/* * Check decoding of seccomp SECCOMP_GET_ACTION_AVAIL. * * Copyright (c) 2017 Dmitry V. Levin * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "tests.h" #include #ifdef __NR_seccomp # include # include # include # ifdef HAVE_LINUX_SECCOMP_H # include # endif # ifndef SECCOMP_GET_ACTION_AVAIL # define SECCOMP_GET_ACTION_AVAIL 2 # endif static const char *errstr; static long k_seccomp(const kernel_ulong_t op, const kernel_ulong_t flags, const kernel_ulong_t args) { const long rc = syscall(__NR_seccomp, op, flags, args); errstr = sprintrc(rc); return rc; } int main(void) { TAIL_ALLOC_OBJECT_CONST_PTR(uint32_t, act); kernel_ulong_t op = (kernel_ulong_t) 0xfacefeed00000000ULL | SECCOMP_GET_ACTION_AVAIL; kernel_ulong_t flags = (kernel_ulong_t) 0xdeadbeef00000000ULL; unsigned int i; struct { uint32_t val; const char *str; } actions [] = { { 0, "SECCOMP_RET_KILL_THREAD" }, # ifdef SECCOMP_RET_KILL_PROCESS { ARG_STR(SECCOMP_RET_KILL_PROCESS) }, # endif # ifdef SECCOMP_RET_TRAP { ARG_STR(SECCOMP_RET_TRAP) }, # endif # ifdef SECCOMP_RET_ERRNO { ARG_STR(SECCOMP_RET_ERRNO) }, # endif # ifdef SECCOMP_RET_TRACE { ARG_STR(SECCOMP_RET_TRACE) }, # endif # ifdef SECCOMP_RET_LOG { ARG_STR(SECCOMP_RET_LOG) }, # endif # ifdef SECCOMP_RET_ALLOW { ARG_STR(SECCOMP_RET_ALLOW) }, # endif { 0xffffffff, "0xffffffff /* SECCOMP_RET_??? */" } }; for (i = 0; i < ARRAY_SIZE(actions); ++i) { *act = actions[i].val; k_seccomp(op, flags, (uintptr_t) act); printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, [%s]) = %s\n", actions[i].str, errstr); } *act = actions[0].val; k_seccomp(op, flags, (uintptr_t) (act + 1)); printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, %p) = %s\n", act + 1, errstr); if (F8ILL_KULONG_SUPPORTED) { k_seccomp(op, flags, f8ill_ptr_to_kulong(act)); printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, %#jx) = %s\n", (uintmax_t) f8ill_ptr_to_kulong(act), errstr); } flags |= 0xcafef00d; k_seccomp(op, flags, 0); printf("seccomp(SECCOMP_GET_ACTION_AVAIL, %u, NULL) = %s\n", (unsigned int) flags, errstr); puts("+++ exited with 0 +++"); return 0; } #else SKIP_MAIN_UNDEFINED("__NR_seccomp") #endif