On 10/05/2017 01:38 PM, Jeremy Eder
wrote:
I
don't see any avc when it fails while label:disable is set.
I
ran semodule -DB and retried. I now see dontaudit stuff but
still no interesting denials.
I'm
not sure if you were talking to me or Frank with the atomic
command line...
I
pulled the label out docker inspect on the systemtap image so
I can run it manually. Here is what I am running.
All
I have added is the --security-opt label:disable part.
# docker run --security-opt label:disable
--cap-add SYS_ADMIN -v /sys/kernel/debug:/sys/kernel/debug
-v /usr/src/kernels:/usr/src/kernels -v
/usr/lib/modules/:/usr/lib/modules/ -v
/usr/lib/debug:/usr/lib/debug -t -i --name systemtap candidate-registry.fedoraproject.org/f26/systemtap
Should be SYS_MODULE not SYS_ADMIN or maybe both.
I also tried
with --security-opt seccomp:unconfimed. That did not help.
Adding
--privileged to the above command line, and systemtap works.
This is likely the key difference between why
systemtap has always worked in the rhel-tools
container...the label on that image includes --privileged.
|
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx