merge latest upstream
This commit is contained in:
commit
898c0de0b7
@ -1,3 +1,4 @@
|
||||
- Added devtmpfs support.
|
||||
- Dbadm updates from KaiGai Kohei.
|
||||
- Virtio disk file context update from Mika Pfluger.
|
||||
- Increase bindreservport range to 512-1024 in corenetwork, from Dan Walsh.
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(readahead, 1.11.0)
|
||||
policy_module(readahead, 1.11.1)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -45,6 +45,8 @@ dev_getattr_all_blk_files(readahead_t)
|
||||
dev_dontaudit_read_all_blk_files(readahead_t)
|
||||
dev_dontaudit_getattr_memory_dev(readahead_t)
|
||||
dev_dontaudit_getattr_nvram_dev(readahead_t)
|
||||
# Early devtmpfs, before udev relabel
|
||||
dev_dontaudit_rw_generic_chr_files(readahead_t)
|
||||
|
||||
domain_use_interactive_fds(readahead_t)
|
||||
domain_read_all_domains_state(readahead_t)
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(corecommands, 1.13.1)
|
||||
policy_module(corecommands, 1.13.2)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -15,6 +15,7 @@ attribute exec_type;
|
||||
#
|
||||
type bin_t alias { ls_exec_t sbin_t };
|
||||
corecmd_executable_file(bin_t)
|
||||
dev_associate(bin_t) #For /dev/MAKEDEV
|
||||
|
||||
#
|
||||
# shell_exec_t is the type of user shells such as /bin/bash.
|
||||
|
@ -71,6 +71,43 @@ interface(`dev_node',`
|
||||
typeattribute $1 device_node;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Associate the specified file type with device filesystem.
|
||||
## </summary>
|
||||
## <param name="file_type">
|
||||
## <summary>
|
||||
## The type of the file to be associated.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`dev_associate',`
|
||||
gen_require(`
|
||||
type device_t;
|
||||
')
|
||||
|
||||
allow $1 device_t:filesystem associate;
|
||||
fs_associate_tmpfs($1) #For backwards compatibility
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Mount a filesystem on /dev
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allow access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`dev_mounton',`
|
||||
gen_require(`
|
||||
type device_t;
|
||||
')
|
||||
|
||||
allow $1 device_t:dir mounton;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Allow full relabeling (to and from) of all device nodes.
|
||||
@ -567,6 +604,24 @@ interface(`dev_rw_generic_blk_files',`
|
||||
allow $1 device_t:blk_file rw_chr_file_perms;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Dontaudit attempts to read/write generic character device files.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain to dontaudit access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`dev_dontaudit_rw_generic_chr_files',`
|
||||
gen_require(`
|
||||
type device_t;
|
||||
')
|
||||
|
||||
dontaudit $1 device_t:chr_file rw_chr_file_perms;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Create generic character device files.
|
||||
@ -831,7 +886,7 @@ interface(`dev_filetrans',`
|
||||
|
||||
filetrans_pattern($1, device_t, $2, $3)
|
||||
|
||||
fs_associate_tmpfs($2)
|
||||
dev_associate($2)
|
||||
files_associate_tmp($2)
|
||||
')
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(devices, 1.10.1)
|
||||
policy_module(devices, 1.10.2)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -18,6 +18,8 @@ fs_associate_tmpfs(device_t)
|
||||
files_type(device_t)
|
||||
files_mountpoint(device_t)
|
||||
files_associate_tmp(device_t)
|
||||
fs_type(device_t)
|
||||
fs_use_trans devtmpfs gen_context(system_u:object_r:device_t,s0);
|
||||
|
||||
#
|
||||
# Type for /dev/agpgart
|
||||
@ -290,6 +292,8 @@ mls_trusted_object(zero_device_t)
|
||||
# Rules for all device nodes
|
||||
#
|
||||
|
||||
allow device_node device_t:filesystem associate;
|
||||
|
||||
fs_associate(device_node)
|
||||
fs_associate_tmpfs(device_node)
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(filesystem, 1.13.1)
|
||||
policy_module(filesystem, 1.13.2)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -191,7 +191,6 @@ files_poly_parent(tmpfs_t)
|
||||
# and label the filesystem itself with the specified context.
|
||||
# This is appropriate for pseudo filesystems like devpts and tmpfs
|
||||
# where we want to label objects with a derived type.
|
||||
fs_use_trans devtmpfs gen_context(system_u:object_r:tmpfs_t,s0);
|
||||
fs_use_trans mqueue gen_context(system_u:object_r:tmpfs_t,s0);
|
||||
fs_use_trans shm gen_context(system_u:object_r:tmpfs_t,s0);
|
||||
fs_use_trans tmpfs gen_context(system_u:object_r:tmpfs_t,s0);
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(kernel, 1.12.1)
|
||||
policy_module(kernel, 1.12.2)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -246,8 +246,7 @@ dev_create_generic_blk_files(kernel_t)
|
||||
dev_delete_generic_blk_files(kernel_t)
|
||||
dev_create_generic_chr_files(kernel_t)
|
||||
dev_delete_generic_chr_files(kernel_t)
|
||||
# work around until devtmpfs has device_t type
|
||||
dev_tmpfs_filetrans_dev(kernel_t, { dir blk_file chr_file })
|
||||
dev_mounton(kernel_t)
|
||||
|
||||
# Mount root file system. Used when loading a policy
|
||||
# from initrd, then mounting the root filesystem
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(hostname, 1.6.0)
|
||||
policy_module(hostname, 1.6.1)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -25,6 +25,8 @@ kernel_list_proc(hostname_t)
|
||||
kernel_read_proc_symlinks(hostname_t)
|
||||
|
||||
dev_read_sysfs(hostname_t)
|
||||
# Early devtmpfs, before udev relabel
|
||||
dev_dontaudit_rw_generic_chr_files(hostname_t)
|
||||
|
||||
domain_dontaudit_leaks(hostname_t)
|
||||
domain_use_interactive_fds(hostname_t)
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(init, 1.15.1)
|
||||
policy_module(init, 1.15.2)
|
||||
|
||||
gen_require(`
|
||||
class passwd rootok;
|
||||
@ -133,7 +133,6 @@ files_pid_filetrans(init_t, init_var_run_t, file)
|
||||
|
||||
allow init_t initctl_t:fifo_file manage_fifo_file_perms;
|
||||
dev_filetrans(init_t, initctl_t, fifo_file)
|
||||
fs_associate_tmpfs(initctl_t)
|
||||
|
||||
# Modify utmp.
|
||||
allow init_t initrc_var_run_t:file { rw_file_perms setattr };
|
||||
@ -146,6 +145,8 @@ corecmd_exec_bin(init_t)
|
||||
|
||||
dev_read_sysfs(init_t)
|
||||
dev_read_urand(init_t)
|
||||
# Early devtmpfs
|
||||
dev_rw_generic_chr_files(init_t)
|
||||
|
||||
domain_getpgid_all_domains(init_t)
|
||||
domain_kill_all_domains(init_t)
|
||||
@ -402,6 +403,7 @@ dev_read_sound_mixer(initrc_t)
|
||||
dev_write_sound_mixer(initrc_t)
|
||||
dev_setattr_all_chr_files(initrc_t)
|
||||
dev_rw_lvm_control(initrc_t)
|
||||
dev_rw_generic_chr_files(initrc_t)
|
||||
dev_delete_lvm_control_dev(initrc_t)
|
||||
dev_manage_generic_symlinks(initrc_t)
|
||||
dev_manage_generic_files(initrc_t)
|
||||
|
@ -1,4 +1,4 @@
|
||||
policy_module(mount, 1.11.0)
|
||||
policy_module(mount, 1.11.1)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -102,6 +102,8 @@ dev_getattr_sound_dev(mount_t)
|
||||
ifdef(`hide_broken_symptoms',`
|
||||
dev_rw_generic_blk_files(mount_t)
|
||||
')
|
||||
# Early devtmpfs, before udev relabel
|
||||
dev_dontaudit_rw_generic_chr_files(mount_t)
|
||||
|
||||
domain_use_interactive_fds(mount_t)
|
||||
domain_dontaudit_search_all_domains_state(mount_t)
|
||||
|
Loading…
Reference in New Issue
Block a user