commit: 876526eaec1af77abca0b1033ef863882dd92b48 Author: David Sugar <dsugar <AT> tresys <DOT> com> AuthorDate: Fri Nov 2 00:38:01 2018 +0000 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> CommitDate: Sun Nov 11 23:17:31 2018 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=876526ea
Allow clamd_t to read /proc/sys/crypt/fips_enabled To fix the following denials: type=AVC msg=audit(1540821927.216:215): avc: denied { search } for pid=1726 comm="clamd" name="crypto" dev="proc" ino=68 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir type=AVC msg=audit(1540821927.216:215): avc: denied { read } for pid=1726 comm="clamd" name="fips_enabled" dev="proc" ino=69 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1540821927.216:215): avc: denied { open } for pid=1726 comm="clamd" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=69 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1540821927.216:216): avc: denied { getattr } for pid=1726 comm="clamd" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=69 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file Signed-off-by: Dave Sugar <dsugar <AT> tresys.com> Signed-off-by: Jason Zaman <jason <AT> perfinion.com> policy/modules/services/clamav.te | 1 + 1 file changed, 1 insertion(+) diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te index b8c53a58..b55bac56 100644 --- a/policy/modules/services/clamav.te +++ b/policy/modules/services/clamav.te @@ -104,6 +104,7 @@ manage_sock_files_pattern(clamd_t, clamd_var_run_t, clamd_var_run_t) files_pid_filetrans(clamd_t, clamd_var_run_t, { dir file sock_file }) kernel_dontaudit_list_proc(clamd_t) +kernel_read_crypto_sysctls(clamd_t) kernel_read_sysctl(clamd_t) kernel_read_kernel_sysctls(clamd_t) kernel_read_system_state(clamd_t)