diff --git a/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp b/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp index 2712aa73a12b3f14699454c1aa1deadc10bcd271..b04add52327be9706ad1bb84ec7c6d39b3a42aa2 100644 --- a/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp +++ b/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp @@ -803,7 +803,7 @@ HWTEST_F(CapabilityTestSuite, CapabilityTest1500, Reliability | MediumTest | Lev 0, sizeof(struct __user_cap_header_struct)); if (result != EOK) { LOG("CapgetWithAllCap memset_s failed"); - return FALSE; + ASSERT_TRUE(false); }; capheader.version = _LINUX_CAPABILITY_VERSION_3; capheader.pid = 0; @@ -812,7 +812,7 @@ HWTEST_F(CapabilityTestSuite, CapabilityTest1500, Reliability | MediumTest | Lev LINUX_FULL_CAP, CAP_NUM * sizeof(struct __user_cap_data_struct)); if (result != EOK) { LOG("CapgetWithAllCap memset_s failed"); - return FALSE; + ASSERT_TRUE(false); }; capdata[CAP_TO_INDEX(INVALID_CAP_TO_INDEX)].permitted &= ~CAP_TO_MASK(INVALID_CAP_TO_INDEX); capdata[CAP_TO_INDEX(INVALID_CAP_TO_INDEX)].effective &= ~CAP_TO_MASK(INVALID_CAP_TO_INDEX); @@ -1138,7 +1138,7 @@ HWTEST_F(CapabilityTestSuite, CapabilityTest2300, Security | MediumTest | Level1 0, sizeof(struct __user_cap_header_struct)); if (result != EOK) { LOG("CapgetWithAllCap memset_s failed"); - return FALSE; + ASSERT_TRUE(false); }; capheader.version = _LINUX_CAPABILITY_VERSION_3; struct __user_cap_data_struct capdataget[CAP_NUM] = { { 0 }, { 0 } }; @@ -1146,7 +1146,7 @@ HWTEST_F(CapabilityTestSuite, CapabilityTest2300, Security | MediumTest | Level1 0, CAP_NUM * sizeof(struct __user_cap_data_struct)); if (result != EOK) { LOG("CapgetWithAllCap memset_s failed"); - return FALSE; + ASSERT_TRUE(false); }; pid_t pid = getpid(); for (int num = OTHER_PID; num <= pid; num++) {