- Allow bumblebeed to send signal to insmod

- Dontaudit attempts by crond_t net_admin caused by journald
- Allow the docker daemon to mounton tty_device_t
- Add addtional snapper fixes to allo relabel file_t
- Allow setattr for all mountpoints
- Allow snapperd to write all dirs
- Add support for /etc/sysconfig/snapper
- Allow mozilla_plugin to getsession
- Add labeling for thttpd
- Allow sosreport to execute grub2-probe
- Allow NM to manage hostname config file
- Allow systemd_timedated_t to dbus chat with rpm_script_t
- Allow lsmd plugins to connect to http/ssh/http_cache ports by default
- Add lsmd_plugin_connect_any boolea
- Add support for ipset
- Add support for /dev/sclp_line0
- Add modutils_signal_insmod()
- Add files_relabelto_all_mountpoints() interface
- Allow the docker daemon to mounton tty_device_t
- Allow all systemd domains to read /proc/1
- Login programs talking to journald are attempting to net_admin, add dontaudit
- init is not gettar on processes as shutdown time
- Add systemd_hostnamed_manage_config() interface
- Make unconfined_service_t valid in enforcing
- Remove transition for temp dirs created by init_t
- gdm-simple-slave uses use setsockopt
- Add lvm_read_metadata()
This commit is contained in:
Miroslav Grepl 2014-02-27 12:34:10 +01:00
parent 2a6e2e714e
commit 439063013f
3 changed files with 473 additions and 321 deletions

File diff suppressed because it is too large Load Diff

View File

@ -2992,10 +2992,10 @@ index 0000000..8ba9c95
+ spamassassin_read_pid_files(antivirus_domain) + spamassassin_read_pid_files(antivirus_domain)
+') +')
diff --git a/apache.fc b/apache.fc diff --git a/apache.fc b/apache.fc
index 7caefc3..536a4bd 100644 index 7caefc3..516f7bb 100644
--- a/apache.fc --- a/apache.fc
+++ b/apache.fc +++ b/apache.fc
@@ -1,162 +1,197 @@ @@ -1,162 +1,200 @@
-HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0) -HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
-HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0) -HOME_DIR/((www)|(web)|(public_html))/cgi-bin(/.+)? gen_context(system_u:object_r:httpd_user_script_exec_t,s0)
+HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0) +HOME_DIR/((www)|(web)|(public_html))(/.+)? gen_context(system_u:object_r:httpd_user_content_t,s0)
@ -3040,6 +3040,7 @@ index 7caefc3..536a4bd 100644
-/etc/vhosts -- gen_context(system_u:object_r:httpd_config_t,s0) -/etc/vhosts -- gen_context(system_u:object_r:httpd_config_t,s0)
-/etc/WebCalendar(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) -/etc/WebCalendar(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
-/etc/zabbix/web(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) -/etc/zabbix/web(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+/etc/thttpd\.conf -- gen_context(system_u:object_r:httpd_config_t,s0)
+/etc/vhosts -- gen_context(system_u:object_r:httpd_config_t,s0) +/etc/vhosts -- gen_context(system_u:object_r:httpd_config_t,s0)
+/etc/WebCalendar(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) +/etc/WebCalendar(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+/etc/zabbix/web(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) +/etc/zabbix/web(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
@ -3112,6 +3113,7 @@ index 7caefc3..536a4bd 100644
+/usr/sbin/php-fpm -- gen_context(system_u:object_r:httpd_exec_t,s0) +/usr/sbin/php-fpm -- gen_context(system_u:object_r:httpd_exec_t,s0)
+/usr/sbin/rotatelogs -- gen_context(system_u:object_r:httpd_rotatelogs_exec_t,s0) +/usr/sbin/rotatelogs -- gen_context(system_u:object_r:httpd_rotatelogs_exec_t,s0)
+/usr/sbin/suexec -- gen_context(system_u:object_r:httpd_suexec_exec_t,s0) +/usr/sbin/suexec -- gen_context(system_u:object_r:httpd_suexec_exec_t,s0)
+/usr/sbin/thttpd -- gen_context(system_u:object_r:httpd_exec_t,s0)
+ +
+ifdef(`distro_suse', ` +ifdef(`distro_suse', `
+/usr/sbin/httpd2-.* -- gen_context(system_u:object_r:httpd_exec_t,s0) +/usr/sbin/httpd2-.* -- gen_context(system_u:object_r:httpd_exec_t,s0)
@ -3249,6 +3251,7 @@ index 7caefc3..536a4bd 100644
/var/log/roundcubemail(/.*)? gen_context(system_u:object_r:httpd_log_t,s0) /var/log/roundcubemail(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
/var/log/suphp\.log.* -- gen_context(system_u:object_r:httpd_log_t,s0) /var/log/suphp\.log.* -- gen_context(system_u:object_r:httpd_log_t,s0)
-/var/log/z-push(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) -/var/log/z-push(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+/var/log/thttpd\.log.* -- gen_context(system_u:object_r:httpd_log_t,s0)
+/var/log/php_errors\.log.* -- gen_context(system_u:object_r:httpd_log_t,s0) +/var/log/php_errors\.log.* -- gen_context(system_u:object_r:httpd_log_t,s0)
+/var/log/z-push(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0) +/var/log/z-push(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+ifdef(`distro_debian', ` +ifdef(`distro_debian', `
@ -3282,6 +3285,7 @@ index 7caefc3..536a4bd 100644
+/var/run/mod_.* gen_context(system_u:object_r:httpd_var_run_t,s0) +/var/run/mod_.* gen_context(system_u:object_r:httpd_var_run_t,s0)
+/var/run/nginx.* gen_context(system_u:object_r:httpd_var_run_t,s0) +/var/run/nginx.* gen_context(system_u:object_r:httpd_var_run_t,s0)
+/var/run/php-fpm(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0) +/var/run/php-fpm(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
+/var/run/thttpd\.pid -- gen_context(system_u:object_r:httpd_var_run_t,s0)
+/var/run/wsgi.* -s gen_context(system_u:object_r:httpd_var_run_t,s0) +/var/run/wsgi.* -s gen_context(system_u:object_r:httpd_var_run_t,s0)
+/var/run/user/apache(/.*)? gen_context(system_u:object_r:httpd_tmp_t,s0) +/var/run/user/apache(/.*)? gen_context(system_u:object_r:httpd_tmp_t,s0)
+ +
@ -3331,7 +3335,6 @@ index 7caefc3..536a4bd 100644
+/var/log/dirsrv/admin-serv(/.*)? gen_context(system_u:object_r:httpd_log_t,s0) +/var/log/dirsrv/admin-serv(/.*)? gen_context(system_u:object_r:httpd_log_t,s0)
+/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0) +/var/run/dirsrv/admin-serv.* gen_context(system_u:object_r:httpd_var_run_t,s0)
+/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0) +/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? gen_context(system_u:object_r:httpd_var_run_t,s0)
+
diff --git a/apache.if b/apache.if diff --git a/apache.if b/apache.if
index f6eb485..51b128e 100644 index f6eb485..51b128e 100644
--- a/apache.if --- a/apache.if
@ -10107,10 +10110,10 @@ index 0000000..de66654
+') +')
diff --git a/bumblebee.te b/bumblebee.te diff --git a/bumblebee.te b/bumblebee.te
new file mode 100644 new file mode 100644
index 0000000..fe923e3 index 0000000..1076e6a
--- /dev/null --- /dev/null
+++ b/bumblebee.te +++ b/bumblebee.te
@@ -0,0 +1,59 @@ @@ -0,0 +1,60 @@
+policy_module(bumblebee, 1.0.0) +policy_module(bumblebee, 1.0.0)
+ +
+######################################## +########################################
@ -10158,6 +10161,7 @@ index 0000000..fe923e3
+logging_send_syslog_msg(bumblebee_t) +logging_send_syslog_msg(bumblebee_t)
+ +
+modutils_domtrans_insmod(bumblebee_t) +modutils_domtrans_insmod(bumblebee_t)
+modutils_signal_insmod(bumblebee_t)
+ +
+sysnet_dns_name_resolve(bumblebee_t) +sysnet_dns_name_resolve(bumblebee_t)
+ +
@ -16522,7 +16526,7 @@ index 1303b30..72481a7 100644
+ logging_log_filetrans($1, cron_log_t, $2, $3) + logging_log_filetrans($1, cron_log_t, $2, $3)
') ')
diff --git a/cron.te b/cron.te diff --git a/cron.te b/cron.te
index 7de3859..ce147f1 100644 index 7de3859..4e6ebcd 100644
--- a/cron.te --- a/cron.te
+++ b/cron.te +++ b/cron.te
@@ -11,46 +11,46 @@ gen_require(` @@ -11,46 +11,46 @@ gen_require(`
@ -16722,7 +16726,7 @@ index 7de3859..ce147f1 100644
selinux_get_fs_mount(admin_crontab_t) selinux_get_fs_mount(admin_crontab_t)
selinux_validate_context(admin_crontab_t) selinux_validate_context(admin_crontab_t)
selinux_compute_access_vector(admin_crontab_t) selinux_compute_access_vector(admin_crontab_t)
@@ -204,12 +148,14 @@ selinux_compute_relabel_context(admin_crontab_t) @@ -204,22 +148,26 @@ selinux_compute_relabel_context(admin_crontab_t)
selinux_compute_user_contexts(admin_crontab_t) selinux_compute_user_contexts(admin_crontab_t)
tunable_policy(`fcron_crond',` tunable_policy(`fcron_crond',`
@ -16738,7 +16742,9 @@ index 7de3859..ce147f1 100644
# #
allow crond_t self:capability { dac_override chown fowner setgid setuid sys_nice dac_read_search }; allow crond_t self:capability { dac_override chown fowner setgid setuid sys_nice dac_read_search };
@@ -218,8 +164,10 @@ allow crond_t self:process ~{ ptrace setcurrent setexec setfscreate execmem exec -dontaudit crond_t self:capability { sys_resource sys_tty_config };
+dontaudit crond_t self:capability { net_admin sys_resource sys_tty_config };
allow crond_t self:process ~{ ptrace setcurrent setexec setfscreate execmem execstack execheap };
allow crond_t self:process { setexec setfscreate }; allow crond_t self:process { setexec setfscreate };
allow crond_t self:fd use; allow crond_t self:fd use;
allow crond_t self:fifo_file rw_fifo_file_perms; allow crond_t self:fifo_file rw_fifo_file_perms;
@ -23445,10 +23451,10 @@ index 0000000..89401fe
+') +')
diff --git a/docker.te b/docker.te diff --git a/docker.te b/docker.te
new file mode 100644 new file mode 100644
index 0000000..a1e6966 index 0000000..75d51ed
--- /dev/null --- /dev/null
+++ b/docker.te +++ b/docker.te
@@ -0,0 +1,239 @@ @@ -0,0 +1,240 @@
+policy_module(docker, 1.0.0) +policy_module(docker, 1.0.0)
+ +
+######################################## +########################################
@ -23657,6 +23663,7 @@ index 0000000..a1e6966
+term_use_ptmx(docker_t) +term_use_ptmx(docker_t)
+term_getattr_pty_fs(docker_t) +term_getattr_pty_fs(docker_t)
+term_relabel_pty_fs(docker_t) +term_relabel_pty_fs(docker_t)
+term_mounton_unallocated_ttys(docker_t)
+ +
+modutils_domtrans_insmod(docker_t) +modutils_domtrans_insmod(docker_t)
+ +
@ -39632,10 +39639,24 @@ index d314333..da30c5d 100644
+ ') + ')
') ')
diff --git a/lsm.te b/lsm.te diff --git a/lsm.te b/lsm.te
index 4ec0eea..5bf5627 100644 index 4ec0eea..0f702df 100644
--- a/lsm.te --- a/lsm.te
+++ b/lsm.te +++ b/lsm.te
@@ -12,6 +12,17 @@ init_daemon_domain(lsmd_t, lsmd_exec_t) @@ -4,6 +4,13 @@ policy_module(lsm, 1.0.0)
#
# Declarations
#
+## <desc>
+## <p>
+## Determine whether lsmd_plugin can
+## connect to all TCP ports.
+## </p>
+## </desc>
+gen_tunable(lsmd_plugin_connect_any, false)
type lsmd_t;
type lsmd_exec_t;
@@ -12,6 +19,17 @@ init_daemon_domain(lsmd_t, lsmd_exec_t)
type lsmd_var_run_t; type lsmd_var_run_t;
files_pid_file(lsmd_var_run_t) files_pid_file(lsmd_var_run_t)
@ -39653,7 +39674,7 @@ index 4ec0eea..5bf5627 100644
######################################## ########################################
# #
# Local policy # Local policy
@@ -26,4 +37,36 @@ manage_lnk_files_pattern(lsmd_t, lsmd_var_run_t, lsmd_var_run_t) @@ -26,4 +44,47 @@ manage_lnk_files_pattern(lsmd_t, lsmd_var_run_t, lsmd_var_run_t)
manage_sock_files_pattern(lsmd_t, lsmd_var_run_t, lsmd_var_run_t) manage_sock_files_pattern(lsmd_t, lsmd_var_run_t, lsmd_var_run_t)
files_pid_filetrans(lsmd_t, lsmd_var_run_t, { dir file sock_file }) files_pid_filetrans(lsmd_t, lsmd_var_run_t, { dir file sock_file })
@ -39667,6 +39688,7 @@ index 4ec0eea..5bf5627 100644
+# +#
+ +
+allow lsmd_plugin_t self:udp_socket create_socket_perms; +allow lsmd_plugin_t self:udp_socket create_socket_perms;
+allow lsmd_plugin_t self:tcp_socket create_stream_socket_perms;
+ +
+domtrans_pattern(lsmd_t, lsmd_plugin_exec_t, lsmd_plugin_t) +domtrans_pattern(lsmd_t, lsmd_plugin_exec_t, lsmd_plugin_t)
+allow lsmd_plugin_t lsmd_t:unix_stream_socket { read write }; +allow lsmd_plugin_t lsmd_t:unix_stream_socket { read write };
@ -39678,12 +39700,22 @@ index 4ec0eea..5bf5627 100644
+manage_dirs_pattern(lsmd_plugin_t, lsmd_plugin_tmp_t, lsmd_plugin_tmp_t) +manage_dirs_pattern(lsmd_plugin_t, lsmd_plugin_tmp_t, lsmd_plugin_tmp_t)
+files_tmp_filetrans(lsmd_plugin_t, lsmd_plugin_tmp_t, { file dir }) +files_tmp_filetrans(lsmd_plugin_t, lsmd_plugin_tmp_t, { file dir })
+ +
+tunable_policy(`lsmd_plugin_connect_any',`
+ corenet_tcp_connect_all_ports(lsmd_plugin_t)
+ corenet_sendrecv_all_packets(lsmd_plugin_t)
+ corenet_tcp_sendrecv_all_ports(lsmd_plugin_t)
+')
+
+kernel_read_system_state(lsmd_plugin_t) +kernel_read_system_state(lsmd_plugin_t)
+ +
+dev_read_urand(lsmd_plugin_t) +dev_read_urand(lsmd_plugin_t)
+ +
+corecmd_exec_bin(lsmd_plugin_t) +corecmd_exec_bin(lsmd_plugin_t)
+ +
+corenet_tcp_connect_http_port(lsmd_plugin_t)
+corenet_tcp_connect_http_cache_port(lsmd_plugin_t)
+corenet_tcp_connect_ssh_port(lsmd_plugin_t)
+
+init_stream_connect(lsmd_plugin_t) +init_stream_connect(lsmd_plugin_t)
+init_dontaudit_rw_stream_socket(lsmd_plugin_t) +init_dontaudit_rw_stream_socket(lsmd_plugin_t)
+ +
@ -44133,7 +44165,7 @@ index 6194b80..03c6414 100644
') ')
+ +
diff --git a/mozilla.te b/mozilla.te diff --git a/mozilla.te b/mozilla.te
index 11ac8e4..ea784b3 100644 index 11ac8e4..dfd8d3a 100644
--- a/mozilla.te --- a/mozilla.te
+++ b/mozilla.te +++ b/mozilla.te
@@ -6,17 +6,41 @@ policy_module(mozilla, 2.8.0) @@ -6,17 +6,41 @@ policy_module(mozilla, 2.8.0)
@ -44571,7 +44603,7 @@ index 11ac8e4..ea784b3 100644
') ')
optional_policy(` optional_policy(`
@@ -300,259 +324,241 @@ optional_policy(` @@ -300,259 +324,243 @@ optional_policy(`
######################################## ########################################
# #
@ -44585,7 +44617,7 @@ index 11ac8e4..ea784b3 100644
+dontaudit mozilla_plugin_t self:capability { sys_admin ipc_lock sys_nice sys_tty_config }; +dontaudit mozilla_plugin_t self:capability { sys_admin ipc_lock sys_nice sys_tty_config };
+dontaudit mozilla_plugin_t self:capability2 block_suspend; +dontaudit mozilla_plugin_t self:capability2 block_suspend;
+ +
+allow mozilla_plugin_t self:process { setpgid getsched setsched signal_perms execmem execstack setrlimit transition }; +allow mozilla_plugin_t self:process { getsession setcap setpgid getsched setsched signal_perms execmem execstack setrlimit transition };
+allow mozilla_plugin_t self:netlink_route_socket r_netlink_socket_perms; +allow mozilla_plugin_t self:netlink_route_socket r_netlink_socket_perms;
+allow mozilla_plugin_t self:netlink_socket create_socket_perms; +allow mozilla_plugin_t self:netlink_socket create_socket_perms;
+allow mozilla_plugin_t self:tcp_socket create_stream_socket_perms; +allow mozilla_plugin_t self:tcp_socket create_stream_socket_perms;
@ -44670,6 +44702,8 @@ index 11ac8e4..ea784b3 100644
kernel_request_load_module(mozilla_plugin_t) kernel_request_load_module(mozilla_plugin_t)
kernel_dontaudit_getattr_core_if(mozilla_plugin_t) kernel_dontaudit_getattr_core_if(mozilla_plugin_t)
+files_dontaudit_read_root_files(mozilla_plugin_t) +files_dontaudit_read_root_files(mozilla_plugin_t)
+kernel_dontaudit_list_all_proc(mozilla_plugin_t)
+kernel_dontaudit_list_all_sysctls(mozilla_plugin_t)
corecmd_exec_bin(mozilla_plugin_t) corecmd_exec_bin(mozilla_plugin_t)
corecmd_exec_shell(mozilla_plugin_t) corecmd_exec_shell(mozilla_plugin_t)
@ -44962,7 +44996,7 @@ index 11ac8e4..ea784b3 100644
') ')
optional_policy(` optional_policy(`
@@ -560,7 +566,11 @@ optional_policy(` @@ -560,7 +568,11 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -44975,7 +45009,7 @@ index 11ac8e4..ea784b3 100644
') ')
optional_policy(` optional_policy(`
@@ -568,108 +578,131 @@ optional_policy(` @@ -568,108 +580,131 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -48293,7 +48327,7 @@ index 687af38..404ed6d 100644
+ mysql_stream_connect($1) + mysql_stream_connect($1)
') ')
diff --git a/mysql.te b/mysql.te diff --git a/mysql.te b/mysql.te
index 7584bbe..d053405 100644 index 7584bbe..ae0d53a 100644
--- a/mysql.te --- a/mysql.te
+++ b/mysql.te +++ b/mysql.te
@@ -6,20 +6,15 @@ policy_module(mysql, 1.14.1) @@ -6,20 +6,15 @@ policy_module(mysql, 1.14.1)
@ -48453,7 +48487,7 @@ index 7584bbe..d053405 100644
seutil_sigchld_newrole(mysqld_t) seutil_sigchld_newrole(mysqld_t)
') ')
@@ -155,21 +160,17 @@ optional_policy(` @@ -155,21 +160,18 @@ optional_policy(`
####################################### #######################################
# #
@ -48463,6 +48497,7 @@ index 7584bbe..d053405 100644
-allow mysqld_safe_t self:capability { chown dac_override fowner kill }; -allow mysqld_safe_t self:capability { chown dac_override fowner kill };
+allow mysqld_safe_t self:capability { chown dac_override fowner kill sys_nice sys_resource }; +allow mysqld_safe_t self:capability { chown dac_override fowner kill sys_nice sys_resource };
+dontaudit mysqld_safe_t self:capability sys_ptrace;
allow mysqld_safe_t self:process { setsched getsched setrlimit }; allow mysqld_safe_t self:process { setsched getsched setrlimit };
allow mysqld_safe_t self:fifo_file rw_fifo_file_perms; allow mysqld_safe_t self:fifo_file rw_fifo_file_perms;
@ -48479,7 +48514,7 @@ index 7584bbe..d053405 100644
list_dirs_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t) list_dirs_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
manage_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t) manage_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
@@ -177,9 +178,7 @@ manage_lnk_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t) @@ -177,9 +179,7 @@ manage_lnk_files_pattern(mysqld_safe_t, mysqld_log_t, mysqld_log_t)
logging_log_filetrans(mysqld_safe_t, mysqld_log_t, file) logging_log_filetrans(mysqld_safe_t, mysqld_log_t, file)
manage_files_pattern(mysqld_safe_t, mysqld_var_run_t, mysqld_var_run_t) manage_files_pattern(mysqld_safe_t, mysqld_var_run_t, mysqld_var_run_t)
@ -48490,7 +48525,7 @@ index 7584bbe..d053405 100644
kernel_read_system_state(mysqld_safe_t) kernel_read_system_state(mysqld_safe_t)
kernel_read_kernel_sysctls(mysqld_safe_t) kernel_read_kernel_sysctls(mysqld_safe_t)
@@ -187,21 +186,29 @@ kernel_read_kernel_sysctls(mysqld_safe_t) @@ -187,21 +187,29 @@ kernel_read_kernel_sysctls(mysqld_safe_t)
corecmd_exec_bin(mysqld_safe_t) corecmd_exec_bin(mysqld_safe_t)
corecmd_exec_shell(mysqld_safe_t) corecmd_exec_shell(mysqld_safe_t)
@ -48526,7 +48561,7 @@ index 7584bbe..d053405 100644
optional_policy(` optional_policy(`
hostname_exec(mysqld_safe_t) hostname_exec(mysqld_safe_t)
@@ -209,7 +216,7 @@ optional_policy(` @@ -209,7 +217,7 @@ optional_policy(`
######################################## ########################################
# #
@ -48535,7 +48570,7 @@ index 7584bbe..d053405 100644
# #
allow mysqlmanagerd_t self:capability { dac_override kill }; allow mysqlmanagerd_t self:capability { dac_override kill };
@@ -218,11 +225,12 @@ allow mysqlmanagerd_t self:fifo_file rw_fifo_file_perms; @@ -218,11 +226,12 @@ allow mysqlmanagerd_t self:fifo_file rw_fifo_file_perms;
allow mysqlmanagerd_t self:tcp_socket create_stream_socket_perms; allow mysqlmanagerd_t self:tcp_socket create_stream_socket_perms;
allow mysqlmanagerd_t self:unix_stream_socket create_stream_socket_perms; allow mysqlmanagerd_t self:unix_stream_socket create_stream_socket_perms;
@ -48553,7 +48588,7 @@ index 7584bbe..d053405 100644
domtrans_pattern(mysqlmanagerd_t, mysqld_exec_t, mysqld_t) domtrans_pattern(mysqlmanagerd_t, mysqld_exec_t, mysqld_t)
@@ -230,31 +238,20 @@ manage_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t) @@ -230,31 +239,20 @@ manage_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t)
manage_sock_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t) manage_sock_files_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t)
filetrans_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t, { file sock_file }) filetrans_pattern(mysqlmanagerd_t, mysqld_var_run_t, mysqlmanagerd_var_run_t, { file sock_file })
@ -50258,7 +50293,7 @@ index 86dc29d..993ecf5 100644
+ logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log") + logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log")
') ')
diff --git a/networkmanager.te b/networkmanager.te diff --git a/networkmanager.te b/networkmanager.te
index 55f2009..8562dec 100644 index 55f2009..5e67bb6 100644
--- a/networkmanager.te --- a/networkmanager.te
+++ b/networkmanager.te +++ b/networkmanager.te
@@ -9,15 +9,18 @@ type NetworkManager_t; @@ -9,15 +9,18 @@ type NetworkManager_t;
@ -50624,7 +50659,7 @@ index 55f2009..8562dec 100644
+ systemd_write_inhibit_pipes(NetworkManager_t) + systemd_write_inhibit_pipes(NetworkManager_t)
+ systemd_read_logind_sessions_files(NetworkManager_t) + systemd_read_logind_sessions_files(NetworkManager_t)
+ systemd_dbus_chat_logind(NetworkManager_t) + systemd_dbus_chat_logind(NetworkManager_t)
+ systemd_hostnamed_read_config(NetworkManager_t) + systemd_hostnamed_manage_config(NetworkManager_t)
+') +')
+ +
+optional_policy(` +optional_policy(`
@ -80070,7 +80105,7 @@ index ef3b225..d248cd3 100644
init_labeled_script_domtrans($1, rpm_initrc_exec_t) init_labeled_script_domtrans($1, rpm_initrc_exec_t)
domain_system_change_exemption($1) domain_system_change_exemption($1)
diff --git a/rpm.te b/rpm.te diff --git a/rpm.te b/rpm.te
index 6fc360e..4e28c91 100644 index 6fc360e..44f9739 100644
--- a/rpm.te --- a/rpm.te
+++ b/rpm.te +++ b/rpm.te
@@ -1,15 +1,13 @@ @@ -1,15 +1,13 @@
@ -80474,7 +80509,7 @@ index 6fc360e..4e28c91 100644
ifdef(`distro_redhat',` ifdef(`distro_redhat',`
optional_policy(` optional_policy(`
@@ -363,41 +385,67 @@ ifdef(`distro_redhat',` @@ -363,41 +385,68 @@ ifdef(`distro_redhat',`
') ')
') ')
@ -80512,6 +80547,7 @@ index 6fc360e..4e28c91 100644
- ') - ')
+ optional_policy(` + optional_policy(`
+ systemd_dbus_chat_logind(rpm_script_t) + systemd_dbus_chat_logind(rpm_script_t)
+ systemd_dbus_chat_timedated(rpm_script_t)
+ ') + ')
+') +')
+ +
@ -80553,7 +80589,7 @@ index 6fc360e..4e28c91 100644
optional_policy(` optional_policy(`
java_domtrans_unconfined(rpm_script_t) java_domtrans_unconfined(rpm_script_t)
@@ -409,6 +457,6 @@ optional_policy(` @@ -409,6 +458,6 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -83828,10 +83864,10 @@ index 0000000..b7db254
+# Empty +# Empty
diff --git a/sandbox.if b/sandbox.if diff --git a/sandbox.if b/sandbox.if
new file mode 100644 new file mode 100644
index 0000000..8a6ad19 index 0000000..89bc443
--- /dev/null --- /dev/null
+++ b/sandbox.if +++ b/sandbox.if
@@ -0,0 +1,56 @@ @@ -0,0 +1,57 @@
+ +
+## <summary>policy for sandbox</summary> +## <summary>policy for sandbox</summary>
+ +
@ -83862,6 +83898,7 @@ index 0000000..8a6ad19
+ allow sandbox_domain $1:process { sigchld signull }; + allow sandbox_domain $1:process { sigchld signull };
+ allow sandbox_domain $1:fifo_file rw_inherited_fifo_file_perms; + allow sandbox_domain $1:fifo_file rw_inherited_fifo_file_perms;
+ dontaudit sandbox_domain $1:process signal; + dontaudit sandbox_domain $1:process signal;
+ dontaudit sandbox_domain $1:key { link read search view };
+ dontaudit sandbox_domain $1:unix_stream_socket rw_socket_perms; + dontaudit sandbox_domain $1:unix_stream_socket rw_socket_perms;
+') +')
+ +
@ -83966,10 +84003,10 @@ index 0000000..6caef63
+/usr/share/sandbox/start -- gen_context(system_u:object_r:sandbox_exec_t,s0) +/usr/share/sandbox/start -- gen_context(system_u:object_r:sandbox_exec_t,s0)
diff --git a/sandboxX.if b/sandboxX.if diff --git a/sandboxX.if b/sandboxX.if
new file mode 100644 new file mode 100644
index 0000000..e30b346 index 0000000..3258f45
--- /dev/null --- /dev/null
+++ b/sandboxX.if +++ b/sandboxX.if
@@ -0,0 +1,393 @@ @@ -0,0 +1,394 @@
+ +
+## <summary>policy for sandboxX </summary> +## <summary>policy for sandboxX </summary>
+ +
@ -84011,6 +84048,7 @@ index 0000000..e30b346
+ dontaudit sandbox_xserver_t $1:file read; + dontaudit sandbox_xserver_t $1:file read;
+ allow sandbox_x_domain sandbox_x_domain:process signal; + allow sandbox_x_domain sandbox_x_domain:process signal;
+ # Dontaudit leaked file descriptors + # Dontaudit leaked file descriptors
+ dontaudit sandbox_x_domain $1:key { link read search view };
+ dontaudit sandbox_x_domain $1:fifo_file { read write }; + dontaudit sandbox_x_domain $1:fifo_file { read write };
+ dontaudit sandbox_x_domain $1:tcp_socket rw_socket_perms; + dontaudit sandbox_x_domain $1:tcp_socket rw_socket_perms;
+ dontaudit sandbox_x_domain $1:udp_socket rw_socket_perms; + dontaudit sandbox_x_domain $1:udp_socket rw_socket_perms;
@ -88492,13 +88530,14 @@ index cbfe369..6594af3 100644
files_search_var_lib($1) files_search_var_lib($1)
diff --git a/snapper.fc b/snapper.fc diff --git a/snapper.fc b/snapper.fc
new file mode 100644 new file mode 100644
index 0000000..1cb1360 index 0000000..ab5d7e7
--- /dev/null --- /dev/null
+++ b/snapper.fc +++ b/snapper.fc
@@ -0,0 +1,5 @@ @@ -0,0 +1,6 @@
+/usr/sbin/snapperd -- gen_context(system_u:object_r:snapperd_exec_t,s0) +/usr/sbin/snapperd -- gen_context(system_u:object_r:snapperd_exec_t,s0)
+ +
+/etc/snapper(/.*)? gen_context(system_u:object_r:snapperd_conf_t,s0) +/etc/snapper(/.*)? gen_context(system_u:object_r:snapperd_conf_t,s0)
+/etc/sysconfig/snapper -- gen_context(system_u:object_r:snapperd_conf_t,s0)
+ +
+/var/log/snapper\.log.* -- gen_context(system_u:object_r:snapperd_log_t,s0) +/var/log/snapper\.log.* -- gen_context(system_u:object_r:snapperd_log_t,s0)
diff --git a/snapper.if b/snapper.if diff --git a/snapper.if b/snapper.if
@ -88551,10 +88590,10 @@ index 0000000..94105ee
+') +')
diff --git a/snapper.te b/snapper.te diff --git a/snapper.te b/snapper.te
new file mode 100644 new file mode 100644
index 0000000..a299f53 index 0000000..01ade60
--- /dev/null --- /dev/null
+++ b/snapper.te +++ b/snapper.te
@@ -0,0 +1,66 @@ @@ -0,0 +1,70 @@
+policy_module(snapper, 1.0.0) +policy_module(snapper, 1.0.0)
+ +
+######################################## +########################################
@ -88599,6 +88638,10 @@ index 0000000..a299f53
+corecmd_exec_shell(snapperd_t) +corecmd_exec_shell(snapperd_t)
+corecmd_exec_bin(snapperd_t) +corecmd_exec_bin(snapperd_t)
+ +
+files_write_all_dirs(snapperd_t)
+files_setattr_all_mountpoints(snapperd_t)
+files_relabelto_all_mountpoints(snapperd_t)
+files_relabelfrom_isid_type(snapperd_t)
+files_read_all_files(snapperd_t) +files_read_all_files(snapperd_t)
+files_list_all(snapperd_t) +files_list_all(snapperd_t)
+ +
@ -88948,7 +88991,7 @@ index 634c6b4..e1edfd9 100644
######################################## ########################################
diff --git a/sosreport.te b/sosreport.te diff --git a/sosreport.te b/sosreport.te
index f2f507d..3d93f55 100644 index f2f507d..0d4a35c 100644
--- a/sosreport.te --- a/sosreport.te
+++ b/sosreport.te +++ b/sosreport.te
@@ -13,15 +13,15 @@ type sosreport_exec_t; @@ -13,15 +13,15 @@ type sosreport_exec_t;
@ -89016,16 +89059,17 @@ index f2f507d..3d93f55 100644
corecmd_exec_all_executables(sosreport_t) corecmd_exec_all_executables(sosreport_t)
@@ -69,6 +89,8 @@ dev_read_urand(sosreport_t) @@ -69,6 +89,9 @@ dev_read_urand(sosreport_t)
dev_read_raw_memory(sosreport_t) dev_read_raw_memory(sosreport_t)
dev_read_sysfs(sosreport_t) dev_read_sysfs(sosreport_t)
dev_rw_generic_usb_dev(sosreport_t) dev_rw_generic_usb_dev(sosreport_t)
+dev_rw_lvm_control(sosreport_t)
+dev_getattr_all_chr_files(sosreport_t) +dev_getattr_all_chr_files(sosreport_t)
+dev_getattr_all_blk_files(sosreport_t) +dev_getattr_all_blk_files(sosreport_t)
domain_getattr_all_domains(sosreport_t) domain_getattr_all_domains(sosreport_t)
domain_read_all_domains_state(sosreport_t) domain_read_all_domains_state(sosreport_t)
@@ -83,7 +105,6 @@ files_list_all(sosreport_t) @@ -83,7 +106,6 @@ files_list_all(sosreport_t)
files_read_config_files(sosreport_t) files_read_config_files(sosreport_t)
files_read_generic_tmp_files(sosreport_t) files_read_generic_tmp_files(sosreport_t)
files_read_non_auth_files(sosreport_t) files_read_non_auth_files(sosreport_t)
@ -89033,7 +89077,7 @@ index f2f507d..3d93f55 100644
files_read_var_lib_files(sosreport_t) files_read_var_lib_files(sosreport_t)
files_read_var_symlinks(sosreport_t) files_read_var_symlinks(sosreport_t)
files_read_kernel_modules(sosreport_t) files_read_kernel_modules(sosreport_t)
@@ -92,25 +113,35 @@ files_manage_etc_runtime_files(sosreport_t) @@ -92,25 +114,35 @@ files_manage_etc_runtime_files(sosreport_t)
files_etc_filetrans_etc_runtime(sosreport_t, file) files_etc_filetrans_etc_runtime(sosreport_t, file)
fs_getattr_all_fs(sosreport_t) fs_getattr_all_fs(sosreport_t)
@ -89072,10 +89116,14 @@ index f2f507d..3d93f55 100644
optional_policy(` optional_policy(`
abrt_manage_pid_files(sosreport_t) abrt_manage_pid_files(sosreport_t)
@@ -119,6 +150,10 @@ optional_policy(` @@ -119,6 +151,14 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
+ bootloader_exec(sosreport_t)
+')
+
+optional_policy(`
+ brctl_domtrans(sosreport_t) + brctl_domtrans(sosreport_t)
+') +')
+ +
@ -89083,10 +89131,11 @@ index f2f507d..3d93f55 100644
cups_stream_connect(sosreport_t) cups_stream_connect(sosreport_t)
') ')
@@ -127,6 +162,15 @@ optional_policy(` @@ -127,6 +167,16 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
+ lvm_read_config(sosreport_t)
+ lvm_dontaudit_access_check_lock(sosreport_t) + lvm_dontaudit_access_check_lock(sosreport_t)
+') +')
+ +
@ -89099,7 +89148,7 @@ index f2f507d..3d93f55 100644
fstools_domtrans(sosreport_t) fstools_domtrans(sosreport_t)
') ')
@@ -136,6 +180,10 @@ optional_policy(` @@ -136,6 +186,10 @@ optional_policy(`
optional_policy(` optional_policy(`
hal_dbus_chat(sosreport_t) hal_dbus_chat(sosreport_t)
') ')
@ -89110,7 +89159,7 @@ index f2f507d..3d93f55 100644
') ')
optional_policy(` optional_policy(`
@@ -147,13 +195,34 @@ optional_policy(` @@ -147,13 +201,34 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`

View File

@ -19,7 +19,7 @@
Summary: SELinux policy configuration Summary: SELinux policy configuration
Name: selinux-policy Name: selinux-policy
Version: 3.13.1 Version: 3.13.1
Release: 27%{?dist} Release: 28%{?dist}
License: GPLv2+ License: GPLv2+
Group: System Environment/Base Group: System Environment/Base
Source: serefpolicy-%{version}.tgz Source: serefpolicy-%{version}.tgz
@ -580,6 +580,35 @@ SELinux Reference policy mls base module.
%endif %endif
%changelog %changelog
* Thu Feb 27 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-28
- Allow bumblebeed to send signal to insmod
- Dontaudit attempts by crond_t net_admin caused by journald
- Allow the docker daemon to mounton tty_device_t
- Add addtional snapper fixes to allo relabel file_t
- Allow setattr for all mountpoints
- Allow snapperd to write all dirs
- Add support for /etc/sysconfig/snapper
- Allow mozilla_plugin to getsession
- Add labeling for thttpd
- Allow sosreport to execute grub2-probe
- Allow NM to manage hostname config file
- Allow systemd_timedated_t to dbus chat with rpm_script_t
- Allow lsmd plugins to connect to http/ssh/http_cache ports by default
- Add lsmd_plugin_connect_any boolea
- Add support for ipset
- Add support for /dev/sclp_line0
- Add modutils_signal_insmod()
- Add files_relabelto_all_mountpoints() interface
- Allow the docker daemon to mounton tty_device_t
- Allow all systemd domains to read /proc/1
- Login programs talking to journald are attempting to net_admin, add dontaudit
- init is not gettar on processes as shutdown time
- Add systemd_hostnamed_manage_config() interface
- Make unconfined_service_t valid in enforcing
- Remove transition for temp dirs created by init_t
- gdm-simple-slave uses use setsockopt
- Add lvm_read_metadata()
* Mon Feb 24 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-27 * Mon Feb 24 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-27
- Make unconfined_service_t valid in enforcing - Make unconfined_service_t valid in enforcing
- Remove transition for temp dirs created by init_t - Remove transition for temp dirs created by init_t