| /* SPDX-License-Identifier: GPL-2.0 */ |
| /* |
| * Landlock test helpers |
| * |
| * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net> |
| * Copyright © 2019-2020 ANSSI |
| * Copyright © 2021 Microsoft Corporation |
| */ |
| |
| #include <arpa/inet.h> |
| #include <errno.h> |
| #include <linux/landlock.h> |
| #include <linux/securebits.h> |
| #include <sys/capability.h> |
| #include <sys/socket.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <sys/un.h> |
| #include <sys/wait.h> |
| #include <unistd.h> |
| |
| #include "../kselftest_harness.h" |
| |
| #define TMP_DIR "tmp" |
| |
| #ifndef __maybe_unused |
| #define __maybe_unused __attribute__((__unused__)) |
| #endif |
| |
| /* TEST_F_FORK() should not be used for new tests. */ |
| #define TEST_F_FORK(fixture_name, test_name) TEST_F(fixture_name, test_name) |
| |
| #ifndef landlock_create_ruleset |
| static inline int |
| landlock_create_ruleset(const struct landlock_ruleset_attr *const attr, |
| const size_t size, const __u32 flags) |
| { |
| return syscall(__NR_landlock_create_ruleset, attr, size, flags); |
| } |
| #endif |
| |
| #ifndef landlock_add_rule |
| static inline int landlock_add_rule(const int ruleset_fd, |
| const enum landlock_rule_type rule_type, |
| const void *const rule_attr, |
| const __u32 flags) |
| { |
| return syscall(__NR_landlock_add_rule, ruleset_fd, rule_type, rule_attr, |
| flags); |
| } |
| #endif |
| |
| #ifndef landlock_restrict_self |
| static inline int landlock_restrict_self(const int ruleset_fd, |
| const __u32 flags) |
| { |
| return syscall(__NR_landlock_restrict_self, ruleset_fd, flags); |
| } |
| #endif |
| |
| static void _init_caps(struct __test_metadata *const _metadata, bool drop_all) |
| { |
| cap_t cap_p; |
| /* Only these three capabilities are useful for the tests. */ |
| const cap_value_t caps[] = { |
| /* clang-format off */ |
| CAP_DAC_OVERRIDE, |
| CAP_MKNOD, |
| CAP_NET_ADMIN, |
| CAP_NET_BIND_SERVICE, |
| CAP_SYS_ADMIN, |
| CAP_SYS_CHROOT, |
| /* clang-format on */ |
| }; |
| const unsigned int noroot = SECBIT_NOROOT | SECBIT_NOROOT_LOCKED; |
| |
| if ((cap_get_secbits() & noroot) != noroot) |
| EXPECT_EQ(0, cap_set_secbits(noroot)); |
| |
| cap_p = cap_get_proc(); |
| EXPECT_NE(NULL, cap_p); |
| EXPECT_NE(-1, cap_clear(cap_p)); |
| if (!drop_all) { |
| EXPECT_NE(-1, cap_set_flag(cap_p, CAP_PERMITTED, |
| ARRAY_SIZE(caps), caps, CAP_SET)); |
| } |
| |
| /* Automatically resets ambient capabilities. */ |
| EXPECT_NE(-1, cap_set_proc(cap_p)) |
| { |
| TH_LOG("Failed to set capabilities: %s", strerror(errno)); |
| } |
| EXPECT_NE(-1, cap_free(cap_p)); |
| |
| /* Quickly checks that ambient capabilities are cleared. */ |
| EXPECT_NE(-1, cap_get_ambient(caps[0])); |
| } |
| |
| /* We cannot put such helpers in a library because of kselftest_harness.h . */ |
| static void __maybe_unused disable_caps(struct __test_metadata *const _metadata) |
| { |
| _init_caps(_metadata, false); |
| } |
| |
| static void __maybe_unused drop_caps(struct __test_metadata *const _metadata) |
| { |
| _init_caps(_metadata, true); |
| } |
| |
| static void _change_cap(struct __test_metadata *const _metadata, |
| const cap_flag_t flag, const cap_value_t cap, |
| const cap_flag_value_t value) |
| { |
| cap_t cap_p; |
| |
| cap_p = cap_get_proc(); |
| EXPECT_NE(NULL, cap_p); |
| EXPECT_NE(-1, cap_set_flag(cap_p, flag, 1, &cap, value)); |
| EXPECT_NE(-1, cap_set_proc(cap_p)) |
| { |
| TH_LOG("Failed to set capability %d: %s", cap, strerror(errno)); |
| } |
| EXPECT_NE(-1, cap_free(cap_p)); |
| } |
| |
| static void __maybe_unused set_cap(struct __test_metadata *const _metadata, |
| const cap_value_t cap) |
| { |
| _change_cap(_metadata, CAP_EFFECTIVE, cap, CAP_SET); |
| } |
| |
| static void __maybe_unused clear_cap(struct __test_metadata *const _metadata, |
| const cap_value_t cap) |
| { |
| _change_cap(_metadata, CAP_EFFECTIVE, cap, CAP_CLEAR); |
| } |
| |
| static void __maybe_unused |
| set_ambient_cap(struct __test_metadata *const _metadata, const cap_value_t cap) |
| { |
| _change_cap(_metadata, CAP_INHERITABLE, cap, CAP_SET); |
| |
| EXPECT_NE(-1, cap_set_ambient(cap, CAP_SET)) |
| { |
| TH_LOG("Failed to set ambient capability %d: %s", cap, |
| strerror(errno)); |
| } |
| } |
| |
| static void __maybe_unused clear_ambient_cap( |
| struct __test_metadata *const _metadata, const cap_value_t cap) |
| { |
| EXPECT_EQ(1, cap_get_ambient(cap)); |
| _change_cap(_metadata, CAP_INHERITABLE, cap, CAP_CLEAR); |
| EXPECT_EQ(0, cap_get_ambient(cap)); |
| } |
| |
| /* Receives an FD from a UNIX socket. Returns the received FD, or -errno. */ |
| static int __maybe_unused recv_fd(int usock) |
| { |
| int fd_rx; |
| union { |
| /* Aligned ancillary data buffer. */ |
| char buf[CMSG_SPACE(sizeof(fd_rx))]; |
| struct cmsghdr _align; |
| } cmsg_rx = {}; |
| char data = '\0'; |
| struct iovec io = { |
| .iov_base = &data, |
| .iov_len = sizeof(data), |
| }; |
| struct msghdr msg = { |
| .msg_iov = &io, |
| .msg_iovlen = 1, |
| .msg_control = &cmsg_rx.buf, |
| .msg_controllen = sizeof(cmsg_rx.buf), |
| }; |
| struct cmsghdr *cmsg; |
| int res; |
| |
| res = recvmsg(usock, &msg, MSG_CMSG_CLOEXEC); |
| if (res < 0) |
| return -errno; |
| |
| cmsg = CMSG_FIRSTHDR(&msg); |
| if (cmsg->cmsg_len != CMSG_LEN(sizeof(fd_rx))) |
| return -EIO; |
| |
| memcpy(&fd_rx, CMSG_DATA(cmsg), sizeof(fd_rx)); |
| return fd_rx; |
| } |
| |
| /* Sends an FD on a UNIX socket. Returns 0 on success or -errno. */ |
| static int __maybe_unused send_fd(int usock, int fd_tx) |
| { |
| union { |
| /* Aligned ancillary data buffer. */ |
| char buf[CMSG_SPACE(sizeof(fd_tx))]; |
| struct cmsghdr _align; |
| } cmsg_tx = {}; |
| char data_tx = '.'; |
| struct iovec io = { |
| .iov_base = &data_tx, |
| .iov_len = sizeof(data_tx), |
| }; |
| struct msghdr msg = { |
| .msg_iov = &io, |
| .msg_iovlen = 1, |
| .msg_control = &cmsg_tx.buf, |
| .msg_controllen = sizeof(cmsg_tx.buf), |
| }; |
| struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg); |
| |
| cmsg->cmsg_len = CMSG_LEN(sizeof(fd_tx)); |
| cmsg->cmsg_level = SOL_SOCKET; |
| cmsg->cmsg_type = SCM_RIGHTS; |
| memcpy(CMSG_DATA(cmsg), &fd_tx, sizeof(fd_tx)); |
| |
| if (sendmsg(usock, &msg, 0) < 0) |
| return -errno; |
| return 0; |
| } |
| |
| static void __maybe_unused |
| enforce_ruleset(struct __test_metadata *const _metadata, const int ruleset_fd) |
| { |
| ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)); |
| ASSERT_EQ(0, landlock_restrict_self(ruleset_fd, 0)) |
| { |
| TH_LOG("Failed to enforce ruleset: %s", strerror(errno)); |
| } |
| } |
| |
| struct protocol_variant { |
| int domain; |
| int type; |
| }; |
| |
| struct service_fixture { |
| struct protocol_variant protocol; |
| /* port is also stored in ipv4_addr.sin_port or ipv6_addr.sin6_port */ |
| unsigned short port; |
| union { |
| struct sockaddr_in ipv4_addr; |
| struct sockaddr_in6 ipv6_addr; |
| struct { |
| struct sockaddr_un unix_addr; |
| socklen_t unix_addr_len; |
| }; |
| }; |
| }; |
| |
| static pid_t __maybe_unused sys_gettid(void) |
| { |
| return syscall(__NR_gettid); |
| } |
| |
| static void __maybe_unused set_unix_address(struct service_fixture *const srv, |
| const unsigned short index) |
| { |
| srv->unix_addr.sun_family = AF_UNIX; |
| sprintf(srv->unix_addr.sun_path, |
| "_selftests-landlock-abstract-unix-tid%d-index%d", sys_gettid(), |
| index); |
| srv->unix_addr_len = SUN_LEN(&srv->unix_addr); |
| srv->unix_addr.sun_path[0] = '\0'; |
| } |