Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp7420636ybl; Tue, 24 Dec 2019 02:11:22 -0800 (PST) X-Google-Smtp-Source: APXvYqz+BRUWd1bcq6lpOFFOgxIfotyZsfKBbh8pqGoxK8Ja3rb/apy9IegnlThxoZgjl0stV+Qq X-Received: by 2002:a9d:6d8f:: with SMTP id x15mr29267872otp.322.1577182282712; Tue, 24 Dec 2019 02:11:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577182282; cv=none; d=google.com; s=arc-20160816; b=a672RHMfsblzEVuMjeLBZhoJmcrql7G4sew4iNkr1OirkUQ9hcxcAVlTn70Hj95VNm t+jwfwOLpXbIkXnSTDUMPD/MZ5yjL0vDuQ62gjXsIlljremmadoKQCOmrmQ3dnOEhw2e lKwD2fjupgDZ4OOOWnIJgl8vbIPxkkNq8FoE3mw8Mr3FmePZcR7Ec96SiuQUm+gsIO50 +aTMXBCRVXNRgKIApo6B1rjBHgUiInjggC2r21FMDoqNNyMJfA6N29OZG5wsG1JNwML3 fZg0rS7aTk0QPK9PJds3nasxOr8yzj4IgJbOY/Arlck3QXgOaKNuJwBglrTjiN/KdKPf iQTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=400s6hbcrBhnn5AjLIC1Wg7vbAoEWCY5NdYSNgaQfHA=; b=WBYQIm9aVXgI8iwIGl++xMz10csnWzMieWddAsaKratsdEVLMYbkRs+3NZ+I9AqDqA D6A95e5N5nZXhwh+U11tAeo+dGzEp3KD8ZbKGMGSpqa6Lg+ytQsD482JjaMYkN/tFd1d ZClOdeMW9ky6ca/qBqIFj9Wk8XLFvFBxHlJNCYReOiGsePSdVSXNY2KQlWCPPDbhKdVn wf0/S8z/FjLdAaO2hqWxgdztW8J4qcvx8HgB6ZS8yiRJDSnm7i0unvqeJ4L4GcdEeRWA fBJ3OPhvn5B3JNrsOFFHpP6JvjjIihFeS2XshrQp8EjZk6rV3guNMDVLnmwAv4c20NRC AfDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@perfinion-com.20150623.gappssmtp.com header.s=20150623 header.b=zEUkSyZB; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c12si9249335otp.106.2019.12.24.02.11.20; Tue, 24 Dec 2019 02:11:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@perfinion-com.20150623.gappssmtp.com header.s=20150623 header.b=zEUkSyZB; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726246AbfLXKLU (ORCPT + 11 others); Tue, 24 Dec 2019 05:11:20 -0500 Received: from mail-pg1-f193.google.com ([209.85.215.193]:36612 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726084AbfLXKLU (ORCPT ); Tue, 24 Dec 2019 05:11:20 -0500 Received: by mail-pg1-f193.google.com with SMTP id k3so10199273pgc.3 for ; Tue, 24 Dec 2019 02:11:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=perfinion-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=400s6hbcrBhnn5AjLIC1Wg7vbAoEWCY5NdYSNgaQfHA=; b=zEUkSyZBQDBCjf/EicIjFJBYpPxZJXi5LQG6Tf4nmLWlSbPcjD+pEtSbi7FvyjXREx dXtDwr274HrGf7lV/qCzSjtS2SneB4ZZtc23iQcmRm6mzpEWs7k7Z8Byx/CTMyFiDqCS mx82VjRLjp6L5YWZjklQEpA2c2gy0gJuRAikhkwJ88+hZ+BwgvsWSY5okGfsU/vFLCfD AxT0ZkWvUc/6gtz8nYcR+kN13GWrCncwA6+nVZUQLPcmobfLSNI3Cl0eZnfa0tkiHZVG xDkIUpnsGFt1eOP21dIRLgJI0HAxotbXBUkqd80MH7bpWQIS9xd4tA3DHxEKzH5qz2zN Fzcg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=400s6hbcrBhnn5AjLIC1Wg7vbAoEWCY5NdYSNgaQfHA=; b=H0fdj1sMbjY5h8glNspNpjUwsMDCu5mWHwpgmMkJd/2Kta7xTfi7RhRLTKRv4xmwEX ZePR8bacxkrIYh3v49WLM/RZQnwvdLdysE2n+TIxq+Qy/kMJTcJHvtSQgHX4AlGdqTrV D12AYEnymf87Gc2DLRsFPovpgn/kP7LNzbrnsKVb0NXYCAAHsjel1qOQfJxEmLH/rzHp +8Fjx/s3POyzJIk+jJ8WwACHOhx77YB9kokjVhYHX9RLNeq/wAb6mZW8aQH+XdLB6MwC R7Ns/eB5kJuGrzWg9NGvPcy+zsWdjauqxG4wDU4uYPlJRbF86S8FiLaS3m46fvUCJ3Tr t5qA== X-Gm-Message-State: APjAAAUSeZQhjSHJNR0U0WJ4SeM71FCWYcLhHS+GkEykHxi2G6aJIv6e 5vbF5zjbtCJUCk96bYpg6YH7p2OzakF8mA== X-Received: by 2002:a62:8782:: with SMTP id i124mr36403790pfe.22.1577182279020; Tue, 24 Dec 2019 02:11:19 -0800 (PST) Received: from localhost ([101.127.140.252]) by smtp.gmail.com with ESMTPSA id n2sm25678959pgn.71.2019.12.24.02.11.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Dec 2019 02:11:18 -0800 (PST) From: Jason Zaman To: selinux-refpolicy@vger.kernel.org Cc: Jason Zaman Subject: [PATCH 8/9] virt: Add unix socket for virtlogd/virtlockd Date: Tue, 24 Dec 2019 18:10:42 +0800 Message-Id: <20191224101043.58122-8-jason@perfinion.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191224101043.58122-1-jason@perfinion.com> References: <20191224101043.58122-1-jason@perfinion.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org avc: denied { listen } for pid=3236 comm="virtlogd" path="/run/libvirt/virtlogd-sock" scontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=0 Signed-off-by: Jason Zaman --- policy/modules/services/virt.te | 2 ++ 1 file changed, 2 insertions(+) diff --git a/policy/modules/services/virt.te b/policy/modules/services/virt.te index 0d5d1b25..d4c5d05a 100644 --- a/policy/modules/services/virt.te +++ b/policy/modules/services/virt.te @@ -1323,6 +1323,7 @@ kernel_dontaudit_read_system_state(virt_leaseshelper_t) allow virtlockd_t self:capability dac_override; allow virtlockd_t self:fifo_file rw_fifo_file_perms; +allow virtlockd_t self:unix_stream_socket create_stream_socket_perms; allow virtlockd_t virtd_t:dir list_dir_perms; allow virtlockd_t virtd_t:file read_file_perms; @@ -1362,6 +1363,7 @@ virt_read_config(virtlockd_t) # allow virtlogd_t self:fifo_file rw_fifo_file_perms; +allow virtlogd_t self:unix_stream_socket create_stream_socket_perms; allow virtlogd_t virtd_t:dir list_dir_perms; allow virtlogd_t virtd_t:file read_file_perms; -- 2.24.1