diff options
author | Amir Goldstein <amir73il@gmail.com> | 2019-12-06 07:33:36 +0100 |
---|---|---|
committer | Miklos Szeredi <mszeredi@redhat.com> | 2019-12-10 16:00:55 +0100 |
commit | 6889ee5a53b8d969aa542047f5ac8acdc0e79a91 (patch) | |
tree | 73f32667320449fcc809d211f5d44714de8a9b05 /fs | |
parent | ovl: fix corner case of non-unique st_dev;st_ino (diff) | |
download | linux-6889ee5a53b8d969aa542047f5ac8acdc0e79a91.tar.xz linux-6889ee5a53b8d969aa542047f5ac8acdc0e79a91.zip |
ovl: relax WARN_ON() on rename to self
In ovl_rename(), if new upper is hardlinked to old upper underneath
overlayfs before upper dirs are locked, user will get an ESTALE error
and a WARN_ON will be printed.
Changes to underlying layers while overlayfs is mounted may result in
unexpected behavior, but it shouldn't crash the kernel and it shouldn't
trigger WARN_ON() either, so relax this WARN_ON().
Reported-by: syzbot+bb1836a212e69f8e201a@syzkaller.appspotmail.com
Fixes: 804032fabb3b ("ovl: don't check rename to self")
Cc: <stable@vger.kernel.org> # v4.9+
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/overlayfs/dir.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/overlayfs/dir.c b/fs/overlayfs/dir.c index 702aa63f6774..29abdb1d3b5c 100644 --- a/fs/overlayfs/dir.c +++ b/fs/overlayfs/dir.c @@ -1170,7 +1170,7 @@ static int ovl_rename(struct inode *olddir, struct dentry *old, if (newdentry == trap) goto out_dput; - if (WARN_ON(olddentry->d_inode == newdentry->d_inode)) + if (olddentry->d_inode == newdentry->d_inode) goto out_dput; err = 0; |