// Copyright (c) 2016 Sandstorm Development Group, Inc. and contributors // Licensed under the MIT License: // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to deal // in the Software without restriction, including without limitation the rights // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell // copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN // THE SOFTWARE. #if __linux__ && __x86_64__ && defined(__has_include) #if __has_include(<linux/seccomp.h>) && \ __has_include(<linux/filter.h>) && \ __has_include(<linux/audit.h>) && \ __has_include(<linux/signal.h>) && \ __has_include(<sys/ptrace.h>) // This test re-runs filesystem-disk-test.c++ with newfangled Linux kernel features disabled. // // This test must be compiled as a separate program, since it alters the calling process by // enabling seccomp to disable the kernel features. // // At present this test only runs under Ekam builds. It *could* reasonably easily be added to the // autotools or cmake builds, but would require compiling a separate test binary, which is a bit // weird, and may lead to spurious error reports on systems that don't support seccomp for whatever // reason. #include <syscall.h> #include <unistd.h> #include <sys/prctl.h> #include <sys/ptrace.h> #include <linux/seccomp.h> #include <linux/filter.h> #include <kj/debug.h> #ifdef SECCOMP_SET_MODE_FILTER namespace { #if 0 // Source code of the seccomp filter: ld [0] /* offsetof(struct seccomp_data, nr) */ jeq #8, lseek /* __NR_lseek */ jeq #16, inval /* __NR_ioctl */ jeq #40, nosys /* __NR_sendfile */ jeq #257, openat /* __NR_openat */ jeq #285, notsup /* __NR_fallocate */ jeq #316, nosys /* __NR_renameat2 */ jmp good openat: ld [32] /* offsetof(struct seccomp_data, args[2]), aka flags */ and #4259840 /* O_TMPFILE */ jeq #4259840, notsup jmp good lseek: ld [32] /* offsetof(struct seccomp_data, args[2]), aka whence */ jeq #3, inval /* SEEK_DATA */ jeq #4, inval /* SEEK_HOLE */ jmp good inval: ret #0x00050016 /* SECCOMP_RET_ERRNO | EINVAL */ nosys: ret #0x00050026 /* SECCOMP_RET_ERRNO | ENOSYS */ notsup: ret #0x0005005f /* SECCOMP_RET_ERRNO | EOPNOTSUPP */ good: ret #0x7fff0000 /* SECCOMP_RET_ALLOW */ #endif struct SetupSeccompForFilesystemTest { SetupSeccompForFilesystemTest() { struct sock_filter filter[] { { 0x20, 0, 0, 0000000000 }, { 0x15, 10, 0, 0x00000008 }, { 0x15, 13, 0, 0x00000010 }, { 0x15, 13, 0, 0x00000028 }, { 0x15, 3, 0, 0x00000101 }, { 0x15, 12, 0, 0x0000011d }, { 0x15, 10, 0, 0x0000013c }, { 0x05, 0, 0, 0x0000000b }, { 0x20, 0, 0, 0x00000020 }, { 0x54, 0, 0, 0x00410000 }, { 0x15, 7, 0, 0x00410000 }, { 0x05, 0, 0, 0x00000007 }, { 0x20, 0, 0, 0x00000020 }, { 0x15, 2, 0, 0x00000003 }, { 0x15, 1, 0, 0x00000004 }, { 0x05, 0, 0, 0x00000003 }, { 0x06, 0, 0, 0x00050016 }, { 0x06, 0, 0, 0x00050026 }, { 0x06, 0, 0, 0x0005005f }, { 0x06, 0, 0, 0x7fff0000 }, }; struct sock_fprog prog { sizeof(filter) / sizeof(filter[0]), filter }; KJ_SYSCALL(prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)); KJ_SYSCALL(syscall(__NR_seccomp, SECCOMP_SET_MODE_FILTER, 0, &prog)); } }; SetupSeccompForFilesystemTest setupSeccompForFilesystemTest; } // namespace #define HOLES_NOT_SUPPORTED // OK, now run all the regular filesystem tests! #include "filesystem-disk-test.c++" #endif #endif #endif #if __linux__ && !__x86_64__ // HACK: We may be cross-compiling. Ekam's cross-compiling is currently hacky -- if a test is a // test on the host platform then it needs to be a test on all other targets, too. So add a dummy // test here. // TODO(cleanup): Make Ekam cross-compiling better. #include <kj/test.h> KJ_TEST("old kernel test -- not supported on this architecture") {} #endif