summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJoe MacDonald <joe_macdonald@mentor.com>2017-05-04 11:57:48 -0400
committerJoe MacDonald <joe_macdonald@mentor.com>2017-05-04 11:57:48 -0400
commitdb1f0fe50d63a2253d602c41d0077e308fc78c51 (patch)
tree675783458c304f0cc0d7ab3e373972b8ba5e91e5
parent0cfdbb47aafef9e9af562c9dffebd0aefefe5457 (diff)
downloadmeta-selinux-db1f0fe50d63a2253d602c41d0077e308fc78c51.tar.gz
refpolicy: Update to 20170204 release
This updates all of the common policies. standard, minimum, mls and targeted. Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/ftp-add-ftpd_t-to-mlsfilewrite.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/ftp-add-ftpd_t-to-mlsfilewrite.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-clock.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-clock.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-corecommands.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-corecommands.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-dmesg.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-dmesg.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-bind.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-bind.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_login.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_login.patch)20
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_resolv.conf.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_resolv.conf.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_shadow.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_shadow.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_su.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_su.patch)11
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fstools.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fstools.patch)41
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ftpwho-dir.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ftpwho-dir.patch)14
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-iptables.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-iptables.patch)16
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-mta.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-mta.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-netutils.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-netutils.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-nscd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-nscd.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-rpm.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-rpm.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-screen.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-screen.patch)18
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ssh.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ssh.patch)14
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-su.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-su.patch)9
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-subs_dist.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-subs_dist.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-sysnetwork.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-sysnetwork.patch)20
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-udevd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-udevd.patch)21
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_hostname.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_hostname.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysklogd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysklogd.patch)21
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysvinit.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysvinit.patch)28
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-bsdpty_device_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-bsdpty_device_t.patch)54
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-syslogd_t-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-syslogd_t-symlink.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-tmp-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-tmp-symlink.patch)62
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-cache-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-cache-symlink.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-apache.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-apache.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink.patch)82
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-syslogd_t-to-trusted-object.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-syslogd_t-to-trusted-object.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-nfsd-to-exec-shell-commands.patch)20
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-setfiles_t-to-read-symlinks.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-setfiles_t-to-read-symlinks.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-sysadm-to-run-rpcinfo.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-sysadm-to-run-rpcinfo.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-don-t-audit-tty_device_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-don-t-audit-tty_device_t.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-dmesg-to-use-dev-kmsg.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-dmesg-to-use-dev-kmsg.patch)18
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-new-SELINUXMNT-in-sys.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-new-SELINUXMNT-in-sys.patch)120
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch)52
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-setfiles-statvfs-get-file-count.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-setfiles-statvfs-get-file-count.patch)12
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-seutils-manage-config-files.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-seutils-manage-config-files.patch)20
-rw-r--r--recipes-security/refpolicy/refpolicy-2.20170204/refpolicy-update-for_systemd.patch (renamed from recipes-security/refpolicy/refpolicy-2.20151208/refpolicy-update-for_systemd.patch)10
-rw-r--r--recipes-security/refpolicy/refpolicy-mcs_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-mcs_2.20151208.bb)0
-rw-r--r--recipes-security/refpolicy/refpolicy-minimum_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-minimum_2.20151208.bb)0
-rw-r--r--recipes-security/refpolicy/refpolicy-mls_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-mls_2.20151208.bb)0
-rw-r--r--recipes-security/refpolicy/refpolicy-standard_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-standard_2.20151208.bb)0
-rw-r--r--recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch33
-rw-r--r--recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch2
-rw-r--r--recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch30
-rw-r--r--recipes-security/refpolicy/refpolicy-targeted_2.20170204.bb (renamed from recipes-security/refpolicy/refpolicy-targeted_2.20151208.bb)0
-rw-r--r--recipes-security/refpolicy/refpolicy_2.20170204.inc (renamed from recipes-security/refpolicy/refpolicy_2.20151208.inc)9
52 files changed, 593 insertions, 404 deletions
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/ftp-add-ftpd_t-to-mlsfilewrite.patch b/recipes-security/refpolicy/refpolicy-2.20170204/ftp-add-ftpd_t-to-mlsfilewrite.patch
index 49da4b6..85c40a4 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/ftp-add-ftpd_t-to-mlsfilewrite.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/ftp-add-ftpd_t-to-mlsfilewrite.patch
@@ -17,15 +17,16 @@ root@localhost:~# sesearch --allow -s ftpd_t -t var_run_t|grep dir|grep add_name
17root@localhost:~# 17root@localhost:~#
18 18
19Signed-off-by: Roy Li <rongqing.li@windriver.com> 19Signed-off-by: Roy Li <rongqing.li@windriver.com>
20Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
20--- 21---
21 policy/modules/contrib/ftp.te | 2 ++ 22 policy/modules/contrib/ftp.te | 2 ++
22 1 file changed, 2 insertions(+) 23 1 file changed, 2 insertions(+)
23 24
24diff --git a/policy/modules/contrib/ftp.te b/policy/modules/contrib/ftp.te
25index 544c512..12a31dd 100644
26--- a/policy/modules/contrib/ftp.te 25--- a/policy/modules/contrib/ftp.te
27+++ b/policy/modules/contrib/ftp.te 26+++ b/policy/modules/contrib/ftp.te
28@@ -144,6 +144,8 @@ role ftpdctl_roles types ftpdctl_t; 27@@ -148,10 +148,12 @@ init_system_domain(ftpdctl_t, ftpdctl_ex
28 role ftpdctl_roles types ftpdctl_t;
29
29 type ftpdctl_tmp_t; 30 type ftpdctl_tmp_t;
30 files_tmp_file(ftpdctl_tmp_t) 31 files_tmp_file(ftpdctl_tmp_t)
31 32
@@ -34,6 +35,5 @@ index 544c512..12a31dd 100644
34 type sftpd_t; 35 type sftpd_t;
35 domain_type(sftpd_t) 36 domain_type(sftpd_t)
36 role system_r types sftpd_t; 37 role system_r types sftpd_t;
37-- 38
381.7.10.4 39 type xferlog_t;
39
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-clock.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-clock.patch
index 3ff8f55..b2102af 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-clock.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-clock.patch
@@ -3,20 +3,18 @@ Subject: [PATCH] refpolicy: fix real path for clock
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/system/clock.fc | 1 + 8 policy/modules/system/clock.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/system/clock.fc b/policy/modules/system/clock.fc
11index c5e05ca..a74c40c 100644
12--- a/policy/modules/system/clock.fc 11--- a/policy/modules/system/clock.fc
13+++ b/policy/modules/system/clock.fc 12+++ b/policy/modules/system/clock.fc
14@@ -2,4 +2,5 @@ 13@@ -1,6 +1,7 @@
14
15 /etc/adjtime -- gen_context(system_u:object_r:adjtime_t,s0) 15 /etc/adjtime -- gen_context(system_u:object_r:adjtime_t,s0)
16 16
17 /sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0) 17 /sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
18+/sbin/hwclock\.util-linux -- gen_context(system_u:object_r:hwclock_exec_t,s0) 18+/sbin/hwclock\.util-linux -- gen_context(system_u:object_r:hwclock_exec_t,s0)
19 19
20-- 20 /usr/sbin/hwclock -- gen_context(system_u:object_r:hwclock_exec_t,s0)
211.7.11.7
22
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-corecommands.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-corecommands.patch
index 24b67c3..3739059 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-corecommands.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-corecommands.patch
@@ -3,15 +3,16 @@ Subject: [PATCH] refpolicy: fix real path for corecommands
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/kernel/corecommands.fc | 1 + 8 policy/modules/kernel/corecommands.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc
11index f051c4a..ab624f3 100644
12--- a/policy/modules/kernel/corecommands.fc 11--- a/policy/modules/kernel/corecommands.fc
13+++ b/policy/modules/kernel/corecommands.fc 12+++ b/policy/modules/kernel/corecommands.fc
14@@ -153,6 +153,7 @@ ifdef(`distro_gentoo',` 13@@ -154,10 +154,11 @@ ifdef(`distro_gentoo',`
14 /sbin -d gen_context(system_u:object_r:bin_t,s0)
15 /sbin/.* gen_context(system_u:object_r:bin_t,s0)
15 /sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0) 16 /sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0)
16 /sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0) 17 /sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0)
17 /sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0) 18 /sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0)
@@ -19,6 +20,5 @@ index f051c4a..ab624f3 100644
19 20
20 # 21 #
21 # /opt 22 # /opt
22-- 23 #
231.7.11.7 24 /opt/(.*/)?bin(/.*)? gen_context(system_u:object_r:bin_t,s0)
24
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-dmesg.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-dmesg.patch
index db4c4d4..2a567da 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-dmesg.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-dmesg.patch
@@ -3,18 +3,16 @@ Subject: [PATCH] refpolicy: fix real path for dmesg
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/admin/dmesg.fc | 1 + 8 policy/modules/admin/dmesg.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/admin/dmesg.fc b/policy/modules/admin/dmesg.fc
11index d6cc2d9..7f3e5b0 100644
12--- a/policy/modules/admin/dmesg.fc 11--- a/policy/modules/admin/dmesg.fc
13+++ b/policy/modules/admin/dmesg.fc 12+++ b/policy/modules/admin/dmesg.fc
14@@ -1,2 +1,3 @@ 13@@ -1,4 +1,5 @@
15 14
16 /bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0) 15 /bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
17+/bin/dmesg\.util-linux -- gen_context(system_u:object_r:dmesg_exec_t,s0) 16+/bin/dmesg\.util-linux -- gen_context(system_u:object_r:dmesg_exec_t,s0)
18-- 17
191.7.11.7 18 /usr/bin/dmesg -- gen_context(system_u:object_r:dmesg_exec_t,s0)
20
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-bind.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-bind.patch
index 59ba5bc..3218c88 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-bind.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-bind.patch
@@ -6,15 +6,14 @@ Subject: [PATCH] refpolicy: fix real path for bind.
6Upstream-Status: Inappropriate [configuration] 6Upstream-Status: Inappropriate [configuration]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/bind.fc | 2 ++ 11 policy/modules/contrib/bind.fc | 2 ++
11 1 file changed, 2 insertions(+) 12 1 file changed, 2 insertions(+)
12 13
13diff --git a/policy/modules/contrib/bind.fc b/policy/modules/contrib/bind.fc
14index 2b9a3a1..fd45d53 100644
15--- a/policy/modules/contrib/bind.fc 14--- a/policy/modules/contrib/bind.fc
16+++ b/policy/modules/contrib/bind.fc 15+++ b/policy/modules/contrib/bind.fc
17@@ -1,8 +1,10 @@ 16@@ -1,10 +1,12 @@
18 /etc/rc\.d/init\.d/named -- gen_context(system_u:object_r:named_initrc_exec_t,s0) 17 /etc/rc\.d/init\.d/named -- gen_context(system_u:object_r:named_initrc_exec_t,s0)
19+/etc/rc\.d/init\.d/bind -- gen_context(system_u:object_r:named_initrc_exec_t,s0) 18+/etc/rc\.d/init\.d/bind -- gen_context(system_u:object_r:named_initrc_exec_t,s0)
20 /etc/rc\.d/init\.d/unbound -- gen_context(system_u:object_r:named_initrc_exec_t,s0) 19 /etc/rc\.d/init\.d/unbound -- gen_context(system_u:object_r:named_initrc_exec_t,s0)
@@ -25,6 +24,5 @@ index 2b9a3a1..fd45d53 100644
25 /etc/bind/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0) 24 /etc/bind/rndc\.key -- gen_context(system_u:object_r:dnssec_t,s0)
26 /etc/dnssec-trigger/dnssec_trigger_server\.key -- gen_context(system_u:object_r:dnssec_t,s0) 25 /etc/dnssec-trigger/dnssec_trigger_server\.key -- gen_context(system_u:object_r:dnssec_t,s0)
27 /etc/named\.rfc1912\.zones -- gen_context(system_u:object_r:named_conf_t,s0) 26 /etc/named\.rfc1912\.zones -- gen_context(system_u:object_r:named_conf_t,s0)
28-- 27 /etc/named\.root\.hints -- gen_context(system_u:object_r:named_conf_t,s0)
291.7.9.5 28 /etc/named\.conf -- gen_context(system_u:object_r:named_conf_t,s0)
30
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_login.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_login.patch
index 427181e..dfb7544 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_login.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_login.patch
@@ -3,15 +3,14 @@ Subject: [PATCH] fix real path for login commands.
3Upstream-Status: Inappropriate [only for Poky] 3Upstream-Status: Inappropriate [only for Poky]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/system/authlogin.fc | 7 ++++--- 8 policy/modules/system/authlogin.fc | 7 ++++---
8 1 files changed, 4 insertions(+), 3 deletions(-) 9 1 files changed, 4 insertions(+), 3 deletions(-)
9 10
10diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc
11index 28ad538..c8dd17f 100644
12--- a/policy/modules/system/authlogin.fc 11--- a/policy/modules/system/authlogin.fc
13+++ b/policy/modules/system/authlogin.fc 12+++ b/policy/modules/system/authlogin.fc
14@@ -1,5 +1,7 @@ 13@@ -1,19 +1,21 @@
15 14
16 /bin/login -- gen_context(system_u:object_r:login_exec_t,s0) 15 /bin/login -- gen_context(system_u:object_r:login_exec_t,s0)
17+/bin/login\.shadow -- gen_context(system_u:object_r:login_exec_t,s0) 16+/bin/login\.shadow -- gen_context(system_u:object_r:login_exec_t,s0)
@@ -19,19 +18,20 @@ index 28ad538..c8dd17f 100644
19 18
20 /etc/\.pwd\.lock -- gen_context(system_u:object_r:shadow_t,s0) 19 /etc/\.pwd\.lock -- gen_context(system_u:object_r:shadow_t,s0)
21 /etc/group\.lock -- gen_context(system_u:object_r:shadow_t,s0) 20 /etc/group\.lock -- gen_context(system_u:object_r:shadow_t,s0)
22@@ -9,9 +11,9 @@ 21 /etc/gshadow.* -- gen_context(system_u:object_r:shadow_t,s0)
22 /etc/passwd\.lock -- gen_context(system_u:object_r:shadow_t,s0)
23 /etc/shadow.* -- gen_context(system_u:object_r:shadow_t,s0)
23 24
24 /sbin/pam_console_apply -- gen_context(system_u:object_r:pam_console_exec_t,s0) 25 /sbin/pam_console_apply -- gen_context(system_u:object_r:pam_console_exec_t,s0)
25 /sbin/pam_timestamp_check -- gen_context(system_u:object_r:pam_exec_t,s0) 26 /sbin/pam_timestamp_check -- gen_context(system_u:object_r:pam_exec_t,s0)
26-/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) 27-/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
27-/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0) 28-/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0)
28-/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0) 29-/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
29+/usr/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) 30+/sbin/unix_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
30+/usr/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0) 31+/sbin/unix_update -- gen_context(system_u:object_r:updpwd_exec_t,s0)
31+/usr/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0) 32+/sbin/unix_verify -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
32 ifdef(`distro_suse', ` 33 ifdef(`distro_suse', `
33 /sbin/unix2_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0) 34 /sbin/unix2_chkpwd -- gen_context(system_u:object_r:chkpwd_exec_t,s0)
34 ') 35 ')
35-- 36
361.7.5.4 37 /usr/bin/login -- gen_context(system_u:object_r:login_exec_t,s0)
37
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_resolv.conf.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_resolv.conf.patch
index 80cca67..b90b744 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_resolv.conf.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_resolv.conf.patch
@@ -3,15 +3,16 @@ Subject: [PATCH] fix real path for resolv.conf
3Upstream-Status: Inappropriate [only for Poky] 3Upstream-Status: Inappropriate [only for Poky]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/system/sysnetwork.fc | 1 + 8 policy/modules/system/sysnetwork.fc | 1 +
8 1 files changed, 1 insertions(+), 0 deletions(-) 9 1 files changed, 1 insertions(+), 0 deletions(-)
9 10
10diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
11index 346a7cc..dec8632 100644
12--- a/policy/modules/system/sysnetwork.fc 11--- a/policy/modules/system/sysnetwork.fc
13+++ b/policy/modules/system/sysnetwork.fc 12+++ b/policy/modules/system/sysnetwork.fc
14@@ -24,6 +24,7 @@ ifdef(`distro_debian',` 13@@ -23,10 +23,11 @@ ifdef(`distro_debian',`
14 /etc/ethers -- gen_context(system_u:object_r:net_conf_t,s0)
15 /etc/hosts -- gen_context(system_u:object_r:net_conf_t,s0)
15 /etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0) 16 /etc/hosts\.deny.* -- gen_context(system_u:object_r:net_conf_t,s0)
16 /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0) 17 /etc/denyhosts.* -- gen_context(system_u:object_r:net_conf_t,s0)
17 /etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) 18 /etc/resolv\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
@@ -19,6 +20,5 @@ index 346a7cc..dec8632 100644
19 /etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0) 20 /etc/yp\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
20 21
21 /etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0) 22 /etc/dhcp3(/.*)? gen_context(system_u:object_r:dhcp_etc_t,s0)
22-- 23 /etc/dhcp3?/dhclient.* gen_context(system_u:object_r:dhcp_etc_t,s0)
231.7.5.4 24
24
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_shadow.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_shadow.patch
index 29ac2c3..9819c1d 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_shadow.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_shadow.patch
@@ -3,15 +3,16 @@ Subject: [PATCH] fix real path for shadow commands.
3Upstream-Status: Inappropriate [only for Poky] 3Upstream-Status: Inappropriate [only for Poky]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/admin/usermanage.fc | 6 ++++++ 8 policy/modules/admin/usermanage.fc | 6 ++++++
8 1 file changed, 6 insertions(+) 9 1 file changed, 6 insertions(+)
9 10
10diff --git a/policy/modules/admin/usermanage.fc b/policy/modules/admin/usermanage.fc
11index f82f0ce..841ba9b 100644
12--- a/policy/modules/admin/usermanage.fc 11--- a/policy/modules/admin/usermanage.fc
13+++ b/policy/modules/admin/usermanage.fc 12+++ b/policy/modules/admin/usermanage.fc
14@@ -4,11 +4,17 @@ ifdef(`distro_gentoo',` 13@@ -6,15 +6,21 @@ ifdef(`distro_debian',`
14 /etc/cron\.daily/cracklib-runtime -- gen_context(system_u:object_r:crack_exec_t,s0)
15 ')
15 16
16 /usr/bin/chage -- gen_context(system_u:object_r:passwd_exec_t,s0) 17 /usr/bin/chage -- gen_context(system_u:object_r:passwd_exec_t,s0)
17 /usr/bin/chfn -- gen_context(system_u:object_r:chfn_exec_t,s0) 18 /usr/bin/chfn -- gen_context(system_u:object_r:chfn_exec_t,s0)
@@ -29,6 +30,5 @@ index f82f0ce..841ba9b 100644
29 30
30 /usr/lib/cracklib_dict.* -- gen_context(system_u:object_r:crack_db_t,s0) 31 /usr/lib/cracklib_dict.* -- gen_context(system_u:object_r:crack_db_t,s0)
31 32
32-- 33 /usr/sbin/crack_[a-z]* -- gen_context(system_u:object_r:crack_exec_t,s0)
331.7.9.5 34 /usr/sbin/cracklib-[a-z]* -- gen_context(system_u:object_r:crack_exec_t,s0)
34
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_su.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_su.patch
index b0392ce..b8597f9 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fix-real-path_su.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fix-real-path_su.patch
@@ -6,20 +6,17 @@ Subject: [PATCH] fix real path for su.shadow command
6Upstream-Status: Inappropriate [only for Poky] 6Upstream-Status: Inappropriate [only for Poky]
7 7
8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> 8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/admin/su.fc | 2 ++ 11 policy/modules/admin/su.fc | 2 ++
11 1 file changed, 2 insertions(+) 12 1 file changed, 2 insertions(+)
12 13
13diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc
14index a563687..0f43827 100644
15--- a/policy/modules/admin/su.fc 14--- a/policy/modules/admin/su.fc
16+++ b/policy/modules/admin/su.fc 15+++ b/policy/modules/admin/su.fc
17@@ -4,3 +4,5 @@ 16@@ -2,5 +2,6 @@
17 /bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
18 18
19 /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) 19 /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0)
20 /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) 20 /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0)
21+ 21 /usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
22+/bin/su.shadow -- gen_context(system_u:object_r:su_exec_t,s0) 22+/bin/su.shadow -- gen_context(system_u:object_r:su_exec_t,s0)
23--
241.7.9.5
25
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fstools.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fstools.patch
index 9c45694..66bef0f 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-fstools.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-fstools.patch
@@ -12,11 +12,9 @@ Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
12 policy/modules/system/fstools.fc | 9 +++++++++ 12 policy/modules/system/fstools.fc | 9 +++++++++
13 1 file changed, 9 insertions(+) 13 1 file changed, 9 insertions(+)
14 14
15diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc
16index d10368d..f22761a 100644
17--- a/policy/modules/system/fstools.fc 15--- a/policy/modules/system/fstools.fc
18+++ b/policy/modules/system/fstools.fc 16+++ b/policy/modules/system/fstools.fc
19@@ -1,6 +1,8 @@ 17@@ -1,19 +1,23 @@
20 /sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0) 18 /sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0)
21 /sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0) 19 /sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0)
22+/sbin/blkid/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 20+/sbin/blkid/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
@@ -25,20 +23,24 @@ index d10368d..f22761a 100644
25 /sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 23 /sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
26 /sbin/dosfsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) 24 /sbin/dosfsck -- gen_context(system_u:object_r:fsadm_exec_t,s0)
27 /sbin/dump -- gen_context(system_u:object_r:fsadm_exec_t,s0) 25 /sbin/dump -- gen_context(system_u:object_r:fsadm_exec_t,s0)
28@@ -9,9 +11,12 @@ 26 /sbin/dumpe2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
27 /sbin/e2fsck -- gen_context(system_u:object_r:fsadm_exec_t,s0)
29 /sbin/e4fsck -- gen_context(system_u:object_r:fsadm_exec_t,s0) 28 /sbin/e4fsck -- gen_context(system_u:object_r:fsadm_exec_t,s0)
30 /sbin/e2label -- gen_context(system_u:object_r:fsadm_exec_t,s0) 29 /sbin/e2label -- gen_context(system_u:object_r:fsadm_exec_t,s0)
31 /sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 30 /sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
32+/sbin/fdisk/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 31+/sbin/fdisk/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
33 /sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 32 /sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
34+/usr/sbin/findfs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
35 /sbin/fsck.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 33 /sbin/fsck.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
36 /sbin/hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0) 34 /sbin/hdparm -- gen_context(system_u:object_r:fsadm_exec_t,s0)
37+/sbin/hdparm/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 35+/sbin/hdparm/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
38 /sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0) 36 /sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0)
39 /sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 37 /sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
40 /sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 38 /sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
41@@ -24,6 +29,7 @@ 39 /sbin/lsraid -- gen_context(system_u:object_r:fsadm_exec_t,s0)
40 /sbin/make_reiser4 -- gen_context(system_u:object_r:fsadm_exec_t,s0)
41@@ -22,20 +26,22 @@
42 /sbin/mke4fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
43 /sbin/mkfs.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
42 /sbin/mkraid -- gen_context(system_u:object_r:fsadm_exec_t,s0) 44 /sbin/mkraid -- gen_context(system_u:object_r:fsadm_exec_t,s0)
43 /sbin/mkreiserfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 45 /sbin/mkreiserfs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
44 /sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0) 46 /sbin/mkswap -- gen_context(system_u:object_r:fsadm_exec_t,s0)
@@ -46,25 +48,28 @@ index d10368d..f22761a 100644
46 /sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0) 48 /sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0)
47 /sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0) 49 /sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0)
48 /sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) 50 /sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0)
49@@ -32,8 +38,10 @@ 51 /sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0)
52 /sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0)
50 /sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0) 53 /sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0)
51 /sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 54 /sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
52 /sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0) 55 /sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0)
53+/usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
54 /sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) 56 /sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
55 /sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0) 57 /sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0)
56+/sbin/swapoff/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 58+/sbin/swapoff/.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0)
57 /sbin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) 59 /sbin/swapon.* -- gen_context(system_u:object_r:fsadm_exec_t,s0)
58 /sbin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) 60 /sbin/tune2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
59 /sbin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0) 61 /sbin/zdb -- gen_context(system_u:object_r:fsadm_exec_t,s0)
60@@ -45,6 +53,7 @@ 62 /sbin/zhack -- gen_context(system_u:object_r:fsadm_exec_t,s0)
61 63 /sbin/zinject -- gen_context(system_u:object_r:fsadm_exec_t,s0)
62 /usr/bin/partition_uuid -- gen_context(system_u:object_r:fsadm_exec_t,s0) 64@@ -83,10 +89,11 @@
63 /usr/bin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0) 65 /usr/sbin/parted -- gen_context(system_u:object_r:fsadm_exec_t,s0)
66 /usr/sbin/partprobe -- gen_context(system_u:object_r:fsadm_exec_t,s0)
67 /usr/sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0)
68 /usr/sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0)
69 /usr/sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0)
64+/usr/sbin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0) 70+/usr/sbin/raw -- gen_context(system_u:object_r:fsadm_exec_t,s0)
65 /usr/bin/scsi_unique_id -- gen_context(system_u:object_r:fsadm_exec_t,s0) 71 /usr/sbin/reiserfs(ck|tune) -- gen_context(system_u:object_r:fsadm_exec_t,s0)
66 /usr/bin/syslinux -- gen_context(system_u:object_r:fsadm_exec_t,s0) 72 /usr/sbin/resize.*fs -- gen_context(system_u:object_r:fsadm_exec_t,s0)
67 73 /usr/sbin/scsi_info -- gen_context(system_u:object_r:fsadm_exec_t,s0)
68-- 74 /usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0)
691.7.9.5 75 /usr/sbin/smartctl -- gen_context(system_u:object_r:fsadm_exec_t,s0)
70
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ftpwho-dir.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ftpwho-dir.patch
index a7d434f..d58de6a 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ftpwho-dir.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ftpwho-dir.patch
@@ -5,23 +5,23 @@ Upstream-Status: Pending
5ftpwho is installed into /usr/bin/, not /usr/sbin, so fix it 5ftpwho is installed into /usr/bin/, not /usr/sbin, so fix it
6 6
7Signed-off-by: Roy Li <rongqing.li@windriver.com> 7Signed-off-by: Roy Li <rongqing.li@windriver.com>
8Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
8--- 9---
9 policy/modules/contrib/ftp.fc | 2 +- 10 policy/modules/contrib/ftp.fc | 2 +-
10 1 file changed, 1 insertion(+), 1 deletion(-) 11 1 file changed, 1 insertion(+), 1 deletion(-)
11 12
12diff --git a/policy/modules/contrib/ftp.fc b/policy/modules/contrib/ftp.fc
13index ddb75c1..26fec47 100644
14--- a/policy/modules/contrib/ftp.fc 13--- a/policy/modules/contrib/ftp.fc
15+++ b/policy/modules/contrib/ftp.fc 14+++ b/policy/modules/contrib/ftp.fc
16@@ -9,7 +9,7 @@ 15@@ -10,11 +10,11 @@
17
18 /usr/kerberos/sbin/ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) 16 /usr/kerberos/sbin/ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0)
19 17
18 /usr/lib/systemd/system/proftpd.*\.service -- gen_context(system_u:object_r:ftpd_unit_t,s0)
19 /usr/lib/systemd/system/vsftpd.*\.service -- gen_context(system_u:object_r:ftpd_unit_t,s0)
20
20-/usr/sbin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0) 21-/usr/sbin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0)
21+/usr/bin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0) 22+/usr/bin/ftpwho -- gen_context(system_u:object_r:ftpd_exec_t,s0)
22 /usr/sbin/in\.ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) 23 /usr/sbin/in\.ftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0)
23 /usr/sbin/muddleftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) 24 /usr/sbin/muddleftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0)
24 /usr/sbin/proftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0) 25 /usr/sbin/proftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0)
25-- 26 /usr/sbin/vsftpd -- gen_context(system_u:object_r:ftpd_exec_t,s0)
261.7.10.4 27
27
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-iptables.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-iptables.patch
index 89b1547..9e1196a 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-iptables.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-iptables.patch
@@ -3,22 +3,22 @@ Subject: [PATCH] refpolicy: fix real path for iptables
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/system/iptables.fc | 1 + 8 policy/modules/system/iptables.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc
11index 14cffd2..84ac92b 100644
12--- a/policy/modules/system/iptables.fc 11--- a/policy/modules/system/iptables.fc
13+++ b/policy/modules/system/iptables.fc 12+++ b/policy/modules/system/iptables.fc
14@@ -13,6 +13,7 @@ 13@@ -14,10 +14,11 @@
14 /sbin/ipvsadm -- gen_context(system_u:object_r:iptables_exec_t,s0)
15 /sbin/ipvsadm-restore -- gen_context(system_u:object_r:iptables_exec_t,s0) 15 /sbin/ipvsadm-restore -- gen_context(system_u:object_r:iptables_exec_t,s0)
16 /sbin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0) 16 /sbin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0)
17 /sbin/nft -- gen_context(system_u:object_r:iptables_exec_t,s0)
17 /sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) 18 /sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
18+/usr/sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) 19+/usr/sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
19 20
20 /usr/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0) 21 /usr/lib/systemd/system/[^/]*arptables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
21 /usr/sbin/iptables -- gen_context(system_u:object_r:iptables_exec_t,s0) 22 /usr/lib/systemd/system/[^/]*ebtables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
22-- 23 /usr/lib/systemd/system/[^/]*ip6tables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
231.7.11.7 24 /usr/lib/systemd/system/[^/]*iptables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
24
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-mta.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-mta.patch
index bbd83ec..5d2b0cf 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-mta.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-mta.patch
@@ -6,15 +6,16 @@ Subject: [PATCH] refpolicy: fix real path for mta
6Upstream-Status: Inappropriate [configuration] 6Upstream-Status: Inappropriate [configuration]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/mta.fc | 1 + 11 policy/modules/contrib/mta.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/contrib/mta.fc b/policy/modules/contrib/mta.fc
14index f42896c..0d4bcef 100644
15--- a/policy/modules/contrib/mta.fc 14--- a/policy/modules/contrib/mta.fc
16+++ b/policy/modules/contrib/mta.fc 15+++ b/policy/modules/contrib/mta.fc
17@@ -22,6 +22,7 @@ HOME_DIR/\.maildir(/.*)? gen_context(system_u:object_r:mail_home_rw_t,s0) 16@@ -20,10 +20,11 @@ HOME_DIR/\.maildir(/.*)? gen_context(sys
17 /usr/lib/courier/bin/sendmail -- gen_context(system_u:object_r:sendmail_exec_t,s0)
18
18 /usr/sbin/rmail -- gen_context(system_u:object_r:sendmail_exec_t,s0) 19 /usr/sbin/rmail -- gen_context(system_u:object_r:sendmail_exec_t,s0)
19 /usr/sbin/sendmail\.postfix -- gen_context(system_u:object_r:sendmail_exec_t,s0) 20 /usr/sbin/sendmail\.postfix -- gen_context(system_u:object_r:sendmail_exec_t,s0)
20 /usr/sbin/sendmail(\.sendmail)? -- gen_context(system_u:object_r:sendmail_exec_t,s0) 21 /usr/sbin/sendmail(\.sendmail)? -- gen_context(system_u:object_r:sendmail_exec_t,s0)
@@ -22,6 +23,5 @@ index f42896c..0d4bcef 100644
22 /usr/sbin/ssmtp -- gen_context(system_u:object_r:sendmail_exec_t,s0) 23 /usr/sbin/ssmtp -- gen_context(system_u:object_r:sendmail_exec_t,s0)
23 24
24 /var/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0) 25 /var/mail(/.*)? gen_context(system_u:object_r:mail_spool_t,s0)
25-- 26
261.7.9.5 27 /var/qmail/bin/sendmail -- gen_context(system_u:object_r:sendmail_exec_t,s0)
27
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-netutils.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-netutils.patch
index b45d03e..b41e6e4 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-netutils.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-netutils.patch
@@ -3,22 +3,22 @@ Subject: [PATCH] refpolicy: fix real path for netutils
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/admin/netutils.fc | 1 + 8 policy/modules/admin/netutils.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/admin/netutils.fc b/policy/modules/admin/netutils.fc
11index 407078f..f2ed3dc 100644
12--- a/policy/modules/admin/netutils.fc 11--- a/policy/modules/admin/netutils.fc
13+++ b/policy/modules/admin/netutils.fc 12+++ b/policy/modules/admin/netutils.fc
14@@ -3,6 +3,7 @@ 13@@ -1,10 +1,11 @@
14 /bin/ping.* -- gen_context(system_u:object_r:ping_exec_t,s0)
15 /bin/tracepath.* -- gen_context(system_u:object_r:traceroute_exec_t,s0)
15 /bin/traceroute.* -- gen_context(system_u:object_r:traceroute_exec_t,s0) 16 /bin/traceroute.* -- gen_context(system_u:object_r:traceroute_exec_t,s0)
16 17
17 /sbin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) 18 /sbin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0)
18+/bin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0) 19+/bin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0)
19 20
21 /usr/bin/arping -- gen_context(system_u:object_r:netutils_exec_t,s0)
20 /usr/bin/lft -- gen_context(system_u:object_r:traceroute_exec_t,s0) 22 /usr/bin/lft -- gen_context(system_u:object_r:traceroute_exec_t,s0)
21 /usr/bin/nmap -- gen_context(system_u:object_r:traceroute_exec_t,s0) 23 /usr/bin/nmap -- gen_context(system_u:object_r:traceroute_exec_t,s0)
22-- 24 /usr/bin/ping.* -- gen_context(system_u:object_r:ping_exec_t,s0)
231.7.11.7
24
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-nscd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-nscd.patch
index 1db328c..0adf7c2 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-nscd.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-nscd.patch
@@ -6,15 +6,14 @@ Subject: [PATCH] refpolicy: fix real path for nscd
6Upstream-Status: Inappropriate [configuration] 6Upstream-Status: Inappropriate [configuration]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/nscd.fc | 1 + 11 policy/modules/contrib/nscd.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/contrib/nscd.fc b/policy/modules/contrib/nscd.fc
14index ba64485..61a6f24 100644
15--- a/policy/modules/contrib/nscd.fc 14--- a/policy/modules/contrib/nscd.fc
16+++ b/policy/modules/contrib/nscd.fc 15+++ b/policy/modules/contrib/nscd.fc
17@@ -1,6 +1,7 @@ 16@@ -1,8 +1,9 @@
18 /etc/rc\.d/init\.d/nscd -- gen_context(system_u:object_r:nscd_initrc_exec_t,s0) 17 /etc/rc\.d/init\.d/nscd -- gen_context(system_u:object_r:nscd_initrc_exec_t,s0)
19 18
20 /usr/sbin/nscd -- gen_context(system_u:object_r:nscd_exec_t,s0) 19 /usr/sbin/nscd -- gen_context(system_u:object_r:nscd_exec_t,s0)
@@ -22,6 +21,5 @@ index ba64485..61a6f24 100644
22 21
23 /var/cache/nscd(/.*)? gen_context(system_u:object_r:nscd_var_run_t,s0) 22 /var/cache/nscd(/.*)? gen_context(system_u:object_r:nscd_var_run_t,s0)
24 23
25-- 24 /var/db/nscd(/.*)? gen_context(system_u:object_r:nscd_var_run_t,s0)
261.7.9.5 25
27
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-rpm.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-rpm.patch
index 7ba3380..9de7532 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-rpm.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-rpm.patch
@@ -6,20 +6,18 @@ Subject: [PATCH] refpolicy: fix real path for cpio
6Upstream-Status: Inappropriate [configuration] 6Upstream-Status: Inappropriate [configuration]
7 7
8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> 8Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/rpm.fc | 1 + 11 policy/modules/contrib/rpm.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/contrib/rpm.fc b/policy/modules/contrib/rpm.fc
14index ebe91fc..539063c 100644
15--- a/policy/modules/contrib/rpm.fc 14--- a/policy/modules/contrib/rpm.fc
16+++ b/policy/modules/contrib/rpm.fc 15+++ b/policy/modules/contrib/rpm.fc
17@@ -58,4 +58,5 @@ ifdef(`distro_redhat',` 16@@ -61,6 +61,7 @@ ifdef(`distro_redhat',`
17 /run/yum.* -- gen_context(system_u:object_r:rpm_var_run_t,s0)
18 /run/PackageKit(/.*)? gen_context(system_u:object_r:rpm_var_run_t,s0)
18 19
19 ifdef(`enable_mls',` 20 ifdef(`enable_mls',`
20 /usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0) 21 /usr/sbin/cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
21+/bin/cpio.cpio -- gen_context(system_u:object_r:rpm_exec_t,s0) 22+/bin/cpio.cpio -- gen_context(system_u:object_r:rpm_exec_t,s0)
22 ') 23 ')
23--
241.7.9.5
25
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-screen.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-screen.patch
index 3218194..8ea210e 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-screen.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-screen.patch
@@ -6,22 +6,18 @@ Subject: [PATCH] refpolicy: fix real path for screen
6Upstream-Status: Inappropriate [configuration] 6Upstream-Status: Inappropriate [configuration]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/screen.fc | 1 + 11 policy/modules/contrib/screen.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/contrib/screen.fc b/policy/modules/contrib/screen.fc
14index e7c2cf7..49ddca2 100644
15--- a/policy/modules/contrib/screen.fc 14--- a/policy/modules/contrib/screen.fc
16+++ b/policy/modules/contrib/screen.fc 15+++ b/policy/modules/contrib/screen.fc
17@@ -3,6 +3,7 @@ HOME_DIR/\.screenrc -- gen_context(system_u:object_r:screen_home_t,s0) 16@@ -4,6 +4,7 @@ HOME_DIR/\.tmux\.conf -- gen_context(sys
18 HOME_DIR/\.tmux\.conf -- gen_context(system_u:object_r:screen_home_t,s0)
19 17
20 /usr/bin/screen -- gen_context(system_u:object_r:screen_exec_t,s0) 18 /run/screen(/.*)? gen_context(system_u:object_r:screen_runtime_t,s0)
21+/usr/bin/screen-.* -- gen_context(system_u:object_r:screen_exec_t,s0) 19 /run/tmux(/.*)? gen_context(system_u:object_r:screen_runtime_t,s0)
22 /usr/bin/tmux -- gen_context(system_u:object_r:screen_exec_t,s0)
23 20
24 /var/run/screen(/.*)? gen_context(system_u:object_r:screen_var_run_t,s0) 21 /usr/bin/screen -- gen_context(system_u:object_r:screen_exec_t,s0)
25-- 22+/usr/bin/screen-.* -- gen_context(system_u:object_r:screen_exec_t,s0)
261.7.9.5 23 /usr/bin/tmux -- gen_context(system_u:object_r:screen_exec_t,s0)
27
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ssh.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ssh.patch
index 9aeb3a2..a01e2eb 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-ssh.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-ssh.patch
@@ -3,22 +3,22 @@ Subject: [PATCH] refpolicy: fix real path for ssh
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/services/ssh.fc | 1 + 8 policy/modules/services/ssh.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc
11index 078bcd7..9717428 100644
12--- a/policy/modules/services/ssh.fc 11--- a/policy/modules/services/ssh.fc
13+++ b/policy/modules/services/ssh.fc 12+++ b/policy/modules/services/ssh.fc
14@@ -6,6 +6,7 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0) 13@@ -2,10 +2,11 @@ HOME_DIR/\.ssh(/.*)? gen_context(syste
15 /etc/ssh/ssh_host_rsa_key -- gen_context(system_u:object_r:sshd_key_t,s0) 14
15 /etc/ssh/primes -- gen_context(system_u:object_r:sshd_key_t,s0)
16 /etc/ssh/ssh_host.*_key -- gen_context(system_u:object_r:sshd_key_t,s0)
16 17
17 /usr/bin/ssh -- gen_context(system_u:object_r:ssh_exec_t,s0) 18 /usr/bin/ssh -- gen_context(system_u:object_r:ssh_exec_t,s0)
18+/usr/bin/ssh\.openssh -- gen_context(system_u:object_r:ssh_exec_t,s0) 19+/usr/bin/ssh\.openssh -- gen_context(system_u:object_r:ssh_exec_t,s0)
19 /usr/bin/ssh-agent -- gen_context(system_u:object_r:ssh_agent_exec_t,s0) 20 /usr/bin/ssh-agent -- gen_context(system_u:object_r:ssh_agent_exec_t,s0)
20 /usr/bin/ssh-keygen -- gen_context(system_u:object_r:ssh_keygen_exec_t,s0) 21 /usr/bin/ssh-keygen -- gen_context(system_u:object_r:ssh_keygen_exec_t,s0)
21 22
22-- 23 /usr/lib/openssh/ssh-keysign -- gen_context(system_u:object_r:ssh_keysign_exec_t,s0)
231.7.11.7 24 /usr/lib/ssh/ssh-keysign -- gen_context(system_u:object_r:ssh_keysign_exec_t,s0)
24
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-su.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-su.patch
index 358e4ef..e3d156e 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-su.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-su.patch
@@ -3,21 +3,18 @@ Subject: [PATCH] refpolicy: fix real path for su
3Upstream-Status: Inappropriate [configuration] 3Upstream-Status: Inappropriate [configuration]
4 4
5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 5Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
6Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
6--- 7---
7 policy/modules/admin/su.fc | 1 + 8 policy/modules/admin/su.fc | 1 +
8 1 file changed, 1 insertion(+) 9 1 file changed, 1 insertion(+)
9 10
10diff --git a/policy/modules/admin/su.fc b/policy/modules/admin/su.fc
11index 688abc2..a563687 100644
12--- a/policy/modules/admin/su.fc 11--- a/policy/modules/admin/su.fc
13+++ b/policy/modules/admin/su.fc 12+++ b/policy/modules/admin/su.fc
14@@ -1,5 +1,6 @@ 13@@ -1,6 +1,7 @@
15 14
16 /bin/su -- gen_context(system_u:object_r:su_exec_t,s0) 15 /bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
17+/usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0) 16+/usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
18 17
19 /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0) 18 /usr/(local/)?bin/ksu -- gen_context(system_u:object_r:su_exec_t,s0)
20 /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0) 19 /usr/bin/kdesu -- gen_context(system_u:object_r:su_exec_t,s0)
21-- 20 /usr/bin/su -- gen_context(system_u:object_r:su_exec_t,s0)
221.7.11.7
23
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-subs_dist.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-subs_dist.patch
index cfec7d9..c5fdc51 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-subs_dist.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-subs_dist.patch
@@ -13,10 +13,14 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13 13
14--- a/config/file_contexts.subs_dist 14--- a/config/file_contexts.subs_dist
15+++ b/config/file_contexts.subs_dist 15+++ b/config/file_contexts.subs_dist
16@@ -19,3 +19,13 @@ 16@@ -21,5 +21,17 @@
17 /usr/local/lib64 /usr/lib 17
18 /usr/local/lib /usr/lib 18 # backward compatibility
19 /var/run/lock /var/lock 19 # not for refpolicy intern, but for /var/run using applications,
20 # like systemd tmpfiles or systemd socket configurations
21 /var/run /run
22+
23+# Yocto compatibility
20+/var/volatile/log /var/log 24+/var/volatile/log /var/log
21+/var/volatile/run /var/run 25+/var/volatile/run /var/run
22+/var/volatile/cache /var/cache 26+/var/volatile/cache /var/cache
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-sysnetwork.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-sysnetwork.patch
index 64f497d..fa369ca 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-sysnetwork.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-sysnetwork.patch
@@ -7,15 +7,16 @@ Upstream-Status: Inappropriate [configuration]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> 9Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10--- 11---
11 policy/modules/system/sysnetwork.fc | 4 ++++ 12 policy/modules/system/sysnetwork.fc | 4 ++++
12 1 file changed, 4 insertions(+) 13 1 file changed, 4 insertions(+)
13 14
14diff --git a/policy/modules/system/sysnetwork.fc b/policy/modules/system/sysnetwork.fc
15index fbb935c..a194622 100644
16--- a/policy/modules/system/sysnetwork.fc 15--- a/policy/modules/system/sysnetwork.fc
17+++ b/policy/modules/system/sysnetwork.fc 16+++ b/policy/modules/system/sysnetwork.fc
18@@ -4,6 +4,7 @@ 17@@ -2,10 +2,11 @@
18 #
19 # /bin
19 # 20 #
20 /bin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 21 /bin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
21 /bin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 22 /bin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
@@ -23,17 +24,19 @@ index fbb935c..a194622 100644
23 24
24 # 25 #
25 # /dev 26 # /dev
26@@ -43,7 +44,9 @@ ifdef(`distro_redhat',` 27 #
28 ifdef(`distro_debian',`
29@@ -43,17 +44,19 @@ ifdef(`distro_redhat',`
30 /sbin/dhclient.* -- gen_context(system_u:object_r:dhcpc_exec_t,s0)
27 /sbin/dhcdbd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) 31 /sbin/dhcdbd -- gen_context(system_u:object_r:dhcpc_exec_t,s0)
28 /sbin/dhcpcd -- gen_context(system_u:object_r:dhcpc_exec_t,s0) 32 /sbin/dhcpcd -- gen_context(system_u:object_r:dhcpc_exec_t,s0)
29 /sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 33 /sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
30+/usr/sbin/ethtool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
31 /sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 34 /sbin/ifconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
32+/sbin/ifconfig\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 35+/sbin/ifconfig\.net-tools -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
33 /sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 36 /sbin/ip -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
34 /sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 37 /sbin/ipx_configure -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
35 /sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 38 /sbin/ipx_interface -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
36@@ -51,6 +54,7 @@ ifdef(`distro_redhat',` 39 /sbin/ipx_internal_net -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
37 /sbin/iw -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 40 /sbin/iw -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
38 /sbin/iwconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 41 /sbin/iwconfig -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
39 /sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 42 /sbin/mii-tool -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
@@ -41,6 +44,5 @@ index fbb935c..a194622 100644
41 /sbin/pump -- gen_context(system_u:object_r:dhcpc_exec_t,s0) 44 /sbin/pump -- gen_context(system_u:object_r:dhcpc_exec_t,s0)
42 /sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0) 45 /sbin/tc -- gen_context(system_u:object_r:ifconfig_exec_t,s0)
43 46
44-- 47 #
451.7.9.5 48 # /usr
46
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-udevd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-udevd.patch
index c6c19be..8e2cb1b 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-udevd.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-udevd.patch
@@ -10,26 +10,29 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
10 policy/modules/system/udev.fc | 2 ++ 10 policy/modules/system/udev.fc | 2 ++
11 1 file changed, 2 insertions(+) 11 1 file changed, 2 insertions(+)
12 12
13diff --git a/policy/modules/system/udev.fc b/policy/modules/system/udev.fc
14index 40928d8..491bb23 100644
15--- a/policy/modules/system/udev.fc 13--- a/policy/modules/system/udev.fc
16+++ b/policy/modules/system/udev.fc 14+++ b/policy/modules/system/udev.fc
17@@ -10,6 +10,7 @@ 15@@ -8,10 +8,11 @@
16
17 /etc/udev/rules.d(/.*)? gen_context(system_u:object_r:udev_rules_t,s0)
18 /etc/udev/scripts/.+ -- gen_context(system_u:object_r:udev_helper_exec_t,s0) 18 /etc/udev/scripts/.+ -- gen_context(system_u:object_r:udev_helper_exec_t,s0)
19 19
20 /lib/udev/udev-acl -- gen_context(system_u:object_r:udev_exec_t,s0) 20 /lib/udev/udev-acl -- gen_context(system_u:object_r:udev_exec_t,s0)
21+/lib/udev/udevd -- gen_context(system_u:object_r:udev_exec_t,s0) 21+/lib/udev/udevd -- gen_context(system_u:object_r:udev_exec_t,s0)
22 22
23 ifdef(`distro_debian',` 23 ifdef(`distro_debian',`
24 /bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0)
24 /lib/udev/create_static_nodes -- gen_context(system_u:object_r:udev_exec_t,s0) 25 /lib/udev/create_static_nodes -- gen_context(system_u:object_r:udev_exec_t,s0)
25@@ -27,6 +28,7 @@ ifdef(`distro_redhat',` 26 ')
27@@ -26,10 +27,11 @@ ifdef(`distro_debian',`
28 ifdef(`distro_redhat',`
29 /sbin/start_udev -- gen_context(system_u:object_r:udev_exec_t,s0)
26 ') 30 ')
27 31
28 /usr/bin/udevinfo -- gen_context(system_u:object_r:udev_exec_t,s0) 32 /usr/bin/udevinfo -- gen_context(system_u:object_r:udev_exec_t,s0)
29+/usr/bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0) 33+/usr/bin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0)
30 34
31 /usr/lib/systemd/systemd-udevd -- gen_context(system_u:object_r:udev_exec_t,s0) 35 /usr/sbin/udev -- gen_context(system_u:object_r:udev_exec_t,s0)
32 36 /usr/sbin/udevadm -- gen_context(system_u:object_r:udev_exec_t,s0)
33-- 37 /usr/sbin/udevd -- gen_context(system_u:object_r:udev_exec_t,s0)
341.7.9.5 38 /usr/sbin/udevsend -- gen_context(system_u:object_r:udev_exec_t,s0)
35
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_hostname.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_hostname.patch
index cedb5b5..038cb1f 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_hostname.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_hostname.patch
@@ -6,18 +6,16 @@ Subject: [PATCH 3/4] fix update-alternatives for hostname
6Upstream-Status: Inappropriate [only for Poky] 6Upstream-Status: Inappropriate [only for Poky]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/system/hostname.fc | 1 + 11 policy/modules/system/hostname.fc | 1 +
11 1 file changed, 1 insertion(+) 12 1 file changed, 1 insertion(+)
12 13
13diff --git a/policy/modules/system/hostname.fc b/policy/modules/system/hostname.fc
14index 9dfecf7..4003b6d 100644
15--- a/policy/modules/system/hostname.fc 14--- a/policy/modules/system/hostname.fc
16+++ b/policy/modules/system/hostname.fc 15+++ b/policy/modules/system/hostname.fc
17@@ -1,2 +1,3 @@ 16@@ -1,4 +1,5 @@
18 17
19 /bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0) 18 /bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0)
20+/bin/hostname\.net-tools -- gen_context(system_u:object_r:hostname_exec_t,s0) 19+/bin/hostname\.net-tools -- gen_context(system_u:object_r:hostname_exec_t,s0)
21-- 20
221.7.9.5 21 /usr/bin/hostname -- gen_context(system_u:object_r:hostname_exec_t,s0)
23
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysklogd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysklogd.patch
index 868ee6b..2038110 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysklogd.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysklogd.patch
@@ -9,16 +9,16 @@ for syslogd_t to read syslog_conf_t lnk_file is needed.
9Upstream-Status: Inappropriate [only for Poky] 9Upstream-Status: Inappropriate [only for Poky]
10 10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12--- 13---
13 policy/modules/system/logging.fc | 4 ++++ 14 policy/modules/system/logging.fc | 4 ++++
14 policy/modules/system/logging.te | 1 + 15 policy/modules/system/logging.te | 1 +
15 2 files changed, 5 insertions(+) 16 2 files changed, 5 insertions(+)
16 17
17diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc
18index b50c5fe..c005f33 100644
19--- a/policy/modules/system/logging.fc 18--- a/policy/modules/system/logging.fc
20+++ b/policy/modules/system/logging.fc 19+++ b/policy/modules/system/logging.fc
21@@ -2,19 +2,23 @@ 20@@ -1,22 +1,26 @@
21 /dev/log -s gen_context(system_u:object_r:devlog_t,mls_systemhigh)
22 22
23 /etc/rsyslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) 23 /etc/rsyslog.conf gen_context(system_u:object_r:syslog_conf_t,s0)
24 /etc/syslog.conf gen_context(system_u:object_r:syslog_conf_t,s0) 24 /etc/syslog.conf gen_context(system_u:object_r:syslog_conf_t,s0)
@@ -41,12 +41,14 @@ index b50c5fe..c005f33 100644
41+/sbin/syslogd\.sysklogd -- gen_context(system_u:object_r:syslogd_exec_t,s0) 41+/sbin/syslogd\.sysklogd -- gen_context(system_u:object_r:syslogd_exec_t,s0)
42 /sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0) 42 /sbin/syslog-ng -- gen_context(system_u:object_r:syslogd_exec_t,s0)
43 43
44 /usr/sbin/klogd -- gen_context(system_u:object_r:klogd_exec_t,s0) 44 /usr/lib/systemd/system/auditd.* -- gen_context(system_u:object_r:auditd_unit_t,s0)
45diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te 45 /usr/lib/systemd/system/[^/]*systemd-journal.* -- gen_context(system_u:object_r:syslogd_unit_t,s0)
46index 87e3db2..2914b0b 100644 46 /usr/lib/systemd/systemd-journald -- gen_context(system_u:object_r:syslogd_exec_t,s0)
47--- a/policy/modules/system/logging.te 47--- a/policy/modules/system/logging.te
48+++ b/policy/modules/system/logging.te 48+++ b/policy/modules/system/logging.te
49@@ -371,6 +371,7 @@ allow syslogd_t self:udp_socket create_socket_perms; 49@@ -388,10 +388,11 @@ allow syslogd_t self:unix_dgram_socket s
50 allow syslogd_t self:fifo_file rw_fifo_file_perms;
51 allow syslogd_t self:udp_socket create_socket_perms;
50 allow syslogd_t self:tcp_socket create_stream_socket_perms; 52 allow syslogd_t self:tcp_socket create_stream_socket_perms;
51 53
52 allow syslogd_t syslog_conf_t:file read_file_perms; 54 allow syslogd_t syslog_conf_t:file read_file_perms;
@@ -54,6 +56,5 @@ index 87e3db2..2914b0b 100644
54 56
55 # Create and bind to /dev/log or /var/run/log. 57 # Create and bind to /dev/log or /var/run/log.
56 allow syslogd_t devlog_t:sock_file manage_sock_file_perms; 58 allow syslogd_t devlog_t:sock_file manage_sock_file_perms;
57-- 59 files_pid_filetrans(syslogd_t, devlog_t, sock_file)
581.7.9.5 60
59
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysvinit.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysvinit.patch
index 3a617d8..d8c1642 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-fc-update-alternatives_sysvinit.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-fc-update-alternatives_sysvinit.patch
@@ -6,17 +6,18 @@ Subject: [PATCH 1/4] fix update-alternatives for sysvinit
6Upstream-Status: Inappropriate [only for Poky] 6Upstream-Status: Inappropriate [only for Poky]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/shutdown.fc | 1 + 11 policy/modules/contrib/shutdown.fc | 1 +
11 policy/modules/kernel/corecommands.fc | 1 + 12 policy/modules/kernel/corecommands.fc | 1 +
12 policy/modules/system/init.fc | 1 + 13 policy/modules/system/init.fc | 1 +
13 3 files changed, 3 insertions(+) 14 3 files changed, 3 insertions(+)
14 15
15diff --git a/policy/modules/contrib/shutdown.fc b/policy/modules/contrib/shutdown.fc
16index a91f33b..90e51e0 100644
17--- a/policy/modules/contrib/shutdown.fc 16--- a/policy/modules/contrib/shutdown.fc
18+++ b/policy/modules/contrib/shutdown.fc 17+++ b/policy/modules/contrib/shutdown.fc
19@@ -3,6 +3,7 @@ 18@@ -1,10 +1,11 @@
19 /etc/nologin -- gen_context(system_u:object_r:shutdown_etc_t,s0)
20
20 /lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) 21 /lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0)
21 22
22 /sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) 23 /sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0)
@@ -24,11 +25,13 @@ index a91f33b..90e51e0 100644
24 25
25 /usr/lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0) 26 /usr/lib/upstart/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0)
26 27
27diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc 28 /usr/sbin/shutdown -- gen_context(system_u:object_r:shutdown_exec_t,s0)
28index bcfdba7..87502a3 100644 29
29--- a/policy/modules/kernel/corecommands.fc 30--- a/policy/modules/kernel/corecommands.fc
30+++ b/policy/modules/kernel/corecommands.fc 31+++ b/policy/modules/kernel/corecommands.fc
31@@ -10,6 +10,7 @@ 32@@ -8,10 +8,11 @@
33 /bin/bash2 -- gen_context(system_u:object_r:shell_exec_t,s0)
34 /bin/fish -- gen_context(system_u:object_r:shell_exec_t,s0)
32 /bin/ksh.* -- gen_context(system_u:object_r:shell_exec_t,s0) 35 /bin/ksh.* -- gen_context(system_u:object_r:shell_exec_t,s0)
33 /bin/mksh -- gen_context(system_u:object_r:shell_exec_t,s0) 36 /bin/mksh -- gen_context(system_u:object_r:shell_exec_t,s0)
34 /bin/mountpoint -- gen_context(system_u:object_r:bin_t,s0) 37 /bin/mountpoint -- gen_context(system_u:object_r:bin_t,s0)
@@ -36,11 +39,13 @@ index bcfdba7..87502a3 100644
36 /bin/sash -- gen_context(system_u:object_r:shell_exec_t,s0) 39 /bin/sash -- gen_context(system_u:object_r:shell_exec_t,s0)
37 /bin/tcsh -- gen_context(system_u:object_r:shell_exec_t,s0) 40 /bin/tcsh -- gen_context(system_u:object_r:shell_exec_t,s0)
38 /bin/yash -- gen_context(system_u:object_r:shell_exec_t,s0) 41 /bin/yash -- gen_context(system_u:object_r:shell_exec_t,s0)
39diff --git a/policy/modules/system/init.fc b/policy/modules/system/init.fc 42 /bin/zsh.* -- gen_context(system_u:object_r:shell_exec_t,s0)
40index bc0ffc8..020b9fe 100644 43
41--- a/policy/modules/system/init.fc 44--- a/policy/modules/system/init.fc
42+++ b/policy/modules/system/init.fc 45+++ b/policy/modules/system/init.fc
43@@ -30,6 +30,7 @@ ifdef(`distro_gentoo', ` 46@@ -30,10 +30,11 @@ ifdef(`distro_gentoo', `
47
48 #
44 # /sbin 49 # /sbin
45 # 50 #
46 /sbin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0) 51 /sbin/init(ng)? -- gen_context(system_u:object_r:init_exec_t,s0)
@@ -48,6 +53,5 @@ index bc0ffc8..020b9fe 100644
48 # because nowadays, /sbin/init is often a symlink to /sbin/upstart 53 # because nowadays, /sbin/init is often a symlink to /sbin/upstart
49 /sbin/upstart -- gen_context(system_u:object_r:init_exec_t,s0) 54 /sbin/upstart -- gen_context(system_u:object_r:init_exec_t,s0)
50 55
51-- 56 ifdef(`distro_gentoo', `
521.7.9.5 57 /sbin/rc -- gen_context(system_u:object_r:rc_exec_t,s0)
53
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-bsdpty_device_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-bsdpty_device_t.patch
index 9a3322f..7be7147 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-bsdpty_device_t.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-bsdpty_device_t.patch
@@ -6,15 +6,16 @@ Subject: [PATCH 5/6] add rules for bsdpty_device_t to complete pty devices.
6Upstream-Status: Pending 6Upstream-Status: Pending
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/kernel/terminal.if | 16 ++++++++++++++++ 11 policy/modules/kernel/terminal.if | 16 ++++++++++++++++
11 1 file changed, 16 insertions(+) 12 1 file changed, 16 insertions(+)
12 13
13diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
14index 771bce1..7519d0e 100644
15--- a/policy/modules/kernel/terminal.if 14--- a/policy/modules/kernel/terminal.if
16+++ b/policy/modules/kernel/terminal.if 15+++ b/policy/modules/kernel/terminal.if
17@@ -531,9 +531,11 @@ interface(`term_dontaudit_manage_pty_dirs',` 16@@ -585,13 +585,15 @@ interface(`term_getattr_generic_ptys',`
17 ## </param>
18 #
18 interface(`term_dontaudit_getattr_generic_ptys',` 19 interface(`term_dontaudit_getattr_generic_ptys',`
19 gen_require(` 20 gen_require(`
20 type devpts_t; 21 type devpts_t;
@@ -26,7 +27,11 @@ index 771bce1..7519d0e 100644
26 ') 27 ')
27 ######################################## 28 ########################################
28 ## <summary> 29 ## <summary>
29@@ -549,11 +551,13 @@ interface(`term_dontaudit_getattr_generic_ptys',` 30 ## ioctl of generic pty devices.
31 ## </summary>
32@@ -603,15 +605,17 @@ interface(`term_dontaudit_getattr_generi
33 #
34 # cjp: added for ppp
30 interface(`term_ioctl_generic_ptys',` 35 interface(`term_ioctl_generic_ptys',`
31 gen_require(` 36 gen_require(`
32 type devpts_t; 37 type devpts_t;
@@ -40,7 +45,11 @@ index 771bce1..7519d0e 100644
40 ') 45 ')
41 46
42 ######################################## 47 ########################################
43@@ -571,9 +575,11 @@ interface(`term_ioctl_generic_ptys',` 48 ## <summary>
49 ## Allow setting the attributes of
50@@ -625,13 +629,15 @@ interface(`term_ioctl_generic_ptys',`
51 #
52 # dwalsh: added for rhgb
44 interface(`term_setattr_generic_ptys',` 53 interface(`term_setattr_generic_ptys',`
45 gen_require(` 54 gen_require(`
46 type devpts_t; 55 type devpts_t;
@@ -52,7 +61,11 @@ index 771bce1..7519d0e 100644
52 ') 61 ')
53 62
54 ######################################## 63 ########################################
55@@ -591,9 +597,11 @@ interface(`term_setattr_generic_ptys',` 64 ## <summary>
65 ## Dontaudit setting the attributes of
66@@ -645,13 +651,15 @@ interface(`term_setattr_generic_ptys',`
67 #
68 # dwalsh: added for rhgb
56 interface(`term_dontaudit_setattr_generic_ptys',` 69 interface(`term_dontaudit_setattr_generic_ptys',`
57 gen_require(` 70 gen_require(`
58 type devpts_t; 71 type devpts_t;
@@ -64,7 +77,11 @@ index 771bce1..7519d0e 100644
64 ') 77 ')
65 78
66 ######################################## 79 ########################################
67@@ -611,11 +619,13 @@ interface(`term_dontaudit_setattr_generic_ptys',` 80 ## <summary>
81 ## Read and write the generic pty
82@@ -665,15 +673,17 @@ interface(`term_dontaudit_setattr_generi
83 ## </param>
84 #
68 interface(`term_use_generic_ptys',` 85 interface(`term_use_generic_ptys',`
69 gen_require(` 86 gen_require(`
70 type devpts_t; 87 type devpts_t;
@@ -78,7 +95,11 @@ index 771bce1..7519d0e 100644
78 ') 95 ')
79 96
80 ######################################## 97 ########################################
81@@ -633,9 +643,11 @@ interface(`term_use_generic_ptys',` 98 ## <summary>
99 ## Dot not audit attempts to read and
100@@ -687,13 +697,15 @@ interface(`term_use_generic_ptys',`
101 ## </param>
102 #
82 interface(`term_dontaudit_use_generic_ptys',` 103 interface(`term_dontaudit_use_generic_ptys',`
83 gen_require(` 104 gen_require(`
84 type devpts_t; 105 type devpts_t;
@@ -90,7 +111,11 @@ index 771bce1..7519d0e 100644
90 ') 111 ')
91 112
92 ####################################### 113 #######################################
93@@ -651,10 +663,12 @@ interface(`term_dontaudit_use_generic_ptys',` 114 ## <summary>
115 ## Set the attributes of the tty device
116@@ -705,14 +717,16 @@ interface(`term_dontaudit_use_generic_pt
117 ## </param>
118 #
94 interface(`term_setattr_controlling_term',` 119 interface(`term_setattr_controlling_term',`
95 gen_require(` 120 gen_require(`
96 type devtty_t; 121 type devtty_t;
@@ -103,7 +128,11 @@ index 771bce1..7519d0e 100644
103 ') 128 ')
104 129
105 ######################################## 130 ########################################
106@@ -671,10 +685,12 @@ interface(`term_setattr_controlling_term',` 131 ## <summary>
132 ## Read and write the controlling
133@@ -725,14 +739,16 @@ interface(`term_setattr_controlling_term
134 ## </param>
135 #
107 interface(`term_use_controlling_term',` 136 interface(`term_use_controlling_term',`
108 gen_require(` 137 gen_require(`
109 type devtty_t; 138 type devtty_t;
@@ -116,6 +145,5 @@ index 771bce1..7519d0e 100644
116 ') 145 ')
117 146
118 ####################################### 147 #######################################
119-- 148 ## <summary>
1201.7.9.5 149 ## Get the attributes of the pty multiplexor (/dev/ptmx).
121
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-syslogd_t-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-syslogd_t-symlink.patch
index aa9734a..e90aab5 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-syslogd_t-symlink.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-syslogd_t-symlink.patch
@@ -8,15 +8,16 @@ syslogd_t.
8Upstream-Status: Inappropriate [only for Poky] 8Upstream-Status: Inappropriate [only for Poky]
9 9
10Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 10Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11--- 12---
12 policy/modules/system/logging.te | 2 ++ 13 policy/modules/system/logging.te | 2 ++
13 1 file changed, 2 insertions(+) 14 1 file changed, 2 insertions(+)
14 15
15diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
16index 2ad9ea5..70427d8 100644
17--- a/policy/modules/system/logging.te 16--- a/policy/modules/system/logging.te
18+++ b/policy/modules/system/logging.te 17+++ b/policy/modules/system/logging.te
19@@ -384,6 +384,8 @@ rw_fifo_files_pattern(syslogd_t, var_log_t, var_log_t) 18@@ -404,10 +404,12 @@ rw_fifo_files_pattern(syslogd_t, var_log
19 files_search_spool(syslogd_t)
20
20 # Allow access for syslog-ng 21 # Allow access for syslog-ng
21 allow syslogd_t var_log_t:dir { create setattr }; 22 allow syslogd_t var_log_t:dir { create setattr };
22 23
@@ -25,6 +26,5 @@ index 2ad9ea5..70427d8 100644
25 # manage temporary files 26 # manage temporary files
26 manage_dirs_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) 27 manage_dirs_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t)
27 manage_files_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t) 28 manage_files_pattern(syslogd_t, syslogd_tmp_t, syslogd_tmp_t)
28-- 29 files_tmp_filetrans(syslogd_t, syslogd_tmp_t, { dir file })
291.7.11.7 30
30
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-tmp-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-tmp-symlink.patch
index 210c297..07ebf58 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-tmp-symlink.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-tmp-symlink.patch
@@ -9,16 +9,17 @@ lnk_file while doing search/list/delete/rw.. in /tmp/ directory.
9Upstream-Status: Inappropriate [only for Poky] 9Upstream-Status: Inappropriate [only for Poky]
10 10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12--- 13---
13 policy/modules/kernel/files.fc | 1 + 14 policy/modules/kernel/files.fc | 1 +
14 policy/modules/kernel/files.if | 8 ++++++++ 15 policy/modules/kernel/files.if | 8 ++++++++
15 2 files changed, 9 insertions(+), 0 deletions(-) 16 2 files changed, 9 insertions(+), 0 deletions(-)
16 17
17diff --git a/policy/modules/kernel/files.fc b/policy/modules/kernel/files.fc
18index 8796ca3..a0db748 100644
19--- a/policy/modules/kernel/files.fc 18--- a/policy/modules/kernel/files.fc
20+++ b/policy/modules/kernel/files.fc 19+++ b/policy/modules/kernel/files.fc
21@@ -185,6 +185,7 @@ ifdef(`distro_debian',` 20@@ -191,10 +191,11 @@ ifdef(`distro_debian',`
21
22 #
22 # /tmp 23 # /tmp
23 # 24 #
24 /tmp -d gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh) 25 /tmp -d gen_context(system_u:object_r:tmp_t,s0-mls_systemhigh)
@@ -26,11 +27,13 @@ index 8796ca3..a0db748 100644
26 /tmp/.* <<none>> 27 /tmp/.* <<none>>
27 /tmp/\.journal <<none>> 28 /tmp/\.journal <<none>>
28 29
29diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if 30 /tmp/lost\+found -d gen_context(system_u:object_r:lost_found_t,mls_systemhigh)
30index e1e814d..a7384b0 100644 31 /tmp/lost\+found/.* <<none>>
31--- a/policy/modules/kernel/files.if 32--- a/policy/modules/kernel/files.if
32+++ b/policy/modules/kernel/files.if 33+++ b/policy/modules/kernel/files.if
33@@ -4199,6 +4199,7 @@ interface(`files_search_tmp',` 34@@ -4471,10 +4471,11 @@ interface(`files_search_tmp',`
35 gen_require(`
36 type tmp_t;
34 ') 37 ')
35 38
36 allow $1 tmp_t:dir search_dir_perms; 39 allow $1 tmp_t:dir search_dir_perms;
@@ -38,7 +41,11 @@ index e1e814d..a7384b0 100644
38 ') 41 ')
39 42
40 ######################################## 43 ########################################
41@@ -4235,6 +4236,7 @@ interface(`files_list_tmp',` 44 ## <summary>
45 ## Do not audit attempts to search the tmp directory (/tmp).
46@@ -4507,10 +4508,11 @@ interface(`files_list_tmp',`
47 gen_require(`
48 type tmp_t;
42 ') 49 ')
43 50
44 allow $1 tmp_t:dir list_dir_perms; 51 allow $1 tmp_t:dir list_dir_perms;
@@ -46,7 +53,11 @@ index e1e814d..a7384b0 100644
46 ') 53 ')
47 54
48 ######################################## 55 ########################################
49@@ -4271,6 +4273,7 @@ interface(`files_delete_tmp_dir_entry',` 56 ## <summary>
57 ## Do not audit listing of the tmp directory (/tmp).
58@@ -4543,10 +4545,11 @@ interface(`files_delete_tmp_dir_entry',`
59 gen_require(`
60 type tmp_t;
50 ') 61 ')
51 62
52 allow $1 tmp_t:dir del_entry_dir_perms; 63 allow $1 tmp_t:dir del_entry_dir_perms;
@@ -54,7 +65,11 @@ index e1e814d..a7384b0 100644
54 ') 65 ')
55 66
56 ######################################## 67 ########################################
57@@ -4289,6 +4292,7 @@ interface(`files_read_generic_tmp_files',` 68 ## <summary>
69 ## Read files in the tmp directory (/tmp).
70@@ -4561,10 +4564,11 @@ interface(`files_read_generic_tmp_files'
71 gen_require(`
72 type tmp_t;
58 ') 73 ')
59 74
60 read_files_pattern($1, tmp_t, tmp_t) 75 read_files_pattern($1, tmp_t, tmp_t)
@@ -62,7 +77,11 @@ index e1e814d..a7384b0 100644
62 ') 77 ')
63 78
64 ######################################## 79 ########################################
65@@ -4307,6 +4311,7 @@ interface(`files_manage_generic_tmp_dirs',` 80 ## <summary>
81 ## Manage temporary directories in /tmp.
82@@ -4579,10 +4583,11 @@ interface(`files_manage_generic_tmp_dirs
83 gen_require(`
84 type tmp_t;
66 ') 85 ')
67 86
68 manage_dirs_pattern($1, tmp_t, tmp_t) 87 manage_dirs_pattern($1, tmp_t, tmp_t)
@@ -70,7 +89,11 @@ index e1e814d..a7384b0 100644
70 ') 89 ')
71 90
72 ######################################## 91 ########################################
73@@ -4325,6 +4330,7 @@ interface(`files_manage_generic_tmp_files',` 92 ## <summary>
93 ## Manage temporary files and directories in /tmp.
94@@ -4597,10 +4602,11 @@ interface(`files_manage_generic_tmp_file
95 gen_require(`
96 type tmp_t;
74 ') 97 ')
75 98
76 manage_files_pattern($1, tmp_t, tmp_t) 99 manage_files_pattern($1, tmp_t, tmp_t)
@@ -78,7 +101,11 @@ index e1e814d..a7384b0 100644
78 ') 101 ')
79 102
80 ######################################## 103 ########################################
81@@ -4361,6 +4367,7 @@ interface(`files_rw_generic_tmp_sockets',` 104 ## <summary>
105 ## Read symbolic links in the tmp directory (/tmp).
106@@ -4633,10 +4639,11 @@ interface(`files_rw_generic_tmp_sockets'
107 gen_require(`
108 type tmp_t;
82 ') 109 ')
83 110
84 rw_sock_files_pattern($1, tmp_t, tmp_t) 111 rw_sock_files_pattern($1, tmp_t, tmp_t)
@@ -86,7 +113,11 @@ index e1e814d..a7384b0 100644
86 ') 113 ')
87 114
88 ######################################## 115 ########################################
89@@ -4550,6 +4557,7 @@ interface(`files_tmp_filetrans',` 116 ## <summary>
117 ## Mount filesystems in the tmp directory (/tmp)
118@@ -4840,10 +4847,11 @@ interface(`files_tmp_filetrans',`
119 gen_require(`
120 type tmp_t;
90 ') 121 ')
91 122
92 filetrans_pattern($1, tmp_t, $2, $3, $4) 123 filetrans_pattern($1, tmp_t, $2, $3, $4)
@@ -94,6 +125,5 @@ index e1e814d..a7384b0 100644
94 ') 125 ')
95 126
96 ######################################## 127 ########################################
97-- 128 ## <summary>
981.7.5.4 129 ## Delete the contents of /tmp.
99
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-cache-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-cache-symlink.patch
index 18a92dd..b828b7a 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-cache-symlink.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-cache-symlink.patch
@@ -11,15 +11,16 @@ contents, so this is still a secure relax.
11Upstream-Status: Inappropriate [only for Poky] 11Upstream-Status: Inappropriate [only for Poky]
12 12
13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 13Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
14Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14--- 15---
15 policy/modules/kernel/domain.te | 3 +++ 16 policy/modules/kernel/domain.te | 3 +++
16 1 file changed, 3 insertions(+) 17 1 file changed, 3 insertions(+)
17 18
18diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te
19index cf04cb5..9ffe6b0 100644
20--- a/policy/modules/kernel/domain.te 19--- a/policy/modules/kernel/domain.te
21+++ b/policy/modules/kernel/domain.te 20+++ b/policy/modules/kernel/domain.te
22@@ -104,6 +104,9 @@ term_use_controlling_term(domain) 21@@ -108,10 +108,13 @@ dev_rw_zero(domain)
22 term_use_controlling_term(domain)
23
23 # list the root directory 24 # list the root directory
24 files_list_root(domain) 25 files_list_root(domain)
25 26
@@ -29,6 +30,5 @@ index cf04cb5..9ffe6b0 100644
29 ifdef(`hide_broken_symptoms',` 30 ifdef(`hide_broken_symptoms',`
30 # This check is in the general socket 31 # This check is in the general socket
31 # listen code, before protocol-specific 32 # listen code, before protocol-specific
32-- 33 # listen function is called, so bad calls
331.7.9.5 34 # to listen on UDP sockets should be silenced
34
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-apache.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-apache.patch
index 8bc40c4..8d22c21 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-apache.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-apache.patch
@@ -10,15 +10,16 @@ logging.if. So still need add a individual rule for apache.te.
10Upstream-Status: Inappropriate [only for Poky] 10Upstream-Status: Inappropriate [only for Poky]
11 11
12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13--- 14---
14 policy/modules/contrib/apache.te | 1 + 15 policy/modules/contrib/apache.te | 1 +
15 1 file changed, 1 insertion(+) 16 1 file changed, 1 insertion(+)
16 17
17diff --git a/policy/modules/contrib/apache.te b/policy/modules/contrib/apache.te
18index ec8bd13..06f2e95 100644
19--- a/policy/modules/contrib/apache.te 18--- a/policy/modules/contrib/apache.te
20+++ b/policy/modules/contrib/apache.te 19+++ b/policy/modules/contrib/apache.te
21@@ -400,6 +400,7 @@ create_files_pattern(httpd_t, httpd_log_t, httpd_log_t) 20@@ -409,10 +409,11 @@ allow httpd_t httpd_log_t:dir setattr_di
21 create_dirs_pattern(httpd_t, httpd_log_t, httpd_log_t)
22 create_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
22 append_files_pattern(httpd_t, httpd_log_t, httpd_log_t) 23 append_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
23 read_files_pattern(httpd_t, httpd_log_t, httpd_log_t) 24 read_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
24 read_lnk_files_pattern(httpd_t, httpd_log_t, httpd_log_t) 25 read_lnk_files_pattern(httpd_t, httpd_log_t, httpd_log_t)
@@ -26,6 +27,5 @@ index ec8bd13..06f2e95 100644
26 logging_log_filetrans(httpd_t, httpd_log_t, file) 27 logging_log_filetrans(httpd_t, httpd_log_t, file)
27 28
28 allow httpd_t httpd_modules_t:dir list_dir_perms; 29 allow httpd_t httpd_modules_t:dir list_dir_perms;
29-- 30 mmap_files_pattern(httpd_t, httpd_modules_t, httpd_modules_t)
301.7.9.5 31 read_files_pattern(httpd_t, httpd_modules_t, httpd_modules_t)
31
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch
index cbf0f7d..2e8e1f2 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink-audisp_remote_t.patch
@@ -8,15 +8,16 @@ audisp_remote_t.
8Upstream-Status: Inappropriate [only for Poky] 8Upstream-Status: Inappropriate [only for Poky]
9 9
10Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 10Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
11Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
11--- 12---
12 policy/modules/system/logging.te | 1 + 13 policy/modules/system/logging.te | 1 +
13 1 file changed, 1 insertion(+) 14 1 file changed, 1 insertion(+)
14 15
15diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
16index 8426a49..2ad9ea5 100644
17--- a/policy/modules/system/logging.te 16--- a/policy/modules/system/logging.te
18+++ b/policy/modules/system/logging.te 17+++ b/policy/modules/system/logging.te
19@@ -262,6 +262,7 @@ allow audisp_remote_t self:capability { setuid setpcap }; 18@@ -278,10 +278,11 @@ optional_policy(`
19
20 allow audisp_remote_t self:capability { setuid setpcap };
20 allow audisp_remote_t self:process { getcap setcap }; 21 allow audisp_remote_t self:process { getcap setcap };
21 allow audisp_remote_t self:tcp_socket create_socket_perms; 22 allow audisp_remote_t self:tcp_socket create_socket_perms;
22 allow audisp_remote_t var_log_t:dir search_dir_perms; 23 allow audisp_remote_t var_log_t:dir search_dir_perms;
@@ -24,6 +25,5 @@ index 8426a49..2ad9ea5 100644
24 25
25 manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) 26 manage_dirs_pattern(audisp_remote_t, audit_spool_t, audit_spool_t)
26 manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t) 27 manage_files_pattern(audisp_remote_t, audit_spool_t, audit_spool_t)
27-- 28 files_spool_filetrans(audisp_remote_t, audit_spool_t, { dir file })
281.7.11.7 29
29
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink.patch
index b06f3ef..a7161d5 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-rules-for-var-log-symlink.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-rules-for-var-log-symlink.patch
@@ -9,17 +9,18 @@ lnk_file while doing search/list/delete/rw.. in /var/log/ directory.
9Upstream-Status: Inappropriate [only for Poky] 9Upstream-Status: Inappropriate [only for Poky]
10 10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12--- 13---
13 policy/modules/system/logging.fc | 1 + 14 policy/modules/system/logging.fc | 1 +
14 policy/modules/system/logging.if | 14 +++++++++++++- 15 policy/modules/system/logging.if | 14 +++++++++++++-
15 policy/modules/system/logging.te | 1 + 16 policy/modules/system/logging.te | 1 +
16 3 files changed, 15 insertions(+), 1 deletion(-) 17 3 files changed, 15 insertions(+), 1 deletion(-)
17 18
18diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc
19index c005f33..9529e40 100644
20--- a/policy/modules/system/logging.fc 19--- a/policy/modules/system/logging.fc
21+++ b/policy/modules/system/logging.fc 20+++ b/policy/modules/system/logging.fc
22@@ -41,6 +41,7 @@ ifdef(`distro_suse', ` 21@@ -49,10 +49,11 @@ ifdef(`distro_suse', `
22
23 /var/axfrdns/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0)
23 /var/dnscache/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0) 24 /var/dnscache/log/main(/.*)? gen_context(system_u:object_r:var_log_t,s0)
24 25
25 /var/log -d gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh) 26 /var/log -d gen_context(system_u:object_r:var_log_t,s0-mls_systemhigh)
@@ -27,11 +28,13 @@ index c005f33..9529e40 100644
27 /var/log/.* gen_context(system_u:object_r:var_log_t,s0) 28 /var/log/.* gen_context(system_u:object_r:var_log_t,s0)
28 /var/log/boot\.log -- gen_context(system_u:object_r:var_log_t,mls_systemhigh) 29 /var/log/boot\.log -- gen_context(system_u:object_r:var_log_t,mls_systemhigh)
29 /var/log/messages[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh) 30 /var/log/messages[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh)
30diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if 31 /var/log/secure[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh)
31index 4e94884..9a6f599 100644 32 /var/log/maillog[^/]* gen_context(system_u:object_r:var_log_t,mls_systemhigh)
32--- a/policy/modules/system/logging.if 33--- a/policy/modules/system/logging.if
33+++ b/policy/modules/system/logging.if 34+++ b/policy/modules/system/logging.if
34@@ -136,12 +136,13 @@ interface(`logging_set_audit_parameters',` 35@@ -134,16 +134,17 @@ interface(`logging_set_audit_parameters'
36 ## </param>
37 ## <rolecap/>
35 # 38 #
36 interface(`logging_read_audit_log',` 39 interface(`logging_read_audit_log',`
37 gen_require(` 40 gen_require(`
@@ -46,7 +49,11 @@ index 4e94884..9a6f599 100644
46 ') 49 ')
47 50
48 ######################################## 51 ########################################
49@@ -626,6 +627,7 @@ interface(`logging_search_logs',` 52 ## <summary>
53 ## Execute auditctl in the auditctl domain.
54@@ -665,10 +666,11 @@ interface(`logging_search_logs',`
55 type var_log_t;
56 ')
50 57
51 files_search_var($1) 58 files_search_var($1)
52 allow $1 var_log_t:dir search_dir_perms; 59 allow $1 var_log_t:dir search_dir_perms;
@@ -54,7 +61,11 @@ index 4e94884..9a6f599 100644
54 ') 61 ')
55 62
56 ####################################### 63 #######################################
57@@ -663,6 +665,7 @@ interface(`logging_list_logs',` 64 ## <summary>
65 ## Do not audit attempts to search the var log directory.
66@@ -702,10 +704,11 @@ interface(`logging_list_logs',`
67 type var_log_t;
68 ')
58 69
59 files_search_var($1) 70 files_search_var($1)
60 allow $1 var_log_t:dir list_dir_perms; 71 allow $1 var_log_t:dir list_dir_perms;
@@ -62,7 +73,11 @@ index 4e94884..9a6f599 100644
62 ') 73 ')
63 74
64 ####################################### 75 #######################################
65@@ -682,6 +685,7 @@ interface(`logging_rw_generic_log_dirs',` 76 ## <summary>
77 ## Read and write the generic log directory (/var/log).
78@@ -721,10 +724,11 @@ interface(`logging_rw_generic_log_dirs',
79 type var_log_t;
80 ')
66 81
67 files_search_var($1) 82 files_search_var($1)
68 allow $1 var_log_t:dir rw_dir_perms; 83 allow $1 var_log_t:dir rw_dir_perms;
@@ -70,7 +85,11 @@ index 4e94884..9a6f599 100644
70 ') 85 ')
71 86
72 ####################################### 87 #######################################
73@@ -793,10 +797,12 @@ interface(`logging_append_all_logs',` 88 ## <summary>
89 ## Search through all log dirs.
90@@ -832,14 +836,16 @@ interface(`logging_append_all_logs',`
91 ## <rolecap/>
92 #
74 interface(`logging_read_all_logs',` 93 interface(`logging_read_all_logs',`
75 gen_require(` 94 gen_require(`
76 attribute logfile; 95 attribute logfile;
@@ -83,7 +102,11 @@ index 4e94884..9a6f599 100644
83 read_files_pattern($1, logfile, logfile) 102 read_files_pattern($1, logfile, logfile)
84 ') 103 ')
85 104
86@@ -815,10 +821,12 @@ interface(`logging_read_all_logs',` 105 ########################################
106 ## <summary>
107@@ -854,14 +860,16 @@ interface(`logging_read_all_logs',`
108 # cjp: not sure why this is needed. This was added
109 # because of logrotate.
87 interface(`logging_exec_all_logs',` 110 interface(`logging_exec_all_logs',`
88 gen_require(` 111 gen_require(`
89 attribute logfile; 112 attribute logfile;
@@ -96,7 +119,11 @@ index 4e94884..9a6f599 100644
96 can_exec($1, logfile) 119 can_exec($1, logfile)
97 ') 120 ')
98 121
99@@ -880,6 +888,7 @@ interface(`logging_read_generic_logs',` 122 ########################################
123 ## <summary>
124@@ -919,10 +927,11 @@ interface(`logging_read_generic_logs',`
125 type var_log_t;
126 ')
100 127
101 files_search_var($1) 128 files_search_var($1)
102 allow $1 var_log_t:dir list_dir_perms; 129 allow $1 var_log_t:dir list_dir_perms;
@@ -104,7 +131,11 @@ index 4e94884..9a6f599 100644
104 read_files_pattern($1, var_log_t, var_log_t) 131 read_files_pattern($1, var_log_t, var_log_t)
105 ') 132 ')
106 133
107@@ -900,6 +909,7 @@ interface(`logging_write_generic_logs',` 134 ########################################
135 ## <summary>
136@@ -939,10 +948,11 @@ interface(`logging_write_generic_logs',`
137 type var_log_t;
138 ')
108 139
109 files_search_var($1) 140 files_search_var($1)
110 allow $1 var_log_t:dir list_dir_perms; 141 allow $1 var_log_t:dir list_dir_perms;
@@ -112,7 +143,11 @@ index 4e94884..9a6f599 100644
112 write_files_pattern($1, var_log_t, var_log_t) 143 write_files_pattern($1, var_log_t, var_log_t)
113 ') 144 ')
114 145
115@@ -938,6 +948,7 @@ interface(`logging_rw_generic_logs',` 146 ########################################
147 ## <summary>
148@@ -977,10 +987,11 @@ interface(`logging_rw_generic_logs',`
149 type var_log_t;
150 ')
116 151
117 files_search_var($1) 152 files_search_var($1)
118 allow $1 var_log_t:dir list_dir_perms; 153 allow $1 var_log_t:dir list_dir_perms;
@@ -120,7 +155,11 @@ index 4e94884..9a6f599 100644
120 rw_files_pattern($1, var_log_t, var_log_t) 155 rw_files_pattern($1, var_log_t, var_log_t)
121 ') 156 ')
122 157
123@@ -960,6 +971,7 @@ interface(`logging_manage_generic_logs',` 158 ########################################
159 ## <summary>
160@@ -999,10 +1010,11 @@ interface(`logging_manage_generic_logs',
161 type var_log_t;
162 ')
124 163
125 files_search_var($1) 164 files_search_var($1)
126 manage_files_pattern($1, var_log_t, var_log_t) 165 manage_files_pattern($1, var_log_t, var_log_t)
@@ -128,18 +167,19 @@ index 4e94884..9a6f599 100644
128 ') 167 ')
129 168
130 ######################################## 169 ########################################
131diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te 170 ## <summary>
132index 2ab0a49..2795d89 100644 171 ## All of the rules required to administrate
133--- a/policy/modules/system/logging.te 172--- a/policy/modules/system/logging.te
134+++ b/policy/modules/system/logging.te 173+++ b/policy/modules/system/logging.te
135@@ -139,6 +139,7 @@ allow auditd_t auditd_etc_t:file read_file_perms; 174@@ -151,10 +151,11 @@ allow auditd_t auditd_etc_t:file read_fi
175
136 manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t) 176 manage_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
177 allow auditd_t auditd_log_t:dir setattr;
137 manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t) 178 manage_lnk_files_pattern(auditd_t, auditd_log_t, auditd_log_t)
138 allow auditd_t var_log_t:dir search_dir_perms; 179 allow auditd_t var_log_t:dir search_dir_perms;
139+allow auditd_t var_log_t:lnk_file read_lnk_file_perms; 180+allow auditd_t var_log_t:lnk_file read_lnk_file_perms;
140 181
141 manage_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) 182 manage_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t)
142 manage_sock_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t) 183 manage_sock_files_pattern(auditd_t, auditd_var_run_t, auditd_var_run_t)
143-- 184 files_pid_filetrans(auditd_t, auditd_var_run_t, { file sock_file })
1441.7.9.5 185
145
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-syslogd_t-to-trusted-object.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-syslogd_t-to-trusted-object.patch
index 92b1592..dc623d3 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-add-syslogd_t-to-trusted-object.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-add-syslogd_t-to-trusted-object.patch
@@ -10,15 +10,16 @@ Upstream-Status: Inappropriate [only for Poky]
10 10
11Signed-off-by: Roy.Li <rongqing.li@windriver.com> 11Signed-off-by: Roy.Li <rongqing.li@windriver.com>
12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 12Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13--- 14---
14 policy/modules/system/logging.te | 1 + 15 policy/modules/system/logging.te | 1 +
15 1 file changed, 1 insertion(+) 16 1 file changed, 1 insertion(+)
16 17
17diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
18index 2914b0b..2ab0a49 100644
19--- a/policy/modules/system/logging.te 18--- a/policy/modules/system/logging.te
20+++ b/policy/modules/system/logging.te 19+++ b/policy/modules/system/logging.te
21@@ -450,6 +450,7 @@ fs_getattr_all_fs(syslogd_t) 20@@ -477,10 +477,11 @@ files_var_lib_filetrans(syslogd_t, syslo
21
22 fs_getattr_all_fs(syslogd_t)
22 fs_search_auto_mountpoints(syslogd_t) 23 fs_search_auto_mountpoints(syslogd_t)
23 24
24 mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories 25 mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories
@@ -26,6 +27,5 @@ index 2914b0b..2ab0a49 100644
26 27
27 term_write_console(syslogd_t) 28 term_write_console(syslogd_t)
28 # Allow syslog to a terminal 29 # Allow syslog to a terminal
29-- 30 term_write_unallocated_ttys(syslogd_t)
301.7.9.5 31
31
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-nfsd-to-exec-shell-commands.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch
index e77a730..ca2796f 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-nfsd-to-exec-shell-commands.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-nfsd-to-exec-shell-commands.patch
@@ -6,16 +6,17 @@ Subject: [PATCH] allow nfsd to exec shell commands.
6Upstream-Status: Inappropriate [only for Poky] 6Upstream-Status: Inappropriate [only for Poky]
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/contrib/rpc.te | 2 +- 11 policy/modules/contrib/rpc.te | 2 +-
11 policy/modules/kernel/kernel.if | 18 ++++++++++++++++++ 12 policy/modules/kernel/kernel.if | 18 ++++++++++++++++++
12 2 files changed, 19 insertions(+), 1 deletions(-) 13 2 files changed, 19 insertions(+), 1 deletions(-)
13 14
14diff --git a/policy/modules/contrib/rpc.te b/policy/modules/contrib/rpc.te
15index 9566932..5605205 100644
16--- a/policy/modules/contrib/rpc.te 15--- a/policy/modules/contrib/rpc.te
17+++ b/policy/modules/contrib/rpc.te 16+++ b/policy/modules/contrib/rpc.te
18@@ -203,7 +203,7 @@ kernel_read_network_state(nfsd_t) 17@@ -222,11 +222,11 @@ allow nfsd_t { nfsd_rw_t nfsd_ro_t }:dir
18
19 kernel_read_network_state(nfsd_t)
19 kernel_dontaudit_getattr_core_if(nfsd_t) 20 kernel_dontaudit_getattr_core_if(nfsd_t)
20 kernel_setsched(nfsd_t) 21 kernel_setsched(nfsd_t)
21 kernel_request_load_module(nfsd_t) 22 kernel_request_load_module(nfsd_t)
@@ -24,11 +25,13 @@ index 9566932..5605205 100644
24 25
25 corenet_sendrecv_nfs_server_packets(nfsd_t) 26 corenet_sendrecv_nfs_server_packets(nfsd_t)
26 corenet_tcp_bind_nfs_port(nfsd_t) 27 corenet_tcp_bind_nfs_port(nfsd_t)
27diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if 28 corenet_udp_bind_nfs_port(nfsd_t)
28index 649e458..8a669c5 100644 29
29--- a/policy/modules/kernel/kernel.if 30--- a/policy/modules/kernel/kernel.if
30+++ b/policy/modules/kernel/kernel.if 31+++ b/policy/modules/kernel/kernel.if
31@@ -804,6 +804,24 @@ interface(`kernel_unmount_proc',` 32@@ -844,10 +844,28 @@ interface(`kernel_unmount_proc',`
33 allow $1 proc_t:filesystem unmount;
34 ')
32 35
33 ######################################## 36 ########################################
34 ## <summary> 37 ## <summary>
@@ -53,6 +56,5 @@ index 649e458..8a669c5 100644
53 ## Get the attributes of the proc filesystem. 56 ## Get the attributes of the proc filesystem.
54 ## </summary> 57 ## </summary>
55 ## <param name="domain"> 58 ## <param name="domain">
56-- 59 ## <summary>
571.7.5.4 60 ## Domain allowed access.
58
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-setfiles_t-to-read-symlinks.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-setfiles_t-to-read-symlinks.patch
index 9ef61b4..d28bde0 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-setfiles_t-to-read-symlinks.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-setfiles_t-to-read-symlinks.patch
@@ -7,15 +7,16 @@ Upstream-Status: Pending
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> 9Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com>
10Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
10--- 11---
11 policy/modules/system/selinuxutil.te | 3 +++ 12 policy/modules/system/selinuxutil.te | 3 +++
12 1 file changed, 3 insertions(+) 13 1 file changed, 3 insertions(+)
13 14
14diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
15index 9058dd8..f998491 100644
16--- a/policy/modules/system/selinuxutil.te 15--- a/policy/modules/system/selinuxutil.te
17+++ b/policy/modules/system/selinuxutil.te 16+++ b/policy/modules/system/selinuxutil.te
18@@ -552,6 +552,9 @@ files_relabel_all_files(setfiles_t) 17@@ -553,10 +553,13 @@ files_read_etc_files(setfiles_t)
18 files_list_all(setfiles_t)
19 files_relabel_all_files(setfiles_t)
19 files_read_usr_symlinks(setfiles_t) 20 files_read_usr_symlinks(setfiles_t)
20 files_dontaudit_read_all_symlinks(setfiles_t) 21 files_dontaudit_read_all_symlinks(setfiles_t)
21 22
@@ -25,6 +26,5 @@ index 9058dd8..f998491 100644
25 fs_getattr_all_xattr_fs(setfiles_t) 26 fs_getattr_all_xattr_fs(setfiles_t)
26 fs_list_all(setfiles_t) 27 fs_list_all(setfiles_t)
27 fs_search_auto_mountpoints(setfiles_t) 28 fs_search_auto_mountpoints(setfiles_t)
28-- 29 fs_relabelfrom_noxattr_fs(setfiles_t)
291.7.9.5 30
30
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-sysadm-to-run-rpcinfo.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-sysadm-to-run-rpcinfo.patch
index ec3dbf4..a1fda13 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-allow-sysadm-to-run-rpcinfo.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-allow-sysadm-to-run-rpcinfo.patch
@@ -9,15 +9,16 @@ type=AVC msg=audit(1392427946.976:264): avc: denied { connectto } for pid=211
9type=SYSCALL msg=audit(1392427946.976:264): arch=c000003e syscall=42 success=no exit=-13 a0=3 a1=7fff3aa20000 a2=17 a3=22 items=0 ppid=2108 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=pts0 comm="rpcinfo" exe="/usr/sbin/rpcinfo" subj=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 key=(null) 9type=SYSCALL msg=audit(1392427946.976:264): arch=c000003e syscall=42 success=no exit=-13 a0=3 a1=7fff3aa20000 a2=17 a3=22 items=0 ppid=2108 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=pts0 comm="rpcinfo" exe="/usr/sbin/rpcinfo" subj=system_u:system_r:rpcbind_t:s0-s15:c0.c1023 key=(null)
10 10
11Signed-off-by: Roy Li <rongqing.li@windriver.com> 11Signed-off-by: Roy Li <rongqing.li@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12--- 13---
13 policy/modules/roles/sysadm.te | 4 ++++ 14 policy/modules/roles/sysadm.te | 4 ++++
14 1 file changed, 4 insertions(+) 15 1 file changed, 4 insertions(+)
15 16
16diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te
17index 1767217..5502c6a 100644
18--- a/policy/modules/roles/sysadm.te 17--- a/policy/modules/roles/sysadm.te
19+++ b/policy/modules/roles/sysadm.te 18+++ b/policy/modules/roles/sysadm.te
20@@ -413,6 +413,10 @@ optional_policy(` 19@@ -1169,10 +1169,14 @@ optional_policy(`
20 virt_admin(sysadm_t, sysadm_r)
21 virt_stream_connect(sysadm_t)
21 ') 22 ')
22 23
23 optional_policy(` 24 optional_policy(`
@@ -28,6 +29,5 @@ index 1767217..5502c6a 100644
28 vmware_role(sysadm_r, sysadm_t) 29 vmware_role(sysadm_r, sysadm_t)
29 ') 30 ')
30 31
31-- 32 optional_policy(`
321.7.10.4 33 vnstatd_admin(sysadm_t, sysadm_r)
33
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-don-t-audit-tty_device_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-don-t-audit-tty_device_t.patch
index 82370d8..346872a 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-don-t-audit-tty_device_t.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-don-t-audit-tty_device_t.patch
@@ -9,15 +9,16 @@ term_dontaudit_use_console.
9Upstream-Status: Inappropriate [only for Poky] 9Upstream-Status: Inappropriate [only for Poky]
10 10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
12--- 13---
13 policy/modules/kernel/terminal.if | 3 +++ 14 policy/modules/kernel/terminal.if | 3 +++
14 1 file changed, 3 insertions(+) 15 1 file changed, 3 insertions(+)
15 16
16diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
17index 7519d0e..45de1ac 100644
18--- a/policy/modules/kernel/terminal.if 17--- a/policy/modules/kernel/terminal.if
19+++ b/policy/modules/kernel/terminal.if 18+++ b/policy/modules/kernel/terminal.if
20@@ -299,9 +299,12 @@ interface(`term_use_console',` 19@@ -297,13 +297,16 @@ interface(`term_use_console',`
20 ## </param>
21 #
21 interface(`term_dontaudit_use_console',` 22 interface(`term_dontaudit_use_console',`
22 gen_require(` 23 gen_require(`
23 type console_device_t; 24 type console_device_t;
@@ -30,6 +31,5 @@ index 7519d0e..45de1ac 100644
30 ') 31 ')
31 32
32 ######################################## 33 ########################################
33-- 34 ## <summary>
341.7.9.5 35 ## Set the attributes of the console
35
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-dmesg-to-use-dev-kmsg.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-dmesg-to-use-dev-kmsg.patch
index d6c8dbf..8443e31 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-dmesg-to-use-dev-kmsg.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-dmesg-to-use-dev-kmsg.patch
@@ -4,26 +4,27 @@ Date: Fri, 23 Aug 2013 16:36:09 +0800
4Subject: [PATCH] fix dmesg to use /dev/kmsg as default input 4Subject: [PATCH] fix dmesg to use /dev/kmsg as default input
5 5
6Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 6Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
7Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
7--- 8---
8 policy/modules/admin/dmesg.if | 1 + 9 policy/modules/admin/dmesg.if | 1 +
9 policy/modules/admin/dmesg.te | 2 ++ 10 policy/modules/admin/dmesg.te | 2 ++
10 2 files changed, 3 insertions(+) 11 2 files changed, 3 insertions(+)
11 12
12diff --git a/policy/modules/admin/dmesg.if b/policy/modules/admin/dmesg.if
13index e1973c7..739a4bc 100644
14--- a/policy/modules/admin/dmesg.if 13--- a/policy/modules/admin/dmesg.if
15+++ b/policy/modules/admin/dmesg.if 14+++ b/policy/modules/admin/dmesg.if
16@@ -37,4 +37,5 @@ interface(`dmesg_exec',` 15@@ -35,6 +35,7 @@ interface(`dmesg_exec',`
16 type dmesg_exec_t;
17 ')
17 18
18 corecmd_search_bin($1) 19 corecmd_search_bin($1)
19 can_exec($1, dmesg_exec_t) 20 can_exec($1, dmesg_exec_t)
20+ dev_read_kmsg($1) 21+ dev_read_kmsg($1)
21 ') 22 ')
22diff --git a/policy/modules/admin/dmesg.te b/policy/modules/admin/dmesg.te
23index 72bc6d8..c591aea 100644
24--- a/policy/modules/admin/dmesg.te 23--- a/policy/modules/admin/dmesg.te
25+++ b/policy/modules/admin/dmesg.te 24+++ b/policy/modules/admin/dmesg.te
26@@ -28,6 +28,8 @@ kernel_read_proc_symlinks(dmesg_t) 25@@ -28,10 +28,12 @@ kernel_read_proc_symlinks(dmesg_t)
26 # for when /usr is not mounted:
27 kernel_dontaudit_search_unlabeled(dmesg_t)
27 28
28 dev_read_sysfs(dmesg_t) 29 dev_read_sysfs(dmesg_t)
29 30
@@ -32,6 +33,5 @@ index 72bc6d8..c591aea 100644
32 fs_search_auto_mountpoints(dmesg_t) 33 fs_search_auto_mountpoints(dmesg_t)
33 34
34 term_dontaudit_use_console(dmesg_t) 35 term_dontaudit_use_console(dmesg_t)
35-- 36
361.7.9.5 37 domain_use_interactive_fds(dmesg_t)
37
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-new-SELINUXMNT-in-sys.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-new-SELINUXMNT-in-sys.patch
index 7e92b64..58903ce 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-new-SELINUXMNT-in-sys.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-new-SELINUXMNT-in-sys.patch
@@ -14,11 +14,11 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14 policy/modules/kernel/selinux.if | 34 ++++++++++++++++++++++++++++++++-- 14 policy/modules/kernel/selinux.if | 34 ++++++++++++++++++++++++++++++++--
15 1 file changed, 32 insertions(+), 2 deletions(-) 15 1 file changed, 32 insertions(+), 2 deletions(-)
16 16
17Index: refpolicy/policy/modules/kernel/selinux.if 17--- a/policy/modules/kernel/selinux.if
18=================================================================== 18+++ b/policy/modules/kernel/selinux.if
19--- refpolicy.orig/policy/modules/kernel/selinux.if 19@@ -56,10 +56,14 @@ interface(`selinux_labeled_boolean',`
20+++ refpolicy/policy/modules/kernel/selinux.if 20 interface(`selinux_get_fs_mount',`
21@@ -58,6 +58,10 @@ interface(`selinux_get_fs_mount',` 21 gen_require(`
22 type security_t; 22 type security_t;
23 ') 23 ')
24 24
@@ -29,7 +29,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
29 # starting in libselinux 2.0.5, init_selinuxmnt() will 29 # starting in libselinux 2.0.5, init_selinuxmnt() will
30 # attempt to short circuit by checking if SELINUXMNT 30 # attempt to short circuit by checking if SELINUXMNT
31 # (/selinux) is already a selinuxfs 31 # (/selinux) is already a selinuxfs
32@@ -88,6 +92,7 @@ interface(`selinux_dontaudit_get_fs_moun 32 allow $1 security_t:filesystem getattr;
33
34@@ -86,10 +90,11 @@ interface(`selinux_get_fs_mount',`
35 interface(`selinux_dontaudit_get_fs_mount',`
36 gen_require(`
33 type security_t; 37 type security_t;
34 ') 38 ')
35 39
@@ -37,7 +41,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
37 # starting in libselinux 2.0.5, init_selinuxmnt() will 41 # starting in libselinux 2.0.5, init_selinuxmnt() will
38 # attempt to short circuit by checking if SELINUXMNT 42 # attempt to short circuit by checking if SELINUXMNT
39 # (/selinux) is already a selinuxfs 43 # (/selinux) is already a selinuxfs
40@@ -117,6 +122,8 @@ interface(`selinux_mount_fs',` 44 dontaudit $1 security_t:filesystem getattr;
45
46@@ -115,10 +120,12 @@ interface(`selinux_dontaudit_get_fs_moun
47 interface(`selinux_mount_fs',`
48 gen_require(`
41 type security_t; 49 type security_t;
42 ') 50 ')
43 51
@@ -46,7 +54,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
46 allow $1 security_t:filesystem mount; 54 allow $1 security_t:filesystem mount;
47 ') 55 ')
48 56
49@@ -136,6 +143,8 @@ interface(`selinux_remount_fs',` 57 ########################################
58 ## <summary>
59@@ -134,10 +141,12 @@ interface(`selinux_mount_fs',`
60 interface(`selinux_remount_fs',`
61 gen_require(`
50 type security_t; 62 type security_t;
51 ') 63 ')
52 64
@@ -55,7 +67,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
55 allow $1 security_t:filesystem remount; 67 allow $1 security_t:filesystem remount;
56 ') 68 ')
57 69
58@@ -154,6 +163,8 @@ interface(`selinux_unmount_fs',` 70 ########################################
71 ## <summary>
72@@ -152,10 +161,12 @@ interface(`selinux_remount_fs',`
73 interface(`selinux_unmount_fs',`
74 gen_require(`
59 type security_t; 75 type security_t;
60 ') 76 ')
61 77
@@ -64,7 +80,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
64 allow $1 security_t:filesystem unmount; 80 allow $1 security_t:filesystem unmount;
65 ') 81 ')
66 82
67@@ -172,6 +183,8 @@ interface(`selinux_getattr_fs',` 83 ########################################
84 ## <summary>
85@@ -170,10 +181,12 @@ interface(`selinux_unmount_fs',`
86 interface(`selinux_getattr_fs',`
87 gen_require(`
68 type security_t; 88 type security_t;
69 ') 89 ')
70 90
@@ -73,7 +93,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
73 allow $1 security_t:filesystem getattr; 93 allow $1 security_t:filesystem getattr;
74 94
75 dev_getattr_sysfs($1) 95 dev_getattr_sysfs($1)
76@@ -194,6 +207,7 @@ interface(`selinux_dontaudit_getattr_fs' 96 dev_search_sysfs($1)
97 ')
98@@ -192,10 +205,11 @@ interface(`selinux_getattr_fs',`
99 interface(`selinux_dontaudit_getattr_fs',`
100 gen_require(`
77 type security_t; 101 type security_t;
78 ') 102 ')
79 103
@@ -81,7 +105,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
81 dontaudit $1 security_t:filesystem getattr; 105 dontaudit $1 security_t:filesystem getattr;
82 106
83 dev_dontaudit_getattr_sysfs($1) 107 dev_dontaudit_getattr_sysfs($1)
84@@ -216,6 +230,7 @@ interface(`selinux_dontaudit_getattr_dir 108 dev_dontaudit_search_sysfs($1)
109 ')
110@@ -214,10 +228,11 @@ interface(`selinux_dontaudit_getattr_fs'
111 interface(`selinux_dontaudit_getattr_dir',`
112 gen_require(`
85 type security_t; 113 type security_t;
86 ') 114 ')
87 115
@@ -89,7 +117,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
89 dontaudit $1 security_t:dir getattr; 117 dontaudit $1 security_t:dir getattr;
90 ') 118 ')
91 119
92@@ -234,6 +249,7 @@ interface(`selinux_search_fs',` 120 ########################################
121 ## <summary>
122@@ -232,10 +247,11 @@ interface(`selinux_dontaudit_getattr_dir
123 interface(`selinux_search_fs',`
124 gen_require(`
93 type security_t; 125 type security_t;
94 ') 126 ')
95 127
@@ -97,7 +129,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
97 dev_search_sysfs($1) 129 dev_search_sysfs($1)
98 allow $1 security_t:dir search_dir_perms; 130 allow $1 security_t:dir search_dir_perms;
99 ') 131 ')
100@@ -253,6 +269,7 @@ interface(`selinux_dontaudit_search_fs', 132
133 ########################################
134@@ -251,10 +267,11 @@ interface(`selinux_search_fs',`
135 interface(`selinux_dontaudit_search_fs',`
136 gen_require(`
101 type security_t; 137 type security_t;
102 ') 138 ')
103 139
@@ -105,7 +141,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
105 dontaudit $1 security_t:dir search_dir_perms; 141 dontaudit $1 security_t:dir search_dir_perms;
106 ') 142 ')
107 143
108@@ -272,6 +289,7 @@ interface(`selinux_dontaudit_read_fs',` 144 ########################################
145 ## <summary>
146@@ -270,10 +287,11 @@ interface(`selinux_dontaudit_search_fs',
147 interface(`selinux_dontaudit_read_fs',`
148 gen_require(`
109 type security_t; 149 type security_t;
110 ') 150 ')
111 151
@@ -113,7 +153,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
113 dontaudit $1 security_t:dir search_dir_perms; 153 dontaudit $1 security_t:dir search_dir_perms;
114 dontaudit $1 security_t:file read_file_perms; 154 dontaudit $1 security_t:file read_file_perms;
115 ') 155 ')
116@@ -293,6 +311,7 @@ interface(`selinux_get_enforce_mode',` 156
157 ########################################
158@@ -291,10 +309,11 @@ interface(`selinux_dontaudit_read_fs',`
159 interface(`selinux_get_enforce_mode',`
160 gen_require(`
117 type security_t; 161 type security_t;
118 ') 162 ')
119 163
@@ -121,7 +165,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
121 dev_search_sysfs($1) 165 dev_search_sysfs($1)
122 allow $1 security_t:dir list_dir_perms; 166 allow $1 security_t:dir list_dir_perms;
123 allow $1 security_t:file read_file_perms; 167 allow $1 security_t:file read_file_perms;
124@@ -361,6 +380,7 @@ interface(`selinux_read_policy',` 168 ')
169
170@@ -359,10 +378,11 @@ interface(`selinux_load_policy',`
171 interface(`selinux_read_policy',`
172 gen_require(`
125 type security_t; 173 type security_t;
126 ') 174 ')
127 175
@@ -129,7 +177,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
129 dev_search_sysfs($1) 177 dev_search_sysfs($1)
130 allow $1 security_t:dir list_dir_perms; 178 allow $1 security_t:dir list_dir_perms;
131 allow $1 security_t:file read_file_perms; 179 allow $1 security_t:file read_file_perms;
132@@ -426,6 +446,7 @@ interface(`selinux_set_generic_booleans' 180 allow $1 security_t:security read_policy;
181 ')
182@@ -424,10 +444,11 @@ interface(`selinux_set_boolean',`
183 interface(`selinux_set_generic_booleans',`
184 gen_require(`
133 type security_t; 185 type security_t;
134 ') 186 ')
135 187
@@ -137,7 +189,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
137 dev_search_sysfs($1) 189 dev_search_sysfs($1)
138 190
139 allow $1 security_t:dir list_dir_perms; 191 allow $1 security_t:dir list_dir_perms;
140@@ -463,6 +484,7 @@ interface(`selinux_set_all_booleans',` 192 allow $1 security_t:file rw_file_perms;
193
194@@ -461,10 +482,11 @@ interface(`selinux_set_all_booleans',`
195 type security_t, secure_mode_policyload_t;
196 attribute boolean_type;
141 bool secure_mode_policyload; 197 bool secure_mode_policyload;
142 ') 198 ')
143 199
@@ -145,7 +201,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
145 dev_search_sysfs($1) 201 dev_search_sysfs($1)
146 202
147 allow $1 security_t:dir list_dir_perms; 203 allow $1 security_t:dir list_dir_perms;
148@@ -522,6 +544,7 @@ interface(`selinux_validate_context',` 204 allow $1 { boolean_type -secure_mode_policyload_t }:file rw_file_perms;
205 allow $1 secure_mode_policyload_t:file read_file_perms;
206@@ -520,10 +542,11 @@ interface(`selinux_set_parameters',`
207 interface(`selinux_validate_context',`
208 gen_require(`
149 type security_t; 209 type security_t;
150 ') 210 ')
151 211
@@ -153,7 +213,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
153 dev_search_sysfs($1) 213 dev_search_sysfs($1)
154 allow $1 security_t:dir list_dir_perms; 214 allow $1 security_t:dir list_dir_perms;
155 allow $1 security_t:file rw_file_perms; 215 allow $1 security_t:file rw_file_perms;
156@@ -544,6 +567,7 @@ interface(`selinux_dontaudit_validate_co 216 allow $1 security_t:security check_context;
217 ')
218@@ -542,10 +565,11 @@ interface(`selinux_validate_context',`
219 interface(`selinux_dontaudit_validate_context',`
220 gen_require(`
157 type security_t; 221 type security_t;
158 ') 222 ')
159 223
@@ -161,7 +225,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
161 dontaudit $1 security_t:dir list_dir_perms; 225 dontaudit $1 security_t:dir list_dir_perms;
162 dontaudit $1 security_t:file rw_file_perms; 226 dontaudit $1 security_t:file rw_file_perms;
163 dontaudit $1 security_t:security check_context; 227 dontaudit $1 security_t:security check_context;
164@@ -565,6 +589,7 @@ interface(`selinux_compute_access_vector 228 ')
229
230@@ -563,10 +587,11 @@ interface(`selinux_dontaudit_validate_co
231 interface(`selinux_compute_access_vector',`
232 gen_require(`
165 type security_t; 233 type security_t;
166 ') 234 ')
167 235
@@ -169,7 +237,11 @@ Index: refpolicy/policy/modules/kernel/selinux.if
169 dev_search_sysfs($1) 237 dev_search_sysfs($1)
170 allow $1 security_t:dir list_dir_perms; 238 allow $1 security_t:dir list_dir_perms;
171 allow $1 security_t:file rw_file_perms; 239 allow $1 security_t:file rw_file_perms;
172@@ -660,6 +685,13 @@ interface(`selinux_compute_user_contexts 240 allow $1 security_t:security compute_av;
241 ')
242@@ -658,10 +683,17 @@ interface(`selinux_compute_relabel_conte
243 interface(`selinux_compute_user_contexts',`
244 gen_require(`
173 type security_t; 245 type security_t;
174 ') 246 ')
175 247
@@ -183,3 +255,5 @@ Index: refpolicy/policy/modules/kernel/selinux.if
183 dev_search_sysfs($1) 255 dev_search_sysfs($1)
184 allow $1 security_t:dir list_dir_perms; 256 allow $1 security_t:dir list_dir_perms;
185 allow $1 security_t:file rw_file_perms; 257 allow $1 security_t:file rw_file_perms;
258 allow $1 security_t:security compute_user;
259 ')
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch
index f04ebec..883daf8 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-nfsd_t-to-mount_nfsd_fs_t.patch
@@ -14,23 +14,11 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
14 policy/modules/kernel/kernel.te | 2 ++ 14 policy/modules/kernel/kernel.te | 2 ++
15 4 files changed, 13 insertions(+) 15 4 files changed, 13 insertions(+)
16 16
17--- a/policy/modules/contrib/rpc.te
18+++ b/policy/modules/contrib/rpc.te
19@@ -263,6 +263,11 @@ tunable_policy(`nfs_export_all_ro',`
20
21 optional_policy(`
22 mount_exec(nfsd_t)
23+ # Should domtrans to mount_t while mounting nfsd_fs_t.
24+ mount_domtrans(nfsd_t)
25+ # nfsd_t need to chdir to /var/lib/nfs and read files.
26+ files_list_var(nfsd_t)
27+ rpc_read_nfs_state_data(nfsd_t)
28 ')
29
30 ########################################
31--- a/policy/modules/contrib/rpcbind.te 17--- a/policy/modules/contrib/rpcbind.te
32+++ b/policy/modules/contrib/rpcbind.te 18+++ b/policy/modules/contrib/rpcbind.te
33@@ -70,6 +70,11 @@ logging_send_syslog_msg(rpcbind_t) 19@@ -71,8 +71,13 @@ auth_use_nsswitch(rpcbind_t)
20
21 logging_send_syslog_msg(rpcbind_t)
34 22
35 miscfiles_read_localization(rpcbind_t) 23 miscfiles_read_localization(rpcbind_t)
36 24
@@ -42,20 +30,44 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
42 ifdef(`distro_debian',` 30 ifdef(`distro_debian',`
43 term_dontaudit_use_unallocated_ttys(rpcbind_t) 31 term_dontaudit_use_unallocated_ttys(rpcbind_t)
44 ') 32 ')
33--- a/policy/modules/contrib/rpc.te
34+++ b/policy/modules/contrib/rpc.te
35@@ -275,10 +275,15 @@ tunable_policy(`nfs_export_all_ro',`
36 files_read_non_auth_files(nfsd_t)
37 ')
38
39 optional_policy(`
40 mount_exec(nfsd_t)
41+ # Should domtrans to mount_t while mounting nfsd_fs_t.
42+ mount_domtrans(nfsd_t)
43+ # nfsd_t need to chdir to /var/lib/nfs and read files.
44+ files_list_var(nfsd_t)
45+ rpc_read_nfs_state_data(nfsd_t)
46 ')
47
48 ########################################
49 #
50 # GSSD local policy
45--- a/policy/modules/kernel/filesystem.te 51--- a/policy/modules/kernel/filesystem.te
46+++ b/policy/modules/kernel/filesystem.te 52+++ b/policy/modules/kernel/filesystem.te
47@@ -119,6 +119,7 @@ genfscon mvfs / gen_context(system_u:obj 53@@ -127,10 +127,11 @@ fs_noxattr_type(mvfs_t)
54 allow mvfs_t self:filesystem associate;
55 genfscon mvfs / gen_context(system_u:object_r:mvfs_t,s0)
48 56
49 type nfsd_fs_t; 57 type nfsd_fs_t;
50 fs_type(nfsd_fs_t) 58 fs_type(nfsd_fs_t)
51+files_mountpoint(nfsd_fs_t) 59+files_mountpoint(nfsd_fs_t)
52 genfscon nfsd / gen_context(system_u:object_r:nfsd_fs_t,s0) 60 genfscon nfsd / gen_context(system_u:object_r:nfsd_fs_t,s0)
53 61
54 type oprofilefs_t; 62 type nsfs_t;
63 fs_type(nsfs_t)
64 genfscon nsfs / gen_context(system_u:object_r:nsfs_t,s0)
55--- a/policy/modules/kernel/kernel.te 65--- a/policy/modules/kernel/kernel.te
56+++ b/policy/modules/kernel/kernel.te 66+++ b/policy/modules/kernel/kernel.te
57@@ -293,6 +293,8 @@ mls_process_read_up(kernel_t) 67@@ -324,10 +324,12 @@ mcs_process_set_categories(kernel_t)
58 mls_process_write_down(kernel_t) 68
69 mls_process_read_all_levels(kernel_t)
70 mls_process_write_all_levels(kernel_t)
59 mls_file_write_all_levels(kernel_t) 71 mls_file_write_all_levels(kernel_t)
60 mls_file_read_all_levels(kernel_t) 72 mls_file_read_all_levels(kernel_t)
61+mls_socket_write_all_levels(kernel_t) 73+mls_socket_write_all_levels(kernel_t)
@@ -63,3 +75,5 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
63 75
64 ifdef(`distro_redhat',` 76 ifdef(`distro_redhat',`
65 # Bugzilla 222337 77 # Bugzilla 222337
78 fs_rw_tmpfs_chr_files(kernel_t)
79 ')
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-setfiles-statvfs-get-file-count.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-setfiles-statvfs-get-file-count.patch
index 0b8cc5d..1cfd80b 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-setfiles-statvfs-get-file-count.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-setfiles-statvfs-get-file-count.patch
@@ -10,15 +10,16 @@ Upstream-Status: pending
10 10
11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 11Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
12Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com> 12Signed-off-by: Shrikant Bobade <Shrikant_Bobade@mentor.com>
13Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
13--- 14---
14 policy/modules/system/selinuxutil.te | 2 +- 15 policy/modules/system/selinuxutil.te | 2 +-
15 1 file changed, 1 insertion(+), 1 deletion(-) 16 1 file changed, 1 insertion(+), 1 deletion(-)
16 17
17diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
18index f998491..1a4e565 100644
19--- a/policy/modules/system/selinuxutil.te 18--- a/policy/modules/system/selinuxutil.te
20+++ b/policy/modules/system/selinuxutil.te 19+++ b/policy/modules/system/selinuxutil.te
21@@ -555,7 +555,7 @@ files_dontaudit_read_all_symlinks(setfiles_t) 20@@ -556,11 +556,11 @@ files_read_usr_symlinks(setfiles_t)
21 files_dontaudit_read_all_symlinks(setfiles_t)
22
22 # needs to be able to read symlinks to make restorecon on symlink working 23 # needs to be able to read symlinks to make restorecon on symlink working
23 files_read_all_symlinks(setfiles_t) 24 files_read_all_symlinks(setfiles_t)
24 25
@@ -27,6 +28,5 @@ index f998491..1a4e565 100644
27 fs_list_all(setfiles_t) 28 fs_list_all(setfiles_t)
28 fs_search_auto_mountpoints(setfiles_t) 29 fs_search_auto_mountpoints(setfiles_t)
29 fs_relabelfrom_noxattr_fs(setfiles_t) 30 fs_relabelfrom_noxattr_fs(setfiles_t)
30-- 31
311.7.9.5 32 mls_file_read_all_levels(setfiles_t)
32
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-seutils-manage-config-files.patch b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-seutils-manage-config-files.patch
index be33bf1..fba7759 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/poky-policy-fix-seutils-manage-config-files.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/poky-policy-fix-seutils-manage-config-files.patch
@@ -6,16 +6,17 @@ Subject: [PATCH 2/2] refpolicy: fix selinux utils to manage config files
6Upstream-Status: Pending 6Upstream-Status: Pending
7 7
8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> 8Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/system/selinuxutil.if | 1 + 11 policy/modules/system/selinuxutil.if | 1 +
11 policy/modules/system/userdomain.if | 4 ++++ 12 policy/modules/system/userdomain.if | 4 ++++
12 2 files changed, 5 insertions(+) 13 2 files changed, 5 insertions(+)
13 14
14diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
15index 3822072..db03ca1 100644
16--- a/policy/modules/system/selinuxutil.if 15--- a/policy/modules/system/selinuxutil.if
17+++ b/policy/modules/system/selinuxutil.if 16+++ b/policy/modules/system/selinuxutil.if
18@@ -680,6 +680,7 @@ interface(`seutil_manage_config',` 17@@ -753,10 +753,11 @@ interface(`seutil_manage_config',`
18 gen_require(`
19 type selinux_config_t;
19 ') 20 ')
20 21
21 files_search_etc($1) 22 files_search_etc($1)
@@ -23,11 +24,13 @@ index 3822072..db03ca1 100644
23 manage_files_pattern($1, selinux_config_t, selinux_config_t) 24 manage_files_pattern($1, selinux_config_t, selinux_config_t)
24 read_lnk_files_pattern($1, selinux_config_t, selinux_config_t) 25 read_lnk_files_pattern($1, selinux_config_t, selinux_config_t)
25 ') 26 ')
26diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if 27
27index b4a691d..20c8bf8 100644 28 #######################################
28--- a/policy/modules/system/userdomain.if 29--- a/policy/modules/system/userdomain.if
29+++ b/policy/modules/system/userdomain.if 30+++ b/policy/modules/system/userdomain.if
30@@ -1277,6 +1277,10 @@ template(`userdom_security_admin_template',` 31@@ -1327,10 +1327,14 @@ template(`userdom_security_admin_templat
32 logging_read_audit_log($1)
33 logging_read_generic_logs($1)
31 logging_read_audit_config($1) 34 logging_read_audit_config($1)
32 35
33 seutil_manage_bin_policy($1) 36 seutil_manage_bin_policy($1)
@@ -38,6 +41,5 @@ index b4a691d..20c8bf8 100644
38 seutil_run_checkpolicy($1, $2) 41 seutil_run_checkpolicy($1, $2)
39 seutil_run_loadpolicy($1, $2) 42 seutil_run_loadpolicy($1, $2)
40 seutil_run_semanage($1, $2) 43 seutil_run_semanage($1, $2)
41-- 44 seutil_run_setfiles($1, $2)
421.7.9.5 45
43
diff --git a/recipes-security/refpolicy/refpolicy-2.20151208/refpolicy-update-for_systemd.patch b/recipes-security/refpolicy/refpolicy-2.20170204/refpolicy-update-for_systemd.patch
index 2ae4185..41b9c2b 100644
--- a/recipes-security/refpolicy/refpolicy-2.20151208/refpolicy-update-for_systemd.patch
+++ b/recipes-security/refpolicy/refpolicy-2.20170204/refpolicy-update-for_systemd.patch
@@ -6,15 +6,16 @@ Subject: [PATCH] refpolicy: update for systemd related allow rules
6It provide, the systemd support related allow rules 6It provide, the systemd support related allow rules
7 7
8Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com> 8Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com>
9Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
9--- 10---
10 policy/modules/system/init.te | 5 +++++ 11 policy/modules/system/init.te | 5 +++++
11 1 file changed, 5 insertions(+) 12 1 file changed, 5 insertions(+)
12 13
13diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
14index c8f007d..a9675f6 100644
15--- a/policy/modules/system/init.te 14--- a/policy/modules/system/init.te
16+++ b/policy/modules/system/init.te 15+++ b/policy/modules/system/init.te
17@@ -929,3 +929,8 @@ optional_policy(` 16@@ -1105,5 +1105,10 @@ optional_policy(`
17 ')
18
18 optional_policy(` 19 optional_policy(`
19 zebra_read_config(initrc_t) 20 zebra_read_config(initrc_t)
20 ') 21 ')
@@ -24,6 +25,3 @@ index c8f007d..a9675f6 100644
24+allow devpts_t device_t:filesystem associate; 25+allow devpts_t device_t:filesystem associate;
25+allow init_t self:capability2 block_suspend; 26+allow init_t self:capability2 block_suspend;
26\ No newline at end of file 27\ No newline at end of file
27--
281.7.9.5
29
diff --git a/recipes-security/refpolicy/refpolicy-mcs_2.20151208.bb b/recipes-security/refpolicy/refpolicy-mcs_2.20170204.bb
index 062727b..062727b 100644
--- a/recipes-security/refpolicy/refpolicy-mcs_2.20151208.bb
+++ b/recipes-security/refpolicy/refpolicy-mcs_2.20170204.bb
diff --git a/recipes-security/refpolicy/refpolicy-minimum_2.20151208.bb b/recipes-security/refpolicy/refpolicy-minimum_2.20170204.bb
index da6626e..da6626e 100644
--- a/recipes-security/refpolicy/refpolicy-minimum_2.20151208.bb
+++ b/recipes-security/refpolicy/refpolicy-minimum_2.20170204.bb
diff --git a/recipes-security/refpolicy/refpolicy-mls_2.20151208.bb b/recipes-security/refpolicy/refpolicy-mls_2.20170204.bb
index 7388232..7388232 100644
--- a/recipes-security/refpolicy/refpolicy-mls_2.20151208.bb
+++ b/recipes-security/refpolicy/refpolicy-mls_2.20170204.bb
diff --git a/recipes-security/refpolicy/refpolicy-standard_2.20151208.bb b/recipes-security/refpolicy/refpolicy-standard_2.20170204.bb
index 3674fdd..3674fdd 100644
--- a/recipes-security/refpolicy/refpolicy-standard_2.20151208.bb
+++ b/recipes-security/refpolicy/refpolicy-standard_2.20170204.bb
diff --git a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch
index b33e84b..3a8a95e 100644
--- a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch
+++ b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-fix-optional-issue-on-sysadm-module.patch
@@ -19,10 +19,10 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
19 19
20--- a/policy/modules/system/init.te 20--- a/policy/modules/system/init.te
21+++ b/policy/modules/system/init.te 21+++ b/policy/modules/system/init.te
22@@ -344,17 +344,19 @@ ifdef(`init_systemd',` 22@@ -300,16 +300,18 @@ ifdef(`init_systemd',`
23 23
24 optional_policy(` 24 optional_policy(`
25 modutils_domtrans(init_t) 25 modutils_domtrans_insmod(init_t)
26 ') 26 ')
27 ',` 27 ',`
28- tunable_policy(`init_upstart',` 28- tunable_policy(`init_upstart',`
@@ -30,25 +30,32 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
30- ',` 30- ',`
31- # Run the shell in the sysadm role for single-user mode. 31- # Run the shell in the sysadm role for single-user mode.
32- # causes problems with upstart 32- # causes problems with upstart
33- ifndef(`distro_debian',` 33- sysadm_shell_domtrans(init_t)
34- sysadm_shell_domtrans(init_t)
35+ optional_policy(` 34+ optional_policy(`
36+ tunable_policy(`init_upstart',` 35+ tunable_policy(`init_upstart',`
37+ corecmd_shell_domtrans(init_t, initrc_t) 36+ corecmd_shell_domtrans(init_t, initrc_t)
38+ ',` 37+ ',`
39+ # Run the shell in the sysadm role for single-user mode. 38+ # Run the shell in the sysadm role for single-user mode.
40+ # causes problems with upstart 39+ # causes problems with upstart
41+ ifndef(`distro_debian',` 40+ sysadm_shell_domtrans(init_t)
42+ sysadm_shell_domtrans(init_t) 41+ ')
43+ ')
44 ')
45 ') 42 ')
46 ') 43 ')
47 44
48 ifdef(`distro_debian',` 45 ifdef(`distro_debian',`
46 fs_tmpfs_filetrans(init_t, initctl_t, fifo_file, "initctl")
47@@ -1109,6 +1111,6 @@ optional_policy(`
48 ')
49
50 # systemd related allow rules
51 allow kernel_t init_t:process dyntransition;
52 allow devpts_t device_t:filesystem associate;
53-allow init_t self:capability2 block_suspend;
54\ No newline at end of file
55+allow init_t self:capability2 block_suspend;
49--- a/policy/modules/system/locallogin.te 56--- a/policy/modules/system/locallogin.te
50+++ b/policy/modules/system/locallogin.te 57+++ b/policy/modules/system/locallogin.te
51@@ -260,11 +260,13 @@ seutil_read_default_contexts(sulogin_t) 58@@ -244,11 +244,13 @@ seutil_read_default_contexts(sulogin_t)
52 userdom_use_unpriv_users_fds(sulogin_t) 59 userdom_use_unpriv_users_fds(sulogin_t)
53 60
54 userdom_search_user_home_dirs(sulogin_t) 61 userdom_search_user_home_dirs(sulogin_t)
@@ -59,7 +66,7 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
59+ sysadm_shell_domtrans(sulogin_t) 66+ sysadm_shell_domtrans(sulogin_t)
60+') 67+')
61 68
62 # by default, sulogin does not use pam... 69 # suse and debian do not use pam with sulogin...
63 # sulogin_pam might need to be defined otherwise 70 ifdef(`distro_suse', `define(`sulogin_no_pam')')
64 ifdef(`sulogin_pam', ` 71 ifdef(`distro_debian', `define(`sulogin_no_pam')')
65 selinux_get_fs_mount(sulogin_t) 72
diff --git a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch
index 17a8199..1dc9911 100644
--- a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch
+++ b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-remove-duplicate-type_transition.patch
@@ -25,7 +25,7 @@ Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
25 25
26--- a/policy/modules/system/init.if 26--- a/policy/modules/system/init.if
27+++ b/policy/modules/system/init.if 27+++ b/policy/modules/system/init.if
28@@ -1430,16 +1430,16 @@ interface(`init_spec_domtrans_script',` 28@@ -1268,16 +1268,16 @@ interface(`init_spec_domtrans_script',`
29 ## </summary> 29 ## </summary>
30 ## </param> 30 ## </param>
31 # 31 #
diff --git a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch
index 29d3e2d..f28ab74 100644
--- a/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch
+++ b/recipes-security/refpolicy/refpolicy-targeted/refpolicy-unconfined_u-default-user.patch
@@ -30,21 +30,21 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
30+ 30+
31--- a/policy/modules/roles/sysadm.te 31--- a/policy/modules/roles/sysadm.te
32+++ b/policy/modules/roles/sysadm.te 32+++ b/policy/modules/roles/sysadm.te
33@@ -37,10 +37,11 @@ ubac_process_exempt(sysadm_t) 33@@ -41,10 +41,11 @@ init_reload(sysadm_t)
34 ubac_file_exempt(sysadm_t) 34 init_reboot_system(sysadm_t)
35 ubac_fd_exempt(sysadm_t) 35 init_shutdown_system(sysadm_t)
36 36 init_start_generic_units(sysadm_t)
37 init_exec(sysadm_t) 37 init_stop_generic_units(sysadm_t)
38 init_admin(sysadm_t) 38 init_reload_generic_units(sysadm_t)
39+init_script_role_transition(sysadm_r) 39+init_script_role_transition(sysadm_r)
40 40
41 selinux_read_policy(sysadm_t)
42
43 # Add/remove user home directories 41 # Add/remove user home directories
44 userdom_manage_user_home_dirs(sysadm_t) 42 userdom_manage_user_home_dirs(sysadm_t)
43 userdom_home_filetrans_user_home_dir(sysadm_t)
44
45--- a/policy/modules/system/init.if 45--- a/policy/modules/system/init.if
46+++ b/policy/modules/system/init.if 46+++ b/policy/modules/system/init.if
47@@ -1394,30 +1394,31 @@ interface(`init_script_file_entry_type', 47@@ -1232,30 +1232,31 @@ interface(`init_script_file_entry_type',
48 ## </summary> 48 ## </summary>
49 ## </param> 49 ## </param>
50 # 50 #
@@ -80,7 +80,7 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
80 80
81 ######################################## 81 ########################################
82 ## <summary> 82 ## <summary>
83@@ -1429,22 +1430,23 @@ interface(`init_spec_domtrans_script',` 83@@ -1267,22 +1268,23 @@ interface(`init_spec_domtrans_script',`
84 ## </summary> 84 ## </summary>
85 ## </param> 85 ## </param>
86 # 86 #
@@ -108,11 +108,11 @@ Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
108 108
109 ######################################## 109 ########################################
110 ## <summary> 110 ## <summary>
111@@ -2972,5 +2974,34 @@ interface(`init_admin',` 111@@ -2502,5 +2504,34 @@ interface(`init_reload_all_units',`
112 init_stop_all_units($1) 112 class service reload;
113 init_stop_generic_units($1) 113 ')
114 init_stop_system($1) 114
115 init_telinit($1) 115 allow $1 systemdunit:service reload;
116 ') 116 ')
117+ 117+
118+######################################## 118+########################################
diff --git a/recipes-security/refpolicy/refpolicy-targeted_2.20151208.bb b/recipes-security/refpolicy/refpolicy-targeted_2.20170204.bb
index f795bf7..f795bf7 100644
--- a/recipes-security/refpolicy/refpolicy-targeted_2.20151208.bb
+++ b/recipes-security/refpolicy/refpolicy-targeted_2.20170204.bb
diff --git a/recipes-security/refpolicy/refpolicy_2.20151208.inc b/recipes-security/refpolicy/refpolicy_2.20170204.inc
index ce90b13..48e6cd6 100644
--- a/recipes-security/refpolicy/refpolicy_2.20151208.inc
+++ b/recipes-security/refpolicy/refpolicy_2.20170204.inc
@@ -1,8 +1,8 @@
1SRC_URI = "https://raw.githubusercontent.com/wiki/TresysTechnology/refpolicy/files/refpolicy-${PV}.tar.bz2;" 1SRC_URI = "https://raw.githubusercontent.com/wiki/TresysTechnology/refpolicy/files/refpolicy-${PV}.tar.bz2;"
2SRC_URI[md5sum] = "7b1ca12e9ea0254508391559cb8f2c41" 2SRC_URI[md5sum] = "76a7a455289c9216ee0fbb8de71c9799"
3SRC_URI[sha256sum] = "2dd2f45a7132137afe8302805c3b7839739759b9ab73dd1815c01afe34ac99de" 3SRC_URI[sha256sum] = "5e4daee61d89dfdc8c7bf369f81c99845931e337916dc6401e301c5de57ea336"
4 4
5FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy-2.20151208:" 5FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy-2.20170204:"
6 6
7# Fix file contexts for Poky 7# Fix file contexts for Poky
8SRC_URI += "file://poky-fc-subs_dist.patch \ 8SRC_URI += "file://poky-fc-subs_dist.patch \
@@ -14,16 +14,13 @@ SRC_URI += "file://poky-fc-subs_dist.patch \
14 file://poky-fc-fix-real-path_shadow.patch \ 14 file://poky-fc-fix-real-path_shadow.patch \
15 file://poky-fc-fix-bind.patch \ 15 file://poky-fc-fix-bind.patch \
16 file://poky-fc-clock.patch \ 16 file://poky-fc-clock.patch \
17 file://poky-fc-corecommands.patch \
18 file://poky-fc-dmesg.patch \ 17 file://poky-fc-dmesg.patch \
19 file://poky-fc-fstools.patch \ 18 file://poky-fc-fstools.patch \
20 file://poky-fc-iptables.patch \
21 file://poky-fc-mta.patch \ 19 file://poky-fc-mta.patch \
22 file://poky-fc-netutils.patch \ 20 file://poky-fc-netutils.patch \
23 file://poky-fc-nscd.patch \ 21 file://poky-fc-nscd.patch \
24 file://poky-fc-screen.patch \ 22 file://poky-fc-screen.patch \
25 file://poky-fc-ssh.patch \ 23 file://poky-fc-ssh.patch \
26 file://poky-fc-su.patch \
27 file://poky-fc-sysnetwork.patch \ 24 file://poky-fc-sysnetwork.patch \
28 file://poky-fc-udevd.patch \ 25 file://poky-fc-udevd.patch \
29 file://poky-fc-rpm.patch \ 26 file://poky-fc-rpm.patch \