Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp740236ybc; Sat, 23 Nov 2019 07:27:42 -0800 (PST) X-Google-Smtp-Source: APXvYqxKB/w9Dn+SAUnyZqSd7jk8vn1ZKlFsoV3jw8jxJFqVy+yBYxloF1mYojpXUWd1ObYqKKWA X-Received: by 2002:a17:906:4e07:: with SMTP id z7mr2249374eju.201.1574522862105; Sat, 23 Nov 2019 07:27:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574522862; cv=none; d=google.com; s=arc-20160816; b=iyRdyfvghpNRZyO9U48aobsJ9Y3e1HMYfnzODU67YBUOHF1uGYq5p4FUBT9TE4hzDu JGYJ3K0PmkCgs7oUZKAxAtMvXBEKM6qZu6rGx7/A9bvNjgTVnuLSncH+gc5nk7T8B5MX cfTYMyx3S6wlHBCmMaNhbgXFRVyvPk6xDNYplabZ134/MJ3E2y6fFQnX8fU+6Pgxvnv+ bhVOQj24C42CzcVYe/12r3bJIH3QHz8apH0iZh7C1k0dF2hzz+YGrkAgaFflFv8g5QPb 4rnf4voXSMcVdaJ9sJSFFe9z12QpvrCkPg9PVqa1H3Vf232WoObCe6Bc2RXsxqQUXnTl aa9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=Z7eYHrehpMGQpvM0NFrDzwRddSx8/tksnwlLUsoqE5U=; b=uuEXGYYz1JNhDKMNHAbvdp5sE1nJP8ieMg2xgV4m6iAhNlFoqWOgPAXV8nzMMQ/Wt+ J331t+4Q2PtDQYTIH0SvbZcUnwrn723yu31dHDnMvM7ZHhTSVwk4aNvQXAtGBMus0Zp5 N2OkOrc1ci0OhQVNdojbg1+b/xMAkzUOcGDUrmiGbLBNM8+KC+4qpihAbKEx2IZ0GTnd 50d17IdxPWHbgnxchQoqgtQ90v7tqjbpEWDNcjxL3lXC1CnxT2dBw9opSQHkDgrQXqQ5 aJNsAJNUuvoS6mqvlltrajfxQ1pT2QAMDtzcIx9bXW+vBv0w0twwIM6/01tuZrMwk1OM QOng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=NREsfl9L; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f25si1001919ejt.9.2019.11.23.07.27.37; Sat, 23 Nov 2019 07:27:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=NREsfl9L; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726686AbfKWP1h (ORCPT + 11 others); Sat, 23 Nov 2019 10:27:37 -0500 Received: from mail-qk1-f196.google.com ([209.85.222.196]:41780 "EHLO mail-qk1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726487AbfKWP1h (ORCPT ); Sat, 23 Nov 2019 10:27:37 -0500 Received: by mail-qk1-f196.google.com with SMTP id m125so8952563qkd.8 for ; Sat, 23 Nov 2019 07:27:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=Z7eYHrehpMGQpvM0NFrDzwRddSx8/tksnwlLUsoqE5U=; b=NREsfl9LZPYXSoo4DzsdbPb0mQStHTPve2r3SdwMiXS2/bWoUHEdy4HPkD695BZU55 wlrrlaT4cPMlWDWJ40EzC11pLrquRdEqb8ZDj/cwxsm/1soVrz52bBSXYZCco/1fWCT4 vzTihqX197jeRNYw7YTaMbLg3y+FC1e/OH1VA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Z7eYHrehpMGQpvM0NFrDzwRddSx8/tksnwlLUsoqE5U=; b=otPGlnlz4Tqx+/jc9K+wMYt0cwr7vC1odtsSLdX3B9N0GoZtl77XrNkc/gRw37HToc FEUtG8JBjID27ty9frYwWauhMOceWvYYbQveLF6XNxnufiyM9bNEP1gCW9nm2ohpmYgq erCV07wmojH8eFc+dVUOO59ECzWHD7Hvs+Z0wR/d+yYKx5fDm55pedCQDgzlnxxBESUA ledMlu97Yppaj0MIgqJtycg7wvD7j8NNwQaUWdXo5yRQEMa+eSjOiT9Al0LsmO8VbeN4 HqzCk1IHYYQTzBB+Bi9rlwDBJnTnmu/taZzPk0/MH8CVWXKjprDNcKOH8iTQNKvLOH1h DRjw== X-Gm-Message-State: APjAAAX5nQ27u1jGSahnxCjmABBIHLwpvHJiasaJ1ovdrHSQYkn+7NUd 4E2xyqYnaUM4pxnnIXHmglazUK3qD5s= X-Received: by 2002:a37:4a97:: with SMTP id x145mr8996981qka.65.1574522853689; Sat, 23 Nov 2019 07:27:33 -0800 (PST) Received: from [192.168.1.190] (pool-108-15-23-247.bltmmd.fios.verizon.net. [108.15.23.247]) by smtp.gmail.com with ESMTPSA id i4sm752987qtp.57.2019.11.23.07.27.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 23 Nov 2019 07:27:33 -0800 (PST) Subject: Re: [PATCH] resolve syslog imuxsock denial To: "Sugar, David" , "selinux-refpolicy@vger.kernel.org" References: <20191117044832.13428-1-dsugar@tresys.com> From: Chris PeBenito Message-ID: <49690137-d67c-6c48-cf53-77581651a32f@ieee.org> Date: Sat, 23 Nov 2019 10:27:31 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191117044832.13428-1-dsugar@tresys.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 11/16/19 11:48 PM, Sugar, David wrote: > I'm seeing the following error while starting rsyslog: > Nov 17 02:01:38 localhost rsyslogd: cannot create '/run/systemd/journal/syslog': Permission denied [v8.24.0-41.el7_7.2] > Nov 17 02:01:38 localhost rsyslogd: imuxsock does not run because we could not aquire any socket [v8.24.0-41.el7_7.2] > Nov 17 02:01:38 localhost rsyslogd: activation of module imuxsock failed [v8.24.0-41.el7_7.2] > > With the following denials: > type=AVC msg=audit(1573958708.773:1896): avc: denied { create } for pid=2347 comm="rsyslogd" name="syslog" scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:object_r:syslogd_runtime_t:s0 tclass=sock_file permissive=1 > type=AVC msg=audit(1573958708.773:1897): avc: denied { setattr } for pid=2347 comm="rsyslogd" name="syslog" dev="tmpfs" ino=19368 scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:object_r:syslogd_runtime_t:s0 tclass=sock_file permissive=1 > > Signed-off-by: Dave Sugar > --- > policy/modules/system/logging.te | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te > index 3d5b57f1..42d77a24 100644 > --- a/policy/modules/system/logging.te > +++ b/policy/modules/system/logging.te > @@ -432,6 +432,8 @@ allow syslogd_t syslogd_runtime_t:file map; > files_pid_filetrans(syslogd_t, syslogd_runtime_t, file) > allow syslogd_t syslogd_runtime_t:dir create_dir_perms; > > +allow syslogd_t syslogd_runtime_t:sock_file { create setattr }; > + > kernel_read_crypto_sysctls(syslogd_t) > kernel_read_system_state(syslogd_t) > kernel_read_network_state(syslogd_t) Merged. -- Chris PeBenito