1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
|
/*
* Check decoding of prctl PR_GET_SECUREBITS/PR_SET_SECUREBITS operations.
*
* Copyright (c) 2016 Eugene Syromyatnikov <evgsyr@gmail.com>
* Copyright (c) 2016 Dmitry V. Levin <ldv@strace.io>
* Copyright (c) 2016-2021 The strace developers.
* All rights reserved.
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "tests.h"
#include "scno.h"
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <linux/prctl.h>
#include <linux/securebits.h>
#include "xlat.h"
#include "xlat/secbits.h"
#ifdef INJECT_RETVAL
# define INJ_STR " (INJECTED)"
#else
# define INJ_STR ""
#endif
static const char *errstr;
static long
prctl(kernel_ulong_t arg1, kernel_ulong_t arg2)
{
static const kernel_ulong_t bogus_arg =
(kernel_ulong_t) 0xdeadbeefbadc0dedULL;
long rc = syscall(__NR_prctl, arg1, arg2, bogus_arg);
errstr = sprintrc(rc);
return rc;
}
int
main(int argc, char *argv[])
{
prctl_marker();
#ifdef INJECT_RETVAL
unsigned long num_skip;
bool locked = false;
if (argc < 2)
error_msg_and_fail("Usage: %s NUM_SKIP", argv[0]);
num_skip = strtoul(argv[1], NULL, 0);
for (size_t i = 0; i < num_skip; i++) {
if (prctl_marker() < 0)
continue;
locked = true;
break;
}
if (!locked)
error_msg_and_fail("Have not locked on prctl(-1, -2, -3, -4"
", -5) returning non-error value");
#endif /* INJECT_RETVAL */
static const kernel_ulong_t bits1 =
(kernel_ulong_t) 0xdeadc0defacebeefULL;
static const kernel_ulong_t bits2 =
(kernel_ulong_t) 0xbadc0ded00000000ULL;
static const kernel_ulong_t bits3 =
(kernel_ulong_t) 0xffULL;
prctl(PR_SET_SECUREBITS, 0);
printf("prctl(" XLAT_KNOWN(0x1c, "PR_SET_SECUREBITS") ", 0) = %s"
INJ_STR "\n", errstr);
prctl(PR_SET_SECUREBITS, bits1);
printf("prctl(" XLAT_KNOWN(0x1c, "PR_SET_SECUREBITS") ", "
NABBR("%#llx") VERB(" /* ") NRAW("SECBIT_NOROOT|"
"SECBIT_NOROOT_LOCKED|SECBIT_NO_SETUID_FIXUP|"
"SECBIT_NO_SETUID_FIXUP_LOCKED|SECBIT_KEEP_CAPS_LOCKED|"
"SECBIT_NO_CAP_AMBIENT_RAISE|SECBIT_NO_CAP_AMBIENT_RAISE_LOCKED|"
"%#llx") VERB(" */") ") = %s" INJ_STR "\n",
XLAT_SEL((unsigned long long) bits1,
(unsigned long long) bits1 & ~0xffULL), errstr);
if (bits2) {
prctl(PR_SET_SECUREBITS, bits2);
printf("prctl(" XLAT_KNOWN(0x1c, "PR_SET_SECUREBITS") ", %#llx"
NRAW(" /* SECBIT_??? */") ") = %s" INJ_STR "\n",
(unsigned long long) bits2, errstr);
}
prctl(PR_SET_SECUREBITS, bits3);
printf("prctl(" XLAT_KNOWN(0x1c, "PR_SET_SECUREBITS") ", "
XLAT_KNOWN(0xff, "SECBIT_NOROOT|SECBIT_NOROOT_LOCKED|"
"SECBIT_NO_SETUID_FIXUP|SECBIT_NO_SETUID_FIXUP_LOCKED|"
"SECBIT_KEEP_CAPS|SECBIT_KEEP_CAPS_LOCKED|"
"SECBIT_NO_CAP_AMBIENT_RAISE|SECBIT_NO_CAP_AMBIENT_RAISE_LOCKED")
") = %s" INJ_STR "\n", errstr);
long rc = prctl(PR_GET_SECUREBITS, bits1);
printf("prctl(" XLAT_KNOWN(0x1b, "PR_GET_SECUREBITS") ") = ");
if (rc > 0) {
printf("%#lx", rc);
if ((rc & 0xff) && !XLAT_RAW) {
printf(" (");
printflags(secbits, rc, NULL);
printf(")");
}
puts(INJ_STR);
} else {
printf("%s" INJ_STR "\n", errstr);
}
puts("+++ exited with 0 +++");
return 0;
}
|