Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3342890imm; Fri, 20 Jul 2018 14:58:59 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfojjoKq4mrC0ZSSwliE/AvVTkGJfspNZez7suQkHS13goXKuZ9uYqOoWBXp8wyAx/Nm5SV X-Received: by 2002:a17:902:6902:: with SMTP id j2-v6mr3584609plk.323.1532123939360; Fri, 20 Jul 2018 14:58:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532123939; cv=none; d=google.com; s=arc-20160816; b=i1L/aCPAVQYqaZ7Mnbdj5LWQZtvM40m/YvscIEAZltA41UARnD9NKMqGdJ13MO8laS 5eLO4uXbOE8eOYDUFN9SoZotF8YdC4JZXoEQODAwEahH+1I5Aw6U4w3kSLJqPrn13ndj qsz1U7tF4TKP/hG5xmOd25cvBW2JECdDtllYGMrCJDeZ6PetZ58GE+hy+yxtHt9srRyp XZCvgJfGo0XOCS6KE3ZDhaBqK/ZEgMs+Jip7IcIExSno+e5prlF/SIVYrB3vEL2CePPk Nl+B8m67ndKsPmWoYKyPHCLKTFty38RRBAqWyn6K+7v0cLtmIiuOK0x5QwJKvUC0z6EK ETGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=tIEkp64TmPCpebyTXuoAvzG6dGVFBBH1K1wwByjORzQ=; b=z3CjpgyeUN/VpM5l4/RwboCaslvkW6oU2Dgl9ZfrzYDIJdPFDIO58ium1IGG59zMz+ VOAzbNnCO9b8UzLOsOXq2Z9qBf+JwO2DC9pJKRYivsslS6rluME62gx2T+cQ8qoAhwh6 8ruQlcKWG17VmPJ4hlaonupJWIkQNpXqzxUawxNkqKdXYAAYNRVOeAsqk7p+WOp5DLV8 ue5re29VsonSViUUekwFo2RzufVrmN0D+z+TRrKnNdRtHHb9xbmo+wHvFaNv86i96JsK S5z1PQyvGabojdPUTgIHHEhvIzEYUbXYbdFC6ft3a38qQsD5tq7dLHnIaBy3uX/hjAVW BndA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y186-v6si2599902pgb.395.2018.07.20.14.58.44; Fri, 20 Jul 2018 14:58:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731844AbeGTWrz (ORCPT + 99 others); Fri, 20 Jul 2018 18:47:55 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:37654 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728214AbeGTWry (ORCPT ); Fri, 20 Jul 2018 18:47:54 -0400 Received: from 2.general.tyhicks.us.vpn ([10.172.64.53] helo=sec.l.tihix.com) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1fgdPA-0004ZT-Tx; Fri, 20 Jul 2018 21:57:41 +0000 From: Tyler Hicks To: Greg Kroah-Hartman , Tejun Heo , "David S. Miller" , Stephen Hemminger Cc: Dmitry Torokhov , "Eric W. Biederman" , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org, Linux Containers Subject: [PATCH net-next v3 6/8] net-sysfs: make sure objects belong to container's owner Date: Fri, 20 Jul 2018 21:56:52 +0000 Message-Id: <1532123814-1109-7-git-send-email-tyhicks@canonical.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1532123814-1109-1-git-send-email-tyhicks@canonical.com> References: <1532123814-1109-1-git-send-email-tyhicks@canonical.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dmitry Torokhov When creating various objects in /sys/class/net/... make sure that they belong to container's owner instead of global root (if they belong to a container/namespace). Co-Developed-by: Tyler Hicks Signed-off-by: Dmitry Torokhov Signed-off-by: Tyler Hicks --- net/core/net-sysfs.c | 47 ++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 46 insertions(+), 1 deletion(-) diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c index 405c41ecb20b..ada065fc685e 100644 --- a/net/core/net-sysfs.c +++ b/net/core/net-sysfs.c @@ -656,6 +656,24 @@ static const struct attribute_group wireless_group = { #define net_class_groups NULL #endif /* CONFIG_SYSFS */ +static void net_ns_get_ownership(const struct net *net, + kuid_t *uid, kgid_t *gid) +{ + if (net) { + kuid_t ns_root_uid = make_kuid(net->user_ns, 0); + kgid_t ns_root_gid = make_kgid(net->user_ns, 0); + + if (uid_valid(ns_root_uid)) + *uid = ns_root_uid; + + if (gid_valid(ns_root_gid)) + *gid = ns_root_gid; + } else { + *uid = GLOBAL_ROOT_UID; + *gid = GLOBAL_ROOT_GID; + } +} + #ifdef CONFIG_SYSFS #define to_rx_queue_attr(_attr) \ container_of(_attr, struct rx_queue_attribute, attr) @@ -905,11 +923,20 @@ static const void *rx_queue_namespace(struct kobject *kobj) return ns; } +static void rx_queue_get_ownership(struct kobject *kobj, + kuid_t *uid, kgid_t *gid) +{ + const struct net *net = rx_queue_namespace(kobj); + + net_ns_get_ownership(net, uid, gid); +} + static struct kobj_type rx_queue_ktype __ro_after_init = { .sysfs_ops = &rx_queue_sysfs_ops, .release = rx_queue_release, .default_attrs = rx_queue_default_attrs, - .namespace = rx_queue_namespace + .namespace = rx_queue_namespace, + .get_ownership = rx_queue_get_ownership, }; static int rx_queue_add_kobject(struct net_device *dev, int index) @@ -1431,11 +1458,20 @@ static const void *netdev_queue_namespace(struct kobject *kobj) return ns; } +static void netdev_queue_get_ownership(struct kobject *kobj, + kuid_t *uid, kgid_t *gid) +{ + const struct net *net = netdev_queue_namespace(kobj); + + net_ns_get_ownership(net, uid, gid); +} + static struct kobj_type netdev_queue_ktype __ro_after_init = { .sysfs_ops = &netdev_queue_sysfs_ops, .release = netdev_queue_release, .default_attrs = netdev_queue_default_attrs, .namespace = netdev_queue_namespace, + .get_ownership = netdev_queue_get_ownership, }; static int netdev_queue_add_kobject(struct net_device *dev, int index) @@ -1625,6 +1661,14 @@ static const void *net_namespace(struct device *d) return dev_net(dev); } +static void net_get_ownership(struct device *d, kuid_t *uid, kgid_t *gid) +{ + struct net_device *dev = to_net_dev(d); + const struct net *net = dev_net(dev); + + net_ns_get_ownership(net, uid, gid); +} + static struct class net_class __ro_after_init = { .name = "net", .dev_release = netdev_release, @@ -1632,6 +1676,7 @@ static struct class net_class __ro_after_init = { .dev_uevent = netdev_uevent, .ns_type = &net_ns_type_operations, .namespace = net_namespace, + .get_ownership = net_get_ownership, }; #ifdef CONFIG_OF_NET -- 2.7.4