diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if index 42de367d7..20c81fb21 100644 --- a/policy/modules/kernel/files.if +++ b/policy/modules/kernel/files.if @@ -6737,6 +6737,25 @@ interface(`files_relabel_all_pid_dirs',` relabel_dirs_pattern($1, pidfile, pidfile) ') +######################################## +## +## Relabel to/from all var_run (pid) socket files +## +## +## +## Domain alloed access. +## +## +# +interface(`files_relabel_all_pid_sock_files',` + gen_require(` + attribute pidfile; + ') + + relabel_sock_files_pattern($1, pidfile, pidfile) +') + + ######################################## ## ## Relabel to/from all var_run (pid) files and directories diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index 17c31fa78..a704d3ce3 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -320,6 +320,7 @@ ifdef(`init_systemd',` files_mounton_root(init_t) files_search_pids(init_t) files_relabel_all_pids(init_t) + files_relabel_all_pid_sock_files(init_t) files_relabelto_etc_runtime_dirs(init_t) files_relabelto_etc_runtime_files(init_t) files_read_all_locks(init_t)