-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This is a test case to demonstrate the selinux vs dmz issue. The issue is, runc calls selinux.SetExecLabel and then execs the runc-dmz binary, but the execve is denied by selinux: > type=PROCTITLE msg=audit(10/05/2023 22:54:07.911:10904) : proctitle=/tmp/bats-run-sGk2sn/runc.Ql243q/bundle/runc init > type=SYSCALL msg=audit(10/05/2023 22:54:07.911:10904) : arch=x86_64 syscall=execveat success=no exit=EACCES(Permission denied) a0=0x6 a1=0xc0000b90fa a2=0xc0000a26a0 a3=0xc000024660 items=0 ppid=105316 pid=105327 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=pts0 ses=8 comm=runc:[2:INIT] exe=/tmp/bats-run-sGk2sn/runc.Ql243q/bundle/runc subj=unconfined_u:unconfined_r:container_runtime_t:s0-s0:c0.c1023 key=(null) > type=AVC msg=audit(10/05/2023 22:54:07.911:10904) : avc: denied { entrypoint } for pid=105327 comm=runc:[2:INIT] path=/memfd:runc_cloned:runc-dmz (deleted) dev="tmpfs" ino=2341 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=unconfined_u:object_r:container_runtime_tmpfs_t:s0 tclass=file permissive=0 (The above error is Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
- Loading branch information
Showing
3 changed files
with
63 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
#!/usr/bin/env bats | ||
|
||
load helpers | ||
|
||
function setup() { | ||
requires root # for chcon | ||
if ! selinuxenabled; then | ||
skip "requires SELinux enabled and in enforcing mode" | ||
fi | ||
|
||
setup_busybox | ||
|
||
# Use a copy of runc binary with proper selinux label set. | ||
cp "$RUNC" . | ||
export RUNC="$PWD/runc" | ||
chcon -u system_u -r object_r -t container_runtime_exec_t "$RUNC" | ||
|
||
# Label container fs. | ||
chcon -u system_u -r object_r -t container_file_t -R rootfs | ||
|
||
# Save the start date and time for ausearch. | ||
AU_DD="$(date +%x)" | ||
AU_TT="$(date +%H:%M:%S)" | ||
} | ||
|
||
function teardown() { | ||
teardown_bundle | ||
# Show any avc denials. | ||
if command -v ausearch &>/dev/null; then | ||
ausearch -ts "$AU_DD" "$AU_TT" -i -m avc || true | ||
fi | ||
} | ||
|
||
# Baseline test, to check that runc works with selinux enabled. | ||
@test "runc run (no selinux label)" { | ||
update_config ' .process.args = ["/bin/true"]' | ||
runc run tst | ||
[ "$status" -eq 0 ] | ||
} | ||
|
||
# https://github.com/opencontainers/runc/issues/4057 | ||
@test "runc run (custom selinux label)" { | ||
update_config ' .process.selinuxLabel |= "system_u:system_r:container_t:s0:c4,c5" | ||
| .process.args = ["/bin/true"]' | ||
runc run tst | ||
[ "$status" -eq 0 ] | ||
} | ||
|
||
@test "runc run (custom selinux label, RUNC_DMZ=legacy)" { | ||
export RUNC_DMZ=legacy | ||
update_config ' .process.selinuxLabel |= "system_u:system_r:container_t:s0:c4,c5" | ||
| .process.args = ["/bin/true"]' | ||
runc run tst | ||
[ "$status" -eq 0 ] | ||
} |