sysfs: Restrict mounting sysfs
authorEric W. Biederman <ebiederm@xmission.com>
Tue, 26 Mar 2013 03:07:01 +0000 (20:07 -0700)
committerMaciej Wereski <m.wereski@partner.samsung.com>
Mon, 23 Mar 2015 17:33:31 +0000 (18:33 +0100)
commitb18358cafdfa879b78de0b6b1bf8d43b1fb824d4
treeb21e1e19d8291db5ddbfe07dc8a7e1c5f10f29b5
parente79446e6076a174cc4f64fa450a0bc0a850fc249
sysfs: Restrict mounting sysfs

Don't allow mounting sysfs unless the caller has CAP_SYS_ADMIN rights
over the net namespace.  The principle here is if you create or have
capabilities over it you can mount it, otherwise you get to live with
what other people have mounted.

Instead of testing this with a straight forward ns_capable call,
perform this check the long and torturous way with kobject helpers,
this keeps direct knowledge of namespaces out of sysfs, and preserves
the existing sysfs abstractions.

Acked-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
fs/sysfs/mount.c
include/linux/kobject_ns.h
lib/kobject.c
net/core/net-sysfs.c