1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
|
// RUN: %clangxx %s -o %t && %run %t %p
// UNSUPPORTED: android
#include <assert.h>
#include <errno.h>
#include <linux/filter.h>
#include <linux/seccomp.h>
#include <stdint.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/prctl.h>
#ifndef PR_SCHED_CORE
# define PR_SCHED_CORE 62
#endif
#ifndef PR_SCHED_CORE_CREATE
# define PR_SCHED_CORE_CREATE 1
#endif
#ifndef PR_SCHED_CORE_GET
# define PR_SCHED_CORE_GET 0
#endif
#ifndef PR_SET_VMA
# define PR_SET_VMA 0x53564d41
# define PR_SET_VMA_ANON_NAME 0
#endif
int main() {
int res;
res = prctl(PR_SCHED_CORE, PR_SCHED_CORE_CREATE, 0, 0, 0);
if (res < 0) {
assert(errno == EINVAL || errno == ENODEV);
} else {
uint64_t cookie = 0;
res = prctl(PR_SCHED_CORE, PR_SCHED_CORE_GET, 0, 0, &cookie);
if (res < 0) {
assert(errno == EINVAL);
} else {
assert(cookie != 0);
}
}
int signum;
res = prctl(PR_GET_PDEATHSIG, reinterpret_cast<unsigned long>(&signum));
if (res < 0) {
assert(errno == EINVAL);
} else {
assert(signum == 0);
}
char invname[81], vlname[] = "prctl";
for (auto i = 0; i < sizeof(invname); i++) {
invname[i] = 0x1e;
}
invname[80] = 0;
auto p =
mmap(nullptr, 128, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE, -1, 0);
assert(p != MAP_FAILED);
// regardless of kernel support, the name is invalid
res = prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, (uintptr_t)p, 128,
(uintptr_t)invname);
assert(res == -1);
assert(errno == EINVAL);
res = prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, (uintptr_t)p, 128,
(uintptr_t)vlname);
if (res < 0) {
assert(errno == EINVAL);
}
munmap(p, 128);
res = prctl(PR_SET_NAME, "tname");
if (res == 0) {
char name[16];
res = prctl(PR_GET_NAME, name);
if (res == 0) {
assert(!strcmp(name, "tname"));
}
}
sock_filter f[] = {{.code = (BPF_LD | BPF_W | BPF_ABS),
.k = (uint32_t)(SKF_AD_OFF | SKF_AD_CPU)},
{.code = (BPF_RET | BPF_A), .k = 0}};
sock_fprog pr = {.len = 2, .filter = f};
res = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &pr);
assert(res == -1);
return 0;
}
|