2 677d90f7 2021-03-12 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 677d90f7 2021-03-12 op * Permission to use, copy, modify, and distribute this software for any
5 677d90f7 2021-03-12 op * purpose with or without fee is hereby granted, provided that the above
6 677d90f7 2021-03-12 op * copyright notice and this permission notice appear in all copies.
8 677d90f7 2021-03-12 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 677d90f7 2021-03-12 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 677d90f7 2021-03-12 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 677d90f7 2021-03-12 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 677d90f7 2021-03-12 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 677d90f7 2021-03-12 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 677d90f7 2021-03-12 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 a9d11f81 2021-10-08 op #include "compat.h"
19 f63b8f73 2022-04-24 op #include <limits.h>
21 4b877649 2021-10-07 op #include "fs.h"
22 754622a2 2021-03-15 op #include "telescope.h"
24 677d90f7 2021-03-12 op #ifdef __OpenBSD__
26 fced318d 2021-10-08 op # include <errno.h>
27 35e1f40a 2021-03-14 op # include <stdlib.h>
28 35e1f40a 2021-03-14 op # include <string.h>
29 2b1f38ab 2021-03-13 op # include <unistd.h>
32 17c10c65 2021-07-12 op sandbox_net_process(void)
34 677d90f7 2021-03-12 op if (pledge("stdio inet dns", NULL) == -1)
35 677d90f7 2021-03-12 op err(1, "pledge");
39 b1d4d01b 2021-03-14 op sandbox_ui_process(void)
41 35e1f40a 2021-03-14 op char path[PATH_MAX];
43 de2a69bb 2021-05-17 op if (unveil("/tmp", "rwc") == -1)
44 e9cb759e 2021-10-08 op err(1, "unveil(/tmp)");
46 35e1f40a 2021-03-14 op strlcpy(path, getenv("HOME"), sizeof(path));
47 35e1f40a 2021-03-14 op strlcat(path, "/Downloads", sizeof(path));
48 4380c692 2021-10-08 op if (unveil(path, "rwc") == -1 && errno != ENOENT)
49 fd0beb53 2021-10-07 op err(1, "unveil(%s)", path);
51 4b877649 2021-10-07 op if (unveil(config_path_base, "rwc") == -1)
52 fd0beb53 2021-10-07 op err(1, "unveil(%s)", config_path_base);
54 4b877649 2021-10-07 op if (unveil(data_path_base, "rwc") == -1)
55 fd0beb53 2021-10-07 op err(1, "unveil(%s)", data_path_base);
57 4b877649 2021-10-07 op if (unveil(cache_path_base, "rwc") == -1)
58 fd0beb53 2021-10-07 op err(1, "unveil(%s)", cache_path_base);
60 8f90b214 2022-08-16 op if (unveil("/bin/sh", "rx") == -1)
61 8f90b214 2022-08-16 op err(1, "unveil(xdg-open)");
63 8f90b214 2022-08-16 op if (pledge("stdio rpath wpath cpath unix tty proc exec",
65 35e1f40a 2021-03-14 op err(1, "pledge");
68 a9d11f81 2021-10-08 op #elif HAVE_LINUX_LANDLOCK_H
70 a9d11f81 2021-10-08 op #include <linux/landlock.h>
72 a9d11f81 2021-10-08 op #include <sys/prctl.h>
73 a9d11f81 2021-10-08 op #include <sys/stat.h>
74 a9d11f81 2021-10-08 op #include <sys/syscall.h>
76 fced318d 2021-10-08 op #include <errno.h>
77 a9d11f81 2021-10-08 op #include <fcntl.h>
78 a9d11f81 2021-10-08 op #include <stdlib.h>
79 a9d11f81 2021-10-08 op #include <string.h>
80 a9d11f81 2021-10-08 op #include <unistd.h>
83 a9d11f81 2021-10-08 op * What's the deal with landlock? While distro with linux >= 5.13
84 a9d11f81 2021-10-08 op * have the struct declarations, libc wrappers are missing. The
85 a9d11f81 2021-10-08 op * sample landlock code provided by the authors includes these "shims"
86 a9d11f81 2021-10-08 op * in their example for the landlock API until libc provides them.
88 a9d11f81 2021-10-08 op * Linux is such a mess sometimes. /rant
91 a9d11f81 2021-10-08 op #ifndef landlock_create_ruleset
92 a9d11f81 2021-10-08 op static inline int
93 a9d11f81 2021-10-08 op landlock_create_ruleset(const struct landlock_ruleset_attr *attr, size_t size,
96 a9d11f81 2021-10-08 op return syscall(__NR_landlock_create_ruleset, attr, size, flags);
100 a9d11f81 2021-10-08 op #ifndef landlock_add_rule
101 a9d11f81 2021-10-08 op static inline int
102 a9d11f81 2021-10-08 op landlock_add_rule(int ruleset_fd, enum landlock_rule_type type,
103 a9d11f81 2021-10-08 op const void *attr, __u32 flags)
105 a9d11f81 2021-10-08 op return syscall(__NR_landlock_add_rule, ruleset_fd, type, attr, flags);
109 a9d11f81 2021-10-08 op #ifndef landlock_restrict_self
110 a9d11f81 2021-10-08 op static inline int
111 a9d11f81 2021-10-08 op landlock_restrict_self(int ruleset_fd, __u32 flags)
113 a9d11f81 2021-10-08 op return syscall(__NR_landlock_restrict_self, ruleset_fd, flags);
118 a9d11f81 2021-10-08 op open_landlock(void)
121 a9d11f81 2021-10-08 op struct landlock_ruleset_attr attr = {
122 35ae81fd 2022-02-10 op .handled_access_fs = LANDLOCK_ACCESS_FS_EXECUTE |
123 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_READ_FILE |
124 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_READ_DIR |
125 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_WRITE_FILE |
126 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_REMOVE_DIR |
127 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_REMOVE_FILE |
128 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_CHAR |
129 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_DIR |
130 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_REG |
131 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_SOCK |
132 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_FIFO |
133 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_BLOCK |
134 35ae81fd 2022-02-10 op LANDLOCK_ACCESS_FS_MAKE_SYM,
137 4ab3b651 2021-11-29 op fd = landlock_create_ruleset(&attr, sizeof(attr), 0);
138 4ab3b651 2021-11-29 op if (fd == -1) {
139 4ab3b651 2021-11-29 op switch (errno) {
141 4ab3b651 2021-11-29 op case EOPNOTSUPP:
144 4ab3b651 2021-11-29 op err(1, "can't create landlock ruleset");
151 a9d11f81 2021-10-08 op landlock_unveil(int landlock_fd, const char *path, int perms)
153 a9d11f81 2021-10-08 op struct landlock_path_beneath_attr pb;
154 a9d11f81 2021-10-08 op int err, saved_errno;
156 a9d11f81 2021-10-08 op pb.allowed_access = perms;
158 a9d11f81 2021-10-08 op if ((pb.parent_fd = open(path, O_PATH)) == -1)
161 a9d11f81 2021-10-08 op err = landlock_add_rule(landlock_fd, LANDLOCK_RULE_PATH_BENEATH,
163 a9d11f81 2021-10-08 op saved_errno = errno;
164 a9d11f81 2021-10-08 op close(pb.parent_fd);
165 a9d11f81 2021-10-08 op errno = saved_errno;
166 a9d11f81 2021-10-08 op return err ? -1 : 0;
170 a9d11f81 2021-10-08 op landlock_apply(int fd)
172 a9d11f81 2021-10-08 op int r, saved_errno;
174 a9d11f81 2021-10-08 op if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) == -1)
175 a9d11f81 2021-10-08 op err(1, "%s: prctl(PR_SET_NO_NEW_PRIVS)", __func__);
177 a9d11f81 2021-10-08 op r = landlock_restrict_self(fd, 0);
178 a9d11f81 2021-10-08 op saved_errno = errno;
180 a9d11f81 2021-10-08 op errno = saved_errno;
181 a9d11f81 2021-10-08 op return r ? -1 : 0;
185 a9d11f81 2021-10-08 op landlock_no_fs(void)
190 4ab3b651 2021-11-29 op * XXX: landlock disabled at runtime, pretend everything's
193 a9d11f81 2021-10-08 op if ((fd = open_landlock()) == -1)
196 a9d11f81 2021-10-08 op return landlock_apply(fd);
200 a9d11f81 2021-10-08 op sandbox_net_process(void)
203 ed1d237e 2021-11-27 op * We don't know what paths are required for the TLS stack.
204 ed1d237e 2021-11-27 op * Yes, it sucks.
210 a9d11f81 2021-10-08 op sandbox_ui_process(void)
213 f63b8f73 2022-04-24 op * Needs to be able to read files *and* execute programs,
214 f63b8f73 2022-04-24 op * can't be sandboxed.
221 68a9b7d2 2021-03-13 op #warning "No sandbox for this OS"
224 17c10c65 2021-07-12 op sandbox_net_process(void)
230 35e1f40a 2021-03-14 op sandbox_ui_process(void)