123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153 |
- LANDLOCK_ACCESS_FS_EXECUTE |\
- LANDLOCK_ACCESS_FS_WRITE_FILE |\
- LANDLOCK_ACCESS_FS_READ_FILE |\
- LANDLOCK_ACCESS_FS_READ_DIR |\
- LANDLOCK_ACCESS_FS_REMOVE_DIR |\
- LANDLOCK_ACCESS_FS_REMOVE_FILE |\
- LANDLOCK_ACCESS_FS_MAKE_CHAR |\
- LANDLOCK_ACCESS_FS_MAKE_DIR |\
- LANDLOCK_ACCESS_FS_MAKE_REG |\
- LANDLOCK_ACCESS_FS_MAKE_SOCK |\
- LANDLOCK_ACCESS_FS_MAKE_FIFO |\
- LANDLOCK_ACCESS_FS_MAKE_BLOCK |\
- LANDLOCK_ACCESS_FS_MAKE_SYM |\
- LANDLOCK_ACCESS_FS_REFER |\
- LANDLOCK_ACCESS_FS_TRUNCATE |\
- LANDLOCK_ACCESS_FS_IOCTL_DEV )
- LANDLOCK_ACCESS_NET_BIND_TCP |\
- LANDLOCK_ACCESS_NET_CONNECT_TCP )
- int ll_rule_fd, ll_abi;\
- struct landlock_ruleset_attr __rattr = {0};\
- struct landlock_path_beneath_attr __pattr = {0};\
- struct landlock_net_port_attr __nattr = {0};\
- int __err = 0;\
- __rattr.handled_access_fs = LL_FS_ALL;\
- __rattr.handled_access_net = LL_NET_ALL;\
- ll_abi = (int)syscall(SYS_landlock_create_ruleset, NULL, 0, LANDLOCK_CREATE_RULESET_VERSION);\
- switch (ll_abi) {\
- case -1: return -1;\
- case 1: __rattr.handled_access_fs &= ~LANDLOCK_ACCESS_FS_REFER; __attribute__((fallthrough));\
- case 2: __rattr.handled_access_fs &= ~LANDLOCK_ACCESS_FS_TRUNCATE; __attribute__((fallthrough));\
- case 3: __rattr.handled_access_net &= ~(LANDLOCK_ACCESS_NET_BIND_TCP | LANDLOCK_ACCESS_NET_CONNECT_TCP); __attribute__((fallthrough));\
- case 4: __rattr.handled_access_fs &= ~LANDLOCK_ACCESS_FS_IOCTL_DEV;\
- default: break;\
- }\
- ll_rule_fd = (int)syscall(SYS_landlock_create_ruleset, &__rattr, sizeof(struct landlock_ruleset_attr), 0);\
- if (-1 == ll_rule_fd) {\
- LL_PRINTERR("landlock_create_ruleset: %s", strerror(errno));\
- return -1;\
- }
- __err = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0);\
- if (-1 == __err) {\
- LL_PRINTERR("set_no_new_privs: %s", strerror(errno));\
- goto __close;\
- }\
- __err = (int)syscall(SYS_landlock_restrict_self, ll_rule_fd, 0);\
- if (__err)\
- LL_PRINTERR("landlock_restrict_self: %s", strerror(errno));\
- __close: close(ll_rule_fd);\
- return __err; }
- const char *__path = (p);\
- __pattr.allowed_access = (rules) & __rattr.handled_access_fs;\
- __pattr.parent_fd = open(__path, O_PATH | O_CLOEXEC);\
- if (-1 == __pattr.parent_fd) {\
- LL_PRINTERR("open(%s): %s", __path, strerror(errno));\
- __err = -1;\
- goto __close;\
- }\
- __err = (int)syscall(SYS_landlock_add_rule, ll_rule_fd, LANDLOCK_RULE_PATH_BENEATH, &__pattr, 0);\
- if (__err) {\
- LL_PRINTERR("landlock_add_rule(%s): %s", __path, strerror(errno));\
- goto __close;\
- }\
- close(__pattr.parent_fd);\
- } while (0)
- if (ll_abi > 3) {\
- unsigned short __port = (p);\
- __nattr.allowed_access = (rules);\
- __nattr.port = __port;\
- __err = (int)syscall(SYS_landlock_add_rule, ll_rule_fd, LANDLOCK_RULE_NET_PORT, &__nattr, 0);\
- if (__err) {\
- LL_PRINTERR("landlock_add_rule(%u): %s", __port, strerror(errno));\
- goto __close;\
- }\
- }\
- } while (0)
|