From: Johannes Segitz <jsegitz@suse.de>
To: Stefano Brivio <sbrivio@redhat.com>
Cc: passt-dev@passt.top, Paul Holzinger <pholzing@redhat.com>
Subject: Re: [PATCH] SELinux: Dontaudit access to dri devices
Date: Tue, 31 Mar 2026 09:00:47 +0200 [thread overview]
Message-ID: <actxHwXyTdc1OWic@suse.com> (raw)
In-Reply-To: <20260330171541.15a8b5d0@elisabeth>
[-- Attachment #1: Type: text/plain, Size: 1698 bytes --]
Hi,
On Mon, Mar 30, 2026 at 05:15:42PM +0200, Stefano Brivio wrote:
> On Mon, 30 Mar 2026 13:05:57 +0200 Johannes Segitz <jsegitz@suse.de> wrote:
> > Currently podman can pass a FD to a DRI device to pasta, leading to AVCs
> > like this:
> > avc: denied { read write }
> > comm="pasta" path="/dev/dri/renderD128"
> > scontext=unconfined_u:unconfined_r:pasta_t:s0-s0:c0.c1023
> > tcontext=system_u:object_r:dri_device_t:s0
> > tclass=chr_file
> > These are harmless, so dontaudit them
> >
> > Signed-off-by: Johannes Segitz <jsegitz@suse.de>
>
> Thanks for the patch.
>
> I'm wondering how can this still happen though, as commit 09603cab28f9
> ("passt, util: Close any open file that the parent might have leaked")
> should take care of those. Do you happen to know?
No, I just read the code and it seems like this should prevent this. I
unfortunately can't debug this in depth, because it doesn't happen on my
system. The reporter is helpful with debugging, but going into gdb sessions
with remote hands doesn't sound feasible ;)
> Perhaps the access happens before we call isolate_initial()... but then
> I guess we should try to close leaked files before that point, to be on
> the safe side?
Would be worth a try. If you have a patch for that I can provide an updated
package to the reporter and ask him to test it
Johannes
--
GPG Key EE16 6BCE AD56 E034 BFB3 3ADD 7BF7 29D5 E7C8 1FA0
Subkey fingerprint: 250F 43F5 F7CE 6F1E 9C59 4F95 BC27 DD9D 2CC4 FD66
SUSE Software Solutions Germany GmbH, Frankenstr. 146, 90461 Nürnberg, Germany
Geschäftsführer: Jochen Jaser, Andrew McDonald, Werner Knoblich, (HRB 36809, AG Nürnberg)
[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 870 bytes --]
next prev parent reply other threads:[~2026-03-31 7:00 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-30 11:05 Johannes Segitz
2026-03-30 15:15 ` Stefano Brivio
2026-03-31 7:00 ` Johannes Segitz [this message]
2026-03-31 19:47 ` Stefano Brivio
2026-04-01 12:12 ` Johannes Segitz
2026-04-02 12:24 ` Paul Holzinger
2026-04-02 13:36 ` Paul Holzinger
2026-04-02 13:46 ` Stefano Brivio
2026-04-02 14:07 ` Johannes Segitz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=actxHwXyTdc1OWic@suse.com \
--to=jsegitz@suse.de \
--cc=passt-dev@passt.top \
--cc=pholzing@redhat.com \
--cc=sbrivio@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).