diff --git a/policy-F16.patch b/policy-F16.patch index 78ffd0d..84f4266 100644 --- a/policy-F16.patch +++ b/policy-F16.patch @@ -1304,7 +1304,7 @@ index 4f7bd3c..a29af21 100644 - unconfined_domain(kudzu_t) ') diff --git a/policy/modules/admin/logrotate.te b/policy/modules/admin/logrotate.te -index 7090dae..c1ccc06 100644 +index 7090dae..071d66e 100644 --- a/policy/modules/admin/logrotate.te +++ b/policy/modules/admin/logrotate.te @@ -29,9 +29,9 @@ files_type(logrotate_var_lib_t) @@ -1351,12 +1351,13 @@ index 7090dae..c1ccc06 100644 # cjp: why is this needed? init_domtrans_script(logrotate_t) -@@ -116,17 +120,15 @@ miscfiles_read_localization(logrotate_t) +@@ -116,17 +120,16 @@ miscfiles_read_localization(logrotate_t) seutil_dontaudit_read_config(logrotate_t) -userdom_use_user_terminals(logrotate_t) +systemd_exec_systemctl(logrotate_t) ++init_stream_connect(logrotate_t) + +userdom_use_inherited_user_terminals(logrotate_t) userdom_list_user_home_dirs(logrotate_t) @@ -1374,7 +1375,7 @@ index 7090dae..c1ccc06 100644 # for savelog can_exec(logrotate_t, logrotate_exec_t) -@@ -138,7 +140,7 @@ ifdef(`distro_debian', ` +@@ -138,7 +141,7 @@ ifdef(`distro_debian', ` ') optional_policy(` @@ -1383,7 +1384,7 @@ index 7090dae..c1ccc06 100644 ') optional_policy(` -@@ -154,6 +156,10 @@ optional_policy(` +@@ -154,6 +157,10 @@ optional_policy(` ') optional_policy(` @@ -1394,7 +1395,7 @@ index 7090dae..c1ccc06 100644 asterisk_domtrans(logrotate_t) ') -@@ -162,10 +168,20 @@ optional_policy(` +@@ -162,10 +169,20 @@ optional_policy(` ') optional_policy(` @@ -1415,7 +1416,7 @@ index 7090dae..c1ccc06 100644 cups_domtrans(logrotate_t) ') -@@ -200,9 +216,12 @@ optional_policy(` +@@ -200,9 +217,12 @@ optional_policy(` ') optional_policy(` @@ -1429,7 +1430,7 @@ index 7090dae..c1ccc06 100644 optional_policy(` samba_exec_log(logrotate_t) -@@ -228,3 +247,14 @@ optional_policy(` +@@ -228,3 +248,14 @@ optional_policy(` optional_policy(` varnishd_manage_log(logrotate_t) ') @@ -4091,7 +4092,7 @@ index d5aaf0e..6b16aef 100644 optional_policy(` mta_send_mail(sxid_t) diff --git a/policy/modules/admin/tmpreaper.te b/policy/modules/admin/tmpreaper.te -index 6a5004b..90cf622 100644 +index 6a5004b..70d684a 100644 --- a/policy/modules/admin/tmpreaper.te +++ b/policy/modules/admin/tmpreaper.te @@ -7,6 +7,7 @@ policy_module(tmpreaper, 1.5.0) @@ -4102,7 +4103,16 @@ index 6a5004b..90cf622 100644 application_domain(tmpreaper_t, tmpreaper_exec_t) role system_r types tmpreaper_t; -@@ -25,11 +26,16 @@ fs_getattr_xattr_fs(tmpreaper_t) +@@ -18,6 +19,8 @@ role system_r types tmpreaper_t; + allow tmpreaper_t self:process { fork sigchld }; + allow tmpreaper_t self:capability { dac_override dac_read_search fowner }; + ++kernel_read_system_state(tmpreaper_t) ++ + dev_read_urand(tmpreaper_t) + + fs_getattr_xattr_fs(tmpreaper_t) +@@ -25,11 +28,16 @@ fs_getattr_xattr_fs(tmpreaper_t) files_read_etc_files(tmpreaper_t) files_read_var_lib_files(tmpreaper_t) files_purge_tmp(tmpreaper_t) @@ -4119,7 +4129,7 @@ index 6a5004b..90cf622 100644 mls_file_read_all_levels(tmpreaper_t) mls_file_write_all_levels(tmpreaper_t) -@@ -38,13 +44,17 @@ logging_send_syslog_msg(tmpreaper_t) +@@ -38,13 +46,17 @@ logging_send_syslog_msg(tmpreaper_t) miscfiles_read_localization(tmpreaper_t) miscfiles_delete_man_pages(tmpreaper_t) @@ -4141,7 +4151,7 @@ index 6a5004b..90cf622 100644 ') optional_policy(` -@@ -52,7 +62,9 @@ optional_policy(` +@@ -52,7 +64,9 @@ optional_policy(` ') optional_policy(` @@ -4151,7 +4161,7 @@ index 6a5004b..90cf622 100644 apache_delete_cache_files(tmpreaper_t) apache_setattr_cache_dirs(tmpreaper_t) ') -@@ -66,9 +78,13 @@ optional_policy(` +@@ -66,9 +80,13 @@ optional_policy(` ') optional_policy(` @@ -18705,7 +18715,7 @@ index 22821ff..20251b0 100644 ######################################## # diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if -index 97fcdac..630ff53 100644 +index 97fcdac..fdb4b09 100644 --- a/policy/modules/kernel/filesystem.if +++ b/policy/modules/kernel/filesystem.if @@ -631,6 +631,27 @@ interface(`fs_getattr_cgroup',` @@ -19172,7 +19182,32 @@ index 97fcdac..630ff53 100644 manage_lnk_files_pattern($1, nfs_t, nfs_t) ') -@@ -3958,6 +4217,42 @@ interface(`fs_dontaudit_list_tmpfs',` +@@ -3258,6 +3517,24 @@ interface(`fs_getattr_nfsd_files',` + getattr_files_pattern($1, nfsd_fs_t, nfsd_fs_t) + ') + ++####################################### ++## ++## read files on an nfsd filesystem ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`fs_read_nfsd_files',` ++ gen_require(` ++ type nfsd_fs_t; ++ ') ++ ++ read_files_pattern($1, nfsd_fs_t, nfsd_fs_t) ++') ++ + ######################################## + ## + ## Read and write NFS server files. +@@ -3958,6 +4235,42 @@ interface(`fs_dontaudit_list_tmpfs',` ######################################## ## @@ -19215,7 +19250,7 @@ index 97fcdac..630ff53 100644 ## Create, read, write, and delete ## tmpfs directories ## -@@ -4175,6 +4470,24 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',` +@@ -4175,6 +4488,24 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',` ######################################## ## @@ -19240,7 +19275,7 @@ index 97fcdac..630ff53 100644 ## Relabel character nodes on tmpfs filesystems. ## ## -@@ -4251,6 +4564,25 @@ interface(`fs_manage_tmpfs_files',` +@@ -4251,6 +4582,25 @@ interface(`fs_manage_tmpfs_files',` ######################################## ## @@ -19266,7 +19301,7 @@ index 97fcdac..630ff53 100644 ## Read and write, create and delete symbolic ## links on tmpfs filesystems. ## -@@ -4457,6 +4789,8 @@ interface(`fs_mount_all_fs',` +@@ -4457,6 +4807,8 @@ interface(`fs_mount_all_fs',` ') allow $1 filesystem_type:filesystem mount; @@ -19275,7 +19310,7 @@ index 97fcdac..630ff53 100644 ') ######################################## -@@ -4503,7 +4837,7 @@ interface(`fs_unmount_all_fs',` +@@ -4503,7 +4855,7 @@ interface(`fs_unmount_all_fs',` ## ##

## Allow the specified domain to @@ -19284,7 +19319,7 @@ index 97fcdac..630ff53 100644 ## Example attributes: ##

##