Received: by 2002:a05:6622:f08:0:0:0:0 with SMTP id l8csp4479267ivc; Tue, 3 Nov 2020 13:06:33 -0800 (PST) X-Google-Smtp-Source: ABdhPJxbk7SCD4FSy9TmTiw90Yni3QpSSK8tZilQjKZqPorbuD5HHaKviJ31VC7fuVokLBZiPvhb X-Received: by 2002:a50:f98b:: with SMTP id q11mr10000224edn.345.1604437593495; Tue, 03 Nov 2020 13:06:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604437593; cv=none; d=google.com; s=arc-20160816; b=F2cvjAhIzHmNtKPKeEDxEEWIvGIkvyaHqFojZzxAY8CCGdZYyJOtCUIAGr1jZ/M6df A3yab78ZhAOeCX9PRuTJikByf6i0u37qwX/l1yGpjxPvGtLbVR0RiDqDUMQs1dFu88wk zAVcdEmcOV13+q8VhcdgMO45uObLS512+IinW6BDl9Gy7W50T+ss1QiidZf3NOpXmSpE 7Cx7d12WFLqoudkxzHXR7Kp3gQP9/WSL59HcdwbGlDcYPERrxWkqLpJ2HGjxebO/06RS DuMiYH+Nj3NpbeqBC28YibxcVprZrae8k3vFHoN813Cf7ufygo5JD726f4vo4CQKnNKB gTkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hDwgjgTfxYjWXB+l2CJOI68FKDkX0ik7khKEUphJUsM=; b=eoqmh9qptsms2HQKrlOzH/aElBTPTdgcfyfOkiwYZbiZy7YvnwxNEgKXOR2GVIvfcC OyDOR46LsDHhW1SFgaHUmDN7ivi3yUuksbhTFhTqmOJVPPXUuGnr46PxHOMAkyzToFF8 bzsaZmrbYSkG7Qs+R++eWUBk4zlmClnbNC+nKWXjJFfy9mpRYzeE1pSkxeQcDTdSSSY4 eIjEssPRI0EKSL6Cx0YMKMFG1vqhu+zPAKfBK7biFqJHMtjWpwWW1GbnQrsWiPvkXA/r kh/dA8p/ay5We6N1Ur+io2ePiUiJt42LJnn5OnrtNEM6ObMtIyX201xyWxka0l38sZCd nRPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AximMhgp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a13si1592595edr.154.2020.11.03.13.06.10; Tue, 03 Nov 2020 13:06:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AximMhgp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388044AbgKCVE6 (ORCPT + 99 others); Tue, 3 Nov 2020 16:04:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:43068 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388033AbgKCVEv (ORCPT ); Tue, 3 Nov 2020 16:04:51 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 64F9220658; Tue, 3 Nov 2020 21:04:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604437490; bh=FDgL0XsLhpdRFS4u/BcWRFfU2xZXVTDuou3wCX2E7rE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AximMhgpPhEecMF5Kxu7qZ9y5oxqx6oYLtixLdWQ+Qv7uynla6FESsaCeA47nx5zA 3y8r1ZrhCmp1rp4mlMnNJkbxNBlbLznplHen3J7g9c19WlZipeAPJxynfWmR3STJeO GB0S9oquU5rvdQigABwkFGgx/fHZM5837RTvzC8w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andreas Dilger , Ritesh Harjani , Jan Kara , Theodore Tso , Sasha Levin Subject: [PATCH 4.19 100/191] ext4: Detect already used quota file early Date: Tue, 3 Nov 2020 21:36:32 +0100 Message-Id: <20201103203243.088642273@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203232.656475008@linuxfoundation.org> References: <20201103203232.656475008@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jan Kara [ Upstream commit e0770e91424f694b461141cbc99adf6b23006b60 ] When we try to use file already used as a quota file again (for the same or different quota type), strange things can happen. At the very least lockdep annotations may be wrong but also inode flags may be wrongly set / reset. When the file is used for two quota types at once we can even corrupt the file and likely crash the kernel. Catch all these cases by checking whether passed file is already used as quota file and bail early in that case. This fixes occasional generic/219 failure due to lockdep complaint. Reviewed-by: Andreas Dilger Reported-by: Ritesh Harjani Signed-off-by: Jan Kara Link: https://lore.kernel.org/r/20201015110330.28716-1-jack@suse.cz Signed-off-by: Theodore Ts'o Signed-off-by: Sasha Levin --- fs/ext4/super.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/fs/ext4/super.c b/fs/ext4/super.c index 0c15ff19acbd4..16ea7cfd130c0 100644 --- a/fs/ext4/super.c +++ b/fs/ext4/super.c @@ -5752,6 +5752,11 @@ static int ext4_quota_on(struct super_block *sb, int type, int format_id, /* Quotafile not on the same filesystem? */ if (path->dentry->d_sb != sb) return -EXDEV; + + /* Quota already enabled for this file? */ + if (IS_NOQUOTA(d_inode(path->dentry))) + return -EBUSY; + /* Journaling quota? */ if (EXT4_SB(sb)->s_qf_names[type]) { /* Quotafile not in fs root? */ -- 2.27.0