From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 4C4A1158089 for ; Fri, 6 Oct 2023 16:44:37 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 0DC032BC026; Fri, 6 Oct 2023 16:44:36 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id E67922BC026 for ; Fri, 6 Oct 2023 16:44:35 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 9485B335D17 for ; Fri, 6 Oct 2023 16:44:34 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 11DA19D9 for ; Fri, 6 Oct 2023 16:44:33 +0000 (UTC) From: "Kenton Groombridge" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Kenton Groombridge" Message-ID: <1696606026.fde90b82b10e32324d96deca43928f448d8dd932.concord@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/systemd.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: concord X-VCS-Committer-Name: Kenton Groombridge X-VCS-Revision: fde90b82b10e32324d96deca43928f448d8dd932 X-VCS-Branch: master Date: Fri, 6 Oct 2023 16:44:33 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: b8cb51af-8ea9-47f0-9a86-ce5969d23302 X-Archives-Hash: fcff6fa6ef13c03dd6094cb5114e6212 commit: fde90b82b10e32324d96deca43928f448d8dd932 Author: Yi Zhao windriver com> AuthorDate: Thu Sep 21 03:31:31 2023 +0000 Commit: Kenton Groombridge gentoo org> CommitDate: Fri Oct 6 15:27:06 2023 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=fde90b82 systemd: allow systemd-networkd to create file in /run/systemd directory systemd-networkd creates files in /run/systemd directory which should be labeled appropriately. Fixes: avc: denied { create } for pid=136 comm="systemd-network" name=".#networkd2c6a2ac2dbf34a8" scontext=system_u:system_r:systemd_networkd_t tcontext=system_u:object_r:init_runtime_t tclass=file permissive=1 avc: denied { write } for pid=136 comm="systemd-network" path="/run/systemd/.#networkd2c6a2ac2dbf34a8" dev="tmpfs" ino=81 scontext=system_u:system_r:systemd_networkd_t tcontext=system_u:object_r:init_runtime_t tclass=file permissive=1 avc: denied { setattr } for pid=136 comm="systemd-network" name=".#networkd2c6a2ac2dbf34a8" dev="tmpfs" ino=81 scontext=system_u:system_r:systemd_networkd_t tcontext=system_u:object_r:init_runtime_t tclass=file permissive=1 avc: denied { rename } for pid=136 comm="systemd-network" name=".#networkd2c6a2ac2dbf34a8" dev="tmpfs" ino=81 scontext=system_u:system_r:systemd_networkd_t tcontext=system_u:object_r:init_runtime_t tclass=file permissive=1 Signed-off-by: Yi Zhao windriver.com> Signed-off-by: Kenton Groombridge gentoo.org> policy/modules/system/systemd.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index f74ab30b4..b60d5729d 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -1168,7 +1168,7 @@ auth_use_nsswitch(systemd_networkd_t) init_dgram_send(systemd_networkd_t) init_read_state(systemd_networkd_t) init_read_runtime_files(systemd_networkd_t) -init_runtime_filetrans(systemd_networkd_t, systemd_networkd_runtime_t, dir) +init_runtime_filetrans(systemd_networkd_t, systemd_networkd_runtime_t, { dir file }) logging_send_syslog_msg(systemd_networkd_t)