test/sandbox: separate check filter
All checks were successful
Test / Create distribution (push) Successful in 26s
Test / Fpkg (push) Successful in 34s
Test / Fortify (push) Successful in 2m29s
Test / Data race detector (push) Successful in 3m12s
Test / Flake checks (push) Successful in 54s

Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
Ophestra 2025-03-29 22:34:51 +09:00
parent 8b62e08b44
commit 8886c40974
Signed by: cat
SSH Key Fingerprint: SHA256:gQ67O0enBZ7UdZypgtspB2FDM1g3GVw8nX0XSdcFw8Q

View File

@ -129,18 +129,43 @@ func (t *T) MustCheck(want *TestCase) {
}
func MustCheckFilter(pid int, want string) {
if err := ptraceAttach(pid); err != nil {
err := CheckFilter(pid, want)
if err == nil {
return
}
var perr *ptraceError
if !errors.As(err, &perr) {
fatalf("%s", err)
}
switch perr.op {
case "PTRACE_ATTACH":
fatalf("cannot attach to process %d: %v", pid, err)
}
buf, err := getFilter[[8]byte](pid, 0)
if err0 := ptraceDetach(pid); err0 != nil {
printf("cannot detach from process %d: %v", pid, err0)
}
if err != nil {
if errors.Is(err, syscall.ENOENT) {
case "PTRACE_SECCOMP_GET_FILTER":
if perr.errno == syscall.ENOENT {
fatalf("seccomp filter not installed for process %d", pid)
}
fatalf("cannot get filter: %v", err)
default:
fatalf("cannot check filter: %v", err)
}
*(*int)(nil) = 0 // not reached
}
func CheckFilter(pid int, want string) error {
if err := ptraceAttach(pid); err != nil {
return err
}
defer func() {
if err := ptraceDetach(pid); err != nil {
printf("cannot detach from process %d: %v", pid, err)
}
}()
buf, err := getFilter[[8]byte](pid, 0)
if err != nil {
return err
}
h := sha512.New()
@ -149,9 +174,11 @@ func MustCheckFilter(pid int, want string) {
}
if got := hex.EncodeToString(h.Sum(nil)); got != want {
fatalf("[FAIL] %s", got)
printf("[FAIL] %s", got)
return syscall.ENOTRECOVERABLE
} else {
printf("[ OK ] %s", got)
return nil
}
}