chiark / gitweb /
selinux: relabel /run the same way as /dev after loading the policy since they both...
authorLennart Poettering <lennart@poettering.net>
Mon, 4 Apr 2011 14:56:51 +0000 (16:56 +0200)
committerLennart Poettering <lennart@poettering.net>
Mon, 4 Apr 2011 14:58:23 +0000 (16:58 +0200)
src/mount-setup.c
src/selinux-setup.c

index 49eab0bfa72ef5b148d53f70ae9582415207f351..a42ed439571370a9899887fc91b60decbc477a8a 100644 (file)
@@ -243,8 +243,10 @@ int mount_setup(void) {
          * appropriate labels, after mounting. The other virtual API
          * file systems do not need. */
 
-        if (unlink("/dev/.systemd-relabel-devtmpfs") >= 0)
+        if (unlink("/dev/.systemd-relabel-run-dev") >= 0) {
                 nftw("/dev", nftw_cb, 64, FTW_MOUNT|FTW_PHYS);
+                nftw("/run", nftw_cb, 64, FTW_MOUNT|FTW_PHYS);
+        }
 
         /* Create a few default symlinks, which are normally created
          * bei udevd, but some scripts might need them before we start
index e21ff6bb9fc9d14ca2416b5cda56172aa83b25ce..c32c7ad8db5fb9c59341a63fc6c1d38d2e367a11 100644 (file)
@@ -43,9 +43,9 @@ int selinux_setup(char *const argv[]) {
                return 0;
 
        /* Before we load the policy we create a flag file to ensure
-        * that after the reexec we iterate through /dev to relabel
-        * things. */
-       touch("/dev/.systemd-relabel-devtmpfs");
+        * that after the reexec we iterate through /run and /dev to
+        * relabel things. */
+       touch("/dev/.systemd-relabel-run-dev");
 
        if (selinux_init_load_policy(&enforce) == 0) {
                log_debug("Successfully loaded SELinux policy, reexecuting.");
@@ -60,7 +60,7 @@ int selinux_setup(char *const argv[]) {
        } else {
                log_full(enforce > 0 ? LOG_ERR : LOG_WARNING, "Failed to load SELinux policy.");
 
-               unlink("/dev/.systemd-relabel-devtmpfs");
+               unlink("/dev/.systemd-relabel-run-dev");
 
                if (enforce > 0)
                        return -EIO;