#include "xlat/seccomp_ops.h"
#include "xlat/seccomp_filter_flags.h"
-static void
-decode_seccomp_set_mode_strict(const unsigned int flags,
- const kernel_ulong_t addr)
-{
- tprintf("%u, ", flags);
- printaddr(addr);
-}
-
SYS_FUNC(seccomp)
{
unsigned int op = tcp->u_arg[0];
+ unsigned int flags = tcp->u_arg[1];
+ unsigned int act;
printxval(seccomp_ops, op, "SECCOMP_SET_MODE_???");
tprints(", ");
- if (op == SECCOMP_SET_MODE_FILTER) {
- printflags(seccomp_filter_flags, tcp->u_arg[1],
+ switch (op) {
+ case SECCOMP_GET_ACTION_AVAIL:
+ tprintf("%u, ", flags);
+ if (!umove_or_printaddr(tcp, tcp->u_arg[2], &act)) {
+ tprints("[");
+ printxval(seccomp_ret_action, act, "SECCOMP_RET_???");
+ tprints("]");
+ }
+ break;
+
+ case SECCOMP_SET_MODE_FILTER:
+ printflags(seccomp_filter_flags, flags,
"SECCOMP_FILTER_FLAG_???");
tprints(", ");
decode_seccomp_fprog(tcp, tcp->u_arg[2]);
- } else {
- decode_seccomp_set_mode_strict(tcp->u_arg[1],
- tcp->u_arg[2]);
+ break;
+
+ case SECCOMP_SET_MODE_STRICT:
+ default:
+ tprintf("%u, ", flags);
+ printaddr(tcp->u_arg[2]);
+ break;
}
return RVAL_DECODED;
--- /dev/null
+/*
+ * Check decoding of seccomp SECCOMP_GET_ACTION_AVAIL.
+ *
+ * Copyright (c) 2017 Dmitry V. Levin <ldv@altlinux.org>
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 3. The name of the author may not be used to endorse or promote products
+ * derived from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "tests.h"
+#include <asm/unistd.h>
+
+#ifdef __NR_seccomp
+
+# include <stdio.h>
+# include <stdint.h>
+# include <unistd.h>
+
+# ifdef HAVE_LINUX_SECCOMP_H
+# include <linux/seccomp.h>
+# endif
+
+# ifndef SECCOMP_GET_ACTION_AVAIL
+# define SECCOMP_GET_ACTION_AVAIL 2
+# endif
+
+static const char *errstr;
+
+static long
+k_seccomp(const kernel_ulong_t op, const kernel_ulong_t flags,
+ const kernel_ulong_t args)
+{
+ const long rc = syscall(__NR_seccomp, op, flags, args);
+ errstr = sprintrc(rc);
+ return rc;
+}
+
+int
+main(void)
+{
+ TAIL_ALLOC_OBJECT_CONST_PTR(uint32_t, act);
+ kernel_ulong_t op = (kernel_ulong_t) 0xfacefeed00000000ULL
+ | SECCOMP_GET_ACTION_AVAIL;
+ kernel_ulong_t flags = (kernel_ulong_t) 0xdeadbeef00000000ULL;
+ unsigned int i;
+
+ struct {
+ uint32_t val;
+ const char *str;
+ } actions [] = {
+ { 0, "SECCOMP_RET_KILL_THREAD" },
+# ifdef SECCOMP_RET_KILL_PROCESS
+ { ARG_STR(SECCOMP_RET_KILL_PROCESS) },
+# endif
+# ifdef SECCOMP_RET_TRAP
+ { ARG_STR(SECCOMP_RET_TRAP) },
+# endif
+# ifdef SECCOMP_RET_ERRNO
+ { ARG_STR(SECCOMP_RET_ERRNO) },
+# endif
+# ifdef SECCOMP_RET_TRACE
+ { ARG_STR(SECCOMP_RET_TRACE) },
+# endif
+# ifdef SECCOMP_RET_LOG
+ { ARG_STR(SECCOMP_RET_LOG) },
+# endif
+# ifdef SECCOMP_RET_ALLOW
+ { ARG_STR(SECCOMP_RET_ALLOW) },
+# endif
+ { 0xffffffff, "0xffffffff /* SECCOMP_RET_??? */" }
+ };
+
+ for (i = 0; i < ARRAY_SIZE(actions); ++i) {
+ *act = actions[i].val;
+ k_seccomp(op, flags, (uintptr_t) act);
+ printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, [%s]) = %s\n",
+ actions[i].str, errstr);
+ }
+
+ *act = actions[0].val;
+
+ k_seccomp(op, flags, (uintptr_t) (act + 1));
+ printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, %p) = %s\n",
+ act + 1, errstr);
+
+ if (F8ILL_KULONG_SUPPORTED) {
+ k_seccomp(op, flags, f8ill_ptr_to_kulong(act));
+ printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, %#jx) = %s\n",
+ (uintmax_t) f8ill_ptr_to_kulong(act), errstr);
+ }
+
+ flags |= 0xcafef00d;
+ k_seccomp(op, flags, 0);
+ printf("seccomp(SECCOMP_GET_ACTION_AVAIL, %u, NULL) = %s\n",
+ (unsigned int) flags, errstr);
+
+ puts("+++ exited with 0 +++");
+ return 0;
+}
+
+#else
+
+SKIP_MAIN_UNDEFINED("__NR_seccomp")
+
+#endif