[Bug 265311] silly mount() arguments with MNT_UPDATE and MNT_UNION can cause kernel page-fault
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 265311] silly mount() arguments with MNT_UPDATE and MNT_UNION can cause kernel page-fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 265311] silly mount() arguments with MNT_UPDATE and MNT_UNION can cause kernel page-fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 265311] silly mount() arguments with MNT_UPDATE and MNT_UNION can cause kernel page-fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 265311] silly mount() arguments with MNT_UPDATE and MNT_UNION can cause kernel page-fault"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 19 Jul 2022 13:32:40 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=265311 Bug ID: 265311 Summary: silly mount() arguments with MNT_UPDATE and MNT_UNION can cause kernel page-fault Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: rtm@lcs.mit.edu This user program causes a kernel page fault in CURRENT: char data[128]; memset(data, 0, sizeof(data)); *(char **)data = "doesnotexist"; mount("ffs", "/", 0x10020, data); 0x10020 is MNT_UPDATE and MNT_UNION. The crash happens because the argument to VREF is zero in this code from vfs_lookup(): if ((error == ENOENT) && (dp->v_vflag & VV_ROOT) && (dp->v_mount != NULL) && (dp->v_mount->mnt_flag & MNT_UNION)) { tdp = dp; dp = dp->v_mount->mnt_vnodecovered; VREF(dp); panic: Fatal page fault at 0xffffffc0003934f4: 0x000000000001ac ... panic() at panic+0x2a page_fault_handler() at page_fault_handler+0x1a4 do_trap_supervisor() at do_trap_supervisor+0x76 cpu_exception_handler_supervisor() at cpu_exception_handler_supervisor+0x70 --- exception 13, tval = 0x1ac refcount_acquire_if_gt() at refcount_acquire_if_gt+0xe refcount_acquire_if_not_zero() at refcount_acquire_if_not_zero+0xc vget_prep() at vget_prep+0x14 vref() at vref+0x10 vfs_lookup() at vfs_lookup+0x374 namei() at namei+0x17e ffs_mount() at ffs_mount+0x2dc vfs_domount_update() at vfs_domount_update+0x1fa vfs_domount() at vfs_domount+0x230 vfs_donmount() at vfs_donmount+0x742 kernel_mount() at kernel_mount+0x4e ffs_cmount() at ffs_cmount+0x60 sys_mount() at sys_mount+0x17e syscallenter() at syscallenter+0xec ecall_handler() at ecall_handler+0x18 do_trap_user() at do_trap_user+0xea cpu_exception_handler_user() at cpu_exception_handler_user+0x72 -- You are receiving this mail because: You are the assignee for the bug.