Hi Stefan, On Fri, 2023-11-10 at 15:21 -0500, Stefan Berger wrote: > Address issues raised by shellcheck SC2320: > "This $? refers to echo/printf, not a previous command. > Assign to variable to avoid it being overwritten." > > Signed-off-by: Stefan Berger <stefanb@xxxxxxxxxxxxx> > --- > tests/Makefile.am | 2 +- > tests/mmap_check.test | 8 +++----- > tests/portable_signatures.test | 9 +++------ > 3 files changed, 7 insertions(+), 12 deletions(-) > > diff --git a/tests/Makefile.am b/tests/Makefile.am > index bcc1ee4..babfa7a 100644 > --- a/tests/Makefile.am > +++ b/tests/Makefile.am > @@ -26,7 +26,7 @@ clean-local: > distclean: distclean-keys > > shellcheck: > - shellcheck -i SC2086,SC2181,SC2046 \ > + shellcheck -i SC2086,SC2181,SC2046,SC2320 \ > functions.sh gen-keys.sh install-fsverity.sh \ > install-mount-idmapped.sh install-openssl3.sh \ > install-swtpm.sh install-tss.sh softhsm_setup \ > diff --git a/tests/mmap_check.test b/tests/mmap_check.test > index 2dd3433..3d2e1b1 100755 > --- a/tests/mmap_check.test > +++ b/tests/mmap_check.test > @@ -97,11 +97,9 @@ check_load_ima_rule() { > > new_policy=$(mktemp -p "$g_mountpoint") > echo "$1" > "$new_policy" > - echo "$new_policy" > /sys/kernel/security/ima/policy > - result=$? > - rm -f "$new_policy" > - > - if [ "$result" -ne 0 ]; then > + if echo "$new_policy" > /sys/kernel/security/ima/policy; then > + rm -f "$new_policy" > + else > echo "${RED}Failed to set IMA policy${NORM}" > return "$HARDFAIL" > fi This isn't equiavlent. $new_policy was previously always removed. > diff --git a/tests/portable_signatures.test b/tests/portable_signatures.test > index 9f3339b..5251211 100755 > --- a/tests/portable_signatures.test > +++ b/tests/portable_signatures.test > @@ -80,7 +80,6 @@ METADATA_CHANGE_FOWNER_2=3002 > > check_load_ima_rule() { > local rule_loaded > - local result > local new_policy > > rule_loaded=$(grep "$1" /sys/kernel/security/ima/policy) > @@ -88,11 +87,9 @@ check_load_ima_rule() { > new_policy=$(mktemp -p "$g_mountpoint") > echo "$1" > "$new_policy" > evmctl sign -o -a sha256 --imasig --key "$key_path" "$new_policy" &> /dev/null > - echo "$new_policy" > /sys/kernel/security/ima/policy > - result=$? > - rm -f "$new_policy" > - > - if [ "$result" -ne 0 ]; then > + if echo "$new_policy" > /sys/kernel/security/ima/policy; then > + rm -f "$new_policy" > + else > echo "${RED}Failed to set IMA policy${NORM}" > return "$FAIL" > fi Same here. -- thanks, Mimi