]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
selftests/bpf: Remove usage of lsm/file_alloc_security in selftest
authorAmery Hung <ameryhung@gmail.com>
Wed, 26 Nov 2025 20:29:27 +0000 (12:29 -0800)
committerAlexei Starovoitov <ast@kernel.org>
Fri, 28 Nov 2025 23:18:28 +0000 (15:18 -0800)
file_alloc_security hook is disabled. Use other LSM hooks in selftests
instead.

Signed-off-by: Amery Hung <ameryhung@gmail.com>
Link: https://lore.kernel.org/r/20251126202927.2584874-2-ameryhung@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
tools/testing/selftests/bpf/prog_tests/test_lsm.c
tools/testing/selftests/bpf/progs/lsm_tailcall.c
tools/testing/selftests/bpf/progs/verifier_lsm.c

index 2a27f3714f5cfd7202b7dc1cde1728cea1105454..bdc4fc06bc5a52c289b626c0caadd9ed9759880c 100644 (file)
@@ -139,7 +139,7 @@ static void test_lsm_tailcall(void)
        if (CHECK_FAIL(!err))
                goto close_prog;
 
-       prog_fd = bpf_program__fd(skel->progs.lsm_file_alloc_security_prog);
+       prog_fd = bpf_program__fd(skel->progs.lsm_kernfs_init_security_prog);
        if (CHECK_FAIL(prog_fd < 0))
                goto close_prog;
 
index 49c075ce2d4c361e7c1962f0eaf030617a2a2f06..6e7e58051e640a1771ffabdd830624d8684bfcd2 100644 (file)
@@ -20,14 +20,14 @@ int lsm_file_permission_prog(void *ctx)
        return 0;
 }
 
-SEC("lsm/file_alloc_security")
-int lsm_file_alloc_security_prog(void *ctx)
+SEC("lsm/kernfs_init_security")
+int lsm_kernfs_init_security_prog(void *ctx)
 {
        return 0;
 }
 
-SEC("lsm/file_alloc_security")
-int lsm_file_alloc_security_entry(void *ctx)
+SEC("lsm/kernfs_init_security")
+int lsm_kernfs_init_security_entry(void *ctx)
 {
        bpf_tail_call_static(ctx, &jmp_table, 0);
        return 0;
index 32e5e779cb962f3f9de1f8dcc7ba01b08b8ed783..6af9100a37ffd65be8674faa2cc8f906a8e5b786 100644 (file)
@@ -4,7 +4,7 @@
 #include <bpf/bpf_helpers.h>
 #include "bpf_misc.h"
 
-SEC("lsm/file_alloc_security")
+SEC("lsm/file_permission")
 __description("lsm bpf prog with -4095~0 retval. test 1")
 __success
 __naked int errno_zero_retval_test1(void *ctx)
@@ -15,7 +15,7 @@ __naked int errno_zero_retval_test1(void *ctx)
        ::: __clobber_all);
 }
 
-SEC("lsm/file_alloc_security")
+SEC("lsm/file_permission")
 __description("lsm bpf prog with -4095~0 retval. test 2")
 __success
 __naked int errno_zero_retval_test2(void *ctx)