-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing rules for bootupd on Fedora CoreOS Rawhide #2362
Comments
@zpytela Gentle ping here. We would appreciate if we could that in Fedora 41. Thanks |
Hi @zpytela , could you help to look at this when at your convenience? We need this for Fedora 41. Thanks! |
All the denials are audited with permissive=1, i. e. all syscalls are allowed. Which service does not work properly? |
The commit addresses the following AVC denials: type=AVC msg=audit(1727251620.089:166): avc: denied { search } for pid=1475 comm="lsblk" name="udev" dev="tmpfs" ino=58 scontext=system_u:system_r:bootupd_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1727251620.089:167): avc: denied { read } for pid=1475 comm="lsblk" name="b252:0" dev="tmpfs" ino=1331 scontext=system_u:system_r:bootupd_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file permissive=1 type=AVC msg=audit(1727251620.089:168): avc: denied { open } for pid=1475 comm="lsblk" path="/run/udev/data/b252:0" dev="tmpfs" ino=1331 scontext=system_u:system_r:bootupd_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file permissive=1 type=AVC msg=audit(1727251620.089:169): avc: denied { getattr } for pid=1475 comm="lsblk" path="/run/udev/data/b252:0" dev="tmpfs" ino=1331 scontext=system_u:system_r:bootupd_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file permissive=1 Resolves: fedora-selinux#2362
|
I can't see my comment from yesterday where I asked which service created the /sysroot dir and files there as they are mislabeled. Reading udev runtime files is allowed in the PR which refers to this issue. |
|
In particular, the following permissions were allowed: - allow read files in /sysroot, which have root_t type - allow read udev pid files in case lsblk was executed from bootupd so no transition to udev applied - root_t as the default file context for /sysroot/.aleph-version.json Resolves: rhbz#2320395 Resolves: fedora-selinux#2362
I am going to merge all open PRs now, although some may not be a complete solution, and create a build. |
On Fedora CoreOS using Rawhide (using
selinux-policy-41.18-1.fc42.noarch
), get the following AVCs:And
We use
lsblk
in coreos/bootupd#729The text was updated successfully, but these errors were encountered: