]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
selftests/landlock: Add network tests
authorKonstantin Meskhidze <konstantin.meskhidze@huawei.com>
Thu, 26 Oct 2023 01:47:49 +0000 (09:47 +0800)
committerMickaël Salaün <mic@digikod.net>
Thu, 26 Oct 2023 19:07:16 +0000 (21:07 +0200)
Add 82 test suites to check edge cases related to bind() and connect()
actions. They are defined with 6 fixtures and their variants:

The "protocol" fixture is extended with 12 variants defined as a matrix
of: sandboxed/not-sandboxed, IPv4/IPv6/unix network domain, and
stream/datagram socket. 4 related tests suites are defined:
* bind: Tests bind action.
* connect: Tests connect action.
* bind_unspec: Tests bind action with the AF_UNSPEC socket family.
* connect_unspec: Tests connect action with the AF_UNSPEC socket family.

The "ipv4" fixture is extended with 4 variants defined as a matrix
of: sandboxed/not-sandboxed, and stream/datagram socket. 1 related test
suite is defined:
* from_unix_to_inet: Tests to make sure unix sockets' actions are not
  restricted by Landlock rules applied to TCP ones.

The "tcp_layers" fixture is extended with 8 variants defined as a matrix
of: IPv4/IPv6 network domain, and different number of landlock rule
layers. 2 related tests suites are defined:
* ruleset_overlap: Tests nested layers with less constraints.
* ruleset_expand: Tests nested layers with more constraints.

In the "mini" fixture 4 tests suites are defined:
* network_access_rights: Tests handling of known access rights.
* unknown_access_rights: Tests handling of unknown access rights.
* inval: Tests unhandled allowed access and zero access value.
* tcp_port_overflow: Tests with port values greater than 65535.

The "ipv4_tcp" fixture supports IPv4 network domain with stream socket.
2 tests suites are defined:
* port_endianness: Tests with big/little endian port formats.
* with_fs: Tests a ruleset with both filesystem and network
  restrictions.

The "port_specific" fixture is extended with 4 variants defined
as a matrix of: sandboxed/not-sandboxed, IPv4/IPv6 network domain,
and stream socket. 2 related tests suites are defined:
* bind_connect_zero: Tests with port 0.
* bind_connect_1023: Tests with port 1023.

Test coverage for security/landlock is 92.4% of 710 lines according to
gcc/gcov-13.

Signed-off-by: Konstantin Meskhidze <konstantin.meskhidze@huawei.com>
Link: https://lore.kernel.org/r/20231026014751.414649-11-konstantin.meskhidze@huawei.com
[mic: Extend commit message, update test coverage, clean up capability
use, fix useless TEST_F_FORK, and improve ipv4_tcp.with_fs]
Co-developed-by: Mickaël Salaün <mic@digikod.net>
Signed-off-by: Mickaël Salaün <mic@digikod.net>
tools/testing/selftests/landlock/common.h
tools/testing/selftests/landlock/config
tools/testing/selftests/landlock/net_test.c [new file with mode: 0644]

index 0fd6c4cf5e6f5649eeb6ed9dba7bcc99ede17f02..5b79758cae627593c68b9fd465451efcf7b75f9f 100644 (file)
@@ -112,10 +112,13 @@ static void _init_caps(struct __test_metadata *const _metadata, bool drop_all)
        cap_t cap_p;
        /* Only these three capabilities are useful for the tests. */
        const cap_value_t caps[] = {
+               /* clang-format off */
                CAP_DAC_OVERRIDE,
                CAP_MKNOD,
                CAP_SYS_ADMIN,
                CAP_SYS_CHROOT,
+               CAP_NET_BIND_SERVICE,
+               /* clang-format on */
        };
 
        cap_p = cap_get_proc();
index 3dc9e438eab10f528480788847dda20ad3c3ff53..0086efaa7b681c7be4866b4e4b5d9cb924fe150d 100644 (file)
@@ -1,5 +1,9 @@
 CONFIG_CGROUPS=y
 CONFIG_CGROUP_SCHED=y
+CONFIG_INET=y
+CONFIG_IPV6=y
+CONFIG_NET=y
+CONFIG_NET_NS=y
 CONFIG_OVERLAY_FS=y
 CONFIG_PROC_FS=y
 CONFIG_SECURITY=y
diff --git a/tools/testing/selftests/landlock/net_test.c b/tools/testing/selftests/landlock/net_test.c
new file mode 100644 (file)
index 0000000..929e21c
--- /dev/null
@@ -0,0 +1,1738 @@
+// SPDX-License-Identifier: GPL-2.0-only
+/*
+ * Landlock tests - Network
+ *
+ * Copyright © 2022-2023 Huawei Tech. Co., Ltd.
+ * Copyright © 2023 Microsoft Corporation
+ */
+
+#define _GNU_SOURCE
+#include <arpa/inet.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <linux/landlock.h>
+#include <linux/in.h>
+#include <sched.h>
+#include <stdint.h>
+#include <string.h>
+#include <sys/prctl.h>
+#include <sys/socket.h>
+#include <sys/un.h>
+
+#include "common.h"
+
+const short sock_port_start = (1 << 10);
+
+static const char loopback_ipv4[] = "127.0.0.1";
+static const char loopback_ipv6[] = "::1";
+
+/* Number pending connections queue to be hold. */
+const short backlog = 10;
+
+enum sandbox_type {
+       NO_SANDBOX,
+       /* This may be used to test rules that allow *and* deny accesses. */
+       TCP_SANDBOX,
+};
+
+struct protocol_variant {
+       int domain;
+       int type;
+};
+
+struct service_fixture {
+       struct protocol_variant protocol;
+       /* port is also stored in ipv4_addr.sin_port or ipv6_addr.sin6_port */
+       unsigned short port;
+       union {
+               struct sockaddr_in ipv4_addr;
+               struct sockaddr_in6 ipv6_addr;
+               struct {
+                       struct sockaddr_un unix_addr;
+                       socklen_t unix_addr_len;
+               };
+       };
+};
+
+static int set_service(struct service_fixture *const srv,
+                      const struct protocol_variant prot,
+                      const unsigned short index)
+{
+       memset(srv, 0, sizeof(*srv));
+
+       /*
+        * Copies all protocol properties in case of the variant only contains
+        * a subset of them.
+        */
+       srv->protocol = prot;
+
+       /* Checks for port overflow. */
+       if (index > 2)
+               return 1;
+       srv->port = sock_port_start << (2 * index);
+
+       switch (prot.domain) {
+       case AF_UNSPEC:
+       case AF_INET:
+               srv->ipv4_addr.sin_family = prot.domain;
+               srv->ipv4_addr.sin_port = htons(srv->port);
+               srv->ipv4_addr.sin_addr.s_addr = inet_addr(loopback_ipv4);
+               return 0;
+
+       case AF_INET6:
+               srv->ipv6_addr.sin6_family = prot.domain;
+               srv->ipv6_addr.sin6_port = htons(srv->port);
+               inet_pton(AF_INET6, loopback_ipv6, &srv->ipv6_addr.sin6_addr);
+               return 0;
+
+       case AF_UNIX:
+               srv->unix_addr.sun_family = prot.domain;
+               sprintf(srv->unix_addr.sun_path,
+                       "_selftests-landlock-net-tid%d-index%d", gettid(),
+                       index);
+               srv->unix_addr_len = SUN_LEN(&srv->unix_addr);
+               srv->unix_addr.sun_path[0] = '\0';
+               return 0;
+       }
+       return 1;
+}
+
+static void setup_loopback(struct __test_metadata *const _metadata)
+{
+       set_cap(_metadata, CAP_SYS_ADMIN);
+       ASSERT_EQ(0, unshare(CLONE_NEWNET));
+       ASSERT_EQ(0, system("ip link set dev lo up"));
+       clear_cap(_metadata, CAP_SYS_ADMIN);
+}
+
+static bool is_restricted(const struct protocol_variant *const prot,
+                         const enum sandbox_type sandbox)
+{
+       switch (prot->domain) {
+       case AF_INET:
+       case AF_INET6:
+               switch (prot->type) {
+               case SOCK_STREAM:
+                       return sandbox == TCP_SANDBOX;
+               }
+               break;
+       }
+       return false;
+}
+
+static int socket_variant(const struct service_fixture *const srv)
+{
+       int ret;
+
+       ret = socket(srv->protocol.domain, srv->protocol.type | SOCK_CLOEXEC,
+                    0);
+       if (ret < 0)
+               return -errno;
+       return ret;
+}
+
+#ifndef SIN6_LEN_RFC2133
+#define SIN6_LEN_RFC2133 24
+#endif
+
+static socklen_t get_addrlen(const struct service_fixture *const srv,
+                            const bool minimal)
+{
+       switch (srv->protocol.domain) {
+       case AF_UNSPEC:
+       case AF_INET:
+               return sizeof(srv->ipv4_addr);
+
+       case AF_INET6:
+               if (minimal)
+                       return SIN6_LEN_RFC2133;
+               return sizeof(srv->ipv6_addr);
+
+       case AF_UNIX:
+               if (minimal)
+                       return sizeof(srv->unix_addr) -
+                              sizeof(srv->unix_addr.sun_path);
+               return srv->unix_addr_len;
+
+       default:
+               return 0;
+       }
+}
+
+static void set_port(struct service_fixture *const srv, uint16_t port)
+{
+       switch (srv->protocol.domain) {
+       case AF_UNSPEC:
+       case AF_INET:
+               srv->ipv4_addr.sin_port = htons(port);
+               return;
+
+       case AF_INET6:
+               srv->ipv6_addr.sin6_port = htons(port);
+               return;
+
+       default:
+               return;
+       }
+}
+
+static uint16_t get_binded_port(int socket_fd,
+                               const struct protocol_variant *const prot)
+{
+       struct sockaddr_in ipv4_addr;
+       struct sockaddr_in6 ipv6_addr;
+       socklen_t ipv4_addr_len, ipv6_addr_len;
+
+       /* Gets binded port. */
+       switch (prot->domain) {
+       case AF_UNSPEC:
+       case AF_INET:
+               ipv4_addr_len = sizeof(ipv4_addr);
+               getsockname(socket_fd, &ipv4_addr, &ipv4_addr_len);
+               return ntohs(ipv4_addr.sin_port);
+
+       case AF_INET6:
+               ipv6_addr_len = sizeof(ipv6_addr);
+               getsockname(socket_fd, &ipv6_addr, &ipv6_addr_len);
+               return ntohs(ipv6_addr.sin6_port);
+
+       default:
+               return 0;
+       }
+}
+
+static int bind_variant_addrlen(const int sock_fd,
+                               const struct service_fixture *const srv,
+                               const socklen_t addrlen)
+{
+       int ret;
+
+       switch (srv->protocol.domain) {
+       case AF_UNSPEC:
+       case AF_INET:
+               ret = bind(sock_fd, &srv->ipv4_addr, addrlen);
+               break;
+
+       case AF_INET6:
+               ret = bind(sock_fd, &srv->ipv6_addr, addrlen);
+               break;
+
+       case AF_UNIX:
+               ret = bind(sock_fd, &srv->unix_addr, addrlen);
+               break;
+
+       default:
+               errno = EAFNOSUPPORT;
+               return -errno;
+       }
+
+       if (ret < 0)
+               return -errno;
+       return ret;
+}
+
+static int bind_variant(const int sock_fd,
+                       const struct service_fixture *const srv)
+{
+       return bind_variant_addrlen(sock_fd, srv, get_addrlen(srv, false));
+}
+
+static int connect_variant_addrlen(const int sock_fd,
+                                  const struct service_fixture *const srv,
+                                  const socklen_t addrlen)
+{
+       int ret;
+
+       switch (srv->protocol.domain) {
+       case AF_UNSPEC:
+       case AF_INET:
+               ret = connect(sock_fd, &srv->ipv4_addr, addrlen);
+               break;
+
+       case AF_INET6:
+               ret = connect(sock_fd, &srv->ipv6_addr, addrlen);
+               break;
+
+       case AF_UNIX:
+               ret = connect(sock_fd, &srv->unix_addr, addrlen);
+               break;
+
+       default:
+               errno = -EAFNOSUPPORT;
+               return -errno;
+       }
+
+       if (ret < 0)
+               return -errno;
+       return ret;
+}
+
+static int connect_variant(const int sock_fd,
+                          const struct service_fixture *const srv)
+{
+       return connect_variant_addrlen(sock_fd, srv, get_addrlen(srv, false));
+}
+
+FIXTURE(protocol)
+{
+       struct service_fixture srv0, srv1, srv2, unspec_any0, unspec_srv0;
+};
+
+FIXTURE_VARIANT(protocol)
+{
+       const enum sandbox_type sandbox;
+       const struct protocol_variant prot;
+};
+
+FIXTURE_SETUP(protocol)
+{
+       const struct protocol_variant prot_unspec = {
+               .domain = AF_UNSPEC,
+               .type = SOCK_STREAM,
+       };
+
+       disable_caps(_metadata);
+
+       ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));
+       ASSERT_EQ(0, set_service(&self->srv1, variant->prot, 1));
+       ASSERT_EQ(0, set_service(&self->srv2, variant->prot, 2));
+
+       ASSERT_EQ(0, set_service(&self->unspec_srv0, prot_unspec, 0));
+
+       ASSERT_EQ(0, set_service(&self->unspec_any0, prot_unspec, 0));
+       self->unspec_any0.ipv4_addr.sin_addr.s_addr = htonl(INADDR_ANY);
+
+       setup_loopback(_metadata);
+};
+
+FIXTURE_TEARDOWN(protocol)
+{
+}
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_tcp) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_INET,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_tcp) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_INET6,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv4_udp) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_INET,
+               .type = SOCK_DGRAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_ipv6_udp) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_INET6,
+               .type = SOCK_DGRAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_stream) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_UNIX,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, no_sandbox_with_unix_datagram) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_UNIX,
+               .type = SOCK_DGRAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_tcp) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_INET,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_tcp) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_INET6,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv4_udp) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_INET,
+               .type = SOCK_DGRAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_ipv6_udp) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_INET6,
+               .type = SOCK_DGRAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_unix_stream) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_UNIX,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(protocol, tcp_sandbox_with_unix_datagram) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_UNIX,
+               .type = SOCK_DGRAM,
+       },
+};
+
+static void test_bind_and_connect(struct __test_metadata *const _metadata,
+                                 const struct service_fixture *const srv,
+                                 const bool deny_bind, const bool deny_connect)
+{
+       char buf = '\0';
+       int inval_fd, bind_fd, client_fd, status, ret;
+       pid_t child;
+
+       /* Starts invalid addrlen tests with bind. */
+       inval_fd = socket_variant(srv);
+       ASSERT_LE(0, inval_fd)
+       {
+               TH_LOG("Failed to create socket: %s", strerror(errno));
+       }
+
+       /* Tries to bind with zero as addrlen. */
+       EXPECT_EQ(-EINVAL, bind_variant_addrlen(inval_fd, srv, 0));
+
+       /* Tries to bind with too small addrlen. */
+       EXPECT_EQ(-EINVAL, bind_variant_addrlen(inval_fd, srv,
+                                               get_addrlen(srv, true) - 1));
+
+       /* Tries to bind with minimal addrlen. */
+       ret = bind_variant_addrlen(inval_fd, srv, get_addrlen(srv, true));
+       if (deny_bind) {
+               EXPECT_EQ(-EACCES, ret);
+       } else {
+               EXPECT_EQ(0, ret)
+               {
+                       TH_LOG("Failed to bind to socket: %s", strerror(errno));
+               }
+       }
+       EXPECT_EQ(0, close(inval_fd));
+
+       /* Starts invalid addrlen tests with connect. */
+       inval_fd = socket_variant(srv);
+       ASSERT_LE(0, inval_fd);
+
+       /* Tries to connect with zero as addrlen. */
+       EXPECT_EQ(-EINVAL, connect_variant_addrlen(inval_fd, srv, 0));
+
+       /* Tries to connect with too small addrlen. */
+       EXPECT_EQ(-EINVAL, connect_variant_addrlen(inval_fd, srv,
+                                                  get_addrlen(srv, true) - 1));
+
+       /* Tries to connect with minimal addrlen. */
+       ret = connect_variant_addrlen(inval_fd, srv, get_addrlen(srv, true));
+       if (srv->protocol.domain == AF_UNIX) {
+               EXPECT_EQ(-EINVAL, ret);
+       } else if (deny_connect) {
+               EXPECT_EQ(-EACCES, ret);
+       } else if (srv->protocol.type == SOCK_STREAM) {
+               /* No listening server, whatever the value of deny_bind. */
+               EXPECT_EQ(-ECONNREFUSED, ret);
+       } else {
+               EXPECT_EQ(0, ret)
+               {
+                       TH_LOG("Failed to connect to socket: %s",
+                              strerror(errno));
+               }
+       }
+       EXPECT_EQ(0, close(inval_fd));
+
+       /* Starts connection tests. */
+       bind_fd = socket_variant(srv);
+       ASSERT_LE(0, bind_fd);
+
+       ret = bind_variant(bind_fd, srv);
+       if (deny_bind) {
+               EXPECT_EQ(-EACCES, ret);
+       } else {
+               EXPECT_EQ(0, ret);
+
+               /* Creates a listening socket. */
+               if (srv->protocol.type == SOCK_STREAM)
+                       EXPECT_EQ(0, listen(bind_fd, backlog));
+       }
+
+       child = fork();
+       ASSERT_LE(0, child);
+       if (child == 0) {
+               int connect_fd, ret;
+
+               /* Closes listening socket for the child. */
+               EXPECT_EQ(0, close(bind_fd));
+
+               /* Starts connection tests. */
+               connect_fd = socket_variant(srv);
+               ASSERT_LE(0, connect_fd);
+               ret = connect_variant(connect_fd, srv);
+               if (deny_connect) {
+                       EXPECT_EQ(-EACCES, ret);
+               } else if (deny_bind) {
+                       /* No listening server. */
+                       EXPECT_EQ(-ECONNREFUSED, ret);
+               } else {
+                       EXPECT_EQ(0, ret);
+                       EXPECT_EQ(1, write(connect_fd, ".", 1));
+               }
+
+               EXPECT_EQ(0, close(connect_fd));
+               _exit(_metadata->passed ? EXIT_SUCCESS : EXIT_FAILURE);
+               return;
+       }
+
+       /* Accepts connection from the child. */
+       client_fd = bind_fd;
+       if (!deny_bind && !deny_connect) {
+               if (srv->protocol.type == SOCK_STREAM) {
+                       client_fd = accept(bind_fd, NULL, 0);
+                       ASSERT_LE(0, client_fd);
+               }
+
+               EXPECT_EQ(1, read(client_fd, &buf, 1));
+               EXPECT_EQ('.', buf);
+       }
+
+       EXPECT_EQ(child, waitpid(child, &status, 0));
+       EXPECT_EQ(1, WIFEXITED(status));
+       EXPECT_EQ(EXIT_SUCCESS, WEXITSTATUS(status));
+
+       /* Closes connection, if any. */
+       if (client_fd != bind_fd)
+               EXPECT_LE(0, close(client_fd));
+
+       /* Closes listening socket. */
+       EXPECT_EQ(0, close(bind_fd));
+}
+
+TEST_F(protocol, bind)
+{
+       if (variant->sandbox == TCP_SANDBOX) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               };
+               const struct landlock_net_port_attr tcp_bind_connect_p0 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = self->srv0.port,
+               };
+               const struct landlock_net_port_attr tcp_connect_p1 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = self->srv1.port,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Allows connect and bind for the first port.  */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect_p0, 0));
+
+               /* Allows connect and denies bind for the second port. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_connect_p1, 0));
+
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       /* Binds a socket to the first port. */
+       test_bind_and_connect(_metadata, &self->srv0, false, false);
+
+       /* Binds a socket to the second port. */
+       test_bind_and_connect(_metadata, &self->srv1,
+                             is_restricted(&variant->prot, variant->sandbox),
+                             false);
+
+       /* Binds a socket to the third port. */
+       test_bind_and_connect(_metadata, &self->srv2,
+                             is_restricted(&variant->prot, variant->sandbox),
+                             is_restricted(&variant->prot, variant->sandbox));
+}
+
+TEST_F(protocol, connect)
+{
+       if (variant->sandbox == TCP_SANDBOX) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               };
+               const struct landlock_net_port_attr tcp_bind_connect_p0 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = self->srv0.port,
+               };
+               const struct landlock_net_port_attr tcp_bind_p1 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+                       .port = self->srv1.port,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Allows connect and bind for the first port. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect_p0, 0));
+
+               /* Allows bind and denies connect for the second port. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_p1, 0));
+
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       test_bind_and_connect(_metadata, &self->srv0, false, false);
+
+       test_bind_and_connect(_metadata, &self->srv1, false,
+                             is_restricted(&variant->prot, variant->sandbox));
+
+       test_bind_and_connect(_metadata, &self->srv2,
+                             is_restricted(&variant->prot, variant->sandbox),
+                             is_restricted(&variant->prot, variant->sandbox));
+}
+
+TEST_F(protocol, bind_unspec)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
+       };
+       const struct landlock_net_port_attr tcp_bind = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = self->srv0.port,
+       };
+       int bind_fd, ret;
+
+       if (variant->sandbox == TCP_SANDBOX) {
+               const int ruleset_fd = landlock_create_ruleset(
+                       &ruleset_attr, sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Allows bind. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+
+       /* Allowed bind on AF_UNSPEC/INADDR_ANY. */
+       ret = bind_variant(bind_fd, &self->unspec_any0);
+       if (variant->prot.domain == AF_INET) {
+               EXPECT_EQ(0, ret)
+               {
+                       TH_LOG("Failed to bind to unspec/any socket: %s",
+                              strerror(errno));
+               }
+       } else {
+               EXPECT_EQ(-EINVAL, ret);
+       }
+       EXPECT_EQ(0, close(bind_fd));
+
+       if (variant->sandbox == TCP_SANDBOX) {
+               const int ruleset_fd = landlock_create_ruleset(
+                       &ruleset_attr, sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Denies bind. */
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+
+       /* Denied bind on AF_UNSPEC/INADDR_ANY. */
+       ret = bind_variant(bind_fd, &self->unspec_any0);
+       if (variant->prot.domain == AF_INET) {
+               if (is_restricted(&variant->prot, variant->sandbox)) {
+                       EXPECT_EQ(-EACCES, ret);
+               } else {
+                       EXPECT_EQ(0, ret);
+               }
+       } else {
+               EXPECT_EQ(-EINVAL, ret);
+       }
+       EXPECT_EQ(0, close(bind_fd));
+
+       /* Checks bind with AF_UNSPEC and the loopback address. */
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+       ret = bind_variant(bind_fd, &self->unspec_srv0);
+       if (variant->prot.domain == AF_INET) {
+               EXPECT_EQ(-EAFNOSUPPORT, ret);
+       } else {
+               EXPECT_EQ(-EINVAL, ret)
+               {
+                       TH_LOG("Wrong bind error: %s", strerror(errno));
+               }
+       }
+       EXPECT_EQ(0, close(bind_fd));
+}
+
+TEST_F(protocol, connect_unspec)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = LANDLOCK_ACCESS_NET_CONNECT_TCP,
+       };
+       const struct landlock_net_port_attr tcp_connect = {
+               .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               .port = self->srv0.port,
+       };
+       int bind_fd, client_fd, status;
+       pid_t child;
+
+       /* Specific connection tests. */
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+       EXPECT_EQ(0, bind_variant(bind_fd, &self->srv0));
+       if (self->srv0.protocol.type == SOCK_STREAM)
+               EXPECT_EQ(0, listen(bind_fd, backlog));
+
+       child = fork();
+       ASSERT_LE(0, child);
+       if (child == 0) {
+               int connect_fd, ret;
+
+               /* Closes listening socket for the child. */
+               EXPECT_EQ(0, close(bind_fd));
+
+               connect_fd = socket_variant(&self->srv0);
+               ASSERT_LE(0, connect_fd);
+               EXPECT_EQ(0, connect_variant(connect_fd, &self->srv0));
+
+               /* Tries to connect again, or set peer. */
+               ret = connect_variant(connect_fd, &self->srv0);
+               if (self->srv0.protocol.type == SOCK_STREAM) {
+                       EXPECT_EQ(-EISCONN, ret);
+               } else {
+                       EXPECT_EQ(0, ret);
+               }
+
+               if (variant->sandbox == TCP_SANDBOX) {
+                       const int ruleset_fd = landlock_create_ruleset(
+                               &ruleset_attr, sizeof(ruleset_attr), 0);
+                       ASSERT_LE(0, ruleset_fd);
+
+                       /* Allows connect. */
+                       ASSERT_EQ(0, landlock_add_rule(ruleset_fd,
+                                                      LANDLOCK_RULE_NET_PORT,
+                                                      &tcp_connect, 0));
+                       enforce_ruleset(_metadata, ruleset_fd);
+                       EXPECT_EQ(0, close(ruleset_fd));
+               }
+
+               /* Disconnects already connected socket, or set peer. */
+               ret = connect_variant(connect_fd, &self->unspec_any0);
+               if (self->srv0.protocol.domain == AF_UNIX &&
+                   self->srv0.protocol.type == SOCK_STREAM) {
+                       EXPECT_EQ(-EINVAL, ret);
+               } else {
+                       EXPECT_EQ(0, ret);
+               }
+
+               /* Tries to reconnect, or set peer. */
+               ret = connect_variant(connect_fd, &self->srv0);
+               if (self->srv0.protocol.domain == AF_UNIX &&
+                   self->srv0.protocol.type == SOCK_STREAM) {
+                       EXPECT_EQ(-EISCONN, ret);
+               } else {
+                       EXPECT_EQ(0, ret);
+               }
+
+               if (variant->sandbox == TCP_SANDBOX) {
+                       const int ruleset_fd = landlock_create_ruleset(
+                               &ruleset_attr, sizeof(ruleset_attr), 0);
+                       ASSERT_LE(0, ruleset_fd);
+
+                       /* Denies connect. */
+                       enforce_ruleset(_metadata, ruleset_fd);
+                       EXPECT_EQ(0, close(ruleset_fd));
+               }
+
+               ret = connect_variant(connect_fd, &self->unspec_any0);
+               if (self->srv0.protocol.domain == AF_UNIX &&
+                   self->srv0.protocol.type == SOCK_STREAM) {
+                       EXPECT_EQ(-EINVAL, ret);
+               } else {
+                       /* Always allowed to disconnect. */
+                       EXPECT_EQ(0, ret);
+               }
+
+               EXPECT_EQ(0, close(connect_fd));
+               _exit(_metadata->passed ? EXIT_SUCCESS : EXIT_FAILURE);
+               return;
+       }
+
+       client_fd = bind_fd;
+       if (self->srv0.protocol.type == SOCK_STREAM) {
+               client_fd = accept(bind_fd, NULL, 0);
+               ASSERT_LE(0, client_fd);
+       }
+
+       EXPECT_EQ(child, waitpid(child, &status, 0));
+       EXPECT_EQ(1, WIFEXITED(status));
+       EXPECT_EQ(EXIT_SUCCESS, WEXITSTATUS(status));
+
+       /* Closes connection, if any. */
+       if (client_fd != bind_fd)
+               EXPECT_LE(0, close(client_fd));
+
+       /* Closes listening socket. */
+       EXPECT_EQ(0, close(bind_fd));
+}
+
+FIXTURE(ipv4)
+{
+       struct service_fixture srv0, srv1;
+};
+
+FIXTURE_VARIANT(ipv4)
+{
+       const enum sandbox_type sandbox;
+       const int type;
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(ipv4, no_sandbox_with_tcp) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .type = SOCK_STREAM,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(ipv4, tcp_sandbox_with_tcp) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .type = SOCK_STREAM,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(ipv4, no_sandbox_with_udp) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .type = SOCK_DGRAM,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(ipv4, tcp_sandbox_with_udp) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .type = SOCK_DGRAM,
+};
+
+FIXTURE_SETUP(ipv4)
+{
+       const struct protocol_variant prot = {
+               .domain = AF_INET,
+               .type = variant->type,
+       };
+
+       disable_caps(_metadata);
+
+       set_service(&self->srv0, prot, 0);
+       set_service(&self->srv1, prot, 1);
+
+       setup_loopback(_metadata);
+};
+
+FIXTURE_TEARDOWN(ipv4)
+{
+}
+
+TEST_F(ipv4, from_unix_to_inet)
+{
+       int unix_stream_fd, unix_dgram_fd;
+
+       if (variant->sandbox == TCP_SANDBOX) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               };
+               const struct landlock_net_port_attr tcp_bind_connect_p0 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = self->srv0.port,
+               };
+               int ruleset_fd;
+
+               /* Denies connect and bind to check errno value. */
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Allows connect and bind for srv0.  */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect_p0, 0));
+
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       unix_stream_fd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
+       ASSERT_LE(0, unix_stream_fd);
+
+       unix_dgram_fd = socket(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0);
+       ASSERT_LE(0, unix_dgram_fd);
+
+       /* Checks unix stream bind and connect for srv0. */
+       EXPECT_EQ(-EINVAL, bind_variant(unix_stream_fd, &self->srv0));
+       EXPECT_EQ(-EINVAL, connect_variant(unix_stream_fd, &self->srv0));
+
+       /* Checks unix stream bind and connect for srv1. */
+       EXPECT_EQ(-EINVAL, bind_variant(unix_stream_fd, &self->srv1))
+       {
+               TH_LOG("Wrong bind error: %s", strerror(errno));
+       }
+       EXPECT_EQ(-EINVAL, connect_variant(unix_stream_fd, &self->srv1));
+
+       /* Checks unix datagram bind and connect for srv0. */
+       EXPECT_EQ(-EINVAL, bind_variant(unix_dgram_fd, &self->srv0));
+       EXPECT_EQ(-EINVAL, connect_variant(unix_dgram_fd, &self->srv0));
+
+       /* Checks unix datagram bind and connect for srv1. */
+       EXPECT_EQ(-EINVAL, bind_variant(unix_dgram_fd, &self->srv1));
+       EXPECT_EQ(-EINVAL, connect_variant(unix_dgram_fd, &self->srv1));
+}
+
+FIXTURE(tcp_layers)
+{
+       struct service_fixture srv0, srv1;
+};
+
+FIXTURE_VARIANT(tcp_layers)
+{
+       const size_t num_layers;
+       const int domain;
+};
+
+FIXTURE_SETUP(tcp_layers)
+{
+       const struct protocol_variant prot = {
+               .domain = variant->domain,
+               .type = SOCK_STREAM,
+       };
+
+       disable_caps(_metadata);
+
+       ASSERT_EQ(0, set_service(&self->srv0, prot, 0));
+       ASSERT_EQ(0, set_service(&self->srv1, prot, 1));
+
+       setup_loopback(_metadata);
+};
+
+FIXTURE_TEARDOWN(tcp_layers)
+{
+}
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, no_sandbox_with_ipv4) {
+       /* clang-format on */
+       .domain = AF_INET,
+       .num_layers = 0,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, one_sandbox_with_ipv4) {
+       /* clang-format on */
+       .domain = AF_INET,
+       .num_layers = 1,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, two_sandboxes_with_ipv4) {
+       /* clang-format on */
+       .domain = AF_INET,
+       .num_layers = 2,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, three_sandboxes_with_ipv4) {
+       /* clang-format on */
+       .domain = AF_INET,
+       .num_layers = 3,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, no_sandbox_with_ipv6) {
+       /* clang-format on */
+       .domain = AF_INET6,
+       .num_layers = 0,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, one_sandbox_with_ipv6) {
+       /* clang-format on */
+       .domain = AF_INET6,
+       .num_layers = 1,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, two_sandboxes_with_ipv6) {
+       /* clang-format on */
+       .domain = AF_INET6,
+       .num_layers = 2,
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(tcp_layers, three_sandboxes_with_ipv6) {
+       /* clang-format on */
+       .domain = AF_INET6,
+       .num_layers = 3,
+};
+
+TEST_F(tcp_layers, ruleset_overlap)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                     LANDLOCK_ACCESS_NET_CONNECT_TCP,
+       };
+       const struct landlock_net_port_attr tcp_bind = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = self->srv0.port,
+       };
+       const struct landlock_net_port_attr tcp_bind_connect = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                 LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               .port = self->srv0.port,
+       };
+
+       if (variant->num_layers >= 1) {
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Allows bind. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind, 0));
+               /* Also allows bind, but allows connect too. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       if (variant->num_layers >= 2) {
+               int ruleset_fd;
+
+               /* Creates another ruleset layer. */
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Only allows bind. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       if (variant->num_layers >= 3) {
+               int ruleset_fd;
+
+               /* Creates another ruleset layer. */
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Try to allow bind and connect. */
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       /*
+        * Forbids to connect to the socket because only one ruleset layer
+        * allows connect.
+        */
+       test_bind_and_connect(_metadata, &self->srv0, false,
+                             variant->num_layers >= 2);
+}
+
+TEST_F(tcp_layers, ruleset_expand)
+{
+       if (variant->num_layers >= 1) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
+               };
+               /* Allows bind for srv0. */
+               const struct landlock_net_port_attr bind_srv0 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+                       .port = self->srv0.port,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &bind_srv0, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       if (variant->num_layers >= 2) {
+               /* Expands network mask with connect action. */
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               };
+               /* Allows bind for srv0 and connect to srv0. */
+               const struct landlock_net_port_attr tcp_bind_connect_p0 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = self->srv0.port,
+               };
+               /* Try to allow bind for srv1. */
+               const struct landlock_net_port_attr tcp_bind_p1 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+                       .port = self->srv1.port,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect_p0, 0));
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_p1, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       if (variant->num_layers >= 3) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               };
+               /* Allows connect to srv0, without bind rule. */
+               const struct landlock_net_port_attr tcp_bind_p0 = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+                       .port = self->srv0.port,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_p0, 0));
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       test_bind_and_connect(_metadata, &self->srv0, false,
+                             variant->num_layers >= 3);
+
+       test_bind_and_connect(_metadata, &self->srv1, variant->num_layers >= 1,
+                             variant->num_layers >= 2);
+}
+
+/* clang-format off */
+FIXTURE(mini) {};
+/* clang-format on */
+
+FIXTURE_SETUP(mini)
+{
+       disable_caps(_metadata);
+
+       setup_loopback(_metadata);
+};
+
+FIXTURE_TEARDOWN(mini)
+{
+}
+
+/* clang-format off */
+
+#define ACCESS_LAST LANDLOCK_ACCESS_NET_CONNECT_TCP
+
+#define ACCESS_ALL ( \
+       LANDLOCK_ACCESS_NET_BIND_TCP | \
+       LANDLOCK_ACCESS_NET_CONNECT_TCP)
+
+/* clang-format on */
+
+TEST_F(mini, network_access_rights)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = ACCESS_ALL,
+       };
+       struct landlock_net_port_attr net_port = {
+               .port = sock_port_start,
+       };
+       int ruleset_fd;
+       __u64 access;
+
+       ruleset_fd =
+               landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
+       ASSERT_LE(0, ruleset_fd);
+
+       for (access = 1; access <= ACCESS_LAST; access <<= 1) {
+               net_port.allowed_access = access;
+               EXPECT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &net_port, 0))
+               {
+                       TH_LOG("Failed to add rule with access 0x%llx: %s",
+                              access, strerror(errno));
+               }
+       }
+       EXPECT_EQ(0, close(ruleset_fd));
+}
+
+/* Checks invalid attribute, out of landlock network access range. */
+TEST_F(mini, unknown_access_rights)
+{
+       __u64 access_mask;
+
+       for (access_mask = 1ULL << 63; access_mask != ACCESS_LAST;
+            access_mask >>= 1) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = access_mask,
+               };
+
+               EXPECT_EQ(-1, landlock_create_ruleset(&ruleset_attr,
+                                                     sizeof(ruleset_attr), 0));
+               EXPECT_EQ(EINVAL, errno);
+       }
+}
+
+TEST_F(mini, inval)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP
+       };
+       const struct landlock_net_port_attr tcp_bind_connect = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                 LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               .port = sock_port_start,
+       };
+       const struct landlock_net_port_attr tcp_denied = {
+               .allowed_access = 0,
+               .port = sock_port_start,
+       };
+       const struct landlock_net_port_attr tcp_bind = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = sock_port_start,
+       };
+       int ruleset_fd;
+
+       ruleset_fd =
+               landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
+       ASSERT_LE(0, ruleset_fd);
+
+       /* Checks unhandled allowed_access. */
+       EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                       &tcp_bind_connect, 0));
+       EXPECT_EQ(EINVAL, errno);
+
+       /* Checks zero access value. */
+       EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                       &tcp_denied, 0));
+       EXPECT_EQ(ENOMSG, errno);
+
+       /* Adds with legitimate values. */
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &tcp_bind, 0));
+}
+
+TEST_F(mini, tcp_port_overflow)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                     LANDLOCK_ACCESS_NET_CONNECT_TCP,
+       };
+       const struct landlock_net_port_attr port_max_bind = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = UINT16_MAX,
+       };
+       const struct landlock_net_port_attr port_max_connect = {
+               .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               .port = UINT16_MAX,
+       };
+       const struct landlock_net_port_attr port_overflow1 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = UINT16_MAX + 1,
+       };
+       const struct landlock_net_port_attr port_overflow2 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = UINT16_MAX + 2,
+       };
+       const struct landlock_net_port_attr port_overflow3 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = UINT32_MAX + 1UL,
+       };
+       const struct landlock_net_port_attr port_overflow4 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = UINT32_MAX + 2UL,
+       };
+       const struct protocol_variant ipv4_tcp = {
+               .domain = AF_INET,
+               .type = SOCK_STREAM,
+       };
+       struct service_fixture srv_denied, srv_max_allowed;
+       int ruleset_fd;
+
+       ASSERT_EQ(0, set_service(&srv_denied, ipv4_tcp, 0));
+
+       /* Be careful to avoid port inconsistencies. */
+       srv_max_allowed = srv_denied;
+       srv_max_allowed.port = port_max_bind.port;
+       srv_max_allowed.ipv4_addr.sin_port = htons(port_max_bind.port);
+
+       ruleset_fd =
+               landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
+       ASSERT_LE(0, ruleset_fd);
+
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &port_max_bind, 0));
+
+       EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                       &port_overflow1, 0));
+       EXPECT_EQ(EINVAL, errno);
+
+       EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                       &port_overflow2, 0));
+       EXPECT_EQ(EINVAL, errno);
+
+       EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                       &port_overflow3, 0));
+       EXPECT_EQ(EINVAL, errno);
+
+       /* Interleaves with invalid rule additions. */
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &port_max_connect, 0));
+
+       EXPECT_EQ(-1, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                       &port_overflow4, 0));
+       EXPECT_EQ(EINVAL, errno);
+
+       enforce_ruleset(_metadata, ruleset_fd);
+
+       test_bind_and_connect(_metadata, &srv_denied, true, true);
+       test_bind_and_connect(_metadata, &srv_max_allowed, false, false);
+}
+
+FIXTURE(ipv4_tcp)
+{
+       struct service_fixture srv0, srv1;
+};
+
+FIXTURE_SETUP(ipv4_tcp)
+{
+       const struct protocol_variant ipv4_tcp = {
+               .domain = AF_INET,
+               .type = SOCK_STREAM,
+       };
+
+       disable_caps(_metadata);
+
+       ASSERT_EQ(0, set_service(&self->srv0, ipv4_tcp, 0));
+       ASSERT_EQ(0, set_service(&self->srv1, ipv4_tcp, 1));
+
+       setup_loopback(_metadata);
+};
+
+FIXTURE_TEARDOWN(ipv4_tcp)
+{
+}
+
+TEST_F(ipv4_tcp, port_endianness)
+{
+       const struct landlock_ruleset_attr ruleset_attr = {
+               .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                     LANDLOCK_ACCESS_NET_CONNECT_TCP,
+       };
+       const struct landlock_net_port_attr bind_host_endian_p0 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               /* Host port format. */
+               .port = self->srv0.port,
+       };
+       const struct landlock_net_port_attr connect_big_endian_p0 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               /* Big endian port format. */
+               .port = htons(self->srv0.port),
+       };
+       const struct landlock_net_port_attr bind_connect_host_endian_p1 = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                 LANDLOCK_ACCESS_NET_CONNECT_TCP,
+               /* Host port format. */
+               .port = self->srv1.port,
+       };
+       const unsigned int one = 1;
+       const char little_endian = *(const char *)&one;
+       int ruleset_fd;
+
+       ruleset_fd =
+               landlock_create_ruleset(&ruleset_attr, sizeof(ruleset_attr), 0);
+       ASSERT_LE(0, ruleset_fd);
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &bind_host_endian_p0, 0));
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &connect_big_endian_p0, 0));
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &bind_connect_host_endian_p1, 0));
+       enforce_ruleset(_metadata, ruleset_fd);
+
+       /* No restriction for big endinan CPU. */
+       test_bind_and_connect(_metadata, &self->srv0, false, little_endian);
+
+       /* No restriction for any CPU. */
+       test_bind_and_connect(_metadata, &self->srv1, false, false);
+}
+
+TEST_F(ipv4_tcp, with_fs)
+{
+       const struct landlock_ruleset_attr ruleset_attr_fs_net = {
+               .handled_access_fs = LANDLOCK_ACCESS_FS_READ_DIR,
+               .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP,
+       };
+       struct landlock_path_beneath_attr path_beneath = {
+               .allowed_access = LANDLOCK_ACCESS_FS_READ_DIR,
+               .parent_fd = -1,
+       };
+       struct landlock_net_port_attr tcp_bind = {
+               .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP,
+               .port = self->srv0.port,
+       };
+       int ruleset_fd, bind_fd, dir_fd;
+
+       /* Creates ruleset both for filesystem and network access. */
+       ruleset_fd = landlock_create_ruleset(&ruleset_attr_fs_net,
+                                            sizeof(ruleset_attr_fs_net), 0);
+       ASSERT_LE(0, ruleset_fd);
+
+       /* Adds a filesystem rule. */
+       path_beneath.parent_fd = open("/dev", O_PATH | O_DIRECTORY | O_CLOEXEC);
+       ASSERT_LE(0, path_beneath.parent_fd);
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_PATH_BENEATH,
+                                      &path_beneath, 0));
+       EXPECT_EQ(0, close(path_beneath.parent_fd));
+
+       /* Adds a network rule. */
+       ASSERT_EQ(0, landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                      &tcp_bind, 0));
+
+       enforce_ruleset(_metadata, ruleset_fd);
+       EXPECT_EQ(0, close(ruleset_fd));
+
+       /* Tests file access. */
+       dir_fd = open("/dev", O_RDONLY);
+       EXPECT_LE(0, dir_fd);
+       EXPECT_EQ(0, close(dir_fd));
+
+       dir_fd = open("/", O_RDONLY);
+       EXPECT_EQ(-1, dir_fd);
+       EXPECT_EQ(EACCES, errno);
+
+       /* Tests port binding. */
+       bind_fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
+       ASSERT_LE(0, bind_fd);
+       EXPECT_EQ(0, bind_variant(bind_fd, &self->srv0));
+       EXPECT_EQ(0, close(bind_fd));
+
+       bind_fd = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
+       ASSERT_LE(0, bind_fd);
+       EXPECT_EQ(-EACCES, bind_variant(bind_fd, &self->srv1));
+}
+
+FIXTURE(port_specific)
+{
+       struct service_fixture srv0;
+};
+
+FIXTURE_VARIANT(port_specific)
+{
+       const enum sandbox_type sandbox;
+       const struct protocol_variant prot;
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(port_specific, no_sandbox_with_ipv4) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_INET,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(port_specific, sandbox_with_ipv4) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_INET,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(port_specific, no_sandbox_with_ipv6) {
+       /* clang-format on */
+       .sandbox = NO_SANDBOX,
+       .prot = {
+               .domain = AF_INET6,
+               .type = SOCK_STREAM,
+       },
+};
+
+/* clang-format off */
+FIXTURE_VARIANT_ADD(port_specific, sandbox_with_ipv6) {
+       /* clang-format on */
+       .sandbox = TCP_SANDBOX,
+       .prot = {
+               .domain = AF_INET6,
+               .type = SOCK_STREAM,
+       },
+};
+
+FIXTURE_SETUP(port_specific)
+{
+       disable_caps(_metadata);
+
+       ASSERT_EQ(0, set_service(&self->srv0, variant->prot, 0));
+
+       setup_loopback(_metadata);
+};
+
+FIXTURE_TEARDOWN(port_specific)
+{
+}
+
+TEST_F(port_specific, bind_connect_zero)
+{
+       int bind_fd, connect_fd, ret;
+       uint16_t port;
+
+       /* Adds a rule layer with bind and connect actions. */
+       if (variant->sandbox == TCP_SANDBOX) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP
+               };
+               const struct landlock_net_port_attr tcp_bind_connect_zero = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = 0,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               /* Checks zero port value on bind and connect actions. */
+               EXPECT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect_zero, 0));
+
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+
+       connect_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, connect_fd);
+
+       /* Sets address port to 0 for both protocol families. */
+       set_port(&self->srv0, 0);
+       /*
+        * Binds on port 0, which selects a random port within
+        * ip_local_port_range.
+        */
+       ret = bind_variant(bind_fd, &self->srv0);
+       EXPECT_EQ(0, ret);
+
+       EXPECT_EQ(0, listen(bind_fd, backlog));
+
+       /* Connects on port 0. */
+       ret = connect_variant(connect_fd, &self->srv0);
+       EXPECT_EQ(-ECONNREFUSED, ret);
+
+       /* Sets binded port for both protocol families. */
+       port = get_binded_port(bind_fd, &variant->prot);
+       EXPECT_NE(0, port);
+       set_port(&self->srv0, port);
+       /* Connects on the binded port. */
+       ret = connect_variant(connect_fd, &self->srv0);
+       if (is_restricted(&variant->prot, variant->sandbox)) {
+               /* Denied by Landlock. */
+               EXPECT_EQ(-EACCES, ret);
+       } else {
+               EXPECT_EQ(0, ret);
+       }
+
+       EXPECT_EQ(0, close(connect_fd));
+       EXPECT_EQ(0, close(bind_fd));
+}
+
+TEST_F(port_specific, bind_connect_1023)
+{
+       int bind_fd, connect_fd, ret;
+
+       /* Adds a rule layer with bind and connect actions. */
+       if (variant->sandbox == TCP_SANDBOX) {
+               const struct landlock_ruleset_attr ruleset_attr = {
+                       .handled_access_net = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                             LANDLOCK_ACCESS_NET_CONNECT_TCP
+               };
+               /* A rule with port value less than 1024. */
+               const struct landlock_net_port_attr tcp_bind_connect_low_range = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = 1023,
+               };
+               /* A rule with 1024 port. */
+               const struct landlock_net_port_attr tcp_bind_connect = {
+                       .allowed_access = LANDLOCK_ACCESS_NET_BIND_TCP |
+                                         LANDLOCK_ACCESS_NET_CONNECT_TCP,
+                       .port = 1024,
+               };
+               int ruleset_fd;
+
+               ruleset_fd = landlock_create_ruleset(&ruleset_attr,
+                                                    sizeof(ruleset_attr), 0);
+               ASSERT_LE(0, ruleset_fd);
+
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect_low_range, 0));
+               ASSERT_EQ(0,
+                         landlock_add_rule(ruleset_fd, LANDLOCK_RULE_NET_PORT,
+                                           &tcp_bind_connect, 0));
+
+               enforce_ruleset(_metadata, ruleset_fd);
+               EXPECT_EQ(0, close(ruleset_fd));
+       }
+
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+
+       connect_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, connect_fd);
+
+       /* Sets address port to 1023 for both protocol families. */
+       set_port(&self->srv0, 1023);
+       /* Binds on port 1023. */
+       ret = bind_variant(bind_fd, &self->srv0);
+       /* Denied by the system. */
+       EXPECT_EQ(-EACCES, ret);
+
+       /* Binds on port 1023. */
+       set_cap(_metadata, CAP_NET_BIND_SERVICE);
+       ret = bind_variant(bind_fd, &self->srv0);
+       clear_cap(_metadata, CAP_NET_BIND_SERVICE);
+       EXPECT_EQ(0, ret);
+       EXPECT_EQ(0, listen(bind_fd, backlog));
+
+       /* Connects on the binded port 1023. */
+       ret = connect_variant(connect_fd, &self->srv0);
+       EXPECT_EQ(0, ret);
+
+       EXPECT_EQ(0, close(connect_fd));
+       EXPECT_EQ(0, close(bind_fd));
+
+       bind_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, bind_fd);
+
+       connect_fd = socket_variant(&self->srv0);
+       ASSERT_LE(0, connect_fd);
+
+       /* Sets address port to 1024 for both protocol families. */
+       set_port(&self->srv0, 1024);
+       /* Binds on port 1024. */
+       ret = bind_variant(bind_fd, &self->srv0);
+       EXPECT_EQ(0, ret);
+       EXPECT_EQ(0, listen(bind_fd, backlog));
+
+       /* Connects on the binded port 1024. */
+       ret = connect_variant(connect_fd, &self->srv0);
+       EXPECT_EQ(0, ret);
+
+       EXPECT_EQ(0, close(connect_fd));
+       EXPECT_EQ(0, close(bind_fd));
+}
+
+TEST_HARNESS_MAIN