View Issue Details

IDProjectCategoryView StatusLast Update
0001310channel: kernel/el8kernel-mlpublic2023-01-12 11:23
Reporterefdevse Assigned Toburakkucat  
PrioritynormalSeveritytextReproducibilityN/A
Status resolvedResolutionfixed 
PlatformLinuxOSRocky Linux 8OS Version8.7
Summary0001310: Boot message about: CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE
DescriptionAfter installing kernel-ml - I noticed a boot message this mornng, and thought I should report it. It's prob nothing, but in case that is something you want/need to deal with when building the kernel(s).

> SELinux: Initializing.
> CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE is non-zero. This is deprecated and will be rejected in a future kernel release.
> SELinux: https://github.com/SELinuxProject/selinux-kernel/wiki/DEPRECATE-checkreqprot
TagsNo tags attached.

Activities

efdevse

2023-01-10 20:35

reporter   ~0008894

Based on the text on the GitHub page, I checked my: '/sys/fs/selinux/checkreqprot' and it says 0. And the warning/bootmsg said it's 'non-zero'. Does it mean it's set in the kernel perhaps?

pperry

2023-01-11 04:35

administrator   ~0008896

Acknowledged. Thank you for the report / heads up. Alan, our kernel maintainer, will investigate and consider if we need to change the config.

burakkucat

2023-01-11 12:21

administrator   ~0008899

I check the status of that configuration option from the latest Red Hat distributed kernels for el7, el8 and el9 --

[el7 ~]$ grep 'CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE' /boot/config*
/boot/config-3.10.0-1160.80.1.el7.x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
/boot/config-3.10.0-1160.81.1.el7.x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
[el7 ~]$

[el8 ~]$ grep 'CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE' /boot/config*
/boot/config-4.18.0-372.32.1.el8_6.x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
/boot/config-4.18.0-425.3.1.el8.x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
[el8 ~]$

[el9 ~]$ grep 'CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE' /boot/config*
/boot/config-5.14.0-70.30.1.el9_0.x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
/boot/config-5.14.0-162.6.1.el9_1.x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
[el9 ~]$

I now check the value from the running Red Hat distributed kernels for el7, el8 and el9 --

[el7 ~]$ cat /sys/fs/selinux/checkreqprot ; echo
0
[el7 ~]$

[el8 ~]$ cat /sys/fs/selinux/checkreqprot ; echo
0
[el8 ~]$

[el9 ~]$ cat /sys/fs/selinux/checkreqprot ; echo
0
[el9 ~]$

Finally I check our master configuration files for that option with kernel-ml for el7, el8 and el9 --

[kernels]$ grep -r 'CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE' * | sort | grep -E '6\.1\.4|6\.2'
el7/config-6.1/config-6.1.4-x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el7/config-6.2/config-6.2.0-x86_64-rc1:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el7/config-6.2/config-6.2.0-x86_64-rc2:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el7/config-6.2/config-6.2.0-x86_64-rc3:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el8/config-6.1/config-6.1.4-x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el8/config-6.2/config-6.2.0-x86_64-rc1:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el8/config-6.2/config-6.2.0-x86_64-rc2:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el8/config-6.2/config-6.2.0-x86_64-rc3:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=1
el9/config-6.1/config-6.1.4-aarch64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.1/config-6.1.4-x86_64:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.2/config-6.2.0-aarch64-rc1:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.2/config-6.2.0-aarch64-rc2:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.2/config-6.2.0-aarch64-rc3:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.2/config-6.2.0-x86_64-rc1:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.2/config-6.2.0-x86_64-rc2:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
el9/config-6.2/config-6.2.0-x86_64-rc3:CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE=0
[kernels]$

I have, therefore, queued a change of the default CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE, from 1 to 0, for the next builds of the kernel-ml package sets for both el7 and el8.

burakkucat

2023-01-12 11:23

administrator   ~0008904

With today's release [1][2] of updated kernel-ml package sets for both el7 and el8, that have the CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE option set as zero, this request has been fulfilled.

Now closing as "resolved/fixed".

[1] https://lists.elrepo.org/pipermail/elrepo/2023-January/006328.html
[2] https://lists.elrepo.org/pipermail/elrepo/2023-January/006329.html

Issue History

Date Modified Username Field Change
2023-01-10 20:27 efdevse New Issue
2023-01-10 20:27 efdevse Status new => assigned
2023-01-10 20:27 efdevse Assigned To => burakkucat
2023-01-10 20:35 efdevse Note Added: 0008894
2023-01-11 04:33 pperry Status assigned => acknowledged
2023-01-11 04:35 pperry Note Added: 0008896
2023-01-11 12:21 burakkucat Note Added: 0008899
2023-01-12 11:23 burakkucat Status acknowledged => resolved
2023-01-12 11:23 burakkucat Resolution open => fixed
2023-01-12 11:23 burakkucat Note Added: 0008904