On Thu, Mar 28, 2019 at 05:38:29PM +0200, Amir Goldstein wrote: > This nasty little syzbot repro: > https://syzkaller.appspot.com/x/repro.syz?x=12c7a94f400000 > > Creates overlay mounts where the same directory is both in upper > and lower layers. Simplified example: > > mkdir foo work > mount -t overlay none foo -o"lowerdir=.,upperdir=foo,workdir=work" > > The repro runs several threads in parallel that attempt to chdir > into foo and attempt to symlink/rename/exec/mkdir the file bar. > > The repro hits a WARN_ON() I placed in ovl_instantiate(), which > suggests that an overlay inode already exists in cache and is hashed > by the pointer of the real upper dentry that ovl_create_real() has > just created. At the point of the WARN_ON(), for overlay dir inode > lock is held and upper dir inode lock, so at first, I did not see how > this was possible. > > On a closer look, I see that after ovl_create_real(), because of the > overlapping upper and lower layers, a lookup by another thread can > find the file foo/bar that was just created in upper layer, at overlay > path foo/foo/bar and hash the an overlay inode with the new real dentry > as lower dentry. This is possible because the overlay directory > foo/foo is not locked and the upper dentry foo/bar is in dcache, so > ovl_lookup() can find it without taking upper dir inode shared lock. > > Overlapping layers is considered a wrong setup which would result in > unexpected behavior, but it shouldn't crash the kernel and it shouldn't > trigger WARN_ON() either, Hi Amir, Is it possible detect this overlapping layer configuration and fail the mount instead (is_subdir())? Vivek