Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1953576pxb; Fri, 29 Jan 2021 09:12:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJxi8lnU97HSabg4Oze7NjhniLGvDL48B3ceyjufpEUnpZfs6vgjy9ioJCtlLE/JsaRwAsG2 X-Received: by 2002:a5d:4e0e:: with SMTP id p14mr5776570wrt.58.1611940324265; Fri, 29 Jan 2021 09:12:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611940324; cv=none; d=google.com; s=arc-20160816; b=ZK765WjwgaeyIBTkje6TdwhFDmhd8/vE1ll5HEHzo/u0AmI2s+H2acu/q9cSG8CG6A TeeoudKKpAvdrGvGI2GNXr6fIe68dv0C2T7OmQKSNNS3bI0HABbPCfGs/eV+QgVIQpdF YwGDQ182GqxOkhMUR1TgR02OFL5ypWk3Xjn55W8blHCqrBSTE874Dond8cNfCVJ8uHG/ j11GYdZ/RmGvALfcc7aYubBsFkB1hHFT/vOO8KPZXmbEuLbdIhS2xPSVB3nzVTyoHmln eugiEXQdDHCl6vJnSv4C/VwWXZPPbXIEF6kOiW1Tuy1GT+uPILp3G4yk/yfUnZOqsbyJ Kwpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=X9BtqdmW5kfywFotEgGJwTUBmyhNwJcWqmDBrTQPfU4=; b=H3MpjXPTNzrXCsQ3Hd0LTVbK1EbAy8XBvop0XuCaJ97LhaH9yXSk8dw6bRLxz+PywW 6TKrPQ90uAPCFPMLuuFLQLnsF2gtU4PN9CH0fM5/Mpc7x/75HJukzxFyfoDGYCcCV0RI ZoGqPkhy1w9qxlg14PZLK0/7QIL4XpbppfmOaAr3qni+NRn9RODE42UchUWysrTdtEGv ed1TRniptpiGXRGC9RTu/N09GK9h6Ru6lBzLe1z7XqVAjK8QgIvmLYdcNSAi7EmB1pkr VHxXIsNOh04T0uvSJaUBHyChBCfnIiXYRETakOxvjLdQZTTqIeoXa4zhHFcPZvVVKbWb GXUQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f14si4998377ejc.535.2021.01.29.09.11.39; Fri, 29 Jan 2021 09:12:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232202AbhA2RK4 (ORCPT + 99 others); Fri, 29 Jan 2021 12:10:56 -0500 Received: from www262.sakura.ne.jp ([202.181.97.72]:61161 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231871AbhA2RKw (ORCPT ); Fri, 29 Jan 2021 12:10:52 -0500 Received: from fsav304.sakura.ne.jp (fsav304.sakura.ne.jp [153.120.85.135]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 10TH8gL7041384; Sat, 30 Jan 2021 02:08:42 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav304.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav304.sakura.ne.jp); Sat, 30 Jan 2021 02:08:42 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav304.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 10TH8gCx041381 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Sat, 30 Jan 2021 02:08:42 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: general protection fault in tomoyo_socket_sendmsg_permission To: Shuah Khan , Hillf Danton , syzbot Cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Andrey Konovalov , Valentina Manea , Greg Kroah-Hartman , syzkaller-bugs@googlegroups.com References: <000000000000647eff05b3f7e0d4@google.com> <20201113120055.11748-1-hdanton@sina.com> <5f71e0c1-d387-6d72-d8e4-edb11cf57f72@linuxfoundation.org> <2b70d360-a293-4acb-ea6c-2badda5e8b8b@linuxfoundation.org> <9bdd3f10-bddb-bd87-d7ad-b4b706477006@i-love.sakura.ne.jp> <6b8da36f-a994-7604-77f4-52e29434605f@linuxfoundation.org> From: Tetsuo Handa Message-ID: <5f9ec159-77d8-ffba-21d1-2810e059f998@i-love.sakura.ne.jp> Date: Sat, 30 Jan 2021 02:08:41 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <6b8da36f-a994-7604-77f4-52e29434605f@linuxfoundation.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/01/30 1:05, Shuah Khan wrote: >> Since "general protection fault in tomoyo_socket_sendmsg_permission" is caused by >> unexpectedly resetting ud->tcp_socket to NULL without waiting for tx thread to >> terminate, tracing the ordering of events is worth knowing. Even adding >> schedule_timeout_uninterruptible() to before kernel_sendmsg() might help. >> > > What about the duplicate bug information that was in my email? > Did you take a look at that? I was not aware of the duplicate bugs. It is interesting that "KASAN: null-ptr-deref Write in event_handler" says that vdev->ud.tcp_tx became NULL at if (vdev->ud.tcp_tx) { /* this location */ kthread_stop_put(vdev->ud.tcp_tx); vdev->ud.tcp_tx = NULL; } which means that somebody else is unexpectedly resetting vdev->ud.tcp_tx to NULL. If memset() from vhci_device_init() from vhci_start() were unexpectedly called, all of tcp_socket, tcp_rx, tcp_tx etc. becomes NULL which can explain these bugs ? I'm inclined to report not only tcp_socket but also other fields when kernel_sendmsg() detected that tcp_socket is NULL...