Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Misc updates #828

Merged
merged 13 commits into from
Nov 6, 2024
Merged

Misc updates #828

merged 13 commits into from
Nov 6, 2024

Conversation

cgzones
Copy link
Contributor

@cgzones cgzones commented Oct 30, 2024

No description provided.

Copy link
Member

@pebenito pebenito left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A few minor nits.

Side note: I'd take a patch to add a codespell check in the lint github action, if you're willing.

policy/modules/kernel/files.if Show resolved Hide resolved
policy/modules/system/systemd.te Outdated Show resolved Hide resolved
policy/modules/system/userdomain.if Outdated Show resolved Hide resolved
Signed-off-by: Christian Göttsche <[email protected]>
    type=PROCTITLE msg=audit(28/10/24 14:04:16.969:146) : proctitle=/usr/lib/systemd/system-generators/systemd-ssh-generator /run/systemd/generator /run/systemd/generator.early /run/systemd/genera
    type=SYSCALL msg=audit(28/10/24 14:04:16.969:146) : arch=x86_64 syscall=socket success=yes exit=4 a0=vsock a1=SOCK_STREAM a2=ip a3=0x7 items=0 ppid=13019 pid=13030 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=systemd-ssh-gen exe=/usr/lib/systemd/system-generators/systemd-ssh-generator subj=system_u:system_r:systemd_generator_t:s0 key=(null)
    type=AVC msg=audit(28/10/24 14:04:16.969:146) : avc:  denied  { module_request } for  pid=13030 comm=systemd-ssh-gen kmod="net-pf-40" scontext=system_u:system_r:systemd_generator_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system permissive=1

Signed-off-by: Christian Göttsche <[email protected]>
    type=PROCTITLE msg=audit(28/10/24 14:21:43.722:110) : proctitle=/sbin/agetty -o -p -- \u --noclear - linux
    type=OBJ_PID msg=audit(28/10/24 14:21:43.722:110) : opid=970 oauid=root ouid=root oses=1 obj=system_u:system_r:local_login_t:s0 ocomm=login
    type=OBJ_PID msg=audit(28/10/24 14:21:43.722:110) : opid=970 oauid=root ouid=root oses=1 obj=system_u:system_r:local_login_t:s0 ocomm=login
    type=SYSCALL msg=audit(28/10/24 14:21:43.722:110) : arch=x86_64 syscall=ioctl success=yes exit=0 a0=0x0 a1=TIOCNOTTY a2=0x0 a3=0x8 items=0 ppid=1 pid=970 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=login exe=/usr/bin/login subj=system_u:system_r:local_login_t:s0 key=(null)
    type=AVC msg=audit(28/10/24 14:21:43.722:110) : avc:  denied  { signal } for  pid=970 comm=login scontext=system_u:system_r:local_login_t:s0 tcontext=system_u:system_r:local_login_t:s0 tclass=process permissive=0

Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
SELint reports:
    haproxy.te:          65: (C): Permissions in av rule not ordered (setuid before setgid) (C-005)
    container.te:      1012: (C): Permissions in av rule not ordered (setuid before setpcap) (C-005)

Signed-off-by: Christian Göttsche <[email protected]>
    type=PROCTITLE msg=audit(28/03/24 20:06:02.246:111) : proctitle=sort -V -r
    type=SYSCALL msg=audit(28/03/24 20:06:02.246:111) : arch=x86_64 syscall=sched_getaffinity success=no exit=EACCES(Permission denied) a0=0x0 a1=0x80 a2=0x7fffcffce4f0 a3=0x7f2e4b437a98 items=0 ppid=5539 pid=5542 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=pts1 ses=1 comm=sort exe=/usr/bin/sort subj=unconfined_u:unconfined_r:bootloader_t:s0-s0:c0.c1023 key=(null)
    type=AVC msg=audit(28/03/24 20:06:02.246:111) : avc:  denied  { getsched } for  pid=5542 comm=sort scontext=unconfined_u:unconfined_r:bootloader_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:bootloader_t:s0-s0:c0.c1023 tclass=process permissive=0

Signed-off-by: Christian Göttsche <[email protected]>
Found by codespell(1).

Signed-off-by: Christian Göttsche <[email protected]>
@cgzones cgzones force-pushed the misc branch 2 times, most recently from 1896c03 to 2a3653d Compare November 5, 2024 19:45
Signed-off-by: Christian Göttsche <[email protected]>
@pebenito pebenito merged commit c6f07fd into SELinuxProject:main Nov 6, 2024
118 checks passed
@cgzones cgzones deleted the misc branch November 6, 2024 14:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants