Skip to content

Commit

Permalink
The kernel domain should be able to mounton default directories
Browse files Browse the repository at this point in the history
during switch_root.

Corresponding suspicious permissions are removed from the init
domain, however this might need further testing on a wider number
of systems.

Signed-off-by: Guido Trentalancia <[email protected]>
---
 policy/modules/kernel/kernel.te |    1 +
 policy/modules/system/init.te   |    4 ----
 2 files changed, 1 insertion(+), 4 deletions(-)
  • Loading branch information
gtrentalancia committed Aug 24, 2023
1 parent 718139c commit 191f6d2
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 4 deletions.
1 change: 1 addition & 0 deletions policy/modules/kernel/kernel.te
Original file line number Diff line number Diff line change
Expand Up @@ -365,6 +365,7 @@ files_getattr_etc_runtime_dirs(kernel_t)
files_mounton_etc_runtime_dirs(kernel_t)
files_list_home(kernel_t)
files_read_usr_files(kernel_t)
files_mounton_default(kernel_t)

mcs_process_set_categories(kernel_t)

Expand Down
4 changes: 0 additions & 4 deletions policy/modules/system/init.te
Original file line number Diff line number Diff line change
Expand Up @@ -850,10 +850,6 @@ files_exec_etc_files(initrc_t)
files_read_usr_files(initrc_t)
files_manage_urandom_seed(initrc_t)
files_manage_generic_spool(initrc_t)
# Mount and unmount file systems.
# cjp: not sure why these are here; should use mount policy
files_list_default(initrc_t)
files_mounton_default(initrc_t)
files_manage_mnt_dirs(initrc_t)
files_manage_mnt_files(initrc_t)

Expand Down

0 comments on commit 191f6d2

Please sign in to comment.