From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 6851A13835A for ; Sun, 21 Mar 2021 22:11:03 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id A8BF4E0876; Sun, 21 Mar 2021 22:11:02 +0000 (UTC) Received: from smtp.gentoo.org (mail.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 94451E0875 for ; Sun, 21 Mar 2021 22:11:02 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 174133404A5 for ; Sun, 21 Mar 2021 22:11:01 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 4C91C634 for ; Sun, 21 Mar 2021 22:10:58 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1613418564.1e529853d647536648b7a36b39f234280ed580ec.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/systemd.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 1e529853d647536648b7a36b39f234280ed580ec X-VCS-Branch: master Date: Sun, 21 Mar 2021 22:10:58 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: 8450c0b8-ec91-4cfb-806f-41c1fa820ade X-Archives-Hash: f9bbe618d43f4947214dbef9616339d3 commit: 1e529853d647536648b7a36b39f234280ed580ec Author: Krzysztof Nowicki op pl> AuthorDate: Thu Feb 4 15:19:40 2021 +0000 Commit: Jason Zaman gentoo org> CommitDate: Mon Feb 15 19:49:24 2021 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=1e529853 Fix setting-up sandbox environment for systemd-networkd Systemd starts networkd in a sandbox enviroment for enhanced security. As part of that, several mounts need to be prepared, of which one fails: avc: denied { mounton } for pid=711 comm="(networkd)" path="/run/systemd/unit-root/run/systemd/netif" dev="tmpfs" ino=1538 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:systemd_networkd_runtime_t:s0 tclass=dir permissive=1 Fix this by declaring directories of systemd_networkd_runtime_t type as an init daemon mount point. Signed-off-by: Krzysztof Nowicki op.pl> Signed-off-by: Jason Zaman gentoo.org> policy/modules/system/systemd.te | 1 + 1 file changed, 1 insertion(+) diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index 427ae600..2b50638b 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -179,6 +179,7 @@ init_system_domain(systemd_networkd_t, systemd_networkd_exec_t) type systemd_networkd_runtime_t alias systemd_networkd_var_run_t; files_runtime_file(systemd_networkd_runtime_t) +init_mountpoint(systemd_networkd_runtime_t) type systemd_networkd_unit_t; init_unit_file(systemd_networkd_unit_t)