]> granicus.if.org Git - strace/commitdiff
tests: add seccomp-strict.test
authorDmitry V. Levin <ldv@altlinux.org>
Mon, 11 Apr 2016 15:09:09 +0000 (15:09 +0000)
committerDmitry V. Levin <ldv@altlinux.org>
Mon, 11 Apr 2016 15:09:09 +0000 (15:09 +0000)
* tests/seccomp-strict.c: New file.
* tests/seccomp-strict.test: New test.
* tests/.gitignore: Add seccomp-strict.
* tests/Makefile.am (check_PROGRAMS): Likewise.
(DECODER_TESTS): Add seccomp-strict.test.

tests/.gitignore
tests/Makefile.am
tests/seccomp-strict.c [new file with mode: 0644]
tests/seccomp-strict.test [new file with mode: 0755]

index 222255f15b837bb7cda39260aa10ba8385d151af..12b0c5336db5297f50a4c055557e2c7f808af98e 100644 (file)
@@ -128,6 +128,7 @@ sched_xetparam
 sched_xetscheduler
 scm_rights
 seccomp
+seccomp-strict
 select
 sendfile
 sendfile64
index 183ff7c71b77e20662a0bd1d1d0e34e03d2ff914..1e492f535e1d502db5c5ec5b86ff0cd38ad08834 100644 (file)
@@ -177,6 +177,7 @@ check_PROGRAMS = \
        sched_xetscheduler \
        scm_rights \
        seccomp \
+       seccomp-strict \
        select \
        sendfile \
        sendfile64 \
@@ -373,6 +374,7 @@ DECODER_TESTS = \
        sched_xetparam.test \
        sched_xetscheduler.test \
        scm_rights-fd.test \
+       seccomp-strict.test \
        seccomp.test \
        select.test \
        sendfile.test \
diff --git a/tests/seccomp-strict.c b/tests/seccomp-strict.c
new file mode 100644 (file)
index 0000000..348bd2e
--- /dev/null
@@ -0,0 +1,70 @@
+/*
+ * Check how seccomp SECCOMP_SET_MODE_STRICT is decoded.
+ *
+ * Copyright (c) 2016 Dmitry V. Levin <ldv@altlinux.org>
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. The name of the author may not be used to endorse or promote products
+ *    derived from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "tests.h"
+#include <sys/syscall.h>
+
+#if defined __NR_seccomp && defined __NR_exit
+
+# include <assert.h>
+# include <errno.h>
+# include <stdio.h>
+# include <unistd.h>
+
+int
+main(void)
+{
+       static const char text1[] =
+               "seccomp(SECCOMP_SET_MODE_STRICT, 0, NULL) = 0\n";
+       static const char text2[] = "+++ exited with 0 +++\n";
+       const unsigned long addr = (unsigned long) 0xfacefeeddeadbeef;
+       int rc = 0;
+
+       assert(syscall(__NR_seccomp, -1L, -1L, addr) == -1);
+       printf("seccomp(%#x /* SECCOMP_SET_MODE_??? */, %u, %#lx) = -1 %s (%m)\n",
+              -1, -1, addr, ENOSYS == errno ? "ENOSYS" : "EINVAL");
+       fflush(stdout);
+
+       if (syscall(__NR_seccomp, 0, 0, 0)) {
+               printf("seccomp(SECCOMP_SET_MODE_STRICT, 0, NULL) = -1 %s (%m)\n",
+                      ENOSYS == errno ? "ENOSYS" : "EINVAL");
+               fflush(stdout);
+       } else {
+               rc += write(1, text1, LENGTH_OF(text1)) != LENGTH_OF(text1);
+       }
+
+       rc += write(1, text2, LENGTH_OF(text2)) != LENGTH_OF(text2);
+       return !!syscall(__NR_exit, rc);
+}
+
+#else
+
+SKIP_MAIN_UNDEFINED("__NR_seccomp && __NR_exit")
+
+#endif
diff --git a/tests/seccomp-strict.test b/tests/seccomp-strict.test
new file mode 100755 (executable)
index 0000000..62f66b8
--- /dev/null
@@ -0,0 +1,6 @@
+#!/bin/sh
+
+# Check how seccomp SECCOMP_SET_MODE_STRICT is decoded.
+
+. "${srcdir=.}/init.sh"
+run_strace_match_diff -e trace=seccomp