Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2770533pxj; Mon, 31 May 2021 10:18:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWKBb4j+CFSreG9KH9WsnFuHejCET+7qD2kpAzA5PVxngZjbj+3T04IvJ+zGQJpppBhTy9 X-Received: by 2002:aa7:d607:: with SMTP id c7mr26138695edr.255.1622481513672; Mon, 31 May 2021 10:18:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622481513; cv=none; d=google.com; s=arc-20160816; b=eXDhdCUZNKjv+f4vUdHtKr4xpoEh8h5vRpdXXuJwFRY9VPZBPLEON/S5amiByVcOnG gX1Hgzj5bw56+kV1aC8+4EDx089HtzVw4zNhR5L163kvMCAF2iHmK//jGu5kmt7YFl7P RxGvscWBI/wiJV7qYrgZlDoNghxUk4vGALWqXap0U5FdeL0kEPXLfbva/u2tYTDi/EW6 okccEo2YLiGaUFD2MaqxEbVScO8Ygpt61jJluK/QqGoFalxIJPx2KjQ19kFBW1T8qHNz t0zVa2uOVn6LEk0+LBLrub4p2uH8xCjpCsEqlaf9EAl4+XVniFGM3UPrBrXwRQEt1A73 0ouQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=R3ERwvWAJQeMnwLML6I5CNggHBvI3ijt6irwEhA0CSU=; b=Kr7A+QoIlzGyL2M46ikD7nrXqA/5BoeOiAh8b8H/0rjd1CCID6JlrpUSny3OxDhrfp Yh/WjZOJNrBB0EP/xaW2tHHxidwdzzqMnDxTsfaRWLE6oufm+HN8XjQ5wWYJFZNdDBcp C6r+NZXl8IE3s2XkG0IJluBAQPZgkWB3rqRJTPZpla7m/kZmHEXVIfL98C+SqC3xeHEi //3E51uTvXNm7RWHEyG9Svqa7BTjJ3m30uSNK3FwLrCJZ5Y6FJGshy6N4V0P4GVZAMBR JQ0skIFccnJP2KLh9EnJNNzNto8UVT3pkvt2PZw2tDTqn6Fb3/Oxwp1xZd8gBx/Kh/Ly GprQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZjcWRA2z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f6si11359741edd.60.2021.05.31.10.18.09; Mon, 31 May 2021 10:18:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZjcWRA2z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232948AbhEaRRJ (ORCPT + 99 others); Mon, 31 May 2021 13:17:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51992 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233480AbhEaRPn (ORCPT ); Mon, 31 May 2021 13:15:43 -0400 Received: from mail-pj1-x102a.google.com (mail-pj1-x102a.google.com [IPv6:2607:f8b0:4864:20::102a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63606C0611EB; Mon, 31 May 2021 08:29:07 -0700 (PDT) Received: by mail-pj1-x102a.google.com with SMTP id k22-20020a17090aef16b0290163512accedso128947pjz.0; Mon, 31 May 2021 08:29:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=R3ERwvWAJQeMnwLML6I5CNggHBvI3ijt6irwEhA0CSU=; b=ZjcWRA2zVVf2u39IwROdRm+73SIR4lpLX33ihPFpccyUmmwKGXuEURi0bGu4ChqTds qbWYG7Ryuo/jLZeeXHauSo899ebOPGJ9UIr2EkiM//zBZcok6/ELX79M6ZqIdWEksGOV lSuljF4vJqYpWRlmsJB2tMuqpqgxVajKZO/q3dLh/26/ghOonKlPwxqxSJ7ZkJFdA1cR C2zlYiuSeJ5EKIsIqhq0Ww3jwn+xPLMNrjEJy4r+fbqgBXQWk7HkSpfAJJPvp1/BztMK /Ze895BJAIxsRCi3pGceCSh/CP6Nql9so5EzCN93ySHKrawSCQgjdiqOnqu5AJEaFHVP /GUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=R3ERwvWAJQeMnwLML6I5CNggHBvI3ijt6irwEhA0CSU=; b=UEIB1Lty8JBvtPbqWmBG3dRXo513wC5cdFIpiBt2uMuLo7phjm3p5V8vcZX0e6hn72 GJnwJQP/ClCIRiED4+LY9FjgEsAiV+hkVLesHAJv7fOtuNOZtC08+nOG3hY8rDfxJ7YT FrU/QhW0Zo8sDVAxcVOxQELw1rcLljlrApZugezXnFDW9qK09muTlsubz0WmEiUZxmxu bQ2Yo4aGXybNyIxrfMTJWKJ9uZgNtIj8w1OCwjkt0QzORrqU78c5VzpqC7KZB8eDnDz7 wCxAc8/+LTrxRlPjuTLXNoAfdaL4ZHek4hb8i/5lZtHwqKBbEUJX6KWsBvuPspXg1ok+ g3ug== X-Gm-Message-State: AOAM532COuGdn0j1MPjtacfmVK+/AzKTPcFs/g0sYJ4lYiqz9U0rhOtL fQXlJVoXBNKAA+I3i0SyjsI= X-Received: by 2002:a17:903:2482:b029:fd:696c:1d2b with SMTP id p2-20020a1709032482b02900fd696c1d2bmr21292801plw.24.1622474946893; Mon, 31 May 2021 08:29:06 -0700 (PDT) Received: from mail.google.com ([141.164.41.4]) by smtp.gmail.com with ESMTPSA id t13sm4319859pfh.97.2021.05.31.08.29.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 31 May 2021 08:29:06 -0700 (PDT) Date: Mon, 31 May 2021 23:28:58 +0800 From: Changbin Du To: Jakub Kicinski Cc: Changbin Du , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled Message-ID: <20210531152858.nz2orstfcm2bwvjr@mail.google.com> References: <20210529060526.422987-1-changbin.du@gmail.com> <20210529112735.22bdc153@kicinski-fedora-PC1C0HJN.hsd1.ca.comcast.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210529112735.22bdc153@kicinski-fedora-PC1C0HJN.hsd1.ca.comcast.net> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, May 29, 2021 at 11:27:35AM -0700, Jakub Kicinski wrote: > On Sat, 29 May 2021 14:05:26 +0800 Changbin Du wrote: > > When NET_NS is not enabled, socket ioctl cmd SIOCGSKNS should do nothing > > but acknowledge userspace it is not supported. Otherwise, kernel would > > panic wherever nsfs trys to access ns->ops since the proc_ns_operations > > is not implemented in this case. > > > > [7.670023] Unable to handle kernel NULL pointer dereference at virtual address 00000010 > > [7.670268] pgd = 32b54000 > > [7.670544] [00000010] *pgd=00000000 > > [7.671861] Internal error: Oops: 5 [#1] SMP ARM > > [7.672315] Modules linked in: > > [7.672918] CPU: 0 PID: 1 Comm: systemd Not tainted 5.13.0-rc3-00375-g6799d4f2da49 #16 > > [7.673309] Hardware name: Generic DT based system > > [7.673642] PC is at nsfs_evict+0x24/0x30 > > [7.674486] LR is at clear_inode+0x20/0x9c > > > > Signed-off-by: Changbin Du > > Cc: # v4.9 > > Please provide a Fixes tag. > Now it will be fixed by nsfs side. And the code has been changed to many times.. > > diff --git a/net/socket.c b/net/socket.c > > index 27e3e7d53f8e..644b46112d35 100644 > > --- a/net/socket.c > > +++ b/net/socket.c > > @@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg) > > mutex_unlock(&vlan_ioctl_mutex); > > break; > > case SIOCGSKNS: > > +#ifdef CONFIG_NET_NS > > err = -EPERM; > > if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) > > break; > > > > err = open_related_ns(&net->ns, get_net_ns); > > There's a few more places with this exact code. Can we please add the > check in get_net_ns? That should fix all callers. > > > +#else > > + err = -ENOTSUPP; > > EOPNOTSUPP, you shouldn't return ENOTSUPP to user space. > Thanks for pointing out. Will change it. > > +#endif > > break; > > case SIOCGSTAMP_OLD: > > case SIOCGSTAMPNS_OLD: > -- Cheers, Changbin Du