Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp863209ybl; Fri, 30 Aug 2019 08:13:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqwFTBfbOeSVY1mXEZIIuCFdW5vHXlxr7H4N5h5J+aaOqzVCw1UjL6SfpGvFcJgnpH52Cme6 X-Received: by 2002:a17:902:6b81:: with SMTP id p1mr16124581plk.91.1567178025997; Fri, 30 Aug 2019 08:13:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567178025; cv=none; d=google.com; s=arc-20160816; b=m4PVfKxV//e1PKw0Lq9Mlt+kJoob5OIiT6/AVMEqoj1UckD1AntG0e8saHRMvjTHbh 0clqI/Krfgog3f33/6041tFXfCEHatlMVQ14DOJ5+PeCtiAsqakqlFKHJBdrASbY/R6v DK6F6U2uDMiWejMupE9mLUzrhpnwPm1OuO7mfsylesM2cmRfqi6wlxTkJ2xtfNAwzk9y vi22CWJUh6HXg2mP/zwzDzaNLLEeuOjrzRI2e1OOsk4gZ56Aamz4AS/kSg6PDYwAKUiW RialfMSc7sTyPHXC86PhCwjLQNO1JbBdQYCsCAyjrrptqL8KXqNUqrXLpdiaMZI1PlbS m4Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:content-id:mime-version :subject:cc:to:references:in-reply-to:from:organization; bh=1mNr4/QGCzp0cLQHuAogjGqMSCsGw5vfxUWCKJMxK/M=; b=pvSMdXocrEzhNqMRz8TaLPOT85tffPqwXqrVLrOqeWyUj3eoqn5nWo2EIpqZ7NAeQU fhVpjd60V7NOsbww9z3ynf+Mnvn9jl93IfwTq7DH9S+jidugU5Ga6BNKvYhiFgR/jjMt u61TB2dzkxOUvGITsYKBtC2mqK0lx6m34io53GR0wr5uSQ/Lh9fQy83RDMfVufm9ieaM Mh9XjGHuexLjWnnCOPb9I8qV9WqGXUM8nBdKf3CoxI8pm99XBpshiJfJKQ+TIGTcst0d OcCbUTgQ1zIrzPaIyhPg6MkgwO00bWR1nE0UU7qwlv3pWaP/YcJSQpFFqEzf2yXXr6Ti bgEA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p17si4834791plo.225.2019.08.30.08.13.28; Fri, 30 Aug 2019 08:13:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728160AbfH3PMg (ORCPT + 99 others); Fri, 30 Aug 2019 11:12:36 -0400 Received: from mx1.redhat.com ([209.132.183.28]:48628 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727948AbfH3PMg (ORCPT ); Fri, 30 Aug 2019 11:12:36 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 143BB881346; Fri, 30 Aug 2019 15:12:36 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-120-255.rdu2.redhat.com [10.10.120.255]) by smtp.corp.redhat.com (Postfix) with ESMTP id C4492100197A; Fri, 30 Aug 2019 15:12:34 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 From: David Howells In-Reply-To: <20190830145454.B91DF125411@zmta02.collab.prod.int.phx2.redhat.com> References: <20190830145454.B91DF125411@zmta02.collab.prod.int.phx2.redhat.com> <20190830085646.14740-1-hdanton@sina.com> <4384.1567174383@warthog.procyon.org.uk> To: Hillf Danton Cc: dhowells@redhat.com, Sachin Sant , "linuxppc-dev@ozlabs.org" , "keyrings@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: Oops (request_key_auth_describe) while running cve-2016-7042 from LTP MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <11907.1567177954.1@warthog.procyon.org.uk> Date: Fri, 30 Aug 2019 16:12:34 +0100 Message-ID: <11908.1567177954@warthog.procyon.org.uk> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.69]); Fri, 30 Aug 2019 15:12:36 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hillf Danton wrote: > 1, callee has no pre defined duty to help caller in general; they should not > try to do anything, however, to help their callers in principle due to > limited info on their hands IMO. Ah, no. It's entirely reasonable for an API to specify that one of its methods will be called with one or more locks held - and that the method must be aware of this and may make use of this. > 3, no comment can be found in security/keys/request_key_auth.c about > the rcu already documented. There is API documentation in Documentation/security/keys/core.rst. If you look at about line 1538 onwards: * ``void (*describe)(const struct key *key, struct seq_file *p);`` This method is optional. It is called during /proc/keys reading to summarise a key's description and payload in text form. This method will be called with the RCU read lock held. rcu_dereference() should be used to read the payload pointer if the payload is to be accessed. key->datalen cannot be trusted to stay consistent with the contents of the payload. The description will not change, though the key's state may. It is not safe to sleep in this method; the RCU read lock is held by the caller. David