diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy-minimum')
-rw-r--r-- | recipes-security/refpolicy/refpolicy-minimum/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch | 19 |
1 files changed, 5 insertions, 14 deletions
diff --git a/recipes-security/refpolicy/refpolicy-minimum/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch b/recipes-security/refpolicy/refpolicy-minimum/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch index a7338e1..f5a767d 100644 --- a/recipes-security/refpolicy/refpolicy-minimum/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch +++ b/recipes-security/refpolicy/refpolicy-minimum/0008-refpolicy-minimum-systemd-fix-for-systemd-tmp-files-.patch | |||
@@ -37,11 +37,9 @@ Signed-off-by: Shrikant Bobade <shrikant_bobade@mentor.com> | |||
37 | policy/modules/system/systemd.te | 3 +++ | 37 | policy/modules/system/systemd.te | 3 +++ |
38 | 3 files changed, 45 insertions(+) | 38 | 3 files changed, 45 insertions(+) |
39 | 39 | ||
40 | diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if | ||
41 | index 1cedea2..4ea7d55 100644 | ||
42 | --- a/policy/modules/kernel/files.if | 40 | --- a/policy/modules/kernel/files.if |
43 | +++ b/policy/modules/kernel/files.if | 41 | +++ b/policy/modules/kernel/files.if |
44 | @@ -6729,3 +6729,22 @@ interface(`files_unconfined',` | 42 | @@ -6906,3 +6906,22 @@ interface(`files_unconfined',` |
45 | 43 | ||
46 | typeattribute $1 files_unconfined_type; | 44 | typeattribute $1 files_unconfined_type; |
47 | ') | 45 | ') |
@@ -64,13 +62,11 @@ index 1cedea2..4ea7d55 100644 | |||
64 | + | 62 | + |
65 | + allow $1 tmp_t:lnk_file getattr; | 63 | + allow $1 tmp_t:lnk_file getattr; |
66 | +') | 64 | +') |
67 | diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if | ||
68 | index f1130d1..4604441 100644 | ||
69 | --- a/policy/modules/kernel/kernel.if | 65 | --- a/policy/modules/kernel/kernel.if |
70 | +++ b/policy/modules/kernel/kernel.if | 66 | +++ b/policy/modules/kernel/kernel.if |
71 | @@ -3323,3 +3323,26 @@ interface(`kernel_unconfined',` | 67 | @@ -3418,3 +3418,26 @@ interface(`kernel_rw_vm_overcommit_sysct |
72 | typeattribute $1 kern_unconfined; | 68 | kernel_search_vm_sysctl($1) |
73 | kernel_load_module($1) | 69 | allow $1 sysctl_vm_overcommit_t:file rw_file_perms; |
74 | ') | 70 | ') |
75 | + | 71 | + |
76 | +######################################## | 72 | +######################################## |
@@ -95,17 +91,12 @@ index f1130d1..4604441 100644 | |||
95 | + | 91 | + |
96 | +') | 92 | +') |
97 | + | 93 | + |
98 | diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te | ||
99 | index 22021eb..8813664 100644 | ||
100 | --- a/policy/modules/system/systemd.te | 94 | --- a/policy/modules/system/systemd.te |
101 | +++ b/policy/modules/system/systemd.te | 95 | +++ b/policy/modules/system/systemd.te |
102 | @@ -269,3 +269,6 @@ allow systemd_tmpfiles_t initrc_t:unix_dgram_socket sendto; | 96 | @@ -374,3 +374,6 @@ allow systemd_tmpfiles_t initrc_t:unix_d |
103 | allow systemd_tmpfiles_t self:capability net_admin; | 97 | allow systemd_tmpfiles_t self:capability net_admin; |
104 | 98 | ||
105 | allow systemd_tmpfiles_t init_t:file { open getattr read }; | 99 | allow systemd_tmpfiles_t init_t:file { open getattr read }; |
106 | + | 100 | + |
107 | +systemd_service_allow_kernel_domain_access_to_sysctl_kernel_t(systemd_tmpfiles_t) | 101 | +systemd_service_allow_kernel_domain_access_to_sysctl_kernel_t(systemd_tmpfiles_t) |
108 | +systemd_service_allow_kernel_files_domain_to_tmp_t(systemd_tmpfiles_t) | 102 | +systemd_service_allow_kernel_files_domain_to_tmp_t(systemd_tmpfiles_t) |
109 | -- | ||
110 | 1.9.1 | ||
111 | |||