2 * Copyright (c) 2021 Omar Polo <op@openbsd.org>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 #include <linux/landlock.h>
19 #include <sys/prctl.h>
20 #include <sys/syscall.h>
25 #include "got_compat.h"
28 * What's the deal with landlock? While distro with linux >= 5.13
29 * have the struct declarations, libc wrappers are missing. The
30 * sample landlock code provided by the authors includes these "shims"
31 * in their example for the landlock API until libc provides them.
34 #ifndef landlock_create_ruleset
36 landlock_create_ruleset(const struct landlock_ruleset_attr
*attr
, size_t size
,
39 return syscall(__NR_landlock_create_ruleset
, attr
, size
, flags
);
43 #ifndef landlock_add_rule
45 landlock_add_rule(int ruleset_fd
, enum landlock_rule_type type
,
46 const void *attr
, __u32 flags
)
48 return syscall(__NR_landlock_add_rule
, ruleset_fd
, type
, attr
, flags
);
52 #ifndef landlock_restrict_self
54 landlock_restrict_self(int ruleset_fd
, __u32 flags
)
56 return syscall(__NR_landlock_restrict_self
, ruleset_fd
, flags
);
61 * Maybe we should ship with a full copy of the linux headers because
65 #ifndef LANDLOCK_ACCESS_FS_REFER
66 #define LANDLOCK_ACCESS_FS_REFER (1ULL << 13)
69 #ifndef LANDLOCK_ACCESS_FS_TRUNCATE
70 #define LANDLOCK_ACCESS_FS_TRUNCATE (1ULL << 14)
74 * Revoke any fs access.
79 struct landlock_ruleset_attr rattr
= {
81 * List all capabilities currently defined by landlock.
82 * Failure in doing so will implicitly allow those actions
83 * (i.e. omitting READ_FILE will allow to read _any_ file.)
86 LANDLOCK_ACCESS_FS_EXECUTE
|
87 LANDLOCK_ACCESS_FS_READ_FILE
|
88 LANDLOCK_ACCESS_FS_READ_DIR
|
89 LANDLOCK_ACCESS_FS_WRITE_FILE
|
90 LANDLOCK_ACCESS_FS_REMOVE_DIR
|
91 LANDLOCK_ACCESS_FS_REMOVE_FILE
|
92 LANDLOCK_ACCESS_FS_MAKE_CHAR
|
93 LANDLOCK_ACCESS_FS_MAKE_DIR
|
94 LANDLOCK_ACCESS_FS_MAKE_REG
|
95 LANDLOCK_ACCESS_FS_MAKE_SOCK
|
96 LANDLOCK_ACCESS_FS_MAKE_FIFO
|
97 LANDLOCK_ACCESS_FS_MAKE_BLOCK
|
98 LANDLOCK_ACCESS_FS_MAKE_SYM
|
99 LANDLOCK_ACCESS_FS_REFER
|
100 LANDLOCK_ACCESS_FS_TRUNCATE
,
102 int fd
, abi
, saved_errno
;
104 if (prctl(PR_SET_NO_NEW_PRIVS
, 1, 0, 0, 0) == -1)
107 abi
= landlock_create_ruleset(NULL
, 0, LANDLOCK_CREATE_RULESET_VERSION
);
109 /* this kernel doesn't have landlock built in */
110 if (errno
== ENOSYS
|| errno
== EOPNOTSUPP
)
115 rattr
.handled_access_fs
&= ~LANDLOCK_ACCESS_FS_REFER
;
117 rattr
.handled_access_fs
&= ~LANDLOCK_ACCESS_FS_TRUNCATE
;
119 fd
= landlock_create_ruleset(&rattr
, sizeof(rattr
), 0);
123 if (landlock_restrict_self(fd
, 0)) {