History log of /external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
538ec81a46e52d383987543b4017ac785b796bdc 14-Nov-2016 Cyril Hrubis <chrubis@suse.cz> run_capbounds.sh: Make use of tst_kvcmp + fix

Also fixes TCONF return value.

Signed-off-by: Cyril Hrubis <chrubis@suse.cz>
/external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh
4548c6cf9bcdd96d8303caa4130ab638b61f8a30 19-Oct-2012 Wanlong Gao <gaowanlong@cn.fujitsu.com> Update FSF address

find . -type f -exec sed -i 's/675 Mass Ave, Cambridge, MA 02139, USA/51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA/g' {} \;
find . -type f -exec sed -i 's/59 Temple Place, Suite 330, Boston, MA 02111-1307 USA/51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA/g' {} \;

Signed-off-by: Wanlong Gao <gaowanlong@cn.fujitsu.com>
/external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh
76adea29db505e5ca22695902870f78580c8a5aa 28-Apr-2009 subrata_modak <subrata_modak> Add capability bounding set testcases, to verify the following:
1. prctl(CAP_BSET_READ, 0..NCAPS) returns 1
2. prctl(CAP_BSET_READ, -1|NCAPS+1) return -1
3. prctl(CAP_BSET_DROP, -1|NCAPS+1) returns -1
4. prctl(CAP_BSET_DROP, 0..NCAPS) returns 1
4b. prctl(CAP_BSET_READ, N) returns 0 after each unset, 1 for those not yet removed
5. fI=empty; N \notin pP; prctl(CAPBSET_DROP, N); setting pI=N fails
6. pI=N; fI=fE=N; prctl(CAPBSET_DROP, N); exec(f) - N \in pE
(or make f setuid-root)
7. pI=0; fI=fE=N; prctl(CAPBSET_DROP, N); exec(f) - N \notin pE
(or make f setuid-root)
A set of securebits and keepcaps tests have yet to be written (as per an email I sent a few months ago). Signed-off-by: Serge Hallyn <serue@us.ibm.com>.
/external/ltp/testcases/kernel/security/cap_bound/run_capbounds.sh