Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow unconfined_domain_type use io_uring cmd on domain #1937

Merged
merged 1 commit into from
Nov 14, 2023

Conversation

JurajMarcin
Copy link
Contributor

This rule allows unconfined_domain_type to execute ioctl commands on the domain attribute asynchronously using the io_uring interface.

Addresses the following denial:
type=AVC msg=audit(1696444258.396:6393): avc: denied { cmd } for pid=41525 comm="socket-io-cmd.t" path="socket:[230442]" dev="sockfs" ino=230442 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=io_uring permissive=0 type=URINGOP msg=audit(1696444258.396:6393): uring_op=46 success=no exit=-13 items=0 ppid=41524 pid=41525 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)^]UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root"

Resolves: RHEL-11792

This rule allows unconfined_domain_type to execute ioctl commands on the
domain attribute asynchronously using the io_uring interface.

Addresses the following denial:
type=AVC msg=audit(1696444258.396:6393): avc:  denied  { cmd } for  pid=41525 comm="socket-io-cmd.t" path="socket:[230442]" dev="sockfs" ino=230442 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=io_uring permissive=0
type=URINGOP msg=audit(1696444258.396:6393): uring_op=46 success=no exit=-13 items=0 ppid=41524 pid=41525 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)^]UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root"

Resolves: RHEL-11792
@zpytela
Copy link
Contributor

zpytela commented Nov 14, 2023

Merging, thank you.

@zpytela zpytela merged commit b807c21 into fedora-selinux:rawhide Nov 14, 2023
3 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants