From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 5DB30158020 for ; Wed, 12 Oct 2022 13:35:04 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 2566CE0969; Wed, 12 Oct 2022 13:35:03 +0000 (UTC) Received: from smtp.gentoo.org (dev.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 0D818E0969 for ; Wed, 12 Oct 2022 13:35:03 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 929EC3410CF for ; Wed, 12 Oct 2022 13:35:01 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 11ED8621 for ; Wed, 12 Oct 2022 13:34:59 +0000 (UTC) From: "Kenton Groombridge" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Kenton Groombridge" Message-ID: <1662232070.d50193d70d6d2620c82c112a534d36a6ff06e6ea.concord@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:concord-dev commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/systemd.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: concord X-VCS-Committer-Name: Kenton Groombridge X-VCS-Revision: d50193d70d6d2620c82c112a534d36a6ff06e6ea X-VCS-Branch: concord-dev Date: Wed, 12 Oct 2022 13:34:59 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: 09dcf221-4754-47b6-aa73-fe9b6f27d3b4 X-Archives-Hash: 7e37acbe4494e550693fc8080a0916ba commit: d50193d70d6d2620c82c112a534d36a6ff06e6ea Author: Dave Sugar gmail com> AuthorDate: Fri Aug 26 12:45:38 2022 +0000 Commit: Kenton Groombridge gentoo org> CommitDate: Sat Sep 3 19:07:50 2022 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d50193d7 systemd: systemd-update-done fix startup issue Seeing error: Failed to initalize SELinux labeling handle: No such file or directory but no denials. With strace (and looking at source) found it is opening /etc/selinux/config openat(AT_FDCWD, "/etc/selinux/config", O_RDONLY|O_CLOEXEC) = 3 but that was dontaudited. allow systemd_update_done_t file_type:filesystem getattr; allow systemd_update_done_t selinux_config_t:dir { getattr open search }; dontaudit systemd_update_done_t selinux_config_t:dir { getattr open search }; dontaudit systemd_update_done_t selinux_config_t:file { getattr ioctl lock open read }; These changes fix the issue Signed-off-by: Dave Sugar gmail.com> Signed-off-by: Jason Zaman gentoo.org> policy/modules/system/systemd.te | 1 + 1 file changed, 1 insertion(+) diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index 2dc8b901..1eb35aa4 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -1752,6 +1752,7 @@ kernel_read_kernel_sysctls(systemd_update_done_t) selinux_use_status_page(systemd_update_done_t) +seutil_read_config(systemd_update_done_t) seutil_read_file_contexts(systemd_update_done_t) systemd_log_parse_environment(systemd_update_done_t)