diff --git a/public/domain.te b/public/domain.te index c46d6fa874120ca4ad420e5f97c4c4bb83fa0095..95639c6f9ea30b7c64dcbdbdbe9f1e3244b6f4f0 100644 --- a/public/domain.te +++ b/public/domain.te @@ -1319,3 +1319,14 @@ neverallow { -zygote } self:capability dac_override; neverallow domain self:capability dac_read_search; + +# If an already existing file is opened with O_CREATE, the kernel might generate +# a false report of a create denial. Silence these denials and make sure that +# inappropriate permissions are not granted. +neverallow domain { + proc_type + sysfs_type +}:dir { add_name create link remove_name rename reparent rmdir write }; + +dontaudit domain proc_type:dir write; +dontaudit domain sysfs_type:dir write; diff --git a/public/file.te b/public/file.te index c0ea4d867217df71a38f605e548306b0a64d1116..156fce141519249a0ef180f6f7870de867ed0f4a 100644 --- a/public/file.te +++ b/public/file.te @@ -83,10 +83,10 @@ type sysfs_net, fs_type, sysfs_type; type sysfs_power, fs_type, sysfs_type; type sysfs_rtc, fs_type, sysfs_type; type sysfs_switch, fs_type, sysfs_type; -type sysfs_usb, sysfs_type, file_type, mlstrustedobject; +type sysfs_usb, fs_type, sysfs_type; type sysfs_wakeup_reasons, fs_type, sysfs_type; type sysfs_fs_ext4_features, sysfs_type, fs_type; -type fs_bpf, fs_type, sysfs_type; +type fs_bpf, fs_type; type configfs, fs_type; # /sys/devices/system/cpu type sysfs_devices_system_cpu, fs_type, sysfs_type;