On 11/10/13 15:42, George Spelvin wrote: > ebied...@xmission.com (Eric W. Biederman) wrote: >> Sigh. This is all wrong. The only correct thing to test is >> file->f_cred. Aka the capabilities of the program that opened the >> file. >> >> Which means that the interface to %pK in the case of kptr_restrict is >> broken as it has no way to be passed the information it needs to make >> a sensible decision. > > I looked at the code, and pretty painful. Certainly it's possible to > include a reference to the file (I was thinking of just the credentials, > actually) in the seq_file. But getting that to the vsprintf.c code > (specifically, the pointer() function) is a PITA. > > I'm willing to accept the currently proposed kludge as a "good enough" > approximation, as long as we're all agreed that using the credentials > at open() time would be The Right Thing, and hopefully someone will find > the round tuitts to implement that in future. > > But in the meantime, "the perfect is the enemey of the good" is worth > remembering. > > (An alternate implementation I've been thinking about would be to do > away with %pK, and instead have a "secret_ptr(p, seq->cred)" helper that > returned p or 0 depending on the credential.)
Yeah, that is probably the best solution. I'll try to put together a patch series doing this. It will obviously be more involved though, so I think it is still worth merging the original patch in the interm. ~Ryan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/