sandboxed-api/sandboxed_api/sandbox2/testcases/add_policy_on_syscalls.cc
Christian Blichmann 441201884a Update license header with recommended best practices
PiperOrigin-RevId: 290250533
Change-Id: Ic34b253446463cf971a055b70a242df93a598ee3
2020-01-17 05:05:29 -08:00

40 lines
1.2 KiB
C++

// Copyright 2019 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// A binary that tests a lot of syscalls, to test the AddPolicyOnSyscall
// functionality.
#include <sys/stat.h>
#include <unistd.h>
#include <cerrno>
int main() {
unsigned int r, e, s;
char buf[1];
// 1000 is the UID/GID we use inside the namespaces.
if (getuid() != 1000) return 1;
if (getgid() != 1000) return 2;
if (geteuid() != 1000) return 3;
if (getegid() != 1000) return 4;
if (getresuid(&r, &e, &s) != -1 || errno != 42) return 5;
if (getresgid(&r, &e, &s) != -1 || errno != 42) return 6;
if (read(0, buf, 1) != -1 || errno != 43) return 7;
if (write(1, buf, 1) != -1 || errno != 43) return 8;
// Trigger a violation.
umask(0);
return 0;
}