]> granicus.if.org Git - strace/commitdiff
tests: add seccomp-filter.test
authorDmitry V. Levin <ldv@altlinux.org>
Tue, 12 Apr 2016 00:20:03 +0000 (00:20 +0000)
committerDmitry V. Levin <ldv@altlinux.org>
Tue, 12 Apr 2016 00:20:03 +0000 (00:20 +0000)
* tests/seccomp-filter.c: New file.
* tests/seccomp-filter.test: New test.
* tests/.gitignore: Add seccomp-filter.
* tests/Makefile.am (check_PROGRAMS): Likewise.
(DECODER_TESTS): Add seccomp-filter.test.

tests/.gitignore
tests/Makefile.am
tests/seccomp-filter.c [new file with mode: 0644]
tests/seccomp-filter.test [new file with mode: 0755]

index 3ed6ceea173a198ec9ed1851ed260ca7f4b44c3e..6aae5de162e019709b330f5f322c8934a1874e73 100644 (file)
@@ -128,6 +128,7 @@ sched_xetattr
 sched_xetparam
 sched_xetscheduler
 scm_rights
+seccomp-filter
 seccomp-filter-v
 seccomp-strict
 select
index db33f4df450b591b6153e803d6d122d6e0011968..2a4feb00953cac5ec42e257af65930348ceab0e0 100644 (file)
@@ -177,6 +177,7 @@ check_PROGRAMS = \
        sched_xetparam \
        sched_xetscheduler \
        scm_rights \
+       seccomp-filter \
        seccomp-filter-v \
        seccomp-strict \
        select \
@@ -377,6 +378,7 @@ DECODER_TESTS = \
        sched_xetscheduler.test \
        scm_rights-fd.test \
        seccomp-filter-v.test \
+       seccomp-filter.test \
        seccomp-strict.test \
        select.test \
        sendfile.test \
diff --git a/tests/seccomp-filter.c b/tests/seccomp-filter.c
new file mode 100644 (file)
index 0000000..6d39965
--- /dev/null
@@ -0,0 +1,77 @@
+/*
+ * Check decoding of seccomp SECCOMP_SET_MODE_FILTER.
+ *
+ * Copyright (c) 2016 Dmitry V. Levin <ldv@altlinux.org>
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. The name of the author may not be used to endorse or promote products
+ *    derived from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "tests.h"
+
+#include <assert.h>
+#include <errno.h>
+#include <stdio.h>
+#include <sys/syscall.h>
+#include <unistd.h>
+
+#ifdef HAVE_LINUX_SECCOMP_H
+# include <linux/seccomp.h>
+#endif
+#ifdef HAVE_LINUX_FILTER_H
+# include <linux/filter.h>
+#endif
+
+#if defined __NR_seccomp && defined SECCOMP_SET_MODE_FILTER
+
+# define N 7
+
+int
+main(void)
+{
+       struct sock_filter *const filter = tail_alloc(sizeof(*filter) * N);
+       const void *const efault = tail_alloc(1);
+       struct sock_fprog *const prog = tail_alloc(sizeof(*prog));
+
+       prog->filter = filter;
+       prog->len = N;
+       assert(syscall(__NR_seccomp, SECCOMP_SET_MODE_FILTER, -1, prog) == -1);
+       printf("seccomp(SECCOMP_SET_MODE_FILTER, %s, {len=%u, filter=%p})"
+              " = -1 %s (%m)\n", "SECCOMP_FILTER_FLAG_TSYNC|0xfffffffe",
+              prog->len, prog->filter,
+              ENOSYS == errno ? "ENOSYS" : "EINVAL");
+
+       assert(syscall(__NR_seccomp, SECCOMP_SET_MODE_FILTER, -2L, efault) == -1);
+       printf("seccomp(SECCOMP_SET_MODE_FILTER, %s, %p) = -1 %s (%m)\n",
+              "0xfffffffe /* SECCOMP_FILTER_FLAG_??? */", efault,
+              ENOSYS == errno ? "ENOSYS" : "EINVAL");
+
+       puts("+++ exited with 0 +++");
+       return 0;
+}
+
+#else
+
+SKIP_MAIN_UNDEFINED("__NR_seccomp && SECCOMP_SET_MODE_FILTER")
+
+#endif
diff --git a/tests/seccomp-filter.test b/tests/seccomp-filter.test
new file mode 100755 (executable)
index 0000000..65c6d49
--- /dev/null
@@ -0,0 +1,6 @@
+#!/bin/sh
+
+# Check decoding of seccomp SECCOMP_SET_MODE_FILTER.
+
+. "${srcdir=.}/init.sh"
+run_strace_match_diff -e trace=seccomp