Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1675768pxj; Wed, 19 May 2021 11:12:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzOF2P2++E9Amyr0bPQjbPQYOeF2uoiLFrt4q0rgdtnCO6zSzTlrejo2MjHJGwubzuPeakj X-Received: by 2002:a6b:3c1a:: with SMTP id k26mr791026iob.113.1621447945373; Wed, 19 May 2021 11:12:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621447945; cv=none; d=google.com; s=arc-20160816; b=RHtS7Utk9WdYT/yBN6XX9tOfL2WaD/kHwK4VVEf62Vy582owQPbxtDoeNVOzCCQW8B m6CTTGOCUcsBynClE3oV28MSvvsPDzbLcomBTTNX72wwe4wbjC3tjOL+3qhcwJH/G9o4 1HNRGOaTb8++B0LNsSqLwl84q5ugw8rGVvQntTIXgatuhxAl2AJPtguJeYTb+mqQmj6y 48HQ7eRDF4h1qrhfXP2uyetzlKdx3Q61LhHANY8jgvvGb/s88TH8R1w4I7iLd79IiaDU UpLc6ekJoWUcNBMHoLFZUFAMB7AY5TOVKWbj+VkTCGhdR5AREmh/AKWn9hvDXEYyV2uw vMmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=EkLNktB71PhIj4e15hzhD8YOUYAMXKa3EfPD4Z2mdCE=; b=BRNNlEnegJoI33Bh282Uc3sxXqLw226scdkthooikOyRNrOvATkRO/junnOwkOoQhU I+ZgD7KwziR5Km+mtq1Msxa1mrWrE354fkhdJ7mo3URb+es+Eyy6s6YTpWhZOJ3DiN54 yDBQL73qqxeXmDtJ2ZfPfdb3wD35EC1CV/Q1JXzQlQxjymwXao7WMsH6hsXiRa/YTt9j ppvHA/Ei7C3zI/5i5X9xnj77GlnuIemrd4I4/f99pjORpicKNNrIqHJzz14R5eDyfj6j 9Jnx+xvSPqoi9W+yZeRB0oSk06UaBhtbizlW1ddZClUkj5W2jhkf8OmTZJpu62akqhzV II2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=mR6wtPfI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f12si29843jas.31.2021.05.19.11.12.13; Wed, 19 May 2021 11:12:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=mR6wtPfI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232006AbhERNnP (ORCPT + 99 others); Tue, 18 May 2021 09:43:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230217AbhERNnL (ORCPT ); Tue, 18 May 2021 09:43:11 -0400 Received: from mail-vs1-xe31.google.com (mail-vs1-xe31.google.com [IPv6:2607:f8b0:4864:20::e31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AC5BBC061573 for ; Tue, 18 May 2021 06:41:53 -0700 (PDT) Received: by mail-vs1-xe31.google.com with SMTP id x13so4942877vsh.1 for ; Tue, 18 May 2021 06:41:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EkLNktB71PhIj4e15hzhD8YOUYAMXKa3EfPD4Z2mdCE=; b=mR6wtPfIt2bQoLzjyvhav/mhG7j5BsvoX0PxqmzDEtKKyPc62z52ENLosOt5RkaWjr U7HzeYjMY2brL++Rj5aSV6OokT6/5gkNvItU9Ibsw0187CsoeOb92bCmmgpJg+f0V/fx U1HHF6JNYCfU/6NrUXujPvowWk9rVvmfSu6vM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EkLNktB71PhIj4e15hzhD8YOUYAMXKa3EfPD4Z2mdCE=; b=n2Ne4Q63v+K0PxpcmME2ALzVV0Hgi5GkXTU1wZlb+0yvSNUhsFp/X7yFtgDw/cgZ6j lICd+CEK7NGn+pWl0RKo1pAr/Ji+/oXX8IFxfk6Y8OWnjzsqQCf7gIS9aJhdO9Djavbe H4LW0HzmI4a1pbpZ4QgSqAWe+mcDYDEueHL/oex3dhGAWYli7iDRI3F2XzdUkSwqyLAD DGCozJ9wBHNZTCbb9hXTgEdowmj8XuAnoZJby1CTGb26KMgDHHmw+WcWU/0armw6vrvO Q8zQJaarrz57b2wXCPk96amtytutQ67DeqmEf0JkiGx/lRmQaPjbWtrNujQXbhPIGOnC hXRQ== X-Gm-Message-State: AOAM531I3pIIhhze0hNOR//1I/jwCtK1922PTmjHJ1Q7eWqFePd/v4qW BgPd/WV7u0fmnsjsY/6zaLNFKxHb/eV0VwpfIBP/wg== X-Received: by 2002:a67:ebd2:: with SMTP id y18mr6544819vso.7.1621345312932; Tue, 18 May 2021 06:41:52 -0700 (PDT) MIME-Version: 1.0 References: <20210518122138.22914-1-yaohaidong369@gmail.com> In-Reply-To: <20210518122138.22914-1-yaohaidong369@gmail.com> From: Miklos Szeredi Date: Tue, 18 May 2021 15:41:41 +0200 Message-ID: Subject: Re: [PATCH] ovl: useing ovl_revert_creds() instead of revert_creds(), To: Haidong Yao Cc: Orson Zhai , Chunyan Zhang , Chunyan Zhang , Orson Zhai , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , overlayfs , linux-kernel@vger.kernel.org, network dev , bpf , stable , Haidong Yao Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 18 May 2021 at 14:21, Haidong Yao wrote: > > From: Haidong Yao > > After execution adb remout,happened crash. > > Fixes: 292f902a40c1 ("ovl: check permission to open real file") > > This fixes the warning below. > > [ 241.778266]c2 [T31619] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004 > [ 241.796757]c2 [T31619] Mem abort info: > [ 241.800475]c2 [T31619] ESR = 0x96000005 > [ 241.804457]c2 [T31619] EC = 0x25: DABT (current EL), IL = 32 bits > [ 241.810686]c2 [T31619] SET = 0, FnV = 0 > [ 241.814666]c2 [T31619] EA = 0, S1PTW = 0 > [ 241.818733]c2 [T31619] Data abort info: > [ 241.822542]c2 [T31619] ISV = 0, ISS = 0x00000005 > [ 241.827302]c2 [T31619] CM = 0, WnR = 0 > [ 241.831198]c2 [T31619] user pgtable: 4k pages, 39-bit VAs, pgdp=000000017709f000 > [ 241.838552]c2 [T31619] [0000000000000004] pgd=0000000000000000, pud=0000000000000000 > [ 241.846255]c2 [T31619] Internal error: Oops: 96000005 [#1] PREEMPT SMP > [ 241.852746]c2 [T31619] sprd-sysdump: dump_die_cb save pregs_die_g ok . > [ 242.021424]c2 [T31619] CPU: 2 PID: 31619 Comm: ylog.opentcpdum Tainted: G S WC O 5.4.114-g23ed6b182f28-ab19500 #2 > [ 242.032496]c2 [T31619] Hardware name: Spreadtrum UMS512-1H10 SoC (DT) > [ 242.038901]c2 [T31619] pstate: 20400085 (nzCv daIf +PAN -UAO) > [ 242.044620]c2 [T31619] pc : bpf_get_current_uid_gid+0x1c/0x34 > [ 242.050331]c2 [T31619] lr : bpf_prog_4f08a086bc7e64fb_tracepoint_sche+0x5a0/0x2000 > [ 242.057852]c2 [T31619] sp : ffffffc018fab4e0 > [ 242.062093]c2 [T31619] x29: ffffffc018fab4e0 x28: 0000000005de0e82 > [ 242.068323]c2 [T31619] x27: ffffffc01008ee04 x26: 0000000000000000 > [ 242.074554]c2 [T31619] x25: ffffffc018fab640 x24: ffffffc000000000 > [ 242.080785]c2 [T31619] x23: ffffffc0121cf868 x22: 000000383e0d5d53 > [ 242.087015]c2 [T31619] x21: 0000000000000005 x20: 0000000000000007 > [ 242.093246]c2 [T31619] x19: fffffffebf93cac0 x18: ffffffc016d7d0a0 > [ 242.099477]c2 [T31619] x17: 0000007f477affdc x16: 0000000000002c26 > [ 242.105707]c2 [T31619] x15: 000000000000007f x14: 000000000000007f > [ 242.111938]c2 [T31619] x13: 000000000001af6a x12: 0000000026762762 > [ 242.118169]c2 [T31619] x11: 001a39dd8df5aa00 x10: ffffffc010093398 > [ 242.124400]c2 [T31619] x9 : ffffffc0121bd018 x8 : 0000000000000000 > [ 242.130630]c2 [T31619] x7 : ffffff80c45c0110 x6 : ffffffc0123b9dc6 > [ 242.136862]c2 [T31619] x5 : ffffffc012399000 x4 : 0000000000000004 > [ 242.143093]c2 [T31619] x3 : ffffff80f3412d00 x2 : ffffff80d5395a00 > [ 242.149322]c2 [T31619] x1 : ffffffc018fab628 x0 : ffffff80c45c0110 > [ 242.155554]c2 [T31619] Call trace: > [ 242.158931]c2 [T31619] bpf_get_current_uid_gid+0x1c/0x34 > [ 242.164295]c2 [T31619] bpf_prog_4f08a086bc7e64fb_tracepoint_sche+0x5a0/0x2000 > [ 242.171480]c2 [T31619] trace_call_bpf+0x1b0/0x3d4 > [ 242.176240]c2 [T31619] perf_trace_sched_switch+0x1a8/0x204 > [ 242.181779]c2 [T31619] __schedule+0x828/0x9ac > [ 242.186190]c2 [T31619] preempt_schedule_common+0x17c/0x2bc > [ 242.191730]c2 [T31619] vprintk_emit+0x738/0x7c8 > [ 242.196316]c2 [T31619] vprintk_func+0x238/0x274 > [ 242.200901]c2 [T31619] printk+0x64/0x90 > [ 242.204799]c2 [T31619] die_kernel_fault+0x4c/0x80 > [ 242.209556]c2 [T31619] __do_kernel_fault+0x24c/0x268 > [ 242.214574]c2 [T31619] do_page_fault+0xa4/0x744 > [ 242.219160]c2 [T31619] do_translation_fault+0x60/0x80 > [ 242.224267]c2 [T31619] do_mem_abort+0x68/0xfc > [ 242.228681]c2 [T31619] el1_da+0x1c/0xc0 > [ 242.232576]c2 [T31619] cap_vm_enough_memory+0x20/0x84 > [ 242.237681]c2 [T31619] insert_vm_struct+0xf4/0x3cc > [ 242.242527]c2 [T31619] bprm_mm_init+0x188/0x2ac > [ 242.247113]c2 [T31619] __do_execve_file+0x3f8/0x904 > [ 242.252045]c2 [T31619] __arm64_sys_execve+0x50/0x64 > [ 242.256979]c2 [T31619] el0_svc_common+0xc0/0x22c > [ 242.261652]c2 [T31619] el0_svc_handler+0x2c/0x3c > [ 242.266323]c2 [T31619] el0_svc+0x8/0xc > [ 242.270137]c2 [T31619] Code: d503201f d5384108 b40000c8 f943a508 (f8404100) > [ 242.277143]c2 [T31619] ---[ end trace d2bf18208d1aac17 ]--- > > Signed-off-by: Haidong Yao > --- > fs/overlayfs/file.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/fs/overlayfs/file.c b/fs/overlayfs/file.c > index 4d53d3b7e5fe..d9bc658f22ee 100644 > --- a/fs/overlayfs/file.c > +++ b/fs/overlayfs/file.c > @@ -60,7 +60,7 @@ static struct file *ovl_open_realfile(const struct file *file, > realfile = open_with_fake_path(&file->f_path, flags, realinode, > current_cred()); > } > - revert_creds(old_cred); > + ovl_revert_creds(inode->i_sb, old_cred); Upstream kernel doesn't have ovl_revert_creds(). Thanks, Miklos