1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150
|
/*
* Check decoding of landlock_add_rule syscall.
*
* Copyright (c) 2021 Eugene Syromyatnikov <evgsyr@gmail.com>
* Copyright (c) 2021-2024 The strace developers.
* All rights reserved.
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "tests.h"
#include "scno.h"
#include <inttypes.h>
#include <stdio.h>
#include <stdint.h>
#include <unistd.h>
#include <linux/landlock.h>
#ifndef SKIP_IF_PROC_IS_UNAVAILABLE
# define SKIP_IF_PROC_IS_UNAVAILABLE
#endif
#ifndef FD0_STR
# define FD0_STR ""
#endif
#ifndef RULESET_FD
# define RULESET_FD -1
#endif
#ifndef RULESET_FD_STR
# define RULESET_FD_STR "-1"
#endif
#ifndef PARENT_FD
# define PARENT_FD -1
#endif
#ifndef PARENT_FD_STR
# define PARENT_FD_STR "-1"
#endif
static const char *errstr;
static long
sys_landlock_add_rule(int ruleset_fd, unsigned int rule_type, void *rule_attr,
unsigned int flags)
{
static const kernel_ulong_t fill =
(kernel_ulong_t) 0xd1efaced00000000ULL;
kernel_ulong_t arg1 = fill | (unsigned int) ruleset_fd;
kernel_ulong_t arg2 = fill | rule_type;
kernel_ulong_t arg3 = (uintptr_t) rule_attr;
kernel_ulong_t arg4 = fill | flags;
kernel_ulong_t arg5 = fill | 0xdecaffed;
kernel_ulong_t arg6 = fill | 0xdeefaced;
long rc = syscall(__NR_landlock_add_rule,
arg1, arg2, arg3, arg4, arg5, arg6);
errstr = sprintrc(rc);
return rc;
}
int
main(void)
{
SKIP_IF_PROC_IS_UNAVAILABLE;
TAIL_ALLOC_OBJECT_CONST_PTR(struct landlock_path_beneath_attr, attr_path);
TAIL_ALLOC_OBJECT_CONST_PTR(struct landlock_net_port_attr, attr_port);
/* All zeroes */
sys_landlock_add_rule(0, 0, NULL, 0);
printf("landlock_add_rule(0" FD0_STR ", 0 /* LANDLOCK_RULE_??? */"
", NULL, 0) = %s\n", errstr);
/* Bogus values */
sys_landlock_add_rule(0xdeadc0de, 0xfacebeef, attr_path + 1, 1);
printf("landlock_add_rule(-559038242"
", 0xfacebeef /* LANDLOCK_RULE_??? */, %p, 0x1) = %s\n",
attr_path + 1, errstr);
sys_landlock_add_rule(1729, 3, attr_path + 1, 0xffffffff);
printf("landlock_add_rule(1729, 0x3 /* LANDLOCK_RULE_??? */, %p"
", 0xffffffff) = %s\n",
attr_path + 1, errstr);
/* Invalid pointer */
sys_landlock_add_rule(RULESET_FD, LANDLOCK_RULE_PATH_BENEATH,
attr_path + 1, 0);
printf("landlock_add_rule(" RULESET_FD_STR
", LANDLOCK_RULE_PATH_BENEATH, %p, 0) = %s\n",
attr_path + 1, errstr);
/* Short read */
sys_landlock_add_rule(RULESET_FD, LANDLOCK_RULE_NET_PORT,
(char *) attr_port + 4, 0);
printf("landlock_add_rule(" RULESET_FD_STR
", LANDLOCK_RULE_NET_PORT, %p, 0) = %s\n",
(char *) attr_port + 4, errstr);
/* Valid attr ptr */
static const struct strval64 fs_vals[] = {
{ ARG_STR(LANDLOCK_ACCESS_FS_EXECUTE) },
{ ARG_ULL_STR(LANDLOCK_ACCESS_FS_EXECUTE|LANDLOCK_ACCESS_FS_READ_FILE|LANDLOCK_ACCESS_FS_READ_DIR|LANDLOCK_ACCESS_FS_REMOVE_FILE|LANDLOCK_ACCESS_FS_MAKE_CHAR|LANDLOCK_ACCESS_FS_MAKE_DIR|LANDLOCK_ACCESS_FS_MAKE_SOCK|LANDLOCK_ACCESS_FS_MAKE_FIFO|LANDLOCK_ACCESS_FS_MAKE_BLOCK|LANDLOCK_ACCESS_FS_MAKE_SYM|LANDLOCK_ACCESS_FS_REFER|LANDLOCK_ACCESS_FS_TRUNCATE|LANDLOCK_ACCESS_FS_IOCTL_DEV|0xdebeefeddeca0000) },
{ ARG_ULL_STR(0xdebeefeddeca0000)
" /* LANDLOCK_ACCESS_FS_??? */" },
}, net_vals[] = {
{ ARG_STR(LANDLOCK_ACCESS_NET_BIND_TCP) },
{ ARG_STR(LANDLOCK_ACCESS_NET_CONNECT_TCP) },
{ ARG_ULL_STR(LANDLOCK_ACCESS_NET_BIND_TCP|LANDLOCK_ACCESS_NET_CONNECT_TCP|0xfffffffffffffffc) },
{ ARG_ULL_STR(0xfffffffffffffffc)
" /* LANDLOCK_ACCESS_NET_??? */" },
};
static const struct strival32 parent_fd_vals[] = {
{ ARG_STR(-1) },
{ ARG_STR(11630) },
{ PARENT_FD, PARENT_FD_STR },
};
static const unsigned long long port_vals[] = {
0, 0xffff, 0xfacefeeddeadbeefULL
};
for (size_t i = 0; i < ARRAY_SIZE(fs_vals); i++) {
for (size_t j = 0; j < ARRAY_SIZE(parent_fd_vals); j++) {
attr_path->allowed_access = fs_vals[i].val;
attr_path->parent_fd = parent_fd_vals[j].val;
sys_landlock_add_rule(RULESET_FD,
LANDLOCK_RULE_PATH_BENEATH,
attr_path, 0);
printf("landlock_add_rule(" RULESET_FD_STR
", LANDLOCK_RULE_PATH_BENEATH"
", {allowed_access=%s, parent_fd=%s}, 0) = %s\n",
fs_vals[i].str, parent_fd_vals[j].str, errstr);
}
}
for (size_t i = 0; i < ARRAY_SIZE(net_vals); i++) {
for (size_t j = 0; j < ARRAY_SIZE(port_vals); j++) {
attr_port->allowed_access = net_vals[i].val;
attr_port->port = (uint64_t) port_vals[j];
sys_landlock_add_rule(RULESET_FD,
LANDLOCK_RULE_NET_PORT,
attr_port, 0);
printf("landlock_add_rule(" RULESET_FD_STR
", LANDLOCK_RULE_NET_PORT"
", {allowed_access=%s, port=%llu}, 0) = %s\n",
net_vals[i].str, port_vals[j], errstr);
}
}
puts("+++ exited with 0 +++");
return 0;
}
|