aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDavid Sugar <dsugar@tresys.com>2017-10-12 16:16:17 +0000
committerJason Zaman <jason@perfinion.com>2017-10-29 20:59:08 +0800
commit08fff4870eab9cec72d17019d21d832176fd5905 (patch)
treedf6e3eb5a77a27e2a99bccfccf766d661101a4df
parentinit: Clean up line placement in init_systemd blocks. (diff)
downloadhardened-refpolicy-08fff487.tar.gz
hardened-refpolicy-08fff487.tar.bz2
hardened-refpolicy-08fff487.zip
Denial relabeling /run/systemd/private
I am seeing the following denial (in dmesg) during system startup: [ 4.623332] type=1400 audit(1507767947.042:3): avc: denied { relabelto } for pid=1 comm="systemd" name="private" dev="tmpfs" ino=5865 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=sock_file It appears that systemd is attempting to relablel the socket file /run/systemd/private to init_var_run_t but doesn't have permission. Updated to create new interface for relabeling of sock_files rather than adding to existing interface Signed-off-by: Dave Sugar <dsugar@tresys.com>
-rw-r--r--policy/modules/kernel/files.if19
-rw-r--r--policy/modules/system/init.te1
2 files changed, 20 insertions, 0 deletions
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index 12a1210cc..ec2c89996 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -6741,6 +6741,25 @@ interface(`files_relabel_all_pid_dirs',`
########################################
## <summary>
+## Relabel to/from all var_run (pid) socket files
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain alloed access.
+## </summary>
+## </param>
+#
+interface(`files_relabel_all_pid_sock_files',`
+ gen_require(`
+ attribute pidfile;
+ ')
+
+ relabel_sock_files_pattern($1, pidfile, pidfile)
+')
+
+
+########################################
+## <summary>
## Relabel to/from all var_run (pid) files and directories
## </summary>
## <param name="domain">
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 75da7a621..350554d39 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -320,6 +320,7 @@ ifdef(`init_systemd',`
files_mounton_root(init_t)
files_search_pids(init_t)
files_relabel_all_pids(init_t)
+ files_relabel_all_pid_sock_files(init_t)
files_relabelto_etc_runtime_dirs(init_t)
files_relabelto_etc_runtime_files(init_t)
files_read_all_locks(init_t)