Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp847524ybp; Fri, 11 Oct 2019 05:24:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqzarofmVLhswTGAAFAs2KIaP5PZFU3RWHbATn62KGouWHhDZw+cU5HAIAQbHqDk02jLYQ7D X-Received: by 2002:a17:906:519:: with SMTP id j25mr13424475eja.65.1570796696799; Fri, 11 Oct 2019 05:24:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570796696; cv=none; d=google.com; s=arc-20160816; b=odhZErh+LLVzPKfw8ze7eh0Ewl/vmY+6VYEH5szPN1VcmydzlOFtWVNRHgLqfjDY1Q Jah5o+0SpB5a6dlYbvq20HDtoPNEKeLwkbyYdApJlXthzhzU8Uyw+J2DZ1GU5KpnX9A4 T4Jr3OqRvm74ZlrQE+CHBuFNI6cMLSRAxtnRaZ00Hc9TGlbtHlMHZvPTZDSWXWoohyYx pEdfdlrt6QSQORsN9t1j0KrfCZNJHKexD4Tx+dasATQeE70SAsaiDURHJ1eZuu3ijTte fwS9lwvBUu2EZxzOvOb3OPOzMDlCXxmehjZTGtvUwIuvqKOI9ODOq/VT49TFfT+zvxJs StXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=ZV60KaNkXmEPpCxr4MXT8NgObWn+q+8GTJzVferSSi0=; b=u3rE3TPPhp4DJYm6+2i5uWEcH7WG+hWJzY8XeeOUyBwVc6ZJpdYEVArB0R2ZA5J8iT MwQ7nPaBiIidKIm9HDQqVp4D2OVXca1rXrcVycBjv6+XUvpTJDR8QoNG885g2HijWZek KSeXIfZAa9L2OUKEnRucYItDT7HmHLKKdzGEu336pCEZwOPNNAJHxuxGWm1Eoca64Yyr oGwj9zVMytZOCoZNXAHZYNz9rC5jI+hVzZ13hId1rHWYUBXOxe8Q40mrFprDiDe2UC4w Xs4bUtSvWjSyaLTfwvsW9LV81EPpelYoNM+hSZTnoYbgfnqCvA3c3EbpFtoAk78xz/C4 NSaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bigon.be header.s=key1 header.b=rkJ7pm8m; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12si5130303ejx.282.2019.10.11.05.24.52; Fri, 11 Oct 2019 05:24:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@bigon.be header.s=key1 header.b=rkJ7pm8m; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727936AbfJKMYU (ORCPT + 11 others); Fri, 11 Oct 2019 08:24:20 -0400 Received: from ithil.bigon.be ([163.172.57.153]:38264 "EHLO ithil.bigon.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727961AbfJKMYU (ORCPT ); Fri, 11 Oct 2019 08:24:20 -0400 Received: from localhost (localhost [IPv6:::1]) by ithil.bigon.be (Postfix) with ESMTP id 3FF3D20262 for ; Fri, 11 Oct 2019 14:24:18 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bigon.be; h= content-transfer-encoding:mime-version:references:in-reply-to :x-mailer:message-id:date:date:subject:subject:from:from :received:received:received; s=key1; t=1570796658; x=1572611059; bh=tzDwD9W/AbIqmCcIBS/8uXPokTf73AsNcuhOP3QbIvQ=; b=rkJ7pm8mLnXx ArxEgvK2A33Vz3h2NvPwOTnCoLWrkDfsuwqb5RBZedYk/9SXvUC4tbYlhmHwo6MX YSYVFqmgTo1PzyTQKAzuUFSZHMI/78tiaCt1WLRK3ai7iq6ceFX9qPIKIz8BKCDp U1vmL6Zo3NB+J62+O/XFIniZq6bkihs= Received: from ithil.bigon.be ([IPv6:::1]) by localhost (ithil.bigon.be [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id eoZWkugpm2ko for ; Fri, 11 Oct 2019 14:24:18 +0200 (CEST) Received: from edoras.bigon.be (unknown [193.53.238.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: bigon@bigon.be) by ithil.bigon.be (Postfix) with ESMTPSA for ; Fri, 11 Oct 2019 14:24:18 +0200 (CEST) Received: from bigon (uid 1000) (envelope-from bigon@bigon.be) id 2147c by edoras.bigon.be (DragonFly Mail Agent v0.12); Fri, 11 Oct 2019 14:24:16 +0200 From: Laurent Bigonville To: selinux-refpolicy@vger.kernel.org Subject: [PATCH 03/10] Allow colord_t to exec colord_exec_t type Date: Fri, 11 Oct 2019 14:24:09 +0200 Message-Id: <20191011122416.14651-3-bigon@debian.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191011122416.14651-1-bigon@debian.org> References: <20191011122416.14651-1-bigon@debian.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org From: Laurent Bigonville The main colord daemon can exec other daemon like colord-sane type=AVC msg=audit(04/10/19 10:12:46.339:1676) : avc: denied { execute_no_trans } for pid=16983 comm=colord path=/usr/lib/colord/colord-sane dev="dm-1" ino=1049183 scontext=system_u:system_r:colord_t:s0 tcontext=system_u:object_r:colord_exec_t:s0 tclass=file permissive=1 Signed-off-by: Laurent Bigonville --- policy/modules/services/colord.te | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/services/colord.te b/policy/modules/services/colord.te index 6117b06f..fada3fb8 100644 --- a/policy/modules/services/colord.te +++ b/policy/modules/services/colord.te @@ -43,6 +43,8 @@ manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t) manage_files_pattern(colord_t, colord_var_lib_t, colord_var_lib_t) files_var_lib_filetrans(colord_t, colord_var_lib_t, dir) +can_exec(colord_t, colord_exec_t) + kernel_read_crypto_sysctls(colord_t) kernel_read_device_sysctls(colord_t) kernel_read_network_state(colord_t) -- 2.23.0