-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[rawhide][branched] SELinux AVC denials causes the afterburn write to fail in cloud platforms #1784
Labels
Comments
aaradhak
added
kind/bug
pipeline failure
This issue or pull request is derived from CI failures
labels
Aug 20, 2024
Opened a BZ for this selinux-policy avc denial - https://bugzilla.redhat.com/show_bug.cgi?id=2306352 |
marmijo
added a commit
to marmijo/fedora-coreos-config
that referenced
this issue
Sep 3, 2024
Recent changes in the SELinux policy have broken a lot of our code. Revert the affected domains back to permissive mode so we can continue to build and test `releasever >= 41` until fedora-selinux/selinux-policy#2257 merges and the domains are reverted upstream or until the issue is resolved altogether. Add the workaround for `afterburn_t` as well so we can unblock coreos/fedora-coreos-tracker#1784
marmijo
added a commit
to marmijo/fedora-coreos-config
that referenced
this issue
Sep 3, 2024
Recent changes in the SELinux policy have broken a lot of our code. Revert the affected domains back to permissive mode so we can continue to build and test `releasever >= 41` until fedora-selinux/selinux-policy#2257 merges and the domains are reverted upstream or until the issue is resolved altogether. Add the workaround for `afterburn_t` as well so we can unblock coreos/fedora-coreos-tracker#1784
marmijo
added a commit
to coreos/fedora-coreos-config
that referenced
this issue
Sep 4, 2024
Recent changes in the SELinux policy have broken a lot of our code. Revert the affected domains back to permissive mode so we can continue to build and test `releasever >= 41` until fedora-selinux/selinux-policy#2257 merges and the domains are reverted upstream or until the issue is resolved altogether. Add the workaround for `afterburn_t` as well so we can unblock coreos/fedora-coreos-tracker#1784
A workaround was added for this in: coreos/fedora-coreos-config#3127. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Describe the bug
In the recent rawhide & branched cloud platform builds, the kola tests are failing due to an error in the afterburn service.
harness.go:1823: mach.Start() failed: machine "i-0c58eeb79e70a7d44" failed basic checks: detected failed or stuck systemd units: some systemd units failed: [email protected]; <nil>
On further debugging, it is found that the afterburn process attempted to write to the /var/home/core/.ssh/authorized_keys.d/ directory but was denied by SELinux . This denial caused the afterburn-sshkeys service to fail with a "Permission denied (os error 13)" error.
This seems to be like a selinux-policy issue.
Apart from the above AVC denials, came across few other AVC denials in the journal log as below:
Reproduction steps
Start a pipeline job build of the kola cloud platforms.
Expected behavior
The SELinux policy to allow the afterburn process to write to the directory in question.
Actual behavior
kola tests fails with this error:
harness.go:1823: mach.Start() failed: machine "i-0c58eeb79e70a7d44" failed basic checks: detected failed or stuck systemd units: some systemd units failed: [email protected]; <nil>
System details
Kola cloud platform pipeline jobs.
Streams - rawhide & branched
Butane or Ignition config
No response
Additional information
There's a similar afterburn issue that was filed against c9s that was fixed, but possibly the fixes there need to be brought to Fedora too: https://issues.redhat.com/browse/RHEL-49735
The text was updated successfully, but these errors were encountered: