I run it several times a week on Rawhide, it's running fine for me.
FWIW, usually when people are having a problem running the
selinux-testsuite it is because they didn't follow the README very
closely. I'm not saying that's the case here, but it couldn't hurt to
give it a second look ...
On
On 5/14/2018 4:48 PM, Stephen Smalley wrote:
> It's been running fine for me. Maybe you just need to clean your tree and do
> a fresh make test.
Did that first thing.
Digging down, I find that the "make -C policy load" is failing.
make[1]: Leaving directory
It's been running fine for me. Maybe you just need to clean your tree and
do a fresh make test.
On Mon, May 14, 2018, 7:37 PM Casey Schaufler
wrote:
> Has anyone had success with the SELinux test suite on Fedora 28?
> I find the chcon and newrole are unhappy with the
Has anyone had success with the SELinux test suite on Fedora 28?
I find the chcon and newrole are unhappy with the contexts used
in the suite.
On Sat, May 12, 2018 at 9:58 PM, Richard Guy Briggs wrote:
> Use a macro, "AUDIT_SID_UNSET", to replace each instance of
> initialization and comparison to an audit session ID.
>
> Signed-off-by: Richard Guy Briggs
> ---
> include/linux/audit.h | 2 +-
>
On Sat, May 12, 2018 at 9:58 PM, Richard Guy Briggs wrote:
> Recognizing that the loginuid is an internal audit value, use an access
> function to retrieve the audit loginuid value for the task rather than
> reaching directly into the task struct to get it.
>
> Signed-off-by:
On Fri, May 11, 2018 at 1:15 PM, Alexey Kodanev
wrote:
> Commit d452930fd3b9 ("selinux: Add SCTP support") breaks compatibility
> with the old programs that can pass sockaddr_in structure with AF_UNSPEC
> and INADDR_ANY to bind(). As a result, bind() returns
On 5/14/2018 9:53 AM, Stephen Smalley wrote:
> On 05/14/2018 11:12 AM, Stephen Smalley wrote:
>> On 05/10/2018 08:55 PM, Casey Schaufler wrote:
>>> From: Casey Schaufler
>>> Date: Thu, 10 May 2018 15:54:25 -0700
>>> Subject: [PATCH 20/23] LSM: Move common usercopy into
>>>
On 05/14/2018 11:12 AM, Stephen Smalley wrote:
> On 05/10/2018 08:55 PM, Casey Schaufler wrote:
>> From: Casey Schaufler
>> Date: Thu, 10 May 2018 15:54:25 -0700
>> Subject: [PATCH 20/23] LSM: Move common usercopy into
>> security_getpeersec_stream
>>
>> The modules
On 5/14/2018 8:04 AM, Stephen Smalley wrote:
> On 05/10/2018 08:53 PM, Casey Schaufler wrote:
>> From: Casey Schaufler
>> Date: Thu, 10 May 2018 14:23:27 -0700
>> Subject: [PATCH 10/23] LSM: Infrastructure management of the inode security
>> blob
>>
>> Move management of
On 05/10/2018 08:55 PM, Casey Schaufler wrote:
> From: Casey Schaufler
> Date: Thu, 10 May 2018 15:54:25 -0700
> Subject: [PATCH 20/23] LSM: Move common usercopy into
> security_getpeersec_stream
>
> The modules implementing hook for getpeersec_stream
> don't need to be
On 05/10/2018 08:53 PM, Casey Schaufler wrote:
> From: Casey Schaufler
> Date: Thu, 10 May 2018 14:23:27 -0700
> Subject: [PATCH 10/23] LSM: Infrastructure management of the inode security
> blob
>
> Move management of the inode->i_security blob out
> of the individual
On Wed, 9 May 2018 10:18:52 -0300
Mauro Carvalho Chehab wrote:
> As we move stuff around, some doc references are broken. Fix some of
> them via this script:
> ./scripts/documentation-file-ref-check --fix-rst
>
> Manually checked if the produced result is
On Mon, May 14, 2018 at 09:30:41AM -0400, Stephen Smalley wrote:
> On 05/13/2018 07:43 AM, Nicolas Iooss wrote:
> > On Sat, May 12, 2018 at 2:53 PM, Matěj Cepl wrote:
> >> Hi,
> >>
> >> I am changing jobs (Red Hat -> SUSE; R, but not a security
> >> related job), and although I
On 05/13/2018 07:43 AM, Nicolas Iooss wrote:
> On Sat, May 12, 2018 at 2:53 PM, Matěj Cepl wrote:
>> Hi,
>>
>> I am changing jobs (Red Hat -> SUSE; R, but not a security
>> related job), and although I will be switching my workstation to
>> OpenSUSE, I would love to keep SELinux
On Sat, May 12, 2018 at 8:53 AM Matěj Cepl wrote:
> Hi,
> I am changing jobs (Red Hat -> SUSE; R, but not a security
> related job), and although I will be switching my workstation to
> OpenSUSE, I would love to keep SELinux working. Which meant I had
> to dig into the current
On Wed, 09 May 2018 15:18:52 +0200,
Mauro Carvalho Chehab wrote:
>
> As we move stuff around, some doc references are broken. Fix some of
> them via this script:
> ./scripts/documentation-file-ref-check --fix-rst
>
> Manually checked if the produced result is valid, removing a few
>
Group the audit parameters for each task into one structure.
In particular, remove the loginuid and sessionid values and the audit
context pointer from the task structure, replacing them with an audit
task information structure to contain them. Use access functions to
access audit values.
Note:
Use a macro, "AUDIT_SID_UNSET", to replace each instance of
initialization and comparison to an audit session ID.
Signed-off-by: Richard Guy Briggs
---
include/linux/audit.h | 2 +-
include/net/xfrm.h | 2 +-
include/uapi/linux/audit.h | 1 +
init/init_task.c
Recognizing that the loginuid is an internal audit value, use an access
function to retrieve the audit loginuid value for the task rather than
reaching directly into the task struct to get it.
Signed-off-by: Richard Guy Briggs
---
kernel/auditsc.c | 18 +-
1
The audit-related parameters in struct task_struct should ideally be
collected together and accessed through a standard audit API.
Collect the existing loginuid, sessionid and audit_context together in a
new struct audit_task_info called "audit" in struct task_struct.
See:
Recognizing that the audit context is an internal audit value, use an
access function to retrieve the audit context pointer for the task
rather than reaching directly into the task struct to get it.
Signed-off-by: Richard Guy Briggs
---
include/linux/audit.h| 14
On 2018-05-10 17:21, Richard Guy Briggs wrote:
> On 2018-05-09 11:13, Paul Moore wrote:
> > On Fri, May 4, 2018 at 4:54 PM, Richard Guy Briggs wrote:
> > > Recognizing that the loginuid is an internal audit value, use an access
> > > function to retrieve the audit loginuid value
24 matches
Mail list logo