1 |
commit: a4cd0594e707a739edae6a241a92823e90e31203 |
2 |
Author: David Sugar <dsugar <AT> tresys <DOT> com> |
3 |
AuthorDate: Tue Dec 12 02:15:28 2017 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Dec 13 12:03:31 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=a4cd0594 |
7 |
|
8 |
Allow systemd_logind to delete user_runtime_content_type files |
9 |
|
10 |
Now that objects in /run/user/%{USERID}/* use the attribute user_runtime_content_type use interfaces userdom_delete_all_user_runtime_* to allow deletion of these objects. |
11 |
|
12 |
type=AVC msg=audit(1511920346.734:199): avc: denied { read } for pid=1067 comm="systemd-logind" name="dconf" dev="tmpfs" ino=14745 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir |
13 |
type=AVC msg=audit(1511920346.734:199): avc: denied { open } for pid=1067 comm="systemd-logind" path="/run/user/998/dconf" dev="tmpfs" ino=14745 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir |
14 |
type=AVC msg=audit(1511920346.734:200): avc: denied { getattr } for pid=1067 comm="systemd-logind" path="/run/user/998/dconf" dev="tmpfs" ino=14745 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir |
15 |
type=AVC msg=audit(1511920346.734:201): avc: denied { write } for pid=1067 comm="systemd-logind" name="dconf" dev="tmpfs" ino=14745 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir |
16 |
type=AVC msg=audit(1511920346.734:201): avc: denied { remove_name } for pid=1067 comm="systemd-logind" name="user" dev="tmpfs" ino=14746 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir |
17 |
type=AVC msg=audit(1511920346.734:201): avc: denied { unlink } for pid=1067 comm="systemd-logind" name="user" dev="tmpfs" ino=14746 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file |
18 |
type=AVC msg=audit(1511920346.734:202): avc: denied { rmdir } for pid=1067 comm="systemd-logind" name="dconf" dev="tmpfs" ino=14745 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir |
19 |
|
20 |
Signed-off-by: Dave Sugar <dsugar <AT> tresys.com> |
21 |
|
22 |
policy/modules/system/systemd.te | 6 +++++- |
23 |
1 file changed, 5 insertions(+), 1 deletion(-) |
24 |
|
25 |
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te |
26 |
index 9ab85680..f64059b1 100644 |
27 |
--- a/policy/modules/system/systemd.te |
28 |
+++ b/policy/modules/system/systemd.te |
29 |
@@ -445,6 +445,11 @@ udev_list_pids(systemd_logind_t) |
30 |
udev_read_db(systemd_logind_t) |
31 |
udev_read_pid_files(systemd_logind_t) |
32 |
|
33 |
+userdom_delete_all_user_runtime_dirs(systemd_logind_t) |
34 |
+userdom_delete_all_user_runtime_files(systemd_logind_t) |
35 |
+userdom_delete_all_user_runtime_named_pipes(systemd_logind_t) |
36 |
+userdom_delete_all_user_runtime_named_sockets(systemd_logind_t) |
37 |
+userdom_delete_all_user_runtime_symlinks(systemd_logind_t) |
38 |
userdom_manage_user_runtime_dirs(systemd_logind_t) |
39 |
userdom_manage_user_runtime_root_dirs(systemd_logind_t) |
40 |
userdom_mounton_user_runtime_dirs(systemd_logind_t) |
41 |
@@ -454,7 +459,6 @@ userdom_relabel_user_tmpfs_files(systemd_logind_t) |
42 |
userdom_relabelfrom_user_runtime_dirs(systemd_logind_t) |
43 |
userdom_relabelto_user_runtime_dirs(systemd_logind_t) |
44 |
userdom_setattr_user_ttys(systemd_logind_t) |
45 |
-userdom_delete_user_runtime_files(systemd_logind_t) |
46 |
userdom_use_user_ttys(systemd_logind_t) |
47 |
|
48 |
# Needed to work around patch not yet merged into the systemd-logind supported on RHEL 7.x |