From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from facesaver.epoch.ncsc.mil (facesaver [144.51.25.10]) by tarius.tycho.ncsc.mil (8.13.1/8.13.1) with ESMTP id lBSJYoco012416 for ; Fri, 28 Dec 2007 14:34:50 -0500 Message-ID: <47754FCB.1070307@tycho.nsa.gov> Date: Fri, 28 Dec 2007 14:34:35 -0500 From: Eamon Walsh MIME-Version: 1.0 To: Xavier Toth CC: SE Linux Subject: Re: X avcs References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Sender: owner-selinux@tycho.nsa.gov List-Id: selinux@tycho.nsa.gov Xavier Toth wrote: > What about labeling notification-daemon as other gnome apps have been > labeled (user_xpriv_t)? > > On Dec 26, 2007 3:01 PM, Xavier Toth wrote: > >> swo_u who is running ranged (systemlow-systemhigh) uses newrole to >> launch an X windows app at systemhigh and then I get avcs like the >> following: >> >> avc: denied { receive } for request=X11:ChangeWindowAttributes >> comm=/usr/libexec/notification-daemon resid=3800036 restype=WINDOW >> scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_t:s15:c0.c1023 tclass=x_drawable >> avc: denied { get_property } for request=X11:GetProperty >> comm=/usr/libexec/notification-daemon resid=3800036 restype=WINDOW >> scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_t:s15:c0.c1023 tclass=x_drawable >> avc: denied { receive } for comm=/usr/libexec/notification-daemon >> event=X11:MapNotify scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_manage_xevent_t:s15:c0.c1023 >> tclass=x_event >> avc: denied { receive } for comm=/usr/libexec/notification-daemon >> event=X11:VisibilityNotify >> scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_default_xevent_t:s15:c0.c1023 >> tclass=x_event >> avc: denied { receive } for comm=/usr/libexec/notification-daemon >> event=X11:PropertyNotify scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_property_xevent_t:s15:c0.c1023 >> tclass=x_event >> avc: denied { receive } for comm=/usr/libexec/notification-daemon >> event=X11:FocusIn scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_focus_xevent_t:s15:c0.c1023 >> tclass=x_event >> avc: denied { getattr } for request=X11:GetGeometry >> comm=/usr/libexec/notification-daemon resid=3800036 restype=WINDOW >> scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_t:s15:c0.c1023 tclass=x_drawable >> avc: denied { read } for request=X11:GetProperty >> comm=/usr/libexec/notification-daemon property=WM_NAME >> scontext=swo_u:user_r:user_t:s0-s15:c0.c1023 >> tcontext=swo_u:object_r:user_default_xproperty_t:s15:c0.c1023 >> tclass=x_property >> These are all allowed by the TE rules. So I think this is a MLS issue. I committed read-to-clearance and write-to-clearance interfaces and went ahead and granted read-to-clearance in the per-role template. The patch I committed is below. So update from SVN and see if that solves the problem. Index: policy/modules/kernel/mls.if =================================================================== --- policy/modules/kernel/mls.if (revision 2565) +++ policy/modules/kernel/mls.if (working copy) @@ -612,6 +612,26 @@ ######################################## ## ## Make specified domain MLS trusted +## for reading from X objects up to its clearance. +## +## +## +## Domain allowed access. +## +## +## +# +interface(`mls_xwin_read_to_clearance',` + gen_require(` + attribute mlsxwinreadtoclr; + ') + + typeattribute $1 mlsxwinreadtoclr; +') + +######################################## +## +## Make specified domain MLS trusted ## for reading from X objects at any level. ## ## @@ -632,6 +652,26 @@ ######################################## ## ## Make specified domain MLS trusted +## for write to X objects up to its clearance. +## +## +## +## Domain allowed access. +## +## +## +# +interface(`mls_xwin_write_to_clearance',` + gen_require(` + attribute mlsxwinwritetoclr; + ') + + typeattribute $1 mlsxwinwritetoclr; +') + +######################################## +## +## Make specified domain MLS trusted ## for writing to X objects at any level. ## ## Index: policy/modules/services/xwindows.if =================================================================== --- policy/modules/services/xwindows.if (revision 2565) +++ policy/modules/services/xwindows.if (working copy) @@ -374,6 +374,7 @@ # xwindows_domain_template($1,$1,$2,$3) + mls_xwin_read_to_clearance($2) # FIXME: this domain should be removed xwindows_domain_template($1,$1_xpriv,$1_xpriv_t,$3) -- Eamon Walsh National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.