root/tools/testing/selftests/landlock/sandbox-and-launch.c
// SPDX-License-Identifier: GPL-2.0
/*
 * Sandbox itself and execute another program (in a different mount point).
 *
 * Used by layout1.umount_sandboxer from fs_test.c
 *
 * Copyright © 2024-2025 Microsoft Corporation
 */

#define _GNU_SOURCE
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/prctl.h>
#include <unistd.h>

#include "wrappers.h"

int main(int argc, char *argv[])
{
        struct landlock_ruleset_attr ruleset_attr = {
                .scoped = LANDLOCK_SCOPE_SIGNAL,
        };
        int pipe_child, pipe_parent, ruleset_fd;
        char buf;

        /*
         * The first argument must be the file descriptor number of a pipe.
         * The second argument must be the program to execute.
         */
        if (argc != 4) {
                fprintf(stderr, "Wrong number of arguments (not three)\n");
                return 1;
        }

        pipe_child = atoi(argv[2]);
        pipe_parent = atoi(argv[3]);

        ruleset_fd =
                landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
        if (ruleset_fd < 0) {
                perror("Failed to create ruleset");
                return 1;
        }

        if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) {
                perror("Failed to call prctl()");
                return 1;
        }

        if (landlock_restrict_self(ruleset_fd, 0)) {
                perror("Failed to restrict self");
                return 1;
        }

        if (close(ruleset_fd)) {
                perror("Failed to close ruleset");
                return 1;
        }

        /* Signals that we are sandboxed. */
        errno = 0;
        if (write(pipe_child, ".", 1) != 1) {
                perror("Failed to write to the second argument");
                return 1;
        }

        /* Waits for the parent to try to umount. */
        if (read(pipe_parent, &buf, 1) != 1) {
                perror("Failed to write to the third argument");
                return 1;
        }

        /* Shifts arguments. */
        argv[0] = argv[1];
        argv[1] = argv[2];
        argv[2] = argv[3];
        argv[3] = NULL;
        execve(argv[0], argv, NULL);
        perror("Failed to execute the provided binary");
        return 1;
}