All of lore.kernel.org
 help / color / mirror / Atom feed
From: domg472@gmail.com (Dominick Grift)
To: refpolicy@oss.tresys.com
Subject: [refpolicy] [PATCH] hadoop 1/10 -- unconfined
Date: Mon, 20 Sep 2010 21:50:48 +0200	[thread overview]
Message-ID: <4C97BB18.1000808@gmail.com> (raw)
In-Reply-To: <20100920193322.GA31431@localhost.localdomain>

On 09/20/2010 09:33 PM, Dominick Grift wrote:
> On Mon, Sep 20, 2010 at 02:02:12PM -0400, Paul Nuzzi wrote:
>> On 09/20/2010 01:03 PM, Dominick Grift wrote:
>>> On Mon, Sep 20, 2010 at 10:34:28AM -0400, Paul Nuzzi wrote:
>>>> I fixed the hadoop patch based on all of the feedback I received.  Added role support for sysadm_r to all of the services and programs.  Steve and I were not able to successfully use init_script_domain.  The interface didn't provide what we needed so I had to patch unconfined.if with a role transition interface.  It was also causing problems with sysadm_r.  I split up the patches since it was huge. 
>>>
>>> Why did the init script domain not work for you?
>>>
>>> I am interested in helping to make this policy upstreamable but i am not sure about how to deal with this init scenario and i would like to hear from others what the best way is to go forward with this.
>>>
>>
>> I wasn't able to transfer into the pseudo initrc domain with init_script_domain.  Using
>> init_script_domain(hadoop_datanode_initrc_t, hadoop_datanode_initrc_exec_t) executed the startup script in unconfined_u:system_r:initrc_t instead of :hadoop_datanode_initrc_t.  Using init_daemon_domain (which I know works) and init_script_domain together gives a semodule insert error conflicting te rule for (init_t, hadoop_datanode_initrc_exec_t:process): old was initrc_t, new is hadoop_datanode_initrc_t.  Maybe this is because it contains domtrans_pattern(init_run_all_scripts_domain, $2, $1) instead of domtrans_pattern(initrc_t,$2,$1) that init_daemon_domain has.
> 
> I just test it and it works provided that you use run_init to start the daemon.
> 
> I suspect Fedora broken the functionality to make it work by default:
> 
> These seem to be the culprits:
> 
> init_exec_script_files(sysadm_t)
> init_domtrans_script(unconfined_t)
> 
> Here is how to reproduce how i got it to work:
> 
> policy_module(test, 1.0.0)
> 
> type test_t;
> type test_exec_t;
> init_script_domain(test_t, test_exec_t)
> role system_r types test_t;
> 
> chcon -t test_exec_t /etc/rc.d/init.d/httpd
> 
> sudo -r sysadm_r -t sysadm_t
> run_init service httpd start
> 
> sudo -r unconfined_r -t unconfined_t
> run_init service httpd start
> 
> 

The problem i think is that redhats policy diverged from refpolicy,
especially with regard to this functionality.

This makes it that much harder to develop policy on redhat
configurations that should get adopted in refpolicy.

The use of the init script domain() will probably work just fine in
refpolicy, and so if you want your policy upstreamed you should probably
use that.

Redhat will have to deal with it once it merges refpolicy into its
branch (or they just exclude it).

> 
>>
>> Searching through refpolicy I don't see any references to init_script_domain.  Lets see what everyone else thinks.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 261 bytes
Desc: OpenPGP digital signature
Url : http://oss.tresys.com/pipermail/refpolicy/attachments/20100920/e96a3a31/attachment.bin 

  reply	other threads:[~2010-09-20 19:50 UTC|newest]

Thread overview: 37+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-09-20 14:34 [refpolicy] [PATCH] hadoop 1/10 -- unconfined Paul Nuzzi
2010-09-20 17:03 ` Dominick Grift
2010-09-20 18:02   ` Paul Nuzzi
2010-09-20 19:33     ` Dominick Grift
2010-09-20 19:50       ` Dominick Grift [this message]
2010-09-20 19:01 ` Dominick Grift
  -- strict thread matches above, loose matches on Subject: below --
2010-09-20 22:24 Dominick Grift
2010-09-21  9:02 Dominick Grift
2010-09-21 15:42 ` Paul Nuzzi
2010-09-21 16:14   ` Dominick Grift
2010-09-21 16:34     ` Paul Nuzzi
2010-09-21 17:08       ` Dominick Grift
2010-09-23 13:54         ` Paul Nuzzi
2010-09-23 14:40           ` Dominick Grift
2010-09-21 19:55       ` Jeremy Solt
2010-09-21 16:29 Dominick Grift
2010-09-21 19:57 Dominick Grift
2010-09-21 20:04 ` Jeremy Solt
2010-09-23 13:13   ` Paul Nuzzi
2010-09-24 14:20     ` Jeremy Solt
2010-09-27 18:50       ` Paul Nuzzi
2010-09-30 19:39         ` Paul Nuzzi
2010-10-01 12:02           ` Dominick Grift
2010-10-01 15:17             ` Paul Nuzzi
2010-10-01 17:56               ` Christopher J. PeBenito
2010-10-04 17:15                 ` Paul Nuzzi
2010-10-04 18:18                   ` Christopher J. PeBenito
2010-10-05 19:59                     ` Paul Nuzzi
2010-10-07 14:41                       ` Chris PeBenito
2010-10-07 16:35                         ` Paul Nuzzi
2010-10-01 18:01               ` Dominick Grift
2010-10-01 19:06                 ` Paul Nuzzi
2010-09-23 14:53 Dominick Grift
2010-10-06 10:06 Dominick Grift
2010-10-06 10:25 Dominick Grift
2010-10-06 15:54 ` Paul Nuzzi
2010-10-06 17:34   ` Dominick Grift

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4C97BB18.1000808@gmail.com \
    --to=domg472@gmail.com \
    --cc=refpolicy@oss.tresys.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.