diff --git a/container-selinux.tgz b/container-selinux.tgz index b1bd8aa..001fc23 100644 Binary files a/container-selinux.tgz and b/container-selinux.tgz differ diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch index b7cc288..7a71a37 100644 --- a/policy-rawhide-base.patch +++ b/policy-rawhide-base.patch @@ -6866,7 +6866,7 @@ index b31c05491..a7b0f009a 100644 +/usr/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0) +/usr/lib/udev/devices/zero -c gen_context(system_u:object_r:zero_device_t,s0) diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if -index 76f285ea6..ac044aea2 100644 +index 76f285ea6..c28d65c08 100644 --- a/policy/modules/kernel/devices.if +++ b/policy/modules/kernel/devices.if @@ -143,13 +143,32 @@ interface(`dev_relabel_all_dev_nodes',` @@ -7649,7 +7649,15 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -2532,6 +3038,24 @@ interface(`dev_read_raw_memory',` +@@ -2525,6 +3031,7 @@ interface(`dev_read_raw_memory',` + ') + + read_chr_files_pattern($1, device_t, memory_device_t) ++ allow $1 memory_device_t:chr_file map; + + allow $1 self:capability sys_rawio; + typeattribute $1 memory_raw_read; +@@ -2532,6 +3039,24 @@ interface(`dev_read_raw_memory',` ######################################## ## @@ -7674,7 +7682,7 @@ index 76f285ea6..ac044aea2 100644 ## Do not audit attempts to read raw memory devices ## (e.g. /dev/mem). ## -@@ -2573,6 +3097,24 @@ interface(`dev_write_raw_memory',` +@@ -2573,6 +3098,24 @@ interface(`dev_write_raw_memory',` ######################################## ## @@ -7699,7 +7707,7 @@ index 76f285ea6..ac044aea2 100644 ## Read and execute raw memory devices (e.g. /dev/mem). ## ## -@@ -2587,7 +3129,7 @@ interface(`dev_rx_raw_memory',` +@@ -2587,7 +3130,7 @@ interface(`dev_rx_raw_memory',` ') dev_read_raw_memory($1) @@ -7708,7 +7716,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -2606,7 +3148,7 @@ interface(`dev_wx_raw_memory',` +@@ -2606,7 +3149,7 @@ interface(`dev_wx_raw_memory',` ') dev_write_raw_memory($1) @@ -7717,7 +7725,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -2725,7 +3267,7 @@ interface(`dev_write_misc',` +@@ -2725,7 +3268,7 @@ interface(`dev_write_misc',` ## ## ## @@ -7726,7 +7734,7 @@ index 76f285ea6..ac044aea2 100644 ## ## # -@@ -2811,7 +3353,7 @@ interface(`dev_rw_modem',` +@@ -2811,7 +3354,7 @@ interface(`dev_rw_modem',` ######################################## ## @@ -7735,7 +7743,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -2819,17 +3361,17 @@ interface(`dev_rw_modem',` +@@ -2819,17 +3362,17 @@ interface(`dev_rw_modem',` ## ## # @@ -7757,7 +7765,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -2837,17 +3379,17 @@ interface(`dev_getattr_mouse_dev',` +@@ -2837,17 +3380,17 @@ interface(`dev_getattr_mouse_dev',` ## ## # @@ -7779,7 +7787,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -2855,12 +3397,84 @@ interface(`dev_setattr_mouse_dev',` +@@ -2855,12 +3398,84 @@ interface(`dev_setattr_mouse_dev',` ## ## # @@ -7867,7 +7875,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -2903,20 +3517,20 @@ interface(`dev_getattr_mtrr_dev',` +@@ -2903,20 +3518,20 @@ interface(`dev_getattr_mtrr_dev',` ######################################## ## @@ -7892,7 +7900,7 @@ index 76f285ea6..ac044aea2 100644 ##

## ## -@@ -2925,43 +3539,34 @@ interface(`dev_getattr_mtrr_dev',` +@@ -2925,43 +3540,34 @@ interface(`dev_getattr_mtrr_dev',` ##
## # @@ -7948,7 +7956,7 @@ index 76f285ea6..ac044aea2 100644 ## range registers (MTRR). ## ## -@@ -2970,13 +3575,32 @@ interface(`dev_write_mtrr',` +@@ -2970,13 +3576,32 @@ interface(`dev_write_mtrr',` ## ## # @@ -7984,7 +7992,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -3144,6 +3768,80 @@ interface(`dev_create_null_dev',` +@@ -3144,6 +3769,80 @@ interface(`dev_create_null_dev',` ######################################## ## @@ -8065,7 +8073,7 @@ index 76f285ea6..ac044aea2 100644 ## Do not audit attempts to get the attributes ## of the BIOS non-volatile RAM device. ## -@@ -3163,6 +3861,24 @@ interface(`dev_dontaudit_getattr_nvram_dev',` +@@ -3163,6 +3862,24 @@ interface(`dev_dontaudit_getattr_nvram_dev',` ######################################## ## @@ -8090,7 +8098,7 @@ index 76f285ea6..ac044aea2 100644 ## Read and write BIOS non-volatile RAM. ## ## -@@ -3254,7 +3970,25 @@ interface(`dev_rw_printer',` +@@ -3254,7 +3971,25 @@ interface(`dev_rw_printer',` ######################################## ## @@ -8117,7 +8125,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -3262,12 +3996,13 @@ interface(`dev_rw_printer',` +@@ -3262,12 +3997,13 @@ interface(`dev_rw_printer',` ## ## # @@ -8134,7 +8142,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -3399,7 +4134,7 @@ interface(`dev_dontaudit_read_rand',` +@@ -3399,7 +4135,7 @@ interface(`dev_dontaudit_read_rand',` ######################################## ## @@ -8143,7 +8151,7 @@ index 76f285ea6..ac044aea2 100644 ## number generator devices (e.g., /dev/random) ## ## -@@ -3413,7 +4148,7 @@ interface(`dev_dontaudit_append_rand',` +@@ -3413,7 +4149,7 @@ interface(`dev_dontaudit_append_rand',` type random_device_t; ') @@ -8152,7 +8160,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -3633,6 +4368,7 @@ interface(`dev_read_sound',` +@@ -3633,6 +4369,7 @@ interface(`dev_read_sound',` ') read_chr_files_pattern($1, device_t, sound_device_t) @@ -8160,7 +8168,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -3669,6 +4405,7 @@ interface(`dev_read_sound_mixer',` +@@ -3669,6 +4406,7 @@ interface(`dev_read_sound_mixer',` ') read_chr_files_pattern($1, device_t, sound_device_t) @@ -8168,7 +8176,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -3855,7 +4592,7 @@ interface(`dev_getattr_sysfs_dirs',` +@@ -3855,7 +4593,7 @@ interface(`dev_getattr_sysfs_dirs',` ######################################## ## @@ -8177,7 +8185,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -3863,91 +4600,89 @@ interface(`dev_getattr_sysfs_dirs',` +@@ -3863,91 +4601,89 @@ interface(`dev_getattr_sysfs_dirs',` ## ## # @@ -8288,7 +8296,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -3955,60 +4690,215 @@ interface(`dev_dontaudit_write_sysfs_dirs',` +@@ -3955,60 +4691,215 @@ interface(`dev_dontaudit_write_sysfs_dirs',` ## ## # @@ -8525,7 +8533,7 @@ index 76f285ea6..ac044aea2 100644 read_lnk_files_pattern($1, sysfs_t, sysfs_t) list_dirs_pattern($1, sysfs_t, sysfs_t) -@@ -4016,6 +4906,81 @@ interface(`dev_rw_sysfs',` +@@ -4016,6 +4907,81 @@ interface(`dev_rw_sysfs',` ######################################## ## @@ -8607,7 +8615,7 @@ index 76f285ea6..ac044aea2 100644 ## Read and write the TPM device. ## ## -@@ -4113,6 +5078,25 @@ interface(`dev_write_urand',` +@@ -4113,6 +5079,25 @@ interface(`dev_write_urand',` ######################################## ## @@ -8633,7 +8641,7 @@ index 76f285ea6..ac044aea2 100644 ## Getattr generic the USB devices. ## ## -@@ -4123,7 +5107,7 @@ interface(`dev_write_urand',` +@@ -4123,7 +5108,7 @@ interface(`dev_write_urand',` # interface(`dev_getattr_generic_usb_dev',` gen_require(` @@ -8642,7 +8650,7 @@ index 76f285ea6..ac044aea2 100644 ') getattr_chr_files_pattern($1, device_t, usb_device_t) -@@ -4409,9 +5393,9 @@ interface(`dev_rw_usbfs',` +@@ -4409,9 +5394,9 @@ interface(`dev_rw_usbfs',` read_lnk_files_pattern($1, usbfs_t, usbfs_t) ') @@ -8654,7 +8662,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -4419,17 +5403,17 @@ interface(`dev_rw_usbfs',` +@@ -4419,17 +5404,17 @@ interface(`dev_rw_usbfs',` ## ## # @@ -8677,7 +8685,7 @@ index 76f285ea6..ac044aea2 100644 ## ## ## -@@ -4437,12 +5421,12 @@ interface(`dev_getattr_video_dev',` +@@ -4437,12 +5422,12 @@ interface(`dev_getattr_video_dev',` ## ## # @@ -8693,7 +8701,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -4539,6 +5523,134 @@ interface(`dev_write_video_dev',` +@@ -4539,6 +5524,134 @@ interface(`dev_write_video_dev',` ######################################## ## @@ -8828,7 +8836,7 @@ index 76f285ea6..ac044aea2 100644 ## Allow read/write the vhost net device ## ## -@@ -4557,6 +5669,24 @@ interface(`dev_rw_vhost',` +@@ -4557,6 +5670,24 @@ interface(`dev_rw_vhost',` ######################################## ## @@ -8853,7 +8861,7 @@ index 76f285ea6..ac044aea2 100644 ## Read and write VMWare devices. ## ## -@@ -4589,7 +5719,7 @@ interface(`dev_rwx_vmware',` +@@ -4589,7 +5720,7 @@ interface(`dev_rwx_vmware',` ') dev_rw_vmware($1) @@ -8862,7 +8870,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -4630,6 +5760,24 @@ interface(`dev_write_watchdog',` +@@ -4630,6 +5761,24 @@ interface(`dev_write_watchdog',` ######################################## ## @@ -8887,7 +8895,7 @@ index 76f285ea6..ac044aea2 100644 ## Read and write the the wireless device. ## ## -@@ -4762,6 +5910,44 @@ interface(`dev_rw_xserver_misc',` +@@ -4762,6 +5911,44 @@ interface(`dev_rw_xserver_misc',` ######################################## ## @@ -8932,7 +8940,7 @@ index 76f285ea6..ac044aea2 100644 ## Read and write to the zero device (/dev/zero). ## ## -@@ -4794,7 +5980,7 @@ interface(`dev_rwx_zero',` +@@ -4794,7 +5981,7 @@ interface(`dev_rwx_zero',` ') dev_rw_zero($1) @@ -8941,7 +8949,7 @@ index 76f285ea6..ac044aea2 100644 ') ######################################## -@@ -4851,3 +6037,1064 @@ interface(`dev_unconfined',` +@@ -4851,3 +6038,1064 @@ interface(`dev_unconfined',` typeattribute $1 devices_unconfined_type; ') @@ -39239,7 +39247,7 @@ index c42fbc329..bf211dbee 100644 + files_pid_filetrans($1, iptables_var_run_t, file, "xtables.lock") +') diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te -index be8ed1e6c..91d1296b8 100644 +index be8ed1e6c..73e51f7ef 100644 --- a/policy/modules/system/iptables.te +++ b/policy/modules/system/iptables.te @@ -16,15 +16,21 @@ role iptables_roles types iptables_t; @@ -39367,7 +39375,7 @@ index be8ed1e6c..91d1296b8 100644 ') optional_policy(` -@@ -110,7 +138,15 @@ optional_policy(` +@@ -110,7 +138,16 @@ optional_policy(` ') optional_policy(` @@ -39380,10 +39388,11 @@ index be8ed1e6c..91d1296b8 100644 +optional_policy(` modutils_run_insmod(iptables_t, iptables_roles) + modutils_list_module_config(iptables_t) ++ modutils_read_module_config(iptables_t) ') optional_policy(` -@@ -119,11 +155,25 @@ optional_policy(` +@@ -119,11 +156,25 @@ optional_policy(` ') optional_policy(` @@ -39409,7 +39418,7 @@ index be8ed1e6c..91d1296b8 100644 ') optional_policy(` -@@ -135,9 +185,9 @@ optional_policy(` +@@ -135,9 +186,9 @@ optional_policy(` ') optional_policy(` diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch index 9809300..b3a8a86 100644 --- a/policy-rawhide-contrib.patch +++ b/policy-rawhide-contrib.patch @@ -47515,15 +47515,19 @@ index dd8e01af3..9cd6b0b8e 100644 ## ## diff --git a/logrotate.te b/logrotate.te -index be0ab84b3..882160882 100644 +index be0ab84b3..9ca958706 100644 --- a/logrotate.te +++ b/logrotate.te -@@ -5,16 +5,29 @@ policy_module(logrotate, 1.15.0) +@@ -5,16 +5,33 @@ policy_module(logrotate, 1.15.0) # Declarations # -attribute_role logrotate_roles; -roleattribute system_r logrotate_roles; ++gen_require(` ++ class passwd passwd; ++') ++ +## +##

+## Allow logrotate to manage nfs files @@ -47552,7 +47556,7 @@ index be0ab84b3..882160882 100644 type logrotate_lock_t; files_lock_file(logrotate_lock_t) -@@ -25,21 +38,31 @@ files_tmp_file(logrotate_tmp_t) +@@ -25,21 +42,33 @@ files_tmp_file(logrotate_tmp_t) type logrotate_var_lib_t; files_type(logrotate_var_lib_t) @@ -47575,6 +47579,8 @@ index be0ab84b3..882160882 100644 + +allow logrotate_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap }; + ++allow logrotate_t self:passwd { passwd }; ++ +# Set a context other than the default one for newly created files. +allow logrotate_t self:process setfscreate; + @@ -47590,7 +47596,7 @@ index be0ab84b3..882160882 100644 allow logrotate_t self:shm create_shm_perms; allow logrotate_t self:sem create_sem_perms; allow logrotate_t self:msgq create_msgq_perms; -@@ -48,36 +71,54 @@ allow logrotate_t self:msg { send receive }; +@@ -48,36 +77,54 @@ allow logrotate_t self:msg { send receive }; allow logrotate_t logrotate_lock_t:file manage_file_perms; files_lock_filetrans(logrotate_t, logrotate_lock_t, file) @@ -47650,7 +47656,7 @@ index be0ab84b3..882160882 100644 files_manage_generic_spool(logrotate_t) files_manage_generic_spool_dirs(logrotate_t) files_getattr_generic_locks(logrotate_t) -@@ -95,32 +136,57 @@ mls_process_write_to_clearance(logrotate_t) +@@ -95,32 +142,58 @@ mls_process_write_to_clearance(logrotate_t) selinux_get_fs_mount(logrotate_t) selinux_get_enforce_mode(logrotate_t) @@ -47662,6 +47668,7 @@ index be0ab84b3..882160882 100644 init_all_labeled_script_domtrans(logrotate_t) +init_reload_services(logrotate_t) ++init_reload_transient_unit(logrotate_t) logging_manage_all_logs(logrotate_t) logging_send_syslog_msg(logrotate_t) @@ -47714,7 +47721,7 @@ index be0ab84b3..882160882 100644 ') optional_policy(` -@@ -135,16 +201,17 @@ optional_policy(` +@@ -135,16 +208,17 @@ optional_policy(` optional_policy(` apache_read_config(logrotate_t) @@ -47734,7 +47741,7 @@ index be0ab84b3..882160882 100644 ') optional_policy(` -@@ -170,6 +237,11 @@ optional_policy(` +@@ -170,6 +244,11 @@ optional_policy(` ') optional_policy(` @@ -47746,7 +47753,7 @@ index be0ab84b3..882160882 100644 fail2ban_stream_connect(logrotate_t) ') -@@ -178,7 +250,8 @@ optional_policy(` +@@ -178,7 +257,8 @@ optional_policy(` ') optional_policy(` @@ -47756,7 +47763,7 @@ index be0ab84b3..882160882 100644 ') optional_policy(` -@@ -198,17 +271,18 @@ optional_policy(` +@@ -198,17 +278,18 @@ optional_policy(` ') optional_policy(` @@ -47778,7 +47785,7 @@ index be0ab84b3..882160882 100644 ') optional_policy(` -@@ -216,6 +290,14 @@ optional_policy(` +@@ -216,6 +297,14 @@ optional_policy(` ') optional_policy(` @@ -47793,7 +47800,7 @@ index be0ab84b3..882160882 100644 samba_exec_log(logrotate_t) ') -@@ -228,26 +310,50 @@ optional_policy(` +@@ -228,26 +317,50 @@ optional_policy(` ') optional_policy(` @@ -73824,7 +73831,7 @@ index 000000000..9c27847b2 +') + diff --git a/plymouthd.fc b/plymouthd.fc -index 735500fd1..2ba6832cc 100644 +index 735500fd1..7f694728c 100644 --- a/plymouthd.fc +++ b/plymouthd.fc @@ -1,15 +1,14 @@ @@ -73842,7 +73849,7 @@ index 735500fd1..2ba6832cc 100644 -/var/lib/plymouth(/.*)? gen_context(system_u:object_r:plymouthd_var_lib_t,s0) +/var/run/plymouth(/.*)? gen_context(system_u:object_r:plymouthd_var_run_t,s0) -+/var/log/boot\.log gen_context(system_u:object_r:plymouthd_var_log_t,mls_systemhigh) ++/var/log/boot\.log.* gen_context(system_u:object_r:plymouthd_var_log_t,mls_systemhigh) -/var/log/boot\.log.* -- gen_context(system_u:object_r:plymouthd_var_log_t,mls_systemhigh) +/usr/sbin/plymouthd -- gen_context(system_u:object_r:plymouthd_exec_t,s0) diff --git a/selinux-policy.spec b/selinux-policy.spec index 9635f28..56ba655 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -19,7 +19,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.13.1 -Release: 280%{?dist} +Release: 281%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -681,6 +681,9 @@ exit 0 %endif %changelog +* Mon Sep 11 2017 Lukas Vrabec - 3.13.1-281 +- Allow domains reading raw memory also use mmap. + * Thu Sep 07 2017 Lukas Vrabec - 3.13.1-280 - Add rules fixing installing ipa-server-install with SELinux in Enforcing. BZ(1488404) - Fix denials during ipa-server-install process on F27+