seccomp: decode SECCOMP_GET_ACTION_AVAIL operation

* defs.h (seccomp_ret_action): New xlat prototype.
* seccomp.c (decode_seccomp_set_mode_strict): Remove.
(SYS_FUNC(seccomp)): Decode SECCOMP_GET_ACTION_AVAIL operation.
* NEWS: Mention this.
* tests/seccomp_get_action_avail.c: New file.
* tests/gen_tests.in (seccomp_get_action_avail): New entry.
* tests/pure_executables.list: Add seccomp_get_action_avail.
* tests/.gitignore: Likewise.
This commit is contained in:
Дмитрий Левин 2017-11-02 00:21:57 +00:00
parent 745c53410f
commit 5d460ae383
7 changed files with 152 additions and 13 deletions

2
NEWS
View File

@ -3,6 +3,8 @@ Noteworthy changes in release ?.?? (????-??-??)
* Improvements
* Implemented decoding of NETLINK_NETFILTER netlink message types and flags.
* Implemented decoding of SECCOMP_GET_ACTION_AVAIL operation of seccomp
syscall.
* Updated lists of ARPHRD_*, BPF_*, ETH_P_*, LOOP_*, MADV_*,
MEMBARRIER_CMD_*, MFD_*, SECCOMP_*, SO_*, SOL_*, TCP_*, and UFFD_FEATURE_*
constants.

1
defs.h
View File

@ -295,6 +295,7 @@ extern const struct xlat resource_flags[];
extern const struct xlat routing_scopes[];
extern const struct xlat routing_table_ids[];
extern const struct xlat routing_types[];
extern const struct xlat seccomp_ret_action[];
extern const struct xlat setns_types[];
extern const struct xlat sg_io_info[];
extern const struct xlat socketlayers[];

View File

@ -33,29 +33,37 @@
#include "xlat/seccomp_ops.h"
#include "xlat/seccomp_filter_flags.h"
static void
decode_seccomp_set_mode_strict(const unsigned int flags,
const kernel_ulong_t addr)
{
tprintf("%u, ", flags);
printaddr(addr);
}
SYS_FUNC(seccomp)
{
unsigned int op = tcp->u_arg[0];
unsigned int flags = tcp->u_arg[1];
unsigned int act;
printxval(seccomp_ops, op, "SECCOMP_SET_MODE_???");
tprints(", ");
if (op == SECCOMP_SET_MODE_FILTER) {
printflags(seccomp_filter_flags, tcp->u_arg[1],
switch (op) {
case SECCOMP_GET_ACTION_AVAIL:
tprintf("%u, ", flags);
if (!umove_or_printaddr(tcp, tcp->u_arg[2], &act)) {
tprints("[");
printxval(seccomp_ret_action, act, "SECCOMP_RET_???");
tprints("]");
}
break;
case SECCOMP_SET_MODE_FILTER:
printflags(seccomp_filter_flags, flags,
"SECCOMP_FILTER_FLAG_???");
tprints(", ");
decode_seccomp_fprog(tcp, tcp->u_arg[2]);
} else {
decode_seccomp_set_mode_strict(tcp->u_arg[1],
tcp->u_arg[2]);
break;
case SECCOMP_SET_MODE_STRICT:
default:
tprintf("%u, ", flags);
printaddr(tcp->u_arg[2]);
break;
}
return RVAL_DECODED;

1
tests/.gitignore vendored
View File

@ -359,6 +359,7 @@ scno.h
seccomp-filter
seccomp-filter-v
seccomp-strict
seccomp_get_action_avail
select
semop
sendfile

View File

@ -309,6 +309,7 @@ sched_xetscheduler -a22 -e trace=sched_getscheduler,sched_setscheduler
sched_yield -a14
seccomp-filter -e trace=seccomp
seccomp-filter-v -v -e trace=seccomp
seccomp_get_action_avail -e trace=seccomp
select -a36
semop -a32 -e trace=semop,semtimedop
sendfile -a27

View File

@ -298,6 +298,7 @@ sched_xetparam
sched_xetscheduler
sched_yield
seccomp-filter
seccomp_get_action_avail
select
semop
sendfile

View File

@ -0,0 +1,125 @@
/*
* Check decoding of seccomp SECCOMP_GET_ACTION_AVAIL.
*
* Copyright (c) 2017 Dmitry V. Levin <ldv@altlinux.org>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "tests.h"
#include <asm/unistd.h>
#ifdef __NR_seccomp
# include <stdio.h>
# include <stdint.h>
# include <unistd.h>
# ifdef HAVE_LINUX_SECCOMP_H
# include <linux/seccomp.h>
# endif
# ifndef SECCOMP_GET_ACTION_AVAIL
# define SECCOMP_GET_ACTION_AVAIL 2
# endif
static const char *errstr;
static long
k_seccomp(const kernel_ulong_t op, const kernel_ulong_t flags,
const kernel_ulong_t args)
{
const long rc = syscall(__NR_seccomp, op, flags, args);
errstr = sprintrc(rc);
return rc;
}
int
main(void)
{
TAIL_ALLOC_OBJECT_CONST_PTR(uint32_t, act);
kernel_ulong_t op = (kernel_ulong_t) 0xfacefeed00000000ULL
| SECCOMP_GET_ACTION_AVAIL;
kernel_ulong_t flags = (kernel_ulong_t) 0xdeadbeef00000000ULL;
unsigned int i;
struct {
uint32_t val;
const char *str;
} actions [] = {
{ 0, "SECCOMP_RET_KILL_THREAD" },
# ifdef SECCOMP_RET_KILL_PROCESS
{ ARG_STR(SECCOMP_RET_KILL_PROCESS) },
# endif
# ifdef SECCOMP_RET_TRAP
{ ARG_STR(SECCOMP_RET_TRAP) },
# endif
# ifdef SECCOMP_RET_ERRNO
{ ARG_STR(SECCOMP_RET_ERRNO) },
# endif
# ifdef SECCOMP_RET_TRACE
{ ARG_STR(SECCOMP_RET_TRACE) },
# endif
# ifdef SECCOMP_RET_LOG
{ ARG_STR(SECCOMP_RET_LOG) },
# endif
# ifdef SECCOMP_RET_ALLOW
{ ARG_STR(SECCOMP_RET_ALLOW) },
# endif
{ 0xffffffff, "0xffffffff /* SECCOMP_RET_??? */" }
};
for (i = 0; i < ARRAY_SIZE(actions); ++i) {
*act = actions[i].val;
k_seccomp(op, flags, (uintptr_t) act);
printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, [%s]) = %s\n",
actions[i].str, errstr);
}
*act = actions[0].val;
k_seccomp(op, flags, (uintptr_t) (act + 1));
printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, %p) = %s\n",
act + 1, errstr);
if (F8ILL_KULONG_SUPPORTED) {
k_seccomp(op, flags, f8ill_ptr_to_kulong(act));
printf("seccomp(SECCOMP_GET_ACTION_AVAIL, 0, %#jx) = %s\n",
(uintmax_t) f8ill_ptr_to_kulong(act), errstr);
}
flags |= 0xcafef00d;
k_seccomp(op, flags, 0);
printf("seccomp(SECCOMP_GET_ACTION_AVAIL, %u, NULL) = %s\n",
(unsigned int) flags, errstr);
puts("+++ exited with 0 +++");
return 0;
}
#else
SKIP_MAIN_UNDEFINED("__NR_seccomp")
#endif