Skip to content

Commit 13fc645

Browse files
BoardzMasterl0kod
authored andcommitted
landlock: Make ruleset's access masks more generic
Rename ruleset's access masks and modify it's type to access_masks_t to support network type rules in following commits. Add filesystem helper functions to add and get filesystem mask. Signed-off-by: Konstantin Meskhidze <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Mickaël Salaün <[email protected]>
1 parent 05d3ef8 commit 13fc645

File tree

5 files changed

+50
-20
lines changed

5 files changed

+50
-20
lines changed

security/landlock/fs.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -178,9 +178,9 @@ int landlock_append_fs_rule(struct landlock_ruleset *const ruleset,
178178
return -EINVAL;
179179

180180
/* Transforms relative access rights to absolute ones. */
181-
access_rights |=
182-
LANDLOCK_MASK_ACCESS_FS &
183-
~(ruleset->fs_access_masks[0] | ACCESS_INITIALLY_DENIED);
181+
access_rights |= LANDLOCK_MASK_ACCESS_FS &
182+
~(landlock_get_fs_access_mask(ruleset, 0) |
183+
ACCESS_INITIALLY_DENIED);
184184
object = get_inode_object(d_backing_inode(path->dentry));
185185
if (IS_ERR(object))
186186
return PTR_ERR(object);
@@ -294,7 +294,7 @@ get_handled_accesses(const struct landlock_ruleset *const domain)
294294
size_t layer_level;
295295

296296
for (layer_level = 0; layer_level < domain->num_layers; layer_level++)
297-
access_dom |= domain->fs_access_masks[layer_level];
297+
access_dom |= landlock_get_fs_access_mask(domain, layer_level);
298298
return access_dom & LANDLOCK_MASK_ACCESS_FS;
299299
}
300300

@@ -336,7 +336,7 @@ init_layer_masks(const struct landlock_ruleset *const domain,
336336
* access rights.
337337
*/
338338
if (BIT_ULL(access_bit) &
339-
(domain->fs_access_masks[layer_level] |
339+
(landlock_get_fs_access_mask(domain, layer_level) |
340340
ACCESS_INITIALLY_DENIED)) {
341341
(*layer_masks)[access_bit] |=
342342
BIT_ULL(layer_level);

security/landlock/limits.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@
2121
#define LANDLOCK_LAST_ACCESS_FS LANDLOCK_ACCESS_FS_TRUNCATE
2222
#define LANDLOCK_MASK_ACCESS_FS ((LANDLOCK_LAST_ACCESS_FS << 1) - 1)
2323
#define LANDLOCK_NUM_ACCESS_FS __const_hweight64(LANDLOCK_MASK_ACCESS_FS)
24+
#define LANDLOCK_SHIFT_ACCESS_FS 0
2425

2526
/* clang-format on */
2627

security/landlock/ruleset.c

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ static struct landlock_ruleset *create_ruleset(const u32 num_layers)
2929
struct landlock_ruleset *new_ruleset;
3030

3131
new_ruleset =
32-
kzalloc(struct_size(new_ruleset, fs_access_masks, num_layers),
32+
kzalloc(struct_size(new_ruleset, access_masks, num_layers),
3333
GFP_KERNEL_ACCOUNT);
3434
if (!new_ruleset)
3535
return ERR_PTR(-ENOMEM);
@@ -40,7 +40,7 @@ static struct landlock_ruleset *create_ruleset(const u32 num_layers)
4040
/*
4141
* hierarchy = NULL
4242
* num_rules = 0
43-
* fs_access_masks[] = 0
43+
* access_masks[] = 0
4444
*/
4545
return new_ruleset;
4646
}
@@ -55,7 +55,7 @@ landlock_create_ruleset(const access_mask_t fs_access_mask)
5555
return ERR_PTR(-ENOMSG);
5656
new_ruleset = create_ruleset(1);
5757
if (!IS_ERR(new_ruleset))
58-
new_ruleset->fs_access_masks[0] = fs_access_mask;
58+
landlock_add_fs_access_mask(new_ruleset, fs_access_mask, 0);
5959
return new_ruleset;
6060
}
6161

@@ -117,11 +117,12 @@ static void build_check_ruleset(void)
117117
.num_rules = ~0,
118118
.num_layers = ~0,
119119
};
120-
typeof(ruleset.fs_access_masks[0]) fs_access_mask = ~0;
120+
typeof(ruleset.access_masks[0]) access_masks = ~0;
121121

122122
BUILD_BUG_ON(ruleset.num_rules < LANDLOCK_MAX_NUM_RULES);
123123
BUILD_BUG_ON(ruleset.num_layers < LANDLOCK_MAX_NUM_LAYERS);
124-
BUILD_BUG_ON(fs_access_mask < LANDLOCK_MASK_ACCESS_FS);
124+
BUILD_BUG_ON(access_masks <
125+
(LANDLOCK_MASK_ACCESS_FS << LANDLOCK_SHIFT_ACCESS_FS));
125126
}
126127

127128
/**
@@ -281,7 +282,7 @@ static int merge_ruleset(struct landlock_ruleset *const dst,
281282
err = -EINVAL;
282283
goto out_unlock;
283284
}
284-
dst->fs_access_masks[dst->num_layers - 1] = src->fs_access_masks[0];
285+
dst->access_masks[dst->num_layers - 1] = src->access_masks[0];
285286

286287
/* Merges the @src tree. */
287288
rbtree_postorder_for_each_entry_safe(walker_rule, next_rule, &src->root,
@@ -340,8 +341,8 @@ static int inherit_ruleset(struct landlock_ruleset *const parent,
340341
goto out_unlock;
341342
}
342343
/* Copies the parent layer stack and leaves a space for the new layer. */
343-
memcpy(child->fs_access_masks, parent->fs_access_masks,
344-
flex_array_size(parent, fs_access_masks, parent->num_layers));
344+
memcpy(child->access_masks, parent->access_masks,
345+
flex_array_size(parent, access_masks, parent->num_layers));
345346

346347
if (WARN_ON_ONCE(!parent->hierarchy)) {
347348
err = -EINVAL;

security/landlock/ruleset.h

Lines changed: 31 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@ static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_FS);
2525
/* Makes sure for_each_set_bit() and for_each_clear_bit() calls are OK. */
2626
static_assert(sizeof(unsigned long) >= sizeof(access_mask_t));
2727

28+
/* Ruleset access masks. */
29+
typedef u16 access_masks_t;
30+
/* Makes sure all ruleset access rights can be stored. */
31+
static_assert(BITS_PER_TYPE(access_masks_t) >= LANDLOCK_NUM_ACCESS_FS);
32+
2833
typedef u16 layer_mask_t;
2934
/* Makes sure all layers can be checked. */
3035
static_assert(BITS_PER_TYPE(layer_mask_t) >= LANDLOCK_MAX_NUM_LAYERS);
@@ -110,7 +115,7 @@ struct landlock_ruleset {
110115
* section. This is only used by
111116
* landlock_put_ruleset_deferred() when @usage reaches zero.
112117
* The fields @lock, @usage, @num_rules, @num_layers and
113-
* @fs_access_masks are then unused.
118+
* @access_masks are then unused.
114119
*/
115120
struct work_struct work_free;
116121
struct {
@@ -137,7 +142,7 @@ struct landlock_ruleset {
137142
*/
138143
u32 num_layers;
139144
/**
140-
* @fs_access_masks: Contains the subset of filesystem
145+
* @access_masks: Contains the subset of filesystem
141146
* actions that are restricted by a ruleset. A domain
142147
* saves all layers of merged rulesets in a stack
143148
* (FAM), starting from the first layer to the last
@@ -148,13 +153,13 @@ struct landlock_ruleset {
148153
* layers are set once and never changed for the
149154
* lifetime of the ruleset.
150155
*/
151-
access_mask_t fs_access_masks[];
156+
access_masks_t access_masks[];
152157
};
153158
};
154159
};
155160

156161
struct landlock_ruleset *
157-
landlock_create_ruleset(const access_mask_t fs_access_mask);
162+
landlock_create_ruleset(const access_mask_t access_mask);
158163

159164
void landlock_put_ruleset(struct landlock_ruleset *const ruleset);
160165
void landlock_put_ruleset_deferred(struct landlock_ruleset *const ruleset);
@@ -177,4 +182,26 @@ static inline void landlock_get_ruleset(struct landlock_ruleset *const ruleset)
177182
refcount_inc(&ruleset->usage);
178183
}
179184

185+
static inline void
186+
landlock_add_fs_access_mask(struct landlock_ruleset *const ruleset,
187+
const access_mask_t fs_access_mask,
188+
const u16 layer_level)
189+
{
190+
access_mask_t fs_mask = fs_access_mask & LANDLOCK_MASK_ACCESS_FS;
191+
192+
/* Should already be checked in sys_landlock_create_ruleset(). */
193+
WARN_ON_ONCE(fs_access_mask != fs_mask);
194+
ruleset->access_masks[layer_level] |=
195+
(fs_mask << LANDLOCK_SHIFT_ACCESS_FS);
196+
}
197+
198+
static inline access_mask_t
199+
landlock_get_fs_access_mask(const struct landlock_ruleset *const ruleset,
200+
const u16 layer_level)
201+
{
202+
return (ruleset->access_masks[layer_level] >>
203+
LANDLOCK_SHIFT_ACCESS_FS) &
204+
LANDLOCK_MASK_ACCESS_FS;
205+
}
206+
180207
#endif /* _SECURITY_LANDLOCK_RULESET_H */

security/landlock/syscalls.c

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -310,6 +310,7 @@ SYSCALL_DEFINE4(landlock_add_rule, const int, ruleset_fd,
310310
struct path path;
311311
struct landlock_ruleset *ruleset;
312312
int res, err;
313+
access_mask_t mask;
313314

314315
if (!landlock_initialized)
315316
return -EOPNOTSUPP;
@@ -346,10 +347,10 @@ SYSCALL_DEFINE4(landlock_add_rule, const int, ruleset_fd,
346347
}
347348
/*
348349
* Checks that allowed_access matches the @ruleset constraints
349-
* (ruleset->fs_access_masks[0] is automatically upgraded to 64-bits).
350+
* (ruleset->access_masks[0] is automatically upgraded to 64-bits).
350351
*/
351-
if ((path_beneath_attr.allowed_access | ruleset->fs_access_masks[0]) !=
352-
ruleset->fs_access_masks[0]) {
352+
mask = landlock_get_fs_access_mask(ruleset, 0);
353+
if ((path_beneath_attr.allowed_access | mask) != mask) {
353354
err = -EINVAL;
354355
goto out_put_ruleset;
355356
}

0 commit comments

Comments
 (0)