Skip to content

Commit 16bae3e

Browse files
pcmooreaxboe
authored andcommitted
io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL
We need to correct some aspects of the IORING_OP_FIXED_FD_INSTALL command to take into account the security implications of making an io_uring-private file descriptor generally accessible to a userspace task. The first change in this patch is to enable auditing of the FD_INSTALL operation as installing a file descriptor into a task's file descriptor table is a security relevant operation and something that admins/users may want to audit. The second change is to disable the io_uring credential override functionality, also known as io_uring "personalities", in the FD_INSTALL command. The credential override in FD_INSTALL is particularly problematic as it affects the credentials used in the security_file_receive() LSM hook. If a task were to request a credential override via REQ_F_CREDS on a FD_INSTALL operation, the LSM would incorrectly check to see if the overridden credentials of the io_uring were able to "receive" the file as opposed to the task's credentials. After discussions upstream, it's difficult to imagine a use case where we would want to allow a credential override on a FD_INSTALL operation so we are simply going to block REQ_F_CREDS on IORING_OP_FIXED_FD_INSTALL operations. Fixes: dc18b89 ("io_uring/openclose: add support for IORING_OP_FIXED_FD_INSTALL") Signed-off-by: Paul Moore <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Jens Axboe <[email protected]>
1 parent 6613476 commit 16bae3e

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

io_uring/opdef.c

-1
Original file line numberDiff line numberDiff line change
@@ -471,7 +471,6 @@ const struct io_issue_def io_issue_defs[] = {
471471
},
472472
[IORING_OP_FIXED_FD_INSTALL] = {
473473
.needs_file = 1,
474-
.audit_skip = 1,
475474
.prep = io_install_fixed_fd_prep,
476475
.issue = io_install_fixed_fd,
477476
},

io_uring/openclose.c

+4
Original file line numberDiff line numberDiff line change
@@ -277,6 +277,10 @@ int io_install_fixed_fd_prep(struct io_kiocb *req, const struct io_uring_sqe *sq
277277
if (flags & ~IORING_FIXED_FD_NO_CLOEXEC)
278278
return -EINVAL;
279279

280+
/* ensure the task's creds are used when installing/receiving fds */
281+
if (req->flags & REQ_F_CREDS)
282+
return -EPERM;
283+
280284
/* default to O_CLOEXEC, disable if IORING_FIXED_FD_NO_CLOEXEC is set */
281285
ifi = io_kiocb_to_cmd(req, struct io_fixed_install);
282286
ifi->o_flags = O_CLOEXEC;

0 commit comments

Comments
 (0)