xref: /openbmc/linux/security/landlock/ptrace.c (revision a266ef69)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Landlock LSM - Ptrace hooks
4  *
5  * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
6  * Copyright © 2019-2020 ANSSI
7  */
8 
9 #include <asm/current.h>
10 #include <linux/cred.h>
11 #include <linux/errno.h>
12 #include <linux/kernel.h>
13 #include <linux/lsm_hooks.h>
14 #include <linux/rcupdate.h>
15 #include <linux/sched.h>
16 
17 #include "common.h"
18 #include "cred.h"
19 #include "ptrace.h"
20 #include "ruleset.h"
21 #include "setup.h"
22 
23 /**
24  * domain_scope_le - Checks domain ordering for scoped ptrace
25  *
26  * @parent: Parent domain.
27  * @child: Potential child of @parent.
28  *
29  * Checks if the @parent domain is less or equal to (i.e. an ancestor, which
30  * means a subset of) the @child domain.
31  */
32 static bool domain_scope_le(const struct landlock_ruleset *const parent,
33 			    const struct landlock_ruleset *const child)
34 {
35 	const struct landlock_hierarchy *walker;
36 
37 	if (!parent)
38 		return true;
39 	if (!child)
40 		return false;
41 	for (walker = child->hierarchy; walker; walker = walker->parent) {
42 		if (walker == parent->hierarchy)
43 			/* @parent is in the scoped hierarchy of @child. */
44 			return true;
45 	}
46 	/* There is no relationship between @parent and @child. */
47 	return false;
48 }
49 
50 static bool task_is_scoped(const struct task_struct *const parent,
51 			   const struct task_struct *const child)
52 {
53 	bool is_scoped;
54 	const struct landlock_ruleset *dom_parent, *dom_child;
55 
56 	rcu_read_lock();
57 	dom_parent = landlock_get_task_domain(parent);
58 	dom_child = landlock_get_task_domain(child);
59 	is_scoped = domain_scope_le(dom_parent, dom_child);
60 	rcu_read_unlock();
61 	return is_scoped;
62 }
63 
64 static int task_ptrace(const struct task_struct *const parent,
65 		       const struct task_struct *const child)
66 {
67 	/* Quick return for non-landlocked tasks. */
68 	if (!landlocked(parent))
69 		return 0;
70 	if (task_is_scoped(parent, child))
71 		return 0;
72 	return -EPERM;
73 }
74 
75 /**
76  * hook_ptrace_access_check - Determines whether the current process may access
77  *			      another
78  *
79  * @child: Process to be accessed.
80  * @mode: Mode of attachment.
81  *
82  * If the current task has Landlock rules, then the child must have at least
83  * the same rules.  Else denied.
84  *
85  * Determines whether a process may access another, returning 0 if permission
86  * granted, -errno if denied.
87  */
88 static int hook_ptrace_access_check(struct task_struct *const child,
89 				    const unsigned int mode)
90 {
91 	return task_ptrace(current, child);
92 }
93 
94 /**
95  * hook_ptrace_traceme - Determines whether another process may trace the
96  *			 current one
97  *
98  * @parent: Task proposed to be the tracer.
99  *
100  * If the parent has Landlock rules, then the current task must have the same
101  * or more rules.  Else denied.
102  *
103  * Determines whether the nominated task is permitted to trace the current
104  * process, returning 0 if permission is granted, -errno if denied.
105  */
106 static int hook_ptrace_traceme(struct task_struct *const parent)
107 {
108 	return task_ptrace(parent, current);
109 }
110 
111 static struct security_hook_list landlock_hooks[] __lsm_ro_after_init = {
112 	LSM_HOOK_INIT(ptrace_access_check, hook_ptrace_access_check),
113 	LSM_HOOK_INIT(ptrace_traceme, hook_ptrace_traceme),
114 };
115 
116 __init void landlock_add_ptrace_hooks(void)
117 {
118 	security_add_hooks(landlock_hooks, ARRAY_SIZE(landlock_hooks),
119 			   LANDLOCK_NAME);
120 }
121