{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":209304340,"defaultBranch":"main","name":"selinux-testsuite","ownerLogin":"stephensmalley","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2019-09-18T12:35:27.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/7840580?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1727443736.0","currentOid":""},"activityList":{"items":[{"before":"ed2b6e385fdeacb53d73f256af11d68f13e227c6","after":"1ad535f0862021e44ecd92d62328be0854608174","ref":"refs/heads/selinuxns","pushedAt":"2024-09-27T15:36:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy/test_global.te: add binder permissions for running in namespace\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"policy/test_global.te: add binder permissions for running in namespace"}},{"before":"7e6078ac33ab07cae876f8e312b716bc97b425d2","after":"ed2b6e385fdeacb53d73f256af11d68f13e227c6","ref":"refs/heads/selinuxns","pushedAt":"2024-09-27T14:04:44.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"test/Makefile: disable tests that are not supported in a selinux namespace\n\nDisable tests that are not currently supported in a child selinux namespace.\nPrimarily these are due to also running in a separate network namespace\nand mount namespace rather than being inherent to the SELinux namespace.\nTODO: Figure out a way to dynamically test whether we are running in\na non-init selinux namespace and only disable then.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"test/Makefile: disable tests that are not supported in a selinux name…"}},{"before":null,"after":"7e6078ac33ab07cae876f8e312b716bc97b425d2","ref":"refs/heads/selinuxns","pushedAt":"2024-09-27T13:28:56.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"test/Makefile: disable tests that are not supported in a selinux namespace\n\nDisable tests that are not currently supported in a child selinux namespace.\nPrimarily these are due to also running in a separate network namespace\nand mount namespace rather than being inherent to the SELinux namespace.\nTODO: Figure out a way to dynamically test whether we are running in\na non-init selinux namespace and only disable then.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"test/Makefile: disable tests that are not supported in a selinux name…"}},{"before":null,"after":"3fc1fa9e229ecc575a60c815a3f7899aa2fec455","ref":"refs/heads/skipkeysocket","pushedAt":"2024-08-29T13:37:29.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled\n\nRHEL/CentOS Stream 10+ and Fedora ELN will have CONFIG_NET_KEY disabled\n[1]. Make the test skip itself when it detects that PF_KEY is not\nsupported so that the testsuite can still pass out-of-the-box on these\nplatforms.\n\n[1] https://gitlab.com/cki-project/kernel-ark/-/commit/99d6d1c86fe1bb1df5c0b80f4717826c2330e291\n\nSigned-off-by: Ondrej Mosnacek ","shortMessageHtmlLink":"tests/key_socket: skip the test if CONFIG_NET_KEY is not enabled"}},{"before":null,"after":"073cc86a6c1e77edbf8d3c4bf3f9a35e1e2b3e1d","ref":"refs/heads/smcsocketv2","pushedAt":"2024-08-29T13:25:21.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/extended_socket_class: test SMC sockets\n\nEnable SMC sockets and their dependencies in the defconfig and\nexercise them as part of the extended socket class tests.\nThis only verifies that socket create permission is checked\nagainst the correct class. The tests only cover AF_SMC,\nnot IPPROTO_SMC.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/extended_socket_class: test SMC sockets"}},{"before":"e427bd7674fb010ac6b9db289b7296245f5f10fd","after":"2d4b1cbaae43aca7d21172876ebd0e0bba9fc81c","ref":"refs/heads/netlink_xperm","pushedAt":"2024-08-28T20:02:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy,tests: add tests for netlink xperms\n\nAdd tests for netlink xperms. Test program is based on an earlier test\nprogram for netlink_send checking by Paul Moore. Exercising these\ntests depends on the corresponding kernel patch, userspace patches,\nand updating the base policy to define the new nlmsg permissions\nand to enable the new netlink_xperm policy capability.\n\nFor testing purposes, you can update the base policy by manually\nmodifying your base module and tweaking /usr/share/selinux/devel\n(latter only required due to writing the test policy as a .te file\nrather than as .cil in order to use the test macros) as follows:\n sudo semodule -c -E base\n sudo sed -i.orig \"s/nlmsg_read/nlmsg nlmsg_read/\" base.cil\n sudo semodule -i base.cil\n echo \"(policycap netlink_xperm)\" > netlink_xperm.cil\n sudo semodule -i netlink_xperm.cil\n sudo sed -i.orig \"s/nlmsg_read/nlmsg nlmsg_read/\" \\\n /usr/share/selinux/devel/include/support/all_perms.spt\n\nWhen finished testing, you can semodule -r base netlink_xperm to\nundo the two module changes and restore your all_perms.spt file\nfrom the saved .orig file.\n\nNB The above may lead to unexpected denials of the new nlmsg permission\nfor existing domains on your system and prevent new ssh sessions from\nbeing created. Recommend only inserting the netlink_xperm.cil module\njust prior to running the testsuite and removing immediately thereafter.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"policy,tests: add tests for netlink xperms"}},{"before":"118de2039de827ca89b6f2d5e207fc3cf221f9bc","after":"e427bd7674fb010ac6b9db289b7296245f5f10fd","ref":"refs/heads/netlink_xperm","pushedAt":"2024-08-28T19:55:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy,tests: add tests for netlink xperms\n\nAdd tests for netlink xperms. Test program is based on an earlier test\nprogram for netlink_send checking by Paul Moore. Exercising these\ntests depends on the corresponding kernel patch, userspace patches,\nand updating the base policy to define the new nlmsg permissions\nand to enable the new netlink_xperm policy capability.\n\nFor testing purposes, you can update the base policy by manually\nmodifying your base module and tweaking /usr/share/selinux/devel\n(only required due to writing the test policy as a .te file\nrather than as .cil in order to use the test macros) as follows:\n sudo semodule -c -E base\n sudo sed -i.orig \"s/nlmsg_read/nlmsg nlmsg_read/\" base.cil\n sudo semodule -i base.cil\n echo \"(policycap netlink_xperm)\" > netlink_xperm.cil\n sudo semodule -i netlink_xperm.cil\n sudo sed -i.orig \"s/nlmsg_read/nlmsg nlmsg_read/\" \\\n /usr/share/selinux/devel/include/support/all_perms.spt\n\nWhen finished testing, you can semodule -r base netlink_xperm to\nundo the two module changes and restore your all_perms.spt file\nfrom the saved .orig file.\n\nNB The above may lead to unexpected denials of the new nlmsg permission\nfor existing domains on your system and prevent new ssh sessions from\nbeing created. Recommend only inserting the netlink_xperm.cil module\njust prior to running the testsuite and removing immediately thereafter.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"policy,tests: add tests for netlink xperms"}},{"before":null,"after":"118de2039de827ca89b6f2d5e207fc3cf221f9bc","ref":"refs/heads/netlink_xperm","pushedAt":"2024-08-28T19:28:16.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy,tests: add tests for netlink xperms\n\nAdd tests for netlink xperms. Test program is based on an earlier test\nprogram for netlink_send checking by Paul Moore. Exercising these\ntests depends on the corresponding kernel patch, userspace patches,\nand updating the base policy to define the new nlmsg permissions\nand to enable the new netlink_xperm policy capability.\n\nFor testing purposes, you can update the base policy by manually\nmodifying your base module and tweaking the /usr/share/selinux/devel\nheader as follows:\n sudo semodule -c -E base\n sudo sed -i.orig \"s/nlmsg_read/nlmsg nlmsg_read/\" base.cil\n sudo semodule -i base.cil\n echo \"(policycap netlink_xperm)\" > netlink_xperm.cil\n sudo semodule -i netlink_xperm.cil\n sudo sed -i.orig \"s/nlmsg_read/nlmsg nlmsg_read/\" \\\n /usr/share/selinux/devel/include/support/all_perms.spt\n\nWhen finished testing, you can semodule -r base netlink_xperm to\nundo the two module changes and restore your all_perms.spt file\nfrom the saved .orig file.\n\nNB The above may lead to unexpected denials of the new nlmsg permission\nfor existing domains on your system and prevent new ssh sessions from\nbeing created. Recommend only inserting the netlink_xperm.cil module\njust prior to running the testsuite and removing immediately thereafter.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"policy,tests: add tests for netlink xperms"}},{"before":null,"after":"2953479db3410b3aee9033ee5de459145f8bcea3","ref":"refs/heads/smcsocket","pushedAt":"2024-08-16T14:43:08.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/extended_socket_class: test SMC sockets\n\nEnable SMC sockets and their dependencies in the defconfig and\nexercise them as part of the extended socket class tests.\nThis only verifies that socket create permission is checked\nagainst the correct class. The tests cover both usage of AF_SMC\nand AF_INET using the recently introduced IPPROTO_SMC.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/extended_socket_class: test SMC sockets"}},{"before":"3aedfc0089e59c59442ad14ff2d3bea0da322c36","after":"e3597f50f338565b89cbc9b23c7329e01019eb21","ref":"refs/heads/execheapregression","pushedAt":"2024-08-08T18:37:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/mmap: add tests for execheap regression\n\nAdd tests for the execheap regression introduced by commit 68df1baf158f\n(\"selinux: use vma_is_initial_stack() and vma_is_initial_heap()\").\n\nThe reproducer code is from Marc Reisner, slightly amended for\nrunning within the testsuite.\n\nReported-by: Marc Reisner \nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/mmap: add tests for execheap regression"}},{"before":null,"after":"3aedfc0089e59c59442ad14ff2d3bea0da322c36","ref":"refs/heads/execheapregression","pushedAt":"2024-08-08T18:26:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/mmap: add tests for execheap regression\n\nAdd tests for the execheap regression introduced by commit 68df1baf158f\n(\"selinux: use vma_is_initial_stack() and vma_is_initial_heap()\").\n\nThe reproducer code is from Marc Reisner, slightly amended for\nrunning within the testsuite.\n\nReported-by: Marc Reisner \nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/mmap: add tests for execheap regression"}},{"before":"9c4e753a0894d3b170f8bec3ae0f8d57db50c70c","after":null,"ref":"refs/heads/sandbox","pushedAt":"2024-06-07T18:48:38.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"}},{"before":"ce5e5aaca5c2c0f818cce8f0f4039f36c415682a","after":null,"ref":"refs/heads/nftables","pushedAt":"2024-06-07T18:48:32.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"}},{"before":"ce0fcbfe5690dd44a015562145848b3befdbf6f3","after":null,"ref":"refs/heads/nfsfixes","pushedAt":"2024-06-07T18:48:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"}},{"before":"779de186037b4cc8c9e496885188b7bb95d45d70","after":null,"ref":"refs/heads/fixinetsocket","pushedAt":"2024-06-07T18:48:18.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"}},{"before":"d90c5941903b8fef9041bc90445f9d8d714dac7b","after":null,"ref":"refs/heads/defconfig-fat-gre","pushedAt":"2024-06-07T18:48:10.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"}},{"before":"72ed9de4f15b204188f63722d4adb2db0cc2d223","after":"0815abcd70b382e13592264ce39bf48742421cc8","ref":"refs/heads/main","pushedAt":"2024-06-03T16:49:24.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: comment out failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Comment out the 2nd mount, which also\nresolves the failure.\n\nThis bug is tracked in\nhttps://github.com/SELinuxProject/selinux-testsuite/issues/92\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley \nSigned-off-by: Ondrej Mosnacek ","shortMessageHtmlLink":"tests/nfs_filesystem: comment out failing mount"}},{"before":"010984cee2736ccd069d23ab986dc43d44b0f464","after":"ce0fcbfe5690dd44a015562145848b3befdbf6f3","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-31T13:05:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: comment out failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Comment out the 2nd mount, which also\nresolves the failure.\n\nThis bug is tracked in\nhttps://github.com/SELinuxProject/selinux-testsuite/issues/92\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/nfs_filesystem: comment out failing mount"}},{"before":"02d128dbc4d06f0f286a066d810e7a2f8ad63ca4","after":"010984cee2736ccd069d23ab986dc43d44b0f464","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-31T13:00:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: comment out failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Comment out the 2nd mount, which also\nresolves the failure.\n\nThis bug is tracked in\nhttps://github.com/SELinuxProject/selinux-testsuite/issues/92\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/nfs_filesystem: comment out failing mount"}},{"before":"54dd47eac5a786a51b03981a5a9046287a68d42a","after":"02d128dbc4d06f0f286a066d810e7a2f8ad63ca4","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-30T19:26:10.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: comment out failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Comment out the 2nd mount, which also\nresolves the failure.\n\nThis bug is tracked in\nhttps://github.com/SELinuxProject/selinux-testsuite/issues/92\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/nfs_filesystem: comment out failing mount"}},{"before":"02d128dbc4d06f0f286a066d810e7a2f8ad63ca4","after":"54dd47eac5a786a51b03981a5a9046287a68d42a","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-30T18:51:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: comment out failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Comment out the 2nd mount, which also\nresolves the failure.\n\nThis bug is tracked in\nhttps://github.com/SELinuxProject/selinux-testsuite/issues/92\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/nfs_filesystem: comment out failing mount"}},{"before":"29984fa252fe9758ae8e578c918991e07b72d2a6","after":"02d128dbc4d06f0f286a066d810e7a2f8ad63ca4","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-30T18:14:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: comment out failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Comment out the 2nd mount, which also\nresolves the failure.\n\nThis bug is tracked in\nhttps://github.com/SELinuxProject/selinux-testsuite/issues/92\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/nfs_filesystem: comment out failing mount"}},{"before":"ace13ada1d5b5e10ea8c60639ef91ea516e86cc2","after":"29984fa252fe9758ae8e578c918991e07b72d2a6","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-29T17:05:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/nfs_filesystem: remove failing mount\n\nFor reasons unclear, we attempt to mount twice, the 2nd time yields EBUSY,\nand then the following test fails. Remove the 2nd mount, which also\nresolves the failure.\n\nBefore:\nRun NFS context specific tests\nnfs_filesystem/test .. 2/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 30/56 creat(2) Failed: Permission denied\n\n# Failed test at nfs_filesystem/test line 118.\nnfs_filesystem/test .. 53/56 # Looks like you failed 2 tests of 56.\nnfs_filesystem/test .. Dubious, test returned 2 (wstat 512, 0x200)\nFailed 2/56 subtests\n\nTest Summary Report\n-------------------\nnfs_filesystem/test (Wstat: 512 (exited 2) Tests: 56 Failed: 2)\n Failed tests: 7, 35\n Non-zero exit status: 2\nFiles=1, Tests=56, 12 wallclock secs ( 0.02 usr 0.00 sys + 0.15 cusr 0.25 csys = 0.42 CPU)\nResult: FAIL\nFailed 1/1 test programs. 2/56 subtests failed.\nError on line: 104 - Closing down NFS\numount: /mnt/selinux-testsuite: not mounted.\nNFS Closed down\n\nAfter:\nNo errors from this test script.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tests/nfs_filesystem: remove failing mount"}},{"before":null,"after":"ace13ada1d5b5e10ea8c60639ef91ea516e86cc2","ref":"refs/heads/nfsfixes","pushedAt":"2024-05-06T17:52:28.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tools/nfs.sh: comment out the fscontext= tests for now\n\nThese tests currently fail on mount(2) calls due to the directory being\nunlabeled at the point where search access is checked. Until we can resolve\nthe underlying issue, comment out these tests to allow the NFS tests to\nbe run.\n\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"tools/nfs.sh: comment out the fscontext= tests for now"}},{"before":"6b283641fa4c8c554bd5476c9660667acf6e3c74","after":"72ed9de4f15b204188f63722d4adb2db0cc2d223","ref":"refs/heads/main","pushedAt":"2024-04-09T19:08:05.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy: avoid usage of fedora specific install_t\n\nThe type install_t is fedora specific and not declared in the Reference\nPolicy.\nAvoid linker failures by using anaconda_fd_use() if available.\n\nFixes: f9f4a604b50e (\"policy: fix testsuite_domain_type_minimal() to work with rpm-ostree\")\nSigned-off-by: Christian Göttsche ","shortMessageHtmlLink":"policy: avoid usage of fedora specific install_t"}},{"before":"ab02919a0f9db4b6f3d162073b93380d80478014","after":"6b283641fa4c8c554bd5476c9660667acf6e3c74","ref":"refs/heads/main","pushedAt":"2023-12-15T20:29:13.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"ci: bump actions/checkout to v4\n\nSigned-off-by: Ondrej Mosnacek ","shortMessageHtmlLink":"ci: bump actions/checkout to v4"}},{"before":null,"after":"ce5e5aaca5c2c0f818cce8f0f4039f36c415682a","ref":"refs/heads/nftables","pushedAt":"2023-11-27T18:39:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"defconfig: add NF_TABLES dependency for netlink_socket tests to pass\n\nIn order to support the NETFILTER_NETLINK protocol, either NF_TABLES or IP_SET must be enabled.\nNeither are strict dependencies in Kconfig. Fix this by enabling NF_TABLES in the defconfig.\n\nBefore:\n ./netlinkcreate: socket(AF_NETLINK, SOCK_DGRAM, netfilter/12): Protocol not supported\n not ok 3\n # Test 3 got: \"256\" (./test at line 25)\n # Expected: \"0\"\n # ./test line 25 is: ok( $result, 0 );\n\nAfter:\n ok 3\n\nSigned-off-by: Alan Wandke ","shortMessageHtmlLink":"defconfig: add NF_TABLES dependency for netlink_socket tests to pass"}},{"before":null,"after":"ab02919a0f9db4b6f3d162073b93380d80478014","ref":"refs/heads/main","pushedAt":"2023-07-19T13:33:28.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy: allow all test domains to search user/admin home directories\n\nThe permissions are sometimes needed to resolve paths when running the\ntestsuite from a user/admin home directory. To avoid cluttering\nindividual policy files with macros that allow it, apply the macros to\nthe whole testsuite_domain attribute. Thankfully this doesn't break the\nother tests.\n\nThis also fixes the inet_socket test, which started to require these\npermissions after a recent change.\n\nWhile there, also remove userdom_read_user_tmp_files() from\ntest_overlay_mounter_t, which doesn't seem to be needed.\n\nFixes: 4dcea27ada77 (\"tests/inet_socket: cover the MPTCP protocol\")\nInspired-by: Stephen Smalley \nTested-by: Stephen Smalley \nSigned-off-by: Ondrej Mosnacek ","shortMessageHtmlLink":"policy: allow all test domains to search user/admin home directories"}},{"before":null,"after":"779de186037b4cc8c9e496885188b7bb95d45d70","ref":"refs/heads/fixinetsocket","pushedAt":"2023-07-14T18:04:34.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"policy: allow inet socket test domains to search user home content\n\nThis is necessary for resolving pathnames when running the testsuite\nfrom a user home directory.\n\nReproducer:\n1. Clone selinux-testsuite into home directory.\n2. Try running it there.\n\nBefore:\ninet_socket/tcp/test ........ Flag file open: Permission denied\n(test hangs)\n\nAfter:\nall tests complete and pass\n\nFixes: 4dcea27ada77f51c2868095e951aab790374fba9 (\"tests/inet_socket:\ncover the MPTCP protocol\")\nSigned-off-by: Stephen Smalley ","shortMessageHtmlLink":"policy: allow inet socket test domains to search user home content"}},{"before":"65cbbb8c4a4cafd1b307bfbd954acd7c5a653bb8","after":"17fecc443e267407f2f48e2cb17fbe83699f235d","ref":"refs/heads/master","pushedAt":"2023-03-20T13:52:10.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"stephensmalley","name":"Stephen Smalley","path":"/stephensmalley","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7840580?s=80&v=4"},"commit":{"message":"tests/atsecure: avoid running bash under test domains\n\nThe 'env' utility can be used just as well. This avoids the \"bash:\n/root/.bashrc: Permission denied\" error message that appears when the\ntestsuite is ran with a terminal attached to the stdout/stdin and the\ncorresponding AVC denials.\n\nSigned-off-by: Ondrej Mosnacek ","shortMessageHtmlLink":"tests/atsecure: avoid running bash under test domains"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yN1QxNTozNjo0My4wMDAwMDBazwAAAATCxQjW","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wMy0yMFQxMzo1MjoxMC4wMDAwMDBazwAAAAMHNKaj"}},"title":"Activity · stephensmalley/selinux-testsuite"}