filesystem-disk-old-kernel-test.c++ 4.72 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
// Copyright (c) 2016 Sandstorm Development Group, Inc. and contributors
// Licensed under the MIT License:
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.

#if __linux__ && __x86_64__ && defined(__has_include)
#if __has_include(<linux/seccomp.h>) && \
    __has_include(<linux/filter.h>) && \
    __has_include(<linux/audit.h>) && \
    __has_include(<linux/signal.h>) && \
    __has_include(<sys/ptrace.h>)
// This test re-runs filesystem-disk-test.c++ with newfangled Linux kernel features disabled.
//
30
// This test must be compiled as a separate program, since it alters the calling process by
31
// enabling seccomp to disable the kernel features.
32 33 34 35 36
//
// At present this test only runs under Ekam builds. It *could* reasonably easily be added to the
// autotools or cmake builds, but would require compiling a separate test binary, which is a bit
// weird, and may lead to spurious error reports on systems that don't support seccomp for whatever
// reason.
37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124

#include <syscall.h>
#include <unistd.h>
#include <sys/prctl.h>
#include <sys/ptrace.h>
#include <linux/seccomp.h>
#include <linux/filter.h>
#include <kj/debug.h>

#ifdef SECCOMP_SET_MODE_FILTER

namespace {

#if 0
// Source code of the seccomp filter:

  ld [0]                  /* offsetof(struct seccomp_data, nr) */
  jeq #8, lseek           /* __NR_lseek */
  jeq #16, inval          /* __NR_ioctl */
  jeq #40, nosys          /* __NR_sendfile */
  jeq #257, openat        /* __NR_openat */
  jeq #285, notsup        /* __NR_fallocate */
  jeq #316, nosys         /* __NR_renameat2 */
  jmp good

openat:
  ld [32]                 /* offsetof(struct seccomp_data, args[2]), aka flags */
  and #4259840            /* O_TMPFILE */
  jeq #4259840, notsup
  jmp good

lseek:
  ld [32]                 /* offsetof(struct seccomp_data, args[2]), aka whence */
  jeq #3, inval           /* SEEK_DATA */
  jeq #4, inval           /* SEEK_HOLE */
  jmp good

inval:  ret #0x00050016  /* SECCOMP_RET_ERRNO | EINVAL */
nosys:  ret #0x00050026  /* SECCOMP_RET_ERRNO | ENOSYS */
notsup: ret #0x0005005f  /* SECCOMP_RET_ERRNO | EOPNOTSUPP */
good:   ret #0x7fff0000  /* SECCOMP_RET_ALLOW */

#endif

struct SetupSeccompForFilesystemTest {
  SetupSeccompForFilesystemTest() {
    struct sock_filter filter[] {
      { 0x20,  0,  0, 0000000000 },
      { 0x15, 10,  0, 0x00000008 },
      { 0x15, 13,  0, 0x00000010 },
      { 0x15, 13,  0, 0x00000028 },
      { 0x15,  3,  0, 0x00000101 },
      { 0x15, 12,  0, 0x0000011d },
      { 0x15, 10,  0, 0x0000013c },
      { 0x05,  0,  0, 0x0000000b },
      { 0x20,  0,  0, 0x00000020 },
      { 0x54,  0,  0, 0x00410000 },
      { 0x15,  7,  0, 0x00410000 },
      { 0x05,  0,  0, 0x00000007 },
      { 0x20,  0,  0, 0x00000020 },
      { 0x15,  2,  0, 0x00000003 },
      { 0x15,  1,  0, 0x00000004 },
      { 0x05,  0,  0, 0x00000003 },
      { 0x06,  0,  0, 0x00050016 },
      { 0x06,  0,  0, 0x00050026 },
      { 0x06,  0,  0, 0x0005005f },
      { 0x06,  0,  0, 0x7fff0000 },
    };

    struct sock_fprog prog { sizeof(filter) / sizeof(filter[0]), filter };

    KJ_SYSCALL(prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0));
    KJ_SYSCALL(syscall(__NR_seccomp, SECCOMP_SET_MODE_FILTER, 0, &prog));
  }
};

SetupSeccompForFilesystemTest setupSeccompForFilesystemTest;

}  // namespace

#define HOLES_NOT_SUPPORTED

// OK, now run all the regular filesystem tests!
#include "filesystem-disk-test.c++"

#endif
#endif
#endif
125 126 127 128 129 130 131 132 133

#if __linux__ && !__x86_64__
// HACK: We may be cross-compiling. Ekam's cross-compiling is currently hacky -- if a test is a
//   test on the host platform then it needs to be a test on all other targets, too. So add a dummy
//   test here.
// TODO(cleanup): Make Ekam cross-compiling better.
#include <kj/test.h>
KJ_TEST("old kernel test -- not supported on this architecture") {}
#endif