Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4633112pxj; Tue, 25 May 2021 12:29:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyLNoQ0eM/ZyjC0ColfUORDF+xsTihR38N9bq/Q9Iw1XzDrllJJNCc435zuAH5f3Lid6jj7 X-Received: by 2002:a17:906:c212:: with SMTP id d18mr11005049ejz.291.1621970967972; Tue, 25 May 2021 12:29:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621970967; cv=none; d=google.com; s=arc-20160816; b=WFE3gAnLXSB9Yzv4pr0JxW+gFbf0PFWZsCLcQoJvwUCSl1K1ucqAk/UMSCci4DxQzz R6yco25PbNoFHWcqVsj4nOag00+cNynUylMCcicJzHNG2TJUXdPf0rZtwd4CRpGqMmnF rjKJFiLI+GRAh68kwiuWGfUC+13fxZPpsmxrVGR9tbl5ni68WPmagIuXOYAV0UrCJHFf HhTR0XmapJoTL+Y3e15+zb5MtMj+Vb8au2KHl9w0h0bYUvBstliYxPgJjG3RzlDZOvsi JyaF0hokVRdyGRV1lFgbEwbvCSEWCLUjJHCWb2YT3crMRDrnyAV2xQlYkIKPqWY5iMzY 3BHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=QwwibIpiOw0lnR2xuGgxBTVkHMnpX5LkanOW/O3/p5U=; b=K8ED+fsyCLwQR+R7SGfvmzHyA7GhLzaVM+L4/1vdZg6cfQ4Hoc24Yr47uo7PZ+MLDU N8pn7Iv5KYfx6QwaIKgdTnrwopiL8M2+1KVCELHQL+Atum4mWaQmin1mqVuM5ajOKgBW KGvsXoXh1kERGLQjlKKv2fAHMoRv8WSuhecqtaE6WD6ANhPvNLaQfCdNZTt+zkQxVr95 eavTXoEL5z9mjQuEothpeQveuO6nEc9Uwu0sp9vzQemUC23l/bofiwgkGKVSCgXD4+nC weV1sUTqrXf/YXIoDaymfiHeF7AZhtQVhR7g2akavBq+O60tMxyR1vi38BZEkIRtUA8X NmUg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id js19si1571978ejc.73.2021.05.25.12.29.05; Tue, 25 May 2021 12:29:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232154AbhEYPE2 convert rfc822-to-8bit (ORCPT + 99 others); Tue, 25 May 2021 11:04:28 -0400 Received: from us-smtp-delivery-44.mimecast.com ([205.139.111.44]:50415 "EHLO us-smtp-delivery-44.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232032AbhEYPEU (ORCPT ); Tue, 25 May 2021 11:04:20 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-390-TbeyHIyPO7ixY4ulWm630A-1; Tue, 25 May 2021 11:02:44 -0400 X-MC-Unique: TbeyHIyPO7ixY4ulWm630A-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id BEE8A801B15; Tue, 25 May 2021 15:02:42 +0000 (UTC) Received: from bahia.lan (ovpn-113-46.ams2.redhat.com [10.36.113.46]) by smtp.corp.redhat.com (Postfix) with ESMTP id AC6695D723; Tue, 25 May 2021 15:02:37 +0000 (UTC) From: Greg Kurz To: Miklos Szeredi Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Vivek Goyal , virtio-fs@redhat.com, Greg Kurz , mreitz@redhat.com, stable@vger.kernel.org Subject: [PATCH 1/4] fuse: Fix crash in fuse_dentry_automount() error path Date: Tue, 25 May 2021 17:02:27 +0200 Message-Id: <20210525150230.157586-2-groug@kaod.org> In-Reply-To: <20210525150230.157586-1-groug@kaod.org> References: <20210525150230.157586-1-groug@kaod.org> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: kaod.org Content-Transfer-Encoding: 8BIT Content-Type: text/plain; charset=WINDOWS-1252 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If fuse_fill_super_submount() returns an error, the error path triggers a crash: [ 26.206673] BUG: kernel NULL pointer dereference, address: 0000000000000000 [...] [ 26.226362] RIP: 0010:__list_del_entry_valid+0x25/0x90 [...] [ 26.247938] Call Trace: [ 26.248300] fuse_mount_remove+0x2c/0x70 [fuse] [ 26.248892] virtio_kill_sb+0x22/0x160 [virtiofs] [ 26.249487] deactivate_locked_super+0x36/0xa0 [ 26.250077] fuse_dentry_automount+0x178/0x1a0 [fuse] The crash happens because fuse_mount_remove() assumes that the FUSE mount was already added to list under the FUSE connection, but this only done after fuse_fill_super_submount() has returned success. This means that until fuse_fill_super_submount() has returned success, the FUSE mount isn't actually owned by the superblock. We should thus reclaim ownership by clearing sb->s_fs_info, which will skip the call to fuse_mount_remove(), and perform rollback, like virtio_fs_get_tree() already does for the root sb. Fixes: bf109c64040f ("fuse: implement crossmounts") Cc: mreitz@redhat.com Cc: stable@vger.kernel.org # v5.10+ Signed-off-by: Greg Kurz --- fs/fuse/dir.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/fs/fuse/dir.c b/fs/fuse/dir.c index 1b6c001a7dd1..01559061cbfb 100644 --- a/fs/fuse/dir.c +++ b/fs/fuse/dir.c @@ -339,8 +339,12 @@ static struct vfsmount *fuse_dentry_automount(struct path *path) /* Initialize superblock, making @mp_fi its root */ err = fuse_fill_super_submount(sb, mp_fi); - if (err) + if (err) { + fuse_conn_put(fc); + kfree(fm); + sb->s_fs_info = NULL; goto out_put_sb; + } sb->s_flags |= SB_ACTIVE; fsc->root = dget(sb->s_root); -- 2.31.1