test/sandbox: separate check filter
All checks were successful
Test / Fpkg (push) Successful in 34s
Test / Create distribution (push) Successful in 36s
Test / Fortify (push) Successful in 2m28s
Test / Data race detector (push) Successful in 3m20s
Test / Flake checks (push) Successful in 59s

Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
Ophestra 2025-03-29 22:34:51 +09:00
parent 8b62e08b44
commit d54311b282
Signed by: cat
SSH Key Fingerprint: SHA256:gQ67O0enBZ7UdZypgtspB2FDM1g3GVw8nX0XSdcFw8Q

View File

@ -129,18 +129,40 @@ func (t *T) MustCheck(want *TestCase) {
}
func MustCheckFilter(pid int, want string) {
if err := ptraceAttach(pid); err != nil {
err := CheckFilter(pid, want)
if err == nil {
return
}
var perr *ptraceError
if !errors.As(err, &perr) {
fatalf("%s", err)
}
switch perr.op {
case "PTRACE_ATTACH":
fatalf("cannot attach to process %d: %v", pid, err)
case "PTRACE_SECCOMP_GET_FILTER":
if perr.errno == syscall.ENOENT {
fatalf("seccomp filter not installed for process %d", pid)
}
fatalf("cannot get filter: %v", err)
default:
fatalf("cannot check filter: %v", err)
}
*(*int)(nil) = 0 // not reached
}
func CheckFilter(pid int, want string) error {
if err := ptraceAttach(pid); err != nil {
return err
}
buf, err := getFilter[[8]byte](pid, 0)
if err0 := ptraceDetach(pid); err0 != nil {
printf("cannot detach from process %d: %v", pid, err0)
}
if err != nil {
if errors.Is(err, syscall.ENOENT) {
fatalf("seccomp filter not installed for process %d", pid)
}
fatalf("cannot get filter: %v", err)
return err
}
h := sha512.New()
@ -149,9 +171,11 @@ func MustCheckFilter(pid int, want string) {
}
if got := hex.EncodeToString(h.Sum(nil)); got != want {
fatalf("[FAIL] %s", got)
printf("[FAIL] %s", got)
return syscall.ENOTRECOVERABLE
} else {
printf("[ OK ] %s", got)
return nil
}
}