Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4168653pxv; Mon, 19 Jul 2021 19:07:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwucnSMf249N5tbyPxjGoUI1CYbudNhPYviF/wOdIXDZMnseEnJqiLNVewRqgSVTfh5bsjc X-Received: by 2002:a17:906:f0d1:: with SMTP id dk17mr30046244ejb.424.1626746840551; Mon, 19 Jul 2021 19:07:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626746840; cv=none; d=google.com; s=arc-20160816; b=jqGHeBAxnuWiHq56dZMqyudrx+AiZgeQIdyF9tUobTMoN0lsQd57a0jz+uLqSecQos cVlqlwMgnkrN3F4g7NaULd/TD8KlrvoAikO95jrMNS/oczaemcJToPpEdZ5yJZ4+Xnks mVMdRXP2huIB6nwmRMbiOBgmJlJNmvjM9HJDC2w3pAvrfBeMe7JEXvZoG72Uk9u3METO oWJuduRbDfgvS8wk5nbW+k8onj8OhiaYyPS8Qlj/JC4aSmKV3QlmqZSheyIzZTUk/WY0 pSwxZwOrD8Fyai6X2ftLWWsqMX1NM9VBbKhvcv5tbiIWpcX1/HGDvkyykEO2MS75DKWl ENQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=yAKEdbRASVTCVDA6Pth10I+WXA6yOgQj9SbrcWT0+UM=; b=G0RGjQeWmoQFdyKFDShEWkuMQupnYgVm6rq39c4UqqKDVIWN1AEMLSdmpNYzI8Gk4g /IeX2MJX5d65GMyiSg3LTCsY8kktqKKAxrLix/NYO6eUf/szQyxT8Zn9Kjx8t5o+coOL GIcUeToRASIDSFviVAG0nLPYxQ0Laqr8fDsLpMwwzHaXJtKyVn2pW8M2VIo6nv3taOwq 4c77syspQY0d9lpCzM+0XXcJVEc0LgTuMNyrExQRLyG/HKAE/KhUp1L8oCyEo/APDkMw CPctBpsm5tlSzikvx7+PcxC90TijJXDaJgKQJJQ02PlGjQpn9zSK92p+NeNoT5u8QUZg 5gHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Likab/Io"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id eg42si22073543edb.69.2021.07.19.19.06.57; Mon, 19 Jul 2021 19:07:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Likab/Io"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244372AbhGTBGL (ORCPT + 99 others); Mon, 19 Jul 2021 21:06:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39286 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241228AbhGTBCF (ORCPT ); Mon, 19 Jul 2021 21:02:05 -0400 Received: from mail-pg1-x529.google.com (mail-pg1-x529.google.com [IPv6:2607:f8b0:4864:20::529]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C8C0FC061768; Mon, 19 Jul 2021 18:42:44 -0700 (PDT) Received: by mail-pg1-x529.google.com with SMTP id 70so17708932pgh.2; Mon, 19 Jul 2021 18:42:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=yAKEdbRASVTCVDA6Pth10I+WXA6yOgQj9SbrcWT0+UM=; b=Likab/Io5q4ZvilS3QZBUIT/B/8UycV1jwy1Lbc4ASOi74Rl6Z5257JBZedykNbCJw 0ylMh4vjn7Wy1X+7gQ1p+5fYseFRPMd2xF/qOJxYh/hjCVNmyAkqVC21AkMGejgaQD1W XsTMqvnkzozbFa+kCTKVxzgyBNe2YipUmMMYHn/wVIFcDA8G9M88ntSH29lAX3mlyzfc LLwccptnHnviYU7bUtqEWLT428pMprvlmRUK9YLmumFUozzlCNoJQFkhxL6aKpKu7rIq G2bvMH8EpjvyCtINMO9kahu313D+yhBU4MTKyC5djZiqCx3pYmpmGtBPCFp2FBMSh69g 4WQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=yAKEdbRASVTCVDA6Pth10I+WXA6yOgQj9SbrcWT0+UM=; b=fW2ayNwCRO9Mt7Uhj7xWAXI+10LARb/H5QLiqMtnpn6i1lsjl7bpBCd7sP+GArt9Gq insLIzkETKNtsaPNgY9u4CVevjkUUe2jy1Ahrt6XU3Ius2KB/06aAvqRWXDqysz9//h/ YylvUwllzwv6JsFb03HeVHB1uQR99hWJK1tkbKi3ndBc+wvo6nn4uwn6S6fM5E2RwGxS gbmGK5FjB/XdlKt5CLic6Eb4Hn4e62cJTK+0mZ28ThBHgClheXu/9++OA6TqJi80fPc1 BdWFL/jiZhm++bm6vNTrC+b5ooFVnq1ZswplwvC7w3kSsPg5tZdgdj5FVU/+0U40GFOP M08g== X-Gm-Message-State: AOAM532JUT7BVvvRi4WGZbIN3PiTi+yZ5pgsouyoQfVASL+FUdTtbKo2 oB/yynZiulAKB/WHdpApFgc= X-Received: by 2002:a05:6a00:1390:b029:32a:e2a2:74de with SMTP id t16-20020a056a001390b029032ae2a274demr28355456pfg.6.1626745364423; Mon, 19 Jul 2021 18:42:44 -0700 (PDT) Received: from localhost.localdomain ([193.203.214.57]) by smtp.gmail.com with ESMTPSA id bf18sm17549943pjb.46.2021.07.19.18.42.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Jul 2021 18:42:44 -0700 (PDT) From: cgel.zte@gmail.com X-Google-Original-From: yang.yang29@zte.com.cn To: kuba@kernel.org Cc: davem@davemloft.net, yoshfuji@linux-ipv6.org, dsahern@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Yang Yang , Zeal Robot Subject: [PATCH net-next] net: ipv4: add capability check for net administration Date: Mon, 19 Jul 2021 18:43:28 -0700 Message-Id: <20210720014328.378868-1-yang.yang29@zte.com.cn> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yang Yang Root in init user namespace can modify /proc/sys/net/ipv4/ip_forward without CAP_NET_ADMIN, this doesn't follow the principle of capabilities. For example, let's take a look at netdev_store(), root can't modify netdev attribute without CAP_NET_ADMIN. So let's keep the consistency of permission check logic. Reported-by: Zeal Robot Signed-off-by: Yang Yang --- net/ipv4/devinet.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/net/ipv4/devinet.c b/net/ipv4/devinet.c index 73721a4448bd..6238ab2dd3d1 100644 --- a/net/ipv4/devinet.c +++ b/net/ipv4/devinet.c @@ -2424,11 +2424,15 @@ static int devinet_sysctl_forward(struct ctl_table *ctl, int write, int *valp = ctl->data; int val = *valp; loff_t pos = *ppos; - int ret = proc_dointvec(ctl, write, buffer, lenp, ppos); + struct net *net = ctl->extra2; + int ret; - if (write && *valp != val) { - struct net *net = ctl->extra2; + if (write && !ns_capable(net->user_ns, CAP_NET_ADMIN)) + return -EPERM; + + ret = proc_dointvec(ctl, write, buffer, lenp, ppos); + if (write && *valp != val) { if (valp != &IPV4_DEVCONF_DFLT(net, FORWARDING)) { if (!rtnl_trylock()) { /* Restore the original values before restarting */ -- 2.25.1