]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/commitdiff
landlock: Add clang-format exceptions
authorMickaël Salaün <mic@digikod.net>
Fri, 6 May 2022 16:05:07 +0000 (18:05 +0200)
committerStefan Bader <stefan.bader@canonical.com>
Wed, 10 Aug 2022 07:25:13 +0000 (09:25 +0200)
BugLink: https://bugs.launchpad.net/bugs/1981864
commit 6cc2df8e3a3967e7c13a424f87f6efb1d4a62d80 upstream.

In preparation to a following commit, add clang-format on and
clang-format off stanzas around constant definitions.  This enables to
keep aligned values, which is much more readable than packed
definitions.

Link: https://lore.kernel.org/r/20220506160513.523257-2-mic@digikod.net
Cc: stable@vger.kernel.org
Signed-off-by: Mickaël Salaün <mic@digikod.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
include/uapi/linux/landlock.h
security/landlock/fs.c
security/landlock/limits.h

index b3d952067f59c12af7bb3105ab00543ec2d23ec8..15c31abb0d76c801ca2900b231d9cf54841d5871 100644 (file)
@@ -33,7 +33,9 @@ struct landlock_ruleset_attr {
  * - %LANDLOCK_CREATE_RULESET_VERSION: Get the highest supported Landlock ABI
  *   version.
  */
+/* clang-format off */
 #define LANDLOCK_CREATE_RULESET_VERSION                        (1U << 0)
+/* clang-format on */
 
 /**
  * enum landlock_rule_type - Landlock rule type
@@ -120,6 +122,7 @@ struct landlock_path_beneath_attr {
  *   :manpage:`access(2)`.
  *   Future Landlock evolutions will enable to restrict them.
  */
+/* clang-format off */
 #define LANDLOCK_ACCESS_FS_EXECUTE                     (1ULL << 0)
 #define LANDLOCK_ACCESS_FS_WRITE_FILE                  (1ULL << 1)
 #define LANDLOCK_ACCESS_FS_READ_FILE                   (1ULL << 2)
@@ -133,5 +136,6 @@ struct landlock_path_beneath_attr {
 #define LANDLOCK_ACCESS_FS_MAKE_FIFO                   (1ULL << 10)
 #define LANDLOCK_ACCESS_FS_MAKE_BLOCK                  (1ULL << 11)
 #define LANDLOCK_ACCESS_FS_MAKE_SYM                    (1ULL << 12)
+/* clang-format on */
 
 #endif /* _UAPI_LINUX_LANDLOCK_H */
index 5ff3fa3e789ec5eb76a91de342191b3b3e0180f1..329285a792f9beee328f016e40caa9dfbe24d61b 100644 (file)
@@ -146,10 +146,12 @@ retry:
 }
 
 /* All access rights that can be tied to files. */
+/* clang-format off */
 #define ACCESS_FILE ( \
        LANDLOCK_ACCESS_FS_EXECUTE | \
        LANDLOCK_ACCESS_FS_WRITE_FILE | \
        LANDLOCK_ACCESS_FS_READ_FILE)
+/* clang-format on */
 
 /*
  * @path: Should have been checked by get_path_from_fd().
index 2a0a1095ee27e617d60b6bc47c074553a0e481b6..a274ae6b5570eb4c669f87ffa67242219979f7a7 100644 (file)
 #include <linux/limits.h>
 #include <uapi/linux/landlock.h>
 
+/* clang-format off */
+
 #define LANDLOCK_MAX_NUM_LAYERS                64
 #define LANDLOCK_MAX_NUM_RULES         U32_MAX
 
 #define LANDLOCK_LAST_ACCESS_FS                LANDLOCK_ACCESS_FS_MAKE_SYM
 #define LANDLOCK_MASK_ACCESS_FS                ((LANDLOCK_LAST_ACCESS_FS << 1) - 1)
 
+/* clang-format on */
+
 #endif /* _SECURITY_LANDLOCK_LIMITS_H */