Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp720834ybx; Wed, 6 Nov 2019 07:27:22 -0800 (PST) X-Google-Smtp-Source: APXvYqxikIh3DQKXYu5e3LaDO+gdFmgWjWuU/vtxGKpQ9e8KkJD3pQ6/YgQQ1hJkCmelFLClPDq/ X-Received: by 2002:aa7:db55:: with SMTP id n21mr3337059edt.113.1573054042279; Wed, 06 Nov 2019 07:27:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573054042; cv=none; d=google.com; s=arc-20160816; b=xY2s0nsBayd13S+LrEZWNKo7lnEhDzEc8VZRtnQzWZMR+lDh9Z3ScIRTjpZacssz5b KW2ahL4Ewgz5LgJWhGbYiluDSuLcoH1lViLIPvqpdzUDKAigQnE7cTiU5hefhj2Bze5c E0TCN8czvo8DsHQRRj4GqZYVye7rt3CgW/1Avi4Mcjz6lslL7+Tf8nGYyaxQSzGDTPy7 6HmUXK848GOHthlaM1WjBBxe3aHW1S79lNXVCqPxbCyH0dxxFLlXdlDzMDQjyVO+CH5t svERH52Wtu7HzcIvUlFEuPuAzomzJReJWRYmYpY9spsiCW5hTx9TTzzXDxQkgud6J7df pWLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:references:cc:to:from:subject:reply-to :dkim-signature; bh=cDyn55vQ0zC56fcCjJAvaWSHX2sqlnGb0sAKw8IHj/s=; b=vDHbBC1lm7b5ApqMuRnOP20Azb4F3xW5husFVFOZccsmCedqAQsVRbSuIltAAQZZ42 BMNAOx4oKzqKwzoihgRqzimkNWsJt2isCGpl9d/dVSW6JRoiUop7BD3z/zUG5dQmZcaZ PCvkOuQy71x+0TQJpZ9MA+wuoAwUqkipRi8HKAztolzm9psNAw4NdBm08PHO3iTtsqf/ yk5EjpJiN1j+nzMr4V98n0OvDIxpTUFzxlPZ1NHrce80777N+A4l8g0XLS8zvi/i2Hgy hdAtIQ5J7FpyhaOtdilfteiz0WMqZoBauaMDRvVGvmpLmxlqkpCV7+szkcbcmrRItojp ABUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aneJfRUv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z31si13328262ede.236.2019.11.06.07.26.58; Wed, 06 Nov 2019 07:27:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aneJfRUv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731769AbfKFP0E (ORCPT + 99 others); Wed, 6 Nov 2019 10:26:04 -0500 Received: from us-smtp-2.mimecast.com ([205.139.110.61]:22168 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727996AbfKFP0E (ORCPT ); Wed, 6 Nov 2019 10:26:04 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1573053962; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=cDyn55vQ0zC56fcCjJAvaWSHX2sqlnGb0sAKw8IHj/s=; b=aneJfRUvdywDzDWd/WOkeJ8ZA1q+pFDq3KXhhpFZu636uqw6IduSJQ9+IjIOiRWUiWU0Qd 28lJn/QfoVbEwK3gjIJaQtjaF+wE/oY1eyjuRH7kozSnrzPVRBcHeNeY63M1hPE3mNtaq3 uz4DNtgLWY2bfjUkj6K26WlB71uyaHM= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-48-EXmaXr8tOJKEjNTa7TImNQ-1; Wed, 06 Nov 2019 10:25:59 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id D983D107ACC3; Wed, 6 Nov 2019 15:25:57 +0000 (UTC) Received: from crecklin.bos.csb (ovpn-121-160.rdu2.redhat.com [10.10.121.160]) by smtp.corp.redhat.com (Postfix) with ESMTP id 04D8960BE0; Wed, 6 Nov 2019 15:25:55 +0000 (UTC) Reply-To: crecklin@redhat.com Subject: Re: [PATCH] security/keyring: avoid pagefaults in keyring_read_iterator From: Chris von Recklinghausen To: David Howells Cc: Jarkko Sakkinen , James Morris , "Serge E . Hallyn" , keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Waiman Long References: <20191018184030.8407-1-crecklin@redhat.com> <30309.1571667719@warthog.procyon.org.uk> <3c87bfba-9dc9-665f-17e8-0656e87c658b@redhat.com> Organization: Red Hat Message-ID: <3390b0d2-0f8e-3240-2ebb-94400456fdf0@redhat.com> Date: Wed, 6 Nov 2019 10:25:55 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <3c87bfba-9dc9-665f-17e8-0656e87c658b@redhat.com> Content-Language: en-US X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-MC-Unique: EXmaXr8tOJKEjNTa7TImNQ-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=WINDOWS-1252 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/25/2019 07:10 AM, Chris von Recklinghausen wrote: > On 10/21/2019 11:46 AM, Chris von Recklinghausen wrote: >> On 10/21/2019 10:21 AM, David Howells wrote: >>> Chris von Recklinghausen wrote: >>> >>>> The put_user call from keyring_read_iterator caused a page fault which >>>> attempts to lock mm->mmap_sem and type->lock_class (key->sem) in the r= everse >>>> order that keyring_read_iterator did, thus causing the circular lockin= g >>>> dependency. >>>> >>>> Remedy this by using access_ok and __put_user instead of put_user so w= e'll >>>> return an error instead of faulting in the page. >>> I wonder if it's better to create a kernel buffer outside of the lock i= n >>> keyctl_read_key(). Hmmm... The reason I didn't want to do that is tha= t >>> keyrings have don't have limits on the size. Maybe that's not actually= a >>> problem, since 1MiB would be able to hold a list of a quarter of a mill= ion >>> keys. >>> >>> David >>> >> Hi David, >> >> Thanks for the feedback. >> >> I can try to prototype that, but regardless of where the kernel buffer >> is allocated, the important part is causing the initial pagefault in the >> read path outside the lock so __put_user won't fail due to a valid user >> address but page backing the user address isn't in-core. >> >> I'll start work on v2. > Actually I'm going to back off on a v2 effort at this point and request > that folks comment on the code as-is. Changing keyctl_read_key to use > its own kernel buffer might be a worthwhile effort, but it doesn't > appear to me to have any effects on preventing pagefaults on user pages > at inopportune points of the code. Does anyone have any more feedback on v1 of this patch? Thanks, Chris > > Thanks, > > Chris > >> Thanks, >> >> Chris >>