lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <98d4f3c3-1ac3-d94b-d4b6-295d8b3264c5@intel.com>
Date:   Fri, 2 Sep 2022 14:23:48 +0800
From:   kernel test robot <yujie.liu@...el.com>
To:     Karthik Alapati <mail@...thek.com>
CC:     <lkp@...ts.01.org>, <lkp@...el.com>, 0day robot <lkp@...el.com>,
        <ntfs3@...ts.linux.dev>,
        Konstantin Komarov <almaz.alexandrovich@...agon-software.com>,
        Nathan Chancellor <nathan@...nel.org>,
        Nick Desaulniers <ndesaulniers@...gle.com>,
        Tom Rix <trix@...hat.com>, <linux-kernel@...r.kernel.org>,
        <llvm@...ts.linux.dev>
Subject: [fs/ntfs3] 6457c9bffd: RIP:put_mount_options

Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 6457c9bffda42028f5314008cbd053bc2286611e ("[PATCH] fs/ntfs3: fix memory leak in put_ntfs()")
url: https://github.com/intel-lab-lkp/linux/commits/Karthik-Alapati/fs-ntfs3-fix-memory-leak-in-put_ntfs/20220831-123557
base: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git dcf8e5633e2e69ad60b730ab5905608b756a032f
patch link: ntfs3.lists.linux.dev   https://lore.kernel.org/ntfs3/Yw7k0VQm%2B8l8JKWr@karthik-strix-linux.karthek.com

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


[  125.350941][  T230] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
[  125.352173][  T230] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[  125.352873][  T230] CPU: 1 PID: 230 Comm: mount Not tainted 6.0.0-rc3-00008-g6457c9bffda4 #1
[  125.353616][  T230] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014
[  125.354531][  T230] RIP: 0010:put_mount_options+0x14/0x59
[  125.355125][  T230] Code: e8 37 37 b9 ff f0 ff 4b 34 75 09 48 89 df 5b e9 ac 1a ad ff 5b c3 48 89 fa b8 ff ff 37 00 55 48 89 fd 48 c1 ea 03 48 c1 e0 2a <80> 3c 02 00 74 05 e8 f3 32 b9 ff 48 8b 7d 00 e8 9e e0 b8 ff 48 8d
[  125.356733][  T230] RSP: 0018:ffffc90000547cc8 EFLAGS: 00010286
[  125.357247][  T230] RAX: dffffc0000000000 RBX: ffff88816b58e400 RCX: 0000000000000000
[  125.357912][  T230] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000
[  125.358465][  T230] RBP: 0000000000000000 R08: 000000000000001e R09: ffffc9000054798f
[  125.358912][  T230] R10: 0000000000000001 R11: ffffffff81204b88 R12: ffff88816b58e4b0
[  125.359561][  T230] R13: 0000000000000000 R14: ffff8881154d03a0 R15: ffffc90000547da0
[  125.360290][  T230] FS:  00007f8cb234d740(0000) GS:ffff8883aef00000(0000) knlGS:0000000000000000
[  125.361112][  T230] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  125.361702][  T230] CR2: 000055fd37b7e078 CR3: 00000001123d8000 CR4: 00000000000406e0
[  125.362426][  T230] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  125.363170][  T230] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  125.363904][  T230] Call Trace:
[  125.364118][  T230]  <TASK>
[  125.364385][  T230]  put_ntfs+0x32/0x26f
[  125.364774][  T230]  ntfs_fs_free+0x61/0x73
[  125.365206][  T230]  put_fs_context+0x129/0x33c
[  125.365593][  T230]  ? put_ntfs+0x26f/0x26f
[  125.365849][  T230]  do_new_mount+0x27b/0x314
[  125.366250][  T230]  ? do_add_mount+0x1e8/0x1e8
[  125.366525][  T230]  path_mount+0x9af/0x9d8
[  125.366774][  T230]  ? finish_automount+0x316/0x316
[  125.367142][  T230]  do_mount+0x89/0xb7
[  125.367524][  T230]  ? path_mount+0x9d8/0x9d8
[  125.367928][  T230]  __x64_sys_mount+0x249/0x275
[  125.368347][  T230]  ? lockdep_hardirqs_on_prepare+0x2bc/0x2dd
[  125.368942][  T230]  do_syscall_64+0x6e/0x82
[  125.369355][  T230]  entry_SYSCALL_64_after_hwframe+0x5e/0xc8
[  125.369875][  T230] RIP: 0033:0x7f8cb24476ca
[  125.370286][  T230] Code: 48 8b 0d c9 b7 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 96 b7 0b 00 f7 d8 64 89 01 48
[  125.371336][  T230] RSP: 002b:00007ffcabdd8d78 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  125.371770][  T230] RAX: ffffffffffffffda RBX: 00007ffcabdd8f10 RCX: 00007f8cb24476ca
[  125.372176][  T230] RDX: 000055fd37b7e5e0 RSI: 000055fd37b7a7c1 RDI: 000055fd37b7a7ac
[  125.372581][  T230] RBP: 0000000000008000 R08: 0000000000000000 R09: 000055fd37b7e9a0
[  125.372987][  T230] R10: 0000000000008000 R11: 0000000000000206 R12: 00007f8cb234d6c0
[  125.373392][  T230] R13: 0000000000000000 R14: 000055fd37b6a138 R15: 00000000ffffffff
[  125.373799][  T230]  </TASK>
[  125.373986][  T230] Modules linked in:
[  125.374356][  T230] ---[ end trace 0000000000000000 ]---
[  125.374647][  T230] RIP: 0010:put_mount_options+0x14/0x59
[  125.374954][  T230] Code: e8 37 37 b9 ff f0 ff 4b 34 75 09 48 89 df 5b e9 ac 1a ad ff 5b c3 48 89 fa b8 ff ff 37 00 55 48 89 fd 48 c1 ea 03 48 c1 e0 2a <80> 3c 02 00 74 05 e8 f3 32 b9 ff 48 8b 7d 00 e8 9e e0 b8 ff 48 8d
[  125.375947][  T230] RSP: 0018:ffffc90000547cc8 EFLAGS: 00010286
[  125.376263][  T230] RAX: dffffc0000000000 RBX: ffff88816b58e400 RCX: 0000000000000000
[  125.376669][  T230] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000
[  125.377075][  T230] RBP: 0000000000000000 R08: 000000000000001e R09: ffffc9000054798f
[  125.377481][  T230] R10: 0000000000000001 R11: ffffffff81204b88 R12: ffff88816b58e4b0
[  125.377886][  T230] R13: 0000000000000000 R14: ffff8881154d03a0 R15: ffffc90000547da0
[  125.378309][  T230] FS:  00007f8cb234d740(0000) GS:ffff8883aef00000(0000) knlGS:0000000000000000
[  125.378763][  T230] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  125.379124][  T230] CR2: 000055fd37b7e078 CR3: 00000001123d8000 CR4: 00000000000406e0
[  125.379531][  T230] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  125.379933][  T230] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  125.380340][  T230] Kernel panic - not syncing: Fatal exception
[  125.380718][  T230] Kernel Offset: disabled


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <yujie.liu@...el.com>


To reproduce:

         # build kernel
	cd linux
	cp config-6.0.0-rc3-00008-g6457c9bffda4 .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


         git clone https://github.com/intel/lkp-tests.git
         cd lkp-tests
         bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

         # if come across any failure that blocks the test,
         # please remove ~/.lkp and /lkp dir to run from a clean state.


-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config-6.0.0-rc3-00008-g6457c9bffda4" of type "text/plain" (133714 bytes)

View attachment "job-script" of type "text/plain" (5091 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (15196 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ