sysfs: Restrict mounting sysfs
authorEric W. Biederman <ebiederm@xmission.com>
Tue, 26 Mar 2013 03:07:01 +0000 (20:07 -0700)
committerMaciej Wereski <m.wereski@partner.samsung.com>
Tue, 9 Jun 2015 09:31:03 +0000 (11:31 +0200)
commitb15f60b377cbe073847245ab8a6e5a3f1d75b1ce
treee622cea83dd9e30b5510852bda0b992462320a2b
parentf90e2927317f84b95ef2e548291efb526352d4b7
sysfs: Restrict mounting sysfs

Don't allow mounting sysfs unless the caller has CAP_SYS_ADMIN rights
over the net namespace.  The principle here is if you create or have
capabilities over it you can mount it, otherwise you get to live with
what other people have mounted.

Instead of testing this with a straight forward ns_capable call,
perform this check the long and torturous way with kobject helpers,
this keeps direct knowledge of namespaces out of sysfs, and preserves
the existing sysfs abstractions.

Acked-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
fs/sysfs/mount.c
include/linux/kobject_ns.h
lib/kobject.c
net/core/net-sysfs.c