blob: 7b0c3fda2c86f06031c5b6ac3cc6d4ff29a08fb8 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
#!/bin/sh -efu
#
# Check decoding of return values injected into a syscall that "never fails".
#
# Copyright (c) 2018-2020 The strace developers.
# All rights reserved.
#
# SPDX-License-Identifier: GPL-2.0-or-later
. "${srcdir=.}/scno_tampering.sh"
SYSCALL='/^geteuid(32)?$'
run_prog
prog="$args"
fault_args="-a9 -e trace=${SYSCALL} -e inject=${SYSCALL}:retval="
test_rval()
{
local rval
rval="$1"; shift
run_strace $fault_args$rval $prog $rval > "$EXP"
match_diff "$LOG" "$EXP"
}
test_rval 0
test_rval 1
test_rval 0x7fffffff
test_rval 0x80000000
test_rval 0xfffff000
test_rval 0xfffffffe
test_rval 0xffffffff
case "$SIZEOF_KERNEL_LONG_T" in
8)
test_rval 0x80000000
test_rval 0xfffff000
test_rval 0xfffffffe
test_rval 0xffffffff
test_rval 0x100000000
test_rval 0x7fffffffffffffff
test_rval 0x8000000000000000
test_rval 0xfffffffffffff000
test_rval 0xfffffffffffffffe
test_rval 0xffffffffffffffff
;;
esac
|