From: David-Alexandre Davidson <ryvore@gmail.com>
To: Stephen Smalley <sds@tycho.nsa.gov>
Cc: James Morris <jmorris@namei.org>, selinux@tycho.nsa.gov
Subject: Re: Wrong tclass on a cifs share content
Date: Wed, 28 Jun 2006 11:34:48 -0400 [thread overview]
Message-ID: <44A2A198.3050909@gmail.com> (raw)
In-Reply-To: <1151507942.20419.247.camel@moss-spartans.epoch.ncsc.mil>
[-- Attachment #1: Type: text/plain, Size: 2597 bytes --]
Stephen Smalley wrote:
> On Wed, 2006-06-28 at 10:47 -0400, David-Alexandre Davidson wrote:
>
>> When accessing folders over a cifs share from a selinux context, I get
>> audit messages, reporting denied actions
>> such as 0x100000 and 0x200000 , which refers to search, and rmdir. The
>> problem is that selinux incorrectly
>> report the target class as "file", when it is in reality a "dir"
>> element. Being unable to map these Hex code to
>> a valid action for a file, every request is denied no mater what policy
>> rules are in effect. (actions like read,
>> setattr, getattr are valid because they are the same for file and dir
>> elements)
>>
>> I'm running Fedora core 5 with the lastest stable kernel, and it can
>> easily be reproduced. Just map a cifs share,
>> (I use automount) and attempt a rmdir /theshare/sample_dir as root.
>> and then :
>>
>> type=AVC msg=audit(1151197545.712:144): avc: denied { 0x200000 } for pid=2608
>> comm="rmdir" name="sample_dir" dev=cifs ino=8889
>> scontext=root:staff_r:staff_t:s0-s0:c0.c255 tcontext=system_u:object_r:cifs_t:s0
>> tclass=file
>>
>>
>> If anyone can help on that matter, or tell me who I should report this
>> to, it would be very appreciated. I
>> believe it is related to the kernel either at the point the labeling is
>> made when the share is mounted, or
>> if not, when selinux lookup the tclass on those element. Without
>> selinux, everything work fine, and no file
>> system error occur. I'll be browsing the source code to find more
>> details about what causes this issue,
>> but I'm not really familiar with that part of the kernel source.
>>
>
> It is a bad interaction between cifs and selinux. Did you file a
> bugzilla against the kernel as I suggested when you initially raised
> this report on fedora-selinux-list? SELinux does its inode security
> setup upon d_instantiate, and expects the fs to have set up the base
> inode state (such as the inode mode) by that point. cifs appears to
> violate this expectation. One or the other will have to change.
>
> If you just want to allow staff_t to perform arbitrary actions on the
> mount, you could add:
> allow staff_t cifs_t:file *;
>
>
Thanks for the details, at the moment, that allow rule does the work, or
I can simply work with
selinux, in permissive mode but I require more control on my final
system setup.
Here is the link to the bug report :
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=196567
<https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=196567>
-----------------------------
David-Alexandre Davidson
[-- Attachment #2: Type: text/html, Size: 3041 bytes --]
prev parent reply other threads:[~2006-06-28 15:34 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-06-28 14:47 Wrong tclass on a cifs share content David-Alexandre Davidson
2006-06-28 15:19 ` Stephen Smalley
2006-06-28 15:34 ` David-Alexandre Davidson [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=44A2A198.3050909@gmail.com \
--to=ryvore@gmail.com \
--cc=jmorris@namei.org \
--cc=sds@tycho.nsa.gov \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.