--- /dev/null
+/**
+ * Seccomp Library test program
+ *
+ * Copyright (c) 2017 Red Hat <pmoore@redhat.com>
+ * Author: Paul Moore <paul@paul-moore.com>
+ */
+
+/*
+ * This library is free software; you can redistribute it and/or modify it
+ * under the terms of version 2.1 of the GNU Lesser General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This library is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
+ * for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this library; if not, see <http://www.gnu.org/licenses>.
+ */
+
+#include <errno.h>
+#include <limits.h>
+#include <unistd.h>
+
+#include <seccomp.h>
+
+#include "util.h"
+
+int main(int argc, char *argv[])
+{
+ int rc;
+ struct util_options opts;
+ scmp_filter_ctx ctx = NULL;
+
+ rc = util_getopt(argc, argv, &opts);
+ if (rc < 0)
+ goto out;
+
+ ctx = seccomp_init(SCMP_ACT_KILL);
+ if (ctx == NULL)
+ return ENOMEM;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1001, 2,
+ SCMP_A0(SCMP_CMP_EQ, 1),
+ SCMP_A1(SCMP_CMP_EQ, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1001, 0);
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1002, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_TRAP, 1002, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != -EEXIST)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1003, 1,
+ SCMP_A0(SCMP_CMP_NE, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_TRAP, 1003, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1004, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_TRAP, 1004, 1,
+ SCMP_A0(SCMP_CMP_NE, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1005, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1005, 1,
+ SCMP_A0(SCMP_CMP_NE, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1006, 2,
+ SCMP_A0(SCMP_CMP_EQ, 1),
+ SCMP_A1(SCMP_CMP_EQ, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1006, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1007, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1007, 2,
+ SCMP_A0(SCMP_CMP_EQ, 1),
+ SCMP_A1(SCMP_CMP_EQ, 2));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1008, 2,
+ SCMP_A0(SCMP_CMP_NE, 1),
+ SCMP_A1(SCMP_CMP_NE, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1008, 3,
+ SCMP_A0(SCMP_CMP_NE, 1),
+ SCMP_A1(SCMP_CMP_NE, 2),
+ SCMP_A2(SCMP_CMP_NE, 3));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1009, 2,
+ SCMP_A0(SCMP_CMP_EQ, 1),
+ SCMP_A1(SCMP_CMP_NE, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1009, 1,
+ SCMP_A0(SCMP_CMP_NE, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1010, 2,
+ SCMP_A0(SCMP_CMP_NE, 1),
+ SCMP_A1(SCMP_CMP_EQ, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1010, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1011, 1,
+ SCMP_A0(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1011, 2,
+ SCMP_A0(SCMP_CMP_NE, 1),
+ SCMP_A2(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1012, 1,
+ SCMP_A0(SCMP_CMP_MASKED_EQ, 0x0000, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1013, 2,
+ SCMP_A0(SCMP_CMP_NE, 1),
+ SCMP_A1(SCMP_CMP_NE, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1013, 2,
+ SCMP_A0(SCMP_CMP_LT, 1),
+ SCMP_A1(SCMP_CMP_NE, 2));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1014, 2,
+ SCMP_A3(SCMP_CMP_GE, 1),
+ SCMP_A4(SCMP_CMP_GE, 2));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1014, 2,
+ SCMP_A0(SCMP_CMP_NE, 1),
+ SCMP_A1(SCMP_CMP_NE, 2));
+ if (rc != 0)
+ goto out;
+
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1015, 2,
+ SCMP_A0(SCMP_CMP_EQ, 4),
+ SCMP_A1(SCMP_CMP_EQ, 1));
+ if (rc != 0)
+ goto out;
+ rc = seccomp_rule_add_exact(ctx, SCMP_ACT_ALLOW, 1015, 2,
+ SCMP_A0(SCMP_CMP_EQ, 4),
+ SCMP_A1(SCMP_CMP_NE, 1));
+ if (rc != 0)
+ goto out;
+
+ rc = util_filter_output(&opts, ctx);
+ if (rc)
+ goto out;
+
+out:
+ seccomp_release(ctx);
+ return (rc < 0 ? -rc : rc);
+}
--- /dev/null
+#!/usr/bin/env python
+
+#
+# Seccomp Library test program
+#
+# Copyright (c) 2017 Red Hat <pmoore@redhat.com>
+# Author: Paul Moore <paul@paul-moore.com>
+#
+
+#
+# This library is free software; you can redistribute it and/or modify it
+# under the terms of version 2.1 of the GNU Lesser General Public License as
+# published by the Free Software Foundation.
+#
+# This library is distributed in the hope that it will be useful, but WITHOUT
+# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+# FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
+# for more details.
+#
+# You should have received a copy of the GNU Lesser General Public License
+# along with this library; if not, see <http://www.gnu.org/licenses>.
+#
+
+import argparse
+import sys
+
+import util
+
+from seccomp import *
+
+def test(args):
+ f = SyscallFilter(KILL)
+
+ f.add_rule_exactly(ALLOW, 1001,
+ Arg(0, EQ, 1),
+ Arg(1, EQ, 2))
+ f.add_rule_exactly(ALLOW, 1001)
+
+ f.add_rule_exactly(ALLOW, 1002,
+ Arg(0, EQ, 1))
+ f.add_rule_exactly(ALLOW, 1002,
+ Arg(0, EQ, 1))
+
+ f.add_rule_exactly(ALLOW, 1003,
+ Arg(0, NE, 1))
+ f.add_rule_exactly(TRAP, 1003,
+ Arg(0, EQ, 1))
+
+ f.add_rule_exactly(ALLOW, 1004,
+ Arg(0, EQ, 1))
+ f.add_rule_exactly(TRAP, 1004,
+ Arg(0, NE, 1))
+
+ f.add_rule_exactly(ALLOW, 1005,
+ Arg(0, EQ, 1))
+ f.add_rule_exactly(ALLOW, 1005,
+ Arg(0, NE, 1))
+
+ f.add_rule_exactly(ALLOW, 1006,
+ Arg(0, EQ, 1),
+ Arg(1, EQ, 2))
+ f.add_rule_exactly(ALLOW, 1006,
+ Arg(0, EQ, 1))
+
+ f.add_rule_exactly(ALLOW, 1007,
+ Arg(0, EQ, 1))
+ f.add_rule_exactly(ALLOW, 1007,
+ Arg(0, EQ, 1),
+ Arg(1, EQ, 2))
+
+ f.add_rule_exactly(ALLOW, 1008,
+ Arg(0, NE, 1),
+ Arg(1, NE, 2))
+ f.add_rule_exactly(ALLOW, 1008,
+ Arg(0, NE, 1),
+ Arg(1, NE, 2),
+ Arg(2, NE, 3))
+
+ f.add_rule_exactly(ALLOW, 1009,
+ Arg(0, EQ, 1),
+ Arg(1, NE, 2))
+ f.add_rule_exactly(ALLOW, 1009,
+ Arg(0, NE, 1))
+
+ f.add_rule_exactly(ALLOW, 1010,
+ Arg(0, NE, 1),
+ Arg(1, EQ, 2))
+ f.add_rule_exactly(ALLOW, 1010,
+ Arg(0, EQ, 1))
+
+ f.add_rule_exactly(ALLOW, 1011,
+ Arg(0, EQ, 1))
+ f.add_rule_exactly(ALLOW, 1011,
+ Arg(0, NE, 1),
+ Arg(2, EQ, 1))
+
+ f.add_rule_exactly(ALLOW, 1012,
+ Arg(0, MASKED_EQ, 0x0000, 1))
+
+ f.add_rule_exactly(ALLOW, 1013,
+ Arg(0, NE, 1),
+ Arg(2, NE, 2))
+ f.add_rule_exactly(ALLOW, 1013,
+ Arg(0, LT, 1),
+ Arg(2, NE, 2))
+
+ f.add_rule_exactly(ALLOW, 1014,
+ Arg(3, GE, 1),
+ Arg(4, GE, 2))
+ f.add_rule_exactly(ALLOW, 1014,
+ Arg(0, NE, 1),
+ Arg(1, NE, 2))
+
+ f.add_rule_exactly(ALLOW, 1015,
+ Arg(0, EQ, 4),
+ Arg(1, EQ, 1))
+ f.add_rule_exactly(ALLOW, 1015,
+ Arg(0, EQ, 4),
+ Arg(1, NE, 1))
+
+ return f
+
+args = util.get_opt()
+ctx = test(args)
+util.filter_output(args, ctx)
+
+# kate: syntax python;
+# kate: indent-mode python; space-indent on; indent-width 4; mixedindent off;
--- /dev/null
+#
+# libseccomp regression test automation data
+#
+# Copyright (c) 2017 Red Hat <pmoore@redhat.com>
+# Author: Paul Moore <paul@paul-moore.com>
+#
+
+test type: bpf-sim
+
+# Testname Arch Syscall Arg0 Arg1 Arg2 Arg3 Arg4 Arg5 Result
+42-sim-adv_chains all 1000 N N N N N N KILL
+42-sim-adv_chains all 1001 N N N N N N ALLOW
+42-sim-adv_chains all 1002 1 N N N N N ALLOW
+42-sim-adv_chains all 1003 N N N N N N ALLOW
+42-sim-adv_chains all 1003 1 N N N N N TRAP
+42-sim-adv_chains all 1003 2 N N N N N ALLOW
+42-sim-adv_chains all 1004 N N N N N N TRAP
+42-sim-adv_chains all 1004 1 N N N N N ALLOW
+42-sim-adv_chains all 1004 2 N N N N N TRAP
+42-sim-adv_chains all 1005 N N N N N N ALLOW
+42-sim-adv_chains all 1005 1 N N N N N ALLOW
+42-sim-adv_chains all 1005 2 N N N N N ALLOW
+42-sim-adv_chains all 1006 1 N N N N N ALLOW
+42-sim-adv_chains all 1007 1 N N N N N ALLOW
+42-sim-adv_chains all 1008 2 3 N N N N ALLOW
+42-sim-adv_chains all 1008 2 3 3 N N N ALLOW
+42-sim-adv_chains all 1008 2 3 4 N N N ALLOW
+42-sim-adv_chains all 1009 N N N N N N ALLOW
+42-sim-adv_chains all 1009 2 N N N N N ALLOW
+42-sim-adv_chains all 1009 1 3 N N N N ALLOW
+42-sim-adv_chains all 1010 N N N N N N KILL
+42-sim-adv_chains all 1010 1 N N N N N ALLOW
+42-sim-adv_chains all 1010 2 2 N N N N ALLOW
+42-sim-adv_chains all 1011 1 N N N N N ALLOW
+42-sim-adv_chains all 1011 2 4 1 N N N ALLOW
+42-sim-adv_chains all 1012 8 N N N N N ALLOW
+42-sim-adv_chains all 1013 2 3 N N N N ALLOW
+42-sim-adv_chains all 1013 0 4 N N N N ALLOW
+42-sim-adv_chains all 1014 0 0 2 3 N N ALLOW
+42-sim-adv_chains all 1014 2 3 1 2 N N ALLOW
+42-sim-adv_chains all 1015 1 N N N N N KILL
+42-sim-adv_chains all 1015 4 N N N N N ALLOW
+42-sim-adv_chains all 1015 4 1 N N N N ALLOW
+42-sim-adv_chains all 1015 4 2 N N N N ALLOW
+
+test type: bpf-sim-fuzz
+
+# Testname StressCount
+42-sim-adv_chains 50
+
+test type: bpf-valgrind
+
+# Testname
+42-sim-adv_chains