On Friday, November 06, 2015 02:07:22 PM Jan Stancek wrote: > When running selinux-testsuite in automated environment, > such as Beaker, stdin is usually /dev/null. This causes > problem for inet_socket test: > secon: Couldn't read security context: Inappropriate ioctl for device > > Signed-off-by: Jan Stancek <jstancek@xxxxxxxxxx> > Cc: Paul Moore <paul@xxxxxxxxxxxxxx> > Cc: Stephen Smalley <sds@xxxxxxxxxxxxx> > --- > tests/inet_socket/ipsec-load | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) Looks good to me, merged. > diff --git a/tests/inet_socket/ipsec-load b/tests/inet_socket/ipsec-load > index ded6efb04722..b9d2c6e43544 100755 > --- a/tests/inet_socket/ipsec-load > +++ b/tests/inet_socket/ipsec-load > @@ -3,8 +3,8 @@ echo 0 > /proc/sys/net/ipv4/conf/lo/disable_xfrm > echo 0 > /proc/sys/net/ipv4/conf/lo/disable_policy > ip xfrm policy flush > ip xfrm state flush > -goodclientcon=`secon -u`:`secon -r`:test_inet_client_t:`secon -m` > -badclientcon=`secon -u`:`secon -r`:test_inet_bad_client_t:`secon -m` > +goodclientcon=`secon -u --pid $$`:`secon -r --pid > $$`:test_inet_client_t:`secon -m --pid $$` +badclientcon=`secon -u --pid > $$`:`secon -r --pid $$`:test_inet_bad_client_t:`secon -m --pid $$` ip xfrm > state add src 127.0.0.1 dst 127.0.0.1 proto ah spi 0x200 ctx $goodclientcon > auth md5 0123456789012345 ip xfrm state add src 127.0.0.1 dst 127.0.0.1 > proto ah spi 0x250 ctx $badclientcon auth md5 0123456789012345 ip xfrm > policy add src 127.0.0.1 dst 127.0.0.1 proto tcp dir out ctx > "system_u:object_r:test_spd_t:s0" tmpl proto ah mode transport level > required -- paul moore www.paul-moore.com _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.