538ec81a46e52d383987543b4017ac785b796bdc |
|
14-Nov-2016 |
Cyril Hrubis <chrubis@suse.cz> |
run_capbounds.sh: Make use of tst_kvcmp + fix Also fixes TCONF return value. Signed-off-by: Cyril Hrubis <chrubis@suse.cz>
/external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh
|
4548c6cf9bcdd96d8303caa4130ab638b61f8a30 |
|
19-Oct-2012 |
Wanlong Gao <gaowanlong@cn.fujitsu.com> |
Update FSF address find . -type f -exec sed -i 's/675 Mass Ave, Cambridge, MA 02139, USA/51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA/g' {} \; find . -type f -exec sed -i 's/59 Temple Place, Suite 330, Boston, MA 02111-1307 USA/51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA/g' {} \; Signed-off-by: Wanlong Gao <gaowanlong@cn.fujitsu.com>
/external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh
|
76adea29db505e5ca22695902870f78580c8a5aa |
|
28-Apr-2009 |
subrata_modak <subrata_modak> |
Add capability bounding set testcases, to verify the following: 1. prctl(CAP_BSET_READ, 0..NCAPS) returns 1 2. prctl(CAP_BSET_READ, -1|NCAPS+1) return -1 3. prctl(CAP_BSET_DROP, -1|NCAPS+1) returns -1 4. prctl(CAP_BSET_DROP, 0..NCAPS) returns 1 4b. prctl(CAP_BSET_READ, N) returns 0 after each unset, 1 for those not yet removed 5. fI=empty; N \notin pP; prctl(CAPBSET_DROP, N); setting pI=N fails 6. pI=N; fI=fE=N; prctl(CAPBSET_DROP, N); exec(f) - N \in pE (or make f setuid-root) 7. pI=0; fI=fE=N; prctl(CAPBSET_DROP, N); exec(f) - N \notin pE (or make f setuid-root) A set of securebits and keepcaps tests have yet to be written (as per an email I sent a few months ago). Signed-off-by: Serge Hallyn <serue@us.ibm.com>.
/external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh
|