diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch new file mode 100644 index 0000000..b1a72d6 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 4782b27839064438f103b77c31e5db75189025a8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Thu, 18 Jun 2020 16:14:45 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/systemd: add capability mknod for | ||
5 | systemd_user_runtime_dir_t | ||
6 | |||
7 | Fixes: | ||
8 | avc: denied { mknod } for pid=266 comm="systemd-user-ru" capability=27 | ||
9 | scontext=system_u:system_r:systemd_user_runtime_dir_t:s0-s15:c0.c1023 | ||
10 | tcontext=system_u:system_r:systemd_user_runtime_dir_t:s0-s15:c0.c1023 | ||
11 | tclass=capability permissive=0 | ||
12 | |||
13 | Upstream-Status: Inappropriate [embedded specific] | ||
14 | |||
15 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
16 | --- | ||
17 | policy/modules/system/systemd.te | 2 +- | ||
18 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
21 | index c7fe51b62..f82031a09 100644 | ||
22 | --- a/policy/modules/system/systemd.te | ||
23 | +++ b/policy/modules/system/systemd.te | ||
24 | @@ -1372,7 +1372,7 @@ seutil_libselinux_linked(systemd_user_session_type) | ||
25 | # systemd-user-runtime-dir local policy | ||
26 | # | ||
27 | |||
28 | -allow systemd_user_runtime_dir_t self:capability { fowner chown sys_admin dac_read_search dac_override }; | ||
29 | +allow systemd_user_runtime_dir_t self:capability { fowner chown sys_admin dac_read_search dac_override mknod }; | ||
30 | allow systemd_user_runtime_dir_t self:process setfscreate; | ||
31 | |||
32 | domain_obj_id_change_exemption(systemd_user_runtime_dir_t) | ||
33 | -- | ||
34 | 2.17.1 | ||
35 | |||