Comments (4)
These AVCs are not container specific they would be in selinux-policy.
dac_override usually means the process does not have access to the object without via normal permissions. IT The root user does not have access to the object. What is the permissions on
/var/lib/iscsi/nodes/iqn.2019-10.io.longhorn:pvc-92f33fde-1363-4619-aca4-823bfd8f444f/10.42.0.67,3260,1/
Who owns it I would figure root does not have read/write or execute access and that is causing the DAC_OVERRIDE>
from container-selinux.
Please attach the AVC messages.
ausearch -m avc -ts recent
from container-selinux.
Ping
from container-selinux.
Hi @rhatdan
Apologies for the delayed response.
I don't have environment now. Here is old output which I collected before.
type=PROCTITLE msg=audit(1685680051.117:90103): proctitle=6E73656E746572002D2D6D6F756E743D2F686F73742F70726F632F312F6E732F6D6E74002D2D6E65743D2F686F73742F70726F632F312F6E732F6E657400697363736961646D002D6D00646973636F76657279002D740073656E6474617267657473002D700031302E34322E302E3637
type=PATH msg=audit(1685680051.117:90103): item=0 name="/var/lib/iscsi/nodes/iqn.2019-10.io.longhorn:pvc-a5f752cd-09bb-4d37-a517-ec83704b25d9/10.42.0.67,3260,1/" inode=8412064 dev=fd:08 mode=040600 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:iscsi_var_lib_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
type=CWD msg=audit(1685680051.117:90103): cwd="/"
type=SYSCALL msg=audit(1685680051.117:90103): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=561977481090 a2=241 a3=1b6 items=1 ppid=61338 pid=61427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iscsiadm" exe="/usr/sbin/iscsiadm" subj=system_u:system_r:iscsid_t:s0 key=(null)
type=AVC msg=audit(1685680051.117:90103): avc: denied { dac_override } for pid=61427 comm="iscsiadm" capability=1 scontext=system_u:system_r:iscsid_t:s0 tcontext=system_u:system_r:iscsid_t:s0 tclass=capability permissive=0
----
time->Fri Jun 2 04:27:31 2023
type=PROCTITLE msg=audit(1685680051.117:90106): proctitle=6E73656E746572002D2D6D6F756E743D2F686F73742F70726F632F312F6E732F6D6E74002D2D6E65743D2F686F73742F70726F632F312F6E732F6E657400697363736961646D002D6D00646973636F76657279002D740073656E6474617267657473002D700031302E34322E302E3637
type=PATH msg=audit(1685680051.117:90106): item=0 name="/var/lib/iscsi/nodes/iqn.2019-10.io.longhorn:pvc-92f33fde-1363-4619-aca4-823bfd8f444f/10.42.0.67,3260,1/" inode=12603867 dev=fd:08 mode=040600 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:iscsi_var_lib_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
type=CWD msg=audit(1685680051.117:90106): cwd="/"
type=SYSCALL msg=audit(1685680051.117:90106): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=561977481090 a2=241 a3=1b6 items=1 ppid=61338 pid=61427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iscsiadm" exe="/usr/sbin/iscsiadm" subj=system_u:system_r:iscsid_t:s0 key=(null)
type=AVC msg=audit(1685680051.117:90106): avc: denied { dac_override } for pid=61427 comm="iscsiadm" capability=1 scontext=system_u:system_r:iscsid_t:s0 tcontext=system_u:system_r:iscsid_t:s0 tclass=capability permissive=0
Thanks for looking into this!
from container-selinux.
Related Issues (20)
- SELinux blocks ansible from doing DNF updates with the nsenter connection plugin HOT 8
- Branch protection for main branch HOT 3
- gating tests? HOT 2
- iptables-restore cannot read file from inside a container HOT 6
- allow user_u to work with containers HOT 8
- Packit: Use packit for bumping official fedora package HOT 1
- CI: check for long-running relabels HOT 1
- [packit] Propose downstream failed for release v2.213.0 HOT 3
- Issues on Fedora (container-selinux-2.211.1) with container_domain_template HOT 5
- user_namespace { create } rule not working HOT 11
- Concern with use of dac_override in home_container.cil HOT 3
- `avc: denied { shutdown }` when using socket activation with rootless podman quadlet HOT 3
- dri_device_t cannot be accessed correctly by pods using device plugins. HOT 12
- Add support for `rpm --verify` HOT 2
- container_init_t does not possess ptrace process context HOT 13
- CRI-O CI broken due to SELinux AVC Denials with latest runc (main branch) build HOT 20
- systemd crashes while attempting to start under container_user_r role HOT 11
- /etc/kubernetes filetrans? HOT 1
- container_user_u issues related to `podmansh` HOT 2
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from container-selinux.