Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1392277pxb; Fri, 21 Jan 2022 17:27:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJy49drBTAFRct3QVPdciA6cmZczg/c2pMCgqtQu5pM6H7f1KffznHShQvsTzgz+uWa2+nYt X-Received: by 2002:a17:902:8d82:b0:149:a740:d8d0 with SMTP id v2-20020a1709028d8200b00149a740d8d0mr5924996plo.5.1642814842977; Fri, 21 Jan 2022 17:27:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642814842; cv=none; d=google.com; s=arc-20160816; b=hDYedKIU4ip37a8WhxkAHV5Wk+5RFJkLSk9mS26VwvBCi2QRbcwGshMCWi8DGf4pcC s751onAapcG5zIRvX9DGV5t02PZA/rM1ChFh2dmqrwiBZt0iqynSNwM1RKMF+patflSj IZzkY5hC9LaH7pJCJ2i05QkFLnuCEyW0GOdIRthDnEhvXls+nVul3jTFrRmwca9ov4+g Lnq+slRuYrsz5fPhbq9SnTd6lpg+IUz8eI+z9uCUzxM6NNJWyU5oatrb9AYVJT9wF+6n u3kfUZxe1XpucykhJM681e16svG8FQ51xesS/1Hy2379CNoznt/EKDy5aenT2coKTwBl k33g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=SqKYFo0L4M4EKCldXEGF4wCa1vK3TtWpBEpxsV807Xg=; b=nR67f18V+xd9yzYDwykzd+S6fnkXUzaJ9fdQ4HkA4CRqFl4Ll9ifqEJ2D/0McDG7GH f5Zp60W2BRY2NBf+uGZas45C5A6fEPz04Hm5/K+dS6+7HnBPa6Y+jGRektsww3l8d8xG VR2zuSR4Y8vllaCSY49EeiBAGkCT22XMMcUqiOnrTiAztQDkmgCZO0JlsLmS4OuXICWs iWS8FUg4Rf3NNA/jeFDkOBhBpdEJQIwdtk8cpv8F3+5lcgDKKg1J+aI+VESDjZrzTvGw xz/ggHe/3CLh3DkL+IMQt1FxUcDK/wwJSms2gskuU13fGkKOBZtpzQNWN+93v8bjwqLo sS8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id mh5si17871509pjb.155.2022.01.21.17.27.11; Fri, 21 Jan 2022 17:27:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1380566AbiAUNK0 convert rfc822-to-8bit (ORCPT + 99 others); Fri, 21 Jan 2022 08:10:26 -0500 Received: from us-smtp-delivery-44.mimecast.com ([205.139.111.44]:30977 "EHLO us-smtp-delivery-44.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1380557AbiAUNKY (ORCPT ); Fri, 21 Jan 2022 08:10:24 -0500 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-286-qgc-g0hKP0O-lYa8qA8vPA-1; Fri, 21 Jan 2022 08:10:20 -0500 X-MC-Unique: qgc-g0hKP0O-lYa8qA8vPA-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 8ED5C83DEE1; Fri, 21 Jan 2022 13:10:18 +0000 (UTC) Received: from comp-core-i7-2640m-0182e6.redhat.com (unknown [10.36.110.3]) by smtp.corp.redhat.com (Postfix) with ESMTP id 1AC8178AA0; Fri, 21 Jan 2022 13:10:14 +0000 (UTC) From: Alexey Gladkov To: LKML , Linux Containers Cc: Alexander Mikhalitsyn , Andrew Morton , Christian Brauner , Daniel Walsh , Davidlohr Bueso , "Eric W . Biederman" , Kirill Tkhai , Manfred Spraul , Serge Hallyn , Varad Gautam , Vasily Averin Subject: [RFC PATCH v3 4/4] ipc: Allow to modify ipc/mq sysctls if CAP_SYS_RESOURCE is present Date: Fri, 21 Jan 2022 14:08:41 +0100 Message-Id: <9351533c4114f160d7b7d2db32d9636747bdede9.1642769810.git.legion@kernel.org> In-Reply-To: References: <87tuebwo99.fsf@email.froward.int.ebiederm.org> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=legion@kernel.org X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: kernel.org Content-Transfer-Encoding: 8BIT Content-Type: text/plain; charset=WINDOWS-1252 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The mq_overview(7) says that mq sysctls are available for modification to a privileged process (CAP_SYS_RESOURCE). Right now, within userns, a privileged process cannot modify these files. Once the mq and ipc sysctls have been moved to the ipc namespace we can grant access to these files. mqueue sysctls -------------- The mq sysctls are protected by an upper limit that cannot be exceeded on the system: For /proc/sys/fs/mqueue/msg_max the upper limit is HARD_MSGMAX. For /proc/sys/fs/mqueue/msgsize_max the upper limit is HARD_MSGSIZEMAX. Also RLIMIT_MSGQUEUE limits all queues used by the process. This limit is also tied to userns. ipc sysctls ----------- The implementation has no specific limits for the per-process maximum number of shared memory segments. Only SHM_LOCK and SHM_HUGETLB limited by RLIMIT_MEMLOCK which is also tied to userns. This patch is RPC only and should not be applied without a security discussion. Signed-off-by: Alexey Gladkov --- ipc/ipc_sysctl.c | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/ipc/ipc_sysctl.c b/ipc/ipc_sysctl.c index 9fc8e3e75be7..f1d1c83656f9 100644 --- a/ipc/ipc_sysctl.c +++ b/ipc/ipc_sysctl.c @@ -254,6 +254,21 @@ static struct ctl_table mq_sysctls[] = { {} }; +static int set_permissions(struct ctl_table_header *head, struct ctl_table *table) +{ + struct ipc_namespace *ns = container_of(head->set, struct ipc_namespace, set); + int mode; + + /* Allow users with CAP_SYS_RESOURCE unrestrained access */ + if (ns_capable(ns->user_ns, CAP_SYS_RESOURCE)) + mode = (table->mode & S_IRWXU) >> 6; + else + /* Allow all others at most read-only access */ + mode = table->mode & S_IROTH; + + return (mode << 6) | (mode << 3) | mode; +} + static struct ctl_table_set *set_lookup(struct ctl_table_root *root) { return ¤t->nsproxy->ipc_ns->set; @@ -266,6 +281,7 @@ static int set_is_seen(struct ctl_table_set *set) static struct ctl_table_root set_root = { .lookup = set_lookup, + .permissions = set_permissions, }; static bool register_ipc_sysctl_table(struct ipc_namespace *ns) -- 2.33.0