Received: by 10.192.165.148 with SMTP id m20csp1395072imm; Fri, 27 Apr 2018 19:31:22 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpuceBiTIKwFsL1QqIbYc68lTVEj2mwGfFg/PikCBgXZAiDLI89ujRAV4FAyeQ6Il2T2pjT X-Received: by 2002:a17:902:f44:: with SMTP id 62-v6mr4482461ply.318.1524882682294; Fri, 27 Apr 2018 19:31:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524882682; cv=none; d=google.com; s=arc-20160816; b=fsBdp1FjrHfPzyjCTQre68m8PVffravCuZBAGMKSs94S5KnDXC1KC4YxQ/98re15Is 898U1DIzma+fsejWyQE9MvEYXEgJn2N9Agtls6+ye8wck5kqn2Bap4dUmR5Lugr3qRqJ aDdMNtVqV3aaOQXYDF42IbqL8km+Yfz1CTxbEQeRFrFSkWskwXMXIxBb30A/VDsqQYEm BoHZhQ2V5vsp9oYSqKN0JuAJewvrLAFT2Co9WBU39g2IVoPSRjv+BZMgKhjKlNVIS+1S /z1Z0H9ZvkQFbhZEyxnVFMXWCYU3O2n5IGVFFaOQDn9O+H4/A/sK2r8PAhU6v1ajAKMi AFBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:cc:references:to:subject:arc-authentication-results; bh=5mHqrUDUtPbigBJpABH52/Zv6Y5nluiCpcHAviUPtiI=; b=TKXuYaAF7fCuCO1FT75I7YYG0Febni7Eo6Sl9Xw4hrGpdkFmbwhlvVqpuns9MCxlRC 4hR89chOkrTQc4kTOc1OBygU4vFM/jI4+uXGOi01biesDOZvfKcv0ufttyCZfIVm7d4q EMUFbnjKlFgAPNcRvZWzNM0LN+I+GwM8h7B+1iFqhJBUXrLCbEJ1PX8PdWyFvfJPJ0+n DY8NBFb+Lk/LWcLLXMHykUlPlxK8w7BA/BRIaqiaIdAubUP4gzYM0Be2lrmUwwdvtQ6n aDBSfEPyJb52JBLrzZ3cZxTivaaA5ds1jd8NGoYOMo3wRBmKjNm6yoD1/zrxyOgRfdV7 nGKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p13-v6si2273159pgn.267.2018.04.27.19.31.06; Fri, 27 Apr 2018 19:31:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759487AbeD1C35 (ORCPT + 99 others); Fri, 27 Apr 2018 22:29:57 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:18342 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759307AbeD1C34 (ORCPT ); Fri, 27 Apr 2018 22:29:56 -0400 Received: from fsav104.sakura.ne.jp (fsav104.sakura.ne.jp [27.133.134.231]) by www262.sakura.ne.jp (8.14.5/8.14.5) with ESMTP id w3S2Tkmi071666; Sat, 28 Apr 2018 11:29:46 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav104.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav104.sakura.ne.jp); Sat, 28 Apr 2018 11:29:46 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav104.sakura.ne.jp) Received: from [192.168.1.8] (softbank126099184120.bbtec.net [126.99.184.120]) (authenticated bits=0) by www262.sakura.ne.jp (8.14.5/8.14.5) with ESMTP id w3S2TgWd071615 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 28 Apr 2018 11:29:46 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Subject: Re: general protection fault in fuse_ctl_remove_conn To: syzbot , miklos@szeredi.hu, syzkaller-bugs@googlegroups.com References: <000000000000c0a706056ad69897@google.com> Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org From: Tetsuo Handa Message-ID: Date: Sat, 28 Apr 2018 11:29:38 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <000000000000c0a706056ad69897@google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From 9f41081f8bd6762a6f629e5e23e6d07a62bba69c Mon Sep 17 00:00:00 2001 From: Tetsuo Handa Date: Sat, 28 Apr 2018 11:24:09 +0900 Subject: [PATCH] fuse: don't keep inode-less dentry at fuse_ctl_add_dentry(). syzbot is reporting NULL pointer dereference at fuse_ctl_remove_conn() [1]. Since fc->ctl_ndents is incremented by fuse_ctl_add_conn() when new_inode() failed, fuse_ctl_remove_conn() reaches an inode-less dentry and tries to clear d_inode(dentry)->i_private field. Fix this by calling dput() rather than incrementing fc->ctl_ndents when new_inode() failed. [1] https://syzkaller.appspot.com/bug?id=f396d863067238959c91c0b7cfc10b163638cac6 Signed-off-by: Tetsuo Handa Reported-by: syzbot Fixes: bafa96541b250a70 ("fuse: add control filesystem") Cc: Miklos Szeredi --- fs/fuse/control.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/fs/fuse/control.c b/fs/fuse/control.c index b9ea99c..a651f8e 100644 --- a/fs/fuse/control.c +++ b/fs/fuse/control.c @@ -211,10 +211,12 @@ static struct dentry *fuse_ctl_add_dentry(struct dentry *parent, if (!dentry) return NULL; - fc->ctl_dentry[fc->ctl_ndents++] = dentry; inode = new_inode(fuse_control_sb); - if (!inode) + if (!inode) { + dput(dentry); return NULL; + } + fc->ctl_dentry[fc->ctl_ndents++] = dentry; inode->i_ino = get_next_ino(); inode->i_mode = mode; -- 1.8.3.1