From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net [23.128.96.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AD4AC41227; Tue, 14 Nov 2023 15:26:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linux.org.uk header.i=@linux.org.uk header.b="E+0fInP0" Received: from zeniv.linux.org.uk (zeniv.linux.org.uk [IPv6:2a03:a000:7:0:5054:ff:fe1c:15ff]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E1A1B93; Tue, 14 Nov 2023 07:26:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=linux.org.uk; s=zeniv-20220401; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=iksz4wvrrAe3MrzMi4Syux0ALWcXSqTNlCCEFGxtMiA=; b=E+0fInP01H8oXGNYXwy2zIWHxc QnhFlc5yYUp9Gj19CLutDX/Au7blOKcbuaAZ7vAhDJWKiShkJeEvm3bpxRx9XkHieoHf5n7CgRceH kOPPBN74RUaRwfYDzraLB9x1tCS4X1UP7l9kG8EyQT9hLTm7QdqdjF+FhKjwMtTiEpVZMlFgRamP8 pB/pFd64pY7g7lCRRplbmdzN3LuDOn/EPI/Tm+1JgvefXPFdOWUcD0mya1zBWbWPbkahqGpR705Bt tt50Lb2viJo9DeQ3VTcEUlBST4ypo+zS5jxZxyf73x8l7k0pWWMIfTtQ/KHokXSSZ+vtm7qnShBFO L+LzMFpA==; Received: from viro by zeniv.linux.org.uk with local (Exim 4.96 #2 (Red Hat Linux)) id 1r2vIf-00Fizn-1h; Tue, 14 Nov 2023 15:26:01 +0000 Date: Tue, 14 Nov 2023 15:26:01 +0000 From: Al Viro To: Ian Kent Cc: Edward Adam Davis , syzbot+662f87a8ef490f45fa64@syzkaller.appspotmail.com, autofs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: [PATCH] autofs: fix null deref in autofs_fill_super Message-ID: <20231114152601.GS1957730@ZenIV> References: <000000000000ae5995060a125650@google.com> <4fcf49456c32087f5306e84c4a8df5b2bd9f4146.camel@themaw.net> <20231114044110.GR1957730@ZenIV> Precedence: bulk X-Mailing-List: linux-fsdevel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Al Viro On Tue, Nov 14, 2023 at 04:30:25PM +0800, Ian Kent wrote: > I'll prepare a patch, the main thing that I was concerned about was > > whether the cause really was NULL root_inode but Edward more or less > > tested that. One thing: that was a massaged copy of the variant in my local tree, so this > > managed_dentry_set_managed(s->s_root); might be worth an explanation; mainline has __managed_dentry_set_managed() here, and yes, it is safe since nothing can access it yet, but... it's not worth skipping on spin_lock/spin_unlock for ->d_flags update here.