linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled
@ 2021-05-29  6:05 Changbin Du
  2021-05-29 18:27 ` Jakub Kicinski
  2021-05-29 19:14 ` Cong Wang
  0 siblings, 2 replies; 6+ messages in thread
From: Changbin Du @ 2021-05-29  6:05 UTC (permalink / raw)
  To: David S. Miller, Jakub Kici nski
  Cc: netdev, linux-kernel, Changbin Du, stable

When NET_NS is not enabled, socket ioctl cmd SIOCGSKNS should do nothing
but acknowledge userspace it is not supported. Otherwise, kernel would
panic wherever nsfs trys to access ns->ops since the proc_ns_operations
is not implemented in this case.

[7.670023] Unable to handle kernel NULL pointer dereference at virtual address 00000010
[7.670268] pgd = 32b54000
[7.670544] [00000010] *pgd=00000000
[7.671861] Internal error: Oops: 5 [#1] SMP ARM
[7.672315] Modules linked in:
[7.672918] CPU: 0 PID: 1 Comm: systemd Not tainted 5.13.0-rc3-00375-g6799d4f2da49 #16
[7.673309] Hardware name: Generic DT based system
[7.673642] PC is at nsfs_evict+0x24/0x30
[7.674486] LR is at clear_inode+0x20/0x9c

Signed-off-by: Changbin Du <changbin.du@gmail.com>
Cc: <stable@vger.kernel.org> # v4.9
---
 net/socket.c | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/net/socket.c b/net/socket.c
index 27e3e7d53f8e..644b46112d35 100644
--- a/net/socket.c
+++ b/net/socket.c
@@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
 			mutex_unlock(&vlan_ioctl_mutex);
 			break;
 		case SIOCGSKNS:
+#ifdef CONFIG_NET_NS
 			err = -EPERM;
 			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
 				break;
 
 			err = open_related_ns(&net->ns, get_net_ns);
+#else
+			err = -ENOTSUPP;
+#endif
 			break;
 		case SIOCGSTAMP_OLD:
 		case SIOCGSTAMPNS_OLD:
-- 
2.27.0


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled
  2021-05-29  6:05 [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled Changbin Du
@ 2021-05-29 18:27 ` Jakub Kicinski
  2021-05-31 15:28   ` Changbin Du
  2021-05-29 19:14 ` Cong Wang
  1 sibling, 1 reply; 6+ messages in thread
From: Jakub Kicinski @ 2021-05-29 18:27 UTC (permalink / raw)
  To: Changbin Du; +Cc: David S. Miller, netdev, linux-kernel, stable

On Sat, 29 May 2021 14:05:26 +0800 Changbin Du wrote:
> When NET_NS is not enabled, socket ioctl cmd SIOCGSKNS should do nothing
> but acknowledge userspace it is not supported. Otherwise, kernel would
> panic wherever nsfs trys to access ns->ops since the proc_ns_operations
> is not implemented in this case.
> 
> [7.670023] Unable to handle kernel NULL pointer dereference at virtual address 00000010
> [7.670268] pgd = 32b54000
> [7.670544] [00000010] *pgd=00000000
> [7.671861] Internal error: Oops: 5 [#1] SMP ARM
> [7.672315] Modules linked in:
> [7.672918] CPU: 0 PID: 1 Comm: systemd Not tainted 5.13.0-rc3-00375-g6799d4f2da49 #16
> [7.673309] Hardware name: Generic DT based system
> [7.673642] PC is at nsfs_evict+0x24/0x30
> [7.674486] LR is at clear_inode+0x20/0x9c
> 
> Signed-off-by: Changbin Du <changbin.du@gmail.com>
> Cc: <stable@vger.kernel.org> # v4.9

Please provide a Fixes tag.

> diff --git a/net/socket.c b/net/socket.c
> index 27e3e7d53f8e..644b46112d35 100644
> --- a/net/socket.c
> +++ b/net/socket.c
> @@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
>  			mutex_unlock(&vlan_ioctl_mutex);
>  			break;
>  		case SIOCGSKNS:
> +#ifdef CONFIG_NET_NS
>  			err = -EPERM;
>  			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
>  				break;
>  
>  			err = open_related_ns(&net->ns, get_net_ns);

There's a few more places with this exact code. Can we please add the
check in get_net_ns? That should fix all callers.

> +#else
> +			err = -ENOTSUPP;

EOPNOTSUPP, you shouldn't return ENOTSUPP to user space.

> +#endif
>  			break;
>  		case SIOCGSTAMP_OLD:
>  		case SIOCGSTAMPNS_OLD:


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled
  2021-05-29  6:05 [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled Changbin Du
  2021-05-29 18:27 ` Jakub Kicinski
@ 2021-05-29 19:14 ` Cong Wang
  2021-05-31  8:30   ` David Laight
  1 sibling, 1 reply; 6+ messages in thread
From: Cong Wang @ 2021-05-29 19:14 UTC (permalink / raw)
  To: Changbin Du
  Cc: David S. Miller, Jakub Kici nski,
	Linux Kernel Network Developers, LKML, stable

On Fri, May 28, 2021 at 11:08 PM Changbin Du <changbin.du@gmail.com> wrote:
> diff --git a/net/socket.c b/net/socket.c
> index 27e3e7d53f8e..644b46112d35 100644
> --- a/net/socket.c
> +++ b/net/socket.c
> @@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
>                         mutex_unlock(&vlan_ioctl_mutex);
>                         break;
>                 case SIOCGSKNS:
> +#ifdef CONFIG_NET_NS
>                         err = -EPERM;
>                         if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
>                                 break;
>
>                         err = open_related_ns(&net->ns, get_net_ns);
> +#else
> +                       err = -ENOTSUPP;
> +#endif

I wonder if it is easier if we just reject ns->ops==NULL case
in open_related_ns(). For 1) we can save an ugly #ifdef here;
2) drivers/net/tun.c has the same bugs.

Something like this:

diff --git a/fs/nsfs.c b/fs/nsfs.c
index 800c1d0eb0d0..d63414604e99 100644
--- a/fs/nsfs.c
+++ b/fs/nsfs.c
@@ -152,6 +152,9 @@ int open_related_ns(struct ns_common *ns,
        int err;
        int fd;

+       if (!ns->ops)
+               return -EOPNOTSUPP;
+
        fd = get_unused_fd_flags(O_CLOEXEC);
        if (fd < 0)
                return fd;

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* RE: [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled
  2021-05-29 19:14 ` Cong Wang
@ 2021-05-31  8:30   ` David Laight
  2021-05-31 15:31     ` Changbin Du
  0 siblings, 1 reply; 6+ messages in thread
From: David Laight @ 2021-05-31  8:30 UTC (permalink / raw)
  To: 'Cong Wang', Changbin Du
  Cc: David S. Miller, Jakub Kici nski,
	Linux Kernel Network Developers, LKML, stable

From: Cong Wang
> Sent: 29 May 2021 20:15
> 
> On Fri, May 28, 2021 at 11:08 PM Changbin Du <changbin.du@gmail.com> wrote:
> > diff --git a/net/socket.c b/net/socket.c
> > index 27e3e7d53f8e..644b46112d35 100644
> > --- a/net/socket.c
> > +++ b/net/socket.c
> > @@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
> >                         mutex_unlock(&vlan_ioctl_mutex);
> >                         break;
> >                 case SIOCGSKNS:
> > +#ifdef CONFIG_NET_NS
> >                         err = -EPERM;
> >                         if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
> >                                 break;
> >
> >                         err = open_related_ns(&net->ns, get_net_ns);
> > +#else
> > +                       err = -ENOTSUPP;
> > +#endif
> 
> I wonder if it is easier if we just reject ns->ops==NULL case
> in open_related_ns(). For 1) we can save an ugly #ifdef here;
> 2) drivers/net/tun.c has the same bugs.

If CONFIG_NET_NS is unset then why not make both ns_capable()
and open_related_ns() unconditionally return -ENOTSUPP?

	David

-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled
  2021-05-29 18:27 ` Jakub Kicinski
@ 2021-05-31 15:28   ` Changbin Du
  0 siblings, 0 replies; 6+ messages in thread
From: Changbin Du @ 2021-05-31 15:28 UTC (permalink / raw)
  To: Jakub Kicinski; +Cc: Changbin Du, David S. Miller, netdev, linux-kernel, stable

On Sat, May 29, 2021 at 11:27:35AM -0700, Jakub Kicinski wrote:
> On Sat, 29 May 2021 14:05:26 +0800 Changbin Du wrote:
> > When NET_NS is not enabled, socket ioctl cmd SIOCGSKNS should do nothing
> > but acknowledge userspace it is not supported. Otherwise, kernel would
> > panic wherever nsfs trys to access ns->ops since the proc_ns_operations
> > is not implemented in this case.
> > 
> > [7.670023] Unable to handle kernel NULL pointer dereference at virtual address 00000010
> > [7.670268] pgd = 32b54000
> > [7.670544] [00000010] *pgd=00000000
> > [7.671861] Internal error: Oops: 5 [#1] SMP ARM
> > [7.672315] Modules linked in:
> > [7.672918] CPU: 0 PID: 1 Comm: systemd Not tainted 5.13.0-rc3-00375-g6799d4f2da49 #16
> > [7.673309] Hardware name: Generic DT based system
> > [7.673642] PC is at nsfs_evict+0x24/0x30
> > [7.674486] LR is at clear_inode+0x20/0x9c
> > 
> > Signed-off-by: Changbin Du <changbin.du@gmail.com>
> > Cc: <stable@vger.kernel.org> # v4.9
> 
> Please provide a Fixes tag.
>
Now it will be fixed by nsfs side. And the code has been changed to many times..

> > diff --git a/net/socket.c b/net/socket.c
> > index 27e3e7d53f8e..644b46112d35 100644
> > --- a/net/socket.c
> > +++ b/net/socket.c
> > @@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
> >  			mutex_unlock(&vlan_ioctl_mutex);
> >  			break;
> >  		case SIOCGSKNS:
> > +#ifdef CONFIG_NET_NS
> >  			err = -EPERM;
> >  			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
> >  				break;
> >  
> >  			err = open_related_ns(&net->ns, get_net_ns);
> 
> There's a few more places with this exact code. Can we please add the
> check in get_net_ns? That should fix all callers.
> 
> > +#else
> > +			err = -ENOTSUPP;
> 
> EOPNOTSUPP, you shouldn't return ENOTSUPP to user space.
>
Thanks for pointing out. Will change it.

> > +#endif
> >  			break;
> >  		case SIOCGSTAMP_OLD:
> >  		case SIOCGSTAMPNS_OLD:
> 

-- 
Cheers,
Changbin Du

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled
  2021-05-31  8:30   ` David Laight
@ 2021-05-31 15:31     ` Changbin Du
  0 siblings, 0 replies; 6+ messages in thread
From: Changbin Du @ 2021-05-31 15:31 UTC (permalink / raw)
  To: David Laight
  Cc: 'Cong Wang',
	Changbin Du, David S. Miller, Jakub Kici nski,
	Linux Kernel Network Developers, LKML, stable

On Mon, May 31, 2021 at 08:30:58AM +0000, David Laight wrote:
> From: Cong Wang
> > Sent: 29 May 2021 20:15
> > 
> > On Fri, May 28, 2021 at 11:08 PM Changbin Du <changbin.du@gmail.com> wrote:
> > > diff --git a/net/socket.c b/net/socket.c
> > > index 27e3e7d53f8e..644b46112d35 100644
> > > --- a/net/socket.c
> > > +++ b/net/socket.c
> > > @@ -1149,11 +1149,15 @@ static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
> > >                         mutex_unlock(&vlan_ioctl_mutex);
> > >                         break;
> > >                 case SIOCGSKNS:
> > > +#ifdef CONFIG_NET_NS
> > >                         err = -EPERM;
> > >                         if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
> > >                                 break;
> > >
> > >                         err = open_related_ns(&net->ns, get_net_ns);
> > > +#else
> > > +                       err = -ENOTSUPP;
> > > +#endif
> > 
> > I wonder if it is easier if we just reject ns->ops==NULL case
> > in open_related_ns(). For 1) we can save an ugly #ifdef here;
> > 2) drivers/net/tun.c has the same bugs.
> 
> If CONFIG_NET_NS is unset then why not make both ns_capable()
> and open_related_ns() unconditionally return -ENOTSUPP?
>
Here is the new fix that reject creating indoe for disabled ns.
--- a/fs/nsfs.c
+++ b/fs/nsfs.c
@@ -62,6 +62,10 @@ static int __ns_get_path(struct path *path, struct ns_common *ns)
        struct inode *inode;
        unsigned long d;
 
+       /* In case the namespace is not actually enabled. */
+       if (!ns->ops)
+               return -EOPNOTSUPP;

> 	David
> 
> -
> Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
> Registration No: 1397386 (Wales)

-- 
Cheers,
Changbin Du

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2021-05-31 17:18 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-05-29  6:05 [PATCH] net: fix oops in socket ioctl cmd SIOCGSKNS when NET_NS is disabled Changbin Du
2021-05-29 18:27 ` Jakub Kicinski
2021-05-31 15:28   ` Changbin Du
2021-05-29 19:14 ` Cong Wang
2021-05-31  8:30   ` David Laight
2021-05-31 15:31     ` Changbin Du

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).