-
Bug
-
Resolution: Unresolved
-
Normal
-
rhel-10.2
-
No
-
Moderate
-
1
-
rhel-security-selinux
-
ssg_security
-
1
-
QE ack
-
False
-
False
-
-
No
-
SELINUX 260128: 17
-
None
-
Automated
-
Release Note Not Required
-
-
ppc64le
-
None
What were you trying to do that didn't work?
Please provide the package NVR for which bug is seen:
selinux-policy-42.1.10-1.el10.noarch
selinux-policy-devel-42.1.10-1.el10.noarch
selinux-policy-doc-42.1.10-1.el10.noarch
selinux-policy-extra-42.1.10-1.el10.noarch
selinux-policy-mls-42.1.10-1.el10.noarch
selinux-policy-mls-extra-42.1.10-1.el10.noarch
selinux-policy-targeted-42.1.10-1.el10.noarch
selinux-policy-targeted-extra-42.1.10-1.el10.noarch
How reproducible:
always
Steps to reproduce
- get a ppc64le machine with RHEL-10.2 installed
- run the following automated test: /CoreOS/selinux-policy/Regression/dev-general
- look for failures in the output
Expected results
- their default SELinux labels differ from device_t
Actual results
/dev/papr-indices system_u:object_r:device_t:s0 /dev/papr-platform-dump system_u:object_r:device_t:s0 /dev/papr-physical-attestation system_u:object_r:device_t:s0
Additional information
- clones
-
RHEL-56908 more specific labels for /dev/papr-sysparm and /dev/papr-vpd
-
- Closed
-
- is cloned by
-
RHEL-129879 [rhel-9] more specific labels for new /dev/papr-* devices
-
- Planning
-