-
Notifications
You must be signed in to change notification settings - Fork 14
Open
Description
All the flies in /sysroot/composefs/objects
have the label system_u:object_r:root_t:s0
This causes AVC denials with selinux like the following
audit: type=1400 audit(1758694966.621:123): avc: denied { read } for pid=1006 comm="restorecon" path="/e7/b21bc6ba7080f331992e550543a28cd7d03382ef065a46f2326150e497965f" dev="vdb3" ino=681271 scontext=system_u:system_r:setfiles_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=file permissive=1
audit: type=1400 audit(1758694966.640:124): avc: denied { read } for pid=941 comm="agetty" path="/e2/2ed11c42842916ff956a27a586a1ac14fe83d5c3f4bac62e44632663a4b313" dev="vdb 3" ino=684166 scontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tcontext=system_u:object_r:root_t:s0 tclass=file permissive=1
audit: type=1400 audit(1758694964.795:3): avc: denied { read } for pid=640 comm="kdump-dep-gener" path="/33/73be7af612e45284fda8531c4883219c32e3416b5cf7cdbbfdd40605df436f" dev="vdb3" ino=678768 scontext=system_u:system_r:kdump_dep_generator_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=file permissive=1
audit: type=1400 audit(1758694964.828:4): avc: denied { read } for pid=669 comm="sed" path="/b1/32fabb5dbcc5830cfaeeba919a52d132f5851880054ec50559d43f9cfd10d8" dev="vdb3" in o=683644 scontext=system_u:system_r:kdump_dep_generator_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=file permissive=1
The repo object /e7/b21bc6ba7080f331992e550543a28cd7d03382ef065a46f2326150e497965f
points to /usr/lib64/libcap-ng.so.0.0.0
I haven't included all the AVC denials as there are quite a few.
Relabeling files in objects directory to their counterparts in the EROFS should fix this issue
Metadata
Metadata
Assignees
Labels
No labels