xref: /openbmc/linux/security/landlock/ruleset.h (revision c900529f3d9161bfde5cca0754f83b4d3c3e0220)
1ae271c1bSMickaël Salaün /* SPDX-License-Identifier: GPL-2.0-only */
2ae271c1bSMickaël Salaün /*
3ae271c1bSMickaël Salaün  * Landlock LSM - Ruleset management
4ae271c1bSMickaël Salaün  *
5ae271c1bSMickaël Salaün  * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net>
6ae271c1bSMickaël Salaün  * Copyright © 2018-2020 ANSSI
7ae271c1bSMickaël Salaün  */
8ae271c1bSMickaël Salaün 
9ae271c1bSMickaël Salaün #ifndef _SECURITY_LANDLOCK_RULESET_H
10ae271c1bSMickaël Salaün #define _SECURITY_LANDLOCK_RULESET_H
11ae271c1bSMickaël Salaün 
125f2ff33eSMickaël Salaün #include <linux/bitops.h>
135f2ff33eSMickaël Salaün #include <linux/build_bug.h>
14ae271c1bSMickaël Salaün #include <linux/mutex.h>
15ae271c1bSMickaël Salaün #include <linux/rbtree.h>
16ae271c1bSMickaël Salaün #include <linux/refcount.h>
17ae271c1bSMickaël Salaün #include <linux/workqueue.h>
18ae271c1bSMickaël Salaün 
195f2ff33eSMickaël Salaün #include "limits.h"
20ae271c1bSMickaël Salaün #include "object.h"
21ae271c1bSMickaël Salaün 
225f2ff33eSMickaël Salaün typedef u16 access_mask_t;
235f2ff33eSMickaël Salaün /* Makes sure all filesystem access rights can be stored. */
245f2ff33eSMickaël Salaün static_assert(BITS_PER_TYPE(access_mask_t) >= LANDLOCK_NUM_ACCESS_FS);
258ba0005fSMickaël Salaün /* Makes sure for_each_set_bit() and for_each_clear_bit() calls are OK. */
268ba0005fSMickaël Salaün static_assert(sizeof(unsigned long) >= sizeof(access_mask_t));
275f2ff33eSMickaël Salaün 
2875c542d6SMickaël Salaün typedef u16 layer_mask_t;
2975c542d6SMickaël Salaün /* Makes sure all layers can be checked. */
3075c542d6SMickaël Salaün static_assert(BITS_PER_TYPE(layer_mask_t) >= LANDLOCK_MAX_NUM_LAYERS);
3175c542d6SMickaël Salaün 
32ae271c1bSMickaël Salaün /**
33ae271c1bSMickaël Salaün  * struct landlock_layer - Access rights for a given layer
34ae271c1bSMickaël Salaün  */
35ae271c1bSMickaël Salaün struct landlock_layer {
36ae271c1bSMickaël Salaün 	/**
37ae271c1bSMickaël Salaün 	 * @level: Position of this layer in the layer stack.
38ae271c1bSMickaël Salaün 	 */
39ae271c1bSMickaël Salaün 	u16 level;
40ae271c1bSMickaël Salaün 	/**
41ae271c1bSMickaël Salaün 	 * @access: Bitfield of allowed actions on the kernel object.  They are
42ae271c1bSMickaël Salaün 	 * relative to the object type (e.g. %LANDLOCK_ACTION_FS_READ).
43ae271c1bSMickaël Salaün 	 */
445f2ff33eSMickaël Salaün 	access_mask_t access;
45ae271c1bSMickaël Salaün };
46ae271c1bSMickaël Salaün 
47ae271c1bSMickaël Salaün /**
48ae271c1bSMickaël Salaün  * struct landlock_rule - Access rights tied to an object
49ae271c1bSMickaël Salaün  */
50ae271c1bSMickaël Salaün struct landlock_rule {
51ae271c1bSMickaël Salaün 	/**
52ae271c1bSMickaël Salaün 	 * @node: Node in the ruleset's red-black tree.
53ae271c1bSMickaël Salaün 	 */
54ae271c1bSMickaël Salaün 	struct rb_node node;
55ae271c1bSMickaël Salaün 	/**
56ae271c1bSMickaël Salaün 	 * @object: Pointer to identify a kernel object (e.g. an inode).  This
57ae271c1bSMickaël Salaün 	 * is used as a key for this ruleset element.  This pointer is set once
58ae271c1bSMickaël Salaün 	 * and never modified.  It always points to an allocated object because
59ae271c1bSMickaël Salaün 	 * each rule increments the refcount of its object.
60ae271c1bSMickaël Salaün 	 */
61ae271c1bSMickaël Salaün 	struct landlock_object *object;
62ae271c1bSMickaël Salaün 	/**
63ae271c1bSMickaël Salaün 	 * @num_layers: Number of entries in @layers.
64ae271c1bSMickaël Salaün 	 */
65ae271c1bSMickaël Salaün 	u32 num_layers;
66ae271c1bSMickaël Salaün 	/**
67ae271c1bSMickaël Salaün 	 * @layers: Stack of layers, from the latest to the newest, implemented
68ae271c1bSMickaël Salaün 	 * as a flexible array member (FAM).
69ae271c1bSMickaël Salaün 	 */
70*246c713aSKees Cook 	struct landlock_layer layers[] __counted_by(num_layers);
71ae271c1bSMickaël Salaün };
72ae271c1bSMickaël Salaün 
73ae271c1bSMickaël Salaün /**
74ae271c1bSMickaël Salaün  * struct landlock_hierarchy - Node in a ruleset hierarchy
75ae271c1bSMickaël Salaün  */
76ae271c1bSMickaël Salaün struct landlock_hierarchy {
77ae271c1bSMickaël Salaün 	/**
78ae271c1bSMickaël Salaün 	 * @parent: Pointer to the parent node, or NULL if it is a root
79ae271c1bSMickaël Salaün 	 * Landlock domain.
80ae271c1bSMickaël Salaün 	 */
81ae271c1bSMickaël Salaün 	struct landlock_hierarchy *parent;
82ae271c1bSMickaël Salaün 	/**
83ae271c1bSMickaël Salaün 	 * @usage: Number of potential children domains plus their parent
84ae271c1bSMickaël Salaün 	 * domain.
85ae271c1bSMickaël Salaün 	 */
86ae271c1bSMickaël Salaün 	refcount_t usage;
87ae271c1bSMickaël Salaün };
88ae271c1bSMickaël Salaün 
89ae271c1bSMickaël Salaün /**
90ae271c1bSMickaël Salaün  * struct landlock_ruleset - Landlock ruleset
91ae271c1bSMickaël Salaün  *
92ae271c1bSMickaël Salaün  * This data structure must contain unique entries, be updatable, and quick to
93ae271c1bSMickaël Salaün  * match an object.
94ae271c1bSMickaël Salaün  */
95ae271c1bSMickaël Salaün struct landlock_ruleset {
96ae271c1bSMickaël Salaün 	/**
97ae271c1bSMickaël Salaün 	 * @root: Root of a red-black tree containing &struct landlock_rule
98ae271c1bSMickaël Salaün 	 * nodes.  Once a ruleset is tied to a process (i.e. as a domain), this
99ae271c1bSMickaël Salaün 	 * tree is immutable until @usage reaches zero.
100ae271c1bSMickaël Salaün 	 */
101ae271c1bSMickaël Salaün 	struct rb_root root;
102ae271c1bSMickaël Salaün 	/**
103ae271c1bSMickaël Salaün 	 * @hierarchy: Enables hierarchy identification even when a parent
104ae271c1bSMickaël Salaün 	 * domain vanishes.  This is needed for the ptrace protection.
105ae271c1bSMickaël Salaün 	 */
106ae271c1bSMickaël Salaün 	struct landlock_hierarchy *hierarchy;
107ae271c1bSMickaël Salaün 	union {
108ae271c1bSMickaël Salaün 		/**
109ae271c1bSMickaël Salaün 		 * @work_free: Enables to free a ruleset within a lockless
110ae271c1bSMickaël Salaün 		 * section.  This is only used by
111ae271c1bSMickaël Salaün 		 * landlock_put_ruleset_deferred() when @usage reaches zero.
112ae271c1bSMickaël Salaün 		 * The fields @lock, @usage, @num_rules, @num_layers and
113ae271c1bSMickaël Salaün 		 * @fs_access_masks are then unused.
114ae271c1bSMickaël Salaün 		 */
115ae271c1bSMickaël Salaün 		struct work_struct work_free;
116ae271c1bSMickaël Salaün 		struct {
117ae271c1bSMickaël Salaün 			/**
118ae271c1bSMickaël Salaün 			 * @lock: Protects against concurrent modifications of
119ae271c1bSMickaël Salaün 			 * @root, if @usage is greater than zero.
120ae271c1bSMickaël Salaün 			 */
121ae271c1bSMickaël Salaün 			struct mutex lock;
122ae271c1bSMickaël Salaün 			/**
123ae271c1bSMickaël Salaün 			 * @usage: Number of processes (i.e. domains) or file
124ae271c1bSMickaël Salaün 			 * descriptors referencing this ruleset.
125ae271c1bSMickaël Salaün 			 */
126ae271c1bSMickaël Salaün 			refcount_t usage;
127ae271c1bSMickaël Salaün 			/**
128ae271c1bSMickaël Salaün 			 * @num_rules: Number of non-overlapping (i.e. not for
129ae271c1bSMickaël Salaün 			 * the same object) rules in this ruleset.
130ae271c1bSMickaël Salaün 			 */
131ae271c1bSMickaël Salaün 			u32 num_rules;
132ae271c1bSMickaël Salaün 			/**
133ae271c1bSMickaël Salaün 			 * @num_layers: Number of layers that are used in this
134ae271c1bSMickaël Salaün 			 * ruleset.  This enables to check that all the layers
135ae271c1bSMickaël Salaün 			 * allow an access request.  A value of 0 identifies a
136ae271c1bSMickaël Salaün 			 * non-merged ruleset (i.e. not a domain).
137ae271c1bSMickaël Salaün 			 */
138ae271c1bSMickaël Salaün 			u32 num_layers;
139ae271c1bSMickaël Salaün 			/**
140ae271c1bSMickaël Salaün 			 * @fs_access_masks: Contains the subset of filesystem
141ae271c1bSMickaël Salaün 			 * actions that are restricted by a ruleset.  A domain
142ae271c1bSMickaël Salaün 			 * saves all layers of merged rulesets in a stack
143ae271c1bSMickaël Salaün 			 * (FAM), starting from the first layer to the last
144ae271c1bSMickaël Salaün 			 * one.  These layers are used when merging rulesets,
145ae271c1bSMickaël Salaün 			 * for user space backward compatibility (i.e.
146ae271c1bSMickaël Salaün 			 * future-proof), and to properly handle merged
147ae271c1bSMickaël Salaün 			 * rulesets without overlapping access rights.  These
148ae271c1bSMickaël Salaün 			 * layers are set once and never changed for the
149ae271c1bSMickaël Salaün 			 * lifetime of the ruleset.
150ae271c1bSMickaël Salaün 			 */
1515f2ff33eSMickaël Salaün 			access_mask_t fs_access_masks[];
152ae271c1bSMickaël Salaün 		};
153ae271c1bSMickaël Salaün 	};
154ae271c1bSMickaël Salaün };
155ae271c1bSMickaël Salaün 
1565f2ff33eSMickaël Salaün struct landlock_ruleset *
1575f2ff33eSMickaël Salaün landlock_create_ruleset(const access_mask_t fs_access_mask);
158ae271c1bSMickaël Salaün 
159ae271c1bSMickaël Salaün void landlock_put_ruleset(struct landlock_ruleset *const ruleset);
160ae271c1bSMickaël Salaün void landlock_put_ruleset_deferred(struct landlock_ruleset *const ruleset);
161ae271c1bSMickaël Salaün 
162ae271c1bSMickaël Salaün int landlock_insert_rule(struct landlock_ruleset *const ruleset,
16306a1c40aSMickaël Salaün 			 struct landlock_object *const object,
1645f2ff33eSMickaël Salaün 			 const access_mask_t access);
165ae271c1bSMickaël Salaün 
16606a1c40aSMickaël Salaün struct landlock_ruleset *
16706a1c40aSMickaël Salaün landlock_merge_ruleset(struct landlock_ruleset *const parent,
168ae271c1bSMickaël Salaün 		       struct landlock_ruleset *const ruleset);
169ae271c1bSMickaël Salaün 
17006a1c40aSMickaël Salaün const struct landlock_rule *
17106a1c40aSMickaël Salaün landlock_find_rule(const struct landlock_ruleset *const ruleset,
172ae271c1bSMickaël Salaün 		   const struct landlock_object *const object);
173ae271c1bSMickaël Salaün 
landlock_get_ruleset(struct landlock_ruleset * const ruleset)174ae271c1bSMickaël Salaün static inline void landlock_get_ruleset(struct landlock_ruleset *const ruleset)
175ae271c1bSMickaël Salaün {
176ae271c1bSMickaël Salaün 	if (ruleset)
177ae271c1bSMickaël Salaün 		refcount_inc(&ruleset->usage);
178ae271c1bSMickaël Salaün }
179ae271c1bSMickaël Salaün 
180ae271c1bSMickaël Salaün #endif /* _SECURITY_LANDLOCK_RULESET_H */
181