root/tools/testing/selftests/landlock/net_test.c
// SPDX-License-Identifier: GPL-2.0-only
/*
 * Landlock tests - Network
 *
 * Copyright © 2022-2023 Huawei Tech. Co., Ltd.
 * Copyright © 2023 Microsoft Corporation
 */

#define _GNU_SOURCE
#include <arpa/inet.h>
#include <errno.h>
#include <fcntl.h>
#include <linux/landlock.h>
#include <linux/in.h>
#include <sched.h>
#include <stdint.h>
#include <string.h>
#include <sys/prctl.h>
#include <sys/socket.h>
#include <sys/syscall.h>
#include <sys/un.h>

#include "audit.h"
#include "common.h"

const short sock_port_start = (1 << 10);

static const char loopback_ipv4[] = "127.0.0.1";
static const char loopback_ipv6[] = "::1";

/* Number pending connections queue to be hold. */
const short backlog = 10;

enum sandbox_type {
        NO_SANDBOX,
        /* This may be used to test rules that allow *and* deny accesses. */
        TCP_SANDBOX,
};

static int set_service(struct service_fixture *const srv,
                       const struct protocol_variant prot,
                       const unsigned short index)
{
        memset(srv, 0, sizeof(*srv));

        /*
         * Copies all protocol properties in case of the variant only contains
         * a subset of them.
         */
        srv->protocol = prot;

        /* Checks for port overflow. */
        if (index > 2)
                return 1;
        srv->port = sock_port_start << (2 * index);

        switch (prot.domain) {
        case AF_UNSPEC:
        case AF_INET:
                srv->ipv4_addr.sin_family = prot.domain;
                srv->ipv4_addr.sin_port = htons(srv->port);
                srv->ipv4_addr.sin_addr.s_addr = inet_addr(loopback_ipv4);
                return 0;

        case AF_INET6:
                srv->ipv6_addr.sin6_family = prot.domain;
                srv->ipv6_addr.sin6_port = htons(srv->port);
                inet_pton(AF_INET6, loopback_ipv6, &srv->ipv6_addr.sin6_addr);
                return 0;

        case AF_UNIX:
                set_unix_address(srv, index);
                return 0;
        }
        return 1;
}

static void setup_loopback(struct __test_metadata *const _metadata)
{
        set_cap(_metadata, CAP_SYS_ADMIN);
        ASSERT_EQ(0, unshare(CLONE_NEWNET));
        clear_cap(_metadata, CAP_SYS_ADMIN);

        set_ambient_cap(_metadata, CAP_NET_ADMIN);
        ASSERT_EQ(0, system("ip link set dev lo up"));
        clear_ambient_cap(_metadata, CAP_NET_ADMIN);
}

static bool prot_is_tcp(const struct protocol_variant *const prot)
{
        return (prot->domain == AF_INET || prot->domain == AF_INET6) &&
               prot->type == SOCK_STREAM &&
               (prot->protocol == IPPROTO_TCP || prot->protocol == IPPROTO_IP);
}

static bool is_restricted(const struct protocol_variant *const prot,
                          const enum sandbox_type sandbox)
{
        if (sandbox == TCP_SANDBOX)
                return prot_is_tcp(prot);
        return false;
}

static int socket_variant(const struct service_fixture *const srv)
{
        int ret;

        ret = socket(srv->protocol.domain, srv->protocol.type | SOCK_CLOEXEC,
                     srv->protocol.protocol);
        if (ret < 0)
                return -errno;
        return ret;
}

#ifndef SIN6_LEN_RFC2133
#define SIN6_LEN_RFC2133 24
#endif

static socklen_t get_addrlen(const struct service_fixture *const srv,
                             const bool minimal)
{
        switch (srv->protocol.domain) {
        case AF_UNSPEC:
                if (minimal)
                        return sizeof(sa_family_t);
                return sizeof(struct sockaddr_storage);

        case AF_INET:
                return sizeof(srv->ipv4_addr);

        case AF_INET6:
                if (minimal)
                        return SIN6_LEN_RFC2133;
                return sizeof(srv->ipv6_addr);

        case AF_UNIX:
                if (minimal)
                        return sizeof(srv->unix_addr) -
                               sizeof(srv->unix_addr.sun_path);
                return srv->unix_addr_len;

        default:
                return 0;
        }
}

static void set_port(struct service_fixture *const srv, uint16_t port)
{
        switch (srv->protocol.domain) {
        case AF_UNSPEC:
        case AF_INET:
                srv->ipv4_addr.sin_port = htons(port);
                return;

        case AF_INET6:
                srv->ipv6_addr.sin6_port = htons(port);
                return;

        default:
                return;
        }
}

static uint16_t get_binded_port(int socket_fd,
                                const struct protocol_variant *const prot)
{
        struct sockaddr_in ipv4_addr;
        struct sockaddr_in6 ipv6_addr;
        socklen_t ipv4_addr_len, ipv6_addr_len;

        /* Gets binded port. */
        switch (prot->domain) {
        case AF_UNSPEC:
        case AF_INET:
                ipv4_addr_len = sizeof(ipv4_addr);
                getsockname(socket_fd, &ipv4_addr, &ipv4_addr_len);
                return ntohs(ipv4_addr.sin_port);

        case AF_INET6:
                ipv6_addr_len = sizeof(ipv6_addr);
                getsockname(socket_fd, &ipv6_addr, &ipv6_addr_len);
                return ntohs(ipv6_addr.sin6_port);

        default:
                return 0;
        }
}

static int bind_variant_addrlen(const int sock_fd,
                                const struct service_fixture *const srv,
                                const socklen_t addrlen)
{
        int ret;

        switch (srv->protocol.domain) {
        case AF_UNSPEC:
        case AF_INET:
                ret = bind(sock_fd, &srv->ipv4_addr, addrlen);
                break;

        case AF_INET6:
                ret = bind(sock_fd, &srv->ipv6_addr, addrlen);
                break;

        case AF_UNIX:
                ret = bind(sock_fd, &srv->unix_addr, addrlen);
                break;

        default:
                errno = EAFNOSUPPORT;
                return -errno;
        }

        if (ret < 0)
                return -errno;
        return ret;
}

static int bind_variant(const int sock_fd,
                        const struct service_fixture *const srv)
{
        return bind_variant_addrlen(sock_fd, srv, get_addrlen(srv, false));
}

static int connect_variant_addrlen(const int sock_fd,
                                   const struct service_fixture *const srv,
                                   const socklen_t addrlen)
{
        int ret;

        switch (srv->protocol.domain) {
        case AF_UNSPEC:
        case AF_INET:
                ret = connect(sock_fd, &srv->ipv4_addr, addrlen);
                break;

        case AF_INET6:
                ret = connect(sock_fd, &srv->ipv6_addr, addrlen);
                break;

        case AF_UNIX:
                ret = connect(sock_fd, &srv->unix_addr, addrlen);
                break;

        default:
                errno = -EAFNOSUPPORT;
                return -errno;
        }

        if (ret < 0)
                return -errno;
        return ret;
}

static int connect_variant(const int sock_fd,
                           const struct service_fixture *const srv)
{
        return connect_variant_addrlen(sock_fd, srv, get_addrlen(srv, false));
}

FIXTURE(protocol)
{
        struct service_fixture srv0, srv1, srv2, unspec_any0, unspec_srv0;
};

FIXTURE_VARIANT(protocol)
{
        const enum sandbox_type sandbox;
        const struct protocol_variant prot;
};

FIXTURE_SETUP(protocol)
{
        const struct protocol_variant prot_unspec = {
                .domain = AF_UNSPEC,
                .type = SOCK_STREAM,
        };

        disable_caps(_metadata);

        ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));
        ASSERT_EQ(0, set_service(&self->srv1, variant->prot, 1));
        ASSERT_EQ(0, set_service(&self->srv2, variant->prot, 2));

        ASSERT_EQ(0, set_service(&self->unspec_srv0, prot_unspec, 0));

        ASSERT_EQ(0, set_service(&self->unspec_any0, prot_unspec, 0));
        self->unspec_any0.ipv4_addr.sin_addr.s_addr = htonl(INADDR_ANY);

        setup_loopback(_metadata);
};

FIXTURE_TEARDOWN(protocol)
{
}

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp1) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
                /* IPPROTO_IP == 0 */
                .protocol = IPPROTO_IP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp2) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_TCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_mptcp) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_MPTCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp1) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
                /* IPPROTO_IP == 0 */
                .protocol = IPPROTO_IP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp2) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_TCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_mptcp) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_MPTCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_udp) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_DGRAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_udp) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_DGRAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_stream) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_UNIX,
                .type = SOCK_STREAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_datagram) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_UNIX,
                .type = SOCK_DGRAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp1) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
                /* IPPROTO_IP == 0 */
                .protocol = IPPROTO_IP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp2) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_TCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_mptcp) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_MPTCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp1) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
                /* IPPROTO_IP == 0 */
                .protocol = IPPROTO_IP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp2) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_TCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_mptcp) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
                .protocol = IPPROTO_MPTCP,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_udp) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_DGRAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_udp) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_DGRAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_unix_stream) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_UNIX,
                .type = SOCK_STREAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_unix_datagram) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_UNIX,
                .type = SOCK_DGRAM,
        },
};

static void test_bind_and_connect(struct __test_metadata *const _metadata,
                                  const struct service_fixture *const srv,
                                  const bool deny_bind, const bool deny_connect)
{
        char buf = '\0';
        int inval_fd, bind_fd, client_fd, status, ret;
        pid_t child;

        /* Starts invalid addrlen tests with bind. */
        inval_fd = socket_variant(srv);
        ASSERT_LE(0, inval_fd)
        {
                TH_LOG("Failed to create socket: %s", strerror(errno));
        }

        /* Tries to bind with zero as addrlen. */
        EXPECT_EQ(-EINVAL, bind_variant_addrlen(inval_fd, srv, 0));

        /* Tries to bind with too small addrlen. */
        EXPECT_EQ(-EINVAL, bind_variant_addrlen(inval_fd, srv,
                                                get_addrlen(srv, true) - 1));

        /* Tries to bind with minimal addrlen. */
        ret = bind_variant_addrlen(inval_fd, srv, get_addrlen(srv, true));
        if (deny_bind) {
                EXPECT_EQ(-EACCES, ret);
        } else {
                EXPECT_EQ(0, ret)
                {
                        TH_LOG("Failed to bind to socket: %s", strerror(errno));
                }
        }
        EXPECT_EQ(0, close(inval_fd));

        /* Starts invalid addrlen tests with connect. */
        inval_fd = socket_variant(srv);
        ASSERT_LE(0, inval_fd);

        /* Tries to connect with zero as addrlen. */
        EXPECT_EQ(-EINVAL, connect_variant_addrlen(inval_fd, srv, 0));

        /* Tries to connect with too small addrlen. */
        EXPECT_EQ(-EINVAL, connect_variant_addrlen(inval_fd, srv,
                                                   get_addrlen(srv, true) - 1));

        /* Tries to connect with minimal addrlen. */
        ret = connect_variant_addrlen(inval_fd, srv, get_addrlen(srv, true));
        if (srv->protocol.domain == AF_UNIX) {
                EXPECT_EQ(-EINVAL, ret);
        } else if (deny_connect) {
                EXPECT_EQ(-EACCES, ret);
        } else if (srv->protocol.type == SOCK_STREAM) {
                /* No listening server, whatever the value of deny_bind. */
                EXPECT_EQ(-ECONNREFUSED, ret);
        } else {
                EXPECT_EQ(0, ret)
                {
                        TH_LOG("Failed to connect to socket: %s",
                               strerror(errno));
                }
        }
        EXPECT_EQ(0, close(inval_fd));

        /* Starts connection tests. */
        bind_fd = socket_variant(srv);
        ASSERT_LE(0, bind_fd);

        ret = bind_variant(bind_fd, srv);
        if (deny_bind) {
                EXPECT_EQ(-EACCES, ret);
        } else {
                EXPECT_EQ(0, ret);

                /* Creates a listening socket. */
                if (srv->protocol.type == SOCK_STREAM)
                        EXPECT_EQ(0, listen(bind_fd, backlog));
        }

        child = fork();
        ASSERT_LE(0, child);
        if (child == 0) {
                int connect_fd, ret;

                /* Closes listening socket for the child. */
                EXPECT_EQ(0, close(bind_fd));

                /* Starts connection tests. */
                connect_fd = socket_variant(srv);
                ASSERT_LE(0, connect_fd);
                ret = connect_variant(connect_fd, srv);
                if (deny_connect) {
                        EXPECT_EQ(-EACCES, ret);
                } else if (deny_bind) {
                        /* No listening server. */
                        EXPECT_EQ(-ECONNREFUSED, ret);
                } else {
                        EXPECT_EQ(0, ret);
                        EXPECT_EQ(1, write(connect_fd, ".", 1));
                }

                EXPECT_EQ(0, close(connect_fd));
                _exit(_metadata->exit_code);
                return;
        }

        /* Accepts connection from the child. */
        client_fd = bind_fd;
        if (!deny_bind && !deny_connect) {
                if (srv->protocol.type == SOCK_STREAM) {
                        client_fd = accept(bind_fd, NULL, 0);
                        ASSERT_LE(0, client_fd);
                }

                EXPECT_EQ(1, read(client_fd, &buf, 1));
                EXPECT_EQ('.', buf);
        }

        EXPECT_EQ(child, waitpid(child, &status, 0));
        EXPECT_EQ(1, WIFEXITED(status));
        EXPECT_EQ(EXIT_SUCCESS, WEXITSTATUS(status));

        /* Closes connection, if any. */
        if (client_fd != bind_fd)
                EXPECT_LE(0, close(client_fd));

        /* Closes listening socket. */
        EXPECT_EQ(0, close(bind_fd));
}

TEST_F(protocol, bind)
{
        if (variant->sandbox == TCP_SANDBOX) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP,
                };
                const struct landlock_net_port_attr tcp_bind_connect_p0 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = self->srv0.port,
                };
                const struct landlock_net_port_attr tcp_connect_p1 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = self->srv1.port,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Allows connect and bind for the first port.  */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect_p0, 0));

                /* Allows connect and denies bind for the second port. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_connect_p1, 0));

                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        /* Binds a socket to the first port. */
        test_bind_and_connect(_metadata, &self->srv0, false, false);

        /* Binds a socket to the second port. */
        test_bind_and_connect(_metadata, &self->srv1,
                              is_restricted(&variant->prot, variant->sandbox),
                              false);

        /* Binds a socket to the third port. */
        test_bind_and_connect(_metadata, &self->srv2,
                              is_restricted(&variant->prot, variant->sandbox),
                              is_restricted(&variant->prot, variant->sandbox));
}

TEST_F(protocol, connect)
{
        if (variant->sandbox == TCP_SANDBOX) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP,
                };
                const struct landlock_net_port_attr tcp_bind_connect_p0 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = self->srv0.port,
                };
                const struct landlock_net_port_attr tcp_bind_p1 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                        .port = self->srv1.port,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Allows connect and bind for the first port. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect_p0, 0));

                /* Allows bind and denies connect for the second port. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_p1, 0));

                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        test_bind_and_connect(_metadata, &self->srv0, false, false);

        test_bind_and_connect(_metadata, &self->srv1, false,
                              is_restricted(&variant->prot, variant->sandbox));

        test_bind_and_connect(_metadata, &self->srv2,
                              is_restricted(&variant->prot, variant->sandbox),
                              is_restricted(&variant->prot, variant->sandbox));
}

TEST_F(protocol, bind_unspec)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
        };
        const struct landlock_net_port_attr tcp_bind = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = self->srv0.port,
        };
        int bind_fd, ret;

        if (variant->sandbox == TCP_SANDBOX) {
                const int ruleset_fd = landlock_create_ruleset(
                        &ruleset_attr, sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Allows bind. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);

        /* Tries to bind with too small addrlen. */
        EXPECT_EQ(-EINVAL, bind_variant_addrlen(
                                   bind_fd, &self->unspec_any0,
                                   get_addrlen(&self->unspec_any0, true) - 1));

        /* Allowed bind on AF_UNSPEC/INADDR_ANY. */
        ret = bind_variant(bind_fd, &self->unspec_any0);
        if (variant->prot.domain == AF_INET) {
                EXPECT_EQ(0, ret)
                {
                        TH_LOG("Failed to bind to unspec/any socket: %s",
                               strerror(errno));
                }
        } else if (variant->prot.domain == AF_INET6) {
                EXPECT_EQ(-EAFNOSUPPORT, ret);
        } else {
                EXPECT_EQ(-EINVAL, ret);
        }
        EXPECT_EQ(0, close(bind_fd));

        if (variant->sandbox == TCP_SANDBOX) {
                const int ruleset_fd = landlock_create_ruleset(
                        &ruleset_attr, sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Denies bind. */
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);

        /* Denied bind on AF_UNSPEC/INADDR_ANY. */
        ret = bind_variant(bind_fd, &self->unspec_any0);
        if (variant->prot.domain == AF_INET) {
                if (is_restricted(&variant->prot, variant->sandbox)) {
                        EXPECT_EQ(-EACCES, ret);
                } else {
                        EXPECT_EQ(0, ret);
                }
        } else if (variant->prot.domain == AF_INET6) {
                EXPECT_EQ(-EAFNOSUPPORT, ret);
        } else {
                EXPECT_EQ(-EINVAL, ret);
        }
        EXPECT_EQ(0, close(bind_fd));

        /* Checks bind with AF_UNSPEC and the loopback address. */
        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);
        ret = bind_variant(bind_fd, &self->unspec_srv0);
        if (variant->prot.domain == AF_INET ||
            variant->prot.domain == AF_INET6) {
                EXPECT_EQ(-EAFNOSUPPORT, ret);
        } else {
                EXPECT_EQ(-EINVAL, ret)
                {
                        TH_LOG("Wrong bind error: %s", strerror(errno));
                }
        }
        EXPECT_EQ(0, close(bind_fd));
}

TEST_F(protocol, connect_unspec)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_CONNECT_TCP,
        };
        const struct landlock_net_port_attr tcp_connect = {
                .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
                .port = self->srv0.port,
        };
        int bind_fd, client_fd, status;
        pid_t child;

        /* Specific connection tests. */
        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);
        EXPECT_EQ(0, bind_variant(bind_fd, &self->srv0));
        if (self->srv0.protocol.type == SOCK_STREAM)
                EXPECT_EQ(0, listen(bind_fd, backlog));

        child = fork();
        ASSERT_LE(0, child);
        if (child == 0) {
                int connect_fd, ret;

                /* Closes listening socket for the child. */
                EXPECT_EQ(0, close(bind_fd));

                connect_fd = socket_variant(&self->srv0);
                ASSERT_LE(0, connect_fd);
                EXPECT_EQ(0, connect_variant(connect_fd, &self->srv0));

                /* Tries to connect again, or set peer. */
                ret = connect_variant(connect_fd, &self->srv0);
                if (self->srv0.protocol.type == SOCK_STREAM) {
                        EXPECT_EQ(-EISCONN, ret);
                } else {
                        EXPECT_EQ(0, ret);
                }

                if (variant->sandbox == TCP_SANDBOX) {
                        const int ruleset_fd = landlock_create_ruleset(
                                &ruleset_attr, sizeof(ruleset_attr), 0);
                        ASSERT_LE(0, ruleset_fd);

                        /* Allows connect. */
                        ASSERT_EQ(0, landlock_add_rule(ruleset_fd,
                                                       LANDLOCK_RULE_NET_PORT,
                                                       &tcp_connect, 0));
                        enforce_ruleset(_metadata, ruleset_fd);
                        EXPECT_EQ(0, close(ruleset_fd));
                }

                /* Disconnects already connected socket, or set peer. */
                ret = connect_variant(connect_fd, &self->unspec_any0);
                if (self->srv0.protocol.domain == AF_UNIX &&
                    self->srv0.protocol.type == SOCK_STREAM) {
                        EXPECT_EQ(-EINVAL, ret);
                } else {
                        EXPECT_EQ(0, ret);
                }

                /* Tries to reconnect, or set peer. */
                ret = connect_variant(connect_fd, &self->srv0);
                if (self->srv0.protocol.domain == AF_UNIX &&
                    self->srv0.protocol.type == SOCK_STREAM) {
                        EXPECT_EQ(-EISCONN, ret);
                } else {
                        EXPECT_EQ(0, ret);
                }

                if (variant->sandbox == TCP_SANDBOX) {
                        const int ruleset_fd = landlock_create_ruleset(
                                &ruleset_attr, sizeof(ruleset_attr), 0);
                        ASSERT_LE(0, ruleset_fd);

                        /* Denies connect. */
                        enforce_ruleset(_metadata, ruleset_fd);
                        EXPECT_EQ(0, close(ruleset_fd));
                }

                /* Try to re-disconnect with a truncated address struct. */
                EXPECT_EQ(-EINVAL,
                          connect_variant_addrlen(
                                  connect_fd, &self->unspec_any0,
                                  get_addrlen(&self->unspec_any0, true) - 1));

                /*
                 * Re-disconnect, with a minimal sockaddr struct (just a
                 * bare af_family=AF_UNSPEC field).
                 */
                ret = connect_variant_addrlen(connect_fd, &self->unspec_any0,
                                              get_addrlen(&self->unspec_any0,
                                                          true));
                if (self->srv0.protocol.domain == AF_UNIX &&
                    self->srv0.protocol.type == SOCK_STREAM) {
                        EXPECT_EQ(-EINVAL, ret);
                } else {
                        /* Always allowed to disconnect. */
                        EXPECT_EQ(0, ret);
                }

                EXPECT_EQ(0, close(connect_fd));
                _exit(_metadata->exit_code);
                return;
        }

        client_fd = bind_fd;
        if (self->srv0.protocol.type == SOCK_STREAM) {
                client_fd = accept(bind_fd, NULL, 0);
                ASSERT_LE(0, client_fd);
        }

        EXPECT_EQ(child, waitpid(child, &status, 0));
        EXPECT_EQ(1, WIFEXITED(status));
        EXPECT_EQ(EXIT_SUCCESS, WEXITSTATUS(status));

        /* Closes connection, if any. */
        if (client_fd != bind_fd)
                EXPECT_LE(0, close(client_fd));

        /* Closes listening socket. */
        EXPECT_EQ(0, close(bind_fd));
}

FIXTURE(ipv4)
{
        struct service_fixture srv0, srv1;
};

FIXTURE_VARIANT(ipv4)
{
        const enum sandbox_type sandbox;
        const int type;
};

/* clang-format off */
FIXTURE_VARIANT_ADD(ipv4, no_sandbox_with_tcp) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .type = SOCK_STREAM,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(ipv4, tcp_sandbox_with_tcp) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .type = SOCK_STREAM,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(ipv4, no_sandbox_with_udp) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .type = SOCK_DGRAM,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(ipv4, tcp_sandbox_with_udp) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .type = SOCK_DGRAM,
};

FIXTURE_SETUP(ipv4)
{
        const struct protocol_variant prot = {
                .domain = AF_INET,
                .type = variant->type,
        };

        disable_caps(_metadata);

        set_service(&self->srv0, prot, 0);
        set_service(&self->srv1, prot, 1);

        setup_loopback(_metadata);
};

FIXTURE_TEARDOWN(ipv4)
{
}

TEST_F(ipv4, from_unix_to_inet)
{
        int unix_stream_fd, unix_dgram_fd;

        if (variant->sandbox == TCP_SANDBOX) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP,
                };
                const struct landlock_net_port_attr tcp_bind_connect_p0 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = self->srv0.port,
                };
                int ruleset_fd;

                /* Denies connect and bind to check errno value. */
                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Allows connect and bind for srv0.  */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect_p0, 0));

                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        unix_stream_fd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
        ASSERT_LE(0, unix_stream_fd);

        unix_dgram_fd = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0);
        ASSERT_LE(0, unix_dgram_fd);

        /* Checks unix stream bind and connect for srv0. */
        EXPECT_EQ(-EINVAL, bind_variant(unix_stream_fd, &self->srv0));
        EXPECT_EQ(-EINVAL, connect_variant(unix_stream_fd, &self->srv0));

        /* Checks unix stream bind and connect for srv1. */
        EXPECT_EQ(-EINVAL, bind_variant(unix_stream_fd, &self->srv1))
        {
                TH_LOG("Wrong bind error: %s", strerror(errno));
        }
        EXPECT_EQ(-EINVAL, connect_variant(unix_stream_fd, &self->srv1));

        /* Checks unix datagram bind and connect for srv0. */
        EXPECT_EQ(-EINVAL, bind_variant(unix_dgram_fd, &self->srv0));
        EXPECT_EQ(-EINVAL, connect_variant(unix_dgram_fd, &self->srv0));

        /* Checks unix datagram bind and connect for srv1. */
        EXPECT_EQ(-EINVAL, bind_variant(unix_dgram_fd, &self->srv1));
        EXPECT_EQ(-EINVAL, connect_variant(unix_dgram_fd, &self->srv1));
}

FIXTURE(tcp_layers)
{
        struct service_fixture srv0, srv1;
};

FIXTURE_VARIANT(tcp_layers)
{
        const size_t num_layers;
        const int domain;
};

FIXTURE_SETUP(tcp_layers)
{
        const struct protocol_variant prot = {
                .domain = variant->domain,
                .type = SOCK_STREAM,
        };

        disable_caps(_metadata);

        ASSERT_EQ(0, set_service(&self->srv0, prot, 0));
        ASSERT_EQ(0, set_service(&self->srv1, prot, 1));

        setup_loopback(_metadata);
};

FIXTURE_TEARDOWN(tcp_layers)
{
}

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, no_sandbox_with_ipv4) {
        /* clang-format on */
        .domain = AF_INET,
        .num_layers = 0,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, one_sandbox_with_ipv4) {
        /* clang-format on */
        .domain = AF_INET,
        .num_layers = 1,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, two_sandboxes_with_ipv4) {
        /* clang-format on */
        .domain = AF_INET,
        .num_layers = 2,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, three_sandboxes_with_ipv4) {
        /* clang-format on */
        .domain = AF_INET,
        .num_layers = 3,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, no_sandbox_with_ipv6) {
        /* clang-format on */
        .domain = AF_INET6,
        .num_layers = 0,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, one_sandbox_with_ipv6) {
        /* clang-format on */
        .domain = AF_INET6,
        .num_layers = 1,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, two_sandboxes_with_ipv6) {
        /* clang-format on */
        .domain = AF_INET6,
        .num_layers = 2,
};

/* clang-format off */
FIXTURE_VARIANT_ADD(tcp_layers, three_sandboxes_with_ipv6) {
        /* clang-format on */
        .domain = AF_INET6,
        .num_layers = 3,
};

TEST_F(tcp_layers, ruleset_overlap)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                      LANDLOCK_ACCESS_NET_CONNECT_TCP,
        };
        const struct landlock_net_port_attr tcp_bind = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = self->srv0.port,
        };
        const struct landlock_net_port_attr tcp_bind_connect = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                  LANDLOCK_ACCESS_NET_CONNECT_TCP,
                .port = self->srv0.port,
        };

        if (variant->num_layers >= 1) {
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Allows bind. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind, 0));
                /* Also allows bind, but allows connect too. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        if (variant->num_layers >= 2) {
                int ruleset_fd;

                /* Creates another ruleset layer. */
                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Only allows bind. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        if (variant->num_layers >= 3) {
                int ruleset_fd;

                /* Creates another ruleset layer. */
                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Try to allow bind and connect. */
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        /*
         * Forbids to connect to the socket because only one ruleset layer
         * allows connect.
         */
        test_bind_and_connect(_metadata, &self->srv0, false,
                              variant->num_layers >= 2);
}

TEST_F(tcp_layers, ruleset_expand)
{
        if (variant->num_layers >= 1) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
                };
                /* Allows bind for srv0. */
                const struct landlock_net_port_attr bind_srv0 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                        .port = self->srv0.port,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &bind_srv0, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        if (variant->num_layers >= 2) {
                /* Expands network mask with connect action. */
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP,
                };
                /* Allows bind for srv0 and connect to srv0. */
                const struct landlock_net_port_attr tcp_bind_connect_p0 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = self->srv0.port,
                };
                /* Try to allow bind for srv1. */
                const struct landlock_net_port_attr tcp_bind_p1 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                        .port = self->srv1.port,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect_p0, 0));
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_p1, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        if (variant->num_layers >= 3) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP,
                };
                /* Allows connect to srv0, without bind rule. */
                const struct landlock_net_port_attr tcp_bind_p0 = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                        .port = self->srv0.port,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_p0, 0));
                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        test_bind_and_connect(_metadata, &self->srv0, false,
                              variant->num_layers >= 3);

        test_bind_and_connect(_metadata, &self->srv1, variant->num_layers >= 1,
                              variant->num_layers >= 2);
}

/* clang-format off */
FIXTURE(mini) {};
/* clang-format on */

FIXTURE_SETUP(mini)
{
        disable_caps(_metadata);

        setup_loopback(_metadata);
};

FIXTURE_TEARDOWN(mini)
{
}

/* clang-format off */

#define ACCESS_LAST LANDLOCK_ACCESS_NET_CONNECT_TCP

#define ACCESS_ALL ( \
        LANDLOCK_ACCESS_NET_BIND_TCP | \
        LANDLOCK_ACCESS_NET_CONNECT_TCP)

/* clang-format on */

TEST_F(mini, network_access_rights)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = ACCESS_ALL,
        };
        struct landlock_net_port_attr net_port = {
                .port = sock_port_start,
        };
        int ruleset_fd;
        __u64 access;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);

        for (access = 1; access <= ACCESS_LAST; access <<= 1) {
                net_port.allowed_access = access;
                EXPECT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &net_port, 0))
                {
                        TH_LOG("Failed to add rule with access 0x%llx: %s",
                               access, strerror(errno));
                }
        }
        EXPECT_EQ(0, close(ruleset_fd));
}

/* Checks invalid attribute, out of landlock network access range. */
TEST_F(mini, ruleset_with_unknown_access)
{
        __u64 access_mask;

        for (access_mask = 1ULL << 63; access_mask != ACCESS_LAST;
             access_mask >>= 1) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = access_mask,
                };

                EXPECT_EQ(-1, landlock_create_ruleset(&ruleset_attr,
                                                      sizeof(ruleset_attr), 0));
                EXPECT_EQ(EINVAL, errno);
        }
}

TEST_F(mini, rule_with_unknown_access)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = ACCESS_ALL,
        };
        struct landlock_net_port_attr net_port = {
                .port = sock_port_start,
        };
        int ruleset_fd;
        __u64 access;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);

        for (access = 1ULL << 63; access != ACCESS_LAST; access >>= 1) {
                net_port.allowed_access = access;
                EXPECT_EQ(-1,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &net_port, 0));
                EXPECT_EQ(EINVAL, errno);
        }
        EXPECT_EQ(0, close(ruleset_fd));
}

TEST_F(mini, rule_with_unhandled_access)
{
        struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
        };
        struct landlock_net_port_attr net_port = {
                .port = sock_port_start,
        };
        int ruleset_fd;
        __u64 access;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);

        for (access = 1; access > 0; access <<= 1) {
                int err;

                net_port.allowed_access = access;
                err = landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &net_port, 0);
                if (access == ruleset_attr.handled_access_net) {
                        EXPECT_EQ(0, err);
                } else {
                        EXPECT_EQ(-1, err);
                        EXPECT_EQ(EINVAL, errno);
                }
        }

        EXPECT_EQ(0, close(ruleset_fd));
}

TEST_F(mini, inval)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP
        };
        const struct landlock_net_port_attr tcp_bind_connect = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                  LANDLOCK_ACCESS_NET_CONNECT_TCP,
                .port = sock_port_start,
        };
        const struct landlock_net_port_attr tcp_denied = {
                .allowed_access = 0,
                .port = sock_port_start,
        };
        const struct landlock_net_port_attr tcp_bind = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = sock_port_start,
        };
        int ruleset_fd;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);

        /* Checks unhandled allowed_access. */
        EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &tcp_bind_connect, 0));
        EXPECT_EQ(EINVAL, errno);

        /* Checks zero access value. */
        EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &tcp_denied, 0));
        EXPECT_EQ(ENOMSG, errno);

        /* Adds with legitimate values. */
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &tcp_bind, 0));
}

TEST_F(mini, tcp_port_overflow)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                      LANDLOCK_ACCESS_NET_CONNECT_TCP,
        };
        const struct landlock_net_port_attr port_max_bind = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = UINT16_MAX,
        };
        const struct landlock_net_port_attr port_max_connect = {
                .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
                .port = UINT16_MAX,
        };
        const struct landlock_net_port_attr port_overflow1 = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = UINT16_MAX + 1,
        };
        const struct landlock_net_port_attr port_overflow2 = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = UINT16_MAX + 2,
        };
        const struct landlock_net_port_attr port_overflow3 = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = UINT32_MAX + 1UL,
        };
        const struct landlock_net_port_attr port_overflow4 = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = UINT32_MAX + 2UL,
        };
        const struct protocol_variant ipv4_tcp = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
        };
        struct service_fixture srv_denied, srv_max_allowed;
        int ruleset_fd;

        ASSERT_EQ(0, set_service(&srv_denied, ipv4_tcp, 0));

        /* Be careful to avoid port inconsistencies. */
        srv_max_allowed = srv_denied;
        srv_max_allowed.port = port_max_bind.port;
        srv_max_allowed.ipv4_addr.sin_port = htons(port_max_bind.port);

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);

        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &port_max_bind, 0));

        EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &port_overflow1, 0));
        EXPECT_EQ(EINVAL, errno);

        EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &port_overflow2, 0));
        EXPECT_EQ(EINVAL, errno);

        EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &port_overflow3, 0));
        EXPECT_EQ(EINVAL, errno);

        /* Interleaves with invalid rule additions. */
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &port_max_connect, 0));

        EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                        &port_overflow4, 0));
        EXPECT_EQ(EINVAL, errno);

        enforce_ruleset(_metadata, ruleset_fd);

        test_bind_and_connect(_metadata, &srv_denied, true, true);
        test_bind_and_connect(_metadata, &srv_max_allowed, false, false);
}

FIXTURE(ipv4_tcp)
{
        struct service_fixture srv0, srv1;
};

FIXTURE_SETUP(ipv4_tcp)
{
        const struct protocol_variant ipv4_tcp = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
        };

        disable_caps(_metadata);

        ASSERT_EQ(0, set_service(&self->srv0, ipv4_tcp, 0));
        ASSERT_EQ(0, set_service(&self->srv1, ipv4_tcp, 1));

        setup_loopback(_metadata);
};

FIXTURE_TEARDOWN(ipv4_tcp)
{
}

TEST_F(ipv4_tcp, port_endianness)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                      LANDLOCK_ACCESS_NET_CONNECT_TCP,
        };
        const struct landlock_net_port_attr bind_host_endian_p0 = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                /* Host port format. */
                .port = self->srv0.port,
        };
        const struct landlock_net_port_attr connect_big_endian_p0 = {
                .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
                /* Big endian port format. */
                .port = htons(self->srv0.port),
        };
        const struct landlock_net_port_attr bind_connect_host_endian_p1 = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                  LANDLOCK_ACCESS_NET_CONNECT_TCP,
                /* Host port format. */
                .port = self->srv1.port,
        };
        const unsigned int one = 1;
        const char little_endian = *(const char *)&one;
        int ruleset_fd;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &bind_host_endian_p0, 0));
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &connect_big_endian_p0, 0));
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &bind_connect_host_endian_p1, 0));
        enforce_ruleset(_metadata, ruleset_fd);

        /* No restriction for big endinan CPU. */
        test_bind_and_connect(_metadata, &self->srv0, false, little_endian);

        /* No restriction for any CPU. */
        test_bind_and_connect(_metadata, &self->srv1, false, false);
}

TEST_F(ipv4_tcp, with_fs)
{
        const struct landlock_ruleset_attr ruleset_attr_fs_net = {
                .handled_access_fs = LANDLOCK_ACCESS_FS_READ_DIR,
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
        };
        struct landlock_path_beneath_attr path_beneath = {
                .allowed_access = LANDLOCK_ACCESS_FS_READ_DIR,
                .parent_fd = -1,
        };
        struct landlock_net_port_attr tcp_bind = {
                .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
                .port = self->srv0.port,
        };
        int ruleset_fd, bind_fd, dir_fd;

        /* Creates ruleset both for filesystem and network access. */
        ruleset_fd = landlock_create_ruleset(&ruleset_attr_fs_net,
                                             sizeof(ruleset_attr_fs_net), 0);
        ASSERT_LE(0, ruleset_fd);

        /* Adds a filesystem rule. */
        path_beneath.parent_fd = open("/dev", O_PATH | O_DIRECTORY | O_CLOEXEC);
        ASSERT_LE(0, path_beneath.parent_fd);
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_PATH_BENEATH,
                                       &path_beneath, 0));
        EXPECT_EQ(0, close(path_beneath.parent_fd));

        /* Adds a network rule. */
        ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                       &tcp_bind, 0));

        enforce_ruleset(_metadata, ruleset_fd);
        EXPECT_EQ(0, close(ruleset_fd));

        /* Tests file access. */
        dir_fd = open("/dev", O_RDONLY);
        EXPECT_LE(0, dir_fd);
        EXPECT_EQ(0, close(dir_fd));

        dir_fd = open("/", O_RDONLY);
        EXPECT_EQ(-1, dir_fd);
        EXPECT_EQ(EACCES, errno);

        /* Tests port binding. */
        bind_fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
        ASSERT_LE(0, bind_fd);
        EXPECT_EQ(0, bind_variant(bind_fd, &self->srv0));
        EXPECT_EQ(0, close(bind_fd));

        bind_fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
        ASSERT_LE(0, bind_fd);
        EXPECT_EQ(-EACCES, bind_variant(bind_fd, &self->srv1));
}

FIXTURE(port_specific)
{
        struct service_fixture srv0;
};

FIXTURE_VARIANT(port_specific)
{
        const enum sandbox_type sandbox;
        const struct protocol_variant prot;
};

/* clang-format off */
FIXTURE_VARIANT_ADD(port_specific, no_sandbox_with_ipv4) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(port_specific, sandbox_with_ipv4) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(port_specific, no_sandbox_with_ipv6) {
        /* clang-format on */
        .sandbox = NO_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(port_specific, sandbox_with_ipv6) {
        /* clang-format on */
        .sandbox = TCP_SANDBOX,
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
        },
};

FIXTURE_SETUP(port_specific)
{
        disable_caps(_metadata);

        ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));

        setup_loopback(_metadata);
};

FIXTURE_TEARDOWN(port_specific)
{
}

TEST_F(port_specific, bind_connect_zero)
{
        int bind_fd, connect_fd, ret;
        uint16_t port;

        /* Adds a rule layer with bind and connect actions. */
        if (variant->sandbox == TCP_SANDBOX) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP
                };
                const struct landlock_net_port_attr tcp_bind_connect_zero = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = 0,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                /* Checks zero port value on bind and connect actions. */
                EXPECT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect_zero, 0));

                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);

        connect_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, connect_fd);

        /* Sets address port to 0 for both protocol families. */
        set_port(&self->srv0, 0);
        /*
         * Binds on port 0, which selects a random port within
         * ip_local_port_range.
         */
        ret = bind_variant(bind_fd, &self->srv0);
        EXPECT_EQ(0, ret);

        EXPECT_EQ(0, listen(bind_fd, backlog));

        /* Connects on port 0. */
        ret = connect_variant(connect_fd, &self->srv0);
        EXPECT_EQ(-ECONNREFUSED, ret);

        /* Sets binded port for both protocol families. */
        port = get_binded_port(bind_fd, &variant->prot);
        EXPECT_NE(0, port);
        set_port(&self->srv0, port);
        /* Connects on the binded port. */
        ret = connect_variant(connect_fd, &self->srv0);
        if (is_restricted(&variant->prot, variant->sandbox)) {
                /* Denied by Landlock. */
                EXPECT_EQ(-EACCES, ret);
        } else {
                EXPECT_EQ(0, ret);
        }

        EXPECT_EQ(0, close(connect_fd));
        EXPECT_EQ(0, close(bind_fd));
}

TEST_F(port_specific, bind_connect_1023)
{
        int bind_fd, connect_fd, ret;

        /* Adds a rule layer with bind and connect actions. */
        if (variant->sandbox == TCP_SANDBOX) {
                const struct landlock_ruleset_attr ruleset_attr = {
                        .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                              LANDLOCK_ACCESS_NET_CONNECT_TCP
                };
                /* A rule with port value less than 1024. */
                const struct landlock_net_port_attr tcp_bind_connect_low_range = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = 1023,
                };
                /* A rule with 1024 port. */
                const struct landlock_net_port_attr tcp_bind_connect = {
                        .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
                                          LANDLOCK_ACCESS_NET_CONNECT_TCP,
                        .port = 1024,
                };
                int ruleset_fd;

                ruleset_fd = landlock_create_ruleset(&ruleset_attr,
                                                     sizeof(ruleset_attr), 0);
                ASSERT_LE(0, ruleset_fd);

                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect_low_range, 0));
                ASSERT_EQ(0,
                          landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
                                            &tcp_bind_connect, 0));

                enforce_ruleset(_metadata, ruleset_fd);
                EXPECT_EQ(0, close(ruleset_fd));
        }

        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);

        connect_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, connect_fd);

        /* Sets address port to 1023 for both protocol families. */
        set_port(&self->srv0, 1023);
        /* Binds on port 1023. */
        ret = bind_variant(bind_fd, &self->srv0);
        /* Denied by the system. */
        EXPECT_EQ(-EACCES, ret);

        /* Binds on port 1023. */
        set_cap(_metadata, CAP_NET_BIND_SERVICE);
        ret = bind_variant(bind_fd, &self->srv0);
        clear_cap(_metadata, CAP_NET_BIND_SERVICE);
        EXPECT_EQ(0, ret);
        EXPECT_EQ(0, listen(bind_fd, backlog));

        /* Connects on the binded port 1023. */
        ret = connect_variant(connect_fd, &self->srv0);
        EXPECT_EQ(0, ret);

        EXPECT_EQ(0, close(connect_fd));
        EXPECT_EQ(0, close(bind_fd));

        bind_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, bind_fd);

        connect_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, connect_fd);

        /* Sets address port to 1024 for both protocol families. */
        set_port(&self->srv0, 1024);
        /* Binds on port 1024. */
        ret = bind_variant(bind_fd, &self->srv0);
        EXPECT_EQ(0, ret);
        EXPECT_EQ(0, listen(bind_fd, backlog));

        /* Connects on the binded port 1024. */
        ret = connect_variant(connect_fd, &self->srv0);
        EXPECT_EQ(0, ret);

        EXPECT_EQ(0, close(connect_fd));
        EXPECT_EQ(0, close(bind_fd));
}

static int matches_log_tcp(const int audit_fd, const char *const blockers,
                           const char *const dir_addr, const char *const addr,
                           const char *const dir_port)
{
        static const char log_template[] = REGEX_LANDLOCK_PREFIX
                " blockers=%s %s=%s %s=1024$";
        /*
         * Max strlen(blockers): 16
         * Max strlen(dir_addr): 5
         * Max strlen(addr): 12
         * Max strlen(dir_port): 4
         */
        char log_match[sizeof(log_template) + 37];
        int log_match_len;

        log_match_len = snprintf(log_match, sizeof(log_match), log_template,
                                 blockers, dir_addr, addr, dir_port);
        if (log_match_len > sizeof(log_match))
                return -E2BIG;

        return audit_match_record(audit_fd, AUDIT_LANDLOCK_ACCESS, log_match,
                                  NULL);
}

FIXTURE(audit)
{
        struct service_fixture srv0;
        struct audit_filter audit_filter;
        int audit_fd;
};

FIXTURE_VARIANT(audit)
{
        const char *const addr;
        const struct protocol_variant prot;
};

/* clang-format off */
FIXTURE_VARIANT_ADD(audit, ipv4) {
        /* clang-format on */
        .addr = "127\\.0\\.0\\.1",
        .prot = {
                .domain = AF_INET,
                .type = SOCK_STREAM,
        },
};

/* clang-format off */
FIXTURE_VARIANT_ADD(audit, ipv6) {
        /* clang-format on */
        .addr = "::1",
        .prot = {
                .domain = AF_INET6,
                .type = SOCK_STREAM,
        },
};

FIXTURE_SETUP(audit)
{
        ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));
        setup_loopback(_metadata);

        set_cap(_metadata, CAP_AUDIT_CONTROL);
        self->audit_fd = audit_init_with_exe_filter(&self->audit_filter);
        EXPECT_LE(0, self->audit_fd);
        disable_caps(_metadata);
};

FIXTURE_TEARDOWN(audit)
{
        set_cap(_metadata, CAP_AUDIT_CONTROL);
        EXPECT_EQ(0, audit_cleanup(self->audit_fd, &self->audit_filter));
        clear_cap(_metadata, CAP_AUDIT_CONTROL);
}

TEST_F(audit, bind)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                      LANDLOCK_ACCESS_NET_CONNECT_TCP,
        };
        struct audit_records records;
        int ruleset_fd, sock_fd;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);
        enforce_ruleset(_metadata, ruleset_fd);
        EXPECT_EQ(0, close(ruleset_fd));

        sock_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, sock_fd);
        EXPECT_EQ(-EACCES, bind_variant(sock_fd, &self->srv0));
        EXPECT_EQ(0, matches_log_tcp(self->audit_fd, "net\\.bind_tcp", "saddr",
                                     variant->addr, "src"));

        EXPECT_EQ(0, audit_count_records(self->audit_fd, &records));
        EXPECT_EQ(0, records.access);
        EXPECT_EQ(1, records.domain);

        EXPECT_EQ(0, close(sock_fd));
}

TEST_F(audit, connect)
{
        const struct landlock_ruleset_attr ruleset_attr = {
                .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
                                      LANDLOCK_ACCESS_NET_CONNECT_TCP,
        };
        struct audit_records records;
        int ruleset_fd, sock_fd;

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        ASSERT_LE(0, ruleset_fd);
        enforce_ruleset(_metadata, ruleset_fd);
        EXPECT_EQ(0, close(ruleset_fd));

        sock_fd = socket_variant(&self->srv0);
        ASSERT_LE(0, sock_fd);
        EXPECT_EQ(-EACCES, connect_variant(sock_fd, &self->srv0));
        EXPECT_EQ(0, matches_log_tcp(self->audit_fd, "net\\.connect_tcp",
                                     "daddr", variant->addr, "dest"));

        EXPECT_EQ(0, audit_count_records(self->audit_fd, &records));
        EXPECT_EQ(0, records.access);
        EXPECT_EQ(1, records.domain);

        EXPECT_EQ(0, close(sock_fd));
}

TEST_HARNESS_MAIN