diff options
author | Christian Brauner <brauner@kernel.org> | 2025-04-07 11:54:19 +0200 |
---|---|---|
committer | Christian Brauner <brauner@kernel.org> | 2025-04-07 16:19:04 +0200 |
commit | 1ed95281c0c77dbb1540f9855cd3c5f19900f7a5 (patch) | |
tree | d39e0d7ba60f81c957f41d187dc70e59f18a98a3 /tools/testing/selftests/filesystems/anon_inode_test.c | |
parent | c83b9024966090fe0df92aab16975b8d00089e1f (diff) |
anon_inode: raise SB_I_NODEV and SB_I_NOEXEC
It isn't possible to execute anonymous inodes because they cannot be
opened in any way after they have been created. This includes execution:
execveat(fd_anon_inode, "", NULL, NULL, AT_EMPTY_PATH)
Anonymous inodes have inode->f_op set to no_open_fops which sets
no_open() which returns ENXIO. That means any call to do_dentry_open()
which is the endpoint of the do_open_execat() will fail. There's no
chance to execute an anonymous inode. Unless a given subsystem overrides
it ofc.
However, we should still harden this and raise SB_I_NODEV and
SB_I_NOEXEC on the superblock itself so that no one gets any creative
ideas.
Link: https://lore.kernel.org/20250407-work-anon_inode-v1-5-53a44c20d44e@kernel.org
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Cc: stable@vger.kernel.org # all LTS kernels
Signed-off-by: Christian Brauner <brauner@kernel.org>
Diffstat (limited to 'tools/testing/selftests/filesystems/anon_inode_test.c')
0 files changed, 0 insertions, 0 deletions