aboutgitcodebugslistschat
path: root/test/tcp/git:
diff options
context:
space:
mode:
authorStefano Brivio <sbrivio@redhat.com>2026-01-16 16:48:46 +0100
committerStefano Brivio <sbrivio@redhat.com>2026-01-16 17:22:44 +0100
commita6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e (patch)
tree2c9c522515960bda59daf044a69cf60366ee0432 /test/tcp/git:
parent4296a59034b0ebe805221d02554477b899ac9fb3 (diff)
downloadpasst-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.tar
passt-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.tar.gz
passt-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.tar.bz2
passt-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.tar.lz
passt-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.tar.xz
passt-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.tar.zst
passt-a6d92ca82c9ea0b395aa56c568ee6b6e6d4ac81e.zip
selinux: Enable open permissions on netns directory, operations on container_var_run_t
Tuomo reports two further SELinux denials after upgrading to a passt-selinux version that includes the transition to pasta_t for containers, one I could reproduce: denied { open } for pid=3343050 comm="pasta.avx2" path="/run/user/1000/netns" dev="tmpfs" ino=51 scontext=unconfined_u:unconfined_r:pasta_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1 which I didn't take care of in the previous commit, d2c5133990a7 ("selinux: Enable read and watch permissions on netns directory as well"), as it didn't appear in my quick test. But I can make pasta use "open" on the network namespace entry by simply using it to make connections. So, for that, add "open" to the existing rule for user_tmp_t:dir. Then, another one I couldn't reproduce instead: denied { write } for pid=3589324 comm="pasta.avx2" name="rootless-netns" dev="tmpfs" ino=36 scontext=unconfined_u:unconfined_r:pasta_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:container_var_run_t:s0 tclass=dir permissive=0 which, I think, comes from a specific combination of versions of container-selinux, Podman, and passt-selinux packages, which prevents the expected type transition on container_var_run_t unless restorecon is invoked manually, or until a reboot. Allowing the same permissions on container_var_run_t as we do on ifconfig_var_run_t is harmless, so do that to prevent this further denial. Reported-by: Tuomo Soini <tis@foobar.fi> Fixes: d2c5133990a7 ("selinux: Enable read and watch permissions on netns directory as well") Fixes: 7aeda16a7818 ("selinux: Transition to pasta_t in containers") Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'test/tcp/git:')
0 files changed, 0 insertions, 0 deletions