On Thu, Nov 24, 2016 at 09:13:35PM +0000, Robert Sharp wrote:
> On 24/11/16 17:07, Jason Zaman wrote:
> > That warning is harmless, i'll remove the line from the policy later.
> > for now ignore it or manually remove the line to silence the warning.
> > http://blog.perfinion.com/2016/10/selinux-userspace-26-released/
> 
> Sorry Jason, but I am not making much progress. I have emerged as you 
> suggested with the 20151208-r6 versions (and setools4). When I repeat 
> the search for portage_sandbox I get the same results as before:

OH! I just looked harder at my configs, I do have this locally on my
laptop:
allow portage_sandbox_t portage_tmp_t:dir { relabelfrom relabelto };
I hadnt added it to the policies yet tho. I forgot why I needed it :(.
Do all packages fail without it or only some?
I will add it to the next policy release, I guess it was my fault all
along :-P, sorry about that.

> # sesearch -s portage_sandbox_t -t portage_tmp_t -A
> allow portage_sandbox_t non_auth_file_type:dir { search read lock 
> getattr ioctl open };
> allow portage_sandbox_t non_auth_file_type:file { read lock ioctl open 
> getattr };
> allow portage_sandbox_t non_auth_file_type:lnk_file { read getattr };
> allow portage_sandbox_t portage_tmp_t:dir { rename search setattr read 
> lock create reparent getattr write ioctl link rmdir remove_name unlink 
> open add_name };
> allow portage_sandbox_t portage_tmp_t:fifo_file { rename setattr read 
> lock create getattr write ioctl link unlink open append };
> allow portage_sandbox_t portage_tmp_t:file { rename execute setattr read 
> lock create getattr execute_no_trans write relabelfrom ioctl link 
> relabelto unlink open append };
> allow portage_sandbox_t portage_tmp_t:lnk_file { rename setattr read 
> lock create getattr write ioctl link unlink };
> allow portage_sandbox_t portage_tmp_t:sock_file { rename setattr read 
> lock create getattr write ioctl link unlink open append };
> 
> There is still no relableto/from in the dir rule. I am not sure the 
> module rebuild worked. I tried the semodule -B again with -v and it all 
> happens rather quickly:
> 
> # semodule -B -v
> Committing changes:
> libsemanage.add_user: user system_u not in password file
> Ok: transaction number 0.
> 
> Doesn't seem like it spent long rebuilding all those policies, but then 
> I wouldn't know if it is supposed to be quick?
> 
> Also, there doesn't seem to be a very easy way to confirm what policy 
> version is in place? I once saw a listing from semodule -l that included 
> version information but it doesn't happen on my system.
The policy versions that semodule reports are what the policy_module
line in the source which was annoying to look up too. newer userspace is
based off CIL which doesnt have those version numbers at all anymore.

-- Jason

Reply via email to