194 lines
5.0 KiB
C
194 lines
5.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Landlock test helpers
|
|
*
|
|
* Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
|
|
* Copyright © 2019-2020 ANSSI
|
|
* Copyright © 2021 Microsoft Corporation
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <linux/landlock.h>
|
|
#include <sys/capability.h>
|
|
#include <sys/syscall.h>
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
#include <unistd.h>
|
|
|
|
#include "../kselftest_harness.h"
|
|
|
|
#ifndef ARRAY_SIZE
|
|
#define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
|
|
#endif
|
|
|
|
/*
|
|
* TEST_F_FORK() is useful when a test drop privileges but the corresponding
|
|
* FIXTURE_TEARDOWN() requires them (e.g. to remove files from a directory
|
|
* where write actions are denied). For convenience, FIXTURE_TEARDOWN() is
|
|
* also called when the test failed, but not when FIXTURE_SETUP() failed. For
|
|
* this to be possible, we must not call abort() but instead exit smoothly
|
|
* (hence the step print).
|
|
*/
|
|
/* clang-format off */
|
|
#define TEST_F_FORK(fixture_name, test_name) \
|
|
static void fixture_name##_##test_name##_child( \
|
|
struct __test_metadata *_metadata, \
|
|
FIXTURE_DATA(fixture_name) *self, \
|
|
const FIXTURE_VARIANT(fixture_name) *variant); \
|
|
TEST_F(fixture_name, test_name) \
|
|
{ \
|
|
int status; \
|
|
const pid_t child = fork(); \
|
|
if (child < 0) \
|
|
abort(); \
|
|
if (child == 0) { \
|
|
_metadata->no_print = 1; \
|
|
fixture_name##_##test_name##_child(_metadata, self, variant); \
|
|
if (_metadata->skip) \
|
|
_exit(255); \
|
|
if (_metadata->passed) \
|
|
_exit(0); \
|
|
_exit(_metadata->step); \
|
|
} \
|
|
if (child != waitpid(child, &status, 0)) \
|
|
abort(); \
|
|
if (WIFSIGNALED(status) || !WIFEXITED(status)) { \
|
|
_metadata->passed = 0; \
|
|
_metadata->step = 1; \
|
|
return; \
|
|
} \
|
|
switch (WEXITSTATUS(status)) { \
|
|
case 0: \
|
|
_metadata->passed = 1; \
|
|
break; \
|
|
case 255: \
|
|
_metadata->passed = 1; \
|
|
_metadata->skip = 1; \
|
|
break; \
|
|
default: \
|
|
_metadata->passed = 0; \
|
|
_metadata->step = WEXITSTATUS(status); \
|
|
break; \
|
|
} \
|
|
} \
|
|
static void fixture_name##_##test_name##_child( \
|
|
struct __test_metadata __attribute__((unused)) *_metadata, \
|
|
FIXTURE_DATA(fixture_name) __attribute__((unused)) *self, \
|
|
const FIXTURE_VARIANT(fixture_name) \
|
|
__attribute__((unused)) *variant)
|
|
/* clang-format on */
|
|
|
|
#ifndef landlock_create_ruleset
|
|
static inline int
|
|
landlock_create_ruleset(const struct landlock_ruleset_attr *const attr,
|
|
const size_t size, const __u32 flags)
|
|
{
|
|
return syscall(__NR_landlock_create_ruleset, attr, size, flags);
|
|
}
|
|
#endif
|
|
|
|
#ifndef landlock_add_rule
|
|
static inline int landlock_add_rule(const int ruleset_fd,
|
|
const enum landlock_rule_type rule_type,
|
|
const void *const rule_attr,
|
|
const __u32 flags)
|
|
{
|
|
return syscall(__NR_landlock_add_rule, ruleset_fd, rule_type, rule_attr,
|
|
flags);
|
|
}
|
|
#endif
|
|
|
|
#ifndef landlock_restrict_self
|
|
static inline int landlock_restrict_self(const int ruleset_fd,
|
|
const __u32 flags)
|
|
{
|
|
return syscall(__NR_landlock_restrict_self, ruleset_fd, flags);
|
|
}
|
|
#endif
|
|
|
|
static void _init_caps(struct __test_metadata *const _metadata, bool drop_all)
|
|
{
|
|
cap_t cap_p;
|
|
/* Only these three capabilities are useful for the tests. */
|
|
const cap_value_t caps[] = {
|
|
CAP_DAC_OVERRIDE,
|
|
CAP_MKNOD,
|
|
CAP_SYS_ADMIN,
|
|
CAP_SYS_CHROOT,
|
|
};
|
|
|
|
cap_p = cap_get_proc();
|
|
EXPECT_NE(NULL, cap_p)
|
|
{
|
|
TH_LOG("Failed to cap_get_proc: %s", strerror(errno));
|
|
}
|
|
EXPECT_NE(-1, cap_clear(cap_p))
|
|
{
|
|
TH_LOG("Failed to cap_clear: %s", strerror(errno));
|
|
}
|
|
if (!drop_all) {
|
|
EXPECT_NE(-1, cap_set_flag(cap_p, CAP_PERMITTED,
|
|
ARRAY_SIZE(caps), caps, CAP_SET))
|
|
{
|
|
TH_LOG("Failed to cap_set_flag: %s", strerror(errno));
|
|
}
|
|
}
|
|
EXPECT_NE(-1, cap_set_proc(cap_p))
|
|
{
|
|
TH_LOG("Failed to cap_set_proc: %s", strerror(errno));
|
|
}
|
|
EXPECT_NE(-1, cap_free(cap_p))
|
|
{
|
|
TH_LOG("Failed to cap_free: %s", strerror(errno));
|
|
}
|
|
}
|
|
|
|
/* We cannot put such helpers in a library because of kselftest_harness.h . */
|
|
__attribute__((__unused__)) static void
|
|
disable_caps(struct __test_metadata *const _metadata)
|
|
{
|
|
_init_caps(_metadata, false);
|
|
}
|
|
|
|
__attribute__((__unused__)) static void
|
|
drop_caps(struct __test_metadata *const _metadata)
|
|
{
|
|
_init_caps(_metadata, true);
|
|
}
|
|
|
|
static void _effective_cap(struct __test_metadata *const _metadata,
|
|
const cap_value_t caps, const cap_flag_value_t value)
|
|
{
|
|
cap_t cap_p;
|
|
|
|
cap_p = cap_get_proc();
|
|
EXPECT_NE(NULL, cap_p)
|
|
{
|
|
TH_LOG("Failed to cap_get_proc: %s", strerror(errno));
|
|
}
|
|
EXPECT_NE(-1, cap_set_flag(cap_p, CAP_EFFECTIVE, 1, &caps, value))
|
|
{
|
|
TH_LOG("Failed to cap_set_flag: %s", strerror(errno));
|
|
}
|
|
EXPECT_NE(-1, cap_set_proc(cap_p))
|
|
{
|
|
TH_LOG("Failed to cap_set_proc: %s", strerror(errno));
|
|
}
|
|
EXPECT_NE(-1, cap_free(cap_p))
|
|
{
|
|
TH_LOG("Failed to cap_free: %s", strerror(errno));
|
|
}
|
|
}
|
|
|
|
__attribute__((__unused__)) static void
|
|
set_cap(struct __test_metadata *const _metadata, const cap_value_t caps)
|
|
{
|
|
_effective_cap(_metadata, caps, CAP_SET);
|
|
}
|
|
|
|
__attribute__((__unused__)) static void
|
|
clear_cap(struct __test_metadata *const _metadata, const cap_value_t caps)
|
|
{
|
|
_effective_cap(_metadata, caps, CAP_CLEAR);
|
|
}
|