ANDROID: regression introduced override_creds=off
Fixes a regression introduced by the series of commits: commit17bd9a7f78
("ANDROID: overlayfs ovl_create_of_link regression"), commit 272fcd1ca7ceb252b1c3a2961110c7c1722707cf ("ANDROID: overlayfs: override_creds=off option bypass creator_cred"), commitaab9adb4b8
("Merge 4.4.179 into android-4.4") that took in an incomplete, backport of commit54a07fff4b
("ovl: fix uid/gid when creating over whiteout") (or upstream commit d0e13f5bbe4be7c8f27736fc40503dcec04b7de0 ("ovl: fix uid/gid when creating over whiteout")) where a crash is observed a crash in ovl_create_or_link() when a simple re-direction command in vendor directory. /vendor/bin/<Any test> > /vendor/bin/test_log.txt 2>&1& After further debugging we see that if the output is redirected to a file which doesn’t exist we see this stack: [ 377.382745] ovl_create_or_link+0xac/0x710 [ 377.382745] ovl_create_object+0xb8/0x110 [ 377.382745] ovl_create+0x34/0x40 [ 377.382745] path_openat+0xd44/0x15a8 [ 377.382745] do_filp_open+0x80/0x128 [ 377.382745] do_sys_open+0x140/0x250 [ 377.382745] __arm64_sys_openat+0x2c/0x38 ovl_override_creds returns NULL because the override_cred flag is set to false. This causes ovl_revert_creds also to fail. There is another call to check override_cred in override_cred call which overrides the creds permanently as there no revert_creds associated. So whenever next commit_cred is called we see the crash as the credentials are permanently overridden. Signed-off-by: Mark Salyzyn <salyzyn@google.com> Tested-by: Rishabh/Jeevan <jshriram@qualcomm.corp-partner.google.com> Bug: 140816499 Bug: 109821005 Bug: 112955896 Bug: 127298877 Bug: 137541192 Change-Id: Icd0d9be82fc57af5ead1eeab99f79adf3adf62ef
This commit is contained in:
parent
da6d147f98
commit
3dcafcc6c0
1 changed files with 5 additions and 3 deletions
|
@ -407,7 +407,7 @@ static int ovl_create_or_link(struct dentry *dentry, int mode, dev_t rdev,
|
|||
if (!ovl_dentry_is_opaque(dentry)) {
|
||||
err = ovl_create_upper(dentry, inode, &stat, link, hardlink);
|
||||
} else {
|
||||
const struct cred *old_cred;
|
||||
const struct cred *old_cred, *hold_cred = NULL;
|
||||
struct cred *override_cred;
|
||||
|
||||
old_cred = ovl_override_creds(dentry->d_sb);
|
||||
|
@ -422,13 +422,15 @@ static int ovl_create_or_link(struct dentry *dentry, int mode, dev_t rdev,
|
|||
our_cred = current_cred();
|
||||
override_cred->fsuid = our_cred->fsuid;
|
||||
override_cred->fsgid = our_cred->fsgid;
|
||||
put_cred(override_creds(override_cred));
|
||||
hold_cred = override_creds(override_cred);
|
||||
put_cred(override_cred);
|
||||
|
||||
err = ovl_create_over_whiteout(dentry, inode, &stat,
|
||||
link, hardlink);
|
||||
}
|
||||
ovl_revert_creds(old_cred);
|
||||
ovl_revert_creds(old_cred ?: hold_cred);
|
||||
if (old_cred && hold_cred)
|
||||
put_cred(hold_cred);
|
||||
}
|
||||
|
||||
if (!err)
|
||||
|
|
Loading…
Add table
Reference in a new issue