Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5022642ybv; Mon, 17 Feb 2020 10:35:06 -0800 (PST) X-Google-Smtp-Source: APXvYqxZyVOTVKrboK2/41/S8X0c+oyR7FyLXt38rlpHmU40anqQvxUBU3k14f3As/k10u4pungp X-Received: by 2002:a9d:aea:: with SMTP id 97mr12966904otq.51.1581964506285; Mon, 17 Feb 2020 10:35:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581964506; cv=none; d=google.com; s=arc-20160816; b=lBIMKZYfHmQB7Z+UmzGJ+t/GZ7y49cwKaj41XQOaBRJ/+s4JXtnDJv6WVETWPq5GDf B0YhVOzNvHmel3BnG2CodG0WgMDEZM6o0PpE8XlX9H2m6jvxPEdxWuZWASF2c+aJbaL4 Liv0k2cPkdId+IbSpJgYQgGWuma/aaN0XZ7Yyn/2+PRwRIgcK+SvKiKn7auCE/8bP0w5 virDETrT01VbTK2UmlPoVUSodTkUeog8mig7mzO984928Oq7q14fdE3Cy2/5MfOZblu/ eax2qCp45gt/ORBnHCirFowvHGDu7Mr7mvX6vI0O71PRG6zzlU750x48E63EYDXCe7SW VDhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=Muz18ABK6jzRHSpPE9bMDpqQFGikuz/Fa0k5Wap1RMk=; b=KRUaB6lEmgSISpDnRJSLkzdLl4AYhFdSakWTdaWX4zVCA3rXErdJ+a766VYTfN6jEe CJHVTuNFySif251PnQe/mZzR7jaueQn9/c63UEeN9KSkc9hRJ1mUnrkgP5kV3Nz3WUAP lIQhgRGdNuyAjUIM+F+7huGXozkf0WBP1Q8dheoP1h0+YCbYtgaxeH4BmdvYNQkXrL29 FDQ8HkNzevp8vlHOyHz+urzEZmfBuMtCGzlwiWyhPnHR4ahbX8B6ebIhsZ9x/b37quve 6DRP9K7NOjRGb2cE+vA/DtiR5vAm4oDDzRMOULUNzT77L1uECzRVbxXepO9tLNAGq8oJ Ym3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=hPvh+kpi; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l80si6732775oib.268.2020.02.17.10.35.04; Mon, 17 Feb 2020 10:35:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=hPvh+kpi; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727179AbgBQSen (ORCPT + 13 others); Mon, 17 Feb 2020 13:34:43 -0500 Received: from mail-qk1-f196.google.com ([209.85.222.196]:35703 "EHLO mail-qk1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729252AbgBQSem (ORCPT ); Mon, 17 Feb 2020 13:34:42 -0500 Received: by mail-qk1-f196.google.com with SMTP id v2so17128031qkj.2 for ; Mon, 17 Feb 2020 10:34:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=Muz18ABK6jzRHSpPE9bMDpqQFGikuz/Fa0k5Wap1RMk=; b=hPvh+kpiV6yeWnaCUdR12lUWjPgMds17p6aF6Rr98LmqaE0MmJX74On9H3IYbCyd3W 3kmIwfkgP3EZSZPIp6/RsGnj8YdI0eHnXV68UmRkQqwH2LixONdSJhPJ317qyDnlUaV2 RtB4ROoTEZxcxrcPRD9qZZLmnaG5PeVHGLNBA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Muz18ABK6jzRHSpPE9bMDpqQFGikuz/Fa0k5Wap1RMk=; b=bs4Wd0GO+unkiiq/2MgZzFJat5C+ywEU5A4wynmWM9LAt+VaCaE5FIJSEJ/a2TzR2Q HMjSpILQUv2y2twZsOxubLYpwcgCLWOY5nKhbKyvMGq4K5Q/NwFkpNeE/j9mTzIZcsPH Y9mLBu/+MXPVgHXDYoNQtXGBya6YCPUnMvWXy1E/YNwqDPLpY0LAzICwtjTC6LrHmnMd SLYZtMcuyC4xLNt27JzMVN1CsUN0CC4Jaob4YG/LMIYqLzqIq4osXjFSnfp7HdtjglVZ sOTGs+M2zxGemihUHzo4hr1b3hwZ7y5U+oYgoxH6p1nsyra6nn9MM94YEcmRQXg/QIHJ rVVg== X-Gm-Message-State: APjAAAXS+dxdQWV0n98NoSmL9KLItduc2AqQ8/IAeV2vmqWAmV32ojpc 0usu877nBhW4I4mOSduwmoPmelptmJE= X-Received: by 2002:a05:620a:909:: with SMTP id v9mr15147068qkv.138.1581964481724; Mon, 17 Feb 2020 10:34:41 -0800 (PST) Received: from fedora.pebenito.net (pool-108-15-23-247.bltmmd.fios.verizon.net. [108.15.23.247]) by smtp.gmail.com with ESMTPSA id h20sm625868qkk.64.2020.02.17.10.34.41 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 17 Feb 2020 10:34:41 -0800 (PST) Subject: Re: [PATCH 08/10] dbus: add watch perms To: Jason Zaman , selinux-refpolicy@vger.kernel.org References: <20200216200319.39337-1-jason@perfinion.com> <20200216200319.39337-8-jason@perfinion.com> From: Chris PeBenito Message-ID: <2422a92b-5315-620d-8d70-22593b80ce53@ieee.org> Date: Mon, 17 Feb 2020 13:28:16 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.3.1 MIME-Version: 1.0 In-Reply-To: <20200216200319.39337-8-jason@perfinion.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 2/16/20 3:03 PM, Jason Zaman wrote: > avc: denied { watch } for pid=10630 comm="dbus-daemon" path="/usr/share/dbus-1/accessibility-services" dev="zfs" ino=244551 scontext=staff_u:staff_r:staff_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 > avc: denied { watch } for pid=10622 comm="dbus-daemon" path="/etc/dbus-1/session.d" dev="zfs" ino=262694 scontext=staff_u:staff_r:staff_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir permissive=0 > Signed-off-by: Jason Zaman > --- > policy/modules/services/dbus.te | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/policy/modules/services/dbus.te b/policy/modules/services/dbus.te > index 4e395f7f..6f9835c6 100644 > --- a/policy/modules/services/dbus.te > +++ b/policy/modules/services/dbus.te > @@ -219,6 +219,7 @@ allow session_bus_type self:netlink_selinux_socket create_socket_perms; > allow session_bus_type dbusd_etc_t:dir list_dir_perms; > read_files_pattern(session_bus_type, dbusd_etc_t, dbusd_etc_t) > read_lnk_files_pattern(session_bus_type, dbusd_etc_t, dbusd_etc_t) > +allow session_bus_type dbusd_etc_t:dir watch; > > manage_dirs_pattern(session_bus_type, session_dbusd_home_t, session_dbusd_home_t) > manage_files_pattern(session_bus_type, session_dbusd_home_t, session_dbusd_home_t) > @@ -258,6 +259,7 @@ domain_use_interactive_fds(session_bus_type) > > files_list_home(session_bus_type) > files_read_usr_files(session_bus_type) > +files_watch_usr_dirs(session_bus_type) > files_dontaudit_search_var(session_bus_type) > > fs_getattr_romfs(session_bus_type) Merged. -- Chris PeBenito