blob: 87dbc91644308b0f72a8aa7fea6aed8d27eb48f8 [file] [log] [blame]
// SPDX-License-Identifier: GPL-2.0
/*
* Write in a pipe, wait, sandbox itself, test sandboxing, and wait again.
*
* Used by audit_exec.flags from audit_test.c
*
* Copyright © 2024-2025 Microsoft Corporation
*/
#define _GNU_SOURCE
#include <fcntl.h>
#include <linux/landlock.h>
#include <linux/prctl.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/prctl.h>
#include <unistd.h>
#include "wrappers.h"
static int sync_with(int pipe_child, int pipe_parent)
{
char buf;
/* Signals that we are waiting. */
if (write(pipe_child, ".", 1) != 1) {
perror("Failed to write to first argument");
return 1;
}
/* Waits for the parent do its test. */
if (read(pipe_parent, &buf, 1) != 1) {
perror("Failed to write to the second argument");
return 1;
}
return 0;
}
int main(int argc, char *argv[])
{
const struct landlock_ruleset_attr layer2 = {
.handled_access_fs = LANDLOCK_ACCESS_FS_READ_DIR,
};
const struct landlock_ruleset_attr layer3 = {
.scoped = LANDLOCK_SCOPE_SIGNAL,
};
int err, pipe_child, pipe_parent, ruleset_fd;
/* The first argument must be the file descriptor number of a pipe. */
if (argc != 3) {
fprintf(stderr, "Wrong number of arguments (not two)\n");
return 1;
}
pipe_child = atoi(argv[1]);
pipe_parent = atoi(argv[2]);
/* PR_SET_NO_NEW_PRIVS already set by parent. */
/* First step to test parent's layer1. */
err = sync_with(pipe_child, pipe_parent);
if (err)
return err;
/* Tries to send a signal, denied by layer1. */
if (!kill(getppid(), 0)) {
fprintf(stderr, "Successfully sent a signal to the parent");
return 1;
}
/* Second step to test parent's layer1 and our layer2. */
err = sync_with(pipe_child, pipe_parent);
if (err)
return err;
ruleset_fd = landlock_create_ruleset(&layer2, sizeof(layer2), 0);
if (ruleset_fd < 0) {
perror("Failed to create the layer2 ruleset");
return 1;
}
if (landlock_restrict_self(ruleset_fd, 0)) {
perror("Failed to restrict self");
return 1;
}
close(ruleset_fd);
/* Tries to send a signal, denied by layer1. */
if (!kill(getppid(), 0)) {
fprintf(stderr, "Successfully sent a signal to the parent");
return 1;
}
/* Tries to open ., denied by layer2. */
if (open("/", O_RDONLY | O_DIRECTORY | O_CLOEXEC) >= 0) {
fprintf(stderr, "Successfully opened /");
return 1;
}
/* Third step to test our layer2 and layer3. */
err = sync_with(pipe_child, pipe_parent);
if (err)
return err;
ruleset_fd = landlock_create_ruleset(&layer3, sizeof(layer3), 0);
if (ruleset_fd < 0) {
perror("Failed to create the layer3 ruleset");
return 1;
}
if (landlock_restrict_self(ruleset_fd, 0)) {
perror("Failed to restrict self");
return 1;
}
close(ruleset_fd);
/* Tries to open ., denied by layer2. */
if (open("/", O_RDONLY | O_DIRECTORY | O_CLOEXEC) >= 0) {
fprintf(stderr, "Successfully opened /");
return 1;
}
/* Tries to send a signal, denied by layer3. */
if (!kill(getppid(), 0)) {
fprintf(stderr, "Successfully sent a signal to the parent");
return 1;
}
return 0;
}