Received: by 2002:aa6:c46f:0:b029:96:faae:e639 with SMTP id i15csp337902lkq; Thu, 5 Nov 2020 03:56:30 -0800 (PST) X-Google-Smtp-Source: ABdhPJyiwTImK7zuSlCv/UaatNbN1Ghoxbt40Hnf2/4M2NBgQC3O9TG5EuxM17+6tPoUBQnfWXu8 X-Received: by 2002:a17:906:d8b0:: with SMTP id qc16mr1881562ejb.268.1604577390056; Thu, 05 Nov 2020 03:56:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604577390; cv=none; d=google.com; s=arc-20160816; b=Id/AQHiH1fabkallg3s5MRp+vldRd309m8sxMdZemtkwsvtUnkA77QL7jp7PaBzs9g kfjkPbRjiYFsqQ4+tpLY8jjh/HWC/1r/wP0mCGYzqoMQSVJNThqo7JmhaGXIgFvTclDC ecFiMgMcoaQLqNpmz8wAkVMB/pjaPueDMqwXOMeQTg1ffjnClWPTC/5foL/+ealuTTKM 1aAKqYrrKY6xeE+3rFwhAGaKoPWK5Oa5DOh7TW+BWNLyjSFje6SEYeFi6z4B6Je0wIrt y4jdUMqU5ZNcTGfUmL9XXGRD3Dk0kBWwhqgf0WFGFz9Mc9gr8NxxVZyJjmEd/ByGakQs /VJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:dkim-signature; bh=wO2I427EY6rcbPWniKQqfclkL6RxoRj9GT3EW1oUrsQ=; b=msiiIJOLZhDqmusqVKTKtI1SASpjLHr1JQGiWupu07GE4QPU4OiTasiPpQz5o51gA+ 8+24b31T5eqzQWlpVhF69s11PMpqK4k8ZoJbeq595lDMgi9l8NeacmHiXGop/d479dWb R359n6QiYeY1h5LeqO/+EtI/gINvH8oHZfbowsi6uh1c4kMqvvFVUZO/jqTDVmHN4lvu TkMrpBMJ9oQET8040DKPkB+L2JcvqjNCjKDNrDIBGsThf4lUp+Lo8tDdpLCUdE32Q1Bs 4EcFBjcmOk/5CbfyqR/Qg45hCBASQ6AonlLkUHHossv6jx/TDZddV3Qmvkpaj6Cob+cb LM8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=eeLH1K6I; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o22si909529eds.598.2020.11.05.03.56.24; Thu, 05 Nov 2020 03:56:30 -0800 (PST) Received-SPF: pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ieee.org header.s=google header.b=eeLH1K6I; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ieee.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726665AbgKELz6 (ORCPT + 17 others); Thu, 5 Nov 2020 06:55:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48686 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726067AbgKELz6 (ORCPT ); Thu, 5 Nov 2020 06:55:58 -0500 Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C6BC5C0613CF for ; Thu, 5 Nov 2020 03:55:56 -0800 (PST) Received: by mail-io1-xd43.google.com with SMTP id j12so1515589iow.0 for ; Thu, 05 Nov 2020 03:55:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=wO2I427EY6rcbPWniKQqfclkL6RxoRj9GT3EW1oUrsQ=; b=eeLH1K6Id3723jubuTQqgl9/gT78bnkJvPQ+E3/TTmt344ymEnsvD541x79rAKGgY+ 6Z+VOmAsb5VKj/mReIyhEq9C0fw0oL+8rE9URoDQMbS/2oEvgM1FK21kJR8IoSsvPzTL VNPRjOol88UYf6ADE2i0GJumm11z5SNt/9BjU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=wO2I427EY6rcbPWniKQqfclkL6RxoRj9GT3EW1oUrsQ=; b=QJhIrR05XrJr5mBoXJ0CLCBJS9EXVbagx0Lk02nzWmunzFktrY84bs2zkslsXvXg9P TxW8pUvRbNYEoMVGFVL6LgJ9Do0Xe0XZqKQck/Dfvq9ktvFkhW8uHPMOZh5gMZhsghck 48F8n5mJK05eHO0Wj2LKzuS4YOe7NKlevjYQAoGGpPZhmY08b4SEhGX+D1SdNRpo6O7g kzGsj1LxYVAREs5wm1xtW0P+vUhbl4cSriB/1pYLloDMUvcyyM3QMimmQTOxV41vpEBd kEzD64DytV4JvFBdxMuNNxW6tSe3ARuZc5VbV5b1m0srr1tQX8qhSABCLNnH0IHsw0cu JDvw== X-Gm-Message-State: AOAM5335SOu5dplbLrZ9+a424OHn5xFNwwLkLxrJcDLqjZUw0lTuedgv UH3+i+a0ceCuJrA7bF9IVp7TKlflKmMr4nYD X-Received: by 2002:a05:6602:22c2:: with SMTP id e2mr1408030ioe.156.1604577355930; Thu, 05 Nov 2020 03:55:55 -0800 (PST) Received: from fedora.pebenito.net (pool-96-234-173-17.bltmmd.fios.verizon.net. [96.234.173.17]) by smtp.gmail.com with ESMTPSA id b191sm949302iof.29.2020.11.05.03.55.55 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 05 Nov 2020 03:55:55 -0800 (PST) Subject: Re: [PATCH v2] xen: Allow xenstored to map /proc/xen/xsd_kva To: Anthony PERARD , selinux-refpolicy@vger.kernel.org References: <20201027172228.528204-1-anthony.perard@citrix.com> From: Chris PeBenito Message-ID: Date: Thu, 5 Nov 2020 06:55:54 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <20201027172228.528204-1-anthony.perard@citrix.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org On 10/27/20 1:22 PM, Anthony PERARD wrote: > xenstored is using mmap() on /proc/xen/xsd_kva, and when the SELinux > boolean "domain_can_mmap_files" in CentOS is set to false the mmap() > call fails. > > Signed-off-by: Anthony PERARD > --- > v2: Declare an interface instead of using allow in xen.te directly. > --- > policy/modules/kernel/filesystem.if | 18 ++++++++++++++++++ > policy/modules/system/xen.te | 1 + > 2 files changed, 19 insertions(+) > > diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if > index b52fc769236b..b85ae2f6e851 100644 > --- a/policy/modules/kernel/filesystem.if > +++ b/policy/modules/kernel/filesystem.if > @@ -5310,6 +5310,24 @@ interface(`fs_manage_xenfs_files',` > manage_files_pattern($1, xenfs_t, xenfs_t) > ') > > +######################################## > +## > +## Map files a XENFS filesystem. > +## > +## > +## > +## Domain allowed access. > +## > +## > +# > +interface(`fs_mmap_xenfs_files',` > + gen_require(` > + type xenfs_t; > + ') > + > + allow $1 xenfs_t:file map; > +') > + > ######################################## > ## > ## Do not audit attempts to create, > diff --git a/policy/modules/system/xen.te b/policy/modules/system/xen.te > index 2c95d0ca3bbd..82328cbbbaa3 100644 > --- a/policy/modules/system/xen.te > +++ b/policy/modules/system/xen.te > @@ -459,6 +459,7 @@ files_read_usr_files(xenstored_t) > > fs_search_xenfs(xenstored_t) > fs_manage_xenfs_files(xenstored_t) > +fs_mmap_xenfs_files(xenstored_t) > > term_use_generic_ptys(xenstored_t) Merged. -- Chris PeBenito