Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp7420391ybl; Tue, 24 Dec 2019 02:11:09 -0800 (PST) X-Google-Smtp-Source: APXvYqxxOFxn+n/DXLMYfZ38DNI3qoQmbR9ieenFD8QCY18ljQaL45zzzOIqPBA6/ZUHYf9poheS X-Received: by 2002:a9d:66c1:: with SMTP id t1mr34482164otm.73.1577182269438; Tue, 24 Dec 2019 02:11:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577182269; cv=none; d=google.com; s=arc-20160816; b=V61ZHQipekiEE1D2glq41YIREdVnhauwPDiVRTvxk+h4MwEytriXcN8qm7PZEH8R1Y j+khFGO4ncmAXCAdvbYzJkk3GxLmXQhqJgdTkv8XuiI1bxtF8DI8giB/cZIdhFQdairR WvZcbKjd2KkXbmVDAt7X76pwkGcMWHDady0CyyZ9wDmyH5x48SuOB44/65Toi8i9DzI3 xcKXbakdPTwGDmaE2uDXNVUCMYSPBE3dZK+8+MUu8ZSBD84dCKOO8KVclbYyaymVeUvC W8PQQ+QyBFxH+hLO8IyeR1YkFPU09oE2Fwmf+uRCzG6qnO41oA5cixrCXJo1ixHCdSXp 9YcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=a1maS3xhxcv5zx392gJnCkgUCTS/c9Y+IDTlXg1d6hE=; b=aRbj+9FSGvvlmxgy79z6EnhpHwm1o1sCLCyXj3EoMHXiVSP6geYghlXY37ptolGKaI NtN+C4ai/CytFS9kmP5vCNMAcmj52vm1aU3utqemoEc0lOOAwP77lPX4p8WPiOeNb8fl edZG4mrvfB88wcIHYLottbjUwC/Uv516BNDak5siSm1ciYhAfie5L0+1I8atIKnPP1KU 14UxkP6YxRBteadZPYY9BrRBpvAHoh64nJQrcktl+AsT4kr5b58sAzSUu4YqQ1lCp/gn 7enZtJkm3lQZMtngkfEfnQm0ZW1OcfQLadGz1DvcPbGD1thIa35UdCLs2urgW7saBLbW JqSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@perfinion-com.20150623.gappssmtp.com header.s=20150623 header.b=atc1KQVv; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z18si12089350otq.121.2019.12.24.02.11.07; Tue, 24 Dec 2019 02:11:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@perfinion-com.20150623.gappssmtp.com header.s=20150623 header.b=atc1KQVv; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726213AbfLXKLG (ORCPT + 11 others); Tue, 24 Dec 2019 05:11:06 -0500 Received: from mail-pj1-f66.google.com ([209.85.216.66]:51714 "EHLO mail-pj1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726084AbfLXKLG (ORCPT ); Tue, 24 Dec 2019 05:11:06 -0500 Received: by mail-pj1-f66.google.com with SMTP id j11so1004664pjs.1 for ; Tue, 24 Dec 2019 02:11:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=perfinion-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=a1maS3xhxcv5zx392gJnCkgUCTS/c9Y+IDTlXg1d6hE=; b=atc1KQVvT/qX/60IbquAlryuPl324SU8dMurW/gIvuHZSndIdY2p18Gr13QGJhxSqK 3KxIxxu4OGAYR111uWdLJLdXrRiGjru0NPA3DmOwnEc0G6POINEBV/bktbFrUS5agnjx PgtyW8WaNNKAOcNKUpbWiZ8z/6fKf+6T5QuhPTIEOKqdYsvpHT6+50eHPwyalsrObEJZ aqlS+A3vcBScMr/q4N2TMjn2D3vvrlEEHaYn9HU/o/K6WYhnzswNIFuXO4P1WcifP8TY TE6fKxfICj6RbnchtOt8/jxv8GuM5MwJr+s/ysrPDwOCxnC8+1YDqLKUSCwLb/ZvOseo uIqA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=a1maS3xhxcv5zx392gJnCkgUCTS/c9Y+IDTlXg1d6hE=; b=d4BdsVsOsYFlWO0pMnkTL5nVVxlxxX1/ZOt40pRAMeEvzdrqMKZB1R9iitvc+dAZVE o5ZlM6i2dDU54Fzr+RBUVmWZno79p+hqEOnaMsXg4OhQ0AR/BQQWkSAoLccUcD9yr5b6 nFofURVvmqctUailkw/Zp+d2zk4hJtRX39t88Z87g5VGB50TkyQYzzHiPVpix+EYVZC0 aufXvaxhS9265KV3LHos5aFbIBAF/X3E8snlX+VgGaoKhnSiRym5vCSzBbR5SHSJt857 iegohqxgdhp7YUH9Vc+7wbv1N21GgSqVPJsi6JGTYXq6QDucWDv5NZsaVfb2NID8KqFs Ui2w== X-Gm-Message-State: APjAAAVf5lvKlDAvsnRVNrV0s/ph0eJX3VkiM9AmMmDlXUvVP2wt1QUZ 88fodYgyGvbG3heK1Rbn8qf3Leu4MMy32A== X-Received: by 2002:a17:90a:c795:: with SMTP id gn21mr4823618pjb.95.1577182265785; Tue, 24 Dec 2019 02:11:05 -0800 (PST) Received: from localhost ([101.127.140.252]) by smtp.gmail.com with ESMTPSA id e16sm24959197pgk.77.2019.12.24.02.11.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Dec 2019 02:11:05 -0800 (PST) From: Jason Zaman To: selinux-refpolicy@vger.kernel.org Cc: Jason Zaman Subject: [PATCH 4/9] devicekit: udisks needs access to /run/mount/utab.lock Date: Tue, 24 Dec 2019 18:10:38 +0800 Message-Id: <20191224101043.58122-4-jason@perfinion.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191224101043.58122-1-jason@perfinion.com> References: <20191224101043.58122-1-jason@perfinion.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org type=AVC msg=audit(1563073723.106:232): avc: denied { read } for pid=7850 comm="udisksd" name="utab.lock" dev="tmpfs" ino=18445 scontext=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 type=SYSCALL msg=audit(1563073723.106:232): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=55841d66c920 a2=10 a3=0 items=1 ppid=7849 pid=7850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="udisksd" exe="/usr/libexec/udisks2/udisksd" subj=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 key=(null) type=CWD msg=audit(1563073723.106:232): cwd="/" type=PATH msg=audit(1563073723.106:232): item=0 name="/run/mount/utab.lock" inode=18445 dev=00:16 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:mount_runtime_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Signed-off-by: Jason Zaman --- policy/modules/services/devicekit.te | 1 + 1 file changed, 1 insertion(+) diff --git a/policy/modules/services/devicekit.te b/policy/modules/services/devicekit.te index 3331bd00..0622b6cf 100644 --- a/policy/modules/services/devicekit.te +++ b/policy/modules/services/devicekit.te @@ -192,6 +192,7 @@ optional_policy(` optional_policy(` mount_domtrans(devicekit_disk_t) + mount_rw_runtime_files(devicekit_disk_t) ') optional_policy(` -- 2.24.1