xref: /aosp_15_r20/external/strace/tests-m32/prctl-seccomp-strict.test (revision cf84ac9a129d8ea9952db616b4e9b904c4bdde56)
1*cf84ac9aSAndroid Build Coastguard Worker#!/bin/sh
2*cf84ac9aSAndroid Build Coastguard Worker
3*cf84ac9aSAndroid Build Coastguard Worker# Check how prctl PR_SET_SECCOMP SECCOMP_MODE_STRICT is decoded.
4*cf84ac9aSAndroid Build Coastguard Worker
5*cf84ac9aSAndroid Build Coastguard Worker. "${srcdir=.}/init.sh"
6*cf84ac9aSAndroid Build Coastguard Worker
7*cf84ac9aSAndroid Build Coastguard Workercheck_prog grep
8*cf84ac9aSAndroid Build Coastguard Workerset -- "../$NAME"
9*cf84ac9aSAndroid Build Coastguard Worker"$@" > /dev/null || {
10*cf84ac9aSAndroid Build Coastguard Worker	case $? in
11*cf84ac9aSAndroid Build Coastguard Worker		77) skip_ "$* exited with code 77" ;;
12*cf84ac9aSAndroid Build Coastguard Worker		137) framework_skip_ "$* killed by SIGKILL, fix your kernel" ;;
13*cf84ac9aSAndroid Build Coastguard Worker		*) fail_ "$args failed" ;;
14*cf84ac9aSAndroid Build Coastguard Worker	esac
15*cf84ac9aSAndroid Build Coastguard Worker}
16*cf84ac9aSAndroid Build Coastguard Workerrun_strace -eprctl "$@" > "$EXP"
17*cf84ac9aSAndroid Build Coastguard Workergrep -v '^prctl(PR_GET_' < "$LOG" > "$OUT"
18*cf84ac9aSAndroid Build Coastguard Workermatch_diff "$OUT" "$EXP"
19