type=AVC msg=audit(1554324562.840:159): avc: denied { sendto } for pid=7277 comm="systemd-backlig" path="/run/systemd/journal/socket" scontext=system_u:system_r:systemd_backlight_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=1 type=AVC msg=audit(1554324271.863:245): avc: denied { sendto } for pid=7421 comm="systemd-user-se" path="/run/systemd/journal/socket" scontext=system_u:system_r:systemd_sessions_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=0 type=AVC msg=audit(1554324635.844:313): avc: denied { sendto } for pid=7744 comm="systemd-cryptse" path="/run/systemd/journal/socket" scontext=system_u:system_r:lvm_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=unix_dgram_socket permissive=1 Signed-off-by: Dave Sugar <dsugar@xxxxxxxxxx> --- policy/modules/system/lvm.te | 1 + policy/modules/system/systemd.te | 4 ++++ 2 files changed, 5 insertions(+) diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te index ec3b4a18..aea199d4 100644 --- a/policy/modules/system/lvm.te +++ b/policy/modules/system/lvm.te @@ -222,6 +222,7 @@ filetrans_pattern(lvm_t, lvm_etc_t, lvm_metadata_t, file) files_etc_filetrans(lvm_t, lvm_metadata_t, file) files_search_mnt(lvm_t) +kernel_dgram_send(lvm_t) kernel_request_load_module(lvm_t) kernel_get_sysvipc_info(lvm_t) kernel_read_system_state(lvm_t) diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index f6455f6f..541117a9 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -228,6 +228,8 @@ dev_rw_sysfs(systemd_backlight_t) # for udev.conf files_read_etc_files(systemd_backlight_t) +kernel_dgram_send(systemd_backlight_t) + # for /run/udev/data/+backlight* udev_read_pid_files(systemd_backlight_t) @@ -981,6 +983,8 @@ allow systemd_sessions_t self:process setfscreate; allow systemd_sessions_t systemd_sessions_var_run_t:file manage_file_perms; files_pid_filetrans(systemd_sessions_t, systemd_sessions_var_run_t, file) +kernel_dgram_send(systemd_sessions_t) + selinux_get_enforce_mode(systemd_sessions_t) selinux_get_fs_mount(systemd_sessions_t) -- 2.20.1