Closed allisonkarlitskaya closed 1 week ago
There are some outstanding items here:
targeted
libselinux
/run/systemd/volatile-root
[ 3.055118] audit: type=1400 audit(1731016644.835:3): avc: denied { read } for pid=447 comm="systemd-gpt-aut" name="volatile-root" dev="tmpfs" ino=679 scontext=system_u:system_r:systemd_gpt_generator_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=lnk_file permissive=1
enforcing=0
Closes #29
As far as I know, the SELinux policy type is taken from /etc/selinux/config:
/etc/selinux/config
$ grep "^SELINUXTYPE=" /etc/selinux/config` SELINUXTYPE=targeted
There are some outstanding items here:
targeted
right nowlibselinux
, possibly making it a conditional feature?~ don't link libselinux: do it ourselves/run/systemd/volatile-root
hack symlink to avoid this:[ 3.055118] audit: type=1400 audit(1731016644.835:3): avc: denied { read } for pid=447 comm="systemd-gpt-aut" name="volatile-root" dev="tmpfs" ino=679 scontext=system_u:system_r:systemd_gpt_generator_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=lnk_file permissive=1
enforcing=0
Closes #29