1. 30 Sep, 2022 19 commits
    • Edward Lo's avatar
      fs/ntfs3: Validate buffer length while parsing index · 4d42ecda
      Edward Lo authored
      indx_read is called when we have some NTFS directory operations that
      need more information from the index buffers. This adds a sanity check
      to make sure the returned index buffer length is legit, or we may have
      some out-of-bound memory accesses.
      
      [  560.897595] BUG: KASAN: slab-out-of-bounds in hdr_find_e.isra.0+0x10c/0x320
      [  560.898321] Read of size 2 at addr ffff888009497238 by task exp/245
      [  560.898760]
      [  560.899129] CPU: 0 PID: 245 Comm: exp Not tainted 6.0.0-rc6 #37
      [  560.899505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [  560.900170] Call Trace:
      [  560.900407]  <TASK>
      [  560.900732]  dump_stack_lvl+0x49/0x63
      [  560.901108]  print_report.cold+0xf5/0x689
      [  560.901395]  ? hdr_find_e.isra.0+0x10c/0x320
      [  560.901716]  kasan_report+0xa7/0x130
      [  560.901950]  ? hdr_find_e.isra.0+0x10c/0x320
      [  560.902208]  __asan_load2+0x68/0x90
      [  560.902427]  hdr_find_e.isra.0+0x10c/0x320
      [  560.902846]  ? cmp_uints+0xe0/0xe0
      [  560.903363]  ? cmp_sdh+0x90/0x90
      [  560.903883]  ? ntfs_bread_run+0x190/0x190
      [  560.904196]  ? rwsem_down_read_slowpath+0x750/0x750
      [  560.904969]  ? ntfs_fix_post_read+0xe0/0x130
      [  560.905259]  ? __kasan_check_write+0x14/0x20
      [  560.905599]  ? up_read+0x1a/0x90
      [  560.905853]  ? indx_read+0x22c/0x380
      [  560.906096]  indx_find+0x2ef/0x470
      [  560.906352]  ? indx_find_buffer+0x2d0/0x2d0
      [  560.906692]  ? __kasan_kmalloc+0x88/0xb0
      [  560.906977]  dir_search_u+0x196/0x2f0
      [  560.907220]  ? ntfs_nls_to_utf16+0x450/0x450
      [  560.907464]  ? __kasan_check_write+0x14/0x20
      [  560.907747]  ? mutex_lock+0x8f/0xe0
      [  560.907970]  ? __mutex_lock_slowpath+0x20/0x20
      [  560.908214]  ? kmem_cache_alloc+0x143/0x4b0
      [  560.908459]  ntfs_lookup+0xe0/0x100
      [  560.908788]  __lookup_slow+0x116/0x220
      [  560.909050]  ? lookup_fast+0x1b0/0x1b0
      [  560.909309]  ? lookup_fast+0x13f/0x1b0
      [  560.909601]  walk_component+0x187/0x230
      [  560.909944]  link_path_walk.part.0+0x3f0/0x660
      [  560.910285]  ? handle_lookup_down+0x90/0x90
      [  560.910618]  ? path_init+0x642/0x6e0
      [  560.911084]  ? percpu_counter_add_batch+0x6e/0xf0
      [  560.912559]  ? __alloc_file+0x114/0x170
      [  560.913008]  path_openat+0x19c/0x1d10
      [  560.913419]  ? getname_flags+0x73/0x2b0
      [  560.913815]  ? kasan_save_stack+0x3a/0x50
      [  560.914125]  ? kasan_save_stack+0x26/0x50
      [  560.914542]  ? __kasan_slab_alloc+0x6d/0x90
      [  560.914924]  ? kmem_cache_alloc+0x143/0x4b0
      [  560.915339]  ? getname_flags+0x73/0x2b0
      [  560.915647]  ? getname+0x12/0x20
      [  560.916114]  ? __x64_sys_open+0x4c/0x60
      [  560.916460]  ? path_lookupat.isra.0+0x230/0x230
      [  560.916867]  ? __isolate_free_page+0x2e0/0x2e0
      [  560.917194]  do_filp_open+0x15c/0x1f0
      [  560.917448]  ? may_open_dev+0x60/0x60
      [  560.917696]  ? expand_files+0xa4/0x3a0
      [  560.917923]  ? __kasan_check_write+0x14/0x20
      [  560.918185]  ? _raw_spin_lock+0x88/0xdb
      [  560.918409]  ? _raw_spin_lock_irqsave+0x100/0x100
      [  560.918783]  ? _find_next_bit+0x4a/0x130
      [  560.919026]  ? _raw_spin_unlock+0x19/0x40
      [  560.919276]  ? alloc_fd+0x14b/0x2d0
      [  560.919635]  do_sys_openat2+0x32a/0x4b0
      [  560.920035]  ? file_open_root+0x230/0x230
      [  560.920336]  ? __rcu_read_unlock+0x5b/0x280
      [  560.920813]  do_sys_open+0x99/0xf0
      [  560.921208]  ? filp_open+0x60/0x60
      [  560.921482]  ? exit_to_user_mode_prepare+0x49/0x180
      [  560.921867]  __x64_sys_open+0x4c/0x60
      [  560.922128]  do_syscall_64+0x3b/0x90
      [  560.922369]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [  560.923030] RIP: 0033:0x7f7dff2e4469
      [  560.923681] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 088
      [  560.924451] RSP: 002b:00007ffd41a210b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000002
      [  560.925168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7dff2e4469
      [  560.925655] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007ffd41a211f0
      [  560.926085] RBP: 00007ffd41a252a0 R08: 00007f7dff60fba0 R09: 00007ffd41a25388
      [  560.926405] R10: 0000000000400b80 R11: 0000000000000206 R12: 00000000004004e0
      [  560.926867] R13: 00007ffd41a25380 R14: 0000000000000000 R15: 0000000000000000
      [  560.927241]  </TASK>
      [  560.927491]
      [  560.927755] Allocated by task 245:
      [  560.928409]  kasan_save_stack+0x26/0x50
      [  560.929271]  __kasan_kmalloc+0x88/0xb0
      [  560.929778]  __kmalloc+0x192/0x320
      [  560.930023]  indx_read+0x249/0x380
      [  560.930224]  indx_find+0x2a2/0x470
      [  560.930695]  dir_search_u+0x196/0x2f0
      [  560.930892]  ntfs_lookup+0xe0/0x100
      [  560.931115]  __lookup_slow+0x116/0x220
      [  560.931323]  walk_component+0x187/0x230
      [  560.931570]  link_path_walk.part.0+0x3f0/0x660
      [  560.931791]  path_openat+0x19c/0x1d10
      [  560.932008]  do_filp_open+0x15c/0x1f0
      [  560.932226]  do_sys_openat2+0x32a/0x4b0
      [  560.932413]  do_sys_open+0x99/0xf0
      [  560.932709]  __x64_sys_open+0x4c/0x60
      [  560.933417]  do_syscall_64+0x3b/0x90
      [  560.933776]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [  560.934235]
      [  560.934486] The buggy address belongs to the object at ffff888009497000
      [  560.934486]  which belongs to the cache kmalloc-512 of size 512
      [  560.935239] The buggy address is located 56 bytes to the right of
      [  560.935239]  512-byte region [ffff888009497000, ffff888009497200)
      [  560.936153]
      [  560.937326] The buggy address belongs to the physical page:
      [  560.938228] page:0000000062a3dfae refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9496
      [  560.939616] head:0000000062a3dfae order:1 compound_mapcount:0 compound_pincount:0
      [  560.940219] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff)
      [  560.942702] raw: 000fffffc0010200 ffffea0000164f80 dead000000000005 ffff888001041c80
      [  560.943932] raw: 0000000000000000 0000000080080008 00000001ffffffff 0000000000000000
      [  560.944568] page dumped because: kasan: bad access detected
      [  560.945735]
      [  560.946112] Memory state around the buggy address:
      [  560.946870]  ffff888009497100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      [  560.947242]  ffff888009497180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      [  560.947611] >ffff888009497200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      [  560.947915]                                         ^
      [  560.948249]  ffff888009497280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      [  560.948687]  ffff888009497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      Signed-off-by: default avatarEdward Lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      4d42ecda
    • Dan Carpenter's avatar
      fs/ntfs3: Harden against integer overflows · e001e608
      Dan Carpenter authored
      Smatch complains that the "add_bytes" is not to be trusted.  Use
      size_add() to prevent an integer overflow.
      
      Fixes: be71b5cb ("fs/ntfs3: Add attrib operations")
      Signed-off-by: default avatarDan Carpenter <dan.carpenter@oracle.com>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      e001e608
    • Edward Lo's avatar
      fs/ntfs3: Validate attribute name offset · 4f1dc7d9
      Edward Lo authored
      Although the attribute name length is checked before comparing it to
      some common names (e.g., $I30), the offset isn't. This adds a sanity
      check for the attribute name offset, guarantee the validity and prevent
      possible out-of-bound memory accesses.
      
      [  191.720056] BUG: unable to handle page fault for address: ffffebde00000008
      [  191.721060] #PF: supervisor read access in kernel mode
      [  191.721586] #PF: error_code(0x0000) - not-present page
      [  191.722079] PGD 0 P4D 0
      [  191.722571] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
      [  191.723179] CPU: 0 PID: 244 Comm: mount Not tainted 6.0.0-rc4 #28
      [  191.723749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [  191.724832] RIP: 0010:kfree+0x56/0x3b0
      [  191.725870] Code: 80 48 01 d8 0f 82 65 03 00 00 48 c7 c2 00 00 00 80 48 2b 15 2c 06 dd 01 48 01 d0 48 c1 e8 0c 48 c1 e0 06 48 03 05 0a 069
      [  191.727375] RSP: 0018:ffff8880076f7878 EFLAGS: 00000286
      [  191.727897] RAX: ffffebde00000000 RBX: 0000000000000040 RCX: ffffffff8528d5b9
      [  191.728531] RDX: 0000777f80000000 RSI: ffffffff8522d49c RDI: 0000000000000040
      [  191.729183] RBP: ffff8880076f78a0 R08: 0000000000000000 R09: 0000000000000000
      [  191.729628] R10: ffff888008949fd8 R11: ffffed10011293fd R12: 0000000000000040
      [  191.730158] R13: ffff888008949f98 R14: ffff888008949ec0 R15: ffff888008949fb0
      [  191.730645] FS:  00007f3520cd7e40(0000) GS:ffff88805ba00000(0000) knlGS:0000000000000000
      [  191.731328] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  191.731667] CR2: ffffebde00000008 CR3: 0000000009704000 CR4: 00000000000006f0
      [  191.732568] Call Trace:
      [  191.733231]  <TASK>
      [  191.733860]  kvfree+0x2c/0x40
      [  191.734632]  ni_clear+0x180/0x290
      [  191.735085]  ntfs_evict_inode+0x45/0x70
      [  191.735495]  evict+0x199/0x280
      [  191.735996]  iput.part.0+0x286/0x320
      [  191.736438]  iput+0x32/0x50
      [  191.736811]  iget_failed+0x23/0x30
      [  191.737270]  ntfs_iget5+0x337/0x1890
      [  191.737629]  ? ntfs_clear_mft_tail+0x20/0x260
      [  191.738201]  ? ntfs_get_block_bmap+0x70/0x70
      [  191.738482]  ? ntfs_objid_init+0xf6/0x140
      [  191.738779]  ? ntfs_reparse_init+0x140/0x140
      [  191.739266]  ntfs_fill_super+0x121b/0x1b50
      [  191.739623]  ? put_ntfs+0x1d0/0x1d0
      [  191.739984]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
      [  191.740466]  ? put_ntfs+0x1d0/0x1d0
      [  191.740787]  ? sb_set_blocksize+0x6a/0x80
      [  191.741272]  get_tree_bdev+0x232/0x370
      [  191.741829]  ? put_ntfs+0x1d0/0x1d0
      [  191.742669]  ntfs_fs_get_tree+0x15/0x20
      [  191.743132]  vfs_get_tree+0x4c/0x130
      [  191.743457]  path_mount+0x654/0xfe0
      [  191.743938]  ? putname+0x80/0xa0
      [  191.744271]  ? finish_automount+0x2e0/0x2e0
      [  191.744582]  ? putname+0x80/0xa0
      [  191.745053]  ? kmem_cache_free+0x1c4/0x440
      [  191.745403]  ? putname+0x80/0xa0
      [  191.745616]  do_mount+0xd6/0xf0
      [  191.745887]  ? path_mount+0xfe0/0xfe0
      [  191.746287]  ? __kasan_check_write+0x14/0x20
      [  191.746582]  __x64_sys_mount+0xca/0x110
      [  191.746850]  do_syscall_64+0x3b/0x90
      [  191.747122]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [  191.747517] RIP: 0033:0x7f351fee948a
      [  191.748332] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
      [  191.749341] RSP: 002b:00007ffd51cf3af8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
      [  191.749960] RAX: ffffffffffffffda RBX: 000055b903733060 RCX: 00007f351fee948a
      [  191.750589] RDX: 000055b903733260 RSI: 000055b9037332e0 RDI: 000055b90373bce0
      [  191.751115] RBP: 0000000000000000 R08: 000055b903733280 R09: 0000000000000020
      [  191.751537] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 000055b90373bce0
      [  191.751946] R13: 000055b903733260 R14: 0000000000000000 R15: 00000000ffffffff
      [  191.752519]  </TASK>
      [  191.752782] Modules linked in:
      [  191.753785] CR2: ffffebde00000008
      [  191.754937] ---[ end trace 0000000000000000 ]---
      [  191.755429] RIP: 0010:kfree+0x56/0x3b0
      [  191.755725] Code: 80 48 01 d8 0f 82 65 03 00 00 48 c7 c2 00 00 00 80 48 2b 15 2c 06 dd 01 48 01 d0 48 c1 e8 0c 48 c1 e0 06 48 03 05 0a 069
      [  191.756744] RSP: 0018:ffff8880076f7878 EFLAGS: 00000286
      [  191.757218] RAX: ffffebde00000000 RBX: 0000000000000040 RCX: ffffffff8528d5b9
      [  191.757580] RDX: 0000777f80000000 RSI: ffffffff8522d49c RDI: 0000000000000040
      [  191.758016] RBP: ffff8880076f78a0 R08: 0000000000000000 R09: 0000000000000000
      [  191.758570] R10: ffff888008949fd8 R11: ffffed10011293fd R12: 0000000000000040
      [  191.758957] R13: ffff888008949f98 R14: ffff888008949ec0 R15: ffff888008949fb0
      [  191.759317] FS:  00007f3520cd7e40(0000) GS:ffff88805ba00000(0000) knlGS:0000000000000000
      [  191.759711] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  191.760118] CR2: ffffebde00000008 CR3: 0000000009704000 CR4: 00000000000006f0
      Signed-off-by: default avatarEdward Lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      4f1dc7d9
    • Edward Lo's avatar
      fs/ntfs3: Add null pointer check for inode operations · c1ca8ef0
      Edward Lo authored
      This adds a sanity check for the i_op pointer of the inode which is
      returned after reading Root directory MFT record. We should check the
      i_op is valid before trying to create the root dentry, otherwise we may
      encounter a NPD while mounting a image with a funny Root directory MFT
      record.
      
      [  114.484325] BUG: kernel NULL pointer dereference, address: 0000000000000008
      [  114.484811] #PF: supervisor read access in kernel mode
      [  114.485084] #PF: error_code(0x0000) - not-present page
      [  114.485606] PGD 0 P4D 0
      [  114.485975] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
      [  114.486570] CPU: 0 PID: 237 Comm: mount Tainted: G    B              6.0.0-rc4 #28
      [  114.486977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [  114.488169] RIP: 0010:d_flags_for_inode+0xe0/0x110
      [  114.488816] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241
      [  114.490326] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296
      [  114.490695] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea
      [  114.490986] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020
      [  114.491364] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05
      [  114.491675] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000
      [  114.491954] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750
      [  114.492397] FS:  00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000
      [  114.492797] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  114.493150] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0
      [  114.493671] Call Trace:
      [  114.493890]  <TASK>
      [  114.494075]  __d_instantiate+0x24/0x1c0
      [  114.494505]  d_instantiate.part.0+0x35/0x50
      [  114.494754]  d_make_root+0x53/0x80
      [  114.494998]  ntfs_fill_super+0x1232/0x1b50
      [  114.495260]  ? put_ntfs+0x1d0/0x1d0
      [  114.495499]  ? vsprintf+0x20/0x20
      [  114.495723]  ? set_blocksize+0x95/0x150
      [  114.495964]  get_tree_bdev+0x232/0x370
      [  114.496272]  ? put_ntfs+0x1d0/0x1d0
      [  114.496502]  ntfs_fs_get_tree+0x15/0x20
      [  114.496859]  vfs_get_tree+0x4c/0x130
      [  114.497099]  path_mount+0x654/0xfe0
      [  114.497507]  ? putname+0x80/0xa0
      [  114.497933]  ? finish_automount+0x2e0/0x2e0
      [  114.498362]  ? putname+0x80/0xa0
      [  114.498571]  ? kmem_cache_free+0x1c4/0x440
      [  114.498819]  ? putname+0x80/0xa0
      [  114.499069]  do_mount+0xd6/0xf0
      [  114.499343]  ? path_mount+0xfe0/0xfe0
      [  114.499683]  ? __kasan_check_write+0x14/0x20
      [  114.500133]  __x64_sys_mount+0xca/0x110
      [  114.500592]  do_syscall_64+0x3b/0x90
      [  114.500930]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [  114.501294] RIP: 0033:0x7fdc898e948a
      [  114.501542] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
      [  114.502716] RSP: 002b:00007ffd793e58f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
      [  114.503175] RAX: ffffffffffffffda RBX: 0000564b2228f060 RCX: 00007fdc898e948a
      [  114.503588] RDX: 0000564b2228f260 RSI: 0000564b2228f2e0 RDI: 0000564b22297ce0
      [  114.504925] RBP: 0000000000000000 R08: 0000564b2228f280 R09: 0000000000000020
      [  114.505484] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564b22297ce0
      [  114.505823] R13: 0000564b2228f260 R14: 0000000000000000 R15: 00000000ffffffff
      [  114.506562]  </TASK>
      [  114.506887] Modules linked in:
      [  114.507648] CR2: 0000000000000008
      [  114.508884] ---[ end trace 0000000000000000 ]---
      [  114.509675] RIP: 0010:d_flags_for_inode+0xe0/0x110
      [  114.510140] Code: 24 f7 ff 49 83 3e 00 74 41 41 83 cd 02 66 44 89 6b 02 eb 92 48 8d 7b 20 e8 6d 24 f7 ff 4c 8b 73 20 49 8d 7e 08 e8 60 241
      [  114.511762] RSP: 0018:ffff8880065e7aa8 EFLAGS: 00000296
      [  114.512401] RAX: 0000000000000001 RBX: ffff888008ccd750 RCX: ffffffff84af2aea
      [  114.513103] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff87abd020
      [  114.513512] RBP: ffff8880065e7ac8 R08: 0000000000000001 R09: fffffbfff0f57a05
      [  114.513831] R10: ffffffff87abd027 R11: fffffbfff0f57a04 R12: 0000000000000000
      [  114.514757] R13: 0000000000000008 R14: 0000000000000000 R15: ffff888008ccd750
      [  114.515411] FS:  00007fdc8a627e40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000
      [  114.515794] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  114.516208] CR2: 0000000000000008 CR3: 00000000013ba000 CR4: 00000000000006f0
      Signed-off-by: default avatarEdward Lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      c1ca8ef0
    • Daniel Pinto's avatar
      fs/ntfs3: Fix junction point resolution · 0a4e7ce6
      Daniel Pinto authored
      The ntfs3 file system driver does not convert the target path of
      junction points to a proper Linux path. As junction points targets
      are always absolute paths (they start with a drive letter), all
      junctions will result in broken links.
      
      Translate the targets of junction points to relative paths so they
      point to directories inside the mounted volume. Note that Windows
      allows junction points to reference directories in another drive.
      However, as there is no way to know which drive the junctions refer
      to, we assume they always target the same file system they are in.
      
      Link: https://bugzilla.kernel.org/show_bug.cgi?id=214833Signed-off-by: default avatarDaniel Pinto <danielpinto52@gmail.com>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      0a4e7ce6
    • Shigeru Yoshida's avatar
      fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst() · caad9dd8
      Shigeru Yoshida authored
      syzbot reported UBSAN error as below:
      
      [   76.901829][ T6677] ================================================================================
      [   76.903908][ T6677] UBSAN: shift-out-of-bounds in fs/ntfs3/super.c:675:13
      [   76.905363][ T6677] shift exponent -247 is negative
      
      This patch avoid this error.
      
      Link: https://syzkaller.appspot.com/bug?id=b0299c09a14aababf0f1c862dd4ebc8ab9eb0179
      Fixes: a3b77434 (fs/ntfs3: validate BOOT sectors_per_clusters)
      Cc: Author: Randy Dunlap <rdunlap@infradead.org>
      Reported-by: syzbot+35b87c668935bb55e666@syzkaller.appspotmail.com
      Signed-off-by: default avatarShigeru Yoshida <syoshida@redhat.com>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      caad9dd8
    • Shigeru Yoshida's avatar
      fs/ntfs3: Fix memory leak on ntfs_fill_super() error path · 51e76a23
      Shigeru Yoshida authored
      syzbot reported kmemleak as below:
      
      BUG: memory leak
      unreferenced object 0xffff8880122f1540 (size 32):
        comm "a.out", pid 6664, jiffies 4294939771 (age 25.500s)
        hex dump (first 32 bytes):
          00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
          00 00 00 00 00 00 00 00 ed ff ed ff 00 00 00 00  ................
        backtrace:
          [<ffffffff81b16052>] ntfs_init_fs_context+0x22/0x1c0
          [<ffffffff8164aaa7>] alloc_fs_context+0x217/0x430
          [<ffffffff81626dd4>] path_mount+0x704/0x1080
          [<ffffffff81627e7c>] __x64_sys_mount+0x18c/0x1d0
          [<ffffffff84593e14>] do_syscall_64+0x34/0xb0
          [<ffffffff84600087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
      
      This patch fixes this issue by freeing mount options on error path of
      ntfs_fill_super().
      
      Reported-by: syzbot+9d67170b20e8f94351c8@syzkaller.appspotmail.com
      Signed-off-by: default avatarShigeru Yoshida <syoshida@redhat.com>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      51e76a23
    • Kenneth Lee's avatar
      fs/ntfs3: Use kmalloc_array for allocating multiple elements · 92f017c4
      Kenneth Lee authored
      Prefer using kmalloc_array(a, b) over kmalloc(a * b) as this
      improves semantics since kmalloc is intended for allocating an
      array of memory.
      Signed-off-by: default avatarKenneth Lee <klee33@uw.edu>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      92f017c4
    • Alon Zahavi's avatar
      fs/ntfs3: Fix attr_punch_hole() null pointer derenference · 6d5c9e79
      Alon Zahavi authored
      The bug occours due to a misuse of `attr` variable instead of `attr_b`.
      `attr` is being initialized as NULL, then being derenfernced
      as `attr->res.data_size`.
      
      This bug causes a crash of the ntfs3 driver itself,
      If compiled directly to the kernel, it crashes the whole system.
      Signed-off-by: default avatarAlon Zahavi <zahavi.alon@gmail.com>
      Co-developed-by: default avatarTal Lossos <tallossos@gmail.com>
      Signed-off-by: default avatarTal Lossos <tallossos@gmail.com>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      6d5c9e79
    • Marc Aurèle La France's avatar
      fs/ntfs3: Fix [df]mask display in /proc/mounts · f27b92ec
      Marc Aurèle La France authored
      ntfs3's dmask and fmask mount options are 16-bit quantities but are displayed
      as 1-extended 32-bit values in /proc/mounts.  Fix this by circumventing
      integer promotion.
      Signed-off-by: default avatarMarc Aurèle La France <tsi@tuyoix.net>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      f27b92ec
    • Edward Lo's avatar
      fs/ntfs3: Add null pointer check to attr_load_runs_vcn · 2681631c
      Edward Lo authored
      Some metadata files are handled before MFT. This adds a null pointer
      check for some corner cases that could lead to NPD while reading these
      metadata files for a malformed NTFS image.
      
      [  240.190827] BUG: kernel NULL pointer dereference, address: 0000000000000158
      [  240.191583] #PF: supervisor read access in kernel mode
      [  240.191956] #PF: error_code(0x0000) - not-present page
      [  240.192391] PGD 0 P4D 0
      [  240.192897] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
      [  240.193805] CPU: 0 PID: 242 Comm: mount Tainted: G    B             5.19.0+ #17
      [  240.194477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [  240.195152] RIP: 0010:ni_find_attr+0xae/0x300
      [  240.195679] Code: c8 48 c7 45 88 c0 4e 5e 86 c7 00 f1 f1 f1 f1 c7 40 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 e2 d9f
      [  240.196642] RSP: 0018:ffff88800812f690 EFLAGS: 00000286
      [  240.197019] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff85ef037a
      [  240.197523] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff88e95f60
      [  240.197877] RBP: ffff88800812f738 R08: 0000000000000001 R09: fffffbfff11d2bed
      [  240.198292] R10: ffffffff88e95f67 R11: fffffbfff11d2bec R12: 0000000000000000
      [  240.198647] R13: 0000000000000080 R14: 0000000000000000 R15: 0000000000000000
      [  240.199410] FS:  00007f233c33be40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000
      [  240.199895] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  240.200314] CR2: 0000000000000158 CR3: 0000000004d32000 CR4: 00000000000006f0
      [  240.200839] Call Trace:
      [  240.201104]  <TASK>
      [  240.201502]  ? ni_load_mi+0x80/0x80
      [  240.202297]  ? ___slab_alloc+0x465/0x830
      [  240.202614]  attr_load_runs_vcn+0x8c/0x1a0
      [  240.202886]  ? __kasan_slab_alloc+0x32/0x90
      [  240.203157]  ? attr_data_write_resident+0x250/0x250
      [  240.203543]  mi_read+0x133/0x2c0
      [  240.203785]  mi_get+0x70/0x140
      [  240.204012]  ni_load_mi_ex+0xfa/0x190
      [  240.204346]  ? ni_std5+0x90/0x90
      [  240.204588]  ? __kasan_kmalloc+0x88/0xb0
      [  240.204859]  ni_enum_attr_ex+0xf1/0x1c0
      [  240.205107]  ? ni_fname_type.part.0+0xd0/0xd0
      [  240.205600]  ? ntfs_load_attr_list+0xbe/0x300
      [  240.205864]  ? ntfs_cmp_names_cpu+0x125/0x180
      [  240.206157]  ntfs_iget5+0x56c/0x1870
      [  240.206510]  ? ntfs_get_block_bmap+0x70/0x70
      [  240.206776]  ? __kasan_kmalloc+0x88/0xb0
      [  240.207030]  ? set_blocksize+0x95/0x150
      [  240.207545]  ntfs_fill_super+0xb8f/0x1e20
      [  240.207839]  ? put_ntfs+0x1d0/0x1d0
      [  240.208069]  ? vsprintf+0x20/0x20
      [  240.208467]  ? mutex_unlock+0x81/0xd0
      [  240.208846]  ? set_blocksize+0x95/0x150
      [  240.209221]  get_tree_bdev+0x232/0x370
      [  240.209804]  ? put_ntfs+0x1d0/0x1d0
      [  240.210519]  ntfs_fs_get_tree+0x15/0x20
      [  240.210991]  vfs_get_tree+0x4c/0x130
      [  240.211455]  path_mount+0x645/0xfd0
      [  240.211806]  ? putname+0x80/0xa0
      [  240.212112]  ? finish_automount+0x2e0/0x2e0
      [  240.212559]  ? kmem_cache_free+0x110/0x390
      [  240.212906]  ? putname+0x80/0xa0
      [  240.213329]  do_mount+0xd6/0xf0
      [  240.213829]  ? path_mount+0xfd0/0xfd0
      [  240.214246]  ? __kasan_check_write+0x14/0x20
      [  240.214774]  __x64_sys_mount+0xca/0x110
      [  240.215080]  do_syscall_64+0x3b/0x90
      [  240.215442]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [  240.215811] RIP: 0033:0x7f233b4e948a
      [  240.216104] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
      [  240.217615] RSP: 002b:00007fff02211ec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
      [  240.218718] RAX: ffffffffffffffda RBX: 0000561cdc35b060 RCX: 00007f233b4e948a
      [  240.219556] RDX: 0000561cdc35b260 RSI: 0000561cdc35b2e0 RDI: 0000561cdc363af0
      [  240.219975] RBP: 0000000000000000 R08: 0000561cdc35b280 R09: 0000000000000020
      [  240.220403] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000561cdc363af0
      [  240.220803] R13: 0000561cdc35b260 R14: 0000000000000000 R15: 00000000ffffffff
      [  240.221256]  </TASK>
      [  240.221567] Modules linked in:
      [  240.222028] CR2: 0000000000000158
      [  240.223291] ---[ end trace 0000000000000000 ]---
      [  240.223669] RIP: 0010:ni_find_attr+0xae/0x300
      [  240.224058] Code: c8 48 c7 45 88 c0 4e 5e 86 c7 00 f1 f1 f1 f1 c7 40 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 e2 d9f
      [  240.225033] RSP: 0018:ffff88800812f690 EFLAGS: 00000286
      [  240.225968] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff85ef037a
      [  240.226624] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff88e95f60
      [  240.227307] RBP: ffff88800812f738 R08: 0000000000000001 R09: fffffbfff11d2bed
      [  240.227816] R10: ffffffff88e95f67 R11: fffffbfff11d2bec R12: 0000000000000000
      [  240.228330] R13: 0000000000000080 R14: 0000000000000000 R15: 0000000000000000
      [  240.228729] FS:  00007f233c33be40(0000) GS:ffff888058200000(0000) knlGS:0000000000000000
      [  240.229281] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  240.230298] CR2: 0000000000000158 CR3: 0000000004d32000 CR4: 00000000000006f0
      Signed-off-by: default avatarEdward Lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      2681631c
    • Edward Lo's avatar
      fs/ntfs3: Validate data run offset · 6db62086
      Edward Lo authored
      This adds sanity checks for data run offset. We should make sure data
      run offset is legit before trying to unpack them, otherwise we may
      encounter use-after-free or some unexpected memory access behaviors.
      
      [   82.940342] BUG: KASAN: use-after-free in run_unpack+0x2e3/0x570
      [   82.941180] Read of size 1 at addr ffff888008a8487f by task mount/240
      [   82.941670]
      [   82.942069] CPU: 0 PID: 240 Comm: mount Not tainted 5.19.0+ #15
      [   82.942482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [   82.943720] Call Trace:
      [   82.944204]  <TASK>
      [   82.944471]  dump_stack_lvl+0x49/0x63
      [   82.944908]  print_report.cold+0xf5/0x67b
      [   82.945141]  ? __wait_on_bit+0x106/0x120
      [   82.945750]  ? run_unpack+0x2e3/0x570
      [   82.946626]  kasan_report+0xa7/0x120
      [   82.947046]  ? run_unpack+0x2e3/0x570
      [   82.947280]  __asan_load1+0x51/0x60
      [   82.947483]  run_unpack+0x2e3/0x570
      [   82.947709]  ? memcpy+0x4e/0x70
      [   82.947927]  ? run_pack+0x7a0/0x7a0
      [   82.948158]  run_unpack_ex+0xad/0x3f0
      [   82.948399]  ? mi_enum_attr+0x14a/0x200
      [   82.948717]  ? run_unpack+0x570/0x570
      [   82.949072]  ? ni_enum_attr_ex+0x1b2/0x1c0
      [   82.949332]  ? ni_fname_type.part.0+0xd0/0xd0
      [   82.949611]  ? mi_read+0x262/0x2c0
      [   82.949970]  ? ntfs_cmp_names_cpu+0x125/0x180
      [   82.950249]  ntfs_iget5+0x632/0x1870
      [   82.950621]  ? ntfs_get_block_bmap+0x70/0x70
      [   82.951192]  ? evict+0x223/0x280
      [   82.951525]  ? iput.part.0+0x286/0x320
      [   82.951969]  ntfs_fill_super+0x1321/0x1e20
      [   82.952436]  ? put_ntfs+0x1d0/0x1d0
      [   82.952822]  ? vsprintf+0x20/0x20
      [   82.953188]  ? mutex_unlock+0x81/0xd0
      [   82.953379]  ? set_blocksize+0x95/0x150
      [   82.954001]  get_tree_bdev+0x232/0x370
      [   82.954438]  ? put_ntfs+0x1d0/0x1d0
      [   82.954700]  ntfs_fs_get_tree+0x15/0x20
      [   82.955049]  vfs_get_tree+0x4c/0x130
      [   82.955292]  path_mount+0x645/0xfd0
      [   82.955615]  ? putname+0x80/0xa0
      [   82.955955]  ? finish_automount+0x2e0/0x2e0
      [   82.956310]  ? kmem_cache_free+0x110/0x390
      [   82.956723]  ? putname+0x80/0xa0
      [   82.957023]  do_mount+0xd6/0xf0
      [   82.957411]  ? path_mount+0xfd0/0xfd0
      [   82.957638]  ? __kasan_check_write+0x14/0x20
      [   82.957948]  __x64_sys_mount+0xca/0x110
      [   82.958310]  do_syscall_64+0x3b/0x90
      [   82.958719]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [   82.959341] RIP: 0033:0x7fd0d1ce948a
      [   82.960193] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
      [   82.961532] RSP: 002b:00007ffe59ff69a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
      [   82.962527] RAX: ffffffffffffffda RBX: 0000564dcc107060 RCX: 00007fd0d1ce948a
      [   82.963266] RDX: 0000564dcc107260 RSI: 0000564dcc1072e0 RDI: 0000564dcc10fce0
      [   82.963686] RBP: 0000000000000000 R08: 0000564dcc107280 R09: 0000000000000020
      [   82.964272] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564dcc10fce0
      [   82.964785] R13: 0000564dcc107260 R14: 0000000000000000 R15: 00000000ffffffff
      Signed-off-by: default avatarEdward Lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      6db62086
    • edward lo's avatar
      fs/ntfs3: Add overflow check for attribute size · e19c6277
      edward lo authored
      The offset addition could overflow and pass the used size check given an
      attribute with very large size (e.g., 0xffffff7f) while parsing MFT
      attributes. This could lead to out-of-bound memory R/W if we try to
      access the next attribute derived by Add2Ptr(attr, asize)
      
      [   32.963847] BUG: unable to handle page fault for address: ffff956a83c76067
      [   32.964301] #PF: supervisor read access in kernel mode
      [   32.964526] #PF: error_code(0x0000) - not-present page
      [   32.964893] PGD 4dc01067 P4D 4dc01067 PUD 0
      [   32.965316] Oops: 0000 [#1] PREEMPT SMP NOPTI
      [   32.965727] CPU: 0 PID: 243 Comm: mount Not tainted 5.19.0+ #6
      [   32.966050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [   32.966628] RIP: 0010:mi_enum_attr+0x44/0x110
      [   32.967239] Code: 89 f0 48 29 c8 48 89 c1 39 c7 0f 86 94 00 00 00 8b 56 04 83 fa 17 0f 86 88 00 00 00 89 d0 01 ca 48 01 f0 8d 4a 08 39 f9a
      [   32.968101] RSP: 0018:ffffba15c06a7c38 EFLAGS: 00000283
      [   32.968364] RAX: ffff956a83c76067 RBX: ffff956983c76050 RCX: 000000000000006f
      [   32.968651] RDX: 0000000000000067 RSI: ffff956983c760e8 RDI: 00000000000001c8
      [   32.968963] RBP: ffffba15c06a7c38 R08: 0000000000000064 R09: 00000000ffffff7f
      [   32.969249] R10: 0000000000000007 R11: ffff956983c760e8 R12: ffff95698225e000
      [   32.969870] R13: 0000000000000000 R14: ffffba15c06a7cd8 R15: ffff95698225e170
      [   32.970655] FS:  00007fdab8189e40(0000) GS:ffff9569fdc00000(0000) knlGS:0000000000000000
      [   32.971098] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [   32.971378] CR2: ffff956a83c76067 CR3: 0000000002c58000 CR4: 00000000000006f0
      [   32.972098] Call Trace:
      [   32.972842]  <TASK>
      [   32.973341]  ni_enum_attr_ex+0xda/0xf0
      [   32.974087]  ntfs_iget5+0x1db/0xde0
      [   32.974386]  ? slab_post_alloc_hook+0x53/0x270
      [   32.974778]  ? ntfs_fill_super+0x4c7/0x12a0
      [   32.975115]  ntfs_fill_super+0x5d6/0x12a0
      [   32.975336]  get_tree_bdev+0x175/0x270
      [   32.975709]  ? put_ntfs+0x150/0x150
      [   32.975956]  ntfs_fs_get_tree+0x15/0x20
      [   32.976191]  vfs_get_tree+0x2a/0xc0
      [   32.976374]  ? capable+0x19/0x20
      [   32.976572]  path_mount+0x484/0xaa0
      [   32.977025]  ? putname+0x57/0x70
      [   32.977380]  do_mount+0x80/0xa0
      [   32.977555]  __x64_sys_mount+0x8b/0xe0
      [   32.978105]  do_syscall_64+0x3b/0x90
      [   32.978830]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [   32.979311] RIP: 0033:0x7fdab72e948a
      [   32.980015] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
      [   32.981251] RSP: 002b:00007ffd15b87588 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
      [   32.981832] RAX: ffffffffffffffda RBX: 0000557de0aaf060 RCX: 00007fdab72e948a
      [   32.982234] RDX: 0000557de0aaf260 RSI: 0000557de0aaf2e0 RDI: 0000557de0ab7ce0
      [   32.982714] RBP: 0000000000000000 R08: 0000557de0aaf280 R09: 0000000000000020
      [   32.983046] R10: 00000000c0ed0000 R11: 0000000000000206 R12: 0000557de0ab7ce0
      [   32.983494] R13: 0000557de0aaf260 R14: 0000000000000000 R15: 00000000ffffffff
      [   32.984094]  </TASK>
      [   32.984352] Modules linked in:
      [   32.984753] CR2: ffff956a83c76067
      [   32.985911] ---[ end trace 0000000000000000 ]---
      [   32.986555] RIP: 0010:mi_enum_attr+0x44/0x110
      [   32.987217] Code: 89 f0 48 29 c8 48 89 c1 39 c7 0f 86 94 00 00 00 8b 56 04 83 fa 17 0f 86 88 00 00 00 89 d0 01 ca 48 01 f0 8d 4a 08 39 f9a
      [   32.988232] RSP: 0018:ffffba15c06a7c38 EFLAGS: 00000283
      [   32.988532] RAX: ffff956a83c76067 RBX: ffff956983c76050 RCX: 000000000000006f
      [   32.988916] RDX: 0000000000000067 RSI: ffff956983c760e8 RDI: 00000000000001c8
      [   32.989356] RBP: ffffba15c06a7c38 R08: 0000000000000064 R09: 00000000ffffff7f
      [   32.989994] R10: 0000000000000007 R11: ffff956983c760e8 R12: ffff95698225e000
      [   32.990415] R13: 0000000000000000 R14: ffffba15c06a7cd8 R15: ffff95698225e170
      [   32.991011] FS:  00007fdab8189e40(0000) GS:ffff9569fdc00000(0000) knlGS:0000000000000000
      [   32.991524] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [   32.991936] CR2: ffff956a83c76067 CR3: 0000000002c58000 CR4: 00000000000006f0
      
      This patch adds an overflow check
      Signed-off-by: default avataredward lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      e19c6277
    • edward lo's avatar
      fs/ntfs3: Validate BOOT record_size · 0b660462
      edward lo authored
      When the NTFS BOOT record_size field < 0, it represents a
      shift value. However, there is no sanity check on the shift result
      and the sbi->record_bits calculation through blksize_bits() assumes
      the size always > 256, which could lead to NPD while mounting a
      malformed NTFS image.
      
      [  318.675159] BUG: kernel NULL pointer dereference, address: 0000000000000158
      [  318.675682] #PF: supervisor read access in kernel mode
      [  318.675869] #PF: error_code(0x0000) - not-present page
      [  318.676246] PGD 0 P4D 0
      [  318.676502] Oops: 0000 [#1] PREEMPT SMP NOPTI
      [  318.676934] CPU: 0 PID: 259 Comm: mount Not tainted 5.19.0 #5
      [  318.677289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      [  318.678136] RIP: 0010:ni_find_attr+0x2d/0x1c0
      [  318.678656] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180
      [  318.679848] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246
      [  318.680104] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080
      [  318.680790] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
      [  318.681679] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
      [  318.682577] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080
      [  318.683015] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000
      [  318.683618] FS:  00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000
      [  318.684280] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  318.684651] CR2: 0000000000000158 CR3: 0000000002e1a000 CR4: 00000000000006f0
      [  318.685623] Call Trace:
      [  318.686607]  <TASK>
      [  318.686872]  ? ntfs_alloc_inode+0x1a/0x60
      [  318.687235]  attr_load_runs_vcn+0x2b/0xa0
      [  318.687468]  mi_read+0xbb/0x250
      [  318.687576]  ntfs_iget5+0x114/0xd90
      [  318.687750]  ntfs_fill_super+0x588/0x11b0
      [  318.687953]  ? put_ntfs+0x130/0x130
      [  318.688065]  ? snprintf+0x49/0x70
      [  318.688164]  ? put_ntfs+0x130/0x130
      [  318.688256]  get_tree_bdev+0x16a/0x260
      [  318.688407]  vfs_get_tree+0x20/0xb0
      [  318.688519]  path_mount+0x2dc/0x9b0
      [  318.688877]  do_mount+0x74/0x90
      [  318.689142]  __x64_sys_mount+0x89/0xd0
      [  318.689636]  do_syscall_64+0x3b/0x90
      [  318.689998]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
      [  318.690318] RIP: 0033:0x7fd9e133c48a
      [  318.690687] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008
      [  318.691357] RSP: 002b:00007ffd374406c8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
      [  318.691632] RAX: ffffffffffffffda RBX: 0000564d0b051080 RCX: 00007fd9e133c48a
      [  318.691920] RDX: 0000564d0b051280 RSI: 0000564d0b051300 RDI: 0000564d0b0596a0
      [  318.692123] RBP: 0000000000000000 R08: 0000564d0b0512a0 R09: 0000000000000020
      [  318.692349] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 0000564d0b0596a0
      [  318.692673] R13: 0000564d0b051280 R14: 0000000000000000 R15: 00000000ffffffff
      [  318.693007]  </TASK>
      [  318.693271] Modules linked in:
      [  318.693614] CR2: 0000000000000158
      [  318.694446] ---[ end trace 0000000000000000 ]---
      [  318.694779] RIP: 0010:ni_find_attr+0x2d/0x1c0
      [  318.694952] Code: 89 ca 4d 89 c7 41 56 41 55 41 54 41 89 cc 55 48 89 fd 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 180
      [  318.696042] RSP: 0018:ffffa6c8c0297bd8 EFLAGS: 00000246
      [  318.696531] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000080
      [  318.698114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
      [  318.699286] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
      [  318.699795] R10: 0000000000000000 R11: 0000000000000005 R12: 0000000000000080
      [  318.700236] R13: ffff8d5582e68400 R14: 0000000000000100 R15: 0000000000000000
      [  318.700973] FS:  00007fd9e1c81e40(0000) GS:ffff8d55fdc00000(0000) knlGS:0000000000000000
      [  318.701688] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [  318.702190] CR2: 0000000000000158 CR3: 0000000002e1a000 CR4: 00000000000006f0
      [  318.726510] mount (259) used greatest stack depth: 13320 bytes left
      
      This patch adds a sanity check.
      Signed-off-by: default avataredward lo <edward.lo@ambergroup.io>
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      0b660462
    • Konstantin Komarov's avatar
      fs/ntfs3: Rename variables and add comment · 43f03acb
      Konstantin Komarov authored
      After renaming we don't need to split code in two lines.
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      43f03acb
    • Konstantin Komarov's avatar
      fs/ntfs3: Add option "nocase" · a3a956c7
      Konstantin Komarov authored
      This commit adds mount option and additional functions.
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      a3a956c7
    • Konstantin Komarov's avatar
      fs/ntfs3: Change destroy_inode to free_inode · ae6b47b5
      Konstantin Komarov authored
      Many filesystems already use free_inode callback,
      so we will use it too from now on.
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      ae6b47b5
    • Konstantin Komarov's avatar
      fs/ntfs3: Add hidedotfiles option · 098250db
      Konstantin Komarov authored
      With this option all files with filename[0] == '.'
      will have FILE_ATTRIBUTE_HIDDEN attribute.
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      098250db
    • Konstantin Komarov's avatar
      fs/ntfs3: Add comments about cluster size · bd6ae049
      Konstantin Komarov authored
      This commit adds additional info about CONFIG_NTFS3_64BIT_CLUSTER
      Signed-off-by: default avatarKonstantin Komarov <almaz.alexandrovich@paragon-software.com>
      bd6ae049
  2. 25 Sep, 2022 8 commits
  3. 24 Sep, 2022 10 commits
  4. 23 Sep, 2022 3 commits