162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/* -*- linux-c -*-
362306a36Sopenharmony_ci * sysctl_net.c: sysctl interface to net subsystem.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Begun April 1, 1996, Mike Shaver.
662306a36Sopenharmony_ci * Added /proc/sys/net directories for each protocol family. [MS]
762306a36Sopenharmony_ci *
862306a36Sopenharmony_ci * Revision 1.2  1996/05/08  20:24:40  shaver
962306a36Sopenharmony_ci * Added bits for NET_BRIDGE and the NET_IPV4_ARP stuff and
1062306a36Sopenharmony_ci * NET_IPV4_IP_FORWARD.
1162306a36Sopenharmony_ci *
1262306a36Sopenharmony_ci *
1362306a36Sopenharmony_ci */
1462306a36Sopenharmony_ci
1562306a36Sopenharmony_ci#include <linux/mm.h>
1662306a36Sopenharmony_ci#include <linux/export.h>
1762306a36Sopenharmony_ci#include <linux/sysctl.h>
1862306a36Sopenharmony_ci#include <linux/nsproxy.h>
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci#include <net/sock.h>
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_ci#ifdef CONFIG_INET
2362306a36Sopenharmony_ci#include <net/ip.h>
2462306a36Sopenharmony_ci#endif
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_ci#ifdef CONFIG_NET
2762306a36Sopenharmony_ci#include <linux/if_ether.h>
2862306a36Sopenharmony_ci#endif
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_cistatic struct ctl_table_set *
3162306a36Sopenharmony_cinet_ctl_header_lookup(struct ctl_table_root *root)
3262306a36Sopenharmony_ci{
3362306a36Sopenharmony_ci	return &current->nsproxy->net_ns->sysctls;
3462306a36Sopenharmony_ci}
3562306a36Sopenharmony_ci
3662306a36Sopenharmony_cistatic int is_seen(struct ctl_table_set *set)
3762306a36Sopenharmony_ci{
3862306a36Sopenharmony_ci	return &current->nsproxy->net_ns->sysctls == set;
3962306a36Sopenharmony_ci}
4062306a36Sopenharmony_ci
4162306a36Sopenharmony_ci/* Return standard mode bits for table entry. */
4262306a36Sopenharmony_cistatic int net_ctl_permissions(struct ctl_table_header *head,
4362306a36Sopenharmony_ci			       struct ctl_table *table)
4462306a36Sopenharmony_ci{
4562306a36Sopenharmony_ci	struct net *net = container_of(head->set, struct net, sysctls);
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci	/* Allow network administrator to have same access as root. */
4862306a36Sopenharmony_ci	if (ns_capable_noaudit(net->user_ns, CAP_NET_ADMIN)) {
4962306a36Sopenharmony_ci		int mode = (table->mode >> 6) & 7;
5062306a36Sopenharmony_ci		return (mode << 6) | (mode << 3) | mode;
5162306a36Sopenharmony_ci	}
5262306a36Sopenharmony_ci
5362306a36Sopenharmony_ci	return table->mode;
5462306a36Sopenharmony_ci}
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_cistatic void net_ctl_set_ownership(struct ctl_table_header *head,
5762306a36Sopenharmony_ci				  struct ctl_table *table,
5862306a36Sopenharmony_ci				  kuid_t *uid, kgid_t *gid)
5962306a36Sopenharmony_ci{
6062306a36Sopenharmony_ci	struct net *net = container_of(head->set, struct net, sysctls);
6162306a36Sopenharmony_ci	kuid_t ns_root_uid;
6262306a36Sopenharmony_ci	kgid_t ns_root_gid;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	ns_root_uid = make_kuid(net->user_ns, 0);
6562306a36Sopenharmony_ci	if (uid_valid(ns_root_uid))
6662306a36Sopenharmony_ci		*uid = ns_root_uid;
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	ns_root_gid = make_kgid(net->user_ns, 0);
6962306a36Sopenharmony_ci	if (gid_valid(ns_root_gid))
7062306a36Sopenharmony_ci		*gid = ns_root_gid;
7162306a36Sopenharmony_ci}
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_cistatic struct ctl_table_root net_sysctl_root = {
7462306a36Sopenharmony_ci	.lookup = net_ctl_header_lookup,
7562306a36Sopenharmony_ci	.permissions = net_ctl_permissions,
7662306a36Sopenharmony_ci	.set_ownership = net_ctl_set_ownership,
7762306a36Sopenharmony_ci};
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_cistatic int __net_init sysctl_net_init(struct net *net)
8062306a36Sopenharmony_ci{
8162306a36Sopenharmony_ci	setup_sysctl_set(&net->sysctls, &net_sysctl_root, is_seen);
8262306a36Sopenharmony_ci	return 0;
8362306a36Sopenharmony_ci}
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_cistatic void __net_exit sysctl_net_exit(struct net *net)
8662306a36Sopenharmony_ci{
8762306a36Sopenharmony_ci	retire_sysctl_set(&net->sysctls);
8862306a36Sopenharmony_ci}
8962306a36Sopenharmony_ci
9062306a36Sopenharmony_cistatic struct pernet_operations sysctl_pernet_ops = {
9162306a36Sopenharmony_ci	.init = sysctl_net_init,
9262306a36Sopenharmony_ci	.exit = sysctl_net_exit,
9362306a36Sopenharmony_ci};
9462306a36Sopenharmony_ci
9562306a36Sopenharmony_cistatic struct ctl_table_header *net_header;
9662306a36Sopenharmony_ci__init int net_sysctl_init(void)
9762306a36Sopenharmony_ci{
9862306a36Sopenharmony_ci	static struct ctl_table empty[1];
9962306a36Sopenharmony_ci	int ret = -ENOMEM;
10062306a36Sopenharmony_ci	/* Avoid limitations in the sysctl implementation by
10162306a36Sopenharmony_ci	 * registering "/proc/sys/net" as an empty directory not in a
10262306a36Sopenharmony_ci	 * network namespace.
10362306a36Sopenharmony_ci	 */
10462306a36Sopenharmony_ci	net_header = register_sysctl_sz("net", empty, 0);
10562306a36Sopenharmony_ci	if (!net_header)
10662306a36Sopenharmony_ci		goto out;
10762306a36Sopenharmony_ci	ret = register_pernet_subsys(&sysctl_pernet_ops);
10862306a36Sopenharmony_ci	if (ret)
10962306a36Sopenharmony_ci		goto out1;
11062306a36Sopenharmony_ciout:
11162306a36Sopenharmony_ci	return ret;
11262306a36Sopenharmony_ciout1:
11362306a36Sopenharmony_ci	unregister_sysctl_table(net_header);
11462306a36Sopenharmony_ci	net_header = NULL;
11562306a36Sopenharmony_ci	goto out;
11662306a36Sopenharmony_ci}
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci/* Verify that sysctls for non-init netns are safe by either:
11962306a36Sopenharmony_ci * 1) being read-only, or
12062306a36Sopenharmony_ci * 2) having a data pointer which points outside of the global kernel/module
12162306a36Sopenharmony_ci *    data segment, and rather into the heap where a per-net object was
12262306a36Sopenharmony_ci *    allocated.
12362306a36Sopenharmony_ci */
12462306a36Sopenharmony_cistatic void ensure_safe_net_sysctl(struct net *net, const char *path,
12562306a36Sopenharmony_ci				   struct ctl_table *table, size_t table_size)
12662306a36Sopenharmony_ci{
12762306a36Sopenharmony_ci	struct ctl_table *ent;
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	pr_debug("Registering net sysctl (net %p): %s\n", net, path);
13062306a36Sopenharmony_ci	ent = table;
13162306a36Sopenharmony_ci	for (size_t i = 0; i < table_size && ent->procname; ent++, i++) {
13262306a36Sopenharmony_ci		unsigned long addr;
13362306a36Sopenharmony_ci		const char *where;
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci		pr_debug("  procname=%s mode=%o proc_handler=%ps data=%p\n",
13662306a36Sopenharmony_ci			 ent->procname, ent->mode, ent->proc_handler, ent->data);
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci		/* If it's not writable inside the netns, then it can't hurt. */
13962306a36Sopenharmony_ci		if ((ent->mode & 0222) == 0) {
14062306a36Sopenharmony_ci			pr_debug("    Not writable by anyone\n");
14162306a36Sopenharmony_ci			continue;
14262306a36Sopenharmony_ci		}
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci		/* Where does data point? */
14562306a36Sopenharmony_ci		addr = (unsigned long)ent->data;
14662306a36Sopenharmony_ci		if (is_module_address(addr))
14762306a36Sopenharmony_ci			where = "module";
14862306a36Sopenharmony_ci		else if (is_kernel_core_data(addr))
14962306a36Sopenharmony_ci			where = "kernel";
15062306a36Sopenharmony_ci		else
15162306a36Sopenharmony_ci			continue;
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_ci		/* If it is writable and points to kernel/module global
15462306a36Sopenharmony_ci		 * data, then it's probably a netns leak.
15562306a36Sopenharmony_ci		 */
15662306a36Sopenharmony_ci		WARN(1, "sysctl %s/%s: data points to %s global data: %ps\n",
15762306a36Sopenharmony_ci		     path, ent->procname, where, ent->data);
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_ci		/* Make it "safe" by dropping writable perms */
16062306a36Sopenharmony_ci		ent->mode &= ~0222;
16162306a36Sopenharmony_ci	}
16262306a36Sopenharmony_ci}
16362306a36Sopenharmony_ci
16462306a36Sopenharmony_cistruct ctl_table_header *register_net_sysctl_sz(struct net *net,
16562306a36Sopenharmony_ci						const char *path,
16662306a36Sopenharmony_ci						struct ctl_table *table,
16762306a36Sopenharmony_ci						size_t table_size)
16862306a36Sopenharmony_ci{
16962306a36Sopenharmony_ci	int count;
17062306a36Sopenharmony_ci	struct ctl_table *entry;
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	if (!net_eq(net, &init_net))
17362306a36Sopenharmony_ci		ensure_safe_net_sysctl(net, path, table, table_size);
17462306a36Sopenharmony_ci
17562306a36Sopenharmony_ci	entry = table;
17662306a36Sopenharmony_ci	for (count = 0 ; count < table_size && entry->procname; entry++, count++)
17762306a36Sopenharmony_ci		;
17862306a36Sopenharmony_ci
17962306a36Sopenharmony_ci	return __register_sysctl_table(&net->sysctls, path, table, count);
18062306a36Sopenharmony_ci}
18162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(register_net_sysctl_sz);
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_civoid unregister_net_sysctl_table(struct ctl_table_header *header)
18462306a36Sopenharmony_ci{
18562306a36Sopenharmony_ci	unregister_sysctl_table(header);
18662306a36Sopenharmony_ci}
18762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(unregister_net_sysctl_table);
188