Doing this on a RHEL8.10 distro. I've created a user with staff_u role: # useradd -Z staff_u testadm
And provided this user elevated permissions, for which did following steps: 1. created: /etc/sudoers.d/mysudoers 2. added this: %testadm ALL=(ALL) TYPE=sysadm_t ROLE=sysadm_r ALL Did reboot. Installed my app's selinux policy module(rpm). Then logged in with this testadm user, and ran command to elevate to sysadm_r:sysadm_t: # sudo runcon -r sysadm_r -t sysadm_t -- su - Now, on this console, with selinux Enforcing, I try running my application's executable (maconfig) and I'm getting this permission denied error: [root@6H0RHEL810 ~]# /opt/McAfee/agent/bin/maconfig -stop 2025-04-25 11:43:12.768 (50811.50811) maconfig.Info: Stopping Trellix agent. sh: /etc/init.d/ma: /bin/sh: bad interpreter: Permission denied 2025-04-25 11:43:12.770 (50811.50811) maconfig.Info: configuration finished So naturally, I looked for denials in var/log/audit/audit.log but got this instead: type=SELINUX_ERR msg=audit(1745581392.769:2056): op=security_compute_sid invalid_context="staff_u:system_r:initrc_t:s0" scontext=staff_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1745581392.769:2056): arch=c000003e syscall=59 success=no exit=-13 a0=5587d7a7b540 a1=5587d7a7c700 a2=5587d7a79e40 a3=0 items=0 ppid=50811 pid=50812 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=8 comm="sh" exe="/usr/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 key=(null)ARCH=x86_64 SYSCALL=execve AUID="testadm" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root" type=PROCTITLE msg=audit(1745581392.769:2056): proctitle=7368002D63002F6574632F696E69742E642F6D612073746F70 ..which is not a straighforward avc denial. So searched for ways to tackle this. Found the explanation for the log - a process running as sysadm_t (maconfig) tried to run a file labeled initrc_exec_t (/etc/init.d/ma - my application's script), and SELinux said "nope" because it would result in an invalid context transition to initrc_t. So tried a couple of other things: -Switched selinux to Permissive mode, got some user_avc denials. Added rules in policy for allowing those, but didn't work. -Added this domain transition rule to my policy (didn't work): domain_auto_trans(sysadm_t, initrc_exec_t, initrc_t); -Tried adding these role-type statements in policy (which I thought would work for sure but nope): require { role system_r, sysadm_r } role system_r types initrc_t; #AND role sysadm_r types initrc_t; Also got to know some more stuff from these pages https://wiki.gentoo.org/wiki/SELinux/Tutorials/Linux_services_and_the_system_u_SELinux_user#:~:text=warrants%20proper%20control.-,Linux%20service%20scripts,-Most%20Linux%20service https://github.com/SELinuxProject/selinux-notebook/blob/main/src/auditing.md ..but still not sure how to proceed. Pls help out if u can. Thanks in advance! -- _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue