From: Stefano Brivio <sbrivio@redhat.com>
To: Janne Grunau <janne-psst@jannau.net>
Cc: passt-dev@passt.top
Subject: Re: [PATCH 1/1] selinx: Add getattr to class udp_socket
Date: Fri, 2 May 2025 19:26:50 +0200 [thread overview]
Message-ID: <20250502192650.03880498@elisabeth> (raw)
In-Reply-To: <20250501095407.606439-1-janne-psst@jannau.net>
On Thu, 1 May 2025 11:54:07 +0200
Janne Grunau <janne-psst@jannau.net> wrote:
> Commit 59cc89f ("udp, udp_flow: Track our specific address on socket
> interfaces") added a getsockname() call in udp_flow_new(). This requires
> getattr. Fixes "Flow 0 (UDP flow): Unable to determine local address:
> Permission denied" errors in muvm/passt on Fedora Linux 42 with SELinux.
>
> The SELinux audit message is
>
> | type=AVC msg=audit(1746083799.606:235): avc: denied { getattr } for
> | pid=2961 comm="passt" laddr=127.0.0.1 lport=49221
> | faddr=127.0.0.53 fport=53
> | scontext=unconfined_u:unconfined_r:passt_t:s0-s0:c0.c1023
> | tcontext=unconfined_u:unconfined_r:passt_t:s0-s0:c0.c1023
> | tclass=udp_socket permissive=0
>
> Fixes: 59cc89f ("udp, udp_flow: Track our specific address on socket interfaces")
> Signed-off-by: Janne Grunau <janne-psst@jannau.net>
Whoops. Applied. Thanks for fixing this, and welcome to the git log!
By the way, if somebody is wondering:
> ---
> contrib/selinux/passt.te | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/contrib/selinux/passt.te b/contrib/selinux/passt.te
> index f8ea672..eb9ce72 100644
> --- a/contrib/selinux/passt.te
> +++ b/contrib/selinux/passt.te
> @@ -49,7 +49,7 @@ require {
> type proc_net_t;
> type node_t;
> class tcp_socket { create accept listen name_bind name_connect getattr ioctl };
> - class udp_socket { create accept listen };
> + class udp_socket { create accept listen getattr };
> class icmp_socket { bind create name_bind node_bind setopt read write };
> class sock_file { create unlink write };
>
> @@ -133,7 +133,7 @@ allow passt_t node_t:icmp_socket { name_bind node_bind };
> allow passt_t port_t:icmp_socket name_bind;
>
> allow passt_t self:tcp_socket { create getopt setopt connect bind listen accept shutdown read write getattr ioctl };
> -allow passt_t self:udp_socket { create getopt setopt connect bind read write };
> +allow passt_t self:udp_socket { create getopt setopt connect bind read write getattr };
...this already works with pasta's (pasta_t) profile because there we
need a bunch of other things (for "spliced" sockets) and I used the
create_stream_socket_perms macro instead, which already includes getattr.
But including getattr here is enough for passt, no need to allow
everything else.
> allow passt_t self:icmp_socket { bind create setopt read write };
>
> allow passt_t user_tmp_t:dir { add_name write };
--
Stefano
prev parent reply other threads:[~2025-05-02 17:26 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-05-01 9:54 [PATCH 1/1] selinx: Add getattr to class udp_socket Janne Grunau
2025-05-02 17:26 ` Stefano Brivio [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250502192650.03880498@elisabeth \
--to=sbrivio@redhat.com \
--cc=janne-psst@jannau.net \
--cc=passt-dev@passt.top \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).