[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5jJQaxTOGgKCcApOiAX+ZnSgGQG6nU30hD0WeyQRcZ=zDg@mail.gmail.com>
Date: Tue, 18 Apr 2017 14:58:35 -0700
From: Kees Cook <keescook@...omium.org>
To: Mickaël Salaün <mic@...ikod.net>
Cc: LKML <linux-kernel@...r.kernel.org>,
Alexei Starovoitov <ast@...nel.org>,
Andy Lutomirski <luto@...capital.net>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
Casey Schaufler <casey@...aufler-ca.com>,
Daniel Borkmann <daniel@...earbox.net>,
David Drysdale <drysdale@...gle.com>,
"David S . Miller" <davem@...emloft.net>,
"Eric W . Biederman" <ebiederm@...ssion.com>,
James Morris <james.l.morris@...cle.com>,
Jann Horn <jann@...jh.net>, Jonathan Corbet <corbet@....net>,
Matthew Garrett <mjg59@...f.ucam.org>,
Michael Kerrisk <mtk.manpages@...il.com>,
Paul Moore <paul@...l-moore.com>,
Sargun Dhillon <sargun@...gun.me>,
"Serge E . Hallyn" <serge@...lyn.com>,
Shuah Khan <shuah@...nel.org>, Tejun Heo <tj@...nel.org>,
Thomas Graf <tgraf@...g.ch>, Will Drewry <wad@...omium.org>,
"kernel-hardening@...ts.openwall.com"
<kernel-hardening@...ts.openwall.com>,
Linux API <linux-api@...r.kernel.org>,
linux-security-module <linux-security-module@...r.kernel.org>,
Network Development <netdev@...r.kernel.org>
Subject: Re: [PATCH net-next v6 02/11] bpf,landlock: Define an eBPF program
type for Landlock
On Tue, Mar 28, 2017 at 4:46 PM, Mickaël Salaün <mic@...ikod.net> wrote:
> Add a new type of eBPF program used by Landlock rules.
>
> This new BPF program type will be registered with the Landlock LSM
> initialization.
>
> Add an initial Landlock Kconfig.
>
> Changes since v5:
> * rename file hooks.c to init.c
> * fix spelling
>
> Changes since v4:
> * merge a minimal (not enabled) LSM code and Kconfig in this commit
>
> Changes since v3:
> * split commit
> * revamp the landlock_context:
> * add arch, syscall_nr and syscall_cmd (ioctl, fcntl…) to be able to
> cross-check action with the event type
> * replace args array with dedicated fields to ease the addition of new
> fields
>
> Signed-off-by: Mickaël Salaün <mic@...ikod.net>
> Cc: Alexei Starovoitov <ast@...nel.org>
> Cc: Andy Lutomirski <luto@...capital.net>
> Cc: Daniel Borkmann <daniel@...earbox.net>
> Cc: David S. Miller <davem@...emloft.net>
> Cc: James Morris <james.l.morris@...cle.com>
> Cc: Kees Cook <keescook@...omium.org>
> Cc: Serge E. Hallyn <serge@...lyn.com>
> ---
> [...]
> +static inline bool bpf_landlock_is_valid_subtype(
> + union bpf_prog_subtype *prog_subtype)
> +{
> + if (WARN_ON(!prog_subtype))
> + return false;
> +
> + switch (prog_subtype->landlock_rule.event) {
> + case LANDLOCK_SUBTYPE_EVENT_FS:
> + break;
> + case LANDLOCK_SUBTYPE_EVENT_UNSPEC:
> + default:
> + return false;
> + }
> +
> + if (!prog_subtype->landlock_rule.version ||
> + prog_subtype->landlock_rule.version > LANDLOCK_VERSION)
> + return false;
> + if (!prog_subtype->landlock_rule.event ||
> + prog_subtype->landlock_rule.event > _LANDLOCK_SUBTYPE_EVENT_LAST)
> + return false;
> + if (prog_subtype->landlock_rule.ability & ~_LANDLOCK_SUBTYPE_ABILITY_MASK)
> + return false;
> + if (prog_subtype->landlock_rule.option & ~_LANDLOCK_SUBTYPE_OPTION_MASK)
> + return false;
> +
> + /* check ability flags */
> + if (prog_subtype->landlock_rule.ability & LANDLOCK_SUBTYPE_ABILITY_WRITE &&
> + !capable(CAP_SYS_ADMIN))
> + return false;
> + if (prog_subtype->landlock_rule.ability & LANDLOCK_SUBTYPE_ABILITY_DEBUG &&
> + !capable(CAP_SYS_ADMIN))
> + return false;
> +
> + return true;
> +}
I would add more comments for the rule and ability tests just to help
people read this.
> +
> +static inline const struct bpf_func_proto *bpf_landlock_func_proto(
> + enum bpf_func_id func_id, union bpf_prog_subtype *prog_subtype)
> +{
> + bool event_fs = (prog_subtype->landlock_rule.event ==
> + LANDLOCK_SUBTYPE_EVENT_FS);
> + bool ability_write = !!(prog_subtype->landlock_rule.ability &
> + LANDLOCK_SUBTYPE_ABILITY_WRITE);
> + bool ability_debug = !!(prog_subtype->landlock_rule.ability &
> + LANDLOCK_SUBTYPE_ABILITY_DEBUG);
> +
> + switch (func_id) {
> + case BPF_FUNC_map_lookup_elem:
> + return &bpf_map_lookup_elem_proto;
> +
> + /* ability_write */
> + case BPF_FUNC_map_delete_elem:
> + if (ability_write)
> + return &bpf_map_delete_elem_proto;
> + return NULL;
> + case BPF_FUNC_map_update_elem:
> + if (ability_write)
> + return &bpf_map_update_elem_proto;
> + return NULL;
> +
> + /* ability_debug */
> + case BPF_FUNC_get_current_comm:
> + if (ability_debug)
> + return &bpf_get_current_comm_proto;
> + return NULL;
> + case BPF_FUNC_get_current_pid_tgid:
> + if (ability_debug)
> + return &bpf_get_current_pid_tgid_proto;
> + return NULL;
> + case BPF_FUNC_get_current_uid_gid:
> + if (ability_debug)
> + return &bpf_get_current_uid_gid_proto;
> + return NULL;
> + case BPF_FUNC_trace_printk:
> + if (ability_debug)
> + return bpf_get_trace_printk_proto();
> + return NULL;
> +
> + default:
> + return NULL;
> + }
> +}
I find this switch statement mixed with the "if (ability...)" kind of
hard to read and a bit fragile. I think it'd be better written as:
switch (func_id) {
case BPF_FUNC_map_lookup_elem:
return ...
}
if (ability_write) {
switch (func_id) {
...
}
}
if (ability_debug) {
switch (func_id) {
...
}
}
return NULL;
Then it's self-documenting and it's harder to add a case without the
desired ability check...
> +static const struct bpf_verifier_ops bpf_landlock_ops = {
> + .get_func_proto = bpf_landlock_func_proto,
> + .is_valid_access = bpf_landlock_is_valid_access,
> + .is_valid_subtype = bpf_landlock_is_valid_subtype,
> +};
> +
> +static struct bpf_prog_type_list bpf_landlock_type __ro_after_init = {
> + .ops = &bpf_landlock_ops,
> + .type = BPF_PROG_TYPE_LANDLOCK,
> +};
Yay const and ro_after_init! :)
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists