1
0
mirror of https://github.com/containers/youki synced 2024-11-22 17:02:00 +01:00

Add unittest to expertiment seccomp programs (#2956)

* add test code

Signed-off-by: sat0ken <15720506+sat0ken@users.noreply.github.com>

* separate unittest code by arch

Signed-off-by: sat0ken <15720506+sat0ken@users.noreply.github.com>

* rm blank line

Signed-off-by: sat0ken <15720506+sat0ken@users.noreply.github.com>

---------

Signed-off-by: sat0ken <15720506+sat0ken@users.noreply.github.com>
This commit is contained in:
sat0ken 2024-10-22 21:29:21 +09:00 committed by GitHub
parent cd8e76e483
commit 0c1d5e351f
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 68 additions and 1 deletions

@ -18,3 +18,24 @@ pub fn gen_validate(arc: &Arch) -> Vec<Instruction> {
Instruction::stmt(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS),
]
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_gen_validate_x86() {
let bpf_prog = gen_validate(&Arch::X86);
assert_eq!(bpf_prog[0], Instruction::stmt(BPF_LD | BPF_W | BPF_ABS, seccomp_data_arch_offset() as u32));
assert_eq!(bpf_prog[1], Instruction::jump(BPF_JMP | BPF_JEQ | BPF_K, 1, 0, AUDIT_ARCH_X86_64));
assert_eq!(bpf_prog[2], Instruction::stmt(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS));
}
#[test]
fn test_gen_validate_aarch64() {
let bpf_prog = gen_validate(&Arch::AArch64);
assert_eq!(bpf_prog[0], Instruction::stmt(BPF_LD | BPF_W | BPF_ABS, seccomp_data_arch_offset() as u32));
assert_eq!(bpf_prog[1], Instruction::jump(BPF_JMP | BPF_JEQ | BPF_K, 1, 0, AUDIT_ARCH_AARCH64));
assert_eq!(bpf_prog[2], Instruction::stmt(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS));
}
}

@ -95,7 +95,7 @@ mod tests {
#[test]
fn test_seccomp_data_arg_size_offset() {
if cfg!(target_arch = "x86_64") {
assert_eq!(seccomp_data_arg_size_offset(), 8);
assert_eq!(seccomp_data_arg_size(), 8);
}
}

@ -274,3 +274,49 @@ impl Rule {
bpf_prog
}
}
#[cfg(test)]
mod tests {
use syscalls::syscall_args;
use super::*;
#[test]
fn test_get_syscall_number_x86() {
let sys_num = get_syscall_number(&Arch::X86, "read");
assert_eq!(sys_num.unwrap(), 0);
}
#[test]
fn test_get_syscall_number_aarch64() {
let sys_num = get_syscall_number(&Arch::AArch64, "read");
assert_eq!(sys_num.unwrap(), 63);
}
#[test]
fn test_to_instruction_x86() {
let rule = Rule::new("getcwd".parse().unwrap(), 0, syscall_args!(), false);
let inst = Rule::to_instruction(&Arch::X86, SECCOMP_RET_KILL_PROCESS, &rule);
let bpf_prog = gen_validate(&Arch::X86);
assert_eq!(inst[0], bpf_prog[0]);
assert_eq!(inst[1], bpf_prog[1]);
assert_eq!(inst[2], bpf_prog[2]);
assert_eq!(inst[3], Instruction::stmt(BPF_LD | BPF_W | BPF_ABS, 0));
assert_eq!(inst[4], Instruction::jump(BPF_JMP | BPF_JEQ | BPF_K, 0, 1,
get_syscall_number(&Arch::X86, "getcwd").unwrap() as c_uint));
assert_eq!(inst[5], Instruction::stmt(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS));
}
#[test]
fn test_to_instruction_aarch64() {
let rule = Rule::new("getcwd".parse().unwrap(), 0, syscall_args!(), false);
let inst = Rule::to_instruction(&Arch::AArch64, SECCOMP_RET_KILL_PROCESS, &rule);
let bpf_prog = gen_validate(&Arch::AArch64);
assert_eq!(inst[0], bpf_prog[0]);
assert_eq!(inst[1], bpf_prog[1]);
assert_eq!(inst[2], bpf_prog[2]);
assert_eq!(inst[3], Instruction::stmt(BPF_LD | BPF_W | BPF_ABS, 0));
assert_eq!(inst[4], Instruction::jump(BPF_JMP | BPF_JEQ | BPF_K, 0, 1,
get_syscall_number(&Arch::AArch64, "getcwd").unwrap() as c_uint));
assert_eq!(inst[5], Instruction::stmt(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS));
}
}