From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ADA94259C84; Tue, 5 Aug 2025 09:01:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.12 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754384509; cv=none; b=KPhoiV9S/oU2q0G65nmNJnj96ePQcLLRN/pPBkntTK0Y9PNrKhM9pqYlli/C/iP0cQmszuLIZOPFbidnIy2QKMtTVZr9YFQ3WnJj0WR7s8RPzlA7X0cNMTRDsiLu8PYeWfAtfMcqMdDpdpS6TJ3DHETriOk9Q2HGDaIYeNoNfHM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754384509; c=relaxed/simple; bh=RDyUgR2PQ1GVGOThtsglLFcL8GrDSPC0hME5I1Gf3Ss=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=VKfpq3sOhiqksOgs46BmRFtm9bu46XEI+NSPWNhaHM43xGbMIzSCfzgcOG4zMDoktY72PUAZ1q7RVsLAc0DhGHFY1bwLTGcZjEtfr1T8j+9oH1SaJU+ZoWOGdmRwxusfp3mrtq36PcQezk1fq7GMZ+nxsSbNS+fDLCliV1U0pL4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=f6MjZj1K; arc=none smtp.client-ip=198.175.65.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="f6MjZj1K" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1754384508; x=1785920508; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=RDyUgR2PQ1GVGOThtsglLFcL8GrDSPC0hME5I1Gf3Ss=; b=f6MjZj1KG+k3EmVo598Ad3IBMbW2TaRczWfySFGeQ3Yah/KLPUFCIgpk QBswtZwFOnF6vwEHZOuNVKTJuI3bjrgxfzpTTvqvQmWkmgAGRKREO38eo ot7bIdGBt/bEexpzO9BzwZ+ohUCFeTTvUv7ZEjMIQIjPOsIWGu5F7YZ+N PVt0sY1lHqrB17hDNvnK9Aqt2GYo5xxxRK/6mf+FvzBF1tSEDGSVxF0qK buzUbrBJedEi5JgRLBhyjsApgZEQubXP3qw8XiM6js74j82QvGKu6lw0q um7Wm6AXiQI78F1ka/Kr5xQdJz2tqxNaconDF1rrjYVTtT4qODeT2Ds/c w==; X-CSE-ConnectionGUID: 1rqrcCWuRZuNhOgk9okV4w== X-CSE-MsgGUID: vUU3Xt21QlCO+W6SY4ZVcw== X-IronPort-AV: E=McAfee;i="6800,10657,11512"; a="68120310" X-IronPort-AV: E=Sophos;i="6.17,265,1747724400"; d="scan'208";a="68120310" Received: from orviesa004.jf.intel.com ([10.64.159.144]) by orvoesa104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Aug 2025 02:01:43 -0700 X-CSE-ConnectionGUID: HPiZt80WRHmf5Ze8zQ44Jw== X-CSE-MsgGUID: Gzy1SfDaRceL5UHtY83ftA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.17,265,1747724400"; d="scan'208";a="168862744" Received: from lkp-server02.sh.intel.com (HELO 4ea60e6ab079) ([10.239.97.151]) by orviesa004.jf.intel.com with ESMTP; 05 Aug 2025 02:01:39 -0700 Received: from kbuild by 4ea60e6ab079 with local (Exim 4.96) (envelope-from ) id 1ujDY8-0000Ue-2g; Tue, 05 Aug 2025 09:01:36 +0000 Date: Tue, 5 Aug 2025 17:01:34 +0800 From: kernel test robot To: Pranav Tyagi , tglx@linutronix.de, mingo@redhat.com, peterz@infradead.org, dvhart@infradead.org, dave@stgolabs.net, andrealmeid@igalia.com, linux-kernel@vger.kernel.org Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, jann@thejh.net, keescook@chromium.org, skhan@linuxfoundation.org, linux-kernel-mentees@lists.linux.dev, Pranav Tyagi Subject: Re: [PATCH v2] futex: don't leak robust_list pointer on exec race Message-ID: <202508051607.VJkmdtGV-lkp@intel.com> References: <20250804115533.14186-1-pranav.tyagi03@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel-mentees@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20250804115533.14186-1-pranav.tyagi03@gmail.com> Hi Pranav, kernel test robot noticed the following build errors: [auto build test ERROR on tip/locking/core] [also build test ERROR on linus/master v6.16 next-20250805] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Pranav-Tyagi/futex-don-t-leak-robust_list-pointer-on-exec-race/20250804-195739 base: tip/locking/core patch link: https://lore.kernel.org/r/20250804115533.14186-1-pranav.tyagi03%40gmail.com patch subject: [PATCH v2] futex: don't leak robust_list pointer on exec race config: riscv-randconfig-001-20250805 (https://download.01.org/0day-ci/archive/20250805/202508051607.VJkmdtGV-lkp@intel.com/config) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250805/202508051607.VJkmdtGV-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202508051607.VJkmdtGV-lkp@intel.com/ All errors (new ones prefixed by >>): >> kernel/futex/syscalls.c:81:13: error: no member named 'compat_robust_list' in 'struct task_struct' 81 | head = p->compat_robust_list; | ~ ^ 1 error generated. vim +81 kernel/futex/syscalls.c 41 42 static void __user *get_robust_list_common(int pid, 43 bool compat) 44 { 45 void __user *head; 46 unsigned long ret; 47 48 struct task_struct *p; 49 50 if (!pid) { 51 p = current; 52 get_task_struct(p); 53 } else { 54 rcu_read_lock(); 55 p = find_task_by_vpid(pid); 56 /* 57 * pin the task to permit dropping the RCU read lock before 58 * acquiring the semaphore 59 */ 60 if (p) 61 get_task_struct(p); 62 rcu_read_unlock(); 63 if (!p) 64 return ERR_PTR(-ESRCH); 65 } 66 67 /* 68 * Hold exec_update_lock to serialize with concurrent exec() 69 * so ptrace_may_access() is checked against stable credentials 70 */ 71 72 ret = down_read_killable(&p->signal->exec_update_lock); 73 if (ret) 74 goto err_put; 75 76 ret = -EPERM; 77 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) 78 goto err_unlock; 79 80 if (compat) > 81 head = p->compat_robust_list; 82 else 83 head = p->robust_list; 84 85 up_read(&p->signal->exec_update_lock); 86 put_task_struct(p); 87 88 return head; 89 90 err_unlock: 91 up_read(&p->signal->exec_update_lock); 92 err_put: 93 put_task_struct(p); 94 return ERR_PTR(ret); 95 } 96 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki