public inbox for linux-security-module@vger.kernel.org
 help / color / mirror / Atom feed
* [BUG] landlock: warning in collect_domain_accesses via renameat2 path rename
@ 2026-04-17 11:30 王志
  2026-04-18 23:08 ` Justin Suess
  0 siblings, 1 reply; 2+ messages in thread
From: 王志 @ 2026-04-17 11:30 UTC (permalink / raw)
  To: linux-security-module; +Cc: linux-kernel, linux-fsdevel, paul

Dear Maintainers,

When using our customized Syzkaller to fuzz the latest Linux kernel, we discovered a crash related to Landlock during a path rename operation.

HEAD commit: 7d0a66e4bb9081d75c82ec4957c50034cb0ea449
git tree: upstream

Reproducer and logs:
Output: https://github.com/manual0/crash/blob/main/cebd27007e806e16cf15cb1e0214c24054e8998e/report1
Kernel config: https://github.com/manual0/crash/blob/main/6.18-syzbot.config
C reproducer: https://github.com/manual0/crash/blob/main/cebd27007e806e16cf15cb1e0214c24054e8998e/repro.c

----------------------------------------

Analysis:

The crash is triggered through the following path:

renameat2
  → security_path_rename
  → current_check_refer_path
  → collect_domain_accesses

This indicates that a path rename operation triggers Landlock's path access control checks. The crash occurs inside collect_domain_accesses(), which is responsible for collecting the current process's domain access rights.

The bug is caused by collect_domain_accesses() traversing inconsistent or invalid Landlock ruleset data during rename path permission checks, leading to unsafe memory access.
----------------------------------------

If you fix this issue, please add the following tag to the commit:

Reported-by: Zhi Wang <wangzhi@stu.xidian.edu.cn>

Thanks,
Zhi Wang

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2026-04-18 23:08 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-17 11:30 [BUG] landlock: warning in collect_domain_accesses via renameat2 path rename 王志
2026-04-18 23:08 ` Justin Suess

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox