[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[HTCondor-users] selinux denial



I've returned to investigating selinux warnings on many of my hosts, and came across these two on a condor-23.0.0 startd:
type=AVC msg=audit(1701367202.333:15914342): avc:  denied  { read } for 
pid=868067 comm="condor_procd" 
scontext=system_u:system_r:condor_procd_t:s0 
tcontext=system_u:system_r:condor_procd_t:s0 tclass=perf_event permissive=1
type=AVC msg=audit(1701367217.357:15914353): avc:  denied  { 
dac_override } for  pid=868067 comm="condor_procd" capability=1 
scontext=system_u:system_r:condor_procd_t:s0 
tcontext=system_u:system_r:condor_procd_t:s0 tclass=capability permissive=1
It's easy enough to add a local policy to allow these:


require {
        type condor_procd_t;
        class perf_event read;
        class capability dac_override;
}

#============= condor_procd_t ==============
allow condor_procd_t self:capability dac_override;
allow condor_procd_t self:perf_event read;


...but I figured I'd report it here in case it should be added to the upstream condor policy.
--Mike