Bug#850116: [DSE-Dev] Bug#850116: SEGV is always a bug in app or library
Laurent Bigonville
bigon at debian.org
Fri Jan 13 18:26:38 UTC 2017
Le 13/01/17 à 16:43, Russell Coker a écrit :
> I find it difficult to think of situations where a SEGV in a program is anything
> other than a bug in the program or a library it uses. If the program is
> prevented from doing something it wants to do (by SE Linux, Unix permissions,
> a filesystem error, lack of disk space, etc) it should log an error so that the
> sysadmin can fix the problem.
Did you check the user_avc's too? I see some denials of dbus
communication here.
With all the new allow rules in the attached files, I can get gdm
running and I can open a session too in enforcing. (I had to set the
boolean allow_execmem to on also).
All these rules are probably not needed, but that can be used as a base
I guess.
Cheers,
Laurent Bigonville
-------------- next part --------------
module local_dbus2 1.0;
require {
type event_device_t;
type system_dbusd_t;
class chr_file { read write };
}
#============= system_dbusd_t ==============
allow system_dbusd_t event_device_t:chr_file { read write };
module local_dbus 1.0;
require {
type system_dbusd_t;
type dri_device_t;
type event_device_t;
class chr_file { read write };
}
#============= system_dbusd_t ==============
allow system_dbusd_t dri_device_t:chr_file { read write };
#============= system_dbusd_t ==============
allow system_dbusd_t event_device_t:chr_file { read write };
module local_rtkit 1.0;
require {
type rtkit_daemon_t;
type xdm_t;
class process setsched;
class dbus send_msg;
}
#============= rtkit_daemon_t ==============
allow rtkit_daemon_t xdm_t:dbus send_msg;
#!!!! This avc is allowed in the current policy
allow rtkit_daemon_t xdm_t:process setsched;
module local_systemd 1.0;
require {
type systemd_logind_t;
type NetworkManager_t;
type tty_device_t;
type user_runtime_t;
class chr_file setattr;
class fd use;
class file unlink;
}
#============= NetworkManager_t ==============
allow NetworkManager_t systemd_logind_t:fd use;
#============= systemd_logind_t ==============
#!!!! This avc is allowed in the current policy
allow systemd_logind_t tty_device_t:chr_file setattr;
#!!!! This avc is allowed in the current policy
allow systemd_logind_t user_runtime_t:file unlink;
module local_udev 1.0;
require {
type alsa_t;
type kernel_t;
type initrc_var_run_t;
type udev_t;
class capability sys_tty_config;
class key search;
class dir { add_name getattr search write };
class process { noatsecure rlimitinh siginh };
class file { create write };
}
#============= udev_t ==============
allow udev_t alsa_t:process { noatsecure rlimitinh siginh };
#!!!! This avc is allowed in the current policy
allow udev_t initrc_var_run_t:dir { add_name getattr search write };
#!!!! This avc is allowed in the current policy
allow udev_t initrc_var_run_t:file create;
allow udev_t initrc_var_run_t:file write;
allow udev_t kernel_t:key search;
allow udev_t self:capability sys_tty_config;
module local_user 1.0;
require {
type init_var_run_t;
type colord_t;
type rtkit_daemon_t;
type realmd_t;
type xdm_t;
type avahi_t;
type NetworkManager_t;
type policykit_t;
type modemmanager_t;
type unconfined_t;
type systemd_locale_t;
type systemd_logind_t;
type systemd_hostnamed_t;
type devicekit_disk_t;
type accountsd_t;
type apt_t;
type init_t;
type initrc_t;
class service status;
class system status;
class dbus send_msg;
}
#============= NetworkManager_t ==============
allow NetworkManager_t apt_t:dbus send_msg;
#!!!! This avc is allowed in the current policy
allow NetworkManager_t init_t:dbus send_msg;
allow NetworkManager_t unconfined_t:dbus send_msg;
allow NetworkManager_t xdm_t:dbus send_msg;
#============= accountsd_t ==============
allow accountsd_t unconfined_t:dbus send_msg;
#============= apt_t ==============
allow apt_t unconfined_t:dbus send_msg;
#============= avahi_t ==============
allow avahi_t colord_t:dbus send_msg;
#!!!! This avc is allowed in the current policy
allow avahi_t init_t:dbus send_msg;
#============= colord_t ==============
allow colord_t avahi_t:dbus send_msg;
allow colord_t unconfined_t:dbus send_msg;
#============= devicekit_disk_t ==============
allow devicekit_disk_t initrc_t:dbus send_msg;
#============= init_t ==============
#!!!! This avc is allowed in the current policy
allow init_t unconfined_t:dbus send_msg;
#============= modemmanager_t ==============
#!!!! This avc is allowed in the current policy
allow modemmanager_t init_t:dbus send_msg;
allow modemmanager_t systemd_logind_t:dbus send_msg;
allow modemmanager_t unconfined_t:dbus send_msg;
#============= policykit_t ==============
allow policykit_t apt_t:dbus send_msg;
allow policykit_t xdm_t:dbus send_msg;
#============= realmd_t ==============
allow realmd_t xdm_t:dbus send_msg;
#============= rtkit_daemon_t ==============
#!!!! This avc is allowed in the current policy
allow rtkit_daemon_t xdm_t:dbus send_msg;
#============= systemd_hostnamed_t ==============
allow systemd_hostnamed_t unconfined_t:dbus send_msg;
allow systemd_hostnamed_t xdm_t:dbus send_msg;
#============= systemd_locale_t ==============
allow systemd_locale_t init_t:dbus send_msg;
allow systemd_locale_t unconfined_t:dbus send_msg;
allow systemd_locale_t xdm_t:dbus send_msg;
#============= systemd_logind_t ==============
allow systemd_logind_t apt_t:dbus send_msg;
allow systemd_logind_t modemmanager_t:dbus send_msg;
#============= unconfined_t ==============
#!!!! This avc is allowed in the current policy
allow unconfined_t init_var_run_t:service status;
#============= xdm_t ==============
allow xdm_t init_t:system status;
More information about the pkg-gnome-maintainers
mailing list