Public bug reported:

When I tried to mount a 9p share using v9fs, I received this in dmesg.

[130583.180162] Installing 9P2000 support
[130583.257129] Installing v9fs 9p2000 file system support
[130584.467791] BUG: unable to handle kernel NULL pointer dereference at 
0000000e
[130584.467812] IP: [<c0256724>] match_number+0x44/0xa0
[130584.467835] *pde = 00000000 
[130584.467856] Oops: 0000 [#1] SMP 
[130584.467873] Modules linked in: 9p 9pnet arc4 ecb ieee80211_crypt_wep isofs 
nls_iso8859_1 nls_cp437 vfat fat udf crc_itu_t ipv6 usb_storage libusual 
af_packet radeon drm bridge stp bnep rfcomm l2cap kqemu uinput ppdev autofs4 
speedstep_centrino cpufreq_userspace cpufreq_conservative cpufreq_ondemand 
cpufreq_powersave cpufreq_stats freq_table wmi pci_slot container sbs sbshc 
iptable_filter ip_tables x_tables lp loop joydev pcmcia snd_intel8x0 
snd_ac97_codec btusb ac97_bus bluetooth snd_pcm_oss snd_mixer_oss snd_pcm 
battery ac psmouse snd_seq_dummy ipw2200 serio_raw ieee80211 ieee80211_crypt 
yenta_socket rsrc_nonstatic pcmcia_core video output parport_pc nsc_ircc 
snd_seq_oss parport snd_seq_midi snd_rawmidi irda crc_ccitt snd_seq_midi_event 
snd_seq snd_timer snd_seq_device snd soundcore snd_page_alloc button iTCO_wdt 
iTCO_vendor_support intel_agp shpchp pci_hotplug agpgart thinkpad_acpi rfkill 
led_class nvram evdev ext3 jbd mbcache sha256_generic aes_i586 aes_generic cbc 
usbhid hid sg sr_mod cdrom sd_mod crc_t10dif ata_piix pata_acpi ata_generic 
libata e1000 scsi_mod ehci_hcd uhci_hcd usbcore dock dm_crypt crypto_blkcipher 
dm_mirror dm_log dm_snapshot dm_mod thermal processor fan fbcon tileblit font 
bitblit softcursor uvesafb cn fuse
[130584.468012] 
[130584.468012] Pid: 30463, comm: mount Not tainted (2.6.27-4-generic #1)
[130584.468012] EIP: 0060:[<c0256724>] EFLAGS: 00210212 CPU: 0
[130584.468012] EIP is at match_number+0x44/0xa0
[130584.468012] EAX: 00200278 EBX: e8b31d9c ECX: 0008009e EDX: 00000400
[130584.468012] ESI: 0000000e EDI: c3800000 EBP: e8b31d8c ESP: e8b31d70
[130584.468012]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[130584.468012] Process mount (pid: 30463, ti=e8b30000 task=f6766480 
task.ti=e8b30000)
[130584.468012] Stack: 00000000 e8b31db8 c3800000 ddb74c80 e8b31e14 00000003 
e8b31db4 e8b31d94 
[130584.468012]        c02567aa e8b31dc8 f8f6939f 0000000e 00200286 c059bd38 
00200282 f8f70500 
[130584.468012]        f8f70500 ddb74c8f e8b31e30 f8f70500 f8f70500 e8a42ac0 
e8b31e30 f8f6a6ab 
[130584.468012] Call Trace:
[130584.468012]  [<c02567aa>] ? match_int+0xa/0x10
[130584.468012]  [<f8f6939f>] ? parse_opts+0x8f/0xe0 [9pnet]
[130584.468012]  [<f8f6a6ab>] ? p9_trans_create_tcp+0x2b/0x1e0 [9pnet]
[130584.468012]  [<f8f672d8>] ? parse_opts+0xb8/0x100 [9pnet]
[130584.468012]  [<f8f6741d>] ? p9_client_create+0xfd/0x210 [9pnet]
[130584.468012]  [<f8f60c32>] ? v9fs_session_init+0xb2/0x180 [9p]
[130584.468012]  [<f8f5f0a8>] ? v9fs_get_sb+0x58/0x1c0 [9p]
[130584.468012]  [<c01cd28d>] ? alloc_vfsmnt+0x8d/0x120
[130584.468012]  [<c01b5a4e>] ? vfs_kern_mount+0x5e/0x130
[130584.468012]  [<c01b5b7e>] ? do_kern_mount+0x3e/0xe0
[130584.468012]  [<c01cdfff>] ? do_new_mount+0x6f/0x90
[130584.468012]  [<c01ce542>] ? do_mount+0x1d2/0x1f0
[130584.468012]  [<c01cbc8d>] ? exact_copy_from_user+0x4d/0xa0
[130584.468012]  [<c01cc29e>] ? copy_mount_options+0x6e/0xd0
[130584.468012]  [<c01ce5f1>] ? sys_mount+0x91/0xc0
[130584.468012]  [<c0103f6b>] ? sysenter_do_call+0x12/0x2f
[130584.468012]  =======================
[130584.468012] Code: 00 00 89 7d fc 89 4d e4 8b 40 04 83 c0 01 2b 03 e8 a2 85 
f5 ff 85 c0 89 45 ec 74 53 8b 33 8b 43 04 8b 7d ec 29 f0 89 c1 c1 e9 02 <f3> a5 
89 c1 83 e1 03 74 02 f3 a4 8b 43 04 8b 55 ec 2b 03 c6 04 
[130584.468012] EIP: [<c0256724>] match_number+0x44/0xa0 SS:ESP 0068:e8b31d70
[130584.468925] ---[ end trace fd4717f61e1d6430 ]---

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
v9fs dereferences NULL on mounting unauthed server
https://bugs.launchpad.net/bugs/282427
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to