generic: posix acl extended attribute memory corruption test

XFS had a use-after-free bug when xfs_xattr_put_listent runs out of
listxattr buffer space while trying to store the name
"system.posix_acl_access" and then corrupts memory by not checking
the seen_enough state and then trying to shove
"trusted.SGI_ACL_FILE" into the buffer as well.

In order to tickle the bug in a user visible way we must have
already put a name in the buffer, so we take advantage of the fact
that "security.evm" sorts before "system.posix_acl_access" to make
sure this happens.

Signed-off-by: Darrick J. Wong <darrick.wong@oracle.com>
Reviewed-by: Eryu Guan <guaneryu@gmail.com>
Signed-off-by: Eryu Guan <guaneryu@gmail.com>
This commit is contained in:
Darrick J. Wong
2019-02-13 12:48:14 -08:00
committed by Eryu Guan
parent 26e4a81c78
commit e6897e32b8
6 changed files with 168 additions and 1 deletions
+1
View File
@@ -114,6 +114,7 @@
/src/stat_test
/src/swapon
/src/t_access_root
/src/t_attr_corruption
/src/t_dir_offset
/src/t_dir_offset2
/src/t_dir_type
+1 -1
View File
@@ -27,7 +27,7 @@ LINUX_TARGETS = xfsctl bstat t_mtab getdevicesize preallo_rw_pattern_reader \
renameat2 t_getcwd e4compact test-nextquota punch-alternating \
attr-list-by-handle-cursor-test listxattr dio-interleaved t_dir_type \
dio-invalidate-cache stat_test t_encrypted_d_revalidate \
attr_replace_test swapon mkswap
attr_replace_test swapon mkswap t_attr_corruption
SUBDIRS = log-writes perf
+122
View File
@@ -0,0 +1,122 @@
// SPDX-License-Identifier: GPL-2.0+
/*
* Copyright (C) 2019 Oracle. All Rights Reserved.
* Author: Darrick J. Wong <darrick.wong@oracle.com>
*
* Test program to tickle a use-after-free bug in xfs.
*
* XFS had a use-after-free bug when xfs_xattr_put_listent runs out of
* listxattr buffer space while trying to store the name
* "system.posix_acl_access" and then corrupts memory by not checking the
* seen_enough state and then trying to shove "trusted.SGI_ACL_FILE" into the
* buffer as well.
*
* In order to tickle the bug in a user visible way we must have already put a
* name in the buffer, so we take advantage of the fact that "security.evm"
* sorts before "system.posix_acl_access" to make sure this happens.
*
* If we trigger the bug, the program will print the garbled string
* "rusted.SGI_ACL_FILE". If the bug is fixed, the flistxattr call returns
* ERANGE.
*/
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <stdint.h>
#include <unistd.h>
#include <attr/xattr.h>
void die(const char *msg)
{
perror(msg);
exit(1);
}
struct entry {
uint16_t a;
uint16_t b;
uint32_t c;
};
struct myacl {
uint32_t d;
struct entry e[4];
};
int main(int argc, char *argv[])
{
struct myacl acl = {
.d = 2,
.e = {
{1, 0, 0},
{4, 0, 0},
{0x10, 0, 0},
{0x20, 0, 0},
},
};
char buf[64];
ssize_t sz;
int fd;
int ret;
if (argc > 1) {
ret = chdir(argv[1]);
if (ret)
die(argv[1]);
}
fd = creat("file0", 0644);
if (fd < 0)
die("create");
ret = fsetxattr(fd, "system.posix_acl_access", &acl, sizeof(acl), 0);
if (ret)
die("set posix acl");
ret = fsetxattr(fd, "security.evm", buf, 1, 1);
if (ret)
die("set evm");
sz = flistxattr(fd, buf, 30);
if (sz < 0)
die("list attr");
printf("%s\n", buf);
return 0;
#if 0
/* original syzkaller reproducer */
syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0);
memcpy((void*)0x20000180, "./file0", 8);
syscall(__NR_creat, 0x20000180, 0);
memcpy((void*)0x20000000, "./file0", 8);
memcpy((void*)0x20000040, "system.posix_acl_access", 24);
*(uint32_t*)0x20000680 = 2;
*(uint16_t*)0x20000684 = 1;
*(uint16_t*)0x20000686 = 0;
*(uint32_t*)0x20000688 = 0;
*(uint16_t*)0x2000068c = 4;
*(uint16_t*)0x2000068e = 0;
*(uint32_t*)0x20000690 = 0;
*(uint16_t*)0x20000694 = 0x10;
*(uint16_t*)0x20000696 = 0;
*(uint32_t*)0x20000698 = 0;
*(uint16_t*)0x2000069c = 0x20;
*(uint16_t*)0x2000069e = 0;
*(uint32_t*)0x200006a0 = 0;
syscall(__NR_setxattr, 0x20000000, 0x20000040, 0x20000680, 0x24, 0);
memcpy((void*)0x20000080, "./file0", 8);
memcpy((void*)0x200000c0, "security.evm", 13);
memcpy((void*)0x20000100, "\x03\x00\x00\x00\x57", 5);
syscall(__NR_lsetxattr, 0x20000080, 0x200000c0, 0x20000100, 1, 1);
memcpy((void*)0x20000300, "./file0", 8);
syscall(__NR_listxattr, 0x20000300, 0x200002c0, 0x1e);
return 0;
#endif
}
+41
View File
@@ -0,0 +1,41 @@
#! /bin/bash
# SPDX-License-Identifier: GPL-2.0+
# Copyright (c) 2019 Oracle, Inc. All Rights Reserved.
#
# FS QA Test No. 529
#
# Regression test for a bug where XFS corrupts memory if the listxattr buffer
# is a particularly well crafted size on a filesystem that supports posix acls.
#
seq=`basename $0`
seqres=$RESULT_DIR/$seq
echo "QA output created by $seq"
tmp=/tmp/$$
status=1 # failure is the default!
trap "_cleanup; exit \$status" 0 1 2 3 15
_cleanup()
{
cd /
rm -f $tmp.*
}
# get standard environment, filters and checks
. ./common/rc
. ./common/attr
# real QA test starts here
_supported_fs generic
_supported_os Linux
_require_acls
_require_scratch
_require_test_program "t_attr_corruption"
rm -f $seqres.full
_scratch_mkfs >> $seqres.full 2>&1
_scratch_mount
$here/src/t_attr_corruption $SCRATCH_MNT
status=0
exit
+2
View File
@@ -0,0 +1,2 @@
QA output created by 529
list attr: Numerical result out of range
+1
View File
@@ -531,3 +531,4 @@
526 auto quick log
527 auto quick log
528 auto quick
529 auto quick attr