selinux packaage update

Signed-off-by: basebuilder_pel7ppc64bebuilder0 <basebuilder@powerel.org>
master
basebuilder_pel7ppc64bebuilder0 2019-03-28 00:10:02 +01:00
parent 15b879c8cd
commit 9704065dce
2 changed files with 103 additions and 1 deletions

View File

@ -10,6 +10,53 @@ index b6debf340..329eb3922 100644
allow $1_sudo_t $3:key search;
# Enter this derived domain from the user domain
diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
index 5fa83a2fb..34fd0b0f1 100644
--- a/policy/modules/kernel/domain.if
+++ b/policy/modules/kernel/domain.if
@@ -602,6 +602,42 @@ interface(`domain_search_all_domains_state',`
allow $1 domain:dir search_dir_perms;
')
+########################################
+## <summary>
+## Allow read and write of process kernel keyrings
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to dontaudit.
+## </summary>
+## </param>
+#
+interface(`domain_rw_all_domains_keyrings',`
+ gen_require(`
+ attribute domain;
+ ')
+
+ allow $1 domain:key { read write};
+')
+
+########################################
+## <summary>
+## Allow manage of process kernel keyrings
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to dontaudit.
+## </summary>
+## </param>
+#
+interface(`domain_manage_all_domains_keyrings',`
+ gen_require(`
+ attribute domain;
+ ')
+
+ allow $1 domain:key manage_key_perms;
+')
+
########################################
## <summary>
## Do not audit attempts to search the process
diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te
index c03a52c04..8569b19db 100644
--- a/policy/modules/roles/staff.te

View File

@ -459,7 +459,7 @@ index 2ee527f2a..79a2a9c48 100644
- allow nfsd_t $1:dbus send_msg;
-')
diff --git a/rpc.te b/rpc.te
index f4df4fda2..f585a7fb5 100644
index f4df4fda2..b9665f773 100644
--- a/rpc.te
+++ b/rpc.te
@@ -65,13 +65,6 @@ systemd_unit_file(nfsd_unit_file_t)
@ -511,6 +511,61 @@ index f4df4fda2..f585a7fb5 100644
optional_policy(`
mount_exec(nfsd_t)
mount_manage_pid_files(nfsd_t)
@@ -357,6 +331,8 @@ kernel_signal(gssd_t)
corecmd_exec_bin(gssd_t)
+domain_manage_all_domains_keyrings(gssd_t)
+
fs_list_rpc(gssd_t)
fs_rw_rpc_sockets(gssd_t)
fs_read_rpc_files(gssd_t)
diff --git a/rpm.te b/rpm.te
index 7394a0dfc..4402cbe09 100644
--- a/rpm.te
+++ b/rpm.te
@@ -34,6 +34,7 @@ logging_log_file(rpm_log_t)
type rpm_var_lib_t;
files_type(rpm_var_lib_t)
+files_mountpoint(rpm_var_lib_t)
typealias rpm_var_lib_t alias var_lib_rpm_t;
type rpm_var_cache_t;
diff --git a/snapper.fc b/snapper.fc
index 4f4bdb397..0a43846a8 100644
--- a/snapper.fc
+++ b/snapper.fc
@@ -7,6 +7,7 @@
/mnt/(.*/)?\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
+
/usr/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
/var/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
/etc/\.snapshots(/.*)? gen_context(system_u:object_r:snapperd_data_t,s0)
diff --git a/snapper.te b/snapper.te
index 8c9e4a200..5be6d3542 100644
--- a/snapper.te
+++ b/snapper.te
@@ -22,7 +22,7 @@ files_type(snapperd_data_t)
#
# snapperd local policy
#
-allow snapperd_t self:capability { dac_read_search fowner sys_admin };
+allow snapperd_t self:capability { dac_read_search dac_override fowner sys_admin };
allow snapperd_t self:process setsched;
allow snapperd_t self:fifo_file rw_fifo_file_perms;
@@ -57,6 +57,8 @@ files_read_all_files(snapperd_t)
files_read_all_symlinks(snapperd_t)
files_list_all(snapperd_t)
files_manage_isid_type_dirs(snapperd_t)
+files_manage_non_security_dirs(snapperd_t)
+files_relabel_non_security_files(snapperd_t)
fs_getattr_all_fs(snapperd_t)
fs_mount_xattr_fs(snapperd_t)
diff --git a/sysstat.te b/sysstat.te
index a2690e315..efb2f855c 100644
--- a/sysstat.te