Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3213330pxf; Mon, 22 Mar 2021 00:13:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxj0Wc0cS1Arr3MC4YE008C2xtdIbxuMFcisVZ5w5pzijtKLzfaOSeDCLOiChVQNh8bZd3b X-Received: by 2002:aa7:c551:: with SMTP id s17mr24118646edr.291.1616397190358; Mon, 22 Mar 2021 00:13:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616397190; cv=none; d=google.com; s=arc-20160816; b=0ll14/jKBiLuJ1AnwY+Re4pmcCXt1tEiwkRtBYYvR1vqPKn3enr8nwPtbiSATunPTe tmg4znnUVjkf7La2IuEFY7cLYiPltNCzIpeI2LxprEcOxGUJO0sGwO75B0CKocAki4/E nanDp57wxexMfQM/+etJ44vyEo/hMPNpx7TCM4xmnseRRQpqmWj33WMZ+0i+Fw09iFcf zkSHyFKO0OwkQ8ktnKoh1UdJDKU5AumttYWlnOwsJFbHZ7wZ85I4MekQ7xiVUcdWXnKN 7sWrSOP/twOLVfVmZoIg977PWogfmYXHb7KWFfny6yAoPPBRWmsnp/EP/snso+5vnq9E MVLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=TrOBa035wpQcEh/IB2Ovo/GX7PJh8X+ZQxqFqB6c5Xw=; b=xC5Dr00xTbrcPiyYz11DGY5R7EH4PZYfQrolQ3+mnJ+FzsonyksET2YjpvviKcOdpn P8qOTG3b3R57DvRaWOAk/YbKjIWYG0ADqpEQKspKj3b4+WEoRaWPIsAw6b36z84Wql2T yRd0Y7sF2pvBVftpFGm9jgPPcbxqN0qE9aOiJ75BCImxL/OTr3Nz2o2Vt6+24zNzwv/O 5cisZRUSECPx/I8Pub2ZviEGdC199bpLB58gKBq8cDT9F4P1iHqZZw01k8a1chJLDYz9 zSQajiou8arxEedVZ34oTqv1vVC5DP1Q7LIOnXY/UQdaW/LkDk5bhouOlmnLZ6Uendoz XvXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt8si10894238ejc.111.2021.03.22.00.12.47; Mon, 22 Mar 2021 00:13:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229715AbhCVHLV (ORCPT + 99 others); Mon, 22 Mar 2021 03:11:21 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:62355 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229883AbhCVHLD (ORCPT ); Mon, 22 Mar 2021 03:11:03 -0400 Received: from fsav103.sakura.ne.jp (fsav103.sakura.ne.jp [27.133.134.230]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 12M7B1lW083976; Mon, 22 Mar 2021 16:11:01 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav103.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav103.sakura.ne.jp); Mon, 22 Mar 2021 16:11:01 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav103.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 12M7B1sG083972 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Mon, 22 Mar 2021 16:11:01 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: [RFC PATCH 2/2] integrity: double check iint_cache was initialized To: Mimi Zohar , Dmitry Vyukov Cc: linux-integrity@vger.kernel.org, James Morris , "Serge E . Hallyn" , linux-security-module , LKML , Eric Biggers References: <20210319200358.22816-1-zohar@linux.ibm.com> <20210319200358.22816-2-zohar@linux.ibm.com> From: Tetsuo Handa Message-ID: <8450c80a-104a-3f36-0963-0ae8fa69e0f2@i-love.sakura.ne.jp> Date: Mon, 22 Mar 2021 16:10:59 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20210319200358.22816-2-zohar@linux.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/03/20 5:03, Mimi Zohar wrote: > The integrity's "iint_cache" is initialized at security_init(). Only > after an IMA policy is loaded, which is initialized at late_initcall, > is a file's integrity status stored in the "iint_cache". > > All integrity_inode_get() callers first verify that the IMA policy has > been loaded, before calling it. Yet for some reason, it is still being > called, causing a NULL pointer dereference. > > As reported by Dmitry Vyukov: > in qemu: > qemu-system-x86_64 -enable-kvm -machine q35,nvdimm -cpu > max,migratable=off -smp 4 -m 4G,slots=4,maxmem=16G -hda > wheezy.img -kernel arch/x86/boot/bzImage -nographic -vga std > -soundhw all -usb -usbdevice tablet -bt hci -bt device:keyboard > -net user,host=10.0.2.10,hostfwd=tcp::10022-:22 -net > nic,model=virtio-net-pci -object > memory-backend-file,id=pmem1,share=off,mem-path=/dev/zero,size=64M > -device nvdimm,id=nvdimm1,memdev=pmem1 -append "console=ttyS0 > root=/dev/sda earlyprintk=serial rodata=n oops=panic panic_on_warn=1 > panic=86400 lsm=smack numa=fake=2 nopcid dummy_hcd.num=8" -pidfile > vm_pid -m 2G -cpu host > I tried similar command line (without "-enable-kvm" and without "-cpu host" as I'm running from VMware, without "-soundhw all", without "-machine q35,nvdimm" and "-device nvdimm,id=nvdimm1,memdev=pmem1" etc.) on 5.12-rc4. While I was finally able to hit similar crash when I used "-smp 1" instead of "-smp 4", I suspect this is not a integrity module's problem but a memory initialization/corruption problem, for I got various different crashes (INT3) at memory allocation when I was trimming command line options trying to reproduce the same crash. Dmitry, do you get different crashes by changing command line arguments?