* Wed Jul 13 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-202
- Allow systemd_logind_t to start init_t BZ(1355861) - Add init_start() interface - Allow sysadm user to run systemd-tmpfiles - Add interface systemd_tmpfiles_run
This commit is contained in:
parent
1ad8909907
commit
449da6b428
Binary file not shown.
@ -25374,7 +25374,7 @@ index ff92430..36740ea 100644
|
|||||||
## <summary>
|
## <summary>
|
||||||
## Execute a generic bin program in the sysadm domain.
|
## Execute a generic bin program in the sysadm domain.
|
||||||
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
|
diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
|
||||||
index 2522ca6..fe03d6d 100644
|
index 2522ca6..a23a472 100644
|
||||||
--- a/policy/modules/roles/sysadm.te
|
--- a/policy/modules/roles/sysadm.te
|
||||||
+++ b/policy/modules/roles/sysadm.te
|
+++ b/policy/modules/roles/sysadm.te
|
||||||
@@ -5,39 +5,88 @@ policy_module(sysadm, 2.6.1)
|
@@ -5,39 +5,88 @@ policy_module(sysadm, 2.6.1)
|
||||||
@ -25807,7 +25807,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -345,30 +490,37 @@ optional_policy(`
|
@@ -345,30 +490,38 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -25820,6 +25820,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
+ systemd_login_reboot(sysadm_t)
|
+ systemd_login_reboot(sysadm_t)
|
||||||
+ systemd_login_halt(sysadm_t)
|
+ systemd_login_halt(sysadm_t)
|
||||||
+ systemd_login_undefined(sysadm_t)
|
+ systemd_login_undefined(sysadm_t)
|
||||||
|
+ systemd_tmpfiles_run(sysadm_t, sysadm_r)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -25854,7 +25855,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -380,10 +532,6 @@ optional_policy(`
|
@@ -380,10 +533,6 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -25865,7 +25866,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
usermanage_run_admin_passwd(sysadm_t, sysadm_r)
|
usermanage_run_admin_passwd(sysadm_t, sysadm_r)
|
||||||
usermanage_run_groupadd(sysadm_t, sysadm_r)
|
usermanage_run_groupadd(sysadm_t, sysadm_r)
|
||||||
usermanage_run_useradd(sysadm_t, sysadm_r)
|
usermanage_run_useradd(sysadm_t, sysadm_r)
|
||||||
@@ -391,6 +539,9 @@ optional_policy(`
|
@@ -391,6 +540,9 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
virt_stream_connect(sysadm_t)
|
virt_stream_connect(sysadm_t)
|
||||||
@ -25875,7 +25876,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -398,31 +549,34 @@ optional_policy(`
|
@@ -398,31 +550,34 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -25916,7 +25917,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
auth_role(sysadm_r, sysadm_t)
|
auth_role(sysadm_r, sysadm_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -435,10 +589,6 @@ ifndef(`distro_redhat',`
|
@@ -435,10 +590,6 @@ ifndef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -25927,7 +25928,7 @@ index 2522ca6..fe03d6d 100644
|
|||||||
dbus_role_template(sysadm, sysadm_r, sysadm_t)
|
dbus_role_template(sysadm, sysadm_r, sysadm_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -459,15 +609,79 @@ ifndef(`distro_redhat',`
|
@@ -459,15 +610,79 @@ ifndef(`distro_redhat',`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -35258,7 +35259,7 @@ index bc0ffc8..37b8ea5 100644
|
|||||||
')
|
')
|
||||||
+/var/run/systemd(/.*)? gen_context(system_u:object_r:init_var_run_t,s0)
|
+/var/run/systemd(/.*)? gen_context(system_u:object_r:init_var_run_t,s0)
|
||||||
diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
|
diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
|
||||||
index 79a45f6..e176b9f 100644
|
index 79a45f6..9926eaf 100644
|
||||||
--- a/policy/modules/system/init.if
|
--- a/policy/modules/system/init.if
|
||||||
+++ b/policy/modules/system/init.if
|
+++ b/policy/modules/system/init.if
|
||||||
@@ -1,5 +1,21 @@
|
@@ -1,5 +1,21 @@
|
||||||
@ -36301,7 +36302,7 @@ index 79a45f6..e176b9f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -1806,37 +2294,672 @@ interface(`init_pid_filetrans_utmp',`
|
@@ -1806,37 +2294,690 @@ interface(`init_pid_filetrans_utmp',`
|
||||||
files_pid_filetrans($1, initrc_var_run_t, file, "utmp")
|
files_pid_filetrans($1, initrc_var_run_t, file, "utmp")
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -36729,6 +36730,24 @@ index 79a45f6..e176b9f 100644
|
|||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
+## <summary>
|
+## <summary>
|
||||||
|
+## Start system from init
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+#
|
||||||
|
+interface(`init_start',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type init_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ allow $1 init_t:system start;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
|
+## <summary>
|
||||||
+## Tell init to reboot the system.
|
+## Tell init to reboot the system.
|
||||||
+## </summary>
|
+## </summary>
|
||||||
+## <param name="domain">
|
+## <param name="domain">
|
||||||
@ -46795,10 +46814,10 @@ index 0000000..8b77d7a
|
|||||||
+/var/run/initramfs(/.*)? <<none>>
|
+/var/run/initramfs(/.*)? <<none>>
|
||||||
diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
|
diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..513b97b
|
index 0000000..16cd1ac
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/policy/modules/system/systemd.if
|
+++ b/policy/modules/system/systemd.if
|
||||||
@@ -0,0 +1,1738 @@
|
@@ -0,0 +1,1763 @@
|
||||||
+## <summary>SELinux policy for systemd components</summary>
|
+## <summary>SELinux policy for systemd components</summary>
|
||||||
+
|
+
|
||||||
+######################################
|
+######################################
|
||||||
@ -47405,6 +47424,31 @@ index 0000000..513b97b
|
|||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
+## <summary>
|
+## <summary>
|
||||||
|
+## Execute systemd-tmpfiles in the systemd_tmpfiles_t domain, and
|
||||||
|
+## allow the specified role the systemd_tmpfiles domain.
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+## <param name="role">
|
||||||
|
+## <summary>
|
||||||
|
+## The role to be allowed the systemd_tmpfiles domain.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+#
|
||||||
|
+interface(`systemd_tmpfiles_run',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type systemd_tmpfiles_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ systemd_passwd_agent_domtrans($1)
|
||||||
|
+ role $2 types systemd_tmpfiles_t;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
|
+## <summary>
|
||||||
+## Role access for systemd_passwd_agent
|
+## Role access for systemd_passwd_agent
|
||||||
+## </summary>
|
+## </summary>
|
||||||
+## <param name="role">
|
+## <param name="role">
|
||||||
@ -48539,10 +48583,10 @@ index 0000000..513b97b
|
|||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000..7877160
|
index 0000000..180e701
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/policy/modules/system/systemd.te
|
+++ b/policy/modules/system/systemd.te
|
||||||
@@ -0,0 +1,957 @@
|
@@ -0,0 +1,958 @@
|
||||||
+policy_module(systemd, 1.0.0)
|
+policy_module(systemd, 1.0.0)
|
||||||
+
|
+
|
||||||
+#######################################
|
+#######################################
|
||||||
@ -48770,6 +48814,7 @@ index 0000000..7877160
|
|||||||
+init_named_pid_filetrans(systemd_logind_t, systemd_logind_inhibit_var_run_t, dir, "inhibit")
|
+init_named_pid_filetrans(systemd_logind_t, systemd_logind_inhibit_var_run_t, dir, "inhibit")
|
||||||
+
|
+
|
||||||
+init_status(systemd_logind_t)
|
+init_status(systemd_logind_t)
|
||||||
|
+init_start(systemd_logind_t)
|
||||||
+init_signal(systemd_logind_t)
|
+init_signal(systemd_logind_t)
|
||||||
+init_reboot(systemd_logind_t)
|
+init_reboot(systemd_logind_t)
|
||||||
+init_halt(systemd_logind_t)
|
+init_halt(systemd_logind_t)
|
||||||
|
@ -648,6 +648,12 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Jul 13 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-202
|
||||||
|
- Allow systemd_logind_t to start init_t BZ(1355861)
|
||||||
|
- Add init_start() interface
|
||||||
|
- Allow sysadm user to run systemd-tmpfiles
|
||||||
|
- Add interface systemd_tmpfiles_run
|
||||||
|
|
||||||
* Mon Jul 11 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-201
|
* Mon Jul 11 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-201
|
||||||
- Allow lttng tools to block suspending
|
- Allow lttng tools to block suspending
|
||||||
- Allow creation of vpnaas in openstack
|
- Allow creation of vpnaas in openstack
|
||||||
|
Loading…
Reference in New Issue
Block a user