2015-12-17 17:56:48 +00:00
/*
2016-04-11 15:16:30 +00:00
* Check verbose decoding of prctl PR_SET_SECCOMP SECCOMP_MODE_FILTER .
*
2016-01-05 23:17:29 +00:00
* Copyright ( c ) 2015 - 2016 Dmitry V . Levin < ldv @ altlinux . org >
2018-12-24 23:46:43 +00:00
* Copyright ( c ) 2016 - 2018 The strace developers .
2015-12-17 17:56:48 +00:00
* All rights reserved .
*
2018-12-10 00:00:00 +00:00
* SPDX - License - Identifier : GPL - 2.0 - or - later
2015-12-17 17:56:48 +00:00
*/
2016-01-02 13:28:43 +00:00
# include "tests.h"
2015-03-19 00:40:49 +00:00
# include <stddef.h>
# include <unistd.h>
# include <stdio.h>
# include <errno.h>
2016-08-09 14:38:29 +00:00
# include <asm/unistd.h>
2015-03-19 00:40:49 +00:00
# ifdef HAVE_PRCTL
# include <sys / prctl.h>
# endif
# ifdef HAVE_LINUX_SECCOMP_H
# include <linux / seccomp.h>
# endif
2017-07-08 01:49:00 +00:00
# include <linux/filter.h>
2015-03-19 00:40:49 +00:00
# if defined HAVE_PRCTL \
& & defined PR_SET_NO_NEW_PRIVS \
& & defined PR_SET_SECCOMP \
& & defined SECCOMP_MODE_FILTER \
& & defined SECCOMP_RET_ERRNO \
& & defined BPF_JUMP \
& & defined BPF_STMT
2018-12-30 15:35:21 +00:00
# define SOCK_FILTER_ALLOW_SYSCALL(nr) \
2016-04-11 20:25:01 +00:00
BPF_JUMP ( BPF_JMP | BPF_K | BPF_JEQ , __NR_ # # nr , 0 , 1 ) , \
BPF_STMT ( BPF_RET | BPF_K , SECCOMP_RET_ALLOW )
2015-03-19 00:40:49 +00:00
2018-12-30 15:35:21 +00:00
# define SOCK_FILTER_DENY_SYSCALL(nr, err) \
2016-04-11 20:25:01 +00:00
BPF_JUMP ( BPF_JMP | BPF_K | BPF_JEQ , __NR_ # # nr , 0 , 1 ) , \
BPF_STMT ( BPF_RET | BPF_K , SECCOMP_RET_ERRNO | ( SECCOMP_RET_DATA & ( err ) ) )
2015-03-19 00:40:49 +00:00
2018-12-30 15:35:21 +00:00
# define SOCK_FILTER_KILL_PROCESS \
2016-04-11 20:25:01 +00:00
BPF_STMT ( BPF_RET | BPF_K , SECCOMP_RET_KILL )
2015-03-19 00:40:49 +00:00
2018-12-30 15:35:21 +00:00
# define PRINT_ALLOW_SYSCALL(nr) \
2016-04-11 20:25:01 +00:00
printf ( " BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#x, 0, 0x1), " \
" BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), " , \
2015-03-19 00:40:49 +00:00
__NR_ # # nr )
2018-12-30 15:35:21 +00:00
# define PRINT_DENY_SYSCALL(nr, err) \
2016-04-11 20:25:01 +00:00
printf ( " BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, %#x, 0, 0x1), " \
" BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|%#x), " , \
2015-03-19 00:40:49 +00:00
__NR_ # # nr , err )
static const struct sock_filter filter [ ] = {
/* load syscall number */
2016-04-11 20:25:01 +00:00
BPF_STMT ( BPF_LD | BPF_W | BPF_ABS , offsetof ( struct seccomp_data , nr ) ) ,
2015-03-19 00:40:49 +00:00
/* allow syscalls */
SOCK_FILTER_ALLOW_SYSCALL ( close ) ,
SOCK_FILTER_ALLOW_SYSCALL ( exit ) ,
SOCK_FILTER_ALLOW_SYSCALL ( exit_group ) ,
/* deny syscalls */
SOCK_FILTER_DENY_SYSCALL ( sync , EBUSY ) ,
SOCK_FILTER_DENY_SYSCALL ( setsid , EPERM ) ,
/* kill process */
SOCK_FILTER_KILL_PROCESS
} ;
static const struct sock_fprog prog = {
2016-04-12 00:05:43 +00:00
. len = ARRAY_SIZE ( filter ) ,
2015-03-19 00:40:49 +00:00
. filter = ( struct sock_filter * ) filter ,
} ;
int
main ( void )
{
int fds [ 2 ] ;
puts ( " prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 " ) ;
2016-04-12 00:05:43 +00:00
printf ( " prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=%u, filter=[ " ,
prog . len ) ;
2015-03-19 00:40:49 +00:00
2016-04-11 20:25:01 +00:00
printf ( " BPF_STMT(BPF_LD|BPF_W|BPF_ABS, %#x), " ,
2015-03-19 00:40:49 +00:00
( unsigned ) offsetof ( struct seccomp_data , nr ) ) ;
PRINT_ALLOW_SYSCALL ( close ) ;
PRINT_ALLOW_SYSCALL ( exit ) ;
PRINT_ALLOW_SYSCALL ( exit_group ) ;
PRINT_DENY_SYSCALL ( sync , EBUSY ) ,
PRINT_DENY_SYSCALL ( setsid , EPERM ) ,
2017-11-01 02:02:21 +00:00
printf ( " BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_KILL_THREAD) " ) ;
2015-03-19 00:40:49 +00:00
2016-04-12 00:05:43 +00:00
puts ( " ]}) = 0 " ) ;
2015-03-19 00:40:49 +00:00
puts ( " +++ exited with 0 +++ " ) ;
fflush ( stdout ) ;
close ( 0 ) ;
close ( 1 ) ;
2016-01-05 23:17:29 +00:00
if ( pipe ( fds ) )
perror_msg_and_fail ( " pipe " ) ;
if ( prctl ( PR_SET_NO_NEW_PRIVS , 1 , 0 , 0 , 0 ) )
perror_msg_and_skip ( " PR_SET_NO_NEW_PRIVS " ) ;
if ( prctl ( PR_SET_SECCOMP , SECCOMP_MODE_FILTER , & prog ) )
perror_msg_and_skip ( " PR_SET_SECCOMP " ) ;
if ( close ( 0 ) | | close ( 1 ) )
2015-03-19 00:40:49 +00:00
_exit ( 77 ) ;
_exit ( 0 ) ;
}
# else
2016-01-05 23:17:29 +00:00
SKIP_MAIN_UNDEFINED ( " HAVE_PRCTL && PR_SET_NO_NEW_PRIVS && PR_SET_SECCOMP "
" && SECCOMP_MODE_FILTER && SECCOMP_RET_ERRNO "
" && BPF_JUMP && BPF_STMT " )
2015-03-19 00:40:49 +00:00
# endif