-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kernel: core_hook: automate and refactor umount #2531
base: main
Are you sure you want to change the base?
Conversation
yes it is incomplete, it doesnt have sys_mount kprobe hook for LKM, but I cant really test this. |
f9156b0
to
e38a41f
Compare
What is the root cause of #2386 (comment), and how does it fix the issue? |
That I don't really have an idea, I suspect it has something to do with mount order and then unmount order. maybe need to follow if its not that, then maybe it has something to do with the use of fsopen + move_mount. |
0825348
to
94b6be6
Compare
cherry pick from `Add fallback to mount syscall (tiann#1349)` upstream: tiann@abf0dac Signed-off-by: backslashxx <[email protected]>
[ 12.751262] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: bin [ 12.754232] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: etc [ 12.760778] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: etc [ 12.767372] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: app [ 12.770883] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: media [ 12.773800] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: overlay [ 12.779962] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: app [ 12.783207] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: priv-app [ 12.790585] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: bin [ 12.794018] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: etc [ 12.796985] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: firmware [ 12.799988] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: lib [ 12.803699] KernelSU: security_sb_mount: devicename pattern fstype: overlay path: lib64 [ 25.033029] KernelSU: umount lib64 failed: -22 [ 25.033032] KernelSU: umount lib failed: -22 [ 25.033033] KernelSU: umount firmware failed: -22 [ 25.033034] KernelSU: umount etc failed: -22 [ 25.033035] KernelSU: umount bin failed: -22 [ 25.033036] KernelSU: umount priv-app failed: -22 [ 25.033037] KernelSU: umount app failed: -22 [ 25.033038] KernelSU: umount overlay failed: -22 [ 25.033039] KernelSU: umount media failed: -22 [ 25.033040] KernelSU: umount app failed: -22 [ 25.033041] KernelSU: umount etc failed: -22 [ 25.033043] KernelSU: umount etc failed: -22 [ 25.033043] KernelSU: umount bin failed: -22 Revert "Update core_hook.c" This reverts commit d93f20526cef320996c86e038ea308d74d1e563e. Update core_hook.c
DNM: debugging core_hook: ksu_umount_mnt: tweak Update core_hook.c Update core_hook.c Update core_hook.c
we just de-struct the damn thing anyway. and with this we can also probably reuse the function for hooking sys_mount or security_move_mount eventually
automate this if tiann#2510 ever happens check dirname
ad02d1b
to
dbe3881
Compare
fefc2e6
to
094a7ff
Compare
b992e8e
to
594d366
Compare
/** * d_path - return the path of a dentry * @path: path to report * @buf: buffer to return value in * @buflen: buffer length * * Convert a dentry into an ASCII path name. If the entry has been deleted * the string " (deleted)" is appended. Note that this is ambiguous. * * Returns a pointer into the buffer or an error code if the path was * too long. Note: Callers should use the returned pointer, not the passed * in buffer, to use the name! The implementation often starts at an offset * into the buffer, and may leave 0 bytes at the start. * * "buflen" should be positive. */
1705016
to
3d4254f
Compare
809c623
to
fba601e
Compare
I'm not really sure on the kprobe hook |
I cant test this, but this is how it goes right?
this assumes that workdir starts with /dev/workdir
This reverts commit 70e230f.
monitors and lists all incoming mounts by hooking security_sb_mount or alternatively, sys_mount / do_mount.
this requires ksud to go back and use sys_mount instead of fsopen + move_mount
this also fixes that MNT_DETACH issue. (#2386 (comment))
Modules also can create an overlay with KSU devname and it will be added to the list.
This will also restore pre 5.2 manager support.
Those might be a bit questionable, so it is a take it or reject it kind of situation.
sys_mount hook looks like
ref: backslashxx/mojito_krenol@ac020b0
sys_mount / do_mount compatibility is for LKM and 6.8+ where you cant just do LSM hooks as is.
torvalds/linux@9285c5a#diff-3b35df76d1c4627ed97cc307a957850d57b85e77917c19ac0813286c46b4ace2R556
Context: aviraxp@c7facef#commitcomment-153941502