From patchwork Wed Aug 24 14:11:53 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Guido Trentalancia X-Patchwork-Id: 9297939 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 4ABB360757 for ; Wed, 24 Aug 2016 14:13:15 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3D8C42903F for ; Wed, 24 Aug 2016 14:13:15 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 308162904F; Wed, 24 Aug 2016 14:13:15 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (smtp.nsa.gov [8.44.101.9]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 2C59B29032 for ; Wed, 24 Aug 2016 14:13:12 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.28,570,1464652800"; d="scan'208";a="18715880" IronPort-PHdr: =?us-ascii?q?9a23=3A0IGBfRRACFf5mKr8cNq9Or3+TNpsv+yvbD5Q0YIu?= =?us-ascii?q?jvd0So/mwa65ZRKN2/xhgRfzUJnB7Loc0qyN4vmmAjJLvs/J8ChbNscdD1ld0Y?= =?us-ascii?q?RetjdjKfbNMVf8Iv/uYn5yN+V5f3ghwUuGN1NIEt31fVzYry76xzcTHhLiKVg9?= =?us-ascii?q?fbytScbshsi6n9q/54fUK10RwmHsOPUpcl7p9E2R7pBQ2to6bP5pi1PgmThhQ6?= =?us-ascii?q?xu32RmJFaezV7Xx/yb29pdyRlWoO8r7MVaUK/3LOwSRL1cCyk6YShuvJW4/SLb?= =?us-ascii?q?RA6v63IQX384kxdMD0Dl4Rj2U425iSD9rOt712HaZpW3Ho0uXXyey4sjCFqx0G?= =?us-ascii?q?ZUfwI+pXrajs12kbJzvAOqpxs5xZXdJo6SKqlQZKTYKPwHRGZGFvpLWipdC4e1?= =?us-ascii?q?aYAOBqJVMvtZo47Vu0EDqwe3AQCqD+LmjDlFmimljuUBz+09HFSej0QbFNUUvS?= =?us-ascii?q?GO9Ng=3D?= X-IPAS-Result: =?us-ascii?q?A2FbBQAeqr1X/wHyM5BdHQGDCwEBAQEBHoFSugIjh0tMAQE?= =?us-ascii?q?BAQEBAQIBAlsngjIKgiYCBAECNxQgDgMJAQEXJwIICAMBLQwJEQ4LBRgEiBEEv?= =?us-ascii?q?y+PDBEBaIUQBZlIkAmJCYVgjECDeVSDf26GIYIfAQEB?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP; 24 Aug 2016 14:12:32 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id u7OEC1EO031537; Wed, 24 Aug 2016 10:12:07 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id u7OEC04m169125 for ; Wed, 24 Aug 2016 10:12:00 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id u7OEC09H031520 for ; Wed, 24 Aug 2016 10:12:00 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1CzAQAeqr1Xh0c2WFFdLwGCeQEBAQEBgXCkWZEmhA2GHQKCEQEBAQEBAQECEwEBAQgNCQkZhRECAQMjZiUCGA4CAj0aGYg2rnuQAwEwgQKPBII2gloFmUiQCY5pjECDeYJ6gVluiEABAQE X-IPAS-Result: A1CzAQAeqr1Xh0c2WFFdLwGCeQEBAQEBgXCkWZEmhA2GHQKCEQEBAQEBAQECEwEBAQgNCQkZhRECAQMjZiUCGA4CAj0aGYg2rnuQAwEwgQKPBII2gloFmUiQCY5pjECDeYJ6gVluiEABAQE X-IronPort-AV: E=Sophos;i="5.28,570,1464667200"; d="scan'208";a="5662906" Received: from emsm-gh1-uea11.corp.nsa.gov (HELO emsm-gh1-uea11.nsa.gov) ([10.208.41.37]) by goalie.tycho.ncsc.mil with ESMTP; 24 Aug 2016 10:11:59 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3APYpfcRFPcaxLvDO/rMvOKZ1GYnF86YWxBRYc798d?= =?us-ascii?q?s5kLTJ74p86wAkXT6L1XgUPTWs2DsrQf2rOQ6P6rBjVIoc7Y9itTKNoUD15NoP?= =?us-ascii?q?5VtjRoONSCB0z/IayiRA0BN+MGamVY+WqmO1NeAsf0ag6aiHSz6TkPBke3blIt?= =?us-ascii?q?dazLE4Lfx/66y/q1s8WKJV4Z3XzmP/gtdV329VyX7ZhOx9M6a+4Y8VjgmjNwYe?= =?us-ascii?q?NYxGdldxq4vi3XwYOOxqNl6DlaoPk79sRNAu3QdqU8SqFEXnx9azhmrPbzvBzj?= =?us-ascii?q?QAKD62EyU2gSnlJoDgHJ4QuyZZz2qCr8uaI9g3HbboXKSuUvVDCj6bp7YAP5gy?= =?us-ascii?q?cAcTgi+SfYjdIjorhcpUeOuh1zxMboeoyTKPN6d6XWfNpSEWVcX8pWfzBbD4Wg?= =?us-ascii?q?Zo8GCeEANKBeopWr9AhGlge3GQT5XLCn8TRPnHKjhvU3?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0FRAgAeqr1Xh0c2WFFdLwGCeQEBAQEBg?= =?us-ascii?q?XCkWZEmhA2GHQKCEQEBAQEBAQECAQIQAQEBCA0JCRkvgjIKgiYCAQMjZiUCGA4?= =?us-ascii?q?CAj0aGYg2rnuQAwEwgQKPBII2gloFmUiQCY5pjECDeYJ6gVluiEABAQE?= X-IPAS-Result: =?us-ascii?q?A0FRAgAeqr1Xh0c2WFFdLwGCeQEBAQEBgXCkWZEmhA2GHQK?= =?us-ascii?q?CEQEBAQEBAQECAQIQAQEBCA0JCRkvgjIKgiYCAQMjZiUCGA4CAj0aGYg2rnuQA?= =?us-ascii?q?wEwgQKPBII2gloFmUiQCY5pjECDeYJ6gVluiEABAQE?= X-IronPort-AV: E=Sophos;i="5.28,570,1464652800"; d="scan'208";a="18715811" Received: from authsmtp30.register.it (HELO authsmtp.register.it) ([81.88.54.71]) by emsm-gh1-uea11.nsa.gov with ESMTP/TLS/DHE-RSA-AES128-SHA; 24 Aug 2016 14:11:56 +0000 Received: from vortex.lan ([151.76.69.70]) by paganini35 with id b2Bt1t00Z1Wy5Br012Bt37; Wed, 24 Aug 2016 16:11:54 +0200 X-Rid: guido@trentalancia.net@151.76.69.70 Message-ID: <1472047913.4446.7.camel@trentalancia.net> Subject: [PATCH v2] Build the SELinux testsuite on systems using the Reference Policy From: Guido Trentalancia To: selinux@tycho.nsa.gov Date: Wed, 24 Aug 2016 16:11:53 +0200 In-Reply-To: <1472042396.4446.4.camel@trentalancia.net> References: <1472042396.4446.4.camel@trentalancia.net> X-Mailer: Evolution 3.20.5 Mime-Version: 1.0 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Fix the Makefile in the policy subdirectory of the SELinux testsuite so that it builds correctly on the standard Reference Policy which does not have the same booleans available on Red Hat. Signed-off-by: Guido Trentalancia --- policy/Makefile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- selinux-testsuite-git-23082016-orig/policy/Makefile 2016-08-23 20:50:08.527633728 +0200 +++ selinux-testsuite-git-23082016/policy/Makefile 2016-08-24 14:38:08.987455031 +0200 @@ -68,7 +68,7 @@ load_rhel: all load_general: all # General policy load - /usr/sbin/setsebool allow_domain_fd_use=0 + /usr/sbin/getsebool -a | grep -q allow_domain_fd_use && /usr/sbin/setsebool allow_domain_fd_use=0 || : $(SEMODULE) -i test_policy/test_policy.pp unload_rhel: @@ -77,7 +77,7 @@ unload_rhel: unload_general: # General policy unload - /usr/sbin/setsebool allow_domain_fd_use=1 + /usr/sbin/getsebool -a | grep -q allow_domain_fd_use && /usr/sbin/setsebool allow_domain_fd_use=1 || : $(SEMODULE) -r test_policy clean: