Commit 13fc6455 authored by Konstantin Meskhidze's avatar Konstantin Meskhidze Committed by Mickaël Salaün

landlock: Make ruleset's access masks more generic

Rename ruleset's access masks and modify it's type to access_masks_t
to support network type rules in following commits. Add filesystem
helper functions to add and get filesystem mask.
Signed-off-by: default avatarKonstantin Meskhidze <konstantin.meskhidze@huawei.com>
Link: https://lore.kernel.org/r/20231026014751.414649-2-konstantin.meskhidze@huawei.comSigned-off-by: default avatarMickaël Salaün <mic@digikod.net>
parent 05d3ef8b
...@@ -178,9 +178,9 @@ int landlock_append_fs_rule(struct landlock_ruleset *const ruleset, ...@@ -178,9 +178,9 @@ int landlock_append_fs_rule(struct landlock_ruleset *const ruleset,
return -EINVAL; return -EINVAL;
/* Transforms relative access rights to absolute ones. */ /* Transforms relative access rights to absolute ones. */
access_rights |= access_rights |= LANDLOCK_MASK_ACCESS_FS &
LANDLOCK_MASK_ACCESS_FS & ~(landlock_get_fs_access_mask(ruleset, 0) |
~(ruleset->fs_access_masks[0] | ACCESS_INITIALLY_DENIED); ACCESS_INITIALLY_DENIED);
object = get_inode_object(d_backing_inode(path->dentry)); object = get_inode_object(d_backing_inode(path->dentry));
if (IS_ERR(object)) if (IS_ERR(object))
return PTR_ERR(object); return PTR_ERR(object);
...@@ -294,7 +294,7 @@ get_handled_accesses(const struct landlock_ruleset *const domain) ...@@ -294,7 +294,7 @@ get_handled_accesses(const struct landlock_ruleset *const domain)
size_t layer_level; size_t layer_level;
for (layer_level = 0; layer_level < domain->num_layers; layer_level++) for (layer_level = 0; layer_level < domain->num_layers; layer_level++)
access_dom |= domain->fs_access_masks[layer_level]; access_dom |= landlock_get_fs_access_mask(domain, layer_level);
return access_dom & LANDLOCK_MASK_ACCESS_FS; return access_dom & LANDLOCK_MASK_ACCESS_FS;
} }
...@@ -336,7 +336,7 @@ init_layer_masks(const struct landlock_ruleset *const domain, ...@@ -336,7 +336,7 @@ init_layer_masks(const struct landlock_ruleset *const domain,
* access rights. * access rights.
*/ */
if (BIT_ULL(access_bit) & if (BIT_ULL(access_bit) &
(domain->fs_access_masks[layer_level] | (landlock_get_fs_access_mask(domain, layer_level) |
ACCESS_INITIALLY_DENIED)) { ACCESS_INITIALLY_DENIED)) {
(*layer_masks)[access_bit] |= (*layer_masks)[access_bit] |=
BIT_ULL(layer_level); BIT_ULL(layer_level);
......
...@@ -21,6 +21,7 @@ ...@@ -21,6 +21,7 @@
#define LANDLOCK_LAST_ACCESS_FS LANDLOCK_ACCESS_FS_TRUNCATE #define LANDLOCK_LAST_ACCESS_FS LANDLOCK_ACCESS_FS_TRUNCATE
#define LANDLOCK_MASK_ACCESS_FS ((LANDLOCK_LAST_ACCESS_FS << 1) - 1) #define LANDLOCK_MASK_ACCESS_FS ((LANDLOCK_LAST_ACCESS_FS << 1) - 1)
#define LANDLOCK_NUM_ACCESS_FS __const_hweight64(LANDLOCK_MASK_ACCESS_FS) #define LANDLOCK_NUM_ACCESS_FS __const_hweight64(LANDLOCK_MASK_ACCESS_FS)
#define LANDLOCK_SHIFT_ACCESS_FS 0
/* clang-format on */ /* clang-format on */
......
...@@ -29,7 +29,7 @@ static struct landlock_ruleset *create_ruleset(const u32 num_layers) ...@@ -29,7 +29,7 @@ static struct landlock_ruleset *create_ruleset(const u32 num_layers)
struct landlock_ruleset *new_ruleset; struct landlock_ruleset *new_ruleset;
new_ruleset = new_ruleset =
kzalloc(struct_size(new_ruleset, fs_access_masks, num_layers), kzalloc(struct_size(new_ruleset, access_masks, num_layers),
GFP_KERNEL_ACCOUNT); GFP_KERNEL_ACCOUNT);
if (!new_ruleset) if (!new_ruleset)
return ERR_PTR(-ENOMEM); return ERR_PTR(-ENOMEM);
...@@ -40,7 +40,7 @@ static struct landlock_ruleset *create_ruleset(const u32 num_layers) ...@@ -40,7 +40,7 @@ static struct landlock_ruleset *create_ruleset(const u32 num_layers)
/* /*
* hierarchy = NULL * hierarchy = NULL
* num_rules = 0 * num_rules = 0
* fs_access_masks[] = 0 * access_masks[] = 0
*/ */
return new_ruleset; return new_ruleset;
} }
...@@ -55,7 +55,7 @@ landlock_create_ruleset(const access_mask_t fs_access_mask) ...@@ -55,7 +55,7 @@ landlock_create_ruleset(const access_mask_t fs_access_mask)
return ERR_PTR(-ENOMSG); return ERR_PTR(-ENOMSG);
new_ruleset = create_ruleset(1); new_ruleset = create_ruleset(1);
if (!IS_ERR(new_ruleset)) if (!IS_ERR(new_ruleset))
new_ruleset->fs_access_masks[0] = fs_access_mask; landlock_add_fs_access_mask(new_ruleset, fs_access_mask, 0);
return new_ruleset; return new_ruleset;
} }
...@@ -117,11 +117,12 @@ static void build_check_ruleset(void) ...@@ -117,11 +117,12 @@ static void build_check_ruleset(void)
.num_rules = ~0, .num_rules = ~0,
.num_layers = ~0, .num_layers = ~0,
}; };
typeof(ruleset.fs_access_masks[0]) fs_access_mask = ~0; typeof(ruleset.access_masks[0]) access_masks = ~0;
BUILD_BUG_ON(ruleset.num_rules < LANDLOCK_MAX_NUM_RULES); BUILD_BUG_ON(ruleset.num_rules < LANDLOCK_MAX_NUM_RULES);
BUILD_BUG_ON(ruleset.num_layers < LANDLOCK_MAX_NUM_LAYERS); BUILD_BUG_ON(ruleset.num_layers < LANDLOCK_MAX_NUM_LAYERS);
BUILD_BUG_ON(fs_access_mask < LANDLOCK_MASK_ACCESS_FS); BUILD_BUG_ON(access_masks <
(LANDLOCK_MASK_ACCESS_FS << LANDLOCK_SHIFT_ACCESS_FS));
} }
/** /**
...@@ -281,7 +282,7 @@ static int merge_ruleset(struct landlock_ruleset *const dst, ...@@ -281,7 +282,7 @@ static int merge_ruleset(struct landlock_ruleset *const dst,
err = -EINVAL; err = -EINVAL;
goto out_unlock; goto out_unlock;
} }
dst->fs_access_masks[dst->num_layers - 1] = src->fs_access_masks[0]; dst->access_masks[dst->num_layers - 1] = src->access_masks[0];
/* Merges the @src tree. */ /* Merges the @src tree. */
rbtree_postorder_for_each_entry_safe(walker_rule, next_rule, &src->root, rbtree_postorder_for_each_entry_safe(walker_rule, next_rule, &src->root,
...@@ -340,8 +341,8 @@ static int inherit_ruleset(struct landlock_ruleset *const parent, ...@@ -340,8 +341,8 @@ static int inherit_ruleset(struct landlock_ruleset *const parent,
goto out_unlock; goto out_unlock;
} }
/* Copies the parent layer stack and leaves a space for the new layer. */ /* Copies the parent layer stack and leaves a space for the new layer. */
memcpy(child->fs_access_masks, parent->fs_access_masks, memcpy(child->access_masks, parent->access_masks,
flex_array_size(parent, fs_access_masks, parent->num_layers)); flex_array_size(parent, access_masks, parent->num_layers));
if (WARN_ON_ONCE(!parent->hierarchy)) { if (WARN_ON_ONCE(!parent->hierarchy)) {
err = -EINVAL; err = -EINVAL;
......
...@@ -25,6 +25,11 @@ static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_FS); ...@@ -25,6 +25,11 @@ static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_FS);
/* Makes sure for_each_set_bit() and for_each_clear_bit() calls are OK. */ /* Makes sure for_each_set_bit() and for_each_clear_bit() calls are OK. */
static_assert(sizeof(unsigned long) >= sizeof(access_mask_t)); static_assert(sizeof(unsigned long) >= sizeof(access_mask_t));
/* Ruleset access masks. */
typedef u16 access_masks_t;
/* Makes sure all ruleset access rights can be stored. */
static_assert(BITS_PER_TYPE(access_masks_t) >= LANDLOCK_NUM_ACCESS_FS);
typedef u16 layer_mask_t; typedef u16 layer_mask_t;
/* Makes sure all layers can be checked. */ /* Makes sure all layers can be checked. */
static_assert(BITS_PER_TYPE(layer_mask_t) >= LANDLOCK_MAX_NUM_LAYERS); static_assert(BITS_PER_TYPE(layer_mask_t) >= LANDLOCK_MAX_NUM_LAYERS);
...@@ -110,7 +115,7 @@ struct landlock_ruleset { ...@@ -110,7 +115,7 @@ struct landlock_ruleset {
* section. This is only used by * section. This is only used by
* landlock_put_ruleset_deferred() when @usage reaches zero. * landlock_put_ruleset_deferred() when @usage reaches zero.
* The fields @lock, @usage, @num_rules, @num_layers and * The fields @lock, @usage, @num_rules, @num_layers and
* @fs_access_masks are then unused. * @access_masks are then unused.
*/ */
struct work_struct work_free; struct work_struct work_free;
struct { struct {
...@@ -137,7 +142,7 @@ struct landlock_ruleset { ...@@ -137,7 +142,7 @@ struct landlock_ruleset {
*/ */
u32 num_layers; u32 num_layers;
/** /**
* @fs_access_masks: Contains the subset of filesystem * @access_masks: Contains the subset of filesystem
* actions that are restricted by a ruleset. A domain * actions that are restricted by a ruleset. A domain
* saves all layers of merged rulesets in a stack * saves all layers of merged rulesets in a stack
* (FAM), starting from the first layer to the last * (FAM), starting from the first layer to the last
...@@ -148,13 +153,13 @@ struct landlock_ruleset { ...@@ -148,13 +153,13 @@ struct landlock_ruleset {
* layers are set once and never changed for the * layers are set once and never changed for the
* lifetime of the ruleset. * lifetime of the ruleset.
*/ */
access_mask_t fs_access_masks[]; access_masks_t access_masks[];
}; };
}; };
}; };
struct landlock_ruleset * struct landlock_ruleset *
landlock_create_ruleset(const access_mask_t fs_access_mask); landlock_create_ruleset(const access_mask_t access_mask);
void landlock_put_ruleset(struct landlock_ruleset *const ruleset); void landlock_put_ruleset(struct landlock_ruleset *const ruleset);
void landlock_put_ruleset_deferred(struct landlock_ruleset *const ruleset); void landlock_put_ruleset_deferred(struct landlock_ruleset *const ruleset);
...@@ -177,4 +182,26 @@ static inline void landlock_get_ruleset(struct landlock_ruleset *const ruleset) ...@@ -177,4 +182,26 @@ static inline void landlock_get_ruleset(struct landlock_ruleset *const ruleset)
refcount_inc(&ruleset->usage); refcount_inc(&ruleset->usage);
} }
static inline void
landlock_add_fs_access_mask(struct landlock_ruleset *const ruleset,
const access_mask_t fs_access_mask,
const u16 layer_level)
{
access_mask_t fs_mask = fs_access_mask & LANDLOCK_MASK_ACCESS_FS;
/* Should already be checked in sys_landlock_create_ruleset(). */
WARN_ON_ONCE(fs_access_mask != fs_mask);
ruleset->access_masks[layer_level] |=
(fs_mask << LANDLOCK_SHIFT_ACCESS_FS);
}
static inline access_mask_t
landlock_get_fs_access_mask(const struct landlock_ruleset *const ruleset,
const u16 layer_level)
{
return (ruleset->access_masks[layer_level] >>
LANDLOCK_SHIFT_ACCESS_FS) &
LANDLOCK_MASK_ACCESS_FS;
}
#endif /* _SECURITY_LANDLOCK_RULESET_H */ #endif /* _SECURITY_LANDLOCK_RULESET_H */
...@@ -310,6 +310,7 @@ SYSCALL_DEFINE4(landlock_add_rule, const int, ruleset_fd, ...@@ -310,6 +310,7 @@ SYSCALL_DEFINE4(landlock_add_rule, const int, ruleset_fd,
struct path path; struct path path;
struct landlock_ruleset *ruleset; struct landlock_ruleset *ruleset;
int res, err; int res, err;
access_mask_t mask;
if (!landlock_initialized) if (!landlock_initialized)
return -EOPNOTSUPP; return -EOPNOTSUPP;
...@@ -346,10 +347,10 @@ SYSCALL_DEFINE4(landlock_add_rule, const int, ruleset_fd, ...@@ -346,10 +347,10 @@ SYSCALL_DEFINE4(landlock_add_rule, const int, ruleset_fd,
} }
/* /*
* Checks that allowed_access matches the @ruleset constraints * Checks that allowed_access matches the @ruleset constraints
* (ruleset->fs_access_masks[0] is automatically upgraded to 64-bits). * (ruleset->access_masks[0] is automatically upgraded to 64-bits).
*/ */
if ((path_beneath_attr.allowed_access | ruleset->fs_access_masks[0]) != mask = landlock_get_fs_access_mask(ruleset, 0);
ruleset->fs_access_masks[0]) { if ((path_beneath_attr.allowed_access | mask) != mask) {
err = -EINVAL; err = -EINVAL;
goto out_put_ruleset; goto out_put_ruleset;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment