Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3066999imm; Sun, 1 Jul 2018 11:28:33 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdT2MpLAkxfrGPNUbFrSjcweNhM5YykkN+SiIx3h4kSPewqGAR9+PAEEzdlW68Mf/zz4Vx4 X-Received: by 2002:a17:902:a24:: with SMTP id 33-v6mr7511056plo.88.1530469713283; Sun, 01 Jul 2018 11:28:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530469713; cv=none; d=google.com; s=arc-20160816; b=socOpEEluFq4+ZRCKde3WO4zdtcSLghP7KX76OtIWBdQKQm9Mb8ayxk5moK8GtscLS po8dkMOjsppOnDxQDiK84dDKr++AiuCBuYEx/3lRB5Efy7UJ9syV4hm+V/lOXjWUvPCV 9ZUwtPr+CDvolC7H9MzrIY2GsFUxlIsN1AnQ8Go8vhTMzI3FJWI046jHd+TlKgENzeZE nKKIaK+LeGN/Ud0smMZb9+oD9KNUVqONoCamOM500M5DPEKL4QBSP5R5YU1jFItsjZ6a 2yvVFudeyyB/WfQwl7P+O7PRF9Mgo0awnwNJZmSGi115Ir56Ah/QH62u2aE0eFu4iN3c 1Aqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=pzUlMQDXFoCQgxI3L0RujpmsAjurAAXXAWIXTNqWM3I=; b=1IzeZV/XVsxcUO7miySt+kNWFh1bI7mfD92CvDBq36aWM93Fgl+fhmP/QWiUgG7n07 0Vn6rr3Q4okIigZfaTyvfhyoYz25u4E2QnXVu7ZvgCiKytpc4mvhtaml2otzqehp8oXi 86fzj0AmTpMR9t+d+EEJuvyvfhuzldqR4gw3wx1Skt3s/rey+J0m7WQC0hWFDPeiV50n B8MU7FhEQe9BuPkUtfaofGOmMe2TxjPrIdj0xeJkjWOPXVId6a2ZSjAdKPFb+SUEDXyL /63QisCLT/BcfRYVnSKe/1+YA7fSjnyYsfXB1NHT67kQ3EuRp7YbCZy75OXr9Mpt8cpE 1zuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s184-v6si12618544pgb.161.2018.07.01.11.28.19; Sun, 01 Jul 2018 11:28:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753328AbeGAQSa (ORCPT + 99 others); Sun, 1 Jul 2018 12:18:30 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:33004 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964950AbeGAQSZ (ORCPT ); Sun, 1 Jul 2018 12:18:25 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 6761C49B; Sun, 1 Jul 2018 16:18:24 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tetsuo Handa , syzbot , John Muir , Csaba Henk , Anand Avati , Miklos Szeredi Subject: [PATCH 4.4 041/105] fuse: dont keep dead fuse_conn at fuse_fill_super(). Date: Sun, 1 Jul 2018 18:01:51 +0200 Message-Id: <20180701153152.186327132@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180701153149.382300170@linuxfoundation.org> References: <20180701153149.382300170@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Tetsuo Handa commit 543b8f8662fe6d21f19958b666ab0051af9db21a upstream. syzbot is reporting use-after-free at fuse_kill_sb_blk() [1]. Since sb->s_fs_info field is not cleared after fc was released by fuse_conn_put() when initialization failed, fuse_kill_sb_blk() finds already released fc and tries to hold the lock. Fix this by clearing sb->s_fs_info field after calling fuse_conn_put(). [1] https://syzkaller.appspot.com/bug?id=a07a680ed0a9290585ca424546860464dd9658db Signed-off-by: Tetsuo Handa Reported-by: syzbot Fixes: 3b463ae0c626 ("fuse: invalidation reverse calls") Cc: John Muir Cc: Csaba Henk Cc: Anand Avati Cc: # v2.6.31 Signed-off-by: Miklos Szeredi Signed-off-by: Greg Kroah-Hartman --- fs/fuse/inode.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/fuse/inode.c +++ b/fs/fuse/inode.c @@ -1158,6 +1158,7 @@ static int fuse_fill_super(struct super_ err_put_conn: fuse_bdi_destroy(fc); fuse_conn_put(fc); + sb->s_fs_info = NULL; err_fput: fput(file); err: