|
|
6cf099 |
From 8ca168c6f459d77cdf8f46d27a392d0847343703 Mon Sep 17 00:00:00 2001
|
|
|
6cf099 |
From: Lukas Slebodnik <lslebodn@redhat.com>
|
|
|
6cf099 |
Date: Thu, 16 Jul 2015 17:00:12 +0200
|
|
|
6cf099 |
Subject: [PATCH 39/47] mmap_cache: "Override" functions for initgr mmap cache
|
|
|
6cf099 |
MIME-Version: 1.0
|
|
|
6cf099 |
Content-Type: text/plain; charset=UTF-8
|
|
|
6cf099 |
Content-Transfer-Encoding: 8bit
|
|
|
6cf099 |
|
|
|
6cf099 |
Functions sss_mc_get_strs_offset and sss_mc_get_strs_len provides
|
|
|
6cf099 |
data about strings for individual memory caches (passwd, ...)
|
|
|
6cf099 |
Their are used in generic responder mmap cache code to find a record
|
|
|
6cf099 |
in mmap cache (sss_mc_find_record). Data provided from functions sss_mc_get_*
|
|
|
6cf099 |
are used for checking the validity of record. So in case of corrupted record
|
|
|
6cf099 |
the whole mmap cache can be invalidated.
|
|
|
6cf099 |
|
|
|
6cf099 |
Functions sss_mc_get_strs_offset and sss_mc_get_strs_len did not provide
|
|
|
6cf099 |
data for initgroups mmap cache and therefore particular record could not be
|
|
|
6cf099 |
invalidated.
|
|
|
6cf099 |
|
|
|
6cf099 |
Resolves:
|
|
|
6cf099 |
https://fedorahosted.org/sssd/ticket/2716
|
|
|
6cf099 |
|
|
|
6cf099 |
Reviewed-by: Michal Židek <mzidek@redhat.com>
|
|
|
6cf099 |
(cherry picked from commit 225dc6914cdc8920b02a129b98ece1ed97b99c03)
|
|
|
6cf099 |
---
|
|
|
6cf099 |
src/responder/nss/nsssrv_mmap_cache.c | 15 ++++++++++++---
|
|
|
6cf099 |
src/sss_client/nss_mc_initgr.c | 16 +++++++++++-----
|
|
|
6cf099 |
src/util/mmap_cache.h | 6 +++++-
|
|
|
6cf099 |
3 files changed, 28 insertions(+), 9 deletions(-)
|
|
|
6cf099 |
|
|
|
6cf099 |
diff --git a/src/responder/nss/nsssrv_mmap_cache.c b/src/responder/nss/nsssrv_mmap_cache.c
|
|
|
6cf099 |
index 16bc926f3ba4f5ab096bd0fb43895edef2b57c50..ab9e769b1f4d5d17a8c41429afce292298239bc5 100644
|
|
|
6cf099 |
--- a/src/responder/nss/nsssrv_mmap_cache.c
|
|
|
6cf099 |
+++ b/src/responder/nss/nsssrv_mmap_cache.c
|
|
|
6cf099 |
@@ -475,6 +475,9 @@ static errno_t sss_mc_get_strs_offset(struct sss_mc_ctx *mcc,
|
|
|
6cf099 |
case SSS_MC_GROUP:
|
|
|
6cf099 |
*_offset = offsetof(struct sss_mc_grp_data, strs);
|
|
|
6cf099 |
return EOK;
|
|
|
6cf099 |
+ case SSS_MC_INITGROUPS:
|
|
|
6cf099 |
+ *_offset = offsetof(struct sss_mc_initgr_data, gids);
|
|
|
6cf099 |
+ return EOK;
|
|
|
6cf099 |
default:
|
|
|
6cf099 |
DEBUG(SSSDBG_FATAL_FAILURE, "Unknown memory cache type.\n");
|
|
|
6cf099 |
return EINVAL;
|
|
|
6cf099 |
@@ -492,6 +495,9 @@ static errno_t sss_mc_get_strs_len(struct sss_mc_ctx *mcc,
|
|
|
6cf099 |
case SSS_MC_GROUP:
|
|
|
6cf099 |
*_len = ((struct sss_mc_grp_data *)&rec->data)->strs_len;
|
|
|
6cf099 |
return EOK;
|
|
|
6cf099 |
+ case SSS_MC_INITGROUPS:
|
|
|
6cf099 |
+ *_len = ((struct sss_mc_initgr_data *)&rec->data)->data_len;
|
|
|
6cf099 |
+ return EOK;
|
|
|
6cf099 |
default:
|
|
|
6cf099 |
DEBUG(SSSDBG_FATAL_FAILURE, "Unknown memory cache type.\n");
|
|
|
6cf099 |
return EINVAL;
|
|
|
6cf099 |
@@ -974,8 +980,8 @@ errno_t sss_mmap_cache_initgr_store(struct sss_mc_ctx **_mcc,
|
|
|
6cf099 |
return EINVAL;
|
|
|
6cf099 |
}
|
|
|
6cf099 |
|
|
|
6cf099 |
- /* num_groups + reserved + array of gids + name*/
|
|
|
6cf099 |
- data_len = (2 + num_groups) * sizeof(uint32_t) + name->len;
|
|
|
6cf099 |
+ /* array of gids + name */
|
|
|
6cf099 |
+ data_len = num_groups * sizeof(uint32_t) + name->len;
|
|
|
6cf099 |
rec_len = sizeof(struct sss_mc_rec) + sizeof(struct sss_mc_initgr_data)
|
|
|
6cf099 |
+ data_len;
|
|
|
6cf099 |
if (rec_len > mcc->dt_size) {
|
|
|
6cf099 |
@@ -998,10 +1004,13 @@ errno_t sss_mmap_cache_initgr_store(struct sss_mc_ctx **_mcc,
|
|
|
6cf099 |
name->str, name->len, name->str, name->len);
|
|
|
6cf099 |
|
|
|
6cf099 |
/* initgroups struct */
|
|
|
6cf099 |
+ data->strs_len = name->len;
|
|
|
6cf099 |
+ data->data_len = data_len;
|
|
|
6cf099 |
+ data->reserved = MC_INVALID_VAL32;
|
|
|
6cf099 |
data->num_groups = num_groups;
|
|
|
6cf099 |
memcpy(data->gids, gids_buf, num_groups * sizeof(uint32_t));
|
|
|
6cf099 |
memcpy(&data->gids[num_groups], name->str, name->len);
|
|
|
6cf099 |
- data->name = MC_PTR_DIFF(&data->gids[num_groups], data);
|
|
|
6cf099 |
+ data->strs = data->name = MC_PTR_DIFF(&data->gids[num_groups], data);
|
|
|
6cf099 |
|
|
|
6cf099 |
MC_LOWER_BARRIER(rec);
|
|
|
6cf099 |
|
|
|
6cf099 |
diff --git a/src/sss_client/nss_mc_initgr.c b/src/sss_client/nss_mc_initgr.c
|
|
|
6cf099 |
index e21b9f40aba00f9cc2385a561fc2bcc163c5791a..153617ea9c6489b7439b9676904b42b042f6697c 100644
|
|
|
6cf099 |
--- a/src/sss_client/nss_mc_initgr.c
|
|
|
6cf099 |
+++ b/src/sss_client/nss_mc_initgr.c
|
|
|
6cf099 |
@@ -93,6 +93,7 @@ errno_t sss_nss_mc_initgroups_dyn(const char *name, size_t name_len,
|
|
|
6cf099 |
uint32_t hash;
|
|
|
6cf099 |
uint32_t slot;
|
|
|
6cf099 |
int ret;
|
|
|
6cf099 |
+ const size_t data_offset = offsetof(struct sss_mc_initgr_data, gids);
|
|
|
6cf099 |
uint8_t *max_addr;
|
|
|
6cf099 |
|
|
|
6cf099 |
ret = sss_nss_mc_get_ctx("initgroups", &initgr_mc_ctx);
|
|
|
6cf099 |
@@ -128,16 +129,21 @@ errno_t sss_nss_mc_initgroups_dyn(const char *name, size_t name_len,
|
|
|
6cf099 |
}
|
|
|
6cf099 |
|
|
|
6cf099 |
data = (struct sss_mc_initgr_data *)rec->data;
|
|
|
6cf099 |
+ rec_name = (char *)data + data->name;
|
|
|
6cf099 |
/* Integrity check
|
|
|
6cf099 |
- * - array with gids must be within data_table
|
|
|
6cf099 |
- * - string must be within data_table */
|
|
|
6cf099 |
- if ((uint8_t *)data->gids > max_addr
|
|
|
6cf099 |
- || (uint8_t *)data + data->name + name_len > max_addr) {
|
|
|
6cf099 |
+ * - name_len cannot be longer than all strings or data
|
|
|
6cf099 |
+ * - data->name cannot point outside strings
|
|
|
6cf099 |
+ * - all data must be within data_table
|
|
|
6cf099 |
+ * - name must be within data_table */
|
|
|
6cf099 |
+ if (name_len > data->data_len
|
|
|
6cf099 |
+ || name_len > data->strs_len
|
|
|
6cf099 |
+ || (data->strs + name_len) > (data_offset + data->data_len)
|
|
|
6cf099 |
+ || (uint8_t *)data->gids + data->data_len > max_addr
|
|
|
6cf099 |
+ || (uint8_t *)rec_name + name_len > max_addr) {
|
|
|
6cf099 |
ret = ENOENT;
|
|
|
6cf099 |
goto done;
|
|
|
6cf099 |
}
|
|
|
6cf099 |
|
|
|
6cf099 |
- rec_name = (char *)data + data->name;
|
|
|
6cf099 |
if (strcmp(name, rec_name) == 0) {
|
|
|
6cf099 |
break;
|
|
|
6cf099 |
}
|
|
|
6cf099 |
diff --git a/src/util/mmap_cache.h b/src/util/mmap_cache.h
|
|
|
6cf099 |
index a8703d5da4022e11c4bc2f3e2f8710e7f9d982bf..b5917b3c0973276e43e9fe160cec7528b1224f8f 100644
|
|
|
6cf099 |
--- a/src/util/mmap_cache.h
|
|
|
6cf099 |
+++ b/src/util/mmap_cache.h
|
|
|
6cf099 |
@@ -79,7 +79,7 @@ typedef uint32_t rel_ptr_t;
|
|
|
6cf099 |
|
|
|
6cf099 |
|
|
|
6cf099 |
#define SSS_MC_MAJOR_VNO 1
|
|
|
6cf099 |
-#define SSS_MC_MINOR_VNO 0
|
|
|
6cf099 |
+#define SSS_MC_MINOR_VNO 1
|
|
|
6cf099 |
|
|
|
6cf099 |
#define SSS_MC_HEADER_UNINIT 0 /* after ftruncate or before reset */
|
|
|
6cf099 |
#define SSS_MC_HEADER_ALIVE 1 /* current and in use */
|
|
|
6cf099 |
@@ -139,6 +139,10 @@ struct sss_mc_grp_data {
|
|
|
6cf099 |
|
|
|
6cf099 |
struct sss_mc_initgr_data {
|
|
|
6cf099 |
rel_ptr_t name; /* ptr to name string, rel. to struct base addr */
|
|
|
6cf099 |
+ rel_ptr_t strs; /* ptr to concatenation of all strings */
|
|
|
6cf099 |
+ uint32_t reserved;
|
|
|
6cf099 |
+ uint32_t strs_len; /* length of strs */
|
|
|
6cf099 |
+ uint32_t data_len; /* all initgroups data len */
|
|
|
6cf099 |
uint32_t num_groups; /* number of groups */
|
|
|
6cf099 |
uint32_t gids[0]; /* array of all groups
|
|
|
6cf099 |
* string with name is stored after gids */
|
|
|
6cf099 |
--
|
|
|
6cf099 |
2.4.3
|
|
|
6cf099 |
|