- Fix virt_use_samba boolean
- Looks like all domains that use dbus libraries are now reading /dev/uran - Add glance_use_fusefs() boolean - Allow tgtd to read /proc/net/psched - Additional access required for gear management of openshift directories - Allow sys_ptrace for mock-build - Fix mock_read_lib_files() interface - Allow mock-build to write all inherited ttys and ptys - Allow spamd to create razor home dirs with correct labeling - Clean up sysnet_use_ldap() - systemd calling needs to be optional - Allow init_t to setattr/relabelfrom dhcp state files
This commit is contained in:
parent
345f520dd6
commit
3f5abd2216
@ -8744,7 +8744,7 @@ index 6a1e4d1..84e8030 100644
|
|||||||
+ dontaudit $1 domain:dir_file_class_set audit_access;
|
+ dontaudit $1 domain:dir_file_class_set audit_access;
|
||||||
')
|
')
|
||||||
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
|
diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
|
||||||
index cf04cb5..806e1cc 100644
|
index cf04cb5..e0615d1 100644
|
||||||
--- a/policy/modules/kernel/domain.te
|
--- a/policy/modules/kernel/domain.te
|
||||||
+++ b/policy/modules/kernel/domain.te
|
+++ b/policy/modules/kernel/domain.te
|
||||||
@@ -4,6 +4,29 @@ policy_module(domain, 1.11.0)
|
@@ -4,6 +4,29 @@ policy_module(domain, 1.11.0)
|
||||||
@ -8785,7 +8785,7 @@ index cf04cb5..806e1cc 100644
|
|||||||
|
|
||||||
# Transitions only allowed from domains to other domains
|
# Transitions only allowed from domains to other domains
|
||||||
neverallow domain ~domain:process { transition dyntransition };
|
neverallow domain ~domain:process { transition dyntransition };
|
||||||
@@ -86,23 +110,46 @@ neverallow ~{ domain unlabeled_t } *:process *;
|
@@ -86,23 +110,47 @@ neverallow ~{ domain unlabeled_t } *:process *;
|
||||||
allow domain self:dir list_dir_perms;
|
allow domain self:dir list_dir_perms;
|
||||||
allow domain self:lnk_file { read_lnk_file_perms lock ioctl };
|
allow domain self:lnk_file { read_lnk_file_perms lock ioctl };
|
||||||
allow domain self:file rw_file_perms;
|
allow domain self:file rw_file_perms;
|
||||||
@ -8827,13 +8827,14 @@ index cf04cb5..806e1cc 100644
|
|||||||
+# All executables should be able to search the directory they are in
|
+# All executables should be able to search the directory they are in
|
||||||
+corecmd_search_bin(domain)
|
+corecmd_search_bin(domain)
|
||||||
+
|
+
|
||||||
|
+
|
||||||
+tunable_policy(`domain_kernel_load_modules',`
|
+tunable_policy(`domain_kernel_load_modules',`
|
||||||
+ kernel_request_load_module(domain)
|
+ kernel_request_load_module(domain)
|
||||||
+')
|
+')
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms',`
|
ifdef(`hide_broken_symptoms',`
|
||||||
# This check is in the general socket
|
# This check is in the general socket
|
||||||
@@ -121,8 +168,18 @@ tunable_policy(`global_ssp',`
|
@@ -121,8 +169,18 @@ tunable_policy(`global_ssp',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -8852,7 +8853,7 @@ index cf04cb5..806e1cc 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -133,6 +190,9 @@ optional_policy(`
|
@@ -133,6 +191,9 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
xserver_dontaudit_use_xdm_fds(domain)
|
xserver_dontaudit_use_xdm_fds(domain)
|
||||||
xserver_dontaudit_rw_xdm_pipes(domain)
|
xserver_dontaudit_rw_xdm_pipes(domain)
|
||||||
@ -8862,7 +8863,7 @@ index cf04cb5..806e1cc 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -147,12 +207,18 @@ optional_policy(`
|
@@ -147,12 +208,18 @@ optional_policy(`
|
||||||
# Use/sendto/connectto sockets created by any domain.
|
# Use/sendto/connectto sockets created by any domain.
|
||||||
allow unconfined_domain_type domain:{ socket_class_set socket key_socket } *;
|
allow unconfined_domain_type domain:{ socket_class_set socket key_socket } *;
|
||||||
|
|
||||||
@ -8882,7 +8883,7 @@ index cf04cb5..806e1cc 100644
|
|||||||
|
|
||||||
# Create/access any System V IPC objects.
|
# Create/access any System V IPC objects.
|
||||||
allow unconfined_domain_type domain:{ sem msgq shm } *;
|
allow unconfined_domain_type domain:{ sem msgq shm } *;
|
||||||
@@ -166,5 +232,346 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
|
@@ -166,5 +233,347 @@ allow unconfined_domain_type domain:lnk_file { read_lnk_file_perms ioctl lock };
|
||||||
# act on all domains keys
|
# act on all domains keys
|
||||||
allow unconfined_domain_type domain:key *;
|
allow unconfined_domain_type domain:key *;
|
||||||
|
|
||||||
@ -9086,6 +9087,7 @@ index cf04cb5..806e1cc 100644
|
|||||||
+ systemd_filetrans_named_content(named_filetrans_domain)
|
+ systemd_filetrans_named_content(named_filetrans_domain)
|
||||||
+ systemd_filetrans_named_hostname(named_filetrans_domain)
|
+ systemd_filetrans_named_hostname(named_filetrans_domain)
|
||||||
+ systemd_filetrans_home_content(named_filetrans_domain)
|
+ systemd_filetrans_home_content(named_filetrans_domain)
|
||||||
|
+ systemd_dontaudit_write_inherited_logind_sessions_pipes(domain)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
@ -27067,7 +27069,7 @@ index 3efd5b6..0bd3a26 100644
|
|||||||
+ allow $1 login_pgm:process sigchld;
|
+ allow $1 login_pgm:process sigchld;
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
|
diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
|
||||||
index 09b791d..73376ca 100644
|
index 09b791d..ff0708e 100644
|
||||||
--- a/policy/modules/system/authlogin.te
|
--- a/policy/modules/system/authlogin.te
|
||||||
+++ b/policy/modules/system/authlogin.te
|
+++ b/policy/modules/system/authlogin.te
|
||||||
@@ -5,6 +5,19 @@ policy_module(authlogin, 2.5.1)
|
@@ -5,6 +5,19 @@ policy_module(authlogin, 2.5.1)
|
||||||
@ -27338,17 +27340,37 @@ index 09b791d..73376ca 100644
|
|||||||
files_list_var_lib(nsswitch_domain)
|
files_list_var_lib(nsswitch_domain)
|
||||||
|
|
||||||
# read /etc/nsswitch.conf
|
# read /etc/nsswitch.conf
|
||||||
@@ -417,15 +453,21 @@ files_read_etc_files(nsswitch_domain)
|
@@ -417,15 +453,42 @@ files_read_etc_files(nsswitch_domain)
|
||||||
|
|
||||||
sysnet_dns_name_resolve(nsswitch_domain)
|
sysnet_dns_name_resolve(nsswitch_domain)
|
||||||
|
|
||||||
-tunable_policy(`authlogin_nsswitch_use_ldap',`
|
|
||||||
- files_list_var_lib(nsswitch_domain)
|
|
||||||
+systemd_hostnamed_read_config(nsswitch_domain)
|
+systemd_hostnamed_read_config(nsswitch_domain)
|
||||||
|
+
|
||||||
|
+
|
||||||
|
tunable_policy(`authlogin_nsswitch_use_ldap',`
|
||||||
|
- files_list_var_lib(nsswitch_domain)
|
||||||
|
+ allow nsswitch_domain self:tcp_socket create_socket_perms;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+tunable_policy(`authlogin_nsswitch_use_ldap',`
|
||||||
|
+ corenet_tcp_sendrecv_generic_if(nsswitch_domain)
|
||||||
|
+ corenet_tcp_sendrecv_generic_node(nsswitch_domain)
|
||||||
|
+ corenet_tcp_sendrecv_ldap_port(nsswitch_domain)
|
||||||
|
+ corenet_tcp_connect_ldap_port(nsswitch_domain)
|
||||||
|
+ corenet_sendrecv_ldap_client_packets(nsswitch_domain)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+tunable_policy(`authlogin_nsswitch_use_ldap',`
|
||||||
|
+ # Support for LDAPS
|
||||||
|
+ dev_read_rand(nsswitch_domain)
|
||||||
|
+ # LDAP Configuration using encrypted requires
|
||||||
|
+ dev_read_urand(nsswitch_domain)
|
||||||
|
+ sysnet_read_config(nsswitch_domain)
|
||||||
|
+')
|
||||||
|
|
||||||
+tunable_policy(`authlogin_nsswitch_use_ldap',`
|
+tunable_policy(`authlogin_nsswitch_use_ldap',`
|
||||||
miscfiles_read_generic_certs(nsswitch_domain)
|
miscfiles_read_generic_certs(nsswitch_domain)
|
||||||
sysnet_use_ldap(nsswitch_domain)
|
- sysnet_use_ldap(nsswitch_domain)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -27359,10 +27381,11 @@ index 09b791d..73376ca 100644
|
|||||||
+
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ tunable_policy(`authlogin_nsswitch_use_ldap',`
|
+ tunable_policy(`authlogin_nsswitch_use_ldap',`
|
||||||
|
+ ldap_read_certs(nsswitch_domain)
|
||||||
ldap_stream_connect(nsswitch_domain)
|
ldap_stream_connect(nsswitch_domain)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@@ -438,6 +480,7 @@ optional_policy(`
|
@@ -438,6 +501,7 @@ optional_policy(`
|
||||||
likewise_stream_connect_lsassd(nsswitch_domain)
|
likewise_stream_connect_lsassd(nsswitch_domain)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -27370,7 +27393,7 @@ index 09b791d..73376ca 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
kerberos_use(nsswitch_domain)
|
kerberos_use(nsswitch_domain)
|
||||||
')
|
')
|
||||||
@@ -456,10 +499,145 @@ optional_policy(`
|
@@ -456,10 +520,145 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
sssd_stream_connect(nsswitch_domain)
|
sssd_stream_connect(nsswitch_domain)
|
||||||
@ -31296,7 +31319,7 @@ index 0d4c8d3..e6ffda3 100644
|
|||||||
+ ps_process_pattern($1, ipsec_mgmt_t)
|
+ ps_process_pattern($1, ipsec_mgmt_t)
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te
|
diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te
|
||||||
index 312cd04..d6d434a 100644
|
index 312cd04..3c62b4c 100644
|
||||||
--- a/policy/modules/system/ipsec.te
|
--- a/policy/modules/system/ipsec.te
|
||||||
+++ b/policy/modules/system/ipsec.te
|
+++ b/policy/modules/system/ipsec.te
|
||||||
@@ -48,6 +48,9 @@ init_system_domain(ipsec_mgmt_t, ipsec_mgmt_exec_t)
|
@@ -48,6 +48,9 @@ init_system_domain(ipsec_mgmt_t, ipsec_mgmt_exec_t)
|
||||||
@ -31493,7 +31516,7 @@ index 312cd04..d6d434a 100644
|
|||||||
|
|
||||||
init_read_utmp(ipsec_mgmt_t)
|
init_read_utmp(ipsec_mgmt_t)
|
||||||
init_use_script_ptys(ipsec_mgmt_t)
|
init_use_script_ptys(ipsec_mgmt_t)
|
||||||
@@ -288,17 +325,22 @@ init_exec_script_files(ipsec_mgmt_t)
|
@@ -288,17 +325,23 @@ init_exec_script_files(ipsec_mgmt_t)
|
||||||
init_use_fds(ipsec_mgmt_t)
|
init_use_fds(ipsec_mgmt_t)
|
||||||
init_labeled_script_domtrans(ipsec_mgmt_t, ipsec_initrc_exec_t)
|
init_labeled_script_domtrans(ipsec_mgmt_t, ipsec_initrc_exec_t)
|
||||||
|
|
||||||
@ -31517,11 +31540,12 @@ index 312cd04..d6d434a 100644
|
|||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ bind_read_dnssec_keys(ipsec_mgmt_t)
|
+ bind_read_dnssec_keys(ipsec_mgmt_t)
|
||||||
+ bind_read_config(ipsec_mgmt_t)
|
+ bind_read_config(ipsec_mgmt_t)
|
||||||
|
+ bind_read_state(ipsec_mgmt_t)
|
||||||
+')
|
+')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
consoletype_exec(ipsec_mgmt_t)
|
consoletype_exec(ipsec_mgmt_t)
|
||||||
@@ -322,6 +364,10 @@ optional_policy(`
|
@@ -322,6 +365,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -31532,7 +31556,7 @@ index 312cd04..d6d434a 100644
|
|||||||
modutils_domtrans_insmod(ipsec_mgmt_t)
|
modutils_domtrans_insmod(ipsec_mgmt_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -335,7 +381,7 @@ optional_policy(`
|
@@ -335,7 +382,7 @@ optional_policy(`
|
||||||
#
|
#
|
||||||
|
|
||||||
allow racoon_t self:capability { net_admin net_bind_service };
|
allow racoon_t self:capability { net_admin net_bind_service };
|
||||||
@ -31541,7 +31565,7 @@ index 312cd04..d6d434a 100644
|
|||||||
allow racoon_t self:unix_dgram_socket { connect create ioctl write };
|
allow racoon_t self:unix_dgram_socket { connect create ioctl write };
|
||||||
allow racoon_t self:netlink_selinux_socket { bind create read };
|
allow racoon_t self:netlink_selinux_socket { bind create read };
|
||||||
allow racoon_t self:udp_socket create_socket_perms;
|
allow racoon_t self:udp_socket create_socket_perms;
|
||||||
@@ -370,13 +416,12 @@ kernel_request_load_module(racoon_t)
|
@@ -370,13 +417,12 @@ kernel_request_load_module(racoon_t)
|
||||||
corecmd_exec_shell(racoon_t)
|
corecmd_exec_shell(racoon_t)
|
||||||
corecmd_exec_bin(racoon_t)
|
corecmd_exec_bin(racoon_t)
|
||||||
|
|
||||||
@ -31561,7 +31585,7 @@ index 312cd04..d6d434a 100644
|
|||||||
corenet_udp_bind_isakmp_port(racoon_t)
|
corenet_udp_bind_isakmp_port(racoon_t)
|
||||||
corenet_udp_bind_ipsecnat_port(racoon_t)
|
corenet_udp_bind_ipsecnat_port(racoon_t)
|
||||||
|
|
||||||
@@ -401,10 +446,10 @@ locallogin_use_fds(racoon_t)
|
@@ -401,10 +447,10 @@ locallogin_use_fds(racoon_t)
|
||||||
logging_send_syslog_msg(racoon_t)
|
logging_send_syslog_msg(racoon_t)
|
||||||
logging_send_audit_msgs(racoon_t)
|
logging_send_audit_msgs(racoon_t)
|
||||||
|
|
||||||
@ -31574,7 +31598,7 @@ index 312cd04..d6d434a 100644
|
|||||||
auth_can_read_shadow_passwords(racoon_t)
|
auth_can_read_shadow_passwords(racoon_t)
|
||||||
tunable_policy(`racoon_read_shadow',`
|
tunable_policy(`racoon_read_shadow',`
|
||||||
auth_tunable_read_shadow(racoon_t)
|
auth_tunable_read_shadow(racoon_t)
|
||||||
@@ -438,9 +483,8 @@ corenet_setcontext_all_spds(setkey_t)
|
@@ -438,9 +484,8 @@ corenet_setcontext_all_spds(setkey_t)
|
||||||
|
|
||||||
locallogin_use_fds(setkey_t)
|
locallogin_use_fds(setkey_t)
|
||||||
|
|
||||||
@ -37506,7 +37530,7 @@ index 40edc18..a072ac2 100644
|
|||||||
+/etc/firestarter/firestarter\.sh gen_context(system_u:object_r:dhcpc_helper_exec_t,s0)
|
+/etc/firestarter/firestarter\.sh gen_context(system_u:object_r:dhcpc_helper_exec_t,s0)
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if
|
diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if
|
||||||
index 2cea692..1c0de21 100644
|
index 2cea692..e094fc0 100644
|
||||||
--- a/policy/modules/system/sysnetwork.if
|
--- a/policy/modules/system/sysnetwork.if
|
||||||
+++ b/policy/modules/system/sysnetwork.if
|
+++ b/policy/modules/system/sysnetwork.if
|
||||||
@@ -38,11 +38,30 @@ interface(`sysnet_domtrans_dhcpc',`
|
@@ -38,11 +38,30 @@ interface(`sysnet_domtrans_dhcpc',`
|
||||||
@ -37843,17 +37867,22 @@ index 2cea692..1c0de21 100644
|
|||||||
corenet_tcp_sendrecv_generic_if($1)
|
corenet_tcp_sendrecv_generic_if($1)
|
||||||
corenet_tcp_sendrecv_generic_node($1)
|
corenet_tcp_sendrecv_generic_node($1)
|
||||||
corenet_tcp_sendrecv_ldap_port($1)
|
corenet_tcp_sendrecv_ldap_port($1)
|
||||||
@@ -763,6 +968,9 @@ interface(`sysnet_use_ldap',`
|
@@ -760,9 +965,14 @@ interface(`sysnet_use_ldap',`
|
||||||
|
|
||||||
|
# Support for LDAPS
|
||||||
|
dev_read_rand($1)
|
||||||
|
+ # LDAP Configuration using encrypted requires
|
||||||
dev_read_urand($1)
|
dev_read_urand($1)
|
||||||
|
|
||||||
sysnet_read_config($1)
|
sysnet_read_config($1)
|
||||||
+
|
+
|
||||||
+ # LDAP Configuration using encrypted requires
|
+ optional_policy(`
|
||||||
+ dev_read_urand($1)
|
+ ldap_read_certs($1)
|
||||||
|
+ ')
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -784,7 +992,6 @@ interface(`sysnet_use_portmap',`
|
@@ -784,7 +994,6 @@ interface(`sysnet_use_portmap',`
|
||||||
allow $1 self:udp_socket create_socket_perms;
|
allow $1 self:udp_socket create_socket_perms;
|
||||||
|
|
||||||
corenet_all_recvfrom_unlabeled($1)
|
corenet_all_recvfrom_unlabeled($1)
|
||||||
@ -37861,7 +37890,7 @@ index 2cea692..1c0de21 100644
|
|||||||
corenet_tcp_sendrecv_generic_if($1)
|
corenet_tcp_sendrecv_generic_if($1)
|
||||||
corenet_udp_sendrecv_generic_if($1)
|
corenet_udp_sendrecv_generic_if($1)
|
||||||
corenet_tcp_sendrecv_generic_node($1)
|
corenet_tcp_sendrecv_generic_node($1)
|
||||||
@@ -796,3 +1003,115 @@ interface(`sysnet_use_portmap',`
|
@@ -796,3 +1005,115 @@ interface(`sysnet_use_portmap',`
|
||||||
|
|
||||||
sysnet_read_config($1)
|
sysnet_read_config($1)
|
||||||
')
|
')
|
||||||
@ -37978,7 +38007,7 @@ index 2cea692..1c0de21 100644
|
|||||||
+ files_pid_filetrans($1, ifconfig_var_run_t, dir, "netns")
|
+ files_pid_filetrans($1, ifconfig_var_run_t, dir, "netns")
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
|
diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
|
||||||
index a392fc4..b0a854f 100644
|
index a392fc4..f1782ee 100644
|
||||||
--- a/policy/modules/system/sysnetwork.te
|
--- a/policy/modules/system/sysnetwork.te
|
||||||
+++ b/policy/modules/system/sysnetwork.te
|
+++ b/policy/modules/system/sysnetwork.te
|
||||||
@@ -5,6 +5,13 @@ policy_module(sysnetwork, 1.15.4)
|
@@ -5,6 +5,13 @@ policy_module(sysnetwork, 1.15.4)
|
||||||
@ -38208,7 +38237,7 @@ index a392fc4..b0a854f 100644
|
|||||||
vmware_append_log(dhcpc_t)
|
vmware_append_log(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -264,12 +312,23 @@ allow ifconfig_t self:msgq create_msgq_perms;
|
@@ -264,12 +312,24 @@ allow ifconfig_t self:msgq create_msgq_perms;
|
||||||
allow ifconfig_t self:msg { send receive };
|
allow ifconfig_t self:msg { send receive };
|
||||||
# Create UDP sockets, necessary when called from dhcpc
|
# Create UDP sockets, necessary when called from dhcpc
|
||||||
allow ifconfig_t self:udp_socket create_socket_perms;
|
allow ifconfig_t self:udp_socket create_socket_perms;
|
||||||
@ -38225,6 +38254,7 @@ index a392fc4..b0a854f 100644
|
|||||||
+can_exec(ifconfig_t, ifconfig_exec_t)
|
+can_exec(ifconfig_t, ifconfig_exec_t)
|
||||||
+
|
+
|
||||||
+manage_files_pattern(ifconfig_t, ifconfig_var_run_t, ifconfig_var_run_t)
|
+manage_files_pattern(ifconfig_t, ifconfig_var_run_t, ifconfig_var_run_t)
|
||||||
|
+manage_lnk_files_pattern(ifconfig_t, ifconfig_var_run_t, ifconfig_var_run_t)
|
||||||
+create_dirs_pattern(ifconfig_t, ifconfig_var_run_t, ifconfig_var_run_t)
|
+create_dirs_pattern(ifconfig_t, ifconfig_var_run_t, ifconfig_var_run_t)
|
||||||
+files_pid_filetrans(ifconfig_t, ifconfig_var_run_t, { file dir })
|
+files_pid_filetrans(ifconfig_t, ifconfig_var_run_t, { file dir })
|
||||||
+allow ifconfig_t ifconfig_var_run_t:file mounton;
|
+allow ifconfig_t ifconfig_var_run_t:file mounton;
|
||||||
@ -38232,7 +38262,7 @@ index a392fc4..b0a854f 100644
|
|||||||
kernel_use_fds(ifconfig_t)
|
kernel_use_fds(ifconfig_t)
|
||||||
kernel_read_system_state(ifconfig_t)
|
kernel_read_system_state(ifconfig_t)
|
||||||
kernel_read_network_state(ifconfig_t)
|
kernel_read_network_state(ifconfig_t)
|
||||||
@@ -279,14 +338,31 @@ kernel_rw_net_sysctls(ifconfig_t)
|
@@ -279,14 +339,32 @@ kernel_rw_net_sysctls(ifconfig_t)
|
||||||
|
|
||||||
corenet_rw_tun_tap_dev(ifconfig_t)
|
corenet_rw_tun_tap_dev(ifconfig_t)
|
||||||
|
|
||||||
@ -38249,7 +38279,8 @@ index a392fc4..b0a854f 100644
|
|||||||
+dev_unmount_sysfs_fs(ifconfig_t)
|
+dev_unmount_sysfs_fs(ifconfig_t)
|
||||||
|
|
||||||
domain_use_interactive_fds(ifconfig_t)
|
domain_use_interactive_fds(ifconfig_t)
|
||||||
|
+domain_read_all_domains_state(ifconfig_t)
|
||||||
|
+
|
||||||
+read_files_pattern(ifconfig_t, dhcpc_state_t, dhcpc_state_t)
|
+read_files_pattern(ifconfig_t, dhcpc_state_t, dhcpc_state_t)
|
||||||
+
|
+
|
||||||
+files_dontaudit_rw_inherited_pipes(ifconfig_t)
|
+files_dontaudit_rw_inherited_pipes(ifconfig_t)
|
||||||
@ -38257,14 +38288,14 @@ index a392fc4..b0a854f 100644
|
|||||||
+files_dontaudit_read_root_files(ifconfig_t)
|
+files_dontaudit_read_root_files(ifconfig_t)
|
||||||
+files_rw_inherited_tmp_file(ifconfig_t)
|
+files_rw_inherited_tmp_file(ifconfig_t)
|
||||||
+files_dontaudit_rw_var_files(ifconfig_t)
|
+files_dontaudit_rw_var_files(ifconfig_t)
|
||||||
+
|
|
||||||
files_read_etc_files(ifconfig_t)
|
files_read_etc_files(ifconfig_t)
|
||||||
files_read_etc_runtime_files(ifconfig_t)
|
files_read_etc_runtime_files(ifconfig_t)
|
||||||
+files_read_usr_files(ifconfig_t)
|
+files_read_usr_files(ifconfig_t)
|
||||||
|
|
||||||
fs_getattr_xattr_fs(ifconfig_t)
|
fs_getattr_xattr_fs(ifconfig_t)
|
||||||
fs_search_auto_mountpoints(ifconfig_t)
|
fs_search_auto_mountpoints(ifconfig_t)
|
||||||
@@ -299,24 +375,22 @@ term_dontaudit_use_all_ptys(ifconfig_t)
|
@@ -299,33 +377,50 @@ term_dontaudit_use_all_ptys(ifconfig_t)
|
||||||
term_dontaudit_use_ptmx(ifconfig_t)
|
term_dontaudit_use_ptmx(ifconfig_t)
|
||||||
term_dontaudit_use_generic_ptys(ifconfig_t)
|
term_dontaudit_use_generic_ptys(ifconfig_t)
|
||||||
|
|
||||||
@ -38292,8 +38323,13 @@ index a392fc4..b0a854f 100644
|
|||||||
+userdom_use_inherited_user_terminals(ifconfig_t)
|
+userdom_use_inherited_user_terminals(ifconfig_t)
|
||||||
userdom_use_all_users_fds(ifconfig_t)
|
userdom_use_all_users_fds(ifconfig_t)
|
||||||
|
|
||||||
|
+optional_policy(`
|
||||||
|
+ hostname_exec(ifconfig_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
ifdef(`distro_ubuntu',`
|
ifdef(`distro_ubuntu',`
|
||||||
@@ -325,7 +399,22 @@ ifdef(`distro_ubuntu',`
|
optional_policy(`
|
||||||
|
unconfined_domain(ifconfig_t)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -38316,7 +38352,7 @@ index a392fc4..b0a854f 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
dev_dontaudit_rw_cardmgr(ifconfig_t)
|
dev_dontaudit_rw_cardmgr(ifconfig_t)
|
||||||
')
|
')
|
||||||
@@ -336,7 +425,11 @@ ifdef(`hide_broken_symptoms',`
|
@@ -336,7 +431,11 @@ ifdef(`hide_broken_symptoms',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -38329,7 +38365,7 @@ index a392fc4..b0a854f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -350,7 +443,15 @@ optional_policy(`
|
@@ -350,7 +449,15 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -38346,7 +38382,7 @@ index a392fc4..b0a854f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -371,3 +472,13 @@ optional_policy(`
|
@@ -371,3 +478,13 @@ optional_policy(`
|
||||||
xen_append_log(ifconfig_t)
|
xen_append_log(ifconfig_t)
|
||||||
xen_dontaudit_rw_unix_stream_sockets(ifconfig_t)
|
xen_dontaudit_rw_unix_stream_sockets(ifconfig_t)
|
||||||
')
|
')
|
||||||
@ -38417,10 +38453,10 @@ index 0000000..916c8ed
|
|||||||
+/var/run/initramfs(/.*)? <<none>>
|
+/var/run/initramfs(/.*)? <<none>>
|
||||||
diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
|
diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..8bca1d7
|
index 0000000..24b2af3
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/policy/modules/system/systemd.if
|
+++ b/policy/modules/system/systemd.if
|
||||||
@@ -0,0 +1,1440 @@
|
@@ -0,0 +1,1458 @@
|
||||||
+## <summary>SELinux policy for systemd components</summary>
|
+## <summary>SELinux policy for systemd components</summary>
|
||||||
+
|
+
|
||||||
+######################################
|
+######################################
|
||||||
@ -38792,6 +38828,24 @@ index 0000000..8bca1d7
|
|||||||
+
|
+
|
||||||
+######################################
|
+######################################
|
||||||
+## <summary>
|
+## <summary>
|
||||||
|
+## Dontaudit attempts to write inherited logind sessions pipes.
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain to not audit.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+#
|
||||||
|
+interface(`systemd_dontaudit_write_inherited_logind_sessions_pipes',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type systemd_logind_sessions_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ dontaudit $1 systemd_logind_sessions_t:fifo_file write;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+######################################
|
||||||
|
+## <summary>
|
||||||
+## Write systemd inhibit pipes.
|
+## Write systemd inhibit pipes.
|
||||||
+## </summary>
|
+## </summary>
|
||||||
+## <param name="domain">
|
+## <param name="domain">
|
||||||
|
@ -19874,7 +19874,7 @@ index dda905b..ccd0ba9 100644
|
|||||||
/var/named/chroot/var/run/dbus(/.*)? gen_context(system_u:object_r:system_dbusd_var_run_t,s0)
|
/var/named/chroot/var/run/dbus(/.*)? gen_context(system_u:object_r:system_dbusd_var_run_t,s0)
|
||||||
+')
|
+')
|
||||||
diff --git a/dbus.if b/dbus.if
|
diff --git a/dbus.if b/dbus.if
|
||||||
index 62d22cb..2b84a85 100644
|
index 62d22cb..89671dd 100644
|
||||||
--- a/dbus.if
|
--- a/dbus.if
|
||||||
+++ b/dbus.if
|
+++ b/dbus.if
|
||||||
@@ -1,4 +1,4 @@
|
@@ -1,4 +1,4 @@
|
||||||
@ -19999,7 +19999,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -103,91 +129,82 @@ template(`dbus_role_template',`
|
@@ -103,91 +129,84 @@ template(`dbus_role_template',`
|
||||||
#
|
#
|
||||||
interface(`dbus_system_bus_client',`
|
interface(`dbus_system_bus_client',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
@ -20021,6 +20021,8 @@ index 62d22cb..2b84a85 100644
|
|||||||
- files_search_var_lib($1)
|
- files_search_var_lib($1)
|
||||||
read_files_pattern($1, system_dbusd_var_lib_t, system_dbusd_var_lib_t)
|
read_files_pattern($1, system_dbusd_var_lib_t, system_dbusd_var_lib_t)
|
||||||
+ files_search_var_lib($1)
|
+ files_search_var_lib($1)
|
||||||
|
+
|
||||||
|
+ dev_read_urand($1)
|
||||||
|
|
||||||
+ # For connecting to the bus
|
+ # For connecting to the bus
|
||||||
files_search_pids($1)
|
files_search_pids($1)
|
||||||
@ -20123,7 +20125,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -195,15 +212,18 @@ interface(`dbus_connect_spec_session_bus',`
|
@@ -195,15 +214,18 @@ interface(`dbus_connect_spec_session_bus',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20148,7 +20150,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -211,57 +231,39 @@ interface(`dbus_session_bus_client',`
|
@@ -211,57 +233,39 @@ interface(`dbus_session_bus_client',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20220,7 +20222,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -269,15 +271,19 @@ interface(`dbus_spec_session_bus_client',`
|
@@ -269,15 +273,19 @@ interface(`dbus_spec_session_bus_client',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20246,7 +20248,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -285,44 +291,52 @@ interface(`dbus_send_session_bus',`
|
@@ -285,44 +293,52 @@ interface(`dbus_send_session_bus',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20313,7 +20315,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -330,18 +344,18 @@ interface(`dbus_send_spec_session_bus',`
|
@@ -330,18 +346,18 @@ interface(`dbus_send_spec_session_bus',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20337,7 +20339,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -349,20 +363,18 @@ interface(`dbus_read_config',`
|
@@ -349,20 +365,18 @@ interface(`dbus_read_config',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20363,7 +20365,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -370,26 +382,20 @@ interface(`dbus_read_lib_files',`
|
@@ -370,26 +384,20 @@ interface(`dbus_read_lib_files',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20396,7 +20398,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type to be used as a domain.
|
## Type to be used as a domain.
|
||||||
@@ -397,81 +403,67 @@ interface(`dbus_manage_lib_files',`
|
@@ -397,81 +405,67 @@ interface(`dbus_manage_lib_files',`
|
||||||
## </param>
|
## </param>
|
||||||
## <param name="entry_point">
|
## <param name="entry_point">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -20506,7 +20508,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -479,18 +471,18 @@ interface(`dbus_spec_session_domain',`
|
@@ -479,18 +473,18 @@ interface(`dbus_spec_session_domain',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20530,7 +20532,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -498,98 +490,80 @@ interface(`dbus_connect_system_bus',`
|
@@ -498,98 +492,80 @@ interface(`dbus_connect_system_bus',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -20657,7 +20659,7 @@ index 62d22cb..2b84a85 100644
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@@ -597,28 +571,49 @@ interface(`dbus_use_system_bus_fds',`
|
@@ -597,28 +573,49 @@ interface(`dbus_use_system_bus_fds',`
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -22165,7 +22167,7 @@ index c697edb..31d45bf 100644
|
|||||||
+ allow $1 dhcpd_unit_file_t:service all_service_perms;
|
+ allow $1 dhcpd_unit_file_t:service all_service_perms;
|
||||||
')
|
')
|
||||||
diff --git a/dhcp.te b/dhcp.te
|
diff --git a/dhcp.te b/dhcp.te
|
||||||
index 98a24b9..36e32aa 100644
|
index 98a24b9..5b576ff 100644
|
||||||
--- a/dhcp.te
|
--- a/dhcp.te
|
||||||
+++ b/dhcp.te
|
+++ b/dhcp.te
|
||||||
@@ -20,6 +20,9 @@ init_daemon_domain(dhcpd_t, dhcpd_exec_t)
|
@@ -20,6 +20,9 @@ init_daemon_domain(dhcpd_t, dhcpd_exec_t)
|
||||||
@ -22194,23 +22196,39 @@ index 98a24b9..36e32aa 100644
|
|||||||
files_read_etc_runtime_files(dhcpd_t)
|
files_read_etc_runtime_files(dhcpd_t)
|
||||||
files_search_var_lib(dhcpd_t)
|
files_search_var_lib(dhcpd_t)
|
||||||
|
|
||||||
@@ -102,8 +103,6 @@ auth_use_nsswitch(dhcpd_t)
|
@@ -102,22 +103,42 @@ auth_use_nsswitch(dhcpd_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(dhcpd_t)
|
logging_send_syslog_msg(dhcpd_t)
|
||||||
|
|
||||||
-miscfiles_read_localization(dhcpd_t)
|
-miscfiles_read_localization(dhcpd_t)
|
||||||
-
|
-
|
||||||
|
+sysnet_read_config(dhcpd_t)
|
||||||
sysnet_read_dhcp_config(dhcpd_t)
|
sysnet_read_dhcp_config(dhcpd_t)
|
||||||
|
|
||||||
userdom_dontaudit_use_unpriv_user_fds(dhcpd_t)
|
userdom_dontaudit_use_unpriv_user_fds(dhcpd_t)
|
||||||
@@ -113,11 +112,20 @@ tunable_policy(`dhcpd_use_ldap',`
|
userdom_dontaudit_search_user_home_dirs(dhcpd_t)
|
||||||
sysnet_use_ldap(dhcpd_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
+ifdef(`distro_gentoo',`
|
tunable_policy(`dhcpd_use_ldap',`
|
||||||
+ allow dhcpd_t self:capability { chown dac_override setgid setuid sys_chroot };
|
- sysnet_use_ldap(dhcpd_t)
|
||||||
|
+ allow dhcpd_t self:tcp_socket create_socket_perms;
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
|
+tunable_policy(`dhcpd_use_ldap',`
|
||||||
|
+ corenet_tcp_sendrecv_generic_if(dhcpd_t)
|
||||||
|
+ corenet_tcp_sendrecv_generic_node(dhcpd_t)
|
||||||
|
+ corenet_tcp_sendrecv_ldap_port(dhcpd_t)
|
||||||
|
+ corenet_tcp_connect_ldap_port(dhcpd_t)
|
||||||
|
+ corenet_sendrecv_ldap_client_packets(dhcpd_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+tunable_policy(`dhcpd_use_ldap',`
|
||||||
|
+ ldap_read_certs(dhcpd_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+ifdef(`distro_gentoo',`
|
||||||
|
+ allow dhcpd_t self:capability { chown dac_override setgid setuid sys_chroot };
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
+ # used for dynamic DNS
|
+ # used for dynamic DNS
|
||||||
bind_read_dnssec_keys(dhcpd_t)
|
bind_read_dnssec_keys(dhcpd_t)
|
||||||
@ -24089,10 +24107,10 @@ index 0000000..1048292
|
|||||||
+')
|
+')
|
||||||
diff --git a/docker.te b/docker.te
|
diff --git a/docker.te b/docker.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..acaabd3
|
index 0000000..4b54a05
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/docker.te
|
+++ b/docker.te
|
||||||
@@ -0,0 +1,267 @@
|
@@ -0,0 +1,268 @@
|
||||||
+policy_module(docker, 1.0.0)
|
+policy_module(docker, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -24319,6 +24337,7 @@ index 0000000..acaabd3
|
|||||||
+modutils_domtrans_insmod(docker_t)
|
+modutils_domtrans_insmod(docker_t)
|
||||||
+
|
+
|
||||||
+systemd_status_all_unit_files(docker_t)
|
+systemd_status_all_unit_files(docker_t)
|
||||||
|
+systemd_start_systemd_services(docker_t)
|
||||||
+
|
+
|
||||||
+userdom_stream_connect(docker_t)
|
+userdom_stream_connect(docker_t)
|
||||||
+userdom_search_user_home_content(docker_t)
|
+userdom_search_user_home_content(docker_t)
|
||||||
@ -28246,10 +28265,10 @@ index 0000000..04e159f
|
|||||||
+')
|
+')
|
||||||
diff --git a/gear.te b/gear.te
|
diff --git a/gear.te b/gear.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..e6a1c7c
|
index 0000000..7f1639a
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/gear.te
|
+++ b/gear.te
|
||||||
@@ -0,0 +1,101 @@
|
@@ -0,0 +1,105 @@
|
||||||
+policy_module(gear, 1.0.0)
|
+policy_module(gear, 1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -28277,7 +28296,7 @@ index 0000000..e6a1c7c
|
|||||||
+#
|
+#
|
||||||
+# gear local policy
|
+# gear local policy
|
||||||
+#
|
+#
|
||||||
+allow gear_t self:capability chown;
|
+allow gear_t self:capability { chown net_admin fowner dac_override };
|
||||||
+allow gear_t self:capability2 block_suspend;
|
+allow gear_t self:capability2 block_suspend;
|
||||||
+allow gear_t self:process { getattr signal_perms };
|
+allow gear_t self:process { getattr signal_perms };
|
||||||
+allow gear_t self:fifo_file rw_fifo_file_perms;
|
+allow gear_t self:fifo_file rw_fifo_file_perms;
|
||||||
@ -28351,6 +28370,10 @@ index 0000000..e6a1c7c
|
|||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ docker_stream_connect(gear_t)
|
+ docker_stream_connect(gear_t)
|
||||||
+')
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ openshift_manage_lib_files(gear_t)
|
||||||
|
+')
|
||||||
diff --git a/geoclue.fc b/geoclue.fc
|
diff --git a/geoclue.fc b/geoclue.fc
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..a97f14f
|
index 0000000..a97f14f
|
||||||
@ -28946,11 +28969,20 @@ index 9eacb2c..229782f 100644
|
|||||||
init_labeled_script_domtrans($1, { glance_api_initrc_exec_t glance_registry_initrc_exec_t })
|
init_labeled_script_domtrans($1, { glance_api_initrc_exec_t glance_registry_initrc_exec_t })
|
||||||
domain_system_change_exemption($1)
|
domain_system_change_exemption($1)
|
||||||
diff --git a/glance.te b/glance.te
|
diff --git a/glance.te b/glance.te
|
||||||
index 5cd0909..a304d35 100644
|
index 5cd0909..1464b4d 100644
|
||||||
--- a/glance.te
|
--- a/glance.te
|
||||||
+++ b/glance.te
|
+++ b/glance.te
|
||||||
@@ -7,8 +7,7 @@ policy_module(glance, 1.1.0)
|
@@ -5,10 +5,16 @@ policy_module(glance, 1.1.0)
|
||||||
|
# Declarations
|
||||||
|
#
|
||||||
|
|
||||||
|
+## <desc>
|
||||||
|
+## <p>
|
||||||
|
+## Allow glance domain to manage fuse files
|
||||||
|
+## </p>
|
||||||
|
+## </desc>
|
||||||
|
+gen_tunable(glance_use_fusefs, false)
|
||||||
|
+
|
||||||
attribute glance_domain;
|
attribute glance_domain;
|
||||||
|
|
||||||
-type glance_registry_t, glance_domain;
|
-type glance_registry_t, glance_domain;
|
||||||
@ -28959,7 +28991,7 @@ index 5cd0909..a304d35 100644
|
|||||||
init_daemon_domain(glance_registry_t, glance_registry_exec_t)
|
init_daemon_domain(glance_registry_t, glance_registry_exec_t)
|
||||||
|
|
||||||
type glance_registry_initrc_exec_t;
|
type glance_registry_initrc_exec_t;
|
||||||
@@ -17,8 +16,10 @@ init_script_file(glance_registry_initrc_exec_t)
|
@@ -17,8 +23,10 @@ init_script_file(glance_registry_initrc_exec_t)
|
||||||
type glance_registry_tmp_t;
|
type glance_registry_tmp_t;
|
||||||
files_tmp_file(glance_registry_tmp_t)
|
files_tmp_file(glance_registry_tmp_t)
|
||||||
|
|
||||||
@ -28972,7 +29004,7 @@ index 5cd0909..a304d35 100644
|
|||||||
init_daemon_domain(glance_api_t, glance_api_exec_t)
|
init_daemon_domain(glance_api_t, glance_api_exec_t)
|
||||||
|
|
||||||
type glance_api_initrc_exec_t;
|
type glance_api_initrc_exec_t;
|
||||||
@@ -41,6 +42,7 @@ files_pid_file(glance_var_run_t)
|
@@ -41,6 +49,7 @@ files_pid_file(glance_var_run_t)
|
||||||
# Common local policy
|
# Common local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -28980,7 +29012,7 @@ index 5cd0909..a304d35 100644
|
|||||||
allow glance_domain self:fifo_file rw_fifo_file_perms;
|
allow glance_domain self:fifo_file rw_fifo_file_perms;
|
||||||
allow glance_domain self:unix_stream_socket create_stream_socket_perms;
|
allow glance_domain self:unix_stream_socket create_stream_socket_perms;
|
||||||
allow glance_domain self:tcp_socket { accept listen };
|
allow glance_domain self:tcp_socket { accept listen };
|
||||||
@@ -56,29 +58,29 @@ manage_files_pattern(glance_domain, glance_var_lib_t, glance_var_lib_t)
|
@@ -56,29 +65,38 @@ manage_files_pattern(glance_domain, glance_var_lib_t, glance_var_lib_t)
|
||||||
manage_dirs_pattern(glance_domain, glance_var_run_t, glance_var_run_t)
|
manage_dirs_pattern(glance_domain, glance_var_run_t, glance_var_run_t)
|
||||||
manage_files_pattern(glance_domain, glance_var_run_t, glance_var_run_t)
|
manage_files_pattern(glance_domain, glance_var_run_t, glance_var_run_t)
|
||||||
|
|
||||||
@ -29011,6 +29043,15 @@ index 5cd0909..a304d35 100644
|
|||||||
-
|
-
|
||||||
sysnet_dns_name_resolve(glance_domain)
|
sysnet_dns_name_resolve(glance_domain)
|
||||||
|
|
||||||
|
+tunable_policy(`glance_use_fusefs',`
|
||||||
|
+ fs_manage_fusefs_dirs(glance_domain)
|
||||||
|
+ fs_manage_fusefs_files(glance_domain)
|
||||||
|
+ fs_read_fusefs_symlinks(glance_domain)
|
||||||
|
+ fs_getattr_fusefs(glance_domain)
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+
|
||||||
+optional_policy(`
|
+optional_policy(`
|
||||||
+ mysql_read_db_lnk_files(glance_domain)
|
+ mysql_read_db_lnk_files(glance_domain)
|
||||||
+')
|
+')
|
||||||
@ -29018,7 +29059,7 @@ index 5cd0909..a304d35 100644
|
|||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Registry local policy
|
# Registry local policy
|
||||||
@@ -88,8 +90,14 @@ manage_dirs_pattern(glance_registry_t, glance_registry_tmp_t, glance_registry_tm
|
@@ -88,8 +106,14 @@ manage_dirs_pattern(glance_registry_t, glance_registry_tmp_t, glance_registry_tm
|
||||||
manage_files_pattern(glance_registry_t, glance_registry_tmp_t, glance_registry_tmp_t)
|
manage_files_pattern(glance_registry_t, glance_registry_tmp_t, glance_registry_tmp_t)
|
||||||
files_tmp_filetrans(glance_registry_t, glance_registry_tmp_t, { dir file })
|
files_tmp_filetrans(glance_registry_t, glance_registry_tmp_t, { dir file })
|
||||||
|
|
||||||
@ -29033,7 +29074,7 @@ index 5cd0909..a304d35 100644
|
|||||||
|
|
||||||
logging_send_syslog_msg(glance_registry_t)
|
logging_send_syslog_msg(glance_registry_t)
|
||||||
|
|
||||||
@@ -108,13 +116,24 @@ manage_files_pattern(glance_api_t, glance_tmp_t, glance_tmp_t)
|
@@ -108,13 +132,24 @@ manage_files_pattern(glance_api_t, glance_tmp_t, glance_tmp_t)
|
||||||
files_tmp_filetrans(glance_api_t, glance_tmp_t, { dir file })
|
files_tmp_filetrans(glance_api_t, glance_tmp_t, { dir file })
|
||||||
can_exec(glance_api_t, glance_tmp_t)
|
can_exec(glance_api_t, glance_tmp_t)
|
||||||
|
|
||||||
@ -43398,10 +43439,10 @@ index 0000000..8d0e473
|
|||||||
+/var/cache/mock(/.*)? gen_context(system_u:object_r:mock_cache_t,s0)
|
+/var/cache/mock(/.*)? gen_context(system_u:object_r:mock_cache_t,s0)
|
||||||
diff --git a/mock.if b/mock.if
|
diff --git a/mock.if b/mock.if
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..6568bfe
|
index 0000000..f5b98e6
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/mock.if
|
+++ b/mock.if
|
||||||
@@ -0,0 +1,310 @@
|
@@ -0,0 +1,311 @@
|
||||||
+## <summary>policy for mock</summary>
|
+## <summary>policy for mock</summary>
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -43457,6 +43498,7 @@ index 0000000..6568bfe
|
|||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ files_search_var_lib($1)
|
+ files_search_var_lib($1)
|
||||||
|
+ list_dirs_pattern($1, mock_var_lib_t, mock_var_lib_t)
|
||||||
+ read_files_pattern($1, mock_var_lib_t, mock_var_lib_t)
|
+ read_files_pattern($1, mock_var_lib_t, mock_var_lib_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
@ -43714,10 +43756,10 @@ index 0000000..6568bfe
|
|||||||
+')
|
+')
|
||||||
diff --git a/mock.te b/mock.te
|
diff --git a/mock.te b/mock.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..fc64201
|
index 0000000..1bf717f
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/mock.te
|
+++ b/mock.te
|
||||||
@@ -0,0 +1,276 @@
|
@@ -0,0 +1,277 @@
|
||||||
+policy_module(mock,1.0.0)
|
+policy_module(mock,1.0.0)
|
||||||
+
|
+
|
||||||
+## <desc>
|
+## <desc>
|
||||||
@ -43912,7 +43954,7 @@ index 0000000..fc64201
|
|||||||
+#
|
+#
|
||||||
+# mock_build local policy
|
+# mock_build local policy
|
||||||
+#
|
+#
|
||||||
+allow mock_build_t self:capability { sys_admin setfcap setuid sys_chroot chown dac_override sys_nice mknod fsetid setgid fowner };
|
+allow mock_build_t self:capability { sys_admin setfcap setuid sys_chroot chown dac_override sys_nice mknod fsetid setgid fowner sys_ptrace };
|
||||||
+dontaudit mock_build_t self:capability audit_write;
|
+dontaudit mock_build_t self:capability audit_write;
|
||||||
+allow mock_build_t self:process { fork setsched setpgid signal_perms };
|
+allow mock_build_t self:process { fork setsched setpgid signal_perms };
|
||||||
+allow mock_build_t self:netlink_audit_socket { create_socket_perms nlmsg_relay };
|
+allow mock_build_t self:netlink_audit_socket { create_socket_perms nlmsg_relay };
|
||||||
@ -43989,6 +44031,7 @@ index 0000000..fc64201
|
|||||||
+
|
+
|
||||||
+libs_exec_ldconfig(mock_build_t)
|
+libs_exec_ldconfig(mock_build_t)
|
||||||
+
|
+
|
||||||
|
+term_use_all_inherited_terms(mock_build_t)
|
||||||
+userdom_use_inherited_user_ptys(mock_build_t)
|
+userdom_use_inherited_user_ptys(mock_build_t)
|
||||||
+
|
+
|
||||||
+tunable_policy(`mock_enable_homedirs',`
|
+tunable_policy(`mock_enable_homedirs',`
|
||||||
@ -79241,7 +79284,7 @@ index 6dbc905..4b17c93 100644
|
|||||||
- admin_pattern($1, rhsmcertd_lock_t)
|
- admin_pattern($1, rhsmcertd_lock_t)
|
||||||
')
|
')
|
||||||
diff --git a/rhsmcertd.te b/rhsmcertd.te
|
diff --git a/rhsmcertd.te b/rhsmcertd.te
|
||||||
index d32e1a2..c820b6f 100644
|
index d32e1a2..54838ad 100644
|
||||||
--- a/rhsmcertd.te
|
--- a/rhsmcertd.te
|
||||||
+++ b/rhsmcertd.te
|
+++ b/rhsmcertd.te
|
||||||
@@ -30,14 +30,13 @@ files_pid_file(rhsmcertd_var_run_t)
|
@@ -30,14 +30,13 @@ files_pid_file(rhsmcertd_var_run_t)
|
||||||
@ -79262,7 +79305,7 @@ index d32e1a2..c820b6f 100644
|
|||||||
|
|
||||||
manage_files_pattern(rhsmcertd_t, rhsmcertd_lock_t, rhsmcertd_lock_t)
|
manage_files_pattern(rhsmcertd_t, rhsmcertd_lock_t, rhsmcertd_lock_t)
|
||||||
files_lock_filetrans(rhsmcertd_t, rhsmcertd_lock_t, file)
|
files_lock_filetrans(rhsmcertd_t, rhsmcertd_lock_t, file)
|
||||||
@@ -50,25 +49,49 @@ manage_files_pattern(rhsmcertd_t, rhsmcertd_var_run_t, rhsmcertd_var_run_t)
|
@@ -50,25 +49,50 @@ manage_files_pattern(rhsmcertd_t, rhsmcertd_var_run_t, rhsmcertd_var_run_t)
|
||||||
files_pid_filetrans(rhsmcertd_t, rhsmcertd_var_run_t, { file dir })
|
files_pid_filetrans(rhsmcertd_t, rhsmcertd_var_run_t, { file dir })
|
||||||
|
|
||||||
kernel_read_network_state(rhsmcertd_t)
|
kernel_read_network_state(rhsmcertd_t)
|
||||||
@ -79271,6 +79314,7 @@ index d32e1a2..c820b6f 100644
|
|||||||
+kernel_read_sysctl(rhsmcertd_t)
|
+kernel_read_sysctl(rhsmcertd_t)
|
||||||
+
|
+
|
||||||
+corenet_tcp_connect_http_port(rhsmcertd_t)
|
+corenet_tcp_connect_http_port(rhsmcertd_t)
|
||||||
|
+corenet_tcp_connect_http_cache_port(rhsmcertd_t)
|
||||||
+corenet_tcp_connect_squid_port(rhsmcertd_t)
|
+corenet_tcp_connect_squid_port(rhsmcertd_t)
|
||||||
|
|
||||||
corecmd_exec_bin(rhsmcertd_t)
|
corecmd_exec_bin(rhsmcertd_t)
|
||||||
@ -88224,7 +88268,7 @@ index 12700b4..fde3c8d 100644
|
|||||||
+ unconfined_domain(unconfined_sendmail_t)
|
+ unconfined_domain(unconfined_sendmail_t)
|
||||||
')
|
')
|
||||||
diff --git a/sensord.fc b/sensord.fc
|
diff --git a/sensord.fc b/sensord.fc
|
||||||
index 8185d5a..97926d2 100644
|
index 8185d5a..9be989a 100644
|
||||||
--- a/sensord.fc
|
--- a/sensord.fc
|
||||||
+++ b/sensord.fc
|
+++ b/sensord.fc
|
||||||
@@ -1,5 +1,9 @@
|
@@ -1,5 +1,9 @@
|
||||||
@ -88234,7 +88278,7 @@ index 8185d5a..97926d2 100644
|
|||||||
|
|
||||||
/usr/sbin/sensord -- gen_context(system_u:object_r:sensord_exec_t,s0)
|
/usr/sbin/sensord -- gen_context(system_u:object_r:sensord_exec_t,s0)
|
||||||
|
|
||||||
+/var/log/sensord\.rrd -- gen_context(system_u:object_r:sensord_log_t,s0)
|
+/var/log/sensor.* gen_context(system_u:object_r:sensord_log_t,s0)
|
||||||
+
|
+
|
||||||
/var/run/sensord\.pid -- gen_context(system_u:object_r:sensord_var_run_t,s0)
|
/var/run/sensord\.pid -- gen_context(system_u:object_r:sensord_var_run_t,s0)
|
||||||
diff --git a/sensord.if b/sensord.if
|
diff --git a/sensord.if b/sensord.if
|
||||||
@ -89414,7 +89458,7 @@ index e2544e1..d3fbd78 100644
|
|||||||
+ xserver_xdm_append_log(shutdown_t)
|
+ xserver_xdm_append_log(shutdown_t)
|
||||||
')
|
')
|
||||||
diff --git a/slocate.te b/slocate.te
|
diff --git a/slocate.te b/slocate.te
|
||||||
index 7292dc0..41c780f 100644
|
index 7292dc0..ce903d6 100644
|
||||||
--- a/slocate.te
|
--- a/slocate.te
|
||||||
+++ b/slocate.te
|
+++ b/slocate.te
|
||||||
@@ -62,7 +62,6 @@ fs_read_noxattr_fs_symlinks(locate_t)
|
@@ -62,7 +62,6 @@ fs_read_noxattr_fs_symlinks(locate_t)
|
||||||
@ -89425,6 +89469,15 @@ index 7292dc0..41c780f 100644
|
|||||||
|
|
||||||
ifdef(`enable_mls',`
|
ifdef(`enable_mls',`
|
||||||
files_dontaudit_getattr_all_dirs(locate_t)
|
files_dontaudit_getattr_all_dirs(locate_t)
|
||||||
|
@@ -71,3 +70,8 @@ ifdef(`enable_mls',`
|
||||||
|
optional_policy(`
|
||||||
|
cron_system_entry(locate_t, locate_exec_t)
|
||||||
|
')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ mock_getattr_lib(locate_t)
|
||||||
|
+')
|
||||||
|
+
|
||||||
diff --git a/slpd.if b/slpd.if
|
diff --git a/slpd.if b/slpd.if
|
||||||
index ca32e89..98278dd 100644
|
index ca32e89..98278dd 100644
|
||||||
--- a/slpd.if
|
--- a/slpd.if
|
||||||
@ -91463,7 +91516,7 @@ index 1499b0b..6950cab 100644
|
|||||||
- spamassassin_role($2, $1)
|
- spamassassin_role($2, $1)
|
||||||
')
|
')
|
||||||
diff --git a/spamassassin.te b/spamassassin.te
|
diff --git a/spamassassin.te b/spamassassin.te
|
||||||
index cc58e35..c76586c 100644
|
index cc58e35..4f35a1b 100644
|
||||||
--- a/spamassassin.te
|
--- a/spamassassin.te
|
||||||
+++ b/spamassassin.te
|
+++ b/spamassassin.te
|
||||||
@@ -7,50 +7,23 @@ policy_module(spamassassin, 2.6.1)
|
@@ -7,50 +7,23 @@ policy_module(spamassassin, 2.6.1)
|
||||||
@ -91937,17 +91990,17 @@ index cc58e35..c76586c 100644
|
|||||||
allow spamd_t self:unix_dgram_socket sendto;
|
allow spamd_t self:unix_dgram_socket sendto;
|
||||||
-allow spamd_t self:unix_stream_socket { accept connectto listen };
|
-allow spamd_t self:unix_stream_socket { accept connectto listen };
|
||||||
-allow spamd_t self:tcp_socket { accept listen };
|
-allow spamd_t self:tcp_socket { accept listen };
|
||||||
-
|
+allow spamd_t self:unix_stream_socket connectto;
|
||||||
|
+allow spamd_t self:tcp_socket create_stream_socket_perms;
|
||||||
|
+allow spamd_t self:udp_socket create_socket_perms;
|
||||||
|
|
||||||
-manage_dirs_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
-manage_dirs_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
||||||
-manage_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
-manage_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
||||||
-manage_lnk_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
-manage_lnk_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
||||||
-manage_fifo_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
-manage_fifo_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
||||||
-manage_sock_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
-manage_sock_files_pattern(spamd_t, spamd_home_t, spamd_home_t)
|
||||||
-userdom_user_home_dir_filetrans(spamd_t, spamd_home_t, dir, ".spamd")
|
-userdom_user_home_dir_filetrans(spamd_t, spamd_home_t, dir, ".spamd")
|
||||||
+allow spamd_t self:unix_stream_socket connectto;
|
-
|
||||||
+allow spamd_t self:tcp_socket create_stream_socket_perms;
|
|
||||||
+allow spamd_t self:udp_socket create_socket_perms;
|
|
||||||
|
|
||||||
-manage_dirs_pattern(spamd_t, spamassassin_home_t, spamassassin_home_t)
|
-manage_dirs_pattern(spamd_t, spamassassin_home_t, spamassassin_home_t)
|
||||||
-manage_files_pattern(spamd_t, spamassassin_home_t, spamassassin_home_t)
|
-manage_files_pattern(spamd_t, spamassassin_home_t, spamassassin_home_t)
|
||||||
-manage_lnk_files_pattern(spamd_t, spamassassin_home_t, spamassassin_home_t)
|
-manage_lnk_files_pattern(spamd_t, spamassassin_home_t, spamassassin_home_t)
|
||||||
@ -92130,7 +92183,7 @@ index cc58e35..c76586c 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -455,7 +533,12 @@ optional_policy(`
|
@@ -455,7 +533,17 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
razor_domtrans(spamd_t)
|
razor_domtrans(spamd_t)
|
||||||
razor_read_lib_files(spamd_t)
|
razor_read_lib_files(spamd_t)
|
||||||
@ -92141,10 +92194,15 @@ index cc58e35..c76586c 100644
|
|||||||
+ tunable_policy(`spamd_enable_home_dirs',`
|
+ tunable_policy(`spamd_enable_home_dirs',`
|
||||||
+ razor_manage_user_home_files(spamd_t)
|
+ razor_manage_user_home_files(spamd_t)
|
||||||
+ ')
|
+ ')
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+optional_policy(`
|
||||||
|
+ spamassassin_filetrans_home_content(spamd_t)
|
||||||
|
+ spamassassin_filetrans_admin_home_content(spamd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -463,9 +546,9 @@ optional_policy(`
|
@@ -463,9 +551,9 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -92155,7 +92213,7 @@ index cc58e35..c76586c 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -474,32 +557,32 @@ optional_policy(`
|
@@ -474,32 +562,32 @@ optional_policy(`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -92198,7 +92256,7 @@ index cc58e35..c76586c 100644
|
|||||||
|
|
||||||
corecmd_exec_bin(spamd_update_t)
|
corecmd_exec_bin(spamd_update_t)
|
||||||
corecmd_exec_shell(spamd_update_t)
|
corecmd_exec_shell(spamd_update_t)
|
||||||
@@ -508,25 +591,21 @@ dev_read_urand(spamd_update_t)
|
@@ -508,25 +596,21 @@ dev_read_urand(spamd_update_t)
|
||||||
|
|
||||||
domain_use_interactive_fds(spamd_update_t)
|
domain_use_interactive_fds(spamd_update_t)
|
||||||
|
|
||||||
@ -95958,7 +96016,7 @@ index 5406b6e..dc5b46e 100644
|
|||||||
admin_pattern($1, tgtd_tmpfs_t)
|
admin_pattern($1, tgtd_tmpfs_t)
|
||||||
')
|
')
|
||||||
diff --git a/tgtd.te b/tgtd.te
|
diff --git a/tgtd.te b/tgtd.te
|
||||||
index d010963..5ecc3bf 100644
|
index d010963..3822bc7 100644
|
||||||
--- a/tgtd.te
|
--- a/tgtd.te
|
||||||
+++ b/tgtd.te
|
+++ b/tgtd.te
|
||||||
@@ -29,7 +29,7 @@ files_pid_file(tgtd_var_run_t)
|
@@ -29,7 +29,7 @@ files_pid_file(tgtd_var_run_t)
|
||||||
@ -95970,8 +96028,11 @@ index d010963..5ecc3bf 100644
|
|||||||
allow tgtd_t self:capability2 block_suspend;
|
allow tgtd_t self:capability2 block_suspend;
|
||||||
allow tgtd_t self:process { setrlimit signal };
|
allow tgtd_t self:process { setrlimit signal };
|
||||||
allow tgtd_t self:fifo_file rw_fifo_file_perms;
|
allow tgtd_t self:fifo_file rw_fifo_file_perms;
|
||||||
@@ -58,13 +58,13 @@ kernel_read_system_state(tgtd_t)
|
@@ -56,15 +56,16 @@ files_pid_filetrans(tgtd_t,tgtd_var_run_t, { file sock_file })
|
||||||
|
|
||||||
|
kernel_read_system_state(tgtd_t)
|
||||||
kernel_read_fs_sysctls(tgtd_t)
|
kernel_read_fs_sysctls(tgtd_t)
|
||||||
|
+kernel_read_network_state(tgtd_t)
|
||||||
|
|
||||||
corenet_all_recvfrom_netlabel(tgtd_t)
|
corenet_all_recvfrom_netlabel(tgtd_t)
|
||||||
-corenet_all_recvfrom_unlabeled(tgtd_t)
|
-corenet_all_recvfrom_unlabeled(tgtd_t)
|
||||||
@ -95985,7 +96046,7 @@ index d010963..5ecc3bf 100644
|
|||||||
corenet_tcp_sendrecv_iscsi_port(tgtd_t)
|
corenet_tcp_sendrecv_iscsi_port(tgtd_t)
|
||||||
|
|
||||||
corenet_sendrecv_iscsi_client_packets(tgtd_t)
|
corenet_sendrecv_iscsi_client_packets(tgtd_t)
|
||||||
@@ -72,16 +72,16 @@ corenet_tcp_connect_isns_port(tgtd_t)
|
@@ -72,16 +73,16 @@ corenet_tcp_connect_isns_port(tgtd_t)
|
||||||
|
|
||||||
dev_read_sysfs(tgtd_t)
|
dev_read_sysfs(tgtd_t)
|
||||||
|
|
||||||
@ -101047,7 +101108,7 @@ index facdee8..88dcafb 100644
|
|||||||
+ virt_stream_connect($1)
|
+ virt_stream_connect($1)
|
||||||
')
|
')
|
||||||
diff --git a/virt.te b/virt.te
|
diff --git a/virt.te b/virt.te
|
||||||
index f03dcf5..fe84861 100644
|
index f03dcf5..25f4104 100644
|
||||||
--- a/virt.te
|
--- a/virt.te
|
||||||
+++ b/virt.te
|
+++ b/virt.te
|
||||||
@@ -1,150 +1,212 @@
|
@@ -1,150 +1,212 @@
|
||||||
@ -101909,7 +101970,7 @@ index f03dcf5..fe84861 100644
|
|||||||
|
|
||||||
tunable_policy(`virt_use_samba',`
|
tunable_policy(`virt_use_samba',`
|
||||||
- fs_manage_cifs_files(virtd_t)
|
- fs_manage_cifs_files(virtd_t)
|
||||||
+ fs_manage_nfs_files(virtd_t)
|
+ fs_manage_cifs_dirs(virtd_t)
|
||||||
fs_manage_cifs_files(virtd_t)
|
fs_manage_cifs_files(virtd_t)
|
||||||
fs_read_cifs_symlinks(virtd_t)
|
fs_read_cifs_symlinks(virtd_t)
|
||||||
')
|
')
|
||||||
@ -102020,16 +102081,7 @@ index f03dcf5..fe84861 100644
|
|||||||
+allow virt_domain self:tcp_socket create_stream_socket_perms;
|
+allow virt_domain self:tcp_socket create_stream_socket_perms;
|
||||||
+allow virt_domain self:udp_socket create_socket_perms;
|
+allow virt_domain self:udp_socket create_socket_perms;
|
||||||
+allow virt_domain self:netlink_kobject_uevent_socket create_socket_perms;
|
+allow virt_domain self:netlink_kobject_uevent_socket create_socket_perms;
|
||||||
|
+
|
||||||
-allow virsh_t self:capability { setpcap dac_override ipc_lock sys_nice sys_tty_config };
|
|
||||||
-allow virsh_t self:process { getcap getsched setsched setcap signal };
|
|
||||||
-allow virsh_t self:fifo_file rw_fifo_file_perms;
|
|
||||||
-allow virsh_t self:unix_stream_socket { accept connectto listen };
|
|
||||||
-allow virsh_t self:tcp_socket { accept listen };
|
|
||||||
-
|
|
||||||
-manage_files_pattern(virsh_t, virt_image_type, virt_image_type)
|
|
||||||
-manage_blk_files_pattern(virsh_t, virt_image_type, virt_image_type)
|
|
||||||
-manage_lnk_files_pattern(virsh_t, virt_image_type, virt_image_type)
|
|
||||||
+list_dirs_pattern(virt_domain, virt_content_t, virt_content_t)
|
+list_dirs_pattern(virt_domain, virt_content_t, virt_content_t)
|
||||||
+read_files_pattern(virt_domain, virt_content_t, virt_content_t)
|
+read_files_pattern(virt_domain, virt_content_t, virt_content_t)
|
||||||
+dontaudit virt_domain virt_content_t:file write_file_perms;
|
+dontaudit virt_domain virt_content_t:file write_file_perms;
|
||||||
@ -102047,17 +102099,30 @@ index f03dcf5..fe84861 100644
|
|||||||
+manage_sock_files_pattern(virt_domain, svirt_home_t, svirt_home_t)
|
+manage_sock_files_pattern(virt_domain, svirt_home_t, svirt_home_t)
|
||||||
+filetrans_pattern(virt_domain, virt_home_t, svirt_home_t, { dir sock_file file })
|
+filetrans_pattern(virt_domain, virt_home_t, svirt_home_t, { dir sock_file file })
|
||||||
+stream_connect_pattern(virt_domain, svirt_home_t, svirt_home_t, virtd_t)
|
+stream_connect_pattern(virt_domain, svirt_home_t, svirt_home_t, virtd_t)
|
||||||
+
|
|
||||||
+manage_dirs_pattern(virt_domain, virt_cache_t, virt_cache_t)
|
|
||||||
+manage_files_pattern(virt_domain, virt_cache_t, virt_cache_t)
|
|
||||||
+files_var_filetrans(virt_domain, virt_cache_t, { file dir })
|
|
||||||
|
|
||||||
|
-allow virsh_t self:capability { setpcap dac_override ipc_lock sys_nice sys_tty_config };
|
||||||
|
-allow virsh_t self:process { getcap getsched setsched setcap signal };
|
||||||
|
-allow virsh_t self:fifo_file rw_fifo_file_perms;
|
||||||
|
-allow virsh_t self:unix_stream_socket { accept connectto listen };
|
||||||
|
-allow virsh_t self:tcp_socket { accept listen };
|
||||||
|
-
|
||||||
|
-manage_files_pattern(virsh_t, virt_image_type, virt_image_type)
|
||||||
|
-manage_blk_files_pattern(virsh_t, virt_image_type, virt_image_type)
|
||||||
|
-manage_lnk_files_pattern(virsh_t, virt_image_type, virt_image_type)
|
||||||
|
-
|
||||||
-manage_dirs_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
-manage_dirs_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
||||||
-manage_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
-manage_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
||||||
-manage_chr_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
-manage_chr_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
||||||
-manage_lnk_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
-manage_lnk_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
||||||
-manage_sock_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
-manage_sock_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
||||||
-manage_fifo_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
-manage_fifo_files_pattern(virsh_t, svirt_lxc_file_t, svirt_lxc_file_t)
|
||||||
|
+manage_dirs_pattern(virt_domain, virt_cache_t, virt_cache_t)
|
||||||
|
+manage_files_pattern(virt_domain, virt_cache_t, virt_cache_t)
|
||||||
|
+files_var_filetrans(virt_domain, virt_cache_t, { file dir })
|
||||||
|
|
||||||
|
-manage_dirs_pattern(virsh_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t)
|
||||||
|
-manage_files_pattern(virsh_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t)
|
||||||
|
-filetrans_pattern(virsh_t, virt_var_run_t, virtd_lxc_var_run_t, dir, "lxc")
|
||||||
+read_lnk_files_pattern(virt_domain, virt_image_t, virt_image_t)
|
+read_lnk_files_pattern(virt_domain, virt_image_t, virt_image_t)
|
||||||
+
|
+
|
||||||
+manage_dirs_pattern(virt_domain, svirt_image_t, svirt_image_t)
|
+manage_dirs_pattern(virt_domain, svirt_image_t, svirt_image_t)
|
||||||
@ -102089,18 +102154,15 @@ index f03dcf5..fe84861 100644
|
|||||||
+
|
+
|
||||||
+dontaudit virtd_t virt_domain:process { siginh noatsecure rlimitinh };
|
+dontaudit virtd_t virt_domain:process { siginh noatsecure rlimitinh };
|
||||||
|
|
||||||
-manage_dirs_pattern(virsh_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t)
|
-dontaudit virsh_t virt_var_lib_t:file read_file_perms;
|
||||||
-manage_files_pattern(virsh_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t)
|
|
||||||
-filetrans_pattern(virsh_t, virt_var_run_t, virtd_lxc_var_run_t, dir, "lxc")
|
|
||||||
+dontaudit virt_domain virt_tmpfs_type:file { read write };
|
+dontaudit virt_domain virt_tmpfs_type:file { read write };
|
||||||
|
|
||||||
-dontaudit virsh_t virt_var_lib_t:file read_file_perms;
|
-allow virsh_t svirt_lxc_domain:process transition;
|
||||||
+append_files_pattern(virt_domain, virt_log_t, virt_log_t)
|
+append_files_pattern(virt_domain, virt_log_t, virt_log_t)
|
||||||
|
|
||||||
-allow virsh_t svirt_lxc_domain:process transition;
|
|
||||||
+append_files_pattern(virt_domain, virt_var_lib_t, virt_var_lib_t)
|
|
||||||
|
|
||||||
-can_exec(virsh_t, virsh_exec_t)
|
-can_exec(virsh_t, virsh_exec_t)
|
||||||
|
+append_files_pattern(virt_domain, virt_var_lib_t, virt_var_lib_t)
|
||||||
|
+
|
||||||
+corecmd_exec_bin(virt_domain)
|
+corecmd_exec_bin(virt_domain)
|
||||||
+corecmd_exec_shell(virt_domain)
|
+corecmd_exec_shell(virt_domain)
|
||||||
+
|
+
|
||||||
@ -102132,7 +102194,7 @@ index f03dcf5..fe84861 100644
|
|||||||
+files_read_mnt_symlinks(virt_domain)
|
+files_read_mnt_symlinks(virt_domain)
|
||||||
+files_read_var_files(virt_domain)
|
+files_read_var_files(virt_domain)
|
||||||
+files_search_all(virt_domain)
|
+files_search_all(virt_domain)
|
||||||
|
+
|
||||||
+fs_getattr_xattr_fs(virt_domain)
|
+fs_getattr_xattr_fs(virt_domain)
|
||||||
+fs_getattr_tmpfs(virt_domain)
|
+fs_getattr_tmpfs(virt_domain)
|
||||||
+fs_rw_anon_inodefs_files(virt_domain)
|
+fs_rw_anon_inodefs_files(virt_domain)
|
||||||
@ -102221,7 +102283,7 @@ index f03dcf5..fe84861 100644
|
|||||||
+ fs_read_cifs_symlinks(virt_domain)
|
+ fs_read_cifs_symlinks(virt_domain)
|
||||||
+ fs_getattr_cifs(virt_domain)
|
+ fs_getattr_cifs(virt_domain)
|
||||||
+')
|
+')
|
||||||
+
|
|
||||||
+tunable_policy(`virt_use_usb',`
|
+tunable_policy(`virt_use_usb',`
|
||||||
+ dev_rw_usbfs(virt_domain)
|
+ dev_rw_usbfs(virt_domain)
|
||||||
+ dev_read_sysfs(virt_domain)
|
+ dev_read_sysfs(virt_domain)
|
||||||
|
@ -19,7 +19,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.13.1
|
Version: 3.13.1
|
||||||
Release: 47%{?dist}
|
Release: 48%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -588,6 +588,20 @@ SELinux Reference policy mls base module.
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Apr 25 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-48
|
||||||
|
- Fix virt_use_samba boolean
|
||||||
|
- Looks like all domains that use dbus libraries are now reading /dev/urand
|
||||||
|
- Add glance_use_fusefs() boolean
|
||||||
|
- Allow tgtd to read /proc/net/psched
|
||||||
|
- Additional access required for gear management of openshift directories
|
||||||
|
- Allow sys_ptrace for mock-build
|
||||||
|
- Fix mock_read_lib_files() interface
|
||||||
|
- Allow mock-build to write all inherited ttys and ptys
|
||||||
|
- Allow spamd to create razor home dirs with correct labeling
|
||||||
|
- Clean up sysnet_use_ldap()
|
||||||
|
- systemd calling needs to be optional
|
||||||
|
- Allow init_t to setattr/relabelfrom dhcp state files
|
||||||
|
|
||||||
* Wed Apr 23 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-47
|
* Wed Apr 23 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-47
|
||||||
- mongod should not be a part of cloudforms.pp
|
- mongod should not be a part of cloudforms.pp
|
||||||
- Fix labeling in snapper.fc
|
- Fix labeling in snapper.fc
|
||||||
|
Loading…
Reference in New Issue
Block a user