Commit Graph

7240 Commits

Author SHA1 Message Date
nisbet-hubbard 75c2805313
Update mysql.fc
Signed-off-by: nisbet-hubbard <87453615+nisbet-hubbard@users.noreply.github.com>
2024-09-15 07:58:57 +08:00
Chris PeBenito a0f8bd4ff7
Merge pull request #807 from dsugar100/main
Additional permissions when fapolicyd.conf more strict
2024-09-13 11:35:57 -04:00
Dave Sugar 70b06f1618
Additional permissions when fapolicyd.conf more strict
When fapolicyd is configured with allow_filesystem_mark = 1 it watches filesysems and mount points
When fapolicyd is configured with integrituy = sha256 it mmaps files to perform hash

node=localhost type=AVC msg=audit(1726153668.013:418): avc:  denied  { watch } for  pid=1561 comm="fapolicyd" path="/dev/shm" dev="tmpfs" ino=1 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0
node=localhost type=AVC msg=audit(1726154081.718:403): avc:  denied  { watch } for  pid=1598 comm="fapolicyd" path="/" dev="dm-1" ino=2 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=1
node=localhost type=AVC msg=audit(1726154081.718:403): avc:  denied  { watch_sb } for  pid=1598 comm="fapolicyd" path="/" dev="dm-1" ino=2 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=1
node=localhost type=AVC msg=audit(1726154081.718:402): avc:  denied  { watch_sb } for  pid=1598 comm="fapolicyd" path="/dev/shm" dev="tmpfs" ino=1 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir permissive=1
node=localhost type=AVC msg=audit(1726154081.721:404): avc:  denied  { watch_sb } for  pid=1598 comm="fapolicyd" path="/boot" dev="sda2" ino=128 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir permissive=1
node=localhost type=AVC msg=audit(1726154081.722:406): avc:  denied  { watch_sb } for  pid=1598 comm="fapolicyd" path="/var" dev="dm-9" ino=2 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir permissive=1
node=localhost type=AVC msg=audit(1726154706.227:415): avc:  denied  { map } for  pid=1594 comm="fapolicyd" path="/usr/bin/kmod" dev="dm-1" ino=14600 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:kmod_exec_t:s0 tclass=file permissive=0
node=localhost type=AVC msg=audit(1726154743.367:999): avc:  denied  { map } for  pid=1594 comm="fapolicyd" path="/usr/lib/systemd/systemd" dev="dm-1" ino=17564 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file permissive=0
node=localhost type=AVC msg=audit(1726154743.403:1030): avc:  denied  { map } for  pid=1594 comm="fapolicyd" path="/usr/bin/bash" dev="dm-1" ino=3571 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file permissive=0
node=localhost type=AVC msg=audit(1726154807.975:476): avc:  denied  { map } for  pid=1599 comm="fapolicyd" path="/usr/lib/systemd/user-environment-generators/30-systemd-environment-d-generator" dev="dm-1" ino=17589 scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:object_r:systemd_generator_exec_t:s0 tclass=file permissive=1

Signed-off-by: Dave Sugar <dsugar100@gmail.com>
2024-09-13 11:14:28 -04:00
Chris PeBenito 351a5a7f4d
Merge pull request #805 from yizhao1/systemd-v256
Fixes for systemd v256
2024-09-11 14:36:58 -04:00
Yi Zhao c20cf22142 systemd: allow systemd-hostnamed to read vsock device
Fixes:
avc:  denied  { read } for  pid=463 comm="systemd-hostnam" name="vsock"
dev="devtmpfs" ino=170 scontext=system_u:system_r:systemd_hostnamed_t:s0-s15:c0.c1023
tcontext=system_u:object_r:vsock_device_t:s0 tclass=chr_file permissive=0

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-10 15:45:32 +08:00
Yi Zhao 4f3437040a systemd: fix policy for systemd-ssh-generator
Fixes:
avc:  denied  { getattr } for  pid=121 comm="systemd-ssh-gen"
path="/usr/sbin/sshd" dev="vda" ino=7787
scontext=system_u:system_r:systemd_generator_t
tcontext=system_u:object_r:sshd_exec_t tclass=file permissive=1

avc:  denied  { execute } for  pid=121 comm="systemd-ssh-gen"
name="sshd" dev="vda" ino=7787
scontext=system_u:system_r:systemd_generator_t
tcontext=system_u:object_r:sshd_exec_t tclass=file permissive=1

avc:  denied  { create } for  pid=121 comm="systemd-ssh-gen"
scontext=system_u:system_r:systemd_generator_t
tcontext=system_u:system_r:systemd_generator_t tclass=vsock_socket
permissive=1

avc:  denied  { read } for  pid=121 comm="systemd-ssh-gen" name="vsock"
dev="devtmpfs" ino=152 scontext=system_u:system_r:systemd_generator_t
tcontext=system_u:object_r:device_t tclass=chr_file permissive=1

avc:  denied  { open } for  pid=121 comm="systemd-ssh-gen"
path="/dev/vsock" dev="devtmpfs" ino=152
scontext=system_u:system_r:systemd_generator_t
tcontext=system_u:object_r:device_t tclass=chr_file permissive=1

avc:  denied  { ioctl } for  pid=121 comm="systemd-ssh-gen"
path="/dev/vsock" dev="devtmpfs" ino=152 ioctlcmd=0x7b9
scontext=system_u:system_r:systemd_generator_t
tcontext=system_u:object_r:device_t tclass=chr_file permissive=1

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-10 14:37:49 +08:00
Yi Zhao d852b75403 devices: add label vsock_device_t for /dev/vsock
Vsock is a Linux socket family designed to allow communication between a
VM and its hypervisor. Add a new label vsock_device_t for vsock device.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-10 14:37:46 +08:00
Yi Zhao a4a7b830fe systemd: add policy for systemd-nsresourced
The systemd-nsresourced service was added in systemd v256[1]. Add policy
for this service and allow all domains to connect to it over unix
socket.

Fixes:
avc:  denied  { connectto } for  pid=325 comm="avahi-daemon"
path="/run/systemd/io.systemd.NamespaceResource"
scontext=system_u:system_r:avahi_t tcontext=system_u:system_r:initrc_t
tclass=unix_stream_socket permissive=1

avc:  denied  { write } for  pid=327 comm="dbus-daemon"
name="io.systemd.NamespaceResource" dev="tmpfs" ino=54
scontext=system_u:system_r:system_dbusd_t
tcontext=system_u:object_r:init_runtime_t tclass=sock_file permissive=1

avc:  denied  { connectto } for  pid=327 comm="dbus-daemon"
path="/run/systemd/io.systemd.NamespaceResource"
scontext=system_u:system_r:system_dbusd_t
tcontext=system_u:system_r:initrc_t tclass=unix_stream_socket
permissive=1

avc:  denied  { connectto } for  pid=200 comm="systemd-userwor"
path="/run/systemd/io.systemd.NamespaceResource"
scontext=system_u:system_r:systemd_userdbd_t
tcontext=system_u:system_r:initrc_t tclass=unix_stream_socket
permissive=1

avc:  denied  { connectto } for  pid=198 comm="systemd-userwor"
path="/run/systemd/io.systemd.NamespaceResource"
scontext=system_u:system_r:systemd_userdbd_t
tcontext=system_u:system_r:initrc_t tclass=unix_stream_socket
permissive=1

[1] 8aee931e7a

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-10 14:36:43 +08:00
Yi Zhao 47081be472 systemd: allow system --user to create netlink_route_socket
Fixes:
avc:  denied  { create } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { getopt } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { setopt } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { bind } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { getattr } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { write } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { nlmsg_read } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { read } for  pid=373 comm="systemd"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=netlink_route_socket
permissive=1

avc:  denied  { sendto } for  pid=378 comm="(ystemctl)"
scontext=root:sysadm_r:sysadm_systemd_t
tcontext=root:sysadm_r:sysadm_systemd_t tclass=unix_dgram_socket
permissive=1

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-03 09:41:52 +08:00
Yi Zhao 78cacc7088 systemd: allow systemd-networkd to manage sock files under /run/systemd/netif
Fixes:
avc:  denied  { create } for  pid=344 comm="systemd-network"
name="io.systemd.Network" scontext=system_u:system_r:systemd_networkd_t
tcontext=system_u:object_r:systemd_networkd_runtime_t tclass=sock_file
permissive=1

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-03 09:41:49 +08:00
Yi Zhao 29d0bb8c33 systemd: set context to systemd_networkd_var_lib_t for /var/lib/systemd/network
Fixes:
avc:  denied  { read } for  pid=344 comm="systemd-network"
path="/var/lib/systemd/network" dev="vda" ino=30708
scontext=system_u:system_r:systemd_networkd_t
tcontext=system_u:object_r:init_var_lib_t tclass=dir permissive=1

avc:  denied  { write } for  pid=344 comm="systemd-network"
name="network" dev="vda" ino=30708
scontext=system_u:system_r:systemd_networkd_t
tcontext=system_u:object_r:init_var_lib_t tclass=dir permissive=1

avc:  denied  { getattr } for  pid=344 comm="systemd-network"
path="/var/lib/systemd/network" dev="vda" ino=30708
scontext=system_u:system_r:systemd_networkd_t
tcontext=system_u:object_r:init_var_lib_t tclass=dir permissive=1

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-09-03 09:41:47 +08:00
Chris PeBenito 6d29eb2388
Merge pull request #806 from gtrentalancia/netlabel_fix
Allow interactive user terminal output for the NetLabel management tool
2024-08-28 12:08:59 -04:00
Guido Trentalancia 22fd3ddad4 Allow interactive user terminal output for the
NetLabel management tool.

Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
---
 policy/modules/system/netlabel.te |    2 ++
 1 file changed, 2 insertions(+)
2024-08-27 14:34:42 +02:00
Chris PeBenito faa409e9f4
Merge pull request #801 from 0xC0ncord/various/20240807
Various fixes
2024-08-21 10:25:47 -04:00
Chris PeBenito 33cfaeb417
Merge pull request #804 from pebenito/quic_nakella-dbus-bluetooth-helper
Adding SE Policy rules to allow usage of unix stream sockets by dbus …
2024-08-19 08:56:29 -04:00
Chris PeBenito c1284c6019 bluetooth: Move line.
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
2024-08-19 08:19:48 -04:00
Naga Bhavani Akella 50a5555f2f Adding SE Policy rules to allow usage of unix stream sockets by dbus and bluetooth contexts when Gatt notifications are turned on by remote.
Below are the avc denials that are resolved -

1. AVC avc:  denied  { use } for  pid=916 comm="dbus-daemon"
path="socket:[71126]" dev="sockfs" ino=71126
scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023
tcontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
tclass=fd permissive=0

2. AVC avc:  denied  { read write } for  pid=913 comm="dbus-daemon"
path="socket:[25037]" dev="sockfs" ino=25037
scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023
tcontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
tclass=unix_stream_socket permissive=0

3. AVC avc:  denied  { use } for  pid=910 comm="bluetoothd"
path="socket:[23966]" dev="sockfs" ino=23966
scontext=system_u:system_r:bluetooth_t:s0-s15:c0.c1023
tcontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
tclass=fd permissive=0

4. AVC avc:  denied  { read write } for  pid=2229 comm="bluetoothd"
path="socket:[27264]" dev="sockfs" ino=27264
scontext=system_u:system_r:bluetooth_t:s0-s15:c0.c1023
tcontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
tclass=unix_stream_socket permissive=0

Signed-off-by: Naga Bhavani Akella <quic_nakella@quicinc.com>
2024-08-19 08:15:10 -04:00
Kenton Groombridge 2b8fa2b4ab kubernetes: allow kubelet to connect all TCP ports
For pod health checks.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-16 14:38:37 -04:00
Kenton Groombridge 9ab94df30d container: allow reading generic certs
There are cases where one may want to mount certs on the host into a
container.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-16 14:38:19 -04:00
Chris PeBenito 274de5bb5d
Merge pull request #802 from 0xC0ncord/kubevirt
Add policy for KubeVirt
2024-08-16 14:21:53 -04:00
Chris PeBenito b15f50a428
Merge pull request #803 from cgzones/quotes
Makefile: drop duplicate quotes
2024-08-16 14:02:54 -04:00
Kenton Groombridge 7530dfa3c6 testing: add container_kvm_t to net admin exempt list
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-14 10:14:33 -04:00
Christian Göttsche 47eced9be5 Makefile: drop duplicate quotes
The variable is used quoted.

Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
2024-08-10 22:40:31 +02:00
Kenton Groombridge b0b0d52dd6 various: rules required for DV manipulation in kubevirt
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-09 15:36:57 -04:00
Kenton Groombridge 21e4a44c0c container: add container_kvm_t and supporting kubevirt rules
container_kvm_t is the type for containers with access to KVM for
running virtual machines.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-09 15:30:01 -04:00
Kenton Groombridge a9bd177bbb iptables: allow reading container engine tmp files
When multus creates a new network, iptables rules get written to /tmp
and iptables will be called to load them.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-09 15:23:24 -04:00
Kenton Groombridge af0b408246 container: allow spc various rules for kubevirt
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-09 15:21:18 -04:00
Kenton Groombridge d585f08c27 container, kubernetes: add supporting rules for kubevirt and multus
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-09 15:14:27 -04:00
Kenton Groombridge 9f37f86b21 dbus: dontaudit session bus domains the netadmin capability
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-07 16:55:28 -04:00
Kenton Groombridge d9ca32f5ae container: allow super privileged containers to manage BPF dirs
Seen on a recent update to Cilium.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-07 16:54:09 -04:00
Kenton Groombridge 1900fbe681 kubernetes: allow kubelet to create unlabeled dirs
When kubelet sets up a container that 1) has mountpoints using subPath
directories and 2) has a volume that is newly provisioned and not yet
relabeled, kubelet will create the mountpoint directories on this volume
before relabeling it. Allow kubelet to create these directories.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-07 16:51:38 -04:00
Kenton Groombridge b9c8ba607c haproxy: allow interactive usage
Allow haproxy to be run interactively, e.g. to test its config file and
report errors.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-07 16:48:24 -04:00
Kenton Groombridge 846804c58a podman: allow managing init runtime units
Containers created via quadlet become runtime units. Podman auto-update
can still restart these, but it needs the appropriate access.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-07 16:43:28 -04:00
Kenton Groombridge 8787b3d8d5 iptables: allow reading usr files
The nftables program reads files in /usr/share/iproute2.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-08-07 16:12:15 -04:00
Chris PeBenito 71f4bd1992
Merge pull request #799 from dsseng/gadgetfs-usbfs
filesystem, devices: move gadgetfs to usbfs_t
2024-07-22 09:17:22 -04:00
Dmitry Sharshakov a6cf207363
filesystem, devices: move gadgetfs to usbfs_t
It is a USB Gadget config pseudo-FS, not a network nor distributed FS

Signed-off-by: Dmitry Sharshakov <d3dx12.xx@gmail.com>
2024-07-20 20:37:47 +03:00
Chris PeBenito 1b11d94cd7
Merge pull request #792 from yizhao1/systemd
systemd: make xdg optional
2024-07-12 08:28:35 -04:00
Yi Zhao 75492f95f7 systemd: make xdg optional
Make xdg optional to avoid a potential build error.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-07-12 19:23:06 +08:00
Chris PeBenito 302e66507a
Merge pull request #794 from 0xC0ncord/main
systemd: allow logind to use locallogin pidfds
2024-07-10 10:19:43 -04:00
Chris PeBenito b65469f826
Merge pull request #793 from 0xC0ncord/sshd-session
sshd: label sshd-session as sshd_exec_t
2024-07-10 10:19:15 -04:00
Kenton Groombridge 097d688ff8 sshd: label sshd-session as sshd_exec_t
OpenSSH 9.8 splits out much of the session code from the main sshd
binary into a new sshd-session binary. Allow the sshd server to execute
this binary by labeling it as sshd_exec_t.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-07-05 14:47:47 -04:00
Chris PeBenito 6cacc4871a
Merge pull request #791 from pebenito/quic_nakella-bluetoothctl
Setting bluetooth helper domain for bluetoothctl
2024-07-01 15:24:37 -04:00
Chris PeBenito b3c272d6ac
Merge pull request #790 from pebenito/quic_rbujala-pulseaudio
Adding Sepolicy rules to allow pulseaudio to access bluetooth sockets.
2024-07-01 15:17:54 -04:00
Chris PeBenito 73c2c68ee7
Merge pull request #789 from yizhao1/update
userdomain: allow administrative user to get attributes of shadow his…
2024-07-01 15:12:24 -04:00
Naga Bhavani Akella b57b6005c5 Setting bluetooth helper domain for bluetoothctl
Required for fixing the below avc denials -

    1. audit: type=1400 audit(1651238006.276:496):
    avc:  denied  { read write } for  pid=2165 comm="bluetoothd"
    path="socket:[43207]" dev="sockfs" ino=43207
    scontext=system_u:system_r:bluetooth_t:s0-s15:c0.c1023
    tcontext=system_u:system_r:initrc_t:s0-s15:c0.c1023
    tclass=unix_stream_socket permissive=1
    2. audit: type=1400 audit(1651238006.276:497):
    avc:  denied  { getattr } for  pid=2165 comm="bluetoothd"
    path="socket:[43207]" dev="sockfs" ino=43207
    scontext=system_u:system_r:bluetooth_t:s0-s15:c0.c1023
    tcontext=system_u:system_r:initrc_t:s0-s15:c0.c1023
    tclass=unix_stream_socket permissive=1
    3. audit: type=1400 audit(1651238006.272:495):
    avc:  denied  { read write } for  pid=689 comm="dbus-daemon"
    path="socket:[43207]" dev="sockfs" ino=43207
    scontext=system_u:system_r:system_dbusd_t:s0-s15:c0.c1023
    tcontext=system_u:system_r:initrc_t:s0-s15:c0.c1023
    tclass=unix_stream_socket permissive=1
    4. audit[1894]: AVC avc:  denied  { read write } for  pid=1894
    comm="bluetoothctl" path="/dev/pts/0" dev="devpts" ino=3
    scontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
    tcontext=system_u:object_r:initrc_devpts_t:s0
    tclass=chr_file permissive=0
    5. audit[2022]: AVC avc:  denied  { use } for  pid=2022
    comm="bluetoothctl" path="socket:[25769]" dev="sockfs" ino=25769
    scontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
    tcontext=system_u:system_r:bluetooth_t:s0-s15:c0.c1023
    tclass=fd permissive=0
    6. audit[2006]: AVC avc:  denied  { read write } for  pid=2006
    comm="bluetoothctl" path="socket:[21106]" dev="sockfs" ino=21106
    scontext=system_u:system_r:bluetooth_helper_t:s0-s15:c0.c1023
    tcontext=system_u:system_r:bluetooth_t:s0-s15:c0.c1023
    tclass=unix_stream_socket permissive=0

    Signed-off-by: Naga Bhavani Akella <quic_nakella@quicinc.com>
2024-07-01 14:48:07 -04:00
Raghavender Reddy Bujala 30f451d6a4 Adding Sepolicy rules to allow pulseaudio to access bluetooth sockets.
pulseaudio uses bluetooth sockets for HFP-AG and
HSP-HS profile to do SLC and SCO connection with
remote.

avc:  denied  { create } for  pid=1271 comm="pulseaudio" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { bind } for  pid=1271 comm="pulseaudio" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { listen } for  pid=1271 comm="pulseaudio" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { accept } for  pid=1271 comm="pulseaudio" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { getopt } for  pid=1271 comm="bluetooth" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { setopt } for  pid=1271 comm="bluetooth" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { read } for  pid=1271 comm="bluetooth" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { write } for  pid=1271 comm="bluetooth" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { shutdown } for  pid=137606 comm="pulseaudio" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

avc:  denied  { connect } for  pid=137606 comm="pulseaudio" scontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tcontext=system_u:system_r:pulseaudio_t:s0-s15:c0.c1023 tclass=bluetooth_socket permissive=1

Signed-off-by: Raghavender Reddy Bujala <quic_rbujala@quicinc.com>
2024-07-01 14:46:40 -04:00
Kenton Groombridge 7037c341fb systemd: allow logind to use locallogin pidfds
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-07-01 09:42:33 -04:00
Yi Zhao 5f7f494d19 userdomain: allow administrative user to get attributes of shadow history file
Before the patch:
root@qemux86-64:~# ls -lZ /etc/security/opasswd
-?????????? ? ?    ?    ?                                    ?  ? /etc/security/opasswd

After the patch:
root@qemux86-64:~# ls -lZ /etc/security/opasswd
-rw-------. 1 root root user_u:object_r:shadow_history_t 237 Jun 30 12:03 /etc/security/opasswd

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
2024-06-30 22:27:12 +08:00
Chris PeBenito 7c797909a2
Merge pull request #787 from 0xC0ncord/various/20240515
Various fixes
2024-06-28 13:25:54 -04:00
Kenton Groombridge 0126cb1e66 node_exporter: allow reading RPC sysctls
For NFS mounts.

Signed-off-by: Kenton Groombridge <concord@gentoo.org>
2024-06-28 12:21:42 -04:00