On Friday 25 July 2008 12:40:25 you wrote: > On what type of system did the new test succeed for you? > On rawhide, capget appears to malfunction: > > # rm t;>t;strace -e capget setcap cap_net_bind_service=ep t 2>&1|cut > -c-78 capget(0x20071026, 0, NULL) = -1 EFAULT (Bad address) > capget(0x20071026, 0, > {CAP_CHOWN|CAP_DAC_OVERRIDE|CAP_DAC_READ_SEARCH|CAP_FOWN capget(0x20071026, > 0, NULL) = -1 EFAULT (Bad address) Failed to set capabilities > on file `t' (Operation not permitted) usage: setcap [-q] (-r|-|<caps>) > <filename> [ ... (-r|-|<capsN>) <filenameN> ] > > Note <filename> must be a regular (non-symlink) file. > > Considering the test doesn't pass anywhere I've tried, I'm in > no hurry to apply it. Setting of capabilities is not permitted by SELinux on rawhide by default. This test succeeds on rawhide, while SELinux is in permissive mode (setenforce 0).
Now I am looking for proper solution - asked SELinux developers, waiting for response. Kamil _______________________________________________ Bug-coreutils mailing list Bug-coreutils@gnu.org http://lists.gnu.org/mailman/listinfo/bug-coreutils