summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2023-07-27 14:07:48 -0400
committerJoe MacDonald <joe@deserted.net>2023-07-31 15:05:30 -0400
commit1924d975283210f0c36bc3c0e8ce516ccc06961f (patch)
tree494be7575b6219b816613ddefb6072973d8e78d4
parent4f3ec6e10f13aaf19fbca9a18547f9e72ba1ec0a (diff)
downloadmeta-selinux-dunfell.tar.gz
refpolicy: update to 20200229+gitdunfell
* Drop obsolete and unused patches. * Rebase patches. * Add patches to make systemd and sysvinit can work with all policy types. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> (cherry picked from commit 15fed8756aa4828fa12a3d813754b4ca65a7607d) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Joe MacDonald <joe@deserted.net>
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0001-refpolicy-minimum-audit-logging-getty-audit-related-.patch68
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0002-refpolicy-minimum-locallogin-add-allow-rules-for-typ.patch54
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0003-fc-sysklogd-apply-policy-to-sysklogd-symlink.patch57
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0003-refpolicy-minimum-systemd-unconfined-lib-add-systemd.patch121
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0004-refpolicy-minimum-systemd-mount-logging-authlogin-ad.patch96
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0005-refpolicy-minimum-init-fix-reboot-with-systemd-as-in.patch37
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0006-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch30
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0006-refpolicy-minimum-systemd-mount-enable-required-refp.patch92
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0007-refpolicy-minimum-systemd-fix-for-login-journal-serv.patch103
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch110
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0009-fc-hwclock-add-hwclock-alternatives.patch28
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0009-refpolicy-minimum-systemd-fix-for-syslog.patch70
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0010-fc-dmesg-apply-policy-to-dmesg-alternatives.patch24
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0014-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch29
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0024-policy-module-rpc-allow-nfsd-to-exec-shell-commands.patch29
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0025-policy-module-rpc-fix-policy-for-nfsserver-to-mount-.patch77
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0026-policy-module-sysfs-fix-for-new-SELINUXMNT-in-sys.patch126
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0027-policy-module-rpc-allow-sysadm-to-run-rpcinfo.patch31
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0028-policy-module-userdomain-fix-selinux-utils-to-manage.patch45
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0029-policy-module-selinuxutil-fix-setfiles-statvfs-to-ge.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0030-policy-module-admin-fix-dmesg-to-use-dev-kmsg-as-def.patch25
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0031-policy-module-ftp-add-ftpd_t-to-mls_file_write_all_l.patch41
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0032-policy-module-init-update-for-systemd-related-allow-.patch32
-rw-r--r--recipes-security/refpolicy/refpolicy-git/0034-policy-module-apache-add-rules-for-the-symlink-of-va.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy-minimum_git.bb6
-rw-r--r--recipes-security/refpolicy/refpolicy-targeted_git.bb20
-rw-r--r--recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch (renamed from recipes-security/refpolicy/refpolicy-git/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch)21
-rw-r--r--recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch (renamed from recipes-security/refpolicy/refpolicy-git/0033-refpolicy-minimum-make-sysadmin-module-optional.patch)40
-rw-r--r--recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch193
-rw-r--r--recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch (renamed from recipes-security/refpolicy/refpolicy-git/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch)26
-rw-r--r--recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch (renamed from recipes-security/refpolicy/refpolicy-git/0004-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch)21
-rw-r--r--recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch (renamed from recipes-security/refpolicy/refpolicy-git/0005-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch)17
-rw-r--r--recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch29
-rw-r--r--recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch (renamed from recipes-security/refpolicy/refpolicy-git/0007-fc-login-apply-login-context-to-login.shadow.patch)13
-rw-r--r--recipes-security/refpolicy/refpolicy/0007-fc-bind-fix-real-path-for-bind.patch (renamed from recipes-security/refpolicy/refpolicy-git/0008-fc-bind-fix-real-path-for-bind.patch)13
-rw-r--r--recipes-security/refpolicy/refpolicy/0008-fc-hwclock-add-hwclock-alternatives.patch25
-rw-r--r--recipes-security/refpolicy/refpolicy/0009-fc-dmesg-apply-policy-to-dmesg-alternatives.patch23
-rw-r--r--recipes-security/refpolicy/refpolicy/0010-fc-ssh-apply-policy-to-ssh-alternatives.patch (renamed from recipes-security/refpolicy/refpolicy-git/0011-fc-ssh-apply-policy-to-ssh-alternatives.patch)13
-rw-r--r--recipes-security/refpolicy/refpolicy/0011-fc-sysnetwork-apply-policy-to-ip-alternatives.patch (renamed from recipes-security/refpolicy/refpolicy-git/0012-fc-sysnetwork-apply-policy-to-ip-alternatives.patch)35
-rw-r--r--recipes-security/refpolicy/refpolicy/0012-fc-udev-apply-policy-to-udevadm-in-libexec.patch (renamed from recipes-security/refpolicy/refpolicy-git/0013-fc-udev-apply-policy-to-udevadm-in-libexec.patch)13
-rw-r--r--recipes-security/refpolicy/refpolicy/0013-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch27
-rw-r--r--recipes-security/refpolicy/refpolicy/0014-fc-su-apply-policy-to-su-alternatives.patch (renamed from recipes-security/refpolicy/refpolicy-git/0015-fc-su-apply-policy-to-su-alternatives.patch)15
-rw-r--r--recipes-security/refpolicy/refpolicy/0015-fc-fstools-fix-real-path-for-fstools.patch (renamed from recipes-security/refpolicy/refpolicy-git/0016-fc-fstools-fix-real-path-for-fstools.patch)58
-rw-r--r--recipes-security/refpolicy/refpolicy/0016-fc-init-fix-update-alternatives-for-sysvinit.patch (renamed from recipes-security/refpolicy/refpolicy-git/0001-fix-update-alternatives-for-sysvinit.patch)40
-rw-r--r--recipes-security/refpolicy/refpolicy/0017-fc-brctl-apply-policy-to-brctl-alternatives.patch24
-rw-r--r--recipes-security/refpolicy/refpolicy/0018-fc-corecommands-apply-policy-to-nologin-alternatives.patch28
-rw-r--r--recipes-security/refpolicy/refpolicy/0019-fc-locallogin-apply-policy-to-sulogin-alternatives.patch25
-rw-r--r--recipes-security/refpolicy/refpolicy/0020-fc-ntp-apply-policy-to-ntpd-alternatives.patch27
-rw-r--r--recipes-security/refpolicy/refpolicy/0021-fc-kerberos-apply-policy-to-kerberos-alternatives.patch50
-rw-r--r--recipes-security/refpolicy/refpolicy/0022-fc-ldap-apply-policy-to-ldap-alternatives.patch40
-rw-r--r--recipes-security/refpolicy/refpolicy/0023-fc-postgresql-apply-policy-to-postgresql-alternative.patch37
-rw-r--r--recipes-security/refpolicy/refpolicy/0024-fc-screen-apply-policy-to-screen-alternatives.patch25
-rw-r--r--recipes-security/refpolicy/refpolicy/0025-fc-usermanage-apply-policy-to-usermanage-alternative.patch45
-rw-r--r--recipes-security/refpolicy/refpolicy/0026-fc-getty-add-file-context-to-start_getty.patch27
-rw-r--r--recipes-security/refpolicy/refpolicy/0027-fc-init-add-file-context-to-etc-network-if-files.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy/0028-fc-vlock-apply-policy-to-vlock-alternatives.patch25
-rw-r--r--recipes-security/refpolicy/refpolicy/0029-fc-cron-apply-policy-to-etc-init.d-crond.patch25
-rw-r--r--recipes-security/refpolicy/refpolicy/0030-file_contexts.subs_dist-set-aliase-for-root-director.patch30
-rw-r--r--recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-add-rules-for-the-syml.patch (renamed from recipes-security/refpolicy/refpolicy-git/0018-policy-module-logging-add-rules-for-the-symlink-of-v.patch)59
-rw-r--r--recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-add-rules-for-syslogd-.patch (renamed from recipes-security/refpolicy/refpolicy-git/0019-policy-module-logging-add-rules-for-syslogd-symlink-.patch)17
-rw-r--r--recipes-security/refpolicy/refpolicy/0033-policy-modules-system-logging-add-domain-rules-for-t.patch (renamed from recipes-security/refpolicy/refpolicy-git/0020-policy-module-logging-add-domain-rules-for-the-subdi.patch)13
-rw-r--r--recipes-security/refpolicy/refpolicy/0034-policy-modules-kernel-files-add-rules-for-the-symlin.patch (renamed from recipes-security/refpolicy/refpolicy-git/0021-policy-module-files-add-rules-for-the-symlink-of-tmp.patch)32
-rw-r--r--recipes-security/refpolicy/refpolicy/0035-policy-modules-kernel-terminal-add-rules-for-bsdpty_.patch (renamed from recipes-security/refpolicy/refpolicy-git/0022-policy-module-terminals-add-rules-for-bsdpty_device_.patch)17
-rw-r--r--recipes-security/refpolicy/refpolicy/0036-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch (renamed from recipes-security/refpolicy/refpolicy-git/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch)13
-rw-r--r--recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch34
-rw-r--r--recipes-security/refpolicy/refpolicy/0038-policy-modules-system-getty-allow-getty_t-watch-gett.patch42
-rw-r--r--recipes-security/refpolicy/refpolicy/0039-policy-modules-services-bluetooth-allow-bluetooth_t-.patch65
-rw-r--r--recipes-security/refpolicy/refpolicy/0040-policy-modules-roles-sysadm-allow-sysadm-to-run-rpci.patch38
-rw-r--r--recipes-security/refpolicy/refpolicy/0041-policy-modules-services-rpc-add-capability-dac_read_.patch34
-rw-r--r--recipes-security/refpolicy/refpolicy/0042-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch45
-rw-r--r--recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rngd-fix-security-context-fo.patch64
-rw-r--r--recipes-security/refpolicy/refpolicy/0044-policy-modules-system-authlogin-allow-chkpwd_t-to-ma.patch34
-rw-r--r--recipes-security/refpolicy/refpolicy/0045-policy-modules-system-udev-allow-udevadm_t-to-search.patch34
-rw-r--r--recipes-security/refpolicy/refpolicy/0046-policy-modules-udev-do-not-audit-udevadm_t-to-read-w.patch37
-rw-r--r--recipes-security/refpolicy/refpolicy/0047-policy-modules-services-rdisc-allow-rdisc_t-to-searc.patch34
-rw-r--r--recipes-security/refpolicy/refpolicy/0048-policy-modules-system-logging-fix-auditd-startup-fai.patch52
-rw-r--r--recipes-security/refpolicy/refpolicy/0049-policy-modules-services-ssh-make-respective-init-scr.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy/0050-policy-modules-kernel-terminal-allow-loging-to-reset.patch31
-rw-r--r--recipes-security/refpolicy/refpolicy/0051-policy-modules-system-selinuxutil-allow-semanage_t-t.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy/0052-policy-modules-system-sysnetwork-allow-ifconfig_t-to.patch35
-rw-r--r--recipes-security/refpolicy/refpolicy/0053-policy-modules-services-ntp-allow-ntpd_t-to-watch-sy.patch55
-rw-r--r--recipes-security/refpolicy/refpolicy/0054-policy-modules-system-systemd-enable-support-for-sys.patch64
-rw-r--r--recipes-security/refpolicy/refpolicy/0055-policy-modules-system-logging-fix-systemd-journald-s.patch74
-rw-r--r--recipes-security/refpolicy/refpolicy/0056-policy-modules-roles-sysadm-allow-sysadm_t-to-watch-.patch36
-rw-r--r--recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch35
-rw-r--r--recipes-security/refpolicy/refpolicy/0058-policy-modules-system-systemd-systemd-gpt-auto-gener.patch35
-rw-r--r--recipes-security/refpolicy/refpolicy/0059-policy-modules-services-rpc-fix-policy-for-nfsserver.patch78
-rw-r--r--recipes-security/refpolicy/refpolicy/0060-policy-modules-services-rpc-make-rpcd_t-MLS-trusted-.patch36
-rw-r--r--recipes-security/refpolicy/refpolicy/0061-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch41
-rw-r--r--recipes-security/refpolicy/refpolicy/0062-policy-modules-system-mount-make-mount_t-domain-MLS-.patch36
-rw-r--r--recipes-security/refpolicy/refpolicy/0063-policy-modules-system-setrans-allow-setrans-to-acces.patch53
-rw-r--r--recipes-security/refpolicy/refpolicy/0064-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch36
-rw-r--r--recipes-security/refpolicy/refpolicy/0065-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch77
-rw-r--r--recipes-security/refpolicy/refpolicy/0066-policy-modules-system-init-make-init_t-MLS-trusted-f.patch46
-rw-r--r--recipes-security/refpolicy/refpolicy/0067-policy-modules-system-systemd-make-systemd-tmpfiles_.patch63
-rw-r--r--recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch (renamed from recipes-security/refpolicy/refpolicy-git/0017-policy-module-logging-Add-the-syslogd_t-to-trusted-o.patch)20
-rw-r--r--recipes-security/refpolicy/refpolicy/0069-policy-modules-system-init-make-init_t-MLS-trusted-f.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy/0070-policy-modules-system-init-all-init_t-to-read-any-le.patch40
-rw-r--r--recipes-security/refpolicy/refpolicy/0071-policy-modules-system-logging-allow-auditd_t-to-writ.patch39
-rw-r--r--recipes-security/refpolicy/refpolicy/0072-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch32
-rw-r--r--recipes-security/refpolicy/refpolicy/0073-policy-modules-system-systemd-make-systemd-logind-do.patch42
-rw-r--r--recipes-security/refpolicy/refpolicy/0074-policy-modules-system-systemd-systemd-user-sessions-.patch41
-rw-r--r--recipes-security/refpolicy/refpolicy/0075-policy-modules-system-systemd-systemd-networkd-make-.patch36
-rw-r--r--recipes-security/refpolicy/refpolicy/0076-policy-modules-system-systemd-systemd-resolved-make-.patch40
-rw-r--r--recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch36
-rw-r--r--recipes-security/refpolicy/refpolicy/0078-policy-modules-system-systemd-systemd-gpt-auto-gener.patch70
-rw-r--r--recipes-security/refpolicy/refpolicy/0079-policy-modules-services-ntp-make-nptd_t-MLS-trusted-.patch40
-rw-r--r--recipes-security/refpolicy/refpolicy/0080-policy-modules-services-avahi-make-avahi_t-MLS-trust.patch29
-rw-r--r--recipes-security/refpolicy/refpolicy_common.inc118
-rw-r--r--recipes-security/refpolicy/refpolicy_git.inc6
110 files changed, 2982 insertions, 1681 deletions
diff --git a/recipes-security/refpolicy/refpolicy-git/0001-refpolicy-minimum-audit-logging-getty-audit-related-.patch b/recipes-security/refpolicy/refpolicy-git/0001-refpolicy-minimum-audit-logging-getty-audit-related-.patch
deleted file mode 100644
index 3cc5395..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0001-refpolicy-minimum-audit-logging-getty-audit-related-.patch
+++ /dev/null
@@ -1,68 +0,0 @@
1From 0f25b7c345d516eccd1c02c93f752ce073b84865 Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:51:44 +0530
4Subject: [PATCH 1/9] refpolicy-minimum: audit: logging: getty: audit related
5 allow rules
6
7add allow rules for audit.log file & resolve dependent avc denials.
8
9without this change we are getting audit avc denials mixed into bootlog &
10audit other avc denials.
11
12audit: type=1400 audit(): avc: denied { getattr } for pid=217 comm="mount"
13name="/" dev="proc" ino=1 scontext=system_u:system_r:mount_t:s0 tcontext=system_0
14audit: type=1400 audit(): avc: denied { sendto } for pid=310 comm="klogd"
15path="/run/systemd/journal/dev-log" scontext=sy0
16audit: type=1400 audit(): avc: denied { sendto } for pid=310 comm="klogd"
17path="/run/systemd/journal/dev-log" scontext=system_u:system_r:klogd_t:s0
18audit(): avc: denied { open } for pid=540 comm="agetty" path="/var/
19volatile/log/wtmp" dev="tmpfs" ino=9536 scontext=system_u:system_r:getty_t
20:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=file permissive=0
21
22Upstream-Status: Pending
23
24Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
25Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
26---
27 policy/modules/system/getty.te | 3 +++
28 policy/modules/system/logging.te | 8 ++++++++
29 2 files changed, 11 insertions(+)
30
31diff --git a/policy/modules/system/getty.te b/policy/modules/system/getty.te
32index 6d3c4284..423db0cc 100644
33--- a/policy/modules/system/getty.te
34+++ b/policy/modules/system/getty.te
35@@ -129,3 +129,6 @@ optional_policy(`
36 optional_policy(`
37 udev_read_db(getty_t)
38 ')
39+
40+allow getty_t tmpfs_t:dir search;
41+allow getty_t tmpfs_t:file { open write lock };
42diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
43index e6221a02..4cc73327 100644
44--- a/policy/modules/system/logging.te
45+++ b/policy/modules/system/logging.te
46@@ -249,6 +249,7 @@ allow audisp_t self:unix_stream_socket create_stream_socket_perms;
47 allow audisp_t self:unix_dgram_socket create_socket_perms;
48
49 allow audisp_t auditd_t:unix_stream_socket rw_socket_perms;
50+allow audisp_t initrc_t:unix_dgram_socket sendto;
51
52 manage_sock_files_pattern(audisp_t, audisp_var_run_t, audisp_var_run_t)
53 files_pid_filetrans(audisp_t, audisp_var_run_t, sock_file)
54@@ -620,3 +621,10 @@ optional_policy(`
55 # log to the xconsole
56 xserver_rw_console(syslogd_t)
57 ')
58+
59+
60+allow auditd_t tmpfs_t:file { getattr setattr create open read append };
61+allow auditd_t tmpfs_t:dir { open read search add_name write getattr search };
62+allow auditd_t initrc_t:unix_dgram_socket sendto;
63+
64+allow klogd_t initrc_t:unix_dgram_socket sendto;
65\ No newline at end of file
66--
672.19.1
68
diff --git a/recipes-security/refpolicy/refpolicy-git/0002-refpolicy-minimum-locallogin-add-allow-rules-for-typ.patch b/recipes-security/refpolicy/refpolicy-git/0002-refpolicy-minimum-locallogin-add-allow-rules-for-typ.patch
deleted file mode 100644
index e2c6c89..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0002-refpolicy-minimum-locallogin-add-allow-rules-for-typ.patch
+++ /dev/null
@@ -1,54 +0,0 @@
1From b69a82237ccc8de3f5b822739760f5cb6596fe51 Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:53:46 +0530
4Subject: [PATCH 2/9] refpolicy-minimum: locallogin: add allow rules for type
5 local_login_t
6
7add allow rules for locallogin module avc denials.
8
9without this change we are getting errors like these:
10
11type=AVC msg=audit(): avc: denied { read write open } for pid=353
12comm="login" path="/var/volatile/log/lastlog" dev="tmpfs" ino=12281 scontext
13=system_u:system_r:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:
14var_log_t:s0 tclass=file permissive=1
15
16type=AVC msg=audit(): avc: denied { sendto } for pid=353 comm="login"
17path="/run/systemd/journal/dev-log" scontext=system_u:system_r:
18local_login_t:s0-s0:c0.c1023 tcontext=system_u:system_r:initrc_t:s0
19tclass=unix_dgram_socket permissive=1
20
21type=AVC msg=audit(): avc: denied { lock } for pid=353 comm="login" path=
22"/var/volatile/log/lastlog" dev="tmpfs" ino=12281 scontext=system_u:system_r
23:local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass
24=file permissive=1
25
26Upstream-Status: Pending
27
28Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
29Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
30---
31 policy/modules/system/locallogin.te | 10 ++++++++++
32 1 file changed, 10 insertions(+)
33
34diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te
35index 4c679ff3..75750e4c 100644
36--- a/policy/modules/system/locallogin.te
37+++ b/policy/modules/system/locallogin.te
38@@ -288,3 +288,13 @@ optional_policy(`
39 optional_policy(`
40 nscd_use(sulogin_t)
41 ')
42+
43+allow local_login_t initrc_t:fd use;
44+allow local_login_t initrc_t:unix_dgram_socket sendto;
45+allow local_login_t initrc_t:unix_stream_socket connectto;
46+allow local_login_t self:capability net_admin;
47+allow local_login_t var_log_t:file { create lock open read write };
48+allow local_login_t var_run_t:file { open read write lock};
49+allow local_login_t var_run_t:sock_file write;
50+allow local_login_t tmpfs_t:dir { add_name write search};
51+allow local_login_t tmpfs_t:file { create open read write lock };
52--
532.19.1
54
diff --git a/recipes-security/refpolicy/refpolicy-git/0003-fc-sysklogd-apply-policy-to-sysklogd-symlink.patch b/recipes-security/refpolicy/refpolicy-git/0003-fc-sysklogd-apply-policy-to-sysklogd-symlink.patch
deleted file mode 100644
index f194d6d..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0003-fc-sysklogd-apply-policy-to-sysklogd-symlink.patch
+++ /dev/null
@@ -1,57 +0,0 @@
1From d0fd07dda45b349af634e4671a70e47fef102386 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:39:41 +0800
4Subject: [PATCH 03/34] fc/sysklogd: apply policy to sysklogd symlink
5
6/etc/syslog.conf is a symlink to /etc/syslog.conf.sysklogd, so a allow
7rule for syslogd_t to read syslog_conf_t lnk_file is needed.
8
9Upstream-Status: Inappropriate [only for Poky]
10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13---
14 policy/modules/system/logging.fc | 3 +++
15 policy/modules/system/logging.te | 1 +
16 2 files changed, 4 insertions(+)
17
18diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc
19index 6693d87b..0cf108e0 100644
20--- a/policy/modules/system/logging.fc
21+++ b/policy/modules/system/logging.fc
22@@ -2,6 +2,7 @@
23
24 /etc/rsyslog\.conf -- gen_context(system_u:object_r:syslog_conf_t,s0)
25 /etc/syslog\.conf -- gen_context(system_u:object_r:syslog_conf_t,s0)
26+/etc/syslog\.conf\.sysklogd gen_context(system_u:object_r:syslog_conf_t,s0)
27 /etc/rsyslog\.d(/.*)? gen_context(system_u:object_r:syslog_conf_t,s0)
28 /etc/audit(/.*)? gen_context(system_u:object_r:auditd_etc_t,mls_systemhigh)
29 /etc/systemd/journal.*\.conf -- gen_context(system_u:object_r:syslog_conf_t,s0)
30@@ -32,10 +33,12 @@
31 /usr/sbin/auditctl -- gen_context(system_u:object_r:auditctl_exec_t,s0)
32 /usr/sbin/auditd -- gen_context(system_u:object_r:auditd_exec_t,s0)
33 /usr/sbin/klogd -- gen_context(system_u:object_r:klogd_exec_t,s0)
34+/usr/sbin/klogd\.sysklogd -- gen_context(system_u:object_r:klogd_exec_t,s0)
35 /usr/sbin/metalog -- gen_context(system_u:object_r:syslogd_exec_t,s0)
36 /usr/sbin/minilogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
37 /usr/sbin/rklogd -- gen_context(system_u:object_r:klogd_exec_t,s0)
38 /usr/sbin/rsyslogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
39+/usr/sbin/syslogd\.sysklogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
40 /usr/sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0)
41 /usr/sbin/syslogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
42
43diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
44index 0c5be1cd..38ccfe3a 100644
45--- a/policy/modules/system/logging.te
46+++ b/policy/modules/system/logging.te
47@@ -399,6 +399,7 @@ allow syslogd_t self:udp_socket create_socket_perms;
48 allow syslogd_t self:tcp_socket create_stream_socket_perms;
49
50 allow syslogd_t syslog_conf_t:file read_file_perms;
51+allow syslogd_t syslog_conf_t:lnk_file read_file_perms;
52 allow syslogd_t syslog_conf_t:dir list_dir_perms;
53
54 # Create and bind to /dev/log or /var/run/log.
55--
562.19.1
57
diff --git a/recipes-security/refpolicy/refpolicy-git/0003-refpolicy-minimum-systemd-unconfined-lib-add-systemd.patch b/recipes-security/refpolicy/refpolicy-git/0003-refpolicy-minimum-systemd-unconfined-lib-add-systemd.patch
deleted file mode 100644
index 968a9be..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0003-refpolicy-minimum-systemd-unconfined-lib-add-systemd.patch
+++ /dev/null
@@ -1,121 +0,0 @@
1From ec36df125da565fe1a9b64000151afaf40c2887d Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:51:32 +0530
4Subject: [PATCH 3/9] refpolicy-minimum: systemd:unconfined:lib: add systemd
5 services allow rules
6
7systemd allow rules for systemd service file operations: start, stop, restart
8& allow rule for unconfined systemd service.
9
10without this change we are getting these errors:
11:~# systemctl status selinux-init.service
12Failed to get properties: Access denied
13
14:~# systemctl stop selinux-init.service
15Failed to stop selinux-init.service: Access denied
16
17:~# systemctl restart selinux-init.service
18audit: type=1107 audit: pid=1 uid=0 auid=4294967295 ses=4294967295 subj=
19system_u:system_r:init_t:s0 msg='avc: denied { start } for auid=n/a uid=0
20gid=0 path="/lib/systemd/system/selinux-init.service" cmdline="systemctl
21restart selinux-init.service" scontext=unconfined_u:unconfined_r:
22unconfined_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=service
23
24Upstream-Status: Pending
25
26Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
27Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
28---
29 policy/modules/system/init.te | 4 +++
30 policy/modules/system/libraries.te | 3 +++
31 policy/modules/system/systemd.if | 39 +++++++++++++++++++++++++++++
32 policy/modules/system/unconfined.te | 6 +++++
33 4 files changed, 52 insertions(+)
34
35diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
36index d8696580..e15ec4b9 100644
37--- a/policy/modules/system/init.te
38+++ b/policy/modules/system/init.te
39@@ -1425,3 +1425,7 @@ optional_policy(`
40 allow kernel_t init_t:process dyntransition;
41 allow devpts_t device_t:filesystem associate;
42 allow init_t self:capability2 block_suspend;
43+allow init_t self:capability2 audit_read;
44+
45+allow initrc_t init_t:system { start status };
46+allow initrc_t init_var_run_t:service { start status };
47diff --git a/policy/modules/system/libraries.te b/policy/modules/system/libraries.te
48index 422b0ea1..80b0c9a5 100644
49--- a/policy/modules/system/libraries.te
50+++ b/policy/modules/system/libraries.te
51@@ -145,3 +145,6 @@ optional_policy(`
52 optional_policy(`
53 unconfined_domain(ldconfig_t)
54 ')
55+
56+# systemd: init domain to start lib domain service
57+systemd_service_lib_function(lib_t)
58diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
59index 6353ca69..4519a448 100644
60--- a/policy/modules/system/systemd.if
61+++ b/policy/modules/system/systemd.if
62@@ -905,3 +905,42 @@ interface(`systemd_getattr_updated_runtime',`
63
64 getattr_files_pattern($1, systemd_update_run_t, systemd_update_run_t)
65 ')
66+
67+########################################
68+## <summary>
69+## Allow specified domain to start stop reset systemd service
70+## </summary>
71+## <param name="domain">
72+## <summary>
73+## Domain to not audit.
74+## </summary>
75+## </param>
76+#
77+interface(`systemd_service_file_operations',`
78+ gen_require(`
79+ class service { start status stop };
80+ ')
81+
82+ allow $1 lib_t:service { start status stop };
83+
84+')
85+
86+
87+########################################
88+## <summary>
89+## Allow init domain to start lib domain service
90+## </summary>
91+## <param name="domain">
92+## <summary>
93+## Domain to not audit.
94+## </summary>
95+## </param>
96+#
97+interface(`systemd_service_lib_function',`
98+ gen_require(`
99+ class service start;
100+ ')
101+
102+ allow initrc_t $1:service start;
103+
104+')
105diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
106index 12cc0d7c..c09e94a5 100644
107--- a/policy/modules/system/unconfined.te
108+++ b/policy/modules/system/unconfined.te
109@@ -240,3 +240,9 @@ unconfined_domain_noaudit(unconfined_execmem_t)
110 optional_policy(`
111 unconfined_dbus_chat(unconfined_execmem_t)
112 ')
113+
114+
115+# systemd: specified domain to start stop reset systemd service
116+systemd_service_file_operations(unconfined_t)
117+
118+allow unconfined_t init_t:system reload;
119--
1202.19.1
121
diff --git a/recipes-security/refpolicy/refpolicy-git/0004-refpolicy-minimum-systemd-mount-logging-authlogin-ad.patch b/recipes-security/refpolicy/refpolicy-git/0004-refpolicy-minimum-systemd-mount-logging-authlogin-ad.patch
deleted file mode 100644
index 06b9192..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0004-refpolicy-minimum-systemd-mount-logging-authlogin-ad.patch
+++ /dev/null
@@ -1,96 +0,0 @@
1From 0918b156dcf4d126fd0e36de5a6c61f114448c8a Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:53:37 +0530
4Subject: [PATCH 4/9] refpolicy-minimum: systemd: mount: logging: authlogin:
5 add allow rules
6
7add allow rules for avc denails for systemd, mount, logging & authlogin
8modules.
9
10without this change we are getting avc denial like these:
11
12type=AVC msg=audit(): avc: denied { sendto } for pid=893 comm="systemd-
13tmpfile" path="/run/systemd/journal/socket" scontext=system_u:system_r:
14systemd_tmpfiles_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=
15unix_dgram_socket permissive=0
16
17type=AVC msg=audit(): avc: denied { open } for pid=703 comm="systemd-
18tmpfile" path="/proc/1/environ" dev="proc" ino=8841 scontext=system_u:
19system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=
20file permissive=0
21
22type=AVC msg=audit(): avc: denied { read write } for pid=486 comm="mount"
23path="socket:[9717]" dev="sockfs" ino=9717 scontext=system_u:system_r:
24mount_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=udp_socket
25
26type=AVC msg=audit(): avc: denied { unix_read unix_write } for pid=292
27comm="syslogd" key=1095648583 scontext=system_u:system_r:syslogd_t:s0
28tcontext=system_u:system_r:syslogd_t:s0 tclass=shm permissive=1
29
30Upstream-Status: Pending
31
32Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
33Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
34---
35 policy/modules/system/authlogin.te | 2 ++
36 policy/modules/system/logging.te | 7 ++++++-
37 policy/modules/system/mount.te | 3 +++
38 policy/modules/system/systemd.te | 5 +++++
39 4 files changed, 16 insertions(+), 1 deletion(-)
40
41diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
42index 28f74bac..dfa46612 100644
43--- a/policy/modules/system/authlogin.te
44+++ b/policy/modules/system/authlogin.te
45@@ -479,3 +479,5 @@ optional_policy(`
46 samba_read_var_files(nsswitch_domain)
47 samba_dontaudit_write_var_files(nsswitch_domain)
48 ')
49+
50+allow chkpwd_t proc_t:filesystem getattr;
51diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
52index 4cc73327..98c2bd19 100644
53--- a/policy/modules/system/logging.te
54+++ b/policy/modules/system/logging.te
55@@ -627,4 +627,9 @@ allow auditd_t tmpfs_t:file { getattr setattr create open read append };
56 allow auditd_t tmpfs_t:dir { open read search add_name write getattr search };
57 allow auditd_t initrc_t:unix_dgram_socket sendto;
58
59-allow klogd_t initrc_t:unix_dgram_socket sendto;
60\ No newline at end of file
61+allow klogd_t initrc_t:unix_dgram_socket sendto;
62+
63+allow syslogd_t self:shm create;
64+allow syslogd_t self:sem { create read unix_write write };
65+allow syslogd_t self:shm { read unix_read unix_write write };
66+allow syslogd_t tmpfs_t:file { read write };
67diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
68index 3dcb8493..a87d0e82 100644
69--- a/policy/modules/system/mount.te
70+++ b/policy/modules/system/mount.te
71@@ -231,3 +231,6 @@ optional_policy(`
72 files_etc_filetrans_etc_runtime(unconfined_mount_t, file)
73 unconfined_domain(unconfined_mount_t)
74 ')
75+
76+allow mount_t proc_t:filesystem getattr;
77+allow mount_t initrc_t:udp_socket { read write };
78diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
79index f6455f6f..b13337b9 100644
80--- a/policy/modules/system/systemd.te
81+++ b/policy/modules/system/systemd.te
82@@ -1011,6 +1011,11 @@ allow systemd_tmpfiles_t systemd_journal_t:file { relabelfrom relabelto };
83 allow systemd_tmpfiles_t systemd_tmpfiles_conf_t:dir list_dir_perms;
84 allow systemd_tmpfiles_t systemd_tmpfiles_conf_type:file read_file_perms;
85
86+allow systemd_tmpfiles_t init_t:dir search;
87+allow systemd_tmpfiles_t proc_t:filesystem getattr;
88+allow systemd_tmpfiles_t init_t:file read;
89+allow systemd_tmpfiles_t initrc_t:unix_dgram_socket sendto;
90+
91 kernel_getattr_proc(systemd_tmpfiles_t)
92 kernel_read_kernel_sysctls(systemd_tmpfiles_t)
93 kernel_read_network_state(systemd_tmpfiles_t)
94--
952.19.1
96
diff --git a/recipes-security/refpolicy/refpolicy-git/0005-refpolicy-minimum-init-fix-reboot-with-systemd-as-in.patch b/recipes-security/refpolicy/refpolicy-git/0005-refpolicy-minimum-init-fix-reboot-with-systemd-as-in.patch
deleted file mode 100644
index aec54cd..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0005-refpolicy-minimum-init-fix-reboot-with-systemd-as-in.patch
+++ /dev/null
@@ -1,37 +0,0 @@
1From 54a00a22a0d9aca794440bf51511f5477e9249d2 Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:53:53 +0530
4Subject: [PATCH 5/9] refpolicy-minimum: init: fix reboot with systemd as init
5 manager.
6
7add allow rule to fix avc denial during system reboot.
8
9without this change we are getting:
10
11audit: type=1107 audit(): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=
12system_u:system_r:init_t:s0 msg='avc: denied { reboot } for auid=n/a uid=0
13gid=0 cmdline="/bin/systemctl --force reboot" scontext=system_u:system_r:
14initrc_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=system
15
16Upstream-Status: Pending
17
18Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
19Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
20---
21 policy/modules/system/init.te | 2 +-
22 1 file changed, 1 insertion(+), 1 deletion(-)
23
24diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
25index e15ec4b9..843fdcff 100644
26--- a/policy/modules/system/init.te
27+++ b/policy/modules/system/init.te
28@@ -1427,5 +1427,5 @@ allow devpts_t device_t:filesystem associate;
29 allow init_t self:capability2 block_suspend;
30 allow init_t self:capability2 audit_read;
31
32-allow initrc_t init_t:system { start status };
33+allow initrc_t init_t:system { start status reboot };
34 allow initrc_t init_var_run_t:service { start status };
35--
362.19.1
37
diff --git a/recipes-security/refpolicy/refpolicy-git/0006-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch b/recipes-security/refpolicy/refpolicy-git/0006-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch
deleted file mode 100644
index d098118..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0006-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch
+++ /dev/null
@@ -1,30 +0,0 @@
1From 9818faa2a732d6d1cda72926526f104de74bd992 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 4 Apr 2019 10:45:03 -0400
4Subject: [PATCH 06/34] fc/resolv.conf: label resolv.conf in var/run/ properly
5
6Upstream-Status: Pending
7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10
11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12---
13 policy/modules/system/sysnetwork.fc | 1 +
14 1 file changed, 1 insertion(+)
15
16diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
17index 1e5432a4..ac7c2dd1 100644
18--- a/policy/modules/system/sysnetwork.fc
19+++ b/policy/modules/system/sysnetwork.fc
20@@ -22,6 +22,7 @@ ifdef(`distro_debian',`
21 /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0)
22 /etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
23 /etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
24+/var/run/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
25
26 /etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0)
27 /etc/dhcp3?/dhclient.* gen_context(system_u:object_r:dhcp_etc_t,s0)
28--
292.19.1
30
diff --git a/recipes-security/refpolicy/refpolicy-git/0006-refpolicy-minimum-systemd-mount-enable-required-refp.patch b/recipes-security/refpolicy/refpolicy-git/0006-refpolicy-minimum-systemd-mount-enable-required-refp.patch
deleted file mode 100644
index bf770d9..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0006-refpolicy-minimum-systemd-mount-enable-required-refp.patch
+++ /dev/null
@@ -1,92 +0,0 @@
1From ca6644e1f1066a8354f2f6dbb068713f59225f37 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Wed, 3 Apr 2019 14:51:29 -0400
4Subject: [PATCH 6/9] refpolicy-minimum: systemd: mount: enable required
5 refpolicy booleans
6
7enable required refpolicy booleans for these modules
8
9i. mount: allow_mount_anyfile
10without enabling this boolean we are getting below avc denial
11
12audit(): avc: denied { mounton } for pid=462 comm="mount" path="/run/media
13/mmcblk2p1" dev="tmpfs" ino=11523 scontext=system_u:system_r:mount_t:s0
14tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=dir permissive=0
15
16This avc can be allowed using the boolean 'allow_mount_anyfile'
17allow mount_t initrc_var_run_t:dir mounton;
18
19ii. systemd : systemd_tmpfiles_manage_all
20without enabling this boolean we are not getting access to mount systemd
21essential tmpfs during bootup, also not getting access to create audit.log
22
23audit(): avc: denied { search } for pid=168 comm="systemd-tmpfile" name=
24"sys" dev="proc" ino=4026531855 scontext=system_u:system_r:systemd_tmpfiles
25_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir permissive=0
26
27 ls /var/log
28 /var/log -> volatile/log
29:~#
30
31The old refpolicy included a pre-generated booleans.conf that could be
32patched. That's no longer the case so we're left with a few options,
33tweak the default directly or create a template booleans.conf file which
34will be updated during build time. Since this is intended to be applied
35only for specific configuraitons it seems like the same either way and
36this avoids us playing games to work around .gitignore.
37
38Upstream-Status: Pending
39
40Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
41Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
42---
43 policy/booleans.conf | 9 +++++++++
44 policy/modules/system/mount.te | 2 +-
45 policy/modules/system/systemd.te | 2 +-
46 3 files changed, 11 insertions(+), 2 deletions(-)
47 create mode 100644 policy/booleans.conf
48
49diff --git a/policy/booleans.conf b/policy/booleans.conf
50new file mode 100644
51index 00000000..850f56ed
52--- /dev/null
53+++ b/policy/booleans.conf
54@@ -0,0 +1,9 @@
55+#
56+# Allow the mount command to mount any directory or file.
57+#
58+allow_mount_anyfile = true
59+
60+#
61+# Enable support for systemd-tmpfiles to manage all non-security files.
62+#
63+systemd_tmpfiles_manage_all = true
64diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
65index a87d0e82..868052b7 100644
66--- a/policy/modules/system/mount.te
67+++ b/policy/modules/system/mount.te
68@@ -10,7 +10,7 @@ policy_module(mount, 1.20.0)
69 ## Allow the mount command to mount any directory or file.
70 ## </p>
71 ## </desc>
72-gen_tunable(allow_mount_anyfile, false)
73+gen_tunable(allow_mount_anyfile, true)
74
75 attribute_role mount_roles;
76 roleattribute system_r mount_roles;
77diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
78index b13337b9..74f9c1cb 100644
79--- a/policy/modules/system/systemd.te
80+++ b/policy/modules/system/systemd.te
81@@ -10,7 +10,7 @@ policy_module(systemd, 1.7.5)
82 ## Enable support for systemd-tmpfiles to manage all non-security files.
83 ## </p>
84 ## </desc>
85-gen_tunable(systemd_tmpfiles_manage_all, false)
86+gen_tunable(systemd_tmpfiles_manage_all, true)
87
88 ## <desc>
89 ## <p>
90--
912.19.1
92
diff --git a/recipes-security/refpolicy/refpolicy-git/0007-refpolicy-minimum-systemd-fix-for-login-journal-serv.patch b/recipes-security/refpolicy/refpolicy-git/0007-refpolicy-minimum-systemd-fix-for-login-journal-serv.patch
deleted file mode 100644
index 307574c..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0007-refpolicy-minimum-systemd-fix-for-login-journal-serv.patch
+++ /dev/null
@@ -1,103 +0,0 @@
1From a1b92a176fe791468e750b95fa8299e8beecf2b1 Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:54:09 +0530
4Subject: [PATCH 7/9] refpolicy-minimum: systemd: fix for login & journal
5 service
6
71. fix for systemd services: login & journal wile using refpolicy-minimum and
8systemd as init manager.
92. fix login duration after providing root password.
10
11without these changes we are getting avc denails like these and below
12systemd services failure:
13
14audit[]: AVC avc: denied { write } for pid=422 comm="login" path="/run/
15systemd/sessions/c1.ref" dev="tmpfs" ino=13455 scontext=system_u:system_r:
16local_login_t:s0-s0:c0.c1023 tcontext=system_u:object_r:init_var_run_t:s0
17tclass=fifo_file permissive=0
18
19audit[]: AVC avc: denied { open } for pid=216 comm="systemd-tmpfile" path
20="/proc/1/environ" dev="proc" ino=9221 scontext=system_u:system_r:
21systemd_tmpfiles_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file
22
23audit[]: USER_AVC pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:
24system_r:init_t:s0 msg='avc: denied { stop } for auid=n/a uid=0 gid=0 path
25="/lib/systemd/system/systemd-journald.service" cmdline="/bin/journalctl
26--flush" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:
27lib_t:s0 tclass=service
28
29[FAILED] Failed to start Flush Journal to Persistent Storage.
30See 'systemctl status systemd-journal-flush.service' for details.
31
32[FAILED] Failed to start Login Service.
33See 'systemctl status systemd-logind.service' for details.
34
35[FAILED] Failed to start Avahi mDNS/DNS-SD Stack.
36See 'systemctl status avahi-daemon.service' for details.
37
38Upstream-Status: Pending
39
40Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
41Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
42---
43 policy/modules/system/init.te | 2 ++
44 policy/modules/system/locallogin.te | 3 +++
45 policy/modules/system/systemd.if | 6 ++++--
46 policy/modules/system/systemd.te | 2 +-
47 4 files changed, 10 insertions(+), 3 deletions(-)
48
49diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
50index 843fdcff..ca8678b8 100644
51--- a/policy/modules/system/init.te
52+++ b/policy/modules/system/init.te
53@@ -1429,3 +1429,5 @@ allow init_t self:capability2 audit_read;
54
55 allow initrc_t init_t:system { start status reboot };
56 allow initrc_t init_var_run_t:service { start status };
57+
58+allow initrc_t init_var_run_t:service stop;
59diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te
60index 75750e4c..2c2cfc7d 100644
61--- a/policy/modules/system/locallogin.te
62+++ b/policy/modules/system/locallogin.te
63@@ -298,3 +298,6 @@ allow local_login_t var_run_t:file { open read write lock};
64 allow local_login_t var_run_t:sock_file write;
65 allow local_login_t tmpfs_t:dir { add_name write search};
66 allow local_login_t tmpfs_t:file { create open read write lock };
67+allow local_login_t init_var_run_t:fifo_file write;
68+allow local_login_t initrc_t:dbus send_msg;
69+allow initrc_t local_login_t:dbus send_msg;
70diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if
71index 4519a448..79133e6f 100644
72--- a/policy/modules/system/systemd.if
73+++ b/policy/modules/system/systemd.if
74@@ -938,9 +938,11 @@ interface(`systemd_service_file_operations',`
75 #
76 interface(`systemd_service_lib_function',`
77 gen_require(`
78- class service start;
79+ class service { start status stop };
80+ class file { execmod open };
81 ')
82
83- allow initrc_t $1:service start;
84+ allow initrc_t $1:service { start status stop };
85+ allow initrc_t $1:file execmod;
86
87 ')
88diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
89index 74f9c1cb..f1d26a44 100644
90--- a/policy/modules/system/systemd.te
91+++ b/policy/modules/system/systemd.te
92@@ -1013,7 +1013,7 @@ allow systemd_tmpfiles_t systemd_tmpfiles_conf_type:file read_file_perms;
93
94 allow systemd_tmpfiles_t init_t:dir search;
95 allow systemd_tmpfiles_t proc_t:filesystem getattr;
96-allow systemd_tmpfiles_t init_t:file read;
97+allow systemd_tmpfiles_t init_t:file { open getattr read };
98 allow systemd_tmpfiles_t initrc_t:unix_dgram_socket sendto;
99
100 kernel_getattr_proc(systemd_tmpfiles_t)
101--
1022.19.1
103
diff --git a/recipes-security/refpolicy/refpolicy-git/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch b/recipes-security/refpolicy/refpolicy-git/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch
deleted file mode 100644
index 05543da..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch
+++ /dev/null
@@ -1,110 +0,0 @@
1From c268b15ec696aa23be73e040daae433b509fa82f Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:54:17 +0530
4Subject: [PATCH 8/9] refpolicy-minimum: systemd: fix for systemd tmp-files
5 services
6
7fix for systemd tmp files setup service while using refpolicy-minimum and
8systemd as init manager.
9
10these allow rules require kernel domain & files access, so added interfaces
11at systemd.te to merge these allow rules.
12
13without these changes we are getting avc denails like these and below
14systemd services failure:
15
16audit[]: AVC avc: denied { getattr } for pid=232 comm="systemd-tmpfile"
17path="/var/tmp" dev="mmcblk2p2" ino=4993 scontext=system_u:system_r:systemd
18_tmpfiles_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=lnk_file
19
20audit[]: AVC avc: denied { search } for pid=232 comm="systemd-tmpfile"
21name="kernel" dev="proc" ino=9341 scontext=system_u:system_r:
22systemd_tmpfiles_t:s0 tcontext=system_u:object_r:sysctl_kernel_t:s0
23tclass=dir permissive=0
24
25[FAILED] Failed to start Create Static Device Nodes in /dev.
26See 'systemctl status systemd-tmpfiles-setup-dev.service' for details.
27
28[FAILED] Failed to start Create Volatile Files and Directories.
29See 'systemctl status systemd-tmpfiles-setup.service' for details.
30
31Upstream-Status: Pending
32
33Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
34Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
35---
36 policy/modules/kernel/files.if | 19 +++++++++++++++++++
37 policy/modules/kernel/kernel.if | 21 +++++++++++++++++++++
38 policy/modules/system/systemd.te | 2 ++
39 3 files changed, 42 insertions(+)
40
41diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
42index eb067ad3..ff74f55a 100644
43--- a/policy/modules/kernel/files.if
44+++ b/policy/modules/kernel/files.if
45@@ -7076,3 +7076,22 @@ interface(`files_unconfined',`
46
47 typeattribute $1 files_unconfined_type;
48 ')
49+
50+########################################
51+## <summary>
52+## systemd tmp files access to kernel tmp files domain
53+## </summary>
54+## <param name="domain">
55+## <summary>
56+## Domain allowed access.
57+## </summary>
58+## </param>
59+#
60+interface(`systemd_service_allow_kernel_files_domain_to_tmp_t',`
61+ gen_require(`
62+ type tmp_t;
63+ class lnk_file getattr;
64+ ')
65+
66+ allow $1 tmp_t:lnk_file getattr;
67+')
68diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
69index 1ad282aa..342eb033 100644
70--- a/policy/modules/kernel/kernel.if
71+++ b/policy/modules/kernel/kernel.if
72@@ -3584,3 +3584,24 @@ interface(`kernel_ib_manage_subnet_unlabeled_endports',`
73 allow $1 unlabeled_t:infiniband_endport manage_subnet;
74 ')
75
76+########################################
77+## <summary>
78+## systemd tmp files access to kernel sysctl domain
79+## </summary>
80+## <param name="domain">
81+## <summary>
82+## Domain allowed access.
83+## </summary>
84+## </param>
85+#
86+interface(`systemd_service_allow_kernel_domain_access_to_sysctl_kernel_t',`
87+ gen_require(`
88+ type sysctl_kernel_t;
89+ class dir search;
90+ class file { open read };
91+ ')
92+
93+ allow $1 sysctl_kernel_t:dir search;
94+ allow $1 sysctl_kernel_t:file { open read };
95+
96+')
97diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
98index f1d26a44..b4c64bc1 100644
99--- a/policy/modules/system/systemd.te
100+++ b/policy/modules/system/systemd.te
101@@ -1139,4 +1139,6 @@ files_var_filetrans(systemd_update_done_t, systemd_update_run_t, file, ".updated
102
103 seutil_read_file_contexts(systemd_update_done_t)
104
105+systemd_service_allow_kernel_domain_access_to_sysctl_kernel_t(systemd_tmpfiles_t)
106+systemd_service_allow_kernel_files_domain_to_tmp_t(systemd_tmpfiles_t)
107 systemd_log_parse_environment(systemd_update_done_t)
108--
1092.19.1
110
diff --git a/recipes-security/refpolicy/refpolicy-git/0009-fc-hwclock-add-hwclock-alternatives.patch b/recipes-security/refpolicy/refpolicy-git/0009-fc-hwclock-add-hwclock-alternatives.patch
deleted file mode 100644
index 382a62c..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0009-fc-hwclock-add-hwclock-alternatives.patch
+++ /dev/null
@@ -1,28 +0,0 @@
1From afaee985ce8cb915905b9cbef141db5d4b7f228c Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 21:59:18 -0400
4Subject: [PATCH 09/34] fc/hwclock: add hwclock alternatives
5
6Upstream-Status: Pending
7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9---
10 policy/modules/system/clock.fc | 5 ++++-
11 1 file changed, 4 insertions(+), 1 deletion(-)
12
13diff --git a/policy/modules/system/clock.fc b/policy/modules/system/clock.fc
14index 30196589..e0dc4b6f 100644
15--- a/policy/modules/system/clock.fc
16+++ b/policy/modules/system/clock.fc
17@@ -2,4 +2,7 @@
18
19 /usr/bin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
20
21-/usr/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
22+/usr/sbin/hwclock\.util-linux -- gen_context(system_u:object_r:hwclock_exec_t,s0)
23+/usr/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
24+/usr/lib/busybox/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
25+/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
26--
272.19.1
28
diff --git a/recipes-security/refpolicy/refpolicy-git/0009-refpolicy-minimum-systemd-fix-for-syslog.patch b/recipes-security/refpolicy/refpolicy-git/0009-refpolicy-minimum-systemd-fix-for-syslog.patch
deleted file mode 100644
index de9180a..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0009-refpolicy-minimum-systemd-fix-for-syslog.patch
+++ /dev/null
@@ -1,70 +0,0 @@
1From 3c7c492f060212bf7c854a27ffa6afa5035f4862 Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 26 Aug 2016 17:54:29 +0530
4Subject: [PATCH 9/9] refpolicy-minimum: systemd: fix for syslog
5
6syslog & getty related allow rules required to fix the syslog mixup with
7boot log, while using systemd as init manager.
8
9without this change we are getting these avc denials:
10
11audit: avc: denied { search } for pid=484 comm="syslogd" name="/"
12dev="tmpfs" ino=7269 scontext=system_u:system_r:syslogd_t:s0 tcontext=
13system_u:object_r:tmpfs_t:s0 tclass=dir permissive=0
14
15audit: avc: denied { write } for pid=372 comm="syslogd" name="log" dev=
16"tmpfs" ino=954 scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:
17object_r:tmpfs_t:s0 tclass=dir permissive=0
18
19audit: avc: denied { add_name } for pid=390 comm="syslogd" name=
20"messages" scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:object_r
21:tmpfs_t:s0 tclass=dir permissive=0
22
23audit: avc: denied { sendto } for pid=558 comm="agetty" path="/run/systemd
24/journal/dev-log" scontext=system_u:system_r:getty_t:s0 tcontext=system_u:
25system_r:initrc_t:s0 tclass=unix_dgram_socket permissive=0
26
27audit: avc: denied { create } for pid=374 comm="syslogd" name="messages"
28scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:object_r:tmpfs_t:
29s0 tclass=file permissive=0
30
31audit: avc: denied { append } for pid=423 comm="syslogd" name="messages"
32dev="tmpfs" ino=7995 scontext=system_u:system_r:syslogd_t:s0 tcontext=
33system_u:object_r:tmpfs_t:s0 tclass=file permissive=0
34
35audit: avc: denied { getattr } for pid=425 comm="syslogd" path="/var/
36volatile/log/messages" dev="tmpfs" ino=8857 scontext=system_u:system_r:
37syslogd_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=file permissive=0
38
39Upstream-Status: Pending
40
41Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
42Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
43---
44 policy/modules/system/getty.te | 1 +
45 policy/modules/system/logging.te | 3 ++-
46 2 files changed, 3 insertions(+), 1 deletion(-)
47
48diff --git a/policy/modules/system/getty.te b/policy/modules/system/getty.te
49index 423db0cc..9ab03956 100644
50--- a/policy/modules/system/getty.te
51+++ b/policy/modules/system/getty.te
52@@ -132,3 +132,4 @@ optional_policy(`
53
54 allow getty_t tmpfs_t:dir search;
55 allow getty_t tmpfs_t:file { open write lock };
56+allow getty_t initrc_t:unix_dgram_socket sendto;
57diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
58index 98c2bd19..6a94ac12 100644
59--- a/policy/modules/system/logging.te
60+++ b/policy/modules/system/logging.te
61@@ -632,4 +632,5 @@ allow klogd_t initrc_t:unix_dgram_socket sendto;
62 allow syslogd_t self:shm create;
63 allow syslogd_t self:sem { create read unix_write write };
64 allow syslogd_t self:shm { read unix_read unix_write write };
65-allow syslogd_t tmpfs_t:file { read write };
66+allow syslogd_t tmpfs_t:file { read write create getattr append open };
67+allow syslogd_t tmpfs_t:dir { search write add_name };
68--
692.19.1
70
diff --git a/recipes-security/refpolicy/refpolicy-git/0010-fc-dmesg-apply-policy-to-dmesg-alternatives.patch b/recipes-security/refpolicy/refpolicy-git/0010-fc-dmesg-apply-policy-to-dmesg-alternatives.patch
deleted file mode 100644
index 5de6d0d..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0010-fc-dmesg-apply-policy-to-dmesg-alternatives.patch
+++ /dev/null
@@ -1,24 +0,0 @@
1From 9f8b5359ce85eab23a5c46157497c44fd3bc4335 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 08:26:55 -0400
4Subject: [PATCH 10/34] fc/dmesg: apply policy to dmesg alternatives
5
6Upstream-Status: Pending
7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9---
10 policy/modules/admin/dmesg.fc | 4 +++-
11 1 file changed, 3 insertions(+), 1 deletion(-)
12
13diff --git a/policy/modules/admin/dmesg.fc b/policy/modules/admin/dmesg.fc
14index e52fdfcf..85d15127 100644
15--- a/policy/modules/admin/dmesg.fc
16+++ b/policy/modules/admin/dmesg.fc
17@@ -1 +1,3 @@
18-/usr/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
19+/usr/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
20+/usr/bin/dmesg\.util-linux -- gen_context(system_u:object_r:dmesg_exec_t,s0)
21+/usr/lib/busybox/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
22--
232.19.1
24
diff --git a/recipes-security/refpolicy/refpolicy-git/0014-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch b/recipes-security/refpolicy/refpolicy-git/0014-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch
deleted file mode 100644
index fff816a..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0014-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch
+++ /dev/null
@@ -1,29 +0,0 @@
1From c8dbbbaed4371c600d057736d1dab78371066fdd Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 09:54:07 -0400
4Subject: [PATCH 14/34] fc/rpm: apply rpm_exec policy to cpio binaries
5
6Upstream-Status: Pending
7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9---
10 policy/modules/admin/rpm.fc | 5 ++++-
11 1 file changed, 4 insertions(+), 1 deletion(-)
12
13diff --git a/policy/modules/admin/rpm.fc b/policy/modules/admin/rpm.fc
14index 578d465c..f2b8003a 100644
15--- a/policy/modules/admin/rpm.fc
16+++ b/policy/modules/admin/rpm.fc
17@@ -65,5 +65,8 @@ ifdef(`distro_redhat',`
18 /run/PackageKit(/.*)? gen_context(system_u:object_r:rpm_var_run_t,s0)
19
20 ifdef(`enable_mls',`
21-/usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
22+/usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
23+/usr/bin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
24+/usr/bin/cpio.cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
25 ')
26+
27--
282.19.1
29
diff --git a/recipes-security/refpolicy/refpolicy-git/0024-policy-module-rpc-allow-nfsd-to-exec-shell-commands.patch b/recipes-security/refpolicy/refpolicy-git/0024-policy-module-rpc-allow-nfsd-to-exec-shell-commands.patch
deleted file mode 100644
index 01f6c8b..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0024-policy-module-rpc-allow-nfsd-to-exec-shell-commands.patch
+++ /dev/null
@@ -1,29 +0,0 @@
1From bc1f2fba24fb63cd9a65ec22b34fcc59798bbaff Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 24/34] policy/module/rpc: allow nfsd to exec shell commands.
5
6Upstream-Status: Inappropriate [only for Poky]
7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10---
11 policy/modules/services/rpc.te | 2 +-
12 1 file changed, 1 insertion(+), 1 deletion(-)
13
14diff --git a/policy/modules/services/rpc.te b/policy/modules/services/rpc.te
15index 47fa2fd0..d4209231 100644
16--- a/policy/modules/services/rpc.te
17+++ b/policy/modules/services/rpc.te
18@@ -227,7 +227,7 @@ kernel_read_network_state(nfsd_t)
19 kernel_dontaudit_getattr_core_if(nfsd_t)
20 kernel_setsched(nfsd_t)
21 kernel_request_load_module(nfsd_t)
22-# kernel_mounton_proc(nfsd_t)
23+kernel_mounton_proc(nfsd_t)
24
25 corenet_sendrecv_nfs_server_packets(nfsd_t)
26 corenet_tcp_bind_nfs_port(nfsd_t)
27--
282.19.1
29
diff --git a/recipes-security/refpolicy/refpolicy-git/0025-policy-module-rpc-fix-policy-for-nfsserver-to-mount-.patch b/recipes-security/refpolicy/refpolicy-git/0025-policy-module-rpc-fix-policy-for-nfsserver-to-mount-.patch
deleted file mode 100644
index 78a4328..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0025-policy-module-rpc-fix-policy-for-nfsserver-to-mount-.patch
+++ /dev/null
@@ -1,77 +0,0 @@
1From f24c277f622d1ae72275525c6d5863f1ddce1d58 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Fri, 23 Aug 2013 12:01:53 +0800
4Subject: [PATCH 25/34] policy/module/rpc: fix policy for nfsserver to mount
5 nfsd_fs_t.
6
7Upstream-Status: Pending
8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11---
12 policy/modules/kernel/filesystem.te | 1 +
13 policy/modules/kernel/kernel.te | 2 ++
14 policy/modules/services/rpc.te | 5 +++++
15 policy/modules/services/rpcbind.te | 5 +++++
16 4 files changed, 13 insertions(+)
17
18diff --git a/policy/modules/kernel/filesystem.te b/policy/modules/kernel/filesystem.te
19index 41037951..b341ba83 100644
20--- a/policy/modules/kernel/filesystem.te
21+++ b/policy/modules/kernel/filesystem.te
22@@ -129,6 +129,7 @@ genfscon mvfs / gen_context(system_u:object_r:mvfs_t,s0)
23
24 type nfsd_fs_t;
25 fs_type(nfsd_fs_t)
26+files_mountpoint(nfsd_fs_t)
27 genfscon nfsd / gen_context(system_u:object_r:nfsd_fs_t,s0)
28
29 type nsfs_t;
30diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
31index 8e958074..7b81c732 100644
32--- a/policy/modules/kernel/kernel.te
33+++ b/policy/modules/kernel/kernel.te
34@@ -334,6 +334,8 @@ mls_process_read_all_levels(kernel_t)
35 mls_process_write_all_levels(kernel_t)
36 mls_file_write_all_levels(kernel_t)
37 mls_file_read_all_levels(kernel_t)
38+mls_socket_write_all_levels(kernel_t)
39+mls_fd_use_all_levels(kernel_t)
40
41 ifdef(`distro_redhat',`
42 # Bugzilla 222337
43diff --git a/policy/modules/services/rpc.te b/policy/modules/services/rpc.te
44index d4209231..a2327b44 100644
45--- a/policy/modules/services/rpc.te
46+++ b/policy/modules/services/rpc.te
47@@ -280,6 +280,11 @@ tunable_policy(`nfs_export_all_ro',`
48
49 optional_policy(`
50 mount_exec(nfsd_t)
51+ # Should domtrans to mount_t while mounting nfsd_fs_t.
52+ mount_domtrans(nfsd_t)
53+ # nfsd_t need to chdir to /var/lib/nfs and read files.
54+ files_list_var(nfsd_t)
55+ rpc_read_nfs_state_data(nfsd_t)
56 ')
57
58 ########################################
59diff --git a/policy/modules/services/rpcbind.te b/policy/modules/services/rpcbind.te
60index 5914af99..2055c114 100644
61--- a/policy/modules/services/rpcbind.te
62+++ b/policy/modules/services/rpcbind.te
63@@ -75,6 +75,11 @@ logging_send_syslog_msg(rpcbind_t)
64
65 miscfiles_read_localization(rpcbind_t)
66
67+# nfsd_t would not be allowed to send unix_stream_socket to rpcbind_t,
68+# because the are running in different level. So add rules to allow this.
69+mls_socket_read_all_levels(rpcbind_t)
70+mls_socket_write_all_levels(rpcbind_t)
71+
72 ifdef(`distro_debian',`
73 term_dontaudit_use_unallocated_ttys(rpcbind_t)
74 ')
75--
762.19.1
77
diff --git a/recipes-security/refpolicy/refpolicy-git/0026-policy-module-sysfs-fix-for-new-SELINUXMNT-in-sys.patch b/recipes-security/refpolicy/refpolicy-git/0026-policy-module-sysfs-fix-for-new-SELINUXMNT-in-sys.patch
deleted file mode 100644
index 257395a..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0026-policy-module-sysfs-fix-for-new-SELINUXMNT-in-sys.patch
+++ /dev/null
@@ -1,126 +0,0 @@
1From 06d2bad9325fdc6b0a73858bca7ba51fe591f39d Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 11:16:37 -0400
4Subject: [PATCH 26/34] policy/module/sysfs: fix for new SELINUXMNT in /sys
5
6SELINUXMNT is now from /selinux to /sys/fs/selinux, so we should
7add rules to access sysfs.
8
9Upstream-Status: Inappropriate [only for Poky]
10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13---
14 policy/modules/kernel/selinux.if | 19 +++++++++++++++++++
15 1 file changed, 19 insertions(+)
16
17diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
18index 6790e5d0..2c95db81 100644
19--- a/policy/modules/kernel/selinux.if
20+++ b/policy/modules/kernel/selinux.if
21@@ -117,6 +117,9 @@ interface(`selinux_mount_fs',`
22 type security_t;
23 ')
24
25+ dev_getattr_sysfs($1)
26+ dev_search_sysfs($1)
27+
28 allow $1 security_t:filesystem mount;
29 ')
30
31@@ -136,6 +139,9 @@ interface(`selinux_remount_fs',`
32 type security_t;
33 ')
34
35+ dev_getattr_sysfs($1)
36+ dev_search_sysfs($1)
37+
38 allow $1 security_t:filesystem remount;
39 ')
40
41@@ -155,6 +161,9 @@ interface(`selinux_unmount_fs',`
42 ')
43
44 allow $1 security_t:filesystem unmount;
45+
46+ dev_getattr_sysfs($1)
47+ dev_search_sysfs($1)
48 ')
49
50 ########################################
51@@ -217,6 +226,8 @@ interface(`selinux_dontaudit_getattr_dir',`
52 ')
53
54 dontaudit $1 security_t:dir getattr;
55+ dev_dontaudit_getattr_sysfs($1)
56+ dev_dontaudit_search_sysfs($1)
57 ')
58
59 ########################################
60@@ -253,6 +264,7 @@ interface(`selinux_dontaudit_search_fs',`
61 type security_t;
62 ')
63
64+ dev_dontaudit_search_sysfs($1)
65 dontaudit $1 security_t:dir search_dir_perms;
66 ')
67
68@@ -272,6 +284,7 @@ interface(`selinux_dontaudit_read_fs',`
69 type security_t;
70 ')
71
72+ dev_dontaudit_getattr_sysfs($1)
73 dontaudit $1 security_t:dir search_dir_perms;
74 dontaudit $1 security_t:file read_file_perms;
75 ')
76@@ -361,6 +374,7 @@ interface(`selinux_read_policy',`
77 type security_t;
78 ')
79
80+ dev_getattr_sysfs($1)
81 dev_search_sysfs($1)
82 allow $1 security_t:dir list_dir_perms;
83 allow $1 security_t:file read_file_perms;
84@@ -394,6 +408,7 @@ interface(`selinux_set_generic_booleans',`
85 type security_t;
86 ')
87
88+ dev_getattr_sysfs($1)
89 dev_search_sysfs($1)
90
91 allow $1 security_t:dir list_dir_perms;
92@@ -431,6 +446,7 @@ interface(`selinux_set_all_booleans',`
93 bool secure_mode_policyload;
94 ')
95
96+ dev_getattr_sysfs($1)
97 dev_search_sysfs($1)
98
99 allow $1 security_t:dir list_dir_perms;
100@@ -512,6 +528,7 @@ interface(`selinux_dontaudit_validate_context',`
101 type security_t;
102 ')
103
104+ dev_dontaudit_search_sysfs($1)
105 dontaudit $1 security_t:dir list_dir_perms;
106 dontaudit $1 security_t:file rw_file_perms;
107 dontaudit $1 security_t:security check_context;
108@@ -533,6 +550,7 @@ interface(`selinux_compute_access_vector',`
109 type security_t;
110 ')
111
112+ dev_getattr_sysfs($1)
113 dev_search_sysfs($1)
114 allow $1 self:netlink_selinux_socket create_socket_perms;
115 allow $1 security_t:dir list_dir_perms;
116@@ -629,6 +647,7 @@ interface(`selinux_compute_user_contexts',`
117 type security_t;
118 ')
119
120+ dev_getattr_sysfs($1)
121 dev_search_sysfs($1)
122 allow $1 security_t:dir list_dir_perms;
123 allow $1 security_t:file rw_file_perms;
124--
1252.19.1
126
diff --git a/recipes-security/refpolicy/refpolicy-git/0027-policy-module-rpc-allow-sysadm-to-run-rpcinfo.patch b/recipes-security/refpolicy/refpolicy-git/0027-policy-module-rpc-allow-sysadm-to-run-rpcinfo.patch
deleted file mode 100644
index 23226a0..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0027-policy-module-rpc-allow-sysadm-to-run-rpcinfo.patch
+++ /dev/null
@@ -1,31 +0,0 @@
1From 447036f5ead83977933b375f5587595b85307a7d Mon Sep 17 00:00:00 2001
2From: Roy Li <rongqing.li@windriver.com>
3Date: Sat, 15 Feb 2014 09:45:00 +0800
4Subject: [PATCH 27/34] policy/module/rpc: allow sysadm to run rpcinfo
5
6Upstream-Status: Pending
7
8type=AVC msg=audit(1392427946.976:264): avc: denied { connectto } for pid=2111 comm="rpcinfo" path="/run/rpcbind.sock" scontext=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 tcontext=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 tclass=unix_stream_socket
9type=SYSCALL msg=audit(1392427946.976:264): arch=c000003e syscall=42 success=no exit=-13 a0=3 a1=7fff3aa20000 a2=17 a3=22 items=0 ppid=2108 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=pts0 comm="rpcinfo" exe="/usr/sbin/rpcinfo" subj=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 key=(null)
10
11Signed-off-by: Roy Li <rongqing.li@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13---
14 policy/modules/roles/sysadm.te | 1 +
15 1 file changed, 1 insertion(+)
16
17diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
18index 2ae952bf..d781378f 100644
19--- a/policy/modules/roles/sysadm.te
20+++ b/policy/modules/roles/sysadm.te
21@@ -945,6 +945,7 @@ optional_policy(`
22 ')
23
24 optional_policy(`
25+ rpcbind_stream_connect(sysadm_t)
26 rpcbind_admin(sysadm_t, sysadm_r)
27 ')
28
29--
302.19.1
31
diff --git a/recipes-security/refpolicy/refpolicy-git/0028-policy-module-userdomain-fix-selinux-utils-to-manage.patch b/recipes-security/refpolicy/refpolicy-git/0028-policy-module-userdomain-fix-selinux-utils-to-manage.patch
deleted file mode 100644
index 732eaaf..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0028-policy-module-userdomain-fix-selinux-utils-to-manage.patch
+++ /dev/null
@@ -1,45 +0,0 @@
1From 391ab30556a3276bac131b3d4bd6c5e52b49c77c Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 28/34] policy/module/userdomain: fix selinux utils to manage
5 config files
6
7Upstream-Status: Pending
8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11---
12 policy/modules/system/selinuxutil.if | 1 +
13 policy/modules/system/userdomain.if | 4 ++++
14 2 files changed, 5 insertions(+)
15
16diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
17index 20024993..0fdc8c10 100644
18--- a/policy/modules/system/selinuxutil.if
19+++ b/policy/modules/system/selinuxutil.if
20@@ -674,6 +674,7 @@ interface(`seutil_manage_config',`
21 ')
22
23 files_search_etc($1)
24+ manage_dirs_pattern($1, selinux_config_t, selinux_config_t)
25 manage_files_pattern($1, selinux_config_t, selinux_config_t)
26 read_lnk_files_pattern($1, selinux_config_t, selinux_config_t)
27 ')
28diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
29index 5221bd13..4cf987d1 100644
30--- a/policy/modules/system/userdomain.if
31+++ b/policy/modules/system/userdomain.if
32@@ -1431,6 +1431,10 @@ template(`userdom_security_admin_template',`
33 logging_read_audit_config($1)
34
35 seutil_manage_bin_policy($1)
36+ seutil_manage_default_contexts($1)
37+ seutil_manage_file_contexts($1)
38+ seutil_manage_module_store($1)
39+ seutil_manage_config($1)
40 seutil_run_checkpolicy($1, $2)
41 seutil_run_loadpolicy($1, $2)
42 seutil_run_semanage($1, $2)
43--
442.19.1
45
diff --git a/recipes-security/refpolicy/refpolicy-git/0029-policy-module-selinuxutil-fix-setfiles-statvfs-to-ge.patch b/recipes-security/refpolicy/refpolicy-git/0029-policy-module-selinuxutil-fix-setfiles-statvfs-to-ge.patch
deleted file mode 100644
index 14734b2..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0029-policy-module-selinuxutil-fix-setfiles-statvfs-to-ge.patch
+++ /dev/null
@@ -1,33 +0,0 @@
1From d97aef0ecdb2ff964b1ed3d0b18ce83c2ab42f14 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 11:30:27 -0400
4Subject: [PATCH 29/34] policy/module/selinuxutil: fix setfiles statvfs to get
5 file count
6
7New setfiles will read /proc/mounts and use statvfs in
8file_system_count() to get file count of filesystems.
9
10Upstream-Status: Pending
11
12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
13Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com>
14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
15---
16 policy/modules/system/selinuxutil.te | 1 +
17 1 file changed, 1 insertion(+)
18
19diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
20index 8a1688cc..a9930e9e 100644
21--- a/policy/modules/system/selinuxutil.te
22+++ b/policy/modules/system/selinuxutil.te
23@@ -607,6 +607,7 @@ files_relabel_all_files(setfiles_t)
24 files_read_usr_symlinks(setfiles_t)
25 files_dontaudit_read_all_symlinks(setfiles_t)
26
27+fs_getattr_all_fs(setfiles_t)
28 fs_getattr_all_xattr_fs(setfiles_t)
29 fs_getattr_cgroup(setfiles_t)
30 fs_getattr_nfs(setfiles_t)
31--
322.19.1
33
diff --git a/recipes-security/refpolicy/refpolicy-git/0030-policy-module-admin-fix-dmesg-to-use-dev-kmsg-as-def.patch b/recipes-security/refpolicy/refpolicy-git/0030-policy-module-admin-fix-dmesg-to-use-dev-kmsg-as-def.patch
deleted file mode 100644
index aebdcb3..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0030-policy-module-admin-fix-dmesg-to-use-dev-kmsg-as-def.patch
+++ /dev/null
@@ -1,25 +0,0 @@
1From 43eba9b9205c5e63f634d60ab8eb5302f7bf4408 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Fri, 23 Aug 2013 16:36:09 +0800
4Subject: [PATCH 30/34] policy/module/admin: fix dmesg to use /dev/kmsg as
5 default input
6
7Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9---
10 policy/modules/admin/dmesg.if | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/admin/dmesg.if b/policy/modules/admin/dmesg.if
14index e1973c78..739a4bc5 100644
15--- a/policy/modules/admin/dmesg.if
16+++ b/policy/modules/admin/dmesg.if
17@@ -37,4 +37,5 @@ interface(`dmesg_exec',`
18
19 corecmd_search_bin($1)
20 can_exec($1, dmesg_exec_t)
21+ dev_read_kmsg($1)
22 ')
23--
242.19.1
25
diff --git a/recipes-security/refpolicy/refpolicy-git/0031-policy-module-ftp-add-ftpd_t-to-mls_file_write_all_l.patch b/recipes-security/refpolicy/refpolicy-git/0031-policy-module-ftp-add-ftpd_t-to-mls_file_write_all_l.patch
deleted file mode 100644
index afba90f..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0031-policy-module-ftp-add-ftpd_t-to-mls_file_write_all_l.patch
+++ /dev/null
@@ -1,41 +0,0 @@
1From 2d81043e7c98b31b37a1ecd1f037a04c60e662aa Mon Sep 17 00:00:00 2001
2From: Roy Li <rongqing.li@windriver.com>
3Date: Mon, 10 Feb 2014 18:10:12 +0800
4Subject: [PATCH 31/34] policy/module/ftp: add ftpd_t to
5 mls_file_write_all_levels
6
7Proftpd will create file under /var/run, but its mls is in high, and
8can not write to lowlevel
9
10Upstream-Status: Pending
11
12type=AVC msg=audit(1392347709.621:15): avc: denied { write } for pid=545 comm="proftpd" name="/" dev="tmpfs" ino=5853 scontext=system_u:system_r:ftpd_t:s15:c0.c1023 tcontext=system_u:object_r:var_run_t:s0-s15:c0.c1023 tclass=dir
13type=AVC msg=audit(1392347709.621:15): avc: denied { add_name } for pid=545 comm="proftpd" name="proftpd.delay" scontext=system_u:system_r:ftpd_t:s15:c0.c1023 tcontext=system_u:object_r:var_run_t:s0-s15:c0.c1023 tclass=dir
14type=SYSCALL msg=audit(1392347709.621:15): arch=c000003e syscall=2 success=yes exit=3 a0=471910 a1=42 a2=1b6 a3=8 items=0 ppid=539 pid=545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="proftpd" exe="/usr/sbin/proftpd" subj=system_u:system_r:ftpd_t:s15:c0.c1023 key=(null)
15
16root@localhost:~# sesearch --allow -s ftpd_t -t var_run_t|grep dir|grep add_name
17 allow ftpd_t var_run_t : dir { ioctl read write getattr lock add_name remove_name search open } ;
18root@localhost:~#
19
20Signed-off-by: Roy Li <rongqing.li@windriver.com>
21Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
22---
23 policy/modules/services/ftp.te | 2 ++
24 1 file changed, 2 insertions(+)
25
26diff --git a/policy/modules/services/ftp.te b/policy/modules/services/ftp.te
27index 29bc077c..d582cf80 100644
28--- a/policy/modules/services/ftp.te
29+++ b/policy/modules/services/ftp.te
30@@ -150,6 +150,8 @@ role ftpdctl_roles types ftpdctl_t;
31 type ftpdctl_tmp_t;
32 files_tmp_file(ftpdctl_tmp_t)
33
34+mls_file_write_all_levels(ftpd_t)
35+
36 type sftpd_t;
37 domain_type(sftpd_t)
38 role system_r types sftpd_t;
39--
402.19.1
41
diff --git a/recipes-security/refpolicy/refpolicy-git/0032-policy-module-init-update-for-systemd-related-allow-.patch b/recipes-security/refpolicy/refpolicy-git/0032-policy-module-init-update-for-systemd-related-allow-.patch
deleted file mode 100644
index ced90be..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0032-policy-module-init-update-for-systemd-related-allow-.patch
+++ /dev/null
@@ -1,32 +0,0 @@
1From ddb7393018483be0ce1cfc4734043b413e3b8a04 Mon Sep 17 00:00:00 2001
2From: Shrikant Bobade <shrikant_bobade@mentor.com>
3Date: Fri, 12 Jun 2015 19:37:52 +0530
4Subject: [PATCH 32/34] policy/module/init: update for systemd related allow
5 rules
6
7It provide, the systemd support related allow rules
8
9Upstream-Status: Pending
10
11Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13---
14 policy/modules/system/init.te | 5 +++++
15 1 file changed, 5 insertions(+)
16
17diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
18index f7635d6f..2e6b57a6 100644
19--- a/policy/modules/system/init.te
20+++ b/policy/modules/system/init.te
21@@ -1418,3 +1418,8 @@ optional_policy(`
22 userdom_dontaudit_rw_all_users_stream_sockets(systemprocess)
23 userdom_dontaudit_write_user_tmp_files(systemprocess)
24 ')
25+
26+# systemd related allow rules
27+allow kernel_t init_t:process dyntransition;
28+allow devpts_t device_t:filesystem associate;
29+allow init_t self:capability2 block_suspend;
30--
312.19.1
32
diff --git a/recipes-security/refpolicy/refpolicy-git/0034-policy-module-apache-add-rules-for-the-symlink-of-va.patch b/recipes-security/refpolicy/refpolicy-git/0034-policy-module-apache-add-rules-for-the-symlink-of-va.patch
deleted file mode 100644
index 03b1439..0000000
--- a/recipes-security/refpolicy/refpolicy-git/0034-policy-module-apache-add-rules-for-the-symlink-of-va.patch
+++ /dev/null
@@ -1,33 +0,0 @@
1From 2e2abdbc7a0e57a27518de0d879ecc84053203d8 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 19:36:44 +0800
4Subject: [PATCH 34/34] policy/module/apache: add rules for the symlink of
5 /var/log - apache2
6
7We have added rules for the symlink of /var/log in logging.if,
8while apache.te uses /var/log but does not use the interfaces in
9logging.if. So still need add a individual rule for apache.te.
10
11Upstream-Status: Inappropriate [only for Poky]
12
13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
15---
16 policy/modules/services/apache.te | 1 +
17 1 file changed, 1 insertion(+)
18
19diff --git a/policy/modules/services/apache.te b/policy/modules/services/apache.te
20index 15c4ea53..596370b1 100644
21--- a/policy/modules/services/apache.te
22+++ b/policy/modules/services/apache.te
23@@ -412,6 +412,7 @@ create_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
24 read_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
25 setattr_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
26 read_lnk_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
27+read_lnk_files_pattern(httpd_t, var_log_t, var_log_t)
28 logging_log_filetrans(httpd_t, httpd_log_t, file)
29
30 allow httpd_t httpd_modules_t:dir list_dir_perms;
31--
322.19.1
33
diff --git a/recipes-security/refpolicy/refpolicy-minimum_git.bb b/recipes-security/refpolicy/refpolicy-minimum_git.bb
index 3b3ca15..dc06ccf 100644
--- a/recipes-security/refpolicy/refpolicy-minimum_git.bb
+++ b/recipes-security/refpolicy/refpolicy-minimum_git.bb
@@ -11,6 +11,10 @@ Pretty much everything runs as initrc_t or unconfined_t so all of the \
11domains are unconfined. \ 11domains are unconfined. \
12" 12"
13 13
14SRC_URI += " \
15 file://0001-refpolicy-minimum-make-sysadmin-module-optional.patch \
16 "
17
14POLICY_NAME = "minimum" 18POLICY_NAME = "minimum"
15 19
16CORE_POLICY_MODULES = "unconfined \ 20CORE_POLICY_MODULES = "unconfined \
@@ -30,7 +34,7 @@ CORE_POLICY_MODULES = "unconfined \
30 locallogin \ 34 locallogin \
31 " 35 "
32#systemd dependent policy modules 36#systemd dependent policy modules
33CORE_POLICY_MODULES += "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'clock systemd udev fstools', '', d)}" 37CORE_POLICY_MODULES += "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'clock systemd udev fstools dbus', '', d)}"
34 38
35# nscd caches libc-issued requests to the name service. 39# nscd caches libc-issued requests to the name service.
36# Without nscd.pp, commands want to use these caches will be blocked. 40# Without nscd.pp, commands want to use these caches will be blocked.
diff --git a/recipes-security/refpolicy/refpolicy-targeted_git.bb b/recipes-security/refpolicy/refpolicy-targeted_git.bb
index 1ecdb4e..e37a083 100644
--- a/recipes-security/refpolicy/refpolicy-targeted_git.bb
+++ b/recipes-security/refpolicy/refpolicy-targeted_git.bb
@@ -14,22 +14,6 @@ POLICY_MLS_SENS = "0"
14 14
15include refpolicy_${PV}.inc 15include refpolicy_${PV}.inc
16 16
17SYSTEMD_REFPOLICY_PATCHES = " \
18 file://0001-refpolicy-minimum-audit-logging-getty-audit-related-.patch \
19 file://0002-refpolicy-minimum-locallogin-add-allow-rules-for-typ.patch \
20 file://0003-refpolicy-minimum-systemd-unconfined-lib-add-systemd.patch \
21 file://0004-refpolicy-minimum-systemd-mount-logging-authlogin-ad.patch \
22 file://0005-refpolicy-minimum-init-fix-reboot-with-systemd-as-in.patch \
23 file://0006-refpolicy-minimum-systemd-mount-enable-required-refp.patch \
24 file://0007-refpolicy-minimum-systemd-fix-for-login-journal-serv.patch \
25 file://0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch \
26 file://0009-refpolicy-minimum-systemd-fix-for-syslog.patch \
27 "
28
29SYSVINIT_REFPOLICY_PATCHES = " \
30 file://0001-fix-update-alternatives-for-sysvinit.patch \
31 "
32
33SRC_URI += " \ 17SRC_URI += " \
34 ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '${SYSTEMD_REFPOLICY_PATCHES}', '${SYSVINIT_REFPOLICY_PATCHES}', d)} \ 18 file://0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch \
35 " 19 "
diff --git a/recipes-security/refpolicy/refpolicy-git/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch b/recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch
index 5e38b8c..be802ec 100644
--- a/recipes-security/refpolicy/refpolicy-git/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch
+++ b/recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch
@@ -1,23 +1,24 @@
1From ab97bea9248f62e735526292fc1253ebb1ecfa6c Mon Sep 17 00:00:00 2001 1From 7dc492abc2918e770b36099cf079ca9be10598c8 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 16:14:09 -0400 3Date: Thu, 28 Mar 2019 16:14:09 -0400
4Subject: [PATCH 01/34] fc/subs/volatile: alias common /var/volatile paths 4Subject: [PATCH] fc/subs/volatile: alias common /var/volatile paths
5 5
6Ensure /var/volatile paths get the appropriate base file context. 6Ensure /var/volatile paths get the appropriate base file context.
7 7
8Upstream-Status: Pending 8Upstream-Status: Inappropriate [embedded specific]
9 9
10Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 10Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12--- 13---
13 config/file_contexts.subs_dist | 10 ++++++++++ 14 config/file_contexts.subs_dist | 6 ++++++
14 1 file changed, 10 insertions(+) 15 1 file changed, 6 insertions(+)
15 16
16diff --git a/config/file_contexts.subs_dist b/config/file_contexts.subs_dist 17diff --git a/config/file_contexts.subs_dist b/config/file_contexts.subs_dist
17index 346d920e..be532d7f 100644 18index 346d920e3..aeb25a5bb 100644
18--- a/config/file_contexts.subs_dist 19--- a/config/file_contexts.subs_dist
19+++ b/config/file_contexts.subs_dist 20+++ b/config/file_contexts.subs_dist
20@@ -31,3 +31,13 @@ 21@@ -31,3 +31,9 @@
21 # not for refpolicy intern, but for /var/run using applications, 22 # not for refpolicy intern, but for /var/run using applications,
22 # like systemd tmpfiles or systemd socket configurations 23 # like systemd tmpfiles or systemd socket configurations
23 /var/run /run 24 /var/run /run
@@ -26,11 +27,7 @@ index 346d920e..be532d7f 100644
26+# ensure the policy applied to the base filesystem objects are reflected in the 27+# ensure the policy applied to the base filesystem objects are reflected in the
27+# volatile hierarchy. 28+# volatile hierarchy.
28+/var/volatile/log /var/log 29+/var/volatile/log /var/log
29+/var/volatile/run /var/run
30+/var/volatile/cache /var/cache
31+/var/volatile/tmp /var/tmp 30+/var/volatile/tmp /var/tmp
32+/var/volatile/lock /var/lock
33+/var/volatile/run/lock /var/lock
34-- 31--
352.19.1 322.17.1
36 33
diff --git a/recipes-security/refpolicy/refpolicy-git/0033-refpolicy-minimum-make-sysadmin-module-optional.patch b/recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch
index 09a16fb..deb27c0 100644
--- a/recipes-security/refpolicy/refpolicy-git/0033-refpolicy-minimum-make-sysadmin-module-optional.patch
+++ b/recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch
@@ -1,44 +1,44 @@
1From a45624beb571ad5dadfca95d53ff69925c9f628c Mon Sep 17 00:00:00 2001 1From efe4d5472fde3d4f043f4e8660c6cc73c7fc1542 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 5 Apr 2019 11:53:28 -0400 3Date: Fri, 5 Apr 2019 11:53:28 -0400
4Subject: [PATCH 33/34] refpolicy/minimum: make sysadmin module optional 4Subject: [PATCH] refpolicy-minimum: make sysadmin module optional
5 5
6init and locallogin modules have a depend for sysadm module because 6The init and locallogin modules have a depend for sysadm module
7they have called sysadm interfaces(sysadm_shell_domtrans). Since 7because they have called sysadm interfaces(sysadm_shell_domtrans).
8sysadm is not a core module, we could make the sysadm_shell_domtrans 8Since sysadm is not a core module, we could make the
9calls optionally by optional_policy. 9sysadm_shell_domtrans calls optionally by optional_policy.
10 10
11So, we could make the minimum policy without sysadm module. 11So, we could make the minimum policy without sysadm module.
12 12
13Upstream-Status: pending 13Upstream-Status: Inappropriate [embedded specific]
14 14
15Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 15Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
16Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> 16Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
17Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 17Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
18Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
18--- 19---
19 policy/modules/system/init.te | 16 +++++++++------- 20 policy/modules/system/init.te | 14 ++++++++------
20 policy/modules/system/locallogin.te | 4 +++- 21 policy/modules/system/locallogin.te | 4 +++-
21 2 files changed, 12 insertions(+), 8 deletions(-) 22 2 files changed, 11 insertions(+), 7 deletions(-)
22 23
23diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te 24diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
24index 2e6b57a6..d8696580 100644 25index feed5af5f..6b6b723b8 100644
25--- a/policy/modules/system/init.te 26--- a/policy/modules/system/init.te
26+++ b/policy/modules/system/init.te 27+++ b/policy/modules/system/init.te
27@@ -448,13 +448,15 @@ ifdef(`init_systemd',` 28@@ -515,13 +515,15 @@ ifdef(`init_systemd',`
28 modutils_domtrans(init_t) 29 unconfined_write_keys(init_t)
29 ') 30 ')
30 ',` 31 ',`
31- tunable_policy(`init_upstart',` 32- tunable_policy(`init_upstart',`
32- corecmd_shell_domtrans(init_t, initrc_t) 33- corecmd_shell_domtrans(init_t, initrc_t)
33- ',` 34+ optional_policy(`
35+ tunable_policy(`init_upstart',`
36+ corecmd_shell_domtrans(init_t, initrc_t)
37 ',`
34- # Run the shell in the sysadm role for single-user mode. 38- # Run the shell in the sysadm role for single-user mode.
35- # causes problems with upstart 39- # causes problems with upstart
36- ifndef(`distro_debian',` 40- ifndef(`distro_debian',`
37- sysadm_shell_domtrans(init_t) 41- sysadm_shell_domtrans(init_t)
38+ optional_policy(`
39+ tunable_policy(`init_upstart',`
40+ corecmd_shell_domtrans(init_t, initrc_t)
41+ ',`
42+ # Run the shell in the sysadm role for single-user mode. 42+ # Run the shell in the sysadm role for single-user mode.
43+ # causes problems with upstart 43+ # causes problems with upstart
44+ ifndef(`distro_debian',` 44+ ifndef(`distro_debian',`
@@ -48,10 +48,10 @@ index 2e6b57a6..d8696580 100644
48 ') 48 ')
49 ') 49 ')
50diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te 50diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te
51index a56f3d1f..4c679ff3 100644 51index f629b0040..971ca40e5 100644
52--- a/policy/modules/system/locallogin.te 52--- a/policy/modules/system/locallogin.te
53+++ b/policy/modules/system/locallogin.te 53+++ b/policy/modules/system/locallogin.te
54@@ -266,7 +266,9 @@ userdom_use_unpriv_users_fds(sulogin_t) 54@@ -267,7 +267,9 @@ userdom_use_unpriv_users_fds(sulogin_t)
55 userdom_search_user_home_dirs(sulogin_t) 55 userdom_search_user_home_dirs(sulogin_t)
56 userdom_use_user_ptys(sulogin_t) 56 userdom_use_user_ptys(sulogin_t)
57 57
@@ -63,5 +63,5 @@ index a56f3d1f..4c679ff3 100644
63 # by default, sulogin does not use pam... 63 # by default, sulogin does not use pam...
64 # sulogin_pam might need to be defined otherwise 64 # sulogin_pam might need to be defined otherwise
65-- 65--
662.19.1 662.17.1
67 67
diff --git a/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch b/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch
new file mode 100644
index 0000000..f3244c6
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch
@@ -0,0 +1,193 @@
1From 8613549f3aad37ce3bec8513057f0f893d4cc9bd Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 20 Apr 2020 11:50:03 +0800
4Subject: [PATCH] refpolicy-targeted: make unconfined_u the default selinux
5 user
6
7For targeted policy type, we define unconfined_u as the default selinux
8user for root and normal users, so users could login in and run most
9commands and services on unconfined domains.
10
11Also add rules for users to run init scripts directly, instead of via
12run_init.
13
14Upstream-Status: Inappropriate [configuration]
15
16Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
17Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
18Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
19Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
20---
21 config/appconfig-mcs/failsafe_context | 2 +-
22 config/appconfig-mcs/seusers | 4 +--
23 policy/modules/roles/sysadm.te | 1 +
24 policy/modules/system/init.if | 42 +++++++++++++++++++++++----
25 policy/modules/system/unconfined.te | 7 +++++
26 policy/users | 6 ++--
27 6 files changed, 50 insertions(+), 12 deletions(-)
28
29diff --git a/config/appconfig-mcs/failsafe_context b/config/appconfig-mcs/failsafe_context
30index 999abd9a3..a50bde775 100644
31--- a/config/appconfig-mcs/failsafe_context
32+++ b/config/appconfig-mcs/failsafe_context
33@@ -1 +1 @@
34-sysadm_r:sysadm_t:s0
35+unconfined_r:unconfined_t:s0
36diff --git a/config/appconfig-mcs/seusers b/config/appconfig-mcs/seusers
37index ce614b41b..c0903d98b 100644
38--- a/config/appconfig-mcs/seusers
39+++ b/config/appconfig-mcs/seusers
40@@ -1,2 +1,2 @@
41-root:root:s0-mcs_systemhigh
42-__default__:user_u:s0
43+root:unconfined_u:s0-mcs_systemhigh
44+__default__:unconfined_u:s0
45diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
46index ac5239d83..310a4fad2 100644
47--- a/policy/modules/roles/sysadm.te
48+++ b/policy/modules/roles/sysadm.te
49@@ -53,6 +53,7 @@ ubac_fd_exempt(sysadm_t)
50
51 init_exec(sysadm_t)
52 init_admin(sysadm_t)
53+init_script_role_transition(sysadm_r)
54
55 selinux_read_policy(sysadm_t)
56
57diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
58index ab24b5d9b..ed441ddef 100644
59--- a/policy/modules/system/init.if
60+++ b/policy/modules/system/init.if
61@@ -1798,11 +1798,12 @@ interface(`init_script_file_entry_type',`
62 #
63 interface(`init_spec_domtrans_script',`
64 gen_require(`
65- type initrc_t, initrc_exec_t;
66+ type initrc_t;
67+ attribute init_script_file_type;
68 ')
69
70 files_list_etc($1)
71- spec_domtrans_pattern($1, initrc_exec_t, initrc_t)
72+ spec_domtrans_pattern($1, init_script_file_type, initrc_t)
73
74 ifdef(`distro_gentoo',`
75 gen_require(`
76@@ -1813,11 +1814,11 @@ interface(`init_spec_domtrans_script',`
77 ')
78
79 ifdef(`enable_mcs',`
80- range_transition $1 initrc_exec_t:process s0;
81+ range_transition $1 init_script_file_type:process s0;
82 ')
83
84 ifdef(`enable_mls',`
85- range_transition $1 initrc_exec_t:process s0 - mls_systemhigh;
86+ range_transition $1 init_script_file_type:process s0 - mls_systemhigh;
87 ')
88 ')
89
90@@ -1834,17 +1835,18 @@ interface(`init_spec_domtrans_script',`
91 interface(`init_domtrans_script',`
92 gen_require(`
93 type initrc_t, initrc_exec_t;
94+ attribute init_script_file_type;
95 ')
96
97 files_list_etc($1)
98 domtrans_pattern($1, initrc_exec_t, initrc_t)
99
100 ifdef(`enable_mcs',`
101- range_transition $1 initrc_exec_t:process s0;
102+ range_transition $1 init_script_file_type:process s0;
103 ')
104
105 ifdef(`enable_mls',`
106- range_transition $1 initrc_exec_t:process s0 - mls_systemhigh;
107+ range_transition $1 init_script_file_type:process s0 - mls_systemhigh;
108 ')
109 ')
110
111@@ -3599,3 +3601,31 @@ interface(`init_getrlimit',`
112
113 allow $1 init_t:process getrlimit;
114 ')
115+
116+########################################
117+## <summary>
118+## Transition to system_r when execute an init script
119+## </summary>
120+## <desc>
121+## <p>
122+## Execute a init script in a specified role
123+## </p>
124+## <p>
125+## No interprocess communication (signals, pipes,
126+## etc.) is provided by this interface since
127+## the domains are not owned by this module.
128+## </p>
129+## </desc>
130+## <param name="source_role">
131+## <summary>
132+## Role to transition from.
133+## </summary>
134+## </param>
135+#
136+interface(`init_script_role_transition',`
137+ gen_require(`
138+ attribute init_script_file_type;
139+ ')
140+
141+ role_transition $1 init_script_file_type system_r;
142+')
143diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te
144index 3d75855b6..5aa4c0b69 100644
145--- a/policy/modules/system/unconfined.te
146+++ b/policy/modules/system/unconfined.te
147@@ -20,6 +20,11 @@ type unconfined_execmem_t alias ada_t;
148 type unconfined_execmem_exec_t alias ada_exec_t;
149 init_system_domain(unconfined_execmem_t, unconfined_execmem_exec_t)
150 role unconfined_r types unconfined_execmem_t;
151+role unconfined_r types unconfined_t;
152+role system_r types unconfined_t;
153+role_transition system_r unconfined_exec_t unconfined_r;
154+allow system_r unconfined_r;
155+allow unconfined_r system_r;
156
157 ########################################
158 #
159@@ -50,6 +55,8 @@ userdom_user_home_dir_filetrans_user_home_content(unconfined_t, { dir file lnk_f
160 ifdef(`direct_sysadm_daemon',`
161 optional_policy(`
162 init_run_daemon(unconfined_t, unconfined_r)
163+ init_domtrans_script(unconfined_t)
164+ init_script_role_transition(unconfined_r)
165 ')
166 ',`
167 ifdef(`distro_gentoo',`
168diff --git a/policy/users b/policy/users
169index ca203758c..e737cd9cc 100644
170--- a/policy/users
171+++ b/policy/users
172@@ -15,7 +15,7 @@
173 # and a user process should never be assigned the system user
174 # identity.
175 #
176-gen_user(system_u,, system_r, s0, s0 - mls_systemhigh, mcs_allcats)
177+gen_user(system_u,, system_r unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats)
178
179 #
180 # user_u is a generic user identity for Linux users who have no
181@@ -43,7 +43,7 @@ ifdef(`direct_sysadm_daemon',`
182 # not in the sysadm_r.
183 #
184 ifdef(`direct_sysadm_daemon',`
185- gen_user(root, sysadm, sysadm_r staff_r ifdef(`enable_mls',`secadm_r auditadm_r') system_r, s0, s0 - mls_systemhigh, mcs_allcats)
186+ gen_user(root, sysadm, unconfined_r sysadm_r staff_r ifdef(`enable_mls',`secadm_r auditadm_r') system_r, s0, s0 - mls_systemhigh, mcs_allcats)
187 ',`
188- gen_user(root, sysadm, sysadm_r staff_r ifdef(`enable_mls',`secadm_r auditadm_r'), s0, s0 - mls_systemhigh, mcs_allcats)
189+ gen_user(root, sysadm, unconfined_r sysadm_r staff_r ifdef(`enable_mls',`secadm_r auditadm_r'), s0, s0 - mls_systemhigh, mcs_allcats)
190 ')
191--
1922.17.1
193
diff --git a/recipes-security/refpolicy/refpolicy-git/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch b/recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch
index 22eab15..e7b69ef 100644
--- a/recipes-security/refpolicy/refpolicy-git/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch
+++ b/recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch
@@ -1,31 +1,33 @@
1From a47fb4d6a25574d900213ef63b5c7e3ce7182419 Mon Sep 17 00:00:00 2001 1From 2a68b7539104bec76aaf2a18b399770f59d0cb28 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 20:48:10 -0400 3Date: Thu, 28 Mar 2019 20:48:10 -0400
4Subject: [PATCH 02/34] fc/subs/busybox: set aliases for bin, sbin and usr 4Subject: [PATCH] fc/subs/busybox: set aliases for bin, sbin and usr
5 5
6The objects in /usr/lib/busybox/* should have the same policy applied as 6The objects in /usr/lib/busybox/* should have the same policy applied as
7the corresponding objects in the / hierarchy. 7the corresponding objects in the / hierarchy.
8 8
9Upstream-Status: Inappropriate [embedded specific]
10
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10--- 13---
11 config/file_contexts.subs_dist | 7 +++++++ 14 config/file_contexts.subs_dist | 6 ++++++
12 1 file changed, 7 insertions(+) 15 1 file changed, 6 insertions(+)
13 16
14diff --git a/config/file_contexts.subs_dist b/config/file_contexts.subs_dist 17diff --git a/config/file_contexts.subs_dist b/config/file_contexts.subs_dist
15index be532d7f..04fca3c3 100644 18index aeb25a5bb..c249c5207 100644
16--- a/config/file_contexts.subs_dist 19--- a/config/file_contexts.subs_dist
17+++ b/config/file_contexts.subs_dist 20+++ b/config/file_contexts.subs_dist
18@@ -41,3 +41,10 @@ 21@@ -37,3 +37,9 @@
22 # volatile hierarchy.
23 /var/volatile/log /var/log
19 /var/volatile/tmp /var/tmp 24 /var/volatile/tmp /var/tmp
20 /var/volatile/lock /var/lock
21 /var/volatile/run/lock /var/lock
22+ 25+
23+# busybox aliases 26+# busybox aliases
24+# quickly match up the busybox built-in tree to the base filesystem tree 27+# quickly match up the busybox built-in tree to the base filesystem tree
25+/usr/lib/busybox/bin /bin 28+/usr/lib/busybox/bin /usr/bin
26+/usr/lib/busybox/sbin /sbin 29+/usr/lib/busybox/sbin /usr/sbin
27+/usr/lib/busybox/usr /usr 30+/usr/lib/busybox/usr /usr
28+
29-- 31--
302.19.1 322.17.1
31 33
diff --git a/recipes-security/refpolicy/refpolicy-git/0004-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch b/recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch
index 36bfdcf..d2e650e 100644
--- a/recipes-security/refpolicy/refpolicy-git/0004-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch
+++ b/recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch
@@ -1,27 +1,26 @@
1From abd7d9fa3398be45e733930ebaec9e05b1aba252 Mon Sep 17 00:00:00 2001 1From 9f73ec53a4a5d5bb9b7fa453f3089c55f777c2ce Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 04/34] fc/hostname: apply policy to common yocto hostname 4Subject: [PATCH] fc/hostname: apply policy to common yocto hostname
5 alternatives 5 alternatives
6 6
7Upstream-Status: Inappropriate [only for Yocto] 7Upstream-Status: Inappropriate [embedded specific]
8 8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
11--- 12---
12 policy/modules/system/hostname.fc | 4 ++++ 13 policy/modules/system/hostname.fc | 2 ++
13 1 file changed, 4 insertions(+) 14 1 file changed, 2 insertions(+)
14 15
15diff --git a/policy/modules/system/hostname.fc b/policy/modules/system/hostname.fc 16diff --git a/policy/modules/system/hostname.fc b/policy/modules/system/hostname.fc
16index 83ddeb57..653e038d 100644 17index 83ddeb573..cf523bc4c 100644
17--- a/policy/modules/system/hostname.fc 18--- a/policy/modules/system/hostname.fc
18+++ b/policy/modules/system/hostname.fc 19+++ b/policy/modules/system/hostname.fc
19@@ -1 +1,5 @@ 20@@ -1 +1,3 @@
21 /usr/bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0)
20+/usr/bin/hostname\.net-tools -- gen_context(system_u:object_r:hostname_exec_t,s0) 22+/usr/bin/hostname\.net-tools -- gen_context(system_u:object_r:hostname_exec_t,s0)
21+/usr/bin/hostname\.coreutils -- gen_context(system_u:object_r:hostname_exec_t,s0) 23+/usr/bin/hostname\.coreutils -- gen_context(system_u:object_r:hostname_exec_t,s0)
22+/usr/lib/busybox/bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0)
23+
24 /usr/bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0)
25-- 24--
262.19.1 252.17.1
27 26
diff --git a/recipes-security/refpolicy/refpolicy-git/0005-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch b/recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch
index 194a474..3c16ac2 100644
--- a/recipes-security/refpolicy/refpolicy-git/0005-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch
+++ b/recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch
@@ -1,30 +1,31 @@
1From 783ba03eff9d5b94363fff148aa1c745ff02ddd4 Mon Sep 17 00:00:00 2001 1From fda1e656c46b360f1023834636c460c5510acf68 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 21:37:32 -0400 3Date: Thu, 28 Mar 2019 21:37:32 -0400
4Subject: [PATCH 05/34] fc/bash: apply /usr/bin/bash context to /bin/bash.bash 4Subject: [PATCH] fc/bash: apply /usr/bin/bash context to /bin/bash.bash
5 5
6We include /bin/bash.bash as a valid alias for /bin/bash, so ensure we apply 6We include /bin/bash.bash as a valid alias for /bin/bash, so ensure we apply
7the proper context to the target for our policy. 7the proper context to the target for our policy.
8 8
9Upstream-Status: Inappropriate [only for Yocto] 9Upstream-Status: Inappropriate [embedded specific]
10 10
11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12--- 13---
13 policy/modules/kernel/corecommands.fc | 1 + 14 policy/modules/kernel/corecommands.fc | 1 +
14 1 file changed, 1 insertion(+) 15 1 file changed, 1 insertion(+)
15 16
16diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc 17diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
17index e7415cac..cf3848db 100644 18index b473850d4..7e199b7b0 100644
18--- a/policy/modules/kernel/corecommands.fc 19--- a/policy/modules/kernel/corecommands.fc
19+++ b/policy/modules/kernel/corecommands.fc 20+++ b/policy/modules/kernel/corecommands.fc
20@@ -141,6 +141,7 @@ ifdef(`distro_gentoo',` 21@@ -142,6 +142,7 @@ ifdef(`distro_gentoo',`
22 /usr/bin(/.*)? gen_context(system_u:object_r:bin_t,s0)
21 /usr/bin/d?ash -- gen_context(system_u:object_r:shell_exec_t,s0) 23 /usr/bin/d?ash -- gen_context(system_u:object_r:shell_exec_t,s0)
22 /usr/bin/bash -- gen_context(system_u:object_r:shell_exec_t,s0) 24 /usr/bin/bash -- gen_context(system_u:object_r:shell_exec_t,s0)
25+/usr/bin/bash\.bash -- gen_context(system_u:object_r:shell_exec_t,s0)
23 /usr/bin/bash2 -- gen_context(system_u:object_r:shell_exec_t,s0) 26 /usr/bin/bash2 -- gen_context(system_u:object_r:shell_exec_t,s0)
24+/usr/bin/bash.bash -- gen_context(system_u:object_r:shell_exec_t,s0)
25 /usr/bin/fish -- gen_context(system_u:object_r:shell_exec_t,s0) 27 /usr/bin/fish -- gen_context(system_u:object_r:shell_exec_t,s0)
26 /usr/bin/git-shell -- gen_context(system_u:object_r:shell_exec_t,s0) 28 /usr/bin/git-shell -- gen_context(system_u:object_r:shell_exec_t,s0)
27 /usr/bin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0)
28-- 29--
292.19.1 302.17.1
30 31
diff --git a/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch b/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch
new file mode 100644
index 0000000..2fe6479
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch
@@ -0,0 +1,29 @@
1From 90a9ef3adb997517f921a3524da99c966e3b00df Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 4 Apr 2019 10:45:03 -0400
4Subject: [PATCH] fc/resolv.conf: label resolv.conf in var/run/ properly
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
11---
12 policy/modules/system/sysnetwork.fc | 1 +
13 1 file changed, 1 insertion(+)
14
15diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
16index fddf9f693..acf539656 100644
17--- a/policy/modules/system/sysnetwork.fc
18+++ b/policy/modules/system/sysnetwork.fc
19@@ -83,6 +83,7 @@ ifdef(`distro_redhat',`
20 /run/dhcpcd(/.*)? gen_context(system_u:object_r:dhcpc_runtime_t,s0)
21 /run/netns -d gen_context(system_u:object_r:ifconfig_runtime_t,s0)
22 /run/netns/[^/]+ -- <<none>>
23+/run/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
24
25 ifdef(`distro_gentoo',`
26 /var/lib/dhcpc(/.*)? gen_context(system_u:object_r:dhcpc_state_t,s0)
27--
282.17.1
29
diff --git a/recipes-security/refpolicy/refpolicy-git/0007-fc-login-apply-login-context-to-login.shadow.patch b/recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch
index 824c136..e187b9e 100644
--- a/recipes-security/refpolicy/refpolicy-git/0007-fc-login-apply-login-context-to-login.shadow.patch
+++ b/recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch
@@ -1,27 +1,28 @@
1From 3323cd185bd27a010fb4353d16cb6c3a8608fd20 Mon Sep 17 00:00:00 2001 1From 3383027dfb8c672468a99805535eeadffbe7d332 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 21:43:53 -0400 3Date: Thu, 28 Mar 2019 21:43:53 -0400
4Subject: [PATCH 07/34] fc/login: apply login context to login.shadow 4Subject: [PATCH] fc/login: apply login context to login.shadow
5 5
6Upstream-Status: Inappropriate [only for Poky] 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9--- 10---
10 policy/modules/system/authlogin.fc | 1 + 11 policy/modules/system/authlogin.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc 14diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc
14index e22945cd..a42bc0da 100644 15index 7fd315706..fa86d6f92 100644
15--- a/policy/modules/system/authlogin.fc 16--- a/policy/modules/system/authlogin.fc
16+++ b/policy/modules/system/authlogin.fc 17+++ b/policy/modules/system/authlogin.fc
17@@ -5,6 +5,7 @@ 18@@ -5,6 +5,7 @@
18 /etc/shadow.* -- gen_context(system_u:object_r:shadow_t,s0) 19 /etc/shadow.* -- gen_context(system_u:object_r:shadow_t,s0)
19 20
20 /usr/bin/login -- gen_context(system_u:object_r:login_exec_t,s0) 21 /usr/bin/login -- gen_context(system_u:object_r:login_exec_t,s0)
21+/usr/bin/login\.shadow -- gen_context(system_u:object_r:login_exec_t,s0) 22+/usr/bin/login\.shadow -- gen_context(system_u:object_r:login_exec_t,s0)
22 /usr/bin/pam_console_apply -- gen_context(system_u:object_r:pam_console_exec_t,s0) 23 /usr/bin/pam_console_apply -- gen_context(system_u:object_r:pam_console_exec_t,s0)
23 /usr/bin/pam_timestamp_check -- gen_context(system_u:object_r:pam_exec_t,s0) 24 /usr/bin/pam_timestamp_check -- gen_context(system_u:object_r:pam_exec_t,s0)
24 /usr/bin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) 25 /usr/bin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
25-- 26--
262.19.1 272.17.1
27 28
diff --git a/recipes-security/refpolicy/refpolicy-git/0008-fc-bind-fix-real-path-for-bind.patch b/recipes-security/refpolicy/refpolicy/0007-fc-bind-fix-real-path-for-bind.patch
index 6472a21..cfd8dfc 100644
--- a/recipes-security/refpolicy/refpolicy-git/0008-fc-bind-fix-real-path-for-bind.patch
+++ b/recipes-security/refpolicy/refpolicy/0007-fc-bind-fix-real-path-for-bind.patch
@@ -1,18 +1,19 @@
1From 9207386c0a860b3b6520eca5e509b9633c67c1e4 Mon Sep 17 00:00:00 2001 1From fcf91092015155c4a10a1d7c4dd352ead0b5698b Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 21:58:53 -0400 3Date: Thu, 28 Mar 2019 21:58:53 -0400
4Subject: [PATCH 08/34] fc/bind: fix real path for bind 4Subject: [PATCH] fc/bind: fix real path for bind
5 5
6Upstream-Status: Pending 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10--- 11---
11 policy/modules/services/bind.fc | 2 ++ 12 policy/modules/services/bind.fc | 2 ++
12 1 file changed, 2 insertions(+) 13 1 file changed, 2 insertions(+)
13 14
14diff --git a/policy/modules/services/bind.fc b/policy/modules/services/bind.fc 15diff --git a/policy/modules/services/bind.fc b/policy/modules/services/bind.fc
15index b4879dc1..59498e25 100644 16index 7c1df4895..9f87a21a6 100644
16--- a/policy/modules/services/bind.fc 17--- a/policy/modules/services/bind.fc
17+++ b/policy/modules/services/bind.fc 18+++ b/policy/modules/services/bind.fc
18@@ -1,8 +1,10 @@ 19@@ -1,8 +1,10 @@
@@ -22,10 +23,10 @@ index b4879dc1..59498e25 100644
22 23
23 /etc/bind(/.*)? gen_context(system_u:object_r:named_zone_t,s0) 24 /etc/bind(/.*)? gen_context(system_u:object_r:named_zone_t,s0)
24 /etc/bind/named\.conf.* -- gen_context(system_u:object_r:named_conf_t,s0) 25 /etc/bind/named\.conf.* -- gen_context(system_u:object_r:named_conf_t,s0)
25+/etc/bind/rndc\.conf -- gen_context(system_u:object_r:named_conf_t,s0) 26+/etc/bind/rndc\.conf.* -- gen_context(system_u:object_r:named_conf_t,s0)
26 /etc/bind/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0) 27 /etc/bind/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0)
27 /etc/dnssec-trigger/dnssec_trigger_server\.key -- gen_context(system_u:object_r:dnssec_t,s0) 28 /etc/dnssec-trigger/dnssec_trigger_server\.key -- gen_context(system_u:object_r:dnssec_t,s0)
28 /etc/named\.rfc1912\.zones -- gen_context(system_u:object_r:named_conf_t,s0) 29 /etc/named\.rfc1912\.zones -- gen_context(system_u:object_r:named_conf_t,s0)
29-- 30--
302.19.1 312.17.1
31 32
diff --git a/recipes-security/refpolicy/refpolicy/0008-fc-hwclock-add-hwclock-alternatives.patch b/recipes-security/refpolicy/refpolicy/0008-fc-hwclock-add-hwclock-alternatives.patch
new file mode 100644
index 0000000..5a09d4b
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0008-fc-hwclock-add-hwclock-alternatives.patch
@@ -0,0 +1,25 @@
1From 2e5be9a910fc07a63efafc87a3c10bd81bd9c052 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Thu, 28 Mar 2019 21:59:18 -0400
4Subject: [PATCH] fc/hwclock: add hwclock alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10---
11 policy/modules/system/clock.fc | 1 +
12 1 file changed, 1 insertion(+)
13
14diff --git a/policy/modules/system/clock.fc b/policy/modules/system/clock.fc
15index 301965892..139485835 100644
16--- a/policy/modules/system/clock.fc
17+++ b/policy/modules/system/clock.fc
18@@ -3,3 +3,4 @@
19 /usr/bin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
20
21 /usr/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
22+/usr/sbin/hwclock\.util-linux -- gen_context(system_u:object_r:hwclock_exec_t,s0)
23--
242.17.1
25
diff --git a/recipes-security/refpolicy/refpolicy/0009-fc-dmesg-apply-policy-to-dmesg-alternatives.patch b/recipes-security/refpolicy/refpolicy/0009-fc-dmesg-apply-policy-to-dmesg-alternatives.patch
new file mode 100644
index 0000000..cc7eb7c
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0009-fc-dmesg-apply-policy-to-dmesg-alternatives.patch
@@ -0,0 +1,23 @@
1From 924ecc31c140dcd862d067849d4e11e111284165 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 08:26:55 -0400
4Subject: [PATCH] fc/dmesg: apply policy to dmesg alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10---
11 policy/modules/admin/dmesg.fc | 1 +
12 1 file changed, 1 insertion(+)
13
14diff --git a/policy/modules/admin/dmesg.fc b/policy/modules/admin/dmesg.fc
15index e52fdfcf8..526b92ed2 100644
16--- a/policy/modules/admin/dmesg.fc
17+++ b/policy/modules/admin/dmesg.fc
18@@ -1 +1,2 @@
19 /usr/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
20+/usr/bin/dmesg\.util-linux -- gen_context(system_u:object_r:dmesg_exec_t,s0)
21--
222.17.1
23
diff --git a/recipes-security/refpolicy/refpolicy-git/0011-fc-ssh-apply-policy-to-ssh-alternatives.patch b/recipes-security/refpolicy/refpolicy/0010-fc-ssh-apply-policy-to-ssh-alternatives.patch
index ab81b31..003af92 100644
--- a/recipes-security/refpolicy/refpolicy-git/0011-fc-ssh-apply-policy-to-ssh-alternatives.patch
+++ b/recipes-security/refpolicy/refpolicy/0010-fc-ssh-apply-policy-to-ssh-alternatives.patch
@@ -1,27 +1,28 @@
1From c7002e990710f83763a1481ddaa56a1f658defee Mon Sep 17 00:00:00 2001 1From 261892950c5b2a40b7c3bb050ede148cbd1c7a84 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 09:20:58 -0400 3Date: Fri, 29 Mar 2019 09:20:58 -0400
4Subject: [PATCH 11/34] fc/ssh: apply policy to ssh alternatives 4Subject: [PATCH] fc/ssh: apply policy to ssh alternatives
5 5
6Upstream-Status: Pending 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9--- 10---
10 policy/modules/services/ssh.fc | 1 + 11 policy/modules/services/ssh.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc 14diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc
14index 4ac3e733..1f453091 100644 15index 60060c35c..518043a9b 100644
15--- a/policy/modules/services/ssh.fc 16--- a/policy/modules/services/ssh.fc
16+++ b/policy/modules/services/ssh.fc 17+++ b/policy/modules/services/ssh.fc
17@@ -4,6 +4,7 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0) 18@@ -4,6 +4,7 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0)
18 /etc/ssh/ssh_host.*_key -- gen_context(system_u:object_r:sshd_key_t,s0) 19 /etc/ssh/ssh_host.*_key -- gen_context(system_u:object_r:sshd_key_t,s0)
19 20
20 /usr/bin/ssh -- gen_context(system_u:object_r:ssh_exec_t,s0) 21 /usr/bin/ssh -- gen_context(system_u:object_r:ssh_exec_t,s0)
21+/usr/bin/ssh\.openssh -- gen_context(system_u:object_r:ssh_exec_t,s0) 22+/usr/bin/ssh\.openssh -- gen_context(system_u:object_r:ssh_exec_t,s0)
22 /usr/bin/ssh-agent -- gen_context(system_u:object_r:ssh_agent_exec_t,s0) 23 /usr/bin/ssh-agent -- gen_context(system_u:object_r:ssh_agent_exec_t,s0)
23 /usr/bin/ssh-keygen -- gen_context(system_u:object_r:ssh_keygen_exec_t,s0) 24 /usr/bin/ssh-keygen -- gen_context(system_u:object_r:ssh_keygen_exec_t,s0)
24 /usr/bin/sshd -- gen_context(system_u:object_r:sshd_exec_t,s0) 25 /usr/bin/sshd -- gen_context(system_u:object_r:sshd_exec_t,s0)
25-- 26--
262.19.1 272.17.1
27 28
diff --git a/recipes-security/refpolicy/refpolicy-git/0012-fc-sysnetwork-apply-policy-to-ip-alternatives.patch b/recipes-security/refpolicy/refpolicy/0011-fc-sysnetwork-apply-policy-to-ip-alternatives.patch
index 8346fcf..aeb63f7 100644
--- a/recipes-security/refpolicy/refpolicy-git/0012-fc-sysnetwork-apply-policy-to-ip-alternatives.patch
+++ b/recipes-security/refpolicy/refpolicy/0011-fc-sysnetwork-apply-policy-to-ip-alternatives.patch
@@ -1,48 +1,39 @@
1From 881a9f637b6eec90d1fa20bf4c102bb595225aaf Mon Sep 17 00:00:00 2001 1From bb8832629e85af2a16800f5cfec97ca0bf8319e6 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Tue, 9 Jun 2015 21:22:52 +0530 3Date: Tue, 9 Jun 2015 21:22:52 +0530
4Subject: [PATCH 12/34] fc/sysnetwork: apply policy to ip alternatives 4Subject: [PATCH] fc/sysnetwork: apply policy to ip alternatives
5 5
6Upstream-Status: Pending 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> 9Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
11--- 12---
12 policy/modules/system/sysnetwork.fc | 10 ++++++++++ 13 policy/modules/system/sysnetwork.fc | 3 +++
13 1 file changed, 10 insertions(+) 14 1 file changed, 3 insertions(+)
14 15
15diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc 16diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
16index ac7c2dd1..4e441503 100644 17index acf539656..d8902d725 100644
17--- a/policy/modules/system/sysnetwork.fc 18--- a/policy/modules/system/sysnetwork.fc
18+++ b/policy/modules/system/sysnetwork.fc 19+++ b/policy/modules/system/sysnetwork.fc
19@@ -60,6 +60,8 @@ ifdef(`distro_redhat',` 20@@ -59,13 +59,16 @@ ifdef(`distro_redhat',`
20 /usr/sbin/dhcpcd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) 21 /usr/sbin/dhcpcd -- gen_context(system_u:object_r:dhcpc_exec_t,s0)
21 /usr/sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 22 /usr/sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
22 /usr/sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 23 /usr/sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
23+/usr/sbin/ifconfig\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 24+/usr/sbin/ifconfig\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
24+/usr/sbin/ip\.iproute2 -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
25 /usr/sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 25 /usr/sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
26+/usr/sbin/ip\.iproute2 -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
26 /usr/sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 27 /usr/sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
27 /usr/sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 28 /usr/sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
28@@ -67,9 +69,17 @@ ifdef(`distro_redhat',` 29 /usr/sbin/ipx_internal_net -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
29 /usr/sbin/iw -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 30 /usr/sbin/iw -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
30 /usr/sbin/iwconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 31 /usr/sbin/iwconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
31 /usr/sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 32 /usr/sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
32+/usr/sbin/mii-tool\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 33+/usr/sbin/mii-tool\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
33 /usr/sbin/pump -- gen_context(system_u:object_r:dhcpc_exec_t,s0) 34 /usr/sbin/pump -- gen_context(system_u:object_r:dhcpc_exec_t,s0)
34 /usr/sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 35 /usr/sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
35 36
36+#
37+# /usr/lib/busybox
38+#
39+/usr/lib/busybox/bin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
40+/usr/lib/busybox/bin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
41+/usr/lib/busybox/sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
42+
43 #
44 # /var
45 #
46-- 37--
472.19.1 382.17.1
48 39
diff --git a/recipes-security/refpolicy/refpolicy-git/0013-fc-udev-apply-policy-to-udevadm-in-libexec.patch b/recipes-security/refpolicy/refpolicy/0012-fc-udev-apply-policy-to-udevadm-in-libexec.patch
index 9ec2e21..d1059df 100644
--- a/recipes-security/refpolicy/refpolicy-git/0013-fc-udev-apply-policy-to-udevadm-in-libexec.patch
+++ b/recipes-security/refpolicy/refpolicy/0012-fc-udev-apply-policy-to-udevadm-in-libexec.patch
@@ -1,28 +1,29 @@
1From 434fe791713127cea8a796529266b87763833117 Mon Sep 17 00:00:00 2001 1From 02a3c7a06f760d3cae909d2c271d1e4fde07c09b Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 09:36:08 -0400 3Date: Fri, 29 Mar 2019 09:36:08 -0400
4Subject: [PATCH 13/34] fc/udev: apply policy to udevadm in libexec 4Subject: [PATCH] fc/udev: apply policy to udevadm in libexec
5 5
6Upstream-Status: Pending 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9--- 10---
10 policy/modules/system/udev.fc | 2 ++ 11 policy/modules/system/udev.fc | 2 ++
11 1 file changed, 2 insertions(+) 12 1 file changed, 2 insertions(+)
12 13
13diff --git a/policy/modules/system/udev.fc b/policy/modules/system/udev.fc 14diff --git a/policy/modules/system/udev.fc b/policy/modules/system/udev.fc
14index 606ad517..2919c0bd 100644 15index 0ae7571cd..ceb5b70b3 100644
15--- a/policy/modules/system/udev.fc 16--- a/policy/modules/system/udev.fc
16+++ b/policy/modules/system/udev.fc 17+++ b/policy/modules/system/udev.fc
17@@ -28,6 +28,8 @@ ifdef(`distro_debian',` 18@@ -28,6 +28,8 @@ ifdef(`distro_debian',`
18 /usr/sbin/udevstart -- gen_context(system_u:object_r:udev_exec_t,s0) 19 /usr/sbin/udevstart -- gen_context(system_u:object_r:udev_exec_t,s0)
19 /usr/sbin/wait_for_sysfs -- gen_context(system_u:object_r:udev_exec_t,s0) 20 /usr/sbin/wait_for_sysfs -- gen_context(system_u:object_r:udev_exec_t,s0)
20 21
21+/usr/libexec/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) 22+/usr/libexec/udevadm -- gen_context(system_u:object_r:udevadm_exec_t,s0)
22+ 23+
23 ifdef(`distro_redhat',` 24 ifdef(`distro_redhat',`
24 /usr/sbin/start_udev -- gen_context(system_u:object_r:udev_exec_t,s0) 25 /usr/sbin/start_udev -- gen_context(system_u:object_r:udev_exec_t,s0)
25 ') 26 ')
26-- 27--
272.19.1 282.17.1
28 29
diff --git a/recipes-security/refpolicy/refpolicy/0013-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch b/recipes-security/refpolicy/refpolicy/0013-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch
new file mode 100644
index 0000000..3e61f45
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0013-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch
@@ -0,0 +1,27 @@
1From 117884178c9ba63334f732da6f30e67e22aa898e Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 09:54:07 -0400
4Subject: [PATCH] fc/rpm: apply rpm_exec policy to cpio binaries
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10---
11 policy/modules/admin/rpm.fc | 2 ++
12 1 file changed, 2 insertions(+)
13
14diff --git a/policy/modules/admin/rpm.fc b/policy/modules/admin/rpm.fc
15index 6194a4833..ace922ac1 100644
16--- a/policy/modules/admin/rpm.fc
17+++ b/policy/modules/admin/rpm.fc
18@@ -66,4 +66,6 @@ ifdef(`distro_redhat',`
19
20 ifdef(`enable_mls',`
21 /usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
22+/usr/bin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
23+/usr/bin/cpio\.cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
24 ')
25--
262.17.1
27
diff --git a/recipes-security/refpolicy/refpolicy-git/0015-fc-su-apply-policy-to-su-alternatives.patch b/recipes-security/refpolicy/refpolicy/0014-fc-su-apply-policy-to-su-alternatives.patch
index b26eeea..da05686 100644
--- a/recipes-security/refpolicy/refpolicy-git/0015-fc-su-apply-policy-to-su-alternatives.patch
+++ b/recipes-security/refpolicy/refpolicy/0014-fc-su-apply-policy-to-su-alternatives.patch
@@ -1,26 +1,27 @@
1From d6eb7326773a01cea4cb6949e8e8f94e12d145ca Mon Sep 17 00:00:00 2001 1From 522d08c0dac1cfe9e33f06bc1252b7b672d9ffd3 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com> 2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Thu, 13 Feb 2014 00:33:07 -0500 3Date: Thu, 13 Feb 2014 00:33:07 -0500
4Subject: [PATCH 15/34] fc/su: apply policy to su alternatives 4Subject: [PATCH] fc/su: apply policy to su alternatives
5 5
6Upstream-Status: Pending 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> 8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10--- 11---
11 policy/modules/admin/su.fc | 2 ++ 12 policy/modules/admin/su.fc | 2 ++
12 1 file changed, 2 insertions(+) 13 1 file changed, 2 insertions(+)
13 14
14diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc 15diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc
15index 3375c969..435a6892 100644 16index 3375c9692..a9868cd58 100644
16--- a/policy/modules/admin/su.fc 17--- a/policy/modules/admin/su.fc
17+++ b/policy/modules/admin/su.fc 18+++ b/policy/modules/admin/su.fc
18@@ -1,3 +1,5 @@ 19@@ -1,3 +1,5 @@
19 /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) 20 /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0)
20 /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) 21 /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0)
21 /usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0) 22 /usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
22+/usr/bin/su\.shadow -- gen_context(system_u:object_r:su_exec_t,s0) 23+/usr/bin/su\.shadow -- gen_context(system_u:object_r:su_exec_t,s0)
23+/usr/bin/su\.util-linux -- gen_context(system_u:object_r:su_exec_t,s0) 24+/usr/bin/su\.util-linux -- gen_context(system_u:object_r:su_exec_t,s0)
24-- 25--
252.19.1 262.17.1
26 27
diff --git a/recipes-security/refpolicy/refpolicy-git/0016-fc-fstools-fix-real-path-for-fstools.patch b/recipes-security/refpolicy/refpolicy/0015-fc-fstools-fix-real-path-for-fstools.patch
index 35676f8..78260e5 100644
--- a/recipes-security/refpolicy/refpolicy-git/0016-fc-fstools-fix-real-path-for-fstools.patch
+++ b/recipes-security/refpolicy/refpolicy/0015-fc-fstools-fix-real-path-for-fstools.patch
@@ -1,76 +1,76 @@
1From 4cc043905534403d2c6c5882ed982bd09a6c605f Mon Sep 17 00:00:00 2001 1From c4b0ffd60873ecca2cf0b1aa898185f5f3928828 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com> 2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Mon, 27 Jan 2014 03:54:01 -0500 3Date: Mon, 27 Jan 2014 03:54:01 -0500
4Subject: [PATCH 16/34] fc/fstools: fix real path for fstools 4Subject: [PATCH] fc/fstools: fix real path for fstools
5 5
6Upstream-Status: Pending 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> 8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
9Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com> 9Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
11--- 12---
12 policy/modules/system/fstools.fc | 12 ++++++++++++ 13 policy/modules/system/fstools.fc | 10 ++++++++++
13 1 file changed, 12 insertions(+) 14 1 file changed, 10 insertions(+)
14 15
15diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc 16diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc
16index 8fbd5ce4..d719e22c 100644 17index d871294e8..bef711850 100644
17--- a/policy/modules/system/fstools.fc 18--- a/policy/modules/system/fstools.fc
18+++ b/policy/modules/system/fstools.fc 19+++ b/policy/modules/system/fstools.fc
19@@ -58,6 +58,7 @@ 20@@ -59,7 +59,9 @@
20 /usr/sbin/addpart -- gen_context(system_u:object_r:fsadm_exec_t,s0) 21 /usr/sbin/addpart -- gen_context(system_u:object_r:fsadm_exec_t,s0)
21 /usr/sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0) 22 /usr/sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0)
22 /usr/sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0) 23 /usr/sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0)
23+/usr/sbin/blkid\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 24+/usr/sbin/blkid\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
24 /usr/sbin/blockdev -- gen_context(system_u:object_r:fsadm_exec_t,s0) 25 /usr/sbin/blockdev -- gen_context(system_u:object_r:fsadm_exec_t,s0)
26+/usr/sbin/blockdev\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
25 /usr/sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 27 /usr/sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
26 /usr/sbin/clubufflush -- gen_context(system_u:object_r:fsadm_exec_t,s0) 28 /usr/sbin/clubufflush -- gen_context(system_u:object_r:fsadm_exec_t,s0)
27@@ -72,10 +73,12 @@ 29 /usr/sbin/delpart -- gen_context(system_u:object_r:fsadm_exec_t,s0)
30@@ -73,10 +75,12 @@
28 /usr/sbin/efibootmgr -- gen_context(system_u:object_r:fsadm_exec_t,s0) 31 /usr/sbin/efibootmgr -- gen_context(system_u:object_r:fsadm_exec_t,s0)
29 /usr/sbin/fatsort -- gen_context(system_u:object_r:fsadm_exec_t,s0) 32 /usr/sbin/fatsort -- gen_context(system_u:object_r:fsadm_exec_t,s0)
30 /usr/sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 33 /usr/sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
31+/usr/sbin/fdisk\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 34+/usr/sbin/fdisk\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
32 /usr/sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 35 /usr/sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
33 /usr/sbin/fsck.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 36 /usr/sbin/fsck.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
34 /usr/sbin/gdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 37 /usr/sbin/gdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
35 /usr/sbin/hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0) 38 /usr/sbin/hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0)
36+/usr/sbin/hdparm\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 39+/usr/sbin/hdparm\.hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0)
37 /usr/sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0) 40 /usr/sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0)
38 /usr/sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 41 /usr/sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
39 /usr/sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 42 /usr/sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
40@@ -88,17 +91,20 @@ 43@@ -84,24 +88,30 @@
44 /usr/sbin/make_reiser4 -- gen_context(system_u:object_r:fsadm_exec_t,s0)
45 /usr/sbin/mkdosfs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
46 /usr/sbin/mke2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
47+/usr/sbin/mke2fs\.e2fsprogs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
48 /usr/sbin/mke4fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
49 /usr/sbin/mkfs.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
41 /usr/sbin/mkraid -- gen_context(system_u:object_r:fsadm_exec_t,s0) 50 /usr/sbin/mkraid -- gen_context(system_u:object_r:fsadm_exec_t,s0)
42 /usr/sbin/mkreiserfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 51 /usr/sbin/mkreiserfs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
43 /usr/sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0) 52 /usr/sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0)
44+/usr/sbin/mkswap\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 53+/usr/sbin/mkswap\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
45 /usr/sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0) 54 /usr/sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0)
46 /usr/sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0) 55 /usr/sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0)
56+/usr/sbin/partprobe\.parted -- gen_context(system_u:object_r:fsadm_exec_t,s0)
47 /usr/sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) 57 /usr/sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0)
48 /usr/sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0) 58 /usr/sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0)
49 /usr/sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0) 59 /usr/sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0)
50+/usr/sbin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0) 60+/usr/sbin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0)
51 /usr/sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0) 61 /usr/sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0)
52 /usr/sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 62 /usr/sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
53 /usr/sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0) 63 /usr/sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0)
54 /usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 64 /usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
55 /usr/sbin/smartctl -- gen_context(system_u:object_r:fsadm_exec_t,s0) 65 /usr/sbin/smartctl -- gen_context(system_u:object_r:fsadm_exec_t,s0)
56 /usr/sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0) 66 /usr/sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0)
57+/usr/sbin/swapoff\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 67+/usr/sbin/swapoff\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
58 /usr/sbin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 68 /usr/sbin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
59 /usr/sbin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 69 /usr/sbin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
70+/usr/sbin/tune2fs\.e2fsprogs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
60 /usr/sbin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0) 71 /usr/sbin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0)
61@@ -108,6 +114,12 @@ 72 /usr/sbin/zhack -- gen_context(system_u:object_r:fsadm_exec_t,s0)
62 /usr/sbin/zstreamdump -- gen_context(system_u:object_r:fsadm_exec_t,s0) 73 /usr/sbin/zinject -- gen_context(system_u:object_r:fsadm_exec_t,s0)
63 /usr/sbin/ztest -- gen_context(system_u:object_r:fsadm_exec_t,s0)
64
65+/usr/lib/busybox/sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0)
66+/usr/lib/busybox/sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
67+/usr/lib/busybox/sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0)
68+/usr/lib/busybox/sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0)
69+/usr/lib/busybox/sbin/swapon -- gen_context(system_u:object_r:fsadm_exec_t,s0)
70+
71 /var/swap -- gen_context(system_u:object_r:swapfile_t,s0)
72
73 /var/log/fsck(/.*)? gen_context(system_u:object_r:fsadm_log_t,s0)
74-- 74--
752.19.1 752.17.1
76 76
diff --git a/recipes-security/refpolicy/refpolicy-git/0001-fix-update-alternatives-for-sysvinit.patch b/recipes-security/refpolicy/refpolicy/0016-fc-init-fix-update-alternatives-for-sysvinit.patch
index 98d98d4..1a8e8dc 100644
--- a/recipes-security/refpolicy/refpolicy-git/0001-fix-update-alternatives-for-sysvinit.patch
+++ b/recipes-security/refpolicy/refpolicy/0016-fc-init-fix-update-alternatives-for-sysvinit.patch
@@ -1,20 +1,21 @@
1From cf2f08bdb2d64b38b6c83c96f409c1cd9975fe6a Mon Sep 17 00:00:00 2001 1From 95a843719394827621e3b33c13f2696f7e498e5b Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH] fix update-alternatives for sysvinit 4Subject: [PATCH] fc/init: fix update-alternatives for sysvinit
5 5
6Upstream-Status: Inappropriate [only for Poky] 6Upstream-Status: Inappropriate [embedded specific]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10--- 11---
11 policy/modules/admin/shutdown.fc | 1 + 12 policy/modules/admin/shutdown.fc | 1 +
12 policy/modules/kernel/corecommands.fc | 1 + 13 policy/modules/kernel/corecommands.fc | 2 ++
13 policy/modules/system/init.fc | 1 + 14 policy/modules/system/init.fc | 1 +
14 3 files changed, 3 insertions(+) 15 3 files changed, 4 insertions(+)
15 16
16diff --git a/policy/modules/admin/shutdown.fc b/policy/modules/admin/shutdown.fc 17diff --git a/policy/modules/admin/shutdown.fc b/policy/modules/admin/shutdown.fc
17index 03a2230c..2ba049ff 100644 18index bf51c103f..91ed72be0 100644
18--- a/policy/modules/admin/shutdown.fc 19--- a/policy/modules/admin/shutdown.fc
19+++ b/policy/modules/admin/shutdown.fc 20+++ b/policy/modules/admin/shutdown.fc
20@@ -5,5 +5,6 @@ 21@@ -5,5 +5,6 @@
@@ -23,31 +24,32 @@ index 03a2230c..2ba049ff 100644
23 /usr/sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) 24 /usr/sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0)
24+/usr/sbin/shutdown\.sysvinit -- gen_context(system_u:object_r:shutdown_exec_t,s0) 25+/usr/sbin/shutdown\.sysvinit -- gen_context(system_u:object_r:shutdown_exec_t,s0)
25 26
26 /run/shutdown\.pid -- gen_context(system_u:object_r:shutdown_var_run_t,s0) 27 /run/shutdown\.pid -- gen_context(system_u:object_r:shutdown_runtime_t,s0)
27diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc 28diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
28index cf3848db..86920167 100644 29index 7e199b7b0..157eeb0d0 100644
29--- a/policy/modules/kernel/corecommands.fc 30--- a/policy/modules/kernel/corecommands.fc
30+++ b/policy/modules/kernel/corecommands.fc 31+++ b/policy/modules/kernel/corecommands.fc
31@@ -149,6 +149,7 @@ ifdef(`distro_gentoo',` 32@@ -151,6 +151,8 @@ ifdef(`distro_gentoo',`
32 /usr/bin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0) 33 /usr/bin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0)
33 /usr/bin/mksh -- gen_context(system_u:object_r:shell_exec_t,s0) 34 /usr/bin/mksh -- gen_context(system_u:object_r:shell_exec_t,s0)
34 /usr/bin/mountpoint -- gen_context(system_u:object_r:bin_t,s0) 35 /usr/bin/mountpoint -- gen_context(system_u:object_r:bin_t,s0)
35+/usr/bin/mountpoint\.sysvinit -- gen_context(system_u:object_r:bin_t,s0) 36+/usr/bin/mountpoint\.sysvinit -- gen_context(system_u:object_r:bin_t,s0)
37+/usr/bin/mountpoint\.util-linux -- gen_context(system_u:object_r:bin_t,s0)
36 /usr/bin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0) 38 /usr/bin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0)
37 /usr/bin/sash -- gen_context(system_u:object_r:shell_exec_t,s0) 39 /usr/bin/sash -- gen_context(system_u:object_r:shell_exec_t,s0)
38 /usr/bin/sesh -- gen_context(system_u:object_r:shell_exec_t,s0) 40 /usr/bin/sesh -- gen_context(system_u:object_r:shell_exec_t,s0)
39diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc 41diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc
40index 11a6ce93..93e9d2b4 100644 42index fee6ff3b6..fe72df22a 100644
41--- a/policy/modules/system/init.fc 43--- a/policy/modules/system/init.fc
42+++ b/policy/modules/system/init.fc 44+++ b/policy/modules/system/init.fc
43@@ -23,6 +23,7 @@ ifdef(`distro_gentoo',` 45@@ -40,6 +40,7 @@ ifdef(`distro_gentoo',`
44 # /usr 46 /usr/libexec/dcc/stop-.* -- gen_context(system_u:object_r:initrc_exec_t,s0)
45 # 47
46 /usr/bin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0) 48 /usr/sbin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0)
47+/usr/sbin/init\.sysvinit -- gen_context(system_u:object_r:init_exec_t,s0) 49+/usr/sbin/init\.sysvinit -- gen_context(system_u:object_r:init_exec_t,s0)
48 /usr/bin/open_init_pty -- gen_context(system_u:object_r:initrc_exec_t,s0) 50 /usr/sbin/open_init_pty -- gen_context(system_u:object_r:initrc_exec_t,s0)
49 /usr/bin/sepg_ctl -- gen_context(system_u:object_r:initrc_exec_t,s0) 51 /usr/sbin/upstart -- gen_context(system_u:object_r:init_exec_t,s0)
50 /usr/bin/systemd -- gen_context(system_u:object_r:init_exec_t,s0) 52
51-- 53--
522.19.1 542.17.1
53 55
diff --git a/recipes-security/refpolicy/refpolicy/0017-fc-brctl-apply-policy-to-brctl-alternatives.patch b/recipes-security/refpolicy/refpolicy/0017-fc-brctl-apply-policy-to-brctl-alternatives.patch
new file mode 100644
index 0000000..6271a88
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0017-fc-brctl-apply-policy-to-brctl-alternatives.patch
@@ -0,0 +1,24 @@
1From 0b05d71fea73c9fc0dc8aac6e7d096b0214db5eb Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 10:19:54 +0800
4Subject: [PATCH] fc/brctl: apply policy to brctl alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/admin/brctl.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/admin/brctl.fc b/policy/modules/admin/brctl.fc
14index ed472f095..2a852b0fd 100644
15--- a/policy/modules/admin/brctl.fc
16+++ b/policy/modules/admin/brctl.fc
17@@ -1,3 +1,4 @@
18 /usr/bin/brctl -- gen_context(system_u:object_r:brctl_exec_t,s0)
19
20 /usr/sbin/brctl -- gen_context(system_u:object_r:brctl_exec_t,s0)
21+/usr/sbin/brctl\.bridge-utils -- gen_context(system_u:object_r:brctl_exec_t,s0)
22--
232.17.1
24
diff --git a/recipes-security/refpolicy/refpolicy/0018-fc-corecommands-apply-policy-to-nologin-alternatives.patch b/recipes-security/refpolicy/refpolicy/0018-fc-corecommands-apply-policy-to-nologin-alternatives.patch
new file mode 100644
index 0000000..442c3d8
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0018-fc-corecommands-apply-policy-to-nologin-alternatives.patch
@@ -0,0 +1,28 @@
1From 5f759c3d89b52e62607266c4e684d66953803d4d Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 10:21:51 +0800
4Subject: [PATCH] fc/corecommands: apply policy to nologin alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/kernel/corecommands.fc | 2 ++
11 1 file changed, 2 insertions(+)
12
13diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
14index 157eeb0d0..515948ea9 100644
15--- a/policy/modules/kernel/corecommands.fc
16+++ b/policy/modules/kernel/corecommands.fc
17@@ -303,6 +303,8 @@ ifdef(`distro_debian',`
18 /usr/sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0)
19 /usr/sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0)
20 /usr/sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0)
21+/usr/sbin/nologin\.shadow -- gen_context(system_u:object_r:shell_exec_t,s0)
22+/usr/sbin/nologin\.util-linux -- gen_context(system_u:object_r:shell_exec_t,s0)
23 /usr/sbin/scponlyc -- gen_context(system_u:object_r:shell_exec_t,s0)
24 /usr/sbin/sesh -- gen_context(system_u:object_r:shell_exec_t,s0)
25 /usr/sbin/smrsh -- gen_context(system_u:object_r:shell_exec_t,s0)
26--
272.17.1
28
diff --git a/recipes-security/refpolicy/refpolicy/0019-fc-locallogin-apply-policy-to-sulogin-alternatives.patch b/recipes-security/refpolicy/refpolicy/0019-fc-locallogin-apply-policy-to-sulogin-alternatives.patch
new file mode 100644
index 0000000..4303d36
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0019-fc-locallogin-apply-policy-to-sulogin-alternatives.patch
@@ -0,0 +1,25 @@
1From 84f715b8d128bcbfdc95adf18d6bc8eb225f05cd Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 10:43:28 +0800
4Subject: [PATCH] fc/locallogin: apply policy to sulogin alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/system/locallogin.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/system/locallogin.fc b/policy/modules/system/locallogin.fc
14index fc8d58507..59e6e9601 100644
15--- a/policy/modules/system/locallogin.fc
16+++ b/policy/modules/system/locallogin.fc
17@@ -2,4 +2,5 @@
18 /usr/bin/sushell -- gen_context(system_u:object_r:sulogin_exec_t,s0)
19
20 /usr/sbin/sulogin -- gen_context(system_u:object_r:sulogin_exec_t,s0)
21+/usr/sbin/sulogin\.util-linux -- gen_context(system_u:object_r:sulogin_exec_t,s0)
22 /usr/sbin/sushell -- gen_context(system_u:object_r:sulogin_exec_t,s0)
23--
242.17.1
25
diff --git a/recipes-security/refpolicy/refpolicy/0020-fc-ntp-apply-policy-to-ntpd-alternatives.patch b/recipes-security/refpolicy/refpolicy/0020-fc-ntp-apply-policy-to-ntpd-alternatives.patch
new file mode 100644
index 0000000..49c2f82
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0020-fc-ntp-apply-policy-to-ntpd-alternatives.patch
@@ -0,0 +1,27 @@
1From b30d9ad872f613d2b1c3aad45eac65593de37b9b Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 10:45:23 +0800
4Subject: [PATCH] fc/ntp: apply policy to ntpd alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/services/ntp.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/services/ntp.fc b/policy/modules/services/ntp.fc
14index cd69ea5d5..49ffe6f68 100644
15--- a/policy/modules/services/ntp.fc
16+++ b/policy/modules/services/ntp.fc
17@@ -25,6 +25,7 @@
18 /usr/lib/systemd/systemd-timesyncd -- gen_context(system_u:object_r:ntpd_exec_t,s0)
19
20 /usr/sbin/ntpd -- gen_context(system_u:object_r:ntpd_exec_t,s0)
21+/usr/sbin/ntpd\.ntp -- gen_context(system_u:object_r:ntpd_exec_t,s0)
22 /usr/sbin/ntpdate -- gen_context(system_u:object_r:ntpdate_exec_t,s0)
23 /usr/sbin/sntp -- gen_context(system_u:object_r:ntpdate_exec_t,s0)
24
25--
262.17.1
27
diff --git a/recipes-security/refpolicy/refpolicy/0021-fc-kerberos-apply-policy-to-kerberos-alternatives.patch b/recipes-security/refpolicy/refpolicy/0021-fc-kerberos-apply-policy-to-kerberos-alternatives.patch
new file mode 100644
index 0000000..7fe5c8f
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0021-fc-kerberos-apply-policy-to-kerberos-alternatives.patch
@@ -0,0 +1,50 @@
1From 632dcd7a700049a955082bd24af742c2780dcc38 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 10:55:05 +0800
4Subject: [PATCH] fc/kerberos: apply policy to kerberos alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/services/kerberos.fc | 10 ++++++++++
11 1 file changed, 10 insertions(+)
12
13diff --git a/policy/modules/services/kerberos.fc b/policy/modules/services/kerberos.fc
14index df21fcc78..ce0166edd 100644
15--- a/policy/modules/services/kerberos.fc
16+++ b/policy/modules/services/kerberos.fc
17@@ -12,6 +12,8 @@ HOME_DIR/\.k5login -- gen_context(system_u:object_r:krb5_home_t,s0)
18 /etc/rc\.d/init\.d/kprop -- gen_context(system_u:object_r:kerberos_initrc_exec_t,s0)
19 /etc/rc\.d/init\.d/krb524d -- gen_context(system_u:object_r:kerberos_initrc_exec_t,s0)
20 /etc/rc\.d/init\.d/krb5kdc -- gen_context(system_u:object_r:kerberos_initrc_exec_t,s0)
21+/etc/rc\.d/init\.d/krb5-admin-server -- gen_context(system_u:object_r:kerberos_initrc_exec_t,s0)
22+/etc/rc\.d/init\.d/krb5-kdc -- gen_context(system_u:object_r:kerberos_initrc_exec_t,s0)
23
24 /usr/bin/krb5kdc -- gen_context(system_u:object_r:krb5kdc_exec_t,s0)
25 /usr/bin/kadmind -- gen_context(system_u:object_r:kadmind_exec_t,s0)
26@@ -26,6 +28,8 @@ HOME_DIR/\.k5login -- gen_context(system_u:object_r:krb5_home_t,s0)
27
28 /usr/sbin/krb5kdc -- gen_context(system_u:object_r:krb5kdc_exec_t,s0)
29 /usr/sbin/kadmind -- gen_context(system_u:object_r:kadmind_exec_t,s0)
30+/usr/sbin/kadmin\.local -- gen_context(system_u:object_r:kadmind_exec_t,s0)
31+/usr/sbin/kpropd -- gen_context(system_u:object_r:kpropd_exec_t,s0)
32
33 /usr/local/var/krb5kdc(/.*)? gen_context(system_u:object_r:krb5kdc_conf_t,s0)
34 /usr/local/var/krb5kdc/principal.* gen_context(system_u:object_r:krb5kdc_principal_t,s0)
35@@ -41,6 +45,12 @@ HOME_DIR/\.k5login -- gen_context(system_u:object_r:krb5_home_t,s0)
36 /var/kerberos/krb5kdc/principal.* gen_context(system_u:object_r:krb5kdc_principal_t,s0)
37 /var/kerberos/krb5kdc/principal.*\.ok -- gen_context(system_u:object_r:krb5kdc_lock_t,s0)
38
39+/var/krb5kdc(/.*)? gen_context(system_u:object_r:krb5kdc_conf_t,s0)
40+/var/krb5kdc/from_master.* gen_context(system_u:object_r:krb5kdc_lock_t,s0)
41+/var/krb5kdc/kadm5\.keytab -- gen_context(system_u:object_r:krb5_keytab_t,s0)
42+/var/krb5kdc/principal.* gen_context(system_u:object_r:krb5kdc_principal_t,s0)
43+/var/krb5kdc/principal.*\.ok -- gen_context(system_u:object_r:krb5kdc_lock_t,s0)
44+
45 /var/log/krb5kdc\.log.* -- gen_context(system_u:object_r:krb5kdc_log_t,s0)
46 /var/log/kadmin\.log.* -- gen_context(system_u:object_r:kadmind_log_t,s0)
47 /var/log/kadmind\.log.* -- gen_context(system_u:object_r:kadmind_log_t,s0)
48--
492.17.1
50
diff --git a/recipes-security/refpolicy/refpolicy/0022-fc-ldap-apply-policy-to-ldap-alternatives.patch b/recipes-security/refpolicy/refpolicy/0022-fc-ldap-apply-policy-to-ldap-alternatives.patch
new file mode 100644
index 0000000..c3bcabe
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0022-fc-ldap-apply-policy-to-ldap-alternatives.patch
@@ -0,0 +1,40 @@
1From a580b0154da9dd07369b172ed459046197e388c7 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 11:06:13 +0800
4Subject: [PATCH] fc/ldap: apply policy to ldap alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/services/ldap.fc | 5 +++++
11 1 file changed, 5 insertions(+)
12
13diff --git a/policy/modules/services/ldap.fc b/policy/modules/services/ldap.fc
14index 0a1d08d0f..65b202962 100644
15--- a/policy/modules/services/ldap.fc
16+++ b/policy/modules/services/ldap.fc
17@@ -1,8 +1,10 @@
18 /etc/ldap/slapd\.conf -- gen_context(system_u:object_r:slapd_etc_t,s0)
19 /etc/openldap/certs(/.*)? gen_context(system_u:object_r:slapd_cert_t,s0)
20 /etc/openldap/slapd\.d(/.*)? gen_context(system_u:object_r:slapd_db_t,s0)
21+/etc/openldap/slapd\.conf -- gen_context(system_u:object_r:slapd_etc_t,s0)
22
23 /etc/rc\.d/init\.d/ldap -- gen_context(system_u:object_r:slapd_initrc_exec_t,s0)
24+/etc/rc\.d/init\.d/openldap -- gen_context(system_u:object_r:slapd_initrc_exec_t,s0)
25
26 /usr/bin/slapd -- gen_context(system_u:object_r:slapd_exec_t,s0)
27
28@@ -25,6 +27,9 @@
29 /var/log/ldap.* gen_context(system_u:object_r:slapd_log_t,s0)
30 /var/log/slapd.* gen_context(system_u:object_r:slapd_log_t,s0)
31
32+/var/openldap(/.*)? gen_context(system_u:object_r:slapd_db_t,s0)
33+/var/openldap/replog(/.*)? gen_context(system_u:object_r:slapd_replog_t,s0)
34+
35 /run/ldapi -s gen_context(system_u:object_r:slapd_runtime_t,s0)
36 /run/openldap(/.*)? gen_context(system_u:object_r:slapd_runtime_t,s0)
37 /run/slapd.* -s gen_context(system_u:object_r:slapd_runtime_t,s0)
38--
392.17.1
40
diff --git a/recipes-security/refpolicy/refpolicy/0023-fc-postgresql-apply-policy-to-postgresql-alternative.patch b/recipes-security/refpolicy/refpolicy/0023-fc-postgresql-apply-policy-to-postgresql-alternative.patch
new file mode 100644
index 0000000..0fc608b
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0023-fc-postgresql-apply-policy-to-postgresql-alternative.patch
@@ -0,0 +1,37 @@
1From 926401518bca5a1e63b7f2c2cbae4a3bc42bf342 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 11:13:16 +0800
4Subject: [PATCH] fc/postgresql: apply policy to postgresql alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/services/postgresql.fc | 11 +++++++++++
11 1 file changed, 11 insertions(+)
12
13diff --git a/policy/modules/services/postgresql.fc b/policy/modules/services/postgresql.fc
14index f31a52cf8..f9bf46870 100644
15--- a/policy/modules/services/postgresql.fc
16+++ b/policy/modules/services/postgresql.fc
17@@ -27,6 +27,17 @@
18 /usr/lib/postgresql(-.*)?/(.*/)?bin/postgres -- gen_context(system_u:object_r:postgresql_exec_t,s0)
19 /usr/lib/postgresql(-.*)?/(.*/)?bin/postmaster -l gen_context(system_u:object_r:postgresql_exec_t,s0)
20
21+/usr/bin/pg_archivecleanup -- gen_context(system_u:object_r:postgresql_exec_t,s0)
22+/usr/bin/pg_basebackup -- gen_context(system_u:object_r:postgresql_exec_t,s0)
23+/usr/bin/pg_controldata -- gen_context(system_u:object_r:postgresql_exec_t,s0)
24+/usr/bin/pg_ctl -- gen_context(system_u:object_r:postgresql_exec_t,s0)
25+/usr/bin/pg_resetxlog -- gen_context(system_u:object_r:postgresql_exec_t,s0)
26+/usr/bin/pg_standby -- gen_context(system_u:object_r:postgresql_exec_t,s0)
27+/usr/bin/pg_upgrade -- gen_context(system_u:object_r:postgresql_exec_t,s0)
28+/usr/bin/pg_xlogdump -- gen_context(system_u:object_r:postgresql_exec_t,s0)
29+/usr/bin/postgres -- gen_context(system_u:object_r:postgresql_exec_t,s0)
30+/usr/bin/postmaster -l gen_context(system_u:object_r:postgresql_exec_t,s0)
31+
32 ifdef(`distro_redhat', `
33 /usr/share/jonas/pgsql(/.*)? gen_context(system_u:object_r:postgresql_db_t,s0)
34 ')
35--
362.17.1
37
diff --git a/recipes-security/refpolicy/refpolicy/0024-fc-screen-apply-policy-to-screen-alternatives.patch b/recipes-security/refpolicy/refpolicy/0024-fc-screen-apply-policy-to-screen-alternatives.patch
new file mode 100644
index 0000000..b529bbf
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0024-fc-screen-apply-policy-to-screen-alternatives.patch
@@ -0,0 +1,25 @@
1From f3f6f0cb4857954afd8a025a1cd3f14b8a11b64d Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 11:15:33 +0800
4Subject: [PATCH] fc/screen: apply policy to screen alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/apps/screen.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/apps/screen.fc b/policy/modules/apps/screen.fc
14index 7196c598e..cada9944e 100644
15--- a/policy/modules/apps/screen.fc
16+++ b/policy/modules/apps/screen.fc
17@@ -6,4 +6,5 @@ HOME_DIR/\.tmux\.conf -- gen_context(system_u:object_r:screen_home_t,s0)
18 /run/tmux(/.*)? gen_context(system_u:object_r:screen_runtime_t,s0)
19
20 /usr/bin/screen -- gen_context(system_u:object_r:screen_exec_t,s0)
21+/usr/bin/screen-.* -- gen_context(system_u:object_r:screen_exec_t,s0)
22 /usr/bin/tmux -- gen_context(system_u:object_r:screen_exec_t,s0)
23--
242.17.1
25
diff --git a/recipes-security/refpolicy/refpolicy/0025-fc-usermanage-apply-policy-to-usermanage-alternative.patch b/recipes-security/refpolicy/refpolicy/0025-fc-usermanage-apply-policy-to-usermanage-alternative.patch
new file mode 100644
index 0000000..76278c9
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0025-fc-usermanage-apply-policy-to-usermanage-alternative.patch
@@ -0,0 +1,45 @@
1From 0656c4b988cb700f322fb03e6639fe0b64e08d63 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 11:25:34 +0800
4Subject: [PATCH] fc/usermanage: apply policy to usermanage alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/admin/usermanage.fc | 4 ++++
11 1 file changed, 4 insertions(+)
12
13diff --git a/policy/modules/admin/usermanage.fc b/policy/modules/admin/usermanage.fc
14index 620eefc6f..6a051f8a5 100644
15--- a/policy/modules/admin/usermanage.fc
16+++ b/policy/modules/admin/usermanage.fc
17@@ -4,7 +4,9 @@ ifdef(`distro_debian',`
18
19 /usr/bin/chage -- gen_context(system_u:object_r:passwd_exec_t,s0)
20 /usr/bin/chfn -- gen_context(system_u:object_r:chfn_exec_t,s0)
21+/usr/bin/chfn\.shadow -- gen_context(system_u:object_r:chfn_exec_t,s0)
22 /usr/bin/chsh -- gen_context(system_u:object_r:chfn_exec_t,s0)
23+/usr/bin/chsh\.shadow -- gen_context(system_u:object_r:chfn_exec_t,s0)
24 /usr/bin/crack_[a-z]* -- gen_context(system_u:object_r:crack_exec_t,s0)
25 /usr/bin/cracklib-[a-z]* -- gen_context(system_u:object_r:crack_exec_t,s0)
26 /usr/bin/gpasswd -- gen_context(system_u:object_r:groupadd_exec_t,s0)
27@@ -14,6 +16,7 @@ ifdef(`distro_debian',`
28 /usr/bin/grpconv -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
29 /usr/bin/grpunconv -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
30 /usr/bin/passwd -- gen_context(system_u:object_r:passwd_exec_t,s0)
31+/usr/bin/passwd\.shadow -- gen_context(system_u:object_r:passwd_exec_t,s0)
32 /usr/bin/pwconv -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
33 /usr/bin/pwunconv -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
34 /usr/bin/useradd -- gen_context(system_u:object_r:useradd_exec_t,s0)
35@@ -39,6 +42,7 @@ ifdef(`distro_debian',`
36 /usr/sbin/usermod -- gen_context(system_u:object_r:useradd_exec_t,s0)
37 /usr/sbin/vigr -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
38 /usr/sbin/vipw -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
39+/usr/sbin/vipw\.shadow -- gen_context(system_u:object_r:admin_passwd_exec_t,s0)
40
41 /usr/share/cracklib(/.*)? gen_context(system_u:object_r:crack_db_t,s0)
42
43--
442.17.1
45
diff --git a/recipes-security/refpolicy/refpolicy/0026-fc-getty-add-file-context-to-start_getty.patch b/recipes-security/refpolicy/refpolicy/0026-fc-getty-add-file-context-to-start_getty.patch
new file mode 100644
index 0000000..5f45438
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0026-fc-getty-add-file-context-to-start_getty.patch
@@ -0,0 +1,27 @@
1From cc8da498e20518cc9e8f59d1a4570e073f19e88b Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 15 Nov 2019 16:07:30 +0800
4Subject: [PATCH] fc/getty: add file context to start_getty
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/system/getty.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/system/getty.fc b/policy/modules/system/getty.fc
14index 116ea6421..53ff6137b 100644
15--- a/policy/modules/system/getty.fc
16+++ b/policy/modules/system/getty.fc
17@@ -4,6 +4,7 @@
18 /run/agetty\.reload -- gen_context(system_u:object_r:getty_runtime_t,s0)
19
20 /usr/bin/.*getty -- gen_context(system_u:object_r:getty_exec_t,s0)
21+/usr/bin/start_getty -- gen_context(system_u:object_r:bin_t,s0)
22
23 /usr/sbin/.*getty -- gen_context(system_u:object_r:getty_exec_t,s0)
24
25--
262.17.1
27
diff --git a/recipes-security/refpolicy/refpolicy/0027-fc-init-add-file-context-to-etc-network-if-files.patch b/recipes-security/refpolicy/refpolicy/0027-fc-init-add-file-context-to-etc-network-if-files.patch
new file mode 100644
index 0000000..e54777c
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0027-fc-init-add-file-context-to-etc-network-if-files.patch
@@ -0,0 +1,33 @@
1From 1d6f9b62082188992bfb681632dff15d5ad608c9 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 19 Nov 2019 14:33:28 +0800
4Subject: [PATCH] fc/init: add file context to /etc/network/if-* files
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/system/init.fc | 3 ++-
11 1 file changed, 2 insertions(+), 1 deletion(-)
12
13diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc
14index fe72df22a..a9d8f343a 100644
15--- a/policy/modules/system/init.fc
16+++ b/policy/modules/system/init.fc
17@@ -70,11 +70,12 @@ ifdef(`distro_redhat',`
18 ifdef(`distro_debian',`
19 /run/hotkey-setup -- gen_context(system_u:object_r:initrc_runtime_t,s0)
20 /run/kdm/.* -- gen_context(system_u:object_r:initrc_runtime_t,s0)
21+')
22+
23 /etc/network/if-pre-up\.d/.* -- gen_context(system_u:object_r:initrc_exec_t,s0)
24 /etc/network/if-up\.d/.* -- gen_context(system_u:object_r:initrc_exec_t,s0)
25 /etc/network/if-down\.d/.* -- gen_context(system_u:object_r:initrc_exec_t,s0)
26 /etc/network/if-post-down\.d/.* -- gen_context(system_u:object_r:initrc_exec_t,s0)
27-')
28
29 ifdef(`distro_gentoo', `
30 /var/lib/init\.d(/.*)? gen_context(system_u:object_r:initrc_state_t,s0)
31--
322.17.1
33
diff --git a/recipes-security/refpolicy/refpolicy/0028-fc-vlock-apply-policy-to-vlock-alternatives.patch b/recipes-security/refpolicy/refpolicy/0028-fc-vlock-apply-policy-to-vlock-alternatives.patch
new file mode 100644
index 0000000..8017392
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0028-fc-vlock-apply-policy-to-vlock-alternatives.patch
@@ -0,0 +1,25 @@
1From 8d8858bd8569db106f0feb44a0912daa872954ec Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Wed, 18 Dec 2019 15:04:41 +0800
4Subject: [PATCH] fc/vlock: apply policy to vlock alternatives
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/apps/vlock.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/apps/vlock.fc b/policy/modules/apps/vlock.fc
14index f668cde9c..c4bc50984 100644
15--- a/policy/modules/apps/vlock.fc
16+++ b/policy/modules/apps/vlock.fc
17@@ -1,4 +1,5 @@
18 /usr/bin/vlock -- gen_context(system_u:object_r:vlock_exec_t,s0)
19+/usr/bin/vlock\.kbd -- gen_context(system_u:object_r:vlock_exec_t,s0)
20 /usr/bin/vlock-main -- gen_context(system_u:object_r:vlock_exec_t,s0)
21
22 /usr/sbin/vlock-main -- gen_context(system_u:object_r:vlock_exec_t,s0)
23--
242.17.1
25
diff --git a/recipes-security/refpolicy/refpolicy/0029-fc-cron-apply-policy-to-etc-init.d-crond.patch b/recipes-security/refpolicy/refpolicy/0029-fc-cron-apply-policy-to-etc-init.d-crond.patch
new file mode 100644
index 0000000..294f999
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0029-fc-cron-apply-policy-to-etc-init.d-crond.patch
@@ -0,0 +1,25 @@
1From 25701662f7149743556bb2d5edb5c69e6de2744f Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 30 Jun 2020 10:45:57 +0800
4Subject: [PATCH] fc/cron: apply policy to /etc/init.d/crond
5
6Upstream-Status: Inappropriate [embedded specific]
7
8Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
9---
10 policy/modules/services/cron.fc | 1 +
11 1 file changed, 1 insertion(+)
12
13diff --git a/policy/modules/services/cron.fc b/policy/modules/services/cron.fc
14index 827363d88..e8412396d 100644
15--- a/policy/modules/services/cron.fc
16+++ b/policy/modules/services/cron.fc
17@@ -1,4 +1,5 @@
18 /etc/rc\.d/init\.d/(anacron|atd) -- gen_context(system_u:object_r:crond_initrc_exec_t,s0)
19+/etc/rc\.d/init\.d/crond -- gen_context(system_u:object_r:crond_initrc_exec_t,s0)
20
21 /etc/cron\.d(/.*)? gen_context(system_u:object_r:system_cron_spool_t,s0)
22 /etc/crontab -- gen_context(system_u:object_r:system_cron_spool_t,s0)
23--
242.17.1
25
diff --git a/recipes-security/refpolicy/refpolicy/0030-file_contexts.subs_dist-set-aliase-for-root-director.patch b/recipes-security/refpolicy/refpolicy/0030-file_contexts.subs_dist-set-aliase-for-root-director.patch
new file mode 100644
index 0000000..8331955
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0030-file_contexts.subs_dist-set-aliase-for-root-director.patch
@@ -0,0 +1,30 @@
1From 9260b04d257cdddf42d0267456d3ba2b38dc22d4 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Sun, 5 Apr 2020 22:03:45 +0800
4Subject: [PATCH] file_contexts.subs_dist: set aliase for /root directory
5
6The genhomedircon.py will expand /root directory to /home/root.
7Add an aliase for it
8
9Upstream-Status: Inappropriate [embedded specific]
10
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12---
13 config/file_contexts.subs_dist | 4 ++++
14 1 file changed, 4 insertions(+)
15
16diff --git a/config/file_contexts.subs_dist b/config/file_contexts.subs_dist
17index c249c5207..67f476868 100644
18--- a/config/file_contexts.subs_dist
19+++ b/config/file_contexts.subs_dist
20@@ -43,3 +43,7 @@
21 /usr/lib/busybox/bin /usr/bin
22 /usr/lib/busybox/sbin /usr/sbin
23 /usr/lib/busybox/usr /usr
24+
25+# The genhomedircon.py will expand /root home directory to /home/root
26+# Add an aliase for it
27+/root /home/root
28--
292.17.1
30
diff --git a/recipes-security/refpolicy/refpolicy-git/0018-policy-module-logging-add-rules-for-the-symlink-of-v.patch b/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-add-rules-for-the-syml.patch
index 6dca744..b05f037 100644
--- a/recipes-security/refpolicy/refpolicy-git/0018-policy-module-logging-add-rules-for-the-symlink-of-v.patch
+++ b/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-add-rules-for-the-syml.patch
@@ -1,39 +1,40 @@
1From ccb0b3884513829a2ab344f1682df6ea6ff4e7de Mon Sep 17 00:00:00 2001 1From e4bdbb101fd2af2d4fd8b87794443097b58d20ff Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 18/34] policy/module/logging: add rules for the symlink of 4Subject: [PATCH] policy/modules/system/logging: add rules for the symlink of
5 /var/log 5 /var/log
6 6
7/var/log is a symlink in poky, so we need allow rules for files to read 7/var/log is a symlink in poky, so we need allow rules for files to read
8lnk_file while doing search/list/delete/rw... in /var/log/ directory. 8lnk_file while doing search/list/delete/rw... in /var/log/ directory.
9 9
10Upstream-Status: Inappropriate [only for Poky] 10Upstream-Status: Inappropriate [embedded specific]
11 11
12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
14--- 15---
15 policy/modules/system/logging.fc | 1 + 16 policy/modules/system/logging.fc | 1 +
16 policy/modules/system/logging.if | 6 ++++++ 17 policy/modules/system/logging.if | 9 +++++++++
17 policy/modules/system/logging.te | 2 ++ 18 policy/modules/system/logging.te | 2 ++
18 3 files changed, 9 insertions(+) 19 3 files changed, 12 insertions(+)
19 20
20diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc 21diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc
21index 0cf108e0..5bec7e99 100644 22index 5681acb51..a4ecd570a 100644
22--- a/policy/modules/system/logging.fc 23--- a/policy/modules/system/logging.fc
23+++ b/policy/modules/system/logging.fc 24+++ b/policy/modules/system/logging.fc
24@@ -55,6 +55,7 @@ ifdef(`distro_suse', ` 25@@ -52,6 +52,7 @@ ifdef(`distro_suse', `
25 /var/dnscache/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0) 26 /var/dnscache/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0)
26 27
27 /var/log -d gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh) 28 /var/log -d gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh)
28+/var/log -l gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh) 29+/var/log -l gen_context(system_u:object_r:var_log_t,s0)
29 /var/log/.* gen_context(system_u:object_r:var_log_t,s0) 30 /var/log/.* gen_context(system_u:object_r:var_log_t,s0)
30 /var/log/dmesg -- gen_context(system_u:object_r:var_log_t,s0) 31 /var/log/dmesg -- gen_context(system_u:object_r:var_log_t,s0)
31 /var/log/syslog -- gen_context(system_u:object_r:var_log_t,s0) 32 /var/log/syslog -- gen_context(system_u:object_r:var_log_t,s0)
32diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if 33diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if
33index 7b7644f7..0c7268ff 100644 34index e5f4080ac..e3cbe4f1a 100644
34--- a/policy/modules/system/logging.if 35--- a/policy/modules/system/logging.if
35+++ b/policy/modules/system/logging.if 36+++ b/policy/modules/system/logging.if
36@@ -972,10 +972,12 @@ interface(`logging_append_all_inherited_logs',` 37@@ -1066,10 +1066,12 @@ interface(`logging_append_all_inherited_logs',`
37 interface(`logging_read_all_logs',` 38 interface(`logging_read_all_logs',`
38 gen_require(` 39 gen_require(`
39 attribute logfile; 40 attribute logfile;
@@ -46,7 +47,7 @@ index 7b7644f7..0c7268ff 100644
46 read_files_pattern($1, logfile, logfile) 47 read_files_pattern($1, logfile, logfile)
47 ') 48 ')
48 49
49@@ -994,10 +996,12 @@ interface(`logging_read_all_logs',` 50@@ -1088,10 +1090,12 @@ interface(`logging_read_all_logs',`
50 interface(`logging_exec_all_logs',` 51 interface(`logging_exec_all_logs',`
51 gen_require(` 52 gen_require(`
52 attribute logfile; 53 attribute logfile;
@@ -59,7 +60,23 @@ index 7b7644f7..0c7268ff 100644
59 can_exec($1, logfile) 60 can_exec($1, logfile)
60 ') 61 ')
61 62
62@@ -1099,6 +1103,7 @@ interface(`logging_read_generic_logs',` 63@@ -1153,6 +1157,7 @@ interface(`logging_manage_generic_log_dirs',`
64
65 files_search_var($1)
66 allow $1 var_log_t:dir manage_dir_perms;
67+ allow $1 var_log_t:lnk_file read_lnk_file_perms;
68 ')
69
70 ########################################
71@@ -1173,6 +1178,7 @@ interface(`logging_relabel_generic_log_dirs',`
72
73 files_search_var($1)
74 allow $1 var_log_t:dir { relabelfrom relabelto };
75+ allow $1 var_log_t:lnk_file read_lnk_file_perms;
76 ')
77
78 ########################################
79@@ -1193,6 +1199,7 @@ interface(`logging_read_generic_logs',`
63 80
64 files_search_var($1) 81 files_search_var($1)
65 allow $1 var_log_t:dir list_dir_perms; 82 allow $1 var_log_t:dir list_dir_perms;
@@ -67,7 +84,7 @@ index 7b7644f7..0c7268ff 100644
67 read_files_pattern($1, var_log_t, var_log_t) 84 read_files_pattern($1, var_log_t, var_log_t)
68 ') 85 ')
69 86
70@@ -1200,6 +1205,7 @@ interface(`logging_manage_generic_logs',` 87@@ -1294,6 +1301,7 @@ interface(`logging_manage_generic_logs',`
71 88
72 files_search_var($1) 89 files_search_var($1)
73 manage_files_pattern($1, var_log_t, var_log_t) 90 manage_files_pattern($1, var_log_t, var_log_t)
@@ -75,8 +92,16 @@ index 7b7644f7..0c7268ff 100644
75 ') 92 ')
76 93
77 ######################################## 94 ########################################
95@@ -1312,6 +1320,7 @@ interface(`logging_watch_generic_logs_dir',`
96 ')
97
98 allow $1 var_log_t:dir watch;
99+ allow $1 var_log_t:lnk_file read_lnk_file_perms;
100 ')
101
102 ########################################
78diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te 103diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
79index c892f547..499a4552 100644 104index 3702d441a..513d811ef 100644
80--- a/policy/modules/system/logging.te 105--- a/policy/modules/system/logging.te
81+++ b/policy/modules/system/logging.te 106+++ b/policy/modules/system/logging.te
82@@ -161,6 +161,7 @@ manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t) 107@@ -161,6 +161,7 @@ manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
@@ -85,8 +110,8 @@ index c892f547..499a4552 100644
85 allow auditd_t var_log_t:dir search_dir_perms; 110 allow auditd_t var_log_t:dir search_dir_perms;
86+allow auditd_t var_log_t:lnk_file read_lnk_file_perms; 111+allow auditd_t var_log_t:lnk_file read_lnk_file_perms;
87 112
88 manage_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) 113 manage_files_pattern(auditd_t, auditd_runtime_t, auditd_runtime_t)
89 manage_sock_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) 114 manage_sock_files_pattern(auditd_t, auditd_runtime_t, auditd_runtime_t)
90@@ -288,6 +289,7 @@ allow audisp_remote_t self:capability { setpcap setuid }; 115@@ -288,6 +289,7 @@ allow audisp_remote_t self:capability { setpcap setuid };
91 allow audisp_remote_t self:process { getcap setcap }; 116 allow audisp_remote_t self:process { getcap setcap };
92 allow audisp_remote_t self:tcp_socket create_socket_perms; 117 allow audisp_remote_t self:tcp_socket create_socket_perms;
@@ -96,5 +121,5 @@ index c892f547..499a4552 100644
96 manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) 121 manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t)
97 manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) 122 manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t)
98-- 123--
992.19.1 1242.17.1
100 125
diff --git a/recipes-security/refpolicy/refpolicy-git/0019-policy-module-logging-add-rules-for-syslogd-symlink-.patch b/recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-add-rules-for-syslogd-.patch
index a532316..c81bee7 100644
--- a/recipes-security/refpolicy/refpolicy-git/0019-policy-module-logging-add-rules-for-syslogd-symlink-.patch
+++ b/recipes-security/refpolicy/refpolicy/0032-policy-modules-system-logging-add-rules-for-syslogd-.patch
@@ -1,33 +1,34 @@
1From b52614cce12e4a7d3437350bb35688d5470f92fc Mon Sep 17 00:00:00 2001 1From aaa818cd6d0b1d7a3ad99f911c6c21d5b30b9f49 Mon Sep 17 00:00:00 2001
2From: Joe MacDonald <joe_macdonald@mentor.com> 2From: Joe MacDonald <joe_macdonald@mentor.com>
3Date: Fri, 29 Mar 2019 10:33:18 -0400 3Date: Fri, 29 Mar 2019 10:33:18 -0400
4Subject: [PATCH 19/34] policy/module/logging: add rules for syslogd symlink of 4Subject: [PATCH] policy/modules/system/logging: add rules for syslogd symlink
5 /var/log 5 of /var/log
6 6
7We have added rules for the symlink of /var/log in logging.if, while 7We have added rules for the symlink of /var/log in logging.if, while
8syslogd_t uses /var/log but does not use the interfaces in logging.if. So 8syslogd_t uses /var/log but does not use the interfaces in logging.if. So
9still need add a individual rule for syslogd_t. 9still need add a individual rule for syslogd_t.
10 10
11Upstream-Status: Inappropriate [only for Poky] 11Upstream-Status: Inappropriate [embedded specific]
12 12
13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15--- 16---
16 policy/modules/system/logging.te | 1 + 17 policy/modules/system/logging.te | 1 +
17 1 file changed, 1 insertion(+) 18 1 file changed, 1 insertion(+)
18 19
19diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te 20diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
20index 499a4552..e6221a02 100644 21index 513d811ef..2d9f65d2d 100644
21--- a/policy/modules/system/logging.te 22--- a/policy/modules/system/logging.te
22+++ b/policy/modules/system/logging.te 23+++ b/policy/modules/system/logging.te
23@@ -417,6 +417,7 @@ files_search_spool(syslogd_t) 24@@ -414,6 +414,7 @@ files_search_spool(syslogd_t)
24 25
25 # Allow access for syslog-ng 26 # Allow access for syslog-ng
26 allow syslogd_t var_log_t:dir { create setattr }; 27 allow syslogd_t var_log_t:dir { create setattr };
27+allow syslogd_t var_log_t:lnk_file read_lnk_file_perms; 28+allow syslogd_t var_log_t:lnk_file read_lnk_file_perms;
28 29
29 # for systemd but can not be conditional 30 # for systemd but can not be conditional
30 files_pid_filetrans(syslogd_t, syslogd_tmp_t, dir, "log") 31 files_runtime_filetrans(syslogd_t, syslogd_tmp_t, dir, "log")
31-- 32--
322.19.1 332.17.1
33 34
diff --git a/recipes-security/refpolicy/refpolicy-git/0020-policy-module-logging-add-domain-rules-for-the-subdi.patch b/recipes-security/refpolicy/refpolicy/0033-policy-modules-system-logging-add-domain-rules-for-t.patch
index a494671..90995dc 100644
--- a/recipes-security/refpolicy/refpolicy-git/0020-policy-module-logging-add-domain-rules-for-the-subdi.patch
+++ b/recipes-security/refpolicy/refpolicy/0033-policy-modules-system-logging-add-domain-rules-for-t.patch
@@ -1,24 +1,25 @@
1From 07456143d9478b345dbe480e1b418b744de96751 Mon Sep 17 00:00:00 2001 1From 0385f2374297ab2b8799fe1ec28d12e1682ec074 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Fri, 23 Aug 2013 11:20:00 +0800 3Date: Fri, 23 Aug 2013 11:20:00 +0800
4Subject: [PATCH 20/34] policy/module/logging: add domain rules for the subdir 4Subject: [PATCH] policy/modules/system/logging: add domain rules for the
5 symlinks in /var/ 5 subdir symlinks in /var/
6 6
7Except /var/log,/var/run,/var/lock, there still other subdir symlinks in 7Except /var/log,/var/run,/var/lock, there still other subdir symlinks in
8/var for poky, so we need allow rules for all domains to read these 8/var for poky, so we need allow rules for all domains to read these
9symlinks. Domains still need their practical allow rules to read the 9symlinks. Domains still need their practical allow rules to read the
10contents, so this is still a secure relax. 10contents, so this is still a secure relax.
11 11
12Upstream-Status: Inappropriate [only for Poky] 12Upstream-Status: Inappropriate [embedded specific]
13 13
14Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 14Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
15Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 15Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
16Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16--- 17---
17 policy/modules/kernel/domain.te | 3 +++ 18 policy/modules/kernel/domain.te | 3 +++
18 1 file changed, 3 insertions(+) 19 1 file changed, 3 insertions(+)
19 20
20diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te 21diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
21index 1a55e3d2..babb794f 100644 22index 4e43a208d..7e5d2b458 100644
22--- a/policy/modules/kernel/domain.te 23--- a/policy/modules/kernel/domain.te
23+++ b/policy/modules/kernel/domain.te 24+++ b/policy/modules/kernel/domain.te
24@@ -110,6 +110,9 @@ term_use_controlling_term(domain) 25@@ -110,6 +110,9 @@ term_use_controlling_term(domain)
@@ -32,5 +33,5 @@ index 1a55e3d2..babb794f 100644
32 # This check is in the general socket 33 # This check is in the general socket
33 # listen code, before protocol-specific 34 # listen code, before protocol-specific
34-- 35--
352.19.1 362.17.1
36 37
diff --git a/recipes-security/refpolicy/refpolicy-git/0021-policy-module-files-add-rules-for-the-symlink-of-tmp.patch b/recipes-security/refpolicy/refpolicy/0034-policy-modules-kernel-files-add-rules-for-the-symlin.patch
index aa61a80..33dc366 100644
--- a/recipes-security/refpolicy/refpolicy-git/0021-policy-module-files-add-rules-for-the-symlink-of-tmp.patch
+++ b/recipes-security/refpolicy/refpolicy/0034-policy-modules-kernel-files-add-rules-for-the-symlin.patch
@@ -1,37 +1,39 @@
1From edcfc7eb98658352f3ffdeb8079517c54ba7f984 Mon Sep 17 00:00:00 2001 1From 3ff1a004b77f44857dadfef3b78a49a55d90c665 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 21/34] policy/module/files: add rules for the symlink of /tmp 4Subject: [PATCH] policy/modules/kernel/files: add rules for the symlink of
5 /tmp
5 6
6/tmp is a symlink in poky, so we need allow rules for files to read 7/tmp is a symlink in poky, so we need allow rules for files to read
7lnk_file while doing search/list/delete/rw.. in /tmp/ directory. 8lnk_file while doing search/list/delete/rw.. in /tmp/ directory.
8 9
9Upstream-Status: Inappropriate [only for Poky] 10Upstream-Status: Inappropriate [embedded specific]
10 11
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
13--- 15---
14 policy/modules/kernel/files.fc | 1 + 16 policy/modules/kernel/files.fc | 1 +
15 policy/modules/kernel/files.if | 8 ++++++++ 17 policy/modules/kernel/files.if | 8 ++++++++
16 2 files changed, 9 insertions(+) 18 2 files changed, 9 insertions(+)
17 19
18diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc 20diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc
19index c3496c21..05b1734b 100644 21index a3993f5cc..f69900945 100644
20--- a/policy/modules/kernel/files.fc 22--- a/policy/modules/kernel/files.fc
21+++ b/policy/modules/kernel/files.fc 23+++ b/policy/modules/kernel/files.fc
22@@ -176,6 +176,7 @@ HOME_ROOT/lost\+found/.* <<none>> 24@@ -176,6 +176,7 @@ HOME_ROOT/lost\+found/.* <<none>>
23 # /tmp 25 # /tmp
24 # 26 #
25 /tmp -d gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh) 27 /tmp -d gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh)
26+/tmp -l gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh) 28+/tmp -l gen_context(system_u:object_r:tmp_t,s0)
27 /tmp/.* <<none>> 29 /tmp/.* <<none>>
28 /tmp/\.journal <<none>> 30 /tmp/\.journal <<none>>
29 31
30diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if 32diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
31index f1c94411..eb067ad3 100644 33index 6a53f886b..ad19738b3 100644
32--- a/policy/modules/kernel/files.if 34--- a/policy/modules/kernel/files.if
33+++ b/policy/modules/kernel/files.if 35+++ b/policy/modules/kernel/files.if
34@@ -4350,6 +4350,7 @@ interface(`files_search_tmp',` 36@@ -4451,6 +4451,7 @@ interface(`files_search_tmp',`
35 ') 37 ')
36 38
37 allow $1 tmp_t:dir search_dir_perms; 39 allow $1 tmp_t:dir search_dir_perms;
@@ -39,7 +41,7 @@ index f1c94411..eb067ad3 100644
39 ') 41 ')
40 42
41 ######################################## 43 ########################################
42@@ -4386,6 +4387,7 @@ interface(`files_list_tmp',` 44@@ -4487,6 +4488,7 @@ interface(`files_list_tmp',`
43 ') 45 ')
44 46
45 allow $1 tmp_t:dir list_dir_perms; 47 allow $1 tmp_t:dir list_dir_perms;
@@ -47,7 +49,7 @@ index f1c94411..eb067ad3 100644
47 ') 49 ')
48 50
49 ######################################## 51 ########################################
50@@ -4422,6 +4424,7 @@ interface(`files_delete_tmp_dir_entry',` 52@@ -4523,6 +4525,7 @@ interface(`files_delete_tmp_dir_entry',`
51 ') 53 ')
52 54
53 allow $1 tmp_t:dir del_entry_dir_perms; 55 allow $1 tmp_t:dir del_entry_dir_perms;
@@ -55,7 +57,7 @@ index f1c94411..eb067ad3 100644
55 ') 57 ')
56 58
57 ######################################## 59 ########################################
58@@ -4440,6 +4443,7 @@ interface(`files_read_generic_tmp_files',` 60@@ -4541,6 +4544,7 @@ interface(`files_read_generic_tmp_files',`
59 ') 61 ')
60 62
61 read_files_pattern($1, tmp_t, tmp_t) 63 read_files_pattern($1, tmp_t, tmp_t)
@@ -63,7 +65,7 @@ index f1c94411..eb067ad3 100644
63 ') 65 ')
64 66
65 ######################################## 67 ########################################
66@@ -4458,6 +4462,7 @@ interface(`files_manage_generic_tmp_dirs',` 68@@ -4559,6 +4563,7 @@ interface(`files_manage_generic_tmp_dirs',`
67 ') 69 ')
68 70
69 manage_dirs_pattern($1, tmp_t, tmp_t) 71 manage_dirs_pattern($1, tmp_t, tmp_t)
@@ -71,7 +73,7 @@ index f1c94411..eb067ad3 100644
71 ') 73 ')
72 74
73 ######################################## 75 ########################################
74@@ -4476,6 +4481,7 @@ interface(`files_manage_generic_tmp_files',` 76@@ -4577,6 +4582,7 @@ interface(`files_manage_generic_tmp_files',`
75 ') 77 ')
76 78
77 manage_files_pattern($1, tmp_t, tmp_t) 79 manage_files_pattern($1, tmp_t, tmp_t)
@@ -79,7 +81,7 @@ index f1c94411..eb067ad3 100644
79 ') 81 ')
80 82
81 ######################################## 83 ########################################
82@@ -4512,6 +4518,7 @@ interface(`files_rw_generic_tmp_sockets',` 84@@ -4613,6 +4619,7 @@ interface(`files_rw_generic_tmp_sockets',`
83 ') 85 ')
84 86
85 rw_sock_files_pattern($1, tmp_t, tmp_t) 87 rw_sock_files_pattern($1, tmp_t, tmp_t)
@@ -87,7 +89,7 @@ index f1c94411..eb067ad3 100644
87 ') 89 ')
88 90
89 ######################################## 91 ########################################
90@@ -4719,6 +4726,7 @@ interface(`files_tmp_filetrans',` 92@@ -4820,6 +4827,7 @@ interface(`files_tmp_filetrans',`
91 ') 93 ')
92 94
93 filetrans_pattern($1, tmp_t, $2, $3, $4) 95 filetrans_pattern($1, tmp_t, $2, $3, $4)
@@ -96,5 +98,5 @@ index f1c94411..eb067ad3 100644
96 98
97 ######################################## 99 ########################################
98-- 100--
992.19.1 1012.17.1
100 102
diff --git a/recipes-security/refpolicy/refpolicy-git/0022-policy-module-terminals-add-rules-for-bsdpty_device_.patch b/recipes-security/refpolicy/refpolicy/0035-policy-modules-kernel-terminal-add-rules-for-bsdpty_.patch
index 68235b1..c6fb34f 100644
--- a/recipes-security/refpolicy/refpolicy-git/0022-policy-module-terminals-add-rules-for-bsdpty_device_.patch
+++ b/recipes-security/refpolicy/refpolicy/0035-policy-modules-kernel-terminal-add-rules-for-bsdpty_.patch
@@ -1,19 +1,20 @@
1From 938ae00d2358d6ebad8173fce274ebb70d95cf72 Mon Sep 17 00:00:00 2001 1From cc8505dc9613a98ee8215854ece31a4aca103e8d Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 22/34] policy/module/terminals: add rules for bsdpty_device_t 4Subject: [PATCH] policy/modules/kernel/terminal: add rules for bsdpty_device_t
5 to complete pty devices. 5 to complete pty devices
6 6
7Upstream-Status: Pending 7Upstream-Status: Inappropriate [embedded specific]
8 8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
11--- 12---
12 policy/modules/kernel/terminal.if | 16 ++++++++++++++++ 13 policy/modules/kernel/terminal.if | 16 ++++++++++++++++
13 1 file changed, 16 insertions(+) 14 1 file changed, 16 insertions(+)
14 15
15diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if 16diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
16index 61308843..a84787e6 100644 17index 4bd4884f8..f70e51525 100644
17--- a/policy/modules/kernel/terminal.if 18--- a/policy/modules/kernel/terminal.if
18+++ b/policy/modules/kernel/terminal.if 19+++ b/policy/modules/kernel/terminal.if
19@@ -623,9 +623,11 @@ interface(`term_getattr_generic_ptys',` 20@@ -623,9 +623,11 @@ interface(`term_getattr_generic_ptys',`
@@ -92,7 +93,7 @@ index 61308843..a84787e6 100644
92 ') 93 ')
93 94
94 ####################################### 95 #######################################
95@@ -743,10 +755,12 @@ interface(`term_dontaudit_use_generic_ptys',` 96@@ -764,10 +776,12 @@ interface(`term_create_controlling_term',`
96 interface(`term_setattr_controlling_term',` 97 interface(`term_setattr_controlling_term',`
97 gen_require(` 98 gen_require(`
98 type devtty_t; 99 type devtty_t;
@@ -105,7 +106,7 @@ index 61308843..a84787e6 100644
105 ') 106 ')
106 107
107 ######################################## 108 ########################################
108@@ -763,10 +777,12 @@ interface(`term_setattr_controlling_term',` 109@@ -784,10 +798,12 @@ interface(`term_setattr_controlling_term',`
109 interface(`term_use_controlling_term',` 110 interface(`term_use_controlling_term',`
110 gen_require(` 111 gen_require(`
111 type devtty_t; 112 type devtty_t;
@@ -119,5 +120,5 @@ index 61308843..a84787e6 100644
119 120
120 ####################################### 121 #######################################
121-- 122--
1222.19.1 1232.17.1
123 124
diff --git a/recipes-security/refpolicy/refpolicy-git/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch b/recipes-security/refpolicy/refpolicy/0036-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch
index 06f9207..cc018fa 100644
--- a/recipes-security/refpolicy/refpolicy-git/0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch
+++ b/recipes-security/refpolicy/refpolicy/0036-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch
@@ -1,22 +1,23 @@
1From 3f5a9b987211ef511bfd1c76b1a7dffad51fba0c Mon Sep 17 00:00:00 2001 1From a9aebca531f52818fe77b9b21f0cad425da78e43 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 23/34] policy/module/terminals: don't audit tty_device_t in 4Subject: [PATCH] policy/modules/kernel/terminal: don't audit tty_device_t in
5 term_dontaudit_use_console. 5 term_dontaudit_use_console
6 6
7We should also not audit terminal to rw tty_device_t and fds in 7We should also not audit terminal to rw tty_device_t and fds in
8term_dontaudit_use_console. 8term_dontaudit_use_console.
9 9
10Upstream-Status: Inappropriate [only for Poky] 10Upstream-Status: Inappropriate [embedded specific]
11 11
12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
14--- 15---
15 policy/modules/kernel/terminal.if | 3 +++ 16 policy/modules/kernel/terminal.if | 3 +++
16 1 file changed, 3 insertions(+) 17 1 file changed, 3 insertions(+)
17 18
18diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if 19diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
19index a84787e6..cf66da2f 100644 20index f70e51525..8f9578dbc 100644
20--- a/policy/modules/kernel/terminal.if 21--- a/policy/modules/kernel/terminal.if
21+++ b/policy/modules/kernel/terminal.if 22+++ b/policy/modules/kernel/terminal.if
22@@ -335,9 +335,12 @@ interface(`term_use_console',` 23@@ -335,9 +335,12 @@ interface(`term_use_console',`
@@ -33,5 +34,5 @@ index a84787e6..cf66da2f 100644
33 34
34 ######################################## 35 ########################################
35-- 36--
362.19.1 372.17.1
37 38
diff --git a/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch b/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch
new file mode 100644
index 0000000..52887e5
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch
@@ -0,0 +1,34 @@
1From 4316f85adb1ab6e0278fb8e8ff68b358f36a933e Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 08:19:16 +0800
4Subject: [PATCH] policy/modules/services/avahi: allow avahi_t to watch /etc
5 directory
6
7Fixes:
8type=AVC msg=audit(1592813140.176:24): avc: denied { watch } for
9pid=360 comm="avahi-daemon" path="/services" dev="vda" ino=173
10scontext=system_u:system_r:avahi_t tcontext=system_u:object_r:etc_t
11tclass=dir permissive=1
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/services/avahi.te | 1 +
18 1 file changed, 1 insertion(+)
19
20diff --git a/policy/modules/services/avahi.te b/policy/modules/services/avahi.te
21index f77e5546d..5643349e3 100644
22--- a/policy/modules/services/avahi.te
23+++ b/policy/modules/services/avahi.te
24@@ -76,6 +76,7 @@ domain_use_interactive_fds(avahi_t)
25
26 files_read_etc_runtime_files(avahi_t)
27 files_read_usr_files(avahi_t)
28+files_watch_etc_dirs(avahi_t)
29
30 auth_use_nsswitch(avahi_t)
31
32--
332.17.1
34
diff --git a/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-getty-allow-getty_t-watch-gett.patch b/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-getty-allow-getty_t-watch-gett.patch
new file mode 100644
index 0000000..3be2cdc
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-getty-allow-getty_t-watch-gett.patch
@@ -0,0 +1,42 @@
1From 383a70a87049ef5065bba4c2c4d4bc3cff914358 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 08:39:44 +0800
4Subject: [PATCH] policy/modules/system/getty: allow getty_t watch
5 getty_runtime_t file
6
7Fixes:
8type=AVC msg=audit(1592813140.280:26): avc: denied { watch } for
9pid=385 comm="getty" path="/run/agetty.reload" dev="tmpfs" ino=12247
10scontext=system_u:system_r:getty_t
11tcontext=system_u:object_r:getty_runtime_t tclass=file permissive=1
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/system/getty.te | 2 ++
18 1 file changed, 2 insertions(+)
19
20diff --git a/policy/modules/system/getty.te b/policy/modules/system/getty.te
21index f5316c30a..39e27e5f1 100644
22--- a/policy/modules/system/getty.te
23+++ b/policy/modules/system/getty.te
24@@ -47,6 +47,7 @@ allow getty_t getty_log_t:file { append_file_perms create_file_perms setattr_fil
25 logging_log_filetrans(getty_t, getty_log_t, file)
26
27 allow getty_t getty_runtime_t:dir watch;
28+allow getty_t getty_runtime_t:file watch;
29 manage_files_pattern(getty_t, getty_runtime_t, getty_runtime_t)
30 files_runtime_filetrans(getty_t, getty_runtime_t, file)
31
32@@ -65,6 +66,7 @@ dev_read_sysfs(getty_t)
33 files_read_etc_runtime_files(getty_t)
34 files_read_etc_files(getty_t)
35 files_search_spool(getty_t)
36+fs_search_tmpfs(getty_t)
37
38 fs_search_auto_mountpoints(getty_t)
39 # for error condition handling
40--
412.17.1
42
diff --git a/recipes-security/refpolicy/refpolicy/0039-policy-modules-services-bluetooth-allow-bluetooth_t-.patch b/recipes-security/refpolicy/refpolicy/0039-policy-modules-services-bluetooth-allow-bluetooth_t-.patch
new file mode 100644
index 0000000..39e72e8
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0039-policy-modules-services-bluetooth-allow-bluetooth_t-.patch
@@ -0,0 +1,65 @@
1From dfc3e78dfee0709bcbfc2d1959e5b7c27922b1b7 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 08:54:20 +0800
4Subject: [PATCH] policy/modules/services/bluetooth: allow bluetooth_t to
5 create and use bluetooth_socket
6
7Fixes:
8type=AVC msg=audit(1592813138.485:17): avc: denied { create } for
9pid=324 comm="bluetoothd" scontext=system_u:system_r:bluetooth_t
10tcontext=system_u:system_r:bluetooth_t tclass=bluetooth_socket
11permissive=1
12type=AVC msg=audit(1592813138.485:18): avc: denied { bind } for
13pid=324 comm="bluetoothd" scontext=system_u:system_r:bluetooth_t
14tcontext=system_u:system_r:bluetooth_t tclass=bluetooth_socket
15permissive=1
16type=AVC msg=audit(1592813138.485:19): avc: denied { write } for
17pid=324 comm="bluetoothd" scontext=system_u:system_r:bluetooth_t
18tcontext=system_u:system_r:bluetooth_t tclass=bluetooth_socket
19permissive=1
20type=AVC msg=audit(1592813138.488:20): avc: denied { getattr } for
21pid=324 comm="bluetoothd" path="socket:[11771]" dev="sockfs" ino=11771
22scontext=system_u:system_r:bluetooth_t
23tcontext=system_u:system_r:bluetooth_t tclass=bluetooth_socket
24permissive=1
25type=AVC msg=audit(1592813138.488:21): avc: denied { listen } for
26pid=324 comm="bluetoothd" scontext=system_u:system_r:bluetooth_t
27tcontext=system_u:system_r:bluetooth_t tclass=bluetooth_socket
28permissive=1
29type=AVC msg=audit(1592813138.498:22): avc: denied { read } for
30pid=324 comm="bluetoothd" path="socket:[11771]" dev="sockfs" ino=11771
31scontext=system_u:system_r:bluetooth_t
32tcontext=system_u:system_r:bluetooth_t tclass=bluetooth_socket
33permissive=1
34
35Upstream-Status: Inappropriate [embedded specific]
36
37Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
38---
39 policy/modules/services/bluetooth.te | 3 +++
40 1 file changed, 3 insertions(+)
41
42diff --git a/policy/modules/services/bluetooth.te b/policy/modules/services/bluetooth.te
43index 025eff444..63e50aeda 100644
44--- a/policy/modules/services/bluetooth.te
45+++ b/policy/modules/services/bluetooth.te
46@@ -60,6 +60,7 @@ allow bluetooth_t self:socket create_stream_socket_perms;
47 allow bluetooth_t self:unix_stream_socket { accept connectto listen };
48 allow bluetooth_t self:tcp_socket { accept listen };
49 allow bluetooth_t self:netlink_kobject_uevent_socket create_socket_perms;
50+allow bluetooth_t self:bluetooth_socket create_stream_socket_perms;
51
52 read_files_pattern(bluetooth_t, bluetooth_conf_t, bluetooth_conf_t)
53
54@@ -127,6 +128,8 @@ userdom_dontaudit_use_unpriv_user_fds(bluetooth_t)
55 userdom_dontaudit_use_user_terminals(bluetooth_t)
56 userdom_dontaudit_search_user_home_dirs(bluetooth_t)
57
58+init_dbus_send_script(bluetooth_t)
59+
60 optional_policy(`
61 dbus_system_bus_client(bluetooth_t)
62 dbus_connect_system_bus(bluetooth_t)
63--
642.17.1
65
diff --git a/recipes-security/refpolicy/refpolicy/0040-policy-modules-roles-sysadm-allow-sysadm-to-run-rpci.patch b/recipes-security/refpolicy/refpolicy/0040-policy-modules-roles-sysadm-allow-sysadm-to-run-rpci.patch
new file mode 100644
index 0000000..e5ad291
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0040-policy-modules-roles-sysadm-allow-sysadm-to-run-rpci.patch
@@ -0,0 +1,38 @@
1From 354389c93e26bb8d8e8c1c126b01d838a6a214c8 Mon Sep 17 00:00:00 2001
2From: Roy Li <rongqing.li@windriver.com>
3Date: Sat, 15 Feb 2014 09:45:00 +0800
4Subject: [PATCH] policy/modules/roles/sysadm: allow sysadm to run rpcinfo
5
6Fixes:
7$ rpcinfo
8rpcinfo: can't contact rpcbind: RPC: Remote system error - Permission denied
9
10avc: denied { connectto } for pid=406 comm="rpcinfo"
11path="/run/rpcbind.sock" scontext=root:sysadm_r:sysadm_t
12tcontext=system_u:system_r:rpcbind_t tclass=unix_stream_socket
13permissive=0
14
15Upstream-Status: Inappropriate [embedded specific]
16
17Signed-off-by: Roy Li <rongqing.li@windriver.com>
18Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
19Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
20---
21 policy/modules/roles/sysadm.te | 1 +
22 1 file changed, 1 insertion(+)
23
24diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
25index f0370b426..fc0945fe4 100644
26--- a/policy/modules/roles/sysadm.te
27+++ b/policy/modules/roles/sysadm.te
28@@ -962,6 +962,7 @@ optional_policy(`
29 ')
30
31 optional_policy(`
32+ rpcbind_stream_connect(sysadm_t)
33 rpcbind_admin(sysadm_t, sysadm_r)
34 ')
35
36--
372.17.1
38
diff --git a/recipes-security/refpolicy/refpolicy/0041-policy-modules-services-rpc-add-capability-dac_read_.patch b/recipes-security/refpolicy/refpolicy/0041-policy-modules-services-rpc-add-capability-dac_read_.patch
new file mode 100644
index 0000000..074647d
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0041-policy-modules-services-rpc-add-capability-dac_read_.patch
@@ -0,0 +1,34 @@
1From fbc8f3140bf6b519bad568fc1d840c9043fc13db Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 14 May 2019 15:22:08 +0800
4Subject: [PATCH] policy/modules/services/rpc: add capability dac_read_search
5 for rpcd_t
6
7Fixes:
8type=AVC msg=audit(1558592079.931:494): avc: denied { dac_read_search }
9for pid=585 comm="sm-notify" capability=2 scontext=system_u:system_r:rpcd_t
10tcontext=system_u:system_r:rpcd_t tclass=capability permissive=0
11
12Upstream-Status: Inappropriate [embedded specific]
13
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/services/rpc.te | 2 +-
17 1 file changed, 1 insertion(+), 1 deletion(-)
18
19diff --git a/policy/modules/services/rpc.te b/policy/modules/services/rpc.te
20index 020dbc4ad..c06ff803f 100644
21--- a/policy/modules/services/rpc.te
22+++ b/policy/modules/services/rpc.te
23@@ -142,7 +142,7 @@ optional_policy(`
24 # Local policy
25 #
26
27-allow rpcd_t self:capability { chown dac_override setgid setpcap setuid sys_admin };
28+allow rpcd_t self:capability { chown dac_override dac_read_search setgid setpcap setuid sys_admin };
29 allow rpcd_t self:capability2 block_suspend;
30 allow rpcd_t self:process { getcap setcap };
31 allow rpcd_t self:fifo_file rw_fifo_file_perms;
32--
332.17.1
34
diff --git a/recipes-security/refpolicy/refpolicy/0042-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch b/recipes-security/refpolicy/refpolicy/0042-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch
new file mode 100644
index 0000000..7ef81fe
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0042-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch
@@ -0,0 +1,45 @@
1From dfe79338ee9915527afd9e0943ed84e0347c4d66 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Wed, 1 Jul 2020 08:44:07 +0800
4Subject: [PATCH] policy/modules/services/rpcbind: allow rpcbind_t to create
5 directory with label rpcbind_runtime_t
6
7Fixes:
8avc: denied { create } for pid=136 comm="rpcbind" name="rpcbind"
9scontext=system_u:system_r:rpcbind_t:s0-s15:c0.c1023
10tcontext=system_u:object_r:var_run_t:s0 tclass=dir permissive=0
11
12Upstream-Status: Inappropriate [embedded specific]
13
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/services/rpcbind.te | 5 +++--
17 1 file changed, 3 insertions(+), 2 deletions(-)
18
19diff --git a/policy/modules/services/rpcbind.te b/policy/modules/services/rpcbind.te
20index 69ed49d8b..4f110773a 100644
21--- a/policy/modules/services/rpcbind.te
22+++ b/policy/modules/services/rpcbind.te
23@@ -25,16 +25,17 @@ files_type(rpcbind_var_lib_t)
24 # Local policy
25 #
26
27-allow rpcbind_t self:capability { dac_override setgid setuid sys_tty_config };
28+allow rpcbind_t self:capability { dac_override setgid setuid sys_tty_config chown };
29 # net_admin is for SO_SNDBUFFORCE
30 dontaudit rpcbind_t self:capability net_admin;
31 allow rpcbind_t self:fifo_file rw_fifo_file_perms;
32 allow rpcbind_t self:unix_stream_socket { accept listen };
33 allow rpcbind_t self:tcp_socket { accept listen };
34
35+manage_dirs_pattern(rpcbind_t, rpcbind_runtime_t, rpcbind_runtime_t)
36 manage_files_pattern(rpcbind_t, rpcbind_runtime_t, rpcbind_runtime_t)
37 manage_sock_files_pattern(rpcbind_t, rpcbind_runtime_t, rpcbind_runtime_t)
38-files_runtime_filetrans(rpcbind_t, rpcbind_runtime_t, { file sock_file })
39+files_runtime_filetrans(rpcbind_t, rpcbind_runtime_t, { file sock_file dir })
40
41 manage_dirs_pattern(rpcbind_t, rpcbind_var_lib_t, rpcbind_var_lib_t)
42 manage_files_pattern(rpcbind_t, rpcbind_var_lib_t, rpcbind_var_lib_t)
43--
442.17.1
45
diff --git a/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rngd-fix-security-context-fo.patch b/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rngd-fix-security-context-fo.patch
new file mode 100644
index 0000000..491cf02
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rngd-fix-security-context-fo.patch
@@ -0,0 +1,64 @@
1From 617b8b558674a77cd2b1eff9155f276985456684 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Wed, 25 May 2016 03:16:24 -0400
4Subject: [PATCH] policy/modules/services/rngd: fix security context for
5 rng-tools
6
7* fix security context for /etc/init.d/rng-tools
8* allow rngd_t to search /run/systemd/journal
9
10Fixes:
11audit: type=1400 audit(1592874699.503:11): avc: denied { read } for
12pid=355 comm="rngd" name="cpu" dev="sysfs" ino=36
13scontext=system_u:system_r:rngd_t tcontext=system_u:object_r:sysfs_t
14tclass=dir permissive=1
15audit: type=1400 audit(1592874699.505:12): avc: denied { getsched }
16for pid=355 comm="rngd" scontext=system_u:system_r:rngd_t
17tcontext=system_u:system_r:rngd_t tclass=process permissive=1
18audit: type=1400 audit(1592874699.508:13): avc: denied { setsched }
19for pid=355 comm="rngd" scontext=system_u:system_r:rngd_t
20tcontext=system_u:system_r:rngd_t tclass=process permissive=1
21
22Upstream-Status: Inappropriate [embedded specific]
23
24Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
25Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
26---
27 policy/modules/services/rngd.fc | 1 +
28 policy/modules/services/rngd.te | 3 ++-
29 2 files changed, 3 insertions(+), 1 deletion(-)
30
31diff --git a/policy/modules/services/rngd.fc b/policy/modules/services/rngd.fc
32index 382c067f9..0ecc5acc4 100644
33--- a/policy/modules/services/rngd.fc
34+++ b/policy/modules/services/rngd.fc
35@@ -1,4 +1,5 @@
36 /etc/rc\.d/init\.d/rngd -- gen_context(system_u:object_r:rngd_initrc_exec_t,s0)
37+/etc/rc\.d/init\.d/rng-tools -- gen_context(system_u:object_r:rngd_initrc_exec_t,s0)
38
39 /usr/bin/rngd -- gen_context(system_u:object_r:rngd_exec_t,s0)
40
41diff --git a/policy/modules/services/rngd.te b/policy/modules/services/rngd.te
42index 839813216..c4ffafb5d 100644
43--- a/policy/modules/services/rngd.te
44+++ b/policy/modules/services/rngd.te
45@@ -21,7 +21,7 @@ files_runtime_file(rngd_runtime_t)
46 #
47
48 allow rngd_t self:capability { ipc_lock sys_admin };
49-allow rngd_t self:process signal;
50+allow rngd_t self:process { signal getsched setsched };
51 allow rngd_t self:fifo_file rw_fifo_file_perms;
52 allow rngd_t self:unix_stream_socket { accept listen };
53
54@@ -34,6 +34,7 @@ dev_read_rand(rngd_t)
55 dev_read_urand(rngd_t)
56 dev_rw_tpm(rngd_t)
57 dev_write_rand(rngd_t)
58+dev_read_sysfs(rngd_t)
59
60 files_read_etc_files(rngd_t)
61
62--
632.17.1
64
diff --git a/recipes-security/refpolicy/refpolicy/0044-policy-modules-system-authlogin-allow-chkpwd_t-to-ma.patch b/recipes-security/refpolicy/refpolicy/0044-policy-modules-system-authlogin-allow-chkpwd_t-to-ma.patch
new file mode 100644
index 0000000..f929df2
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0044-policy-modules-system-authlogin-allow-chkpwd_t-to-ma.patch
@@ -0,0 +1,34 @@
1From 0e3199f243a47853452a877ebad5360bc8c1f2f1 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 21 Nov 2019 13:58:28 +0800
4Subject: [PATCH] policy/modules/system/authlogin: allow chkpwd_t to map
5 shadow_t
6
7Fixes:
8avc: denied { map } for pid=244 comm="unix_chkpwd" path="/etc/shadow"
9dev="vda" ino=443 scontext=system_u:system_r:chkpwd_t
10tcontext=system_u:object_r:shadow_t tclass=file permissive=0
11
12Upstream-Status: Inappropriate [embedded specific]
13
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/system/authlogin.te | 2 +-
17 1 file changed, 1 insertion(+), 1 deletion(-)
18
19diff --git a/policy/modules/system/authlogin.te b/policy/modules/system/authlogin.te
20index 0fc5951e9..e999fa798 100644
21--- a/policy/modules/system/authlogin.te
22+++ b/policy/modules/system/authlogin.te
23@@ -100,7 +100,7 @@ allow chkpwd_t self:capability { dac_override setuid };
24 dontaudit chkpwd_t self:capability sys_tty_config;
25 allow chkpwd_t self:process { getattr signal };
26
27-allow chkpwd_t shadow_t:file read_file_perms;
28+allow chkpwd_t shadow_t:file { read_file_perms map };
29 files_list_etc(chkpwd_t)
30
31 kernel_read_crypto_sysctls(chkpwd_t)
32--
332.17.1
34
diff --git a/recipes-security/refpolicy/refpolicy/0045-policy-modules-system-udev-allow-udevadm_t-to-search.patch b/recipes-security/refpolicy/refpolicy/0045-policy-modules-system-udev-allow-udevadm_t-to-search.patch
new file mode 100644
index 0000000..03d9552
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0045-policy-modules-system-udev-allow-udevadm_t-to-search.patch
@@ -0,0 +1,34 @@
1From bd03c34ab3c193d6c21a6c0b951e89dd4e24eee6 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Fri, 19 Jun 2020 15:21:26 +0800
4Subject: [PATCH] policy/modules/system/udev: allow udevadm_t to search bin dir
5
6Fixes:
7audit: type=1400 audit(1592894099.930:6): avc: denied { search } for
8pid=153 comm="udevadm" name="bin" dev="vda" ino=13
9scontext=system_u:system_r:udevadm_t tcontext=system_u:object_r:bin_t
10tclass=dir permissive=0
11
12Upstream-Status: Inappropriate [embedded specific]
13
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/system/udev.te | 2 ++
17 1 file changed, 2 insertions(+)
18
19diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
20index 52da11acd..3a4d7362c 100644
21--- a/policy/modules/system/udev.te
22+++ b/policy/modules/system/udev.te
23@@ -415,6 +415,8 @@ dev_read_urand(udevadm_t)
24 files_read_etc_files(udevadm_t)
25 files_read_usr_files(udevadm_t)
26
27+corecmd_search_bin(udevadm_t)
28+
29 init_list_runtime(udevadm_t)
30 init_read_state(udevadm_t)
31
32--
332.17.1
34
diff --git a/recipes-security/refpolicy/refpolicy/0046-policy-modules-udev-do-not-audit-udevadm_t-to-read-w.patch b/recipes-security/refpolicy/refpolicy/0046-policy-modules-udev-do-not-audit-udevadm_t-to-read-w.patch
new file mode 100644
index 0000000..9397287
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0046-policy-modules-udev-do-not-audit-udevadm_t-to-read-w.patch
@@ -0,0 +1,37 @@
1From 8b5eb5b2e01a7686c43ba7b53cc76f465f9e8f56 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 30 Jun 2020 09:27:45 +0800
4Subject: [PATCH] policy/modules/udev: do not audit udevadm_t to read/write
5 /dev/console
6
7Fixes:
8avc: denied { read write } for pid=162 comm="udevadm"
9path="/dev/console" dev="devtmpfs" ino=10034
10scontext=system_u:system_r:udevadm_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:console_device_t:s0 tclass=chr_file
12permissive=0
13avc: denied { use } for pid=162 comm="udevadm" path="/dev/console"
14dev="devtmpfs" ino=10034
15scontext=system_u:system_r:udevadm_t:s0-s15:c0.c1023
16tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 tclass=fd permissive=0
17
18Upstream-Status: Inappropriate [embedded specific]
19
20Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
21---
22 policy/modules/system/udev.te | 2 ++
23 1 file changed, 2 insertions(+)
24
25diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te
26index 3a4d7362c..e483d63d3 100644
27--- a/policy/modules/system/udev.te
28+++ b/policy/modules/system/udev.te
29@@ -425,3 +425,5 @@ kernel_read_system_state(udevadm_t)
30
31 seutil_read_file_contexts(udevadm_t)
32
33+init_dontaudit_use_fds(udevadm_t)
34+term_dontaudit_use_console(udevadm_t)
35--
362.17.1
37
diff --git a/recipes-security/refpolicy/refpolicy/0047-policy-modules-services-rdisc-allow-rdisc_t-to-searc.patch b/recipes-security/refpolicy/refpolicy/0047-policy-modules-services-rdisc-allow-rdisc_t-to-searc.patch
new file mode 100644
index 0000000..bfb50cc
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0047-policy-modules-services-rdisc-allow-rdisc_t-to-searc.patch
@@ -0,0 +1,34 @@
1From 6bcf62e310931e8be943520a7e1a5686f54a8e34 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 15:44:43 +0800
4Subject: [PATCH] policy/modules/services/rdisc: allow rdisc_t to search sbin
5 dir
6
7Fixes:
8avc: denied { search } for pid=225 comm="rdisc" name="sbin" dev="vda"
9ino=1478 scontext=system_u:system_r:rdisc_t
10tcontext=system_u:object_r:bin_t tclass=dir permissive=0
11
12Upstream-Status: Inappropriate [embedded specific]
13
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/services/rdisc.te | 2 ++
17 1 file changed, 2 insertions(+)
18
19diff --git a/policy/modules/services/rdisc.te b/policy/modules/services/rdisc.te
20index 82d54dbb7..1dd458f8e 100644
21--- a/policy/modules/services/rdisc.te
22+++ b/policy/modules/services/rdisc.te
23@@ -47,6 +47,8 @@ sysnet_read_config(rdisc_t)
24
25 userdom_dontaudit_use_unpriv_user_fds(rdisc_t)
26
27+corecmd_search_bin(rdisc_t)
28+
29 optional_policy(`
30 seutil_sigchld_newrole(rdisc_t)
31 ')
32--
332.17.1
34
diff --git a/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-logging-fix-auditd-startup-fai.patch b/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-logging-fix-auditd-startup-fai.patch
new file mode 100644
index 0000000..cb5b88d
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-logging-fix-auditd-startup-fai.patch
@@ -0,0 +1,52 @@
1From b585008cec90386903e7613a4a22286c0a94be8c Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Tue, 24 Jan 2017 08:45:35 +0000
4Subject: [PATCH] policy/modules/system/logging: fix auditd startup failures
5
6Fixes:
7 avc: denied { getcap } for pid=849 comm="auditctl" \
8 scontext=system_u:system_r:auditctl_t:s0-s15:c0.c1023 \
9 tcontext=system_u:system_r:auditctl_t:s0-s15:c0.c1023 \
10 tclass=process
11
12 avc: denied { setattr } for pid=848 comm="auditd" \
13 name="audit" dev="tmpfs" ino=9569 \
14 scontext=system_u:system_r:auditd_t:s15:c0.c1023 \
15 tcontext=system_u:object_r:auditd_log_t:s15:c0.c1023 \
16 tclass=dir
17
18 avc: denied { search } for pid=731 comm="auditd" \
19 name="/" dev="tmpfs" ino=9399 \
20 scontext=system_u:system_r:auditd_t:s15:c0.c1023 \
21 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir
22
23Upstream-Status: Inappropriate [embedded specific]
24
25Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
26---
27 policy/modules/system/logging.te | 2 ++
28 1 file changed, 2 insertions(+)
29
30diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
31index 2d9f65d2d..95309f334 100644
32--- a/policy/modules/system/logging.te
33+++ b/policy/modules/system/logging.te
34@@ -157,6 +157,7 @@ allow auditd_t auditd_etc_t:dir list_dir_perms;
35 allow auditd_t auditd_etc_t:file read_file_perms;
36 dontaudit auditd_t auditd_etc_t:file map;
37
38+manage_dirs_pattern(auditd_t, auditd_log_t, auditd_log_t)
39 manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
40 allow auditd_t auditd_log_t:dir setattr;
41 manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
42@@ -177,6 +178,7 @@ dev_read_sysfs(auditd_t)
43 fs_getattr_all_fs(auditd_t)
44 fs_search_auto_mountpoints(auditd_t)
45 fs_rw_anon_inodefs_files(auditd_t)
46+fs_search_tmpfs(auditd_t)
47
48 selinux_search_fs(auditctl_t)
49
50--
512.17.1
52
diff --git a/recipes-security/refpolicy/refpolicy/0049-policy-modules-services-ssh-make-respective-init-scr.patch b/recipes-security/refpolicy/refpolicy/0049-policy-modules-services-ssh-make-respective-init-scr.patch
new file mode 100644
index 0000000..86df765
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0049-policy-modules-services-ssh-make-respective-init-scr.patch
@@ -0,0 +1,33 @@
1From 878f3eb8e0716764ea4d42b996f58ea9072204fc Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Sun, 28 Jun 2020 16:14:45 +0800
4Subject: [PATCH] policy/modules/services/ssh: make respective init scripts
5 create pid dirs with proper contexts
6
7Fix sshd starup failure.
8
9Upstream-Status: Inappropriate [embedded specific]
10
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12---
13 policy/modules/services/ssh.te | 4 +---
14 1 file changed, 1 insertion(+), 3 deletions(-)
15
16diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te
17index fefca0c20..db62eaa18 100644
18--- a/policy/modules/services/ssh.te
19+++ b/policy/modules/services/ssh.te
20@@ -80,9 +80,7 @@ userdom_user_home_content(ssh_home_t)
21 type sshd_keytab_t;
22 files_type(sshd_keytab_t)
23
24-ifdef(`distro_debian',`
25- init_daemon_runtime_file(sshd_runtime_t, dir, "sshd")
26-')
27+init_daemon_runtime_file(sshd_runtime_t, dir, "sshd")
28
29 ##############################
30 #
31--
322.17.1
33
diff --git a/recipes-security/refpolicy/refpolicy/0050-policy-modules-kernel-terminal-allow-loging-to-reset.patch b/recipes-security/refpolicy/refpolicy/0050-policy-modules-kernel-terminal-allow-loging-to-reset.patch
new file mode 100644
index 0000000..e15e57b
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0050-policy-modules-kernel-terminal-allow-loging-to-reset.patch
@@ -0,0 +1,31 @@
1From fb900b71d7e1fa5c3bd997e6deadcaae2b65b05a Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 29 Jun 2020 14:27:02 +0800
4Subject: [PATCH] policy/modules/kernel/terminal: allow loging to reset tty
5 perms
6
7Upstream-Status: Inappropriate [embedded specific]
8
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10---
11 policy/modules/kernel/terminal.if | 4 +---
12 1 file changed, 1 insertion(+), 3 deletions(-)
13
14diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
15index 8f9578dbc..3821ab9b0 100644
16--- a/policy/modules/kernel/terminal.if
17+++ b/policy/modules/kernel/terminal.if
18@@ -119,9 +119,7 @@ interface(`term_user_tty',`
19
20 # Debian login is from shadow utils and does not allow resetting the perms.
21 # have to fix this!
22- ifdef(`distro_debian',`
23- type_change $1 ttynode:chr_file $2;
24- ')
25+ type_change $1 ttynode:chr_file $2;
26
27 tunable_policy(`console_login',`
28 # When user logs in from /dev/console, relabel it
29--
302.17.1
31
diff --git a/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-selinuxutil-allow-semanage_t-t.patch b/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-selinuxutil-allow-semanage_t-t.patch
new file mode 100644
index 0000000..d4f996d
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-selinuxutil-allow-semanage_t-t.patch
@@ -0,0 +1,33 @@
1From 2c8464254adf0b2635e5abf4ccc4473c96fa0006 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 29 Jun 2020 14:30:58 +0800
4Subject: [PATCH] policy/modules/system/selinuxutil: allow semanage_t to read
5 /var/lib
6
7Upstream-Status: Inappropriate [embedded specific]
8
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10---
11 policy/modules/system/selinuxutil.te | 6 ++----
12 1 file changed, 2 insertions(+), 4 deletions(-)
13
14diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
15index fad28f179..09fef149b 100644
16--- a/policy/modules/system/selinuxutil.te
17+++ b/policy/modules/system/selinuxutil.te
18@@ -544,10 +544,8 @@ userdom_map_user_home_content_files(semanage_t)
19 userdom_read_user_tmp_files(semanage_t)
20 userdom_map_user_tmp_files(semanage_t)
21
22-ifdef(`distro_debian',`
23- files_read_var_lib_files(semanage_t)
24- files_read_var_lib_symlinks(semanage_t)
25-')
26+files_read_var_lib_files(semanage_t)
27+files_read_var_lib_symlinks(semanage_t)
28
29 ifdef(`distro_ubuntu',`
30 optional_policy(`
31--
322.17.1
33
diff --git a/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-sysnetwork-allow-ifconfig_t-to.patch b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-sysnetwork-allow-ifconfig_t-to.patch
new file mode 100644
index 0000000..5e606d7
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-sysnetwork-allow-ifconfig_t-to.patch
@@ -0,0 +1,35 @@
1From a3e4135c543be8d3a054e6f74629240370d111ed Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 27 May 2019 15:55:19 +0800
4Subject: [PATCH] policy/modules/system/sysnetwork: allow ifconfig_t to read
5 dhcp client state files
6
7Fixes:
8type=AVC msg=audit(1558942740.789:50): avc: denied { read } for
9pid=221 comm="ip" path="/var/lib/dhcp/dhclient.leases" dev="vda"
10ino=29858 scontext=system_u:system_r:ifconfig_t
11tcontext=system_u:object_r:dhcpc_state_t tclass=file permissive=1
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/system/sysnetwork.te | 2 ++
18 1 file changed, 2 insertions(+)
19
20diff --git a/policy/modules/system/sysnetwork.te b/policy/modules/system/sysnetwork.te
21index bbdbcdc7e..a77738924 100644
22--- a/policy/modules/system/sysnetwork.te
23+++ b/policy/modules/system/sysnetwork.te
24@@ -319,6 +319,8 @@ kernel_request_load_module(ifconfig_t)
25 kernel_search_network_sysctl(ifconfig_t)
26 kernel_rw_net_sysctls(ifconfig_t)
27
28+sysnet_read_dhcpc_state(ifconfig_t)
29+
30 corenet_rw_tun_tap_dev(ifconfig_t)
31
32 dev_read_sysfs(ifconfig_t)
33--
342.17.1
35
diff --git a/recipes-security/refpolicy/refpolicy/0053-policy-modules-services-ntp-allow-ntpd_t-to-watch-sy.patch b/recipes-security/refpolicy/refpolicy/0053-policy-modules-services-ntp-allow-ntpd_t-to-watch-sy.patch
new file mode 100644
index 0000000..85a6d63
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0053-policy-modules-services-ntp-allow-ntpd_t-to-watch-sy.patch
@@ -0,0 +1,55 @@
1From f23bb02c92bcbf7afa0c6b445719df6b06df15ea Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 6 Jul 2020 09:06:08 +0800
4Subject: [PATCH] policy/modules/services/ntp: allow ntpd_t to watch system bus
5 runtime directories and named sockets
6
7Fixes:
8avc: denied { read } for pid=197 comm="systemd-timesyn" name="dbus"
9dev="tmpfs" ino=14064 scontext=system_u:system_r:ntpd_t:s0-s15:c0.c1023
10tcontext=system_u:object_r:system_dbusd_runtime_t:s0 tclass=dir
11permissive=0
12
13avc: denied { watch } for pid=197 comm="systemd-timesyn"
14path="/run/dbus" dev="tmpfs" ino=14064
15scontext=system_u:system_r:ntpd_t:s0-s15:c0.c1023
16tcontext=system_u:object_r:system_dbusd_runtime_t:s0 tclass=dir
17permissive=0
18
19avc: denied { read } for pid=197 comm="systemd-timesyn"
20name="system_bus_socket" dev="tmpfs" ino=14067
21scontext=system_u:system_r:ntpd_t:s0-s15:c0.c1023
22tcontext=system_u:object_r:system_dbusd_runtime_t:s0 tclass=sock_file
23permissive=0
24
25avc: denied { watch } for pid=197 comm="systemd-timesyn"
26path="/run/dbus/system_bus_socket" dev="tmpfs" ino=14067
27scontext=system_u:system_r:ntpd_t:s0-s15:c0.c1023
28tcontext=system_u:object_r:system_dbusd_runtime_t:s0 tclass=sock_file
29permissive=0
30
31Upstream-Status: Inappropriate [embedded specific]
32
33Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
34---
35 policy/modules/services/ntp.te | 4 ++++
36 1 file changed, 4 insertions(+)
37
38diff --git a/policy/modules/services/ntp.te b/policy/modules/services/ntp.te
39index 81f8c76bb..75603e16b 100644
40--- a/policy/modules/services/ntp.te
41+++ b/policy/modules/services/ntp.te
42@@ -141,6 +141,10 @@ userdom_list_user_home_dirs(ntpd_t)
43 ifdef(`init_systemd',`
44 allow ntpd_t ntpd_unit_t:file read_file_perms;
45
46+ dbus_watch_system_bus_runtime_dirs(ntpd_t)
47+ allow ntpd_t system_dbusd_runtime_t:dir read;
48+ dbus_watch_system_bus_runtime_named_sockets(ntpd_t)
49+ allow ntpd_t system_dbusd_runtime_t:sock_file read;
50 dbus_system_bus_client(ntpd_t)
51 dbus_connect_system_bus(ntpd_t)
52 init_dbus_chat(ntpd_t)
53--
542.17.1
55
diff --git a/recipes-security/refpolicy/refpolicy/0054-policy-modules-system-systemd-enable-support-for-sys.patch b/recipes-security/refpolicy/refpolicy/0054-policy-modules-system-systemd-enable-support-for-sys.patch
new file mode 100644
index 0000000..9dde899
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0054-policy-modules-system-systemd-enable-support-for-sys.patch
@@ -0,0 +1,64 @@
1From 9eee952a306000eaa5e92b578f3caa35b6a35699 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Thu, 4 Feb 2016 06:03:19 -0500
4Subject: [PATCH] policy/modules/system/systemd: enable support for
5 systemd-tmpfiles to manage all non-security files
6
7Fixes:
8systemd-tmpfiles[137]: Failed to create directory or subvolume "/var/volatile/log": Permission denied
9systemd-tmpfiles[137]: Failed to create directory or subvolume "/var/volatile/tmp": Permission denied
10systemd-tmpfiles[137]: Failed to create directory or subvolume "/var/log/audit": Permission denied
11
12avc: denied { write } for pid=137 comm="systemd-tmpfile" name="/"
13dev="tmpfs" ino=12400 scontext=system_u:system_r:systemd_tmpfiles_t
14tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0
15
16avc: denied { read } for pid=137 comm="systemd-tmpfile" name="dbus"
17dev="vda" ino=12363 scontext=system_u:system_r:systemd_tmpfiles_t
18tcontext=system_u:object_r:system_dbusd_var_lib_t tclass=dir
19permissive=0
20
21avc: denied { relabelfrom } for pid=137 comm="systemd-tmpfile"
22name="log" dev="vda" ino=14129
23scontext=system_u:system_r:systemd_tmpfiles_t
24tcontext=system_u:object_r:var_log_t tclass=lnk_file permissive=0
25
26avc: denied { create } for pid=137 comm="systemd-tmpfile"
27name="audit" scontext=system_u:system_r:systemd_tmpfiles_t
28tcontext=system_u:object_r:auditd_log_t tclass=dir permissive=0
29
30Upstream-Status: Inappropriate [embedded specific]
31
32Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
33Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
34---
35 policy/modules/system/systemd.te | 6 +++++-
36 1 file changed, 5 insertions(+), 1 deletion(-)
37
38diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
39index 136990d08..c7fe51b62 100644
40--- a/policy/modules/system/systemd.te
41+++ b/policy/modules/system/systemd.te
42@@ -10,7 +10,7 @@ policy_module(systemd, 1.9.14)
43 ## Enable support for systemd-tmpfiles to manage all non-security files.
44 ## </p>
45 ## </desc>
46-gen_tunable(systemd_tmpfiles_manage_all, false)
47+gen_tunable(systemd_tmpfiles_manage_all, true)
48
49 ## <desc>
50 ## <p>
51@@ -1196,6 +1196,10 @@ files_relabel_var_lib_dirs(systemd_tmpfiles_t)
52 files_relabelfrom_home(systemd_tmpfiles_t)
53 files_relabelto_home(systemd_tmpfiles_t)
54 files_relabelto_etc_dirs(systemd_tmpfiles_t)
55+
56+files_manage_non_auth_files(systemd_tmpfiles_t)
57+files_relabel_non_auth_files(systemd_tmpfiles_t)
58+
59 # for /etc/mtab
60 files_manage_etc_symlinks(systemd_tmpfiles_t)
61
62--
632.17.1
64
diff --git a/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-logging-fix-systemd-journald-s.patch b/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-logging-fix-systemd-journald-s.patch
new file mode 100644
index 0000000..7291d2e
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-logging-fix-systemd-journald-s.patch
@@ -0,0 +1,74 @@
1From e10a4ea43bb756bdecc30a3c14f0d2fe980405bd Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Thu, 4 Feb 2016 02:10:15 -0500
4Subject: [PATCH] policy/modules/system/logging: fix systemd-journald startup
5 failures
6
7Fixes:
8avc: denied { search } for pid=233 comm="systemd-journal" name="/"
9dev="tmpfs" ino=12398 scontext=system_u:system_r:syslogd_t
10tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0
11
12avc: denied { nlmsg_write } for pid=110 comm="systemd-journal"
13scontext=system_u:system_r:syslogd_t
14tcontext=system_u:system_r:syslogd_t tclass=netlink_audit_socket
15permissive=0
16
17avc: denied { audit_control } for pid=109 comm="systemd-journal"
18capability=30 scontext=system_u:system_r:syslogd_t
19tcontext=system_u:system_r:syslogd_t tclass=capability permissive=0
20
21Upstream-Status: Inappropriate [embedded specific]
22
23Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
24Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
25---
26 policy/modules/system/logging.fc | 1 +
27 policy/modules/system/logging.te | 5 ++++-
28 2 files changed, 5 insertions(+), 1 deletion(-)
29
30diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc
31index a4ecd570a..dee26a9f4 100644
32--- a/policy/modules/system/logging.fc
33+++ b/policy/modules/system/logging.fc
34@@ -24,6 +24,7 @@
35 /usr/lib/systemd/system/auditd.* -- gen_context(system_u:object_r:auditd_unit_t,s0)
36 /usr/lib/systemd/system/[^/]*systemd-journal.* -- gen_context(system_u:object_r:syslogd_unit_t,s0)
37 /usr/lib/systemd/system/rsyslog.*\.service -- gen_context(system_u:object_r:syslogd_unit_t,s0)
38+/usr/lib/systemd/system/syslog.*\.service -- gen_context(system_u:object_r:syslogd_unit_t,s0)
39 /usr/lib/systemd/systemd-journald -- gen_context(system_u:object_r:syslogd_exec_t,s0)
40 /usr/lib/systemd/systemd-kmsg-syslogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
41
42diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
43index 95309f334..1d45a5fa9 100644
44--- a/policy/modules/system/logging.te
45+++ b/policy/modules/system/logging.te
46@@ -438,6 +438,7 @@ allow syslogd_t syslogd_runtime_t:sock_file { create setattr unlink };
47 allow syslogd_t syslogd_runtime_t:file map;
48 manage_files_pattern(syslogd_t, syslogd_runtime_t, syslogd_runtime_t)
49 files_runtime_filetrans(syslogd_t, syslogd_runtime_t, file)
50+fs_search_tmpfs(syslogd_t)
51
52 kernel_read_crypto_sysctls(syslogd_t)
53 kernel_read_system_state(syslogd_t)
54@@ -517,6 +518,8 @@ init_use_fds(syslogd_t)
55 # cjp: this doesnt make sense
56 logging_send_syslog_msg(syslogd_t)
57
58+logging_set_loginuid(syslogd_t)
59+
60 miscfiles_read_localization(syslogd_t)
61
62 seutil_read_config(syslogd_t)
63@@ -529,7 +532,7 @@ ifdef(`init_systemd',`
64 allow syslogd_t self:netlink_audit_socket connected_socket_perms;
65 allow syslogd_t self:capability2 audit_read;
66 allow syslogd_t self:capability { chown setgid setuid sys_ptrace };
67- allow syslogd_t self:netlink_audit_socket { getattr getopt read setopt write };
68+ allow syslogd_t self:netlink_audit_socket { getattr getopt read setopt write nlmsg_write };
69
70 # remove /run/log/journal when switching to permanent storage
71 allow syslogd_t var_log_t:dir rmdir;
72--
732.17.1
74
diff --git a/recipes-security/refpolicy/refpolicy/0056-policy-modules-roles-sysadm-allow-sysadm_t-to-watch-.patch b/recipes-security/refpolicy/refpolicy/0056-policy-modules-roles-sysadm-allow-sysadm_t-to-watch-.patch
new file mode 100644
index 0000000..7cf3763
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0056-policy-modules-roles-sysadm-allow-sysadm_t-to-watch-.patch
@@ -0,0 +1,36 @@
1From 7fd830d6b2c60dcf5b8ee0b2ff94436de63d5b8c Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Mon, 29 Jun 2020 10:32:25 +0800
4Subject: [PATCH] policy/modules/roles/sysadm: allow sysadm_t to watch runtime
5 dirs
6
7Fixes:
8Failed to add a watch for /run/systemd/ask-password: Permission denied
9
10Upstream-Status: Inappropriate [embedded specific]
11
12Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
13---
14 policy/modules/roles/sysadm.te | 6 ++++++
15 1 file changed, 6 insertions(+)
16
17diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
18index fc0945fe4..07b9faf30 100644
19--- a/policy/modules/roles/sysadm.te
20+++ b/policy/modules/roles/sysadm.te
21@@ -83,6 +83,12 @@ ifdef(`init_systemd',`
22 # Allow sysadm to resolve the username of dynamic users by calling
23 # LookupDynamicUserByUID on org.freedesktop.systemd1.
24 init_dbus_chat(sysadm_t)
25+
26+ fs_watch_cgroup_files(sysadm_t)
27+ files_watch_etc_symlinks(sysadm_t)
28+ mount_watch_runtime_dirs(sysadm_t)
29+ systemd_filetrans_passwd_runtime_dirs(sysadm_t)
30+ allow sysadm_t systemd_passwd_runtime_t:dir watch;
31 ')
32
33 tunable_policy(`allow_ptrace',`
34--
352.17.1
36
diff --git a/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch
new file mode 100644
index 0000000..b1a72d6
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-systemd-add-capability-mknod-f.patch
@@ -0,0 +1,35 @@
1From 4782b27839064438f103b77c31e5db75189025a8 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 18 Jun 2020 16:14:45 +0800
4Subject: [PATCH] policy/modules/system/systemd: add capability mknod for
5 systemd_user_runtime_dir_t
6
7Fixes:
8avc: denied { mknod } for pid=266 comm="systemd-user-ru" capability=27
9scontext=system_u:system_r:systemd_user_runtime_dir_t:s0-s15:c0.c1023
10tcontext=system_u:system_r:systemd_user_runtime_dir_t:s0-s15:c0.c1023
11tclass=capability permissive=0
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/system/systemd.te | 2 +-
18 1 file changed, 1 insertion(+), 1 deletion(-)
19
20diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
21index c7fe51b62..f82031a09 100644
22--- a/policy/modules/system/systemd.te
23+++ b/policy/modules/system/systemd.te
24@@ -1372,7 +1372,7 @@ seutil_libselinux_linked(systemd_user_session_type)
25 # systemd-user-runtime-dir local policy
26 #
27
28-allow systemd_user_runtime_dir_t self:capability { fowner chown sys_admin dac_read_search dac_override };
29+allow systemd_user_runtime_dir_t self:capability { fowner chown sys_admin dac_read_search dac_override mknod };
30 allow systemd_user_runtime_dir_t self:process setfscreate;
31
32 domain_obj_id_change_exemption(systemd_user_runtime_dir_t)
33--
342.17.1
35
diff --git a/recipes-security/refpolicy/refpolicy/0058-policy-modules-system-systemd-systemd-gpt-auto-gener.patch b/recipes-security/refpolicy/refpolicy/0058-policy-modules-system-systemd-systemd-gpt-auto-gener.patch
new file mode 100644
index 0000000..fc1684f
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0058-policy-modules-system-systemd-systemd-gpt-auto-gener.patch
@@ -0,0 +1,35 @@
1From 0607a935759fe3143f473d4a444f92e01aaa2a45 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 14:52:43 +0800
4Subject: [PATCH] policy/modules/system/systemd: systemd-gpt-auto-generator: do
5 not audit attempts to read or write unallocated ttys
6
7Fixes:
8avc: denied { read write } for pid=87 comm="systemd-getty-g"
9name="ttyS0" dev="devtmpfs" ino=10128
10scontext=system_u:system_r:systemd_generator_t
11tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=0
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
16---
17 policy/modules/system/systemd.te | 2 ++
18 1 file changed, 2 insertions(+)
19
20diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
21index f82031a09..fb8d4960f 100644
22--- a/policy/modules/system/systemd.te
23+++ b/policy/modules/system/systemd.te
24@@ -400,6 +400,8 @@ storage_raw_read_fixed_disk(systemd_generator_t)
25
26 systemd_log_parse_environment(systemd_generator_t)
27
28+term_dontaudit_use_unallocated_ttys(systemd_generator_t)
29+
30 optional_policy(`
31 fstools_exec(systemd_generator_t)
32 ')
33--
342.17.1
35
diff --git a/recipes-security/refpolicy/refpolicy/0059-policy-modules-services-rpc-fix-policy-for-nfsserver.patch b/recipes-security/refpolicy/refpolicy/0059-policy-modules-services-rpc-fix-policy-for-nfsserver.patch
new file mode 100644
index 0000000..d4bdd37
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0059-policy-modules-services-rpc-fix-policy-for-nfsserver.patch
@@ -0,0 +1,78 @@
1From fbf98576f32e33e55f3babeb9db255a459fad711 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Fri, 23 Aug 2013 12:01:53 +0800
4Subject: [PATCH] policy/modules/services/rpc: fix policy for nfsserver to
5 mount nfsd_fs_t
6
7Upstream-Status: Inappropriate [embedded specific]
8
9Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12---
13 policy/modules/kernel/kernel.te | 2 ++
14 policy/modules/services/rpc.fc | 2 ++
15 policy/modules/services/rpc.te | 2 ++
16 policy/modules/services/rpcbind.te | 6 ++++++
17 4 files changed, 12 insertions(+)
18
19diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
20index c8218bf8c..44c031a39 100644
21--- a/policy/modules/kernel/kernel.te
22+++ b/policy/modules/kernel/kernel.te
23@@ -356,6 +356,8 @@ mls_process_read_all_levels(kernel_t)
24 mls_process_write_all_levels(kernel_t)
25 mls_file_write_all_levels(kernel_t)
26 mls_file_read_all_levels(kernel_t)
27+mls_socket_write_all_levels(kernel_t)
28+mls_fd_use_all_levels(kernel_t)
29
30 ifdef(`distro_redhat',`
31 # Bugzilla 222337
32diff --git a/policy/modules/services/rpc.fc b/policy/modules/services/rpc.fc
33index 6d3c9b68b..75999a57c 100644
34--- a/policy/modules/services/rpc.fc
35+++ b/policy/modules/services/rpc.fc
36@@ -1,7 +1,9 @@
37 /etc/exports -- gen_context(system_u:object_r:exports_t,s0)
38
39 /etc/rc\.d/init\.d/nfs -- gen_context(system_u:object_r:nfsd_initrc_exec_t,s0)
40+/etc/rc\.d/init\.d/nfsserver -- gen_context(system_u:object_r:nfsd_initrc_exec_t,s0)
41 /etc/rc\.d/init\.d/nfslock -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0)
42+/etc/rc\.d/init\.d/nfscommon -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0)
43 /etc/rc\.d/init\.d/rpcidmapd -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0)
44
45 /usr/bin/rpc\..* -- gen_context(system_u:object_r:rpcd_exec_t,s0)
46diff --git a/policy/modules/services/rpc.te b/policy/modules/services/rpc.te
47index c06ff803f..7c0b37ddc 100644
48--- a/policy/modules/services/rpc.te
49+++ b/policy/modules/services/rpc.te
50@@ -250,6 +250,8 @@ storage_raw_read_removable_device(nfsd_t)
51
52 miscfiles_read_public_files(nfsd_t)
53
54+mls_file_read_to_clearance(nfsd_t)
55+
56 tunable_policy(`allow_nfsd_anon_write',`
57 miscfiles_manage_public_files(nfsd_t)
58 ')
59diff --git a/policy/modules/services/rpcbind.te b/policy/modules/services/rpcbind.te
60index 4f110773a..3cc85a8d5 100644
61--- a/policy/modules/services/rpcbind.te
62+++ b/policy/modules/services/rpcbind.te
63@@ -73,6 +73,12 @@ logging_send_syslog_msg(rpcbind_t)
64
65 miscfiles_read_localization(rpcbind_t)
66
67+# nfsd_t would not be allowed to send unix_stream_socket to rpcbind_t,
68+# because the are running in different level. So add rules to allow this.
69+mls_socket_read_all_levels(rpcbind_t)
70+mls_socket_write_all_levels(rpcbind_t)
71+mls_file_read_to_clearance(rpcbind_t)
72+
73 ifdef(`distro_debian',`
74 term_dontaudit_use_unallocated_ttys(rpcbind_t)
75 ')
76--
772.17.1
78
diff --git a/recipes-security/refpolicy/refpolicy/0060-policy-modules-services-rpc-make-rpcd_t-MLS-trusted-.patch b/recipes-security/refpolicy/refpolicy/0060-policy-modules-services-rpc-make-rpcd_t-MLS-trusted-.patch
new file mode 100644
index 0000000..8f68d66
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0060-policy-modules-services-rpc-make-rpcd_t-MLS-trusted-.patch
@@ -0,0 +1,36 @@
1From 1c71d74635c2b39a15c449e75eacae23b3d4f1b8 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 30 May 2019 08:30:06 +0800
4Subject: [PATCH] policy/modules/services/rpc: make rpcd_t MLS trusted for
5 reading from files up to its clearance
6
7Fixes:
8type=AVC msg=audit(1559176077.169:242): avc: denied { search } for
9pid=374 comm="rpc.statd" name="journal" dev="tmpfs" ino=9854
10scontext=system_u:system_r:rpcd_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_var_run_t:s15:c0.c1023 tclass=dir
12permissive=0
13
14Upstream-Status: Inappropriate [embedded specific]
15
16Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
17---
18 policy/modules/services/rpc.te | 2 ++
19 1 file changed, 2 insertions(+)
20
21diff --git a/policy/modules/services/rpc.te b/policy/modules/services/rpc.te
22index 7c0b37ddc..ef6cb9b63 100644
23--- a/policy/modules/services/rpc.te
24+++ b/policy/modules/services/rpc.te
25@@ -185,6 +185,8 @@ seutil_dontaudit_search_config(rpcd_t)
26
27 userdom_signal_all_users(rpcd_t)
28
29+mls_file_read_to_clearance(rpcd_t)
30+
31 ifdef(`distro_debian',`
32 term_dontaudit_use_unallocated_ttys(rpcd_t)
33 ')
34--
352.17.1
36
diff --git a/recipes-security/refpolicy/refpolicy/0061-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch b/recipes-security/refpolicy/refpolicy/0061-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch
new file mode 100644
index 0000000..af7f3ad
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0061-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch
@@ -0,0 +1,41 @@
1From 0404c4ad3f92408edcdbf46ac0665bf09d4b2516 Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Mon, 28 Jan 2019 14:05:18 +0800
4Subject: [PATCH] policy/modules/roles/sysadm: MLS - sysadm rw to clearance
5
6The two new rules make sysadm_t domain MLS trusted for:
7 - reading from files at all levels.
8 - writing to processes up to its clearance(s0-s15).
9
10With default MLS policy, root user would login in as sysadm_t:s0 by
11default. Most processes will run in sysadm_t:s0 because no
12domtrans/rangetrans rules, as a result, even root could not access
13high level files/processes.
14
15So with the two new rules, root user could work easier in MLS policy.
16
17Upstream-Status: Inappropriate [embedded specific]
18
19Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
20Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
21---
22 policy/modules/roles/sysadm.te | 3 +++
23 1 file changed, 3 insertions(+)
24
25diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
26index 07b9faf30..ac5239d83 100644
27--- a/policy/modules/roles/sysadm.te
28+++ b/policy/modules/roles/sysadm.te
29@@ -42,6 +42,9 @@ dev_read_kmsg(sysadm_t)
30
31 mls_process_read_all_levels(sysadm_t)
32
33+mls_file_read_all_levels(sysadm_t)
34+mls_process_write_to_clearance(sysadm_t)
35+
36 selinux_read_policy(sysadm_t)
37
38 ubac_process_exempt(sysadm_t)
39--
402.17.1
41
diff --git a/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-mount-make-mount_t-domain-MLS-.patch b/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-mount-make-mount_t-domain-MLS-.patch
new file mode 100644
index 0000000..1e7d963
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0062-policy-modules-system-mount-make-mount_t-domain-MLS-.patch
@@ -0,0 +1,36 @@
1From 7789f70ee3506f11b6bc1954469915214bcb9c58 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Sat, 15 Feb 2014 04:22:47 -0500
4Subject: [PATCH] policy/modules/system/mount: make mount_t domain MLS trusted
5 for writing to processes up to its clearance
6
7Fixes:
8avc: denied { setsched } for pid=148 comm="mount"
9scontext=system_u:system_r:mount_t:s0-s15:c0.c1023
10tcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=process
11permissive=1
12
13Upstream-Status: Inappropriate [embedded specific]
14
15Signen-off-by: Wenzong Fan <wenzong.fan@windriver.com>
16Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
17---
18 policy/modules/system/mount.te | 2 ++
19 1 file changed, 2 insertions(+)
20
21diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
22index 282eb3ada..5bb4fe631 100644
23--- a/policy/modules/system/mount.te
24+++ b/policy/modules/system/mount.te
25@@ -116,6 +116,8 @@ fs_dontaudit_write_tmpfs_dirs(mount_t)
26 mls_file_read_all_levels(mount_t)
27 mls_file_write_all_levels(mount_t)
28
29+mls_process_write_to_clearance(mount_t)
30+
31 selinux_get_enforce_mode(mount_t)
32
33 storage_raw_read_fixed_disk(mount_t)
34--
352.17.1
36
diff --git a/recipes-security/refpolicy/refpolicy/0063-policy-modules-system-setrans-allow-setrans-to-acces.patch b/recipes-security/refpolicy/refpolicy/0063-policy-modules-system-setrans-allow-setrans-to-acces.patch
new file mode 100644
index 0000000..55d92f0
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0063-policy-modules-system-setrans-allow-setrans-to-acces.patch
@@ -0,0 +1,53 @@
1From fc77db62ce54a33ee04bfc3e4c68b9cbed7251c6 Mon Sep 17 00:00:00 2001
2From: Roy Li <rongqing.li@windriver.com>
3Date: Sat, 22 Feb 2014 13:35:38 +0800
4Subject: [PATCH] policy/modules/system/setrans: allow setrans to access
5 /sys/fs/selinux
6
71. mcstransd failed to boot-up since the below permission is denied
8statfs("/sys/fs/selinux", 0x7ffff2b80370) = -1 EACCES (Permission denied)
9
102. other programs can not connect to /run/setrans/.setrans-unix
11avc: denied { connectto } for pid=2055 comm="ls"
12path="/run/setrans/.setrans-unix"
13scontext=root:sysadm_r:sysadm_t:s0-s15:c0.c1023
14tcontext=system_u:system_r:setrans_t:s15:c0.c1023
15tclass=unix_stream_socket
16
173. allow setrans_t use fd at any level
18
19Upstream-Status: Inappropriate [embedded specific]
20
21Signed-off-by: Roy Li <rongqing.li@windriver.com>
22Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
23---
24 policy/modules/system/setrans.te | 6 +++---
25 1 file changed, 3 insertions(+), 3 deletions(-)
26
27diff --git a/policy/modules/system/setrans.te b/policy/modules/system/setrans.te
28index 5f020ef78..7f618f212 100644
29--- a/policy/modules/system/setrans.te
30+++ b/policy/modules/system/setrans.te
31@@ -23,9 +23,7 @@ mls_trusted_object(setrans_runtime_t)
32 type setrans_unit_t;
33 init_unit_file(setrans_unit_t)
34
35-ifdef(`distro_debian',`
36- init_daemon_runtime_file(setrans_runtime_t, dir, "setrans")
37-')
38+init_daemon_runtime_file(setrans_runtime_t, dir, "setrans")
39
40 ifdef(`enable_mcs',`
41 init_ranged_daemon_domain(setrans_t, setrans_exec_t, s0 - mcs_systemhigh)
42@@ -73,6 +71,8 @@ mls_net_receive_all_levels(setrans_t)
43 mls_socket_write_all_levels(setrans_t)
44 mls_process_read_all_levels(setrans_t)
45 mls_socket_read_all_levels(setrans_t)
46+mls_fd_use_all_levels(setrans_t)
47+mls_trusted_object(setrans_t)
48
49 selinux_compute_access_vector(setrans_t)
50
51--
522.17.1
53
diff --git a/recipes-security/refpolicy/refpolicy/0064-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch b/recipes-security/refpolicy/refpolicy/0064-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch
new file mode 100644
index 0000000..4fa9968
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0064-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch
@@ -0,0 +1,36 @@
1From a51cec2a8d8f47b7a06c59b8af73d96edcc2a993 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 30 Jun 2020 10:18:20 +0800
4Subject: [PATCH] policy/modules/admin/dmesg: make dmesg_t MLS trusted reading
5 from files up to its clearance
6
7Fixes:
8avc: denied { read } for pid=255 comm="dmesg" name="kmsg"
9dev="devtmpfs" ino=10032
10scontext=system_u:system_r:dmesg_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
12permissive=0
13
14Upstream-Status: Inappropriate [embedded specific]
15
16Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
17---
18 policy/modules/admin/dmesg.te | 2 ++
19 1 file changed, 2 insertions(+)
20
21diff --git a/policy/modules/admin/dmesg.te b/policy/modules/admin/dmesg.te
22index 5bbe71b26..228baecd8 100644
23--- a/policy/modules/admin/dmesg.te
24+++ b/policy/modules/admin/dmesg.te
25@@ -51,6 +51,8 @@ miscfiles_read_localization(dmesg_t)
26 userdom_dontaudit_use_unpriv_user_fds(dmesg_t)
27 userdom_use_user_terminals(dmesg_t)
28
29+mls_file_read_to_clearance(dmesg_t)
30+
31 optional_policy(`
32 seutil_sigchld_newrole(dmesg_t)
33 ')
34--
352.17.1
36
diff --git a/recipes-security/refpolicy/refpolicy/0065-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch b/recipes-security/refpolicy/refpolicy/0065-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch
new file mode 100644
index 0000000..3a2c235
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0065-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch
@@ -0,0 +1,77 @@
1From fdc58fd666915aba89cb07fe6e7eb43a7fbec2ec Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Fri, 13 Oct 2017 07:20:40 +0000
4Subject: [PATCH] policy/modules/kernel/kernel: make kernel_t MLS trusted for
5 lowering the level of files
6
7The boot process hangs with the error while using MLS policy:
8
9 [!!!!!!] Failed to mount API filesystems, freezing.
10 [ 4.085349] systemd[1]: Freezing execution.
11
12Make kernel_t mls trusted for lowering the level of files to fix below
13avc denials and remove the hang issue.
14
15 op=security_validate_transition seresult=denied \
16 oldcontext=system_u:object_r:device_t:s15:c0.c1023 \
17 newcontext=system_u:object_r:device_t:s0 \
18 taskcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=dir
19 systemd[1]: Unable to fix SELinux security context of /dev: Operation not permitted
20
21 avc: denied { create } for pid=1 comm="systemd" name="shm" \
22 scontext=system_u:system_r:kernel_t:s15:c0.c1023 \
23 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir permissive=0
24 systemd[1]: Failed to mount tmpfs at /dev/shm: No such file or directory
25
26 avc: denied { create } for pid=1 comm="systemd" name="pts" \
27 scontext=system_u:system_r:kernel_t:s15:c0.c1023 \
28 tcontext=system_u:object_r:devpts_t:s0-s15:c0.c1023 tclass=dir permissive=0
29
30 op=security_validate_transition seresult=denied \
31 oldcontext=system_u:object_r:unlabeled_t:s0 \
32 newcontext=system_u:object_r:var_run_t:s0-s15:c0.c1023 \
33 taskcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=dir
34
35 op=security_validate_transition seresult=denied \
36 oldcontext=system_u:object_r:tmpfs_t:s15:c0.c1023 \
37 newcontext=system_u:object_r:var_run_t:s0-s15:c0.c1023 \
38 taskcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=dir
39 systemd[1]: Unable to fix SELinux security context of /run: Operation not permitted
40
41 op=security_validate_transition seresult=denied \
42 oldcontext=system_u:object_r:tmpfs_t:s15:c0.c1023 \
43 newcontext=system_u:object_r:cgroup_t:s0 \
44 taskcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=dir
45 systemd[1]: Unable to fix SELinux security context of /sys/fs/cgroup: Operation not permitted
46
47 avc: denied { create } for pid=1 comm="systemd" name="pstore" \
48 scontext=system_u:system_r:kernel_t:s15:c0.c1023 \
49 tcontext=system_u:object_r:pstore_t:s0 tclass=dir permissive=0
50
51Reference: https://bugzilla.redhat.com/show_bug.cgi?id=667370
52
53Upstream-Status: Inappropriate [embedded specific]
54
55Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
56Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
57---
58 policy/modules/kernel/kernel.te | 3 +++
59 1 file changed, 3 insertions(+)
60
61diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
62index 44c031a39..4dffaef76 100644
63--- a/policy/modules/kernel/kernel.te
64+++ b/policy/modules/kernel/kernel.te
65@@ -359,6 +359,9 @@ mls_file_read_all_levels(kernel_t)
66 mls_socket_write_all_levels(kernel_t)
67 mls_fd_use_all_levels(kernel_t)
68
69+# https://bugzilla.redhat.com/show_bug.cgi?id=667370
70+mls_file_downgrade(kernel_t)
71+
72 ifdef(`distro_redhat',`
73 # Bugzilla 222337
74 fs_rw_tmpfs_chr_files(kernel_t)
75--
762.17.1
77
diff --git a/recipes-security/refpolicy/refpolicy/0066-policy-modules-system-init-make-init_t-MLS-trusted-f.patch b/recipes-security/refpolicy/refpolicy/0066-policy-modules-system-init-make-init_t-MLS-trusted-f.patch
new file mode 100644
index 0000000..09e9af2
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0066-policy-modules-system-init-make-init_t-MLS-trusted-f.patch
@@ -0,0 +1,46 @@
1From 3aa784896315d269be4f43a281d59ad7671b2d07 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Fri, 15 Jan 2016 03:47:05 -0500
4Subject: [PATCH] policy/modules/system/init: make init_t MLS trusted for
5 lowering/raising the leve of files
6
7Fix security_validate_transition issues:
8
9 op=security_validate_transition seresult=denied \
10 oldcontext=system_u:object_r:device_t:s15:c0.c1023 \
11 newcontext=system_u:object_r:device_t:s0 \
12 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 \
13 tclass=dir
14
15 op=security_validate_transition seresult=denied \
16 oldcontext=system_u:object_r:var_run_t:s0 \
17 newcontext=system_u:object_r:var_log_t:s0-s15:c0.c1023 \
18 taskcontext=system_u:system_r:init_t:s0-s15:c0.c1023 \
19 tclass=dir
20
21Upstream-Status: Inappropriate [embedded specific]
22
23Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
24Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
25---
26 policy/modules/system/init.te | 4 ++++
27 1 file changed, 4 insertions(+)
28
29diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
30index fe3fcf011..8e85dde72 100644
31--- a/policy/modules/system/init.te
32+++ b/policy/modules/system/init.te
33@@ -208,6 +208,10 @@ mls_process_write_all_levels(init_t)
34 mls_fd_use_all_levels(init_t)
35 mls_process_set_level(init_t)
36
37+# MLS trusted for lowering/raising the level of files
38+mls_file_downgrade(init_t)
39+mls_file_upgrade(init_t)
40+
41 # the following one is needed for libselinux:is_selinux_enabled()
42 # otherwise the call fails and sysvinit tries to load the policy
43 # again when using the initramfs
44--
452.17.1
46
diff --git a/recipes-security/refpolicy/refpolicy/0067-policy-modules-system-systemd-make-systemd-tmpfiles_.patch b/recipes-security/refpolicy/refpolicy/0067-policy-modules-system-systemd-make-systemd-tmpfiles_.patch
new file mode 100644
index 0000000..b4245ab
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0067-policy-modules-system-systemd-make-systemd-tmpfiles_.patch
@@ -0,0 +1,63 @@
1From fb69dde2c8783e0602dcce3509b69ded9e6331a2 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Thu, 4 Feb 2016 06:03:19 -0500
4Subject: [PATCH] policy/modules/system/systemd: make systemd-tmpfiles_t domain
5 MLS trusted for raising/lowering the level of files
6
7Fixes:
8 avc: denied { search } for pid=92 comm="systemd-tmpfile" name="1" \
9 dev="proc" ino=7987 \
10 scontext=system_u:system_r:systemd_tmpfiles_t:s0-s15:c0.c1023 \
11 tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 \
12 tclass=dir
13
14 avc: denied { search } for pid=92 comm="systemd-tmpfile" \
15 name="journal" dev="tmpfs" ino=8226 \
16 scontext=system_u:system_r:systemd_tmpfiles_t:s0-s15:c0.c1023 \
17 tcontext=system_u:object_r:syslogd_var_run_t:s15:c0.c1023 \
18 tclass=dir
19
20 avc: denied { write } for pid=92 comm="systemd-tmpfile" \
21 name="kmsg" dev="devtmpfs" ino=7242 \
22 scontext=system_u:system_r:systemd_tmpfiles_t:s0-s15:c0.c1023 \
23 tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 \
24 tclass=chr_file
25
26 avc: denied { read } for pid=92 comm="systemd-tmpfile" \
27 name="kmod.conf" dev="tmpfs" ino=8660 \
28 scontext=system_u:system_r:systemd_tmpfiles_t:s0-s15:c0.c1023 \
29 tcontext=system_u:object_r:var_run_t:s0 \
30 tclass=file
31
32 avc: denied { search } for pid=92 comm="systemd-tmpfile" \
33 name="kernel" dev="proc" ino=8731 \
34 scontext=system_u:system_r:systemd_tmpfiles_t:s0-s15:c0.c1023 \
35 tcontext=system_u:object_r:sysctl_kernel_t:s0 tclass=dir
36
37Upstream-Status: Inappropriate [embedded specific]
38
39Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
40Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
41---
42 policy/modules/system/systemd.te | 5 +++++
43 1 file changed, 5 insertions(+)
44
45diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
46index fb8d4960f..57f4dc40d 100644
47--- a/policy/modules/system/systemd.te
48+++ b/policy/modules/system/systemd.te
49@@ -1249,6 +1249,11 @@ sysnet_relabel_config(systemd_tmpfiles_t)
50
51 systemd_log_parse_environment(systemd_tmpfiles_t)
52
53+mls_file_write_all_levels(systemd_tmpfiles_t)
54+mls_file_read_all_levels(systemd_tmpfiles_t)
55+mls_file_downgrade(systemd_tmpfiles_t)
56+mls_file_upgrade(systemd_tmpfiles_t)
57+
58 userdom_manage_user_runtime_root_dirs(systemd_tmpfiles_t)
59 userdom_relabel_user_runtime_root_dirs(systemd_tmpfiles_t)
60
61--
622.17.1
63
diff --git a/recipes-security/refpolicy/refpolicy-git/0017-policy-module-logging-Add-the-syslogd_t-to-trusted-o.patch b/recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch
index af24d90..921305e 100644
--- a/recipes-security/refpolicy/refpolicy-git/0017-policy-module-logging-Add-the-syslogd_t-to-trusted-o.patch
+++ b/recipes-security/refpolicy/refpolicy/0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch
@@ -1,33 +1,37 @@
1From f84b1809e45bf08ce2a603827de3ade876ce8683 Mon Sep 17 00:00:00 2001 1From f5a6c667186850ba8c5057742195c46d9f7ff8cf Mon Sep 17 00:00:00 2001
2From: Xin Ouyang <Xin.Ouyang@windriver.com> 2From: Xin Ouyang <Xin.Ouyang@windriver.com>
3Date: Thu, 22 Aug 2013 13:37:23 +0800 3Date: Thu, 22 Aug 2013 13:37:23 +0800
4Subject: [PATCH 17/34] policy/module/logging: Add the syslogd_t to trusted 4Subject: [PATCH] policy/modules/system/logging: add the syslogd_t to trusted
5 object 5 object
6 6
7We add the syslogd_t to trusted object, because other process need 7We add the syslogd_t to trusted object, because other process need
8to have the right to connectto/sendto /dev/log. 8to have the right to connectto/sendto /dev/log.
9 9
10Upstream-Status: Inappropriate [only for Poky] 10Upstream-Status: Inappropriate [embedded specific]
11 11
12Signed-off-by: Roy.Li <rongqing.li@windriver.com> 12Signed-off-by: Roy.Li <rongqing.li@windriver.com>
13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> 14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
15Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15--- 16---
16 policy/modules/system/logging.te | 1 + 17 policy/modules/system/logging.te | 4 ++++
17 1 file changed, 1 insertion(+) 18 1 file changed, 4 insertions(+)
18 19
19diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te 20diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
20index 38ccfe3a..c892f547 100644 21index 1d45a5fa9..eec0560d1 100644
21--- a/policy/modules/system/logging.te 22--- a/policy/modules/system/logging.te
22+++ b/policy/modules/system/logging.te 23+++ b/policy/modules/system/logging.te
23@@ -501,6 +501,7 @@ fs_getattr_all_fs(syslogd_t) 24@@ -501,6 +501,10 @@ fs_getattr_all_fs(syslogd_t)
24 fs_search_auto_mountpoints(syslogd_t) 25 fs_search_auto_mountpoints(syslogd_t)
25 26
26 mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories 27 mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories
28+mls_file_read_all_levels(syslogd_t)
29+mls_socket_write_all_levels(syslogd_t) # Neet to be able to sendto dgram
27+mls_trusted_object(syslogd_t) # Other process need to have the right to connectto/sendto /dev/log 30+mls_trusted_object(syslogd_t) # Other process need to have the right to connectto/sendto /dev/log
31+mls_fd_use_all_levels(syslogd_t)
28 32
29 term_write_console(syslogd_t) 33 term_write_console(syslogd_t)
30 # Allow syslog to a terminal 34 # Allow syslog to a terminal
31-- 35--
322.19.1 362.17.1
33 37
diff --git a/recipes-security/refpolicy/refpolicy/0069-policy-modules-system-init-make-init_t-MLS-trusted-f.patch b/recipes-security/refpolicy/refpolicy/0069-policy-modules-system-init-make-init_t-MLS-trusted-f.patch
new file mode 100644
index 0000000..74ef580
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0069-policy-modules-system-init-make-init_t-MLS-trusted-f.patch
@@ -0,0 +1,33 @@
1From b74b8052fd654d6a242bf3d8773a42f376d08fed Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 28 May 2019 16:41:37 +0800
4Subject: [PATCH] policy/modules/system/init: make init_t MLS trusted for
5 writing to keys at all levels
6
7Fixes:
8type=AVC msg=audit(1559024138.454:31): avc: denied { link } for
9pid=190 comm="(mkdir)" scontext=system_u:system_r:init_t:s0-s15:c0.c1023
10tcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=key permissive=1
11
12Upstream-Status: Inappropriate [embedded specific]
13
14Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
15---
16 policy/modules/system/init.te | 1 +
17 1 file changed, 1 insertion(+)
18
19diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
20index 8e85dde72..453ae9b6b 100644
21--- a/policy/modules/system/init.te
22+++ b/policy/modules/system/init.te
23@@ -207,6 +207,7 @@ mls_file_write_all_levels(init_t)
24 mls_process_write_all_levels(init_t)
25 mls_fd_use_all_levels(init_t)
26 mls_process_set_level(init_t)
27+mls_key_write_all_levels(init_t)
28
29 # MLS trusted for lowering/raising the level of files
30 mls_file_downgrade(init_t)
31--
322.17.1
33
diff --git a/recipes-security/refpolicy/refpolicy/0070-policy-modules-system-init-all-init_t-to-read-any-le.patch b/recipes-security/refpolicy/refpolicy/0070-policy-modules-system-init-all-init_t-to-read-any-le.patch
new file mode 100644
index 0000000..38a8076
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0070-policy-modules-system-init-all-init_t-to-read-any-le.patch
@@ -0,0 +1,40 @@
1From 0e29b493136115b9bf397cc59424552c5b354385 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Wed, 3 Feb 2016 04:16:06 -0500
4Subject: [PATCH] policy/modules/system/init: all init_t to read any level
5 sockets
6
7Fixes:
8 avc: denied { listen } for pid=1 comm="systemd" \
9 path="/run/systemd/journal/stdout" \
10 scontext=system_u:system_r:init_t:s0-s15:c0.c1023 \
11 tcontext=system_u:system_r:syslogd_t:s15:c0.c1023 \
12 tclass=unix_stream_socket permissive=1
13
14 systemd[1]: Failded to listen on Journal Socket
15
16Upstream-Status: Inappropriate [embedded specific]
17
18Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
19Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
20---
21 policy/modules/system/init.te | 3 +++
22 1 file changed, 3 insertions(+)
23
24diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
25index 453ae9b6b..feed5af5f 100644
26--- a/policy/modules/system/init.te
27+++ b/policy/modules/system/init.te
28@@ -213,6 +213,9 @@ mls_key_write_all_levels(init_t)
29 mls_file_downgrade(init_t)
30 mls_file_upgrade(init_t)
31
32+# MLS trusted for reading from sockets at any level
33+mls_socket_read_all_levels(init_t)
34+
35 # the following one is needed for libselinux:is_selinux_enabled()
36 # otherwise the call fails and sysvinit tries to load the policy
37 # again when using the initramfs
38--
392.17.1
40
diff --git a/recipes-security/refpolicy/refpolicy/0071-policy-modules-system-logging-allow-auditd_t-to-writ.patch b/recipes-security/refpolicy/refpolicy/0071-policy-modules-system-logging-allow-auditd_t-to-writ.patch
new file mode 100644
index 0000000..2f7eb44
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0071-policy-modules-system-logging-allow-auditd_t-to-writ.patch
@@ -0,0 +1,39 @@
1From 71a217de05a084899537462f8b432825b12ab187 Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Thu, 25 Feb 2016 04:25:08 -0500
4Subject: [PATCH] policy/modules/system/logging: allow auditd_t to write socket
5 at any level
6
7Allow auditd_t to write init_t:unix_stream_socket at any level.
8
9Fixes:
10 avc: denied { write } for pid=748 comm="auditd" \
11 path="socket:[17371]" dev="sockfs" ino=17371 \
12 scontext=system_u:system_r:auditd_t:s15:c0.c1023 \
13 tcontext=system_u:system_r:init_t:s0-s15:c0.c1023 \
14 tclass=unix_stream_socket permissive=1
15
16Upstream-Status: Inappropriate [embedded specific]
17
18Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
19Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
20---
21 policy/modules/system/logging.te | 2 ++
22 1 file changed, 2 insertions(+)
23
24diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
25index eec0560d1..c22613c0b 100644
26--- a/policy/modules/system/logging.te
27+++ b/policy/modules/system/logging.te
28@@ -210,6 +210,8 @@ miscfiles_read_localization(auditd_t)
29
30 mls_file_read_all_levels(auditd_t)
31 mls_file_write_all_levels(auditd_t) # Need to be able to write to /var/run/ directory
32+mls_fd_use_all_levels(auditd_t)
33+mls_socket_write_all_levels(auditd_t)
34
35 seutil_dontaudit_read_config(auditd_t)
36
37--
382.17.1
39
diff --git a/recipes-security/refpolicy/refpolicy/0072-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch b/recipes-security/refpolicy/refpolicy/0072-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch
new file mode 100644
index 0000000..f32bb74
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0072-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch
@@ -0,0 +1,32 @@
1From 8d1a8ffca75ada3dc576a4013644c9e9cdb45947 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 31 Oct 2019 17:35:59 +0800
4Subject: [PATCH] policy/modules/kernel/kernel: make kernel_t MLS trusted for
5 writing to keys at all levels.
6
7Fixes:
8systemd-udevd[216]: regulatory.0: Process '/usr/sbin/crda' failed with exit code 254.
9
10Upstream-Status: Inappropriate [embedded specific]
11
12Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
13---
14 policy/modules/kernel/kernel.te | 2 ++
15 1 file changed, 2 insertions(+)
16
17diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te
18index 4dffaef76..34444a2f9 100644
19--- a/policy/modules/kernel/kernel.te
20+++ b/policy/modules/kernel/kernel.te
21@@ -362,6 +362,8 @@ mls_fd_use_all_levels(kernel_t)
22 # https://bugzilla.redhat.com/show_bug.cgi?id=667370
23 mls_file_downgrade(kernel_t)
24
25+mls_key_write_all_levels(kernel_t)
26+
27 ifdef(`distro_redhat',`
28 # Bugzilla 222337
29 fs_rw_tmpfs_chr_files(kernel_t)
30--
312.17.1
32
diff --git a/recipes-security/refpolicy/refpolicy/0073-policy-modules-system-systemd-make-systemd-logind-do.patch b/recipes-security/refpolicy/refpolicy/0073-policy-modules-system-systemd-make-systemd-logind-do.patch
new file mode 100644
index 0000000..1e5b474
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0073-policy-modules-system-systemd-make-systemd-logind-do.patch
@@ -0,0 +1,42 @@
1From 212156df805a24852a4762737f7040f1c7bb9b9a Mon Sep 17 00:00:00 2001
2From: Wenzong Fan <wenzong.fan@windriver.com>
3Date: Mon, 23 Jan 2017 08:42:44 +0000
4Subject: [PATCH] policy/modules/system/systemd: make systemd-logind domain MLS
5 trusted for reading from files up to its clearance.
6
7Fixes:
8avc: denied { search } for pid=184 comm="systemd-logind"
9name="journal" dev="tmpfs" ino=10949
10scontext=system_u:system_r:systemd_logind_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
12permissive=1
13
14avc: denied { watch } for pid=184 comm="systemd-logind"
15path="/run/utmp" dev="tmpfs" ino=12725
16scontext=system_u:system_r:systemd_logind_t:s0-s15:c0.c1023
17tcontext=system_u:object_r:initrc_runtime_t:s0 tclass=file permissive=1
18
19Upstream-Status: Inappropriate [embedded specific]
20
21Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
22Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
23---
24 policy/modules/system/systemd.te | 2 ++
25 1 file changed, 2 insertions(+)
26
27diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
28index 57f4dc40d..1449d2808 100644
29--- a/policy/modules/system/systemd.te
30+++ b/policy/modules/system/systemd.te
31@@ -621,6 +621,8 @@ userdom_relabelto_user_runtime_dirs(systemd_logind_t)
32 userdom_setattr_user_ttys(systemd_logind_t)
33 userdom_use_user_ttys(systemd_logind_t)
34
35+mls_file_read_to_clearance(systemd_logind_t)
36+
37 # Needed to work around patch not yet merged into the systemd-logind supported on RHEL 7.x
38 # The change in systemd by Nicolas Iooss on 02-Feb-2016 with hash 4b51966cf6c06250036e428608da92f8640beb96
39 # should fix the problem where user directories in /run/user/$UID/ are not getting the proper context
40--
412.17.1
42
diff --git a/recipes-security/refpolicy/refpolicy/0074-policy-modules-system-systemd-systemd-user-sessions-.patch b/recipes-security/refpolicy/refpolicy/0074-policy-modules-system-systemd-systemd-user-sessions-.patch
new file mode 100644
index 0000000..ebe2b52
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0074-policy-modules-system-systemd-systemd-user-sessions-.patch
@@ -0,0 +1,41 @@
1From bea1f53ae2ba7608503051b874db9aecb97d4f00 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 18 Jun 2020 09:39:23 +0800
4Subject: [PATCH] policy/modules/system/systemd: systemd-user-sessions: make
5 systemd_sessions_t MLS trusted for reading/writing from files at all levels
6
7Fixes:
8avc: denied { search } for pid=229 comm="systemd-user-se"
9name="journal" dev="tmpfs" ino=10956
10scontext=system_u:system_r:systemd_sessions_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
12permissive=0
13avc: denied { write } for pid=229 comm="systemd-user-se" name="kmsg"
14dev="devtmpfs" ino=10032
15scontext=system_u:system_r:systemd_sessions_t:s0-s15:c0.c1023
16tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
17permissive=0
18
19Upstream-Status: Inappropriate [embedded specific]
20
21Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
22---
23 policy/modules/system/systemd.te | 2 ++
24 1 file changed, 2 insertions(+)
25
26diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
27index 1449d2808..6b0f52d15 100644
28--- a/policy/modules/system/systemd.te
29+++ b/policy/modules/system/systemd.te
30@@ -1125,6 +1125,8 @@ seutil_read_file_contexts(systemd_sessions_t)
31
32 systemd_log_parse_environment(systemd_sessions_t)
33
34+mls_file_read_to_clearance(systemd_sessions_t)
35+mls_file_write_all_levels(systemd_sessions_t)
36
37 #########################################
38 #
39--
402.17.1
41
diff --git a/recipes-security/refpolicy/refpolicy/0075-policy-modules-system-systemd-systemd-networkd-make-.patch b/recipes-security/refpolicy/refpolicy/0075-policy-modules-system-systemd-systemd-networkd-make-.patch
new file mode 100644
index 0000000..addb480
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0075-policy-modules-system-systemd-systemd-networkd-make-.patch
@@ -0,0 +1,36 @@
1From a75847eb2a5a34c18a4fd24383a696d6c077a117 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 18 Jun 2020 09:59:58 +0800
4Subject: [PATCH] policy/modules/system/systemd: systemd-networkd: make
5 systemd_networkd_t MLS trusted for reading from files up to its clearance
6
7Fixes:
8avc: denied { search } for pid=219 comm="systemd-network"
9name="journal" dev="tmpfs" ino=10956
10scontext=system_u:system_r:systemd_networkd_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
12permissive=0
13
14Upstream-Status: Inappropriate [embedded specific]
15
16Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
17---
18 policy/modules/system/systemd.te | 2 ++
19 1 file changed, 2 insertions(+)
20
21diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
22index 6b0f52d15..cfbd9196a 100644
23--- a/policy/modules/system/systemd.te
24+++ b/policy/modules/system/systemd.te
25@@ -795,6 +795,8 @@ sysnet_read_config(systemd_networkd_t)
26
27 systemd_log_parse_environment(systemd_networkd_t)
28
29+mls_file_read_to_clearance(systemd_networkd_t)
30+
31 optional_policy(`
32 dbus_system_bus_client(systemd_networkd_t)
33 dbus_connect_system_bus(systemd_networkd_t)
34--
352.17.1
36
diff --git a/recipes-security/refpolicy/refpolicy/0076-policy-modules-system-systemd-systemd-resolved-make-.patch b/recipes-security/refpolicy/refpolicy/0076-policy-modules-system-systemd-systemd-resolved-make-.patch
new file mode 100644
index 0000000..908fe64
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0076-policy-modules-system-systemd-systemd-resolved-make-.patch
@@ -0,0 +1,40 @@
1From fac0583bea8eb74c43cd715cf5029d3243e38f95 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 18 Jun 2020 09:47:25 +0800
4Subject: [PATCH] policy/modules/system/systemd: systemd-resolved: make
5 systemd_resolved_t MLS trusted for reading from files up to its clearance
6
7Fixes:
8avc: denied { search } for pid=220 comm="systemd-resolve"
9name="journal" dev="tmpfs" ino=10956
10scontext=system_u:system_r:systemd_resolved_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
12permissive=0
13avc: denied { search } for pid=220 comm="systemd-resolve" name="/"
14dev="tmpfs" ino=15102
15scontext=system_u:system_r:systemd_resolved_t:s0-s15:c0.c1023
16tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir permissive=0
17
18Upstream-Status: Inappropriate [embedded specific]
19
20Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
21---
22 policy/modules/system/systemd.te | 2 ++
23 1 file changed, 2 insertions(+)
24
25diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
26index cfbd9196a..806468109 100644
27--- a/policy/modules/system/systemd.te
28+++ b/policy/modules/system/systemd.te
29@@ -1096,6 +1096,8 @@ init_dgram_send(systemd_resolved_t)
30
31 seutil_read_file_contexts(systemd_resolved_t)
32
33+mls_file_read_to_clearance(systemd_resolved_t)
34+
35 systemd_log_parse_environment(systemd_resolved_t)
36 systemd_read_networkd_runtime(systemd_resolved_t)
37
38--
392.17.1
40
diff --git a/recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch b/recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch
new file mode 100644
index 0000000..a1013a1
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0077-policy-modules-system-systemd-make-systemd-modules_t.patch
@@ -0,0 +1,36 @@
1From 569033512340d791a13c1ee2f269788c55fff63c Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Sun, 28 Jun 2020 15:19:44 +0800
4Subject: [PATCH] policy/modules/system/systemd: make systemd-modules_t domain
5 MLS trusted for reading from files up to its clearance
6
7Fixes:
8avc: denied { search } for pid=142 comm="systemd-modules"
9name="journal" dev="tmpfs" ino=10990
10scontext=system_u:system_r:systemd_modules_load_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
12permissive=0
13
14Upstream-Status: Inappropriate [embedded specific]
15
16Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
17---
18 policy/modules/system/systemd.te | 2 ++
19 1 file changed, 2 insertions(+)
20
21diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
22index 806468109..e82a1e64a 100644
23--- a/policy/modules/system/systemd.te
24+++ b/policy/modules/system/systemd.te
25@@ -739,6 +739,8 @@ modutils_read_module_objects(systemd_modules_load_t)
26
27 systemd_log_parse_environment(systemd_modules_load_t)
28
29+mls_file_read_to_clearance(systemd_modules_load_t)
30+
31 ########################################
32 #
33 # networkd local policy
34--
352.17.1
36
diff --git a/recipes-security/refpolicy/refpolicy/0078-policy-modules-system-systemd-systemd-gpt-auto-gener.patch b/recipes-security/refpolicy/refpolicy/0078-policy-modules-system-systemd-systemd-gpt-auto-gener.patch
new file mode 100644
index 0000000..303e7cf
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0078-policy-modules-system-systemd-systemd-gpt-auto-gener.patch
@@ -0,0 +1,70 @@
1From 84b86b1a4dd6f8e535c4b9b4ac2bfa38d202d9d3 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 14:52:43 +0800
4Subject: [PATCH] policy/modules/system/systemd: systemd-gpt-auto-generator:
5 make systemd_generator_t MLS trusted for writing from files up to its
6 clearance
7
8Fixes:
9audit: type=1400 audit(1592892455.376:3): avc: denied { write } for
10pid=120 comm="systemd-gpt-aut" name="kmsg" dev="devtmpfs" ino=10032
11scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
12tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
13permissive=0
14audit: type=1400 audit(1592892455.381:4): avc: denied { write } for
15pid=119 comm="systemd-getty-g" name="kmsg" dev="devtmpfs" ino=10032
16scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
17tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
18permissive=0
19audit: type=1400 audit(1592892455.382:5): avc: denied { read write }
20for pid=119 comm="systemd-getty-g" name="ttyS0" dev="devtmpfs"
21ino=10127 scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
22tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file permissive=0
23audit: type=1400 audit(1592892455.382:6): avc: denied { write } for
24pid=124 comm="systemd-system-" name="kmsg" dev="devtmpfs" ino=10032
25scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
26tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
27permissive=0
28audit: type=1400 audit(1592892455.383:7): avc: denied { write } for
29pid=122 comm="systemd-rc-loca" name="kmsg" dev="devtmpfs" ino=10032
30scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
31tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
32permissive=0
33audit: type=1400 audit(1592892455.385:8): avc: denied { write } for
34pid=118 comm="systemd-fstab-g" name="kmsg" dev="devtmpfs" ino=10032
35scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
36tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
37permissive=0
38audit: type=1400 audit(1592892455.385:9): avc: denied { write } for
39pid=121 comm="systemd-hiberna" name="kmsg" dev="devtmpfs" ino=10032
40scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
41tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
42permissive=0
43audit: type=1400 audit(1592892455.386:10): avc: denied { write } for
44pid=123 comm="systemd-run-gen" name="kmsg" dev="devtmpfs" ino=10032
45scontext=system_u:system_r:systemd_generator_t:s0-s15:c0.c1023
46tcontext=system_u:object_r:kmsg_device_t:s15:c0.c1023 tclass=chr_file
47permissive=0
48
49Upstream-Status: Inappropriate [embedded specific]
50
51Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
52---
53 policy/modules/system/systemd.te | 1 +
54 1 file changed, 1 insertion(+)
55
56diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
57index e82a1e64a..7e573645b 100644
58--- a/policy/modules/system/systemd.te
59+++ b/policy/modules/system/systemd.te
60@@ -401,6 +401,7 @@ storage_raw_read_fixed_disk(systemd_generator_t)
61 systemd_log_parse_environment(systemd_generator_t)
62
63 term_dontaudit_use_unallocated_ttys(systemd_generator_t)
64+mls_file_write_to_clearance(systemd_generator_t)
65
66 optional_policy(`
67 fstools_exec(systemd_generator_t)
68--
692.17.1
70
diff --git a/recipes-security/refpolicy/refpolicy/0079-policy-modules-services-ntp-make-nptd_t-MLS-trusted-.patch b/recipes-security/refpolicy/refpolicy/0079-policy-modules-services-ntp-make-nptd_t-MLS-trusted-.patch
new file mode 100644
index 0000000..b939c37
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0079-policy-modules-services-ntp-make-nptd_t-MLS-trusted-.patch
@@ -0,0 +1,40 @@
1From cb455496193d01761175f35297038f7cf468ebed Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Thu, 18 Jun 2020 10:21:04 +0800
4Subject: [PATCH] policy/modules/services/ntp: make nptd_t MLS trusted for
5 reading from files at all levels
6
7Fixes:
8avc: denied { search } for pid=193 comm="systemd-timesyn"
9name="journal" dev="tmpfs" ino=10956
10scontext=system_u:system_r:ntpd_t:s0-s15:c0.c1023
11tcontext=system_u:object_r:syslogd_runtime_t:s15:c0.c1023 tclass=dir
12permissive=0
13avc: denied { read } for pid=193 comm="systemd-timesyn" name="dbus"
14dev="tmpfs" ino=13971 scontext=system_u:system_r:ntpd_t:s0-s15:c0.c1023
15tcontext=system_u:object_r:system_dbusd_runtime_t:s0 tclass=dir
16permissive=0
17
18Upstream-Status: Inappropriate [embedded specific]
19
20Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
21---
22 policy/modules/services/ntp.te | 2 ++
23 1 file changed, 2 insertions(+)
24
25diff --git a/policy/modules/services/ntp.te b/policy/modules/services/ntp.te
26index 75603e16b..8886cb3bf 100644
27--- a/policy/modules/services/ntp.te
28+++ b/policy/modules/services/ntp.te
29@@ -138,6 +138,8 @@ miscfiles_read_localization(ntpd_t)
30 userdom_dontaudit_use_unpriv_user_fds(ntpd_t)
31 userdom_list_user_home_dirs(ntpd_t)
32
33+mls_file_read_all_levels(ntpd_t)
34+
35 ifdef(`init_systemd',`
36 allow ntpd_t ntpd_unit_t:file read_file_perms;
37
38--
392.17.1
40
diff --git a/recipes-security/refpolicy/refpolicy/0080-policy-modules-services-avahi-make-avahi_t-MLS-trust.patch b/recipes-security/refpolicy/refpolicy/0080-policy-modules-services-avahi-make-avahi_t-MLS-trust.patch
new file mode 100644
index 0000000..2b1ab6f
--- /dev/null
+++ b/recipes-security/refpolicy/refpolicy/0080-policy-modules-services-avahi-make-avahi_t-MLS-trust.patch
@@ -0,0 +1,29 @@
1From 0a2e2a58a645bd99242ac5ec60f17fab26a80bf9 Mon Sep 17 00:00:00 2001
2From: Yi Zhao <yi.zhao@windriver.com>
3Date: Tue, 23 Jun 2020 08:19:16 +0800
4Subject: [PATCH] policy/modules/services/avahi: make avahi_t MLS trusted for
5 reading from files up to its clearance
6
7Upstream-Status: Inappropriate [embedded specific]
8
9Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
10---
11 policy/modules/services/avahi.te | 2 ++
12 1 file changed, 2 insertions(+)
13
14diff --git a/policy/modules/services/avahi.te b/policy/modules/services/avahi.te
15index 5643349e3..5994ff3d5 100644
16--- a/policy/modules/services/avahi.te
17+++ b/policy/modules/services/avahi.te
18@@ -95,6 +95,8 @@ sysnet_etc_filetrans_config(avahi_t)
19 userdom_dontaudit_use_unpriv_user_fds(avahi_t)
20 userdom_dontaudit_search_user_home_dirs(avahi_t)
21
22+mls_file_read_to_clearance(avahi_t)
23+
24 optional_policy(`
25 dbus_system_domain(avahi_t, avahi_exec_t)
26
27--
282.17.1
29
diff --git a/recipes-security/refpolicy/refpolicy_common.inc b/recipes-security/refpolicy/refpolicy_common.inc
index 1d9ca93..46cbfa3 100644
--- a/recipes-security/refpolicy/refpolicy_common.inc
+++ b/recipes-security/refpolicy/refpolicy_common.inc
@@ -18,41 +18,87 @@ SRC_URI += "file://customizable_types \
18# refpolicy should provide a version of these and place them in your own 18# refpolicy should provide a version of these and place them in your own
19# refpolicy-${PV} directory. 19# refpolicy-${PV} directory.
20SRC_URI += " \ 20SRC_URI += " \
21 file://0001-fc-subs-volatile-alias-common-var-volatile-paths.patch \ 21 file://0001-fc-subs-volatile-alias-common-var-volatile-paths.patch \
22 file://0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch \ 22 file://0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch \
23 file://0003-fc-sysklogd-apply-policy-to-sysklogd-symlink.patch \ 23 file://0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch \
24 file://0004-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch \ 24 file://0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch \
25 file://0005-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch \ 25 file://0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch \
26 file://0006-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch \ 26 file://0006-fc-login-apply-login-context-to-login.shadow.patch \
27 file://0007-fc-login-apply-login-context-to-login.shadow.patch \ 27 file://0007-fc-bind-fix-real-path-for-bind.patch \
28 file://0008-fc-bind-fix-real-path-for-bind.patch \ 28 file://0008-fc-hwclock-add-hwclock-alternatives.patch \
29 file://0009-fc-hwclock-add-hwclock-alternatives.patch \ 29 file://0009-fc-dmesg-apply-policy-to-dmesg-alternatives.patch \
30 file://0010-fc-dmesg-apply-policy-to-dmesg-alternatives.patch \ 30 file://0010-fc-ssh-apply-policy-to-ssh-alternatives.patch \
31 file://0011-fc-ssh-apply-policy-to-ssh-alternatives.patch \ 31 file://0011-fc-sysnetwork-apply-policy-to-ip-alternatives.patch \
32 file://0012-fc-sysnetwork-apply-policy-to-ip-alternatives.patch \ 32 file://0012-fc-udev-apply-policy-to-udevadm-in-libexec.patch \
33 file://0013-fc-udev-apply-policy-to-udevadm-in-libexec.patch \ 33 file://0013-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch \
34 file://0014-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch \ 34 file://0014-fc-su-apply-policy-to-su-alternatives.patch \
35 file://0015-fc-su-apply-policy-to-su-alternatives.patch \ 35 file://0015-fc-fstools-fix-real-path-for-fstools.patch \
36 file://0016-fc-fstools-fix-real-path-for-fstools.patch \ 36 file://0016-fc-init-fix-update-alternatives-for-sysvinit.patch \
37 file://0017-policy-module-logging-Add-the-syslogd_t-to-trusted-o.patch \ 37 file://0017-fc-brctl-apply-policy-to-brctl-alternatives.patch \
38 file://0018-policy-module-logging-add-rules-for-the-symlink-of-v.patch \ 38 file://0018-fc-corecommands-apply-policy-to-nologin-alternatives.patch \
39 file://0019-policy-module-logging-add-rules-for-syslogd-symlink-.patch \ 39 file://0019-fc-locallogin-apply-policy-to-sulogin-alternatives.patch \
40 file://0020-policy-module-logging-add-domain-rules-for-the-subdi.patch \ 40 file://0020-fc-ntp-apply-policy-to-ntpd-alternatives.patch \
41 file://0021-policy-module-files-add-rules-for-the-symlink-of-tmp.patch \ 41 file://0021-fc-kerberos-apply-policy-to-kerberos-alternatives.patch \
42 file://0022-policy-module-terminals-add-rules-for-bsdpty_device_.patch \ 42 file://0022-fc-ldap-apply-policy-to-ldap-alternatives.patch \
43 file://0023-policy-module-terminals-don-t-audit-tty_device_t-in-.patch \ 43 file://0023-fc-postgresql-apply-policy-to-postgresql-alternative.patch \
44 file://0024-policy-module-rpc-allow-nfsd-to-exec-shell-commands.patch \ 44 file://0024-fc-screen-apply-policy-to-screen-alternatives.patch \
45 file://0025-policy-module-rpc-fix-policy-for-nfsserver-to-mount-.patch \ 45 file://0025-fc-usermanage-apply-policy-to-usermanage-alternative.patch \
46 file://0026-policy-module-sysfs-fix-for-new-SELINUXMNT-in-sys.patch \ 46 file://0026-fc-getty-add-file-context-to-start_getty.patch \
47 file://0027-policy-module-rpc-allow-sysadm-to-run-rpcinfo.patch \ 47 file://0027-fc-init-add-file-context-to-etc-network-if-files.patch \
48 file://0028-policy-module-userdomain-fix-selinux-utils-to-manage.patch \ 48 file://0028-fc-vlock-apply-policy-to-vlock-alternatives.patch \
49 file://0029-policy-module-selinuxutil-fix-setfiles-statvfs-to-ge.patch \ 49 file://0029-fc-cron-apply-policy-to-etc-init.d-crond.patch \
50 file://0030-policy-module-admin-fix-dmesg-to-use-dev-kmsg-as-def.patch \ 50 file://0030-file_contexts.subs_dist-set-aliase-for-root-director.patch \
51 file://0031-policy-module-ftp-add-ftpd_t-to-mls_file_write_all_l.patch \ 51 file://0031-policy-modules-system-logging-add-rules-for-the-syml.patch \
52 file://0032-policy-module-init-update-for-systemd-related-allow-.patch \ 52 file://0032-policy-modules-system-logging-add-rules-for-syslogd-.patch \
53 file://0033-refpolicy-minimum-make-sysadmin-module-optional.patch \ 53 file://0033-policy-modules-system-logging-add-domain-rules-for-t.patch \
54 file://0034-policy-module-apache-add-rules-for-the-symlink-of-va.patch \ 54 file://0034-policy-modules-kernel-files-add-rules-for-the-symlin.patch \
55 " 55 file://0035-policy-modules-kernel-terminal-add-rules-for-bsdpty_.patch \
56 file://0036-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch \
57 file://0037-policy-modules-services-avahi-allow-avahi_t-to-watch.patch \
58 file://0038-policy-modules-system-getty-allow-getty_t-watch-gett.patch \
59 file://0039-policy-modules-services-bluetooth-allow-bluetooth_t-.patch \
60 file://0040-policy-modules-roles-sysadm-allow-sysadm-to-run-rpci.patch \
61 file://0041-policy-modules-services-rpc-add-capability-dac_read_.patch \
62 file://0042-policy-modules-services-rpcbind-allow-rpcbind_t-to-c.patch \
63 file://0043-policy-modules-services-rngd-fix-security-context-fo.patch \
64 file://0044-policy-modules-system-authlogin-allow-chkpwd_t-to-ma.patch \
65 file://0045-policy-modules-system-udev-allow-udevadm_t-to-search.patch \
66 file://0046-policy-modules-udev-do-not-audit-udevadm_t-to-read-w.patch \
67 file://0047-policy-modules-services-rdisc-allow-rdisc_t-to-searc.patch \
68 file://0048-policy-modules-system-logging-fix-auditd-startup-fai.patch \
69 file://0049-policy-modules-services-ssh-make-respective-init-scr.patch \
70 file://0050-policy-modules-kernel-terminal-allow-loging-to-reset.patch \
71 file://0051-policy-modules-system-selinuxutil-allow-semanage_t-t.patch \
72 file://0052-policy-modules-system-sysnetwork-allow-ifconfig_t-to.patch \
73 file://0053-policy-modules-services-ntp-allow-ntpd_t-to-watch-sy.patch \
74 file://0054-policy-modules-system-systemd-enable-support-for-sys.patch \
75 file://0055-policy-modules-system-logging-fix-systemd-journald-s.patch \
76 file://0056-policy-modules-roles-sysadm-allow-sysadm_t-to-watch-.patch \
77 file://0057-policy-modules-system-systemd-add-capability-mknod-f.patch \
78 file://0058-policy-modules-system-systemd-systemd-gpt-auto-gener.patch \
79 file://0059-policy-modules-services-rpc-fix-policy-for-nfsserver.patch \
80 file://0060-policy-modules-services-rpc-make-rpcd_t-MLS-trusted-.patch \
81 file://0061-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch \
82 file://0062-policy-modules-system-mount-make-mount_t-domain-MLS-.patch \
83 file://0063-policy-modules-system-setrans-allow-setrans-to-acces.patch \
84 file://0064-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch \
85 file://0065-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch \
86 file://0066-policy-modules-system-init-make-init_t-MLS-trusted-f.patch \
87 file://0067-policy-modules-system-systemd-make-systemd-tmpfiles_.patch \
88 file://0068-policy-modules-system-logging-add-the-syslogd_t-to-t.patch \
89 file://0069-policy-modules-system-init-make-init_t-MLS-trusted-f.patch \
90 file://0070-policy-modules-system-init-all-init_t-to-read-any-le.patch \
91 file://0071-policy-modules-system-logging-allow-auditd_t-to-writ.patch \
92 file://0072-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch \
93 file://0073-policy-modules-system-systemd-make-systemd-logind-do.patch \
94 file://0074-policy-modules-system-systemd-systemd-user-sessions-.patch \
95 file://0075-policy-modules-system-systemd-systemd-networkd-make-.patch \
96 file://0076-policy-modules-system-systemd-systemd-resolved-make-.patch \
97 file://0077-policy-modules-system-systemd-make-systemd-modules_t.patch \
98 file://0078-policy-modules-system-systemd-systemd-gpt-auto-gener.patch \
99 file://0079-policy-modules-services-ntp-make-nptd_t-MLS-trusted-.patch \
100 file://0080-policy-modules-services-avahi-make-avahi_t-MLS-trust.patch \
101 "
56 102
57S = "${WORKDIR}/refpolicy" 103S = "${WORKDIR}/refpolicy"
58 104
@@ -85,7 +131,7 @@ POLICY_NAME ?= "${POLICY_TYPE}"
85POLICY_DISTRO ?= "redhat" 131POLICY_DISTRO ?= "redhat"
86POLICY_UBAC ?= "n" 132POLICY_UBAC ?= "n"
87POLICY_UNK_PERMS ?= "allow" 133POLICY_UNK_PERMS ?= "allow"
88POLICY_DIRECT_INITRC ?= "n" 134POLICY_DIRECT_INITRC ?= "y"
89POLICY_SYSTEMD ?= "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'y', 'n', d)}" 135POLICY_SYSTEMD ?= "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'y', 'n', d)}"
90POLICY_MONOLITHIC ?= "n" 136POLICY_MONOLITHIC ?= "n"
91POLICY_CUSTOM_BUILDOPT ?= "" 137POLICY_CUSTOM_BUILDOPT ?= ""
diff --git a/recipes-security/refpolicy/refpolicy_git.inc b/recipes-security/refpolicy/refpolicy_git.inc
index 8de07c0..122b7b6 100644
--- a/recipes-security/refpolicy/refpolicy_git.inc
+++ b/recipes-security/refpolicy/refpolicy_git.inc
@@ -1,11 +1,11 @@
1PV = "2.20190201+git${SRCPV}" 1PV = "2.20200229+git${SRCPV}"
2 2
3SRC_URI = "git://github.com/SELinuxProject/refpolicy.git;protocol=git;branch=master;name=refpolicy;destsuffix=refpolicy" 3SRC_URI = "git://github.com/SELinuxProject/refpolicy.git;protocol=git;branch=master;name=refpolicy;destsuffix=refpolicy"
4 4
5SRCREV_refpolicy ?= "df696a325404b84c2c931c85356510005e5e6916" 5SRCREV_refpolicy ?= "613708cad64943bae4e2de00df7b8e656446dd2f"
6 6
7UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" 7UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)"
8 8
9FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy-git:" 9FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy:"
10 10
11include refpolicy_common.inc 11include refpolicy_common.inc