All of lore.kernel.org
 help / color / mirror / Atom feed
* mdadm failure in MLS Enforcing
@ 2009-02-11  4:17 Joe Nall
  2009-02-11 14:26 ` Stephen Smalley
  0 siblings, 1 reply; 6+ messages in thread
From: Joe Nall @ 2009-02-11  4:17 UTC (permalink / raw)
  To: SE Linux

mdadm runs system_u:system_r:mdadm_t:s0-s15:c0.c1023 during boot and  
can't access block devices that are  
system_u:object_r:fixed_disk_device_t:s15:c0.c1023
https://bugzilla.redhat.com/show_bug.cgi?id=485006

Posted here instead of fedora-selinux because I don't think it is  
fedora specific.

Boot avcs:

node=test type=AVC msg=audit(1234315341.183:18): avc:  denied   
{ read } for  pid=1501 comm="mdadm" name="sdb2" dev=tmpfs ino=508  
scontext=system_u:system_r:mdadm_t:s0-s15:c0.c1023  
tcontext=system_u:object_r:fixed_disk_device_t:s15:c0.c1023  
tclass=blk_file

         Was caused by:
                 Policy constraint violation.

                 May require adding a type attribute to the domain or  
type to satisfy the constraint.

                 Constraints are defined in the policy sources in  
policy/constraints (general), policy/mcs (MCS), and policy/mls (MLS).

node=test type=AVC msg=audit(1234315341.184:19): avc:  denied   
{ read } for  pid=1457 comm="mdadm" name=".tmp-9-1" dev=tmpfs ino=5859  
scontext=system_u:system_r:mdadm_t:s0-s15:c0.c1023  
tcontext=system_u:object_r:device_t:s0 tclass=blk_file

         Was caused by:
                 Missing type enforcement (TE) allow rule.

                 You can use audit2allow to generate a loadable module  
to allow this access.

node=test type=AVC msg=audit(1234315341.188:20): avc:  denied   
{ getattr } for  pid=1457 comm="mdadm" path="/proc/kcore" dev=proc  
ino=4026531986 scontext=system_u:system_r:mdadm_t:s0-s15:c0.c1023  
tcontext=system_u:object_r:proc_kcore_t:s15:c0.c1023 tclass=file

         Was caused by:
                 Policy constraint violation.

                 May require adding a type attribute to the domain or  
type to satisfy the constraint.

                 Constraints are defined in the policy sources in  
policy/constraints (general), policy/mcs (MCS), and policy/mls (MLS).

so I added this policy:

diff -up serefpolicy-3.5.13/policy/modules/system/raid.fc.orig  
serefpolicy-3.5.13/policy/modules/system/raid.fc
--- serefpolicy-3.5.13/policy/modules/system/raid.fc.orig	2009-02-10  
19:41:17.000000000 -0600
+++ serefpolicy-3.5.13/policy/modules/system/raid.fc	2009-02-10  
19:41:31.000000000 -0600
@@ -2,4 +2,4 @@
  /sbin/mdadm		--	gen_context(system_u:object_r:mdadm_exec_t,s0)
  /sbin/mdmpd		--	gen_context(system_u:object_r:mdadm_exec_t,s0)

-/var/run/mdadm(/.*)?		gen_context(system_u:object_r:mdadm_var_run_t,s0)
+/var/run/mdadm(/.*)?		 
gen_context(system_u:object_r:mdadm_var_run_t,mls_systemhigh)
diff -up serefpolicy-3.5.13/policy/modules/system/raid.te.orig  
serefpolicy-3.5.13/policy/modules/system/raid.te
--- serefpolicy-3.5.13/policy/modules/system/raid.te.orig	2009-02-10  
19:33:59.000000000 -0600
+++ serefpolicy-3.5.13/policy/modules/system/raid.te	2009-02-10  
19:39:58.000000000 -0600
@@ -9,6 +9,10 @@ policy_module(raid, 1.7.0)
  type mdadm_t;
  type mdadm_exec_t;
  init_daemon_domain(mdadm_t,mdadm_exec_t)
+ifdef(`enable_mls',`
+	init_ranged_daemon_domain(mdadm_t, mdadm_exec_t,mls_systemhigh)
+')
+
  role system_r types mdadm_t;

  type mdadm_var_run_t;

which does transition to SystemHigh using run_init in permissive, but  
doesn't affect this bug.

Clues?

joe


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2009-02-11 17:33 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-02-11  4:17 mdadm failure in MLS Enforcing Joe Nall
2009-02-11 14:26 ` Stephen Smalley
2009-02-11 14:47   ` Joe Nall
2009-02-11 15:00     ` Stephen Smalley
2009-02-11 16:15       ` Joe Nall
2009-02-11 17:33         ` Stephen Smalley

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.