Re: iotop policy development advice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2013-10-09 at 08:04 +1030, William Brown wrote:
> > > 
> > > > I made a 30 minute demonstration about creating policy for iotop (on
> > > > rhel6) : https://www.youtube.com/watch?v=WcF9QkqLcKs
> > > > 
> > > 
> > > Fantastic. Thanks for your combined emails. It has revealed a lot to me.
> > > I'll watch your video, and will create a similar policy for iotop on
> > > Fedora. If you don't mind, I'll post it here for review once I'm done.
> > > 
> > 
> > sure, you can post it but if the policy looks like the one i created in
> > my video then its ok
> > 
> 
> Well hopefully it does. I'm not aiming to copy your policy directly, as
> I want to learn the steps so I can write these for myself.
> 
> I have already run into one issue. I have created an iotop module and
> iotop_sysadm module, but once loaded I see a number of errors in
> ausearch like:
> 
> libsepol.sepol_context_to_sid: could not convert
> staff_u:sysadm_r:iotop_t:s0-s0:c0.c1023 to sid
> libsepol.context_from_record: invalid security context:
> "staff_u:sysadm_r:iotop_t:s0-s0:c0.c1023"
> libsepol.context_from_record: could not create context structure
> libsepol.context_from_string: could not create context structure
> 
> 

It says that the staff_u:sysadm_r:iotop_t:s0-s0:c0.c1023 content is
invalid. So you should check whether the combination of these security
identifiers is valid

you can use the seinfo , semanage and sesearch tools to determine that

to determine whether your uid/gid is associated to
staff_u/s0-s0:c0.c1023:

semanage login -l |grep myadm
myadm                     staff_u                   s0-s0:c0.c1023

to determine whether the staff_u sid is associated to the sysadm_r role
and range of s0-s0:c0.c1023:

semanage user -l | grep staff_u
staff_u         user       s0         s0-s0:c0.c1023
staff_r sysadm_r system_r unconfined_r

to determine whether staff_r can manually change to sysadm_r:

sesearch --role_allow | grep "allow staff_r " | grep sysadm_r
   allow staff_r sysadm_r;

to determine whether the sysadm_r role is associated to the iotop_t
domain:

seinfo -xrsysadm_r | grep iotop
         iotop_t


to determine whether whether sysadm_t automatically domain transitions
to iotop_t when he runs a file with type iotop_exec_t:

sesearch -ASCT -s sysadm_t -t iotop_exec_t | grep type_transition
   type_transition sysadm_t iotop_exec_t : process iotop_t;

if all the above prerequisites are met then things should probably work
in the default fedora/rhel set up

> My research shows this is when you forget the "s0" on a file context,
> but this isn't the case here. 
> 
> I've attached my policy that I have partially written at this point, and
> any advice would be appreciated on this.
> 
> 


--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux