Skip to content

Conversation

@GargiQcom
Copy link

@GargiQcom GargiQcom commented Nov 27, 2025

type=AVC msg=audit(1754407901.439:65): avc: denied { create } for pid=625 comm="bootctl" name="loader" scontext=system_u:system_r:bootloader_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407901.403:56): avc: denied { net_admin } for pid=640 comm="modprobe" capability=12 scontext=system_u:system_r:kmod_t:s0 tcontext=system_u:system_r:kmod_t:s0 tclass=capability permissive=0
type=AVC msg=audit(1754407902.111:87): avc: denied { search } for pid=724 comm="mount" name="/" dev="configfs" ino=5121 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407902.111:88): avc: denied { search } for pid=724 comm="mount" name="adb" dev="configfs" ino=14873 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407903.327:187): avc: denied { execute } for pid=941 comm="libvirtd" name="daemon" dev="sda2" ino=165 scontext=system_u:system_r:virtd_t:s0 tcontext=system_u:object_r:virt_etc_rw_t:s0 tclass=file permissive=0
type=AVC msg=audit(1754407904.511:174): avc: denied { execute_no_trans } for pid=925 comm="libvirtd" path="/etc/libvirt/hooks/daemon" dev="sda2" ino=165 scontext=system_u:system_r:virtd_t:s0 tcontext=system_u:object_r:virt_etc_rw_t:s0 tclass=file permissive=0
type=AVC msg=audit(1754407902.331:103): avc: denied { search } for pid=738 comm="virtlockd" name="sbin" dev="sda2" ino=11213 scontext=system_u:system_r:virtlockd_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407902.343:105): avc: denied { search } for pid=738 comm="virtlockd" name="ssl" dev="sda2" ino=389 scontext=system_u:system_r:virtlockd_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407903.219:106): avc: denied { read } for pid=764 comm="virtlockd" name="openssl.cnf" dev="sda2" ino=692 scontext=system_u:system_r:virtlockd_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file permissive=0
type=AVC msg=audit(1754407904.299:165): avc: denied { sys_admin } for pid=889 comm="wpa_supplicant" capability=21 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=capability permissive=0
type=AVC msg=audit(1754407905.227:173): avc: denied { search } for pid=736 comm="systemd-logind" name="944" dev="proc" ino=15804 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=dir permissive=0

@GargiQcom GargiQcom changed the title Add sepolicy for bootloader to create directory in dosfs Add sepolicy for bootloader, virt, networkmanager, kmod, mount and systemd login Nov 28, 2025
Copy link
Member

@pebenito pebenito left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please remove the commits you intend to revert, instead of adding revert commits.

Comment on lines +638 to +643
interface(`initrc_daemon_search_dir',`
gen_require(`
type initrc_t;
')
allow $1 initrc_t:dir search_dir_perms;
')
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is accessing a /proc/pid directory. This may be dontauditable, and if not, it would likely be incomplete access. Are there errors from logind?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still need an answer for this.

type=AVC msg=audit(1754407901.439:65): avc:  denied  { create } for pid=625 comm="bootctl" name="loader" scontext=system_u:system_r:bootloader_t:s0 tcontext=system_u:object_r:dosfs_t:s0 tclass=dir permissive=0

Signed-off-by: Gargi Misra <[email protected]>
type=AVC msg=audit(1754407902.111:87): avc:  denied  { search } for  pid=724 comm="mount" name="/" dev="configfs" ino=5121 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407902.111:88): avc:  denied  { search } for  pid=724 comm="mount" name="adb" dev="configfs" ino=14873 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=dir permissive=0

Signed-off-by: Gargi Misra <[email protected]>
type=AVC msg=audit(1754407902.331:103): avc:  denied  { search } for  pid=738 comm="virtlockd" name="sbin" dev="sda2" ino=11213 scontext=system_u:system_r:virtlockd_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407902.343:105): avc:  denied  { search } for  pid=738 comm="virtlockd" name="ssl" dev="sda2" ino=389 scontext=system_u:system_r:virtlockd_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1754407903.219:106): avc:  denied  { read } for  pid=764 comm="virtlockd" name="openssl.cnf" dev="sda2" ino=692 scontext=system_u:system_r:virtlockd_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file permissive=0

Signed-off-by: Gargi Misra <[email protected]>
type=AVC msg=audit(1754407905.227:173): avc:  denied  { search } for  pid=736 comm="systemd-logind" name="944" dev="proc" ino=15804 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=dir permissive=0

Signed-off-by: Gargi Misra <[email protected]>
@GargiQcom
Copy link
Author

Hi @pebenito
Updated changes as per the comments

@pebenito
Copy link
Member

One question above still remains.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants