From patchwork Mon Feb 6 18:10:04 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrei Gherzan X-Patchwork-Id: 1738301 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=VY8GqOuC; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4P9Z7j0CP7z23r8 for ; Tue, 7 Feb 2023 05:10:57 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1pP5x4-00023U-Mw; Mon, 06 Feb 2023 18:10:50 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1pP5x1-00022u-Al for kernel-team@lists.ubuntu.com; Mon, 06 Feb 2023 18:10:47 +0000 Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 606154166A for ; Mon, 6 Feb 2023 18:10:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1675707046; bh=w1WRxAvd7rsVQrM6P25OgJYUW/kMZYUE5ZW8CubcWTw=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=VY8GqOuCdwTlk33wcizxxqmXsZhi6KVjvYKEjAj54qf7aNZgkqcCUb19+uRJdsS4s zzkf8/aG775KF8Asv2KEN6J3SDmGJq84Y7IABl9iQqYvCeu/zLiR+2z0qFz09oeZn+ QDHUWzkx8KDPqLklE/IgCUq/xq8Za/+4wM6Je9QqDixtfJd/20Qb7HtvQSkKi4wStx CDXQ2LYRGEFW7wzNzc/fFgd12VgQ+I1ZL6oZIs1aIPmERaiFdUuD9Aakh9aLUNwwyw GzFNMPqBiNRXrjMpeHKSLurSpg8PBNuu35c4wui253GP5qTx21LDDTL5kr06WbShV6 Gwkcr4FYlVOPg== Received: by mail-wm1-f72.google.com with SMTP id l21-20020a05600c4f1500b003e00be23a70so879837wmq.2 for ; Mon, 06 Feb 2023 10:10:46 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=w1WRxAvd7rsVQrM6P25OgJYUW/kMZYUE5ZW8CubcWTw=; b=FXQXKddl/OlMeLZ2Jfp03jIT8TcOLheqz2fTEQlS7Ml7H9PVbdEQZmEvKJIb4429XB nugjlfZFnyha+TokgonMuuoH9r0JnLIB3zL1AookqE55TwgZxs5O9EcJqiSL8kKTcv50 xDPbq/3L/m/nfA94CQ6tmViKRPyUErhZ6a6flyJRxprIfLX+z3s4LqGno3GS6iizsJF3 w1oK4C1t4XsGJ7y/iPlGPZIClIeI7fkB50xxShUd52JpF9DBliwMwY0hGxXW68C52vy8 TKhKeVNKYJI7NGAWJBZNGgs0PpRKNYwbL76ieX45VC8GuwC+ZL5MDjk6qOIPtCm75B2Q fcnQ== X-Gm-Message-State: AO0yUKWHLp3ES3YQSbE11ZVbOPgG2+gwImuKoEjM++dYCS9N0LryeToX 9EtyT/oz04R1tSp9LCT5PRzNm7g31/Ik4j23YzD4L0Wti+GL8DS+0eEL8hJ0UDKvd6K88gS8y9i rC5ACQuoHxcnlqXIrTugyikDb0g/aIJi5Mo8EPUc/9Q== X-Received: by 2002:a05:600c:3416:b0:3df:57aa:db52 with SMTP id y22-20020a05600c341600b003df57aadb52mr572364wmp.4.1675707045397; Mon, 06 Feb 2023 10:10:45 -0800 (PST) X-Google-Smtp-Source: AK7set83T4OGD0EOss+oBoEl1alVXVilHW+vvpfNNF4sf7eSzDLrDhRMdWgYZWbxrfVUXX/n4zgAEw== X-Received: by 2002:a05:600c:3416:b0:3df:57aa:db52 with SMTP id y22-20020a05600c341600b003df57aadb52mr572356wmp.4.1675707045211; Mon, 06 Feb 2023 10:10:45 -0800 (PST) Received: from qwirkle.internal ([81.2.157.149]) by smtp.gmail.com with ESMTPSA id l16-20020a1c7910000000b003dc1d668866sm16253804wme.10.2023.02.06.10.10.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Feb 2023 10:10:44 -0800 (PST) From: Andrei Gherzan To: kernel-team@lists.ubuntu.com Subject: [SRU][Kinetic][PATCH v2 1/1] selftest: net: Improve IPV6_TCLASS/IPV6_HOPLIMIT tests apparmor compatibility Date: Mon, 6 Feb 2023 18:10:04 +0000 Message-Id: <20230206181002.476551-2-andrei.gherzan@canonical.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230206181002.476551-1-andrei.gherzan@canonical.com> References: <20230206181002.476551-1-andrei.gherzan@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Andrei Gherzan Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2000709 "tcpdump" is used to capture traffic in these tests while using a random, temporary and not suffixed file for it. This can interfere with apparmor configuration where the tool is only allowed to read from files with 'known' extensions. The MINE type application/vnd.tcpdump.pcap was registered with IANA for pcap files and .pcap is the extension that is both most common but also aligned with standard apparmor configurations. See TCPDUMP(8) for more details. This improves compatibility with standard apparmor configurations by using ".pcap" as the file extension for the tests' temporary files. Signed-off-by: Andrei Gherzan Signed-off-by: David S. Miller (cherry-picked from commit a6efc42a86c0c87cfe2f1c3d1f09a4c9b13ba890 netdev) --- tools/testing/selftests/net/cmsg_ipv6.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/cmsg_ipv6.sh b/tools/testing/selftests/net/cmsg_ipv6.sh index 2d89cb0ad288..330d0b1ceced 100755 --- a/tools/testing/selftests/net/cmsg_ipv6.sh +++ b/tools/testing/selftests/net/cmsg_ipv6.sh @@ -6,7 +6,7 @@ ksft_skip=4 NS=ns IP6=2001:db8:1::1/64 TGT6=2001:db8:1::2 -TMPF=`mktemp` +TMPF=$(mktemp --suffix ".pcap") cleanup() {