summaryrefslogtreecommitdiffstats
path: root/recipes-security/refpolicy/refpolicy/0037-policy-modules-admin-usermanage-allow-useradd-to-rel.patch
blob: 9465a3e73c718729bbf464628b5a5aaf4ee0fe93 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
From 07866ad826b299194c1bfd7978e5077dde72a68e Mon Sep 17 00:00:00 2001
From: Yi Zhao <yi.zhao@windriver.com>
Date: Mon, 11 Oct 2021 10:10:10 +0800
Subject: [PATCH] policy/modules/admin/usermanage: allow useradd to relabel
 user home files

Fixes:
avc: denied { relabelfrom } for pid=491 comm="useradd" name=".bashrc"
dev="vda" ino=12641 scontext=root:sysadm_r:useradd_t
tcontext=user_u:object_r:user_home_t tclass=file permissive=0

Upstream-Status: Inappropriate [embedded specific]

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
---
 policy/modules/admin/usermanage.te  |  2 ++
 policy/modules/system/userdomain.if | 18 ++++++++++++++++++
 2 files changed, 20 insertions(+)

diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te
index 98646b4b4..50c479498 100644
--- a/policy/modules/admin/usermanage.te
+++ b/policy/modules/admin/usermanage.te
@@ -496,6 +496,7 @@ files_read_etc_runtime_files(useradd_t)
 
 fs_search_auto_mountpoints(useradd_t)
 fs_getattr_xattr_fs(useradd_t)
+fs_search_tmpfs(useradd_t)
 
 mls_file_upgrade(useradd_t)
 
@@ -541,6 +542,7 @@ userdom_home_filetrans_user_home_dir(useradd_t)
 userdom_manage_user_home_content_dirs(useradd_t)
 userdom_manage_user_home_content_files(useradd_t)
 userdom_user_home_dir_filetrans_user_home_content(useradd_t, notdevfile_class_set)
+userdom_relabel_user_home_content_files(useradd_t)
 
 optional_policy(`
 	mta_manage_spool(useradd_t)
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 22b3c1bf7..ec625170d 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -2362,6 +2362,24 @@ interface(`userdom_dontaudit_relabel_user_home_content_files',`
 	dontaudit $1 user_home_t:file relabel_file_perms;
 ')
 
+########################################
+## <summary>
+##	Relabel user home files.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`userdom_relabel_user_home_content_files',`
+	gen_require(`
+		type user_home_t;
+	')
+
+	allow $1 user_home_t:file relabel_file_perms;
+')
+
 ########################################
 ## <summary>
 ##	Read user home subdirectory symbolic links.
-- 
2.17.1