[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ybfhcrgmiwlsa4elkag6fuibfnniep76n43xzopxpe645vy4zr@fth26jirachp>
Date: Thu, 12 Jun 2025 15:55:40 +0200
From: Mateusz Guzik <mjguzik@...il.com>
To: Luis Henriques <luis@...lia.com>
Cc: Alexander Viro <viro@...iv.linux.org.uk>,
Christian Brauner <brauner@...nel.org>, Jan Kara <jack@...e.cz>, linux-fsdevel@...r.kernel.org,
linux-kernel@...r.kernel.org, kernel-dev@...lia.com
Subject: Re: [PATCH] fs: drop assert in file_seek_cur_needs_f_lock
On Thu, Jun 12, 2025 at 10:41:01AM +0100, Luis Henriques wrote:
> The assert in function file_seek_cur_needs_f_lock() can be triggered very
> easily because, as Jan Kara suggested, the file reference may get
> incremented after checking it with fdget_pos().
>
> Fixes: da06e3c51794 ("fs: don't needlessly acquire f_lock")
> Signed-off-by: Luis Henriques <luis@...lia.com>
> ---
> Hi Christian,
>
> It wasn't clear whether you'd be queueing this fix yourself. Since I don't
> see it on vfs.git, I decided to explicitly send the patch so that it doesn't
> slip through the cracks.
>
> Cheers,
> --
> Luis
>
> fs/file.c | 2 --
> 1 file changed, 2 deletions(-)
>
> diff --git a/fs/file.c b/fs/file.c
> index 3a3146664cf3..075f07bdc977 100644
> --- a/fs/file.c
> +++ b/fs/file.c
> @@ -1198,8 +1198,6 @@ bool file_seek_cur_needs_f_lock(struct file *file)
> if (!(file->f_mode & FMODE_ATOMIC_POS) && !file->f_op->iterate_shared)
> return false;
>
> - VFS_WARN_ON_ONCE((file_count(file) > 1) &&
> - !mutex_is_locked(&file->f_pos_lock));
> return true;
> }
>
There this justifies the change.
fdget_pos() can only legally skip locking if it determines to be in
position where nobody else can operate on the same file obj, meaning
file_count(file) == 1 and it can't go up. Otherwise the lock is taken.
Or to put it differently, fdget_pos() NOT taking the lock and new refs
showing up later is a bug.
I don't believe anything of the sort is happening here.
Instead, overlayfs is playing games and *NOT* going through fdget_pos():
ovl_inode_lock(inode);
realfile = ovl_real_file(file);
[..]
ret = vfs_llseek(realfile, offset, whence);
Given the custom inode locking around the call, it may be any other
locking is unnecessary and the code happens to be correct despite the
splat.
I think the safest way out with some future-proofing is to in fact *add*
the locking in ovl_llseek() to shut up the assert -- personally I find
it uneasy there is some underlying file obj flying around.
Even if ultimately the assert has to go, the proposed commit message
does not justify it.
Powered by blists - more mailing lists