Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp751988rwd; Wed, 31 May 2023 05:07:04 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ57jqlrZTMO/JHFtgylGMWC/+fkPcnm7XGjo3jgfXifn5aKQ8A/eQzQdR0LDxyO0FggQSVf X-Received: by 2002:a05:6a20:2698:b0:10c:663c:31c3 with SMTP id h24-20020a056a20269800b0010c663c31c3mr3714369pze.29.1685534824346; Wed, 31 May 2023 05:07:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685534824; cv=none; d=google.com; s=arc-20160816; b=I5tUth5YoHZfYfi37TyAH9dp1kXmiLrPH/skivRa8Tw0KAN22xYLlvCF7swPRWyTJF QSktpU0yAyv66MzSbY8gseAnYSDn+6hnP/SPQvV3wJeTfYcChJQHGlAxUhS31mMB+2nE JkJLZelq+WoLvv9adbTeZrxnK0q5SxOkdnDtR8nW9d7jCj75OGUCMxBngMzmWvd6E8AJ 8HBDf+WrKJ6LJN9MHAl3AEDGvA+JPmLINQHuLgxux+b3Oyxxqj9v+GLpJQN/7xvAFPDq vbA+H/f5W0KX/OvszlqDNHHWzp0Kv3nVkUjvn6XCNWpPeYkpaDYTHZSAdXcAeQANbZee UauA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding:cc:to :reply-to:message-id:subject:date:from; bh=MqThC5C3oA1sEwMAR/9+RK5/43qBE9akUKxhbDAnNk4=; b=xJVMQQ+BPTlppIE4U4VYyizDwiNlemOPgVdNxTGvmVJ37DaK4/gOxpWYCXIWqoXHA5 b40JZh/vf1JeFssnRNKcJNKGdPF09WSptbUvKcupZ2gPb7ydaNa38CeoGlWuoMPthKMI 3XlPmBMoLv9vSkq0MlFwy6iKRmSEsU+XIiPzUr0oqnZI3JXMem9i7a1azv6GCQGmyk4n qmT4JCLGtLdCYJVuUNRfsafvafo4QF4m+0ZpxTd5aiRZjkpArek8pi9Mf149gWZoHriL //eOdQpCeVrpTjdHYJy6ZqpASOs5EeonaIflSU2TO3imleUzvmN4z/VQBuLHkAQpuSJq 72FA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sr.ht Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i9-20020a17090332c900b001ac59bc1c20si59817plr.47.2023.05.31.05.06.37; Wed, 31 May 2023 05:07:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sr.ht Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234902AbjEaLpQ convert rfc822-to-8bit (ORCPT + 99 others); Wed, 31 May 2023 07:45:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47304 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235811AbjEaLpE (ORCPT ); Wed, 31 May 2023 07:45:04 -0400 X-Greylist: delayed 344 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Wed, 31 May 2023 04:45:02 PDT Received: from mail-b.sr.ht (mail-b.sr.ht [173.195.146.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 826C5101; Wed, 31 May 2023 04:45:02 -0700 (PDT) Authentication-Results: mail-b.sr.ht; dkim=none Received: from git.sr.ht (unknown [173.195.146.142]) by mail-b.sr.ht (Postfix) with ESMTPSA id CA0C511F0E0; Wed, 31 May 2023 11:39:16 +0000 (UTC) From: ~akihirosuda Date: Wed, 31 May 2023 19:42:49 +0900 Subject: [PATCH linux] net/ipv4: ping_group_range: allow GID from 2147483648 to 4294967294 Message-ID: <168553315664.20663.13753087625689463092-0@git.sr.ht> X-Mailer: git.sr.ht Reply-to: ~akihirosuda To: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, segoon@openwall.com Cc: suda.kyoto@gmail.com, akihiro.suda.cz@hco.ntt.co.jp Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Spam-Status: No, score=0.2 required=5.0 tests=BAYES_00, FREEMAIL_FORGED_REPLYTO,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Akihiro Suda With this commit, all the GIDs ("0 4294967294") can be written to the "net.ipv4.ping_group_range" sysctl. Note that 4294967295 (0xffffffff) is an invalid GID (see gid_valid() in include/linux/uidgid.h), and an attempt to register this number will cause -EINVAL. Prior to this commit, only up to GID 2147483647 could be covered. Documentation/networking/ip-sysctl.rst had "0 4294967295" as an example value, but this example was wrong and causing -EINVAL. In the implementation, proc_dointvec_minmax is no longer used because it does not support numbers from 2147483648 to 4294967294. proc_douintvec is not used either, because it does not support multi-element vectors, despite its function name. Commit 4f2fec00afa6 ("sysctl: simplify unsigned int support") says "*Do not* add support for them". Fixes: c319b4d76b9e ("net: ipv4: add IPPROTO_ICMP socket kind") Signed-off-by: Akihiro Suda --- Documentation/networking/ip-sysctl.rst | 4 +- include/net/ping.h | 6 --- net/ipv4/sysctl_net_ipv4.c | 52 +++++++++++++++++++++----- 3 files changed, 44 insertions(+), 18 deletions(-) diff --git a/Documentation/networking/ip-sysctl.rst b/Documentation/networking/ip-sysctl.rst index 6ec06a33688a..80b8f73a0244 100644 --- a/Documentation/networking/ip-sysctl.rst +++ b/Documentation/networking/ip-sysctl.rst @@ -1352,8 +1352,8 @@ ping_group_range - 2 INTEGERS Restrict ICMP_PROTO datagram sockets to users in the group range. The default is "1 0", meaning, that nobody (not even root) may create ping sockets. Setting it to "100 100" would grant permissions - to the single group. "0 4294967295" would enable it for the world, "100 - 4294967295" would enable it for the users, but not daemons. + to the single group. "0 4294967294" would enable it for the world, "100 + 4294967294" would enable it for the users, but not daemons. tcp_early_demux - BOOLEAN Enable early demux for established TCP sockets. diff --git a/include/net/ping.h b/include/net/ping.h index 9233ad3de0ad..37b1d7baeb7b 100644 --- a/include/net/ping.h +++ b/include/net/ping.h @@ -16,12 +16,6 @@ #define PING_HTABLE_SIZE 64 #define PING_HTABLE_MASK (PING_HTABLE_SIZE-1) -/* - * gid_t is either uint or ushort. We want to pass it to - * proc_dointvec_minmax(), so it must not be larger than MAX_INT - */ -#define GID_T_MAX (((gid_t)~0U) >> 1) - /* Compatibility glue so we can support IPv6 when it's compiled as a module */ struct pingv6_ops { int (*ipv6_recv_error)(struct sock *sk, struct msghdr *msg, int len, diff --git a/net/ipv4/sysctl_net_ipv4.c b/net/ipv4/sysctl_net_ipv4.c index 40fe70fc2015..5f077156ec50 100644 --- a/net/ipv4/sysctl_net_ipv4.c +++ b/net/ipv4/sysctl_net_ipv4.c @@ -34,8 +34,6 @@ static int ip_ttl_min = 1; static int ip_ttl_max = 255; static int tcp_syn_retries_min = 1; static int tcp_syn_retries_max = MAX_TCP_SYNCNT; -static int ip_ping_group_range_min[] = { 0, 0 }; -static int ip_ping_group_range_max[] = { GID_T_MAX, GID_T_MAX }; static u32 u32_max_div_HZ = UINT_MAX / HZ; static int one_day_secs = 24 * 3600; static u32 fib_multipath_hash_fields_all_mask __maybe_unused = @@ -167,24 +165,56 @@ static int ipv4_ping_group_range(struct ctl_table *table, int write, int ret; gid_t urange[2]; kgid_t low, high; + size_t slen = 256; /* total bytes including '\0' */ + char *s = kmalloc(slen, GFP_KERNEL); /* clobbered by strsep */ struct ctl_table tmp = { - .data = &urange, - .maxlen = sizeof(urange), + .data = s, + .maxlen = slen, .mode = table->mode, - .extra1 = &ip_ping_group_range_min, - .extra2 = &ip_ping_group_range_max, }; + if (unlikely(!s)) + return -ENOMEM; + inet_get_ping_group_range_table(table, &low, &high); urange[0] = from_kgid_munged(user_ns, low); urange[1] = from_kgid_munged(user_ns, high); - ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos); - + /* proc_dointvec_minmax is no longer used because it does not support + * numbers from 2147483648 to 4294967294. + * + * proc_douintvec is not used either, because it does not support + * multi-element vectors, despite its function name. + * Commit 4f2fec00afa6 ("sysctl: simplify unsigned int support") says + * "*Do not* add support for them". + */ + ret = snprintf(tmp.data, slen, "%u\t%u", urange[0], urange[1]); + if (ret < 0) + goto done; + ret = proc_dostring(&tmp, write, buffer, lenp, ppos); + if (*lenp >= slen - 1) /* truncated */ + ret = -EINVAL; if (write && ret == 0) { + char *tok[2]; + int i; + + s = strim(s); + tok[0] = strsep(&s, " \t"); + tok[1] = s; + for (i = 0; i < 2; i++) { + if (!tok[i]) { + ret = -EINVAL; + goto done; + } + ret = kstrtouint(tok[i], 0, &urange[i]); + if (ret < 0) + goto done; + } low = make_kgid(user_ns, urange[0]); high = make_kgid(user_ns, urange[1]); - if (!gid_valid(low) || !gid_valid(high)) - return -EINVAL; + if (!gid_valid(low) || !gid_valid(high)) { + ret = -EINVAL; + goto done; + } if (urange[1] < urange[0] || gid_lt(high, low)) { low = make_kgid(&init_user_ns, 1); high = make_kgid(&init_user_ns, 0); @@ -192,6 +222,8 @@ static int ipv4_ping_group_range(struct ctl_table *table, int write, set_ping_group_range(table, low, high); } +done: + kfree(tmp.data); return ret; } -- 2.38.4