Hi,
I got fail for TC netns_2children (under kernel/containers/netns) when using
SELinux policy MLS in enforcing mode:
netns_child_2.sh 1 TFAIL : FAIL: Unable to ping Child1NS from Child2NS !
netns_child_1.sh 1 TFAIL : CHILD2 is unable to reach CHILD1
netns_2children 1 TFAIL : netns_two_children_ns.c:125: waitpid() returns
22672, errno 255
..but it passes for permissive mode (setenforce 0), so I can either report bug
on SELinux policy
or we must test this TC in permissive mode. I think reporting bug on SELinux
policy is better solution,
what do you think ?
More details (after test fail):
# ausearch -m avc -ts recent | grep ping
type=SYSCALL msg=audit(1413219951.925:1481): arch=c000003e syscall=46
success=yes exit=64 a0=5 a1=7fc90a490160 a2=0 a3=0 items=0 ppid=21088 pid=21167
auid=995 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1
ses=17 comm="ping" exe="/usr/bin/pin "
subj=staff_u:lspp_test_r:lspp_harness_t:s0-s15:c0.c1023 key=(null)
type=AVC msg=audit(1413219951.925:1481): avc: denied { egress } for
pid=21167 comm= ping" saddr=192.168.0.184 daddr=192.168.0.182 netif=veth0
scontext=system_u:object_r:unlabeled_t:s0
tcontext=system_u:object_r:netif_t:s0-s15:c0.c1023 tclass=netif
# ausearch -m avc -ts recent | grep ping | audit2allow
#============= unlabeled_t ==============
allow unlabeled_t netif_t:netif egress;
Thanks,
Matus Marhefka
------------------------------------------------------------------------------
Comprehensive Server Monitoring with Site24x7.
Monitor 10 servers for $9/Month.
Get alerted through email, SMS, voice calls or mobile push notifications.
Take corrective actions from your mobile device.
http://p.sf.net/sfu/Zoho
_______________________________________________
Ltp-list mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ltp-list