Skip to content

Commit 0c0effb

Browse files
committed
landlock: Refactor filesystem access mask management
Replace get_raw_handled_fs_accesses() with a generic landlock_union_access_masks(), and replace get_fs_domain() with a generic landlock_get_applicable_domain(). These helpers will also be useful for other types of access. Cc: Mikhail Ivanov <[email protected]> Reviewed-by: Günther Noack <[email protected]> Link: https://lore.kernel.org/r/[email protected] [mic: Slightly improve doc as suggested by Günther] Signed-off-by: Mickaël Salaün <[email protected]>
1 parent 53b9d78 commit 0c0effb

File tree

3 files changed

+75
-32
lines changed

3 files changed

+75
-32
lines changed

security/landlock/fs.c

Lines changed: 8 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -388,38 +388,22 @@ static bool is_nouser_or_private(const struct dentry *dentry)
388388
unlikely(IS_PRIVATE(d_backing_inode(dentry))));
389389
}
390390

391-
static access_mask_t
392-
get_raw_handled_fs_accesses(const struct landlock_ruleset *const domain)
393-
{
394-
access_mask_t access_dom = 0;
395-
size_t layer_level;
396-
397-
for (layer_level = 0; layer_level < domain->num_layers; layer_level++)
398-
access_dom |=
399-
landlock_get_raw_fs_access_mask(domain, layer_level);
400-
return access_dom;
401-
}
402-
403391
static access_mask_t
404392
get_handled_fs_accesses(const struct landlock_ruleset *const domain)
405393
{
406394
/* Handles all initially denied by default access rights. */
407-
return get_raw_handled_fs_accesses(domain) |
395+
return landlock_union_access_masks(domain).fs |
408396
LANDLOCK_ACCESS_FS_INITIALLY_DENIED;
409397
}
410398

411-
static const struct landlock_ruleset *
412-
get_fs_domain(const struct landlock_ruleset *const domain)
413-
{
414-
if (!domain || !get_raw_handled_fs_accesses(domain))
415-
return NULL;
416-
417-
return domain;
418-
}
399+
static const struct access_masks any_fs = {
400+
.fs = ~0,
401+
};
419402

420403
static const struct landlock_ruleset *get_current_fs_domain(void)
421404
{
422-
return get_fs_domain(landlock_get_current_domain());
405+
return landlock_get_applicable_domain(landlock_get_current_domain(),
406+
any_fs);
423407
}
424408

425409
/*
@@ -1517,7 +1501,8 @@ static int hook_file_open(struct file *const file)
15171501
access_mask_t open_access_request, full_access_request, allowed_access,
15181502
optional_access;
15191503
const struct landlock_ruleset *const dom =
1520-
get_fs_domain(landlock_cred(file->f_cred)->domain);
1504+
landlock_get_applicable_domain(
1505+
landlock_cred(file->f_cred)->domain, any_fs);
15211506

15221507
if (!dom)
15231508
return 0;

security/landlock/ruleset.h

Lines changed: 66 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111

1212
#include <linux/bitops.h>
1313
#include <linux/build_bug.h>
14+
#include <linux/kernel.h>
1415
#include <linux/mutex.h>
1516
#include <linux/rbtree.h>
1617
#include <linux/refcount.h>
@@ -47,6 +48,15 @@ struct access_masks {
4748
access_mask_t scope : LANDLOCK_NUM_SCOPE;
4849
};
4950

51+
union access_masks_all {
52+
struct access_masks masks;
53+
u32 all;
54+
};
55+
56+
/* Makes sure all fields are covered. */
57+
static_assert(sizeof(typeof_member(union access_masks_all, masks)) ==
58+
sizeof(typeof_member(union access_masks_all, all)));
59+
5060
typedef u16 layer_mask_t;
5161
/* Makes sure all layers can be checked. */
5262
static_assert(BITS_PER_TYPE(layer_mask_t) >= LANDLOCK_MAX_NUM_LAYERS);
@@ -260,6 +270,61 @@ static inline void landlock_get_ruleset(struct landlock_ruleset *const ruleset)
260270
refcount_inc(&ruleset->usage);
261271
}
262272

273+
/**
274+
* landlock_union_access_masks - Return all access rights handled in the
275+
* domain
276+
*
277+
* @domain: Landlock ruleset (used as a domain)
278+
*
279+
* Returns: an access_masks result of the OR of all the domain's access masks.
280+
*/
281+
static inline struct access_masks
282+
landlock_union_access_masks(const struct landlock_ruleset *const domain)
283+
{
284+
union access_masks_all matches = {};
285+
size_t layer_level;
286+
287+
for (layer_level = 0; layer_level < domain->num_layers; layer_level++) {
288+
union access_masks_all layer = {
289+
.masks = domain->access_masks[layer_level],
290+
};
291+
292+
matches.all |= layer.all;
293+
}
294+
295+
return matches.masks;
296+
}
297+
298+
/**
299+
* landlock_get_applicable_domain - Return @domain if it applies to (handles)
300+
* at least one of the access rights specified
301+
* in @masks
302+
*
303+
* @domain: Landlock ruleset (used as a domain)
304+
* @masks: access masks
305+
*
306+
* Returns: @domain if any access rights specified in @masks is handled, or
307+
* NULL otherwise.
308+
*/
309+
static inline const struct landlock_ruleset *
310+
landlock_get_applicable_domain(const struct landlock_ruleset *const domain,
311+
const struct access_masks masks)
312+
{
313+
const union access_masks_all masks_all = {
314+
.masks = masks,
315+
};
316+
union access_masks_all merge = {};
317+
318+
if (!domain)
319+
return NULL;
320+
321+
merge.masks = landlock_union_access_masks(domain);
322+
if (merge.all & masks_all.all)
323+
return domain;
324+
325+
return NULL;
326+
}
327+
263328
static inline void
264329
landlock_add_fs_access_mask(struct landlock_ruleset *const ruleset,
265330
const access_mask_t fs_access_mask,
@@ -295,19 +360,12 @@ landlock_add_scope_mask(struct landlock_ruleset *const ruleset,
295360
ruleset->access_masks[layer_level].scope |= mask;
296361
}
297362

298-
static inline access_mask_t
299-
landlock_get_raw_fs_access_mask(const struct landlock_ruleset *const ruleset,
300-
const u16 layer_level)
301-
{
302-
return ruleset->access_masks[layer_level].fs;
303-
}
304-
305363
static inline access_mask_t
306364
landlock_get_fs_access_mask(const struct landlock_ruleset *const ruleset,
307365
const u16 layer_level)
308366
{
309367
/* Handles all initially denied by default access rights. */
310-
return landlock_get_raw_fs_access_mask(ruleset, layer_level) |
368+
return ruleset->access_masks[layer_level].fs |
311369
LANDLOCK_ACCESS_FS_INITIALLY_DENIED;
312370
}
313371

security/landlock/syscalls.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -329,7 +329,7 @@ static int add_rule_path_beneath(struct landlock_ruleset *const ruleset,
329329
return -ENOMSG;
330330

331331
/* Checks that allowed_access matches the @ruleset constraints. */
332-
mask = landlock_get_raw_fs_access_mask(ruleset, 0);
332+
mask = ruleset->access_masks[0].fs;
333333
if ((path_beneath_attr.allowed_access | mask) != mask)
334334
return -EINVAL;
335335

0 commit comments

Comments
 (0)