Skip to content

refpolicy-targeted: Allowed mount to run with system role#1035

Closed
GargiQcom wants to merge 2 commits into
openembedded:masterfrom
GargiQcom:master
Closed

refpolicy-targeted: Allowed mount to run with system role#1035
GargiQcom wants to merge 2 commits into
openembedded:masterfrom
GargiQcom:master

Conversation

@GargiQcom
Copy link
Copy Markdown
Contributor

type=SELINUX_ERR msg=audit(44.591:158): op=security_compute_sid invalid_context="system_u:system_r:unconfined_mount_t:s0" scontext=system_u:system_r:unconfined_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=process

type=SELINUX_ERR msg=audit(44.591:158): op=security_compute_sid invalid_context="system_u:system_r:unconfined_mount_t:s0" scontext=system_u:system_r:unconfined_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=process

Signed-off-by: Gargi Misra <gmisra@qti.qualcomm.com>

type=SELINUX_ERR msg=audit(44.591:158): op=security_compute_sid invalid_context="system_u:system_r:unconfined_mount_t:s0" scontext=system_u:system_r:unconfined_t:s0 tcontext=system_u:object_r:mount_exec_t:s0 tclass=process

Upstream-Status: Inappropriate [meta-oe specific]
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is this meta-oe specific?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This issue is observed in the adb shell, which is provided by meta-oe, hence it is meta-oe specific.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@GargiQcom if the change was in recipe or other metadata then it will be meta-oe for sure or if the change was just needed for OE for some reason. Since the patch is changing the original component, we have to answer question if this patch should be submitted to refpolicy-targeted component upstream or not.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the feedback. Since the overall approach is disputed and doesn’t seem suitable for this repo, I’ll close this PR and re-evaluate the change internally before deciding on the right upstream path.

@GargiQcom GargiQcom closed this Mar 31, 2026
embetrix pushed a commit to embetrix/meta-openembedded that referenced this pull request Apr 3, 2026
Upgrade to release 1.9.0:

- 1.9.0
  - Remove Python 3.8 support (EOL), add Python 3.13 (5f25030)
  - Remove localhost and 127.0.0.1 from default NO_PROXY list (openembedded#994)
  - Support IPv6 CIDRs in the no_proxy option (openembedded#1033)
  - Fix thread safety condition in `teardown()` to improve `run_forever()` (openembedded#1015)
  - Fix openembedded#1024 by chunking data, recursion in on_error callback, thread leak in `_stop_ping_thread()`, avoid implicit None in `recv()` (openembedded#1036)
  - Avoid bare except clauses for better error handling (openembedded#1036)
  - Fix async (openembedded#983)
  - Resolve mypy type errors (openembedded#996, openembedded#1006, 813d570)
  - Test coverage improvements (openembedded#1035, openembedded#1036)
  - flake8 linting improvements (openembedded#1034)

- 1.8.0
  - Added `on_reconnect` parameter to WebSocketApp to handle callback ambiguity (openembedded#972)
  - Improve handling of SSLEOFError and use reconnect bool (openembedded#961)
  - Minor linting and docs CI build upgrades (981c00e, 75ba91a, bec2608)

License-Update: copyright years refreshed

Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants