Allow fapolicyd connect to systemd-userdbd over a unix socket #18
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The commit addresses the following AVC denial and 2 related ones:
type=PROCTITLE msg=audit(03/13/2024 05:37:15.796:150) : proctitle=/usr/sbin/fapolicyd type=PATH msg=audit(03/13/2024 05:37:15.796:150) : item=0 name=/run/systemd/userdb/io.systemd.DropIn inode=479 dev=00:19 mode=socket,666 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:systemd_userdbd_runtime_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 type=SOCKADDR msg=audit(03/13/2024 05:37:15.796:150) : saddr={ saddr_fam=local path=/run/systemd/userdb/io.systemd.DropIn } type=SYSCALL msg=audit(03/13/2024 05:37:15.796:150) : arch=x86_64 syscall=connect success=no exit=EACCES(Permission denied) a0=0x8 a1=0x7ffc6c364060 a2=0x28 a3=0x4 items=1 ppid=1 pid=898 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=fapolicyd exe=/usr/sbin/fapolicyd subj=system_u:system_r:fapolicyd_t:s0 key=(null) type=AVC msg=audit(03/13/2024 05:37:15.796:150) : avc: denied { connectto } for pid=898 comm=fapolicyd path=/run/systemd/userdb/io.systemd.Multiplexer scontext=system_u:system_r:fapolicyd_t:s0 tcontext=system_u:system_r:systemd_userdbd_t:s0 tclass=unix_stream_socket permissive=0