Commit 5b8c291b authored by Linus Torvalds's avatar Linus Torvalds Committed by Sasha Levin

Make file credentials available to the seqfile interfaces

[ Upstream commit 34dbbcdb ]

A lot of seqfile users seem to be using things like %pK that uses the
credentials of the current process, but that is actually completely
wrong for filesystem interfaces.

The unix semantics for permission checking files is to check permissions
at _open_ time, not at read or write time, and that is not just a small
detail: passing off stdin/stdout/stderr to a suid application and making
the actual IO happen in privileged context is a classic exploit
technique.

So if we want to be able to look at permissions at read time, we need to
use the file open credentials, not the current ones.  Normal file
accesses can just use "f_cred" (or any of the helper functions that do
that, like file_ns_capable()), but the seqfile interfaces do not have
any such options.

It turns out that seq_file _does_ save away the user_ns information of
the file, though.  Since user_ns is just part of the full credential
information, replace that special case with saving off the cred pointer
instead, and suddenly seq_file has all the permission information it
needs.
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: default avatarSasha Levin <alexander.levin@verizon.com>
parent d6f7c62a
...@@ -62,9 +62,10 @@ int seq_open(struct file *file, const struct seq_operations *op) ...@@ -62,9 +62,10 @@ int seq_open(struct file *file, const struct seq_operations *op)
memset(p, 0, sizeof(*p)); memset(p, 0, sizeof(*p));
mutex_init(&p->lock); mutex_init(&p->lock);
p->op = op; p->op = op;
#ifdef CONFIG_USER_NS
p->user_ns = file->f_cred->user_ns; // No refcounting: the lifetime of 'p' is constrained
#endif // to the lifetime of the file.
p->file = file;
/* /*
* Wrappers around seq_open(e.g. swaps_open) need to be * Wrappers around seq_open(e.g. swaps_open) need to be
......
...@@ -7,13 +7,10 @@ ...@@ -7,13 +7,10 @@
#include <linux/mutex.h> #include <linux/mutex.h>
#include <linux/cpumask.h> #include <linux/cpumask.h>
#include <linux/nodemask.h> #include <linux/nodemask.h>
#include <linux/fs.h>
#include <linux/cred.h>
struct seq_operations; struct seq_operations;
struct file;
struct path;
struct inode;
struct dentry;
struct user_namespace;
struct seq_file { struct seq_file {
char *buf; char *buf;
...@@ -27,9 +24,7 @@ struct seq_file { ...@@ -27,9 +24,7 @@ struct seq_file {
struct mutex lock; struct mutex lock;
const struct seq_operations *op; const struct seq_operations *op;
int poll_event; int poll_event;
#ifdef CONFIG_USER_NS const struct file *file;
struct user_namespace *user_ns;
#endif
void *private; void *private;
}; };
...@@ -141,7 +136,7 @@ int seq_put_decimal_ll(struct seq_file *m, char delimiter, ...@@ -141,7 +136,7 @@ int seq_put_decimal_ll(struct seq_file *m, char delimiter,
static inline struct user_namespace *seq_user_ns(struct seq_file *seq) static inline struct user_namespace *seq_user_ns(struct seq_file *seq)
{ {
#ifdef CONFIG_USER_NS #ifdef CONFIG_USER_NS
return seq->user_ns; return seq->file->f_cred->user_ns;
#else #else
extern struct user_namespace init_user_ns; extern struct user_namespace init_user_ns;
return &init_user_ns; return &init_user_ns;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment