From: "Sven Vermeulen" <swift@gentoo.org> To: gentoo-commits@lists.gentoo.org Subject: [gentoo-commits] proj/hardened-refpolicy:swift commit in: policy/modules/system/ Date: Sat, 11 Jul 2015 14:09:45 +0000 (UTC) [thread overview] Message-ID: <1436621790.76b213703ff1b7bbcbfb0876388c764918290070.swift@gentoo> (raw) commit: 76b213703ff1b7bbcbfb0876388c764918290070 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> AuthorDate: Sat Jul 11 13:36:30 2015 +0000 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> CommitDate: Sat Jul 11 13:36:30 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=76b21370 Allow run_init_t to read all named init scripts When OpenRC wants to execute a labeled init script, it fails if this is a symlink: ~$ sudo /etc/init.d/ceph-mon.0 start openrc-run should not be run directly The denial shows that a read on the symlink is denied: type=AVC msg=audit(1436621093.701:1165): avc: denied { read } for pid=30786 comm="openrc" name="ceph-mon.0" dev="vda3" ino=1966780 scontext=staff_u:staff_r:run_init_t:s0 tcontext=system_u:object_r:ceph_initrc_exec_t:s0 tclass=lnk_file permissive=0 After granting this, the behavior is as expected: ~$ sudo /etc/init.d/ceph-mon.0 start * Starting Ceph mon.0 ... [ ok ] X-Gentoo-Bug: 554514 X-Gentoo-Bug-URL: https://bugs.gentoo.org/show_bug.cgi?id=554514 policy/modules/system/init.if | 5 +++++ policy/modules/system/selinuxutil.te | 2 ++ 2 files changed, 7 insertions(+) diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if index ed65609..211d434 100644 --- a/policy/modules/system/init.if +++ b/policy/modules/system/init.if @@ -1195,6 +1195,11 @@ interface(`init_read_all_script_files',` files_search_etc($1) allow $1 init_script_file_type:file read_file_perms; + + ifdef(`distro_gentoo',` + # Bug 554514 + allow $1 init_script_file_type:lnk_file read_lnk_file_perms; + ') ') ####################################### diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te index 51c64be..d25a0fd 100644 --- a/policy/modules/system/selinuxutil.te +++ b/policy/modules/system/selinuxutil.te @@ -418,6 +418,8 @@ userdom_use_user_terminals(run_init_t) ifndef(`direct_sysadm_daemon',` ifdef(`distro_gentoo',` # Gentoo integrated run_init: + # Bug 554514 + init_read_all_script_files(run_init_t) init_script_file_entry_type(run_init_t) init_exec_rc(run_init_t)
WARNING: multiple messages have this Message-ID (diff)
From: "Sven Vermeulen" <swift@gentoo.org> To: gentoo-commits@lists.gentoo.org Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ Date: Sat, 11 Jul 2015 13:38:49 +0000 (UTC) [thread overview] Message-ID: <1436621790.76b213703ff1b7bbcbfb0876388c764918290070.swift@gentoo> (raw) Message-ID: <20150711133849.1fHG6mOGwbYqVV_v1SZCjnlFTMzTmqLu_Zanyc6QqZk@z> (raw) commit: 76b213703ff1b7bbcbfb0876388c764918290070 Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be> AuthorDate: Sat Jul 11 13:36:30 2015 +0000 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> CommitDate: Sat Jul 11 13:36:30 2015 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=76b21370 Allow run_init_t to read all named init scripts When OpenRC wants to execute a labeled init script, it fails if this is a symlink: ~$ sudo /etc/init.d/ceph-mon.0 start openrc-run should not be run directly The denial shows that a read on the symlink is denied: type=AVC msg=audit(1436621093.701:1165): avc: denied { read } for pid=30786 comm="openrc" name="ceph-mon.0" dev="vda3" ino=1966780 scontext=staff_u:staff_r:run_init_t:s0 tcontext=system_u:object_r:ceph_initrc_exec_t:s0 tclass=lnk_file permissive=0 After granting this, the behavior is as expected: ~$ sudo /etc/init.d/ceph-mon.0 start * Starting Ceph mon.0 ... [ ok ] X-Gentoo-Bug: 554514 X-Gentoo-Bug-URL: https://bugs.gentoo.org/show_bug.cgi?id=554514 policy/modules/system/init.if | 5 +++++ policy/modules/system/selinuxutil.te | 2 ++ 2 files changed, 7 insertions(+) diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if index ed65609..211d434 100644 --- a/policy/modules/system/init.if +++ b/policy/modules/system/init.if @@ -1195,6 +1195,11 @@ interface(`init_read_all_script_files',` files_search_etc($1) allow $1 init_script_file_type:file read_file_perms; + + ifdef(`distro_gentoo',` + # Bug 554514 + allow $1 init_script_file_type:lnk_file read_lnk_file_perms; + ') ') ####################################### diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te index 51c64be..d25a0fd 100644 --- a/policy/modules/system/selinuxutil.te +++ b/policy/modules/system/selinuxutil.te @@ -418,6 +418,8 @@ userdom_use_user_terminals(run_init_t) ifndef(`direct_sysadm_daemon',` ifdef(`distro_gentoo',` # Gentoo integrated run_init: + # Bug 554514 + init_read_all_script_files(run_init_t) init_script_file_entry_type(run_init_t) init_exec_rc(run_init_t)
next reply other threads:[~2015-07-11 14:09 UTC|newest] Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top 2015-07-11 14:09 Sven Vermeulen [this message] 2015-07-11 13:38 ` [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ Sven Vermeulen -- strict thread matches above, loose matches on Subject: below -- 2018-01-18 16:15 [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2018-01-18 16:15 Sven Vermeulen 2018-01-18 16:15 Sven Vermeulen 2017-05-18 17:03 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2017-05-18 17:02 ` [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2017-05-18 17:03 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2017-05-18 17:02 ` [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2017-05-18 17:03 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2017-05-18 17:02 ` [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2017-05-18 16:54 Sven Vermeulen 2017-05-18 16:54 Sven Vermeulen 2017-05-18 16:54 Sven Vermeulen 2017-05-18 16:54 Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 16:47 ` [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 16:47 ` [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2016-10-24 16:56 [gentoo-commits] proj/hardened-refpolicy:master " Sven Vermeulen 2016-10-24 16:56 ` [gentoo-commits] proj/hardened-refpolicy:swift " Sven Vermeulen 2016-10-24 16:56 Sven Vermeulen 2016-10-24 16:47 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-10-24 15:45 Sven Vermeulen 2016-07-03 11:34 Sven Vermeulen 2016-07-03 11:34 Sven Vermeulen 2015-12-02 15:45 Sven Vermeulen 2015-12-02 15:45 Sven Vermeulen 2015-12-02 15:45 Sven Vermeulen 2015-12-02 15:45 Sven Vermeulen 2015-10-10 12:11 Sven Vermeulen 2015-06-11 16:04 Sven Vermeulen 2015-06-09 13:24 Sven Vermeulen 2015-06-09 13:24 Sven Vermeulen 2015-06-09 13:24 Sven Vermeulen 2015-06-09 13:24 Sven Vermeulen 2015-06-09 13:24 Sven Vermeulen 2015-06-09 13:24 Sven Vermeulen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1436621790.76b213703ff1b7bbcbfb0876388c764918290070.swift@gentoo \ --to=swift@gentoo.org \ --cc=gentoo-commits@lists.gentoo.org \ --cc=gentoo-dev@lists.gentoo.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox