1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
|
/*
* Check decoding of unshare syscall.
*
* Copyright (c) 2016 Eugene Syromyatnikov <evgsyr@gmail.com>
* Copyright (c) 2016-2021 The strace developers.
* All rights reserved.
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "tests.h"
#include "scno.h"
#include <stdio.h>
#include <unistd.h>
int
main(void)
{
static const kernel_ulong_t bogus_flags =
(kernel_ulong_t) 0xbadc0ded0000000fULL;
static struct {
kernel_ulong_t val;
const char *str;
} unshare_flags[] = {
{ ARG_STR(0) },
{ 0xdeadcaf5,
"CLONE_NEWTIME|CLONE_FS|CLONE_SIGHAND|CLONE_THREAD"
"|CLONE_SYSVSEM|CLONE_NEWCGROUP|CLONE_NEWUTS"
"|CLONE_NEWIPC|CLONE_NEWUSER|CLONE_NEWNET|0x80a8c075" },
{ 0x2000000, "CLONE_NEWCGROUP" },
{ ARG_STR(0x81f8f07f) " /* CLONE_??? */" },
};
long rc = syscall(__NR_unshare, bogus_flags);
printf("unshare(%#llx /* CLONE_??? */) = %s\n",
(unsigned long long) bogus_flags, sprintrc(rc));
for (unsigned int i = 0; i < ARRAY_SIZE(unshare_flags); ++i) {
rc = syscall(__NR_unshare, unshare_flags[i].val);
printf("unshare(%s) = %s\n",
unshare_flags[i].str, sprintrc(rc));
}
puts("+++ exited with 0 +++");
return 0;
}
|