On Wed, Apr 28, 2021 at 6:54 AM Ondrej Mosnacek <omosnace@xxxxxxxxxx> wrote: > On Tue, Apr 27, 2021 at 10:15 PM Paul Moore <paul@xxxxxxxxxxxxxx> wrote: > > Starting with Linux v5.12 CAP_SETFCAP is required to map UID 0/root. > > This is due to kernel commit db2e718a4798 ("capabilities: require > > CAP_SETFCAP to map uid 0"). In order to resolve this in the test > > suite allow the cap_userns test domains to exercise the setfcap > > capability. > > > > Signed-off-by: Paul Moore <paul@xxxxxxxxxxxxxx> > > --- > > policy/test_cap_userns.te | 3 +++ > > 1 file changed, 3 insertions(+) > > > > diff --git a/policy/test_cap_userns.te b/policy/test_cap_userns.te > > index ab74325..9683870 100644 > > --- a/policy/test_cap_userns.te > > +++ b/policy/test_cap_userns.te > > @@ -12,6 +12,9 @@ unconfined_runs_test(test_cap_userns_t) > > typeattribute test_cap_userns_t testdomain; > > typeattribute test_cap_userns_t capusernsdomain; > > > > +# linux >= v5.12 needs setfcap to map UID 0 > > +allow capusernsdomain self:capability setfcap; > > + > > # This domain is allowed sys_admin on non-init userns for mount. > > allow test_cap_userns_t self:cap_userns sys_admin; > > Thanks! Would you mind if I move the new rule to the end of the file > (where other rules for the attribute live) and tweak the subject line? > The final commit is available for preview here: > https://github.com/WOnder93/selinux-testsuite/commit/fd4254f09316f6db0410a9187cb8866571f109b5 Sure, do whatever you think is best; you can even replace my little patch with another that you like better. My main concern is just making sure the test suite is fixed and working :) -- paul moore www.paul-moore.com