SELinux/FAQ

From Gentoo Wiki
Jump to:navigation Jump to:search

SELinux is a system of mandatory access controls that can enforce the security policy over all processes and objects in the system.

Introduction

Using SELinux requires administrators a more thorough knowledge of their system and a good idea on how processes should behave. Next to the SELinux resources, a proper FAQ allows us to inform and help users in their day-to-day SELinux experience.

The FAQ is an aggregation of solutions found on IRC, mailinglists, forums and elsewhere. It focuses on SELinux integration on Gentoo Hardened, but general SELinux questions that are popping up regularly will be incorporated as well.

General SELinux support questions

Does SELinux enforce resource limits?

No, resource limits are outside the scope of an access control system. If this type of support is required, take a look at technologies like cgroups, PAM and the like.

Can I use SELinux and the hardened compiler (with PIE-SSP)?

Definitely. It is recommended to do so.

Can I use SELinux with any file system?

SELinux requires access to a file's security context to operate properly. To do so, SELinux uses extended file attributes which needs to be properly supported by the underlying file system. If the file system supports extended file attributes and you have configured your kernel to enable this support, then SELinux will work on those file systems.

General Linux file systems, such as ext2, ext3, ext4, jfs, xfs and btrfs support extended attributes (but don't forget to enable it in the kernel configuration) as well as tmpfs (for instance used by udev). If your file system collection is limited to this set, then you should have no issues.

Ancillary file systems such as vfat and iso9660 are supported too, but with an important caveat: all files in each file system will have the same SELinux security context information since these file systems do not support extended file attributes.

Network file systems can be supported in the same manner as ancillary file systems (all files share the same security context). However, some development has been made in supported extended file attributes on the more popular file systems such as NFS. Although this is far from production-ready, it does look like we will eventually support these file systems on SELinux fully as well.

Can I use SELinux with amd64 no-multilib?

Yes, just use the hardened/linux/amd64/no-multilib/selinux profile and you're all set.

Can I use SELinux with systemd?

Yes, experimental support is available with the systemd/selinux profile. Users are encouraged to try it and report bugs.

What is UBAC exactly?

UBAC, or User Based Access Control, introduces additional constraints when using SELinux policy. Participating domains / types that are both marked as a ubac_constrained_type (which is an attribute) will only have the allowed privileges in effect if they both run with the same SELinux user context.

CODE Example of UBAC behavior
# The SELinux allow rule
allow foo_t bar_t:file { read };

# This will succeed:
staff_u:staff_r:foo_t reads file with type staff_u:object_r:bar_t

# This will be prohibited:
user_u:user_r:foo_t reads file with type staff_u:object_r:bar_t

Of course, this is not always the case. Besides the earlier mentioned requirement that both types are ubac_constrained_type, if the source domain is sysadm_t, then the constraint will not be in effect (the sysadm_t domain is exempt from UBAC constraints). Also, if the source or destination SELinux user is system_u then the constraint will also not be in effect.

Python: global name 'audit' is not defined

If semanage fails with NameError: global name 'audit' is not defined, you need to ensure that sys-process/audit has the python use flag enabled.

Using SELinux

How do I enable SELinux?

This is explained in the SELinux installation instructions.

How do I switch between permissive and enforcing?

The easiest way is to use the setenforce command. With setenforce 0 SELinux is told to run in permissive mode. Similarly, with setenforce 1 SELinux is told to run in enforcing mode.

It is also possible to add a kernel option enforcing=0 or enforcing=1 in the bootloader configuration (or during the startup routine of the system). This allows users to run SELinux in permissive or enforcing mode from the start of the system.

The default state of the system is kept in /etc/selinux/config.

How do I disable SELinux completely?

It might be possible that running SELinux in permissive mode is not sufficient to properly fix any issue you have. To disable SELinux completely, you need to edit /etc/selinux/config and set SELINUX=disabled. Next, reboot the system.

Important
When you have been running your system with SELinux disabled, you must boot in permissive mode first and relabel your entire file system. Activities ran while SELinux was disabled might have created new files or removed the labels from existing files, causing these files to be available without security context.

How can I see SELinux denials?

Using auditd, ausearch can be used to list system denials. To list all denials from the current boot:

root #ausearch -m AVC,USER_AVC,SELINUX_ERR,USER_SELINUX_ERR -ts boot

How do I know which file context rule is used for a particular file?

If you use the matchpathcon command, it will tell you what the security context for the given path (file or directory) should be, but it doesn't tell you which rule it used to deduce this. To do that, you can use findcon:

Note
The findcon utility is part of setools-3. Recent setools (version 4 and higher) no longer contains the findcon application.
root #findcon /etc/selinux/strict/contexts/files/file_contexts -p /lib64/rc/init.d
/.*                          system_u:object_r:default_t
/lib64/rc/init\.d(/.*)?   system_u:object_r:initrc_state_t
/lib64/.*                    system_u:object_r:lib_t

When the SELinux utilities try to apply a context, they try to match the rule that is the most specific, so in the above case, it is the one that leads to the initrc_state_t context.

The most specific means, in order of tests:

  1. If line A has a regular expression, and line B doesn't, then line B is more specific.
  2. If the number of characters before the first regular expression in line A is less than the number of characters before the first regular expression in line B, then line B is more specific
  3. If the number of characters in line A is less than in line B, then line B is more specific
  4. If line A does not map to a specific SELinux type, and line B does, then line B is more specific

If there are specifications that match inside both the policy-provided contexts, the homedir generated contexts and locally-defined contexts, then the following precedence rules apply:

  1. Rules (regardless of their origin) that do not have any regular expressions take precedence over any other expressions
  2. Expressions inside the locally-defined contexts (file_contexts.local) as generated by semanage fcontext commands take precedence over the homedirs- and policy-provided ones
  3. Expressions inside the homedirs generated contexts (file_contexts.homedirs) take precedence over the policy-provided ones (file_contexts)

How do I make small changes (additions) to the policy?

If you are interested in the Gentoo Hardened SELinux development itself, please have a look at the SELinux development resources.

However, you will eventually need to keep some changes on your policy, due to how you have configured your system or when you need to allow something that is not going to be accepted as a distribution-wide policy change. In that case, read on.

Updates on the policy are only possible as long as you need to allow additional privileges. It is not possible to easily remove rules from the policy, only enhance it. To maintain your own set of additional rules, create a file in which you will keep your changes. In the next example, I will use the term fixlocal, substitute with whatever name you like - but keep it consistent. In the file (fixlocal.te) put in the following text (again, substitute fixlocal with your chosen name):

CODE Example skeleton for a SELinux policy module
policy_module(fixlocal, 1.0)

require {
# Declarations of types, classes and permissions used

}

# Declaration of policy rules

In this file, you can add rules as you like. In the next example, we add three rules:

  1. Allow mozilla_t the execmem privilege (based on a denial that occurs when mozilla fails to start)
  2. Allow ssh_t to connect to any port rather than just the SSH port
  3. Allows the user_t domain to send messages directly to the system logger
CODE Example policy module
policy_module(fixlocal, 1.0)

require {
  type mozilla_t;
  type ssh_t;
  type user_t;

  class process { execmem };
}

# Grant mozilla the execmem privilege
allow mozilla_t self:process { execmem };

# Allow SSH client to connect to any port (as provided by the user through the 
# "ssh -p <portnum> ..." command)
corenet_tcp_connect_all_ports(ssh_t)

# Allow the user_t domain to send messages to the system logger
logging_send_syslog_msg(user_t)

If you need to provide raw allow statements (like the one above for the mozilla_t domain), make sure that the type (mozilla_t), class (process) and privilege (execmem) are mentioned in the require { ... } paragraph.

When using interface names, make sure that the types (ssh_t and user_t) are mentioned in the require { ... } paragraph.

To find the proper interface name (like corenet_tcp_connect_all_ports above), you can either look for it in the SELinux Reference Policy API online or, if sec-policy/selinux-base is built with the doc USE flag, in /usr/share/doc/selinux-base-policy-.*/html. Of course, you can also ask for help in #gentoo-hardened (webchat), the mailinglist, forums, etc. to find the proper rules and statements for your case.

With the policy file created, you can then build it using the Makefile provided by the system:

root #make -f /usr/share/selinux/strict/include/Makefile fixlocal.pp

Then, if the builds succeeds, you can load it in memory. Once loaded, it will be loaded after every boot as well, so you do not need to repeat this over and over again.

root #semodule -i fixlocal.pp

How to I load an entire policy set?

Usually, it is sufficient to go into the /usr/share/selinux/strict location and execute semodule like so:

root #semodule -b base.pp -i $(ls *.pp | grep -v base.pp)

With the 2.4 userspace, that command can be simplified:

root #semodule -i *.pp

However, there is a downside. With the 2.4 userspace onwards, modules can have a certain priority. Modules that were loaded in through the 2.3 userspace utilities are at priority 100, whereas new modules are at priority 400. When a new set of policy modules is loaded, but it does not contain every previous module, then weird things can happen.

Consider the following situation where there no longer is a storage module:

root #semodule -i *.pp
Re-declaration of typeattribute fixed_disk_raw_read
Failed to create node
Bad typeattribute declaration at line 74 of /var/lib/selinux/mcs/tmp/modules/100/storage/cil
Failed to build ast
semodule:  Failed!

However removing that module is not possible, because the currently loaded modules depend on objects defined by it:

root #semodule -X 100 -r storage
libsemanage.semanage_direct_remove_key: Removing last storage module (no other storage module exists at another priority).
Failed to resolve typeattributeset statement at 193 of /var/lib/selinux/mcs/tmp/modules/400/authlogin/cil
Failed to resolve ast
semodule:  Failed!

As it is not possible to load in a set of new policies on a new priority (400) and remove an older one from another priority (100) we seem to be in a deadlock.

To resolve this, make an empty policy module named storage and load it (at the higher priority):

root #semodule -i storage.pp -i /usr/share/selinux/mcs/*.pp
libsemanage.semanage_direct_install_info: Overriding storage module at lower priority 100 with module at priority 400.

With that in place, there is now an empty storage module active at priority 400, allowing the administrator to remove the older one, followed by the empty one.

root #semodule -X 100 -r storage
root #semodule -r storage
libsemanage.semanage_direct_remove_key: Removing last storage module (no other storage module exists at another priority).

SELinux kernel error messages

I get a register_security error message when booting

During boot-up, the following message pops up:

CODE Message during boot-up
There is already a security framework initialized, register_security failed.
Failure registering capabilities with the kernel
selinux_register_security: Registering secondary module capability
Capability LSM initialized

This is nothing to worry about (and perfectly normal).

This means that the Capability LSM module couldn't register as the primary module, since SELinux is the primary module. The third message means that it registers with SELinux as a secondary module.

I get a 'Permission ... in class ... not defined' message during booting

During boot-up, the following message is shown:

CODE Message about 'Permission ... in class ... not defined'
SELinux: 2048 avtab hash slots, 16926 rules.
SELinux: 2048 avtab hash slots, 16926 rules.
SELinux:  6 users, 6 roles, 1083 types, 34 bools
SELinux:  77 classes, 16926 rules
SELinux:  Permission read_policy in class security not defined in policy.
SELinux:  Permission audit_access in class file not defined in policy.
SELinux:  Permission audit_access in class dir not defined in policy.
SELinux:  Permission execmod in class dir not defined in policy.
...
SELinux: the above unknown classes and permissions will be denied
SELinux:  Completing initialization.

This means that the Linux kernel that you are booting supports permissions that are not defined in the policy (as offered through the sec-policy/selinux-base-policy package). If you do not notice any errors during regular operations, then this can be ignored (the permissions will be made part of upcoming policy definitions).

SELinux and Gentoo

I get a missing SELinux module error when using emerge

When trying to use emerge, the following error message is displayed:

CODE Error message about missing SELinux module
!!! SELinux module not found. Please verify that it was installed.

This indicates that the portage SELinux module is missing or damaged. Recent Portage versions provide this module out-of-the-box, but the security contexts of the necessary files might be wrong on your system. Try relabeling the files of the portage package:

root #rlpkg portage

I get 'FEATURES variable contains unknown value(s): loadpolicy'

When running emerge, the following error is shown:

CODE Unknown value loadpolicy
FEATURES variable contains unknown value(s): loadpolicy

This is a remnant of the older SELinux policy module set where policy packages might require this FEATURE to be available. This has however since long been removed from the tree.

Please update your profile to a recent SELinux profile (one ending with /selinux/) and make sure that /etc/make.conf does not have FEATURES="loadpolicy" set.

During rlpkg I get 'conflicting specifications for ... and ..., using ...'

When trying to relabel a package (rlpkg packagename) or system (rlpkg -a -r) you get a message similar to the following:

CODE Message about conflicting specifications
filespec_add: conflicting specifications for /usr/bin/getconf and 
/usr/lib64/misc/glibc/getconf/XBS5_LP64_OFF64, using
system_u:object_r:lib_t

This is most likely caused by hard linked files. Remember, SELinux uses the extended attributes in the file system to store the security context of a file. If two separate paths point to the same file using hard links (i.e. the files share the same inode) then both files will have the same security context.

The solution depends on the particular case; in order of most likely to happen and resolve:

  1. Although both files are the same, they are not used in the same context. In such cases, it is recommended to remove one of the files and then copy the other file back to the first (rm B; cp A B). This way, both files have different inodes and can be labeled accordingly.
  2. Both files are used for the same purpose; in this case, it might be better to label the file which would not be labeled correctly (say a binary somewhere in a /usr/lib64/ location) using semanage (semanage fcontext -a -t correct_domain_t /usr/lib64/path/to/file)

It is also not a bad idea to report (after verifying if it hasn't been reported first) this on Gentoo's bugzilla so that the default policies are updated accordingly.

During package installation, ld.so complains 'object 'libsandbox.so' from LD_PRELOAD cannot be preloaded: ignored'

During installation of a package, you might see the following error message:

CODE Message about libsandbox not being preloadable
>> Installing (1 of 1) net-dns/host-991529
>>> Setting SELinux security labels
ERROR: ld.so: object 'libsandbox.so' from LD_PRELOAD cannot be preloaded: ignored.

This message should only occur after the Setting SELinux security labels message. It happens because SELinux tells glibc to disable LD_PRELOAD (and other environment variables that are considered potentially harmful) during domain transitions. Here, portage calls the setfiles command (part of a SELinux installation) and as such transitions from portage_t to setfiles_t, which clears the environment variable.

We believe that it is safer to trust the SELinux policy here (as setfiles runs in its own confined domain anyhow) rather than updating the policy to allow transitioning between portage_t to setfiles_t without clearing these environment variables. Note that libsandbox.so is not disabled during builds and merges, only during the activity where Portage labels the files it just merged.

So the error is in our opinion cosmetic and can be ignored (but sadly not hidden).

Emerge does not work, giving 'Permission denied: /etc/make.conf'

This is to be expected if you are not using the sysadm_r role. Any Portage related activity requires that you are in the sysadm_r role. To transition to the role, first validate if you are currently known as staff_u (or, if you added your own SELinux identities, a user that has the permission to transition to the sysadm_r role). Then run newrole -r sysadm_r to transition.

user $emerge --info
Permission denied: '/etc/make.conf'
user $id -Z
staff_u:staff_r:staff_t
user $newrole -r sysadm_r
Password: 

This is also necessary if you logged on to your system as root but through SSH. The default behavior is that SSH sets the lowest role for the particular user when logged on. And you shouldn't allow remote root logins anyhow.

Cron fails to load in root's crontab with message '(root) ENTRYPOINT FAILED (crontabs/root)'

When you hit the mentioned error with a root crontab or an administrative users' crontab, but not with a regular users' crontab, then check the context of the crontab file:

root #ls -Z /var/spool/cron/crontabs/root
staff_u:object_r:user_cron_spool_t /var/spool/cron/crontabs/root

Next, check what the default context is for the given user (in this case, root) when originating from the crond_t domain:

root #getseuser root system_u:system_r:crond_t
seuser:  root, level (null)
Context 0       root:sysadm_r:cronjob_t
Context 1       root:staff_r:cronjob_t

As you can see, the default context is always for the root SELinux user. However, the /var/spool/cron/crontabs/root file context in the above example is for the SELinux user staff_u. Hence, cron will not be able to read this file (the user_cron_spool_t type is a UBAC constrained one).

To fix this, change the user of the file to root:

root #chcon -u root /var/spool/cron/crontabs/root

Another workaround would be to disable UBAC completely. This is accomplished with USE="-ubac".

When querying the policy, I get 'ERROR: could not find datum for type ...'

When using seinfo or sesearch to query the policy on the system, you get errors similar to:

root #seinfo -tasterisk_t
ERROR: could not find datum for type asterisk_t

This is most likely because your tools are using a newer binary policy to enforce policy, but an older binary for querying. You can verify if this is the case by listing the last modification time on the files:

root #ls -ltr /etc/selinux/strict/policy/policy.*

The file modified last should be the same one as returned by checking /selinux/policyvers:

root #cat /selinux/policyvers; echo
24

If this is not the case (which is very likely since you are reading this FAQ entry) then try forcing the utilities policy version to the correct version:

FILE /etc/selinux/semanage.confForce the SELinux policy version
# Look for and uncomment the policy-version line and set it to the right version
policy-version = 24
Important
If your system is upgrading its kernel, higher version(s) can be supported. In this case, either unset the value again to automatically "jump" to a higher version, or force set it to the higher version.

Portage fails to label files because "setfiles" does not work anymore

Portage uses the setfiles command to set the labels of the files it installs. However, that command is a dynamically linked executable, so any update in its depending libraries (libselinux.so, libsepol.so, libaudit.so and of course libc.so) might cause for the application to fail. Gentoo's standard solution (revdep-rebuild) will not work, since the tool will try to rebuild sys-apps/policycoreutils, which will fail to install because Portage cannot set the file labels.

The solution is to rebuild sys-apps/policycoreutils while disabling Portage's SELinux support, then label the installed files manually using chcon, based on the feedback received from matchpathcon.

root #FEATURES="-selinux" emerge --oneshot policycoreutils
root #for FILE in $(qlist policycoreutils); do CONTEXT=$(matchpathcon -n ${FILE}); chcon ${CONTEXT} ${FILE}; done

Now Portage will function properly again, labeling files as they should.

Applications do not transition on a nosuid-mounted partition

If you have file systems mounted with the nosuid option, then applications started from these file systems will not transition into their appropriate domain. This is intentional.

So, a passwd binary, although correctly labeled passwd_exec_t , will not transition into the passwd_t domain if the binary is stored on a file system mounted with nosuid.

Why do I always need to re-authenticate when operating init scripts?

When you, as an administrator, wants to launch or stop daemons, these activities need to be done as system_u:system_r. Switching to this context set is a highly privileged operation (since you are effectively leaving the user context and entering a system context) and hence the default setup requires the user to re-authenticate.

You can ask not to re-authenticate if you use PAM by editing /etc/pam.d/run_init and adding the following line on top:

FILE /etc/pam.d/run_initAllowing password-less execution if the user is root
auth     sufficient     pam_rootok.so

With this in place, you can now prepend your init script activities with run_init and it will not ask for your password anymore:

root #run_init rc-service local status
Authenticating swift.
 * status: started

How do I use SELinux with initramfs?

We fully support in enforcing mode with an initramfs image. Once the real init loads after the initramfs pivots, it will load the selinux policy and if /etc/selinux/config is set to enforcing the kernel will automatically go into enforcing mode.

If you run SELinux on a production system and would not like to have attackers be able to switch back to permissive mode (even when they would have the necessary privileges otherwise), set the secure_mode_policyload boolean. When enabled, enforcing mode cannot be disabled anymore (until you reboot).

root #setsebool secure_mode_policyload on

Logons through xdm (or similar) fail

If you log on through xdm, gdm, kdm, slim or any other graphical logon manager, you might notice in permissive mode that your context is off, and in enforcing mode that you just cannot log on.

The reason of this is that PAM needs to be configured to include SELinux awareness in your session handling:

FILE /etc/pam.d/somesessionEnable SELinux support through PAM sessions
...
session  required   pam_loginuid.so
session  optional   pam_console.so
session  optional   pam_selinux.so

Replicate the calls towards pam_selinux.so in the various /etc/pam.d/gdm* files (or similar depending on your graphical logon manager).

What is SELinuxfs and where should it be?

The selinuxfs is, as the name suggest, the SELinux File System. It is a pseudo-filesystem, which means that it is represented through files and directories, but those files or directories are not on your disk, but generated by the Linux kernel every time you query it.

The file system is used by the SELinux utilities as an interface to query the SELinux state, maintained by the Linux kernel.

Historically (before libselinux-2.1.9), the mount point for the SELinux file system had to be /selinux. From libselinux-2.1.9 onwards, the default location where the file system is looked for is /sys/fs/selinux, although the library still falls back to the original /selinux location if it cannot find it at the new place.

However, the /sys/fs/selinux location currently has an issue for those systems not using an initramfs, as it means that /sys has not been mounted when init tries to mount /sys/fs/selinux. We are working out how to resolve this, but for now, keep /selinux active.

How do I reload all SELinux policy modules?

By default, Gentoo incrementally updates the SELinux policy. This is because the SELinux policy is modularly, starting with a base.pp setting and then several individual SELinux policy modules. When you install a SELinux policy package, it first tries to load the individual SELinux policy module. If that fails however, it will try to (re)load the entire policy (base with all installed policy modules), akin to the following:

root #cd /usr/share/selinux/strict
root #semodule -b base.pp -i $(ls *.pp | grep -v unconfined | grep -v base.pp)

Or, if you have unconfined domains:

root #semodule -b base.pp -i $(ls *.pp | grep -v base.pp)

Failures that occur now usually mean that not all SELinux policy modules have been upgraded yet, or that there are locally created policies loaded which cannot coexist with the newly defined SELinux policies.

Why can't I just './service start' when I am inside /etc/init.d?

For the more verbose explanation, see bug #448292. Basically, running services requires a few domain transitions, assisted by the run_init command. This command first changes the working directory to / before actually running the requested service. As a result, it tries to execute ./service start from within / instead of /etc/init.d, resulting in an execution failure.

root #cd /etc/init.d; ./sshd status
Authenticating root.
Exec:: No such file or directory

Regex version mismatch, expected ## actual ##

Regex version mismatch, expected: 10.42 2022-12-11 actual: 10.40 2022-04-14
Regex version mismatch, expected: 10.42 2022-12-11 actual: 10.40 2022-04-14

The upgrade of libpcre2 from 10.40 to 10.42 took place recently, and libselinux relied on pre compiled regex from the old PCRE library and it had a very noisy warning message. In this case, read the following section below to re-generate your SELinux file_contexts - or simply re-emerge libselinux (see bug #471718 )

root #emerge -u1 sys-libs/libselinux

File labels do not seem to be set anymore, and matchpathcon is <<none>>

When files seem to be labeled portage_tmp_t, check with the matchpathcon command what SELinux thinks the label should be:

root #matchpathcon /sbin/setfiles
/sbin/setfiles    <<none>>

If that occurs, it might be a pcre upgrade that broke the binary compiled expressions. Go to the policy context directory (like /etc/selinux/mcs/contexts/files) and rebuild all files that also have a companion file with the .bin extension:

root #for n in *.bin; do sefcontext_compile ${{n%%.bin}}; done

With this done, the matchpathcon command should reveal the right context again, and you can relabel the package(s) that had wrong labels:

root #matchpathcon /sbin/setfiles
/sbin/setfiles  system_u:object_r:setfiles_exec_t

See also bug #471718 for more information.

What is the run_init_t domain for?

When user domains, such as sysadm_t, want to execute a service script, the script itself should not only run in the initrc_t domain, but also with the full system context (so system_u:system_r:initrc_t).

Now, switching the SELinux user and role to this (privileged) context should only be done by well controlled steps. Hence, we introduce the run_init_t domain, as target for executing any init script, which still runs in the user context (sysadm_u:sysadm_r:run_init_t. Then, the OpenRC code (through the openrc-run command) will transition towards the proper initrc_t domain.

Only the run_init_t domain is capable of transitioning towards the initrc_t domain (and change SELinux user and role). This way, we don't need to grant this privilege to the wide user domain sysadm_t.

CODE Transition steps with run_init_t
# rc-service lvm start
sysadm_r:sysadm_t --[ execute rc-service (bin_t) ]--> sysadm_r:sysadm_t      (no transition)

# rc-service executes the /etc/init.d/lvm script
sysadm_r:sysadm_t --[ execute initrc_exec_t ]--> sysadm_r:run_init_t         (transition)

# /etc/init.d/lvm script uses openrc-run as interpreter, so executes it
sysadm_r:run_init_t --[ execute openrc-run (bin_t) ]--> sysadm_r:run_init_t  (no transition)

# openrc-run calls setexeccon() to force transition
# Next execute is either open_init_pty or the service script again
sysadm_r:run_init_t --[ through openrc-run ]--> system_r:initrc_t            (transition)

In the audit logs, a reference can occur about the open_init_pty. That is to be expected, it is the openrc-run command which invokes either open_init_pty to transition to initrc_t, or the service script file itself.