Landlock fix for v6.14-rc5
-----BEGIN PGP SIGNATURE----- iIYEABYKAC4WIQSVyBthFV4iTW/VU1/l49DojIL20gUCZ785FhAcbWljQGRpZ2lr b2QubmV0AAoJEOXj0OiMgvbSILQBAMFwpFClzjVeWyLFNd/gaTlPWeedvnag+yZu CK9q39jOAP9tj1unQBFpsI7jsTk6ZxPVxb4DymPIirZMb/5FuxUnDQ== =QrSM -----END PGP SIGNATURE----- Merge tag 'landlock-6.14-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/mic/linux Pull landlock fixes from Mickaël Salaün: "Fixes to TCP socket identification, documentation, and tests" * tag 'landlock-6.14-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/mic/linux: selftests/landlock: Add binaries to .gitignore selftests/landlock: Test that MPTCP actions are not restricted selftests/landlock: Test TCP accesses with protocol=IPPROTO_TCP landlock: Fix non-TCP sockets restriction landlock: Minor typo and grammar fixes in IPC scoping documentation landlock: Fix grammar error selftests/landlock: Enable the new CONFIG_AF_UNIX_OOB
This commit is contained in:
commit
c0d35086a2
8 changed files with 127 additions and 22 deletions
|
@ -8,7 +8,7 @@ Landlock: unprivileged access control
|
|||
=====================================
|
||||
|
||||
:Author: Mickaël Salaün
|
||||
:Date: October 2024
|
||||
:Date: January 2025
|
||||
|
||||
The goal of Landlock is to enable restriction of ambient rights (e.g. global
|
||||
filesystem or network access) for a set of processes. Because Landlock
|
||||
|
@ -329,11 +329,11 @@ non-sandboxed process, we can specify this restriction with
|
|||
A sandboxed process can connect to a non-sandboxed process when its domain is
|
||||
not scoped. If a process's domain is scoped, it can only connect to sockets
|
||||
created by processes in the same scope.
|
||||
Moreover, If a process is scoped to send signal to a non-scoped process, it can
|
||||
Moreover, if a process is scoped to send signal to a non-scoped process, it can
|
||||
only send signals to processes in the same scope.
|
||||
|
||||
A connected datagram socket behaves like a stream socket when its domain is
|
||||
scoped, meaning if the domain is scoped after the socket is connected , it can
|
||||
scoped, meaning if the domain is scoped after the socket is connected, it can
|
||||
still :manpage:`send(2)` data just like a stream socket. However, in the same
|
||||
scenario, a non-connected datagram socket cannot send data (with
|
||||
:manpage:`sendto(2)`) outside its scope.
|
||||
|
|
|
@ -268,7 +268,9 @@ struct landlock_net_port_attr {
|
|||
* ~~~~~~~~~~~~~~~~
|
||||
*
|
||||
* These flags enable to restrict a sandboxed process to a set of network
|
||||
* actions. This is supported since the Landlock ABI version 4.
|
||||
* actions.
|
||||
*
|
||||
* This is supported since Landlock ABI version 4.
|
||||
*
|
||||
* The following access rights apply to TCP port numbers:
|
||||
*
|
||||
|
@ -291,11 +293,13 @@ struct landlock_net_port_attr {
|
|||
* Setting a flag for a ruleset will isolate the Landlock domain to forbid
|
||||
* connections to resources outside the domain.
|
||||
*
|
||||
* This is supported since Landlock ABI version 6.
|
||||
*
|
||||
* Scopes:
|
||||
*
|
||||
* - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from
|
||||
* connecting to an abstract UNIX socket created by a process outside the
|
||||
* related Landlock domain (e.g. a parent domain or a non-sandboxed process).
|
||||
* related Landlock domain (e.g., a parent domain or a non-sandboxed process).
|
||||
* - %LANDLOCK_SCOPE_SIGNAL: Restrict a sandboxed process from sending a signal
|
||||
* to another process outside the domain.
|
||||
*/
|
||||
|
|
|
@ -63,8 +63,7 @@ static int current_check_access_socket(struct socket *const sock,
|
|||
if (WARN_ON_ONCE(dom->num_layers < 1))
|
||||
return -EACCES;
|
||||
|
||||
/* Checks if it's a (potential) TCP socket. */
|
||||
if (sock->type != SOCK_STREAM)
|
||||
if (!sk_is_tcp(sock->sk))
|
||||
return 0;
|
||||
|
||||
/* Checks for minimal header length to safely read sa_family. */
|
||||
|
|
|
@ -124,7 +124,7 @@ create_rule(const struct landlock_id id,
|
|||
return ERR_PTR(-ENOMEM);
|
||||
RB_CLEAR_NODE(&new_rule->node);
|
||||
if (is_object_pointer(id.type)) {
|
||||
/* This should be catched by insert_rule(). */
|
||||
/* This should have been caught by insert_rule(). */
|
||||
WARN_ON_ONCE(!id.key.object);
|
||||
landlock_get_object(id.key.object);
|
||||
}
|
||||
|
|
2
tools/testing/selftests/landlock/.gitignore
vendored
2
tools/testing/selftests/landlock/.gitignore
vendored
|
@ -1,2 +1,4 @@
|
|||
/*_test
|
||||
/sandbox-and-launch
|
||||
/true
|
||||
/wait-pipe
|
||||
|
|
|
@ -207,6 +207,7 @@ enforce_ruleset(struct __test_metadata *const _metadata, const int ruleset_fd)
|
|||
struct protocol_variant {
|
||||
int domain;
|
||||
int type;
|
||||
int protocol;
|
||||
};
|
||||
|
||||
struct service_fixture {
|
||||
|
|
|
@ -1,8 +1,11 @@
|
|||
CONFIG_AF_UNIX_OOB=y
|
||||
CONFIG_CGROUPS=y
|
||||
CONFIG_CGROUP_SCHED=y
|
||||
CONFIG_INET=y
|
||||
CONFIG_IPV6=y
|
||||
CONFIG_KEYS=y
|
||||
CONFIG_MPTCP=y
|
||||
CONFIG_MPTCP_IPV6=y
|
||||
CONFIG_NET=y
|
||||
CONFIG_NET_NS=y
|
||||
CONFIG_OVERLAY_FS=y
|
||||
|
|
|
@ -85,18 +85,18 @@ static void setup_loopback(struct __test_metadata *const _metadata)
|
|||
clear_ambient_cap(_metadata, CAP_NET_ADMIN);
|
||||
}
|
||||
|
||||
static bool prot_is_tcp(const struct protocol_variant *const prot)
|
||||
{
|
||||
return (prot->domain == AF_INET || prot->domain == AF_INET6) &&
|
||||
prot->type == SOCK_STREAM &&
|
||||
(prot->protocol == IPPROTO_TCP || prot->protocol == IPPROTO_IP);
|
||||
}
|
||||
|
||||
static bool is_restricted(const struct protocol_variant *const prot,
|
||||
const enum sandbox_type sandbox)
|
||||
{
|
||||
switch (prot->domain) {
|
||||
case AF_INET:
|
||||
case AF_INET6:
|
||||
switch (prot->type) {
|
||||
case SOCK_STREAM:
|
||||
return sandbox == TCP_SANDBOX;
|
||||
}
|
||||
break;
|
||||
}
|
||||
if (sandbox == TCP_SANDBOX)
|
||||
return prot_is_tcp(prot);
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -105,7 +105,7 @@ static int socket_variant(const struct service_fixture *const srv)
|
|||
int ret;
|
||||
|
||||
ret = socket(srv->protocol.domain, srv->protocol.type | SOCK_CLOEXEC,
|
||||
0);
|
||||
srv->protocol.protocol);
|
||||
if (ret < 0)
|
||||
return -errno;
|
||||
return ret;
|
||||
|
@ -290,22 +290,70 @@ FIXTURE_TEARDOWN(protocol)
|
|||
}
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp) {
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp1) {
|
||||
/* clang-format on */
|
||||
.sandbox = NO_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET,
|
||||
.type = SOCK_STREAM,
|
||||
/* IPPROTO_IP == 0 */
|
||||
.protocol = IPPROTO_IP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp) {
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp2) {
|
||||
/* clang-format on */
|
||||
.sandbox = NO_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_TCP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_mptcp) {
|
||||
/* clang-format on */
|
||||
.sandbox = NO_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_MPTCP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp1) {
|
||||
/* clang-format on */
|
||||
.sandbox = NO_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET6,
|
||||
.type = SOCK_STREAM,
|
||||
/* IPPROTO_IP == 0 */
|
||||
.protocol = IPPROTO_IP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp2) {
|
||||
/* clang-format on */
|
||||
.sandbox = NO_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET6,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_TCP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_mptcp) {
|
||||
/* clang-format on */
|
||||
.sandbox = NO_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET6,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_MPTCP,
|
||||
},
|
||||
};
|
||||
|
||||
|
@ -350,22 +398,70 @@ FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_datagram) {
|
|||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp) {
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp1) {
|
||||
/* clang-format on */
|
||||
.sandbox = TCP_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET,
|
||||
.type = SOCK_STREAM,
|
||||
/* IPPROTO_IP == 0 */
|
||||
.protocol = IPPROTO_IP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp) {
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp2) {
|
||||
/* clang-format on */
|
||||
.sandbox = TCP_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_TCP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_mptcp) {
|
||||
/* clang-format on */
|
||||
.sandbox = TCP_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_MPTCP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp1) {
|
||||
/* clang-format on */
|
||||
.sandbox = TCP_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET6,
|
||||
.type = SOCK_STREAM,
|
||||
/* IPPROTO_IP == 0 */
|
||||
.protocol = IPPROTO_IP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp2) {
|
||||
/* clang-format on */
|
||||
.sandbox = TCP_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET6,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_TCP,
|
||||
},
|
||||
};
|
||||
|
||||
/* clang-format off */
|
||||
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_mptcp) {
|
||||
/* clang-format on */
|
||||
.sandbox = TCP_SANDBOX,
|
||||
.prot = {
|
||||
.domain = AF_INET6,
|
||||
.type = SOCK_STREAM,
|
||||
.protocol = IPPROTO_MPTCP,
|
||||
},
|
||||
};
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue