Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp598004ybk; Fri, 15 May 2020 08:41:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzpN9weMb0qRU0TiFU5Q6ozGKTdtQY/TMP465bM5IpYPE7YHzZ+xrJMmkKJ8wLLkgmrZIPX X-Received: by 2002:a17:906:18e9:: with SMTP id e9mr3259522ejf.140.1589557298845; Fri, 15 May 2020 08:41:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589557298; cv=none; d=google.com; s=arc-20160816; b=E2GnrxOjvit9hT/DChigBGd8Bk+rSce7sAJIhjusXeVOAgh3s/iQj2gbhDYa/FiQWp zaYkdNzi/o/17iRg8ZYQx+djn8QrQ4Q95klH2evPG74cmZIGGuiiXP3qWn1r/JdafuaW B5JV+QcnyTJgwi7wQ36ElNeH24Vqp89JGRFTaYD3meX1WuYDoeBMLPwQnCat+m/mmHW2 G/iy4uaKJ1Aj3x0tTnC/NhVqPFZqWxcQ37vbp51Oo/MyYIsd0bDOAAdTLMJCgzB7lnDR mmvnDEgux7/jekAzXOgnfv3I81rEg1XGwpzk0cfPq1lU31YF3gVxNY+xWKb+IoA9ZBTu 6IOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:from:subject; bh=Nj83KdsjUfEMTW6X+QBQAqUWL2/1dy7saLB+hkho5Yg=; b=z0EeS2Bt5YL1BeJSCVb1+hsHJmd9OS3Wq/fmfiVTH7rCIbY/hU0eCICKkdY53X3VIE wTMnZfJruVQNR5/mQ3uZnYhP/ZpBN5qfb4doAo2Kps7SCSLbUnxWsj8t+xbS1zEl8IAh 8Zzwm+aYohRAW1ma6it1VD8d07MD8VG1X2U+AfVk1G79TMMQYgNJe7YioTafWynBBD// s0SE/XhdwLfeqdK3cCchnPf3exDXb/8J9UjtjsEyqNX0Zd45iBTL5EFEBxh9au8KuQk/ yAderVo0Oc4Q7ACQuUTeI2pdT5jNFFUKub9Bj3B3qo/3565zwhQ8lSefnIXrIIggwZ4z LeTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si1311660edq.191.2020.05.15.08.41.15; Fri, 15 May 2020 08:41:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726652AbgEOPhO (ORCPT + 99 others); Fri, 15 May 2020 11:37:14 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:56988 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726183AbgEOPhM (ORCPT ); Fri, 15 May 2020 11:37:12 -0400 Received: from fsav405.sakura.ne.jp (fsav405.sakura.ne.jp [133.242.250.104]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 04FFaX5p011041; Sat, 16 May 2020 00:36:33 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav405.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav405.sakura.ne.jp); Sat, 16 May 2020 00:36:33 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav405.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 04FFaXJU011017 (version=TLSv1.2 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 16 May 2020 00:36:33 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: linux-next boot error: general protection fault in tomoyo_get_local_path From: Tetsuo Handa To: Alexey Gladkov , "Eric W. Biederman" , Alexander Viro Cc: syzbot , jmorris@namei.org, linux-kernel@vger.kernel.org, linux-next@vger.kernel.org, linux-security-module@vger.kernel.org, serge@hallyn.com, sfr@canb.auug.org.au, syzkaller-bugs@googlegroups.com, linux-fsdevel References: <0000000000002f0c7505a5b0e04c@google.com> Message-ID: <72cb7aea-92bd-d71b-2f8a-63881a35fad8@i-love.sakura.ne.jp> Date: Sat, 16 May 2020 00:36:28 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/05/16 0:18, Tetsuo Handa wrote: > This is > > if (sb->s_magic == PROC_SUPER_MAGIC && *pos == '/') { > char *ep; > const pid_t pid = (pid_t) simple_strtoul(pos + 1, &ep, 10); > struct pid_namespace *proc_pidns = proc_pid_ns(d_inode(dentry)); // <= here > > if (*ep == '/' && pid && pid == > task_tgid_nr_ns(current, proc_pidns)) { > > which was added by commit c59f415a7cb6e1e1 ("Use proc_pid_ns() to get pid_namespace from the proc superblock"). > > @@ -161,9 +162,10 @@ static char *tomoyo_get_local_path(struct dentry *dentry, char * const buffer, > if (sb->s_magic == PROC_SUPER_MAGIC && *pos == '/') { > char *ep; > const pid_t pid = (pid_t) simple_strtoul(pos + 1, &ep, 10); > + struct pid_namespace *proc_pidns = proc_pid_ns(d_inode(dentry)); > > if (*ep == '/' && pid && pid == > - task_tgid_nr_ns(current, sb->s_fs_info)) { > + task_tgid_nr_ns(current, proc_pidns)) { > pos = ep - 5; > if (pos < buffer) > goto out; > > Alexey and Eric, any clue? > A similar bug (racing inode destruction with open() on proc filesystem) was fixed as commit 6f7c41374b62fd80 ("tomoyo: Don't use nifty names on sockets."). Then, it might not be safe to replace dentry->d_sb->s_fs_info with dentry->d_inode->i_sb->s_fs_info .