Re: [PATCH 1/1] refpolicy: Do not want to transition to sysadm_t when upstart runs a shell

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On Mar 7, 2008, at 7:52 AM, Daniel J Walsh wrote:


Looks like it.  I think leaving making it initrc_t would fix most of
your avc messages.

It certainly changed them. Here is the of the changing init_t to initrc_t


#============= init_t ==============
allow init_t self:unix_dgram_socket sendto;
allow init_t shell_exec_t:file { read execute execute_no_trans };

#============= initrc_t ==============
allow initrc_t lvm_control_t:chr_file write;

#============= insmod_t ==============
allow insmod_t kernel_t:process setsched;

#============= sysadm_t ==============
allow sysadm_t cpu_device_t:chr_file write;
allow sysadm_t self:udp_socket listen;
allow sysadm_t var_log_t:file append;

and the denials

[root@rawhide ~]# grep denied /var/log/messages
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925519.436:3): avc: denied { execute } for pid=502 comm="init" name="bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0- s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925519.437:4): avc: denied { read } for pid=502 comm="init" name="bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0-s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925519.437:5): avc: denied { execute_no_trans } for pid=502 comm="init" path="/bin/ bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0- s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925522.258:6): avc: denied { setsched } for pid=616 comm="modprobe" scontext=system_u:system_r:insmod_t:s0-s15:c0.c1023 tcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=process Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925527.696:7): avc: denied { write } for pid=1307 comm="multipath.stati" name="control" dev=tmpfs ino=5337 scontext=system_u:system_r:initrc_t:s0-s15:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.532:8): avc: denied { execute } for pid=1445 comm="init" name="bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0- s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.532:9): avc: denied { read } for pid=1445 comm="init" name="bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0-s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.532:10): avc: denied { execute_no_trans } for pid=1445 comm="init" path="/ bin/bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0- s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.612:11): avc: denied { sendto } for pid=1445 comm="telinit" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:init_t:s0-s15:c0.c1023 tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=unix_dgram_socket Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.798:12): avc: denied { setsched } for pid=1474 comm="modprobe" scontext=system_u:system_r:insmod_t:s0-s15:c0.c1023 tcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=process Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.975:13): avc: denied { write } for pid=1491 comm="microcode_ctl" name="microcode" dev=tmpfs ino=5796 scontext=system_u:system_r:sysadm_t:s0-s15:c0.c1023 tcontext=system_u:object_r:cpu_device_t:s0 tclass=chr_file Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925540.061:16): avc: denied { listen } for pid=2051 comm="rpcbind" lport=955 scontext=system_u:system_r:sysadm_t:s0-s15:c0.c1023 tcontext=system_u:system_r:sysadm_t:s0-s15:c0.c1023 tclass=udp_socket Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925541.097:17): avc: denied { append } for pid=2152 comm="rsyslogd" name="secure" dev=sda2 ino=2621494 scontext=system_u:system_r:sysadm_t:s0- s15:c0.c1023 tcontext=system_u:object_r:var_log_t:s15:c0.c1023 tclass=file

joe


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux