-
Notifications
You must be signed in to change notification settings - Fork 172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Two util-linux denials on Fedora Rawhide #2227
Comments
@DaanDeMeyer The logs are trimmed. It would be even more helpful if there were audit logs with full auditing enabled. The above reproducer seems not to be complete, so I cannot investigate further. |
@zpytela Apologies, these are the non-truncated logs, not with full auditing enabled though, I need to work on getting that enabled:
|
np, but can you add a functional reproducer or additional information - what path is the agetty.autologin file and which service creates it? edit: |
The mkosi reproducer is not sufficient? I have some local logic that allows building and installing new selinux-policy rpms from source into the mkosi image if that makes life easier. Though it's awfully slow because the spec calls make clean all over the place. |
In selinux-policy specfile I see make clean once in the install phase which imho is correct. |
It probably is but it does make incremental builds using |
@zpytela Anything I can do to make debugging this easier for you? |
Yes, a simple reproducer. mkosi did not work for me for some reason. I'll give it another go. |
In the latest util-linux release,
agetty
andlogin
will read systemd credentials to allow configuring their behavior. Reading the credentials should be allowed by the policy.To reproduce:
The text was updated successfully, but these errors were encountered: