Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10030296ybl; Thu, 26 Dec 2019 09:30:07 -0800 (PST) X-Google-Smtp-Source: APXvYqxrzkKjtyBe7f2+7QwsN6tc0yLb5Csm/UFhleIplUEVetzN86jLUglHYHIaBojSRAFVujiv X-Received: by 2002:a9d:6c01:: with SMTP id f1mr48982700otq.133.1577381407528; Thu, 26 Dec 2019 09:30:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577381407; cv=none; d=google.com; s=arc-20160816; b=k6ZgUfg6kUSy68zKLEQlXcqVcmbPb5Gnx1xLRT/gLz9zsO+YOZsqLIk/rYgGxwSash uUqJ4ZLTQ97GGELQz9Eisj4hoQ9T+n/CE1x394UHesscAjSQiEZR92mWi0aoko56ShMV 7Yohyct/JWomvdtbpujh8whgNvyJSMv/iXLkbF/MEhSzlnVMtBfZ5vD9+2zmnoOGIv4Y 2y/ByHl4BAV0ERA8sHng1buT+6aOg4Z+ADes14skIA1VsGUmVKF8TLF/u0ClGWQ+U/mO JQ9C962hojNHp+o+BMFXzY1XGBGQwoiCM1CjzAYTCla2d0Si3ZMuqO2IobO07v4TrTOY QDsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=miLarYgOQ2MAkW9xq2VqcGbWDkNZfbG+swAiSljXbB0=; b=MjtyGznZs0mPmZHVsEgTVx/PMvUFSp4zZlLkSb7L22FyYGOF+uMQe2AKw7jTMFfcbv G9SMKNnIdZFnD88jK0Nzy3GywQ0asIkQP4rOskMz0JpV1Tgv78Fn2rMVK4IcnCnvcQ5U 89CSflBKnnh8WO+tqop671f5fEm+nuvtpjVQYfiBwJyBeO5ll5b/wr68Tk23OGXS/Zss hUCEKoxZOExl3eHXubHuODlE/vZraMkv9VSNuhQfhhe09yZY6jwiCmu0tb2bdOkVsn+j 3Zxi7V5rXPpsW7GHSbQKzs6sJuALFAzWQ5CEDQ/aqq99q9RyUgzpo9uJFP5kgcglmC/Y zpnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=WOi9c14a; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i15si15427500otk.120.2019.12.26.09.30.05; Thu, 26 Dec 2019 09:30:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=WOi9c14a; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726748AbfLZRaF (ORCPT + 11 others); Thu, 26 Dec 2019 12:30:05 -0500 Received: from mail-qt1-f194.google.com ([209.85.160.194]:42953 "EHLO mail-qt1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726480AbfLZRaF (ORCPT ); Thu, 26 Dec 2019 12:30:05 -0500 Received: by mail-qt1-f194.google.com with SMTP id j5so22741729qtq.9 for ; Thu, 26 Dec 2019 09:30:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=miLarYgOQ2MAkW9xq2VqcGbWDkNZfbG+swAiSljXbB0=; b=WOi9c14a0xdHwIf5MMVOEBL4b+Pvf3BzC7Vof9+jdvFIKWqm56lrP8IlHOho1ijKXM 9TqH6P38rgerlqI7CiVUQw3WsmjrqfBOgg/a4Jxldbgpi8s5Dt71zOHkvkO87Y9aiUjR H16bvp21CWbcskEDsJ26tJBm+ApvT2jyZma8I= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=miLarYgOQ2MAkW9xq2VqcGbWDkNZfbG+swAiSljXbB0=; b=t4oCU4Os8Uw4AD1KqykJyPn12v905istDcTihFsGaECdppCyiKlwfDBXg7/AHuP+bV X2bvFAnQWYoYPGhlWJzqTs8FN5iid0mFsUeSQcBu9cYIc+PqLZm9DXWKXhm8TkbZof1a hUL4ntO2xd7jPPW8yA5FzCq5AMbcsF8IN9/uG9GrpxM50j5iY1QnG9P8ZgQFrB5zDv3y 6hVb58H19YaGWPDfhgiuainvudDMRe7PrNMp0pHqgzlpHM/pcvsiwthbW5w+dCX13W3m 0Kc6n/yKT8O3As2JKYqmnk4iWPshGUeGdjvdJawquuKfUpAMPuEZ4fouWSeALVVHA9lK MZdg== X-Gm-Message-State: APjAAAUqQs3OqLcoyObwKoa/NlM1h7h7BuNhsywIqtt+uHW5cmEqRtLw 3AbNEBnOW/JDACDxSKV+BCv18BkakP4= X-Received: by 2002:aed:218f:: with SMTP id l15mr28507290qtc.247.1577381403972; Thu, 26 Dec 2019 09:30:03 -0800 (PST) Received: from fedora.pebenito.net (pool-108-15-23-247.bltmmd.fios.verizon.net. [108.15.23.247]) by smtp.gmail.com with ESMTPSA id v4sm9645837qtd.24.2019.12.26.09.30.03 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 26 Dec 2019 09:30:03 -0800 (PST) Subject: Re: [PATCH 8/9] virt: Add unix socket for virtlogd/virtlockd To: Jason Zaman , selinux-refpolicy@vger.kernel.org References: <20191224101043.58122-1-jason@perfinion.com> <20191224101043.58122-8-jason@perfinion.com> From: Chris PeBenito Message-ID: Date: Thu, 26 Dec 2019 12:28:31 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20191224101043.58122-8-jason@perfinion.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 12/24/19 5:10 AM, Jason Zaman wrote: > avc: denied { listen } for pid=3236 comm="virtlogd" path="/run/libvirt/virtlogd-sock" scontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=0 > > Signed-off-by: Jason Zaman > --- > policy/modules/services/virt.te | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/policy/modules/services/virt.te b/policy/modules/services/virt.te > index 0d5d1b25..d4c5d05a 100644 > --- a/policy/modules/services/virt.te > +++ b/policy/modules/services/virt.te > @@ -1323,6 +1323,7 @@ kernel_dontaudit_read_system_state(virt_leaseshelper_t) > > allow virtlockd_t self:capability dac_override; > allow virtlockd_t self:fifo_file rw_fifo_file_perms; > +allow virtlockd_t self:unix_stream_socket create_stream_socket_perms; > > allow virtlockd_t virtd_t:dir list_dir_perms; > allow virtlockd_t virtd_t:file read_file_perms; > @@ -1362,6 +1363,7 @@ virt_read_config(virtlockd_t) > # > > allow virtlogd_t self:fifo_file rw_fifo_file_perms; > +allow virtlogd_t self:unix_stream_socket create_stream_socket_perms; > > allow virtlogd_t virtd_t:dir list_dir_perms; > allow virtlogd_t virtd_t:file read_file_perms; Merged. -- Chris PeBenito