lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1190996517.7344.79.camel@localhost>
Date:	Fri, 28 Sep 2007 09:21:57 -0700
From:	Dave Hansen <haveblue@...ibm.com>
To:	Andrew Morton <akpm@...ux-foundation.org>
Cc:	Zan Lynx <zlynx@....org>,
	Linux Kernel <linux-kernel@...r.kernel.org>,
	reiserfs-devel <reiserfs-devel@...r.kernel.org>,
	hch <hch@...radead.org>, reiserfs-dev@...esys.com
Subject: Re: 2.6.23-rc8-mm2 NULL dereference in __mnt_is_readonly in
	ftruncate

On Fri, 2007-09-28 at 01:30 -0700, Andrew Morton wrote:
> On Thu, 27 Sep 2007 15:54:20 -0600 Zan Lynx <zlynx@....org> wrote:
> > Near the end of my boot sequence, there is a kernel error.  I am not
> > sure exactly what user-space is doing to make this happen, but I know
> > that a simple shell and some filesystem operations do not cause it.
> > 
> > This error also occurred in 2.6.23-rc8-mm1 but I didn't have time to
> > post it and hoped it would just go away.  I never tested 2.6.23-rc7-mm*,
> > and the error did not happen in rc6-mm1.
> > 
> > console [netcon0] enabled
> > netconsole: network logging started
> > eth0: no IPv6 routers present
> > Unable to handle kernel NULL pointer dereference at 0000000000000053 RIP: 
> >  [<ffffffff802c96c0>] __mnt_is_readonly+0x0/0x20
> > PGD 0 
> > Oops: 0000 [1] SMP 
> > last sysfs file: /block/sr0/size
> > CPU 0 
> > Modules linked in: netconsole configfs sg ipv6 evdev usbhid hid usb_storage libusual psmouse serio_raw ssb video output ehci_hcd ohci_hcd usbcore snd_intel8x0 snd_ac97_codec ac97_bus snd_pcm snd_timer snd snd_page_alloc
> > Pid: 7291, comm: smbd Not tainted 2.6.23-rc8-mm2 #1
> > RIP: 0010:[<ffffffff802c96c0>]  [<ffffffff802c96c0>] __mnt_is_readonly+0x0/0x20
> > RSP: 0018:ffff8100068b1b60  EFLAGS: 00010296
> > RAX: ffff810007108000 RBX: ffff81000261d8c0 RCX: ffffffff8093aca0
> > RDX: 0000000000000004 RSI: ffffffff8092e950 RDI: 0000000000000003
> > RBP: 0000000000000003 R08: 0000000000000003 R09: ffffffff8061f7cd
> > R10: 00000000b256aacb R11: 0000000000000000 R12: 00000000ffffffe2
> > R13: ffff8100068b1bd8 R14: ffff8100068b1ee8 R15: ffff81000655a910
> > FS:  00007f6f0930c6f0(0000) GS:ffffffff806ce000(0000) knlGS:0000000000000000
> > CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> > CR2: 0000000000000053 CR3: 0000000007cb2000 CR4: 00000000000006e0
> > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > Process smbd (pid: 7291, threadinfo ffff8100068b0000, task ffff810007108000)
> > last branch before last exception/interrupt
> >  from  [<ffffffff802cc37a>] mnt_want_write+0x3a/0x90
> >  to  [<ffffffff802c96c0>] __mnt_is_readonly+0x0/0x20
> > Stack:  ffffffff802cc37f ffff8100078cd9a0 ffff8100068b1bd8 ffff8100078cd9a0
> >  ffffffff802c82bc ffff8100078cd780 0000000000000000 ffff8100078cd9a0
> >  ffff8100068b1bd8 ffff8100068b1ee8 0000000000003000 0000000000000000
> > Call Trace:
> >  [<ffffffff802cc37f>] mnt_want_write+0x3f/0x90
> >  [<ffffffff802c82bc>] file_update_time+0x2c/0xe0
> >  [<ffffffff803506a8>] truncate_file_body+0x148/0x3f0
> >  [<ffffffff802647a3>] __lock_acquire+0x583/0x1180
> >  [<ffffffff80537f17>] _spin_unlock+0x17/0x20
> >  [<ffffffff80363822>] store_black_box+0x82/0x90
> >  [<ffffffff8034a845>] safe_link_add+0x75/0xd0
> >  [<ffffffff803521f7>] setattr_unix_file+0x207/0x220
> >  [<ffffffff80538274>] _spin_unlock_irq+0x24/0x30
> >  [<ffffffff805377f1>] __down_write_nested+0xa1/0xc0
> >  [<ffffffff802c8857>] notify_change+0xf7/0x2c0
> >  [<ffffffff802b051e>] do_truncate+0x5e/0x80
> >  [<ffffffff802b0659>] sys_ftruncate+0x119/0x130
> >  [<ffffffff8020c39e>] system_call+0x7e/0x83
> 
> But you oopsed in a different place, via resier4.  I don't know if Dave
> considers that part of his mandate - he could reasonably ask the reiser4
> guys to help fix things up.

First of all, thanks a bunch for the report.  It really helps.

This could probably be considered a reiser4 bug, excited by the r/o bind
mount changes.  See how that pointer is 0x...053?  That's a weird offset
for a structure that should be mostly word-aligned.  

I think that's because reiser4 stack-allocates a 'struct file', and then
only initializes parts of it, *not* including the vfsmount.  The test in
file_update_time() is for f->f_vfsmnt == NULL, and I think we had
something like 0x1 in there.

I think that stack allocation is a pretty nasty trick for a structure
that's supposed to be pretty persistent and dynamically allocated, and
is certainly something that needs to get fixed up in a proper way.

This works around the problem for now, but this could potentially cause
more bugs any time we add some member to 'struct file' and depend on its
state being sane anywhere in the VFS.  If there's a list anywhere of
merge-stopper reiser4 bugs around, this should probably go in there. 

In general, I think reiser4 also lets the 'struct file' get way too deep
into its internals.  For instance, I would expect reiser4_write_extent()
to take a plain inode, not a 'struct file'.

Signed-off-by: Dave Hansen <haveblue@...ibm.com>

---

 lxc-dave/fs/reiser4/plugin/file/file.c |    1 +
 1 file changed, 1 insertion(+)

diff -puN fs/reiser4/plugin/file/file.c~reiser4-need-to-initialize-file-f_mnt fs/reiser4/plugin/file/file.c
--- lxc/fs/reiser4/plugin/file/file.c~reiser4-need-to-initialize-file-f_mnt	2007-09-28 09:10:51.000000000 -0700
+++ lxc-dave/fs/reiser4/plugin/file/file.c	2007-09-28 09:11:20.000000000 -0700
@@ -581,6 +581,7 @@ static int truncate_file_body(struct ino
 		file.private_data = NULL;
 		file.f_pos = new_size;
 		file.private_data = NULL;
+		file.f_vfsmnt = NULL;
 		uf_info = unix_file_inode_data(inode);
 		result = find_file_state(inode, uf_info);
 		if (result)
_


-- Dave

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ