-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Misc updates #828
Merged
Merged
Misc updates #828
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
pebenito
requested changes
Nov 1, 2024
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A few minor nits.
Side note: I'd take a patch to add a codespell check in the lint github action, if you're willing.
Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
type=PROCTITLE msg=audit(28/10/24 14:04:16.969:146) : proctitle=/usr/lib/systemd/system-generators/systemd-ssh-generator /run/systemd/generator /run/systemd/generator.early /run/systemd/genera type=SYSCALL msg=audit(28/10/24 14:04:16.969:146) : arch=x86_64 syscall=socket success=yes exit=4 a0=vsock a1=SOCK_STREAM a2=ip a3=0x7 items=0 ppid=13019 pid=13030 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=systemd-ssh-gen exe=/usr/lib/systemd/system-generators/systemd-ssh-generator subj=system_u:system_r:systemd_generator_t:s0 key=(null) type=AVC msg=audit(28/10/24 14:04:16.969:146) : avc: denied { module_request } for pid=13030 comm=systemd-ssh-gen kmod="net-pf-40" scontext=system_u:system_r:systemd_generator_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system permissive=1 Signed-off-by: Christian Göttsche <[email protected]>
type=PROCTITLE msg=audit(28/10/24 14:21:43.722:110) : proctitle=/sbin/agetty -o -p -- \u --noclear - linux type=OBJ_PID msg=audit(28/10/24 14:21:43.722:110) : opid=970 oauid=root ouid=root oses=1 obj=system_u:system_r:local_login_t:s0 ocomm=login type=OBJ_PID msg=audit(28/10/24 14:21:43.722:110) : opid=970 oauid=root ouid=root oses=1 obj=system_u:system_r:local_login_t:s0 ocomm=login type=SYSCALL msg=audit(28/10/24 14:21:43.722:110) : arch=x86_64 syscall=ioctl success=yes exit=0 a0=0x0 a1=TIOCNOTTY a2=0x0 a3=0x8 items=0 ppid=1 pid=970 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=login exe=/usr/bin/login subj=system_u:system_r:local_login_t:s0 key=(null) type=AVC msg=audit(28/10/24 14:21:43.722:110) : avc: denied { signal } for pid=970 comm=login scontext=system_u:system_r:local_login_t:s0 tcontext=system_u:system_r:local_login_t:s0 tclass=process permissive=0 Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
SELint reports: haproxy.te: 65: (C): Permissions in av rule not ordered (setuid before setgid) (C-005) container.te: 1012: (C): Permissions in av rule not ordered (setuid before setpcap) (C-005) Signed-off-by: Christian Göttsche <[email protected]>
type=PROCTITLE msg=audit(28/03/24 20:06:02.246:111) : proctitle=sort -V -r type=SYSCALL msg=audit(28/03/24 20:06:02.246:111) : arch=x86_64 syscall=sched_getaffinity success=no exit=EACCES(Permission denied) a0=0x0 a1=0x80 a2=0x7fffcffce4f0 a3=0x7f2e4b437a98 items=0 ppid=5539 pid=5542 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=pts1 ses=1 comm=sort exe=/usr/bin/sort subj=unconfined_u:unconfined_r:bootloader_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(28/03/24 20:06:02.246:111) : avc: denied { getsched } for pid=5542 comm=sort scontext=unconfined_u:unconfined_r:bootloader_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:bootloader_t:s0-s0:c0.c1023 tclass=process permissive=0 Signed-off-by: Christian Göttsche <[email protected]>
Found by codespell(1). Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
Signed-off-by: Christian Göttsche <[email protected]>
cgzones
force-pushed
the
misc
branch
2 times, most recently
from
November 5, 2024 19:45
1896c03
to
2a3653d
Compare
Signed-off-by: Christian Göttsche <[email protected]>
pebenito
approved these changes
Nov 6, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.