mirror of
https://github.com/torvalds/linux.git
synced 2024-12-07 19:41:31 +00:00
69fe8ec4f6
Instead of tracking passed = 0/1 rename the field to exit_code and invert the values so that they match the KSFT_* exit codes. This will allow us to fold SKIP / XFAIL into the same value. Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: David S. Miller <davem@davemloft.net>
1805 lines
44 KiB
C
1805 lines
44 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Landlock tests - Network
|
|
*
|
|
* Copyright © 2022-2023 Huawei Tech. Co., Ltd.
|
|
* Copyright © 2023 Microsoft Corporation
|
|
*/
|
|
|
|
#define _GNU_SOURCE
|
|
#include <arpa/inet.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <linux/landlock.h>
|
|
#include <linux/in.h>
|
|
#include <sched.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <sys/prctl.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/syscall.h>
|
|
#include <sys/un.h>
|
|
|
|
#include "common.h"
|
|
|
|
const short sock_port_start = (1 << 10);
|
|
|
|
static const char loopback_ipv4[] = "127.0.0.1";
|
|
static const char loopback_ipv6[] = "::1";
|
|
|
|
/* Number pending connections queue to be hold. */
|
|
const short backlog = 10;
|
|
|
|
enum sandbox_type {
|
|
NO_SANDBOX,
|
|
/* This may be used to test rules that allow *and* deny accesses. */
|
|
TCP_SANDBOX,
|
|
};
|
|
|
|
struct protocol_variant {
|
|
int domain;
|
|
int type;
|
|
};
|
|
|
|
struct service_fixture {
|
|
struct protocol_variant protocol;
|
|
/* port is also stored in ipv4_addr.sin_port or ipv6_addr.sin6_port */
|
|
unsigned short port;
|
|
union {
|
|
struct sockaddr_in ipv4_addr;
|
|
struct sockaddr_in6 ipv6_addr;
|
|
struct {
|
|
struct sockaddr_un unix_addr;
|
|
socklen_t unix_addr_len;
|
|
};
|
|
};
|
|
};
|
|
|
|
static pid_t sys_gettid(void)
|
|
{
|
|
return syscall(__NR_gettid);
|
|
}
|
|
|
|
static int set_service(struct service_fixture *const srv,
|
|
const struct protocol_variant prot,
|
|
const unsigned short index)
|
|
{
|
|
memset(srv, 0, sizeof(*srv));
|
|
|
|
/*
|
|
* Copies all protocol properties in case of the variant only contains
|
|
* a subset of them.
|
|
*/
|
|
srv->protocol = prot;
|
|
|
|
/* Checks for port overflow. */
|
|
if (index > 2)
|
|
return 1;
|
|
srv->port = sock_port_start << (2 * index);
|
|
|
|
switch (prot.domain) {
|
|
case AF_UNSPEC:
|
|
case AF_INET:
|
|
srv->ipv4_addr.sin_family = prot.domain;
|
|
srv->ipv4_addr.sin_port = htons(srv->port);
|
|
srv->ipv4_addr.sin_addr.s_addr = inet_addr(loopback_ipv4);
|
|
return 0;
|
|
|
|
case AF_INET6:
|
|
srv->ipv6_addr.sin6_family = prot.domain;
|
|
srv->ipv6_addr.sin6_port = htons(srv->port);
|
|
inet_pton(AF_INET6, loopback_ipv6, &srv->ipv6_addr.sin6_addr);
|
|
return 0;
|
|
|
|
case AF_UNIX:
|
|
srv->unix_addr.sun_family = prot.domain;
|
|
sprintf(srv->unix_addr.sun_path,
|
|
"_selftests-landlock-net-tid%d-index%d", sys_gettid(),
|
|
index);
|
|
srv->unix_addr_len = SUN_LEN(&srv->unix_addr);
|
|
srv->unix_addr.sun_path[0] = '\0';
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
static void setup_loopback(struct __test_metadata *const _metadata)
|
|
{
|
|
set_cap(_metadata, CAP_SYS_ADMIN);
|
|
ASSERT_EQ(0, unshare(CLONE_NEWNET));
|
|
clear_cap(_metadata, CAP_SYS_ADMIN);
|
|
|
|
set_ambient_cap(_metadata, CAP_NET_ADMIN);
|
|
ASSERT_EQ(0, system("ip link set dev lo up"));
|
|
clear_ambient_cap(_metadata, CAP_NET_ADMIN);
|
|
}
|
|
|
|
static bool is_restricted(const struct protocol_variant *const prot,
|
|
const enum sandbox_type sandbox)
|
|
{
|
|
switch (prot->domain) {
|
|
case AF_INET:
|
|
case AF_INET6:
|
|
switch (prot->type) {
|
|
case SOCK_STREAM:
|
|
return sandbox == TCP_SANDBOX;
|
|
}
|
|
break;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static int socket_variant(const struct service_fixture *const srv)
|
|
{
|
|
int ret;
|
|
|
|
ret = socket(srv->protocol.domain, srv->protocol.type | SOCK_CLOEXEC,
|
|
0);
|
|
if (ret < 0)
|
|
return -errno;
|
|
return ret;
|
|
}
|
|
|
|
#ifndef SIN6_LEN_RFC2133
|
|
#define SIN6_LEN_RFC2133 24
|
|
#endif
|
|
|
|
static socklen_t get_addrlen(const struct service_fixture *const srv,
|
|
const bool minimal)
|
|
{
|
|
switch (srv->protocol.domain) {
|
|
case AF_UNSPEC:
|
|
case AF_INET:
|
|
return sizeof(srv->ipv4_addr);
|
|
|
|
case AF_INET6:
|
|
if (minimal)
|
|
return SIN6_LEN_RFC2133;
|
|
return sizeof(srv->ipv6_addr);
|
|
|
|
case AF_UNIX:
|
|
if (minimal)
|
|
return sizeof(srv->unix_addr) -
|
|
sizeof(srv->unix_addr.sun_path);
|
|
return srv->unix_addr_len;
|
|
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static void set_port(struct service_fixture *const srv, uint16_t port)
|
|
{
|
|
switch (srv->protocol.domain) {
|
|
case AF_UNSPEC:
|
|
case AF_INET:
|
|
srv->ipv4_addr.sin_port = htons(port);
|
|
return;
|
|
|
|
case AF_INET6:
|
|
srv->ipv6_addr.sin6_port = htons(port);
|
|
return;
|
|
|
|
default:
|
|
return;
|
|
}
|
|
}
|
|
|
|
static uint16_t get_binded_port(int socket_fd,
|
|
const struct protocol_variant *const prot)
|
|
{
|
|
struct sockaddr_in ipv4_addr;
|
|
struct sockaddr_in6 ipv6_addr;
|
|
socklen_t ipv4_addr_len, ipv6_addr_len;
|
|
|
|
/* Gets binded port. */
|
|
switch (prot->domain) {
|
|
case AF_UNSPEC:
|
|
case AF_INET:
|
|
ipv4_addr_len = sizeof(ipv4_addr);
|
|
getsockname(socket_fd, &ipv4_addr, &ipv4_addr_len);
|
|
return ntohs(ipv4_addr.sin_port);
|
|
|
|
case AF_INET6:
|
|
ipv6_addr_len = sizeof(ipv6_addr);
|
|
getsockname(socket_fd, &ipv6_addr, &ipv6_addr_len);
|
|
return ntohs(ipv6_addr.sin6_port);
|
|
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static int bind_variant_addrlen(const int sock_fd,
|
|
const struct service_fixture *const srv,
|
|
const socklen_t addrlen)
|
|
{
|
|
int ret;
|
|
|
|
switch (srv->protocol.domain) {
|
|
case AF_UNSPEC:
|
|
case AF_INET:
|
|
ret = bind(sock_fd, &srv->ipv4_addr, addrlen);
|
|
break;
|
|
|
|
case AF_INET6:
|
|
ret = bind(sock_fd, &srv->ipv6_addr, addrlen);
|
|
break;
|
|
|
|
case AF_UNIX:
|
|
ret = bind(sock_fd, &srv->unix_addr, addrlen);
|
|
break;
|
|
|
|
default:
|
|
errno = EAFNOSUPPORT;
|
|
return -errno;
|
|
}
|
|
|
|
if (ret < 0)
|
|
return -errno;
|
|
return ret;
|
|
}
|
|
|
|
static int bind_variant(const int sock_fd,
|
|
const struct service_fixture *const srv)
|
|
{
|
|
return bind_variant_addrlen(sock_fd, srv, get_addrlen(srv, false));
|
|
}
|
|
|
|
static int connect_variant_addrlen(const int sock_fd,
|
|
const struct service_fixture *const srv,
|
|
const socklen_t addrlen)
|
|
{
|
|
int ret;
|
|
|
|
switch (srv->protocol.domain) {
|
|
case AF_UNSPEC:
|
|
case AF_INET:
|
|
ret = connect(sock_fd, &srv->ipv4_addr, addrlen);
|
|
break;
|
|
|
|
case AF_INET6:
|
|
ret = connect(sock_fd, &srv->ipv6_addr, addrlen);
|
|
break;
|
|
|
|
case AF_UNIX:
|
|
ret = connect(sock_fd, &srv->unix_addr, addrlen);
|
|
break;
|
|
|
|
default:
|
|
errno = -EAFNOSUPPORT;
|
|
return -errno;
|
|
}
|
|
|
|
if (ret < 0)
|
|
return -errno;
|
|
return ret;
|
|
}
|
|
|
|
static int connect_variant(const int sock_fd,
|
|
const struct service_fixture *const srv)
|
|
{
|
|
return connect_variant_addrlen(sock_fd, srv, get_addrlen(srv, false));
|
|
}
|
|
|
|
FIXTURE(protocol)
|
|
{
|
|
struct service_fixture srv0, srv1, srv2, unspec_any0, unspec_srv0;
|
|
};
|
|
|
|
FIXTURE_VARIANT(protocol)
|
|
{
|
|
const enum sandbox_type sandbox;
|
|
const struct protocol_variant prot;
|
|
};
|
|
|
|
FIXTURE_SETUP(protocol)
|
|
{
|
|
const struct protocol_variant prot_unspec = {
|
|
.domain = AF_UNSPEC,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
|
|
disable_caps(_metadata);
|
|
|
|
ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));
|
|
ASSERT_EQ(0, set_service(&self->srv1, variant->prot, 1));
|
|
ASSERT_EQ(0, set_service(&self->srv2, variant->prot, 2));
|
|
|
|
ASSERT_EQ(0, set_service(&self->unspec_srv0, prot_unspec, 0));
|
|
|
|
ASSERT_EQ(0, set_service(&self->unspec_any0, prot_unspec, 0));
|
|
self->unspec_any0.ipv4_addr.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
setup_loopback(_metadata);
|
|
};
|
|
|
|
FIXTURE_TEARDOWN(protocol)
|
|
{
|
|
}
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET6,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_udp) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_DGRAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_udp) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET6,
|
|
.type = SOCK_DGRAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_stream) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_UNIX,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_datagram) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_UNIX,
|
|
.type = SOCK_DGRAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET6,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_udp) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_DGRAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_udp) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET6,
|
|
.type = SOCK_DGRAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_unix_stream) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_UNIX,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_unix_datagram) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_UNIX,
|
|
.type = SOCK_DGRAM,
|
|
},
|
|
};
|
|
|
|
static void test_bind_and_connect(struct __test_metadata *const _metadata,
|
|
const struct service_fixture *const srv,
|
|
const bool deny_bind, const bool deny_connect)
|
|
{
|
|
char buf = '\0';
|
|
int inval_fd, bind_fd, client_fd, status, ret;
|
|
pid_t child;
|
|
|
|
/* Starts invalid addrlen tests with bind. */
|
|
inval_fd = socket_variant(srv);
|
|
ASSERT_LE(0, inval_fd)
|
|
{
|
|
TH_LOG("Failed to create socket: %s", strerror(errno));
|
|
}
|
|
|
|
/* Tries to bind with zero as addrlen. */
|
|
EXPECT_EQ(-EINVAL, bind_variant_addrlen(inval_fd, srv, 0));
|
|
|
|
/* Tries to bind with too small addrlen. */
|
|
EXPECT_EQ(-EINVAL, bind_variant_addrlen(inval_fd, srv,
|
|
get_addrlen(srv, true) - 1));
|
|
|
|
/* Tries to bind with minimal addrlen. */
|
|
ret = bind_variant_addrlen(inval_fd, srv, get_addrlen(srv, true));
|
|
if (deny_bind) {
|
|
EXPECT_EQ(-EACCES, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret)
|
|
{
|
|
TH_LOG("Failed to bind to socket: %s", strerror(errno));
|
|
}
|
|
}
|
|
EXPECT_EQ(0, close(inval_fd));
|
|
|
|
/* Starts invalid addrlen tests with connect. */
|
|
inval_fd = socket_variant(srv);
|
|
ASSERT_LE(0, inval_fd);
|
|
|
|
/* Tries to connect with zero as addrlen. */
|
|
EXPECT_EQ(-EINVAL, connect_variant_addrlen(inval_fd, srv, 0));
|
|
|
|
/* Tries to connect with too small addrlen. */
|
|
EXPECT_EQ(-EINVAL, connect_variant_addrlen(inval_fd, srv,
|
|
get_addrlen(srv, true) - 1));
|
|
|
|
/* Tries to connect with minimal addrlen. */
|
|
ret = connect_variant_addrlen(inval_fd, srv, get_addrlen(srv, true));
|
|
if (srv->protocol.domain == AF_UNIX) {
|
|
EXPECT_EQ(-EINVAL, ret);
|
|
} else if (deny_connect) {
|
|
EXPECT_EQ(-EACCES, ret);
|
|
} else if (srv->protocol.type == SOCK_STREAM) {
|
|
/* No listening server, whatever the value of deny_bind. */
|
|
EXPECT_EQ(-ECONNREFUSED, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret)
|
|
{
|
|
TH_LOG("Failed to connect to socket: %s",
|
|
strerror(errno));
|
|
}
|
|
}
|
|
EXPECT_EQ(0, close(inval_fd));
|
|
|
|
/* Starts connection tests. */
|
|
bind_fd = socket_variant(srv);
|
|
ASSERT_LE(0, bind_fd);
|
|
|
|
ret = bind_variant(bind_fd, srv);
|
|
if (deny_bind) {
|
|
EXPECT_EQ(-EACCES, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
|
|
/* Creates a listening socket. */
|
|
if (srv->protocol.type == SOCK_STREAM)
|
|
EXPECT_EQ(0, listen(bind_fd, backlog));
|
|
}
|
|
|
|
child = fork();
|
|
ASSERT_LE(0, child);
|
|
if (child == 0) {
|
|
int connect_fd, ret;
|
|
|
|
/* Closes listening socket for the child. */
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
|
|
/* Starts connection tests. */
|
|
connect_fd = socket_variant(srv);
|
|
ASSERT_LE(0, connect_fd);
|
|
ret = connect_variant(connect_fd, srv);
|
|
if (deny_connect) {
|
|
EXPECT_EQ(-EACCES, ret);
|
|
} else if (deny_bind) {
|
|
/* No listening server. */
|
|
EXPECT_EQ(-ECONNREFUSED, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
EXPECT_EQ(1, write(connect_fd, ".", 1));
|
|
}
|
|
|
|
EXPECT_EQ(0, close(connect_fd));
|
|
_exit(_metadata->exit_code);
|
|
return;
|
|
}
|
|
|
|
/* Accepts connection from the child. */
|
|
client_fd = bind_fd;
|
|
if (!deny_bind && !deny_connect) {
|
|
if (srv->protocol.type == SOCK_STREAM) {
|
|
client_fd = accept(bind_fd, NULL, 0);
|
|
ASSERT_LE(0, client_fd);
|
|
}
|
|
|
|
EXPECT_EQ(1, read(client_fd, &buf, 1));
|
|
EXPECT_EQ('.', buf);
|
|
}
|
|
|
|
EXPECT_EQ(child, waitpid(child, &status, 0));
|
|
EXPECT_EQ(1, WIFEXITED(status));
|
|
EXPECT_EQ(EXIT_SUCCESS, WEXITSTATUS(status));
|
|
|
|
/* Closes connection, if any. */
|
|
if (client_fd != bind_fd)
|
|
EXPECT_LE(0, close(client_fd));
|
|
|
|
/* Closes listening socket. */
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
}
|
|
|
|
TEST_F(protocol, bind)
|
|
{
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_connect_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
const struct landlock_net_port_attr tcp_connect_p1 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv1.port,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Allows connect and bind for the first port. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect_p0, 0));
|
|
|
|
/* Allows connect and denies bind for the second port. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_connect_p1, 0));
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
/* Binds a socket to the first port. */
|
|
test_bind_and_connect(_metadata, &self->srv0, false, false);
|
|
|
|
/* Binds a socket to the second port. */
|
|
test_bind_and_connect(_metadata, &self->srv1,
|
|
is_restricted(&variant->prot, variant->sandbox),
|
|
false);
|
|
|
|
/* Binds a socket to the third port. */
|
|
test_bind_and_connect(_metadata, &self->srv2,
|
|
is_restricted(&variant->prot, variant->sandbox),
|
|
is_restricted(&variant->prot, variant->sandbox));
|
|
}
|
|
|
|
TEST_F(protocol, connect)
|
|
{
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_connect_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_p1 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv1.port,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Allows connect and bind for the first port. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect_p0, 0));
|
|
|
|
/* Allows bind and denies connect for the second port. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_p1, 0));
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
test_bind_and_connect(_metadata, &self->srv0, false, false);
|
|
|
|
test_bind_and_connect(_metadata, &self->srv1, false,
|
|
is_restricted(&variant->prot, variant->sandbox));
|
|
|
|
test_bind_and_connect(_metadata, &self->srv2,
|
|
is_restricted(&variant->prot, variant->sandbox),
|
|
is_restricted(&variant->prot, variant->sandbox));
|
|
}
|
|
|
|
TEST_F(protocol, bind_unspec)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
int bind_fd, ret;
|
|
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const int ruleset_fd = landlock_create_ruleset(
|
|
&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Allows bind. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
|
|
/* Allowed bind on AF_UNSPEC/INADDR_ANY. */
|
|
ret = bind_variant(bind_fd, &self->unspec_any0);
|
|
if (variant->prot.domain == AF_INET) {
|
|
EXPECT_EQ(0, ret)
|
|
{
|
|
TH_LOG("Failed to bind to unspec/any socket: %s",
|
|
strerror(errno));
|
|
}
|
|
} else {
|
|
EXPECT_EQ(-EINVAL, ret);
|
|
}
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const int ruleset_fd = landlock_create_ruleset(
|
|
&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Denies bind. */
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
|
|
/* Denied bind on AF_UNSPEC/INADDR_ANY. */
|
|
ret = bind_variant(bind_fd, &self->unspec_any0);
|
|
if (variant->prot.domain == AF_INET) {
|
|
if (is_restricted(&variant->prot, variant->sandbox)) {
|
|
EXPECT_EQ(-EACCES, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
}
|
|
} else {
|
|
EXPECT_EQ(-EINVAL, ret);
|
|
}
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
|
|
/* Checks bind with AF_UNSPEC and the loopback address. */
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
ret = bind_variant(bind_fd, &self->unspec_srv0);
|
|
if (variant->prot.domain == AF_INET) {
|
|
EXPECT_EQ(-EAFNOSUPPORT, ret);
|
|
} else {
|
|
EXPECT_EQ(-EINVAL, ret)
|
|
{
|
|
TH_LOG("Wrong bind error: %s", strerror(errno));
|
|
}
|
|
}
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
}
|
|
|
|
TEST_F(protocol, connect_unspec)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr tcp_connect = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
int bind_fd, client_fd, status;
|
|
pid_t child;
|
|
|
|
/* Specific connection tests. */
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
EXPECT_EQ(0, bind_variant(bind_fd, &self->srv0));
|
|
if (self->srv0.protocol.type == SOCK_STREAM)
|
|
EXPECT_EQ(0, listen(bind_fd, backlog));
|
|
|
|
child = fork();
|
|
ASSERT_LE(0, child);
|
|
if (child == 0) {
|
|
int connect_fd, ret;
|
|
|
|
/* Closes listening socket for the child. */
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
|
|
connect_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, connect_fd);
|
|
EXPECT_EQ(0, connect_variant(connect_fd, &self->srv0));
|
|
|
|
/* Tries to connect again, or set peer. */
|
|
ret = connect_variant(connect_fd, &self->srv0);
|
|
if (self->srv0.protocol.type == SOCK_STREAM) {
|
|
EXPECT_EQ(-EISCONN, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
}
|
|
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const int ruleset_fd = landlock_create_ruleset(
|
|
&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Allows connect. */
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd,
|
|
LANDLOCK_RULE_NET_PORT,
|
|
&tcp_connect, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
/* Disconnects already connected socket, or set peer. */
|
|
ret = connect_variant(connect_fd, &self->unspec_any0);
|
|
if (self->srv0.protocol.domain == AF_UNIX &&
|
|
self->srv0.protocol.type == SOCK_STREAM) {
|
|
EXPECT_EQ(-EINVAL, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
}
|
|
|
|
/* Tries to reconnect, or set peer. */
|
|
ret = connect_variant(connect_fd, &self->srv0);
|
|
if (self->srv0.protocol.domain == AF_UNIX &&
|
|
self->srv0.protocol.type == SOCK_STREAM) {
|
|
EXPECT_EQ(-EISCONN, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
}
|
|
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const int ruleset_fd = landlock_create_ruleset(
|
|
&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Denies connect. */
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
ret = connect_variant(connect_fd, &self->unspec_any0);
|
|
if (self->srv0.protocol.domain == AF_UNIX &&
|
|
self->srv0.protocol.type == SOCK_STREAM) {
|
|
EXPECT_EQ(-EINVAL, ret);
|
|
} else {
|
|
/* Always allowed to disconnect. */
|
|
EXPECT_EQ(0, ret);
|
|
}
|
|
|
|
EXPECT_EQ(0, close(connect_fd));
|
|
_exit(_metadata->exit_code);
|
|
return;
|
|
}
|
|
|
|
client_fd = bind_fd;
|
|
if (self->srv0.protocol.type == SOCK_STREAM) {
|
|
client_fd = accept(bind_fd, NULL, 0);
|
|
ASSERT_LE(0, client_fd);
|
|
}
|
|
|
|
EXPECT_EQ(child, waitpid(child, &status, 0));
|
|
EXPECT_EQ(1, WIFEXITED(status));
|
|
EXPECT_EQ(EXIT_SUCCESS, WEXITSTATUS(status));
|
|
|
|
/* Closes connection, if any. */
|
|
if (client_fd != bind_fd)
|
|
EXPECT_LE(0, close(client_fd));
|
|
|
|
/* Closes listening socket. */
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
}
|
|
|
|
FIXTURE(ipv4)
|
|
{
|
|
struct service_fixture srv0, srv1;
|
|
};
|
|
|
|
FIXTURE_VARIANT(ipv4)
|
|
{
|
|
const enum sandbox_type sandbox;
|
|
const int type;
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(ipv4, no_sandbox_with_tcp) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(ipv4, tcp_sandbox_with_tcp) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(ipv4, no_sandbox_with_udp) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.type = SOCK_DGRAM,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(ipv4, tcp_sandbox_with_udp) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.type = SOCK_DGRAM,
|
|
};
|
|
|
|
FIXTURE_SETUP(ipv4)
|
|
{
|
|
const struct protocol_variant prot = {
|
|
.domain = AF_INET,
|
|
.type = variant->type,
|
|
};
|
|
|
|
disable_caps(_metadata);
|
|
|
|
set_service(&self->srv0, prot, 0);
|
|
set_service(&self->srv1, prot, 1);
|
|
|
|
setup_loopback(_metadata);
|
|
};
|
|
|
|
FIXTURE_TEARDOWN(ipv4)
|
|
{
|
|
}
|
|
|
|
TEST_F(ipv4, from_unix_to_inet)
|
|
{
|
|
int unix_stream_fd, unix_dgram_fd;
|
|
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_connect_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
/* Denies connect and bind to check errno value. */
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Allows connect and bind for srv0. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect_p0, 0));
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
unix_stream_fd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
ASSERT_LE(0, unix_stream_fd);
|
|
|
|
unix_dgram_fd = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0);
|
|
ASSERT_LE(0, unix_dgram_fd);
|
|
|
|
/* Checks unix stream bind and connect for srv0. */
|
|
EXPECT_EQ(-EINVAL, bind_variant(unix_stream_fd, &self->srv0));
|
|
EXPECT_EQ(-EINVAL, connect_variant(unix_stream_fd, &self->srv0));
|
|
|
|
/* Checks unix stream bind and connect for srv1. */
|
|
EXPECT_EQ(-EINVAL, bind_variant(unix_stream_fd, &self->srv1))
|
|
{
|
|
TH_LOG("Wrong bind error: %s", strerror(errno));
|
|
}
|
|
EXPECT_EQ(-EINVAL, connect_variant(unix_stream_fd, &self->srv1));
|
|
|
|
/* Checks unix datagram bind and connect for srv0. */
|
|
EXPECT_EQ(-EINVAL, bind_variant(unix_dgram_fd, &self->srv0));
|
|
EXPECT_EQ(-EINVAL, connect_variant(unix_dgram_fd, &self->srv0));
|
|
|
|
/* Checks unix datagram bind and connect for srv1. */
|
|
EXPECT_EQ(-EINVAL, bind_variant(unix_dgram_fd, &self->srv1));
|
|
EXPECT_EQ(-EINVAL, connect_variant(unix_dgram_fd, &self->srv1));
|
|
}
|
|
|
|
FIXTURE(tcp_layers)
|
|
{
|
|
struct service_fixture srv0, srv1;
|
|
};
|
|
|
|
FIXTURE_VARIANT(tcp_layers)
|
|
{
|
|
const size_t num_layers;
|
|
const int domain;
|
|
};
|
|
|
|
FIXTURE_SETUP(tcp_layers)
|
|
{
|
|
const struct protocol_variant prot = {
|
|
.domain = variant->domain,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
|
|
disable_caps(_metadata);
|
|
|
|
ASSERT_EQ(0, set_service(&self->srv0, prot, 0));
|
|
ASSERT_EQ(0, set_service(&self->srv1, prot, 1));
|
|
|
|
setup_loopback(_metadata);
|
|
};
|
|
|
|
FIXTURE_TEARDOWN(tcp_layers)
|
|
{
|
|
}
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, no_sandbox_with_ipv4) {
|
|
/* clang-format on */
|
|
.domain = AF_INET,
|
|
.num_layers = 0,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, one_sandbox_with_ipv4) {
|
|
/* clang-format on */
|
|
.domain = AF_INET,
|
|
.num_layers = 1,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, two_sandboxes_with_ipv4) {
|
|
/* clang-format on */
|
|
.domain = AF_INET,
|
|
.num_layers = 2,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, three_sandboxes_with_ipv4) {
|
|
/* clang-format on */
|
|
.domain = AF_INET,
|
|
.num_layers = 3,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, no_sandbox_with_ipv6) {
|
|
/* clang-format on */
|
|
.domain = AF_INET6,
|
|
.num_layers = 0,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, one_sandbox_with_ipv6) {
|
|
/* clang-format on */
|
|
.domain = AF_INET6,
|
|
.num_layers = 1,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, two_sandboxes_with_ipv6) {
|
|
/* clang-format on */
|
|
.domain = AF_INET6,
|
|
.num_layers = 2,
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(tcp_layers, three_sandboxes_with_ipv6) {
|
|
/* clang-format on */
|
|
.domain = AF_INET6,
|
|
.num_layers = 3,
|
|
};
|
|
|
|
TEST_F(tcp_layers, ruleset_overlap)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_connect = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
|
|
if (variant->num_layers >= 1) {
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Allows bind. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind, 0));
|
|
/* Also allows bind, but allows connect too. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
if (variant->num_layers >= 2) {
|
|
int ruleset_fd;
|
|
|
|
/* Creates another ruleset layer. */
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Only allows bind. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
if (variant->num_layers >= 3) {
|
|
int ruleset_fd;
|
|
|
|
/* Creates another ruleset layer. */
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Try to allow bind and connect. */
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
/*
|
|
* Forbids to connect to the socket because only one ruleset layer
|
|
* allows connect.
|
|
*/
|
|
test_bind_and_connect(_metadata, &self->srv0, false,
|
|
variant->num_layers >= 2);
|
|
}
|
|
|
|
TEST_F(tcp_layers, ruleset_expand)
|
|
{
|
|
if (variant->num_layers >= 1) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
};
|
|
/* Allows bind for srv0. */
|
|
const struct landlock_net_port_attr bind_srv0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&bind_srv0, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
if (variant->num_layers >= 2) {
|
|
/* Expands network mask with connect action. */
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
/* Allows bind for srv0 and connect to srv0. */
|
|
const struct landlock_net_port_attr tcp_bind_connect_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
/* Try to allow bind for srv1. */
|
|
const struct landlock_net_port_attr tcp_bind_p1 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv1.port,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect_p0, 0));
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_p1, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
if (variant->num_layers >= 3) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
/* Allows connect to srv0, without bind rule. */
|
|
const struct landlock_net_port_attr tcp_bind_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_p0, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
test_bind_and_connect(_metadata, &self->srv0, false,
|
|
variant->num_layers >= 3);
|
|
|
|
test_bind_and_connect(_metadata, &self->srv1, variant->num_layers >= 1,
|
|
variant->num_layers >= 2);
|
|
}
|
|
|
|
/* clang-format off */
|
|
FIXTURE(mini) {};
|
|
/* clang-format on */
|
|
|
|
FIXTURE_SETUP(mini)
|
|
{
|
|
disable_caps(_metadata);
|
|
|
|
setup_loopback(_metadata);
|
|
};
|
|
|
|
FIXTURE_TEARDOWN(mini)
|
|
{
|
|
}
|
|
|
|
/* clang-format off */
|
|
|
|
#define ACCESS_LAST LANDLOCK_ACCESS_NET_CONNECT_TCP
|
|
|
|
#define ACCESS_ALL ( \
|
|
LANDLOCK_ACCESS_NET_BIND_TCP | \
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP)
|
|
|
|
/* clang-format on */
|
|
|
|
TEST_F(mini, network_access_rights)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = ACCESS_ALL,
|
|
};
|
|
struct landlock_net_port_attr net_port = {
|
|
.port = sock_port_start,
|
|
};
|
|
int ruleset_fd;
|
|
__u64 access;
|
|
|
|
ruleset_fd =
|
|
landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
for (access = 1; access <= ACCESS_LAST; access <<= 1) {
|
|
net_port.allowed_access = access;
|
|
EXPECT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&net_port, 0))
|
|
{
|
|
TH_LOG("Failed to add rule with access 0x%llx: %s",
|
|
access, strerror(errno));
|
|
}
|
|
}
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
/* Checks invalid attribute, out of landlock network access range. */
|
|
TEST_F(mini, ruleset_with_unknown_access)
|
|
{
|
|
__u64 access_mask;
|
|
|
|
for (access_mask = 1ULL << 63; access_mask != ACCESS_LAST;
|
|
access_mask >>= 1) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = access_mask,
|
|
};
|
|
|
|
EXPECT_EQ(-1, landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
}
|
|
}
|
|
|
|
TEST_F(mini, rule_with_unknown_access)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = ACCESS_ALL,
|
|
};
|
|
struct landlock_net_port_attr net_port = {
|
|
.port = sock_port_start,
|
|
};
|
|
int ruleset_fd;
|
|
__u64 access;
|
|
|
|
ruleset_fd =
|
|
landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
for (access = 1ULL << 63; access != ACCESS_LAST; access >>= 1) {
|
|
net_port.allowed_access = access;
|
|
EXPECT_EQ(-1,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&net_port, 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
}
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
TEST_F(mini, rule_with_unhandled_access)
|
|
{
|
|
struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
};
|
|
struct landlock_net_port_attr net_port = {
|
|
.port = sock_port_start,
|
|
};
|
|
int ruleset_fd;
|
|
__u64 access;
|
|
|
|
ruleset_fd =
|
|
landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
for (access = 1; access > 0; access <<= 1) {
|
|
int err;
|
|
|
|
net_port.allowed_access = access;
|
|
err = landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&net_port, 0);
|
|
if (access == ruleset_attr.handled_access_net) {
|
|
EXPECT_EQ(0, err);
|
|
} else {
|
|
EXPECT_EQ(-1, err);
|
|
EXPECT_EQ(EINVAL, errno);
|
|
}
|
|
}
|
|
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
TEST_F(mini, inval)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_connect = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = sock_port_start,
|
|
};
|
|
const struct landlock_net_port_attr tcp_denied = {
|
|
.allowed_access = 0,
|
|
.port = sock_port_start,
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = sock_port_start,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd =
|
|
landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Checks unhandled allowed_access. */
|
|
EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect, 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
/* Checks zero access value. */
|
|
EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_denied, 0));
|
|
EXPECT_EQ(ENOMSG, errno);
|
|
|
|
/* Adds with legitimate values. */
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind, 0));
|
|
}
|
|
|
|
TEST_F(mini, tcp_port_overflow)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr port_max_bind = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = UINT16_MAX,
|
|
};
|
|
const struct landlock_net_port_attr port_max_connect = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = UINT16_MAX,
|
|
};
|
|
const struct landlock_net_port_attr port_overflow1 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = UINT16_MAX + 1,
|
|
};
|
|
const struct landlock_net_port_attr port_overflow2 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = UINT16_MAX + 2,
|
|
};
|
|
const struct landlock_net_port_attr port_overflow3 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = UINT32_MAX + 1UL,
|
|
};
|
|
const struct landlock_net_port_attr port_overflow4 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = UINT32_MAX + 2UL,
|
|
};
|
|
const struct protocol_variant ipv4_tcp = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
struct service_fixture srv_denied, srv_max_allowed;
|
|
int ruleset_fd;
|
|
|
|
ASSERT_EQ(0, set_service(&srv_denied, ipv4_tcp, 0));
|
|
|
|
/* Be careful to avoid port inconsistencies. */
|
|
srv_max_allowed = srv_denied;
|
|
srv_max_allowed.port = port_max_bind.port;
|
|
srv_max_allowed.ipv4_addr.sin_port = htons(port_max_bind.port);
|
|
|
|
ruleset_fd =
|
|
landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&port_max_bind, 0));
|
|
|
|
EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&port_overflow1, 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&port_overflow2, 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&port_overflow3, 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
/* Interleaves with invalid rule additions. */
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&port_max_connect, 0));
|
|
|
|
EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&port_overflow4, 0));
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
|
|
test_bind_and_connect(_metadata, &srv_denied, true, true);
|
|
test_bind_and_connect(_metadata, &srv_max_allowed, false, false);
|
|
}
|
|
|
|
FIXTURE(ipv4_tcp)
|
|
{
|
|
struct service_fixture srv0, srv1;
|
|
};
|
|
|
|
FIXTURE_SETUP(ipv4_tcp)
|
|
{
|
|
const struct protocol_variant ipv4_tcp = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
|
|
disable_caps(_metadata);
|
|
|
|
ASSERT_EQ(0, set_service(&self->srv0, ipv4_tcp, 0));
|
|
ASSERT_EQ(0, set_service(&self->srv1, ipv4_tcp, 1));
|
|
|
|
setup_loopback(_metadata);
|
|
};
|
|
|
|
FIXTURE_TEARDOWN(ipv4_tcp)
|
|
{
|
|
}
|
|
|
|
TEST_F(ipv4_tcp, port_endianness)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
};
|
|
const struct landlock_net_port_attr bind_host_endian_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
/* Host port format. */
|
|
.port = self->srv0.port,
|
|
};
|
|
const struct landlock_net_port_attr connect_big_endian_p0 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
/* Big endian port format. */
|
|
.port = htons(self->srv0.port),
|
|
};
|
|
const struct landlock_net_port_attr bind_connect_host_endian_p1 = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
/* Host port format. */
|
|
.port = self->srv1.port,
|
|
};
|
|
const unsigned int one = 1;
|
|
const char little_endian = *(const char *)&one;
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd =
|
|
landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&bind_host_endian_p0, 0));
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&connect_big_endian_p0, 0));
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&bind_connect_host_endian_p1, 0));
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
|
|
/* No restriction for big endinan CPU. */
|
|
test_bind_and_connect(_metadata, &self->srv0, false, little_endian);
|
|
|
|
/* No restriction for any CPU. */
|
|
test_bind_and_connect(_metadata, &self->srv1, false, false);
|
|
}
|
|
|
|
TEST_F(ipv4_tcp, with_fs)
|
|
{
|
|
const struct landlock_ruleset_attr ruleset_attr_fs_net = {
|
|
.handled_access_fs = LANDLOCK_ACCESS_FS_READ_DIR,
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
};
|
|
struct landlock_path_beneath_attr path_beneath = {
|
|
.allowed_access = LANDLOCK_ACCESS_FS_READ_DIR,
|
|
.parent_fd = -1,
|
|
};
|
|
struct landlock_net_port_attr tcp_bind = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
|
|
.port = self->srv0.port,
|
|
};
|
|
int ruleset_fd, bind_fd, dir_fd;
|
|
|
|
/* Creates ruleset both for filesystem and network access. */
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr_fs_net,
|
|
sizeof(ruleset_attr_fs_net), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Adds a filesystem rule. */
|
|
path_beneath.parent_fd = open("/dev", O_PATH | O_DIRECTORY | O_CLOEXEC);
|
|
ASSERT_LE(0, path_beneath.parent_fd);
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_PATH_BENEATH,
|
|
&path_beneath, 0));
|
|
EXPECT_EQ(0, close(path_beneath.parent_fd));
|
|
|
|
/* Adds a network rule. */
|
|
ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind, 0));
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
|
|
/* Tests file access. */
|
|
dir_fd = open("/dev", O_RDONLY);
|
|
EXPECT_LE(0, dir_fd);
|
|
EXPECT_EQ(0, close(dir_fd));
|
|
|
|
dir_fd = open("/", O_RDONLY);
|
|
EXPECT_EQ(-1, dir_fd);
|
|
EXPECT_EQ(EACCES, errno);
|
|
|
|
/* Tests port binding. */
|
|
bind_fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
ASSERT_LE(0, bind_fd);
|
|
EXPECT_EQ(0, bind_variant(bind_fd, &self->srv0));
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
|
|
bind_fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
|
|
ASSERT_LE(0, bind_fd);
|
|
EXPECT_EQ(-EACCES, bind_variant(bind_fd, &self->srv1));
|
|
}
|
|
|
|
FIXTURE(port_specific)
|
|
{
|
|
struct service_fixture srv0;
|
|
};
|
|
|
|
FIXTURE_VARIANT(port_specific)
|
|
{
|
|
const enum sandbox_type sandbox;
|
|
const struct protocol_variant prot;
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(port_specific, no_sandbox_with_ipv4) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(port_specific, sandbox_with_ipv4) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(port_specific, no_sandbox_with_ipv6) {
|
|
/* clang-format on */
|
|
.sandbox = NO_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET6,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
/* clang-format off */
|
|
FIXTURE_VARIANT_ADD(port_specific, sandbox_with_ipv6) {
|
|
/* clang-format on */
|
|
.sandbox = TCP_SANDBOX,
|
|
.prot = {
|
|
.domain = AF_INET6,
|
|
.type = SOCK_STREAM,
|
|
},
|
|
};
|
|
|
|
FIXTURE_SETUP(port_specific)
|
|
{
|
|
disable_caps(_metadata);
|
|
|
|
ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));
|
|
|
|
setup_loopback(_metadata);
|
|
};
|
|
|
|
FIXTURE_TEARDOWN(port_specific)
|
|
{
|
|
}
|
|
|
|
TEST_F(port_specific, bind_connect_zero)
|
|
{
|
|
int bind_fd, connect_fd, ret;
|
|
uint16_t port;
|
|
|
|
/* Adds a rule layer with bind and connect actions. */
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP
|
|
};
|
|
const struct landlock_net_port_attr tcp_bind_connect_zero = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = 0,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
/* Checks zero port value on bind and connect actions. */
|
|
EXPECT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect_zero, 0));
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
|
|
connect_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, connect_fd);
|
|
|
|
/* Sets address port to 0 for both protocol families. */
|
|
set_port(&self->srv0, 0);
|
|
/*
|
|
* Binds on port 0, which selects a random port within
|
|
* ip_local_port_range.
|
|
*/
|
|
ret = bind_variant(bind_fd, &self->srv0);
|
|
EXPECT_EQ(0, ret);
|
|
|
|
EXPECT_EQ(0, listen(bind_fd, backlog));
|
|
|
|
/* Connects on port 0. */
|
|
ret = connect_variant(connect_fd, &self->srv0);
|
|
EXPECT_EQ(-ECONNREFUSED, ret);
|
|
|
|
/* Sets binded port for both protocol families. */
|
|
port = get_binded_port(bind_fd, &variant->prot);
|
|
EXPECT_NE(0, port);
|
|
set_port(&self->srv0, port);
|
|
/* Connects on the binded port. */
|
|
ret = connect_variant(connect_fd, &self->srv0);
|
|
if (is_restricted(&variant->prot, variant->sandbox)) {
|
|
/* Denied by Landlock. */
|
|
EXPECT_EQ(-EACCES, ret);
|
|
} else {
|
|
EXPECT_EQ(0, ret);
|
|
}
|
|
|
|
EXPECT_EQ(0, close(connect_fd));
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
}
|
|
|
|
TEST_F(port_specific, bind_connect_1023)
|
|
{
|
|
int bind_fd, connect_fd, ret;
|
|
|
|
/* Adds a rule layer with bind and connect actions. */
|
|
if (variant->sandbox == TCP_SANDBOX) {
|
|
const struct landlock_ruleset_attr ruleset_attr = {
|
|
.handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP
|
|
};
|
|
/* A rule with port value less than 1024. */
|
|
const struct landlock_net_port_attr tcp_bind_connect_low_range = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = 1023,
|
|
};
|
|
/* A rule with 1024 port. */
|
|
const struct landlock_net_port_attr tcp_bind_connect = {
|
|
.allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
|
|
LANDLOCK_ACCESS_NET_CONNECT_TCP,
|
|
.port = 1024,
|
|
};
|
|
int ruleset_fd;
|
|
|
|
ruleset_fd = landlock_create_ruleset(&ruleset_attr,
|
|
sizeof(ruleset_attr), 0);
|
|
ASSERT_LE(0, ruleset_fd);
|
|
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect_low_range, 0));
|
|
ASSERT_EQ(0,
|
|
landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
|
|
&tcp_bind_connect, 0));
|
|
|
|
enforce_ruleset(_metadata, ruleset_fd);
|
|
EXPECT_EQ(0, close(ruleset_fd));
|
|
}
|
|
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
|
|
connect_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, connect_fd);
|
|
|
|
/* Sets address port to 1023 for both protocol families. */
|
|
set_port(&self->srv0, 1023);
|
|
/* Binds on port 1023. */
|
|
ret = bind_variant(bind_fd, &self->srv0);
|
|
/* Denied by the system. */
|
|
EXPECT_EQ(-EACCES, ret);
|
|
|
|
/* Binds on port 1023. */
|
|
set_cap(_metadata, CAP_NET_BIND_SERVICE);
|
|
ret = bind_variant(bind_fd, &self->srv0);
|
|
clear_cap(_metadata, CAP_NET_BIND_SERVICE);
|
|
EXPECT_EQ(0, ret);
|
|
EXPECT_EQ(0, listen(bind_fd, backlog));
|
|
|
|
/* Connects on the binded port 1023. */
|
|
ret = connect_variant(connect_fd, &self->srv0);
|
|
EXPECT_EQ(0, ret);
|
|
|
|
EXPECT_EQ(0, close(connect_fd));
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
|
|
bind_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, bind_fd);
|
|
|
|
connect_fd = socket_variant(&self->srv0);
|
|
ASSERT_LE(0, connect_fd);
|
|
|
|
/* Sets address port to 1024 for both protocol families. */
|
|
set_port(&self->srv0, 1024);
|
|
/* Binds on port 1024. */
|
|
ret = bind_variant(bind_fd, &self->srv0);
|
|
EXPECT_EQ(0, ret);
|
|
EXPECT_EQ(0, listen(bind_fd, backlog));
|
|
|
|
/* Connects on the binded port 1024. */
|
|
ret = connect_variant(connect_fd, &self->srv0);
|
|
EXPECT_EQ(0, ret);
|
|
|
|
EXPECT_EQ(0, close(connect_fd));
|
|
EXPECT_EQ(0, close(bind_fd));
|
|
}
|
|
|
|
TEST_HARNESS_MAIN
|