Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1864784ybk; Mon, 11 May 2020 06:16:32 -0700 (PDT) X-Google-Smtp-Source: APiQypJW2XLIWG1OELx44egUNzC/APGAmWO6IAjpKOgnMFA/I7BVl+ArB6TXFYTJ4hf5P+3Q5dn1 X-Received: by 2002:a05:6402:3129:: with SMTP id dd9mr13626093edb.121.1589202991896; Mon, 11 May 2020 06:16:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589202991; cv=none; d=google.com; s=arc-20160816; b=a3FhwxU8yJubWeUFFMMDayeO7LqB60VPAqprLWY5N7MM26sHdQBNQvOAIrSHI7wYsR DthjmHJmRqmTDD5+E2im9U0P3vybEx6v2EnJVCEtWimLeRGfEKTyLvSF1yT7HAut0x6F u3ffTOIXejPUtKOpmHQ8etxfrRDOR08yrMORAjiTfdObNZIz2x2mdXI+fjrbgLks7JgX iFrgiiUEfjFCv8ghPpPJiVQXi5OT3W/L0WXyYmuRsdkaA5pANGcINrM5v7/3BS8gTH9G Ap0rMDzxBJapGPzJeW8JV0mvX6/bOezrhsODPeL9BLCDW/0hknl0cT2JhhLrU4Qfgj19 +ETw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=hd5CEiw3xAmj+Qu84GZ/dMO9hkSOA6ixaeeAM/KiNHU=; b=kasDyw/kRbh8oTstzsrASULc4R2MOTddTDKAcSW4lj/7dbTLXB3uZjUdoaE6vPLifa Gnbf/FSgMAkkjXbbF9eKM4ret4agErPEMgTMHBtcdjSMTFRzrPoXryMzZzLVHl7p6B+z qQskReNfvO4VDMkLzGV/3obOEV3iANCvYEI2E3JZ1dtd0CAKtHBPh9pFHEWgpj5iRug+ hgS+z1GK+ykdkMKvA9YCKKRZtU7DysqKzQNHYAFh20gxtMYZJ+s94otK57lqK9UHMsmG CSraiKJJxxqWD7q0XHHho9wThovER9JbCz+lAc8WEIKo5HQtKcxbL1I+6Uckm8jWzAkb eXMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="t/q/Xu2W"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dk19si6107625edb.262.2020.05.11.06.16.01; Mon, 11 May 2020 06:16:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="t/q/Xu2W"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730200AbgEKNOt (ORCPT + 99 others); Mon, 11 May 2020 09:14:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56040 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1730195AbgEKNOs (ORCPT ); Mon, 11 May 2020 09:14:48 -0400 Received: from mail-lj1-x241.google.com (mail-lj1-x241.google.com [IPv6:2a00:1450:4864:20::241]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 93F8FC061A0E for ; Mon, 11 May 2020 06:14:47 -0700 (PDT) Received: by mail-lj1-x241.google.com with SMTP id h4so9409743ljg.12 for ; Mon, 11 May 2020 06:14:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=hd5CEiw3xAmj+Qu84GZ/dMO9hkSOA6ixaeeAM/KiNHU=; b=t/q/Xu2Wsk1cQP379bqb7AKPnMVYlzvnTZ2iToF9D09oipRJWynKJ+gRR+xoVRGhom 6pD/9G8cClGfg/m8k9yWgDTlOIQbm9Ixb6cWlOWc6rC7qy407QUS0Rka78Hf+0F+RzNM Ujd1KPanQ5orj9cBzjrZfDRy5lLAxw1jJCOqjN4grijylK/LSWTGqs2BjeJWF8qPKUAy SqwMRZfnwvux94TcbbUvcFI2qJKwwB2+W0O7QQA+5+IjPMogtRBJae4RHVct7pW7Obgz z3gIn0kYZs/dFBbBaETQJRSXt/eQ7otP//1WDRZgjNOexrXZffr+COFscNImDd2SZgMA uJ3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=hd5CEiw3xAmj+Qu84GZ/dMO9hkSOA6ixaeeAM/KiNHU=; b=qFDosDE0i5QJxLaGGdxd+a1/XtM++rs5fyrg3lM6ziY6M3fyWGr499R1Ka27AX5x0j zP7e44WD0PrM4ykAWsp6dcTd/qWHid0rvy9mNLzLRgh/t1cVCFmebY/tiXyUlvjcQL8Z ZjrZXW9tW9cXo76XlWu6KnF9bxTU/TShbNHPe2mdg0N0MQYo32vN4iC4sz8O0cyj7K7P am3XNRuPacpRdjndOqPmwqW9ouQBPYI/HE/7T/q5fxEgmEnby1n/w4WajEiiEmCqdK9S VQDqfaMHq4ROks+1H6qZpfNRqXmorhSMCfUn+HwE5MB1jFYm94vqQPdB7iwb+4X0mTDH g/sg== X-Gm-Message-State: AOAM531/IWsP8oCxB2SibM8mZP5D+37jTN3XE7ImPgtUcjKETE5BKah2 C9a5QOIg5MtSfixtSS805EcZag== X-Received: by 2002:a2e:920e:: with SMTP id k14mr10674436ljg.288.1589202886078; Mon, 11 May 2020 06:14:46 -0700 (PDT) Received: from localhost (c-8c28e555.07-21-73746f28.bbcust.telenor.se. [85.229.40.140]) by smtp.gmail.com with ESMTPSA id h11sm10223074lfp.22.2020.05.11.06.14.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 May 2020 06:14:45 -0700 (PDT) From: Anders Roxell To: john.johansen@canonical.com, jmorris@namei.org, serge@hallyn.com Cc: gregkh@linuxfoundation.org, tytso@mit.edu, adilger.kernel@dilger.ca, akpm@linux-foundation.org, brendanhiggins@google.com, linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-security-module@vger.kernel.org, elver@google.com, davidgow@google.com, Anders Roxell Subject: [PATCH v3 6/6] security: apparmor: default KUNIT_* fragments to KUNIT_ALL_TESTS Date: Mon, 11 May 2020 15:14:42 +0200 Message-Id: <20200511131442.30002-1-anders.roxell@linaro.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org This makes it easier to enable all KUnit fragments. Adding 'if !KUNIT_ALL_TESTS' so individual tests can not be turned off. Therefore if KUNIT_ALL_TESTS is enabled that will hide the prompt in menuconfig. Reviewed-by: David Gow Signed-off-by: Anders Roxell --- security/apparmor/Kconfig | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/security/apparmor/Kconfig b/security/apparmor/Kconfig index 0fe336860773..03fae1bd48a6 100644 --- a/security/apparmor/Kconfig +++ b/security/apparmor/Kconfig @@ -70,8 +70,9 @@ config SECURITY_APPARMOR_DEBUG_MESSAGES the kernel message buffer. config SECURITY_APPARMOR_KUNIT_TEST - bool "Build KUnit tests for policy_unpack.c" + bool "Build KUnit tests for policy_unpack.c" if !KUNIT_ALL_TESTS depends on KUNIT=y && SECURITY_APPARMOR + default KUNIT_ALL_TESTS help This builds the AppArmor KUnit tests. -- 2.20.1