Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp963914imm; Fri, 13 Jul 2018 09:10:02 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcMD43YzwXgs/m2WNc69sWV7aR/DinWN00oQSF+oD95unOyd023BmpvrcOZecPzf2bUBWSV X-Received: by 2002:a63:d15:: with SMTP id c21-v6mr6775004pgl.322.1531498202545; Fri, 13 Jul 2018 09:10:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531498202; cv=none; d=google.com; s=arc-20160816; b=wpuPG2MZBwJj+lrG0jcgiTYKXt/ueKUzsxaDo+c75l2jH+QwP2S7ceP2GnJleqTSkz cqMm762prTKBm2nZqBPmHKCb41AutgRFBRTBRW9/4omoFuvOnd1SwmmBMCCVAPYpja6h uvnFkETD2ty/03ymUJ2eilQ1cuR7K9yyUYJh7oMju6bTTzN4Ki1C945GBzW4kcD9q9uK 0sIluG/A1c+wNsW8c7b7K2BRE5i+d5Pjr7359F7pj+/pC77+jCWFByxiy5mDkvpjRK+i zjpxxT+z0ACllbagmlpdSgC8K8X8DVy/lAnaSy6SlQvlAqyKorPP6llU18khQkdkljlM OMSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=EOZJHqnC9UTTB5YwtS7qc3P/2ISGXss/BiRQ0o9DDbE=; b=bnc/gwZvidYRLvgBxYx4r+V+Suiv9nt4YwCIsJFzdjSCPXoyjXT6VpM5X/uiTKxMLZ ZByqOIlZUrey/vXGiGtfqqtZupsIbc6jn7REEFQ81IWiuXmI21Z/7SaDYTKD9GoR70ft fMMwcorQ873v9Vl48l5ZlbvjubOgguiaffEHH5qQJuo7C8ChoERHjBxXgSfGtcylgHQD Xy07jFQ/WCrCFL4vGpYCcYCgF1Brc7pvzc7+vsh3rg8avb9ao21k1Gk/R4XyT3H6OgUb NMovIzsWBqyReCqViO3vnvxBCYl7gIXdYflXaI633ugFOCOZwSEBTEJGiY8j1XMTeleT 5YMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 6-v6si15107210pgv.508.2018.07.13.09.09.42; Fri, 13 Jul 2018 09:10:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387752AbeGMQXf (ORCPT + 99 others); Fri, 13 Jul 2018 12:23:35 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:38407 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729784AbeGMQXe (ORCPT ); Fri, 13 Jul 2018 12:23:34 -0400 Received: from 2.general.tyhicks.us.vpn ([10.172.64.53] helo=sec.ubuntu-ci) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1fe0cB-0006pX-Hm; Fri, 13 Jul 2018 16:08:15 +0000 From: Tyler Hicks To: Greg Kroah-Hartman , Tejun Heo , "David S. Miller" , Stephen Hemminger Cc: Dmitry Torokhov , "Eric W. Biederman" , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org, Linux Containers Subject: [PATCH net-next v2 5/7] net-sysfs: make sure objects belong to contrainer's owner Date: Fri, 13 Jul 2018 16:05:47 +0000 Message-Id: <1531497949-1766-6-git-send-email-tyhicks@canonical.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1531497949-1766-1-git-send-email-tyhicks@canonical.com> References: <1531497949-1766-1-git-send-email-tyhicks@canonical.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dmitry Torokhov When creating various objects in /sys/class/net/... make sure that they belong to container's owner instead of global root (if they belong to a container/namespace). Signed-off-by: Dmitry Torokhov Signed-off-by: Tyler Hicks --- net/core/net-sysfs.c | 44 +++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 43 insertions(+), 1 deletion(-) diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c index ffa1d18f2c2c..41d84c40fe51 100644 --- a/net/core/net-sysfs.c +++ b/net/core/net-sysfs.c @@ -656,6 +656,21 @@ static const struct attribute_group wireless_group = { #define net_class_groups NULL #endif /* CONFIG_SYSFS */ +static void net_ns_get_ownership(const struct net *net, + kuid_t *uid, kgid_t *gid) +{ + if (net) { + kuid_t ns_root_uid = make_kuid(net->user_ns, 0); + kgid_t ns_root_gid = make_kgid(net->user_ns, 0); + + if (uid_valid(ns_root_uid)) + *uid = ns_root_uid; + + if (gid_valid(ns_root_gid)) + *gid = ns_root_gid; + } +} + #ifdef CONFIG_SYSFS #define to_rx_queue_attr(_attr) \ container_of(_attr, struct rx_queue_attribute, attr) @@ -905,11 +920,20 @@ static const void *rx_queue_namespace(struct kobject *kobj) return ns; } +static void rx_queue_get_ownership(struct kobject *kobj, + kuid_t *uid, kgid_t *gid) +{ + const struct net *net = rx_queue_namespace(kobj); + + net_ns_get_ownership(net, uid, gid); +} + static struct kobj_type rx_queue_ktype __ro_after_init = { .sysfs_ops = &rx_queue_sysfs_ops, .release = rx_queue_release, .default_attrs = rx_queue_default_attrs, - .namespace = rx_queue_namespace + .namespace = rx_queue_namespace, + .get_ownership = rx_queue_get_ownership, }; static int rx_queue_add_kobject(struct net_device *dev, int index) @@ -1428,11 +1452,20 @@ static const void *netdev_queue_namespace(struct kobject *kobj) return ns; } +static void netdev_queue_get_ownership(struct kobject *kobj, + kuid_t *uid, kgid_t *gid) +{ + const struct net *net = netdev_queue_namespace(kobj); + + net_ns_get_ownership(net, uid, gid); +} + static struct kobj_type netdev_queue_ktype __ro_after_init = { .sysfs_ops = &netdev_queue_sysfs_ops, .release = netdev_queue_release, .default_attrs = netdev_queue_default_attrs, .namespace = netdev_queue_namespace, + .get_ownership = netdev_queue_get_ownership, }; static int netdev_queue_add_kobject(struct net_device *dev, int index) @@ -1622,6 +1655,14 @@ static const void *net_namespace(struct device *d) return dev_net(dev); } +static void net_get_ownership(struct device *d, kuid_t *uid, kgid_t *gid) +{ + struct net_device *dev = to_net_dev(d); + const struct net *net = dev_net(dev); + + net_ns_get_ownership(net, uid, gid); +} + static struct class net_class __ro_after_init = { .name = "net", .dev_release = netdev_release, @@ -1629,6 +1670,7 @@ static struct class net_class __ro_after_init = { .dev_uevent = netdev_uevent, .ns_type = &net_ns_type_operations, .namespace = net_namespace, + .get_ownership = net_get_ownership, }; #ifdef CONFIG_OF_NET -- 2.7.4