xref: /aosp_15_r20/external/strace/tests-m32/seccomp-strict.test (revision cf84ac9a129d8ea9952db616b4e9b904c4bdde56)
1*cf84ac9aSAndroid Build Coastguard Worker#!/bin/sh
2*cf84ac9aSAndroid Build Coastguard Worker
3*cf84ac9aSAndroid Build Coastguard Worker# Check how seccomp SECCOMP_SET_MODE_STRICT is decoded.
4*cf84ac9aSAndroid Build Coastguard Worker
5*cf84ac9aSAndroid Build Coastguard Worker. "${srcdir=.}/init.sh"
6*cf84ac9aSAndroid Build Coastguard Worker
7*cf84ac9aSAndroid Build Coastguard Workerset -- "../$NAME"
8*cf84ac9aSAndroid Build Coastguard Worker"$@" > /dev/null || {
9*cf84ac9aSAndroid Build Coastguard Worker	case $? in
10*cf84ac9aSAndroid Build Coastguard Worker		77) skip_ "$* exited with code 77" ;;
11*cf84ac9aSAndroid Build Coastguard Worker		137) framework_skip_ "$* killed by SIGKILL, fix your kernel" ;;
12*cf84ac9aSAndroid Build Coastguard Worker		*) fail_ "$args failed" ;;
13*cf84ac9aSAndroid Build Coastguard Worker	esac
14*cf84ac9aSAndroid Build Coastguard Worker}
15*cf84ac9aSAndroid Build Coastguard Workerrun_strace -eseccomp "$@" > "$EXP"
16*cf84ac9aSAndroid Build Coastguard Workermatch_diff "$LOG" "$EXP"
17