- Allow realmd to create tmp files

- FIx ircssi_home_t type to irssi_home_t
- Allow adcli running as realmd_t to connect to ldap port
- Allow NetworkManager to transition to ipsec_t, for running strongswan
- Make openshift_initrc_t an lxc_domain
- Allow gssd to manage user_tmp_t files
- Fix handling of irclogs in users homedir
- Fix labeling for drupal an wp-content in subdirs of /var/www/html
- Allow abrt to read utmp_t file
- Fix openshift policy to transition lnk_file, sock-file an fifo_file when created in a
- fix labeling for (oo|rhc)-restorer-wrapper.sh
- firewalld needs to be able to write to network sysctls
- Fix mozilla_plugin_dontaudit_rw_sem() interface
- Dontaudit generic ipc read/write to a mozilla_plugin for sandbox_x domains
- Add mozilla_plugin_dontaudit_rw_sem() interface
- Allow svirt_lxc_t to transition to openshift domains
- Allow condor domains block_suspend and dac_override caps
- Allow condor_master to read passd
- Allow condor_master to read system state
- Allow NetworkManager to transition to ipsec_t, for running strongswan
- Lots of access required by lvm_t to created encrypted usb device
- Allow xdm_t to dbus communicate with systemd_localed_t
- Label strongswan content as ipsec_exec_mgmt_t for now
- Allow users to dbus chat with systemd_localed
- Fix handling of .xsession-errors in xserver.if, so kde will work
- Might be a bug but we are seeing avc's about people status on init_t:service
- Make sure we label content under /var/run/lock as <<none>>
- Allow daemon and systemprocesses to search init_var_run_t directory
- Add boolean to allow xdm to write xauth data to the home directory
- Allow mount to write keys for the unconfined domain
This commit is contained in:
Miroslav Grepl 2013-04-02 14:31:42 +02:00
parent 30fc9edc15
commit d9444b18fb
3 changed files with 606 additions and 325 deletions

File diff suppressed because it is too large Load Diff

View File

@ -516,7 +516,7 @@ index 058d908..702b716 100644
+')
+
diff --git a/abrt.te b/abrt.te
index cc43d25..0842350 100644
index cc43d25..563c773 100644
--- a/abrt.te
+++ b/abrt.te
@@ -1,4 +1,4 @@
@ -732,7 +732,7 @@ index cc43d25..0842350 100644
dev_getattr_all_chr_files(abrt_t)
dev_getattr_all_blk_files(abrt_t)
@@ -163,29 +173,34 @@ files_getattr_all_files(abrt_t)
@@ -163,29 +173,36 @@ files_getattr_all_files(abrt_t)
files_read_config_files(abrt_t)
files_read_etc_runtime_files(abrt_t)
files_read_var_symlinks(abrt_t)
@ -756,13 +756,14 @@ index cc43d25..0842350 100644
fs_read_nfs_symlinks(abrt_t)
fs_search_all(abrt_t)
-auth_use_nsswitch(abrt_t)
-
logging_read_generic_logs(abrt_t)
+logging_read_generic_logs(abrt_t)
+logging_send_syslog_msg(abrt_t)
+auth_use_nsswitch(abrt_t)
+
auth_use_nsswitch(abrt_t)
-logging_read_generic_logs(abrt_t)
+init_read_utmp(abrt_t)
+miscfiles_read_generic_certs(abrt_t)
miscfiles_read_public_files(abrt_t)
@ -771,7 +772,7 @@ index cc43d25..0842350 100644
tunable_policy(`abrt_anon_write',`
miscfiles_manage_public_files(abrt_t)
@@ -193,15 +208,11 @@ tunable_policy(`abrt_anon_write',`
@@ -193,15 +210,11 @@ tunable_policy(`abrt_anon_write',`
optional_policy(`
apache_list_modules(abrt_t)
@ -788,7 +789,7 @@ index cc43d25..0842350 100644
')
optional_policy(`
@@ -209,6 +220,12 @@ optional_policy(`
@@ -209,6 +222,12 @@ optional_policy(`
')
optional_policy(`
@ -801,7 +802,7 @@ index cc43d25..0842350 100644
policykit_domtrans_auth(abrt_t)
policykit_read_lib(abrt_t)
policykit_read_reload(abrt_t)
@@ -220,6 +237,7 @@ optional_policy(`
@@ -220,6 +239,7 @@ optional_policy(`
corecmd_exec_all_executables(abrt_t)
')
@ -809,7 +810,7 @@ index cc43d25..0842350 100644
optional_policy(`
rpm_exec(abrt_t)
rpm_dontaudit_manage_db(abrt_t)
@@ -230,6 +248,7 @@ optional_policy(`
@@ -230,6 +250,7 @@ optional_policy(`
rpm_signull(abrt_t)
')
@ -817,7 +818,7 @@ index cc43d25..0842350 100644
optional_policy(`
sendmail_domtrans(abrt_t)
')
@@ -240,9 +259,17 @@ optional_policy(`
@@ -240,9 +261,17 @@ optional_policy(`
sosreport_delete_tmp_files(abrt_t)
')
@ -836,7 +837,7 @@ index cc43d25..0842350 100644
#
allow abrt_handle_event_t self:fifo_file rw_fifo_file_perms;
@@ -253,9 +280,13 @@ tunable_policy(`abrt_handle_event',`
@@ -253,9 +282,13 @@ tunable_policy(`abrt_handle_event',`
can_exec(abrt_t, abrt_handle_event_exec_t)
')
@ -851,7 +852,7 @@ index cc43d25..0842350 100644
#
allow abrt_helper_t self:capability { chown setgid sys_nice };
@@ -268,6 +299,7 @@ manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
@@ -268,6 +301,7 @@ manage_dirs_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
manage_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
manage_lnk_files_pattern(abrt_helper_t, abrt_var_cache_t, abrt_var_cache_t)
files_var_filetrans(abrt_helper_t, abrt_var_cache_t, { file dir })
@ -859,7 +860,7 @@ index cc43d25..0842350 100644
read_files_pattern(abrt_helper_t, abrt_var_run_t, abrt_var_run_t)
read_lnk_files_pattern(abrt_helper_t, abrt_var_run_t, abrt_var_run_t)
@@ -276,15 +308,20 @@ corecmd_read_all_executables(abrt_helper_t)
@@ -276,15 +310,20 @@ corecmd_read_all_executables(abrt_helper_t)
domain_read_all_domains_state(abrt_helper_t)
@ -880,7 +881,7 @@ index cc43d25..0842350 100644
userdom_dontaudit_read_user_home_content_files(abrt_helper_t)
userdom_dontaudit_read_user_tmp_files(abrt_helper_t)
dev_dontaudit_read_all_blk_files(abrt_helper_t)
@@ -292,11 +329,25 @@ ifdef(`hide_broken_symptoms',`
@@ -292,11 +331,25 @@ ifdef(`hide_broken_symptoms',`
dev_dontaudit_write_all_chr_files(abrt_helper_t)
dev_dontaudit_write_all_blk_files(abrt_helper_t)
fs_dontaudit_rw_anon_inodefs_files(abrt_helper_t)
@ -907,7 +908,7 @@ index cc43d25..0842350 100644
#
allow abrt_retrace_coredump_t self:fifo_file rw_fifo_file_perms;
@@ -314,10 +365,12 @@ corecmd_exec_shell(abrt_retrace_coredump_t)
@@ -314,10 +367,12 @@ corecmd_exec_shell(abrt_retrace_coredump_t)
dev_read_urand(abrt_retrace_coredump_t)
@ -921,7 +922,7 @@ index cc43d25..0842350 100644
optional_policy(`
rpm_exec(abrt_retrace_coredump_t)
rpm_dontaudit_manage_db(abrt_retrace_coredump_t)
@@ -330,10 +383,11 @@ optional_policy(`
@@ -330,10 +385,11 @@ optional_policy(`
#######################################
#
@ -935,7 +936,7 @@ index cc43d25..0842350 100644
allow abrt_retrace_worker_t self:fifo_file rw_fifo_file_perms;
domtrans_pattern(abrt_retrace_worker_t, abrt_retrace_coredump_exec_t, abrt_retrace_coredump_t)
@@ -352,30 +406,38 @@ corecmd_exec_shell(abrt_retrace_worker_t)
@@ -352,30 +408,38 @@ corecmd_exec_shell(abrt_retrace_worker_t)
dev_read_urand(abrt_retrace_worker_t)
@ -977,7 +978,7 @@ index cc43d25..0842350 100644
kernel_read_kernel_sysctls(abrt_dump_oops_t)
kernel_read_ring_buffer(abrt_dump_oops_t)
@@ -384,14 +446,15 @@ domain_use_interactive_fds(abrt_dump_oops_t)
@@ -384,14 +448,15 @@ domain_use_interactive_fds(abrt_dump_oops_t)
fs_list_inotifyfs(abrt_dump_oops_t)
logging_read_generic_logs(abrt_dump_oops_t)
@ -995,7 +996,7 @@ index cc43d25..0842350 100644
read_files_pattern(abrt_watch_log_t, abrt_etc_t, abrt_etc_t)
@@ -400,16 +463,14 @@ domtrans_pattern(abrt_watch_log_t, abrt_dump_oops_exec_t, abrt_dump_oops_t)
@@ -400,16 +465,14 @@ domtrans_pattern(abrt_watch_log_t, abrt_dump_oops_exec_t, abrt_dump_oops_t)
corecmd_exec_bin(abrt_watch_log_t)
logging_read_all_logs(abrt_watch_log_t)
@ -2721,7 +2722,7 @@ index 0000000..b334e9a
+ spamassassin_read_pid_files(antivirus_domain)
+')
diff --git a/apache.fc b/apache.fc
index 550a69e..e714059 100644
index 550a69e..78579c0 100644
--- a/apache.fc
+++ b/apache.fc
@@ -1,161 +1,184 @@
@ -3018,12 +3019,12 @@ index 550a69e..e714059 100644
-/var/www/svn/conf(/.*)? gen_context(system_u:object_r:httpd_sys_content_t,s0)
-/var/www/svn/hooks(/.*)? gen_context(system_u:object_r:httpd_sys_script_exec_t,s0)
+
+/var/www/html/[^/]*/sites/default/settings\.php -- gen_context(system_u:object_r:httpd_sys_rw_content_t, s0)
+/var/www/html/[^/]*/sites/default/files(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t, s0)
+/var/www/html(/.*)?/sites/default/settings\.php -- gen_context(system_u:object_r:httpd_sys_rw_content_t, s0)
+/var/www/html(/.*)?/sites/default/files(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t, s0)
+
+/var/www/html/configuration\.php gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+
+/var/www/html/wp-content(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+/var/www/html(/.*)?/wp-content(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+
+/var/www/gallery/albums(/.*)? gen_context(system_u:object_r:httpd_sys_rw_content_t,s0)
+
@ -12410,7 +12411,7 @@ index 3fe3cb8..684b700 100644
+ ')
')
diff --git a/condor.te b/condor.te
index 3f2b672..22ddc47 100644
index 3f2b672..2af6e1e 100644
--- a/condor.te
+++ b/condor.te
@@ -46,6 +46,9 @@ files_lock_file(condor_var_lock_t)
@ -12423,8 +12424,13 @@ index 3f2b672..22ddc47 100644
condor_domain_template(collector)
condor_domain_template(negotiator)
condor_domain_template(procd)
@@ -59,8 +62,9 @@ condor_domain_template(startd)
@@ -57,10 +60,14 @@ condor_domain_template(startd)
# Global local policy
#
+allow condor_domain self:capability dac_override;
+allow condor_domain self:capability2 block_suspend;
+
allow condor_domain self:process signal_perms;
allow condor_domain self:fifo_file rw_fifo_file_perms;
-allow condor_domain self:tcp_socket { accept listen };
@ -12435,7 +12441,7 @@ index 3f2b672..22ddc47 100644
manage_dirs_pattern(condor_domain, condor_log_t, condor_log_t)
append_files_pattern(condor_domain, condor_log_t, condor_log_t)
@@ -86,13 +90,10 @@ allow condor_domain condor_master_t:tcp_socket getattr;
@@ -86,13 +93,10 @@ allow condor_domain condor_master_t:tcp_socket getattr;
kernel_read_kernel_sysctls(condor_domain)
kernel_read_network_state(condor_domain)
@ -12449,7 +12455,7 @@ index 3f2b672..22ddc47 100644
corenet_tcp_sendrecv_generic_if(condor_domain)
corenet_tcp_sendrecv_generic_node(condor_domain)
@@ -106,9 +107,7 @@ dev_read_rand(condor_domain)
@@ -106,9 +110,7 @@ dev_read_rand(condor_domain)
dev_read_sysfs(condor_domain)
dev_read_urand(condor_domain)
@ -12460,16 +12466,36 @@ index 3f2b672..22ddc47 100644
tunable_policy(`condor_tcp_network_connect',`
corenet_sendrecv_all_client_packets(condor_domain)
@@ -150,8 +149,6 @@ corenet_tcp_sendrecv_amqp_port(condor_master_t)
@@ -125,7 +127,7 @@ optional_policy(`
# Master local policy
#
-allow condor_master_t self:capability { setuid setgid dac_override sys_ptrace };
+allow condor_master_t self:capability { setuid setgid sys_ptrace };
allow condor_master_t condor_domain:process { sigkill signal };
@@ -133,6 +135,10 @@ manage_dirs_pattern(condor_master_t, condor_master_tmp_t, condor_master_tmp_t)
manage_files_pattern(condor_master_t, condor_master_tmp_t, condor_master_tmp_t)
files_tmp_filetrans(condor_master_t, condor_master_tmp_t, { file dir })
+can_exec(condor_master_t, condor_master_exec_t)
+
+kernel_read_system_state(condor_master_tmp_t)
+
corenet_udp_sendrecv_generic_if(condor_master_t)
corenet_udp_sendrecv_generic_node(condor_master_t)
corenet_tcp_bind_generic_node(condor_master_t)
@@ -150,7 +156,7 @@ corenet_tcp_sendrecv_amqp_port(condor_master_t)
domain_read_all_domains_state(condor_master_t)
-auth_use_nsswitch(condor_master_t)
-
+auth_read_passwd(condor_master_t)
optional_policy(`
mta_send_mail(condor_master_t)
mta_read_config(condor_master_t)
@@ -178,6 +175,8 @@ allow condor_negotiator_t self:capability { setuid setgid };
@@ -178,6 +184,8 @@ allow condor_negotiator_t self:capability { setuid setgid };
allow condor_negotiator_t condor_master_t:tcp_socket rw_stream_socket_perms;
allow condor_negotiator_t condor_master_t:udp_socket getattr;
@ -12478,7 +12504,16 @@ index 3f2b672..22ddc47 100644
######################################
#
# Procd local policy
@@ -209,6 +208,8 @@ manage_files_pattern(condor_schedd_t, condor_schedd_tmp_t, condor_schedd_tmp_t)
@@ -201,6 +209,8 @@ allow condor_schedd_t condor_master_t:udp_socket getattr;
allow condor_schedd_t condor_var_lock_t:dir manage_file_perms;
+allow condor_schedd_t condor_master_tmp_t:dir getattr;
+
domtrans_pattern(condor_schedd_t, condor_procd_exec_t, condor_procd_t)
domtrans_pattern(condor_schedd_t, condor_startd_exec_t, condor_startd_t)
@@ -209,6 +219,8 @@ manage_files_pattern(condor_schedd_t, condor_schedd_tmp_t, condor_schedd_tmp_t)
relabel_files_pattern(condor_schedd_t, condor_schedd_tmp_t, condor_schedd_tmp_t)
files_tmp_filetrans(condor_schedd_t, condor_schedd_tmp_t, { file dir })
@ -12487,7 +12522,7 @@ index 3f2b672..22ddc47 100644
#####################################
#
# Startd local policy
@@ -233,11 +234,10 @@ domain_read_all_domains_state(condor_startd_t)
@@ -233,11 +245,10 @@ domain_read_all_domains_state(condor_startd_t)
mcs_process_set_categories(condor_startd_t)
init_domtrans_script(condor_startd_t)
@ -12500,7 +12535,7 @@ index 3f2b672..22ddc47 100644
optional_policy(`
ssh_basic_client_template(condor_startd, condor_startd_t, system_r)
ssh_domtrans(condor_startd_t)
@@ -249,3 +249,7 @@ optional_policy(`
@@ -249,3 +260,7 @@ optional_policy(`
kerberos_use(condor_startd_ssh_t)
')
')
@ -18739,7 +18774,7 @@ index d294865..3b4f593 100644
+ logging_log_filetrans($1, devicekit_var_log_t, file, "pm-suspend.log")
')
diff --git a/devicekit.te b/devicekit.te
index ff933af..41ca7ce 100644
index ff933af..fc9d3f4 100644
--- a/devicekit.te
+++ b/devicekit.te
@@ -7,15 +7,15 @@ policy_module(devicekit, 1.2.1)
@ -18842,18 +18877,19 @@ index ff933af..41ca7ce 100644
')
optional_policy(`
@@ -180,6 +184,10 @@ optional_policy(`
@@ -180,6 +184,11 @@ optional_policy(`
')
optional_policy(`
+ systemd_read_logind_sessions_files(devicekit_disk_t)
+ systemd_write_inhibit_pipes(devicekit_disk_t)
+')
+
+optional_policy(`
udev_domtrans(devicekit_disk_t)
udev_read_db(devicekit_disk_t)
')
@@ -188,12 +196,19 @@ optional_policy(`
@@ -188,12 +197,19 @@ optional_policy(`
virt_manage_images(devicekit_disk_t)
')
@ -18874,7 +18910,7 @@ index ff933af..41ca7ce 100644
allow devicekit_power_t self:process { getsched signal_perms };
allow devicekit_power_t self:fifo_file rw_fifo_file_perms;
allow devicekit_power_t self:unix_dgram_socket create_socket_perms;
@@ -207,9 +222,7 @@ manage_dirs_pattern(devicekit_power_t, devicekit_var_lib_t, devicekit_var_lib_t)
@@ -207,9 +223,7 @@ manage_dirs_pattern(devicekit_power_t, devicekit_var_lib_t, devicekit_var_lib_t)
manage_files_pattern(devicekit_power_t, devicekit_var_lib_t, devicekit_var_lib_t)
files_var_lib_filetrans(devicekit_power_t, devicekit_var_lib_t, dir)
@ -18885,7 +18921,7 @@ index ff933af..41ca7ce 100644
logging_log_filetrans(devicekit_power_t, devicekit_var_log_t, file)
manage_dirs_pattern(devicekit_power_t, devicekit_var_run_t, devicekit_var_run_t)
@@ -242,17 +255,16 @@ domain_read_all_domains_state(devicekit_power_t)
@@ -242,17 +256,16 @@ domain_read_all_domains_state(devicekit_power_t)
files_read_kernel_img(devicekit_power_t)
files_read_etc_runtime_files(devicekit_power_t)
@ -18905,7 +18941,7 @@ index ff933af..41ca7ce 100644
sysnet_domtrans_ifconfig(devicekit_power_t)
sysnet_domtrans_dhcpc(devicekit_power_t)
@@ -269,9 +281,11 @@ optional_policy(`
@@ -269,9 +282,11 @@ optional_policy(`
optional_policy(`
cron_initrc_domtrans(devicekit_power_t)
@ -18917,7 +18953,7 @@ index ff933af..41ca7ce 100644
dbus_system_bus_client(devicekit_power_t)
allow devicekit_power_t devicekit_t:dbus send_msg;
@@ -302,8 +316,11 @@ optional_policy(`
@@ -302,8 +317,11 @@ optional_policy(`
')
optional_policy(`
@ -18930,7 +18966,7 @@ index ff933af..41ca7ce 100644
hal_manage_pid_dirs(devicekit_power_t)
hal_manage_pid_files(devicekit_power_t)
')
@@ -341,3 +358,9 @@ optional_policy(`
@@ -341,3 +359,9 @@ optional_policy(`
optional_policy(`
vbetool_domtrans(devicekit_power_t)
')
@ -22546,7 +22582,7 @@ index 5cf6ac6..839999e 100644
+ allow $1 firewalld_unit_file_t:service all_service_perms;
')
diff --git a/firewalld.te b/firewalld.te
index c8014f8..02de884 100644
index c8014f8..d84522b 100644
--- a/firewalld.te
+++ b/firewalld.te
@@ -21,11 +21,20 @@ logging_log_file(firewalld_var_log_t)
@ -22571,7 +22607,7 @@ index c8014f8..02de884 100644
dontaudit firewalld_t self:capability sys_tty_config;
allow firewalld_t self:fifo_file rw_fifo_file_perms;
allow firewalld_t self:unix_stream_socket { accept listen };
@@ -40,8 +49,17 @@ allow firewalld_t firewalld_var_log_t:file read_file_perms;
@@ -40,11 +49,21 @@ allow firewalld_t firewalld_var_log_t:file read_file_perms;
allow firewalld_t firewalld_var_log_t:file setattr_file_perms;
logging_log_filetrans(firewalld_t, firewalld_var_log_t, file)
@ -22589,7 +22625,11 @@ index c8014f8..02de884 100644
kernel_read_network_state(firewalld_t)
kernel_read_system_state(firewalld_t)
@@ -53,20 +71,17 @@ dev_read_urand(firewalld_t)
+kernel_rw_net_sysctls(firewalld_t)
corecmd_exec_bin(firewalld_t)
corecmd_exec_shell(firewalld_t)
@@ -53,20 +72,17 @@ dev_read_urand(firewalld_t)
domain_use_interactive_fds(firewalld_t)
@ -22615,7 +22655,7 @@ index c8014f8..02de884 100644
optional_policy(`
dbus_system_domain(firewalld_t, firewalld_exec_t)
@@ -85,6 +100,10 @@ optional_policy(`
@@ -85,6 +101,10 @@ optional_policy(`
')
optional_policy(`
@ -28148,8 +28188,20 @@ index 94ec5f8..801417b 100644
logging_send_syslog_msg(iodined_t)
diff --git a/irc.fc b/irc.fc
index 48e7739..c3285c2 100644
--- a/irc.fc
+++ b/irc.fc
@@ -1,6 +1,6 @@
HOME_DIR/\.ircmotd -- gen_context(system_u:object_r:irc_home_t,s0)
HOME_DIR/\.irssi(/.*)? gen_context(system_u:object_r:irc_home_t,s0)
-HOME_DIR/irclogs(/.*)? gen_context(system_u:object_r:irc_log_home_t,s0)
+HOME_DIR/irclog(/.*)? gen_context(system_u:object_r:issi_home_t,s0)
/etc/irssi\.conf -- gen_context(system_u:object_r:irc_conf_t,s0)
diff --git a/irc.if b/irc.if
index ac00fb0..06cb083 100644
index ac00fb0..53e4fc7 100644
--- a/irc.if
+++ b/irc.if
@@ -20,6 +20,7 @@ interface(`irc_role',`
@ -28160,7 +28212,7 @@ index ac00fb0..06cb083 100644
')
########################################
@@ -39,10 +40,33 @@ interface(`irc_role',`
@@ -39,10 +40,34 @@ interface(`irc_role',`
ps_process_pattern($2, irc_t)
allow $2 irc_t:process { ptrace signal_perms };
@ -28195,16 +28247,23 @@ index ac00fb0..06cb083 100644
+interface(`irc_filetrans_home_content',`
+ gen_require(`
+ type irc_home_t;
+ type irssi_home_t;
+ ')
+ userdom_user_home_dir_filetrans($1, irc_home_t, file, ".ircmotd")
+ userdom_user_home_dir_filetrans($1, irc_home_t, dir, ".irssi")
+ userdom_user_home_dir_filetrans($1, irc_home_t, dir, "irclogs")
+ userdom_user_home_dir_filetrans($1, irssi_home_t, dir, "irclogs")
')
diff --git a/irc.te b/irc.te
index ecad9c7..56e2b35 100644
index ecad9c7..86d790f 100644
--- a/irc.te
+++ b/irc.te
@@ -37,7 +37,32 @@ userdom_user_home_content(irc_log_home_t)
@@ -31,13 +31,35 @@ typealias irc_home_t alias { user_irc_home_t staff_irc_home_t sysadm_irc_home_t
typealias irc_home_t alias { auditadm_irc_home_t secadm_irc_home_t };
userdom_user_home_content(irc_home_t)
-type irc_log_home_t;
-userdom_user_home_content(irc_log_home_t)
-
type irc_tmp_t;
typealias irc_tmp_t alias { user_irc_tmp_t staff_irc_tmp_t sysadm_irc_tmp_t };
typealias irc_tmp_t alias { auditadm_irc_tmp_t secadm_irc_tmp_t };
@ -28233,12 +28292,12 @@ index ecad9c7..56e2b35 100644
+type irssi_etc_t;
+files_config_file(irssi_etc_t)
+
+type irssi_home_t;
+type irssi_home_t alias irc_log_home_t;
+userdom_user_home_content(irssi_home_t)
########################################
#
@@ -53,13 +78,7 @@ allow irc_t irc_conf_t:file read_file_perms;
@@ -53,13 +75,7 @@ allow irc_t irc_conf_t:file read_file_perms;
manage_dirs_pattern(irc_t, irc_home_t, irc_home_t)
manage_files_pattern(irc_t, irc_home_t, irc_home_t)
manage_lnk_files_pattern(irc_t, irc_home_t, irc_home_t)
@ -28253,7 +28312,7 @@ index ecad9c7..56e2b35 100644
manage_dirs_pattern(irc_t, irc_tmp_t, irc_tmp_t)
manage_files_pattern(irc_t, irc_tmp_t, irc_tmp_t)
@@ -70,7 +89,6 @@ files_tmp_filetrans(irc_t, irc_tmp_t, { file dir lnk_file sock_file fifo_file })
@@ -70,7 +86,6 @@ files_tmp_filetrans(irc_t, irc_tmp_t, { file dir lnk_file sock_file fifo_file })
kernel_read_system_state(irc_t)
@ -28261,7 +28320,7 @@ index ecad9c7..56e2b35 100644
corenet_all_recvfrom_netlabel(irc_t)
corenet_tcp_sendrecv_generic_if(irc_t)
corenet_tcp_sendrecv_generic_node(irc_t)
@@ -93,7 +111,6 @@ dev_read_rand(irc_t)
@@ -93,7 +108,6 @@ dev_read_rand(irc_t)
domain_use_interactive_fds(irc_t)
@ -28269,7 +28328,7 @@ index ecad9c7..56e2b35 100644
fs_getattr_all_fs(irc_t)
fs_search_auto_mountpoints(irc_t)
@@ -106,13 +123,15 @@ auth_use_nsswitch(irc_t)
@@ -106,13 +120,15 @@ auth_use_nsswitch(irc_t)
init_read_utmp(irc_t)
init_dontaudit_lock_utmp(irc_t)
@ -28287,7 +28346,7 @@ index ecad9c7..56e2b35 100644
tunable_policy(`irc_use_any_tcp_ports',`
corenet_sendrecv_all_server_packets(irc_t)
@@ -122,18 +141,71 @@ tunable_policy(`irc_use_any_tcp_ports',`
@@ -122,18 +138,71 @@ tunable_policy(`irc_use_any_tcp_ports',`
corenet_tcp_sendrecv_all_ports(irc_t)
')
@ -36110,7 +36169,7 @@ index 6ffaba2..18e3a70 100644
+/usr/lib/nspluginwrapper/plugin-config -- gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0)
+')
diff --git a/mozilla.if b/mozilla.if
index 6194b80..648d041 100644
index 6194b80..116d9d2 100644
--- a/mozilla.if
+++ b/mozilla.if
@@ -1,146 +1,75 @@
@ -36273,14 +36332,14 @@ index 6194b80..648d041 100644
- allow $2 mozilla_plugin_tmpfs_t:file { manage_file_perms relabel_file_perms };
- allow $2 mozilla_plugin_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
- allow $2 mozilla_plugin_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ mozilla_filetrans_home_content($2)
-
- allow $2 mozilla_plugin_rw_t:dir list_dir_perms;
- allow $2 mozilla_plugin_rw_t:file read_file_perms;
- allow $2 mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
-
- can_exec($2, mozilla_plugin_rw_t)
-
+ mozilla_filetrans_home_content($2)
- optional_policy(`
- mozilla_dbus_chat_plugin($2)
- ')
@ -36586,7 +36645,7 @@ index 6194b80..648d041 100644
## </summary>
## <param name="domain">
## <summary>
@@ -433,76 +320,90 @@ interface(`mozilla_dbus_chat',`
@@ -433,76 +320,108 @@ interface(`mozilla_dbus_chat',`
## </summary>
## </param>
#
@ -36654,6 +36713,24 @@ index 6194b80..648d041 100644
- libs_search_lib($1)
- manage_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
+ allow $1 mozilla_plugin_tmpfs_t:file delete_file_perms;
+')
+
+#######################################
+## <summary>
+## Dontaudit generict ipc read/write to a mozilla_plugin
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`mozilla_plugin_dontaudit_rw_sem',`
+ gen_require(`
+ type mozilla_plugin_t;
+ ')
+
+ allow $1 mozilla_plugin_t:sem { unix_read unix_write };
')
########################################
@ -36706,7 +36783,7 @@ index 6194b80..648d041 100644
## </summary>
## <param name="domain">
## <summary>
@@ -510,19 +411,18 @@ interface(`mozilla_plugin_read_tmpfs_files',`
@@ -510,19 +429,18 @@ interface(`mozilla_plugin_read_tmpfs_files',`
## </summary>
## </param>
#
@ -36731,7 +36808,7 @@ index 6194b80..648d041 100644
## </summary>
## <param name="domain">
## <summary>
@@ -530,45 +430,50 @@ interface(`mozilla_plugin_delete_tmpfs_files',`
@@ -530,45 +448,50 @@ interface(`mozilla_plugin_delete_tmpfs_files',`
## </summary>
## </param>
#
@ -42641,7 +42718,7 @@ index 0e8508c..b9c69d2 100644
+ files_etc_filetrans($1, NetworkManager_var_lib_t, file, "wireed-settings.conf")
')
diff --git a/networkmanager.te b/networkmanager.te
index 0b48a30..0c6cd41 100644
index 0b48a30..57fe60f 100644
--- a/networkmanager.te
+++ b/networkmanager.te
@@ -1,4 +1,4 @@
@ -42672,7 +42749,7 @@ index 0b48a30..0c6cd41 100644
type NetworkManager_log_t;
logging_log_file(NetworkManager_log_t)
@@ -39,24 +42,41 @@ init_system_domain(wpa_cli_t, wpa_cli_exec_t)
@@ -39,24 +42,42 @@ init_system_domain(wpa_cli_t, wpa_cli_exec_t)
# Local policy
#
@ -42699,6 +42776,7 @@ index 0b48a30..0c6cd41 100644
+allow NetworkManager_t self:unix_dgram_socket { sendto create_socket_perms };
+allow NetworkManager_t self:unix_stream_socket create_stream_socket_perms;
allow NetworkManager_t self:netlink_route_socket create_netlink_socket_perms;
+allow NetworkManager_t self:netlink_xfrm_socket create_netlink_socket_perms;
allow NetworkManager_t self:netlink_socket create_socket_perms;
allow NetworkManager_t self:netlink_kobject_uevent_socket create_socket_perms;
-allow NetworkManager_t self:tcp_socket { accept listen };
@ -42723,7 +42801,7 @@ index 0b48a30..0c6cd41 100644
manage_dirs_pattern(NetworkManager_t, NetworkManager_etc_rw_t, NetworkManager_etc_rw_t)
manage_files_pattern(NetworkManager_t, NetworkManager_etc_rw_t, NetworkManager_etc_rw_t)
@@ -68,6 +88,7 @@ create_files_pattern(NetworkManager_t, NetworkManager_log_t, NetworkManager_log_
@@ -68,6 +89,7 @@ create_files_pattern(NetworkManager_t, NetworkManager_log_t, NetworkManager_log_
setattr_files_pattern(NetworkManager_t, NetworkManager_log_t, NetworkManager_log_t)
logging_log_filetrans(NetworkManager_t, NetworkManager_log_t, file)
@ -42731,7 +42809,7 @@ index 0b48a30..0c6cd41 100644
manage_files_pattern(NetworkManager_t, NetworkManager_tmp_t, NetworkManager_tmp_t)
manage_sock_files_pattern(NetworkManager_t, NetworkManager_tmp_t, NetworkManager_tmp_t)
files_tmp_filetrans(NetworkManager_t, NetworkManager_tmp_t, { sock_file file })
@@ -81,9 +102,6 @@ manage_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_
@@ -81,9 +103,6 @@ manage_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_
manage_sock_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
files_pid_filetrans(NetworkManager_t, NetworkManager_var_run_t, { dir file sock_file })
@ -42741,7 +42819,7 @@ index 0b48a30..0c6cd41 100644
kernel_read_system_state(NetworkManager_t)
kernel_read_network_state(NetworkManager_t)
kernel_read_kernel_sysctls(NetworkManager_t)
@@ -91,7 +109,6 @@ kernel_request_load_module(NetworkManager_t)
@@ -91,7 +110,6 @@ kernel_request_load_module(NetworkManager_t)
kernel_read_debugfs(NetworkManager_t)
kernel_rw_net_sysctls(NetworkManager_t)
@ -42749,7 +42827,7 @@ index 0b48a30..0c6cd41 100644
corenet_all_recvfrom_netlabel(NetworkManager_t)
corenet_tcp_sendrecv_generic_if(NetworkManager_t)
corenet_udp_sendrecv_generic_if(NetworkManager_t)
@@ -102,22 +119,15 @@ corenet_raw_sendrecv_generic_node(NetworkManager_t)
@@ -102,22 +120,15 @@ corenet_raw_sendrecv_generic_node(NetworkManager_t)
corenet_tcp_sendrecv_all_ports(NetworkManager_t)
corenet_udp_sendrecv_all_ports(NetworkManager_t)
corenet_udp_bind_generic_node(NetworkManager_t)
@ -42775,7 +42853,7 @@ index 0b48a30..0c6cd41 100644
dev_rw_sysfs(NetworkManager_t)
dev_read_rand(NetworkManager_t)
dev_read_urand(NetworkManager_t)
@@ -125,13 +135,6 @@ dev_dontaudit_getattr_generic_blk_files(NetworkManager_t)
@@ -125,13 +136,6 @@ dev_dontaudit_getattr_generic_blk_files(NetworkManager_t)
dev_getattr_all_chr_files(NetworkManager_t)
dev_rw_wireless(NetworkManager_t)
@ -42789,7 +42867,7 @@ index 0b48a30..0c6cd41 100644
fs_getattr_all_fs(NetworkManager_t)
fs_search_auto_mountpoints(NetworkManager_t)
fs_list_inotifyfs(NetworkManager_t)
@@ -140,6 +143,16 @@ mls_file_read_all_levels(NetworkManager_t)
@@ -140,6 +144,16 @@ mls_file_read_all_levels(NetworkManager_t)
selinux_dontaudit_search_fs(NetworkManager_t)
@ -42806,7 +42884,7 @@ index 0b48a30..0c6cd41 100644
storage_getattr_fixed_disk_dev(NetworkManager_t)
init_read_utmp(NetworkManager_t)
@@ -148,10 +161,11 @@ init_domtrans_script(NetworkManager_t)
@@ -148,10 +162,11 @@ init_domtrans_script(NetworkManager_t)
auth_use_nsswitch(NetworkManager_t)
@ -42819,7 +42897,7 @@ index 0b48a30..0c6cd41 100644
seutil_read_config(NetworkManager_t)
@@ -166,21 +180,32 @@ sysnet_kill_dhcpc(NetworkManager_t)
@@ -166,21 +181,32 @@ sysnet_kill_dhcpc(NetworkManager_t)
sysnet_read_dhcpc_state(NetworkManager_t)
sysnet_delete_dhcpc_state(NetworkManager_t)
sysnet_search_dhcp_state(NetworkManager_t)
@ -42856,7 +42934,7 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -196,10 +221,6 @@ optional_policy(`
@@ -196,10 +222,6 @@ optional_policy(`
')
optional_policy(`
@ -42867,7 +42945,7 @@ index 0b48a30..0c6cd41 100644
consoletype_exec(NetworkManager_t)
')
@@ -210,16 +231,11 @@ optional_policy(`
@@ -210,16 +232,11 @@ optional_policy(`
optional_policy(`
dbus_system_domain(NetworkManager_t, NetworkManager_exec_t)
@ -42886,7 +42964,7 @@ index 0b48a30..0c6cd41 100644
')
')
@@ -231,18 +247,19 @@ optional_policy(`
@@ -231,18 +248,19 @@ optional_policy(`
dnsmasq_kill(NetworkManager_t)
dnsmasq_signal(NetworkManager_t)
dnsmasq_signull(NetworkManager_t)
@ -42909,7 +42987,18 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -257,11 +274,7 @@ optional_policy(`
@@ -250,6 +268,10 @@ optional_policy(`
ipsec_kill_mgmt(NetworkManager_t)
ipsec_signal_mgmt(NetworkManager_t)
ipsec_signull_mgmt(NetworkManager_t)
+ ipsec_domtrans(NetworkManager_t)
+ ipsec_kill(NetworkManager_t)
+ ipsec_signal(NetworkManager_t)
+ ipsec_signull(NetworkManager_t)
')
optional_policy(`
@@ -257,11 +279,7 @@ optional_policy(`
')
optional_policy(`
@ -42922,7 +43011,7 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -274,10 +287,17 @@ optional_policy(`
@@ -274,10 +292,17 @@ optional_policy(`
nscd_signull(NetworkManager_t)
nscd_kill(NetworkManager_t)
nscd_initrc_domtrans(NetworkManager_t)
@ -42940,7 +43029,7 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -289,6 +309,7 @@ optional_policy(`
@@ -289,6 +314,7 @@ optional_policy(`
')
optional_policy(`
@ -42948,7 +43037,7 @@ index 0b48a30..0c6cd41 100644
policykit_domtrans_auth(NetworkManager_t)
policykit_read_lib(NetworkManager_t)
policykit_read_reload(NetworkManager_t)
@@ -296,7 +317,7 @@ optional_policy(`
@@ -296,7 +322,7 @@ optional_policy(`
')
optional_policy(`
@ -42957,7 +43046,7 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -307,6 +328,7 @@ optional_policy(`
@@ -307,6 +333,7 @@ optional_policy(`
ppp_signal(NetworkManager_t)
ppp_signull(NetworkManager_t)
ppp_read_config(NetworkManager_t)
@ -42965,7 +43054,7 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -320,13 +342,15 @@ optional_policy(`
@@ -320,13 +347,15 @@ optional_policy(`
')
optional_policy(`
@ -42985,7 +43074,7 @@ index 0b48a30..0c6cd41 100644
')
optional_policy(`
@@ -356,6 +380,5 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
@@ -356,6 +385,5 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
init_dontaudit_use_fds(wpa_cli_t)
init_use_script_ptys(wpa_cli_t)
@ -47541,7 +47630,7 @@ index 0000000..a437f80
+files_read_config_files(openshift_domain)
diff --git a/openshift.fc b/openshift.fc
new file mode 100644
index 0000000..e108d48
index 0000000..f2d6119
--- /dev/null
+++ b/openshift.fc
@@ -0,0 +1,26 @@
@ -47565,7 +47654,7 @@ index 0000000..e108d48
+/usr/s?bin/(oo|rhc)-cgroup-read -- gen_context(system_u:object_r:openshift_cgroup_read_exec_t,s0)
+
+/usr/s?bin/(oo|rhc)-restorer -- gen_context(system_u:object_r:openshift_initrc_exec_t,s0)
+/usr/s?bin/(oo|rhc)-restorer-wrapper.sh -- gen_context(unconfined_u:object_r:httpd_openshift_script_exec_t,s0)
+/usr/s?bin/(oo|rhc)-restorer-wrapper.sh -- gen_context(system_u:object_r:httpd_openshift_script_exec_t,s0)
+/usr/s?bin/oo-admin-ctl-gears -- gen_context(system_u:object_r:openshift_initrc_exec_t,s0)
+/usr/s?bin/mcollectived -- gen_context(system_u:object_r:openshift_initrc_exec_t,s0)
+
@ -48225,10 +48314,10 @@ index 0000000..407386d
+')
diff --git a/openshift.te b/openshift.te
new file mode 100644
index 0000000..894ce1c
index 0000000..3c311bb
--- /dev/null
+++ b/openshift.te
@@ -0,0 +1,530 @@
@@ -0,0 +1,535 @@
+policy_module(openshift,1.0.0)
+
+gen_require(`
@ -48325,6 +48414,8 @@ index 0000000..894ce1c
+unconfined_domain_noaudit(openshift_initrc_t)
+mcs_process_set_categories(openshift_initrc_t)
+
+virt_lxc_domain(openshift_initrc_t)
+
+systemd_dbus_chat_logind(openshift_initrc_t)
+
+manage_dirs_pattern(openshift_initrc_t, openshift_initrc_tmp_t, openshift_initrc_tmp_t)
@ -48393,7 +48484,10 @@ index 0000000..894ce1c
+
+manage_dirs_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t)
+manage_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t)
+fs_tmpfs_filetrans(openshift_domain, openshift_tmpfs_t, { dir file })
+manage_lnk_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t)
+manage_sock_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t)
+manage_fifo_files_pattern(openshift_domain, openshift_tmpfs_t, openshift_tmpfs_t)
+fs_tmpfs_filetrans(openshift_domain, openshift_tmpfs_t, { dir file sock_file lnk_file fifo_file })
+can_exec(openshift_domain, openshift_tmpfs_t)
+
+manage_dirs_pattern(openshift_domain, openshift_tmp_t, openshift_tmp_t)
@ -63150,7 +63244,7 @@ index bff31df..e38693b 100644
## <param name="domain">
## <summary>
diff --git a/realmd.te b/realmd.te
index 9a8f052..727d60a 100644
index 9a8f052..9817f00 100644
--- a/realmd.te
+++ b/realmd.te
@@ -1,4 +1,4 @@
@ -63159,7 +63253,7 @@ index 9a8f052..727d60a 100644
########################################
#
@@ -7,43 +7,52 @@ policy_module(realmd, 1.0.2)
@@ -7,29 +7,37 @@ policy_module(realmd, 1.0.2)
type realmd_t;
type realmd_exec_t;
@ -63167,6 +63261,9 @@ index 9a8f052..727d60a 100644
+application_domain(realmd_t, realmd_exec_t)
+role system_r types realmd_t;
+
+type realmd_tmp_t;
+files_tmp_file(realmd_tmp_t)
+
+type realmd_var_cache_t;
+files_type(realmd_var_cache_t)
@ -63179,6 +63276,10 @@ index 9a8f052..727d60a 100644
allow realmd_t self:capability sys_nice;
allow realmd_t self:process setsched;
+manage_dirs_pattern(realmd_t, realmd_tmp_t, realmd_tmp_t)
+manage_files_pattern(realmd_t, realmd_tmp_t, realmd_tmp_t)
+files_tmp_filetrans(realmd_t, realmd_tmp_t, { dir file })
+
+manage_files_pattern(realmd_t, realmd_var_cache_t, realmd_var_cache_t)
+manage_dirs_pattern(realmd_t, realmd_var_cache_t, realmd_var_cache_t)
+
@ -63195,17 +63296,16 @@ index 9a8f052..727d60a 100644
-corenet_sendrecv_http_client_packets(realmd_t)
corenet_tcp_connect_http_port(realmd_t)
-corenet_tcp_sendrecv_http_port(realmd_t)
+corenet_tcp_connect_ldap_port(realmd_t)
domain_use_interactive_fds(realmd_t)
dev_read_rand(realmd_t)
dev_read_urand(realmd_t)
@@ -38,12 +46,20 @@ dev_read_urand(realmd_t)
-fs_getattr_all_fs(realmd_t)
fs_getattr_all_fs(realmd_t)
-files_read_usr_files(realmd_t)
+fs_getattr_all_fs(realmd_t)
-
auth_use_nsswitch(realmd_t)
logging_send_syslog_msg(realmd_t)
@ -63223,7 +63323,7 @@ index 9a8f052..727d60a 100644
optional_policy(`
dbus_system_domain(realmd_t, realmd_exec_t)
@@ -67,17 +76,25 @@ optional_policy(`
@@ -67,17 +83,25 @@ optional_policy(`
optional_policy(`
nis_exec_ypbind(realmd_t)
@ -63252,13 +63352,13 @@ index 9a8f052..727d60a 100644
')
optional_policy(`
@@ -86,5 +103,26 @@ optional_policy(`
@@ -86,5 +110,26 @@ optional_policy(`
sssd_manage_lib_files(realmd_t)
sssd_manage_public_files(realmd_t)
sssd_read_pid_files(realmd_t)
- sssd_initrc_domtrans(realmd_t)
+ sssd_systemctl(realmd_t)
')
+')
+
+optional_policy(`
+ xserver_read_state_xdm(realmd_t)
@ -63277,7 +63377,7 @@ index 9a8f052..727d60a 100644
+ oddjob_systemctl(realmd_consolehelper_t)
+
+ unconfined_domain_noaudit(realmd_consolehelper_t)
+')
')
+
+
diff --git a/remotelogin.fc b/remotelogin.fc
@ -67080,7 +67180,7 @@ index 3bd6446..a61764b 100644
+ allow $1 var_lib_nfs_t:file relabel_file_perms;
')
diff --git a/rpc.te b/rpc.te
index e5212e6..699925d 100644
index e5212e6..427ea8c 100644
--- a/rpc.te
+++ b/rpc.te
@@ -1,4 +1,4 @@
@ -67412,7 +67512,7 @@ index e5212e6..699925d 100644
userdom_list_user_tmp(gssd_t)
userdom_read_user_tmp_files(gssd_t)
userdom_read_user_tmp_symlinks(gssd_t)
+ userdom_write_user_tmp_files(gssd_t)
+ userdom_manage_user_tmp_files(gssd_t)
+ files_read_generic_tmp_files(gssd_t)
')
@ -72221,10 +72321,10 @@ index 0000000..1b21b7b
+')
diff --git a/sandboxX.te b/sandboxX.te
new file mode 100644
index 0000000..449a87c
index 0000000..5a3d049
--- /dev/null
+++ b/sandboxX.te
@@ -0,0 +1,462 @@
@@ -0,0 +1,463 @@
+policy_module(sandboxX,1.0.0)
+
+dbus_stub()
@ -72685,6 +72785,7 @@ index 0000000..449a87c
+ mozilla_dontaudit_rw_user_home_files(sandbox_x_t)
+ mozilla_dontaudit_rw_user_home_files(sandbox_xserver_t)
+ mozilla_dontaudit_rw_user_home_files(sandbox_x_domain)
+ mozilla_plugin_dontaudit_rw_sem(sandbox_x_domain)
+ mozilla_plugin_dontaudit_leaks(sandbox_x_domain)
+')
diff --git a/sanlock.fc b/sanlock.fc
@ -84087,7 +84188,7 @@ index c30da4c..014e40c 100644
+/var/run/qemu-ga\.pid -- gen_context(system_u:object_r:virt_qemu_ga_var_run_t,s0)
+/var/log/qemu-ga\.log -- gen_context(system_u:object_r:virt_qemu_ga_log_t,s0)
diff --git a/virt.if b/virt.if
index 9dec06c..b991ec7 100644
index 9dec06c..8f6d2a3 100644
--- a/virt.if
+++ b/virt.if
@@ -1,120 +1,51 @@
@ -85492,7 +85593,7 @@ index 9dec06c..b991ec7 100644
## </summary>
## <param name="domain">
## <summary>
@@ -1091,95 +943,132 @@ interface(`virt_manage_virt_cache',`
@@ -1091,95 +943,150 @@ interface(`virt_manage_virt_cache',`
## </summary>
## </param>
#
@ -85511,16 +85612,16 @@ index 9dec06c..b991ec7 100644
- manage_files_pattern($1, virt_image_type, virt_image_type)
- read_lnk_files_pattern($1, virt_image_type, virt_image_type)
- rw_blk_files_pattern($1, virt_image_type, virt_image_type)
+ userdom_user_home_dir_filetrans($1, virt_home_t, dir, ".libvirt")
+ userdom_user_home_dir_filetrans($1, virt_home_t, dir, ".virtinst")
+ filetrans_pattern($1, virt_home_t, svirt_home_t, dir, "qemu")
-
- tunable_policy(`virt_use_nfs',`
- fs_manage_nfs_dirs($1)
- fs_manage_nfs_files($1)
- fs_read_nfs_symlinks($1)
- ')
-
+ userdom_user_home_dir_filetrans($1, virt_home_t, dir, ".libvirt")
+ userdom_user_home_dir_filetrans($1, virt_home_t, dir, ".virtinst")
+ filetrans_pattern($1, virt_home_t, svirt_home_t, dir, "qemu")
- tunable_policy(`virt_use_samba',`
- fs_manage_cifs_files($1)
- fs_manage_cifs_files($1)
@ -85585,14 +85686,6 @@ index 9dec06c..b991ec7 100644
- allow $1 { virtd_lxc_t virsh_t virt_bridgehelper_t virt_qmf_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { virt_domain svirt_lxc_domain virtd_t })
- ps_process_pattern($1, { virtd_lxc_t virsh_t virt_bridgehelper_t virt_qmf_t })
-
- init_labeled_script_domtrans($1, virtd_initrc_exec_t)
- domain_system_change_exemption($1)
- role_transition $2 virtd_initrc_exec_t system_r;
- allow $2 system_r;
-
- fs_search_tmpfs($1)
- admin_pattern($1, virt_tmpfs_type)
+ type $1_t, svirt_lxc_domain;
+ domain_type($1_t)
+ domain_user_exemption_target($1_t)
@ -85600,9 +85693,33 @@ index 9dec06c..b991ec7 100644
+ mcs_constrained($1_t)
+ role system_r types $1_t;
- init_labeled_script_domtrans($1, virtd_initrc_exec_t)
- domain_system_change_exemption($1)
- role_transition $2 virtd_initrc_exec_t system_r;
- allow $2 system_r;
+ kernel_read_system_state($1_t)
+')
- fs_search_tmpfs($1)
- admin_pattern($1, virt_tmpfs_type)
+########################################
+## <summary>
+## Make the specified type usable as a lxc domain
+## </summary>
+## <param name="type">
+## <summary>
+## Type to be used as a lxc domain
+## </summary>
+## </param>
+#
+template(`virt_lxc_domain',`
+ gen_require(`
+ attribute svirt_lxc_domain;
+ ')
- files_search_tmp($1)
- admin_pattern($1, { virt_tmp_type virt_tmp_t })
+ kernel_read_system_state($1_t)
+ typeattribute $1 svirt_lxc_domain;
+')
- files_search_etc($1)

View File

@ -19,7 +19,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.12.1
Release: 24%{?dist}
Release: 25%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@ -526,6 +526,38 @@ SELinux Reference policy mls base module.
%endif
%changelog
* Tue Apr 2 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-25
- Allow realmd to create tmp files
- FIx ircssi_home_t type to irssi_home_t
- Allow adcli running as realmd_t to connect to ldap port
- Allow NetworkManager to transition to ipsec_t, for running strongswan
- Make openshift_initrc_t an lxc_domain
- Allow gssd to manage user_tmp_t files
- Fix handling of irclogs in users homedir
- Fix labeling for drupal an wp-content in subdirs of /var/www/html
- Allow abrt to read utmp_t file
- Fix openshift policy to transition lnk_file, sock-file an fifo_file when created in a tmpfs_t, needs back port to RHEL6
- fix labeling for (oo|rhc)-restorer-wrapper.sh
- firewalld needs to be able to write to network sysctls
- Fix mozilla_plugin_dontaudit_rw_sem() interface
- Dontaudit generic ipc read/write to a mozilla_plugin for sandbox_x domains
- Add mozilla_plugin_dontaudit_rw_sem() interface
- Allow svirt_lxc_t to transition to openshift domains
- Allow condor domains block_suspend and dac_override caps
- Allow condor_master to read passd
- Allow condor_master to read system state
- Allow NetworkManager to transition to ipsec_t, for running strongswan
- Lots of access required by lvm_t to created encrypted usb device
- Allow xdm_t to dbus communicate with systemd_localed_t
- Label strongswan content as ipsec_exec_mgmt_t for now
- Allow users to dbus chat with systemd_localed
- Fix handling of .xsession-errors in xserver.if, so kde will work
- Might be a bug but we are seeing avc's about people status on init_t:service
- Make sure we label content under /var/run/lock as <<none>>
- Allow daemon and systemprocesses to search init_var_run_t directory
- Add boolean to allow xdm to write xauth data to the home directory
- Allow mount to write keys for the unconfined domain
* Tue Mar 26 2013 Miroslav Grepl <mgrepl@redhat.com> 3.12.1-24
- Add labeling for /usr/share/pki
- Allow programs that read var_run_t symlinks also read var_t symlinks