diff options
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/ftp-add-ftpd_t-to-mlsfilewrite.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/ftp-add-ftpd_t-to-mlsfilewrite.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-clock.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-clock.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-corecommands.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-corecommands.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-dmesg.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-dmesg.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-bind.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-bind.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_login.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_login.patch) | 20 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_resolv.conf.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_resolv.conf.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_shadow.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_shadow.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_su.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_su.patch) | 11 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fstools.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fstools.patch) | 41 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ftpwho-dir.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ftpwho-dir.patch) | 14 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-iptables.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-iptables.patch) | 16 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-mta.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-mta.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-netutils.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-netutils.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-nscd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-nscd.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-rpm.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-rpm.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-screen.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-screen.patch) | 18 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ssh.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ssh.patch) | 14 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-su.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-su.patch) | 9 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-subs_dist.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-subs_dist.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-sysnetwork.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-sysnetwork.patch) | 20 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-udevd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-udevd.patch) | 21 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_hostname.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_hostname.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysklogd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysklogd.patch) | 21 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysvinit.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysvinit.patch) | 28 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-bsdpty_device_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-bsdpty_device_t.patch) | 54 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-syslogd_t-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-syslogd_t-symlink.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-tmp-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-tmp-symlink.patch) | 62 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-cache-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-cache-symlink.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-apache.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-apache.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink.patch) | 82 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-syslogd_t-to-trusted-object.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-syslogd_t-to-trusted-object.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-nfsd-to-exec-shell-commands.patch) | 20 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-setfiles_t-to-read-symlinks.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-setfiles_t-to-read-symlinks.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-sysadm-to-run-rpcinfo.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-sysadm-to-run-rpcinfo.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-don-t-audit-tty_device_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-don-t-audit-tty_device_t.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-dmesg-to-use-dev-kmsg.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-dmesg-to-use-dev-kmsg.patch) | 18 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-new-SELINUXMNT-in-sys.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-new-SELINUXMNT-in-sys.patch) | 120 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch) | 52 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-setfiles-statvfs-get-file-count.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-setfiles-statvfs-get-file-count.patch) | 12 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-seutils-manage-config-files.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-seutils-manage-config-files.patch) | 20 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-2.20170204/refpolicy-update-for_systemd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/refpolicy-update-for_systemd.patch) | 10 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-mcs_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-mcs_2.20151208.bb) | 0 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-minimum_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-minimum_2.20151208.bb) | 0 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-mls_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-mls_2.20151208.bb) | 0 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-standard_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-standard_2.20151208.bb) | 0 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch | 33 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch | 2 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch | 30 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy-targeted_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-targeted_2.20151208.bb) | 0 | ||||
| -rw-r--r-- | recipes-security/refpolicy/refpolicy_2.20170204.inc (renamed from recipes-security/refpolicy/refpolicy_2.20151208.inc) | 9 |
52 files changed, 593 insertions, 404 deletions
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/ftp-add-ftpd_t-to-mlsfilewrite.patch b/recipes-security/refpolicy/refpolicy-2.20170204/ftp-add-ftpd_t-to-mlsfilewrite.patch index 49da4b6..85c40a4 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/ftp-add-ftpd_t-to-mlsfilewrite.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/ftp-add-ftpd_t-to-mlsfilewrite.patch | |||
| @@ -17,15 +17,16 @@ root@localhost:~# sesearch --allow -s ftpd_t -t var_run_t|grep dir|grep add_name | |||
| 17 | root@localhost:~# | 17 | root@localhost:~# |
| 18 | 18 | ||
| 19 | Signed-off-by: Roy Li <rongqing.li@windriver.com> | 19 | Signed-off-by: Roy Li <rongqing.li@windriver.com> |
| 20 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 20 | --- | 21 | --- |
| 21 | policy/modules/contrib/ftp.te | 2 ++ | 22 | policy/modules/contrib/ftp.te | 2 ++ |
| 22 | 1 file changed, 2 insertions(+) | 23 | 1 file changed, 2 insertions(+) |
| 23 | 24 | ||
| 24 | diff --git a/policy/modules/contrib/ftp.te b/policy/modules/contrib/ftp.te | ||
| 25 | index 544c512..12a31dd 100644 | ||
| 26 | --- a/policy/modules/contrib/ftp.te | 25 | --- a/policy/modules/contrib/ftp.te |
| 27 | +++ b/policy/modules/contrib/ftp.te | 26 | +++ b/policy/modules/contrib/ftp.te |
| 28 | @@ -144,6 +144,8 @@ role ftpdctl_roles types ftpdctl_t; | 27 | @@ -148,10 +148,12 @@ init_system_domain(ftpdctl_t, ftpdctl_ex |
| 28 | role ftpdctl_roles types ftpdctl_t; | ||
| 29 | |||
| 29 | type ftpdctl_tmp_t; | 30 | type ftpdctl_tmp_t; |
| 30 | files_tmp_file(ftpdctl_tmp_t) | 31 | files_tmp_file(ftpdctl_tmp_t) |
| 31 | 32 | ||
| @@ -34,6 +35,5 @@ index 544c512..12a31dd 100644 | |||
| 34 | type sftpd_t; | 35 | type sftpd_t; |
| 35 | domain_type(sftpd_t) | 36 | domain_type(sftpd_t) |
| 36 | role system_r types sftpd_t; | 37 | role system_r types sftpd_t; |
| 37 | -- | 38 | |
| 38 | 1.7.10.4 | 39 | type xferlog_t; |
| 39 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-clock.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-clock.patch index 3ff8f55..b2102af 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-clock.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-clock.patch | |||
| @@ -3,20 +3,18 @@ Subject: [PATCH] refpolicy: fix real path for clock | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/system/clock.fc | 1 + | 8 | policy/modules/system/clock.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/system/clock.fc b/policy/modules/system/clock.fc | ||
| 11 | index c5e05ca..a74c40c 100644 | ||
| 12 | --- a/policy/modules/system/clock.fc | 11 | --- a/policy/modules/system/clock.fc |
| 13 | +++ b/policy/modules/system/clock.fc | 12 | +++ b/policy/modules/system/clock.fc |
| 14 | @@ -2,4 +2,5 @@ | 13 | @@ -1,6 +1,7 @@ |
| 14 | |||
| 15 | /etc/adjtime -- gen_context(system_u:object_r:adjtime_t,s0) | 15 | /etc/adjtime -- gen_context(system_u:object_r:adjtime_t,s0) |
| 16 | 16 | ||
| 17 | /sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0) | 17 | /sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0) |
| 18 | +/sbin/hwclock\.util-linux -- gen_context(system_u:object_r:hwclock_exec_t,s0) | 18 | +/sbin/hwclock\.util-linux -- gen_context(system_u:object_r:hwclock_exec_t,s0) |
| 19 | 19 | ||
| 20 | -- | 20 | /usr/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0) |
| 21 | 1.7.11.7 | ||
| 22 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-corecommands.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-corecommands.patch index 24b67c3..3739059 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-corecommands.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-corecommands.patch | |||
| @@ -3,15 +3,16 @@ Subject: [PATCH] refpolicy: fix real path for corecommands | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/kernel/corecommands.fc | 1 + | 8 | policy/modules/kernel/corecommands.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc | ||
| 11 | index f051c4a..ab624f3 100644 | ||
| 12 | --- a/policy/modules/kernel/corecommands.fc | 11 | --- a/policy/modules/kernel/corecommands.fc |
| 13 | +++ b/policy/modules/kernel/corecommands.fc | 12 | +++ b/policy/modules/kernel/corecommands.fc |
| 14 | @@ -153,6 +153,7 @@ ifdef(`distro_gentoo',` | 13 | @@ -154,10 +154,11 @@ ifdef(`distro_gentoo',` |
| 14 | /sbin -d gen_context(system_u:object_r:bin_t,s0) | ||
| 15 | /sbin/.* gen_context(system_u:object_r:bin_t,s0) | ||
| 15 | /sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0) | 16 | /sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0) |
| 16 | /sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0) | 17 | /sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0) |
| 17 | /sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0) | 18 | /sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0) |
| @@ -19,6 +20,5 @@ index f051c4a..ab624f3 100644 | |||
| 19 | 20 | ||
| 20 | # | 21 | # |
| 21 | # /opt | 22 | # /opt |
| 22 | -- | 23 | # |
| 23 | 1.7.11.7 | 24 | /opt/(.*/)?bin(/.*)? gen_context(system_u:object_r:bin_t,s0) |
| 24 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-dmesg.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-dmesg.patch index db4c4d4..2a567da 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-dmesg.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-dmesg.patch | |||
| @@ -3,18 +3,16 @@ Subject: [PATCH] refpolicy: fix real path for dmesg | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/admin/dmesg.fc | 1 + | 8 | policy/modules/admin/dmesg.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/admin/dmesg.fc b/policy/modules/admin/dmesg.fc | ||
| 11 | index d6cc2d9..7f3e5b0 100644 | ||
| 12 | --- a/policy/modules/admin/dmesg.fc | 11 | --- a/policy/modules/admin/dmesg.fc |
| 13 | +++ b/policy/modules/admin/dmesg.fc | 12 | +++ b/policy/modules/admin/dmesg.fc |
| 14 | @@ -1,2 +1,3 @@ | 13 | @@ -1,4 +1,5 @@ |
| 15 | 14 | ||
| 16 | /bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0) | 15 | /bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0) |
| 17 | +/bin/dmesg\.util-linux -- gen_context(system_u:object_r:dmesg_exec_t,s0) | 16 | +/bin/dmesg\.util-linux -- gen_context(system_u:object_r:dmesg_exec_t,s0) |
| 18 | -- | 17 | |
| 19 | 1.7.11.7 | 18 | /usr/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0) |
| 20 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-bind.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-bind.patch index 59ba5bc..3218c88 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-bind.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-bind.patch | |||
| @@ -6,15 +6,14 @@ Subject: [PATCH] refpolicy: fix real path for bind. | |||
| 6 | Upstream-Status: Inappropriate [configuration] | 6 | Upstream-Status: Inappropriate [configuration] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/bind.fc | 2 ++ | 11 | policy/modules/contrib/bind.fc | 2 ++ |
| 11 | 1 file changed, 2 insertions(+) | 12 | 1 file changed, 2 insertions(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/contrib/bind.fc b/policy/modules/contrib/bind.fc | ||
| 14 | index 2b9a3a1..fd45d53 100644 | ||
| 15 | --- a/policy/modules/contrib/bind.fc | 14 | --- a/policy/modules/contrib/bind.fc |
| 16 | +++ b/policy/modules/contrib/bind.fc | 15 | +++ b/policy/modules/contrib/bind.fc |
| 17 | @@ -1,8 +1,10 @@ | 16 | @@ -1,10 +1,12 @@ |
| 18 | /etc/rc\.d/init\.d/named -- gen_context(system_u:object_r:named_initrc_exec_t,s0) | 17 | /etc/rc\.d/init\.d/named -- gen_context(system_u:object_r:named_initrc_exec_t,s0) |
| 19 | +/etc/rc\.d/init\.d/bind -- gen_context(system_u:object_r:named_initrc_exec_t,s0) | 18 | +/etc/rc\.d/init\.d/bind -- gen_context(system_u:object_r:named_initrc_exec_t,s0) |
| 20 | /etc/rc\.d/init\.d/unbound -- gen_context(system_u:object_r:named_initrc_exec_t,s0) | 19 | /etc/rc\.d/init\.d/unbound -- gen_context(system_u:object_r:named_initrc_exec_t,s0) |
| @@ -25,6 +24,5 @@ index 2b9a3a1..fd45d53 100644 | |||
| 25 | /etc/bind/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0) | 24 | /etc/bind/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0) |
| 26 | /etc/dnssec-trigger/dnssec_trigger_server\.key -- gen_context(system_u:object_r:dnssec_t,s0) | 25 | /etc/dnssec-trigger/dnssec_trigger_server\.key -- gen_context(system_u:object_r:dnssec_t,s0) |
| 27 | /etc/named\.rfc1912\.zones -- gen_context(system_u:object_r:named_conf_t,s0) | 26 | /etc/named\.rfc1912\.zones -- gen_context(system_u:object_r:named_conf_t,s0) |
| 28 | -- | 27 | /etc/named\.root\.hints -- gen_context(system_u:object_r:named_conf_t,s0) |
| 29 | 1.7.9.5 | 28 | /etc/named\.conf -- gen_context(system_u:object_r:named_conf_t,s0) |
| 30 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_login.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_login.patch index 427181e..dfb7544 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_login.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_login.patch | |||
| @@ -3,15 +3,14 @@ Subject: [PATCH] fix real path for login commands. | |||
| 3 | Upstream-Status: Inappropriate [only for Poky] | 3 | Upstream-Status: Inappropriate [only for Poky] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/system/authlogin.fc | 7 ++++--- | 8 | policy/modules/system/authlogin.fc | 7 ++++--- |
| 8 | 1 files changed, 4 insertions(+), 3 deletions(-) | 9 | 1 files changed, 4 insertions(+), 3 deletions(-) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc | ||
| 11 | index 28ad538..c8dd17f 100644 | ||
| 12 | --- a/policy/modules/system/authlogin.fc | 11 | --- a/policy/modules/system/authlogin.fc |
| 13 | +++ b/policy/modules/system/authlogin.fc | 12 | +++ b/policy/modules/system/authlogin.fc |
| 14 | @@ -1,5 +1,7 @@ | 13 | @@ -1,19 +1,21 @@ |
| 15 | 14 | ||
| 16 | /bin/login -- gen_context(system_u:object_r:login_exec_t,s0) | 15 | /bin/login -- gen_context(system_u:object_r:login_exec_t,s0) |
| 17 | +/bin/login\.shadow -- gen_context(system_u:object_r:login_exec_t,s0) | 16 | +/bin/login\.shadow -- gen_context(system_u:object_r:login_exec_t,s0) |
| @@ -19,19 +18,20 @@ index 28ad538..c8dd17f 100644 | |||
| 19 | 18 | ||
| 20 | /etc/\.pwd\.lock -- gen_context(system_u:object_r:shadow_t,s0) | 19 | /etc/\.pwd\.lock -- gen_context(system_u:object_r:shadow_t,s0) |
| 21 | /etc/group\.lock -- gen_context(system_u:object_r:shadow_t,s0) | 20 | /etc/group\.lock -- gen_context(system_u:object_r:shadow_t,s0) |
| 22 | @@ -9,9 +11,9 @@ | 21 | /etc/gshadow.* -- gen_context(system_u:object_r:shadow_t,s0) |
| 22 | /etc/passwd\.lock -- gen_context(system_u:object_r:shadow_t,s0) | ||
| 23 | /etc/shadow.* -- gen_context(system_u:object_r:shadow_t,s0) | ||
| 23 | 24 | ||
| 24 | /sbin/pam_console_apply -- gen_context(system_u:object_r:pam_console_exec_t,s0) | 25 | /sbin/pam_console_apply -- gen_context(system_u:object_r:pam_console_exec_t,s0) |
| 25 | /sbin/pam_timestamp_check -- gen_context(system_u:object_r:pam_exec_t,s0) | 26 | /sbin/pam_timestamp_check -- gen_context(system_u:object_r:pam_exec_t,s0) |
| 26 | -/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) | 27 | -/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) |
| 27 | -/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0) | 28 | -/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0) |
| 28 | -/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0) | 29 | -/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0) |
| 29 | +/usr/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) | 30 | +/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) |
| 30 | +/usr/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0) | 31 | +/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0) |
| 31 | +/usr/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0) | 32 | +/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0) |
| 32 | ifdef(`distro_suse', ` | 33 | ifdef(`distro_suse', ` |
| 33 | /sbin/unix2_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) | 34 | /sbin/unix2_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) |
| 34 | ') | 35 | ') |
| 35 | -- | 36 | |
| 36 | 1.7.5.4 | 37 | /usr/bin/login -- gen_context(system_u:object_r:login_exec_t,s0) |
| 37 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_resolv.conf.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_resolv.conf.patch index 80cca67..b90b744 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_resolv.conf.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_resolv.conf.patch | |||
| @@ -3,15 +3,16 @@ Subject: [PATCH] fix real path for resolv.conf | |||
| 3 | Upstream-Status: Inappropriate [only for Poky] | 3 | Upstream-Status: Inappropriate [only for Poky] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/system/sysnetwork.fc | 1 + | 8 | policy/modules/system/sysnetwork.fc | 1 + |
| 8 | 1 files changed, 1 insertions(+), 0 deletions(-) | 9 | 1 files changed, 1 insertions(+), 0 deletions(-) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc | ||
| 11 | index 346a7cc..dec8632 100644 | ||
| 12 | --- a/policy/modules/system/sysnetwork.fc | 11 | --- a/policy/modules/system/sysnetwork.fc |
| 13 | +++ b/policy/modules/system/sysnetwork.fc | 12 | +++ b/policy/modules/system/sysnetwork.fc |
| 14 | @@ -24,6 +24,7 @@ ifdef(`distro_debian',` | 13 | @@ -23,10 +23,11 @@ ifdef(`distro_debian',` |
| 14 | /etc/ethers -- gen_context(system_u:object_r:net_conf_t,s0) | ||
| 15 | /etc/hosts -- gen_context(system_u:object_r:net_conf_t,s0) | ||
| 15 | /etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0) | 16 | /etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0) |
| 16 | /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0) | 17 | /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0) |
| 17 | /etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) | 18 | /etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) |
| @@ -19,6 +20,5 @@ index 346a7cc..dec8632 100644 | |||
| 19 | /etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) | 20 | /etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) |
| 20 | 21 | ||
| 21 | /etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0) | 22 | /etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0) |
| 22 | -- | 23 | /etc/dhcp3?/dhclient.* gen_context(system_u:object_r:dhcp_etc_t,s0) |
| 23 | 1.7.5.4 | 24 | |
| 24 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_shadow.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_shadow.patch index 29ac2c3..9819c1d 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_shadow.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_shadow.patch | |||
| @@ -3,15 +3,16 @@ Subject: [PATCH] fix real path for shadow commands. | |||
| 3 | Upstream-Status: Inappropriate [only for Poky] | 3 | Upstream-Status: Inappropriate [only for Poky] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/admin/usermanage.fc | 6 ++++++ | 8 | policy/modules/admin/usermanage.fc | 6 ++++++ |
| 8 | 1 file changed, 6 insertions(+) | 9 | 1 file changed, 6 insertions(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/admin/usermanage.fc b/policy/modules/admin/usermanage.fc | ||
| 11 | index f82f0ce..841ba9b 100644 | ||
| 12 | --- a/policy/modules/admin/usermanage.fc | 11 | --- a/policy/modules/admin/usermanage.fc |
| 13 | +++ b/policy/modules/admin/usermanage.fc | 12 | +++ b/policy/modules/admin/usermanage.fc |
| 14 | @@ -4,11 +4,17 @@ ifdef(`distro_gentoo',` | 13 | @@ -6,15 +6,21 @@ ifdef(`distro_debian',` |
| 14 | /etc/cron\.daily/cracklib-runtime -- gen_context(system_u:object_r:crack_exec_t,s0) | ||
| 15 | ') | ||
| 15 | 16 | ||
| 16 | /usr/bin/chage -- gen_context(system_u:object_r:passwd_exec_t,s0) | 17 | /usr/bin/chage -- gen_context(system_u:object_r:passwd_exec_t,s0) |
| 17 | /usr/bin/chfn -- gen_context(system_u:object_r:chfn_exec_t,s0) | 18 | /usr/bin/chfn -- gen_context(system_u:object_r:chfn_exec_t,s0) |
| @@ -29,6 +30,5 @@ index f82f0ce..841ba9b 100644 | |||
| 29 | 30 | ||
| 30 | /usr/lib/cracklib_dict.* -- gen_context(system_u:object_r:crack_db_t,s0) | 31 | /usr/lib/cracklib_dict.* -- gen_context(system_u:object_r:crack_db_t,s0) |
| 31 | 32 | ||
| 32 | -- | 33 | /usr/sbin/crack_[a-z]* -- gen_context(system_u:object_r:crack_exec_t,s0) |
| 33 | 1.7.9.5 | 34 | /usr/sbin/cracklib-[a-z]* -- gen_context(system_u:object_r:crack_exec_t,s0) |
| 34 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_su.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_su.patch index b0392ce..b8597f9 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_su.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_su.patch | |||
| @@ -6,20 +6,17 @@ Subject: [PATCH] fix real path for su.shadow command | |||
| 6 | Upstream-Status: Inappropriate [only for Poky] | 6 | Upstream-Status: Inappropriate [only for Poky] |
| 7 | 7 | ||
| 8 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | 8 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/admin/su.fc | 2 ++ | 11 | policy/modules/admin/su.fc | 2 ++ |
| 11 | 1 file changed, 2 insertions(+) | 12 | 1 file changed, 2 insertions(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc | ||
| 14 | index a563687..0f43827 100644 | ||
| 15 | --- a/policy/modules/admin/su.fc | 14 | --- a/policy/modules/admin/su.fc |
| 16 | +++ b/policy/modules/admin/su.fc | 15 | +++ b/policy/modules/admin/su.fc |
| 17 | @@ -4,3 +4,5 @@ | 16 | @@ -2,5 +2,6 @@ |
| 17 | /bin/su -- gen_context(system_u:object_r:su_exec_t,s0) | ||
| 18 | 18 | ||
| 19 | /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) | 19 | /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) |
| 20 | /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) | 20 | /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) |
| 21 | + | 21 | /usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0) |
| 22 | +/bin/su.shadow -- gen_context(system_u:object_r:su_exec_t,s0) | 22 | +/bin/su.shadow -- gen_context(system_u:object_r:su_exec_t,s0) |
| 23 | -- | ||
| 24 | 1.7.9.5 | ||
| 25 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fstools.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fstools.patch index 9c45694..66bef0f 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fstools.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fstools.patch | |||
| @@ -12,11 +12,9 @@ Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com> | |||
| 12 | policy/modules/system/fstools.fc | 9 +++++++++ | 12 | policy/modules/system/fstools.fc | 9 +++++++++ |
| 13 | 1 file changed, 9 insertions(+) | 13 | 1 file changed, 9 insertions(+) |
| 14 | 14 | ||
| 15 | diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc | ||
| 16 | index d10368d..f22761a 100644 | ||
| 17 | --- a/policy/modules/system/fstools.fc | 15 | --- a/policy/modules/system/fstools.fc |
| 18 | +++ b/policy/modules/system/fstools.fc | 16 | +++ b/policy/modules/system/fstools.fc |
| 19 | @@ -1,6 +1,8 @@ | 17 | @@ -1,19 +1,23 @@ |
| 20 | /sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 18 | /sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 21 | /sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 19 | /sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 22 | +/sbin/blkid/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 20 | +/sbin/blkid/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| @@ -25,20 +23,24 @@ index d10368d..f22761a 100644 | |||
| 25 | /sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 23 | /sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 26 | /sbin/dosfsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 24 | /sbin/dosfsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 27 | /sbin/dump -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 25 | /sbin/dump -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 28 | @@ -9,9 +11,12 @@ | 26 | /sbin/dumpe2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 27 | /sbin/e2fsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 29 | /sbin/e4fsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 28 | /sbin/e4fsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 30 | /sbin/e2label -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 29 | /sbin/e2label -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 31 | /sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 30 | /sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 32 | +/sbin/fdisk/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 31 | +/sbin/fdisk/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 33 | /sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 32 | /sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 34 | +/usr/sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 35 | /sbin/fsck.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 33 | /sbin/fsck.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 36 | /sbin/hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 34 | /sbin/hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 37 | +/sbin/hdparm/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 35 | +/sbin/hdparm/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 38 | /sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 36 | /sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 39 | /sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 37 | /sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 40 | /sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 38 | /sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 41 | @@ -24,6 +29,7 @@ | 39 | /sbin/lsraid -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 40 | /sbin/make_reiser4 -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 41 | @@ -22,20 +26,22 @@ | ||
| 42 | /sbin/mke4fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 43 | /sbin/mkfs.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 42 | /sbin/mkraid -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 44 | /sbin/mkraid -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 43 | /sbin/mkreiserfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 45 | /sbin/mkreiserfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 44 | /sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 46 | /sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| @@ -46,25 +48,28 @@ index d10368d..f22761a 100644 | |||
| 46 | /sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 48 | /sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 47 | /sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 49 | /sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 48 | /sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 50 | /sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 49 | @@ -32,8 +38,10 @@ | 51 | /sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 52 | /sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 50 | /sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 53 | /sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 51 | /sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 54 | /sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 52 | /sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 55 | /sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 53 | +/usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 54 | /sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 56 | /sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 55 | /sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 57 | /sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 56 | +/sbin/swapoff/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 58 | +/sbin/swapoff/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 57 | /sbin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 59 | /sbin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 58 | /sbin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 60 | /sbin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 59 | /sbin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 61 | /sbin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 60 | @@ -45,6 +53,7 @@ | 62 | /sbin/zhack -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 61 | 63 | /sbin/zinject -- gen_context(system_u:object_r:fsadm_exec_t,s0) | |
| 62 | /usr/bin/partition_uuid -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 64 | @@ -83,10 +89,11 @@ |
| 63 | /usr/bin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 65 | /usr/sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 66 | /usr/sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 67 | /usr/sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 68 | /usr/sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 69 | /usr/sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0) | ||
| 64 | +/usr/sbin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 70 | +/usr/sbin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 65 | /usr/bin/scsi_unique_id -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 71 | /usr/sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 66 | /usr/bin/syslinux -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 72 | /usr/sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 67 | 73 | /usr/sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0) | |
| 68 | -- | 74 | /usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 69 | 1.7.9.5 | 75 | /usr/sbin/smartctl -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
| 70 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ftpwho-dir.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ftpwho-dir.patch index a7d434f..d58de6a 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ftpwho-dir.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ftpwho-dir.patch | |||
| @@ -5,23 +5,23 @@ Upstream-Status: Pending | |||
| 5 | ftpwho is installed into /usr/bin/, not /usr/sbin, so fix it | 5 | ftpwho is installed into /usr/bin/, not /usr/sbin, so fix it |
| 6 | 6 | ||
| 7 | Signed-off-by: Roy Li <rongqing.li@windriver.com> | 7 | Signed-off-by: Roy Li <rongqing.li@windriver.com> |
| 8 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 8 | --- | 9 | --- |
| 9 | policy/modules/contrib/ftp.fc | 2 +- | 10 | policy/modules/contrib/ftp.fc | 2 +- |
| 10 | 1 file changed, 1 insertion(+), 1 deletion(-) | 11 | 1 file changed, 1 insertion(+), 1 deletion(-) |
| 11 | 12 | ||
| 12 | diff --git a/policy/modules/contrib/ftp.fc b/policy/modules/contrib/ftp.fc | ||
| 13 | index ddb75c1..26fec47 100644 | ||
| 14 | --- a/policy/modules/contrib/ftp.fc | 13 | --- a/policy/modules/contrib/ftp.fc |
| 15 | +++ b/policy/modules/contrib/ftp.fc | 14 | +++ b/policy/modules/contrib/ftp.fc |
| 16 | @@ -9,7 +9,7 @@ | 15 | @@ -10,11 +10,11 @@ |
| 17 | |||
| 18 | /usr/kerberos/sbin/ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) | 16 | /usr/kerberos/sbin/ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 19 | 17 | ||
| 18 | /usr/lib/systemd/system/proftpd.*\.service -- gen_context(system_u:object_r:ftpd_unit_t,s0) | ||
| 19 | /usr/lib/systemd/system/vsftpd.*\.service -- gen_context(system_u:object_r:ftpd_unit_t,s0) | ||
| 20 | |||
| 20 | -/usr/sbin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0) | 21 | -/usr/sbin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 21 | +/usr/bin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0) | 22 | +/usr/bin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 22 | /usr/sbin/in\.ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) | 23 | /usr/sbin/in\.ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 23 | /usr/sbin/muddleftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) | 24 | /usr/sbin/muddleftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 24 | /usr/sbin/proftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) | 25 | /usr/sbin/proftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 25 | -- | 26 | /usr/sbin/vsftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) |
| 26 | 1.7.10.4 | 27 | |
| 27 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-iptables.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-iptables.patch index 89b1547..9e1196a 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-iptables.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-iptables.patch | |||
| @@ -3,22 +3,22 @@ Subject: [PATCH] refpolicy: fix real path for iptables | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/system/iptables.fc | 1 + | 8 | policy/modules/system/iptables.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc | ||
| 11 | index 14cffd2..84ac92b 100644 | ||
| 12 | --- a/policy/modules/system/iptables.fc | 11 | --- a/policy/modules/system/iptables.fc |
| 13 | +++ b/policy/modules/system/iptables.fc | 12 | +++ b/policy/modules/system/iptables.fc |
| 14 | @@ -13,6 +13,7 @@ | 13 | @@ -14,10 +14,11 @@ |
| 14 | /sbin/ipvsadm -- gen_context(system_u:object_r:iptables_exec_t,s0) | ||
| 15 | /sbin/ipvsadm-restore -- gen_context(system_u:object_r:iptables_exec_t,s0) | 15 | /sbin/ipvsadm-restore -- gen_context(system_u:object_r:iptables_exec_t,s0) |
| 16 | /sbin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0) | 16 | /sbin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0) |
| 17 | /sbin/nft -- gen_context(system_u:object_r:iptables_exec_t,s0) | ||
| 17 | /sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) | 18 | /sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) |
| 18 | +/usr/sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) | 19 | +/usr/sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) |
| 19 | 20 | ||
| 20 | /usr/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0) | 21 | /usr/lib/systemd/system/[^/]*arptables.* -- gen_context(system_u:object_r:iptables_unit_t,s0) |
| 21 | /usr/sbin/iptables -- gen_context(system_u:object_r:iptables_exec_t,s0) | 22 | /usr/lib/systemd/system/[^/]*ebtables.* -- gen_context(system_u:object_r:iptables_unit_t,s0) |
| 22 | -- | 23 | /usr/lib/systemd/system/[^/]*ip6tables.* -- gen_context(system_u:object_r:iptables_unit_t,s0) |
| 23 | 1.7.11.7 | 24 | /usr/lib/systemd/system/[^/]*iptables.* -- gen_context(system_u:object_r:iptables_unit_t,s0) |
| 24 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-mta.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-mta.patch index bbd83ec..5d2b0cf 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-mta.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-mta.patch | |||
| @@ -6,15 +6,16 @@ Subject: [PATCH] refpolicy: fix real path for mta | |||
| 6 | Upstream-Status: Inappropriate [configuration] | 6 | Upstream-Status: Inappropriate [configuration] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/mta.fc | 1 + | 11 | policy/modules/contrib/mta.fc | 1 + |
| 11 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/contrib/mta.fc b/policy/modules/contrib/mta.fc | ||
| 14 | index f42896c..0d4bcef 100644 | ||
| 15 | --- a/policy/modules/contrib/mta.fc | 14 | --- a/policy/modules/contrib/mta.fc |
| 16 | +++ b/policy/modules/contrib/mta.fc | 15 | +++ b/policy/modules/contrib/mta.fc |
| 17 | @@ -22,6 +22,7 @@ HOME_DIR/\.maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0) | 16 | @@ -20,10 +20,11 @@ HOME_DIR/\.maildir(/.*)? gen_context(sys |
| 17 | /usr/lib/courier/bin/sendmail -- gen_context(system_u:object_r:sendmail_exec_t,s0) | ||
| 18 | |||
| 18 | /usr/sbin/rmail -- gen_context(system_u:object_r:sendmail_exec_t,s0) | 19 | /usr/sbin/rmail -- gen_context(system_u:object_r:sendmail_exec_t,s0) |
| 19 | /usr/sbin/sendmail\.postfix -- gen_context(system_u:object_r:sendmail_exec_t,s0) | 20 | /usr/sbin/sendmail\.postfix -- gen_context(system_u:object_r:sendmail_exec_t,s0) |
| 20 | /usr/sbin/sendmail(\.sendmail)? -- gen_context(system_u:object_r:sendmail_exec_t,s0) | 21 | /usr/sbin/sendmail(\.sendmail)? -- gen_context(system_u:object_r:sendmail_exec_t,s0) |
| @@ -22,6 +23,5 @@ index f42896c..0d4bcef 100644 | |||
| 22 | /usr/sbin/ssmtp -- gen_context(system_u:object_r:sendmail_exec_t,s0) | 23 | /usr/sbin/ssmtp -- gen_context(system_u:object_r:sendmail_exec_t,s0) |
| 23 | 24 | ||
| 24 | /var/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0) | 25 | /var/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0) |
| 25 | -- | 26 | |
| 26 | 1.7.9.5 | 27 | /var/qmail/bin/sendmail -- gen_context(system_u:object_r:sendmail_exec_t,s0) |
| 27 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-netutils.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-netutils.patch index b45d03e..b41e6e4 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-netutils.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-netutils.patch | |||
| @@ -3,22 +3,22 @@ Subject: [PATCH] refpolicy: fix real path for netutils | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/admin/netutils.fc | 1 + | 8 | policy/modules/admin/netutils.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/admin/netutils.fc b/policy/modules/admin/netutils.fc | ||
| 11 | index 407078f..f2ed3dc 100644 | ||
| 12 | --- a/policy/modules/admin/netutils.fc | 11 | --- a/policy/modules/admin/netutils.fc |
| 13 | +++ b/policy/modules/admin/netutils.fc | 12 | +++ b/policy/modules/admin/netutils.fc |
| 14 | @@ -3,6 +3,7 @@ | 13 | @@ -1,10 +1,11 @@ |
| 14 | /bin/ping.* -- gen_context(system_u:object_r:ping_exec_t,s0) | ||
| 15 | /bin/tracepath.* -- gen_context(system_u:object_r:traceroute_exec_t,s0) | ||
| 15 | /bin/traceroute.* -- gen_context(system_u:object_r:traceroute_exec_t,s0) | 16 | /bin/traceroute.* -- gen_context(system_u:object_r:traceroute_exec_t,s0) |
| 16 | 17 | ||
| 17 | /sbin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) | 18 | /sbin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) |
| 18 | +/bin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) | 19 | +/bin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) |
| 19 | 20 | ||
| 21 | /usr/bin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) | ||
| 20 | /usr/bin/lft -- gen_context(system_u:object_r:traceroute_exec_t,s0) | 22 | /usr/bin/lft -- gen_context(system_u:object_r:traceroute_exec_t,s0) |
| 21 | /usr/bin/nmap -- gen_context(system_u:object_r:traceroute_exec_t,s0) | 23 | /usr/bin/nmap -- gen_context(system_u:object_r:traceroute_exec_t,s0) |
| 22 | -- | 24 | /usr/bin/ping.* -- gen_context(system_u:object_r:ping_exec_t,s0) |
| 23 | 1.7.11.7 | ||
| 24 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-nscd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-nscd.patch index 1db328c..0adf7c2 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-nscd.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-nscd.patch | |||
| @@ -6,15 +6,14 @@ Subject: [PATCH] refpolicy: fix real path for nscd | |||
| 6 | Upstream-Status: Inappropriate [configuration] | 6 | Upstream-Status: Inappropriate [configuration] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/nscd.fc | 1 + | 11 | policy/modules/contrib/nscd.fc | 1 + |
| 11 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/contrib/nscd.fc b/policy/modules/contrib/nscd.fc | ||
| 14 | index ba64485..61a6f24 100644 | ||
| 15 | --- a/policy/modules/contrib/nscd.fc | 14 | --- a/policy/modules/contrib/nscd.fc |
| 16 | +++ b/policy/modules/contrib/nscd.fc | 15 | +++ b/policy/modules/contrib/nscd.fc |
| 17 | @@ -1,6 +1,7 @@ | 16 | @@ -1,8 +1,9 @@ |
| 18 | /etc/rc\.d/init\.d/nscd -- gen_context(system_u:object_r:nscd_initrc_exec_t,s0) | 17 | /etc/rc\.d/init\.d/nscd -- gen_context(system_u:object_r:nscd_initrc_exec_t,s0) |
| 19 | 18 | ||
| 20 | /usr/sbin/nscd -- gen_context(system_u:object_r:nscd_exec_t,s0) | 19 | /usr/sbin/nscd -- gen_context(system_u:object_r:nscd_exec_t,s0) |
| @@ -22,6 +21,5 @@ index ba64485..61a6f24 100644 | |||
| 22 | 21 | ||
| 23 | /var/cache/nscd(/.*)? gen_context(system_u:object_r:nscd_var_run_t,s0) | 22 | /var/cache/nscd(/.*)? gen_context(system_u:object_r:nscd_var_run_t,s0) |
| 24 | 23 | ||
| 25 | -- | 24 | /var/db/nscd(/.*)? gen_context(system_u:object_r:nscd_var_run_t,s0) |
| 26 | 1.7.9.5 | 25 | |
| 27 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-rpm.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-rpm.patch index 7ba3380..9de7532 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-rpm.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-rpm.patch | |||
| @@ -6,20 +6,18 @@ Subject: [PATCH] refpolicy: fix real path for cpio | |||
| 6 | Upstream-Status: Inappropriate [configuration] | 6 | Upstream-Status: Inappropriate [configuration] |
| 7 | 7 | ||
| 8 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | 8 | Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/rpm.fc | 1 + | 11 | policy/modules/contrib/rpm.fc | 1 + |
| 11 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/contrib/rpm.fc b/policy/modules/contrib/rpm.fc | ||
| 14 | index ebe91fc..539063c 100644 | ||
| 15 | --- a/policy/modules/contrib/rpm.fc | 14 | --- a/policy/modules/contrib/rpm.fc |
| 16 | +++ b/policy/modules/contrib/rpm.fc | 15 | +++ b/policy/modules/contrib/rpm.fc |
| 17 | @@ -58,4 +58,5 @@ ifdef(`distro_redhat',` | 16 | @@ -61,6 +61,7 @@ ifdef(`distro_redhat',` |
| 17 | /run/yum.* -- gen_context(system_u:object_r:rpm_var_run_t,s0) | ||
| 18 | /run/PackageKit(/.*)? gen_context(system_u:object_r:rpm_var_run_t,s0) | ||
| 18 | 19 | ||
| 19 | ifdef(`enable_mls',` | 20 | ifdef(`enable_mls',` |
| 20 | /usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0) | 21 | /usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0) |
| 21 | +/bin/cpio.cpio -- gen_context(system_u:object_r:rpm_exec_t,s0) | 22 | +/bin/cpio.cpio -- gen_context(system_u:object_r:rpm_exec_t,s0) |
| 22 | ') | 23 | ') |
| 23 | -- | ||
| 24 | 1.7.9.5 | ||
| 25 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-screen.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-screen.patch index 3218194..8ea210e 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-screen.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-screen.patch | |||
| @@ -6,22 +6,18 @@ Subject: [PATCH] refpolicy: fix real path for screen | |||
| 6 | Upstream-Status: Inappropriate [configuration] | 6 | Upstream-Status: Inappropriate [configuration] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/screen.fc | 1 + | 11 | policy/modules/contrib/screen.fc | 1 + |
| 11 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/contrib/screen.fc b/policy/modules/contrib/screen.fc | ||
| 14 | index e7c2cf7..49ddca2 100644 | ||
| 15 | --- a/policy/modules/contrib/screen.fc | 14 | --- a/policy/modules/contrib/screen.fc |
| 16 | +++ b/policy/modules/contrib/screen.fc | 15 | +++ b/policy/modules/contrib/screen.fc |
| 17 | @@ -3,6 +3,7 @@ HOME_DIR/\.screenrc -- gen_context(system_u:object_r:screen_home_t,s0) | 16 | @@ -4,6 +4,7 @@ HOME_DIR/\.tmux\.conf -- gen_context(sys |
| 18 | HOME_DIR/\.tmux\.conf -- gen_context(system_u:object_r:screen_home_t,s0) | ||
| 19 | 17 | ||
| 20 | /usr/bin/screen -- gen_context(system_u:object_r:screen_exec_t,s0) | 18 | /run/screen(/.*)? gen_context(system_u:object_r:screen_runtime_t,s0) |
| 21 | +/usr/bin/screen-.* -- gen_context(system_u:object_r:screen_exec_t,s0) | 19 | /run/tmux(/.*)? gen_context(system_u:object_r:screen_runtime_t,s0) |
| 22 | /usr/bin/tmux -- gen_context(system_u:object_r:screen_exec_t,s0) | ||
| 23 | 20 | ||
| 24 | /var/run/screen(/.*)? gen_context(system_u:object_r:screen_var_run_t,s0) | 21 | /usr/bin/screen -- gen_context(system_u:object_r:screen_exec_t,s0) |
| 25 | -- | 22 | +/usr/bin/screen-.* -- gen_context(system_u:object_r:screen_exec_t,s0) |
| 26 | 1.7.9.5 | 23 | /usr/bin/tmux -- gen_context(system_u:object_r:screen_exec_t,s0) |
| 27 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ssh.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ssh.patch index 9aeb3a2..a01e2eb 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ssh.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ssh.patch | |||
| @@ -3,22 +3,22 @@ Subject: [PATCH] refpolicy: fix real path for ssh | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/services/ssh.fc | 1 + | 8 | policy/modules/services/ssh.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc | ||
| 11 | index 078bcd7..9717428 100644 | ||
| 12 | --- a/policy/modules/services/ssh.fc | 11 | --- a/policy/modules/services/ssh.fc |
| 13 | +++ b/policy/modules/services/ssh.fc | 12 | +++ b/policy/modules/services/ssh.fc |
| 14 | @@ -6,6 +6,7 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0) | 13 | @@ -2,10 +2,11 @@ HOME_DIR/\.ssh(/.*)? gen_context(syste |
| 15 | /etc/ssh/ssh_host_rsa_key -- gen_context(system_u:object_r:sshd_key_t,s0) | 14 | |
| 15 | /etc/ssh/primes -- gen_context(system_u:object_r:sshd_key_t,s0) | ||
| 16 | /etc/ssh/ssh_host.*_key -- gen_context(system_u:object_r:sshd_key_t,s0) | ||
| 16 | 17 | ||
| 17 | /usr/bin/ssh -- gen_context(system_u:object_r:ssh_exec_t,s0) | 18 | /usr/bin/ssh -- gen_context(system_u:object_r:ssh_exec_t,s0) |
| 18 | +/usr/bin/ssh\.openssh -- gen_context(system_u:object_r:ssh_exec_t,s0) | 19 | +/usr/bin/ssh\.openssh -- gen_context(system_u:object_r:ssh_exec_t,s0) |
| 19 | /usr/bin/ssh-agent -- gen_context(system_u:object_r:ssh_agent_exec_t,s0) | 20 | /usr/bin/ssh-agent -- gen_context(system_u:object_r:ssh_agent_exec_t,s0) |
| 20 | /usr/bin/ssh-keygen -- gen_context(system_u:object_r:ssh_keygen_exec_t,s0) | 21 | /usr/bin/ssh-keygen -- gen_context(system_u:object_r:ssh_keygen_exec_t,s0) |
| 21 | 22 | ||
| 22 | -- | 23 | /usr/lib/openssh/ssh-keysign -- gen_context(system_u:object_r:ssh_keysign_exec_t,s0) |
| 23 | 1.7.11.7 | 24 | /usr/lib/ssh/ssh-keysign -- gen_context(system_u:object_r:ssh_keysign_exec_t,s0) |
| 24 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-su.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-su.patch index 358e4ef..e3d156e 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-su.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-su.patch | |||
| @@ -3,21 +3,18 @@ Subject: [PATCH] refpolicy: fix real path for su | |||
| 3 | Upstream-Status: Inappropriate [configuration] | 3 | Upstream-Status: Inappropriate [configuration] |
| 4 | 4 | ||
| 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 5 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 6 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 6 | --- | 7 | --- |
| 7 | policy/modules/admin/su.fc | 1 + | 8 | policy/modules/admin/su.fc | 1 + |
| 8 | 1 file changed, 1 insertion(+) | 9 | 1 file changed, 1 insertion(+) |
| 9 | 10 | ||
| 10 | diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc | ||
| 11 | index 688abc2..a563687 100644 | ||
| 12 | --- a/policy/modules/admin/su.fc | 11 | --- a/policy/modules/admin/su.fc |
| 13 | +++ b/policy/modules/admin/su.fc | 12 | +++ b/policy/modules/admin/su.fc |
| 14 | @@ -1,5 +1,6 @@ | 13 | @@ -1,6 +1,7 @@ |
| 15 | 14 | ||
| 16 | /bin/su -- gen_context(system_u:object_r:su_exec_t,s0) | 15 | /bin/su -- gen_context(system_u:object_r:su_exec_t,s0) |
| 17 | +/usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0) | 16 | +/usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0) |
| 18 | 17 | ||
| 19 | /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) | 18 | /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) |
| 20 | /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) | 19 | /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) |
| 21 | -- | 20 | /usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0) |
| 22 | 1.7.11.7 | ||
| 23 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-subs_dist.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-subs_dist.patch index cfec7d9..c5fdc51 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-subs_dist.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-subs_dist.patch | |||
| @@ -13,10 +13,14 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 13 | 13 | ||
| 14 | --- a/config/file_contexts.subs_dist | 14 | --- a/config/file_contexts.subs_dist |
| 15 | +++ b/config/file_contexts.subs_dist | 15 | +++ b/config/file_contexts.subs_dist |
| 16 | @@ -19,3 +19,13 @@ | 16 | @@ -21,5 +21,17 @@ |
| 17 | /usr/local/lib64 /usr/lib | 17 | |
| 18 | /usr/local/lib /usr/lib | 18 | # backward compatibility |
| 19 | /var/run/lock /var/lock | 19 | # not for refpolicy intern, but for /var/run using applications, |
| 20 | # like systemd tmpfiles or systemd socket configurations | ||
| 21 | /var/run /run | ||
| 22 | + | ||
| 23 | +# Yocto compatibility | ||
| 20 | +/var/volatile/log /var/log | 24 | +/var/volatile/log /var/log |
| 21 | +/var/volatile/run /var/run | 25 | +/var/volatile/run /var/run |
| 22 | +/var/volatile/cache /var/cache | 26 | +/var/volatile/cache /var/cache |
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-sysnetwork.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-sysnetwork.patch index 64f497d..fa369ca 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-sysnetwork.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-sysnetwork.patch | |||
| @@ -7,15 +7,16 @@ Upstream-Status: Inappropriate [configuration] | |||
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> | 9 | Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> |
| 10 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 10 | --- | 11 | --- |
| 11 | policy/modules/system/sysnetwork.fc | 4 ++++ | 12 | policy/modules/system/sysnetwork.fc | 4 ++++ |
| 12 | 1 file changed, 4 insertions(+) | 13 | 1 file changed, 4 insertions(+) |
| 13 | 14 | ||
| 14 | diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc | ||
| 15 | index fbb935c..a194622 100644 | ||
| 16 | --- a/policy/modules/system/sysnetwork.fc | 15 | --- a/policy/modules/system/sysnetwork.fc |
| 17 | +++ b/policy/modules/system/sysnetwork.fc | 16 | +++ b/policy/modules/system/sysnetwork.fc |
| 18 | @@ -4,6 +4,7 @@ | 17 | @@ -2,10 +2,11 @@ |
| 18 | # | ||
| 19 | # /bin | ||
| 19 | # | 20 | # |
| 20 | /bin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 21 | /bin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 21 | /bin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 22 | /bin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| @@ -23,17 +24,19 @@ index fbb935c..a194622 100644 | |||
| 23 | 24 | ||
| 24 | # | 25 | # |
| 25 | # /dev | 26 | # /dev |
| 26 | @@ -43,7 +44,9 @@ ifdef(`distro_redhat',` | 27 | # |
| 28 | ifdef(`distro_debian',` | ||
| 29 | @@ -43,17 +44,19 @@ ifdef(`distro_redhat',` | ||
| 30 | /sbin/dhclient.* -- gen_context(system_u:object_r:dhcpc_exec_t,s0) | ||
| 27 | /sbin/dhcdbd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) | 31 | /sbin/dhcdbd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) |
| 28 | /sbin/dhcpcd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) | 32 | /sbin/dhcpcd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) |
| 29 | /sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 33 | /sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 30 | +/usr/sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | ||
| 31 | /sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 34 | /sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 32 | +/sbin/ifconfig\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 35 | +/sbin/ifconfig\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 33 | /sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 36 | /sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 34 | /sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 37 | /sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 35 | /sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 38 | /sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 36 | @@ -51,6 +54,7 @@ ifdef(`distro_redhat',` | 39 | /sbin/ipx_internal_net -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 37 | /sbin/iw -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 40 | /sbin/iw -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 38 | /sbin/iwconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 41 | /sbin/iwconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 39 | /sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 42 | /sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| @@ -41,6 +44,5 @@ index fbb935c..a194622 100644 | |||
| 41 | /sbin/pump -- gen_context(system_u:object_r:dhcpc_exec_t,s0) | 44 | /sbin/pump -- gen_context(system_u:object_r:dhcpc_exec_t,s0) |
| 42 | /sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0) | 45 | /sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0) |
| 43 | 46 | ||
| 44 | -- | 47 | # |
| 45 | 1.7.9.5 | 48 | # /usr |
| 46 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-udevd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-udevd.patch index c6c19be..8e2cb1b 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-udevd.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-udevd.patch | |||
| @@ -10,26 +10,29 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | |||
| 10 | policy/modules/system/udev.fc | 2 ++ | 10 | policy/modules/system/udev.fc | 2 ++ |
| 11 | 1 file changed, 2 insertions(+) | 11 | 1 file changed, 2 insertions(+) |
| 12 | 12 | ||
| 13 | diff --git a/policy/modules/system/udev.fc b/policy/modules/system/udev.fc | ||
| 14 | index 40928d8..491bb23 100644 | ||
| 15 | --- a/policy/modules/system/udev.fc | 13 | --- a/policy/modules/system/udev.fc |
| 16 | +++ b/policy/modules/system/udev.fc | 14 | +++ b/policy/modules/system/udev.fc |
| 17 | @@ -10,6 +10,7 @@ | 15 | @@ -8,10 +8,11 @@ |
| 16 | |||
| 17 | /etc/udev/rules.d(/.*)? gen_context(system_u:object_r:udev_rules_t,s0) | ||
| 18 | /etc/udev/scripts/.+ -- gen_context(system_u:object_r:udev_helper_exec_t,s0) | 18 | /etc/udev/scripts/.+ -- gen_context(system_u:object_r:udev_helper_exec_t,s0) |
| 19 | 19 | ||
| 20 | /lib/udev/udev-acl -- gen_context(system_u:object_r:udev_exec_t,s0) | 20 | /lib/udev/udev-acl -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 21 | +/lib/udev/udevd -- gen_context(system_u:object_r:udev_exec_t,s0) | 21 | +/lib/udev/udevd -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 22 | 22 | ||
| 23 | ifdef(`distro_debian',` | 23 | ifdef(`distro_debian',` |
| 24 | /bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) | ||
| 24 | /lib/udev/create_static_nodes -- gen_context(system_u:object_r:udev_exec_t,s0) | 25 | /lib/udev/create_static_nodes -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 25 | @@ -27,6 +28,7 @@ ifdef(`distro_redhat',` | 26 | ') |
| 27 | @@ -26,10 +27,11 @@ ifdef(`distro_debian',` | ||
| 28 | ifdef(`distro_redhat',` | ||
| 29 | /sbin/start_udev -- gen_context(system_u:object_r:udev_exec_t,s0) | ||
| 26 | ') | 30 | ') |
| 27 | 31 | ||
| 28 | /usr/bin/udevinfo -- gen_context(system_u:object_r:udev_exec_t,s0) | 32 | /usr/bin/udevinfo -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 29 | +/usr/bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) | 33 | +/usr/bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 30 | 34 | ||
| 31 | /usr/lib/systemd/systemd-udevd -- gen_context(system_u:object_r:udev_exec_t,s0) | 35 | /usr/sbin/udev -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 32 | 36 | /usr/sbin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) | |
| 33 | -- | 37 | /usr/sbin/udevd -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 34 | 1.7.9.5 | 38 | /usr/sbin/udevsend -- gen_context(system_u:object_r:udev_exec_t,s0) |
| 35 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_hostname.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_hostname.patch index cedb5b5..038cb1f 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_hostname.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_hostname.patch | |||
| @@ -6,18 +6,16 @@ Subject: [PATCH 3/4] fix update-alternatives for hostname | |||
| 6 | Upstream-Status: Inappropriate [only for Poky] | 6 | Upstream-Status: Inappropriate [only for Poky] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/system/hostname.fc | 1 + | 11 | policy/modules/system/hostname.fc | 1 + |
| 11 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/system/hostname.fc b/policy/modules/system/hostname.fc | ||
| 14 | index 9dfecf7..4003b6d 100644 | ||
| 15 | --- a/policy/modules/system/hostname.fc | 14 | --- a/policy/modules/system/hostname.fc |
| 16 | +++ b/policy/modules/system/hostname.fc | 15 | +++ b/policy/modules/system/hostname.fc |
| 17 | @@ -1,2 +1,3 @@ | 16 | @@ -1,4 +1,5 @@ |
| 18 | 17 | ||
| 19 | /bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0) | 18 | /bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0) |
| 20 | +/bin/hostname\.net-tools -- gen_context(system_u:object_r:hostname_exec_t,s0) | 19 | +/bin/hostname\.net-tools -- gen_context(system_u:object_r:hostname_exec_t,s0) |
| 21 | -- | 20 | |
| 22 | 1.7.9.5 | 21 | /usr/bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0) |
| 23 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysklogd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysklogd.patch index 868ee6b..2038110 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysklogd.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysklogd.patch | |||
| @@ -9,16 +9,16 @@ for syslogd_t to read syslog_conf_t lnk_file is needed. | |||
| 9 | Upstream-Status: Inappropriate [only for Poky] | 9 | Upstream-Status: Inappropriate [only for Poky] |
| 10 | 10 | ||
| 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 12 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 12 | --- | 13 | --- |
| 13 | policy/modules/system/logging.fc | 4 ++++ | 14 | policy/modules/system/logging.fc | 4 ++++ |
| 14 | policy/modules/system/logging.te | 1 + | 15 | policy/modules/system/logging.te | 1 + |
| 15 | 2 files changed, 5 insertions(+) | 16 | 2 files changed, 5 insertions(+) |
| 16 | 17 | ||
| 17 | diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc | ||
| 18 | index b50c5fe..c005f33 100644 | ||
| 19 | --- a/policy/modules/system/logging.fc | 18 | --- a/policy/modules/system/logging.fc |
| 20 | +++ b/policy/modules/system/logging.fc | 19 | +++ b/policy/modules/system/logging.fc |
| 21 | @@ -2,19 +2,23 @@ | 20 | @@ -1,22 +1,26 @@ |
| 21 | /dev/log -s gen_context(system_u:object_r:devlog_t,mls_systemhigh) | ||
| 22 | 22 | ||
| 23 | /etc/rsyslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) | 23 | /etc/rsyslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) |
| 24 | /etc/syslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) | 24 | /etc/syslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) |
| @@ -41,12 +41,14 @@ index b50c5fe..c005f33 100644 | |||
| 41 | +/sbin/syslogd\.sysklogd -- gen_context(system_u:object_r:syslogd_exec_t,s0) | 41 | +/sbin/syslogd\.sysklogd -- gen_context(system_u:object_r:syslogd_exec_t,s0) |
| 42 | /sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0) | 42 | /sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0) |
| 43 | 43 | ||
| 44 | /usr/sbin/klogd -- gen_context(system_u:object_r:klogd_exec_t,s0) | 44 | /usr/lib/systemd/system/auditd.* -- gen_context(system_u:object_r:auditd_unit_t,s0) |
| 45 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 45 | /usr/lib/systemd/system/[^/]*systemd-journal.* -- gen_context(system_u:object_r:syslogd_unit_t,s0) |
| 46 | index 87e3db2..2914b0b 100644 | 46 | /usr/lib/systemd/systemd-journald -- gen_context(system_u:object_r:syslogd_exec_t,s0) |
| 47 | --- a/policy/modules/system/logging.te | 47 | --- a/policy/modules/system/logging.te |
| 48 | +++ b/policy/modules/system/logging.te | 48 | +++ b/policy/modules/system/logging.te |
| 49 | @@ -371,6 +371,7 @@ allow syslogd_t self:udp_socket create_socket_perms; | 49 | @@ -388,10 +388,11 @@ allow syslogd_t self:unix_dgram_socket s |
| 50 | allow syslogd_t self:fifo_file rw_fifo_file_perms; | ||
| 51 | allow syslogd_t self:udp_socket create_socket_perms; | ||
| 50 | allow syslogd_t self:tcp_socket create_stream_socket_perms; | 52 | allow syslogd_t self:tcp_socket create_stream_socket_perms; |
| 51 | 53 | ||
| 52 | allow syslogd_t syslog_conf_t:file read_file_perms; | 54 | allow syslogd_t syslog_conf_t:file read_file_perms; |
| @@ -54,6 +56,5 @@ index 87e3db2..2914b0b 100644 | |||
| 54 | 56 | ||
| 55 | # Create and bind to /dev/log or /var/run/log. | 57 | # Create and bind to /dev/log or /var/run/log. |
| 56 | allow syslogd_t devlog_t:sock_file manage_sock_file_perms; | 58 | allow syslogd_t devlog_t:sock_file manage_sock_file_perms; |
| 57 | -- | 59 | files_pid_filetrans(syslogd_t, devlog_t, sock_file) |
| 58 | 1.7.9.5 | 60 | |
| 59 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysvinit.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysvinit.patch index 3a617d8..d8c1642 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysvinit.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysvinit.patch | |||
| @@ -6,17 +6,18 @@ Subject: [PATCH 1/4] fix update-alternatives for sysvinit | |||
| 6 | Upstream-Status: Inappropriate [only for Poky] | 6 | Upstream-Status: Inappropriate [only for Poky] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/shutdown.fc | 1 + | 11 | policy/modules/contrib/shutdown.fc | 1 + |
| 11 | policy/modules/kernel/corecommands.fc | 1 + | 12 | policy/modules/kernel/corecommands.fc | 1 + |
| 12 | policy/modules/system/init.fc | 1 + | 13 | policy/modules/system/init.fc | 1 + |
| 13 | 3 files changed, 3 insertions(+) | 14 | 3 files changed, 3 insertions(+) |
| 14 | 15 | ||
| 15 | diff --git a/policy/modules/contrib/shutdown.fc b/policy/modules/contrib/shutdown.fc | ||
| 16 | index a91f33b..90e51e0 100644 | ||
| 17 | --- a/policy/modules/contrib/shutdown.fc | 16 | --- a/policy/modules/contrib/shutdown.fc |
| 18 | +++ b/policy/modules/contrib/shutdown.fc | 17 | +++ b/policy/modules/contrib/shutdown.fc |
| 19 | @@ -3,6 +3,7 @@ | 18 | @@ -1,10 +1,11 @@ |
| 19 | /etc/nologin -- gen_context(system_u:object_r:shutdown_etc_t,s0) | ||
| 20 | |||
| 20 | /lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) | 21 | /lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) |
| 21 | 22 | ||
| 22 | /sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) | 23 | /sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) |
| @@ -24,11 +25,13 @@ index a91f33b..90e51e0 100644 | |||
| 24 | 25 | ||
| 25 | /usr/lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) | 26 | /usr/lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) |
| 26 | 27 | ||
| 27 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc | 28 | /usr/sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) |
| 28 | index bcfdba7..87502a3 100644 | 29 | |
| 29 | --- a/policy/modules/kernel/corecommands.fc | 30 | --- a/policy/modules/kernel/corecommands.fc |
| 30 | +++ b/policy/modules/kernel/corecommands.fc | 31 | +++ b/policy/modules/kernel/corecommands.fc |
| 31 | @@ -10,6 +10,7 @@ | 32 | @@ -8,10 +8,11 @@ |
| 33 | /bin/bash2 -- gen_context(system_u:object_r:shell_exec_t,s0) | ||
| 34 | /bin/fish -- gen_context(system_u:object_r:shell_exec_t,s0) | ||
| 32 | /bin/ksh.* -- gen_context(system_u:object_r:shell_exec_t,s0) | 35 | /bin/ksh.* -- gen_context(system_u:object_r:shell_exec_t,s0) |
| 33 | /bin/mksh -- gen_context(system_u:object_r:shell_exec_t,s0) | 36 | /bin/mksh -- gen_context(system_u:object_r:shell_exec_t,s0) |
| 34 | /bin/mountpoint -- gen_context(system_u:object_r:bin_t,s0) | 37 | /bin/mountpoint -- gen_context(system_u:object_r:bin_t,s0) |
| @@ -36,11 +39,13 @@ index bcfdba7..87502a3 100644 | |||
| 36 | /bin/sash -- gen_context(system_u:object_r:shell_exec_t,s0) | 39 | /bin/sash -- gen_context(system_u:object_r:shell_exec_t,s0) |
| 37 | /bin/tcsh -- gen_context(system_u:object_r:shell_exec_t,s0) | 40 | /bin/tcsh -- gen_context(system_u:object_r:shell_exec_t,s0) |
| 38 | /bin/yash -- gen_context(system_u:object_r:shell_exec_t,s0) | 41 | /bin/yash -- gen_context(system_u:object_r:shell_exec_t,s0) |
| 39 | diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc | 42 | /bin/zsh.* -- gen_context(system_u:object_r:shell_exec_t,s0) |
| 40 | index bc0ffc8..020b9fe 100644 | 43 | |
| 41 | --- a/policy/modules/system/init.fc | 44 | --- a/policy/modules/system/init.fc |
| 42 | +++ b/policy/modules/system/init.fc | 45 | +++ b/policy/modules/system/init.fc |
| 43 | @@ -30,6 +30,7 @@ ifdef(`distro_gentoo', ` | 46 | @@ -30,10 +30,11 @@ ifdef(`distro_gentoo', ` |
| 47 | |||
| 48 | # | ||
| 44 | # /sbin | 49 | # /sbin |
| 45 | # | 50 | # |
| 46 | /sbin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0) | 51 | /sbin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0) |
| @@ -48,6 +53,5 @@ index bc0ffc8..020b9fe 100644 | |||
| 48 | # because nowadays, /sbin/init is often a symlink to /sbin/upstart | 53 | # because nowadays, /sbin/init is often a symlink to /sbin/upstart |
| 49 | /sbin/upstart -- gen_context(system_u:object_r:init_exec_t,s0) | 54 | /sbin/upstart -- gen_context(system_u:object_r:init_exec_t,s0) |
| 50 | 55 | ||
| 51 | -- | 56 | ifdef(`distro_gentoo', ` |
| 52 | 1.7.9.5 | 57 | /sbin/rc -- gen_context(system_u:object_r:rc_exec_t,s0) |
| 53 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-bsdpty_device_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-bsdpty_device_t.patch index 9a3322f..7be7147 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-bsdpty_device_t.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-bsdpty_device_t.patch | |||
| @@ -6,15 +6,16 @@ Subject: [PATCH 5/6] add rules for bsdpty_device_t to complete pty devices. | |||
| 6 | Upstream-Status: Pending | 6 | Upstream-Status: Pending |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/kernel/terminal.if | 16 ++++++++++++++++ | 11 | policy/modules/kernel/terminal.if | 16 ++++++++++++++++ |
| 11 | 1 file changed, 16 insertions(+) | 12 | 1 file changed, 16 insertions(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if | ||
| 14 | index 771bce1..7519d0e 100644 | ||
| 15 | --- a/policy/modules/kernel/terminal.if | 14 | --- a/policy/modules/kernel/terminal.if |
| 16 | +++ b/policy/modules/kernel/terminal.if | 15 | +++ b/policy/modules/kernel/terminal.if |
| 17 | @@ -531,9 +531,11 @@ interface(`term_dontaudit_manage_pty_dirs',` | 16 | @@ -585,13 +585,15 @@ interface(`term_getattr_generic_ptys',` |
| 17 | ## </param> | ||
| 18 | # | ||
| 18 | interface(`term_dontaudit_getattr_generic_ptys',` | 19 | interface(`term_dontaudit_getattr_generic_ptys',` |
| 19 | gen_require(` | 20 | gen_require(` |
| 20 | type devpts_t; | 21 | type devpts_t; |
| @@ -26,7 +27,11 @@ index 771bce1..7519d0e 100644 | |||
| 26 | ') | 27 | ') |
| 27 | ######################################## | 28 | ######################################## |
| 28 | ## <summary> | 29 | ## <summary> |
| 29 | @@ -549,11 +551,13 @@ interface(`term_dontaudit_getattr_generic_ptys',` | 30 | ## ioctl of generic pty devices. |
| 31 | ## </summary> | ||
| 32 | @@ -603,15 +605,17 @@ interface(`term_dontaudit_getattr_generi | ||
| 33 | # | ||
| 34 | # cjp: added for ppp | ||
| 30 | interface(`term_ioctl_generic_ptys',` | 35 | interface(`term_ioctl_generic_ptys',` |
| 31 | gen_require(` | 36 | gen_require(` |
| 32 | type devpts_t; | 37 | type devpts_t; |
| @@ -40,7 +45,11 @@ index 771bce1..7519d0e 100644 | |||
| 40 | ') | 45 | ') |
| 41 | 46 | ||
| 42 | ######################################## | 47 | ######################################## |
| 43 | @@ -571,9 +575,11 @@ interface(`term_ioctl_generic_ptys',` | 48 | ## <summary> |
| 49 | ## Allow setting the attributes of | ||
| 50 | @@ -625,13 +629,15 @@ interface(`term_ioctl_generic_ptys',` | ||
| 51 | # | ||
| 52 | # dwalsh: added for rhgb | ||
| 44 | interface(`term_setattr_generic_ptys',` | 53 | interface(`term_setattr_generic_ptys',` |
| 45 | gen_require(` | 54 | gen_require(` |
| 46 | type devpts_t; | 55 | type devpts_t; |
| @@ -52,7 +61,11 @@ index 771bce1..7519d0e 100644 | |||
| 52 | ') | 61 | ') |
| 53 | 62 | ||
| 54 | ######################################## | 63 | ######################################## |
| 55 | @@ -591,9 +597,11 @@ interface(`term_setattr_generic_ptys',` | 64 | ## <summary> |
| 65 | ## Dontaudit setting the attributes of | ||
| 66 | @@ -645,13 +651,15 @@ interface(`term_setattr_generic_ptys',` | ||
| 67 | # | ||
| 68 | # dwalsh: added for rhgb | ||
| 56 | interface(`term_dontaudit_setattr_generic_ptys',` | 69 | interface(`term_dontaudit_setattr_generic_ptys',` |
| 57 | gen_require(` | 70 | gen_require(` |
| 58 | type devpts_t; | 71 | type devpts_t; |
| @@ -64,7 +77,11 @@ index 771bce1..7519d0e 100644 | |||
| 64 | ') | 77 | ') |
| 65 | 78 | ||
| 66 | ######################################## | 79 | ######################################## |
| 67 | @@ -611,11 +619,13 @@ interface(`term_dontaudit_setattr_generic_ptys',` | 80 | ## <summary> |
| 81 | ## Read and write the generic pty | ||
| 82 | @@ -665,15 +673,17 @@ interface(`term_dontaudit_setattr_generi | ||
| 83 | ## </param> | ||
| 84 | # | ||
| 68 | interface(`term_use_generic_ptys',` | 85 | interface(`term_use_generic_ptys',` |
| 69 | gen_require(` | 86 | gen_require(` |
| 70 | type devpts_t; | 87 | type devpts_t; |
| @@ -78,7 +95,11 @@ index 771bce1..7519d0e 100644 | |||
| 78 | ') | 95 | ') |
| 79 | 96 | ||
| 80 | ######################################## | 97 | ######################################## |
| 81 | @@ -633,9 +643,11 @@ interface(`term_use_generic_ptys',` | 98 | ## <summary> |
| 99 | ## Dot not audit attempts to read and | ||
| 100 | @@ -687,13 +697,15 @@ interface(`term_use_generic_ptys',` | ||
| 101 | ## </param> | ||
| 102 | # | ||
| 82 | interface(`term_dontaudit_use_generic_ptys',` | 103 | interface(`term_dontaudit_use_generic_ptys',` |
| 83 | gen_require(` | 104 | gen_require(` |
| 84 | type devpts_t; | 105 | type devpts_t; |
| @@ -90,7 +111,11 @@ index 771bce1..7519d0e 100644 | |||
| 90 | ') | 111 | ') |
| 91 | 112 | ||
| 92 | ####################################### | 113 | ####################################### |
| 93 | @@ -651,10 +663,12 @@ interface(`term_dontaudit_use_generic_ptys',` | 114 | ## <summary> |
| 115 | ## Set the attributes of the tty device | ||
| 116 | @@ -705,14 +717,16 @@ interface(`term_dontaudit_use_generic_pt | ||
| 117 | ## </param> | ||
| 118 | # | ||
| 94 | interface(`term_setattr_controlling_term',` | 119 | interface(`term_setattr_controlling_term',` |
| 95 | gen_require(` | 120 | gen_require(` |
| 96 | type devtty_t; | 121 | type devtty_t; |
| @@ -103,7 +128,11 @@ index 771bce1..7519d0e 100644 | |||
| 103 | ') | 128 | ') |
| 104 | 129 | ||
| 105 | ######################################## | 130 | ######################################## |
| 106 | @@ -671,10 +685,12 @@ interface(`term_setattr_controlling_term',` | 131 | ## <summary> |
| 132 | ## Read and write the controlling | ||
| 133 | @@ -725,14 +739,16 @@ interface(`term_setattr_controlling_term | ||
| 134 | ## </param> | ||
| 135 | # | ||
| 107 | interface(`term_use_controlling_term',` | 136 | interface(`term_use_controlling_term',` |
| 108 | gen_require(` | 137 | gen_require(` |
| 109 | type devtty_t; | 138 | type devtty_t; |
| @@ -116,6 +145,5 @@ index 771bce1..7519d0e 100644 | |||
| 116 | ') | 145 | ') |
| 117 | 146 | ||
| 118 | ####################################### | 147 | ####################################### |
| 119 | -- | 148 | ## <summary> |
| 120 | 1.7.9.5 | 149 | ## Get the attributes of the pty multiplexor (/dev/ptmx). |
| 121 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-syslogd_t-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-syslogd_t-symlink.patch index aa9734a..e90aab5 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-syslogd_t-symlink.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-syslogd_t-symlink.patch | |||
| @@ -8,15 +8,16 @@ syslogd_t. | |||
| 8 | Upstream-Status: Inappropriate [only for Poky] | 8 | Upstream-Status: Inappropriate [only for Poky] |
| 9 | 9 | ||
| 10 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 10 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 11 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 11 | --- | 12 | --- |
| 12 | policy/modules/system/logging.te | 2 ++ | 13 | policy/modules/system/logging.te | 2 ++ |
| 13 | 1 file changed, 2 insertions(+) | 14 | 1 file changed, 2 insertions(+) |
| 14 | 15 | ||
| 15 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | ||
| 16 | index 2ad9ea5..70427d8 100644 | ||
| 17 | --- a/policy/modules/system/logging.te | 16 | --- a/policy/modules/system/logging.te |
| 18 | +++ b/policy/modules/system/logging.te | 17 | +++ b/policy/modules/system/logging.te |
| 19 | @@ -384,6 +384,8 @@ rw_fifo_files_pattern(syslogd_t, var_log_t, var_log_t) | 18 | @@ -404,10 +404,12 @@ rw_fifo_files_pattern(syslogd_t, var_log |
| 19 | files_search_spool(syslogd_t) | ||
| 20 | |||
| 20 | # Allow access for syslog-ng | 21 | # Allow access for syslog-ng |
| 21 | allow syslogd_t var_log_t:dir { create setattr }; | 22 | allow syslogd_t var_log_t:dir { create setattr }; |
| 22 | 23 | ||
| @@ -25,6 +26,5 @@ index 2ad9ea5..70427d8 100644 | |||
| 25 | # manage temporary files | 26 | # manage temporary files |
| 26 | manage_dirs_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) | 27 | manage_dirs_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) |
| 27 | manage_files_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) | 28 | manage_files_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) |
| 28 | -- | 29 | files_tmp_filetrans(syslogd_t, syslogd_tmp_t, { dir file }) |
| 29 | 1.7.11.7 | 30 | |
| 30 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-tmp-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-tmp-symlink.patch index 210c297..07ebf58 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-tmp-symlink.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-tmp-symlink.patch | |||
| @@ -9,16 +9,17 @@ lnk_file while doing search/list/delete/rw.. in /tmp/ directory. | |||
| 9 | Upstream-Status: Inappropriate [only for Poky] | 9 | Upstream-Status: Inappropriate [only for Poky] |
| 10 | 10 | ||
| 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 12 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 12 | --- | 13 | --- |
| 13 | policy/modules/kernel/files.fc | 1 + | 14 | policy/modules/kernel/files.fc | 1 + |
| 14 | policy/modules/kernel/files.if | 8 ++++++++ | 15 | policy/modules/kernel/files.if | 8 ++++++++ |
| 15 | 2 files changed, 9 insertions(+), 0 deletions(-) | 16 | 2 files changed, 9 insertions(+), 0 deletions(-) |
| 16 | 17 | ||
| 17 | diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc | ||
| 18 | index 8796ca3..a0db748 100644 | ||
| 19 | --- a/policy/modules/kernel/files.fc | 18 | --- a/policy/modules/kernel/files.fc |
| 20 | +++ b/policy/modules/kernel/files.fc | 19 | +++ b/policy/modules/kernel/files.fc |
| 21 | @@ -185,6 +185,7 @@ ifdef(`distro_debian',` | 20 | @@ -191,10 +191,11 @@ ifdef(`distro_debian',` |
| 21 | |||
| 22 | # | ||
| 22 | # /tmp | 23 | # /tmp |
| 23 | # | 24 | # |
| 24 | /tmp -d gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh) | 25 | /tmp -d gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh) |
| @@ -26,11 +27,13 @@ index 8796ca3..a0db748 100644 | |||
| 26 | /tmp/.* <<none>> | 27 | /tmp/.* <<none>> |
| 27 | /tmp/\.journal <<none>> | 28 | /tmp/\.journal <<none>> |
| 28 | 29 | ||
| 29 | diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if | 30 | /tmp/lost\+found -d gen_context(system_u:object_r:lost_found_t,mls_systemhigh) |
| 30 | index e1e814d..a7384b0 100644 | 31 | /tmp/lost\+found/.* <<none>> |
| 31 | --- a/policy/modules/kernel/files.if | 32 | --- a/policy/modules/kernel/files.if |
| 32 | +++ b/policy/modules/kernel/files.if | 33 | +++ b/policy/modules/kernel/files.if |
| 33 | @@ -4199,6 +4199,7 @@ interface(`files_search_tmp',` | 34 | @@ -4471,10 +4471,11 @@ interface(`files_search_tmp',` |
| 35 | gen_require(` | ||
| 36 | type tmp_t; | ||
| 34 | ') | 37 | ') |
| 35 | 38 | ||
| 36 | allow $1 tmp_t:dir search_dir_perms; | 39 | allow $1 tmp_t:dir search_dir_perms; |
| @@ -38,7 +41,11 @@ index e1e814d..a7384b0 100644 | |||
| 38 | ') | 41 | ') |
| 39 | 42 | ||
| 40 | ######################################## | 43 | ######################################## |
| 41 | @@ -4235,6 +4236,7 @@ interface(`files_list_tmp',` | 44 | ## <summary> |
| 45 | ## Do not audit attempts to search the tmp directory (/tmp). | ||
| 46 | @@ -4507,10 +4508,11 @@ interface(`files_list_tmp',` | ||
| 47 | gen_require(` | ||
| 48 | type tmp_t; | ||
| 42 | ') | 49 | ') |
| 43 | 50 | ||
| 44 | allow $1 tmp_t:dir list_dir_perms; | 51 | allow $1 tmp_t:dir list_dir_perms; |
| @@ -46,7 +53,11 @@ index e1e814d..a7384b0 100644 | |||
| 46 | ') | 53 | ') |
| 47 | 54 | ||
| 48 | ######################################## | 55 | ######################################## |
| 49 | @@ -4271,6 +4273,7 @@ interface(`files_delete_tmp_dir_entry',` | 56 | ## <summary> |
| 57 | ## Do not audit listing of the tmp directory (/tmp). | ||
| 58 | @@ -4543,10 +4545,11 @@ interface(`files_delete_tmp_dir_entry',` | ||
| 59 | gen_require(` | ||
| 60 | type tmp_t; | ||
| 50 | ') | 61 | ') |
| 51 | 62 | ||
| 52 | allow $1 tmp_t:dir del_entry_dir_perms; | 63 | allow $1 tmp_t:dir del_entry_dir_perms; |
| @@ -54,7 +65,11 @@ index e1e814d..a7384b0 100644 | |||
| 54 | ') | 65 | ') |
| 55 | 66 | ||
| 56 | ######################################## | 67 | ######################################## |
| 57 | @@ -4289,6 +4292,7 @@ interface(`files_read_generic_tmp_files',` | 68 | ## <summary> |
| 69 | ## Read files in the tmp directory (/tmp). | ||
| 70 | @@ -4561,10 +4564,11 @@ interface(`files_read_generic_tmp_files' | ||
| 71 | gen_require(` | ||
| 72 | type tmp_t; | ||
| 58 | ') | 73 | ') |
| 59 | 74 | ||
| 60 | read_files_pattern($1, tmp_t, tmp_t) | 75 | read_files_pattern($1, tmp_t, tmp_t) |
| @@ -62,7 +77,11 @@ index e1e814d..a7384b0 100644 | |||
| 62 | ') | 77 | ') |
| 63 | 78 | ||
| 64 | ######################################## | 79 | ######################################## |
| 65 | @@ -4307,6 +4311,7 @@ interface(`files_manage_generic_tmp_dirs',` | 80 | ## <summary> |
| 81 | ## Manage temporary directories in /tmp. | ||
| 82 | @@ -4579,10 +4583,11 @@ interface(`files_manage_generic_tmp_dirs | ||
| 83 | gen_require(` | ||
| 84 | type tmp_t; | ||
| 66 | ') | 85 | ') |
| 67 | 86 | ||
| 68 | manage_dirs_pattern($1, tmp_t, tmp_t) | 87 | manage_dirs_pattern($1, tmp_t, tmp_t) |
| @@ -70,7 +89,11 @@ index e1e814d..a7384b0 100644 | |||
| 70 | ') | 89 | ') |
| 71 | 90 | ||
| 72 | ######################################## | 91 | ######################################## |
| 73 | @@ -4325,6 +4330,7 @@ interface(`files_manage_generic_tmp_files',` | 92 | ## <summary> |
| 93 | ## Manage temporary files and directories in /tmp. | ||
| 94 | @@ -4597,10 +4602,11 @@ interface(`files_manage_generic_tmp_file | ||
| 95 | gen_require(` | ||
| 96 | type tmp_t; | ||
| 74 | ') | 97 | ') |
| 75 | 98 | ||
| 76 | manage_files_pattern($1, tmp_t, tmp_t) | 99 | manage_files_pattern($1, tmp_t, tmp_t) |
| @@ -78,7 +101,11 @@ index e1e814d..a7384b0 100644 | |||
| 78 | ') | 101 | ') |
| 79 | 102 | ||
| 80 | ######################################## | 103 | ######################################## |
| 81 | @@ -4361,6 +4367,7 @@ interface(`files_rw_generic_tmp_sockets',` | 104 | ## <summary> |
| 105 | ## Read symbolic links in the tmp directory (/tmp). | ||
| 106 | @@ -4633,10 +4639,11 @@ interface(`files_rw_generic_tmp_sockets' | ||
| 107 | gen_require(` | ||
| 108 | type tmp_t; | ||
| 82 | ') | 109 | ') |
| 83 | 110 | ||
| 84 | rw_sock_files_pattern($1, tmp_t, tmp_t) | 111 | rw_sock_files_pattern($1, tmp_t, tmp_t) |
| @@ -86,7 +113,11 @@ index e1e814d..a7384b0 100644 | |||
| 86 | ') | 113 | ') |
| 87 | 114 | ||
| 88 | ######################################## | 115 | ######################################## |
| 89 | @@ -4550,6 +4557,7 @@ interface(`files_tmp_filetrans',` | 116 | ## <summary> |
| 117 | ## Mount filesystems in the tmp directory (/tmp) | ||
| 118 | @@ -4840,10 +4847,11 @@ interface(`files_tmp_filetrans',` | ||
| 119 | gen_require(` | ||
| 120 | type tmp_t; | ||
| 90 | ') | 121 | ') |
| 91 | 122 | ||
| 92 | filetrans_pattern($1, tmp_t, $2, $3, $4) | 123 | filetrans_pattern($1, tmp_t, $2, $3, $4) |
| @@ -94,6 +125,5 @@ index e1e814d..a7384b0 100644 | |||
| 94 | ') | 125 | ') |
| 95 | 126 | ||
| 96 | ######################################## | 127 | ######################################## |
| 97 | -- | 128 | ## <summary> |
| 98 | 1.7.5.4 | 129 | ## Delete the contents of /tmp. |
| 99 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-cache-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-cache-symlink.patch index 18a92dd..b828b7a 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-cache-symlink.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-cache-symlink.patch | |||
| @@ -11,15 +11,16 @@ contents, so this is still a secure relax. | |||
| 11 | Upstream-Status: Inappropriate [only for Poky] | 11 | Upstream-Status: Inappropriate [only for Poky] |
| 12 | 12 | ||
| 13 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 13 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 14 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 14 | --- | 15 | --- |
| 15 | policy/modules/kernel/domain.te | 3 +++ | 16 | policy/modules/kernel/domain.te | 3 +++ |
| 16 | 1 file changed, 3 insertions(+) | 17 | 1 file changed, 3 insertions(+) |
| 17 | 18 | ||
| 18 | diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te | ||
| 19 | index cf04cb5..9ffe6b0 100644 | ||
| 20 | --- a/policy/modules/kernel/domain.te | 19 | --- a/policy/modules/kernel/domain.te |
| 21 | +++ b/policy/modules/kernel/domain.te | 20 | +++ b/policy/modules/kernel/domain.te |
| 22 | @@ -104,6 +104,9 @@ term_use_controlling_term(domain) | 21 | @@ -108,10 +108,13 @@ dev_rw_zero(domain) |
| 22 | term_use_controlling_term(domain) | ||
| 23 | |||
| 23 | # list the root directory | 24 | # list the root directory |
| 24 | files_list_root(domain) | 25 | files_list_root(domain) |
| 25 | 26 | ||
| @@ -29,6 +30,5 @@ index cf04cb5..9ffe6b0 100644 | |||
| 29 | ifdef(`hide_broken_symptoms',` | 30 | ifdef(`hide_broken_symptoms',` |
| 30 | # This check is in the general socket | 31 | # This check is in the general socket |
| 31 | # listen code, before protocol-specific | 32 | # listen code, before protocol-specific |
| 32 | -- | 33 | # listen function is called, so bad calls |
| 33 | 1.7.9.5 | 34 | # to listen on UDP sockets should be silenced |
| 34 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-apache.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-apache.patch index 8bc40c4..8d22c21 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-apache.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-apache.patch | |||
| @@ -10,15 +10,16 @@ logging.if. So still need add a individual rule for apache.te. | |||
| 10 | Upstream-Status: Inappropriate [only for Poky] | 10 | Upstream-Status: Inappropriate [only for Poky] |
| 11 | 11 | ||
| 12 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 12 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 13 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 13 | --- | 14 | --- |
| 14 | policy/modules/contrib/apache.te | 1 + | 15 | policy/modules/contrib/apache.te | 1 + |
| 15 | 1 file changed, 1 insertion(+) | 16 | 1 file changed, 1 insertion(+) |
| 16 | 17 | ||
| 17 | diff --git a/policy/modules/contrib/apache.te b/policy/modules/contrib/apache.te | ||
| 18 | index ec8bd13..06f2e95 100644 | ||
| 19 | --- a/policy/modules/contrib/apache.te | 18 | --- a/policy/modules/contrib/apache.te |
| 20 | +++ b/policy/modules/contrib/apache.te | 19 | +++ b/policy/modules/contrib/apache.te |
| 21 | @@ -400,6 +400,7 @@ create_files_pattern(httpd_t, httpd_log_t, httpd_log_t) | 20 | @@ -409,10 +409,11 @@ allow httpd_t httpd_log_t:dir setattr_di |
| 21 | create_dirs_pattern(httpd_t, httpd_log_t, httpd_log_t) | ||
| 22 | create_files_pattern(httpd_t, httpd_log_t, httpd_log_t) | ||
| 22 | append_files_pattern(httpd_t, httpd_log_t, httpd_log_t) | 23 | append_files_pattern(httpd_t, httpd_log_t, httpd_log_t) |
| 23 | read_files_pattern(httpd_t, httpd_log_t, httpd_log_t) | 24 | read_files_pattern(httpd_t, httpd_log_t, httpd_log_t) |
| 24 | read_lnk_files_pattern(httpd_t, httpd_log_t, httpd_log_t) | 25 | read_lnk_files_pattern(httpd_t, httpd_log_t, httpd_log_t) |
| @@ -26,6 +27,5 @@ index ec8bd13..06f2e95 100644 | |||
| 26 | logging_log_filetrans(httpd_t, httpd_log_t, file) | 27 | logging_log_filetrans(httpd_t, httpd_log_t, file) |
| 27 | 28 | ||
| 28 | allow httpd_t httpd_modules_t:dir list_dir_perms; | 29 | allow httpd_t httpd_modules_t:dir list_dir_perms; |
| 29 | -- | 30 | mmap_files_pattern(httpd_t, httpd_modules_t, httpd_modules_t) |
| 30 | 1.7.9.5 | 31 | read_files_pattern(httpd_t, httpd_modules_t, httpd_modules_t) |
| 31 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch index cbf0f7d..2e8e1f2 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch | |||
| @@ -8,15 +8,16 @@ audisp_remote_t. | |||
| 8 | Upstream-Status: Inappropriate [only for Poky] | 8 | Upstream-Status: Inappropriate [only for Poky] |
| 9 | 9 | ||
| 10 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 10 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 11 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 11 | --- | 12 | --- |
| 12 | policy/modules/system/logging.te | 1 + | 13 | policy/modules/system/logging.te | 1 + |
| 13 | 1 file changed, 1 insertion(+) | 14 | 1 file changed, 1 insertion(+) |
| 14 | 15 | ||
| 15 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | ||
| 16 | index 8426a49..2ad9ea5 100644 | ||
| 17 | --- a/policy/modules/system/logging.te | 16 | --- a/policy/modules/system/logging.te |
| 18 | +++ b/policy/modules/system/logging.te | 17 | +++ b/policy/modules/system/logging.te |
| 19 | @@ -262,6 +262,7 @@ allow audisp_remote_t self:capability { setuid setpcap }; | 18 | @@ -278,10 +278,11 @@ optional_policy(` |
| 19 | |||
| 20 | allow audisp_remote_t self:capability { setuid setpcap }; | ||
| 20 | allow audisp_remote_t self:process { getcap setcap }; | 21 | allow audisp_remote_t self:process { getcap setcap }; |
| 21 | allow audisp_remote_t self:tcp_socket create_socket_perms; | 22 | allow audisp_remote_t self:tcp_socket create_socket_perms; |
| 22 | allow audisp_remote_t var_log_t:dir search_dir_perms; | 23 | allow audisp_remote_t var_log_t:dir search_dir_perms; |
| @@ -24,6 +25,5 @@ index 8426a49..2ad9ea5 100644 | |||
| 24 | 25 | ||
| 25 | manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) | 26 | manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) |
| 26 | manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) | 27 | manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) |
| 27 | -- | 28 | files_spool_filetrans(audisp_remote_t, audit_spool_t, { dir file }) |
| 28 | 1.7.11.7 | 29 | |
| 29 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink.patch index b06f3ef..a7161d5 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink.patch | |||
| @@ -9,17 +9,18 @@ lnk_file while doing search/list/delete/rw.. in /var/log/ directory. | |||
| 9 | Upstream-Status: Inappropriate [only for Poky] | 9 | Upstream-Status: Inappropriate [only for Poky] |
| 10 | 10 | ||
| 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 12 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 12 | --- | 13 | --- |
| 13 | policy/modules/system/logging.fc | 1 + | 14 | policy/modules/system/logging.fc | 1 + |
| 14 | policy/modules/system/logging.if | 14 +++++++++++++- | 15 | policy/modules/system/logging.if | 14 +++++++++++++- |
| 15 | policy/modules/system/logging.te | 1 + | 16 | policy/modules/system/logging.te | 1 + |
| 16 | 3 files changed, 15 insertions(+), 1 deletion(-) | 17 | 3 files changed, 15 insertions(+), 1 deletion(-) |
| 17 | 18 | ||
| 18 | diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc | ||
| 19 | index c005f33..9529e40 100644 | ||
| 20 | --- a/policy/modules/system/logging.fc | 19 | --- a/policy/modules/system/logging.fc |
| 21 | +++ b/policy/modules/system/logging.fc | 20 | +++ b/policy/modules/system/logging.fc |
| 22 | @@ -41,6 +41,7 @@ ifdef(`distro_suse', ` | 21 | @@ -49,10 +49,11 @@ ifdef(`distro_suse', ` |
| 22 | |||
| 23 | /var/axfrdns/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0) | ||
| 23 | /var/dnscache/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0) | 24 | /var/dnscache/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0) |
| 24 | 25 | ||
| 25 | /var/log -d gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh) | 26 | /var/log -d gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh) |
| @@ -27,11 +28,13 @@ index c005f33..9529e40 100644 | |||
| 27 | /var/log/.* gen_context(system_u:object_r:var_log_t,s0) | 28 | /var/log/.* gen_context(system_u:object_r:var_log_t,s0) |
| 28 | /var/log/boot\.log -- gen_context(system_u:object_r:var_log_t,mls_systemhigh) | 29 | /var/log/boot\.log -- gen_context(system_u:object_r:var_log_t,mls_systemhigh) |
| 29 | /var/log/messages[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh) | 30 | /var/log/messages[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh) |
| 30 | diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if | 31 | /var/log/secure[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh) |
| 31 | index 4e94884..9a6f599 100644 | 32 | /var/log/maillog[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh) |
| 32 | --- a/policy/modules/system/logging.if | 33 | --- a/policy/modules/system/logging.if |
| 33 | +++ b/policy/modules/system/logging.if | 34 | +++ b/policy/modules/system/logging.if |
| 34 | @@ -136,12 +136,13 @@ interface(`logging_set_audit_parameters',` | 35 | @@ -134,16 +134,17 @@ interface(`logging_set_audit_parameters' |
| 36 | ## </param> | ||
| 37 | ## <rolecap/> | ||
| 35 | # | 38 | # |
| 36 | interface(`logging_read_audit_log',` | 39 | interface(`logging_read_audit_log',` |
| 37 | gen_require(` | 40 | gen_require(` |
| @@ -46,7 +49,11 @@ index 4e94884..9a6f599 100644 | |||
| 46 | ') | 49 | ') |
| 47 | 50 | ||
| 48 | ######################################## | 51 | ######################################## |
| 49 | @@ -626,6 +627,7 @@ interface(`logging_search_logs',` | 52 | ## <summary> |
| 53 | ## Execute auditctl in the auditctl domain. | ||
| 54 | @@ -665,10 +666,11 @@ interface(`logging_search_logs',` | ||
| 55 | type var_log_t; | ||
| 56 | ') | ||
| 50 | 57 | ||
| 51 | files_search_var($1) | 58 | files_search_var($1) |
| 52 | allow $1 var_log_t:dir search_dir_perms; | 59 | allow $1 var_log_t:dir search_dir_perms; |
| @@ -54,7 +61,11 @@ index 4e94884..9a6f599 100644 | |||
| 54 | ') | 61 | ') |
| 55 | 62 | ||
| 56 | ####################################### | 63 | ####################################### |
| 57 | @@ -663,6 +665,7 @@ interface(`logging_list_logs',` | 64 | ## <summary> |
| 65 | ## Do not audit attempts to search the var log directory. | ||
| 66 | @@ -702,10 +704,11 @@ interface(`logging_list_logs',` | ||
| 67 | type var_log_t; | ||
| 68 | ') | ||
| 58 | 69 | ||
| 59 | files_search_var($1) | 70 | files_search_var($1) |
| 60 | allow $1 var_log_t:dir list_dir_perms; | 71 | allow $1 var_log_t:dir list_dir_perms; |
| @@ -62,7 +73,11 @@ index 4e94884..9a6f599 100644 | |||
| 62 | ') | 73 | ') |
| 63 | 74 | ||
| 64 | ####################################### | 75 | ####################################### |
| 65 | @@ -682,6 +685,7 @@ interface(`logging_rw_generic_log_dirs',` | 76 | ## <summary> |
| 77 | ## Read and write the generic log directory (/var/log). | ||
| 78 | @@ -721,10 +724,11 @@ interface(`logging_rw_generic_log_dirs', | ||
| 79 | type var_log_t; | ||
| 80 | ') | ||
| 66 | 81 | ||
| 67 | files_search_var($1) | 82 | files_search_var($1) |
| 68 | allow $1 var_log_t:dir rw_dir_perms; | 83 | allow $1 var_log_t:dir rw_dir_perms; |
| @@ -70,7 +85,11 @@ index 4e94884..9a6f599 100644 | |||
| 70 | ') | 85 | ') |
| 71 | 86 | ||
| 72 | ####################################### | 87 | ####################################### |
| 73 | @@ -793,10 +797,12 @@ interface(`logging_append_all_logs',` | 88 | ## <summary> |
| 89 | ## Search through all log dirs. | ||
| 90 | @@ -832,14 +836,16 @@ interface(`logging_append_all_logs',` | ||
| 91 | ## <rolecap/> | ||
| 92 | # | ||
| 74 | interface(`logging_read_all_logs',` | 93 | interface(`logging_read_all_logs',` |
| 75 | gen_require(` | 94 | gen_require(` |
| 76 | attribute logfile; | 95 | attribute logfile; |
| @@ -83,7 +102,11 @@ index 4e94884..9a6f599 100644 | |||
| 83 | read_files_pattern($1, logfile, logfile) | 102 | read_files_pattern($1, logfile, logfile) |
| 84 | ') | 103 | ') |
| 85 | 104 | ||
| 86 | @@ -815,10 +821,12 @@ interface(`logging_read_all_logs',` | 105 | ######################################## |
| 106 | ## <summary> | ||
| 107 | @@ -854,14 +860,16 @@ interface(`logging_read_all_logs',` | ||
| 108 | # cjp: not sure why this is needed. This was added | ||
| 109 | # because of logrotate. | ||
| 87 | interface(`logging_exec_all_logs',` | 110 | interface(`logging_exec_all_logs',` |
| 88 | gen_require(` | 111 | gen_require(` |
| 89 | attribute logfile; | 112 | attribute logfile; |
| @@ -96,7 +119,11 @@ index 4e94884..9a6f599 100644 | |||
| 96 | can_exec($1, logfile) | 119 | can_exec($1, logfile) |
| 97 | ') | 120 | ') |
| 98 | 121 | ||
| 99 | @@ -880,6 +888,7 @@ interface(`logging_read_generic_logs',` | 122 | ######################################## |
| 123 | ## <summary> | ||
| 124 | @@ -919,10 +927,11 @@ interface(`logging_read_generic_logs',` | ||
| 125 | type var_log_t; | ||
| 126 | ') | ||
| 100 | 127 | ||
| 101 | files_search_var($1) | 128 | files_search_var($1) |
| 102 | allow $1 var_log_t:dir list_dir_perms; | 129 | allow $1 var_log_t:dir list_dir_perms; |
| @@ -104,7 +131,11 @@ index 4e94884..9a6f599 100644 | |||
| 104 | read_files_pattern($1, var_log_t, var_log_t) | 131 | read_files_pattern($1, var_log_t, var_log_t) |
| 105 | ') | 132 | ') |
| 106 | 133 | ||
| 107 | @@ -900,6 +909,7 @@ interface(`logging_write_generic_logs',` | 134 | ######################################## |
| 135 | ## <summary> | ||
| 136 | @@ -939,10 +948,11 @@ interface(`logging_write_generic_logs',` | ||
| 137 | type var_log_t; | ||
| 138 | ') | ||
| 108 | 139 | ||
| 109 | files_search_var($1) | 140 | files_search_var($1) |
| 110 | allow $1 var_log_t:dir list_dir_perms; | 141 | allow $1 var_log_t:dir list_dir_perms; |
| @@ -112,7 +143,11 @@ index 4e94884..9a6f599 100644 | |||
| 112 | write_files_pattern($1, var_log_t, var_log_t) | 143 | write_files_pattern($1, var_log_t, var_log_t) |
| 113 | ') | 144 | ') |
| 114 | 145 | ||
| 115 | @@ -938,6 +948,7 @@ interface(`logging_rw_generic_logs',` | 146 | ######################################## |
| 147 | ## <summary> | ||
| 148 | @@ -977,10 +987,11 @@ interface(`logging_rw_generic_logs',` | ||
| 149 | type var_log_t; | ||
| 150 | ') | ||
| 116 | 151 | ||
| 117 | files_search_var($1) | 152 | files_search_var($1) |
| 118 | allow $1 var_log_t:dir list_dir_perms; | 153 | allow $1 var_log_t:dir list_dir_perms; |
| @@ -120,7 +155,11 @@ index 4e94884..9a6f599 100644 | |||
| 120 | rw_files_pattern($1, var_log_t, var_log_t) | 155 | rw_files_pattern($1, var_log_t, var_log_t) |
| 121 | ') | 156 | ') |
| 122 | 157 | ||
| 123 | @@ -960,6 +971,7 @@ interface(`logging_manage_generic_logs',` | 158 | ######################################## |
| 159 | ## <summary> | ||
| 160 | @@ -999,10 +1010,11 @@ interface(`logging_manage_generic_logs', | ||
| 161 | type var_log_t; | ||
| 162 | ') | ||
| 124 | 163 | ||
| 125 | files_search_var($1) | 164 | files_search_var($1) |
| 126 | manage_files_pattern($1, var_log_t, var_log_t) | 165 | manage_files_pattern($1, var_log_t, var_log_t) |
| @@ -128,18 +167,19 @@ index 4e94884..9a6f599 100644 | |||
| 128 | ') | 167 | ') |
| 129 | 168 | ||
| 130 | ######################################## | 169 | ######################################## |
| 131 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 170 | ## <summary> |
| 132 | index 2ab0a49..2795d89 100644 | 171 | ## All of the rules required to administrate |
| 133 | --- a/policy/modules/system/logging.te | 172 | --- a/policy/modules/system/logging.te |
| 134 | +++ b/policy/modules/system/logging.te | 173 | +++ b/policy/modules/system/logging.te |
| 135 | @@ -139,6 +139,7 @@ allow auditd_t auditd_etc_t:file read_file_perms; | 174 | @@ -151,10 +151,11 @@ allow auditd_t auditd_etc_t:file read_fi |
| 175 | |||
| 136 | manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t) | 176 | manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t) |
| 177 | allow auditd_t auditd_log_t:dir setattr; | ||
| 137 | manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t) | 178 | manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t) |
| 138 | allow auditd_t var_log_t:dir search_dir_perms; | 179 | allow auditd_t var_log_t:dir search_dir_perms; |
| 139 | +allow auditd_t var_log_t:lnk_file read_lnk_file_perms; | 180 | +allow auditd_t var_log_t:lnk_file read_lnk_file_perms; |
| 140 | 181 | ||
| 141 | manage_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) | 182 | manage_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) |
| 142 | manage_sock_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) | 183 | manage_sock_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) |
| 143 | -- | 184 | files_pid_filetrans(auditd_t, auditd_var_run_t, { file sock_file }) |
| 144 | 1.7.9.5 | 185 | |
| 145 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-syslogd_t-to-trusted-object.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-syslogd_t-to-trusted-object.patch index 92b1592..dc623d3 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-syslogd_t-to-trusted-object.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-syslogd_t-to-trusted-object.patch | |||
| @@ -10,15 +10,16 @@ Upstream-Status: Inappropriate [only for Poky] | |||
| 10 | 10 | ||
| 11 | Signed-off-by: Roy.Li <rongqing.li@windriver.com> | 11 | Signed-off-by: Roy.Li <rongqing.li@windriver.com> |
| 12 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 12 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 13 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 13 | --- | 14 | --- |
| 14 | policy/modules/system/logging.te | 1 + | 15 | policy/modules/system/logging.te | 1 + |
| 15 | 1 file changed, 1 insertion(+) | 16 | 1 file changed, 1 insertion(+) |
| 16 | 17 | ||
| 17 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | ||
| 18 | index 2914b0b..2ab0a49 100644 | ||
| 19 | --- a/policy/modules/system/logging.te | 18 | --- a/policy/modules/system/logging.te |
| 20 | +++ b/policy/modules/system/logging.te | 19 | +++ b/policy/modules/system/logging.te |
| 21 | @@ -450,6 +450,7 @@ fs_getattr_all_fs(syslogd_t) | 20 | @@ -477,10 +477,11 @@ files_var_lib_filetrans(syslogd_t, syslo |
| 21 | |||
| 22 | fs_getattr_all_fs(syslogd_t) | ||
| 22 | fs_search_auto_mountpoints(syslogd_t) | 23 | fs_search_auto_mountpoints(syslogd_t) |
| 23 | 24 | ||
| 24 | mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories | 25 | mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories |
| @@ -26,6 +27,5 @@ index 2914b0b..2ab0a49 100644 | |||
| 26 | 27 | ||
| 27 | term_write_console(syslogd_t) | 28 | term_write_console(syslogd_t) |
| 28 | # Allow syslog to a terminal | 29 | # Allow syslog to a terminal |
| 29 | -- | 30 | term_write_unallocated_ttys(syslogd_t) |
| 30 | 1.7.9.5 | 31 | |
| 31 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-nfsd-to-exec-shell-commands.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch index e77a730..ca2796f 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-nfsd-to-exec-shell-commands.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch | |||
| @@ -6,16 +6,17 @@ Subject: [PATCH] allow nfsd to exec shell commands. | |||
| 6 | Upstream-Status: Inappropriate [only for Poky] | 6 | Upstream-Status: Inappropriate [only for Poky] |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/contrib/rpc.te | 2 +- | 11 | policy/modules/contrib/rpc.te | 2 +- |
| 11 | policy/modules/kernel/kernel.if | 18 ++++++++++++++++++ | 12 | policy/modules/kernel/kernel.if | 18 ++++++++++++++++++ |
| 12 | 2 files changed, 19 insertions(+), 1 deletions(-) | 13 | 2 files changed, 19 insertions(+), 1 deletions(-) |
| 13 | 14 | ||
| 14 | diff --git a/policy/modules/contrib/rpc.te b/policy/modules/contrib/rpc.te | ||
| 15 | index 9566932..5605205 100644 | ||
| 16 | --- a/policy/modules/contrib/rpc.te | 15 | --- a/policy/modules/contrib/rpc.te |
| 17 | +++ b/policy/modules/contrib/rpc.te | 16 | +++ b/policy/modules/contrib/rpc.te |
| 18 | @@ -203,7 +203,7 @@ kernel_read_network_state(nfsd_t) | 17 | @@ -222,11 +222,11 @@ allow nfsd_t { nfsd_rw_t nfsd_ro_t }:dir |
| 18 | |||
| 19 | kernel_read_network_state(nfsd_t) | ||
| 19 | kernel_dontaudit_getattr_core_if(nfsd_t) | 20 | kernel_dontaudit_getattr_core_if(nfsd_t) |
| 20 | kernel_setsched(nfsd_t) | 21 | kernel_setsched(nfsd_t) |
| 21 | kernel_request_load_module(nfsd_t) | 22 | kernel_request_load_module(nfsd_t) |
| @@ -24,11 +25,13 @@ index 9566932..5605205 100644 | |||
| 24 | 25 | ||
| 25 | corenet_sendrecv_nfs_server_packets(nfsd_t) | 26 | corenet_sendrecv_nfs_server_packets(nfsd_t) |
| 26 | corenet_tcp_bind_nfs_port(nfsd_t) | 27 | corenet_tcp_bind_nfs_port(nfsd_t) |
| 27 | diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if | 28 | corenet_udp_bind_nfs_port(nfsd_t) |
| 28 | index 649e458..8a669c5 100644 | 29 | |
| 29 | --- a/policy/modules/kernel/kernel.if | 30 | --- a/policy/modules/kernel/kernel.if |
| 30 | +++ b/policy/modules/kernel/kernel.if | 31 | +++ b/policy/modules/kernel/kernel.if |
| 31 | @@ -804,6 +804,24 @@ interface(`kernel_unmount_proc',` | 32 | @@ -844,10 +844,28 @@ interface(`kernel_unmount_proc',` |
| 33 | allow $1 proc_t:filesystem unmount; | ||
| 34 | ') | ||
| 32 | 35 | ||
| 33 | ######################################## | 36 | ######################################## |
| 34 | ## <summary> | 37 | ## <summary> |
| @@ -53,6 +56,5 @@ index 649e458..8a669c5 100644 | |||
| 53 | ## Get the attributes of the proc filesystem. | 56 | ## Get the attributes of the proc filesystem. |
| 54 | ## </summary> | 57 | ## </summary> |
| 55 | ## <param name="domain"> | 58 | ## <param name="domain"> |
| 56 | -- | 59 | ## <summary> |
| 57 | 1.7.5.4 | 60 | ## Domain allowed access. |
| 58 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-setfiles_t-to-read-symlinks.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-setfiles_t-to-read-symlinks.patch index 9ef61b4..d28bde0 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-setfiles_t-to-read-symlinks.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-setfiles_t-to-read-symlinks.patch | |||
| @@ -7,15 +7,16 @@ Upstream-Status: Pending | |||
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> | 9 | Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> |
| 10 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 10 | --- | 11 | --- |
| 11 | policy/modules/system/selinuxutil.te | 3 +++ | 12 | policy/modules/system/selinuxutil.te | 3 +++ |
| 12 | 1 file changed, 3 insertions(+) | 13 | 1 file changed, 3 insertions(+) |
| 13 | 14 | ||
| 14 | diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te | ||
| 15 | index 9058dd8..f998491 100644 | ||
| 16 | --- a/policy/modules/system/selinuxutil.te | 15 | --- a/policy/modules/system/selinuxutil.te |
| 17 | +++ b/policy/modules/system/selinuxutil.te | 16 | +++ b/policy/modules/system/selinuxutil.te |
| 18 | @@ -552,6 +552,9 @@ files_relabel_all_files(setfiles_t) | 17 | @@ -553,10 +553,13 @@ files_read_etc_files(setfiles_t) |
| 18 | files_list_all(setfiles_t) | ||
| 19 | files_relabel_all_files(setfiles_t) | ||
| 19 | files_read_usr_symlinks(setfiles_t) | 20 | files_read_usr_symlinks(setfiles_t) |
| 20 | files_dontaudit_read_all_symlinks(setfiles_t) | 21 | files_dontaudit_read_all_symlinks(setfiles_t) |
| 21 | 22 | ||
| @@ -25,6 +26,5 @@ index 9058dd8..f998491 100644 | |||
| 25 | fs_getattr_all_xattr_fs(setfiles_t) | 26 | fs_getattr_all_xattr_fs(setfiles_t) |
| 26 | fs_list_all(setfiles_t) | 27 | fs_list_all(setfiles_t) |
| 27 | fs_search_auto_mountpoints(setfiles_t) | 28 | fs_search_auto_mountpoints(setfiles_t) |
| 28 | -- | 29 | fs_relabelfrom_noxattr_fs(setfiles_t) |
| 29 | 1.7.9.5 | 30 | |
| 30 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-sysadm-to-run-rpcinfo.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-sysadm-to-run-rpcinfo.patch index ec3dbf4..a1fda13 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-sysadm-to-run-rpcinfo.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-sysadm-to-run-rpcinfo.patch | |||
| @@ -9,15 +9,16 @@ type=AVC msg=audit(1392427946.976:264): avc: denied { connectto } for pid=211 | |||
| 9 | type=SYSCALL msg=audit(1392427946.976:264): arch=c000003e syscall=42 success=no exit=-13 a0=3 a1=7fff3aa20000 a2=17 a3=22 items=0 ppid=2108 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=pts0 comm="rpcinfo" exe="/usr/sbin/rpcinfo" subj=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 key=(null) | 9 | type=SYSCALL msg=audit(1392427946.976:264): arch=c000003e syscall=42 success=no exit=-13 a0=3 a1=7fff3aa20000 a2=17 a3=22 items=0 ppid=2108 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=pts0 comm="rpcinfo" exe="/usr/sbin/rpcinfo" subj=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 key=(null) |
| 10 | 10 | ||
| 11 | Signed-off-by: Roy Li <rongqing.li@windriver.com> | 11 | Signed-off-by: Roy Li <rongqing.li@windriver.com> |
| 12 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 12 | --- | 13 | --- |
| 13 | policy/modules/roles/sysadm.te | 4 ++++ | 14 | policy/modules/roles/sysadm.te | 4 ++++ |
| 14 | 1 file changed, 4 insertions(+) | 15 | 1 file changed, 4 insertions(+) |
| 15 | 16 | ||
| 16 | diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te | ||
| 17 | index 1767217..5502c6a 100644 | ||
| 18 | --- a/policy/modules/roles/sysadm.te | 17 | --- a/policy/modules/roles/sysadm.te |
| 19 | +++ b/policy/modules/roles/sysadm.te | 18 | +++ b/policy/modules/roles/sysadm.te |
| 20 | @@ -413,6 +413,10 @@ optional_policy(` | 19 | @@ -1169,10 +1169,14 @@ optional_policy(` |
| 20 | virt_admin(sysadm_t, sysadm_r) | ||
| 21 | virt_stream_connect(sysadm_t) | ||
| 21 | ') | 22 | ') |
| 22 | 23 | ||
| 23 | optional_policy(` | 24 | optional_policy(` |
| @@ -28,6 +29,5 @@ index 1767217..5502c6a 100644 | |||
| 28 | vmware_role(sysadm_r, sysadm_t) | 29 | vmware_role(sysadm_r, sysadm_t) |
| 29 | ') | 30 | ') |
| 30 | 31 | ||
| 31 | -- | 32 | optional_policy(` |
| 32 | 1.7.10.4 | 33 | vnstatd_admin(sysadm_t, sysadm_r) |
| 33 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-don-t-audit-tty_device_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-don-t-audit-tty_device_t.patch index 82370d8..346872a 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-don-t-audit-tty_device_t.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-don-t-audit-tty_device_t.patch | |||
| @@ -9,15 +9,16 @@ term_dontaudit_use_console. | |||
| 9 | Upstream-Status: Inappropriate [only for Poky] | 9 | Upstream-Status: Inappropriate [only for Poky] |
| 10 | 10 | ||
| 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 12 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 12 | --- | 13 | --- |
| 13 | policy/modules/kernel/terminal.if | 3 +++ | 14 | policy/modules/kernel/terminal.if | 3 +++ |
| 14 | 1 file changed, 3 insertions(+) | 15 | 1 file changed, 3 insertions(+) |
| 15 | 16 | ||
| 16 | diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if | ||
| 17 | index 7519d0e..45de1ac 100644 | ||
| 18 | --- a/policy/modules/kernel/terminal.if | 17 | --- a/policy/modules/kernel/terminal.if |
| 19 | +++ b/policy/modules/kernel/terminal.if | 18 | +++ b/policy/modules/kernel/terminal.if |
| 20 | @@ -299,9 +299,12 @@ interface(`term_use_console',` | 19 | @@ -297,13 +297,16 @@ interface(`term_use_console',` |
| 20 | ## </param> | ||
| 21 | # | ||
| 21 | interface(`term_dontaudit_use_console',` | 22 | interface(`term_dontaudit_use_console',` |
| 22 | gen_require(` | 23 | gen_require(` |
| 23 | type console_device_t; | 24 | type console_device_t; |
| @@ -30,6 +31,5 @@ index 7519d0e..45de1ac 100644 | |||
| 30 | ') | 31 | ') |
| 31 | 32 | ||
| 32 | ######################################## | 33 | ######################################## |
| 33 | -- | 34 | ## <summary> |
| 34 | 1.7.9.5 | 35 | ## Set the attributes of the console |
| 35 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-dmesg-to-use-dev-kmsg.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-dmesg-to-use-dev-kmsg.patch index d6c8dbf..8443e31 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-dmesg-to-use-dev-kmsg.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-dmesg-to-use-dev-kmsg.patch | |||
| @@ -4,26 +4,27 @@ Date: Fri, 23 Aug 2013 16:36:09 +0800 | |||
| 4 | Subject: [PATCH] fix dmesg to use /dev/kmsg as default input | 4 | Subject: [PATCH] fix dmesg to use /dev/kmsg as default input |
| 5 | 5 | ||
| 6 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 6 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 7 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 7 | --- | 8 | --- |
| 8 | policy/modules/admin/dmesg.if | 1 + | 9 | policy/modules/admin/dmesg.if | 1 + |
| 9 | policy/modules/admin/dmesg.te | 2 ++ | 10 | policy/modules/admin/dmesg.te | 2 ++ |
| 10 | 2 files changed, 3 insertions(+) | 11 | 2 files changed, 3 insertions(+) |
| 11 | 12 | ||
| 12 | diff --git a/policy/modules/admin/dmesg.if b/policy/modules/admin/dmesg.if | ||
| 13 | index e1973c7..739a4bc 100644 | ||
| 14 | --- a/policy/modules/admin/dmesg.if | 13 | --- a/policy/modules/admin/dmesg.if |
| 15 | +++ b/policy/modules/admin/dmesg.if | 14 | +++ b/policy/modules/admin/dmesg.if |
| 16 | @@ -37,4 +37,5 @@ interface(`dmesg_exec',` | 15 | @@ -35,6 +35,7 @@ interface(`dmesg_exec',` |
| 16 | type dmesg_exec_t; | ||
| 17 | ') | ||
| 17 | 18 | ||
| 18 | corecmd_search_bin($1) | 19 | corecmd_search_bin($1) |
| 19 | can_exec($1, dmesg_exec_t) | 20 | can_exec($1, dmesg_exec_t) |
| 20 | + dev_read_kmsg($1) | 21 | + dev_read_kmsg($1) |
| 21 | ') | 22 | ') |
| 22 | diff --git a/policy/modules/admin/dmesg.te b/policy/modules/admin/dmesg.te | ||
| 23 | index 72bc6d8..c591aea 100644 | ||
| 24 | --- a/policy/modules/admin/dmesg.te | 23 | --- a/policy/modules/admin/dmesg.te |
| 25 | +++ b/policy/modules/admin/dmesg.te | 24 | +++ b/policy/modules/admin/dmesg.te |
| 26 | @@ -28,6 +28,8 @@ kernel_read_proc_symlinks(dmesg_t) | 25 | @@ -28,10 +28,12 @@ kernel_read_proc_symlinks(dmesg_t) |
| 26 | # for when /usr is not mounted: | ||
| 27 | kernel_dontaudit_search_unlabeled(dmesg_t) | ||
| 27 | 28 | ||
| 28 | dev_read_sysfs(dmesg_t) | 29 | dev_read_sysfs(dmesg_t) |
| 29 | 30 | ||
| @@ -32,6 +33,5 @@ index 72bc6d8..c591aea 100644 | |||
| 32 | fs_search_auto_mountpoints(dmesg_t) | 33 | fs_search_auto_mountpoints(dmesg_t) |
| 33 | 34 | ||
| 34 | term_dontaudit_use_console(dmesg_t) | 35 | term_dontaudit_use_console(dmesg_t) |
| 35 | -- | 36 | |
| 36 | 1.7.9.5 | 37 | domain_use_interactive_fds(dmesg_t) |
| 37 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-new-SELINUXMNT-in-sys.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-new-SELINUXMNT-in-sys.patch index 7e92b64..58903ce 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-new-SELINUXMNT-in-sys.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-new-SELINUXMNT-in-sys.patch | |||
| @@ -14,11 +14,11 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 14 | policy/modules/kernel/selinux.if | 34 ++++++++++++++++++++++++++++++++-- | 14 | policy/modules/kernel/selinux.if | 34 ++++++++++++++++++++++++++++++++-- |
| 15 | 1 file changed, 32 insertions(+), 2 deletions(-) | 15 | 1 file changed, 32 insertions(+), 2 deletions(-) |
| 16 | 16 | ||
| 17 | Index: refpolicy/policy/modules/kernel/selinux.if | 17 | --- a/policy/modules/kernel/selinux.if |
| 18 | =================================================================== | 18 | +++ b/policy/modules/kernel/selinux.if |
| 19 | --- refpolicy.orig/policy/modules/kernel/selinux.if | 19 | @@ -56,10 +56,14 @@ interface(`selinux_labeled_boolean',` |
| 20 | +++ refpolicy/policy/modules/kernel/selinux.if | 20 | interface(`selinux_get_fs_mount',` |
| 21 | @@ -58,6 +58,10 @@ interface(`selinux_get_fs_mount',` | 21 | gen_require(` |
| 22 | type security_t; | 22 | type security_t; |
| 23 | ') | 23 | ') |
| 24 | 24 | ||
| @@ -29,7 +29,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 29 | # starting in libselinux 2.0.5, init_selinuxmnt() will | 29 | # starting in libselinux 2.0.5, init_selinuxmnt() will |
| 30 | # attempt to short circuit by checking if SELINUXMNT | 30 | # attempt to short circuit by checking if SELINUXMNT |
| 31 | # (/selinux) is already a selinuxfs | 31 | # (/selinux) is already a selinuxfs |
| 32 | @@ -88,6 +92,7 @@ interface(`selinux_dontaudit_get_fs_moun | 32 | allow $1 security_t:filesystem getattr; |
| 33 | |||
| 34 | @@ -86,10 +90,11 @@ interface(`selinux_get_fs_mount',` | ||
| 35 | interface(`selinux_dontaudit_get_fs_mount',` | ||
| 36 | gen_require(` | ||
| 33 | type security_t; | 37 | type security_t; |
| 34 | ') | 38 | ') |
| 35 | 39 | ||
| @@ -37,7 +41,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 37 | # starting in libselinux 2.0.5, init_selinuxmnt() will | 41 | # starting in libselinux 2.0.5, init_selinuxmnt() will |
| 38 | # attempt to short circuit by checking if SELINUXMNT | 42 | # attempt to short circuit by checking if SELINUXMNT |
| 39 | # (/selinux) is already a selinuxfs | 43 | # (/selinux) is already a selinuxfs |
| 40 | @@ -117,6 +122,8 @@ interface(`selinux_mount_fs',` | 44 | dontaudit $1 security_t:filesystem getattr; |
| 45 | |||
| 46 | @@ -115,10 +120,12 @@ interface(`selinux_dontaudit_get_fs_moun | ||
| 47 | interface(`selinux_mount_fs',` | ||
| 48 | gen_require(` | ||
| 41 | type security_t; | 49 | type security_t; |
| 42 | ') | 50 | ') |
| 43 | 51 | ||
| @@ -46,7 +54,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 46 | allow $1 security_t:filesystem mount; | 54 | allow $1 security_t:filesystem mount; |
| 47 | ') | 55 | ') |
| 48 | 56 | ||
| 49 | @@ -136,6 +143,8 @@ interface(`selinux_remount_fs',` | 57 | ######################################## |
| 58 | ## <summary> | ||
| 59 | @@ -134,10 +141,12 @@ interface(`selinux_mount_fs',` | ||
| 60 | interface(`selinux_remount_fs',` | ||
| 61 | gen_require(` | ||
| 50 | type security_t; | 62 | type security_t; |
| 51 | ') | 63 | ') |
| 52 | 64 | ||
| @@ -55,7 +67,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 55 | allow $1 security_t:filesystem remount; | 67 | allow $1 security_t:filesystem remount; |
| 56 | ') | 68 | ') |
| 57 | 69 | ||
| 58 | @@ -154,6 +163,8 @@ interface(`selinux_unmount_fs',` | 70 | ######################################## |
| 71 | ## <summary> | ||
| 72 | @@ -152,10 +161,12 @@ interface(`selinux_remount_fs',` | ||
| 73 | interface(`selinux_unmount_fs',` | ||
| 74 | gen_require(` | ||
| 59 | type security_t; | 75 | type security_t; |
| 60 | ') | 76 | ') |
| 61 | 77 | ||
| @@ -64,7 +80,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 64 | allow $1 security_t:filesystem unmount; | 80 | allow $1 security_t:filesystem unmount; |
| 65 | ') | 81 | ') |
| 66 | 82 | ||
| 67 | @@ -172,6 +183,8 @@ interface(`selinux_getattr_fs',` | 83 | ######################################## |
| 84 | ## <summary> | ||
| 85 | @@ -170,10 +181,12 @@ interface(`selinux_unmount_fs',` | ||
| 86 | interface(`selinux_getattr_fs',` | ||
| 87 | gen_require(` | ||
| 68 | type security_t; | 88 | type security_t; |
| 69 | ') | 89 | ') |
| 70 | 90 | ||
| @@ -73,7 +93,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 73 | allow $1 security_t:filesystem getattr; | 93 | allow $1 security_t:filesystem getattr; |
| 74 | 94 | ||
| 75 | dev_getattr_sysfs($1) | 95 | dev_getattr_sysfs($1) |
| 76 | @@ -194,6 +207,7 @@ interface(`selinux_dontaudit_getattr_fs' | 96 | dev_search_sysfs($1) |
| 97 | ') | ||
| 98 | @@ -192,10 +205,11 @@ interface(`selinux_getattr_fs',` | ||
| 99 | interface(`selinux_dontaudit_getattr_fs',` | ||
| 100 | gen_require(` | ||
| 77 | type security_t; | 101 | type security_t; |
| 78 | ') | 102 | ') |
| 79 | 103 | ||
| @@ -81,7 +105,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 81 | dontaudit $1 security_t:filesystem getattr; | 105 | dontaudit $1 security_t:filesystem getattr; |
| 82 | 106 | ||
| 83 | dev_dontaudit_getattr_sysfs($1) | 107 | dev_dontaudit_getattr_sysfs($1) |
| 84 | @@ -216,6 +230,7 @@ interface(`selinux_dontaudit_getattr_dir | 108 | dev_dontaudit_search_sysfs($1) |
| 109 | ') | ||
| 110 | @@ -214,10 +228,11 @@ interface(`selinux_dontaudit_getattr_fs' | ||
| 111 | interface(`selinux_dontaudit_getattr_dir',` | ||
| 112 | gen_require(` | ||
| 85 | type security_t; | 113 | type security_t; |
| 86 | ') | 114 | ') |
| 87 | 115 | ||
| @@ -89,7 +117,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 89 | dontaudit $1 security_t:dir getattr; | 117 | dontaudit $1 security_t:dir getattr; |
| 90 | ') | 118 | ') |
| 91 | 119 | ||
| 92 | @@ -234,6 +249,7 @@ interface(`selinux_search_fs',` | 120 | ######################################## |
| 121 | ## <summary> | ||
| 122 | @@ -232,10 +247,11 @@ interface(`selinux_dontaudit_getattr_dir | ||
| 123 | interface(`selinux_search_fs',` | ||
| 124 | gen_require(` | ||
| 93 | type security_t; | 125 | type security_t; |
| 94 | ') | 126 | ') |
| 95 | 127 | ||
| @@ -97,7 +129,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 97 | dev_search_sysfs($1) | 129 | dev_search_sysfs($1) |
| 98 | allow $1 security_t:dir search_dir_perms; | 130 | allow $1 security_t:dir search_dir_perms; |
| 99 | ') | 131 | ') |
| 100 | @@ -253,6 +269,7 @@ interface(`selinux_dontaudit_search_fs', | 132 | |
| 133 | ######################################## | ||
| 134 | @@ -251,10 +267,11 @@ interface(`selinux_search_fs',` | ||
| 135 | interface(`selinux_dontaudit_search_fs',` | ||
| 136 | gen_require(` | ||
| 101 | type security_t; | 137 | type security_t; |
| 102 | ') | 138 | ') |
| 103 | 139 | ||
| @@ -105,7 +141,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 105 | dontaudit $1 security_t:dir search_dir_perms; | 141 | dontaudit $1 security_t:dir search_dir_perms; |
| 106 | ') | 142 | ') |
| 107 | 143 | ||
| 108 | @@ -272,6 +289,7 @@ interface(`selinux_dontaudit_read_fs',` | 144 | ######################################## |
| 145 | ## <summary> | ||
| 146 | @@ -270,10 +287,11 @@ interface(`selinux_dontaudit_search_fs', | ||
| 147 | interface(`selinux_dontaudit_read_fs',` | ||
| 148 | gen_require(` | ||
| 109 | type security_t; | 149 | type security_t; |
| 110 | ') | 150 | ') |
| 111 | 151 | ||
| @@ -113,7 +153,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 113 | dontaudit $1 security_t:dir search_dir_perms; | 153 | dontaudit $1 security_t:dir search_dir_perms; |
| 114 | dontaudit $1 security_t:file read_file_perms; | 154 | dontaudit $1 security_t:file read_file_perms; |
| 115 | ') | 155 | ') |
| 116 | @@ -293,6 +311,7 @@ interface(`selinux_get_enforce_mode',` | 156 | |
| 157 | ######################################## | ||
| 158 | @@ -291,10 +309,11 @@ interface(`selinux_dontaudit_read_fs',` | ||
| 159 | interface(`selinux_get_enforce_mode',` | ||
| 160 | gen_require(` | ||
| 117 | type security_t; | 161 | type security_t; |
| 118 | ') | 162 | ') |
| 119 | 163 | ||
| @@ -121,7 +165,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 121 | dev_search_sysfs($1) | 165 | dev_search_sysfs($1) |
| 122 | allow $1 security_t:dir list_dir_perms; | 166 | allow $1 security_t:dir list_dir_perms; |
| 123 | allow $1 security_t:file read_file_perms; | 167 | allow $1 security_t:file read_file_perms; |
| 124 | @@ -361,6 +380,7 @@ interface(`selinux_read_policy',` | 168 | ') |
| 169 | |||
| 170 | @@ -359,10 +378,11 @@ interface(`selinux_load_policy',` | ||
| 171 | interface(`selinux_read_policy',` | ||
| 172 | gen_require(` | ||
| 125 | type security_t; | 173 | type security_t; |
| 126 | ') | 174 | ') |
| 127 | 175 | ||
| @@ -129,7 +177,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 129 | dev_search_sysfs($1) | 177 | dev_search_sysfs($1) |
| 130 | allow $1 security_t:dir list_dir_perms; | 178 | allow $1 security_t:dir list_dir_perms; |
| 131 | allow $1 security_t:file read_file_perms; | 179 | allow $1 security_t:file read_file_perms; |
| 132 | @@ -426,6 +446,7 @@ interface(`selinux_set_generic_booleans' | 180 | allow $1 security_t:security read_policy; |
| 181 | ') | ||
| 182 | @@ -424,10 +444,11 @@ interface(`selinux_set_boolean',` | ||
| 183 | interface(`selinux_set_generic_booleans',` | ||
| 184 | gen_require(` | ||
| 133 | type security_t; | 185 | type security_t; |
| 134 | ') | 186 | ') |
| 135 | 187 | ||
| @@ -137,7 +189,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 137 | dev_search_sysfs($1) | 189 | dev_search_sysfs($1) |
| 138 | 190 | ||
| 139 | allow $1 security_t:dir list_dir_perms; | 191 | allow $1 security_t:dir list_dir_perms; |
| 140 | @@ -463,6 +484,7 @@ interface(`selinux_set_all_booleans',` | 192 | allow $1 security_t:file rw_file_perms; |
| 193 | |||
| 194 | @@ -461,10 +482,11 @@ interface(`selinux_set_all_booleans',` | ||
| 195 | type security_t, secure_mode_policyload_t; | ||
| 196 | attribute boolean_type; | ||
| 141 | bool secure_mode_policyload; | 197 | bool secure_mode_policyload; |
| 142 | ') | 198 | ') |
| 143 | 199 | ||
| @@ -145,7 +201,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 145 | dev_search_sysfs($1) | 201 | dev_search_sysfs($1) |
| 146 | 202 | ||
| 147 | allow $1 security_t:dir list_dir_perms; | 203 | allow $1 security_t:dir list_dir_perms; |
| 148 | @@ -522,6 +544,7 @@ interface(`selinux_validate_context',` | 204 | allow $1 { boolean_type -secure_mode_policyload_t }:file rw_file_perms; |
| 205 | allow $1 secure_mode_policyload_t:file read_file_perms; | ||
| 206 | @@ -520,10 +542,11 @@ interface(`selinux_set_parameters',` | ||
| 207 | interface(`selinux_validate_context',` | ||
| 208 | gen_require(` | ||
| 149 | type security_t; | 209 | type security_t; |
| 150 | ') | 210 | ') |
| 151 | 211 | ||
| @@ -153,7 +213,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 153 | dev_search_sysfs($1) | 213 | dev_search_sysfs($1) |
| 154 | allow $1 security_t:dir list_dir_perms; | 214 | allow $1 security_t:dir list_dir_perms; |
| 155 | allow $1 security_t:file rw_file_perms; | 215 | allow $1 security_t:file rw_file_perms; |
| 156 | @@ -544,6 +567,7 @@ interface(`selinux_dontaudit_validate_co | 216 | allow $1 security_t:security check_context; |
| 217 | ') | ||
| 218 | @@ -542,10 +565,11 @@ interface(`selinux_validate_context',` | ||
| 219 | interface(`selinux_dontaudit_validate_context',` | ||
| 220 | gen_require(` | ||
| 157 | type security_t; | 221 | type security_t; |
| 158 | ') | 222 | ') |
| 159 | 223 | ||
| @@ -161,7 +225,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 161 | dontaudit $1 security_t:dir list_dir_perms; | 225 | dontaudit $1 security_t:dir list_dir_perms; |
| 162 | dontaudit $1 security_t:file rw_file_perms; | 226 | dontaudit $1 security_t:file rw_file_perms; |
| 163 | dontaudit $1 security_t:security check_context; | 227 | dontaudit $1 security_t:security check_context; |
| 164 | @@ -565,6 +589,7 @@ interface(`selinux_compute_access_vector | 228 | ') |
| 229 | |||
| 230 | @@ -563,10 +587,11 @@ interface(`selinux_dontaudit_validate_co | ||
| 231 | interface(`selinux_compute_access_vector',` | ||
| 232 | gen_require(` | ||
| 165 | type security_t; | 233 | type security_t; |
| 166 | ') | 234 | ') |
| 167 | 235 | ||
| @@ -169,7 +237,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 169 | dev_search_sysfs($1) | 237 | dev_search_sysfs($1) |
| 170 | allow $1 security_t:dir list_dir_perms; | 238 | allow $1 security_t:dir list_dir_perms; |
| 171 | allow $1 security_t:file rw_file_perms; | 239 | allow $1 security_t:file rw_file_perms; |
| 172 | @@ -660,6 +685,13 @@ interface(`selinux_compute_user_contexts | 240 | allow $1 security_t:security compute_av; |
| 241 | ') | ||
| 242 | @@ -658,10 +683,17 @@ interface(`selinux_compute_relabel_conte | ||
| 243 | interface(`selinux_compute_user_contexts',` | ||
| 244 | gen_require(` | ||
| 173 | type security_t; | 245 | type security_t; |
| 174 | ') | 246 | ') |
| 175 | 247 | ||
| @@ -183,3 +255,5 @@ Index: refpolicy/policy/modules/kernel/selinux.if | |||
| 183 | dev_search_sysfs($1) | 255 | dev_search_sysfs($1) |
| 184 | allow $1 security_t:dir list_dir_perms; | 256 | allow $1 security_t:dir list_dir_perms; |
| 185 | allow $1 security_t:file rw_file_perms; | 257 | allow $1 security_t:file rw_file_perms; |
| 258 | allow $1 security_t:security compute_user; | ||
| 259 | ') | ||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch index f04ebec..883daf8 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch | |||
| @@ -14,23 +14,11 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 14 | policy/modules/kernel/kernel.te | 2 ++ | 14 | policy/modules/kernel/kernel.te | 2 ++ |
| 15 | 4 files changed, 13 insertions(+) | 15 | 4 files changed, 13 insertions(+) |
| 16 | 16 | ||
| 17 | --- a/policy/modules/contrib/rpc.te | ||
| 18 | +++ b/policy/modules/contrib/rpc.te | ||
| 19 | @@ -263,6 +263,11 @@ tunable_policy(`nfs_export_all_ro',` | ||
| 20 | |||
| 21 | optional_policy(` | ||
| 22 | mount_exec(nfsd_t) | ||
| 23 | + # Should domtrans to mount_t while mounting nfsd_fs_t. | ||
| 24 | + mount_domtrans(nfsd_t) | ||
| 25 | + # nfsd_t need to chdir to /var/lib/nfs and read files. | ||
| 26 | + files_list_var(nfsd_t) | ||
| 27 | + rpc_read_nfs_state_data(nfsd_t) | ||
| 28 | ') | ||
| 29 | |||
| 30 | ######################################## | ||
| 31 | --- a/policy/modules/contrib/rpcbind.te | 17 | --- a/policy/modules/contrib/rpcbind.te |
| 32 | +++ b/policy/modules/contrib/rpcbind.te | 18 | +++ b/policy/modules/contrib/rpcbind.te |
| 33 | @@ -70,6 +70,11 @@ logging_send_syslog_msg(rpcbind_t) | 19 | @@ -71,8 +71,13 @@ auth_use_nsswitch(rpcbind_t) |
| 20 | |||
| 21 | logging_send_syslog_msg(rpcbind_t) | ||
| 34 | 22 | ||
| 35 | miscfiles_read_localization(rpcbind_t) | 23 | miscfiles_read_localization(rpcbind_t) |
| 36 | 24 | ||
| @@ -42,20 +30,44 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 42 | ifdef(`distro_debian',` | 30 | ifdef(`distro_debian',` |
| 43 | term_dontaudit_use_unallocated_ttys(rpcbind_t) | 31 | term_dontaudit_use_unallocated_ttys(rpcbind_t) |
| 44 | ') | 32 | ') |
| 33 | --- a/policy/modules/contrib/rpc.te | ||
| 34 | +++ b/policy/modules/contrib/rpc.te | ||
| 35 | @@ -275,10 +275,15 @@ tunable_policy(`nfs_export_all_ro',` | ||
| 36 | files_read_non_auth_files(nfsd_t) | ||
| 37 | ') | ||
| 38 | |||
| 39 | optional_policy(` | ||
| 40 | mount_exec(nfsd_t) | ||
| 41 | + # Should domtrans to mount_t while mounting nfsd_fs_t. | ||
| 42 | + mount_domtrans(nfsd_t) | ||
| 43 | + # nfsd_t need to chdir to /var/lib/nfs and read files. | ||
| 44 | + files_list_var(nfsd_t) | ||
| 45 | + rpc_read_nfs_state_data(nfsd_t) | ||
| 46 | ') | ||
| 47 | |||
| 48 | ######################################## | ||
| 49 | # | ||
| 50 | # GSSD local policy | ||
| 45 | --- a/policy/modules/kernel/filesystem.te | 51 | --- a/policy/modules/kernel/filesystem.te |
| 46 | +++ b/policy/modules/kernel/filesystem.te | 52 | +++ b/policy/modules/kernel/filesystem.te |
| 47 | @@ -119,6 +119,7 @@ genfscon mvfs / gen_context(system_u:obj | 53 | @@ -127,10 +127,11 @@ fs_noxattr_type(mvfs_t) |
| 54 | allow mvfs_t self:filesystem associate; | ||
| 55 | genfscon mvfs / gen_context(system_u:object_r:mvfs_t,s0) | ||
| 48 | 56 | ||
| 49 | type nfsd_fs_t; | 57 | type nfsd_fs_t; |
| 50 | fs_type(nfsd_fs_t) | 58 | fs_type(nfsd_fs_t) |
| 51 | +files_mountpoint(nfsd_fs_t) | 59 | +files_mountpoint(nfsd_fs_t) |
| 52 | genfscon nfsd / gen_context(system_u:object_r:nfsd_fs_t,s0) | 60 | genfscon nfsd / gen_context(system_u:object_r:nfsd_fs_t,s0) |
| 53 | 61 | ||
| 54 | type oprofilefs_t; | 62 | type nsfs_t; |
| 63 | fs_type(nsfs_t) | ||
| 64 | genfscon nsfs / gen_context(system_u:object_r:nsfs_t,s0) | ||
| 55 | --- a/policy/modules/kernel/kernel.te | 65 | --- a/policy/modules/kernel/kernel.te |
| 56 | +++ b/policy/modules/kernel/kernel.te | 66 | +++ b/policy/modules/kernel/kernel.te |
| 57 | @@ -293,6 +293,8 @@ mls_process_read_up(kernel_t) | 67 | @@ -324,10 +324,12 @@ mcs_process_set_categories(kernel_t) |
| 58 | mls_process_write_down(kernel_t) | 68 | |
| 69 | mls_process_read_all_levels(kernel_t) | ||
| 70 | mls_process_write_all_levels(kernel_t) | ||
| 59 | mls_file_write_all_levels(kernel_t) | 71 | mls_file_write_all_levels(kernel_t) |
| 60 | mls_file_read_all_levels(kernel_t) | 72 | mls_file_read_all_levels(kernel_t) |
| 61 | +mls_socket_write_all_levels(kernel_t) | 73 | +mls_socket_write_all_levels(kernel_t) |
| @@ -63,3 +75,5 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 63 | 75 | ||
| 64 | ifdef(`distro_redhat',` | 76 | ifdef(`distro_redhat',` |
| 65 | # Bugzilla 222337 | 77 | # Bugzilla 222337 |
| 78 | fs_rw_tmpfs_chr_files(kernel_t) | ||
| 79 | ') | ||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-setfiles-statvfs-get-file-count.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-setfiles-statvfs-get-file-count.patch index 0b8cc5d..1cfd80b 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-setfiles-statvfs-get-file-count.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-setfiles-statvfs-get-file-count.patch | |||
| @@ -10,15 +10,16 @@ Upstream-Status: pending | |||
| 10 | 10 | ||
| 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 11 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 12 | Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> | 12 | Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> |
| 13 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 13 | --- | 14 | --- |
| 14 | policy/modules/system/selinuxutil.te | 2 +- | 15 | policy/modules/system/selinuxutil.te | 2 +- |
| 15 | 1 file changed, 1 insertion(+), 1 deletion(-) | 16 | 1 file changed, 1 insertion(+), 1 deletion(-) |
| 16 | 17 | ||
| 17 | diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te | ||
| 18 | index f998491..1a4e565 100644 | ||
| 19 | --- a/policy/modules/system/selinuxutil.te | 18 | --- a/policy/modules/system/selinuxutil.te |
| 20 | +++ b/policy/modules/system/selinuxutil.te | 19 | +++ b/policy/modules/system/selinuxutil.te |
| 21 | @@ -555,7 +555,7 @@ files_dontaudit_read_all_symlinks(setfiles_t) | 20 | @@ -556,11 +556,11 @@ files_read_usr_symlinks(setfiles_t) |
| 21 | files_dontaudit_read_all_symlinks(setfiles_t) | ||
| 22 | |||
| 22 | # needs to be able to read symlinks to make restorecon on symlink working | 23 | # needs to be able to read symlinks to make restorecon on symlink working |
| 23 | files_read_all_symlinks(setfiles_t) | 24 | files_read_all_symlinks(setfiles_t) |
| 24 | 25 | ||
| @@ -27,6 +28,5 @@ index f998491..1a4e565 100644 | |||
| 27 | fs_list_all(setfiles_t) | 28 | fs_list_all(setfiles_t) |
| 28 | fs_search_auto_mountpoints(setfiles_t) | 29 | fs_search_auto_mountpoints(setfiles_t) |
| 29 | fs_relabelfrom_noxattr_fs(setfiles_t) | 30 | fs_relabelfrom_noxattr_fs(setfiles_t) |
| 30 | -- | 31 | |
| 31 | 1.7.9.5 | 32 | mls_file_read_all_levels(setfiles_t) |
| 32 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-seutils-manage-config-files.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-seutils-manage-config-files.patch index be33bf1..fba7759 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-seutils-manage-config-files.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-seutils-manage-config-files.patch | |||
| @@ -6,16 +6,17 @@ Subject: [PATCH 2/2] refpolicy: fix selinux utils to manage config files | |||
| 6 | Upstream-Status: Pending | 6 | Upstream-Status: Pending |
| 7 | 7 | ||
| 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | 8 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/system/selinuxutil.if | 1 + | 11 | policy/modules/system/selinuxutil.if | 1 + |
| 11 | policy/modules/system/userdomain.if | 4 ++++ | 12 | policy/modules/system/userdomain.if | 4 ++++ |
| 12 | 2 files changed, 5 insertions(+) | 13 | 2 files changed, 5 insertions(+) |
| 13 | 14 | ||
| 14 | diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if | ||
| 15 | index 3822072..db03ca1 100644 | ||
| 16 | --- a/policy/modules/system/selinuxutil.if | 15 | --- a/policy/modules/system/selinuxutil.if |
| 17 | +++ b/policy/modules/system/selinuxutil.if | 16 | +++ b/policy/modules/system/selinuxutil.if |
| 18 | @@ -680,6 +680,7 @@ interface(`seutil_manage_config',` | 17 | @@ -753,10 +753,11 @@ interface(`seutil_manage_config',` |
| 18 | gen_require(` | ||
| 19 | type selinux_config_t; | ||
| 19 | ') | 20 | ') |
| 20 | 21 | ||
| 21 | files_search_etc($1) | 22 | files_search_etc($1) |
| @@ -23,11 +24,13 @@ index 3822072..db03ca1 100644 | |||
| 23 | manage_files_pattern($1, selinux_config_t, selinux_config_t) | 24 | manage_files_pattern($1, selinux_config_t, selinux_config_t) |
| 24 | read_lnk_files_pattern($1, selinux_config_t, selinux_config_t) | 25 | read_lnk_files_pattern($1, selinux_config_t, selinux_config_t) |
| 25 | ') | 26 | ') |
| 26 | diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if | 27 | |
| 27 | index b4a691d..20c8bf8 100644 | 28 | ####################################### |
| 28 | --- a/policy/modules/system/userdomain.if | 29 | --- a/policy/modules/system/userdomain.if |
| 29 | +++ b/policy/modules/system/userdomain.if | 30 | +++ b/policy/modules/system/userdomain.if |
| 30 | @@ -1277,6 +1277,10 @@ template(`userdom_security_admin_template',` | 31 | @@ -1327,10 +1327,14 @@ template(`userdom_security_admin_templat |
| 32 | logging_read_audit_log($1) | ||
| 33 | logging_read_generic_logs($1) | ||
| 31 | logging_read_audit_config($1) | 34 | logging_read_audit_config($1) |
| 32 | 35 | ||
| 33 | seutil_manage_bin_policy($1) | 36 | seutil_manage_bin_policy($1) |
| @@ -38,6 +41,5 @@ index b4a691d..20c8bf8 100644 | |||
| 38 | seutil_run_checkpolicy($1, $2) | 41 | seutil_run_checkpolicy($1, $2) |
| 39 | seutil_run_loadpolicy($1, $2) | 42 | seutil_run_loadpolicy($1, $2) |
| 40 | seutil_run_semanage($1, $2) | 43 | seutil_run_semanage($1, $2) |
| 41 | -- | 44 | seutil_run_setfiles($1, $2) |
| 42 | 1.7.9.5 | 45 | |
| 43 | |||
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/refpolicy-update-for_systemd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/refpolicy-update-for_systemd.patch index 2ae4185..41b9c2b 100644 --- a/recipes-security/refpolicy/refpolicy-2.20151208/refpolicy-update-for_systemd.patch +++ b/recipes-security/refpolicy/refpolicy-2.20170204/refpolicy-update-for_systemd.patch | |||
| @@ -6,15 +6,16 @@ Subject: [PATCH] refpolicy: update for systemd related allow rules | |||
| 6 | It provide, the systemd support related allow rules | 6 | It provide, the systemd support related allow rules |
| 7 | 7 | ||
| 8 | Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com> | 8 | Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com> |
| 9 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
| 9 | --- | 10 | --- |
| 10 | policy/modules/system/init.te | 5 +++++ | 11 | policy/modules/system/init.te | 5 +++++ |
| 11 | 1 file changed, 5 insertions(+) | 12 | 1 file changed, 5 insertions(+) |
| 12 | 13 | ||
| 13 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te | ||
| 14 | index c8f007d..a9675f6 100644 | ||
| 15 | --- a/policy/modules/system/init.te | 14 | --- a/policy/modules/system/init.te |
| 16 | +++ b/policy/modules/system/init.te | 15 | +++ b/policy/modules/system/init.te |
| 17 | @@ -929,3 +929,8 @@ optional_policy(` | 16 | @@ -1105,5 +1105,10 @@ optional_policy(` |
| 17 | ') | ||
| 18 | |||
| 18 | optional_policy(` | 19 | optional_policy(` |
| 19 | zebra_read_config(initrc_t) | 20 | zebra_read_config(initrc_t) |
| 20 | ') | 21 | ') |
| @@ -24,6 +25,3 @@ index c8f007d..a9675f6 100644 | |||
| 24 | +allow devpts_t device_t:filesystem associate; | 25 | +allow devpts_t device_t:filesystem associate; |
| 25 | +allow init_t self:capability2 block_suspend; | 26 | +allow init_t self:capability2 block_suspend; |
| 26 | \ No newline at end of file | 27 | \ No newline at end of file |
| 27 | -- | ||
| 28 | 1.7.9.5 | ||
| 29 | |||
diff --git a/recipes-security/refpolicy/refpolicy-mcs_2.20151208.bb b/recipes-security/refpolicy/refpolicy-mcs_2.20170204.bb index 062727b..062727b 100644 --- a/recipes-security/refpolicy/refpolicy-mcs_2.20151208.bb +++ b/recipes-security/refpolicy/refpolicy-mcs_2.20170204.bb | |||
diff --git a/recipes-security/refpolicy/refpolicy-minimum_2.20151208.bb b/recipes-security/refpolicy/refpolicy-minimum_2.20170204.bb index da6626e..da6626e 100644 --- a/recipes-security/refpolicy/refpolicy-minimum_2.20151208.bb +++ b/recipes-security/refpolicy/refpolicy-minimum_2.20170204.bb | |||
diff --git a/recipes-security/refpolicy/refpolicy-mls_2.20151208.bb b/recipes-security/refpolicy/refpolicy-mls_2.20170204.bb index 7388232..7388232 100644 --- a/recipes-security/refpolicy/refpolicy-mls_2.20151208.bb +++ b/recipes-security/refpolicy/refpolicy-mls_2.20170204.bb | |||
diff --git a/recipes-security/refpolicy/refpolicy-standard_2.20151208.bb b/recipes-security/refpolicy/refpolicy-standard_2.20170204.bb index 3674fdd..3674fdd 100644 --- a/recipes-security/refpolicy/refpolicy-standard_2.20151208.bb +++ b/recipes-security/refpolicy/refpolicy-standard_2.20170204.bb | |||
diff --git a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch index b33e84b..3a8a95e 100644 --- a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch +++ b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch | |||
| @@ -19,10 +19,10 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 19 | 19 | ||
| 20 | --- a/policy/modules/system/init.te | 20 | --- a/policy/modules/system/init.te |
| 21 | +++ b/policy/modules/system/init.te | 21 | +++ b/policy/modules/system/init.te |
| 22 | @@ -344,17 +344,19 @@ ifdef(`init_systemd',` | 22 | @@ -300,16 +300,18 @@ ifdef(`init_systemd',` |
| 23 | 23 | ||
| 24 | optional_policy(` | 24 | optional_policy(` |
| 25 | modutils_domtrans(init_t) | 25 | modutils_domtrans_insmod(init_t) |
| 26 | ') | 26 | ') |
| 27 | ',` | 27 | ',` |
| 28 | - tunable_policy(`init_upstart',` | 28 | - tunable_policy(`init_upstart',` |
| @@ -30,25 +30,32 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 30 | - ',` | 30 | - ',` |
| 31 | - # Run the shell in the sysadm role for single-user mode. | 31 | - # Run the shell in the sysadm role for single-user mode. |
| 32 | - # causes problems with upstart | 32 | - # causes problems with upstart |
| 33 | - ifndef(`distro_debian',` | 33 | - sysadm_shell_domtrans(init_t) |
| 34 | - sysadm_shell_domtrans(init_t) | ||
| 35 | + optional_policy(` | 34 | + optional_policy(` |
| 36 | + tunable_policy(`init_upstart',` | 35 | + tunable_policy(`init_upstart',` |
| 37 | + corecmd_shell_domtrans(init_t, initrc_t) | 36 | + corecmd_shell_domtrans(init_t, initrc_t) |
| 38 | + ',` | 37 | + ',` |
| 39 | + # Run the shell in the sysadm role for single-user mode. | 38 | + # Run the shell in the sysadm role for single-user mode. |
| 40 | + # causes problems with upstart | 39 | + # causes problems with upstart |
| 41 | + ifndef(`distro_debian',` | 40 | + sysadm_shell_domtrans(init_t) |
| 42 | + sysadm_shell_domtrans(init_t) | 41 | + ') |
| 43 | + ') | ||
| 44 | ') | ||
| 45 | ') | 42 | ') |
| 46 | ') | 43 | ') |
| 47 | 44 | ||
| 48 | ifdef(`distro_debian',` | 45 | ifdef(`distro_debian',` |
| 46 | fs_tmpfs_filetrans(init_t, initctl_t, fifo_file, "initctl") | ||
| 47 | @@ -1109,6 +1111,6 @@ optional_policy(` | ||
| 48 | ') | ||
| 49 | |||
| 50 | # systemd related allow rules | ||
| 51 | allow kernel_t init_t:process dyntransition; | ||
| 52 | allow devpts_t device_t:filesystem associate; | ||
| 53 | -allow init_t self:capability2 block_suspend; | ||
| 54 | \ No newline at end of file | ||
| 55 | +allow init_t self:capability2 block_suspend; | ||
| 49 | --- a/policy/modules/system/locallogin.te | 56 | --- a/policy/modules/system/locallogin.te |
| 50 | +++ b/policy/modules/system/locallogin.te | 57 | +++ b/policy/modules/system/locallogin.te |
| 51 | @@ -260,11 +260,13 @@ seutil_read_default_contexts(sulogin_t) | 58 | @@ -244,11 +244,13 @@ seutil_read_default_contexts(sulogin_t) |
| 52 | userdom_use_unpriv_users_fds(sulogin_t) | 59 | userdom_use_unpriv_users_fds(sulogin_t) |
| 53 | 60 | ||
| 54 | userdom_search_user_home_dirs(sulogin_t) | 61 | userdom_search_user_home_dirs(sulogin_t) |
| @@ -59,7 +66,7 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 59 | + sysadm_shell_domtrans(sulogin_t) | 66 | + sysadm_shell_domtrans(sulogin_t) |
| 60 | +') | 67 | +') |
| 61 | 68 | ||
| 62 | # by default, sulogin does not use pam... | 69 | # suse and debian do not use pam with sulogin... |
| 63 | # sulogin_pam might need to be defined otherwise | 70 | ifdef(`distro_suse', `define(`sulogin_no_pam')') |
| 64 | ifdef(`sulogin_pam', ` | 71 | ifdef(`distro_debian', `define(`sulogin_no_pam')') |
| 65 | selinux_get_fs_mount(sulogin_t) | 72 | |
diff --git a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch index 17a8199..1dc9911 100644 --- a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch +++ b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch | |||
| @@ -25,7 +25,7 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | |||
| 25 | 25 | ||
| 26 | --- a/policy/modules/system/init.if | 26 | --- a/policy/modules/system/init.if |
| 27 | +++ b/policy/modules/system/init.if | 27 | +++ b/policy/modules/system/init.if |
| 28 | @@ -1430,16 +1430,16 @@ interface(`init_spec_domtrans_script',` | 28 | @@ -1268,16 +1268,16 @@ interface(`init_spec_domtrans_script',` |
| 29 | ## </summary> | 29 | ## </summary> |
| 30 | ## </param> | 30 | ## </param> |
| 31 | # | 31 | # |
diff --git a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch index 29d3e2d..f28ab74 100644 --- a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch +++ b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch | |||
| @@ -30,21 +30,21 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | |||
| 30 | + | 30 | + |
| 31 | --- a/policy/modules/roles/sysadm.te | 31 | --- a/policy/modules/roles/sysadm.te |
| 32 | +++ b/policy/modules/roles/sysadm.te | 32 | +++ b/policy/modules/roles/sysadm.te |
| 33 | @@ -37,10 +37,11 @@ ubac_process_exempt(sysadm_t) | 33 | @@ -41,10 +41,11 @@ init_reload(sysadm_t) |
| 34 | ubac_file_exempt(sysadm_t) | 34 | init_reboot_system(sysadm_t) |
| 35 | ubac_fd_exempt(sysadm_t) | 35 | init_shutdown_system(sysadm_t) |
| 36 | 36 | init_start_generic_units(sysadm_t) | |
| 37 | init_exec(sysadm_t) | 37 | init_stop_generic_units(sysadm_t) |
| 38 | init_admin(sysadm_t) | 38 | init_reload_generic_units(sysadm_t) |
| 39 | +init_script_role_transition(sysadm_r) | 39 | +init_script_role_transition(sysadm_r) |
| 40 | 40 | ||
| 41 | selinux_read_policy(sysadm_t) | ||
| 42 | |||
| 43 | # Add/remove user home directories | 41 | # Add/remove user home directories |
| 44 | userdom_manage_user_home_dirs(sysadm_t) | 42 | userdom_manage_user_home_dirs(sysadm_t) |
| 43 | userdom_home_filetrans_user_home_dir(sysadm_t) | ||
| 44 | |||
| 45 | --- a/policy/modules/system/init.if | 45 | --- a/policy/modules/system/init.if |
| 46 | +++ b/policy/modules/system/init.if | 46 | +++ b/policy/modules/system/init.if |
| 47 | @@ -1394,30 +1394,31 @@ interface(`init_script_file_entry_type', | 47 | @@ -1232,30 +1232,31 @@ interface(`init_script_file_entry_type', |
| 48 | ## </summary> | 48 | ## </summary> |
| 49 | ## </param> | 49 | ## </param> |
| 50 | # | 50 | # |
| @@ -80,7 +80,7 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | |||
| 80 | 80 | ||
| 81 | ######################################## | 81 | ######################################## |
| 82 | ## <summary> | 82 | ## <summary> |
| 83 | @@ -1429,22 +1430,23 @@ interface(`init_spec_domtrans_script',` | 83 | @@ -1267,22 +1268,23 @@ interface(`init_spec_domtrans_script',` |
| 84 | ## </summary> | 84 | ## </summary> |
| 85 | ## </param> | 85 | ## </param> |
| 86 | # | 86 | # |
| @@ -108,11 +108,11 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> | |||
| 108 | 108 | ||
| 109 | ######################################## | 109 | ######################################## |
| 110 | ## <summary> | 110 | ## <summary> |
| 111 | @@ -2972,5 +2974,34 @@ interface(`init_admin',` | 111 | @@ -2502,5 +2504,34 @@ interface(`init_reload_all_units',` |
| 112 | init_stop_all_units($1) | 112 | class service reload; |
| 113 | init_stop_generic_units($1) | 113 | ') |
| 114 | init_stop_system($1) | 114 | |
| 115 | init_telinit($1) | 115 | allow $1 systemdunit:service reload; |
| 116 | ') | 116 | ') |
| 117 | + | 117 | + |
| 118 | +######################################## | 118 | +######################################## |
diff --git a/recipes-security/refpolicy/refpolicy-targeted_2.20151208.bb b/recipes-security/refpolicy/refpolicy-targeted_2.20170204.bb index f795bf7..f795bf7 100644 --- a/recipes-security/refpolicy/refpolicy-targeted_2.20151208.bb +++ b/recipes-security/refpolicy/refpolicy-targeted_2.20170204.bb | |||
diff --git a/recipes-security/refpolicy/refpolicy_2.20151208.inc b/recipes-security/refpolicy/refpolicy_2.20170204.inc index ce90b13..48e6cd6 100644 --- a/recipes-security/refpolicy/refpolicy_2.20151208.inc +++ b/recipes-security/refpolicy/refpolicy_2.20170204.inc | |||
| @@ -1,8 +1,8 @@ | |||
| 1 | SRC_URI = "https://raw.githubusercontent.com/wiki/TresysTechnology/refpolicy/files/refpolicy-${PV}.tar.bz2;" | 1 | SRC_URI = "https://raw.githubusercontent.com/wiki/TresysTechnology/refpolicy/files/refpolicy-${PV}.tar.bz2;" |
| 2 | SRC_URI[md5sum] = "7b1ca12e9ea0254508391559cb8f2c41" | 2 | SRC_URI[md5sum] = "76a7a455289c9216ee0fbb8de71c9799" |
| 3 | SRC_URI[sha256sum] = "2dd2f45a7132137afe8302805c3b7839739759b9ab73dd1815c01afe34ac99de" | 3 | SRC_URI[sha256sum] = "5e4daee61d89dfdc8c7bf369f81c99845931e337916dc6401e301c5de57ea336" |
| 4 | 4 | ||
| 5 | FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy-2.20151208:" | 5 | FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy-2.20170204:" |
| 6 | 6 | ||
| 7 | # Fix file contexts for Poky | 7 | # Fix file contexts for Poky |
| 8 | SRC_URI += "file://poky-fc-subs_dist.patch \ | 8 | SRC_URI += "file://poky-fc-subs_dist.patch \ |
| @@ -14,16 +14,13 @@ SRC_URI += "file://poky-fc-subs_dist.patch \ | |||
| 14 | file://poky-fc-fix-real-path_shadow.patch \ | 14 | file://poky-fc-fix-real-path_shadow.patch \ |
| 15 | file://poky-fc-fix-bind.patch \ | 15 | file://poky-fc-fix-bind.patch \ |
| 16 | file://poky-fc-clock.patch \ | 16 | file://poky-fc-clock.patch \ |
| 17 | file://poky-fc-corecommands.patch \ | ||
| 18 | file://poky-fc-dmesg.patch \ | 17 | file://poky-fc-dmesg.patch \ |
| 19 | file://poky-fc-fstools.patch \ | 18 | file://poky-fc-fstools.patch \ |
| 20 | file://poky-fc-iptables.patch \ | ||
| 21 | file://poky-fc-mta.patch \ | 19 | file://poky-fc-mta.patch \ |
| 22 | file://poky-fc-netutils.patch \ | 20 | file://poky-fc-netutils.patch \ |
| 23 | file://poky-fc-nscd.patch \ | 21 | file://poky-fc-nscd.patch \ |
| 24 | file://poky-fc-screen.patch \ | 22 | file://poky-fc-screen.patch \ |
| 25 | file://poky-fc-ssh.patch \ | 23 | file://poky-fc-ssh.patch \ |
| 26 | file://poky-fc-su.patch \ | ||
| 27 | file://poky-fc-sysnetwork.patch \ | 24 | file://poky-fc-sysnetwork.patch \ |
| 28 | file://poky-fc-udevd.patch \ | 25 | file://poky-fc-udevd.patch \ |
| 29 | file://poky-fc-rpm.patch \ | 26 | file://poky-fc-rpm.patch \ |
