mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-08-26 21:52:20 +00:00

Add audit support to the file_truncate and file_ioctl hooks. Add a deny_masks_t type and related helpers to store the domain's layer level per optional access rights (i.e. LANDLOCK_ACCESS_FS_TRUNCATE and LANDLOCK_ACCESS_FS_IOCTL_DEV) when opening a file, which cannot be inferred later. In practice, the landlock_file_security aligned blob size is still 16 bytes because this new one-byte deny_masks field follows the existing two-bytes allowed_access field and precede the packed fown_subject. Implementing deny_masks_t with a bitfield instead of a struct enables a generic implementation to store and extract layer levels. Add KUnit tests to check the identification of a layer level from a deny_masks_t, and the computation of a deny_masks_t from an access right with its layer level or a layer_mask_t array. Audit event sample: type=LANDLOCK_DENY msg=audit(1729738800.349:44): domain=195ba459b blockers=fs.ioctl_dev path="/dev/tty" dev="devtmpfs" ino=9 ioctlcmd=0x5401 Cc: Günther Noack <gnoack@google.com> Link: https://lore.kernel.org/r/20250320190717.2287696-15-mic@digikod.net Signed-off-by: Mickaël Salaün <mic@digikod.net>
101 lines
3.0 KiB
C
101 lines
3.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* Landlock - Access types and helpers
|
|
*
|
|
* Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net>
|
|
* Copyright © 2018-2020 ANSSI
|
|
* Copyright © 2024-2025 Microsoft Corporation
|
|
*/
|
|
|
|
#ifndef _SECURITY_LANDLOCK_ACCESS_H
|
|
#define _SECURITY_LANDLOCK_ACCESS_H
|
|
|
|
#include <linux/bitops.h>
|
|
#include <linux/build_bug.h>
|
|
#include <linux/kernel.h>
|
|
#include <uapi/linux/landlock.h>
|
|
|
|
#include "limits.h"
|
|
|
|
/*
|
|
* All access rights that are denied by default whether they are handled or not
|
|
* by a ruleset/layer. This must be ORed with all ruleset->access_masks[]
|
|
* entries when we need to get the absolute handled access masks, see
|
|
* landlock_upgrade_handled_access_masks().
|
|
*/
|
|
/* clang-format off */
|
|
#define _LANDLOCK_ACCESS_FS_INITIALLY_DENIED ( \
|
|
LANDLOCK_ACCESS_FS_REFER)
|
|
/* clang-format on */
|
|
|
|
/* clang-format off */
|
|
#define _LANDLOCK_ACCESS_FS_OPTIONAL ( \
|
|
LANDLOCK_ACCESS_FS_TRUNCATE | \
|
|
LANDLOCK_ACCESS_FS_IOCTL_DEV)
|
|
/* clang-format on */
|
|
|
|
typedef u16 access_mask_t;
|
|
|
|
/* Makes sure all filesystem access rights can be stored. */
|
|
static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_FS);
|
|
/* Makes sure all network access rights can be stored. */
|
|
static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_NET);
|
|
/* Makes sure all scoped rights can be stored. */
|
|
static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_SCOPE);
|
|
/* Makes sure for_each_set_bit() and for_each_clear_bit() calls are OK. */
|
|
static_assert(sizeof(unsigned long) >= sizeof(access_mask_t));
|
|
|
|
/* Ruleset access masks. */
|
|
struct access_masks {
|
|
access_mask_t fs : LANDLOCK_NUM_ACCESS_FS;
|
|
access_mask_t net : LANDLOCK_NUM_ACCESS_NET;
|
|
access_mask_t scope : LANDLOCK_NUM_SCOPE;
|
|
};
|
|
|
|
union access_masks_all {
|
|
struct access_masks masks;
|
|
u32 all;
|
|
};
|
|
|
|
/* Makes sure all fields are covered. */
|
|
static_assert(sizeof(typeof_member(union access_masks_all, masks)) ==
|
|
sizeof(typeof_member(union access_masks_all, all)));
|
|
|
|
typedef u16 layer_mask_t;
|
|
|
|
/* Makes sure all layers can be checked. */
|
|
static_assert(BITS_PER_TYPE(layer_mask_t) >= LANDLOCK_MAX_NUM_LAYERS);
|
|
|
|
/*
|
|
* Tracks domains responsible of a denied access. This is required to avoid
|
|
* storing in each object the full layer_masks[] required by update_request().
|
|
*/
|
|
typedef u8 deny_masks_t;
|
|
|
|
/*
|
|
* Makes sure all optional access rights can be tied to a layer index (cf.
|
|
* get_deny_mask).
|
|
*/
|
|
static_assert(BITS_PER_TYPE(deny_masks_t) >=
|
|
(HWEIGHT(LANDLOCK_MAX_NUM_LAYERS - 1) *
|
|
HWEIGHT(_LANDLOCK_ACCESS_FS_OPTIONAL)));
|
|
|
|
/* LANDLOCK_MAX_NUM_LAYERS must be a power of two (cf. deny_masks_t assert). */
|
|
static_assert(HWEIGHT(LANDLOCK_MAX_NUM_LAYERS) == 1);
|
|
|
|
/* Upgrades with all initially denied by default access rights. */
|
|
static inline struct access_masks
|
|
landlock_upgrade_handled_access_masks(struct access_masks access_masks)
|
|
{
|
|
/*
|
|
* All access rights that are denied by default whether they are
|
|
* explicitly handled or not.
|
|
*/
|
|
if (access_masks.fs)
|
|
access_masks.fs |= _LANDLOCK_ACCESS_FS_INITIALLY_DENIED;
|
|
|
|
return access_masks;
|
|
}
|
|
|
|
#endif /* _SECURITY_LANDLOCK_ACCESS_H */
|