[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8c93e5fc-b7d0-cf96-f03f-97065fecddca@huawei.com>
Date: Mon, 28 Nov 2022 07:02:19 +0300
From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@...wei.com>
To: Mickaël Salaün <mic@...ikod.net>
CC: <willemdebruijn.kernel@...il.com>, <gnoack3000@...il.com>,
<linux-security-module@...r.kernel.org>, <netdev@...r.kernel.org>,
<netfilter-devel@...r.kernel.org>, <artem.kuzin@...wei.com>
Subject: Re: [PATCH v8 09/12] selftests/landlock: Share enforce_ruleset()
11/17/2022 9:43 PM, Mickaël Salaün пишет:
>
> On 21/10/2022 17:26, Konstantin Meskhidze wrote:
>> This commit moves enforce_ruleset() helper function to common.h so that
>> to be used both by filesystem tests and network ones.
>>
>> Signed-off-by: Konstantin Meskhidze <konstantin.meskhidze@...wei.com>
>> ---
>>
>> Changes since v7:
>> * Refactors commit message.
>>
>> Changes since v6:
>> * None.
>>
>> Changes since v5:
>> * Splits commit.
>> * Moves enforce_ruleset helper into common.h
>> * Formats code with clang-format-14.
>>
>> ---
>> tools/testing/selftests/landlock/common.h | 10 ++++++++++
>> tools/testing/selftests/landlock/fs_test.c | 10 ----------
>> 2 files changed, 10 insertions(+), 10 deletions(-)
>>
>> diff --git a/tools/testing/selftests/landlock/common.h b/tools/testing/selftests/landlock/common.h
>> index d7987ae8d7fc..bafed1c0c2a6 100644
>> --- a/tools/testing/selftests/landlock/common.h
>> +++ b/tools/testing/selftests/landlock/common.h
>> @@ -256,3 +256,13 @@ static int __maybe_unused send_fd(int usock, int fd_tx)
>> return -errno;
>> return 0;
>> }
>> +
>> +__attribute__((__unused__)) static void
>
> We can now use __maybe_unused instead. This enables to avoid
> checkpatch.pl warning.
Ok. Will be refactored. Thanks.
>
>
>> +enforce_ruleset(struct __test_metadata *const _metadata, const int ruleset_fd)
>> +{
>> + ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0));
>> + ASSERT_EQ(0, landlock_restrict_self(ruleset_fd, 0))
>> + {
>> + TH_LOG("Failed to enforce ruleset: %s", strerror(errno));
>> + }
>> +}
>> diff --git a/tools/testing/selftests/landlock/fs_test.c b/tools/testing/selftests/landlock/fs_test.c
>> index d5dab986f612..20c1ac8485f1 100644
>> --- a/tools/testing/selftests/landlock/fs_test.c
>> +++ b/tools/testing/selftests/landlock/fs_test.c
>> @@ -563,16 +563,6 @@ static int create_ruleset(struct __test_metadata *const _metadata,
>> return ruleset_fd;
>> }
>>
>> -static void enforce_ruleset(struct __test_metadata *const _metadata,
>> - const int ruleset_fd)
>> -{
>> - ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0));
>> - ASSERT_EQ(0, landlock_restrict_self(ruleset_fd, 0))
>> - {
>> - TH_LOG("Failed to enforce ruleset: %s", strerror(errno));
>> - }
>> -}
>> -
>> TEST_F_FORK(layout1, proc_nsfs)
>> {
>> const struct rule rules[] = {
>> --
>> 2.25.1
>>
> .
Powered by blists - more mailing lists