Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp333168pxu; Fri, 11 Dec 2020 03:32:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJzoSOuO3Wv7wxyaM8Phia4nGB31REQCHg65kU2jfZTtS+VyLw5xYqA2YhMbJVdjUzyd0NpJ X-Received: by 2002:a17:906:145b:: with SMTP id q27mr10741147ejc.86.1607686359542; Fri, 11 Dec 2020 03:32:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607686359; cv=none; d=google.com; s=arc-20160816; b=apERmBSfcRPnyR7VL4Kz0NGO+8ghzJBt1B6fAuKVLnXtcHiz0ANGb07+Fe+k6Fr+ZX 0iJwxzUrbQtKjUMQQGTo/W+dcPUHFJ9ByWdWuoRHv+7GseMXoKx55BXdSueVW16NWYqq AUbGOn1jJx43mfQBRB05/7THF+ToBTO9mpX/LTWC/n/GvOyh/aTLUb170VdsbEkrNXER 5HJc1F3/mjLYY4ND6Qe580v/Qis+QS4upHcrJr3xnrPUF0wKvsNYRysViRoCg0xrDVvY sYkeVkeu2yIXTC2DhJN3V2YzwQYkBLhoA9rClLf32X6e/5nSB41nzBgAwmxvgP70LcVI YwZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=/cUifaYBKB61boif4EGteBuXN6aB+lKe7okmuwJA25Y=; b=jcnevoexSwnbyrhT1PVXQ7Wmc3MOiLHd9CyPQOiqBYcKWzewmkSVUWm4gC/NccKl5l cxMh40bYAetNY2222prdpaN7bfG1PSlZcXqYUsFr8kKU/sZYrI5zfoerXmTuc9rwtC4i qvbVFdIw9gvRIVRJDkvB/Lpn3oUNsgPfyCIMaT3eOPrFQVESatGR0kAN7I0q6kf2U1JC Hew4kToLJLjFkWzeB5PhJ8hrDLPooD4MF8W5tHx3gomliT0au2H3LEi2+50JeASP8Xwo CpPYRes8UegNAs/2pRVqX1FlwxpzUfyl6AetKcgsEC0FC3IAc83ZaE/XXKFIF6apamPL D01Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@coker.com.au header.s=2008 header.b=wHq15X5y; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=coker.com.au Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o16si4438286ejx.217.2020.12.11.03.32.33; Fri, 11 Dec 2020 03:32:39 -0800 (PST) Received-SPF: pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@coker.com.au header.s=2008 header.b=wHq15X5y; spf=pass (google.com: domain of selinux-refpolicy-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=coker.com.au Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732286AbgLKC3y (ORCPT + 16 others); Thu, 10 Dec 2020 21:29:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47018 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391634AbgLKC3W (ORCPT ); Thu, 10 Dec 2020 21:29:22 -0500 Received: from smtp.sws.net.au (smtp.sws.net.au [IPv6:2a01:4f8:140:71f5::dada:cafe]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ACF82C0613CF for ; Thu, 10 Dec 2020 18:28:41 -0800 (PST) Received: from xev.coker.com.au (localhost [127.0.0.1]) by smtp.sws.net.au (Postfix) with ESMTP id 6EA5BFE3C for ; Fri, 11 Dec 2020 13:27:54 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=coker.com.au; s=2008; t=1607653674; bh=/cUifaYBKB61boif4EGteBuXN6aB+lKe7okmuwJA25Y=; l=4425; h=Date:From:To:Subject:From; b=wHq15X5yCpnPsKK28G1Yeo2Flbe4CImF6XH6w0SGoYP8UZ9VdGb/KU5UPKTTRbNHC 7zYQV4mtgYpWrmC5YOEyrUZa9WX0X9sMaTFs593URkFJ0uGbYDerLfsoK7etPcSJXY UkyPkJ73EiWjsVhIQwuHIItc7bAoy1nW4aUVbAUk= Received: by xev.coker.com.au (Postfix, from userid 1001) id 88B3E126F04E; Fri, 11 Dec 2020 13:27:49 +1100 (AEDT) Date: Fri, 11 Dec 2020 13:27:49 +1100 From: Russell Coker To: selinux-refpolicy@vger.kernel.org Subject: [PATCH] first udevadm patch Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org As Chris noted in a previous message the udevadm_t domain could be used from other places. This patch allows for that possibility in the near future but for the moment just makes a system bootable in enforcing mode right now. Also I didn't remove the context entries for udevadm even though on systems with a recent systemd they won't exist. At this time leaving them there may provide the best compatability options. Finally I added a udev_runtime_t watch because the need for that appeared when I was working on this. Signed off by Russell Coker Index: refpolicy-2.20201210/policy/modules/system/udev.fc =================================================================== --- refpolicy-2.20201210.orig/policy/modules/system/udev.fc +++ refpolicy-2.20201210/policy/modules/system/udev.fc @@ -10,7 +10,7 @@ /etc/udev/scripts/.+ -- gen_context(system_u:object_r:udev_helper_exec_t,s0) /usr/bin/udev -- gen_context(system_u:object_r:udev_exec_t,s0) -/usr/bin/udevadm -- gen_context(system_u:object_r:udevadm_exec_t,s0) +/usr/bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/bin/udevd -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/bin/udevinfo -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/bin/udevsend -- gen_context(system_u:object_r:udev_exec_t,s0) @@ -22,7 +22,7 @@ ifdef(`distro_debian',` ') /usr/sbin/udev -- gen_context(system_u:object_r:udev_exec_t,s0) -/usr/sbin/udevadm -- gen_context(system_u:object_r:udevadm_exec_t,s0) +/usr/sbin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/sbin/udevd -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/sbin/udevsend -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/sbin/udevstart -- gen_context(system_u:object_r:udev_exec_t,s0) @@ -32,7 +32,6 @@ ifdef(`distro_redhat',` /usr/sbin/start_udev -- gen_context(system_u:object_r:udev_exec_t,s0) ') -/usr/lib/systemd/systemd-udevd -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/lib/udev/udev-acl -- gen_context(system_u:object_r:udev_exec_t,s0) /usr/share/virtualbox/VBoxCreateUSBNode\.sh -- gen_context(system_u:object_r:udev_helper_exec_t,s0) Index: refpolicy-2.20201210/policy/modules/system/udev.if =================================================================== --- refpolicy-2.20201210.orig/policy/modules/system/udev.if +++ refpolicy-2.20201210/policy/modules/system/udev.if @@ -548,10 +548,10 @@ interface(`udev_manage_runtime_files',` # interface(`udevadm_domtrans',` gen_require(` - type udevadm_t, udevadm_exec_t; + type udevadm_t, udev_exec_t; ') - domtrans_pattern($1, udevadm_exec_t, udevadm_t) + domtrans_pattern($1, udev_exec_t, udevadm_t) ') ######################################## @@ -579,21 +579,3 @@ interface(`udevadm_run',` udevadm_domtrans($1) roleattribute $2 udevadm_roles; ') - -######################################## -## -## Execute udevadm in the caller domain. -## -## -## -## Domain allowed access. -## -## -# -interface(`udevadm_exec',` - gen_require(` - type udevadm_exec_t; - ') - - can_exec($1, udevadm_exec_t) -') Index: refpolicy-2.20201210/policy/modules/system/udev.te =================================================================== --- refpolicy-2.20201210.orig/policy/modules/system/udev.te +++ refpolicy-2.20201210/policy/modules/system/udev.te @@ -8,6 +8,7 @@ attribute_role udevadm_roles; type udev_t; type udev_exec_t; +typealias udev_exec_t alias udevadm_exec_t; type udev_helper_exec_t; kernel_domtrans_to(udev_t, udev_exec_t) domain_obj_id_change_exemption(udev_t) @@ -17,9 +18,7 @@ init_daemon_domain(udev_t, udev_exec_t) init_named_socket_activation(udev_t, udev_runtime_t) type udevadm_t; -type udevadm_exec_t; -init_system_domain(udevadm_t, udevadm_exec_t) -application_domain(udevadm_t, udevadm_exec_t) +application_domain(udevadm_t, udev_exec_t) role udevadm_roles types udevadm_t; type udev_etc_t alias etc_udev_t; @@ -86,6 +85,7 @@ manage_files_pattern(udev_t, udev_runtim manage_lnk_files_pattern(udev_t, udev_runtime_t, udev_runtime_t) manage_sock_files_pattern(udev_t, udev_runtime_t, udev_runtime_t) files_runtime_filetrans(udev_t, udev_runtime_t, dir, "udev") +allow udev_t udev_runtime_t:dir watch; kernel_load_module(udev_t) kernel_read_system_state(udev_t)