Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for open-vm-tools #838

Merged
merged 1 commit into from
Dec 9, 2024
Merged

Conversation

dsugar100
Copy link
Contributor

node=localhost type=AVC msg=audit(1732592552.733:8660): avc: denied { create } for pid=1006 comm="vmtoolsd" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=vsock_socket permissive=0
node=localhost type=AVC msg=audit(1732592232.142:477): avc: denied { create } for pid=1005 comm="VGAuthService" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=vsock_socket permissive=0
node=localhost type=AVC msg=audit(1732592232.516:506): avc: denied { read write } for pid=1006 comm="vmtoolsd" name="card0" dev="devtmpfs" ino=275 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=0
node=localhost type=AVC msg=audit(1732592232.194:479): avc: denied { create } for pid=1005 comm="VGAuthService" name="vmware" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir permissive=0

@pebenito
Copy link
Member

pebenito commented Dec 4, 2024

Check name: PRIVILEGE-CAP_NET_ADMIN

Description: Verify only expected domains can use CAP_NET_ADMIN.

    * allow vmware_tools_t vmware_tools_t:capability { net_admin net_bind_service sys_admin sys_time };

Check FAILED

@dsugar100
Copy link
Contributor Author

Thanks for sharing that, I wasn't seeing it in the automated tests, is there something else that I need to look at?

node=localhost type=AVC msg=audit(1732592552.733:8660): avc:  denied  { create } for  pid=1006 comm="vmtoolsd" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=vsock_socket permissive=0
node=localhost type=AVC msg=audit(1732592232.142:477): avc:  denied  { create } for  pid=1005 comm="VGAuthService" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=vsock_socket permissive=0
node=localhost type=AVC msg=audit(1732592232.516:506): avc:  denied  { read write } for  pid=1006 comm="vmtoolsd" name="card0" dev="devtmpfs" ino=275 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=0
node=localhost type=AVC msg=audit(1732592232.194:479): avc:  denied  { create } for  pid=1005 comm="VGAuthService" name="vmware" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir permissive=0

Signed-off-by: Dave Sugar <[email protected]>
@pebenito pebenito merged commit 65aa17e into SELinuxProject:main Dec 9, 2024
118 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants