Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10030210ybl; Thu, 26 Dec 2019 09:30:03 -0800 (PST) X-Google-Smtp-Source: APXvYqyFj42rtLrN2/YWG6C8EWewKsCek+t+u6gssDFqYBTUa3mDihJC9xIPouMss5pBEAoZv/ZZ X-Received: by 2002:aca:5bd6:: with SMTP id p205mr2710117oib.132.1577381403646; Thu, 26 Dec 2019 09:30:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577381403; cv=none; d=google.com; s=arc-20160816; b=UOS2jAglTVCR9zYKrLuFS84sP1oFdqHnCiTKEvz83vF8FqRcA5wGyKQjXqi8cTI6yx TFZUtWA8+Tnw5t2YcZF1szsMgOoGL4ptEf3j5WTq1QxAmDJBNwqbrRaL2dBxgdl9EjiI temBIXtX4Rhh/VO/c8LbB3sD156qE03fLOCM8HL6OVzoN0Ug0EWJPSizrUaeamSbU+XF fIpwvJUOTVyPRmAt0Looof7G87Cj7azkU6aLr3n8wse/Cc6qCX0n9HhIwvuNINreDex+ O5ys2H8X4BWb+PpN3s/rjPcKROWJX8nJ2XPMeXbVJuS7iS0Xuzwdq4bV53n01xSQW4cK UwCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=KePjYREW6H3wCkunouxoD+LYfTvoZoAslKZ1/6kf9gg=; b=bLE/Gg681RBnYcTA9aPdwXIJ4Bug1oPTqHiXrArWTXhZan6mQ+kiTXR5/AfEoVZwO1 tA0DHelQRxP+An5LC9eSmxAcoLvE758eWHkfWyPIqI1VjhnuBr3WQPZHhh/EAr+4wCqX L6b/Y2bLbq6b+SaZHSUlm1SVnWO4mlhGVDg8DHDo3dOKX+HXtt/DHUkWXHLKhnjumtbw 1MhDmwhho94xcColTYtBqpGT8/EoJElF8Cr39RGASRVwNduN2tVyNSX+YJj3i9XBihVF ljHctOkVTIjOHmvIcRb5e2co7wK1AZ9JTqbUmxv8zsThACOK5dhXmnUI4S4XWfScArby 96wA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=S4t7gZwN; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 38si10323199otj.136.2019.12.26.09.30.01; Thu, 26 Dec 2019 09:30:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=S4t7gZwN; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726661AbfLZRaA (ORCPT + 11 others); Thu, 26 Dec 2019 12:30:00 -0500 Received: from mail-qk1-f193.google.com ([209.85.222.193]:38334 "EHLO mail-qk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726480AbfLZRaA (ORCPT ); Thu, 26 Dec 2019 12:30:00 -0500 Received: by mail-qk1-f193.google.com with SMTP id k6so19859478qki.5 for ; Thu, 26 Dec 2019 09:29:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=KePjYREW6H3wCkunouxoD+LYfTvoZoAslKZ1/6kf9gg=; b=S4t7gZwNzaKFErQ8DTUZfCdkMJPD82OQZ1WyeA5gVBnUU0q5G5gxN7B6ABEe5aK91H oeW22qWFjwFJ3ZK7LM2ZdFavfw4VXTMbscchq3bCCh6ezdOro/skPyyeEs+htw6TIj74 70beuOAdiFDzuWBst6Nt7ih5t3M4RCOBI+6nY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=KePjYREW6H3wCkunouxoD+LYfTvoZoAslKZ1/6kf9gg=; b=r9teNE2jZ2m6jZNA336tfwl1rBiBNnV6/xLUw8anoP446BZjwyQ9Li3bzKGLkK04aW uLXfZblq6/DCVcaTWet99qEJszu4P0HrjRmg+n5bIo0Ua24zAClnf409uhwkwBMq1Tgb Xv4/e6dKEOazqM3Jp6uVSHhBuOaqHC24dDUpk6RNtV9331V/dEtWryOWbAv04g3nKrUs mfrUxArDadrk+necwDuCwesUgTgD9L/8VhMv4UEHBham80D90Dxf7T00XP2mzSSuN9Bg niKG2ZlkfT7h8NgFOBktud6h/6wu6dxaQVOUcs4aQUF9ILK60F8TQ0FUiSI6LhJQvTfA HuUA== X-Gm-Message-State: APjAAAX3UXz4Ki4m36MJggdhjtPnZ6GXmfHAuugQnVJHAKrjjzPoalBG aDBe8WQgNMSWgcJxn2i4L95r9cpLdy8= X-Received: by 2002:a05:620a:10b2:: with SMTP id h18mr39393732qkk.185.1577381398782; Thu, 26 Dec 2019 09:29:58 -0800 (PST) Received: from fedora.pebenito.net (pool-108-15-23-247.bltmmd.fios.verizon.net. [108.15.23.247]) by smtp.gmail.com with ESMTPSA id h8sm9456347qtm.51.2019.12.26.09.29.58 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 26 Dec 2019 09:29:58 -0800 (PST) Subject: Re: [PATCH 4/9] devicekit: udisks needs access to /run/mount/utab.lock To: Jason Zaman , selinux-refpolicy@vger.kernel.org References: <20191224101043.58122-1-jason@perfinion.com> <20191224101043.58122-4-jason@perfinion.com> From: Chris PeBenito Message-ID: <23946a68-55d2-593c-f6e6-649407a36439@ieee.org> Date: Thu, 26 Dec 2019 12:24:18 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20191224101043.58122-4-jason@perfinion.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 12/24/19 5:10 AM, Jason Zaman wrote: > type=AVC msg=audit(1563073723.106:232): avc: denied { read } for pid=7850 comm="udisksd" name="utab.lock" dev="tmpfs" ino=18445 scontext=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 > type=SYSCALL msg=audit(1563073723.106:232): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=55841d66c920 a2=10 a3=0 items=1 ppid=7849 pid=7850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="udisksd" exe="/usr/libexec/udisks2/udisksd" subj=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 key=(null) > type=CWD msg=audit(1563073723.106:232): cwd="/" > type=PATH msg=audit(1563073723.106:232): item=0 name="/run/mount/utab.lock" inode=18445 dev=00:16 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:mount_runtime_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 > > Signed-off-by: Jason Zaman > --- > policy/modules/services/devicekit.te | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/policy/modules/services/devicekit.te b/policy/modules/services/devicekit.te > index 3331bd00..0622b6cf 100644 > --- a/policy/modules/services/devicekit.te > +++ b/policy/modules/services/devicekit.te > @@ -192,6 +192,7 @@ optional_policy(` > > optional_policy(` > mount_domtrans(devicekit_disk_t) > + mount_rw_runtime_files(devicekit_disk_t) > ') > > optional_policy(` Merged. -- Chris PeBenito