Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AVCs on rhel-8 #73

Closed
cjeanner opened this issue Jul 9, 2019 · 2 comments
Closed

AVCs on rhel-8 #73

cjeanner opened this issue Jul 9, 2019 · 2 comments

Comments

@cjeanner
Copy link

cjeanner commented Jul 9, 2019

Hello,

We have detected a small amount of AVCs on a newly deployed rhel-8 with a bunch of containers:

type=AVC msg=audit(1562587793.241:215): avc:  denied  { read } for  pid=8208 comm="systemd-user-ru" name="libpod" dev="tmpfs" ino=73106 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:container_runtime_tmpfs_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1562587793.241:216): avc:  denied  { read } for  pid=8208 comm="systemd-user-ru" name="overlay-containers" dev="tmpfs" ino=73105 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:container_runtime_tmpfs_t:s0 tclass=dir permissive=0
type=AVC msg=audit(1562587793.241:217): avc:  denied  { read } for  pid=8208 comm="systemd-user-ru" name="overlay-layers" dev="tmpfs" ino=73104 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:container_runtime_tmpfs_t:s0 tclass=dir permissive=0

We have a couple of containers bind-mounting /dev - that's probably the main issue, although we can't do otherwise since the services running in those containers do need /dev access on the host.

Do you think we can provide a patch allowing init_t to access (only "read" listed here because "permissive=0") container_runtime_tmpfs? I'm not really sure it's a good idea, but I don't know what to do in order to avoid that :/.

Cheers,

C.

@rhatdan
Copy link
Member

rhatdan commented Jul 9, 2019

I think this access should be allowed or don't audited in the selinux-policy package. This is just the systemd-user-runtime-dir trying to list content under /run.

I just allowed this in upstream. Please open a bugzilla to get this updated in RHEL 8.

@rhatdan rhatdan closed this as completed Jul 9, 2019
@cjeanner
Copy link
Author

cjeanner commented Jul 9, 2019

Hello Dan,
Thank you for your fast answer - BZ against RHEL-8 opened: https://bugzilla.redhat.com/show_bug.cgi?id=1728246

Cheers,

C.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants