Commit e6333d72 authored by Linus Torvalds's avatar Linus Torvalds

Merge tag 'ovl-fixes-4.20-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/vfs

Pull overlayfs fixes from Miklos Szeredi:
 "Needed to revert a patch, because it possibly introduces a security
  hole. Since the patch is basically a conceptual cleanup, not a bug
  fix, it's safe to revert. I'm not giving up on this, and discussions
  seemed to have reached an agreement over how to move forward, but that
  can wait 'till the next release.

  The other two patches are fixes for bugs introduced in recent
  releases"

* tag 'ovl-fixes-4.20-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/vfs:
  Revert "ovl: relax permission checking on underlying layers"
  ovl: fix decode of dir file handle with multi lower layers
  ovl: fix missing override creds in link of a metacopy upper
parents 70f48282 ec7ba118
...@@ -651,6 +651,18 @@ static int ovl_symlink(struct inode *dir, struct dentry *dentry, ...@@ -651,6 +651,18 @@ static int ovl_symlink(struct inode *dir, struct dentry *dentry,
return ovl_create_object(dentry, S_IFLNK, 0, link); return ovl_create_object(dentry, S_IFLNK, 0, link);
} }
static int ovl_set_link_redirect(struct dentry *dentry)
{
const struct cred *old_cred;
int err;
old_cred = ovl_override_creds(dentry->d_sb);
err = ovl_set_redirect(dentry, false);
revert_creds(old_cred);
return err;
}
static int ovl_link(struct dentry *old, struct inode *newdir, static int ovl_link(struct dentry *old, struct inode *newdir,
struct dentry *new) struct dentry *new)
{ {
...@@ -670,7 +682,7 @@ static int ovl_link(struct dentry *old, struct inode *newdir, ...@@ -670,7 +682,7 @@ static int ovl_link(struct dentry *old, struct inode *newdir,
goto out_drop_write; goto out_drop_write;
if (ovl_is_metacopy_dentry(old)) { if (ovl_is_metacopy_dentry(old)) {
err = ovl_set_redirect(old, false); err = ovl_set_link_redirect(old);
if (err) if (err)
goto out_drop_write; goto out_drop_write;
} }
......
...@@ -754,9 +754,8 @@ static struct dentry *ovl_lower_fh_to_d(struct super_block *sb, ...@@ -754,9 +754,8 @@ static struct dentry *ovl_lower_fh_to_d(struct super_block *sb,
goto out; goto out;
} }
/* Otherwise, get a connected non-upper dir or disconnected non-dir */ /* Find origin.dentry again with ovl_acceptable() layer check */
if (d_is_dir(origin.dentry) && if (d_is_dir(origin.dentry)) {
(origin.dentry->d_flags & DCACHE_DISCONNECTED)) {
dput(origin.dentry); dput(origin.dentry);
origin.dentry = NULL; origin.dentry = NULL;
err = ovl_check_origin_fh(ofs, fh, true, NULL, &stack); err = ovl_check_origin_fh(ofs, fh, true, NULL, &stack);
...@@ -769,6 +768,7 @@ static struct dentry *ovl_lower_fh_to_d(struct super_block *sb, ...@@ -769,6 +768,7 @@ static struct dentry *ovl_lower_fh_to_d(struct super_block *sb,
goto out_err; goto out_err;
} }
/* Get a connected non-upper dir or disconnected non-dir */
dentry = ovl_get_dentry(sb, NULL, &origin, index); dentry = ovl_get_dentry(sb, NULL, &origin, index);
out: out:
......
...@@ -286,22 +286,13 @@ int ovl_permission(struct inode *inode, int mask) ...@@ -286,22 +286,13 @@ int ovl_permission(struct inode *inode, int mask)
if (err) if (err)
return err; return err;
/* No need to do any access on underlying for special files */ old_cred = ovl_override_creds(inode->i_sb);
if (special_file(realinode->i_mode)) if (!upperinode &&
return 0; !special_file(realinode->i_mode) && mask & MAY_WRITE) {
/* No need to access underlying for execute */
mask &= ~MAY_EXEC;
if ((mask & (MAY_READ | MAY_WRITE)) == 0)
return 0;
/* Lower files get copied up, so turn write access into read */
if (!upperinode && mask & MAY_WRITE) {
mask &= ~(MAY_WRITE | MAY_APPEND); mask &= ~(MAY_WRITE | MAY_APPEND);
/* Make sure mounter can read file for copy up later */
mask |= MAY_READ; mask |= MAY_READ;
} }
old_cred = ovl_override_creds(inode->i_sb);
err = inode_permission(realinode, mask); err = inode_permission(realinode, mask);
revert_creds(old_cred); revert_creds(old_cred);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment