diff options
-rw-r--r-- | recipes-security/refpolicy/refpolicy-minimum_git.bb | 1 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-make-xdg-module-optional.patch | 40 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0040-policy-modules-system-logging-grant-getpcap-capabili.patch (renamed from recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch) | 0 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0040-policy-modules-system-systemd-allow-systemd-logind-t.patch | 38 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy_common.inc | 3 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy_git.inc | 2 |
6 files changed, 2 insertions, 82 deletions
diff --git a/recipes-security/refpolicy/refpolicy-minimum_git.bb b/recipes-security/refpolicy/refpolicy-minimum_git.bb index 67c3785..562ccac 100644 --- a/recipes-security/refpolicy/refpolicy-minimum_git.bb +++ b/recipes-security/refpolicy/refpolicy-minimum_git.bb | |||
@@ -13,7 +13,6 @@ domains are unconfined. \ | |||
13 | 13 | ||
14 | SRC_URI += " \ | 14 | SRC_URI += " \ |
15 | file://0001-refpolicy-minimum-make-sysadmin-module-optional.patch \ | 15 | file://0001-refpolicy-minimum-make-sysadmin-module-optional.patch \ |
16 | file://0002-refpolicy-minimum-make-xdg-module-optional.patch \ | ||
17 | " | 16 | " |
18 | 17 | ||
19 | POLICY_NAME = "minimum" | 18 | POLICY_NAME = "minimum" |
diff --git a/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-make-xdg-module-optional.patch b/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-make-xdg-module-optional.patch deleted file mode 100644 index cc8c0b7..0000000 --- a/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-make-xdg-module-optional.patch +++ /dev/null | |||
@@ -1,40 +0,0 @@ | |||
1 | From 39b825d24a34864c3d9bae684b083a9b656f641a Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Wed, 29 Sep 2021 11:08:49 +0800 | ||
4 | Subject: [PATCH] refpolicy-minimum: make xdg module optional | ||
5 | |||
6 | The systemd module invokes xdg_config_content and xdg_data_content | ||
7 | interfaces which are from xdg module. Since xdg is not a core module, we | ||
8 | could make it optional in minimum policy. | ||
9 | |||
10 | Upstream-Status: Inappropriate [embedded specific] | ||
11 | |||
12 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
13 | --- | ||
14 | policy/modules/system/systemd.te | 8 ++++++-- | ||
15 | 1 file changed, 6 insertions(+), 2 deletions(-) | ||
16 | |||
17 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
18 | index a0e6bb405..b1fc414ea 100644 | ||
19 | --- a/policy/modules/system/systemd.te | ||
20 | +++ b/policy/modules/system/systemd.te | ||
21 | @@ -313,10 +313,14 @@ init_unit_file(systemd_user_manager_unit_t) | ||
22 | |||
23 | type systemd_conf_home_t; | ||
24 | init_unit_file(systemd_conf_home_t) | ||
25 | -xdg_config_content(systemd_conf_home_t) | ||
26 | +optional_policy(` | ||
27 | + xdg_config_content(systemd_conf_home_t) | ||
28 | +') | ||
29 | |||
30 | type systemd_data_home_t; | ||
31 | -xdg_data_content(systemd_data_home_t) | ||
32 | +optional_policy(` | ||
33 | + xdg_data_content(systemd_data_home_t) | ||
34 | +') | ||
35 | |||
36 | type systemd_user_runtime_notify_t; | ||
37 | userdom_user_runtime_content(systemd_user_runtime_notify_t) | ||
38 | -- | ||
39 | 2.25.1 | ||
40 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch b/recipes-security/refpolicy/refpolicy/0040-policy-modules-system-logging-grant-getpcap-capabili.patch index 5c2e789..5c2e789 100644 --- a/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-grant-getpcap-capabili.patch +++ b/recipes-security/refpolicy/refpolicy/0040-policy-modules-system-logging-grant-getpcap-capabili.patch | |||
diff --git a/recipes-security/refpolicy/refpolicy/0040-policy-modules-system-systemd-allow-systemd-logind-t.patch b/recipes-security/refpolicy/refpolicy/0040-policy-modules-system-systemd-allow-systemd-logind-t.patch deleted file mode 100644 index 4322590..0000000 --- a/recipes-security/refpolicy/refpolicy/0040-policy-modules-system-systemd-allow-systemd-logind-t.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From 1b8a639bfdce84c9b39cd9e89b6da4c1d06cc7ab Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Sun, 4 Feb 2024 19:40:32 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/systemd: allow systemd-logind to | ||
5 | inherit local login file descriptors | ||
6 | |||
7 | Fix reboot timeout error: | ||
8 | $ reboot | ||
9 | Failed to set wall message, ignoring: Failed to activate service 'org.freedesktop.login1': timed out (service_start_timeout=25000ms) | ||
10 | Call to Reboot failed: Failed to activate service 'org.freedesktop.login1': timed out (service_start_timeout=25000ms) | ||
11 | |||
12 | avc: denied { use } for pid=287 comm="systemd-logind" | ||
13 | path="anon_inode:[pidfd]" dev="anon_inodefs" ino=1044 | ||
14 | scontext=system_u:system_r:systemd_logind_t | ||
15 | tcontext=system_u:system_r:local_login_t tclass=fd permissive=0 | ||
16 | |||
17 | Upstream-Status: Pending | ||
18 | |||
19 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
20 | --- | ||
21 | policy/modules/system/systemd.te | 1 + | ||
22 | 1 file changed, 1 insertion(+) | ||
23 | |||
24 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
25 | index ffce3c0e8..03aeb8515 100644 | ||
26 | --- a/policy/modules/system/systemd.te | ||
27 | +++ b/policy/modules/system/systemd.te | ||
28 | @@ -973,6 +973,7 @@ init_stop_system(systemd_logind_t) | ||
29 | miscfiles_read_localization(systemd_logind_t) | ||
30 | |||
31 | locallogin_read_state(systemd_logind_t) | ||
32 | +locallogin_use_fds(systemd_logind_t) | ||
33 | |||
34 | seutil_libselinux_linked(systemd_logind_t) | ||
35 | seutil_read_default_contexts(systemd_logind_t) | ||
36 | -- | ||
37 | 2.25.1 | ||
38 | |||
diff --git a/recipes-security/refpolicy/refpolicy_common.inc b/recipes-security/refpolicy/refpolicy_common.inc index 05dca2c..7b45882 100644 --- a/recipes-security/refpolicy/refpolicy_common.inc +++ b/recipes-security/refpolicy/refpolicy_common.inc | |||
@@ -55,7 +55,7 @@ SRC_URI += " \ | |||
55 | file://0037-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch \ | 55 | file://0037-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch \ |
56 | file://0038-policy-modules-system-systemd-systemd-user-fixes.patch \ | 56 | file://0038-policy-modules-system-systemd-systemd-user-fixes.patch \ |
57 | file://0039-policy-modules-system-authlogin-fix-login-errors-aft.patch \ | 57 | file://0039-policy-modules-system-authlogin-fix-login-errors-aft.patch \ |
58 | file://0040-policy-modules-system-systemd-allow-systemd-logind-t.patch \ | 58 | file://0040-policy-modules-system-logging-grant-getpcap-capabili.patch \ |
59 | file://0041-policy-modules-system-mount-make-mount_t-domain-MLS-.patch \ | 59 | file://0041-policy-modules-system-mount-make-mount_t-domain-MLS-.patch \ |
60 | file://0042-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch \ | 60 | file://0042-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch \ |
61 | file://0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch \ | 61 | file://0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch \ |
@@ -72,7 +72,6 @@ SRC_URI += " \ | |||
72 | file://0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch \ | 72 | file://0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch \ |
73 | file://0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch \ | 73 | file://0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch \ |
74 | file://0056-policy-modules-system-logging-make-syslogd_runtime_t.patch \ | 74 | file://0056-policy-modules-system-logging-make-syslogd_runtime_t.patch \ |
75 | file://0057-policy-modules-system-logging-grant-getpcap-capabili.patch \ | ||
76 | " | 75 | " |
77 | 76 | ||
78 | S = "${WORKDIR}/refpolicy" | 77 | S = "${WORKDIR}/refpolicy" |
diff --git a/recipes-security/refpolicy/refpolicy_git.inc b/recipes-security/refpolicy/refpolicy_git.inc index ee69664..80d92ac 100644 --- a/recipes-security/refpolicy/refpolicy_git.inc +++ b/recipes-security/refpolicy/refpolicy_git.inc | |||
@@ -2,7 +2,7 @@ PV = "2.20240226+git" | |||
2 | 2 | ||
3 | SRC_URI = "git://github.com/SELinuxProject/refpolicy.git;protocol=https;branch=main;name=refpolicy;destsuffix=refpolicy" | 3 | SRC_URI = "git://github.com/SELinuxProject/refpolicy.git;protocol=https;branch=main;name=refpolicy;destsuffix=refpolicy" |
4 | 4 | ||
5 | SRCREV_refpolicy ?= "c920fc5d9e626874b9af8693e5aa697200f76a12" | 5 | SRCREV_refpolicy ?= "71f4bd1992e05bcd79dc5234f8a30deeb141aa3d" |
6 | 6 | ||
7 | UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" | 7 | UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" |
8 | 8 | ||