diff options
author | Mickaël Salaün <mic@digikod.net> | 2025-01-08 16:43:30 +0100 |
---|---|---|
committer | Mickaël Salaün <mic@digikod.net> | 2025-01-17 19:05:38 +0100 |
commit | 2a794ee613617b5d8fd978b7ef08d64aa07ff2e6 (patch) | |
tree | 9e38acd1352ea2a5ae06af4d644a724d38605d25 /security | |
parent | 5147779d5e1b6425f30eb57071717be2bb65fa3b (diff) | |
download | linux-2a794ee613617b5d8fd978b7ef08d64aa07ff2e6.tar.gz linux-2a794ee613617b5d8fd978b7ef08d64aa07ff2e6.tar.bz2 linux-2a794ee613617b5d8fd978b7ef08d64aa07ff2e6.zip |
selftests/landlock: Add layout1.umount_sandboxer tests
Check that a domain is not tied to the executable file that created it.
For instance, that could happen if a Landlock domain took a reference to
a struct path.
Move global path names to common.h and replace copy_binary() with a more
generic copy_file() helper.
Test coverage for security/landlock is 92.7% of 1133 lines according to
gcc/gcov-14.
Cc: Günther Noack <gnoack@google.com>
Link: https://lore.kernel.org/r/20250108154338.1129069-23-mic@digikod.net
[mic: Update date and add test coverage]
Signed-off-by: Mickaël Salaün <mic@digikod.net>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions