Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3393438ybp; Sun, 6 Oct 2019 10:58:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqwEyeU4uJDUEQjbmalmK0XraTPt7Tj8hT7RV3DjnCUGWhmwUsDrgWMqJiF/RJXO7nHSq2EE X-Received: by 2002:aa7:d4c5:: with SMTP id t5mr25262567edr.154.1570384680951; Sun, 06 Oct 2019 10:58:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570384680; cv=none; d=google.com; s=arc-20160816; b=eeVVyHKMNwEOmnP+2K8Gpneut/cwHGHWXxjYZ/Bd1l5CVFITCNMZff+kq6ERHB+zJS dn5RgtOkxwHP7Tsv5pkmXx2str6FeVsZ2AE6vcHZrztiuu5CLnDc9V9fKmXMj0LVF5Df +F++6WJvSwRRpBSxHLRxi6+SnWlRyabYXGAmG4CgJFHDU3jqRNxc77cxA/s++oN7vPYI 9ZAdUe5lKY0jm1pchnKkz9Bqhl//WQXzq5PwwxeMCEA2NBM1r9sdUdXnEMATGekrTCjm D5F0q/yBiV0rKfR3vRXAkgABylrB8Dng/cShfWnKhbdARqDiZWhH3UqUe3rk4FSh70cG 4n1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nkETiw0RLu+rKC4JjVZyGJdQdgJQATJg14N+S2KT7zU=; b=qqtKflG5F/Hcq6Ze41uw4MDEsiFjWJ3jZA5tJfiv3Iovx4Pq9UvvLsMWYngsdbwnXL BFRnuZN8dTUJ/jT1qOF4ifhYtCXFI3wB1mz0I5c/qlABZOWUE3MT4SI1zCRZnpV35HDC HIq676PUaO+PtWoPJDvldlnYhscFBqvyDyl4bIosjEG+LYFG/usPjgAXBNqPlZ5Ufti+ Za/Cj3zG4cG1OweZJUT/Pr6oZ1tIk32b/IYKJB6+wc+Z1F/21O3vfSlCiUpBe4XVr7I0 djHP7FFQRSviucGon0JAa7YUA4+DSGHOKgsmTJ6Ac2AKvQVNzx0WjiEtC2dHr/q5SNG+ aARw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aKGDYh6v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f13si7409416edl.170.2019.10.06.10.57.37; Sun, 06 Oct 2019 10:58:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aKGDYh6v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730006AbfJFRzR (ORCPT + 99 others); Sun, 6 Oct 2019 13:55:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:51348 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727543AbfJFRy3 (ORCPT ); Sun, 6 Oct 2019 13:54:29 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 510AF22470; Sun, 6 Oct 2019 17:46:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383981; bh=mQyM+MYzJfX0sMNye8DCPt5zXmK09F28LgbBWbDWYCw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aKGDYh6vzjWWxC6jHpSptQOQGnJwixZpEoN7qzjGCuKqyeznPibwGG7m74e2gVyJv BW5LCn2mDFbFabAxhRCI6ShARu+uywMamIYrJ3k7NshZGWMNd9p48SXE3PjsdAOjjP f60LeyqeuuH9ClSnJdWCsaZrjD6Qvk0JwEM811aI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+7d6a57304857423318a5@syzkaller.appspotmail.com, David Howells , Miklos Szeredi , Eric Biggers , Al Viro Subject: [PATCH 5.3 166/166] vfs: set fs_context::user_ns for reconfigure Date: Sun, 6 Oct 2019 19:22:12 +0200 Message-Id: <20191006171226.825928317@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171212.850660298@linuxfoundation.org> References: <20191006171212.850660298@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers commit 1dd9bc08cf1420d466dd8dcfcc233777e61ca5d2 upstream. fs_context::user_ns is used by fuse_parse_param(), even during remount, so it needs to be set to the existing value for reconfigure. Reproducer: #include #include int main() { char opts[128]; int fd = open("/dev/fuse", O_RDWR); sprintf(opts, "fd=%d,rootmode=040000,user_id=0,group_id=0", fd); mkdir("mnt", 0777); mount("foo", "mnt", "fuse.foo", 0, opts); mount("foo", "mnt", "fuse.foo", MS_REMOUNT, opts); } Crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP CPU: 0 PID: 129 Comm: syz_make_kuid Not tainted 5.3.0-rc5-next-20190821 #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-20181126_142135-anatol 04/01/2014 RIP: 0010:map_id_range_down+0xb/0xc0 kernel/user_namespace.c:291 [...] Call Trace: map_id_down kernel/user_namespace.c:312 [inline] make_kuid+0xe/0x10 kernel/user_namespace.c:389 fuse_parse_param+0x116/0x210 fs/fuse/inode.c:523 vfs_parse_fs_param+0xdb/0x1b0 fs/fs_context.c:145 vfs_parse_fs_string+0x6a/0xa0 fs/fs_context.c:188 generic_parse_monolithic+0x85/0xc0 fs/fs_context.c:228 parse_monolithic_mount_data+0x1b/0x20 fs/fs_context.c:708 do_remount fs/namespace.c:2525 [inline] do_mount+0x39a/0xa60 fs/namespace.c:3107 ksys_mount+0x7d/0xd0 fs/namespace.c:3325 __do_sys_mount fs/namespace.c:3339 [inline] __se_sys_mount fs/namespace.c:3336 [inline] __x64_sys_mount+0x20/0x30 fs/namespace.c:3336 do_syscall_64+0x4a/0x1a0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe Reported-by: syzbot+7d6a57304857423318a5@syzkaller.appspotmail.com Fixes: 408cbe695350 ("vfs: Convert fuse to use the new mount API") Cc: David Howells Cc: Miklos Szeredi Signed-off-by: Eric Biggers Reviewed-by: David Howells Signed-off-by: Al Viro Signed-off-by: Greg Kroah-Hartman --- fs/fs_context.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/fs/fs_context.c +++ b/fs/fs_context.c @@ -279,10 +279,8 @@ static struct fs_context *alloc_fs_conte fc->user_ns = get_user_ns(reference->d_sb->s_user_ns); break; case FS_CONTEXT_FOR_RECONFIGURE: - /* We don't pin any namespaces as the superblock's - * subscriptions cannot be changed at this point. - */ atomic_inc(&reference->d_sb->s_active); + fc->user_ns = get_user_ns(reference->d_sb->s_user_ns); fc->root = dget(reference); break; }