summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch')
-rw-r--r--recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch35
1 files changed, 35 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch
new file mode 100644
index 0000000..b1a72d6
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch
@@ -0,0 +1,35 @@
1From 4782b27839064438f103b77c31e5db75189025a8 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 18 Jun 2020 16:14:45 +0800
4Subject: [PATCH] policy/modules/system/systemd: add capability mknod for
5 systemd_user_runtime_dir_t
6
7Fixes:
8avc: denied { mknod } for pid=266 comm="systemd-user-ru" capability=27
9scontext=system_u:system_r:systemd_user_runtime_dir_t:s0-s15:c0.c1023
10tcontext=system_u:system_r:systemd_user_runtime_dir_t:s0-s15:c0.c1023
11tclass=capability permissive=0
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/system/systemd.te | 2 +-
18 1 file changed, 1 insertion(+), 1 deletion(-)
19
20diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
21index c7fe51b62..f82031a09 100644
22--- a/policy/modules/system/systemd.te
23+++ b/policy/modules/system/systemd.te
24@@ -1372,7 +1372,7 @@ seutil_libselinux_linked(systemd_user_session_type)
25 # systemd-user-runtime-dir local policy
26 #
27
28-allow systemd_user_runtime_dir_t self:capability { fowner chown sys_admin dac_read_search dac_override };
29+allow systemd_user_runtime_dir_t self:capability { fowner chown sys_admin dac_read_search dac_override mknod };
30 allow systemd_user_runtime_dir_t self:process setfscreate;
31
32 domain_obj_id_change_exemption(systemd_user_runtime_dir_t)
33--
342.17.1
35