Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10030181ybl; Thu, 26 Dec 2019 09:30:01 -0800 (PST) X-Google-Smtp-Source: APXvYqyqO/h0pik27362Dt6CHBTFBCOqvkysv9KPquSTTFk/z42p9pw3xMaTkDWbdRFyMqqKKL7p X-Received: by 2002:a9d:7552:: with SMTP id b18mr17740697otl.20.1577381401862; Thu, 26 Dec 2019 09:30:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577381401; cv=none; d=google.com; s=arc-20160816; b=AFJXVS3RIOntjm9HKo8wUeluZ2FvWsjZmoArdTBD/+/eGol/2uUuO5fC/kKHzDzD+8 +LtGkFMH86LVSlL5o4sMAx0exySk8t+RzsD/chVKH9MTp6TcsiX3PQvMQnjsD68DpoCT 6hcL8F/tm8QLTiI80q4MPAo/FuZr77bWvNLLA13CaRWB8WGEyIBoY8I9UuLdEfhsHwjW CZzv9nlvQTXT7RTiWBgJHpz9FqDhrx+3iE8eVjiALNjyWUGHk97fzny7tOmtrpSme8qL 9ypHJO77Bq5QDFJ7uJvy4g/M8Tvcj8DJ7dM/irHq3m3JPwLn03sg3HNkq6QT6lgwxN6E SUpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=Duf/VYGG5QMzfgG1ElmUXoY4Ebo3GL3Becl2yh/kFYs=; b=ek5LEggrcBps0QXNT0ZBlcenU4+u85waHgdxqQkrjfUd/xloQ3SpKgG4aFPITh2veA d2m3Ow1qhtTNpZWCfZhooJdgffjluWQF1ksHxHqnpiKd3hIzC3m9RWmpCIMURx8sliIv JrDbEUraduSWqOKtCi8Po0wRSRlEciBo0zsQCNM2UjwDO54unenspl4tQkx2ZuW5ths0 bowY/z5t/huKZNTdt4ilv2v2OVGbUnQZ2yXNrcDeSYFVttGb0d5sSHTxMCPGu736ouTu tU3c+T/2g1AGOERYFGJ0FCSpfSAekkWdiZndiAN8+2MdNwdNpX7o+zEXKD1yzGoGIn9p uLKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=YWohBxwn; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i15si15427500otk.120.2019.12.26.09.30.00; Thu, 26 Dec 2019 09:30:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=YWohBxwn; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726659AbfLZR3z (ORCPT + 11 others); Thu, 26 Dec 2019 12:29:55 -0500 Received: from mail-qt1-f194.google.com ([209.85.160.194]:35920 "EHLO mail-qt1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726480AbfLZR3z (ORCPT ); Thu, 26 Dec 2019 12:29:55 -0500 Received: by mail-qt1-f194.google.com with SMTP id q20so22762770qtp.3 for ; Thu, 26 Dec 2019 09:29:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=Duf/VYGG5QMzfgG1ElmUXoY4Ebo3GL3Becl2yh/kFYs=; b=YWohBxwngQ9FUq3bJsaPXw+Y4F/GE/ogS5AVRl6WATZl81aPc1oKV3fUOCRENgO9tr nHwzdGoXmoL/WR9ttTcr9tijr34e9VqmMMdH15fZqUonR4DbP6sONo3X3l80cNyut3z6 VSAXmQHQ0tj7CT4I46jkW5voF8kHVtOetVMmI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Duf/VYGG5QMzfgG1ElmUXoY4Ebo3GL3Becl2yh/kFYs=; b=MnUSVybv9i1qItO/roPyEBWwCMzz9PXAzI/WG7IXR0qVulYzY4haXQ7kPMbA7LRJxy rj6TWS2OiwbJPgI2P00PftanwfwYRCRpNQynw4qPVlJAy42CWJfDIh5xRRen2jqsGp/l 5jTrSYaxWu/BpL16p5sSigVGFV78EyZ+n5bqP2J/QUMr48OgRZpiXgLF2fs7JAEcBQAC lH/FIJJcee/X03UDEsnrkK+T+7qppR+ZtKX7eS4YIMMAnao9aIxtbjMtyH9SBzBls26Y //lhhOL9DSb7bBPVT2qMzhSqSZDq3K0k4QctAKZpiNwUuAsQLrQLUJnvcqK9vYo/bPAL UWnA== X-Gm-Message-State: APjAAAVaRKyYqh/RZtxHI9Iszp6kq/d9Nm1XogTc+z0OyZS2xIXL7y/F AYt177OipgPlglI1VJmwmQ1qzhmiNPE= X-Received: by 2002:aed:2f01:: with SMTP id l1mr34524115qtd.391.1577381393925; Thu, 26 Dec 2019 09:29:53 -0800 (PST) Received: from fedora.pebenito.net (pool-108-15-23-247.bltmmd.fios.verizon.net. [108.15.23.247]) by smtp.gmail.com with ESMTPSA id q25sm8927471qkq.88.2019.12.26.09.29.53 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 26 Dec 2019 09:29:53 -0800 (PST) Subject: Re: [PATCH 6/9] fstools: add zfs-auto-snapshot To: Jason Zaman , selinux-refpolicy@vger.kernel.org References: <20191224101043.58122-1-jason@perfinion.com> <20191224101043.58122-6-jason@perfinion.com> From: Chris PeBenito Message-ID: <9de17edd-fa73-5c08-4093-7ac78b8c75ab@ieee.org> Date: Thu, 26 Dec 2019 12:06:52 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20191224101043.58122-6-jason@perfinion.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 12/24/19 5:10 AM, Jason Zaman wrote: > Should be in domain fstools_t, and needs to run zpool which is > mount_exec_t. > > type=AVC msg=audit(1563084061.269:2472): avc: denied { execute } for pid=4981 comm="env" name="zpool" dev="zfs" ino=259064 scontext=system_u:system_r:fsadm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mount_exec_t:s0 tclass=file permissive=0 > type=SYSCALL msg=audit(1563084061.269:2472): arch=c000003e syscall=59 success=no exit=-13 a0=7ffeba786e70 a1=7ffeba787098 a2=55726a69a4e0 a3=7fbff7eb5b00 items=1 ppid=4980 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="env" exe="/bin/env" subj=system_u:system_r:fsadm_t:s0-s0:c0.c1023 key=(null) > type=CWD msg=audit(1563084061.269:2472): cwd="/root" > type=PATH msg=audit(1563084061.269:2472): item=0 name="/sbin/zpool" inode=259064 dev=00:17 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:mount_exec_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 > > Signed-off-by: Jason Zaman > --- > policy/modules/system/fstools.fc | 1 + > policy/modules/system/fstools.te | 1 + > 2 files changed, 2 insertions(+) > > diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc > index 8fbd5ce4..d871294e 100644 > --- a/policy/modules/system/fstools.fc > +++ b/policy/modules/system/fstools.fc > @@ -49,6 +49,7 @@ > /usr/bin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) > /usr/bin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) > /usr/bin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0) > +/usr/bin/zfs-auto-snapshot -- gen_context(system_u:object_r:fsadm_exec_t,s0) > /usr/bin/zhack -- gen_context(system_u:object_r:fsadm_exec_t,s0) > /usr/bin/zinject -- gen_context(system_u:object_r:fsadm_exec_t,s0) > /usr/bin/zpios -- gen_context(system_u:object_r:fsadm_exec_t,s0) > diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te > index 8d37e323..64b61485 100644 > --- a/policy/modules/system/fstools.te > +++ b/policy/modules/system/fstools.te > @@ -154,6 +154,7 @@ logging_send_syslog_msg(fsadm_t) > > miscfiles_read_localization(fsadm_t) > > +mount_exec(fsadm_t) > # for /run/mount/utab > mount_getattr_runtime_files(fsadm_t) > # losetup: bind mount_loopback_t files to loop devices Please add a comment that this is for the zfs command. -- Chris PeBenito