Bundle libseccomp 2.3.1
[linux-seccomp.git] / libseccomp / tests / 29-sim-pseudo_syscall.py
1 #!/usr/bin/env python
2
3 #
4 # Seccomp Library test program
5 #
6 # Copyright (c) 2015 Red Hat <pmoore@redhat.com>
7 # Author: Paul Moore <paul@paul-moore.com>
8 #
9
10 #
11 # This library is free software; you can redistribute it and/or modify it
12 # under the terms of version 2.1 of the GNU Lesser General Public License as
13 # published by the Free Software Foundation.
14 #
15 # This library is distributed in the hope that it will be useful, but WITHOUT
16 # ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
17 # FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
18 # for more details.
19 #
20 # You should have received a copy of the GNU Lesser General Public License
21 # along with this library; if not, see <http://www.gnu.org/licenses>.
22 #
23
24 import argparse
25 import sys
26
27 import util
28
29 from seccomp import *
30
31 def test(args):
32 f = SyscallFilter(ALLOW)
33 f.remove_arch(Arch())
34 f.add_arch(Arch("x86"))
35 f.add_rule(KILL, "sysmips")
36 try:
37 f.add_rule_exactly(KILL, "sysmips")
38 except RuntimeError:
39 pass
40 try:
41 f.add_rule_exactly(KILL, -10001)
42 except RuntimeError:
43 pass
44 return f
45
46 args = util.get_opt()
47 ctx = test(args)
48 util.filter_output(args, ctx)
49
50 # kate: syntax python;
51 # kate: indent-mode python; space-indent on; indent-width 4; mixedindent off;
This page took 0.023421 seconds and 4 git commands to generate.