Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Patches needed by systemd 255~rc2-1 in Debian/unstable that weren't needed in 254.5-1. #734

Closed
wants to merge 5 commits into from

Conversation

etbe
Copy link
Contributor

@etbe etbe commented Nov 18, 2023

No description provided.

etbe added 2 commits November 19, 2023 02:58
…eeded

in 254.5-1.

Now the program that launches daemons from systemd is running as initrc_t
so that needs some access that previously only init_t had.

It needs term_watch_reads_unallocated_ttys() to check the terminal devices
before launching getty.

In the init_daemon_domain() and init_system_domain() interfaces initrc_t
needs a nnp_transition due to more restrictive policies in systemd to use
nnp more.  Also those interfaces need to allow the daemon to talk to
initrc_t via a unix stream socket as that is apparently the stdout or
something.

In the auth_use_pam_systemd() macro systemd_logind_t needs to access file
descriptors from the PAM using program in question due to a change in
pam-systemd.so.  Not having this access results in the PAM code waiting
for a 20 second timeout before proceeding with the login.

xdm_t needs this auth_use_pam_systemd() interface, it apparently worked
before because even though it uses pam-systemd the operations that the
older version performed were permitted by other rules.

Finally added systemd_dbus_chat_hostnamed(xdm_t) which is needed by a
previous update to systemd (before 254.5-1).

Signed-off-by: Russell Coker <[email protected]>
@@ -1155,6 +1156,8 @@ ifdef(`init_systemd',`
# for logsave in strict configuration
fstools_write_log(initrc_t)

fs_mounton_memory_pressure(initrc_t)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What process is doing this? It seems odd that it would be an initrc_t process instead of init_t.

@@ -356,6 +356,12 @@ interface(`init_daemon_domain',`

domtrans_pattern(initrc_t, $2, $1)

# so new systemd and other mechanisms can set NNP and still execute a domain transition
allow initrc_t $1:process2 nnp_transition;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we want nosuid_transition too.

@@ -551,6 +557,12 @@ interface(`init_system_domain',`

domtrans_pattern(initrc_t, $2, $1)

# so systemd and other mechanisms can set NNP and still execute a domain transition
allow initrc_t $1:process2 nnp_transition;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add nosuid_transition


# for new systemd to redirect output to socket
allow $1 initrc_t:unix_stream_socket rw_socket_perms;

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please move the above additions to the below init_systemd block.

@@ -722,6 +722,7 @@ allow initrc_t self:fifo_file rw_fifo_file_perms;

allow initrc_t initrc_devpts_t:chr_file rw_term_perms;
term_create_pty(initrc_t, initrc_devpts_t)
term_watch_reads_unallocated_ttys(initrc_t)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should go in the init_systemd block.

@@ -1497,6 +1500,10 @@ optional_policy(`
rpm_delete_db(initrc_t)
')

optional_policy(`
userdom_watch_user_ttys(initrc_t)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems like this should go in the init_systemd block.

## </summary>
## </param>
#
interface(`systemd_logind_use_fds',`
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

systemd_use_logind_fds

@pebenito
Copy link
Member

I'd appreciate additional notes either in the commit messages or above in the PR description about what issues/new features these patches address. As demonstrated in #736, these details are important.

@pebenito
Copy link
Member

It looks like the systemd-executor labeling change should resolve several things here, see #732.

Copy link

This PR has not had any recent activity. It will be closed in 7 days if it makes no further progress.

@github-actions github-actions bot added the stale Issue/PR has not had any recent activity. label Jan 29, 2024
Copy link

github-actions bot commented Feb 5, 2024

Closing stale PR.

@github-actions github-actions bot closed this Feb 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
stale Issue/PR has not had any recent activity.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants