Skip to content

Commit 228a115

Browse files
committed
Merge tag '6.13-rc-part1-SMB3-client-fixes' of git://git.samba.org/sfrench/cifs-2.6
Pull smb client updates from Steve French: - Fix two SMB3.1.1 POSIX Extensions problems - Fixes for special file handling (symlinks and FIFOs) - Improve compounding - Four cleanup patches - Fix use after free in signing - Add support for handling namespaces for reconnect related upcalls (e.g. for DNS names resolution and auth) - Fix various directory lease problems (directory entry caching), including some important potential use after frees * tag '6.13-rc-part1-SMB3-client-fixes' of git://git.samba.org/sfrench/cifs-2.6: smb: prevent use-after-free due to open_cached_dir error paths smb: Don't leak cfid when reconnect races with open_cached_dir smb: client: handle max length for SMB symlinks smb: client: get rid of bounds check in SMB2_ioctl_init() smb: client: improve compound padding in encryption smb3: request handle caching when caching directories cifs: Recognize SFU char/block devices created by Windows NFS server on Windows Server <<2012 CIFS: New mount option for cifs.upcall namespace resolution smb/client: Prevent error pointer dereference fs/smb/client: implement chmod() for SMB3 POSIX Extensions smb: cached directories can be more than root file handle smb: client: fix use-after-free of signing key smb: client: Use str_yes_no() helper function smb: client: memcpy() with surrounding object base address cifs: Remove pre-historic unused CIFSSMBCopy
2 parents e767523 + a9685b4 commit 228a115

19 files changed

+293
-246
lines changed

fs/smb/client/cached_dir.c

+44-55
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,16 @@ static struct cached_fid *find_or_create_cached_dir(struct cached_fids *cfids,
5959
list_add(&cfid->entry, &cfids->entries);
6060
cfid->on_list = true;
6161
kref_get(&cfid->refcount);
62+
/*
63+
* Set @cfid->has_lease to true during construction so that the lease
64+
* reference can be put in cached_dir_lease_break() due to a potential
65+
* lease break right after the request is sent or while @cfid is still
66+
* being cached, or if a reconnection is triggered during construction.
67+
* Concurrent processes won't be to use it yet due to @cfid->time being
68+
* zero.
69+
*/
70+
cfid->has_lease = true;
71+
6272
spin_unlock(&cfids->cfid_list_lock);
6373
return cfid;
6474
}
@@ -176,12 +186,12 @@ int open_cached_dir(unsigned int xid, struct cifs_tcon *tcon,
176186
return -ENOENT;
177187
}
178188
/*
179-
* Return cached fid if it has a lease. Otherwise, it is either a new
180-
* entry or laundromat worker removed it from @cfids->entries. Caller
181-
* will put last reference if the latter.
189+
* Return cached fid if it is valid (has a lease and has a time).
190+
* Otherwise, it is either a new entry or laundromat worker removed it
191+
* from @cfids->entries. Caller will put last reference if the latter.
182192
*/
183193
spin_lock(&cfids->cfid_list_lock);
184-
if (cfid->has_lease) {
194+
if (cfid->has_lease && cfid->time) {
185195
spin_unlock(&cfids->cfid_list_lock);
186196
*ret_cfid = cfid;
187197
kfree(utf16_path);
@@ -267,15 +277,6 @@ int open_cached_dir(unsigned int xid, struct cifs_tcon *tcon,
267277

268278
smb2_set_related(&rqst[1]);
269279

270-
/*
271-
* Set @cfid->has_lease to true before sending out compounded request so
272-
* its lease reference can be put in cached_dir_lease_break() due to a
273-
* potential lease break right after the request is sent or while @cfid
274-
* is still being cached. Concurrent processes won't be to use it yet
275-
* due to @cfid->time being zero.
276-
*/
277-
cfid->has_lease = true;
278-
279280
if (retries) {
280281
smb2_set_replay(server, &rqst[0]);
281282
smb2_set_replay(server, &rqst[1]);
@@ -347,6 +348,7 @@ int open_cached_dir(unsigned int xid, struct cifs_tcon *tcon,
347348
SMB2_query_info_free(&rqst[1]);
348349
free_rsp_buf(resp_buftype[0], rsp_iov[0].iov_base);
349350
free_rsp_buf(resp_buftype[1], rsp_iov[1].iov_base);
351+
out:
350352
if (rc) {
351353
spin_lock(&cfids->cfid_list_lock);
352354
if (cfid->on_list) {
@@ -358,23 +360,14 @@ int open_cached_dir(unsigned int xid, struct cifs_tcon *tcon,
358360
/*
359361
* We are guaranteed to have two references at this
360362
* point. One for the caller and one for a potential
361-
* lease. Release the Lease-ref so that the directory
362-
* will be closed when the caller closes the cached
363-
* handle.
363+
* lease. Release one here, and the second below.
364364
*/
365365
cfid->has_lease = false;
366-
spin_unlock(&cfids->cfid_list_lock);
367366
kref_put(&cfid->refcount, smb2_close_cached_fid);
368-
goto out;
369367
}
370368
spin_unlock(&cfids->cfid_list_lock);
371-
}
372-
out:
373-
if (rc) {
374-
if (cfid->is_open)
375-
SMB2_close(0, cfid->tcon, cfid->fid.persistent_fid,
376-
cfid->fid.volatile_fid);
377-
free_cached_dir(cfid);
369+
370+
kref_put(&cfid->refcount, smb2_close_cached_fid);
378371
} else {
379372
*ret_cfid = cfid;
380373
atomic_inc(&tcon->num_remote_opens);
@@ -401,7 +394,7 @@ int open_cached_dir_by_dentry(struct cifs_tcon *tcon,
401394
spin_lock(&cfids->cfid_list_lock);
402395
list_for_each_entry(cfid, &cfids->entries, entry) {
403396
if (dentry && cfid->dentry == dentry) {
404-
cifs_dbg(FYI, "found a cached root file handle by dentry\n");
397+
cifs_dbg(FYI, "found a cached file handle by dentry\n");
405398
kref_get(&cfid->refcount);
406399
*ret_cfid = cfid;
407400
spin_unlock(&cfids->cfid_list_lock);
@@ -512,25 +505,24 @@ void invalidate_all_cached_dirs(struct cifs_tcon *tcon)
512505
cfids->num_entries--;
513506
cfid->is_open = false;
514507
cfid->on_list = false;
515-
/* To prevent race with smb2_cached_lease_break() */
516-
kref_get(&cfid->refcount);
508+
if (cfid->has_lease) {
509+
/*
510+
* The lease was never cancelled from the server,
511+
* so steal that reference.
512+
*/
513+
cfid->has_lease = false;
514+
} else
515+
kref_get(&cfid->refcount);
517516
}
518517
spin_unlock(&cfids->cfid_list_lock);
519518

520519
list_for_each_entry_safe(cfid, q, &entry, entry) {
521520
list_del(&cfid->entry);
522521
cancel_work_sync(&cfid->lease_break);
523-
if (cfid->has_lease) {
524-
/*
525-
* We lease was never cancelled from the server so we
526-
* need to drop the reference.
527-
*/
528-
spin_lock(&cfids->cfid_list_lock);
529-
cfid->has_lease = false;
530-
spin_unlock(&cfids->cfid_list_lock);
531-
kref_put(&cfid->refcount, smb2_close_cached_fid);
532-
}
533-
/* Drop the extra reference opened above*/
522+
/*
523+
* Drop the ref-count from above, either the lease-ref (if there
524+
* was one) or the extra one acquired.
525+
*/
534526
kref_put(&cfid->refcount, smb2_close_cached_fid);
535527
}
536528
}
@@ -541,9 +533,6 @@ smb2_cached_lease_break(struct work_struct *work)
541533
struct cached_fid *cfid = container_of(work,
542534
struct cached_fid, lease_break);
543535

544-
spin_lock(&cfid->cfids->cfid_list_lock);
545-
cfid->has_lease = false;
546-
spin_unlock(&cfid->cfids->cfid_list_lock);
547536
kref_put(&cfid->refcount, smb2_close_cached_fid);
548537
}
549538

@@ -561,6 +550,7 @@ int cached_dir_lease_break(struct cifs_tcon *tcon, __u8 lease_key[16])
561550
!memcmp(lease_key,
562551
cfid->fid.lease_key,
563552
SMB2_LEASE_KEY_SIZE)) {
553+
cfid->has_lease = false;
564554
cfid->time = 0;
565555
/*
566556
* We found a lease remove it from the list
@@ -638,8 +628,14 @@ static void cfids_laundromat_worker(struct work_struct *work)
638628
cfid->on_list = false;
639629
list_move(&cfid->entry, &entry);
640630
cfids->num_entries--;
641-
/* To prevent race with smb2_cached_lease_break() */
642-
kref_get(&cfid->refcount);
631+
if (cfid->has_lease) {
632+
/*
633+
* Our lease has not yet been cancelled from the
634+
* server. Steal that reference.
635+
*/
636+
cfid->has_lease = false;
637+
} else
638+
kref_get(&cfid->refcount);
643639
}
644640
}
645641
spin_unlock(&cfids->cfid_list_lock);
@@ -651,17 +647,10 @@ static void cfids_laundromat_worker(struct work_struct *work)
651647
* with it.
652648
*/
653649
cancel_work_sync(&cfid->lease_break);
654-
if (cfid->has_lease) {
655-
/*
656-
* Our lease has not yet been cancelled from the server
657-
* so we need to drop the reference.
658-
*/
659-
spin_lock(&cfids->cfid_list_lock);
660-
cfid->has_lease = false;
661-
spin_unlock(&cfids->cfid_list_lock);
662-
kref_put(&cfid->refcount, smb2_close_cached_fid);
663-
}
664-
/* Drop the extra reference opened above */
650+
/*
651+
* Drop the ref-count from above, either the lease-ref (if there
652+
* was one) or the extra one acquired.
653+
*/
665654
kref_put(&cfid->refcount, smb2_close_cached_fid);
666655
}
667656
queue_delayed_work(cifsiod_wq, &cfids->laundromat_work,

fs/smb/client/cifs_spnego.c

+16
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,9 @@ struct key_type cifs_spnego_key_type = {
8282
/* strlen of ";pid=0x" */
8383
#define PID_KEY_LEN 7
8484

85+
/* strlen of ";upcall_target=" */
86+
#define UPCALL_TARGET_KEY_LEN 15
87+
8588
/* get a key struct with a SPNEGO security blob, suitable for session setup */
8689
struct key *
8790
cifs_get_spnego_key(struct cifs_ses *sesInfo,
@@ -108,6 +111,11 @@ cifs_get_spnego_key(struct cifs_ses *sesInfo,
108111
if (sesInfo->user_name)
109112
desc_len += USER_KEY_LEN + strlen(sesInfo->user_name);
110113

114+
if (sesInfo->upcall_target == UPTARGET_MOUNT)
115+
desc_len += UPCALL_TARGET_KEY_LEN + 5; // strlen("mount")
116+
else
117+
desc_len += UPCALL_TARGET_KEY_LEN + 3; // strlen("app")
118+
111119
spnego_key = ERR_PTR(-ENOMEM);
112120
description = kzalloc(desc_len, GFP_KERNEL);
113121
if (description == NULL)
@@ -156,6 +164,14 @@ cifs_get_spnego_key(struct cifs_ses *sesInfo,
156164
dp = description + strlen(description);
157165
sprintf(dp, ";pid=0x%x", current->pid);
158166

167+
if (sesInfo->upcall_target == UPTARGET_MOUNT) {
168+
dp = description + strlen(description);
169+
sprintf(dp, ";upcall_target=mount");
170+
} else {
171+
dp = description + strlen(description);
172+
sprintf(dp, ";upcall_target=app");
173+
}
174+
159175
cifs_dbg(FYI, "key description = %s\n", description);
160176
saved_cred = override_creds(spnego_cred);
161177
spnego_key = request_key(&cifs_spnego_key_type, description, "");

fs/smb/client/cifsacl.c

+33-21
Original file line numberDiff line numberDiff line change
@@ -885,12 +885,17 @@ unsigned int setup_authusers_ACE(struct smb_ace *pntace)
885885
* Fill in the special SID based on the mode. See
886886
* https://technet.microsoft.com/en-us/library/hh509017(v=ws.10).aspx
887887
*/
888-
unsigned int setup_special_mode_ACE(struct smb_ace *pntace, __u64 nmode)
888+
unsigned int setup_special_mode_ACE(struct smb_ace *pntace,
889+
bool posix,
890+
__u64 nmode)
889891
{
890892
int i;
891893
unsigned int ace_size = 28;
892894

893-
pntace->type = ACCESS_DENIED_ACE_TYPE;
895+
if (posix)
896+
pntace->type = ACCESS_ALLOWED_ACE_TYPE;
897+
else
898+
pntace->type = ACCESS_DENIED_ACE_TYPE;
894899
pntace->flags = 0x0;
895900
pntace->access_req = 0;
896901
pntace->sid.num_subauth = 3;
@@ -933,7 +938,8 @@ static void populate_new_aces(char *nacl_base,
933938
struct smb_sid *pownersid,
934939
struct smb_sid *pgrpsid,
935940
__u64 *pnmode, u32 *pnum_aces, u16 *pnsize,
936-
bool modefromsid)
941+
bool modefromsid,
942+
bool posix)
937943
{
938944
__u64 nmode;
939945
u32 num_aces = 0;
@@ -950,13 +956,15 @@ static void populate_new_aces(char *nacl_base,
950956
num_aces = *pnum_aces;
951957
nsize = *pnsize;
952958

953-
if (modefromsid) {
954-
pnntace = (struct smb_ace *) (nacl_base + nsize);
955-
nsize += setup_special_mode_ACE(pnntace, nmode);
956-
num_aces++;
959+
if (modefromsid || posix) {
957960
pnntace = (struct smb_ace *) (nacl_base + nsize);
958-
nsize += setup_authusers_ACE(pnntace);
961+
nsize += setup_special_mode_ACE(pnntace, posix, nmode);
959962
num_aces++;
963+
if (modefromsid) {
964+
pnntace = (struct smb_ace *) (nacl_base + nsize);
965+
nsize += setup_authusers_ACE(pnntace);
966+
num_aces++;
967+
}
960968
goto set_size;
961969
}
962970

@@ -1076,7 +1084,7 @@ static __u16 replace_sids_and_copy_aces(struct smb_acl *pdacl, struct smb_acl *p
10761084

10771085
static int set_chmod_dacl(struct smb_acl *pdacl, struct smb_acl *pndacl,
10781086
struct smb_sid *pownersid, struct smb_sid *pgrpsid,
1079-
__u64 *pnmode, bool mode_from_sid)
1087+
__u64 *pnmode, bool mode_from_sid, bool posix)
10801088
{
10811089
int i;
10821090
u16 size = 0;
@@ -1094,11 +1102,11 @@ static int set_chmod_dacl(struct smb_acl *pdacl, struct smb_acl *pndacl,
10941102
nsize = sizeof(struct smb_acl);
10951103

10961104
/* If pdacl is NULL, we don't have a src. Simply populate new ACL. */
1097-
if (!pdacl) {
1105+
if (!pdacl || posix) {
10981106
populate_new_aces(nacl_base,
10991107
pownersid, pgrpsid,
11001108
pnmode, &num_aces, &nsize,
1101-
mode_from_sid);
1109+
mode_from_sid, posix);
11021110
goto finalize_dacl;
11031111
}
11041112

@@ -1115,7 +1123,7 @@ static int set_chmod_dacl(struct smb_acl *pdacl, struct smb_acl *pndacl,
11151123
populate_new_aces(nacl_base,
11161124
pownersid, pgrpsid,
11171125
pnmode, &num_aces, &nsize,
1118-
mode_from_sid);
1126+
mode_from_sid, posix);
11191127

11201128
new_aces_set = true;
11211129
}
@@ -1144,7 +1152,7 @@ static int set_chmod_dacl(struct smb_acl *pdacl, struct smb_acl *pndacl,
11441152
populate_new_aces(nacl_base,
11451153
pownersid, pgrpsid,
11461154
pnmode, &num_aces, &nsize,
1147-
mode_from_sid);
1155+
mode_from_sid, posix);
11481156

11491157
new_aces_set = true;
11501158
}
@@ -1251,7 +1259,7 @@ static int parse_sec_desc(struct cifs_sb_info *cifs_sb,
12511259
/* Convert permission bits from mode to equivalent CIFS ACL */
12521260
static int build_sec_desc(struct smb_ntsd *pntsd, struct smb_ntsd *pnntsd,
12531261
__u32 secdesclen, __u32 *pnsecdesclen, __u64 *pnmode, kuid_t uid, kgid_t gid,
1254-
bool mode_from_sid, bool id_from_sid, int *aclflag)
1262+
bool mode_from_sid, bool id_from_sid, bool posix, int *aclflag)
12551263
{
12561264
int rc = 0;
12571265
__u32 dacloffset;
@@ -1288,7 +1296,7 @@ static int build_sec_desc(struct smb_ntsd *pntsd, struct smb_ntsd *pnntsd,
12881296
ndacl_ptr->num_aces = cpu_to_le32(0);
12891297

12901298
rc = set_chmod_dacl(dacl_ptr, ndacl_ptr, owner_sid_ptr, group_sid_ptr,
1291-
pnmode, mode_from_sid);
1299+
pnmode, mode_from_sid, posix);
12921300

12931301
sidsoffset = ndacloffset + le16_to_cpu(ndacl_ptr->size);
12941302
/* copy the non-dacl portion of secdesc */
@@ -1584,13 +1592,16 @@ id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
15841592
struct smb_ntsd *pntsd = NULL; /* acl obtained from server */
15851593
struct smb_ntsd *pnntsd = NULL; /* modified acl to be sent to server */
15861594
struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1587-
struct tcon_link *tlink = cifs_sb_tlink(cifs_sb);
1595+
struct tcon_link *tlink;
15881596
struct smb_version_operations *ops;
15891597
bool mode_from_sid, id_from_sid;
15901598
const u32 info = 0;
1599+
bool posix;
15911600

1601+
tlink = cifs_sb_tlink(cifs_sb);
15921602
if (IS_ERR(tlink))
15931603
return PTR_ERR(tlink);
1604+
posix = tlink_tcon(tlink)->posix_extensions;
15941605

15951606
ops = tlink_tcon(tlink)->ses->server->ops;
15961607

@@ -1622,12 +1633,13 @@ id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
16221633
id_from_sid = false;
16231634

16241635
/* Potentially, five new ACEs can be added to the ACL for U,G,O mapping */
1625-
nsecdesclen = secdesclen;
16261636
if (pnmode && *pnmode != NO_CHANGE_64) { /* chmod */
1627-
if (mode_from_sid)
1628-
nsecdesclen += 2 * sizeof(struct smb_ace);
1637+
if (posix)
1638+
nsecdesclen = 1 * sizeof(struct smb_ace);
1639+
else if (mode_from_sid)
1640+
nsecdesclen = secdesclen + (2 * sizeof(struct smb_ace));
16291641
else /* cifsacl */
1630-
nsecdesclen += 5 * sizeof(struct smb_ace);
1642+
nsecdesclen = secdesclen + (5 * sizeof(struct smb_ace));
16311643
} else { /* chown */
16321644
/* When ownership changes, changes new owner sid length could be different */
16331645
nsecdesclen = sizeof(struct smb_ntsd) + (sizeof(struct smb_sid) * 2);
@@ -1657,7 +1669,7 @@ id_mode_to_cifs_acl(struct inode *inode, const char *path, __u64 *pnmode,
16571669
}
16581670

16591671
rc = build_sec_desc(pntsd, pnntsd, secdesclen, &nsecdesclen, pnmode, uid, gid,
1660-
mode_from_sid, id_from_sid, &aclflag);
1672+
mode_from_sid, id_from_sid, posix, &aclflag);
16611673

16621674
cifs_dbg(NOISY, "build_sec_desc rc: %d\n", rc);
16631675

0 commit comments

Comments
 (0)