Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

C9s build 20241010 #2383

Merged
merged 8 commits into from
Oct 10, 2024
Merged

C9s build 20241010 #2383

merged 8 commits into from
Oct 10, 2024

Conversation

zpytela
Copy link
Contributor

@zpytela zpytela commented Oct 10, 2024

No description provided.

Resolves: RHEL-17346
Support for Cornelis Omni-Path Express Gen1 driver.

Resolves: RHEL-54996
ptp4l uses the generic netlink socket to get information about virtual
PTP clocks for checking whether a PHC not matching the physical NIC PHC
is a virtual clock. Binding a generic netlink socket requires the
sys_admin capability.

Resolves: RHEL-55133
The new stalld version makes use of bpf programs to monitor run queues
instead of parsing /sys/kernel/debug/sched/debug. For changing thread
scheduling policies, CAP_SYS_RESOURCE is required.

Resolves: RHEL-57075
It turned up the previous commit b677f73 ("Update stalld policy
for bpf usage") was incomplete and there are additional permissions
and capabilities needed.

Resolves: RHEL-57075
The commit addresses the following AVC denial:
type=PROCTITLE msg=audit(2.7.2024 15:31:59.064:1036) : proctitle=boothd daemon -c /etc/booth/booth.conf
type=AVC msg=audit(07/02/24 15:31:59.064:1036) : avc:  denied  { read } for  pid=13949 comm=boothd name=userdb dev="tmpfs" ino=47 scontext=system_u:system_r:boothd_t:s0 tcontext=system_u:object_r:systemd_userdbd_runtime_t:s0 tclass=dir permissive=0
type=SYSCALL msg=audit(07/02/24 15:31:59.064:1036) : arch=x86_64 syscall=openat success=no exit=EACCES(Permission denied) a0=AT_FDCWD a1=0x7fe048ca39cf a2=O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC a3=0x0 items=0 ppid=13894 pid=13949 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=boothd exe=/usr/sbin/boothd subj=system_u:system_r:boothd_t:s0 key=(null)

Resolves: RHEL-57104
It actually allows boothd connect to systemd-userdbd over a unix socket
when the socket is still labeled as kernel_t.

The commit addresses the following AVC denial:
type=PROCTITLE msg=audit(09/09/2024 15:21:42.512:2513) : proctitle=/usr/sbin/boothd daemon -S -c /etc/booth/booth.conf
type=PATH msg=audit(09/09/2024 15:21:42.512:2513) : item=0 name=/run/systemd/userdb/io.systemd.DynamicUser inode=43 dev=00:1b mode=socket,666 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:systemd_userdbd_runtime_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0
type=SOCKADDR msg=audit(09/09/2024 15:21:42.512:2513) : saddr={ saddr_fam=local path=/run/systemd/userdb/io.systemd.DynamicUser }
type=SYSCALL msg=audit(09/09/2024 15:21:42.512:2513) : arch=x86_64 syscall=connect success=no exit=EACCES(Permission denied) a0=0x4 a1=0x7fff90ca7ec0 a2=0x2d a3=0x55fe78f35430 items=1 ppid=1 pid=61596 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=boothd exe=/usr/sbin/boothd subj=system_u:system_r:boothd_t:s0 key=(null)
type=AVC msg=audit(09/09/2024 15:21:42.512:2513) : avc:  denied  { connectto } for  pid=61596 comm=boothd path=/systemd/userdb/io.systemd.DynamicUser scontext=system_u:system_r:boothd_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_stream_socket permissive=0

Resolves: RHEL-57104
@zpytela zpytela merged commit fa8b167 into fedora-selinux:c9s Oct 10, 2024
0 of 2 checks passed
@zpytela zpytela deleted the c9s-build-20241010 branch October 25, 2024 13:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant