diff options
author | INSUN PYO <insun.pyo@samsung.com> | 2021-07-02 13:34:32 +0900 |
---|---|---|
committer | Hyotaek Shim <hyotaek.shim@samsung.com> | 2021-08-02 02:07:58 +0000 |
commit | cb4388b1ec26db5160a336e62fecb17ef647b821 (patch) | |
tree | c9a44753c1e2b12a4c70edfffcc6c030a99f0a55 /units | |
parent | 641264fb3fe5c0463c4f853d14f7cf884bea778d (diff) | |
download | systemd-cb4388b1ec26db5160a336e62fecb17ef647b821.tar.gz systemd-cb4388b1ec26db5160a336e62fecb17ef647b821.tar.bz2 systemd-cb4388b1ec26db5160a336e62fecb17ef647b821.zip |
systemd: fix smack error
A user systemd session accesses /proc/1/sched to detect container.
Jan 01 09:00:14 localhost audit[636]: AVC lsm=SMACK fn=smack_inode_permission action=denied subject="User" object="System::Privileged" requested=r pid=636 comm="systemd" name="sched" dev="proc" ino=12247
Jan 01 09:00:14 localhost audit[636]: AVC lsm=SMACK fn=smack_inode_permission action=denied subject="User" object="System::Privileged" requested=r pid=636 comm="systemd" name="sched" dev="proc" ino=12247
Jan 01 09:00:14 localhost audit[636]: AVC lsm=SMACK fn=smack_inode_permission action=denied subject="User" object="System::Privileged" requested=r pid=636 comm="systemd" name="sched" dev="proc" ino=12247
Jan 01 09:00:23 localhost audit[915]: AVC lsm=SMACK fn=smack_inode_permission action=denied subject="User" object="System::Privileged" requested=r pid=915 comm="systemctl" name="sched" dev="proc" ino=12247
Change-Id: I0d6f632b090582888c45f309c8a8bf06f4f0f510
Diffstat (limited to 'units')
0 files changed, 0 insertions, 0 deletions