Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp8864575rwb; Thu, 24 Nov 2022 05:21:14 -0800 (PST) X-Google-Smtp-Source: AA0mqf5EezFOwJYfnLeuslxMACxLaH+mtln/0AAXcfMOkgIFbHsajzpRuT+yc1IW74ZlEh+UWVSv X-Received: by 2002:a17:906:5409:b0:7b2:7b45:848f with SMTP id q9-20020a170906540900b007b27b45848fmr27967427ejo.129.1669296074501; Thu, 24 Nov 2022 05:21:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669296074; cv=none; d=google.com; s=arc-20160816; b=fw7LCrGz+F70BMBfXvvtkPL97cymnN1wUiJ2eIYKq1Ffytx2vo8XJtxyI9ySTewAXt 8YISGNGPGVpMoQc17E6jRusTzMBfaEXheh35PFfwkagkNk/UUQMe1GKWVgzi2WAyaO6e 3+d/9eDPomlTcXVWkasftQ3hFKd/8I0JdA5Ome1vGqZmudD1g3zPenjWuOdJd86X+fwR Ww4wEmNE8FN+qFAY+xVholVJHCqchBGOKsc/rlbpupxdLPaVFWQpXhOGt7m2jkhAH29h RLGzUboyFBwDwrmqpVIaGx4TLr6lsqTsfWNBSLXvujl11zZ8lMrN8AzcVo25ttV49EVz lsuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=lo5YGwJkzuu1DEKl7Pt4UwcOc8q2fhNpZoctJ4DDbFQ=; b=Jg1sRYY2FBfwM1BOE0PK6qhg79N/icLw1iu8yLnMAhU/dnJgg94bIcdakGoL2C9osu FlONw6fu95oSUWqRWRjx29b1biFDOrfs0b5uD27paI56vRgNv5XHyoBxML8ykJ/WKL5i OR51GURQtyyAQOjxbI+5jbNUMRV+A3wsPdrE6r+GkyBz1hCo//VWXyMwq0PhtNufdrLB 5TLyiaDtfPNS09BXW0k2qlHuvQKmIHhkHZBVDu5hq9mU5p4ghId8DiwFd8rKxkfufKcq Pp3j0NqIjEu6U0MpmUWTu47eurbmSlOMiyiwz/n0+Va3x0nVADvY1ulwIa4P2FIihL4l Yk6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@szeredi.hu header.s=google header.b=CE0hpBY9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=szeredi.hu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s14-20020a50ab0e000000b004593671898esi894865edc.611.2022.11.24.05.20.51; Thu, 24 Nov 2022 05:21:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@szeredi.hu header.s=google header.b=CE0hpBY9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=szeredi.hu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229727AbiKXMpa (ORCPT + 86 others); Thu, 24 Nov 2022 07:45:30 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59548 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229723AbiKXMp1 (ORCPT ); Thu, 24 Nov 2022 07:45:27 -0500 Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F0FE18E0A5 for ; Thu, 24 Nov 2022 04:45:25 -0800 (PST) Received: by mail-ej1-x636.google.com with SMTP id fy37so3878022ejc.11 for ; Thu, 24 Nov 2022 04:45:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=lo5YGwJkzuu1DEKl7Pt4UwcOc8q2fhNpZoctJ4DDbFQ=; b=CE0hpBY9PPZg/9DZFi7e0blAo9T+sKsmWIaI2kynQFy6/a8vcFaZy6nAOiD8blxjwU H9UFJ5LikJT3C8bWpqnIoOV4j1p+5GYsL0IdBQFwM6ge/2xjifrgexL0vNeICEF7ZUF+ bM8XWxv2A/HlUbiyNrZqvW+J+fkvZ68R+/oHk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=lo5YGwJkzuu1DEKl7Pt4UwcOc8q2fhNpZoctJ4DDbFQ=; b=acghPL3Nr8XyOIUKIkeDWsu03tstDr3wV4erF/LWBFlvwg6qW+4K/Hb/w6ePoAJyF+ jOBLBBRjgx6VW7/hX6j6dnx3/Fm3j7/sGh38u4xMMIxY0S22hbwmqk87XfYHvXz2rQYb Ns2NQ+2JDeFBsKUivja29sAFL6ARkwt8lCjglsGxn2Lfi35LTbDTmHP1OJ7XMPuZLUiI E3d5ohe3CLGkKAjjAB1VDv3Et/QJeLy1GZ5JNjczLGbvIWHESOG7TKjpBI8x2zjzrgbS oykzYy29ZBWv3tDxc14Kx5MTAPW7PWsjG5WeYrNu/wFMPVNwFx77cxgRb6vPxu1W0VHH 9E6w== X-Gm-Message-State: ANoB5pmEv3AXhznWFXgP9vFTGqgnVzts+yHBfkcJqk/18apgLhCCEP5e F41IzS/oczMUMcw3/XlvFT3lCw== X-Received: by 2002:a17:906:392:b0:7b5:a9df:d83e with SMTP id b18-20020a170906039200b007b5a9dfd83emr17542962eja.358.1669293924497; Thu, 24 Nov 2022 04:45:24 -0800 (PST) Received: from miu.piliscsaba.redhat.com (91-82-180-126.pool.digikabel.hu. [91.82.180.126]) by smtp.gmail.com with ESMTPSA id f4-20020a05640214c400b00458947539desm468243edx.78.2022.11.24.04.45.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 24 Nov 2022 04:45:24 -0800 (PST) Date: Thu, 24 Nov 2022 13:45:18 +0100 From: Miklos Szeredi To: Chen Zhongjin Cc: syzbot+a4055c78774bbf3498bb@syzkaller.appspotmail.com, linux-unionfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] ovl: Fix use inode directly in rcu-walk mode Message-ID: References: <20221124092602.259809-1-chenzhongjin@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221124092602.259809-1-chenzhongjin@huawei.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 24, 2022 at 05:26:02PM +0800, Chen Zhongjin wrote: > syzkaller reported a null-ptr-deref error: > https://syzkaller.appspot.com/bug?id=bb281e89381b9ed55728c274447a575e69a96c35 > > ovl_dentry_revalidate_common() can be called in rcu-walk mode. > As document said, "in rcu-walk mode, d_parent and d_inode should not be > used without care". Check inode here to protect access under rcu-walk > mode. > > Fixes: bccece1ead36 ("ovl: allow remote upper") > Reported-by: syzbot+a4055c78774bbf3498bb@syzkaller.appspotmail.com > Signed-off-by: Chen Zhongjin Hi, Thanks for the quick analysis and patch. I simplified the patch a bit without changing the attribution. Thanks, Miklos ---- From: Chen Zhongjin Subject: ovl: fix use inode directly in rcu-walk mode ovl_dentry_revalidate_common() can be called in rcu-walk mode. As document said, "in rcu-walk mode, d_parent and d_inode should not be used without care". Check inode here to protect access under rcu-walk mode. Fixes: bccece1ead36 ("ovl: allow remote upper") Reported-by: syzbot+a4055c78774bbf3498bb@syzkaller.appspotmail.com Signed-off-by: Chen Zhongjin Cc: # v5.7 Signed-off-by: Miklos Szeredi --- fs/overlayfs/super.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/fs/overlayfs/super.c +++ b/fs/overlayfs/super.c @@ -139,11 +139,16 @@ static int ovl_dentry_revalidate_common( unsigned int flags, bool weak) { struct ovl_entry *oe = dentry->d_fsdata; + struct inode *inode = d_inode_rcu(dentry); struct dentry *upper; unsigned int i; int ret = 1; - upper = ovl_dentry_upper(dentry); + /* Careful in RCU mode */ + if (!inode) + return -ECHILD; + + upper = ovl_i_dentry_upper(inode); if (upper) ret = ovl_revalidate_real(upper, flags, weak);