View | Details | Raw Unified | Return to bug 236857 | Differences between
and this patch

Collapse All | Expand All

(-)tests/sys/audit/Makefile (+2 lines)
Lines 55-58 Link Here
55
55
56
LDFLAGS+=	-lbsm -lutil
56
LDFLAGS+=	-lbsm -lutil
57
57
58
CFLAGS.process-control.c+=	-I${SRCTOP}/tests
59
58
.include <bsd.test.mk>
60
.include <bsd.test.mk>
(-)tests/sys/audit/process-control.c (+6 lines)
Lines 48-53 Link Here
48
48
49
#include "utils.h"
49
#include "utils.h"
50
50
51
#include "freebsd_test_suite/macros.h"
52
51
static pid_t pid;
53
static pid_t pid;
52
static int filedesc, status;
54
static int filedesc, status;
53
static struct pollfd fds[1];
55
static struct pollfd fds[1];
Lines 1515-1520 Link Here
1515
	int capinfo;
1517
	int capinfo;
1516
	size_t len = sizeof(capinfo);
1518
	size_t len = sizeof(capinfo);
1517
	const char *capname = "kern.features.security_capability_mode";
1519
	const char *capname = "kern.features.security_capability_mode";
1520
1521
	ATF_REQUIRE_FEATURE("security_capability_mode");
1518
	ATF_REQUIRE_EQ(0, sysctlbyname(capname, &capinfo, &len, NULL, 0));
1522
	ATF_REQUIRE_EQ(0, sysctlbyname(capname, &capinfo, &len, NULL, 0));
1519
1523
1520
	/* Without CAPABILITY_MODE enabled, cap_enter() returns ENOSYS */
1524
	/* Without CAPABILITY_MODE enabled, cap_enter() returns ENOSYS */
Lines 1553-1558 Link Here
1553
	int capinfo, modep;
1557
	int capinfo, modep;
1554
	size_t len = sizeof(capinfo);
1558
	size_t len = sizeof(capinfo);
1555
	const char *capname = "kern.features.security_capability_mode";
1559
	const char *capname = "kern.features.security_capability_mode";
1560
1561
	ATF_REQUIRE_FEATURE("security_capability_mode");
1556
	ATF_REQUIRE_EQ(0, sysctlbyname(capname, &capinfo, &len, NULL, 0));
1562
	ATF_REQUIRE_EQ(0, sysctlbyname(capname, &capinfo, &len, NULL, 0));
1557
1563
1558
	/* Without CAPABILITY_MODE enabled, cap_getmode() returns ENOSYS */
1564
	/* Without CAPABILITY_MODE enabled, cap_getmode() returns ENOSYS */

Return to bug 236857