124 lines
2.7 KiB
C
124 lines
2.7 KiB
C
|
// SPDX-License-Identifier: GPL-2.0
|
||
|
#define _GNU_SOURCE
|
||
|
#include <sched.h>
|
||
|
#include <stdlib.h>
|
||
|
#include <sys/types.h>
|
||
|
#include <sys/socket.h>
|
||
|
#include <sys/capability.h>
|
||
|
|
||
|
#include "test_progs.h"
|
||
|
#include "bind_perm.skel.h"
|
||
|
|
||
|
static int duration;
|
||
|
|
||
|
static int create_netns(void)
|
||
|
{
|
||
|
if (!ASSERT_OK(unshare(CLONE_NEWNET), "create netns"))
|
||
|
return -1;
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
void try_bind(int family, int port, int expected_errno)
|
||
|
{
|
||
|
struct sockaddr_storage addr = {};
|
||
|
struct sockaddr_in6 *sin6;
|
||
|
struct sockaddr_in *sin;
|
||
|
int fd = -1;
|
||
|
|
||
|
fd = socket(family, SOCK_STREAM, 0);
|
||
|
if (CHECK(fd < 0, "fd", "errno %d", errno))
|
||
|
goto close_socket;
|
||
|
|
||
|
if (family == AF_INET) {
|
||
|
sin = (struct sockaddr_in *)&addr;
|
||
|
sin->sin_family = family;
|
||
|
sin->sin_port = htons(port);
|
||
|
} else {
|
||
|
sin6 = (struct sockaddr_in6 *)&addr;
|
||
|
sin6->sin6_family = family;
|
||
|
sin6->sin6_port = htons(port);
|
||
|
}
|
||
|
|
||
|
errno = 0;
|
||
|
bind(fd, (struct sockaddr *)&addr, sizeof(addr));
|
||
|
ASSERT_EQ(errno, expected_errno, "bind");
|
||
|
|
||
|
close_socket:
|
||
|
if (fd >= 0)
|
||
|
close(fd);
|
||
|
}
|
||
|
|
||
|
bool cap_net_bind_service(cap_flag_value_t flag)
|
||
|
{
|
||
|
const cap_value_t cap_net_bind_service = CAP_NET_BIND_SERVICE;
|
||
|
cap_flag_value_t original_value;
|
||
|
bool was_effective = false;
|
||
|
cap_t caps;
|
||
|
|
||
|
caps = cap_get_proc();
|
||
|
if (CHECK(!caps, "cap_get_proc", "errno %d", errno))
|
||
|
goto free_caps;
|
||
|
|
||
|
if (CHECK(cap_get_flag(caps, CAP_NET_BIND_SERVICE, CAP_EFFECTIVE,
|
||
|
&original_value),
|
||
|
"cap_get_flag", "errno %d", errno))
|
||
|
goto free_caps;
|
||
|
|
||
|
was_effective = (original_value == CAP_SET);
|
||
|
|
||
|
if (CHECK(cap_set_flag(caps, CAP_EFFECTIVE, 1, &cap_net_bind_service,
|
||
|
flag),
|
||
|
"cap_set_flag", "errno %d", errno))
|
||
|
goto free_caps;
|
||
|
|
||
|
if (CHECK(cap_set_proc(caps), "cap_set_proc", "errno %d", errno))
|
||
|
goto free_caps;
|
||
|
|
||
|
free_caps:
|
||
|
CHECK(cap_free(caps), "cap_free", "errno %d", errno);
|
||
|
return was_effective;
|
||
|
}
|
||
|
|
||
|
void test_bind_perm(void)
|
||
|
{
|
||
|
bool cap_was_effective;
|
||
|
struct bind_perm *skel;
|
||
|
int cgroup_fd;
|
||
|
|
||
|
if (create_netns())
|
||
|
return;
|
||
|
|
||
|
cgroup_fd = test__join_cgroup("/bind_perm");
|
||
|
if (CHECK(cgroup_fd < 0, "cg-join", "errno %d", errno))
|
||
|
return;
|
||
|
|
||
|
skel = bind_perm__open_and_load();
|
||
|
if (!ASSERT_OK_PTR(skel, "skel"))
|
||
|
goto close_cgroup_fd;
|
||
|
|
||
|
skel->links.bind_v4_prog = bpf_program__attach_cgroup(skel->progs.bind_v4_prog, cgroup_fd);
|
||
|
if (!ASSERT_OK_PTR(skel, "bind_v4_prog"))
|
||
|
goto close_skeleton;
|
||
|
|
||
|
skel->links.bind_v6_prog = bpf_program__attach_cgroup(skel->progs.bind_v6_prog, cgroup_fd);
|
||
|
if (!ASSERT_OK_PTR(skel, "bind_v6_prog"))
|
||
|
goto close_skeleton;
|
||
|
|
||
|
cap_was_effective = cap_net_bind_service(CAP_CLEAR);
|
||
|
|
||
|
try_bind(AF_INET, 110, EACCES);
|
||
|
try_bind(AF_INET6, 110, EACCES);
|
||
|
|
||
|
try_bind(AF_INET, 111, 0);
|
||
|
try_bind(AF_INET6, 111, 0);
|
||
|
|
||
|
if (cap_was_effective)
|
||
|
cap_net_bind_service(CAP_SET);
|
||
|
|
||
|
close_skeleton:
|
||
|
bind_perm__destroy(skel);
|
||
|
close_cgroup_fd:
|
||
|
close(cgroup_fd);
|
||
|
}
|