diff mbox series

[meta-selinux,3/5] refpolicy: Added policy for systemd_user_runtime_dir_t to read tmp_t directory

Message ID IA3PR02MB111994BF0095DFFC47F0BD816F151A@IA3PR02MB11199.namprd02.prod.outlook.com
State New
Headers show
Series [meta-selinux,1/5] refpolicy: Added dontaudit on docker_t to manage /usr directory | expand

Commit Message

Gargi Misra April 2, 2026, 7:01 a.m. UTC
refpolicy: Added policy for systemd_user_runtime_dir_t to read tmp_t directory

avc:  denied  { read } for  pid=1201 comm="systemd-user-ru" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:systemd_user_runtime_dir_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir permissive=1

Upstream-Status: Backport [refpolicy: Added policy for systemd_user_runtime_dir_t to read tmp_t ... * SELinuxProject/refpolicy@eef80d4<https://github.com/SELinuxProject/refpolicy/commit/eef80d415802915a577584ccfe473bb2ad8e3fc6>]

Signed-off-by: Gargi Misra <gmisra@qti.qualcomm.com>
---
policy/modules/system/systemd.te | 1 +
1 file changed, 1 insertion(+)
diff mbox series

Patch

diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
index 2cbb6a3628..63b105663c 100644
--- a/policy/modules/system/systemd.te
+++ b/policy/modules/system/systemd.te
@@ -2450,6 +2450,7 @@  systemd_stream_connect_userdb(systemd_user_runtime_dir_t)
files_read_etc_files(systemd_user_runtime_dir_t)
# read /etc/machine-id
files_read_etc_runtime_files(systemd_user_runtime_dir_t)
+files_list_tmp(systemd_user_runtime_dir_t)
 fs_mount_tmpfs(systemd_user_runtime_dir_t)
fs_getattr_tmpfs(systemd_user_runtime_dir_t)