- Allow staff_t to communicate and run docker

- Fix *_ecryptfs_home_dirs booleans
- Allow ldconfig_t to read/write inherited user tmp pipes
- Allow storaged to dbus chat with lvm_t
- Add support for storaged  and storaged-lvm-helper. Labeled it as lvm_exec_t.
- Use proper calling in ssh.te for userdom_home_manager attribute
- Use userdom_home_manager_type() also for ssh_keygen_t
- Allow locate to list directories without labels
- Allow bitlbee to use tcp/7778 port
- /etc/cron.daily/logrotate to execute fail2ban-client.
- Allow keepalives to connect to SNMP port. Support to do  SNMP stuff
- Allow staff_t to communicate and run docker
- Dontaudit search mgrepl/.local for cobblerd_t
- Allow neutron to execute kmod in insmod_t
- Allow neutron to execute udevadm in udev_t
- Allow also fowner cap for varnishd
- Allow keepalived to execute bin_t/shell_exec_t
- rhsmcertd seems to need these accesses.  We need this backported to RHEL7 and perhaps RHEL6 policy
- Add cups_execmem boolean
- Allow gear to manage gear service
- New requires for gear to use systemctl and init var_run_t
- Allow cups to execute its rw_etc_t files, for brothers printers
- Add fixes to make munin and munin-cgi working. Allow munin-cgit to create files/dirs in /tmp, list munin co
- Allow swift to execute bin_t
- Allow swift to bind http_cache
This commit is contained in:
Miroslav Grepl 2014-06-09 09:05:58 +02:00
parent 07a8be1e18
commit 686a38099f
3 changed files with 446 additions and 263 deletions

View File

@ -18601,7 +18601,7 @@ index 234a940..d340f20 100644
######################################## ########################################
## <summary> ## <summary>
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
index 0fef1fc..ee4b689 100644 index 0fef1fc..46aa66e 100644
--- a/policy/modules/roles/staff.te --- a/policy/modules/roles/staff.te
+++ b/policy/modules/roles/staff.te +++ b/policy/modules/roles/staff.te
@@ -8,12 +8,71 @@ policy_module(staff, 2.4.0) @@ -8,12 +8,71 @@ policy_module(staff, 2.4.0)
@ -18676,7 +18676,7 @@ index 0fef1fc..ee4b689 100644
optional_policy(` optional_policy(`
apache_role(staff_r, staff_t) apache_role(staff_r, staff_t)
') ')
@@ -23,11 +82,110 @@ optional_policy(` @@ -23,11 +82,115 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -18705,6 +18705,11 @@ index 0fef1fc..ee4b689 100644
optional_policy(` optional_policy(`
- git_role(staff_r, staff_t) - git_role(staff_r, staff_t)
+ docker_stream_connect(staff_t)
+ docker_exec(staff_t)
+')
+
+optional_policy(`
+ dnsmasq_read_pid_files(staff_t) + dnsmasq_read_pid_files(staff_t)
+') +')
+ +
@ -18788,7 +18793,7 @@ index 0fef1fc..ee4b689 100644
') ')
optional_policy(` optional_policy(`
@@ -35,15 +193,31 @@ optional_policy(` @@ -35,15 +198,31 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -18822,7 +18827,7 @@ index 0fef1fc..ee4b689 100644
') ')
optional_policy(` optional_policy(`
@@ -52,11 +226,61 @@ optional_policy(` @@ -52,11 +231,61 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -18884,7 +18889,7 @@ index 0fef1fc..ee4b689 100644
') ')
ifndef(`distro_redhat',` ifndef(`distro_redhat',`
@@ -65,10 +289,6 @@ ifndef(`distro_redhat',` @@ -65,10 +294,6 @@ ifndef(`distro_redhat',`
') ')
optional_policy(` optional_policy(`
@ -18895,7 +18900,7 @@ index 0fef1fc..ee4b689 100644
cdrecord_role(staff_r, staff_t) cdrecord_role(staff_r, staff_t)
') ')
@@ -78,10 +298,6 @@ ifndef(`distro_redhat',` @@ -78,10 +303,6 @@ ifndef(`distro_redhat',`
optional_policy(` optional_policy(`
dbus_role_template(staff, staff_r, staff_t) dbus_role_template(staff, staff_r, staff_t)
@ -18906,7 +18911,7 @@ index 0fef1fc..ee4b689 100644
') ')
optional_policy(` optional_policy(`
@@ -101,10 +317,6 @@ ifndef(`distro_redhat',` @@ -101,10 +322,6 @@ ifndef(`distro_redhat',`
') ')
optional_policy(` optional_policy(`
@ -18917,7 +18922,7 @@ index 0fef1fc..ee4b689 100644
java_role(staff_r, staff_t) java_role(staff_r, staff_t)
') ')
@@ -125,10 +337,6 @@ ifndef(`distro_redhat',` @@ -125,10 +342,6 @@ ifndef(`distro_redhat',`
') ')
optional_policy(` optional_policy(`
@ -18928,7 +18933,7 @@ index 0fef1fc..ee4b689 100644
pyzor_role(staff_r, staff_t) pyzor_role(staff_r, staff_t)
') ')
@@ -141,10 +349,6 @@ ifndef(`distro_redhat',` @@ -141,10 +354,6 @@ ifndef(`distro_redhat',`
') ')
optional_policy(` optional_policy(`
@ -18939,7 +18944,7 @@ index 0fef1fc..ee4b689 100644
spamassassin_role(staff_r, staff_t) spamassassin_role(staff_r, staff_t)
') ')
@@ -176,3 +380,22 @@ ifndef(`distro_redhat',` @@ -176,3 +385,22 @@ ifndef(`distro_redhat',`
wireshark_role(staff_r, staff_t) wireshark_role(staff_r, staff_t)
') ')
') ')
@ -22141,7 +22146,7 @@ index fe0c682..e8dcfa7 100644
+ ps_process_pattern($1, sshd_t) + ps_process_pattern($1, sshd_t)
+') +')
diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te
index cc877c7..1d92018 100644 index cc877c7..b153547 100644
--- a/policy/modules/services/ssh.te --- a/policy/modules/services/ssh.te
+++ b/policy/modules/services/ssh.te +++ b/policy/modules/services/ssh.te
@@ -6,43 +6,68 @@ policy_module(ssh, 2.4.2) @@ -6,43 +6,68 @@ policy_module(ssh, 2.4.2)
@ -22630,20 +22635,17 @@ index cc877c7..1d92018 100644
dev_read_urand(ssh_keygen_t) dev_read_urand(ssh_keygen_t)
term_dontaudit_use_console(ssh_keygen_t) term_dontaudit_use_console(ssh_keygen_t)
@@ -333,6 +507,12 @@ auth_use_nsswitch(ssh_keygen_t) @@ -332,7 +506,9 @@ auth_use_nsswitch(ssh_keygen_t)
logging_send_syslog_msg(ssh_keygen_t) logging_send_syslog_msg(ssh_keygen_t)
+userdom_home_manager(ssh_keygen_t)
userdom_dontaudit_use_unpriv_user_fds(ssh_keygen_t) userdom_dontaudit_use_unpriv_user_fds(ssh_keygen_t)
+userdom_use_user_terminals(ssh_keygen_t) +userdom_use_user_terminals(ssh_keygen_t)
+
+tunable_policy(`use_nfs_home_dirs',`
+ fs_manage_nfs_files(ssh_keygen_t)
+ fs_manage_nfs_dirs(ssh_keygen_t)
+')
optional_policy(` optional_policy(`
seutil_sigchld_newrole(ssh_keygen_t) seutil_sigchld_newrole(ssh_keygen_t)
@@ -341,3 +521,140 @@ optional_policy(` @@ -341,3 +517,140 @@ optional_policy(`
optional_policy(` optional_policy(`
udev_read_db(ssh_keygen_t) udev_read_db(ssh_keygen_t)
') ')
@ -32471,7 +32473,7 @@ index 808ba93..57a68da 100644
+ files_etc_filetrans($1, ld_so_cache_t, file, "ld.so.preload~") + files_etc_filetrans($1, ld_so_cache_t, file, "ld.so.preload~")
+') +')
diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te
index 54f8fa5..b4c7957 100644 index 54f8fa5..caf32d6 100644
--- a/policy/modules/system/libraries.te --- a/policy/modules/system/libraries.te
+++ b/policy/modules/system/libraries.te +++ b/policy/modules/system/libraries.te
@@ -32,14 +32,14 @@ files_tmp_file(ldconfig_tmp_t) @@ -32,14 +32,14 @@ files_tmp_file(ldconfig_tmp_t)
@ -32535,7 +32537,7 @@ index 54f8fa5..b4c7957 100644
userdom_use_all_users_fds(ldconfig_t) userdom_use_all_users_fds(ldconfig_t)
ifdef(`distro_ubuntu',` ifdef(`distro_ubuntu',`
@@ -103,6 +109,12 @@ ifdef(`distro_ubuntu',` @@ -103,6 +109,13 @@ ifdef(`distro_ubuntu',`
') ')
') ')
@ -32544,11 +32546,12 @@ index 54f8fa5..b4c7957 100644
+userdom_manage_user_home_content_files(ldconfig_t) +userdom_manage_user_home_content_files(ldconfig_t)
+userdom_manage_user_tmp_files(ldconfig_t) +userdom_manage_user_tmp_files(ldconfig_t)
+userdom_manage_user_tmp_symlinks(ldconfig_t) +userdom_manage_user_tmp_symlinks(ldconfig_t)
+userdom_rw_inherited_user_tmp_pipes(ldconfig_t)
+ +
ifdef(`hide_broken_symptoms',` ifdef(`hide_broken_symptoms',`
ifdef(`distro_gentoo',` ifdef(`distro_gentoo',`
# leaked fds from portage # leaked fds from portage
@@ -114,6 +126,11 @@ ifdef(`hide_broken_symptoms',` @@ -114,6 +127,11 @@ ifdef(`hide_broken_symptoms',`
') ')
') ')
@ -32560,7 +32563,7 @@ index 54f8fa5..b4c7957 100644
optional_policy(` optional_policy(`
unconfined_dontaudit_rw_tcp_sockets(ldconfig_t) unconfined_dontaudit_rw_tcp_sockets(ldconfig_t)
') ')
@@ -131,6 +148,14 @@ optional_policy(` @@ -131,6 +149,14 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -32575,7 +32578,7 @@ index 54f8fa5..b4c7957 100644
puppet_rw_tmp(ldconfig_t) puppet_rw_tmp(ldconfig_t)
') ')
@@ -141,6 +166,3 @@ optional_policy(` @@ -141,6 +167,3 @@ optional_policy(`
rpm_manage_script_tmp_files(ldconfig_t) rpm_manage_script_tmp_files(ldconfig_t)
') ')
@ -33885,7 +33888,7 @@ index 59b04c1..13c21e8 100644
+ +
+logging_stream_connect_syslog(syslog_client_type) +logging_stream_connect_syslog(syslog_client_type)
diff --git a/policy/modules/system/lvm.fc b/policy/modules/system/lvm.fc diff --git a/policy/modules/system/lvm.fc b/policy/modules/system/lvm.fc
index 6b91740..633e449 100644 index 6b91740..562d1fd 100644
--- a/policy/modules/system/lvm.fc --- a/policy/modules/system/lvm.fc
+++ b/policy/modules/system/lvm.fc +++ b/policy/modules/system/lvm.fc
@@ -23,6 +23,8 @@ ifdef(`distro_gentoo',` @@ -23,6 +23,8 @@ ifdef(`distro_gentoo',`
@ -33922,7 +33925,7 @@ index 6b91740..633e449 100644
/sbin/lvmiopversion -- gen_context(system_u:object_r:lvm_exec_t,s0) /sbin/lvmiopversion -- gen_context(system_u:object_r:lvm_exec_t,s0)
/sbin/lvmsadc -- gen_context(system_u:object_r:lvm_exec_t,s0) /sbin/lvmsadc -- gen_context(system_u:object_r:lvm_exec_t,s0)
/sbin/lvmsar -- gen_context(system_u:object_r:lvm_exec_t,s0) /sbin/lvmsar -- gen_context(system_u:object_r:lvm_exec_t,s0)
@@ -89,8 +95,72 @@ ifdef(`distro_gentoo',` @@ -89,8 +95,74 @@ ifdef(`distro_gentoo',`
# #
# /usr # /usr
# #
@ -33993,11 +33996,13 @@ index 6b91740..633e449 100644
+/usr/lib/lvm-200/.* -- gen_context(system_u:object_r:lvm_exec_t,s0) +/usr/lib/lvm-200/.* -- gen_context(system_u:object_r:lvm_exec_t,s0)
+/usr/lib/systemd/systemd-cryptsetup -- gen_context(system_u:object_r:lvm_exec_t,s0) +/usr/lib/systemd/systemd-cryptsetup -- gen_context(system_u:object_r:lvm_exec_t,s0)
+/usr/lib/systemd/system-generators/lvm2.* -- gen_context(system_u:object_r:lvm_exec_t,s0) +/usr/lib/systemd/system-generators/lvm2.* -- gen_context(system_u:object_r:lvm_exec_t,s0)
+/usr/lib/storaged/storaged -- gen_context(system_u:object_r:lvm_exec_t,s0)
+/usr/lib/storaged/storaged-lvm-helper -- gen_context(system_u:object_r:lvm_exec_t,s0)
+/usr/lib/udev/udisks-lvm-pv-export -- gen_context(system_u:object_r:lvm_exec_t,s0) +/usr/lib/udev/udisks-lvm-pv-export -- gen_context(system_u:object_r:lvm_exec_t,s0)
# #
# /var # /var
@@ -98,5 +168,9 @@ ifdef(`distro_gentoo',` @@ -98,5 +170,9 @@ ifdef(`distro_gentoo',`
/var/cache/multipathd(/.*)? gen_context(system_u:object_r:lvm_metadata_t,s0) /var/cache/multipathd(/.*)? gen_context(system_u:object_r:lvm_metadata_t,s0)
/var/lib/multipath(/.*)? gen_context(system_u:object_r:lvm_var_lib_t,s0) /var/lib/multipath(/.*)? gen_context(system_u:object_r:lvm_var_lib_t,s0)
/var/lock/lvm(/.*)? gen_context(system_u:object_r:lvm_lock_t,s0) /var/lock/lvm(/.*)? gen_context(system_u:object_r:lvm_lock_t,s0)
@ -34177,7 +34182,7 @@ index 58bc27f..f887230 100644
+') +')
+ +
diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
index 79048c4..55d6ce4 100644 index 79048c4..f505f63 100644
--- a/policy/modules/system/lvm.te --- a/policy/modules/system/lvm.te
+++ b/policy/modules/system/lvm.te +++ b/policy/modules/system/lvm.te
@@ -12,6 +12,9 @@ init_daemon_domain(clvmd_t, clvmd_exec_t) @@ -12,6 +12,9 @@ init_daemon_domain(clvmd_t, clvmd_exec_t)
@ -34405,7 +34410,7 @@ index 79048c4..55d6ce4 100644
bootloader_rw_tmp_files(lvm_t) bootloader_rw_tmp_files(lvm_t)
') ')
@@ -333,14 +374,30 @@ optional_policy(` @@ -333,14 +374,34 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -34429,6 +34434,10 @@ index 79048c4..55d6ce4 100644
') ')
optional_policy(` optional_policy(`
+ policykit_dbus_chat(lvm_t)
+')
+
+optional_policy(`
+ systemd_manage_passwd_run(lvm_t) + systemd_manage_passwd_run(lvm_t)
+') +')
+ +
@ -42130,7 +42139,7 @@ index db75976..4ca3a28 100644
+/var/tmp/hsperfdata_root gen_context(system_u:object_r:user_tmp_t,s0) +/var/tmp/hsperfdata_root gen_context(system_u:object_r:user_tmp_t,s0)
+ +
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 9dc60c6..87b5cc3 100644 index 9dc60c6..139edc7 100644
--- a/policy/modules/system/userdomain.if --- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if
@@ -30,9 +30,11 @@ template(`userdom_base_user_template',` @@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@ -44434,7 +44443,35 @@ index 9dc60c6..87b5cc3 100644
## temporary symbolic links. ## temporary symbolic links.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
@@ -2661,6 +3362,25 @@ interface(`userdom_tmp_filetrans_user_tmp',` @@ -2566,6 +3267,27 @@ interface(`userdom_manage_user_tmp_symlinks',`
## </summary>
## </param>
#
+interface(`userdom_rw_inherited_user_tmp_pipes',`
+ gen_require(`
+ type user_tmp_t;
+ ')
+
+ allow $1 user_tmp_t:fifo_file rw_inherited_fifo_file_perms;
+ files_search_tmp($1)
+')
+
+
+########################################
+## <summary>
+## Create, read, write, and delete user
+## temporary named pipes.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
interface(`userdom_manage_user_tmp_pipes',`
gen_require(`
type user_tmp_t;
@@ -2661,6 +3383,25 @@ interface(`userdom_tmp_filetrans_user_tmp',`
files_tmp_filetrans($1, user_tmp_t, $2, $3) files_tmp_filetrans($1, user_tmp_t, $2, $3)
') ')
@ -44460,7 +44497,7 @@ index 9dc60c6..87b5cc3 100644
######################################## ########################################
## <summary> ## <summary>
## Read user tmpfs files. ## Read user tmpfs files.
@@ -2677,13 +3397,14 @@ interface(`userdom_read_user_tmpfs_files',` @@ -2677,13 +3418,14 @@ interface(`userdom_read_user_tmpfs_files',`
') ')
read_files_pattern($1, user_tmpfs_t, user_tmpfs_t) read_files_pattern($1, user_tmpfs_t, user_tmpfs_t)
@ -44476,7 +44513,7 @@ index 9dc60c6..87b5cc3 100644
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -2704,7 +3425,7 @@ interface(`userdom_rw_user_tmpfs_files',` @@ -2704,7 +3446,7 @@ interface(`userdom_rw_user_tmpfs_files',`
######################################## ########################################
## <summary> ## <summary>
@ -44485,7 +44522,7 @@ index 9dc60c6..87b5cc3 100644
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -2712,14 +3433,30 @@ interface(`userdom_rw_user_tmpfs_files',` @@ -2712,14 +3454,30 @@ interface(`userdom_rw_user_tmpfs_files',`
## </summary> ## </summary>
## </param> ## </param>
# #
@ -44520,7 +44557,7 @@ index 9dc60c6..87b5cc3 100644
') ')
######################################## ########################################
@@ -2814,6 +3551,24 @@ interface(`userdom_use_user_ttys',` @@ -2814,6 +3572,24 @@ interface(`userdom_use_user_ttys',`
######################################## ########################################
## <summary> ## <summary>
@ -44545,7 +44582,7 @@ index 9dc60c6..87b5cc3 100644
## Read and write a user domain pty. ## Read and write a user domain pty.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
@@ -2832,22 +3587,34 @@ interface(`userdom_use_user_ptys',` @@ -2832,22 +3608,34 @@ interface(`userdom_use_user_ptys',`
######################################## ########################################
## <summary> ## <summary>
@ -44588,7 +44625,7 @@ index 9dc60c6..87b5cc3 100644
## </desc> ## </desc>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -2856,14 +3623,33 @@ interface(`userdom_use_user_ptys',` @@ -2856,14 +3644,33 @@ interface(`userdom_use_user_ptys',`
## </param> ## </param>
## <infoflow type="both" weight="10"/> ## <infoflow type="both" weight="10"/>
# #
@ -44626,7 +44663,7 @@ index 9dc60c6..87b5cc3 100644
') ')
######################################## ########################################
@@ -2882,8 +3668,27 @@ interface(`userdom_dontaudit_use_user_terminals',` @@ -2882,8 +3689,27 @@ interface(`userdom_dontaudit_use_user_terminals',`
type user_tty_device_t, user_devpts_t; type user_tty_device_t, user_devpts_t;
') ')
@ -44656,96 +44693,95 @@ index 9dc60c6..87b5cc3 100644
') ')
######################################## ########################################
@@ -2955,69 +3760,68 @@ interface(`userdom_spec_domtrans_unpriv_users',` @@ -2955,6 +3781,42 @@ interface(`userdom_spec_domtrans_unpriv_users',`
allow unpriv_userdomain $1:process sigchld; allow unpriv_userdomain $1:process sigchld;
') ')
-########################################
+##################################### +#####################################
## <summary> +## <summary>
-## Execute an Xserver session in all unprivileged user domains. This
-## is an explicit transition, requiring the
-## caller to use setexeccon().
+## Allow domain dyntrans to unpriv userdomain. +## Allow domain dyntrans to unpriv userdomain.
## </summary> +## </summary>
## <param name="domain"> +## <param name="domain">
-## <summary>
-## Domain allowed to transition.
-## </summary>
+## <summary> +## <summary>
+## Domain allowed access. +## Domain allowed access.
+## </summary> +## </summary>
## </param> +## </param>
# +#
-interface(`userdom_xsession_spec_domtrans_unpriv_users',`
- gen_require(`
- attribute unpriv_userdomain;
- ')
+interface(`userdom_dyntransition_unpriv_users',` +interface(`userdom_dyntransition_unpriv_users',`
+ gen_require(` + gen_require(`
+ attribute unpriv_userdomain; + attribute unpriv_userdomain;
+ ') + ')
+
- xserver_xsession_spec_domtrans($1, unpriv_userdomain)
- allow unpriv_userdomain $1:fd use;
- allow unpriv_userdomain $1:fifo_file rw_file_perms;
- allow unpriv_userdomain $1:process sigchld;
+ allow $1 unpriv_userdomain:process dyntransition; + allow $1 unpriv_userdomain:process dyntransition;
') +')
+
-#######################################
+#################################### +####################################
## <summary> +## <summary>
-## Read and write unpriviledged user SysV sempaphores.
+## Allow domain dyntrans to admin userdomain. +## Allow domain dyntrans to admin userdomain.
## </summary> +## </summary>
## <param name="domain"> +## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
+## <summary> +## <summary>
+## Domain allowed access. +## Domain allowed access.
+## </summary> +## </summary>
## </param> +## </param>
# +#
-interface(`userdom_rw_unpriv_user_semaphores',`
- gen_require(`
- attribute unpriv_userdomain;
- ')
+interface(`userdom_dyntransition_admin_users',` +interface(`userdom_dyntransition_admin_users',`
+ gen_require(` + gen_require(`
+ attribute admindomain; + attribute admindomain;
+ ') + ')
+
+ allow $1 admindomain:process dyntransition;
+')
+
########################################
## <summary>
## Execute an Xserver session in all unprivileged user domains. This
@@ -2978,9 +3840,9 @@ interface(`userdom_xsession_spec_domtrans_unpriv_users',`
allow unpriv_userdomain $1:process sigchld;
')
-#######################################
+########################################
## <summary>
-## Read and write unpriviledged user SysV sempaphores.
+## Manage unpriviledged user SysV sempaphores.
## </summary>
## <param name="domain">
## <summary>
@@ -2988,17 +3850,18 @@ interface(`userdom_xsession_spec_domtrans_unpriv_users',`
## </summary>
## </param>
#
-interface(`userdom_rw_unpriv_user_semaphores',`
+interface(`userdom_manage_unpriv_user_semaphores',`
gen_require(`
attribute unpriv_userdomain;
')
- allow $1 unpriv_userdomain:sem rw_sem_perms; - allow $1 unpriv_userdomain:sem rw_sem_perms;
+ allow $1 admindomain:process dyntransition; + allow $1 unpriv_userdomain:sem create_sem_perms;
') ')
######################################## ########################################
## <summary> ## <summary>
-## Manage unpriviledged user SysV sempaphores. -## Manage unpriviledged user SysV sempaphores.
+## Execute an Xserver session in all unprivileged user domains. This +## Manage unpriviledged user SysV shared
+## is an explicit transition, requiring the +## memory segments.
+## caller to use setexeccon().
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
-## Domain allowed access. @@ -3006,57 +3869,19 @@ interface(`userdom_rw_unpriv_user_semaphores',`
+## Domain allowed to transition.
## </summary> ## </summary>
## </param> ## </param>
# #
-interface(`userdom_manage_unpriv_user_semaphores',` -interface(`userdom_manage_unpriv_user_semaphores',`
+interface(`userdom_xsession_spec_domtrans_unpriv_users',` +interface(`userdom_manage_unpriv_user_shared_mem',`
gen_require(` gen_require(`
attribute unpriv_userdomain; attribute unpriv_userdomain;
') ')
- allow $1 unpriv_userdomain:sem create_sem_perms; - allow $1 unpriv_userdomain:sem create_sem_perms;
+ xserver_xsession_spec_domtrans($1, unpriv_userdomain) + allow $1 unpriv_userdomain:shm create_shm_perms;
+ allow unpriv_userdomain $1:fd use;
+ allow unpriv_userdomain $1:fifo_file rw_file_perms;
+ allow unpriv_userdomain $1:process sigchld;
') ')
-####################################### -#######################################
@ -44753,26 +44789,52 @@ index 9dc60c6..87b5cc3 100644
## <summary> ## <summary>
-## Read and write unpriviledged user SysV shared -## Read and write unpriviledged user SysV shared
-## memory segments. -## memory segments.
+## Manage unpriviledged user SysV sempaphores. -## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`userdom_rw_unpriv_user_shared_mem',`
- gen_require(`
- attribute unpriv_userdomain;
- ')
-
- allow $1 unpriv_userdomain:shm rw_shm_perms;
-')
-
-########################################
-## <summary>
-## Manage unpriviledged user SysV shared
-## memory segments.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`userdom_manage_unpriv_user_shared_mem',`
- gen_require(`
- attribute unpriv_userdomain;
- ')
-
- allow $1 unpriv_userdomain:shm create_shm_perms;
-')
-
-########################################
-## <summary>
-## Execute bin_t in the unprivileged user domains. This
-## is an explicit transition, requiring the
-## caller to use setexeccon().
+## Execute bin_t in the unprivileged user domains. This
+## is an explicit transition, requiring the
+## caller to use setexeccon().
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -3025,12 +3829,12 @@ interface(`userdom_manage_unpriv_user_semaphores',` @@ -3094,7 +3919,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
## </summary>
## </param>
#
-interface(`userdom_rw_unpriv_user_shared_mem',`
+interface(`userdom_manage_unpriv_user_semaphores',`
gen_require(`
attribute unpriv_userdomain;
')
- allow $1 unpriv_userdomain:shm rw_shm_perms;
+ allow $1 unpriv_userdomain:sem create_sem_perms;
')
########################################
@@ -3094,7 +3898,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
domain_entry_file_spec_domtrans($1, unpriv_userdomain) domain_entry_file_spec_domtrans($1, unpriv_userdomain)
allow unpriv_userdomain $1:fd use; allow unpriv_userdomain $1:fd use;
@ -44781,7 +44843,7 @@ index 9dc60c6..87b5cc3 100644
allow unpriv_userdomain $1:process sigchld; allow unpriv_userdomain $1:process sigchld;
') ')
@@ -3110,16 +3914,18 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` @@ -3110,29 +3935,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
# #
interface(`userdom_search_user_home_content',` interface(`userdom_search_user_home_content',`
gen_require(` gen_require(`
@ -44792,33 +44854,11 @@ index 9dc60c6..87b5cc3 100644
files_list_home($1) files_list_home($1)
- allow $1 { user_home_dir_t user_home_t }:dir search_dir_perms; - allow $1 { user_home_dir_t user_home_t }:dir search_dir_perms;
+ allow $1 { user_home_dir_t user_home_type }:dir search_dir_perms;
+ allow $1 { user_home_dir_t user_home_type }:lnk_file read_lnk_file_perms;
')
########################################
## <summary>
-## Send signull to unprivileged user domains.
+## Send general signals to unprivileged user domains.
## </summary>
## <param name="domain">
## <summary>
@@ -3127,30 +3933,12 @@ interface(`userdom_search_user_home_content',`
## </summary>
## </param>
#
-interface(`userdom_signull_unpriv_users',`
+interface(`userdom_signal_unpriv_users',`
gen_require(`
attribute unpriv_userdomain;
')
- allow $1 unpriv_userdomain:process signull;
-') -')
- -
-######################################## -########################################
-## <summary> -## <summary>
-## Send general signals to unprivileged user domains. -## Send signull to unprivileged user domains.
-## </summary> -## </summary>
-## <param name="domain"> -## <param name="domain">
-## <summary> -## <summary>
@ -44826,17 +44866,18 @@ index 9dc60c6..87b5cc3 100644
-## </summary> -## </summary>
-## </param> -## </param>
-# -#
-interface(`userdom_signal_unpriv_users',` -interface(`userdom_signull_unpriv_users',`
- gen_require(` - gen_require(`
- attribute unpriv_userdomain; - attribute unpriv_userdomain;
- ') - ')
- -
- allow $1 unpriv_userdomain:process signal; - allow $1 unpriv_userdomain:process signull;
+ allow $1 unpriv_userdomain:process signal; + allow $1 { user_home_dir_t user_home_type }:dir search_dir_perms;
+ allow $1 { user_home_dir_t user_home_type }:lnk_file read_lnk_file_perms;
') ')
######################################## ########################################
@@ -3214,7 +4002,25 @@ interface(`userdom_dontaudit_use_user_ptys',` @@ -3214,7 +4023,25 @@ interface(`userdom_dontaudit_use_user_ptys',`
type user_devpts_t; type user_devpts_t;
') ')
@ -44863,7 +44904,7 @@ index 9dc60c6..87b5cc3 100644
') ')
######################################## ########################################
@@ -3269,7 +4075,83 @@ interface(`userdom_write_user_tmp_files',` @@ -3269,7 +4096,83 @@ interface(`userdom_write_user_tmp_files',`
type user_tmp_t; type user_tmp_t;
') ')
@ -44948,7 +44989,7 @@ index 9dc60c6..87b5cc3 100644
') ')
######################################## ########################################
@@ -3287,7 +4169,7 @@ interface(`userdom_dontaudit_use_user_ttys',` @@ -3287,7 +4190,7 @@ interface(`userdom_dontaudit_use_user_ttys',`
type user_tty_device_t; type user_tty_device_t;
') ')
@ -44957,7 +44998,7 @@ index 9dc60c6..87b5cc3 100644
') ')
######################################## ########################################
@@ -3306,6 +4188,7 @@ interface(`userdom_read_all_users_state',` @@ -3306,6 +4209,7 @@ interface(`userdom_read_all_users_state',`
') ')
read_files_pattern($1, userdomain, userdomain) read_files_pattern($1, userdomain, userdomain)
@ -44965,7 +45006,7 @@ index 9dc60c6..87b5cc3 100644
kernel_search_proc($1) kernel_search_proc($1)
') ')
@@ -3382,6 +4265,42 @@ interface(`userdom_signal_all_users',` @@ -3382,6 +4286,42 @@ interface(`userdom_signal_all_users',`
allow $1 userdomain:process signal; allow $1 userdomain:process signal;
') ')
@ -45008,7 +45049,7 @@ index 9dc60c6..87b5cc3 100644
######################################## ########################################
## <summary> ## <summary>
## Send a SIGCHLD signal to all user domains. ## Send a SIGCHLD signal to all user domains.
@@ -3402,6 +4321,24 @@ interface(`userdom_sigchld_all_users',` @@ -3402,6 +4342,24 @@ interface(`userdom_sigchld_all_users',`
######################################## ########################################
## <summary> ## <summary>
@ -45033,7 +45074,7 @@ index 9dc60c6..87b5cc3 100644
## Create keys for all user domains. ## Create keys for all user domains.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
@@ -3435,4 +4372,1680 @@ interface(`userdom_dbus_send_all_users',` @@ -3435,4 +4393,1680 @@ interface(`userdom_dbus_send_all_users',`
') ')
allow $1 userdomain:dbus send_msg; allow $1 userdomain:dbus send_msg;
@ -45145,7 +45186,7 @@ index 9dc60c6..87b5cc3 100644
+ tunable_policy(`deny_ptrace',`',` + tunable_policy(`deny_ptrace',`',`
+ allow $1 userdomain:process ptrace; + allow $1 userdomain:process ptrace;
+ ') + ')
+') ')
+ +
+######################################## +########################################
+## <summary> +## <summary>
@ -45202,7 +45243,7 @@ index 9dc60c6..87b5cc3 100644
+ +
+ allow $1 admin_home_t:lnk_file read_lnk_file_perms; + allow $1 admin_home_t:lnk_file read_lnk_file_perms;
+ allow $1 admin_home_t:dir list_dir_perms; + allow $1 admin_home_t:dir list_dir_perms;
') +')
+ +
+######################################## +########################################
+## <summary> +## <summary>
@ -46715,7 +46756,7 @@ index 9dc60c6..87b5cc3 100644
+') +')
+ +
diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te diff --git a/policy/modules/system/userdomain.te b/policy/modules/system/userdomain.te
index f4ac38d..7283238 100644 index f4ac38d..9284c24 100644
--- a/policy/modules/system/userdomain.te --- a/policy/modules/system/userdomain.te
+++ b/policy/modules/system/userdomain.te +++ b/policy/modules/system/userdomain.te
@@ -7,48 +7,43 @@ policy_module(userdomain, 4.9.1) @@ -7,48 +7,43 @@ policy_module(userdomain, 4.9.1)
@ -46804,7 +46845,7 @@ index f4ac38d..7283238 100644
type user_home_dir_t alias { staff_home_dir_t sysadm_home_dir_t secadm_home_dir_t auditadm_home_dir_t unconfined_home_dir_t }; type user_home_dir_t alias { staff_home_dir_t sysadm_home_dir_t secadm_home_dir_t auditadm_home_dir_t unconfined_home_dir_t };
fs_associate_tmpfs(user_home_dir_t) fs_associate_tmpfs(user_home_dir_t)
files_type(user_home_dir_t) files_type(user_home_dir_t)
@@ -70,26 +83,386 @@ ubac_constrained(user_home_dir_t) @@ -70,26 +83,390 @@ ubac_constrained(user_home_dir_t)
type user_home_t alias { staff_home_t sysadm_home_t secadm_home_t auditadm_home_t unconfined_home_t }; type user_home_t alias { staff_home_t sysadm_home_t secadm_home_t auditadm_home_t unconfined_home_t };
typealias user_home_t alias { staff_untrusted_content_t sysadm_untrusted_content_t secadm_untrusted_content_t auditadm_untrusted_content_t unconfined_untrusted_content_t }; typealias user_home_t alias { staff_untrusted_content_t sysadm_untrusted_content_t secadm_untrusted_content_t auditadm_untrusted_content_t unconfined_untrusted_content_t };
@ -46913,6 +46954,7 @@ index f4ac38d..7283238 100644
+ +
+tunable_policy(`use_ecryptfs_home_dirs',` +tunable_policy(`use_ecryptfs_home_dirs',`
+ fs_read_ecryptfs_files(userdom_home_reader_certs_type) + fs_read_ecryptfs_files(userdom_home_reader_certs_type)
+ fs_read_ecryptfs_symlinks(userdom_home_reader_certs_type)
+') +')
+ +
+tunable_policy(`use_nfs_home_dirs',` +tunable_policy(`use_nfs_home_dirs',`
@ -46930,6 +46972,7 @@ index f4ac38d..7283238 100644
+ +
+tunable_policy(`use_ecryptfs_home_dirs',` +tunable_policy(`use_ecryptfs_home_dirs',`
+ fs_read_ecryptfs_files(userdom_home_reader_type) + fs_read_ecryptfs_files(userdom_home_reader_type)
+ fs_read_ecryptfs_symlinks(userdom_home_reader_type)
+') +')
+ +
+tunable_policy(`use_nfs_home_dirs',` +tunable_policy(`use_nfs_home_dirs',`
@ -46954,7 +46997,9 @@ index f4ac38d..7283238 100644
+tunable_policy(`use_ecryptfs_home_dirs',` +tunable_policy(`use_ecryptfs_home_dirs',`
+ fs_manage_ecryptfs_dirs(userdom_home_manager_type) + fs_manage_ecryptfs_dirs(userdom_home_manager_type)
+ fs_manage_ecryptfs_files(userdom_home_manager_type) + fs_manage_ecryptfs_files(userdom_home_manager_type)
+ fs_manage_ecryptfs_symlinks(userdom_home_manager_type)
+') +')
+
+# vi /etc/mtab can cause an avc trying to relabel to self. +# vi /etc/mtab can cause an avc trying to relabel to self.
+dontaudit userdomain self:file relabelto; +dontaudit userdomain self:file relabelto;
+ +

View File

@ -9231,7 +9231,7 @@ index e73fb79..2badfc0 100644
domain_system_change_exemption($1) domain_system_change_exemption($1)
role_transition $2 bitlbee_initrc_exec_t system_r; role_transition $2 bitlbee_initrc_exec_t system_r;
diff --git a/bitlbee.te b/bitlbee.te diff --git a/bitlbee.te b/bitlbee.te
index f5c1a48..7d8669f 100644 index f5c1a48..f255b29 100644
--- a/bitlbee.te --- a/bitlbee.te
+++ b/bitlbee.te +++ b/bitlbee.te
@@ -35,9 +35,12 @@ files_pid_file(bitlbee_var_run_t) @@ -35,9 +35,12 @@ files_pid_file(bitlbee_var_run_t)
@ -9269,7 +9269,17 @@ index f5c1a48..7d8669f 100644
corenet_all_recvfrom_unlabeled(bitlbee_t) corenet_all_recvfrom_unlabeled(bitlbee_t)
corenet_all_recvfrom_netlabel(bitlbee_t) corenet_all_recvfrom_netlabel(bitlbee_t)
@@ -109,16 +114,12 @@ corenet_tcp_sendrecv_interwise_port(bitlbee_t) @@ -98,7 +103,9 @@ corenet_tcp_sendrecv_http_cache_port(bitlbee_t)
corenet_sendrecv_ircd_server_packets(bitlbee_t)
corenet_tcp_bind_ircd_port(bitlbee_t)
+corenet_tcp_bind_interwise_port(bitlbee_t)
corenet_sendrecv_ircd_client_packets(bitlbee_t)
+corenet_tcp_connect_interwise_port(bitlbee_t)
corenet_tcp_connect_ircd_port(bitlbee_t)
corenet_tcp_sendrecv_ircd_port(bitlbee_t)
@@ -109,16 +116,12 @@ corenet_tcp_sendrecv_interwise_port(bitlbee_t)
dev_read_rand(bitlbee_t) dev_read_rand(bitlbee_t)
dev_read_urand(bitlbee_t) dev_read_urand(bitlbee_t)
@ -13147,7 +13157,7 @@ index c223f81..8b567c1 100644
- admin_pattern($1, { httpd_cobbler_content_t httpd_cobbler_content_ra_t httpd_cobbler_content_rw_t }) - admin_pattern($1, { httpd_cobbler_content_t httpd_cobbler_content_ra_t httpd_cobbler_content_rw_t })
') ')
diff --git a/cobbler.te b/cobbler.te diff --git a/cobbler.te b/cobbler.te
index 5f306dd..e01156f 100644 index 5f306dd..1543aec 100644
--- a/cobbler.te --- a/cobbler.te
+++ b/cobbler.te +++ b/cobbler.te
@@ -81,6 +81,7 @@ manage_dirs_pattern(cobblerd_t, cobbler_var_lib_t, cobbler_var_lib_t) @@ -81,6 +81,7 @@ manage_dirs_pattern(cobblerd_t, cobbler_var_lib_t, cobbler_var_lib_t)
@ -13208,7 +13218,7 @@ index 5f306dd..e01156f 100644
') ')
optional_policy(` optional_policy(`
@@ -179,12 +183,22 @@ optional_policy(` @@ -179,12 +183,26 @@ optional_policy(`
optional_policy(` optional_policy(`
dhcpd_domtrans(cobblerd_t) dhcpd_domtrans(cobblerd_t)
dhcpd_initrc_domtrans(cobblerd_t) dhcpd_initrc_domtrans(cobblerd_t)
@ -13223,6 +13233,10 @@ index 5f306dd..e01156f 100644
+') +')
+ +
+optional_policy(` +optional_policy(`
+ gnome_dontaudit_search_config(cobblerd_t)
+')
+
+optional_policy(`
+ libs_exec_ldconfig(cobblerd_t) + libs_exec_ldconfig(cobblerd_t)
+') +')
+ +
@ -13231,7 +13245,7 @@ index 5f306dd..e01156f 100644
') ')
optional_policy(` optional_policy(`
@@ -192,13 +206,13 @@ optional_policy(` @@ -192,13 +210,13 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -18752,14 +18766,21 @@ index 3023be7..303af85 100644
+ files_var_filetrans($1, cupsd_rw_etc_t, dir, "cups") + files_var_filetrans($1, cupsd_rw_etc_t, dir, "cups")
') ')
diff --git a/cups.te b/cups.te diff --git a/cups.te b/cups.te
index c91813c..2230476 100644 index c91813c..dbd69b1 100644
--- a/cups.te --- a/cups.te
+++ b/cups.te +++ b/cups.te
@@ -5,19 +5,24 @@ policy_module(cups, 1.16.2) @@ -5,19 +5,31 @@ policy_module(cups, 1.16.2)
# Declarations # Declarations
# #
-type cupsd_config_t; -type cupsd_config_t;
+## <desc>
+## <p>
+## Allow cups execmem/execstack
+## </p>
+## </desc>
+gen_tunable(cups_execmem, false)
+
+attribute cups_domain; +attribute cups_domain;
+ +
+type cupsd_config_t, cups_domain; +type cupsd_config_t, cups_domain;
@ -18782,7 +18803,7 @@ index c91813c..2230476 100644
files_config_file(cupsd_etc_t) files_config_file(cupsd_etc_t)
type cupsd_initrc_exec_t; type cupsd_initrc_exec_t;
@@ -33,13 +38,15 @@ type cupsd_lock_t; @@ -33,13 +45,15 @@ type cupsd_lock_t;
files_lock_file(cupsd_lock_t) files_lock_file(cupsd_lock_t)
type cupsd_log_t; type cupsd_log_t;
@ -18802,7 +18823,7 @@ index c91813c..2230476 100644
type cupsd_lpd_tmp_t; type cupsd_lpd_tmp_t;
files_tmp_file(cupsd_lpd_tmp_t) files_tmp_file(cupsd_lpd_tmp_t)
@@ -47,7 +54,7 @@ files_tmp_file(cupsd_lpd_tmp_t) @@ -47,7 +61,7 @@ files_tmp_file(cupsd_lpd_tmp_t)
type cupsd_lpd_var_run_t; type cupsd_lpd_var_run_t;
files_pid_file(cupsd_lpd_var_run_t) files_pid_file(cupsd_lpd_var_run_t)
@ -18811,7 +18832,7 @@ index c91813c..2230476 100644
type cups_pdf_exec_t; type cups_pdf_exec_t;
cups_backend(cups_pdf_t, cups_pdf_exec_t) cups_backend(cups_pdf_t, cups_pdf_exec_t)
@@ -55,29 +62,17 @@ type cups_pdf_tmp_t; @@ -55,29 +69,17 @@ type cups_pdf_tmp_t;
files_tmp_file(cups_pdf_tmp_t) files_tmp_file(cups_pdf_tmp_t)
type cupsd_tmp_t; type cupsd_tmp_t;
@ -18845,7 +18866,7 @@ index c91813c..2230476 100644
type ptal_t; type ptal_t;
type ptal_exec_t; type ptal_exec_t;
@@ -97,21 +92,49 @@ ifdef(`enable_mls',` @@ -97,21 +99,49 @@ ifdef(`enable_mls',`
init_ranged_daemon_domain(cupsd_t, cupsd_exec_t, mls_systemhigh) init_ranged_daemon_domain(cupsd_t, cupsd_exec_t, mls_systemhigh)
') ')
@ -18899,7 +18920,7 @@ index c91813c..2230476 100644
allow cupsd_t self:appletalk_socket create_socket_perms; allow cupsd_t self:appletalk_socket create_socket_perms;
allow cupsd_t cupsd_etc_t:dir setattr_dir_perms; allow cupsd_t cupsd_etc_t:dir setattr_dir_perms;
@@ -120,11 +143,13 @@ read_files_pattern(cupsd_t, cupsd_etc_t, cupsd_etc_t) @@ -120,11 +150,14 @@ read_files_pattern(cupsd_t, cupsd_etc_t, cupsd_etc_t)
read_lnk_files_pattern(cupsd_t, cupsd_etc_t, cupsd_etc_t) read_lnk_files_pattern(cupsd_t, cupsd_etc_t, cupsd_etc_t)
manage_files_pattern(cupsd_t, cupsd_interface_t, cupsd_interface_t) manage_files_pattern(cupsd_t, cupsd_interface_t, cupsd_interface_t)
@ -18910,10 +18931,11 @@ index c91813c..2230476 100644
filetrans_pattern(cupsd_t, cupsd_etc_t, cupsd_rw_etc_t, file) filetrans_pattern(cupsd_t, cupsd_etc_t, cupsd_rw_etc_t, file)
files_var_filetrans(cupsd_t, cupsd_rw_etc_t, { dir file }) files_var_filetrans(cupsd_t, cupsd_rw_etc_t, { dir file })
+cups_filetrans_named_content(cupsd_t) +cups_filetrans_named_content(cupsd_t)
+can_exec(cupsd_t, cupsd_rw_etc_t)
allow cupsd_t cupsd_exec_t:dir search_dir_perms; allow cupsd_t cupsd_exec_t:dir search_dir_perms;
allow cupsd_t cupsd_exec_t:lnk_file read_lnk_file_perms; allow cupsd_t cupsd_exec_t:lnk_file read_lnk_file_perms;
@@ -136,22 +161,23 @@ manage_dirs_pattern(cupsd_t, cupsd_log_t, cupsd_log_t) @@ -136,22 +169,23 @@ manage_dirs_pattern(cupsd_t, cupsd_log_t, cupsd_log_t)
manage_files_pattern(cupsd_t, cupsd_log_t, cupsd_log_t) manage_files_pattern(cupsd_t, cupsd_log_t, cupsd_log_t)
logging_log_filetrans(cupsd_t, cupsd_log_t, { file dir }) logging_log_filetrans(cupsd_t, cupsd_log_t, { file dir })
@ -18941,7 +18963,7 @@ index c91813c..2230476 100644
stream_connect_pattern(cupsd_t, ptal_var_run_t, ptal_var_run_t, ptal_t) stream_connect_pattern(cupsd_t, ptal_var_run_t, ptal_var_run_t, ptal_t)
allow cupsd_t ptal_var_run_t:sock_file setattr_sock_file_perms; allow cupsd_t ptal_var_run_t:sock_file setattr_sock_file_perms;
@@ -159,11 +185,9 @@ allow cupsd_t ptal_var_run_t:sock_file setattr_sock_file_perms; @@ -159,11 +193,9 @@ allow cupsd_t ptal_var_run_t:sock_file setattr_sock_file_perms;
can_exec(cupsd_t, { cupsd_exec_t cupsd_interface_t }) can_exec(cupsd_t, { cupsd_exec_t cupsd_interface_t })
kernel_read_system_state(cupsd_t) kernel_read_system_state(cupsd_t)
@ -18953,7 +18975,7 @@ index c91813c..2230476 100644
corenet_all_recvfrom_netlabel(cupsd_t) corenet_all_recvfrom_netlabel(cupsd_t)
corenet_tcp_sendrecv_generic_if(cupsd_t) corenet_tcp_sendrecv_generic_if(cupsd_t)
corenet_udp_sendrecv_generic_if(cupsd_t) corenet_udp_sendrecv_generic_if(cupsd_t)
@@ -186,12 +210,20 @@ corenet_dontaudit_tcp_bind_all_reserved_ports(cupsd_t) @@ -186,12 +218,20 @@ corenet_dontaudit_tcp_bind_all_reserved_ports(cupsd_t)
corenet_tcp_bind_all_rpc_ports(cupsd_t) corenet_tcp_bind_all_rpc_ports(cupsd_t)
corenet_tcp_connect_all_ports(cupsd_t) corenet_tcp_connect_all_ports(cupsd_t)
@ -18978,7 +19000,7 @@ index c91813c..2230476 100644
dev_rw_input_dev(cupsd_t) dev_rw_input_dev(cupsd_t)
dev_rw_generic_usb_dev(cupsd_t) dev_rw_generic_usb_dev(cupsd_t)
dev_rw_usbfs(cupsd_t) dev_rw_usbfs(cupsd_t)
@@ -203,7 +235,6 @@ domain_use_interactive_fds(cupsd_t) @@ -203,7 +243,6 @@ domain_use_interactive_fds(cupsd_t)
files_getattr_boot_dirs(cupsd_t) files_getattr_boot_dirs(cupsd_t)
files_list_spool(cupsd_t) files_list_spool(cupsd_t)
files_read_etc_runtime_files(cupsd_t) files_read_etc_runtime_files(cupsd_t)
@ -18986,7 +19008,7 @@ index c91813c..2230476 100644
files_exec_usr_files(cupsd_t) files_exec_usr_files(cupsd_t)
# for /var/lib/defoma # for /var/lib/defoma
files_read_var_lib_files(cupsd_t) files_read_var_lib_files(cupsd_t)
@@ -212,17 +243,19 @@ files_read_world_readable_files(cupsd_t) @@ -212,17 +251,19 @@ files_read_world_readable_files(cupsd_t)
files_read_world_readable_symlinks(cupsd_t) files_read_world_readable_symlinks(cupsd_t)
files_read_var_files(cupsd_t) files_read_var_files(cupsd_t)
files_read_var_symlinks(cupsd_t) files_read_var_symlinks(cupsd_t)
@ -19008,7 +19030,7 @@ index c91813c..2230476 100644
mls_fd_use_all_levels(cupsd_t) mls_fd_use_all_levels(cupsd_t)
mls_file_downgrade(cupsd_t) mls_file_downgrade(cupsd_t)
mls_file_write_all_levels(cupsd_t) mls_file_write_all_levels(cupsd_t)
@@ -232,6 +265,8 @@ mls_socket_write_all_levels(cupsd_t) @@ -232,6 +273,8 @@ mls_socket_write_all_levels(cupsd_t)
term_search_ptys(cupsd_t) term_search_ptys(cupsd_t)
term_use_unallocated_ttys(cupsd_t) term_use_unallocated_ttys(cupsd_t)
@ -19017,7 +19039,7 @@ index c91813c..2230476 100644
selinux_compute_access_vector(cupsd_t) selinux_compute_access_vector(cupsd_t)
selinux_validate_context(cupsd_t) selinux_validate_context(cupsd_t)
@@ -244,21 +279,21 @@ auth_dontaudit_read_pam_pid(cupsd_t) @@ -244,23 +287,28 @@ auth_dontaudit_read_pam_pid(cupsd_t)
auth_rw_faillog(cupsd_t) auth_rw_faillog(cupsd_t)
auth_use_nsswitch(cupsd_t) auth_use_nsswitch(cupsd_t)
@ -19043,8 +19065,15 @@ index c91813c..2230476 100644
+userdom_dontaudit_use_unpriv_user_fds(cupsd_t) +userdom_dontaudit_use_unpriv_user_fds(cupsd_t)
userdom_dontaudit_search_user_home_content(cupsd_t) userdom_dontaudit_search_user_home_content(cupsd_t)
+tunable_policy(`cups_execmem',`
+ allow cupsd_t self:process { execmem execstack };
+')
+
+
optional_policy(` optional_policy(`
@@ -272,6 +307,8 @@ optional_policy(` apm_domtrans_client(cupsd_t)
')
@@ -272,6 +320,8 @@ optional_policy(`
optional_policy(` optional_policy(`
dbus_system_bus_client(cupsd_t) dbus_system_bus_client(cupsd_t)
@ -19053,7 +19082,7 @@ index c91813c..2230476 100644
userdom_dbus_send_all_users(cupsd_t) userdom_dbus_send_all_users(cupsd_t)
optional_policy(` optional_policy(`
@@ -282,8 +319,10 @@ optional_policy(` @@ -282,8 +332,10 @@ optional_policy(`
hal_dbus_chat(cupsd_t) hal_dbus_chat(cupsd_t)
') ')
@ -19064,7 +19093,7 @@ index c91813c..2230476 100644
') ')
') ')
@@ -296,8 +335,8 @@ optional_policy(` @@ -296,8 +348,8 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -19074,7 +19103,7 @@ index c91813c..2230476 100644
') ')
optional_policy(` optional_policy(`
@@ -306,7 +345,6 @@ optional_policy(` @@ -306,7 +358,6 @@ optional_policy(`
optional_policy(` optional_policy(`
lpd_exec_lpr(cupsd_t) lpd_exec_lpr(cupsd_t)
@ -19082,7 +19111,7 @@ index c91813c..2230476 100644
lpd_read_config(cupsd_t) lpd_read_config(cupsd_t)
lpd_relabel_spool(cupsd_t) lpd_relabel_spool(cupsd_t)
') ')
@@ -334,7 +372,11 @@ optional_policy(` @@ -334,7 +385,11 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -19095,7 +19124,7 @@ index c91813c..2230476 100644
') ')
######################################## ########################################
@@ -342,12 +384,11 @@ optional_policy(` @@ -342,12 +397,11 @@ optional_policy(`
# Configuration daemon local policy # Configuration daemon local policy
# #
@ -19111,7 +19140,7 @@ index c91813c..2230476 100644
allow cupsd_config_t cupsd_t:process signal; allow cupsd_config_t cupsd_t:process signal;
ps_process_pattern(cupsd_config_t, cupsd_t) ps_process_pattern(cupsd_config_t, cupsd_t)
@@ -372,18 +413,16 @@ manage_dirs_pattern(cupsd_config_t, cupsd_config_var_run_t, cupsd_config_var_run @@ -372,18 +426,16 @@ manage_dirs_pattern(cupsd_config_t, cupsd_config_var_run_t, cupsd_config_var_run
manage_files_pattern(cupsd_config_t, cupsd_config_var_run_t, cupsd_config_var_run_t) manage_files_pattern(cupsd_config_t, cupsd_config_var_run_t, cupsd_config_var_run_t)
files_pid_filetrans(cupsd_config_t, cupsd_config_var_run_t, { dir file }) files_pid_filetrans(cupsd_config_t, cupsd_config_var_run_t, { dir file })
@ -19132,7 +19161,7 @@ index c91813c..2230476 100644
corenet_all_recvfrom_netlabel(cupsd_config_t) corenet_all_recvfrom_netlabel(cupsd_config_t)
corenet_tcp_sendrecv_generic_if(cupsd_config_t) corenet_tcp_sendrecv_generic_if(cupsd_config_t)
corenet_tcp_sendrecv_generic_node(cupsd_config_t) corenet_tcp_sendrecv_generic_node(cupsd_config_t)
@@ -392,20 +431,12 @@ corenet_tcp_sendrecv_all_ports(cupsd_config_t) @@ -392,20 +444,12 @@ corenet_tcp_sendrecv_all_ports(cupsd_config_t)
corenet_sendrecv_all_client_packets(cupsd_config_t) corenet_sendrecv_all_client_packets(cupsd_config_t)
corenet_tcp_connect_all_ports(cupsd_config_t) corenet_tcp_connect_all_ports(cupsd_config_t)
@ -19153,7 +19182,7 @@ index c91813c..2230476 100644
fs_search_auto_mountpoints(cupsd_config_t) fs_search_auto_mountpoints(cupsd_config_t)
domain_use_interactive_fds(cupsd_config_t) domain_use_interactive_fds(cupsd_config_t)
@@ -417,11 +448,6 @@ auth_use_nsswitch(cupsd_config_t) @@ -417,11 +461,6 @@ auth_use_nsswitch(cupsd_config_t)
logging_send_syslog_msg(cupsd_config_t) logging_send_syslog_msg(cupsd_config_t)
@ -19165,7 +19194,7 @@ index c91813c..2230476 100644
userdom_dontaudit_use_unpriv_user_fds(cupsd_config_t) userdom_dontaudit_use_unpriv_user_fds(cupsd_config_t)
userdom_dontaudit_search_user_home_dirs(cupsd_config_t) userdom_dontaudit_search_user_home_dirs(cupsd_config_t)
userdom_read_all_users_state(cupsd_config_t) userdom_read_all_users_state(cupsd_config_t)
@@ -449,9 +475,12 @@ optional_policy(` @@ -449,9 +488,12 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -19179,7 +19208,7 @@ index c91813c..2230476 100644
') ')
optional_policy(` optional_policy(`
@@ -487,10 +516,6 @@ optional_policy(` @@ -487,10 +529,6 @@ optional_policy(`
# Lpd local policy # Lpd local policy
# #
@ -19190,7 +19219,7 @@ index c91813c..2230476 100644
allow cupsd_lpd_t self:netlink_tcpdiag_socket r_netlink_socket_perms; allow cupsd_lpd_t self:netlink_tcpdiag_socket r_netlink_socket_perms;
allow cupsd_lpd_t { cupsd_etc_t cupsd_rw_etc_t }:dir list_dir_perms; allow cupsd_lpd_t { cupsd_etc_t cupsd_rw_etc_t }:dir list_dir_perms;
@@ -508,15 +533,15 @@ stream_connect_pattern(cupsd_lpd_t, cupsd_var_run_t, cupsd_var_run_t, cupsd_t) @@ -508,15 +546,15 @@ stream_connect_pattern(cupsd_lpd_t, cupsd_var_run_t, cupsd_var_run_t, cupsd_t)
kernel_read_kernel_sysctls(cupsd_lpd_t) kernel_read_kernel_sysctls(cupsd_lpd_t)
kernel_read_system_state(cupsd_lpd_t) kernel_read_system_state(cupsd_lpd_t)
@ -19208,7 +19237,7 @@ index c91813c..2230476 100644
corenet_tcp_sendrecv_ipp_port(cupsd_lpd_t) corenet_tcp_sendrecv_ipp_port(cupsd_lpd_t)
corenet_sendrecv_printer_server_packets(cupsd_lpd_t) corenet_sendrecv_printer_server_packets(cupsd_lpd_t)
@@ -537,9 +562,6 @@ auth_use_nsswitch(cupsd_lpd_t) @@ -537,9 +575,6 @@ auth_use_nsswitch(cupsd_lpd_t)
logging_send_syslog_msg(cupsd_lpd_t) logging_send_syslog_msg(cupsd_lpd_t)
@ -19218,7 +19247,7 @@ index c91813c..2230476 100644
optional_policy(` optional_policy(`
inetd_service_domain(cupsd_lpd_t, cupsd_lpd_exec_t) inetd_service_domain(cupsd_lpd_t, cupsd_lpd_exec_t)
') ')
@@ -550,7 +572,6 @@ optional_policy(` @@ -550,7 +585,6 @@ optional_policy(`
# #
allow cups_pdf_t self:capability { chown fowner fsetid setuid setgid dac_override }; allow cups_pdf_t self:capability { chown fowner fsetid setuid setgid dac_override };
@ -19226,7 +19255,7 @@ index c91813c..2230476 100644
allow cups_pdf_t self:unix_stream_socket create_stream_socket_perms; allow cups_pdf_t self:unix_stream_socket create_stream_socket_perms;
append_files_pattern(cups_pdf_t, cupsd_log_t, cupsd_log_t) append_files_pattern(cups_pdf_t, cupsd_log_t, cupsd_log_t)
@@ -566,148 +587,23 @@ fs_search_auto_mountpoints(cups_pdf_t) @@ -566,148 +600,23 @@ fs_search_auto_mountpoints(cups_pdf_t)
kernel_read_system_state(cups_pdf_t) kernel_read_system_state(cups_pdf_t)
@ -19255,13 +19284,11 @@ index c91813c..2230476 100644
- fs_manage_cifs_dirs(cups_pdf_t) - fs_manage_cifs_dirs(cups_pdf_t)
- fs_manage_cifs_files(cups_pdf_t) - fs_manage_cifs_files(cups_pdf_t)
-') -')
+userdom_home_manager(cups_pdf_t) -
-optional_policy(`
optional_policy(`
- lpd_manage_spool(cups_pdf_t) - lpd_manage_spool(cups_pdf_t)
+ gnome_read_config(cups_pdf_t) -')
') -
-######################################## -########################################
-# -#
-# HPLIP local policy -# HPLIP local policy
@ -19350,15 +19377,17 @@ index c91813c..2230476 100644
-userdom_dontaudit_use_unpriv_user_fds(hplip_t) -userdom_dontaudit_use_unpriv_user_fds(hplip_t)
-userdom_dontaudit_search_user_home_dirs(hplip_t) -userdom_dontaudit_search_user_home_dirs(hplip_t)
-userdom_dontaudit_search_user_home_content(hplip_t) -userdom_dontaudit_search_user_home_content(hplip_t)
- +userdom_home_manager(cups_pdf_t)
-optional_policy(`
optional_policy(`
- dbus_system_bus_client(hplip_t) - dbus_system_bus_client(hplip_t)
- -
- optional_policy(` - optional_policy(`
- userdom_dbus_send_all_users(hplip_t) - userdom_dbus_send_all_users(hplip_t)
- ') - ')
-') + gnome_read_config(cups_pdf_t)
- ')
-optional_policy(` -optional_policy(`
- lpd_read_config(hplip_t) - lpd_read_config(hplip_t)
- lpd_manage_spool(hplip_t) - lpd_manage_spool(hplip_t)
@ -19378,7 +19407,7 @@ index c91813c..2230476 100644
######################################## ########################################
# #
@@ -735,7 +631,6 @@ kernel_read_kernel_sysctls(ptal_t) @@ -735,7 +644,6 @@ kernel_read_kernel_sysctls(ptal_t)
kernel_list_proc(ptal_t) kernel_list_proc(ptal_t)
kernel_read_proc_symlinks(ptal_t) kernel_read_proc_symlinks(ptal_t)
@ -19386,7 +19415,7 @@ index c91813c..2230476 100644
corenet_all_recvfrom_netlabel(ptal_t) corenet_all_recvfrom_netlabel(ptal_t)
corenet_tcp_sendrecv_generic_if(ptal_t) corenet_tcp_sendrecv_generic_if(ptal_t)
corenet_tcp_sendrecv_generic_node(ptal_t) corenet_tcp_sendrecv_generic_node(ptal_t)
@@ -745,13 +640,11 @@ corenet_sendrecv_ptal_server_packets(ptal_t) @@ -745,13 +653,11 @@ corenet_sendrecv_ptal_server_packets(ptal_t)
corenet_tcp_bind_ptal_port(ptal_t) corenet_tcp_bind_ptal_port(ptal_t)
corenet_tcp_sendrecv_ptal_port(ptal_t) corenet_tcp_sendrecv_ptal_port(ptal_t)
@ -19400,7 +19429,7 @@ index c91813c..2230476 100644
files_read_etc_runtime_files(ptal_t) files_read_etc_runtime_files(ptal_t)
fs_getattr_all_fs(ptal_t) fs_getattr_all_fs(ptal_t)
@@ -759,8 +652,6 @@ fs_search_auto_mountpoints(ptal_t) @@ -759,8 +665,6 @@ fs_search_auto_mountpoints(ptal_t)
logging_send_syslog_msg(ptal_t) logging_send_syslog_msg(ptal_t)
@ -19409,7 +19438,7 @@ index c91813c..2230476 100644
sysnet_read_config(ptal_t) sysnet_read_config(ptal_t)
userdom_dontaudit_use_unpriv_user_fds(ptal_t) userdom_dontaudit_use_unpriv_user_fds(ptal_t)
@@ -773,3 +664,4 @@ optional_policy(` @@ -773,3 +677,4 @@ optional_policy(`
optional_policy(` optional_policy(`
udev_read_db(ptal_t) udev_read_db(ptal_t)
') ')
@ -23805,10 +23834,10 @@ index 0000000..fd679a1
+/var/lib/docker/.*/config\.env gen_context(system_u:object_r:docker_share_t,s0) +/var/lib/docker/.*/config\.env gen_context(system_u:object_r:docker_share_t,s0)
diff --git a/docker.if b/docker.if diff --git a/docker.if b/docker.if
new file mode 100644 new file mode 100644
index 0000000..1048292 index 0000000..76eb32e
--- /dev/null --- /dev/null
+++ b/docker.if +++ b/docker.if
@@ -0,0 +1,345 @@ @@ -0,0 +1,364 @@
+ +
+## <summary>The open-source application container engine.</summary> +## <summary>The open-source application container engine.</summary>
+ +
@ -23833,6 +23862,25 @@ index 0000000..1048292
+ +
+######################################## +########################################
+## <summary> +## <summary>
+## Execute docker in the caller domain.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed to transition.
+## </summary>
+## </param>
+#
+interface(`docker_exec',`
+ gen_require(`
+ type docker_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, docker_exec_t)
+')
+
+########################################
+## <summary>
+## Search docker lib directories. +## Search docker lib directories.
+## </summary> +## </summary>
+## <param name="domain"> +## <param name="domain">
@ -28316,10 +28364,10 @@ index 0000000..04e159f
+') +')
diff --git a/gear.te b/gear.te diff --git a/gear.te b/gear.te
new file mode 100644 new file mode 100644
index 0000000..cb68ca9 index 0000000..91ed5f4
--- /dev/null --- /dev/null
+++ b/gear.te +++ b/gear.te
@@ -0,0 +1,125 @@ @@ -0,0 +1,134 @@
+policy_module(gear, 1.0.0) +policy_module(gear, 1.0.0)
+ +
+######################################## +########################################
@ -28348,13 +28396,17 @@ index 0000000..cb68ca9
+# gear local policy +# gear local policy
+# +#
+allow gear_t self:capability { chown net_admin fowner dac_override }; +allow gear_t self:capability { chown net_admin fowner dac_override };
+dontaudit gear_t self:capability sys_ptrace;
+allow gear_t self:capability2 block_suspend; +allow gear_t self:capability2 block_suspend;
+allow gear_t self:process { getattr signal_perms }; +allow gear_t self:process { getattr signal_perms };
+allow gear_t self:fifo_file rw_fifo_file_perms; +allow gear_t self:fifo_file rw_fifo_file_perms;
+allow gear_t self:unix_stream_socket create_stream_socket_perms; +allow gear_t self:unix_stream_socket create_stream_socket_perms;
+allow gear_t self:tcp_socket create_stream_socket_perms; +allow gear_t self:tcp_socket create_stream_socket_perms;
+ +
+allow gear_t gear_unit_file_t:file read_file_perms;
+allow gear_t gear_unit_file_t:service manage_service_perms;
+allow gear_t gear_unit_file_t:dir { relabelfrom relabelto }; +allow gear_t gear_unit_file_t:dir { relabelfrom relabelto };
+manage_dirs_pattern(gear_t, gear_unit_file_t, gear_unit_file_t)
+ +
+manage_dirs_pattern(gear_t, gear_log_t, gear_log_t) +manage_dirs_pattern(gear_t, gear_log_t, gear_log_t)
+manage_files_pattern(gear_t, gear_log_t, gear_log_t) +manage_files_pattern(gear_t, gear_log_t, gear_log_t)
@ -28376,6 +28428,7 @@ index 0000000..cb68ca9
+manage_sock_files_pattern(gear_t, gear_var_run_t, gear_var_run_t) +manage_sock_files_pattern(gear_t, gear_var_run_t, gear_var_run_t)
+manage_lnk_files_pattern(gear_t, gear_var_run_t, gear_var_run_t) +manage_lnk_files_pattern(gear_t, gear_var_run_t, gear_var_run_t)
+files_pid_filetrans(gear_t, gear_var_run_t, { dir file lnk_file sock_file }) +files_pid_filetrans(gear_t, gear_var_run_t, { dir file lnk_file sock_file })
+init_pid_filetrans(gear_t, gear_var_run_t, { dir file lnk_file sock_file })
+ +
+kernel_read_system_state(gear_t) +kernel_read_system_state(gear_t)
+kernel_read_network_state(gear_t) +kernel_read_network_state(gear_t)
@ -28401,8 +28454,10 @@ index 0000000..cb68ca9
+files_mounton_rootfs(gear_t) +files_mounton_rootfs(gear_t)
+files_read_etc_files(gear_t) +files_read_etc_files(gear_t)
+ +
+fs_list_cgroup_dirs(gear_t)
+fs_read_cgroup_files(gear_t) +fs_read_cgroup_files(gear_t)
+fs_read_tmpfs_symlinks(gear_t) +fs_read_tmpfs_symlinks(gear_t)
+fs_getattr_all_fs(gear_t)
+ +
+auth_use_nsswitch(gear_t) +auth_use_nsswitch(gear_t)
+ +
@ -28414,6 +28469,7 @@ index 0000000..cb68ca9
+ +
+logging_send_audit_msgs(gear_t) +logging_send_audit_msgs(gear_t)
+logging_send_syslog_msg(gear_t) +logging_send_syslog_msg(gear_t)
+logging_read_generic_logs(gear_t)
+ +
+miscfiles_read_localization(gear_t) +miscfiles_read_localization(gear_t)
+ +
@ -28427,6 +28483,7 @@ index 0000000..cb68ca9
+sysnet_manage_ifconfig_run(gear_t) +sysnet_manage_ifconfig_run(gear_t)
+ +
+systemd_manage_all_unit_files(gear_t) +systemd_manage_all_unit_files(gear_t)
+systemd_exec_systemctl(gear_t)
+ +
+optional_policy(` +optional_policy(`
+ hostname_exec(gear_t) + hostname_exec(gear_t)
@ -28621,10 +28678,10 @@ index 0000000..9e17d3e
+') +')
diff --git a/geoclue.te b/geoclue.te diff --git a/geoclue.te b/geoclue.te
new file mode 100644 new file mode 100644
index 0000000..351f145 index 0000000..204995f
--- /dev/null --- /dev/null
+++ b/geoclue.te +++ b/geoclue.te
@@ -0,0 +1,53 @@ @@ -0,0 +1,54 @@
+policy_module(geoclue, 1.0.0) +policy_module(geoclue, 1.0.0)
+ +
+######################################## +########################################
@ -28647,6 +28704,7 @@ index 0000000..351f145
+# +#
+# geoclue local policy +# geoclue local policy
+# +#
+allow geoclue_t self:unix_dgram_socket create_socket_perms;
+ +
+manage_dirs_pattern(geoclue_t, geoclue_var_lib_t, geoclue_var_lib_t) +manage_dirs_pattern(geoclue_t, geoclue_var_lib_t, geoclue_var_lib_t)
+manage_files_pattern(geoclue_t, geoclue_var_lib_t, geoclue_var_lib_t) +manage_files_pattern(geoclue_t, geoclue_var_lib_t, geoclue_var_lib_t)
@ -37100,10 +37158,10 @@ index 0000000..0d61849
+') +')
diff --git a/keepalived.te b/keepalived.te diff --git a/keepalived.te b/keepalived.te
new file mode 100644 new file mode 100644
index 0000000..535f79b index 0000000..2c08717
--- /dev/null --- /dev/null
+++ b/keepalived.te +++ b/keepalived.te
@@ -0,0 +1,47 @@ @@ -0,0 +1,55 @@
+policy_module(keepalived, 1.0.0) +policy_module(keepalived, 1.0.0)
+ +
+######################################## +########################################
@ -37139,6 +37197,11 @@ index 0000000..535f79b
+kernel_read_system_state(keepalived_t) +kernel_read_system_state(keepalived_t)
+kernel_read_network_state(keepalived_t) +kernel_read_network_state(keepalived_t)
+ +
+corecmd_exec_bin(keepalived_t)
+corecmd_exec_shell(keepalived_t)
+
+corenet_tcp_connect_snmp_port(keepalived_t)
+
+auth_use_nsswitch(keepalived_t) +auth_use_nsswitch(keepalived_t)
+ +
+corenet_tcp_connect_connlcli_port(keepalived_t) +corenet_tcp_connect_connlcli_port(keepalived_t)
@ -37151,6 +37214,9 @@ index 0000000..535f79b
+ +
+logging_send_syslog_msg(keepalived_t) +logging_send_syslog_msg(keepalived_t)
+ +
+optional_policy(`
+ snmp_read_snmp_var_lib_files(keepalived_t)
+')
diff --git a/kerberos.fc b/kerberos.fc diff --git a/kerberos.fc b/kerberos.fc
index 4fe75fd..b029c28 100644 index 4fe75fd..b029c28 100644
--- a/kerberos.fc --- a/kerberos.fc
@ -40291,7 +40357,7 @@ index dd8e01a..9cd6b0b 100644
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
diff --git a/logrotate.te b/logrotate.te diff --git a/logrotate.te b/logrotate.te
index be0ab84..f4550f1 100644 index be0ab84..44689e1 100644
--- a/logrotate.te --- a/logrotate.te
+++ b/logrotate.te +++ b/logrotate.te
@@ -5,16 +5,22 @@ policy_module(logrotate, 1.15.0) @@ -5,16 +5,22 @@ policy_module(logrotate, 1.15.0)
@ -40488,7 +40554,7 @@ index be0ab84..f4550f1 100644
') ')
optional_policy(` optional_policy(`
@@ -170,6 +216,10 @@ optional_policy(` @@ -170,6 +216,11 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -40496,10 +40562,11 @@ index be0ab84..f4550f1 100644
+') +')
+ +
+optional_policy(` +optional_policy(`
+ fail2ban_domtrans_client(logrotate_t)
fail2ban_stream_connect(logrotate_t) fail2ban_stream_connect(logrotate_t)
') ')
@@ -178,7 +228,7 @@ optional_policy(` @@ -178,7 +229,7 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -40508,7 +40575,7 @@ index be0ab84..f4550f1 100644
') ')
optional_policy(` optional_policy(`
@@ -198,21 +248,26 @@ optional_policy(` @@ -198,21 +249,26 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -40539,7 +40606,7 @@ index be0ab84..f4550f1 100644
') ')
optional_policy(` optional_policy(`
@@ -228,10 +283,21 @@ optional_policy(` @@ -228,10 +284,21 @@ optional_policy(`
') ')
optional_policy(` optional_policy(`
@ -40561,7 +40628,7 @@ index be0ab84..f4550f1 100644
su_exec(logrotate_t) su_exec(logrotate_t)
') ')
@@ -241,13 +307,11 @@ optional_policy(` @@ -241,13 +308,11 @@ optional_policy(`
####################################### #######################################
# #
@ -44972,7 +45039,7 @@ index 6ffaba2..549fb8c 100644
+/usr/lib/nspluginwrapper/plugin-config -- gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0) +/usr/lib/nspluginwrapper/plugin-config -- gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0)
+') +')
diff --git a/mozilla.if b/mozilla.if diff --git a/mozilla.if b/mozilla.if
index 6194b80..cafb2b0 100644 index 6194b80..7490fe3 100644
--- a/mozilla.if --- a/mozilla.if
+++ b/mozilla.if +++ b/mozilla.if
@@ -1,146 +1,75 @@ @@ -1,146 +1,75 @@
@ -45258,7 +45325,7 @@ index 6194b80..cafb2b0 100644
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -265,140 +173,155 @@ interface(`mozilla_exec_user_plugin_home_files',` @@ -265,140 +173,156 @@ interface(`mozilla_exec_user_plugin_home_files',`
## </param> ## </param>
# #
interface(`mozilla_execmod_user_home_files',` interface(`mozilla_execmod_user_home_files',`
@ -45362,7 +45429,8 @@ index 6194b80..cafb2b0 100644
+ allow $1 mozilla_plugin_t:shm rw_shm_perms; + allow $1 mozilla_plugin_t:shm rw_shm_perms;
+ +
+ ps_process_pattern($1, mozilla_plugin_t) + ps_process_pattern($1, mozilla_plugin_t)
+ allow $1 mozilla_plugin_t:process signal_perms; + ps_process_pattern(mozilla_plugin_t, $1)
+ allow $1 mozilla_plugin_t:process { signal_perms noatsecure };
+ +
+ list_dirs_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t) + list_dirs_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
+ read_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t) + read_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
@ -45474,7 +45542,7 @@ index 6194b80..cafb2b0 100644
') ')
######################################## ########################################
@@ -424,8 +347,7 @@ interface(`mozilla_dbus_chat',` @@ -424,8 +348,7 @@ interface(`mozilla_dbus_chat',`
######################################## ########################################
## <summary> ## <summary>
@ -45484,7 +45552,7 @@ index 6194b80..cafb2b0 100644
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -433,76 +355,144 @@ interface(`mozilla_dbus_chat',` @@ -433,76 +356,144 @@ interface(`mozilla_dbus_chat',`
## </summary> ## </summary>
## </param> ## </param>
# #
@ -45658,7 +45726,7 @@ index 6194b80..cafb2b0 100644
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -510,19 +500,18 @@ interface(`mozilla_plugin_read_tmpfs_files',` @@ -510,19 +501,18 @@ interface(`mozilla_plugin_read_tmpfs_files',`
## </summary> ## </summary>
## </param> ## </param>
# #
@ -45683,7 +45751,7 @@ index 6194b80..cafb2b0 100644
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## <summary> ## <summary>
@@ -530,45 +519,57 @@ interface(`mozilla_plugin_delete_tmpfs_files',` @@ -530,45 +520,57 @@ interface(`mozilla_plugin_delete_tmpfs_files',`
## </summary> ## </summary>
## </param> ## </param>
# #
@ -49123,7 +49191,7 @@ index b744fe3..50c386e 100644
+ admin_pattern($1, munin_content_t) + admin_pattern($1, munin_content_t)
') ')
diff --git a/munin.te b/munin.te diff --git a/munin.te b/munin.te
index b708708..7bdfb65 100644 index b708708..78fa61c 100644
--- a/munin.te --- a/munin.te
+++ b/munin.te +++ b/munin.te
@@ -44,41 +44,40 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t) @@ -44,41 +44,40 @@ files_tmpfs_file(services_munin_plugin_tmpfs_t)
@ -49342,7 +49410,7 @@ index b708708..7bdfb65 100644
dev_read_sysfs(system_munin_plugin_t) dev_read_sysfs(system_munin_plugin_t)
dev_read_urand(system_munin_plugin_t) dev_read_urand(system_munin_plugin_t)
@@ -421,3 +431,32 @@ optional_policy(` @@ -421,3 +431,33 @@ optional_policy(`
optional_policy(` optional_policy(`
unconfined_domain(unconfined_munin_plugin_t) unconfined_domain(unconfined_munin_plugin_t)
') ')
@ -49361,12 +49429,13 @@ index b708708..7bdfb65 100644
+ +
+manage_dirs_pattern(munin_script_t, munin_script_tmp_t, munin_script_tmp_t) +manage_dirs_pattern(munin_script_t, munin_script_tmp_t, munin_script_tmp_t)
+manage_files_pattern(munin_script_t, munin_script_tmp_t,munin_script_tmp_t) +manage_files_pattern(munin_script_t, munin_script_tmp_t,munin_script_tmp_t)
+files_tmp_filetrans(munin_script_t, munin_script_tmp_t, { dir file })
+ +
+read_files_pattern(munin_script_t, munin_var_lib_t, munin_var_lib_t) +read_files_pattern(munin_script_t, munin_var_lib_t, munin_var_lib_t)
+list_dirs_pattern(munin_script_t, munin_etc_t, munin_etc_t)
+read_files_pattern(munin_script_t, munin_etc_t, munin_etc_t) +read_files_pattern(munin_script_t, munin_etc_t, munin_etc_t)
+ +
+read_files_pattern(munin_script_t, munin_log_t, munin_log_t) +manage_files_pattern(munin_script_t, munin_log_t, munin_log_t)
+append_files_pattern(munin_script_t, munin_log_t, munin_log_t)
+ +
+files_search_var_lib(munin_script_t) +files_search_var_lib(munin_script_t)
+ +
@ -73727,10 +73796,10 @@ index afc0068..3105104 100644
+ ') + ')
') ')
diff --git a/quantum.te b/quantum.te diff --git a/quantum.te b/quantum.te
index 8644d8b..f7958c0 100644 index 8644d8b..e815665 100644
--- a/quantum.te --- a/quantum.te
+++ b/quantum.te +++ b/quantum.te
@@ -5,92 +5,138 @@ policy_module(quantum, 1.1.0) @@ -5,92 +5,146 @@ policy_module(quantum, 1.1.0)
# Declarations # Declarations
# #
@ -73792,40 +73861,42 @@ index 8644d8b..f7958c0 100644
+create_files_pattern(neutron_t, neutron_log_t, neutron_log_t) +create_files_pattern(neutron_t, neutron_log_t, neutron_log_t)
+setattr_files_pattern(neutron_t, neutron_log_t, neutron_log_t) +setattr_files_pattern(neutron_t, neutron_log_t, neutron_log_t)
+logging_log_filetrans(neutron_t, neutron_log_t, dir) +logging_log_filetrans(neutron_t, neutron_log_t, dir)
+
+manage_files_pattern(neutron_t, neutron_tmp_t, neutron_tmp_t)
+manage_dirs_pattern(neutron_t, neutron_tmp_t, neutron_tmp_t)
+files_tmp_filetrans(neutron_t, neutron_tmp_t, { file dir })
-manage_dirs_pattern(quantum_t, quantum_log_t, quantum_log_t) -manage_dirs_pattern(quantum_t, quantum_log_t, quantum_log_t)
-append_files_pattern(quantum_t, quantum_log_t, quantum_log_t) -append_files_pattern(quantum_t, quantum_log_t, quantum_log_t)
-create_files_pattern(quantum_t, quantum_log_t, quantum_log_t) -create_files_pattern(quantum_t, quantum_log_t, quantum_log_t)
-setattr_files_pattern(quantum_t, quantum_log_t, quantum_log_t) -setattr_files_pattern(quantum_t, quantum_log_t, quantum_log_t)
-logging_log_filetrans(quantum_t, quantum_log_t, dir) -logging_log_filetrans(quantum_t, quantum_log_t, dir)
+manage_files_pattern(neutron_t, neutron_tmp_t, neutron_tmp_t)
+manage_dirs_pattern(neutron_t, neutron_tmp_t, neutron_tmp_t)
+files_tmp_filetrans(neutron_t, neutron_tmp_t, { file dir })
-manage_files_pattern(quantum_t, quantum_tmp_t, quantum_tmp_t)
-files_tmp_filetrans(quantum_t, quantum_tmp_t, file)
+manage_dirs_pattern(neutron_t, neutron_var_lib_t, neutron_var_lib_t) +manage_dirs_pattern(neutron_t, neutron_var_lib_t, neutron_var_lib_t)
+manage_files_pattern(neutron_t, neutron_var_lib_t, neutron_var_lib_t) +manage_files_pattern(neutron_t, neutron_var_lib_t, neutron_var_lib_t)
+manage_sock_files_pattern(neutron_t, neutron_var_lib_t, neutron_var_lib_t) +manage_sock_files_pattern(neutron_t, neutron_var_lib_t, neutron_var_lib_t)
+files_var_lib_filetrans(neutron_t, neutron_var_lib_t, dir) +files_var_lib_filetrans(neutron_t, neutron_var_lib_t, dir)
-manage_files_pattern(quantum_t, quantum_tmp_t, quantum_tmp_t)
-files_tmp_filetrans(quantum_t, quantum_tmp_t, file)
+can_exec(neutron_t, neutron_tmp_t)
-manage_dirs_pattern(quantum_t, quantum_var_lib_t, quantum_var_lib_t) -manage_dirs_pattern(quantum_t, quantum_var_lib_t, quantum_var_lib_t)
-manage_files_pattern(quantum_t, quantum_var_lib_t, quantum_var_lib_t) -manage_files_pattern(quantum_t, quantum_var_lib_t, quantum_var_lib_t)
-files_var_lib_filetrans(quantum_t, quantum_var_lib_t, dir) -files_var_lib_filetrans(quantum_t, quantum_var_lib_t, dir)
+can_exec(neutron_t, neutron_tmp_t)
-can_exec(quantum_t, quantum_tmp_t)
+kernel_rw_kernel_sysctl(neutron_t) +kernel_rw_kernel_sysctl(neutron_t)
+kernel_rw_net_sysctls(neutron_t) +kernel_rw_net_sysctls(neutron_t)
+kernel_read_system_state(neutron_t) +kernel_read_system_state(neutron_t)
+kernel_read_network_state(neutron_t) +kernel_read_network_state(neutron_t)
+kernel_request_load_module(neutron_t) +kernel_request_load_module(neutron_t)
-can_exec(quantum_t, quantum_tmp_t) -kernel_read_kernel_sysctls(quantum_t)
-kernel_read_system_state(quantum_t)
+corecmd_exec_shell(neutron_t) +corecmd_exec_shell(neutron_t)
+corecmd_exec_bin(neutron_t) +corecmd_exec_bin(neutron_t)
-kernel_read_kernel_sysctls(quantum_t) -corecmd_exec_shell(quantum_t)
-kernel_read_system_state(quantum_t) -corecmd_exec_bin(quantum_t)
+corenet_all_recvfrom_unlabeled(neutron_t) +corenet_all_recvfrom_unlabeled(neutron_t)
+corenet_all_recvfrom_netlabel(neutron_t) +corenet_all_recvfrom_netlabel(neutron_t)
+corenet_tcp_sendrecv_generic_if(neutron_t) +corenet_tcp_sendrecv_generic_if(neutron_t)
@ -73833,49 +73904,47 @@ index 8644d8b..f7958c0 100644
+corenet_tcp_sendrecv_all_ports(neutron_t) +corenet_tcp_sendrecv_all_ports(neutron_t)
+corenet_tcp_bind_generic_node(neutron_t) +corenet_tcp_bind_generic_node(neutron_t)
-corecmd_exec_shell(quantum_t)
-corecmd_exec_bin(quantum_t)
+corenet_tcp_bind_neutron_port(neutron_t)
+corenet_tcp_connect_keystone_port(neutron_t)
+corenet_tcp_connect_amqp_port(neutron_t)
+corenet_tcp_connect_mysqld_port(neutron_t)
+corenet_tcp_connect_osapi_compute_port(neutron_t)
-corenet_all_recvfrom_unlabeled(quantum_t) -corenet_all_recvfrom_unlabeled(quantum_t)
-corenet_all_recvfrom_netlabel(quantum_t) -corenet_all_recvfrom_netlabel(quantum_t)
-corenet_tcp_sendrecv_generic_if(quantum_t) -corenet_tcp_sendrecv_generic_if(quantum_t)
-corenet_tcp_sendrecv_generic_node(quantum_t) -corenet_tcp_sendrecv_generic_node(quantum_t)
-corenet_tcp_sendrecv_all_ports(quantum_t) -corenet_tcp_sendrecv_all_ports(quantum_t)
-corenet_tcp_bind_generic_node(quantum_t) -corenet_tcp_bind_generic_node(quantum_t)
+domain_read_all_domains_state(neutron_t) +corenet_tcp_bind_neutron_port(neutron_t)
+domain_named_filetrans(neutron_t) +corenet_tcp_connect_keystone_port(neutron_t)
+corenet_tcp_connect_amqp_port(neutron_t)
+corenet_tcp_connect_mysqld_port(neutron_t)
+corenet_tcp_connect_osapi_compute_port(neutron_t)
-dev_list_sysfs(quantum_t) -dev_list_sysfs(quantum_t)
-dev_read_urand(quantum_t) -dev_read_urand(quantum_t)
+domain_read_all_domains_state(neutron_t)
+domain_named_filetrans(neutron_t)
-files_read_usr_files(quantum_t)
+dev_read_sysfs(neutron_t) +dev_read_sysfs(neutron_t)
+dev_read_urand(neutron_t) +dev_read_urand(neutron_t)
+dev_mounton_sysfs(neutron_t) +dev_mounton_sysfs(neutron_t)
+dev_mount_sysfs_fs(neutron_t) +dev_mount_sysfs_fs(neutron_t)
+dev_unmount_sysfs_fs(neutron_t) +dev_unmount_sysfs_fs(neutron_t)
-files_read_usr_files(quantum_t) -auth_use_nsswitch(quantum_t)
+files_mounton_non_security(neutron_t) +files_mounton_non_security(neutron_t)
-auth_use_nsswitch(quantum_t)
+auth_use_nsswitch(neutron_t)
-libs_exec_ldconfig(quantum_t) -libs_exec_ldconfig(quantum_t)
+libs_exec_ldconfig(neutron_t) +auth_use_nsswitch(neutron_t)
-logging_send_audit_msgs(quantum_t) -logging_send_audit_msgs(quantum_t)
-logging_send_syslog_msg(quantum_t) -logging_send_syslog_msg(quantum_t)
+libs_exec_ldconfig(neutron_t)
-miscfiles_read_localization(quantum_t)
+logging_send_audit_msgs(neutron_t) +logging_send_audit_msgs(neutron_t)
+logging_send_syslog_msg(neutron_t) +logging_send_syslog_msg(neutron_t)
-miscfiles_read_localization(quantum_t)
+netutils_exec(neutron_t)
-sysnet_domtrans_ifconfig(quantum_t) -sysnet_domtrans_ifconfig(quantum_t)
+netutils_exec(neutron_t)
+
+# need to stay in neutron +# need to stay in neutron
+sysnet_exec_ifconfig(neutron_t) +sysnet_exec_ifconfig(neutron_t)
+sysnet_manage_ifconfig_run(neutron_t) +sysnet_manage_ifconfig_run(neutron_t)
@ -73902,13 +73971,17 @@ index 8644d8b..f7958c0 100644
optional_policy(` optional_policy(`
- postgresql_stream_connect(quantum_t) - postgresql_stream_connect(quantum_t)
- postgresql_unpriv_client(quantum_t) - postgresql_unpriv_client(quantum_t)
+ modutils_domtrans_insmod(neutron_t)
+')
- postgresql_tcp_connect(quantum_t)
+optional_policy(`
+ mysql_stream_connect(neutron_t) + mysql_stream_connect(neutron_t)
+ mysql_read_db_lnk_files(neutron_t) + mysql_read_db_lnk_files(neutron_t)
+ mysql_read_config(neutron_t) + mysql_read_config(neutron_t)
+ mysql_tcp_connect(neutron_t) + mysql_tcp_connect(neutron_t)
+') ')
+
- postgresql_tcp_connect(quantum_t)
+optional_policy(` +optional_policy(`
+ postgresql_stream_connect(neutron_t) + postgresql_stream_connect(neutron_t)
+ postgresql_unpriv_client(neutron_t) + postgresql_unpriv_client(neutron_t)
@ -73918,10 +73991,14 @@ index 8644d8b..f7958c0 100644
+optional_policy(` +optional_policy(`
+ openvswitch_domtrans(neutron_t) + openvswitch_domtrans(neutron_t)
+ openvswitch_stream_connect(neutron_t) + openvswitch_stream_connect(neutron_t)
') +')
+ +
+optional_policy(` +optional_policy(`
+ sudo_exec(neutron_t) + sudo_exec(neutron_t)
+')
+
+optional_policy(`
+ udev_domtrans(neutron_t)
+') +')
diff --git a/quota.fc b/quota.fc diff --git a/quota.fc b/quota.fc
index cadabe3..54ba01d 100644 index cadabe3..54ba01d 100644
@ -79586,10 +79663,20 @@ index 6dbc905..4b17c93 100644
- admin_pattern($1, rhsmcertd_lock_t) - admin_pattern($1, rhsmcertd_lock_t)
') ')
diff --git a/rhsmcertd.te b/rhsmcertd.te diff --git a/rhsmcertd.te b/rhsmcertd.te
index d32e1a2..54838ad 100644 index d32e1a2..33ca060 100644
--- a/rhsmcertd.te --- a/rhsmcertd.te
+++ b/rhsmcertd.te +++ b/rhsmcertd.te
@@ -30,14 +30,13 @@ files_pid_file(rhsmcertd_var_run_t) @@ -18,6 +18,9 @@ logging_log_file(rhsmcertd_log_t)
type rhsmcertd_lock_t;
files_lock_file(rhsmcertd_lock_t)
+type rhsmcertd_tmp_t;
+files_tmp_file(rhsmcertd_tmp_t)
+
type rhsmcertd_var_lib_t;
files_type(rhsmcertd_var_lib_t)
@@ -30,18 +33,21 @@ files_pid_file(rhsmcertd_var_run_t)
# #
allow rhsmcertd_t self:capability sys_nice; allow rhsmcertd_t self:capability sys_nice;
@ -79607,7 +79694,15 @@ index d32e1a2..54838ad 100644
manage_files_pattern(rhsmcertd_t, rhsmcertd_lock_t, rhsmcertd_lock_t) manage_files_pattern(rhsmcertd_t, rhsmcertd_lock_t, rhsmcertd_lock_t)
files_lock_filetrans(rhsmcertd_t, rhsmcertd_lock_t, file) files_lock_filetrans(rhsmcertd_t, rhsmcertd_lock_t, file)
@@ -50,25 +49,50 @@ manage_files_pattern(rhsmcertd_t, rhsmcertd_var_run_t, rhsmcertd_var_run_t)
+manage_dirs_pattern(rhsmcertd_t, rhsmcertd_tmp_t, rhsmcertd_tmp_t)
+manage_files_pattern(rhsmcertd_t, rhsmcertd_tmp_t, rhsmcertd_tmp_t)
+files_tmp_filetrans(rhsmcertd_t, rhsmcertd_tmp_t, { dir file })
+
manage_dirs_pattern(rhsmcertd_t, rhsmcertd_var_lib_t, rhsmcertd_var_lib_t)
manage_files_pattern(rhsmcertd_t, rhsmcertd_var_lib_t, rhsmcertd_var_lib_t)
@@ -50,25 +56,53 @@ manage_files_pattern(rhsmcertd_t, rhsmcertd_var_run_t, rhsmcertd_var_run_t)
files_pid_filetrans(rhsmcertd_t, rhsmcertd_var_run_t, { file dir }) files_pid_filetrans(rhsmcertd_t, rhsmcertd_var_run_t, { file dir })
kernel_read_network_state(rhsmcertd_t) kernel_read_network_state(rhsmcertd_t)
@ -79632,8 +79727,11 @@ index d32e1a2..54838ad 100644
-files_read_usr_files(rhsmcertd_t) -files_read_usr_files(rhsmcertd_t)
+files_manage_generic_locks(rhsmcertd_t) +files_manage_generic_locks(rhsmcertd_t)
+files_manage_system_conf_files(rhsmcertd_t) +files_manage_system_conf_files(rhsmcertd_t)
+files_create_boot_flag(rhsmcertd_t)
+ +
+auth_read_passwd(rhsmcertd_t) +auth_read_passwd(rhsmcertd_t)
+
+libs_exec_ldconfig(rhsmcertd_t)
init_read_state(rhsmcertd_t) init_read_state(rhsmcertd_t)
@ -89876,10 +89974,18 @@ index e2544e1..d3fbd78 100644
+ xserver_xdm_append_log(shutdown_t) + xserver_xdm_append_log(shutdown_t)
') ')
diff --git a/slocate.te b/slocate.te diff --git a/slocate.te b/slocate.te
index 7292dc0..ce903d6 100644 index 7292dc0..103278d 100644
--- a/slocate.te --- a/slocate.te
+++ b/slocate.te +++ b/slocate.te
@@ -62,7 +62,6 @@ fs_read_noxattr_fs_symlinks(locate_t) @@ -44,6 +44,7 @@ dev_getattr_all_blk_files(locate_t)
dev_getattr_all_chr_files(locate_t)
files_list_all(locate_t)
+files_list_isid_type_dirs(locate_t)
files_dontaudit_read_all_symlinks(locate_t)
files_getattr_all_files(locate_t)
files_getattr_all_pipes(locate_t)
@@ -62,7 +63,6 @@ fs_read_noxattr_fs_symlinks(locate_t)
auth_use_nsswitch(locate_t) auth_use_nsswitch(locate_t)
@ -89887,7 +89993,7 @@ index 7292dc0..ce903d6 100644
ifdef(`enable_mls',` ifdef(`enable_mls',`
files_dontaudit_getattr_all_dirs(locate_t) files_dontaudit_getattr_all_dirs(locate_t)
@@ -71,3 +70,8 @@ ifdef(`enable_mls',` @@ -71,3 +71,8 @@ ifdef(`enable_mls',`
optional_policy(` optional_policy(`
cron_system_entry(locate_t, locate_exec_t) cron_system_entry(locate_t, locate_exec_t)
') ')
@ -94448,10 +94554,10 @@ index 0000000..6a1f575
+') +')
diff --git a/swift.te b/swift.te diff --git a/swift.te b/swift.te
new file mode 100644 new file mode 100644
index 0000000..9ee77b2 index 0000000..7fce837
--- /dev/null --- /dev/null
+++ b/swift.te +++ b/swift.te
@@ -0,0 +1,97 @@ @@ -0,0 +1,102 @@
+policy_module(swift, 1.0.0) +policy_module(swift, 1.0.0)
+ +
+######################################## +########################################
@ -94527,7 +94633,12 @@ index 0000000..9ee77b2
+kernel_read_system_state(swift_t) +kernel_read_system_state(swift_t)
+kernel_read_network_state(swift_t) +kernel_read_network_state(swift_t)
+ +
+# bug in swift
+corenet_tcp_bind_xserver_port(swift_t)
+corenet_tcp_bind_http_cache_port(swift_t)
+
+corecmd_exec_shell(swift_t) +corecmd_exec_shell(swift_t)
+corecmd_exec_bin(swift_t)
+ +
+dev_read_urand(swift_t) +dev_read_urand(swift_t)
+ +
@ -99388,7 +99499,7 @@ index 1c35171..2cba4df 100644
domain_system_change_exemption($1) domain_system_change_exemption($1)
role_transition $2 varnishd_initrc_exec_t system_r; role_transition $2 varnishd_initrc_exec_t system_r;
diff --git a/varnishd.te b/varnishd.te diff --git a/varnishd.te b/varnishd.te
index 9d4d8cb..a58e2dd 100644 index 9d4d8cb..8cade37 100644
--- a/varnishd.te --- a/varnishd.te
+++ b/varnishd.te +++ b/varnishd.te
@@ -21,7 +21,7 @@ type varnishd_initrc_exec_t; @@ -21,7 +21,7 @@ type varnishd_initrc_exec_t;
@ -99413,22 +99524,22 @@ index 9d4d8cb..a58e2dd 100644
# #
-allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid }; -allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid };
+allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid chown }; +allow varnishd_t self:capability { kill dac_override ipc_lock setuid setgid chown fowner };
dontaudit varnishd_t self:capability sys_tty_config; dontaudit varnishd_t self:capability sys_tty_config;
-allow varnishd_t self:process signal; -allow varnishd_t self:process signal;
+allow varnishd_t self:process { execmem signal }; +allow varnishd_t self:process { execmem signal };
allow varnishd_t self:fifo_file rw_fifo_file_perms; allow varnishd_t self:fifo_file rw_fifo_file_perms;
allow varnishd_t self:tcp_socket { accept listen }; allow varnishd_t self:tcp_socket { accept listen };
@@ -103,7 +103,6 @@ corenet_tcp_sendrecv_varnishd_port(varnishd_t) @@ -103,15 +103,13 @@ corenet_tcp_sendrecv_varnishd_port(varnishd_t)
dev_read_urand(varnishd_t) dev_read_urand(varnishd_t)
-files_read_usr_files(varnishd_t) -files_read_usr_files(varnishd_t)
-
fs_getattr_all_fs(varnishd_t) fs_getattr_all_fs(varnishd_t)
@@ -111,7 +110,7 @@ auth_use_nsswitch(varnishd_t) auth_use_nsswitch(varnishd_t)
logging_send_syslog_msg(varnishd_t) logging_send_syslog_msg(varnishd_t)

View File

@ -19,7 +19,7 @@
Summary: SELinux policy configuration Summary: SELinux policy configuration
Name: selinux-policy Name: selinux-policy
Version: 3.13.1 Version: 3.13.1
Release: 56%{?dist} Release: 57%{?dist}
License: GPLv2+ License: GPLv2+
Group: System Environment/Base Group: System Environment/Base
Source: serefpolicy-%{version}.tgz Source: serefpolicy-%{version}.tgz
@ -588,6 +588,33 @@ SELinux Reference policy mls base module.
%endif %endif
%changelog %changelog
* Mon Jun 9 2014 Miroslav Grepl<mgrepl@redhat.com> 3.13.1-57
- Allow staff_t to communicate and run docker
- Fix *_ecryptfs_home_dirs booleans
- Allow ldconfig_t to read/write inherited user tmp pipes
- Allow storaged to dbus chat with lvm_t
- Add support for storaged and storaged-lvm-helper. Labeled it as lvm_exec_t.
- Use proper calling in ssh.te for userdom_home_manager attribute
- Use userdom_home_manager_type() also for ssh_keygen_t
- Allow locate to list directories without labels
- Allow bitlbee to use tcp/7778 port
- /etc/cron.daily/logrotate to execute fail2ban-client.
- Allow keepalives to connect to SNMP port. Support to do SNMP stuff
- Allow staff_t to communicate and run docker
- Dontaudit search mgrepl/.local for cobblerd_t
- Allow neutron to execute kmod in insmod_t
- Allow neutron to execute udevadm in udev_t
- Allow also fowner cap for varnishd
- Allow keepalived to execute bin_t/shell_exec_t
- rhsmcertd seems to need these accesses. We need this backported to RHEL7 and perhaps RHEL6 policy
- Add cups_execmem boolean
- Allow gear to manage gear service
- New requires for gear to use systemctl and init var_run_t
- Allow cups to execute its rw_etc_t files, for brothers printers
- Add fixes to make munin and munin-cgi working. Allow munin-cgit to create files/dirs in /tmp, list munin conf dirs and manage munin logs.
- Allow swift to execute bin_t
- Allow swift to bind http_cache
* Sun Jun 08 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 3.13.1-56 * Sun Jun 08 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 3.13.1-56
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild