Lines Matching full:violation
130 /* Wait for child to raise violation and exit. */ in trace_child()
150 /* Read ktrace header and ensure violation occurred. */ in cap_trace_child()
156 /* Read the capability violation. */ in cap_trace_child()
171 struct ktr_cap_fail violation; in ATF_TC_BODY() local
196 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
197 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_NOTCAPABLE); in ATF_TC_BODY()
198 ATF_REQUIRE(cap_rights_is_set(&violation.cap_data.cap_needed, in ATF_TC_BODY()
208 struct ktr_cap_fail violation; in ATF_TC_BODY() local
234 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
235 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_INCREASE); in ATF_TC_BODY()
236 ATF_REQUIRE(cap_rights_is_set(&violation.cap_data.cap_needed, in ATF_TC_BODY()
247 struct ktr_cap_fail violation[2]; in ATF_TC_BODY() local
272 cap_trace_child(pid, violation, 2); in ATF_TC_BODY()
273 ATF_REQUIRE_EQ(violation[0].cap_type, CAPFAIL_SYSCALL); in ATF_TC_BODY()
274 error = syscallabi(violation[0].cap_svflags); in ATF_TC_BODY()
275 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation[0].cap_code), in ATF_TC_BODY()
278 ATF_REQUIRE_EQ(violation[1].cap_type, CAPFAIL_SYSCALL); in ATF_TC_BODY()
279 error = syscallabi(violation[1].cap_svflags); in ATF_TC_BODY()
280 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation[1].cap_code), in ATF_TC_BODY()
282 ATF_REQUIRE_EQ(violation[1].cap_data.cap_int, F_KINFO); in ATF_TC_BODY()
287 * a signal violation.
292 struct ktr_cap_fail violation; in ATF_TC_BODY() local
314 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
315 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_SIGNAL); in ATF_TC_BODY()
316 error = syscallabi(violation.cap_svflags); in ATF_TC_BODY()
317 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation.cap_code), in ATF_TC_BODY()
319 ATF_REQUIRE_EQ(violation.cap_data.cap_int, SIGCONT); in ATF_TC_BODY()
324 * as a protocol violation.
333 struct ktr_cap_fail violation; in ATF_TC_BODY() local
356 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
357 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_PROTO); in ATF_TC_BODY()
358 error = syscallabi(violation.cap_svflags); in ATF_TC_BODY()
359 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation.cap_code), in ATF_TC_BODY()
361 ATF_REQUIRE_EQ(violation.cap_data.cap_int, IPPROTO_ICMP); in ATF_TC_BODY()
366 * reported as a sockaddr violation.
372 struct ktr_cap_fail violation; in ATF_TC_BODY() local
396 * violation. in ATF_TC_BODY()
403 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
404 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_SOCKADDR); in ATF_TC_BODY()
405 error = syscallabi(violation.cap_svflags); in ATF_TC_BODY()
406 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation.cap_code), in ATF_TC_BODY()
408 saddr = (struct sockaddr_in *)&violation.cap_data.cap_sockaddr; in ATF_TC_BODY()
422 struct ktr_cap_fail violation[2]; in ATF_TC_BODY() local
449 cap_trace_child(pid, violation, 2); in ATF_TC_BODY()
450 ATF_REQUIRE_EQ(violation[0].cap_type, CAPFAIL_NAMEI); in ATF_TC_BODY()
451 error = syscallabi(violation[0].cap_svflags); in ATF_TC_BODY()
452 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation[0].cap_code), in ATF_TC_BODY()
454 ATF_REQUIRE_STREQ(violation[0].cap_data.cap_path, "AT_FDCWD"); in ATF_TC_BODY()
456 ATF_REQUIRE_EQ(violation[1].cap_type, CAPFAIL_NAMEI); in ATF_TC_BODY()
457 error = syscallabi(violation[1].cap_svflags); in ATF_TC_BODY()
458 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation[1].cap_code), in ATF_TC_BODY()
460 ATF_REQUIRE_STREQ(violation[1].cap_data.cap_path, "/"); in ATF_TC_BODY()
465 * a cpuset violation.
470 struct ktr_cap_fail violation; in ATF_TC_BODY() local
488 * mode, so this will raise a violation. in ATF_TC_BODY()
496 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
497 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_CPUSET); in ATF_TC_BODY()
498 error = syscallabi(violation.cap_svflags); in ATF_TC_BODY()
499 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation.cap_code), in ATF_TC_BODY()
506 struct ktr_cap_fail violation; in ATF_TC_BODY() local
527 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY()
528 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_NAMEI); in ATF_TC_BODY()
529 error = syscallabi(violation.cap_svflags); in ATF_TC_BODY()
530 ATF_REQUIRE_STREQ(sysdecode_syscallname(error, violation.cap_code), in ATF_TC_BODY()
532 ATF_REQUIRE_STREQ(violation.cap_data.cap_path, "/ktrace_shm"); in ATF_TC_BODY()