mirror of
https://github.com/token2/snapd.git
synced 2026-03-13 11:15:47 -07:00
The kernel-module-load interface may trigger accesses to /etc/modprobe.d as seen
in the following denials:
type=AVC msg=audit(120721 16:27:22.859:25079) : avc: denied { getattr } for
pid=97494 comm=snapd path=/etc/modprobe.d dev="sda5" ino=13371
scontext=system_u:system_r:snappy_t:s0
tcontext=system_u:object_r:modules_conf_t:s0 tclass=dir permissive=1
type=AVC msg=audit(120721 16:27:22.859:25080) : avc: denied { read } for
pid=97494 comm=snapd name=modprobe.d dev="sda5" ino=13371
scontext=system_u:system_r:snappy_t:s0
tcontext=system_u:object_r:modules_conf_t:s0 tclass=dir permissive=1
type=AVC msg=audit(120721 16:27:22.859:25081) : avc: denied { open } for
pid=97494 comm=snapd path=/etc/modprobe.d dev="sda5" ino=13371
scontext=system_u:system_r:snappy_t:s0
tcontext=system_u:object_r:modules_conf_t:s0 tclass=dir permissive=1
Signed-off-by: Maciej Borzecki <maciej.zenon.borzecki@canonical.com>