diff options
67 files changed, 461 insertions, 243 deletions
diff --git a/recipes-security/refpolicy/refpolicy-minimum_git.bb b/recipes-security/refpolicy/refpolicy-minimum_git.bb index 233c851..8e44bfc 100644 --- a/recipes-security/refpolicy/refpolicy-minimum_git.bb +++ b/recipes-security/refpolicy/refpolicy-minimum_git.bb | |||
@@ -13,7 +13,7 @@ domains are unconfined. \ | |||
13 | 13 | ||
14 | SRC_URI += " \ | 14 | SRC_URI += " \ |
15 | file://0001-refpolicy-minimum-make-sysadmin-module-optional.patch \ | 15 | file://0001-refpolicy-minimum-make-sysadmin-module-optional.patch \ |
16 | file://0002-refpolicy-minimum-enable-nscd_use_shm.patch \ | 16 | file://0002-refpolicy-minimum-allow-systemd-networkd-to-accept-a.patch \ |
17 | " | 17 | " |
18 | 18 | ||
19 | POLICY_NAME = "minimum" | 19 | POLICY_NAME = "minimum" |
@@ -33,9 +33,10 @@ CORE_POLICY_MODULES = "unconfined \ | |||
33 | getty \ | 33 | getty \ |
34 | authlogin \ | 34 | authlogin \ |
35 | locallogin \ | 35 | locallogin \ |
36 | dbus \ | ||
36 | " | 37 | " |
37 | # systemd dependent policy modules | 38 | # systemd dependent policy modules |
38 | CORE_POLICY_MODULES += "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'clock systemd udev fstools dbus', '', d)}" | 39 | CORE_POLICY_MODULES += "${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'clock systemd udev fstools', '', d)}" |
39 | 40 | ||
40 | # nscd caches libc-issued requests to the name service. | 41 | # nscd caches libc-issued requests to the name service. |
41 | # Without nscd.pp, commands want to use these caches will be blocked. | 42 | # Without nscd.pp, commands want to use these caches will be blocked. |
diff --git a/recipes-security/refpolicy/refpolicy-targeted_git.bb b/recipes-security/refpolicy/refpolicy-targeted_git.bb index de81d46..321407d 100644 --- a/recipes-security/refpolicy/refpolicy-targeted_git.bb +++ b/recipes-security/refpolicy/refpolicy-targeted_git.bb | |||
@@ -13,5 +13,6 @@ POLICY_MLS_SENS = "0" | |||
13 | include refpolicy_${PV}.inc | 13 | include refpolicy_${PV}.inc |
14 | 14 | ||
15 | SRC_URI += " \ | 15 | SRC_URI += " \ |
16 | file://0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch \ | 16 | file://0001-refpolicy-targeted-Revert-users-Move-unconfined_u-definition-to-unconfi.patch \ |
17 | file://0002-refpolicy-targeted-make-unconfined_u-the-default-sel.patch \ | ||
17 | " | 18 | " |
diff --git a/recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch b/recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch index 45686b2..87febdc 100644 --- a/recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch +++ b/recipes-security/refpolicy/refpolicy/0001-fc-subs-volatile-alias-common-var-volatile-paths.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 2627c403bb84d710a2469e501e6a0ccf5c7fb438 Mon Sep 17 00:00:00 2001 | 1 | From c36ccb73201949df2e4e01dc12e36c77bc42e099 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Thu, 28 Mar 2019 16:14:09 -0400 | 3 | Date: Thu, 28 Mar 2019 16:14:09 -0400 |
4 | Subject: [PATCH] fc/subs/volatile: alias common /var/volatile paths | 4 | Subject: [PATCH] fc/subs/volatile: alias common /var/volatile paths |
diff --git a/recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch b/recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch index 73e6b48..b0c0556 100644 --- a/recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch +++ b/recipes-security/refpolicy/refpolicy/0001-refpolicy-minimum-make-sysadmin-module-optional.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 923dec0f0231024680bb6f7d48ff7edf82ed8082 Mon Sep 17 00:00:00 2001 | 1 | From 4a5d6d9b7c317a2b819ef9a0ebce2e913ad42be9 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Fri, 5 Apr 2019 11:53:28 -0400 | 3 | Date: Fri, 5 Apr 2019 11:53:28 -0400 |
4 | Subject: [PATCH] refpolicy-minimum: make sysadmin module optional | 4 | Subject: [PATCH] refpolicy-minimum: make sysadmin module optional |
@@ -22,10 +22,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
22 | 2 files changed, 11 insertions(+), 7 deletions(-) | 22 | 2 files changed, 11 insertions(+), 7 deletions(-) |
23 | 23 | ||
24 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te | 24 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te |
25 | index 8af34aa7e..fdd64fb5b 100644 | 25 | index 7df44cead..65146974b 100644 |
26 | --- a/policy/modules/system/init.te | 26 | --- a/policy/modules/system/init.te |
27 | +++ b/policy/modules/system/init.te | 27 | +++ b/policy/modules/system/init.te |
28 | @@ -653,13 +653,15 @@ ifdef(`init_systemd',` | 28 | @@ -648,13 +648,15 @@ ifdef(`init_systemd',` |
29 | unconfined_write_keys(init_t) | 29 | unconfined_write_keys(init_t) |
30 | ') | 30 | ') |
31 | ',` | 31 | ',` |
@@ -48,10 +48,10 @@ index 8af34aa7e..fdd64fb5b 100644 | |||
48 | ') | 48 | ') |
49 | ') | 49 | ') |
50 | diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te | 50 | diff --git a/policy/modules/system/locallogin.te b/policy/modules/system/locallogin.te |
51 | index 4ba131d29..9c4b0a1d8 100644 | 51 | index f96092070..db28ce41c 100644 |
52 | --- a/policy/modules/system/locallogin.te | 52 | --- a/policy/modules/system/locallogin.te |
53 | +++ b/policy/modules/system/locallogin.te | 53 | +++ b/policy/modules/system/locallogin.te |
54 | @@ -277,7 +277,9 @@ userdom_use_unpriv_users_fds(sulogin_t) | 54 | @@ -279,7 +279,9 @@ userdom_use_unpriv_users_fds(sulogin_t) |
55 | userdom_search_user_home_dirs(sulogin_t) | 55 | userdom_search_user_home_dirs(sulogin_t) |
56 | userdom_use_user_ptys(sulogin_t) | 56 | userdom_use_user_ptys(sulogin_t) |
57 | 57 | ||
diff --git a/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-Revert-users-Move-unconfined_u-definition-to-unconfi.patch b/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-Revert-users-Move-unconfined_u-definition-to-unconfi.patch new file mode 100644 index 0000000..6907b19 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-Revert-users-Move-unconfined_u-definition-to-unconfi.patch | |||
@@ -0,0 +1,83 @@ | |||
1 | From b14a64cd3a83e0c3741446cb5bca4773f7db5e6d Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Wed, 19 Feb 2025 21:35:02 +0800 | ||
4 | Subject: [PATCH] Revert "users: Move unconfined_u definition to unconfined | ||
5 | module." | ||
6 | |||
7 | This reverts commit ca3698d543c22dbc78c4c491133405754a9f8a3f. | ||
8 | |||
9 | Fix build error for targeted policy. | ||
10 | |||
11 | Upstream-Status: Inappropriate [embedded specific] | ||
12 | |||
13 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
14 | --- | ||
15 | policy/modules/kernel/kernel.te | 3 +++ | ||
16 | policy/modules/system/unconfined.te | 14 -------------- | ||
17 | policy/users | 7 +++++++ | ||
18 | 3 files changed, 10 insertions(+), 14 deletions(-) | ||
19 | |||
20 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te | ||
21 | index 987709345..2dc5c3895 100644 | ||
22 | --- a/policy/modules/kernel/kernel.te | ||
23 | +++ b/policy/modules/kernel/kernel.te | ||
24 | @@ -33,6 +33,9 @@ role sysadm_r; | ||
25 | role staff_r; | ||
26 | role user_r; | ||
27 | |||
28 | +# here until order dependence is fixed: | ||
29 | +role unconfined_r; | ||
30 | + | ||
31 | ifdef(`enable_mls',` | ||
32 | role secadm_r; | ||
33 | role auditadm_r; | ||
34 | diff --git a/policy/modules/system/unconfined.te b/policy/modules/system/unconfined.te | ||
35 | index 6dc1d9484..68b78ff24 100644 | ||
36 | --- a/policy/modules/system/unconfined.te | ||
37 | +++ b/policy/modules/system/unconfined.te | ||
38 | @@ -8,9 +8,6 @@ policy_module(unconfined) | ||
39 | # usage in this module of types created by these | ||
40 | # calls is not correct, however we dont currently | ||
41 | # have another method to add access to these types | ||
42 | - | ||
43 | -role unconfined_r; | ||
44 | - | ||
45 | userdom_base_user_template(unconfined) | ||
46 | userdom_manage_home_role(unconfined_r, unconfined_t) | ||
47 | userdom_manage_tmp_role(unconfined_r, unconfined_t) | ||
48 | @@ -253,14 +250,3 @@ unconfined_domain_noaudit(unconfined_execmem_t) | ||
49 | optional_policy(` | ||
50 | unconfined_dbus_chat(unconfined_execmem_t) | ||
51 | ') | ||
52 | - | ||
53 | -######################################## | ||
54 | -# | ||
55 | -# Unconfined seuser | ||
56 | -# | ||
57 | - | ||
58 | -ifdef(`direct_sysadm_daemon',` | ||
59 | - gen_user(unconfined_u, unconfined, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats) | ||
60 | -',` | ||
61 | - gen_user(unconfined_u, unconfined, unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats) | ||
62 | -') | ||
63 | diff --git a/policy/users b/policy/users | ||
64 | index 25402afd8..ca203758c 100644 | ||
65 | --- a/policy/users | ||
66 | +++ b/policy/users | ||
67 | @@ -28,6 +28,13 @@ gen_user(user_u, user, user_r, s0, s0) | ||
68 | gen_user(staff_u, staff, staff_r sysadm_r ifdef(`enable_mls',`secadm_r auditadm_r'), s0, s0 - mls_systemhigh, mcs_allcats) | ||
69 | gen_user(sysadm_u, sysadm, sysadm_r, s0, s0 - mls_systemhigh, mcs_allcats) | ||
70 | |||
71 | +# Until order dependence is fixed for users: | ||
72 | +ifdef(`direct_sysadm_daemon',` | ||
73 | + gen_user(unconfined_u, unconfined, unconfined_r system_r, s0, s0 - mls_systemhigh, mcs_allcats) | ||
74 | +',` | ||
75 | + gen_user(unconfined_u, unconfined, unconfined_r, s0, s0 - mls_systemhigh, mcs_allcats) | ||
76 | +') | ||
77 | + | ||
78 | # | ||
79 | # The following users correspond to Unix identities. | ||
80 | # These identities are typically assigned as the user attribute | ||
81 | -- | ||
82 | 2.25.1 | ||
83 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch b/recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch index 5815b47..26b1d9c 100644 --- a/recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch +++ b/recipes-security/refpolicy/refpolicy/0002-fc-subs-busybox-set-aliases-for-bin-sbin-and-usr.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From bd8d0af36d8f6eb0f25c43b94e31e93d4ac7513b Mon Sep 17 00:00:00 2001 | 1 | From 1fd50ccbfb7943a4e479af91d308f433f1f0ec8a Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Thu, 28 Mar 2019 20:48:10 -0400 | 3 | Date: Thu, 28 Mar 2019 20:48:10 -0400 |
4 | Subject: [PATCH] fc/subs/busybox: set aliases for bin, sbin and usr | 4 | Subject: [PATCH] fc/subs/busybox: set aliases for bin, sbin and usr |
diff --git a/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-allow-systemd-networkd-to-accept-a.patch b/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-allow-systemd-networkd-to-accept-a.patch new file mode 100644 index 0000000..e4d697c --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-allow-systemd-networkd-to-accept-a.patch | |||
@@ -0,0 +1,47 @@ | |||
1 | From 805d55ae146a21575b013e041cec7f97899d39ae Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Fri, 26 Feb 2021 09:13:23 +0800 | ||
4 | Subject: [PATCH] refpolicy-minimum: allow systemd-networkd to accept and | ||
5 | listen socket | ||
6 | |||
7 | Fixes: | ||
8 | avc: denied { listen } for pid=340 comm="systemd-network" | ||
9 | path="/run/systemd/netif/io.systemd.Network" | ||
10 | scontext=system_u:system_r:systemd_networkd_t:s0 | ||
11 | tcontext=system_u:system_r:systemd_networkd_t:s0 | ||
12 | tclass=unix_stream_socket permissive=1 | ||
13 | |||
14 | avc: denied { accept } for pid=312 comm="systemd-nsresou" | ||
15 | path="/run/systemd/io.systemd.NamespaceResource" | ||
16 | scontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
17 | tcontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
18 | tclass=unix_stream_socket permissive=1 | ||
19 | |||
20 | avc: denied { accept } for pid=309 comm="systemd-nsresou" | ||
21 | path="/run/systemd/io.systemd.NamespaceResource" | ||
22 | scontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
23 | tcontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
24 | tclass=unix_stream_socket permissive=1 | ||
25 | |||
26 | Upstream-Status: Inappropriate [embedded specific] | ||
27 | |||
28 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
29 | --- | ||
30 | policy/modules/system/systemd.te | 1 + | ||
31 | 1 file changed, 1 insertion(+) | ||
32 | |||
33 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
34 | index 45d4db784..af0e05e9d 100644 | ||
35 | --- a/policy/modules/system/systemd.te | ||
36 | +++ b/policy/modules/system/systemd.te | ||
37 | @@ -1305,6 +1305,7 @@ allow systemd_networkd_t self:rawip_socket create_socket_perms; | ||
38 | allow systemd_networkd_t self:tun_socket { create_socket_perms relabelfrom relabelto }; | ||
39 | allow systemd_networkd_t self:udp_socket create_socket_perms; | ||
40 | allow systemd_networkd_t self:unix_dgram_socket create_socket_perms; | ||
41 | +allow systemd_networkd_t self:unix_stream_socket { accept listen }; | ||
42 | |||
43 | manage_dirs_pattern(systemd_networkd_t, systemd_networkd_runtime_t, systemd_networkd_runtime_t) | ||
44 | manage_files_pattern(systemd_networkd_t, systemd_networkd_runtime_t, systemd_networkd_runtime_t) | ||
45 | -- | ||
46 | 2.25.1 | ||
47 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-enable-nscd_use_shm.patch b/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-enable-nscd_use_shm.patch deleted file mode 100644 index 72c5374..0000000 --- a/recipes-security/refpolicy/refpolicy/0002-refpolicy-minimum-enable-nscd_use_shm.patch +++ /dev/null | |||
@@ -1,47 +0,0 @@ | |||
1 | From 9494c078e1aea2ab6ecdf0c3ca01e2d3941b11a7 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Fri, 26 Feb 2021 09:13:23 +0800 | ||
4 | Subject: [PATCH] refpolicy-minimum: enable nscd_use_shm | ||
5 | |||
6 | Fixes: | ||
7 | avc: denied { listen } for pid=340 comm="systemd-network" | ||
8 | path="/run/systemd/netif/io.systemd.Network" | ||
9 | scontext=system_u:system_r:systemd_networkd_t:s0 | ||
10 | tcontext=system_u:system_r:systemd_networkd_t:s0 | ||
11 | tclass=unix_stream_socket permissive=1 | ||
12 | |||
13 | avc: denied { accept } for pid=312 comm="systemd-nsresou" | ||
14 | path="/run/systemd/io.systemd.NamespaceResource" | ||
15 | scontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
16 | tcontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
17 | tclass=unix_stream_socket permissive=1 | ||
18 | |||
19 | avc: denied { accept } for pid=309 comm="systemd-nsresou" | ||
20 | path="/run/systemd/io.systemd.NamespaceResource" | ||
21 | scontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
22 | tcontext=system_u:system_r:systemd_nsresourced_t:s0 | ||
23 | tclass=unix_stream_socket permissive=1 | ||
24 | |||
25 | Upstream-Status: Inappropriate [embedded specific] | ||
26 | |||
27 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
28 | --- | ||
29 | policy/modules/services/nscd.te | 2 +- | ||
30 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
31 | |||
32 | diff --git a/policy/modules/services/nscd.te b/policy/modules/services/nscd.te | ||
33 | index ffc60497c..d226f1145 100644 | ||
34 | --- a/policy/modules/services/nscd.te | ||
35 | +++ b/policy/modules/services/nscd.te | ||
36 | @@ -15,7 +15,7 @@ gen_require(` | ||
37 | ## can use nscd shared memory. | ||
38 | ## </p> | ||
39 | ## </desc> | ||
40 | -gen_tunable(nscd_use_shm, false) | ||
41 | +gen_tunable(nscd_use_shm, true) | ||
42 | |||
43 | attribute_role nscd_roles; | ||
44 | |||
45 | -- | ||
46 | 2.25.1 | ||
47 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch b/recipes-security/refpolicy/refpolicy/0002-refpolicy-targeted-make-unconfined_u-the-default-sel.patch index ba472d7..57eb976 100644 --- a/recipes-security/refpolicy/refpolicy/0001-refpolicy-targeted-make-unconfined_u-the-default-sel.patch +++ b/recipes-security/refpolicy/refpolicy/0002-refpolicy-targeted-make-unconfined_u-the-default-sel.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 38cac8a2f2ec94bbc9b6d04ffcc35b7459c05b11 Mon Sep 17 00:00:00 2001 | 1 | From 0b299c6f8950cbba592a366e93f9ecb0605ffe9a Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Mon, 20 Apr 2020 11:50:03 +0800 | 3 | Date: Mon, 20 Apr 2020 11:50:03 +0800 |
4 | Subject: [PATCH] refpolicy-targeted: make unconfined_u the default selinux | 4 | Subject: [PATCH] refpolicy-targeted: make unconfined_u the default selinux |
diff --git a/recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch b/recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch index 6e82aee..e2dd9e0 100644 --- a/recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch +++ b/recipes-security/refpolicy/refpolicy/0003-fc-hostname-apply-policy-to-common-yocto-hostname-al.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From b8ec557e6aa310c65d9183ae741e649eae1c3619 Mon Sep 17 00:00:00 2001 | 1 | From db25a33d356c7c273c1bcee33bd1f5df80bf29b0 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] fc/hostname: apply policy to common yocto hostname | 4 | Subject: [PATCH] fc/hostname: apply policy to common yocto hostname |
diff --git a/recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch b/recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch index 27f2ea8..f5a012f 100644 --- a/recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch +++ b/recipes-security/refpolicy/refpolicy/0004-fc-bash-apply-usr-bin-bash-context-to-bin-bash.bash.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ddba777d85a78cb372a84f4ff003888e1ba06afa Mon Sep 17 00:00:00 2001 | 1 | From 2016c05b60f0d81294ccccc4242e03d4143b843e Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Thu, 28 Mar 2019 21:37:32 -0400 | 3 | Date: Thu, 28 Mar 2019 21:37:32 -0400 |
4 | Subject: [PATCH] fc/bash: apply /usr/bin/bash context to /bin/bash.bash | 4 | Subject: [PATCH] fc/bash: apply /usr/bin/bash context to /bin/bash.bash |
@@ -15,7 +15,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
15 | 1 file changed, 1 insertion(+) | 15 | 1 file changed, 1 insertion(+) |
16 | 16 | ||
17 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc | 17 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc |
18 | index 04d6caa80..7d2efef0a 100644 | 18 | index 9ac701579..b1163fdbb 100644 |
19 | --- a/policy/modules/kernel/corecommands.fc | 19 | --- a/policy/modules/kernel/corecommands.fc |
20 | +++ b/policy/modules/kernel/corecommands.fc | 20 | +++ b/policy/modules/kernel/corecommands.fc |
21 | @@ -147,6 +147,7 @@ ifdef(`distro_gentoo',` | 21 | @@ -147,6 +147,7 @@ ifdef(`distro_gentoo',` |
diff --git a/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch b/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch index 3c5f5ae..f039ebe 100644 --- a/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch +++ b/recipes-security/refpolicy/refpolicy/0005-fc-resolv.conf-label-resolv.conf-in-var-run-properly.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 3f24037dd9c0c468d4182d6b047a9baa2469726a Mon Sep 17 00:00:00 2001 | 1 | From e2a5ddc7235c9cf248a9d860ab8d0d71ec42e7a7 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Thu, 4 Apr 2019 10:45:03 -0400 | 3 | Date: Thu, 4 Apr 2019 10:45:03 -0400 |
4 | Subject: [PATCH] fc/resolv.conf: label resolv.conf in var/run/ properly | 4 | Subject: [PATCH] fc/resolv.conf: label resolv.conf in var/run/ properly |
diff --git a/recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch b/recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch index 53bb1e7..346b0db 100644 --- a/recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch +++ b/recipes-security/refpolicy/refpolicy/0006-fc-login-apply-login-context-to-login.shadow.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From b318d4d8feb1a021e63d38ac2bea4abe834c4e3b Mon Sep 17 00:00:00 2001 | 1 | From 59b9c22802488a693d40e7570536cca89bdc58ee Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Thu, 28 Mar 2019 21:43:53 -0400 | 3 | Date: Thu, 28 Mar 2019 21:43:53 -0400 |
4 | Subject: [PATCH] fc/login: apply login context to login.shadow | 4 | Subject: [PATCH] fc/login: apply login context to login.shadow |
@@ -12,7 +12,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
12 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
13 | 13 | ||
14 | diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc | 14 | diff --git a/policy/modules/system/authlogin.fc b/policy/modules/system/authlogin.fc |
15 | index fcdd38d6d..c7e7b64a9 100644 | 15 | index eca178a2e..ddf5ecec2 100644 |
16 | --- a/policy/modules/system/authlogin.fc | 16 | --- a/policy/modules/system/authlogin.fc |
17 | +++ b/policy/modules/system/authlogin.fc | 17 | +++ b/policy/modules/system/authlogin.fc |
18 | @@ -8,6 +8,7 @@ | 18 | @@ -8,6 +8,7 @@ |
diff --git a/recipes-security/refpolicy/refpolicy/0007-fc-hwclock-add-hwclock-alternatives.patch b/recipes-security/refpolicy/refpolicy/0007-fc-hwclock-add-hwclock-alternatives.patch index c6e4662..d8c8489 100644 --- a/recipes-security/refpolicy/refpolicy/0007-fc-hwclock-add-hwclock-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0007-fc-hwclock-add-hwclock-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 78e157da0424e06347030577dcdd00f3e6c085ef Mon Sep 17 00:00:00 2001 | 1 | From 9a551208b7e1ebd451115ea36cde1536f34f3866 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Thu, 28 Mar 2019 21:59:18 -0400 | 3 | Date: Thu, 28 Mar 2019 21:59:18 -0400 |
4 | Subject: [PATCH] fc/hwclock: add hwclock alternatives | 4 | Subject: [PATCH] fc/hwclock: add hwclock alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0008-fc-dmesg-apply-policy-to-dmesg-alternatives.patch b/recipes-security/refpolicy/refpolicy/0008-fc-dmesg-apply-policy-to-dmesg-alternatives.patch index 59770e2..8d6b7b2 100644 --- a/recipes-security/refpolicy/refpolicy/0008-fc-dmesg-apply-policy-to-dmesg-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0008-fc-dmesg-apply-policy-to-dmesg-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d15ee4e3684c52af2caa3af2c24af73ab7ceb677 Mon Sep 17 00:00:00 2001 | 1 | From c67674b38368f5d584fd3013f0193b6e6e733a66 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Fri, 29 Mar 2019 08:26:55 -0400 | 3 | Date: Fri, 29 Mar 2019 08:26:55 -0400 |
4 | Subject: [PATCH] fc/dmesg: apply policy to dmesg alternatives | 4 | Subject: [PATCH] fc/dmesg: apply policy to dmesg alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0009-fc-ssh-apply-policy-to-ssh-alternatives.patch b/recipes-security/refpolicy/refpolicy/0009-fc-ssh-apply-policy-to-ssh-alternatives.patch index 84c5b62..4660bca 100644 --- a/recipes-security/refpolicy/refpolicy/0009-fc-ssh-apply-policy-to-ssh-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0009-fc-ssh-apply-policy-to-ssh-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From f287a7b6b9a41963cec1e9bf70eff99e840c9cc3 Mon Sep 17 00:00:00 2001 | 1 | From 0493199f682a52c097ae81ac96118295e47bdf90 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Fri, 29 Mar 2019 09:20:58 -0400 | 3 | Date: Fri, 29 Mar 2019 09:20:58 -0400 |
4 | Subject: [PATCH] fc/ssh: apply policy to ssh alternatives | 4 | Subject: [PATCH] fc/ssh: apply policy to ssh alternatives |
@@ -12,7 +12,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
12 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
13 | 13 | ||
14 | diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc | 14 | diff --git a/policy/modules/services/ssh.fc b/policy/modules/services/ssh.fc |
15 | index a30d01afc..e033d1a70 100644 | 15 | index 93bfa8d26..7b7e567f9 100644 |
16 | --- a/policy/modules/services/ssh.fc | 16 | --- a/policy/modules/services/ssh.fc |
17 | +++ b/policy/modules/services/ssh.fc | 17 | +++ b/policy/modules/services/ssh.fc |
18 | @@ -4,6 +4,7 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0) | 18 | @@ -4,6 +4,7 @@ HOME_DIR/\.ssh(/.*)? gen_context(system_u:object_r:ssh_home_t,s0) |
diff --git a/recipes-security/refpolicy/refpolicy/0010-fc-sysnetwork-apply-policy-to-network-commands-alter.patch b/recipes-security/refpolicy/refpolicy/0010-fc-sysnetwork-apply-policy-to-network-commands-alter.patch index 08d6a80..7c092ee 100644 --- a/recipes-security/refpolicy/refpolicy/0010-fc-sysnetwork-apply-policy-to-network-commands-alter.patch +++ b/recipes-security/refpolicy/refpolicy/0010-fc-sysnetwork-apply-policy-to-network-commands-alter.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From fcfd91661ea05b5967f75927116056924e972214 Mon Sep 17 00:00:00 2001 | 1 | From 53c2af24e86b3ab9be5a982958bb0e5c9e8c1360 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Tue, 9 Jun 2015 21:22:52 +0530 | 3 | Date: Tue, 9 Jun 2015 21:22:52 +0530 |
4 | Subject: [PATCH] fc/sysnetwork: apply policy to network commands alternatives | 4 | Subject: [PATCH] fc/sysnetwork: apply policy to network commands alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0011-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch b/recipes-security/refpolicy/refpolicy/0011-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch index 4420b33..f487090 100644 --- a/recipes-security/refpolicy/refpolicy/0011-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch +++ b/recipes-security/refpolicy/refpolicy/0011-fc-rpm-apply-rpm_exec-policy-to-cpio-binaries.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 6e5d4763c0e3e7b2b819694d85710128f4e0ff28 Mon Sep 17 00:00:00 2001 | 1 | From 2df4a4620b74973ceafde3732273234de9668fe3 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Fri, 29 Mar 2019 09:54:07 -0400 | 3 | Date: Fri, 29 Mar 2019 09:54:07 -0400 |
4 | Subject: [PATCH] fc/rpm: apply rpm_exec policy to cpio binaries | 4 | Subject: [PATCH] fc/rpm: apply rpm_exec policy to cpio binaries |
diff --git a/recipes-security/refpolicy/refpolicy/0012-fc-su-apply-policy-to-su-alternatives.patch b/recipes-security/refpolicy/refpolicy/0012-fc-su-apply-policy-to-su-alternatives.patch index 699fa77..c84de1b 100644 --- a/recipes-security/refpolicy/refpolicy/0012-fc-su-apply-policy-to-su-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0012-fc-su-apply-policy-to-su-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ca60691cffdf516f3f09cee23874a49d890c9de8 Mon Sep 17 00:00:00 2001 | 1 | From 0d026ac95a9da5e345e5b7fbaded216396e12bde Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Thu, 13 Feb 2014 00:33:07 -0500 | 3 | Date: Thu, 13 Feb 2014 00:33:07 -0500 |
4 | Subject: [PATCH] fc/su: apply policy to su alternatives | 4 | Subject: [PATCH] fc/su: apply policy to su alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0013-fc-fstools-fix-real-path-for-fstools.patch b/recipes-security/refpolicy/refpolicy/0013-fc-fstools-fix-real-path-for-fstools.patch index 7e56e75..0ef343d 100644 --- a/recipes-security/refpolicy/refpolicy/0013-fc-fstools-fix-real-path-for-fstools.patch +++ b/recipes-security/refpolicy/refpolicy/0013-fc-fstools-fix-real-path-for-fstools.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From f6a42851e3abe274a733f92f90541de3047e5d74 Mon Sep 17 00:00:00 2001 | 1 | From 09de3f9093cde03bf906411403ff43a25290bd6b Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Mon, 27 Jan 2014 03:54:01 -0500 | 3 | Date: Mon, 27 Jan 2014 03:54:01 -0500 |
4 | Subject: [PATCH] fc/fstools: fix real path for fstools | 4 | Subject: [PATCH] fc/fstools: fix real path for fstools |
@@ -14,10 +14,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
14 | 1 file changed, 10 insertions(+) | 14 | 1 file changed, 10 insertions(+) |
15 | 15 | ||
16 | diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc | 16 | diff --git a/policy/modules/system/fstools.fc b/policy/modules/system/fstools.fc |
17 | index 63423802d..124109a68 100644 | 17 | index 9064ab52e..5962e5736 100644 |
18 | --- a/policy/modules/system/fstools.fc | 18 | --- a/policy/modules/system/fstools.fc |
19 | +++ b/policy/modules/system/fstools.fc | 19 | +++ b/policy/modules/system/fstools.fc |
20 | @@ -58,7 +58,9 @@ | 20 | @@ -57,7 +57,9 @@ |
21 | /usr/sbin/addpart -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 21 | /usr/sbin/addpart -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
22 | /usr/sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 22 | /usr/sbin/badblocks -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
23 | /usr/sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 23 | /usr/sbin/blkid -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
@@ -27,8 +27,8 @@ index 63423802d..124109a68 100644 | |||
27 | /usr/sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 27 | /usr/sbin/cfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
28 | /usr/sbin/clubufflush -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 28 | /usr/sbin/clubufflush -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
29 | /usr/sbin/delpart -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 29 | /usr/sbin/delpart -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
30 | @@ -72,10 +74,13 @@ | 30 | @@ -70,10 +72,13 @@ |
31 | /usr/sbin/efibootmgr -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 31 | /usr/sbin/e2mmpstatus -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
32 | /usr/sbin/fatsort -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 32 | /usr/sbin/fatsort -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
33 | /usr/sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 33 | /usr/sbin/fdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
34 | +/usr/sbin/fdisk\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 34 | +/usr/sbin/fdisk\.util-linux -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
@@ -41,7 +41,7 @@ index 63423802d..124109a68 100644 | |||
41 | /usr/sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 41 | /usr/sbin/install-mbr -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
42 | /usr/sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 42 | /usr/sbin/jfs_.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
43 | /usr/sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 43 | /usr/sbin/losetup.* -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
44 | @@ -83,13 +88,16 @@ | 44 | @@ -81,13 +86,16 @@ |
45 | /usr/sbin/make_reiser4 -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 45 | /usr/sbin/make_reiser4 -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
46 | /usr/sbin/mkdosfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 46 | /usr/sbin/mkdosfs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
47 | /usr/sbin/mke2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 47 | /usr/sbin/mke2fs -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
@@ -58,7 +58,7 @@ index 63423802d..124109a68 100644 | |||
58 | /usr/sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 58 | /usr/sbin/partx -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
59 | /usr/sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 59 | /usr/sbin/raidautorun -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
60 | /usr/sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 60 | /usr/sbin/raidstart -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
61 | @@ -99,8 +107,10 @@ | 61 | @@ -97,8 +105,10 @@ |
62 | /usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 62 | /usr/sbin/sfdisk -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
63 | /usr/sbin/smartctl -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 63 | /usr/sbin/smartctl -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
64 | /usr/sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0) | 64 | /usr/sbin/swapoff -- gen_context(system_u:object_r:fsadm_exec_t,s0) |
diff --git a/recipes-security/refpolicy/refpolicy/0014-fc-init-fix-update-alternatives-for-sysvinit.patch b/recipes-security/refpolicy/refpolicy/0014-fc-init-fix-update-alternatives-for-sysvinit.patch index 40e5413..a483165 100644 --- a/recipes-security/refpolicy/refpolicy/0014-fc-init-fix-update-alternatives-for-sysvinit.patch +++ b/recipes-security/refpolicy/refpolicy/0014-fc-init-fix-update-alternatives-for-sysvinit.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From eecf36ae218ee0d85fd07a14bfbcb6636ab84095 Mon Sep 17 00:00:00 2001 | 1 | From a76963ea8a74c818bd03acae75ae86db59c366e7 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] fc/init: fix update-alternatives for sysvinit | 4 | Subject: [PATCH] fc/init: fix update-alternatives for sysvinit |
@@ -27,7 +27,7 @@ index 2e47783c2..e359539be 100644 | |||
27 | /run/shutdown\.pid -- gen_context(system_u:object_r:shutdown_runtime_t,s0) | 27 | /run/shutdown\.pid -- gen_context(system_u:object_r:shutdown_runtime_t,s0) |
28 | 28 | ||
29 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc | 29 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc |
30 | index 7d2efef0a..9a5711a83 100644 | 30 | index b1163fdbb..1c2553d21 100644 |
31 | --- a/policy/modules/kernel/corecommands.fc | 31 | --- a/policy/modules/kernel/corecommands.fc |
32 | +++ b/policy/modules/kernel/corecommands.fc | 32 | +++ b/policy/modules/kernel/corecommands.fc |
33 | @@ -156,6 +156,8 @@ ifdef(`distro_gentoo',` | 33 | @@ -156,6 +156,8 @@ ifdef(`distro_gentoo',` |
diff --git a/recipes-security/refpolicy/refpolicy/0015-fc-brctl-apply-policy-to-brctl-alternatives.patch b/recipes-security/refpolicy/refpolicy/0015-fc-brctl-apply-policy-to-brctl-alternatives.patch index fa9e849..855446c 100644 --- a/recipes-security/refpolicy/refpolicy/0015-fc-brctl-apply-policy-to-brctl-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0015-fc-brctl-apply-policy-to-brctl-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From e26d8e3eea2cab884562793221ce9b8c39c614cc Mon Sep 17 00:00:00 2001 | 1 | From 19c91699eda904d2c377a29c62bdf6be1ebf59f7 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 10:19:54 +0800 | 3 | Date: Fri, 15 Nov 2019 10:19:54 +0800 |
4 | Subject: [PATCH] fc/brctl: apply policy to brctl alternatives | 4 | Subject: [PATCH] fc/brctl: apply policy to brctl alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0016-fc-corecommands-apply-policy-to-nologin-alternatives.patch b/recipes-security/refpolicy/refpolicy/0016-fc-corecommands-apply-policy-to-nologin-alternatives.patch index eb49b01..220a9b8 100644 --- a/recipes-security/refpolicy/refpolicy/0016-fc-corecommands-apply-policy-to-nologin-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0016-fc-corecommands-apply-policy-to-nologin-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 48b69b97a52cf782fbc54f5e55e92ee81466d0bc Mon Sep 17 00:00:00 2001 | 1 | From 3b40ac147bc2e1a1d387d519fd1710e92d934b4e Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 10:21:51 +0800 | 3 | Date: Fri, 15 Nov 2019 10:21:51 +0800 |
4 | Subject: [PATCH] fc/corecommands: apply policy to nologin alternatives | 4 | Subject: [PATCH] fc/corecommands: apply policy to nologin alternatives |
@@ -11,10 +11,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
11 | 1 file changed, 2 insertions(+) | 11 | 1 file changed, 2 insertions(+) |
12 | 12 | ||
13 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc | 13 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc |
14 | index 9a5711a83..c9009af5f 100644 | 14 | index 1c2553d21..65178ba32 100644 |
15 | --- a/policy/modules/kernel/corecommands.fc | 15 | --- a/policy/modules/kernel/corecommands.fc |
16 | +++ b/policy/modules/kernel/corecommands.fc | 16 | +++ b/policy/modules/kernel/corecommands.fc |
17 | @@ -311,6 +311,8 @@ ifdef(`distro_debian',` | 17 | @@ -312,6 +312,8 @@ ifdef(`distro_debian',` |
18 | /usr/sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0) | 18 | /usr/sbin/insmod_ksymoops_clean -- gen_context(system_u:object_r:bin_t,s0) |
19 | /usr/sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0) | 19 | /usr/sbin/mkfs\.cramfs -- gen_context(system_u:object_r:bin_t,s0) |
20 | /usr/sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0) | 20 | /usr/sbin/nologin -- gen_context(system_u:object_r:shell_exec_t,s0) |
diff --git a/recipes-security/refpolicy/refpolicy/0017-fc-locallogin-apply-policy-to-sulogin-alternatives.patch b/recipes-security/refpolicy/refpolicy/0017-fc-locallogin-apply-policy-to-sulogin-alternatives.patch index 63fa13a..29a9a05 100644 --- a/recipes-security/refpolicy/refpolicy/0017-fc-locallogin-apply-policy-to-sulogin-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0017-fc-locallogin-apply-policy-to-sulogin-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 29e16342861e11d6463ec63ffbe55d1665d05e7d Mon Sep 17 00:00:00 2001 | 1 | From 07657262d8ac7304f8dd0224e3daaecc925d4392 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 10:43:28 +0800 | 3 | Date: Fri, 15 Nov 2019 10:43:28 +0800 |
4 | Subject: [PATCH] fc/locallogin: apply policy to sulogin alternatives | 4 | Subject: [PATCH] fc/locallogin: apply policy to sulogin alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0018-fc-ntp-apply-policy-to-ntpd-alternatives.patch b/recipes-security/refpolicy/refpolicy/0018-fc-ntp-apply-policy-to-ntpd-alternatives.patch index 1947803..c16b3d0 100644 --- a/recipes-security/refpolicy/refpolicy/0018-fc-ntp-apply-policy-to-ntpd-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0018-fc-ntp-apply-policy-to-ntpd-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c1847b18ed1b1a18dbafc735bfb1368c2abb9d55 Mon Sep 17 00:00:00 2001 | 1 | From 85f3abe44a579ddff62fa3ef774c9d53c3bb35e4 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 10:45:23 +0800 | 3 | Date: Fri, 15 Nov 2019 10:45:23 +0800 |
4 | Subject: [PATCH] fc/ntp: apply policy to ntpd alternatives | 4 | Subject: [PATCH] fc/ntp: apply policy to ntpd alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0019-fc-kerberos-apply-policy-to-kerberos-alternatives.patch b/recipes-security/refpolicy/refpolicy/0019-fc-kerberos-apply-policy-to-kerberos-alternatives.patch index 4248605..bcbc59f 100644 --- a/recipes-security/refpolicy/refpolicy/0019-fc-kerberos-apply-policy-to-kerberos-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0019-fc-kerberos-apply-policy-to-kerberos-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 1400afd28f2cd886bae487fb17811a5fd98b86b9 Mon Sep 17 00:00:00 2001 | 1 | From b23752c14edcda3a5d25c386986cb2a53f68df71 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 10:55:05 +0800 | 3 | Date: Fri, 15 Nov 2019 10:55:05 +0800 |
4 | Subject: [PATCH] fc/kerberos: apply policy to kerberos alternatives | 4 | Subject: [PATCH] fc/kerberos: apply policy to kerberos alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0020-fc-ldap-apply-policy-to-ldap-alternatives.patch b/recipes-security/refpolicy/refpolicy/0020-fc-ldap-apply-policy-to-ldap-alternatives.patch index c0aa11b..111af65 100644 --- a/recipes-security/refpolicy/refpolicy/0020-fc-ldap-apply-policy-to-ldap-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0020-fc-ldap-apply-policy-to-ldap-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 53370099eb97c008460bb7b99817737beb94a9bf Mon Sep 17 00:00:00 2001 | 1 | From e86acf68aec0f34bd0d0e41cedbaf4e1584d1a74 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 11:06:13 +0800 | 3 | Date: Fri, 15 Nov 2019 11:06:13 +0800 |
4 | Subject: [PATCH] fc/ldap: apply policy to ldap alternatives | 4 | Subject: [PATCH] fc/ldap: apply policy to ldap alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0021-fc-postgresql-apply-policy-to-postgresql-alternative.patch b/recipes-security/refpolicy/refpolicy/0021-fc-postgresql-apply-policy-to-postgresql-alternative.patch index d76d2e3..c5f190a 100644 --- a/recipes-security/refpolicy/refpolicy/0021-fc-postgresql-apply-policy-to-postgresql-alternative.patch +++ b/recipes-security/refpolicy/refpolicy/0021-fc-postgresql-apply-policy-to-postgresql-alternative.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 67fda1f031d70d1281b058a5f3a31e220b052d21 Mon Sep 17 00:00:00 2001 | 1 | From e237a9acdb30805eec7f7baea6265a4595f93b9d Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 11:13:16 +0800 | 3 | Date: Fri, 15 Nov 2019 11:13:16 +0800 |
4 | Subject: [PATCH] fc/postgresql: apply policy to postgresql alternatives | 4 | Subject: [PATCH] fc/postgresql: apply policy to postgresql alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0022-fc-screen-apply-policy-to-screen-alternatives.patch b/recipes-security/refpolicy/refpolicy/0022-fc-screen-apply-policy-to-screen-alternatives.patch index 2fe39bf..0ce9694 100644 --- a/recipes-security/refpolicy/refpolicy/0022-fc-screen-apply-policy-to-screen-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0022-fc-screen-apply-policy-to-screen-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From fb72a7ca4963a7537bcb98a730025f6f8941d146 Mon Sep 17 00:00:00 2001 | 1 | From 83195f523c21392d9be0af8cd3bc358bd42f882c Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 11:15:33 +0800 | 3 | Date: Fri, 15 Nov 2019 11:15:33 +0800 |
4 | Subject: [PATCH] fc/screen: apply policy to screen alternatives | 4 | Subject: [PATCH] fc/screen: apply policy to screen alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0023-fc-usermanage-apply-policy-to-usermanage-alternative.patch b/recipes-security/refpolicy/refpolicy/0023-fc-usermanage-apply-policy-to-usermanage-alternative.patch index 0d95b3c..c4bcc75 100644 --- a/recipes-security/refpolicy/refpolicy/0023-fc-usermanage-apply-policy-to-usermanage-alternative.patch +++ b/recipes-security/refpolicy/refpolicy/0023-fc-usermanage-apply-policy-to-usermanage-alternative.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 343389daef155325172928f7d5608e638897775d Mon Sep 17 00:00:00 2001 | 1 | From 75bc058a2571dc61b74b18647fa0288b9c47d628 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 11:25:34 +0800 | 3 | Date: Fri, 15 Nov 2019 11:25:34 +0800 |
4 | Subject: [PATCH] fc/usermanage: apply policy to usermanage alternatives | 4 | Subject: [PATCH] fc/usermanage: apply policy to usermanage alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0024-fc-getty-add-file-context-to-start_getty.patch b/recipes-security/refpolicy/refpolicy/0024-fc-getty-add-file-context-to-start_getty.patch index 3066e52..c06c824 100644 --- a/recipes-security/refpolicy/refpolicy/0024-fc-getty-add-file-context-to-start_getty.patch +++ b/recipes-security/refpolicy/refpolicy/0024-fc-getty-add-file-context-to-start_getty.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 23cef56ad581ee4579ab6ee26c9dd8b114816b6b Mon Sep 17 00:00:00 2001 | 1 | From 5b7b58fb5b23b4ccc427233061ba816b45faaca3 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 15 Nov 2019 16:07:30 +0800 | 3 | Date: Fri, 15 Nov 2019 16:07:30 +0800 |
4 | Subject: [PATCH] fc/getty: add file context to start_getty | 4 | Subject: [PATCH] fc/getty: add file context to start_getty |
diff --git a/recipes-security/refpolicy/refpolicy/0025-fc-vlock-apply-policy-to-vlock-alternatives.patch b/recipes-security/refpolicy/refpolicy/0025-fc-vlock-apply-policy-to-vlock-alternatives.patch index 7e596ef..670446b 100644 --- a/recipes-security/refpolicy/refpolicy/0025-fc-vlock-apply-policy-to-vlock-alternatives.patch +++ b/recipes-security/refpolicy/refpolicy/0025-fc-vlock-apply-policy-to-vlock-alternatives.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 32988df0a389ef480334dffce4d5cc96b0f1012e Mon Sep 17 00:00:00 2001 | 1 | From 6e72fd53bbadf600c06c3f25dfd502e6a9c502fb Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Wed, 18 Dec 2019 15:04:41 +0800 | 3 | Date: Wed, 18 Dec 2019 15:04:41 +0800 |
4 | Subject: [PATCH] fc/vlock: apply policy to vlock alternatives | 4 | Subject: [PATCH] fc/vlock: apply policy to vlock alternatives |
diff --git a/recipes-security/refpolicy/refpolicy/0026-fc-add-fcontext-for-init-scripts-and-systemd-service.patch b/recipes-security/refpolicy/refpolicy/0026-fc-add-fcontext-for-init-scripts-and-systemd-service.patch index 4fe9ee9..84af1fa 100644 --- a/recipes-security/refpolicy/refpolicy/0026-fc-add-fcontext-for-init-scripts-and-systemd-service.patch +++ b/recipes-security/refpolicy/refpolicy/0026-fc-add-fcontext-for-init-scripts-and-systemd-service.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 8586fbe84abd716a425e13e8b48179a08e210db2 Mon Sep 17 00:00:00 2001 | 1 | From 7f58d61471a45851dd162c2b4bd9733a5311c0b9 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Tue, 30 Jun 2020 10:45:57 +0800 | 3 | Date: Tue, 30 Jun 2020 10:45:57 +0800 |
4 | Subject: [PATCH] fc: add fcontext for init scripts and systemd service files | 4 | Subject: [PATCH] fc: add fcontext for init scripts and systemd service files |
@@ -14,7 +14,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
14 | 4 files changed, 5 insertions(+) | 14 | 4 files changed, 5 insertions(+) |
15 | 15 | ||
16 | diff --git a/policy/modules/services/cron.fc b/policy/modules/services/cron.fc | 16 | diff --git a/policy/modules/services/cron.fc b/policy/modules/services/cron.fc |
17 | index 827363d88..e8412396d 100644 | 17 | index e71ad22c1..bb1351732 100644 |
18 | --- a/policy/modules/services/cron.fc | 18 | --- a/policy/modules/services/cron.fc |
19 | +++ b/policy/modules/services/cron.fc | 19 | +++ b/policy/modules/services/cron.fc |
20 | @@ -1,4 +1,5 @@ | 20 | @@ -1,4 +1,5 @@ |
@@ -34,7 +34,7 @@ index 382c067f9..0ecc5acc4 100644 | |||
34 | /usr/bin/rngd -- gen_context(system_u:object_r:rngd_exec_t,s0) | 34 | /usr/bin/rngd -- gen_context(system_u:object_r:rngd_exec_t,s0) |
35 | 35 | ||
36 | diff --git a/policy/modules/services/rpc.fc b/policy/modules/services/rpc.fc | 36 | diff --git a/policy/modules/services/rpc.fc b/policy/modules/services/rpc.fc |
37 | index 7edc09fac..7416fa39f 100644 | 37 | index 3b6d1c930..4949d995a 100644 |
38 | --- a/policy/modules/services/rpc.fc | 38 | --- a/policy/modules/services/rpc.fc |
39 | +++ b/policy/modules/services/rpc.fc | 39 | +++ b/policy/modules/services/rpc.fc |
40 | @@ -2,7 +2,9 @@ | 40 | @@ -2,7 +2,9 @@ |
@@ -46,7 +46,7 @@ index 7edc09fac..7416fa39f 100644 | |||
46 | +/etc/rc\.d/init\.d/nfscommon -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0) | 46 | +/etc/rc\.d/init\.d/nfscommon -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0) |
47 | /etc/rc\.d/init\.d/rpcidmapd -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0) | 47 | /etc/rc\.d/init\.d/rpcidmapd -- gen_context(system_u:object_r:rpcd_initrc_exec_t,s0) |
48 | 48 | ||
49 | /usr/bin/nfsdcld -- gen_context(system_u:object_r:rpcd_exec_t,s0) | 49 | /usr/bin/blkmapd -- gen_context(system_u:object_r:blkmapd_exec_t,s0) |
50 | diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc | 50 | diff --git a/policy/modules/system/logging.fc b/policy/modules/system/logging.fc |
51 | index 3b0dea51b..0ce2bec4b 100644 | 51 | index 3b0dea51b..0ce2bec4b 100644 |
52 | --- a/policy/modules/system/logging.fc | 52 | --- a/policy/modules/system/logging.fc |
diff --git a/recipes-security/refpolicy/refpolicy/0027-file_contexts.subs_dist-set-aliase-for-root-director.patch b/recipes-security/refpolicy/refpolicy/0027-file_contexts.subs_dist-set-aliase-for-root-director.patch index 0ad146d..a2a1de8 100644 --- a/recipes-security/refpolicy/refpolicy/0027-file_contexts.subs_dist-set-aliase-for-root-director.patch +++ b/recipes-security/refpolicy/refpolicy/0027-file_contexts.subs_dist-set-aliase-for-root-director.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 20f43a932c5f7369a446707624d12285035b72fc Mon Sep 17 00:00:00 2001 | 1 | From de259386cb52e44dd00534f598800a23be0d7689 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Sun, 5 Apr 2020 22:03:45 +0800 | 3 | Date: Sun, 5 Apr 2020 22:03:45 +0800 |
4 | Subject: [PATCH] file_contexts.subs_dist: set aliase for /root directory | 4 | Subject: [PATCH] file_contexts.subs_dist: set aliase for /root directory |
diff --git a/recipes-security/refpolicy/refpolicy/0028-policy-modules-system-logging-add-rules-for-the-syml.patch b/recipes-security/refpolicy/refpolicy/0028-policy-modules-system-logging-add-rules-for-the-syml.patch index a433cb7..7aaf702 100644 --- a/recipes-security/refpolicy/refpolicy/0028-policy-modules-system-logging-add-rules-for-the-syml.patch +++ b/recipes-security/refpolicy/refpolicy/0028-policy-modules-system-logging-add-rules-for-the-syml.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 97839d4388be64e168613c2ea3202a76e58fb656 Mon Sep 17 00:00:00 2001 | 1 | From 5147059bcfce76f04c4bacaadc4007588b6a722f Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] policy/modules/system/logging: add rules for the symlink of | 4 | Subject: [PATCH] policy/modules/system/logging: add rules for the symlink of |
diff --git a/recipes-security/refpolicy/refpolicy/0029-policy-modules-system-logging-add-rules-for-syslogd-.patch b/recipes-security/refpolicy/refpolicy/0029-policy-modules-system-logging-add-rules-for-syslogd-.patch index 2465417..2b43530 100644 --- a/recipes-security/refpolicy/refpolicy/0029-policy-modules-system-logging-add-rules-for-syslogd-.patch +++ b/recipes-security/refpolicy/refpolicy/0029-policy-modules-system-logging-add-rules-for-syslogd-.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 9bd0c30476615fd4af29a9dd5b3b664398a9845a Mon Sep 17 00:00:00 2001 | 1 | From e2ce1a7a491ee079b9e393ba6bc6c17d457959f4 Mon Sep 17 00:00:00 2001 |
2 | From: Joe MacDonald <joe_macdonald@mentor.com> | 2 | From: Joe MacDonald <joe_macdonald@mentor.com> |
3 | Date: Fri, 29 Mar 2019 10:33:18 -0400 | 3 | Date: Fri, 29 Mar 2019 10:33:18 -0400 |
4 | Subject: [PATCH] policy/modules/system/logging: add rules for syslogd symlink | 4 | Subject: [PATCH] policy/modules/system/logging: add rules for syslogd symlink |
@@ -18,7 +18,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
18 | 1 file changed, 1 insertion(+) | 18 | 1 file changed, 1 insertion(+) |
19 | 19 | ||
20 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 20 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
21 | index eea78ffc5..5f06428f1 100644 | 21 | index 11bbbc113..38e0b4766 100644 |
22 | --- a/policy/modules/system/logging.te | 22 | --- a/policy/modules/system/logging.te |
23 | +++ b/policy/modules/system/logging.te | 23 | +++ b/policy/modules/system/logging.te |
24 | @@ -425,6 +425,7 @@ files_search_spool(syslogd_t) | 24 | @@ -425,6 +425,7 @@ files_search_spool(syslogd_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0030-policy-modules-kernel-files-add-rules-for-the-symlin.patch b/recipes-security/refpolicy/refpolicy/0030-policy-modules-kernel-files-add-rules-for-the-symlin.patch index 6c5731b..6256789 100644 --- a/recipes-security/refpolicy/refpolicy/0030-policy-modules-kernel-files-add-rules-for-the-symlin.patch +++ b/recipes-security/refpolicy/refpolicy/0030-policy-modules-kernel-files-add-rules-for-the-symlin.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 6293ec11e3c471b54c328f56f20c694b7287885f Mon Sep 17 00:00:00 2001 | 1 | From da3cf0879a8e34996125871e8d1336726f715acb Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] policy/modules/kernel/files: add rules for the symlink of | 4 | Subject: [PATCH] policy/modules/kernel/files: add rules for the symlink of |
@@ -30,10 +30,10 @@ index b1728d37c..c5012e6b4 100644 | |||
30 | /tmp/\.journal <<none>> | 30 | /tmp/\.journal <<none>> |
31 | 31 | ||
32 | diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if | 32 | diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if |
33 | index 811efef94..00146fc23 100644 | 33 | index e1fafd4ab..dbd7efa60 100644 |
34 | --- a/policy/modules/kernel/files.if | 34 | --- a/policy/modules/kernel/files.if |
35 | +++ b/policy/modules/kernel/files.if | 35 | +++ b/policy/modules/kernel/files.if |
36 | @@ -4880,6 +4880,7 @@ interface(`files_search_tmp',` | 36 | @@ -4897,6 +4897,7 @@ interface(`files_search_tmp',` |
37 | ') | 37 | ') |
38 | 38 | ||
39 | allow $1 tmp_t:dir search_dir_perms; | 39 | allow $1 tmp_t:dir search_dir_perms; |
@@ -41,7 +41,7 @@ index 811efef94..00146fc23 100644 | |||
41 | ') | 41 | ') |
42 | 42 | ||
43 | ######################################## | 43 | ######################################## |
44 | @@ -4916,6 +4917,7 @@ interface(`files_list_tmp',` | 44 | @@ -4933,6 +4934,7 @@ interface(`files_list_tmp',` |
45 | ') | 45 | ') |
46 | 46 | ||
47 | allow $1 tmp_t:dir list_dir_perms; | 47 | allow $1 tmp_t:dir list_dir_perms; |
@@ -49,7 +49,7 @@ index 811efef94..00146fc23 100644 | |||
49 | ') | 49 | ') |
50 | 50 | ||
51 | ######################################## | 51 | ######################################## |
52 | @@ -4952,6 +4954,7 @@ interface(`files_delete_tmp_dir_entry',` | 52 | @@ -4969,6 +4971,7 @@ interface(`files_delete_tmp_dir_entry',` |
53 | ') | 53 | ') |
54 | 54 | ||
55 | allow $1 tmp_t:dir del_entry_dir_perms; | 55 | allow $1 tmp_t:dir del_entry_dir_perms; |
@@ -57,7 +57,7 @@ index 811efef94..00146fc23 100644 | |||
57 | ') | 57 | ') |
58 | 58 | ||
59 | ######################################## | 59 | ######################################## |
60 | @@ -4970,6 +4973,7 @@ interface(`files_read_generic_tmp_files',` | 60 | @@ -4987,6 +4990,7 @@ interface(`files_read_generic_tmp_files',` |
61 | ') | 61 | ') |
62 | 62 | ||
63 | read_files_pattern($1, tmp_t, tmp_t) | 63 | read_files_pattern($1, tmp_t, tmp_t) |
@@ -65,7 +65,7 @@ index 811efef94..00146fc23 100644 | |||
65 | ') | 65 | ') |
66 | 66 | ||
67 | ######################################## | 67 | ######################################## |
68 | @@ -4988,6 +4992,7 @@ interface(`files_manage_generic_tmp_dirs',` | 68 | @@ -5005,6 +5009,7 @@ interface(`files_manage_generic_tmp_dirs',` |
69 | ') | 69 | ') |
70 | 70 | ||
71 | manage_dirs_pattern($1, tmp_t, tmp_t) | 71 | manage_dirs_pattern($1, tmp_t, tmp_t) |
@@ -73,7 +73,7 @@ index 811efef94..00146fc23 100644 | |||
73 | ') | 73 | ') |
74 | 74 | ||
75 | ######################################## | 75 | ######################################## |
76 | @@ -5024,6 +5029,7 @@ interface(`files_manage_generic_tmp_files',` | 76 | @@ -5041,6 +5046,7 @@ interface(`files_manage_generic_tmp_files',` |
77 | ') | 77 | ') |
78 | 78 | ||
79 | manage_files_pattern($1, tmp_t, tmp_t) | 79 | manage_files_pattern($1, tmp_t, tmp_t) |
@@ -81,7 +81,7 @@ index 811efef94..00146fc23 100644 | |||
81 | ') | 81 | ') |
82 | 82 | ||
83 | ######################################## | 83 | ######################################## |
84 | @@ -5060,6 +5066,7 @@ interface(`files_rw_generic_tmp_sockets',` | 84 | @@ -5077,6 +5083,7 @@ interface(`files_rw_generic_tmp_sockets',` |
85 | ') | 85 | ') |
86 | 86 | ||
87 | rw_sock_files_pattern($1, tmp_t, tmp_t) | 87 | rw_sock_files_pattern($1, tmp_t, tmp_t) |
@@ -89,7 +89,7 @@ index 811efef94..00146fc23 100644 | |||
89 | ') | 89 | ') |
90 | 90 | ||
91 | ######################################## | 91 | ######################################## |
92 | @@ -5267,6 +5274,7 @@ interface(`files_tmp_filetrans',` | 92 | @@ -5284,6 +5291,7 @@ interface(`files_tmp_filetrans',` |
93 | ') | 93 | ') |
94 | 94 | ||
95 | filetrans_pattern($1, tmp_t, $2, $3, $4) | 95 | filetrans_pattern($1, tmp_t, $2, $3, $4) |
diff --git a/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch b/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch index 9ddeb9f..b6ec45c 100644 --- a/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch +++ b/recipes-security/refpolicy/refpolicy/0031-policy-modules-system-logging-fix-auditd-startup-fai.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 40ddb313a0cb04b3e9b180e04d3427715de58aee Mon Sep 17 00:00:00 2001 | 1 | From 59c29aa28424cf61f6b71a9022dced52d5b58c8f Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] policy/modules/system/logging: fix auditd startup failures | 4 | Subject: [PATCH] policy/modules/system/logging: fix auditd startup failures |
@@ -17,7 +17,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
17 | 1 file changed, 3 insertions(+) | 17 | 1 file changed, 3 insertions(+) |
18 | 18 | ||
19 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 19 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
20 | index 5f06428f1..3ffddcb0a 100644 | 20 | index 38e0b4766..a1912254e 100644 |
21 | --- a/policy/modules/system/logging.te | 21 | --- a/policy/modules/system/logging.te |
22 | +++ b/policy/modules/system/logging.te | 22 | +++ b/policy/modules/system/logging.te |
23 | @@ -117,6 +117,7 @@ allow auditctl_t self:netlink_audit_socket nlmsg_readpriv; | 23 | @@ -117,6 +117,7 @@ allow auditctl_t self:netlink_audit_socket nlmsg_readpriv; |
diff --git a/recipes-security/refpolicy/refpolicy/0032-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch b/recipes-security/refpolicy/refpolicy/0032-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch index 8af397d..77d59b8 100644 --- a/recipes-security/refpolicy/refpolicy/0032-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch +++ b/recipes-security/refpolicy/refpolicy/0032-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 857a2cf93f6194d04ae8d2a8a544422e8a021e85 Mon Sep 17 00:00:00 2001 | 1 | From 81222e113818c210d4c2a65567d0b464f96b0523 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] policy/modules/kernel/terminal: don't audit tty_device_t in | 4 | Subject: [PATCH] policy/modules/kernel/terminal: don't audit tty_device_t in |
diff --git a/recipes-security/refpolicy/refpolicy/0033-policy-modules-system-systemd-enable-support-for-sys.patch b/recipes-security/refpolicy/refpolicy/0033-policy-modules-system-systemd-enable-support-for-sys.patch index 82fe4ff..0ffd2f7 100644 --- a/recipes-security/refpolicy/refpolicy/0033-policy-modules-system-systemd-enable-support-for-sys.patch +++ b/recipes-security/refpolicy/refpolicy/0033-policy-modules-system-systemd-enable-support-for-sys.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 44fe25734126ae52d95456992d6a5257bb28a5c2 Mon Sep 17 00:00:00 2001 | 1 | From 1c992963d7006927a79c9009c372ab9593b5bb95 Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Thu, 4 Feb 2016 06:03:19 -0500 | 3 | Date: Thu, 4 Feb 2016 06:03:19 -0500 |
4 | Subject: [PATCH] policy/modules/system/systemd: enable support for | 4 | Subject: [PATCH] policy/modules/system/systemd: enable support for |
@@ -29,7 +29,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
29 | 1 file changed, 1 insertion(+), 1 deletion(-) | 29 | 1 file changed, 1 insertion(+), 1 deletion(-) |
30 | 30 | ||
31 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | 31 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te |
32 | index d58aba30b..8ae917644 100644 | 32 | index 523e49f14..e48a8c26f 100644 |
33 | --- a/policy/modules/system/systemd.te | 33 | --- a/policy/modules/system/systemd.te |
34 | +++ b/policy/modules/system/systemd.te | 34 | +++ b/policy/modules/system/systemd.te |
35 | @@ -10,7 +10,7 @@ policy_module(systemd) | 35 | @@ -10,7 +10,7 @@ policy_module(systemd) |
diff --git a/recipes-security/refpolicy/refpolicy/0034-policy-modules-system-logging-allow-systemd-tmpfiles.patch b/recipes-security/refpolicy/refpolicy/0034-policy-modules-system-logging-allow-systemd-tmpfiles.patch index 334872a..9c5b172 100644 --- a/recipes-security/refpolicy/refpolicy/0034-policy-modules-system-logging-allow-systemd-tmpfiles.patch +++ b/recipes-security/refpolicy/refpolicy/0034-policy-modules-system-logging-allow-systemd-tmpfiles.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 07582b5efbc4fd199e80d9cc9b8144e4c88e0a2b Mon Sep 17 00:00:00 2001 | 1 | From 803bb22683f9265837d0a0713d1f49003eb33ac8 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Sat, 30 Sep 2023 17:20:29 +0800 | 3 | Date: Sat, 30 Sep 2023 17:20:29 +0800 |
4 | Subject: [PATCH] policy/modules/system/logging: allow systemd-tmpfiles to | 4 | Subject: [PATCH] policy/modules/system/logging: allow systemd-tmpfiles to |
@@ -24,7 +24,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
24 | 1 file changed, 4 insertions(+) | 24 | 1 file changed, 4 insertions(+) |
25 | 25 | ||
26 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 26 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
27 | index 3ffddcb0a..df6095805 100644 | 27 | index a1912254e..481ae9d14 100644 |
28 | --- a/policy/modules/system/logging.te | 28 | --- a/policy/modules/system/logging.te |
29 | +++ b/policy/modules/system/logging.te | 29 | +++ b/policy/modules/system/logging.te |
30 | @@ -27,6 +27,10 @@ type auditd_log_t; | 30 | @@ -27,6 +27,10 @@ type auditd_log_t; |
diff --git a/recipes-security/refpolicy/refpolicy/0036-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch b/recipes-security/refpolicy/refpolicy/0035-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch index 3461d66..e0feada 100644 --- a/recipes-security/refpolicy/refpolicy/0036-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch +++ b/recipes-security/refpolicy/refpolicy/0035-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From be2a2d244fd95e4207986fa095988a02cb33cb32 Mon Sep 17 00:00:00 2001 | 1 | From c89141ec6fc96e304a8dac16fa5f4e45fa802201 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 28 Oct 2022 11:56:09 +0800 | 3 | Date: Fri, 28 Oct 2022 11:56:09 +0800 |
4 | Subject: [PATCH] policy/modules/roles/sysadm: allow sysadm to use init file | 4 | Subject: [PATCH] policy/modules/roles/sysadm: allow sysadm to use init file |
@@ -19,7 +19,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
19 | 1 file changed, 2 insertions(+) | 19 | 1 file changed, 2 insertions(+) |
20 | 20 | ||
21 | diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te | 21 | diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te |
22 | index 69777df20..af5ccca9d 100644 | 22 | index acf2c67ae..0c96829a9 100644 |
23 | --- a/policy/modules/roles/sysadm.te | 23 | --- a/policy/modules/roles/sysadm.te |
24 | +++ b/policy/modules/roles/sysadm.te | 24 | +++ b/policy/modules/roles/sysadm.te |
25 | @@ -95,6 +95,8 @@ ifdef(`init_systemd',` | 25 | @@ -95,6 +95,8 @@ ifdef(`init_systemd',` |
diff --git a/recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-allow-systemd_logind_t.patch b/recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-allow-systemd_logind_t.patch deleted file mode 100644 index 39902dd..0000000 --- a/recipes-security/refpolicy/refpolicy/0035-policy-modules-system-systemd-allow-systemd_logind_t.patch +++ /dev/null | |||
@@ -1,43 +0,0 @@ | |||
1 | From 13ad5906311d8e0be5547326c106d9b5ce8481ab Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Sat, 18 Dec 2021 09:26:43 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/systemd: allow systemd_logind_t to read | ||
5 | the process state of all domains | ||
6 | |||
7 | We encountered the following su runtime error: | ||
8 | $ useradd user1 | ||
9 | $ passwd user1 | ||
10 | New password: | ||
11 | Retype new password: | ||
12 | passwd: password updated successfully | ||
13 | $ su - user1 | ||
14 | Session terminated, terminating shell...Hangup | ||
15 | |||
16 | Fixes: | ||
17 | avc: denied { use } for pid=344 comm="su" | ||
18 | path="/run/systemd/sessions/c4.ref" dev="tmpfs" ino=661 | ||
19 | scontext=root:sysadm_r:sysadm_su_t | ||
20 | tcontext=system_u:system_r:systemd_logind_t tclass=fd permissive=0 | ||
21 | |||
22 | Upstream-Status: Pending | ||
23 | |||
24 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
25 | --- | ||
26 | policy/modules/system/systemd.te | 1 + | ||
27 | 1 file changed, 1 insertion(+) | ||
28 | |||
29 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
30 | index 8ae917644..9375e8926 100644 | ||
31 | --- a/policy/modules/system/systemd.te | ||
32 | +++ b/policy/modules/system/systemd.te | ||
33 | @@ -1056,6 +1056,7 @@ userdom_relabelfrom_user_runtime_dirs(systemd_logind_t) | ||
34 | userdom_relabelto_user_runtime_dirs(systemd_logind_t) | ||
35 | userdom_setattr_user_ttys(systemd_logind_t) | ||
36 | userdom_use_user_ttys(systemd_logind_t) | ||
37 | +domain_read_all_domains_state(systemd_logind_t) | ||
38 | |||
39 | # Needed to work around patch not yet merged into the systemd-logind supported on RHEL 7.x | ||
40 | # The change in systemd by Nicolas Iooss on 02-Feb-2016 with hash 4b51966cf6c06250036e428608da92f8640beb96 | ||
41 | -- | ||
42 | 2.25.1 | ||
43 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0037-policy-modules-system-systemd-systemd-user-fixes.patch b/recipes-security/refpolicy/refpolicy/0036-policy-modules-system-systemd-systemd-user-fixes.patch index 02e7541..fb3146a 100644 --- a/recipes-security/refpolicy/refpolicy/0037-policy-modules-system-systemd-systemd-user-fixes.patch +++ b/recipes-security/refpolicy/refpolicy/0036-policy-modules-system-systemd-systemd-user-fixes.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d57677139a8fc837ede3430986bea0c42f49fc97 Mon Sep 17 00:00:00 2001 | 1 | From b2271a808dcc39a199729cbc3884577a5359bb63 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Thu, 4 Feb 2021 10:48:54 +0800 | 3 | Date: Thu, 4 Feb 2021 10:48:54 +0800 |
4 | Subject: [PATCH] policy/modules/system/systemd: systemd --user fixes | 4 | Subject: [PATCH] policy/modules/system/systemd: systemd --user fixes |
@@ -31,10 +31,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
31 | 2 files changed, 34 insertions(+) | 31 | 2 files changed, 34 insertions(+) |
32 | 32 | ||
33 | diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if | 33 | diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if |
34 | index e62e8344a..96b5d31b4 100644 | 34 | index 0f92c23bd..1ae6195a1 100644 |
35 | --- a/policy/modules/system/systemd.if | 35 | --- a/policy/modules/system/systemd.if |
36 | +++ b/policy/modules/system/systemd.if | 36 | +++ b/policy/modules/system/systemd.if |
37 | @@ -230,6 +230,36 @@ template(`systemd_role_template',` | 37 | @@ -236,6 +236,36 @@ template(`systemd_role_template',` |
38 | ') | 38 | ') |
39 | ') | 39 | ') |
40 | 40 | ||
@@ -72,7 +72,7 @@ index e62e8344a..96b5d31b4 100644 | |||
72 | ## <summary> | 72 | ## <summary> |
73 | ## Allow the specified domain to be started as a daemon by the | 73 | ## Allow the specified domain to be started as a daemon by the |
74 | diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if | 74 | diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if |
75 | index 73bb7c410..ea7a90a5d 100644 | 75 | index 677bad480..d2e5feda7 100644 |
76 | --- a/policy/modules/system/userdomain.if | 76 | --- a/policy/modules/system/userdomain.if |
77 | +++ b/policy/modules/system/userdomain.if | 77 | +++ b/policy/modules/system/userdomain.if |
78 | @@ -1467,6 +1467,10 @@ template(`userdom_admin_user_template',` | 78 | @@ -1467,6 +1467,10 @@ template(`userdom_admin_user_template',` |
diff --git a/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-logging-grant-getpcap-capabili.patch b/recipes-security/refpolicy/refpolicy/0037-policy-modules-system-logging-grant-getpcap-capabili.patch index 3f8d1bd..8885851 100644 --- a/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-logging-grant-getpcap-capabili.patch +++ b/recipes-security/refpolicy/refpolicy/0037-policy-modules-system-logging-grant-getpcap-capabili.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c54c53f8765c4401aa4c1b4a6204c8b538c008ad Mon Sep 17 00:00:00 2001 | 1 | From 74f4dd3dfdd0356171a7ce08c5d5c797c57dbe4a Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Tue, 28 May 2024 11:21:48 +0800 | 3 | Date: Tue, 28 May 2024 11:21:48 +0800 |
4 | Subject: [PATCH] policy/modules/system/logging: grant getpcap capability to | 4 | Subject: [PATCH] policy/modules/system/logging: grant getpcap capability to |
@@ -21,7 +21,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
21 | 1 file changed, 2 insertions(+) | 21 | 1 file changed, 2 insertions(+) |
22 | 22 | ||
23 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 23 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
24 | index df6095805..086498936 100644 | 24 | index 481ae9d14..be602fc7f 100644 |
25 | --- a/policy/modules/system/logging.te | 25 | --- a/policy/modules/system/logging.te |
26 | +++ b/policy/modules/system/logging.te | 26 | +++ b/policy/modules/system/logging.te |
27 | @@ -402,6 +402,8 @@ optional_policy(` | 27 | @@ -402,6 +402,8 @@ optional_policy(` |
diff --git a/recipes-security/refpolicy/refpolicy/0039-policy-modules-system-allow-services-to-read-tmpfs-u.patch b/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-allow-services-to-read-tmpfs-u.patch index 1324a17..b4b8291 100644 --- a/recipes-security/refpolicy/refpolicy/0039-policy-modules-system-allow-services-to-read-tmpfs-u.patch +++ b/recipes-security/refpolicy/refpolicy/0038-policy-modules-system-allow-services-to-read-tmpfs-u.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 33bc8d28c406ffd7a6aef2f390734b3f5bdfc5a3 Mon Sep 17 00:00:00 2001 | 1 | From 0047cbb8997d9d36613dcee9b60430fa44025713 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Fri, 30 Aug 2024 12:39:48 +0800 | 3 | Date: Fri, 30 Aug 2024 12:39:48 +0800 |
4 | Subject: [PATCH] policy/modules/system: allow services to read tmpfs under | 4 | Subject: [PATCH] policy/modules/system: allow services to read tmpfs under |
@@ -67,7 +67,7 @@ index a900226bf..75b94785b 100644 | |||
67 | mcs_process_set_categories(getty_t) | 67 | mcs_process_set_categories(getty_t) |
68 | 68 | ||
69 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 69 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
70 | index 086498936..dca46f105 100644 | 70 | index be602fc7f..dbb9c62c9 100644 |
71 | --- a/policy/modules/system/logging.te | 71 | --- a/policy/modules/system/logging.te |
72 | +++ b/policy/modules/system/logging.te | 72 | +++ b/policy/modules/system/logging.te |
73 | @@ -491,6 +491,7 @@ files_read_kernel_symbol_table(syslogd_t) | 73 | @@ -491,6 +491,7 @@ files_read_kernel_symbol_table(syslogd_t) |
@@ -79,10 +79,10 @@ index 086498936..dca46f105 100644 | |||
79 | 79 | ||
80 | mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories | 80 | mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories |
81 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | 81 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te |
82 | index 9375e8926..24fc90838 100644 | 82 | index e48a8c26f..23f7a6027 100644 |
83 | --- a/policy/modules/system/systemd.te | 83 | --- a/policy/modules/system/systemd.te |
84 | +++ b/policy/modules/system/systemd.te | 84 | +++ b/policy/modules/system/systemd.te |
85 | @@ -1294,6 +1294,7 @@ files_watch_root_dirs(systemd_networkd_t) | 85 | @@ -1332,6 +1332,7 @@ files_watch_root_dirs(systemd_networkd_t) |
86 | files_list_runtime(systemd_networkd_t) | 86 | files_list_runtime(systemd_networkd_t) |
87 | 87 | ||
88 | fs_getattr_all_fs(systemd_networkd_t) | 88 | fs_getattr_all_fs(systemd_networkd_t) |
@@ -91,7 +91,7 @@ index 9375e8926..24fc90838 100644 | |||
91 | fs_read_nsfs_files(systemd_networkd_t) | 91 | fs_read_nsfs_files(systemd_networkd_t) |
92 | fs_watch_memory_pressure(systemd_networkd_t) | 92 | fs_watch_memory_pressure(systemd_networkd_t) |
93 | diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te | 93 | diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te |
94 | index b2e43aa7d..f543a48d2 100644 | 94 | index 620de7e2e..ccb073351 100644 |
95 | --- a/policy/modules/system/udev.te | 95 | --- a/policy/modules/system/udev.te |
96 | +++ b/policy/modules/system/udev.te | 96 | +++ b/policy/modules/system/udev.te |
97 | @@ -142,6 +142,7 @@ files_dontaudit_getattr_tmp_dirs(udev_t) | 97 | @@ -142,6 +142,7 @@ files_dontaudit_getattr_tmp_dirs(udev_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0040-policy-modules-kernel-domain-allow-all-domains-to-co.patch b/recipes-security/refpolicy/refpolicy/0039-policy-modules-kernel-domain-allow-all-domains-to-co.patch index e9d9114..a2238b5 100644 --- a/recipes-security/refpolicy/refpolicy/0040-policy-modules-kernel-domain-allow-all-domains-to-co.patch +++ b/recipes-security/refpolicy/refpolicy/0039-policy-modules-kernel-domain-allow-all-domains-to-co.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 58adf54a5ef927cda85c11e2c73151d6e91e8294 Mon Sep 17 00:00:00 2001 | 1 | From 975472091496c8f6ed6544dd307672ccb97cf958 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Thu, 3 Oct 2024 21:12:33 +0800 | 3 | Date: Thu, 3 Oct 2024 21:12:33 +0800 |
4 | Subject: [PATCH] policy/modules/kernel/domain: allow all domains to connect to | 4 | Subject: [PATCH] policy/modules/kernel/domain: allow all domains to connect to |
diff --git a/recipes-security/refpolicy/refpolicy/0040-systemd-allow-systemd-logind-to-inherit-fds.patch b/recipes-security/refpolicy/refpolicy/0040-systemd-allow-systemd-logind-to-inherit-fds.patch new file mode 100644 index 0000000..0010a1f --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0040-systemd-allow-systemd-logind-to-inherit-fds.patch | |||
@@ -0,0 +1,68 @@ | |||
1 | From 9627b5cad0230bc937ba1f2901985afbbc8fcff6 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Tue, 18 Feb 2025 09:54:06 +0800 | ||
4 | Subject: [PATCH] systemd: allow systemd-logind to inherit fds | ||
5 | |||
6 | Fix the timeout issue after exiting su environment: | ||
7 | root@qemux86-64:~# su - user1 | ||
8 | qemux86-64:~$ exit | ||
9 | logout | ||
10 | root@qemux86-64:~# reboot | ||
11 | Failed to set wall message, ignoring: Connection timed out | ||
12 | Call to Reboot failed: Connection timed out | ||
13 | |||
14 | Upstream-Status: Pending | ||
15 | |||
16 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
17 | --- | ||
18 | policy/modules/admin/su.if | 4 ++++ | ||
19 | policy/modules/system/systemd.if | 18 ++++++++++++++++++ | ||
20 | 2 files changed, 22 insertions(+) | ||
21 | |||
22 | diff --git a/policy/modules/admin/su.if b/policy/modules/admin/su.if | ||
23 | index ebb7ef0e0..0398ce6fd 100644 | ||
24 | --- a/policy/modules/admin/su.if | ||
25 | +++ b/policy/modules/admin/su.if | ||
26 | @@ -232,6 +232,10 @@ template(`su_role_template',` | ||
27 | auth_use_pam_systemd($1_su_t) | ||
28 | ') | ||
29 | |||
30 | + ifdef(`init_systemd',` | ||
31 | + systemd_inherit_logind_fds($1_su_t) | ||
32 | + ') | ||
33 | + | ||
34 | tunable_policy(`su_allow_user_exec_domains',` | ||
35 | allow $3 $1_su_t:process signal; | ||
36 | |||
37 | diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if | ||
38 | index 1ae6195a1..99318a3c2 100644 | ||
39 | --- a/policy/modules/system/systemd.if | ||
40 | +++ b/policy/modules/system/systemd.if | ||
41 | @@ -1439,6 +1439,24 @@ interface(`systemd_use_logind_fds',` | ||
42 | allow $1 systemd_logind_t:fd use; | ||
43 | ') | ||
44 | |||
45 | +###################################### | ||
46 | +## <summary> | ||
47 | +## Allow systemd logind to inherit fds | ||
48 | +## </summary> | ||
49 | +## <param name="domain"> | ||
50 | +## <summary> | ||
51 | +## Domain allowed access. | ||
52 | +## </summary> | ||
53 | +## </param> | ||
54 | +# | ||
55 | +interface(`systemd_inherit_logind_fds',` | ||
56 | + gen_require(` | ||
57 | + type systemd_logind_t; | ||
58 | + ') | ||
59 | + | ||
60 | + allow systemd_logind_t $1:fd use; | ||
61 | +') | ||
62 | + | ||
63 | ###################################### | ||
64 | ## <summary> | ||
65 | ## Watch logind sessions dirs. | ||
66 | -- | ||
67 | 2.25.1 | ||
68 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0041-systemd-allow-systemd-tmpfiles-to-read-bin_t-symlink.patch b/recipes-security/refpolicy/refpolicy/0041-systemd-allow-systemd-tmpfiles-to-read-bin_t-symlink.patch new file mode 100644 index 0000000..f3833a4 --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0041-systemd-allow-systemd-tmpfiles-to-read-bin_t-symlink.patch | |||
@@ -0,0 +1,107 @@ | |||
1 | From a39879ca482b525ae2b48bf8708615c923df0575 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yi Zhao <yi.zhao@windriver.com> | ||
3 | Date: Tue, 18 Feb 2025 15:26:19 +0800 | ||
4 | Subject: [PATCH] systemd: allow systemd-tmpfiles to read bin_t symlink | ||
5 | |||
6 | Fixes: | ||
7 | avc: denied { getattr } for pid=279 comm="systemd-tmpfile" | ||
8 | path="/etc/profile.d/70-systemd-shell-extra.sh" dev="vda" ino=172 | ||
9 | scontext=system_u:system_r:systemd_tmpfiles_t | ||
10 | tcontext=system_u:object_r:bin_t tclass=lnk_file permissive=0 | ||
11 | |||
12 | Feb 17 10:16:25 qemux86-64 systemd-tmpfiles[279]: Failed to | ||
13 | fstat(/etc/profile.d/70-systemd-shell-extra.sh): Permission denied | ||
14 | |||
15 | Upstream-Status: Pending | ||
16 | |||
17 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
18 | --- | ||
19 | policy/modules/kernel/corecommands.fc | 1 + | ||
20 | policy/modules/kernel/corecommands.if | 18 ++++++++++++++++++ | ||
21 | policy/modules/system/systemd.if | 1 + | ||
22 | policy/modules/system/systemd.te | 5 +++++ | ||
23 | 4 files changed, 25 insertions(+) | ||
24 | |||
25 | diff --git a/policy/modules/kernel/corecommands.fc b/policy/modules/kernel/corecommands.fc | ||
26 | index 65178ba32..c7e3d2dae 100644 | ||
27 | --- a/policy/modules/kernel/corecommands.fc | ||
28 | +++ b/policy/modules/kernel/corecommands.fc | ||
29 | @@ -241,6 +241,7 @@ ifdef(`distro_gentoo',` | ||
30 | /usr/lib/sftp-server -- gen_context(system_u:object_r:bin_t,s0) | ||
31 | /usr/lib/ssh(/.*)? gen_context(system_u:object_r:bin_t,s0) | ||
32 | /usr/lib/sudo/sesh -- gen_context(system_u:object_r:shell_exec_t,s0) | ||
33 | +/usr/lib/systemd/profile\.d(/.*)? gen_context(system_u:object_r:bin_t,s0) | ||
34 | /usr/lib/systemd/systemd.* -- gen_context(system_u:object_r:bin_t,s0) | ||
35 | /usr/lib/systemd/system-shutdown(/.*)? gen_context(system_u:object_r:bin_t,s0) | ||
36 | /usr/lib/systemd/system-sleep(/.*)? gen_context(system_u:object_r:bin_t,s0) | ||
37 | diff --git a/policy/modules/kernel/corecommands.if b/policy/modules/kernel/corecommands.if | ||
38 | index 08ed91f19..0fa4cbf7d 100644 | ||
39 | --- a/policy/modules/kernel/corecommands.if | ||
40 | +++ b/policy/modules/kernel/corecommands.if | ||
41 | @@ -842,3 +842,21 @@ interface(`corecmd_mmap_all_executables',` | ||
42 | corecmd_search_bin($1) | ||
43 | mmap_exec_files_pattern($1, bin_t, exec_type) | ||
44 | ') | ||
45 | + | ||
46 | +######################################## | ||
47 | +## <summary> | ||
48 | +## Read symbolic links of bin_t files. | ||
49 | +## </summary> | ||
50 | +## <param name="domain"> | ||
51 | +## <summary> | ||
52 | +## Domain allowed access. | ||
53 | +## </summary> | ||
54 | +## </param> | ||
55 | +# | ||
56 | +interface(`fs_read_bin_symlinks',` | ||
57 | + gen_require(` | ||
58 | + type bin_t; | ||
59 | + ') | ||
60 | + | ||
61 | + read_lnk_files_pattern($1, bin_t, bin_t) | ||
62 | +') | ||
63 | diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if | ||
64 | index 99318a3c2..7654d1076 100644 | ||
65 | --- a/policy/modules/system/systemd.if | ||
66 | +++ b/policy/modules/system/systemd.if | ||
67 | @@ -146,6 +146,7 @@ template(`systemd_role_template',` | ||
68 | userdom_exec_user_bin_files($1_systemd_t) | ||
69 | |||
70 | # user systemd-tmpfiles rules | ||
71 | + allow $1_systemd_tmpfiles_t self:capability net_admin; | ||
72 | allow $1_systemd_tmpfiles_t $1_systemd_t:unix_stream_socket rw_socket_perms; | ||
73 | domtrans_pattern($1_systemd_t, systemd_tmpfiles_exec_t, $1_systemd_tmpfiles_t) | ||
74 | read_files_pattern($1_systemd_t, $1_systemd_tmpfiles_t, $1_systemd_tmpfiles_t) | ||
75 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
76 | index 23f7a6027..c605d58de 100644 | ||
77 | --- a/policy/modules/system/systemd.te | ||
78 | +++ b/policy/modules/system/systemd.te | ||
79 | @@ -817,6 +817,7 @@ files_read_etc_files(systemd_hostnamed_t) | ||
80 | files_read_etc_runtime_files(systemd_hostnamed_t) | ||
81 | |||
82 | fs_getattr_all_fs(systemd_hostnamed_t) | ||
83 | +fs_getattr_nsfs_files(systemd_hostnamed_t) | ||
84 | |||
85 | init_delete_runtime_files(systemd_hostnamed_t) | ||
86 | init_read_runtime_files(systemd_hostnamed_t) | ||
87 | @@ -1705,6 +1706,7 @@ manage_files_pattern(systemd_rfkill_t, systemd_rfkill_var_lib_t, systemd_rfkill_ | ||
88 | init_var_lib_filetrans(systemd_rfkill_t, systemd_rfkill_var_lib_t, dir) | ||
89 | |||
90 | fs_getattr_all_fs(systemd_rfkill_t) | ||
91 | +fs_getattr_nsfs_files(systemd_rfkill_t) | ||
92 | |||
93 | kernel_getattr_proc(systemd_rfkill_t) | ||
94 | kernel_read_kernel_sysctls(systemd_rfkill_t) | ||
95 | @@ -1930,6 +1932,9 @@ kernel_getattr_proc(systemd_tmpfiles_t) | ||
96 | kernel_read_kernel_sysctls(systemd_tmpfiles_t) | ||
97 | kernel_read_network_state(systemd_tmpfiles_t) | ||
98 | |||
99 | +# Allow to read bin_t symlink under /etc/profile.d/ | ||
100 | +fs_read_bin_symlinks(systemd_tmpfiles_t) | ||
101 | + | ||
102 | dev_getattr_fs(systemd_tmpfiles_t) | ||
103 | dev_manage_all_dev_nodes(systemd_tmpfiles_t) | ||
104 | dev_read_urand(systemd_tmpfiles_t) | ||
105 | -- | ||
106 | 2.25.1 | ||
107 | |||
diff --git a/recipes-security/refpolicy/refpolicy/0041-policy-modules-system-mount-make-mount_t-domain-MLS-.patch b/recipes-security/refpolicy/refpolicy/0042-policy-modules-system-mount-make-mount_t-domain-MLS-.patch index 93a52fd..43d4e83 100644 --- a/recipes-security/refpolicy/refpolicy/0041-policy-modules-system-mount-make-mount_t-domain-MLS-.patch +++ b/recipes-security/refpolicy/refpolicy/0042-policy-modules-system-mount-make-mount_t-domain-MLS-.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From fe5fe08deab5f02a3609e5333e09e5e3af05140a Mon Sep 17 00:00:00 2001 | 1 | From 87ebadc702f2e3de7c4a8470cffde09a53c8fb8f Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Sat, 15 Feb 2014 04:22:47 -0500 | 3 | Date: Sat, 15 Feb 2014 04:22:47 -0500 |
4 | Subject: [PATCH] policy/modules/system/mount: make mount_t domain MLS trusted | 4 | Subject: [PATCH] policy/modules/system/mount: make mount_t domain MLS trusted |
@@ -19,10 +19,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
19 | 1 file changed, 1 insertion(+) | 19 | 1 file changed, 1 insertion(+) |
20 | 20 | ||
21 | diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te | 21 | diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te |
22 | index d9e431a84..20d6aaba1 100644 | 22 | index c5727585c..71ff4efd1 100644 |
23 | --- a/policy/modules/system/mount.te | 23 | --- a/policy/modules/system/mount.te |
24 | +++ b/policy/modules/system/mount.te | 24 | +++ b/policy/modules/system/mount.te |
25 | @@ -118,6 +118,7 @@ fs_dontaudit_write_all_image_files(mount_t) | 25 | @@ -119,6 +119,7 @@ fs_dontaudit_write_all_image_files(mount_t) |
26 | 26 | ||
27 | mls_file_read_all_levels(mount_t) | 27 | mls_file_read_all_levels(mount_t) |
28 | mls_file_write_all_levels(mount_t) | 28 | mls_file_write_all_levels(mount_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0042-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch b/recipes-security/refpolicy/refpolicy/0043-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch index 2e7a206..079510c 100644 --- a/recipes-security/refpolicy/refpolicy/0042-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch +++ b/recipes-security/refpolicy/refpolicy/0043-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 7a0339aeba7cfe38b62c81ee4074446bba60e801 Mon Sep 17 00:00:00 2001 | 1 | From 4cb4afe1def20e106b0cbac0fb686c28a95ac6d7 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Mon, 28 Jan 2019 14:05:18 +0800 | 3 | Date: Mon, 28 Jan 2019 14:05:18 +0800 |
4 | Subject: [PATCH] policy/modules/roles/sysadm: MLS - sysadm rw to clearance | 4 | Subject: [PATCH] policy/modules/roles/sysadm: MLS - sysadm rw to clearance |
@@ -23,7 +23,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
23 | 1 file changed, 2 insertions(+) | 23 | 1 file changed, 2 insertions(+) |
24 | 24 | ||
25 | diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te | 25 | diff --git a/policy/modules/roles/sysadm.te b/policy/modules/roles/sysadm.te |
26 | index af5ccca9d..10cebdc53 100644 | 26 | index 0c96829a9..5fbcc7204 100644 |
27 | --- a/policy/modules/roles/sysadm.te | 27 | --- a/policy/modules/roles/sysadm.te |
28 | +++ b/policy/modules/roles/sysadm.te | 28 | +++ b/policy/modules/roles/sysadm.te |
29 | @@ -48,6 +48,8 @@ logging_watch_all_logs(sysadm_t) | 29 | @@ -48,6 +48,8 @@ logging_watch_all_logs(sysadm_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch b/recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch index e37db1b..63e32ec 100644 --- a/recipes-security/refpolicy/refpolicy/0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch +++ b/recipes-security/refpolicy/refpolicy/0044-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From a563f59fe223aa9c74df7a482b5da80ce05fbbf5 Mon Sep 17 00:00:00 2001 | 1 | From 7feb72e30444b314c0bf3ca400375b2486d0e7c9 Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Fri, 23 Aug 2013 12:01:53 +0800 | 3 | Date: Fri, 23 Aug 2013 12:01:53 +0800 |
4 | Subject: [PATCH] policy/modules/services/rpc: make nfsd_t domain MLS trusted | 4 | Subject: [PATCH] policy/modules/services/rpc: make nfsd_t domain MLS trusted |
@@ -15,10 +15,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
15 | 2 files changed, 7 insertions(+) | 15 | 2 files changed, 7 insertions(+) |
16 | 16 | ||
17 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te | 17 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te |
18 | index 8fd1875d3..6c35a2374 100644 | 18 | index 65c814a97..da264d081 100644 |
19 | --- a/policy/modules/kernel/kernel.te | 19 | --- a/policy/modules/kernel/kernel.te |
20 | +++ b/policy/modules/kernel/kernel.te | 20 | +++ b/policy/modules/kernel/kernel.te |
21 | @@ -381,6 +381,8 @@ mls_process_read_all_levels(kernel_t) | 21 | @@ -378,6 +378,8 @@ mls_process_read_all_levels(kernel_t) |
22 | mls_process_write_all_levels(kernel_t) | 22 | mls_process_write_all_levels(kernel_t) |
23 | mls_file_write_all_levels(kernel_t) | 23 | mls_file_write_all_levels(kernel_t) |
24 | mls_file_read_all_levels(kernel_t) | 24 | mls_file_read_all_levels(kernel_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0044-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch b/recipes-security/refpolicy/refpolicy/0045-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch index 7990e3f..9f53ba7 100644 --- a/recipes-security/refpolicy/refpolicy/0044-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch +++ b/recipes-security/refpolicy/refpolicy/0045-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 6bd19ab1f6adac7722ef35c70982efea04b5d91f Mon Sep 17 00:00:00 2001 | 1 | From 929d814365465704142aaa3eaa80abad6d03efde Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Tue, 30 Jun 2020 10:18:20 +0800 | 3 | Date: Tue, 30 Jun 2020 10:18:20 +0800 |
4 | Subject: [PATCH] policy/modules/admin/dmesg: make dmesg_t MLS trusted reading | 4 | Subject: [PATCH] policy/modules/admin/dmesg: make dmesg_t MLS trusted reading |
diff --git a/recipes-security/refpolicy/refpolicy/0045-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch b/recipes-security/refpolicy/refpolicy/0046-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch index cc603e6..2073395 100644 --- a/recipes-security/refpolicy/refpolicy/0045-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch +++ b/recipes-security/refpolicy/refpolicy/0046-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From a196f11f4a7f2f96cbf05614513204ca17aa0691 Mon Sep 17 00:00:00 2001 | 1 | From 6ebec2a77b771cfcac8a7320eae7a9abde7cfc3a Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Fri, 13 Oct 2017 07:20:40 +0000 | 3 | Date: Fri, 13 Oct 2017 07:20:40 +0000 |
4 | Subject: [PATCH] policy/modules/kernel/kernel: make kernel_t MLS trusted for | 4 | Subject: [PATCH] policy/modules/kernel/kernel: make kernel_t MLS trusted for |
@@ -59,10 +59,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
59 | 1 file changed, 2 insertions(+) | 59 | 1 file changed, 2 insertions(+) |
60 | 60 | ||
61 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te | 61 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te |
62 | index 6c35a2374..ebde22e02 100644 | 62 | index da264d081..e84bcf2b6 100644 |
63 | --- a/policy/modules/kernel/kernel.te | 63 | --- a/policy/modules/kernel/kernel.te |
64 | +++ b/policy/modules/kernel/kernel.te | 64 | +++ b/policy/modules/kernel/kernel.te |
65 | @@ -383,6 +383,8 @@ mls_file_write_all_levels(kernel_t) | 65 | @@ -380,6 +380,8 @@ mls_file_write_all_levels(kernel_t) |
66 | mls_file_read_all_levels(kernel_t) | 66 | mls_file_read_all_levels(kernel_t) |
67 | mls_socket_write_all_levels(kernel_t) | 67 | mls_socket_write_all_levels(kernel_t) |
68 | mls_fd_use_all_levels(kernel_t) | 68 | mls_fd_use_all_levels(kernel_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0046-policy-modules-system-init-make-init_t-MLS-trusted-f.patch b/recipes-security/refpolicy/refpolicy/0047-policy-modules-system-init-make-init_t-MLS-trusted-f.patch index 95896b2..85095df 100644 --- a/recipes-security/refpolicy/refpolicy/0046-policy-modules-system-init-make-init_t-MLS-trusted-f.patch +++ b/recipes-security/refpolicy/refpolicy/0047-policy-modules-system-init-make-init_t-MLS-trusted-f.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 777e396d61c3af7b847fcc9ebc490f1e5f3969b9 Mon Sep 17 00:00:00 2001 | 1 | From 93936c7a0cf671f463b5d3360c6c906df4028e33 Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Fri, 15 Jan 2016 03:47:05 -0500 | 3 | Date: Fri, 15 Jan 2016 03:47:05 -0500 |
4 | Subject: [PATCH] policy/modules/system/init: make init_t MLS trusted for | 4 | Subject: [PATCH] policy/modules/system/init: make init_t MLS trusted for |
@@ -27,10 +27,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
27 | 1 file changed, 4 insertions(+) | 27 | 1 file changed, 4 insertions(+) |
28 | 28 | ||
29 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te | 29 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te |
30 | index e724c295e..6ffdb547f 100644 | 30 | index 43d62b2e1..039272004 100644 |
31 | --- a/policy/modules/system/init.te | 31 | --- a/policy/modules/system/init.te |
32 | +++ b/policy/modules/system/init.te | 32 | +++ b/policy/modules/system/init.te |
33 | @@ -238,6 +238,10 @@ mls_process_write_all_levels(init_t) | 33 | @@ -239,6 +239,10 @@ mls_process_write_all_levels(init_t) |
34 | mls_fd_use_all_levels(init_t) | 34 | mls_fd_use_all_levels(init_t) |
35 | mls_process_set_level(init_t) | 35 | mls_process_set_level(init_t) |
36 | 36 | ||
diff --git a/recipes-security/refpolicy/refpolicy/0047-policy-modules-system-systemd-make-systemd-tmpfiles_.patch b/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-systemd-make-systemd-tmpfiles_.patch index 8b57c70..fd4d1fe 100644 --- a/recipes-security/refpolicy/refpolicy/0047-policy-modules-system-systemd-make-systemd-tmpfiles_.patch +++ b/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-systemd-make-systemd-tmpfiles_.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From f87ab013d4dffe5b588376b73c51fbfc5e9b1205 Mon Sep 17 00:00:00 2001 | 1 | From a698845641cf86d0cdcab4b014b14757fbc0a605 Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Thu, 4 Feb 2016 06:03:19 -0500 | 3 | Date: Thu, 4 Feb 2016 06:03:19 -0500 |
4 | Subject: [PATCH] policy/modules/system/systemd: make systemd-tmpfiles_t domain | 4 | Subject: [PATCH] policy/modules/system/systemd: make systemd-tmpfiles_t domain |
@@ -43,10 +43,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
43 | 1 file changed, 5 insertions(+) | 43 | 1 file changed, 5 insertions(+) |
44 | 44 | ||
45 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | 45 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te |
46 | index 24fc90838..dc3badece 100644 | 46 | index c605d58de..fb75c2f45 100644 |
47 | --- a/policy/modules/system/systemd.te | 47 | --- a/policy/modules/system/systemd.te |
48 | +++ b/policy/modules/system/systemd.te | 48 | +++ b/policy/modules/system/systemd.te |
49 | @@ -1970,6 +1970,11 @@ sysnet_relabel_config(systemd_tmpfiles_t) | 49 | @@ -2024,6 +2024,11 @@ sysnet_relabel_config(systemd_tmpfiles_t) |
50 | 50 | ||
51 | systemd_log_parse_environment(systemd_tmpfiles_t) | 51 | systemd_log_parse_environment(systemd_tmpfiles_t) |
52 | 52 | ||
diff --git a/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-systemd-systemd-make-systemd_-.patch b/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-systemd-systemd-make-systemd_-.patch index c4b799e..c8cf04a 100644 --- a/recipes-security/refpolicy/refpolicy/0048-policy-modules-system-systemd-systemd-make-systemd_-.patch +++ b/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-systemd-systemd-make-systemd_-.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ec080f2b0b18b29e46bded08a0880624e5380026 Mon Sep 17 00:00:00 2001 | 1 | From f70cd58e286d417f9024b23056234038629bb75f Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Thu, 18 Jun 2020 09:59:58 +0800 | 3 | Date: Thu, 18 Jun 2020 09:59:58 +0800 |
4 | Subject: [PATCH] policy/modules/system/systemd: systemd-*: make systemd_*_t | 4 | Subject: [PATCH] policy/modules/system/systemd: systemd-*: make systemd_*_t |
@@ -43,10 +43,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
43 | 1 file changed, 12 insertions(+) | 43 | 1 file changed, 12 insertions(+) |
44 | 44 | ||
45 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | 45 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te |
46 | index dc3badece..0440b4795 100644 | 46 | index fb75c2f45..45d4db784 100644 |
47 | --- a/policy/modules/system/systemd.te | 47 | --- a/policy/modules/system/systemd.te |
48 | +++ b/policy/modules/system/systemd.te | 48 | +++ b/policy/modules/system/systemd.te |
49 | @@ -430,6 +430,9 @@ files_search_var_lib(systemd_backlight_t) | 49 | @@ -439,6 +439,9 @@ files_search_var_lib(systemd_backlight_t) |
50 | fs_getattr_all_fs(systemd_backlight_t) | 50 | fs_getattr_all_fs(systemd_backlight_t) |
51 | fs_search_cgroup_dirs(systemd_backlight_t) | 51 | fs_search_cgroup_dirs(systemd_backlight_t) |
52 | 52 | ||
@@ -56,7 +56,7 @@ index dc3badece..0440b4795 100644 | |||
56 | ####################################### | 56 | ####################################### |
57 | # | 57 | # |
58 | # Binfmt local policy | 58 | # Binfmt local policy |
59 | @@ -603,6 +606,9 @@ term_use_unallocated_ttys(systemd_generator_t) | 59 | @@ -616,6 +619,9 @@ term_use_unallocated_ttys(systemd_generator_t) |
60 | 60 | ||
61 | udev_read_runtime_files(systemd_generator_t) | 61 | udev_read_runtime_files(systemd_generator_t) |
62 | 62 | ||
@@ -66,9 +66,9 @@ index dc3badece..0440b4795 100644 | |||
66 | ifdef(`distro_gentoo',` | 66 | ifdef(`distro_gentoo',` |
67 | corecmd_shell_entry_type(systemd_generator_t) | 67 | corecmd_shell_entry_type(systemd_generator_t) |
68 | ') | 68 | ') |
69 | @@ -1058,6 +1064,9 @@ userdom_setattr_user_ttys(systemd_logind_t) | 69 | @@ -1093,6 +1099,9 @@ userdom_relabelto_user_runtime_dirs(systemd_logind_t) |
70 | userdom_setattr_user_ttys(systemd_logind_t) | ||
70 | userdom_use_user_ttys(systemd_logind_t) | 71 | userdom_use_user_ttys(systemd_logind_t) |
71 | domain_read_all_domains_state(systemd_logind_t) | ||
72 | 72 | ||
73 | +mls_file_read_all_levels(systemd_logind_t) | 73 | +mls_file_read_all_levels(systemd_logind_t) |
74 | +mls_file_write_all_levels(systemd_logind_t) | 74 | +mls_file_write_all_levels(systemd_logind_t) |
@@ -76,7 +76,7 @@ index dc3badece..0440b4795 100644 | |||
76 | # Needed to work around patch not yet merged into the systemd-logind supported on RHEL 7.x | 76 | # Needed to work around patch not yet merged into the systemd-logind supported on RHEL 7.x |
77 | # The change in systemd by Nicolas Iooss on 02-Feb-2016 with hash 4b51966cf6c06250036e428608da92f8640beb96 | 77 | # The change in systemd by Nicolas Iooss on 02-Feb-2016 with hash 4b51966cf6c06250036e428608da92f8640beb96 |
78 | # should fix the problem where user directories in /run/user/$UID/ are not getting the proper context | 78 | # should fix the problem where user directories in /run/user/$UID/ are not getting the proper context |
79 | @@ -1681,6 +1690,9 @@ udev_read_runtime_files(systemd_rfkill_t) | 79 | @@ -1722,6 +1731,9 @@ udev_read_runtime_files(systemd_rfkill_t) |
80 | 80 | ||
81 | systemd_log_parse_environment(systemd_rfkill_t) | 81 | systemd_log_parse_environment(systemd_rfkill_t) |
82 | 82 | ||
diff --git a/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch b/recipes-security/refpolicy/refpolicy/0050-policy-modules-system-logging-add-the-syslogd_t-to-t.patch index 06e4775..4b70735 100644 --- a/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch +++ b/recipes-security/refpolicy/refpolicy/0050-policy-modules-system-logging-add-the-syslogd_t-to-t.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 564d43016ed6dcbadb7a7203d8d639d0c782d4e7 Mon Sep 17 00:00:00 2001 | 1 | From 25be898844c76cba143de013c05966258e0ec98d Mon Sep 17 00:00:00 2001 |
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | 2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> |
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | 3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 |
4 | Subject: [PATCH] policy/modules/system/logging: add the syslogd_t to trusted | 4 | Subject: [PATCH] policy/modules/system/logging: add the syslogd_t to trusted |
@@ -18,7 +18,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
18 | 1 file changed, 3 insertions(+) | 18 | 1 file changed, 3 insertions(+) |
19 | 19 | ||
20 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 20 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
21 | index dca46f105..cedcaeb36 100644 | 21 | index dbb9c62c9..9659937fe 100644 |
22 | --- a/policy/modules/system/logging.te | 22 | --- a/policy/modules/system/logging.te |
23 | +++ b/policy/modules/system/logging.te | 23 | +++ b/policy/modules/system/logging.te |
24 | @@ -495,6 +495,9 @@ fs_list_tmpfs(syslogd_t) | 24 | @@ -495,6 +495,9 @@ fs_list_tmpfs(syslogd_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0050-policy-modules-system-init-make-init_t-MLS-trusted-f.patch b/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-make-init_t-MLS-trusted-f.patch index 1a0aded..179fc54 100644 --- a/recipes-security/refpolicy/refpolicy/0050-policy-modules-system-init-make-init_t-MLS-trusted-f.patch +++ b/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-make-init_t-MLS-trusted-f.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c49b89d2a6cfc33c0e6fe6347609fea09ae7fe2e Mon Sep 17 00:00:00 2001 | 1 | From ba07393b28fd2459a6ae7e4c50a48d1ee954360e Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Tue, 28 May 2019 16:41:37 +0800 | 3 | Date: Tue, 28 May 2019 16:41:37 +0800 |
4 | Subject: [PATCH] policy/modules/system/init: make init_t MLS trusted for | 4 | Subject: [PATCH] policy/modules/system/init: make init_t MLS trusted for |
@@ -17,10 +17,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
17 | 1 file changed, 1 insertion(+) | 17 | 1 file changed, 1 insertion(+) |
18 | 18 | ||
19 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te | 19 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te |
20 | index 6ffdb547f..8bd8e2f63 100644 | 20 | index 039272004..0a7add4b7 100644 |
21 | --- a/policy/modules/system/init.te | 21 | --- a/policy/modules/system/init.te |
22 | +++ b/policy/modules/system/init.te | 22 | +++ b/policy/modules/system/init.te |
23 | @@ -237,6 +237,7 @@ mls_file_write_all_levels(init_t) | 23 | @@ -238,6 +238,7 @@ mls_file_write_all_levels(init_t) |
24 | mls_process_write_all_levels(init_t) | 24 | mls_process_write_all_levels(init_t) |
25 | mls_fd_use_all_levels(init_t) | 25 | mls_fd_use_all_levels(init_t) |
26 | mls_process_set_level(init_t) | 26 | mls_process_set_level(init_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-init-all-init_t-to-read-any-le.patch index a362c4b..afce2c0 100644 --- a/recipes-security/refpolicy/refpolicy/0051-policy-modules-system-init-all-init_t-to-read-any-le.patch +++ b/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-init-all-init_t-to-read-any-le.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From f8b5f66dd987609027d8e0381338e39b52a47138 Mon Sep 17 00:00:00 2001 | 1 | From a01c52188566c4148862076dae90baa265e985df Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Wed, 3 Feb 2016 04:16:06 -0500 | 3 | Date: Wed, 3 Feb 2016 04:16:06 -0500 |
4 | Subject: [PATCH] policy/modules/system/init: all init_t to read any level | 4 | Subject: [PATCH] policy/modules/system/init: all init_t to read any level |
@@ -22,10 +22,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
22 | 1 file changed, 3 insertions(+) | 22 | 1 file changed, 3 insertions(+) |
23 | 23 | ||
24 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te | 24 | diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te |
25 | index 8bd8e2f63..8af34aa7e 100644 | 25 | index 0a7add4b7..7df44cead 100644 |
26 | --- a/policy/modules/system/init.te | 26 | --- a/policy/modules/system/init.te |
27 | +++ b/policy/modules/system/init.te | 27 | +++ b/policy/modules/system/init.te |
28 | @@ -243,6 +243,9 @@ mls_key_write_all_levels(init_t) | 28 | @@ -244,6 +244,9 @@ mls_key_write_all_levels(init_t) |
29 | mls_file_downgrade(init_t) | 29 | mls_file_downgrade(init_t) |
30 | mls_file_upgrade(init_t) | 30 | mls_file_upgrade(init_t) |
31 | 31 | ||
diff --git a/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch b/recipes-security/refpolicy/refpolicy/0053-policy-modules-system-logging-allow-auditd_t-to-writ.patch index a5a368b..ce77779 100644 --- a/recipes-security/refpolicy/refpolicy/0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch +++ b/recipes-security/refpolicy/refpolicy/0053-policy-modules-system-logging-allow-auditd_t-to-writ.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d6573102f922b0e08d49cb5582612dfbaae10600 Mon Sep 17 00:00:00 2001 | 1 | From dfc4e8ef225a6ce97ef4862b608228440d099863 Mon Sep 17 00:00:00 2001 |
2 | From: Wenzong Fan <wenzong.fan@windriver.com> | 2 | From: Wenzong Fan <wenzong.fan@windriver.com> |
3 | Date: Thu, 25 Feb 2016 04:25:08 -0500 | 3 | Date: Thu, 25 Feb 2016 04:25:08 -0500 |
4 | Subject: [PATCH] policy/modules/system/logging: allow auditd_t to write socket | 4 | Subject: [PATCH] policy/modules/system/logging: allow auditd_t to write socket |
@@ -22,7 +22,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
22 | 1 file changed, 2 insertions(+) | 22 | 1 file changed, 2 insertions(+) |
23 | 23 | ||
24 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 24 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
25 | index cedcaeb36..1b181f7cc 100644 | 25 | index 9659937fe..2c733c0f2 100644 |
26 | --- a/policy/modules/system/logging.te | 26 | --- a/policy/modules/system/logging.te |
27 | +++ b/policy/modules/system/logging.te | 27 | +++ b/policy/modules/system/logging.te |
28 | @@ -236,6 +236,8 @@ miscfiles_read_localization(auditd_t) | 28 | @@ -236,6 +236,8 @@ miscfiles_read_localization(auditd_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0053-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch b/recipes-security/refpolicy/refpolicy/0054-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch index d48db28..b0af22d 100644 --- a/recipes-security/refpolicy/refpolicy/0053-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch +++ b/recipes-security/refpolicy/refpolicy/0054-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 6b77c79af18f6dba52b7a63a7a2aefdd48c0fd33 Mon Sep 17 00:00:00 2001 | 1 | From f26d8ea933ef3f6fe72fbded8d1f6b683c135ab9 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Thu, 31 Oct 2019 17:35:59 +0800 | 3 | Date: Thu, 31 Oct 2019 17:35:59 +0800 |
4 | Subject: [PATCH] policy/modules/kernel/kernel: make kernel_t MLS trusted for | 4 | Subject: [PATCH] policy/modules/kernel/kernel: make kernel_t MLS trusted for |
@@ -15,10 +15,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
15 | 1 file changed, 1 insertion(+) | 15 | 1 file changed, 1 insertion(+) |
16 | 16 | ||
17 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te | 17 | diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te |
18 | index ebde22e02..60e805cb8 100644 | 18 | index e84bcf2b6..987709345 100644 |
19 | --- a/policy/modules/kernel/kernel.te | 19 | --- a/policy/modules/kernel/kernel.te |
20 | +++ b/policy/modules/kernel/kernel.te | 20 | +++ b/policy/modules/kernel/kernel.te |
21 | @@ -385,6 +385,7 @@ mls_socket_write_all_levels(kernel_t) | 21 | @@ -382,6 +382,7 @@ mls_socket_write_all_levels(kernel_t) |
22 | mls_fd_use_all_levels(kernel_t) | 22 | mls_fd_use_all_levels(kernel_t) |
23 | # https://bugzilla.redhat.com/show_bug.cgi?id=667370 | 23 | # https://bugzilla.redhat.com/show_bug.cgi?id=667370 |
24 | mls_file_downgrade(kernel_t) | 24 | mls_file_downgrade(kernel_t) |
diff --git a/recipes-security/refpolicy/refpolicy/0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch b/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-setrans-allow-setrans_t-use-fd.patch index a5c17de..d415fa2 100644 --- a/recipes-security/refpolicy/refpolicy/0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch +++ b/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-setrans-allow-setrans_t-use-fd.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 03e4c0afc4a0aa432b30e9b5e8abbe069871fb9e Mon Sep 17 00:00:00 2001 | 1 | From 44aada7fe60d66a45fdcb9b1e5039365cf2b962b Mon Sep 17 00:00:00 2001 |
2 | From: Roy Li <rongqing.li@windriver.com> | 2 | From: Roy Li <rongqing.li@windriver.com> |
3 | Date: Sat, 22 Feb 2014 13:35:38 +0800 | 3 | Date: Sat, 22 Feb 2014 13:35:38 +0800 |
4 | Subject: [PATCH] policy/modules/system/setrans: allow setrans_t use fd at any | 4 | Subject: [PATCH] policy/modules/system/setrans: allow setrans_t use fd at any |
diff --git a/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch b/recipes-security/refpolicy/refpolicy/0056-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch index 9e46a43..bd629fe 100644 --- a/recipes-security/refpolicy/refpolicy/0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch +++ b/recipes-security/refpolicy/refpolicy/0056-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 1ca4caa4600e9b742f0c7816efe8cff153fe412a Mon Sep 17 00:00:00 2001 | 1 | From 115135e6809b715df2b382bf9e35eef3e09be311 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Mon, 22 Feb 2021 11:28:12 +0800 | 3 | Date: Mon, 22 Feb 2021 11:28:12 +0800 |
4 | Subject: [PATCH] policy/modules/system/systemd: make *_systemd_t MLS trusted | 4 | Subject: [PATCH] policy/modules/system/systemd: make *_systemd_t MLS trusted |
@@ -24,10 +24,10 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
24 | 1 file changed, 3 insertions(+) | 24 | 1 file changed, 3 insertions(+) |
25 | 25 | ||
26 | diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if | 26 | diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if |
27 | index 96b5d31b4..07c506e1c 100644 | 27 | index 7654d1076..22d5e2b18 100644 |
28 | --- a/policy/modules/system/systemd.if | 28 | --- a/policy/modules/system/systemd.if |
29 | +++ b/policy/modules/system/systemd.if | 29 | +++ b/policy/modules/system/systemd.if |
30 | @@ -228,6 +228,9 @@ template(`systemd_role_template',` | 30 | @@ -235,6 +235,9 @@ template(`systemd_role_template',` |
31 | xdg_read_config_files($1_systemd_t) | 31 | xdg_read_config_files($1_systemd_t) |
32 | xdg_read_data_files($1_systemd_t) | 32 | xdg_read_data_files($1_systemd_t) |
33 | ') | 33 | ') |
diff --git a/recipes-security/refpolicy/refpolicy/0056-policy-modules-system-logging-make-syslogd_runtime_t.patch b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-make-syslogd_runtime_t.patch index cc8a416..256fa50 100644 --- a/recipes-security/refpolicy/refpolicy/0056-policy-modules-system-logging-make-syslogd_runtime_t.patch +++ b/recipes-security/refpolicy/refpolicy/0057-policy-modules-system-logging-make-syslogd_runtime_t.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 8e5a17676c9976d163b70edd31834c4e16405ed9 Mon Sep 17 00:00:00 2001 | 1 | From 17f0718ec39892d411d2cbe029864167d5d191a2 Mon Sep 17 00:00:00 2001 |
2 | From: Yi Zhao <yi.zhao@windriver.com> | 2 | From: Yi Zhao <yi.zhao@windriver.com> |
3 | Date: Sat, 18 Dec 2021 17:31:45 +0800 | 3 | Date: Sat, 18 Dec 2021 17:31:45 +0800 |
4 | Subject: [PATCH] policy/modules/system/logging: make syslogd_runtime_t MLS | 4 | Subject: [PATCH] policy/modules/system/logging: make syslogd_runtime_t MLS |
@@ -31,7 +31,7 @@ Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | |||
31 | 1 file changed, 2 insertions(+) | 31 | 1 file changed, 2 insertions(+) |
32 | 32 | ||
33 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | 33 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te |
34 | index 1b181f7cc..d5878876b 100644 | 34 | index 2c733c0f2..c758dbff0 100644 |
35 | --- a/policy/modules/system/logging.te | 35 | --- a/policy/modules/system/logging.te |
36 | +++ b/policy/modules/system/logging.te | 36 | +++ b/policy/modules/system/logging.te |
37 | @@ -459,6 +459,8 @@ allow syslogd_t syslogd_runtime_t:file map; | 37 | @@ -459,6 +459,8 @@ allow syslogd_t syslogd_runtime_t:file map; |
diff --git a/recipes-security/refpolicy/refpolicy_common.inc b/recipes-security/refpolicy/refpolicy_common.inc index f8e5f10..0661e6c 100644 --- a/recipes-security/refpolicy/refpolicy_common.inc +++ b/recipes-security/refpolicy/refpolicy_common.inc | |||
@@ -50,28 +50,29 @@ SRC_URI += " \ | |||
50 | file://0032-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch \ | 50 | file://0032-policy-modules-kernel-terminal-don-t-audit-tty_devic.patch \ |
51 | file://0033-policy-modules-system-systemd-enable-support-for-sys.patch \ | 51 | file://0033-policy-modules-system-systemd-enable-support-for-sys.patch \ |
52 | file://0034-policy-modules-system-logging-allow-systemd-tmpfiles.patch \ | 52 | file://0034-policy-modules-system-logging-allow-systemd-tmpfiles.patch \ |
53 | file://0035-policy-modules-system-systemd-allow-systemd_logind_t.patch \ | 53 | file://0035-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch \ |
54 | file://0036-policy-modules-roles-sysadm-allow-sysadm-to-use-init.patch \ | 54 | file://0036-policy-modules-system-systemd-systemd-user-fixes.patch \ |
55 | file://0037-policy-modules-system-systemd-systemd-user-fixes.patch \ | 55 | file://0037-policy-modules-system-logging-grant-getpcap-capabili.patch \ |
56 | file://0038-policy-modules-system-logging-grant-getpcap-capabili.patch \ | 56 | file://0038-policy-modules-system-allow-services-to-read-tmpfs-u.patch \ |
57 | file://0039-policy-modules-system-allow-services-to-read-tmpfs-u.patch \ | 57 | file://0039-policy-modules-kernel-domain-allow-all-domains-to-co.patch \ |
58 | file://0040-policy-modules-kernel-domain-allow-all-domains-to-co.patch \ | 58 | file://0040-systemd-allow-systemd-logind-to-inherit-fds.patch \ |
59 | file://0041-policy-modules-system-mount-make-mount_t-domain-MLS-.patch \ | 59 | file://0041-systemd-allow-systemd-tmpfiles-to-read-bin_t-symlink.patch \ |
60 | file://0042-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch \ | 60 | file://0042-policy-modules-system-mount-make-mount_t-domain-MLS-.patch \ |
61 | file://0043-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch \ | 61 | file://0043-policy-modules-roles-sysadm-MLS-sysadm-rw-to-clearan.patch \ |
62 | file://0044-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch \ | 62 | file://0044-policy-modules-services-rpc-make-nfsd_t-domain-MLS-t.patch \ |
63 | file://0045-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch \ | 63 | file://0045-policy-modules-admin-dmesg-make-dmesg_t-MLS-trusted-.patch \ |
64 | file://0046-policy-modules-system-init-make-init_t-MLS-trusted-f.patch \ | 64 | file://0046-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch \ |
65 | file://0047-policy-modules-system-systemd-make-systemd-tmpfiles_.patch \ | 65 | file://0047-policy-modules-system-init-make-init_t-MLS-trusted-f.patch \ |
66 | file://0048-policy-modules-system-systemd-systemd-make-systemd_-.patch \ | 66 | file://0048-policy-modules-system-systemd-make-systemd-tmpfiles_.patch \ |
67 | file://0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch \ | 67 | file://0049-policy-modules-system-systemd-systemd-make-systemd_-.patch \ |
68 | file://0050-policy-modules-system-init-make-init_t-MLS-trusted-f.patch \ | 68 | file://0050-policy-modules-system-logging-add-the-syslogd_t-to-t.patch \ |
69 | file://0051-policy-modules-system-init-all-init_t-to-read-any-le.patch \ | 69 | file://0051-policy-modules-system-init-make-init_t-MLS-trusted-f.patch \ |
70 | file://0052-policy-modules-system-logging-allow-auditd_t-to-writ.patch \ | 70 | file://0052-policy-modules-system-init-all-init_t-to-read-any-le.patch \ |
71 | file://0053-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch \ | 71 | file://0053-policy-modules-system-logging-allow-auditd_t-to-writ.patch \ |
72 | file://0054-policy-modules-system-setrans-allow-setrans_t-use-fd.patch \ | 72 | file://0054-policy-modules-kernel-kernel-make-kernel_t-MLS-trust.patch \ |
73 | file://0055-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch \ | 73 | file://0055-policy-modules-system-setrans-allow-setrans_t-use-fd.patch \ |
74 | file://0056-policy-modules-system-logging-make-syslogd_runtime_t.patch \ | 74 | file://0056-policy-modules-system-systemd-make-_systemd_t-MLS-tr.patch \ |
75 | file://0057-policy-modules-system-logging-make-syslogd_runtime_t.patch \ | ||
75 | " | 76 | " |
76 | 77 | ||
77 | S = "${WORKDIR}/refpolicy" | 78 | S = "${WORKDIR}/refpolicy" |
diff --git a/recipes-security/refpolicy/refpolicy_git.inc b/recipes-security/refpolicy/refpolicy_git.inc index 22f28ba..94b3379 100644 --- a/recipes-security/refpolicy/refpolicy_git.inc +++ b/recipes-security/refpolicy/refpolicy_git.inc | |||
@@ -1,8 +1,8 @@ | |||
1 | PV = "2.20240916+git" | 1 | PV = "2.20250213+git" |
2 | 2 | ||
3 | SRC_URI = "git://github.com/SELinuxProject/refpolicy.git;protocol=https;branch=main;name=refpolicy;destsuffix=refpolicy" | 3 | SRC_URI = "git://github.com/SELinuxProject/refpolicy.git;protocol=https;branch=main;name=refpolicy;destsuffix=refpolicy" |
4 | 4 | ||
5 | SRCREV_refpolicy ?= "741dc96eb7e737bc2f00b7f4b4b394a66d32d913" | 5 | SRCREV_refpolicy = "badb91ce49e20449b1a73cd98dc9250b622ed369" |
6 | 6 | ||
7 | UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" | 7 | UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" |
8 | 8 | ||