From 725926c586ecbd93d6f7168c65070d80335ba3d1 Mon Sep 17 00:00:00 2001
From: Chris PeBenito
Date: Nov 08 2005 22:00:30 +0000
Subject: pile of sediff fixes
---
diff --git a/refpolicy/policy/modules/admin/amanda.te b/refpolicy/policy/modules/admin/amanda.te
index 39d9f79..cb0cb3b 100644
--- a/refpolicy/policy/modules/admin/amanda.te
+++ b/refpolicy/policy/modules/admin/amanda.te
@@ -201,7 +201,7 @@ allow amanda_recover_t amanda_recover_dir_t:file create_file_perms;
allow amanda_recover_t amanda_recover_dir_t:lnk_file create_lnk_perms;
allow amanda_recover_t amanda_recover_dir_t:sock_file create_file_perms;
allow amanda_recover_t amanda_recover_dir_t:fifo_file create_file_perms;
-userdom_create_sysadm_home(amanda_recover_t,amanda_recover_dir_t,{ file lnk_file sock_file fifo_file })
+userdom_create_sysadm_home(amanda_recover_t,amanda_recover_dir_t,{ dir file lnk_file sock_file fifo_file })
allow amanda_recover_t amanda_tmp_t:dir create_dir_perms;
allow amanda_recover_t amanda_tmp_t:file create_file_perms;
diff --git a/refpolicy/policy/modules/admin/anaconda.te b/refpolicy/policy/modules/admin/anaconda.te
index b988381..a07668f 100644
--- a/refpolicy/policy/modules/admin/anaconda.te
+++ b/refpolicy/policy/modules/admin/anaconda.te
@@ -35,6 +35,10 @@ optional_policy(`dmesg.te',`
dmesg_domtrans(anaconda_t)
')
+optional_policy(`kudzu.te',`
+ kudzu_domtrans(anaconda_t)
+')
+
optional_policy(`rpm.te',`
rpm_domtrans(anaconda_t)
')
diff --git a/refpolicy/policy/modules/admin/consoletype.te b/refpolicy/policy/modules/admin/consoletype.te
index 19295dd..b5ab0c6 100644
--- a/refpolicy/policy/modules/admin/consoletype.te
+++ b/refpolicy/policy/modules/admin/consoletype.te
@@ -41,6 +41,7 @@ kernel_dontaudit_read_system_state(consoletype_t)
fs_getattr_all_fs(consoletype_t)
fs_search_auto_mountpoints(consoletype_t)
+fs_write_nfs_files(consoletype_t)
term_use_console(consoletype_t)
term_use_unallocated_tty(consoletype_t)
@@ -48,6 +49,7 @@ term_use_unallocated_tty(consoletype_t)
init_use_fd(consoletype_t)
init_use_script_pty(consoletype_t)
init_use_script_fd(consoletype_t)
+init_write_script_pipe(consoletype_t)
domain_use_wide_inherit_fd(consoletype_t)
@@ -107,8 +109,6 @@ optional_policy(`userdomain.te',`
')
ifdef(`TODO',`
-allow consoletype_t nfs_t:file write;
-
optional_policy(`xdm.te', `
allow consoletype_t xdm_tmp_t:file rw_file_perms;
')
diff --git a/refpolicy/policy/modules/admin/kudzu.te b/refpolicy/policy/modules/admin/kudzu.te
index 31691cd..957965b 100644
--- a/refpolicy/policy/modules/admin/kudzu.te
+++ b/refpolicy/policy/modules/admin/kudzu.te
@@ -155,9 +155,6 @@ allow kudzu_t modules_conf_t:file unlink;
optional_policy(`rhgb.te',`
rhgb_domain(kudzu_t)
')
-optional_policy(`anaconda.te', `
- domain_auto_trans(anaconda_t, kudzu_exec_t, kudzu_t)
-')
optional_policy(`lpd.te',`
allow kudzu_t printconf_t:file { getattr read };
')
diff --git a/refpolicy/policy/modules/admin/su.if b/refpolicy/policy/modules/admin/su.if
index b7fd8de..cca5d2c 100644
--- a/refpolicy/policy/modules/admin/su.if
+++ b/refpolicy/policy/modules/admin/su.if
@@ -56,7 +56,10 @@ template(`su_restricted_domain_template', `
domain_use_wide_inherit_fd($1_su_t)
files_read_etc_files($1_su_t)
+ files_search_var_lib($1_su_t)
+ init_dontaudit_use_fd($1_su_t)
+ init_dontaudit_use_script_pty($1_su_t)
# Write to utmp.
init_rw_script_pid($1_su_t)
@@ -73,7 +76,7 @@ template(`su_restricted_domain_template', `
# Only allow transitions to unprivileged user domains.
userdom_spec_domtrans_unpriv_users($1_su_t)
- optional_policy(`crond.te',`
+ optional_policy(`cron.te',`
cron_read_pipe($1_su_t)
')
diff --git a/refpolicy/policy/modules/admin/usermanage.te b/refpolicy/policy/modules/admin/usermanage.te
index fb77e18..b12829c 100644
--- a/refpolicy/policy/modules/admin/usermanage.te
+++ b/refpolicy/policy/modules/admin/usermanage.te
@@ -68,6 +68,7 @@ allow chfn_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit exe
allow chfn_t self:process { setrlimit setfscreate };
allow chfn_t self:fd use;
allow chfn_t self:fifo_file rw_file_perms;
+allow chfn_t self:sock_file r_file_perms;
allow chfn_t self:shm create_shm_perms;
allow chfn_t self:sem create_sem_perms;
allow chfn_t self:msgq create_msgq_perms;
@@ -102,6 +103,8 @@ auth_dontaudit_read_shadow(chfn_t)
# can exec /sbin/unix_chkpwd
corecmd_search_bin(chfn_t)
corecmd_search_sbin(chfn_t)
+# allow checking if a shell is executable
+corecmd_check_exec_shell(chfn_t)
domain_use_wide_inherit_fd(chfn_t)
@@ -134,9 +137,6 @@ optional_policy(`nis.te',`
ifdef(`TODO',`
ifdef(`gnome-pty-helper.te', `allow chfn_t gphdomain:fd use;')
-
-# allow checking if a shell is executable
-allow chfn_t shell_exec_t:file execute;
') dnl endif TODO
########################################
@@ -310,9 +310,8 @@ term_use_all_user_ptys(passwd_t)
auth_manage_shadow(passwd_t)
-# /usr/bin/passwd asks for w access to utmp, but it will operate
-# correctly without it. Do not audit write denials to utmp.
-init_dontaudit_rw_script_pid(passwd_t)
+# allow checking if a shell is executable
+corecmd_check_exec_shell(passwd_t)
domain_use_wide_inherit_fd(passwd_t)
@@ -321,6 +320,10 @@ files_manage_etc_files(passwd_t)
files_search_var(passwd_t)
files_dontaudit_search_pids(passwd_t)
+# /usr/bin/passwd asks for w access to utmp, but it will operate
+# correctly without it. Do not audit write denials to utmp.
+init_dontaudit_rw_script_pid(passwd_t)
+
libs_use_ld_so(passwd_t)
libs_use_shared_libs(passwd_t)
@@ -346,9 +349,6 @@ allow passwd_t { etc_t shadow_t }:file { relabelfrom relabelto };
# Inherit and use descriptors from login.
ifdef(`gnome-pty-helper.te', `allow passwd_t gphdomain:fd use;')
-# allow checking if a shell is executable
-allow passwd_t shell_exec_t:file execute;
-
# make sure that getcon succeeds
allow passwd_t userdomain:dir search;
allow passwd_t userdomain:file read;
@@ -365,6 +365,7 @@ allow sysadm_passwd_t self:process ~{ ptrace setcurrent setexec setfscreate setr
allow sysadm_passwd_t self:process { setrlimit setfscreate };
allow sysadm_passwd_t self:fd use;
allow sysadm_passwd_t self:fifo_file rw_file_perms;
+allow sysadm_passwd_t self:sock_file r_file_perms;
allow sysadm_passwd_t self:unix_dgram_socket create_socket_perms;
allow sysadm_passwd_t self:unix_stream_socket create_stream_socket_perms;
allow sysadm_passwd_t self:unix_dgram_socket sendto;
@@ -403,6 +404,7 @@ term_use_all_user_ptys(sysadm_passwd_t)
auth_manage_shadow(sysadm_passwd_t)
# allow vipw to exec the editor
+corecmd_search_sbin(sysadm_passwd_t)
corecmd_exec_bin(sysadm_passwd_t)
corecmd_exec_shell(sysadm_passwd_t)
files_read_usr_files(sysadm_passwd_t)
diff --git a/refpolicy/policy/modules/kernel/bootloader.if b/refpolicy/policy/modules/kernel/bootloader.if
index 83e3fb6..e620283 100644
--- a/refpolicy/policy/modules/kernel/bootloader.if
+++ b/refpolicy/policy/modules/kernel/bootloader.if
@@ -164,6 +164,9 @@ interface(`bootloader_read_kernel_symbol_table',`
allow $1 boot_t:dir r_dir_perms;
allow $1 system_map_t:file r_file_perms;
+
+ # cjp: this should be dropped:
+ allow $1 boot_t:file { getattr read };
')
########################################
diff --git a/refpolicy/policy/modules/kernel/devices.if b/refpolicy/policy/modules/kernel/devices.if
index c1b5862..4a7ce1b 100644
--- a/refpolicy/policy/modules/kernel/devices.if
+++ b/refpolicy/policy/modules/kernel/devices.if
@@ -792,6 +792,23 @@ interface(`dev_rw_apm_bios',`
########################################
##
+## Read and write the PCMCIA card manager device.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`dev_rw_cardmgr',`
+ gen_require(`
+ type cardmgr_dev_t;
+ ')
+
+ allow $1 device_t:dir r_dir_perms;
+ allow $1 cardmgr_dev_t:chr_file { read write };
+')
+
+########################################
+##
## Do not audit attempts to read and
## write the PCMCIA card manager device.
##
@@ -1356,7 +1373,9 @@ interface(`dev_getattr_mtrr',`
')
allow $1 device_t:dir r_dir_perms;
- allow $1 mtrr_device_t:chr_file getattr;
+
+ # proc entry is a file. added for nmbd_t
+ allow $1 mtrr_device_t:{ file chr_file } getattr;
')
########################################
@@ -1967,6 +1986,23 @@ interface(`dev_getattr_usbfs_dir',`
########################################
##
+## Do not audit attempts to get the attributes
+## of a directory in the usb filesystem.
+##
+##
+## Domain to not audit.
+##
+#
+interface(`dev_dontaudit_getattr_usbfs_dir',`
+ gen_require(`
+ type usbfs_t;
+ ')
+
+ dontaudit $1 usbfs_t:dir getattr;
+')
+
+########################################
+##
## Search the directory containing USB hardware information.
##
##
diff --git a/refpolicy/policy/modules/kernel/filesystem.if b/refpolicy/policy/modules/kernel/filesystem.if
index 69a8354..f12e5d4 100644
--- a/refpolicy/policy/modules/kernel/filesystem.if
+++ b/refpolicy/policy/modules/kernel/filesystem.if
@@ -462,7 +462,7 @@ interface(`fs_getattr_cifs',`
## Search directories on a CIFS or SMB filesystem.
##
##
-## The type of the domain reading the files.
+## Domain allowed access.
##
#
interface(`fs_search_cifs',`
@@ -480,7 +480,7 @@ interface(`fs_search_cifs',`
## CIFS or SMB filesystem.
##
##
-## The type of the domain reading the files.
+## Domain allowed access.
##
#
interface(`fs_list_cifs',`
@@ -514,7 +514,7 @@ interface(`fs_dontaudit_list_cifs',`
## Read files on a CIFS or SMB filesystem.
##
##
-## The type of the domain reading the files.
+## Domain allowed access.
##
#
interface(`fs_read_cifs_files',`
@@ -1085,7 +1085,7 @@ interface(`fs_getattr_nfs',`
## Search directories on a NFS filesystem.
##
##
-## The type of the domain reading the files.
+## Domain allowed access.
##
#
interface(`fs_search_nfs',`
@@ -1119,7 +1119,7 @@ interface(`fs_dontaudit_list_nfs',`
## Read files on a NFS filesystem.
##
##
-## The type of the domain reading the files.
+## Domain allowed access.
##
#
interface(`fs_read_nfs_files',`
@@ -1152,6 +1152,23 @@ interface(`fs_dontaudit_read_nfs_files',`
########################################
##
+## Read files on a NFS filesystem.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`fs_write_nfs_files',`
+ gen_require(`
+ type nfs_t;
+ ')
+
+ allow $1 nfs_t:dir r_dir_perms;
+ allow $1 nfs_t:file write;
+')
+
+########################################
+##
## Execute files on a NFS filesystem.
##
##
diff --git a/refpolicy/policy/modules/kernel/kernel.if b/refpolicy/policy/modules/kernel/kernel.if
index bdd44b9..2b238ee 100644
--- a/refpolicy/policy/modules/kernel/kernel.if
+++ b/refpolicy/policy/modules/kernel/kernel.if
@@ -2,7 +2,7 @@
## Policy for kernel threads, proc filesystem,and unlabeled processes and objects.
##
##
-## This policy has initial SIDs.
+## This module has initial SIDs.
##
########################################
@@ -27,9 +27,9 @@ interface(`kernel_userland_entry',`
domain_auto_trans(kernel_t, $2, $1)
- allow $1 kernel_t:fd use;
allow kernel_t $1:fd use;
- allow kernel_t $1:fifo_file rw_file_perms;
+ allow $1 kernel_t:fd use;
+ allow $1 kernel_t:fifo_file rw_file_perms;
allow $1 kernel_t:process sigchld;
')
@@ -494,6 +494,23 @@ interface(`kernel_list_proc',`
########################################
##
+## Do not audit attempts to list the
+## contents of directories in /proc.
+##
+##
+## Domain to not audit.
+##
+#
+interface(`kernel_dontaudit_list_proc',`
+ gen_require(`
+ type proc_t;
+ ')
+
+ dontaudit $1 proc_t:dir list_dir_perms;
+')
+
+########################################
+##
## Read symbolic links in /proc.
##
##
@@ -1502,6 +1519,23 @@ interface(`kernel_dontaudit_getattr_unlabeled_file',`
########################################
##
+## Do not audit attempts by caller to
+## read an unlabeled file.
+##
+##
+## Domain to not audit.
+##
+#
+interface(`kernel_dontaudit_read_unlabeled_file',`
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:file { getattr read };
+')
+
+########################################
+##
## Do not audit attempts by caller to get attributes for
## unlabeled block devices.
##
diff --git a/refpolicy/policy/modules/kernel/terminal.if b/refpolicy/policy/modules/kernel/terminal.if
index fd5eced..f4c7fc6 100644
--- a/refpolicy/policy/modules/kernel/terminal.if
+++ b/refpolicy/policy/modules/kernel/terminal.if
@@ -124,7 +124,7 @@ interface(`term_create_pty',`
## ttys and all ptys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_all_terms',`
@@ -143,7 +143,7 @@ interface(`term_use_all_terms',`
## Write to the console.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_write_console',`
@@ -160,7 +160,7 @@ interface(`term_write_console',`
## Read from and write to the console.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_console',`
@@ -178,7 +178,7 @@ interface(`term_use_console',`
## or write to the console.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_dontaudit_use_console',`
@@ -195,7 +195,7 @@ interface(`term_dontaudit_use_console',`
## device node.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_setattr_console',`
@@ -230,7 +230,7 @@ interface(`term_dontaudit_getattr_pty_dir',`
## Search the contents of the /dev/pts directory.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_search_ptys',`
@@ -248,7 +248,7 @@ interface(`term_search_ptys',`
## list all ptys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_list_ptys',`
@@ -302,7 +302,7 @@ interface(`term_dontaudit_manage_pty_dir',`
## ioctl of generic pty types.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
# cjp: added for ppp
@@ -323,7 +323,7 @@ interface(`term_ioctl_generic_pty',`
## the targeted policy.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_generic_pty',`
@@ -361,7 +361,7 @@ interface(`term_dontaudit_use_generic_pty',`
## terminal (/dev/tty).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_controlling_term',`
@@ -413,7 +413,7 @@ interface(`term_dontaudit_use_ptmx',`
## pty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_getattr_all_user_ptys',`
@@ -435,7 +435,7 @@ interface(`term_getattr_all_user_ptys',`
## device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_dontaudit_getattr_all_user_ptys',`
@@ -455,7 +455,7 @@ interface(`term_dontaudit_getattr_all_user_ptys',`
## pty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_setattr_all_user_ptys',`
@@ -475,7 +475,7 @@ interface(`term_setattr_all_user_ptys',`
## Relabel to all user ptys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_relabelto_all_user_ptys',`
@@ -492,7 +492,7 @@ interface(`term_relabelto_all_user_ptys',`
## Read and write all user ptys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_all_user_ptys',`
@@ -529,7 +529,7 @@ interface(`term_dontaudit_use_all_user_ptys',`
## user pty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_relabel_all_user_ptys',`
@@ -550,7 +550,7 @@ interface(`term_relabel_all_user_ptys',`
## tty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_getattr_unallocated_ttys',`
@@ -569,7 +569,7 @@ interface(`term_getattr_unallocated_ttys',`
## of all unallocated tty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_dontaudit_getattr_unallocated_ttys',`
@@ -587,7 +587,7 @@ interface(`term_dontaudit_getattr_unallocated_ttys',`
## tty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_setattr_unallocated_ttys',`
@@ -606,7 +606,7 @@ interface(`term_setattr_unallocated_ttys',`
## tty type.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_relabel_unallocated_ttys',`
@@ -625,7 +625,7 @@ interface(`term_relabel_unallocated_ttys',`
## the unallocated tty type.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_reset_tty_labels',`
@@ -642,10 +642,27 @@ interface(`term_reset_tty_labels',`
########################################
##
+## Do not audit attempts to get the attributes
+## of unallocated ttys.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`term_dontaudit_getattr_unallocated_ttys',`
+ gen_require(`
+ type tty_device_t;
+ ')
+
+ dontaudit $1 tty_device_t:chr_file getattr;
+')
+
+########################################
+##
## Write to unallocated ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_write_unallocated_ttys',`
@@ -663,7 +680,7 @@ interface(`term_write_unallocated_ttys',`
## Read and write unallocated ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_unallocated_tty',`
@@ -699,7 +716,7 @@ interface(`term_dontaudit_use_unallocated_tty',`
## device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_getattr_all_user_ttys',`
@@ -719,7 +736,7 @@ interface(`term_getattr_all_user_ttys',`
## device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_dontaudit_getattr_all_user_ttys',`
@@ -738,7 +755,7 @@ interface(`term_dontaudit_getattr_all_user_ttys',`
## device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_setattr_all_user_ttys',`
@@ -757,7 +774,7 @@ interface(`term_setattr_all_user_ttys',`
## user tty device nodes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_relabel_all_user_ttys',`
@@ -775,7 +792,7 @@ interface(`term_relabel_all_user_ttys',`
## Write to all user ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_write_all_user_ttys',`
@@ -793,7 +810,7 @@ interface(`term_write_all_user_ttys',`
## Read and write all user to all user ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_use_all_user_ttys',`
@@ -811,7 +828,7 @@ interface(`term_use_all_user_ttys',`
## any user ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`term_dontaudit_use_all_user_ttys',`
diff --git a/refpolicy/policy/modules/services/apache.te b/refpolicy/policy/modules/services/apache.te
index 2a61cf3..9cc5489 100644
--- a/refpolicy/policy/modules/services/apache.te
+++ b/refpolicy/policy/modules/services/apache.te
@@ -179,6 +179,8 @@ allow httpd_t httpd_squirrelmail_t:dir create_dir_perms;
allow httpd_t httpd_squirrelmail_t:lnk_file create_lnk_perms;
allow httpd_t httpd_squirrelmail_t:file create_file_perms;
+allow httpd_t httpd_suexec_exec_t:file { getattr read };
+
allow httpd_t httpd_sys_content_t:dir r_dir_perms;
allow httpd_t httpd_sys_content_t:file r_file_perms;
@@ -393,13 +395,6 @@ optional_policy(`mailman.te',`
mailman_read_archive(httpd_t)
')
-optional_policy(`mta.te',`
- mta_stub()
-
- # apache should set close-on-exec
- dontaudit httpd_suexec_t httpd_t:unix_stream_socket { read write };
-')
-
optional_policy(`mysql.te',`
mysql_stream_connect(httpd_t)
mysql_rw_db_socket(httpd_t)
@@ -409,6 +404,11 @@ optional_policy(`nscd.te',`
nscd_use_socket(httpd_t)
')
+optional_policy(`postgresql.te',`
+ # Allow httpd to work with postgresql
+ postgresql_unix_connect(httpd_t)
+')
+
optional_policy(`selinuxutil.te',`
seutil_sigchld_newrole(httpd_t)
')
@@ -544,6 +544,7 @@ corecmd_exec_shell(httpd_suexec_t)
files_read_etc_files(httpd_suexec_t)
files_read_usr_files(httpd_suexec_t)
files_dontaudit_search_pids(httpd_suexec_t)
+files_search_home(httpd_suexec_t)
libs_use_ld_so(httpd_suexec_t)
libs_use_shared_libs(httpd_suexec_t)
@@ -619,6 +620,13 @@ optional_policy(`mount.te',`
')
')
+optional_policy(`mta.te',`
+ mta_stub(httpd_suexec_t)
+
+ # apache should set close-on-exec
+ dontaudit httpd_suexec_t httpd_t:unix_stream_socket { read write };
+')
+
optional_policy(`nis.te',`
nis_use_ypbind(httpd_suexec_t)
')
diff --git a/refpolicy/policy/modules/services/apm.if b/refpolicy/policy/modules/services/apm.if
index ed346a9..4cac734 100644
--- a/refpolicy/policy/modules/services/apm.if
+++ b/refpolicy/policy/modules/services/apm.if
@@ -86,3 +86,21 @@ interface(`apm_append_log',`
logging_search_logs($1)
allow $1 apmd_log_t:file append;
')
+
+########################################
+##
+## Connect to apmd over an unix stream socket.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`apm_stream_connect',`
+ gen_require(`
+ type apmd_t;
+ ')
+
+ files_search_pids($1)
+ allow $1 apmd_var_run_t:sock_file write;
+ allow $1 apmd_t:unix_stream_socket connectto;
+')
diff --git a/refpolicy/policy/modules/services/arpwatch.if b/refpolicy/policy/modules/services/arpwatch.if
index dc5b070..2e0dedd 100644
--- a/refpolicy/policy/modules/services/arpwatch.if
+++ b/refpolicy/policy/modules/services/arpwatch.if
@@ -51,6 +51,22 @@ interface(`arpwatch_rw_tmp_files',`
########################################
##
+## Read and write arpwatch temporary files.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`arpwatch_manage_tmp_files',`
+ gen_require(`
+ type arpwatch_tmp_t;
+ ')
+
+ allow $1 arpwatch_tmp_t:file manage_file_perms;
+')
+
+########################################
+##
## Do not audit attempts to read and write
## arpwatch packet sockets.
##
diff --git a/refpolicy/policy/modules/services/bind.te b/refpolicy/policy/modules/services/bind.te
index a4db2f7..7c31188 100644
--- a/refpolicy/policy/modules/services/bind.te
+++ b/refpolicy/policy/modules/services/bind.te
@@ -148,7 +148,6 @@ ifdef(`targeted_policy',`
term_dontaudit_use_unallocated_tty(named_t)
term_dontaudit_use_generic_pty(named_t)
files_dontaudit_read_root_file(named_t)
- #dontaudit ndc_t unlabeled_t:file { getattr read };
')
optional_policy(`dbus.te',`
@@ -247,7 +246,9 @@ ifdef(`distro_redhat',`
allow ndc_t named_conf_t:dir search;
')
-ifdef(`targeted_policy', `
+ifdef(`targeted_policy',`
+ kernel_dontaudit_read_unlabeled_file(ndc_t)
+
term_use_unallocated_tty(ndc_t)
term_use_generic_pty(ndc_t)
')
@@ -270,6 +271,10 @@ optional_policy(`nscd.te',`
nscd_use_socket(ndc_t)
')
+optional_policy(`bind.te',`
+ ppp_dontaudit_use_fd(ndc_t)
+')
+
###########################################################
#
# Partially converted rules. THESE ARE ONLY TEMPORARY
diff --git a/refpolicy/policy/modules/services/bluetooth.te b/refpolicy/policy/modules/services/bluetooth.te
index 1ab8ded..5d6e7bb 100644
--- a/refpolicy/policy/modules/services/bluetooth.te
+++ b/refpolicy/policy/modules/services/bluetooth.te
@@ -206,6 +206,8 @@ logging_send_syslog_msg(bluetooth_helper_t)
miscfiles_read_localization(bluetooth_helper_t)
miscfiles_read_fonts(bluetooth_helper_t)
+userdom_search_all_users_home(bluetooth_helper_t)
+
optional_policy(`nscd.te',`
nscd_use_socket(bluetooth_helper_t)
')
@@ -213,20 +215,12 @@ optional_policy(`nscd.te',`
ifdef(`TODO',`
allow bluetooth_helper_t tmp_t:dir search;
-allow bluetooth_helper_t home_dir_type:dir search;
-
ifdef(`xserver.te', `
allow bluetooth_helper_t xserver_log_t:dir search;
allow bluetooth_helper_t xserver_log_t:file { getattr read };
')
-ifdef(`targeted_policy', `
- allow bluetooth_helper_t tmp_t:sock_file { read write };
- allow bluetooth_helper_t tmpfs_t:file { read write };
- allow bluetooth_helper_t unconfined_t:unix_stream_socket connectto;
- allow bluetooth_t unconfined_t:dbus send_msg;
- allow unconfined_t bluetooth_t:dbus send_msg;
-', `
+ifdef(`targeted_policy', `', `
ifdef(`xdm.te', `
allow bluetooth_helper_t xdm_xserver_tmp_t:sock_file { read write };
')
@@ -237,6 +231,11 @@ ifdef(`targeted_policy', `
') dnl end TODO
ifdef(`targeted_policy',`
+ allow bluetooth_helper_t tmp_t:sock_file { read write };
+ allow bluetooth_helper_t tmpfs_t:file { read write };
+ allow bluetooth_helper_t unconfined_t:unix_stream_socket connectto;
+ allow bluetooth_t unconfined_t:dbus send_msg;
+ allow unconfined_t bluetooth_t:dbus send_msg;
allow bluetooth_t unconfined_t:dbus send_msg;
allow unconfined_t bluetooth_t:dbus send_msg;
')
diff --git a/refpolicy/policy/modules/services/comsat.te b/refpolicy/policy/modules/services/comsat.te
index 57eb700..3f13e1c 100644
--- a/refpolicy/policy/modules/services/comsat.te
+++ b/refpolicy/policy/modules/services/comsat.te
@@ -75,6 +75,8 @@ miscfiles_read_localization(comsat_t)
sysnet_read_config(comsat_t)
+userdom_dontaudit_getattr_sysadm_tty(comsat_t)
+
mta_getattr_spool(comsat_t)
optional_policy(`kerberos.te',`
@@ -89,6 +91,4 @@ optional_policy(`nscd.te',`
nscd_use_socket(comsat_t)
')
-ifdef(`TODO',`
-dontaudit comsat_t sysadm_tty_device_t:chr_file getattr;
-')
+
diff --git a/refpolicy/policy/modules/services/cron.if b/refpolicy/policy/modules/services/cron.if
index c20e965..3df2e37 100644
--- a/refpolicy/policy/modules/services/cron.if
+++ b/refpolicy/policy/modules/services/cron.if
@@ -375,10 +375,9 @@ interface(`cron_sigchld',`
interface(`cron_read_pipe',`
gen_require(`
type crond_t;
- class file r_file_perms;
')
- allow $1 crond_t:file r_file_perms;
+ allow $1 crond_t:fifo_file r_file_perms;
')
########################################
diff --git a/refpolicy/policy/modules/services/cups.if b/refpolicy/policy/modules/services/cups.if
index d1e86d0..5ef539b 100644
--- a/refpolicy/policy/modules/services/cups.if
+++ b/refpolicy/policy/modules/services/cups.if
@@ -2,6 +2,27 @@
########################################
##
+## Execute cups_config in the cups_config domain.
+##
+##
+## The type of the process performing this action.
+##
+#
+interface(`cups_domtrans_config',`
+ gen_require(`
+ type cupsd_config_t, cupsd_config_exec_t;
+ ')
+
+ domain_auto_trans($1,cupsd_config_exec_t,cupsd_config_t)
+
+ allow $1 cupsd_config_t:fd use;
+ allow cupsd_config_t $1:fd use;
+ allow cupsd_config_t $1:fifo_file rw_file_perms;
+ allow cupsd_config_t $1:process sigchld;
+')
+
+########################################
+##
## Read cups-writable configuration files.
##
##
diff --git a/refpolicy/policy/modules/services/cups.te b/refpolicy/policy/modules/services/cups.te
index b3517f7..33ce8a0 100644
--- a/refpolicy/policy/modules/services/cups.te
+++ b/refpolicy/policy/modules/services/cups.te
@@ -661,7 +661,6 @@ optional_policy(`hal.te', `
')
allow hald_t cupsd_config_t:process signal;
- domain_auto_trans(hald_t, cupsd_config_exec_t, cupsd_config_t)
')
# killall causes the following
diff --git a/refpolicy/policy/modules/services/finger.te b/refpolicy/policy/modules/services/finger.te
index ce2cfb9..f38f3bd 100644
--- a/refpolicy/policy/modules/services/finger.te
+++ b/refpolicy/policy/modules/services/finger.te
@@ -136,3 +136,7 @@ optional_policy(`rhgb.te',`
rhgb_domain(fingerd_t)
')
')
+
+# stop it accessing sub-directories, prevents checking a Maildir for new mail,
+# have to change this when we create a type for Maildir
+dontaudit fingerd_t user_home_t:dir search;
diff --git a/refpolicy/policy/modules/services/ftp.if b/refpolicy/policy/modules/services/ftp.if
index 71042be..bf1c3dd 100644
--- a/refpolicy/policy/modules/services/ftp.if
+++ b/refpolicy/policy/modules/services/ftp.if
@@ -1,5 +1,40 @@
## File transfer protocol service
+#######################################
+##
+## The per user domain template for the ftp module.
+##
+##
+##
+## This template allows ftpd to manage files in
+## a user home directory, creating files with the
+## correct type.
+##
+##
+## This template is invoked automatically for each user, and
+## generally does not need to be invoked directly
+## by policy writers.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+#
+template(`ftp_per_userdomain_template',`
+ gen_require(`
+ type ftpd_t;
+ ')
+
+ tunable_policy(`ftpd_is_daemon',`
+ userdom_manage_user_home_subdir_files($1,ftpd_t)
+ userdom_manage_user_home_subdir_symlinks($1,ftpd_t)
+ userdom_manage_user_home_subdir_sockets($1,ftpd_t)
+ userdom_manage_user_home_subdir_pipes($1,ftpd_t)
+ userdom_create_user_home($1,ftpd_t,{ dir file lnk_file sock_file fifo_file })
+ ')
+')
+
########################################
##
## Use ftp by connecting over TCP.
diff --git a/refpolicy/policy/modules/services/ftp.te b/refpolicy/policy/modules/services/ftp.te
index 9577069..d19d772 100644
--- a/refpolicy/policy/modules/services/ftp.te
+++ b/refpolicy/policy/modules/services/ftp.te
@@ -97,6 +97,7 @@ auth_append_login_records(ftpd_t)
auth_write_login_records(ftpd_t)
corecmd_exec_bin(ftpd_t)
+corecmd_exec_sbin(ftpd_t)
# Execute /bin/ls (can comment this out for proftpd)
# also may need rules to allow tar etc...
corecmd_exec_ls(ftpd_t)
@@ -130,6 +131,17 @@ ifdef(`targeted_policy',`
term_dontaudit_use_generic_pty(ftpd_t)
term_dontaudit_use_unallocated_tty(ftpd_t)
+
+ optional_policy(`ftp.te',`
+ tunable_policy(`ftpd_is_daemon',`
+ # cjp: fix this to use regular interfaces
+ userdom_manage_user_home_subdir_files(user,ftpd_t)
+ userdom_manage_user_home_subdir_symlinks(user,ftpd_t)
+ userdom_manage_user_home_subdir_sockets(user,ftpd_t)
+ userdom_manage_user_home_subdir_pipes(user,ftpd_t)
+ userdom_create_user_home(user,ftpd_t,{ dir file lnk_file sock_file fifo_file })
+ ')
+ ')
')
tunable_policy(`allow_ftpd_anon_write',`
@@ -213,13 +225,4 @@ ifdef(`TODO',`
optional_policy(`rhgb.te',`
rhgb_domain(ftpd_t)
')
-
-# cjp: this was in base user macro, but we cannot
-# use typeattribute ftpd_t privhome; interface
-# since typeattribute doesnt work in conditionals
-ifdef(`ftpd.te' , `
-if (ftpd_is_daemon) {
-file_type_auto_trans(ftpd_t, $1_home_dir_t, $1_home_t)
-}
-')
')
diff --git a/refpolicy/policy/modules/services/hal.if b/refpolicy/policy/modules/services/hal.if
index 68f262d..ca45cde 100644
--- a/refpolicy/policy/modules/services/hal.if
+++ b/refpolicy/policy/modules/services/hal.if
@@ -20,3 +20,20 @@ interface(`hal_domtrans',`
allow hald_t $1:fifo_file rw_file_perms;
allow hald_t $1:process sigchld;
')
+
+########################################
+##
+## Send to hal over a unix domain
+## datagram socket.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`hal_dgram_sendto',`
+ gen_require(`
+ type hald_t;
+ ')
+
+ allow $1 hald_t:unix_dgram_socket sendto;
+')
diff --git a/refpolicy/policy/modules/services/hal.te b/refpolicy/policy/modules/services/hal.te
index 6c80d20..725485c 100644
--- a/refpolicy/policy/modules/services/hal.te
+++ b/refpolicy/policy/modules/services/hal.te
@@ -125,6 +125,16 @@ ifdef(`targeted_policy', `
files_dontaudit_read_root_file(hald_t)
')
+optional_policy(`apm.te',`
+ # For /usr/libexec/hald-addon-acpi
+ # writes to /var/run/acpid.socket
+ apm_stream_connect(hald_t)
+')
+
+optional_policy(`cups.te',`
+ cups_domtrans_config(hald_t)
+')
+
optional_policy(`dbus.te',`
allow hald_t self:dbus send_msg;
dbus_system_bus_client_template(hald,hald_t)
@@ -181,12 +191,6 @@ allow hald_t device_t:dir create_dir_perms;
optional_policy(`hald.te',`
allow udev_t hald_t:unix_dgram_socket sendto;
')
-
-# For /usr/libexec/hald-addon-acpi - writes to /var/run/acpid.socket
-ifdef(`apmd.te', `
-allow hald_t apmd_var_run_t:sock_file write;
-allow hald_t apmd_t:unix_stream_socket connectto;
-')
') dnl end TODO
ifdef(`targeted_policy', `
diff --git a/refpolicy/policy/modules/services/inn.te b/refpolicy/policy/modules/services/inn.te
index 11b1b03..83655c1 100644
--- a/refpolicy/policy/modules/services/inn.te
+++ b/refpolicy/policy/modules/services/inn.te
@@ -86,6 +86,8 @@ term_dontaudit_use_console(innd_t)
corecmd_exec_bin(innd_t)
corecmd_exec_shell(innd_t)
+corecmd_search_sbin(innd_t)
+corecmd_read_sbin_symlink(innd_t)
domain_use_wide_inherit_fd(innd_t)
diff --git a/refpolicy/policy/modules/services/mailman.te b/refpolicy/policy/modules/services/mailman.te
index 3e3613b..8687b89 100644
--- a/refpolicy/policy/modules/services/mailman.te
+++ b/refpolicy/policy/modules/services/mailman.te
@@ -51,6 +51,9 @@ optional_policy(`apache.te',`
apache_sigchld(mailman_cgi_t)
apache_use_fd(mailman_cgi_t)
apache_dontaudit_append_log(mailman_cgi_t)
+
+ # FIXME:
+ allow mailman_cgi_t httpd_sys_script_t:dir search;
')
########################################
diff --git a/refpolicy/policy/modules/services/mta.te b/refpolicy/policy/modules/services/mta.te
index 5334c09..d85e550 100644
--- a/refpolicy/policy/modules/services/mta.te
+++ b/refpolicy/policy/modules/services/mta.te
@@ -191,6 +191,9 @@ optional_policy(`postfix.te',`
optional_policy(`crond.te',`
cron_crw_tcp_socket(system_mail_t)
')
+
+ allow mta_user_agent sysadm_t:fifo_file { read write };
+ type_transition postfix_master_t postfix_etc_t:dir etc_aliases_t;
')
optional_policy(`sendmail.te',`
@@ -230,10 +233,13 @@ optional_policy(`qmail.te',`
allow system_mail_t qmail_etc_t:dir search;
allow system_mail_t qmail_etc_t:{ file lnk_file } read;
')
+') dnl end TODO
+
+allow mta_user_agent system_crond_tmp_t:file { read getattr };
optional_policy(`arpwatch.te',`
# why is mail delivered to a directory of type arpwatch_data_t?
- arpwatch_search_data_dir(mta_delivery_agent)
+ arpwatch_search_data(mailserver_delivery)
arpwatch_manage_tmp_files(system_mail_t)
arpwatch_manage_tmp_files(mta_user_agent)
ifdef(`hide_broken_symptoms', `
@@ -241,5 +247,3 @@ optional_policy(`arpwatch.te',`
arpwatch_dontaudit_rw_packet_socket(mta_user_agent)
')
')
-
-') dnl end TODO
diff --git a/refpolicy/policy/modules/services/nis.if b/refpolicy/policy/modules/services/nis.if
index 2451eb2..649d341 100644
--- a/refpolicy/policy/modules/services/nis.if
+++ b/refpolicy/policy/modules/services/nis.if
@@ -204,3 +204,54 @@ interface(`nis_tcp_connect_ypbind',`
allow ypbind_t $1:tcp_socket { acceptfrom recvfrom };
allow $1 kernel_t:tcp_socket recvfrom;
')
+
+########################################
+##
+## Read ypbind pid files.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`nis_read_ypbind_pid',`
+ gen_require(`
+ type ypbind_t;
+ ')
+
+ files_search_pids($1)
+ allow $1 ypbind_t:file r_file_perms;
+')
+
+########################################
+##
+## Delete ypbind pid files.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`nis_delete_ypbind_pid',`
+ gen_require(`
+ type ypbind_t;
+ ')
+
+ # TODO: add delete pid from dir call to files
+ allow $1 ypbind_t:file unlink;
+')
+
+########################################
+##
+## Read ypserv configuration files.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`nis_read_ypserv_config',`
+ gen_require(`
+ type ypserv_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 ypserv_t:file { getattr read };
+')
diff --git a/refpolicy/policy/modules/services/nscd.te b/refpolicy/policy/modules/services/nscd.te
index 559589e..afeff3e 100644
--- a/refpolicy/policy/modules/services/nscd.te
+++ b/refpolicy/policy/modules/services/nscd.te
@@ -90,6 +90,7 @@ selinux_compute_user_contexts(nscd_t)
domain_use_wide_inherit_fd(nscd_t)
files_read_etc_files(nscd_t)
+files_read_generic_tmp_symlinks(nscd_t)
init_use_fd(nscd_t)
init_use_script_pty(nscd_t)
@@ -126,6 +127,7 @@ optional_policy(`nis.te',`
optional_policy(`samba.te',`
samba_connect_winbind(nscd_t)
+ samba_search_var(nscd_t)
')
optional_policy(`udev.te', `
@@ -133,13 +135,7 @@ optional_policy(`udev.te', `
')
ifdef(`TODO',`
-optional_policy(`winbind.te', `
- allow nscd_t samba_var_t:dir search;
-')
optional_policy(`rhgb.te',`
rhgb_domain(nscd_t)
')
-
-allow nscd_t tmp_t:dir { search getattr };
-allow nscd_t tmp_t:lnk_file read;
') dnl end TODO
diff --git a/refpolicy/policy/modules/services/ntp.te b/refpolicy/policy/modules/services/ntp.te
index 524fcc3..748c48e 100644
--- a/refpolicy/policy/modules/services/ntp.te
+++ b/refpolicy/policy/modules/services/ntp.te
@@ -112,6 +112,7 @@ miscfiles_read_localization(ntpd_t)
sysnet_read_config(ntpd_t)
userdom_dontaudit_use_unpriv_user_fd(ntpd_t)
+userdom_list_sysadm_home_dir(ntpd_t)
userdom_dontaudit_list_sysadm_home_dir(ntpd_t)
ifdef(`targeted_policy', `
@@ -145,6 +146,12 @@ optional_policy(`nscd.te',`
nscd_use_socket(ntpd_t)
')
+optional_policy(`samba.te',`
+ # cjp: the connect was previously missing
+ # so it might be ok to drop this
+ samba_connect_winbind(ntpd_t)
+')
+
optional_policy(`selinuxutil.te',`
seutil_sigchld_newrole(ntpd_t)
')
@@ -162,9 +169,4 @@ allow sysadm_t ntpd_t:udp_socket recvfrom;
allow sysadm_t ntpd_t:udp_socket sendto;
allow ntpd_t sysadm_t:udp_socket recvfrom;
-
-ifdef(`winbind.te', `
-allow ntpd_t winbind_var_run_t:dir r_dir_perms;
-allow ntpd_t winbind_var_run_t:sock_file rw_file_perms;
-')
') dnl end TODO
diff --git a/refpolicy/policy/modules/services/portmap.te b/refpolicy/policy/modules/services/portmap.te
index c9dcd28..1f4c4db 100644
--- a/refpolicy/policy/modules/services/portmap.te
+++ b/refpolicy/policy/modules/services/portmap.te
@@ -200,6 +200,11 @@ sysnet_read_config(portmap_helper_t)
userdom_dontaudit_use_all_user_fd(portmap_helper_t)
+ifdef(`targeted_policy', `
+ term_dontaudit_use_unallocated_tty(portmap_helper_t)
+ term_dontaudit_use_generic_pty(portmap_helper_t)
+')
+
optional_policy(`mount.te',`
mount_send_nfs_client_request(portmap_helper_t)
')
diff --git a/refpolicy/policy/modules/services/postfix.te b/refpolicy/policy/modules/services/postfix.te
index e7ddccc..e589926 100644
--- a/refpolicy/policy/modules/services/postfix.te
+++ b/refpolicy/policy/modules/services/postfix.te
@@ -93,6 +93,8 @@ allow postfix_master_t self:fifo_file rw_file_perms;
allow postfix_master_t self:tcp_socket create_stream_socket_perms;
allow postfix_master_t self:udp_socket create_socket_perms;
+allow postfix_master_t postfix_etc_t:file rw_file_perms;
+
can_exec(postfix_master_t,postfix_exec_t)
allow postfix_master_t postfix_map_exec_t:file rx_file_perms;
@@ -333,6 +335,7 @@ allow postfix_map_t postfix_map_tmp_t:file create_file_perms;
files_create_tmp_files(postfix_map_t, postfix_map_tmp_t, { file dir })
kernel_read_kernel_sysctl(postfix_map_t)
+kernel_dontaudit_list_proc(postfix_map_t)
corenet_tcp_sendrecv_all_if(postfix_map_t)
corenet_udp_sendrecv_all_if(postfix_map_t)
@@ -463,6 +466,11 @@ optional_policy(`crond.te',`
cron_rw_system_job_pipe(postfix_postdrop_t)
')
+optional_policy(`ppp.te',`
+ ppp_use_fd(postfix_postqueue_t)
+ ppp_sigchld(postfix_postqueue_t)
+')
+
#######################################
#
# Postfix postqueue local policy
diff --git a/refpolicy/policy/modules/services/postgresql.te b/refpolicy/policy/modules/services/postgresql.te
index 5c19d7f..fd1de40 100644
--- a/refpolicy/policy/modules/services/postgresql.te
+++ b/refpolicy/policy/modules/services/postgresql.te
@@ -212,12 +212,4 @@ ifdef(`distro_gentoo', `
postgresql_search_db_dir(initrc_su_t)
dontaudit initrc_su_t sysadm_devpts_t:chr_file rw_file_perms;
')
-
-# Goes to apache.te:
-# Allow httpd to work with postgresql
-optional_policy(`postgresql.te', `
- # Original policy had apache connecting to postgresql_tmp_t:sock_file
- # instead of what is assumed to be correct: postgresql_var_run_t. -Don
- postgresql_unix_connect(httpd_t)
-')
')
diff --git a/refpolicy/policy/modules/services/ppp.if b/refpolicy/policy/modules/services/ppp.if
index 88c7fba..aa5e4d9 100644
--- a/refpolicy/policy/modules/services/ppp.if
+++ b/refpolicy/policy/modules/services/ppp.if
@@ -18,6 +18,23 @@ interface(`ppp_use_fd',`
########################################
##
+## Do not audit attempts to inherit
+## and use PPP file discriptors.
+##
+##
+## Domain to not audit.
+##
+#
+interface(`ppp_dontaudit_use_fd',`
+ gen_require(`
+ type pppd_t;
+ ')
+
+ dontaudit $1 pppd_t:fd use;
+')
+
+########################################
+##
## Allow domain to send sigchld to parent of PPP domain type.
##
##
@@ -35,7 +52,7 @@ interface(`ppp_sigchld',`
########################################
##
-## Allow domain to send a signal to PPP domain type.
+## Send a generic signal to PPP.
##
##
## Domain allowed access.
@@ -51,6 +68,22 @@ interface(`ppp_signal',`
########################################
##
+## Send a SIGCHLD signal to PPP.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`ppp_sigchld',`
+ gen_require(`
+ type pppd_t;
+ ')
+
+ allow $1 pppd_t:process sigchld;
+')
+
+########################################
+##
## Execute domain in the ppp domain.
##
##
diff --git a/refpolicy/policy/modules/services/ppp.te b/refpolicy/policy/modules/services/ppp.te
index 8734731..cb55c54 100644
--- a/refpolicy/policy/modules/services/ppp.te
+++ b/refpolicy/policy/modules/services/ppp.te
@@ -107,9 +107,8 @@ allow pppd_t pppd_secret_t:file r_file_perms;
# Automatically label newly created files under /etc/ppp with this type
type_transition pppd_t pppd_etc_t:file pppd_etc_rw_t;
-kernel_list_proc(pppd_t)
kernel_read_kernel_sysctl(pppd_t)
-kernel_read_proc_symlinks(pppd_t)
+kernel_read_system_state(pppd_t)
kernel_read_net_sysctl(pppd_t)
kernel_read_network_state(pppd_t)
kernel_load_module(pppd_t)
@@ -318,23 +317,22 @@ optional_policy(`udev.te',`
')
ifdef(`TODO',`
-ifdef(`postfix.te', `
- allow pppd_t postfix_etc_t:dir search;
- allow pppd_t postfix_etc_t:file r_file_perms;
- allow pppd_t postfix_master_exec_t:file { getattr read };
-
- ppp_use_fd(postfix_postqueue_t)
- ppp_signal_daemon(postfix_postqueue_t)
-')
optional_policy(`rhgb.te',`
rhgb_domain(pppd_t)
')
optional_policy(`rhgb.te',`
rhgb_domain(pptp_t)
')
-ifdef(`named.te', `
- dontaudit ndc_t pppd_t:fd use;
')
-domain_auto_trans(pppd_t, pppd_script_exec_t, initrc_t)
+ifdef(`postfix.te', `
+ allow pppd_t postfix_etc_t:dir search;
+ allow pppd_t postfix_etc_t:file r_file_perms;
+ allow pppd_t postfix_master_exec_t:file { getattr read };
')
+
+domain_auto_trans(pppd_t, pppd_script_exec_t, initrc_t)
+allow pppd_t initrc_t:fd use;
+allow initrc_t pppd_t:fd use;
+allow initrc_t pppd_t:fifo_file rw_file_perms;
+allow initrc_t pppd_t:process sigchld;
diff --git a/refpolicy/policy/modules/services/radius.te b/refpolicy/policy/modules/services/radius.te
index b8ad337..c07e206 100644
--- a/refpolicy/policy/modules/services/radius.te
+++ b/refpolicy/policy/modules/services/radius.te
@@ -76,6 +76,7 @@ auth_read_shadow(radiusd_t)
corecmd_exec_bin(radiusd_t)
corecmd_exec_shell(radiusd_t)
+corecmd_search_sbin(radiusd_t)
domain_use_wide_inherit_fd(radiusd_t)
diff --git a/refpolicy/policy/modules/services/rlogin.te b/refpolicy/policy/modules/services/rlogin.te
index 17d8e1e..abc611e 100644
--- a/refpolicy/policy/modules/services/rlogin.te
+++ b/refpolicy/policy/modules/services/rlogin.te
@@ -87,6 +87,7 @@ seutil_dontaudit_search_config(rlogind_t)
sysnet_read_config(rlogind_t)
+userdom_setattr_unpriv_user_pty(rlogind_t)
# cjp: this is egregious
userdom_read_all_user_files(rlogind_t)
diff --git a/refpolicy/policy/modules/services/rpc.te b/refpolicy/policy/modules/services/rpc.te
index c67e85b..b8ade12 100644
--- a/refpolicy/policy/modules/services/rpc.te
+++ b/refpolicy/policy/modules/services/rpc.te
@@ -62,13 +62,17 @@ files_manage_mounttab(rpcd_t)
seutil_dontaudit_search_config(rpcd_t)
-# FIXME
-dontaudit userdomain exports_t:file getattr;
-
ifdef(`distro_redhat',`
allow rpcd_t self:capability { chown dac_override setgid setuid };
')
+optional_policy(`nis.te',`
+ nis_read_ypserv_config(rpcd_t)
+')
+
+# FIXME
+dontaudit userdomain exports_t:file getattr;
+
########################################
#
# NFSD local policy
@@ -132,9 +136,9 @@ fs_read_rpc_dirs(gssd_t)
fs_read_rpc_sockets(gssd_t)
fs_read_rpc_files(gssd_t)
-files_read_tmp(gssd_t)
-files_read_tmp_files(gssd_t)
-files_read_tmp_symlinks(gssd_t)
+files_list_tmp(gssd_t)
+files_read_generic_tmp_files(gssd_t)
+files_read_generic_tmp_symlinks(gssd_t)
tunable_policy(`allow_gssd_read_tmp',`
userdom_list_unpriv_user_tmp(gssd_t)
diff --git a/refpolicy/policy/modules/services/rshd.te b/refpolicy/policy/modules/services/rshd.te
index 5ab132e..d5c5711 100644
--- a/refpolicy/policy/modules/services/rshd.te
+++ b/refpolicy/policy/modules/services/rshd.te
@@ -74,8 +74,8 @@ tunable_policy(`use_nfs_home_dirs',`
')
tunable_policy(`use_samba_home_dirs',`
- fs_read_nfs_files(rshd_t)
- fs_read_nfs_symlinks(rshd_t)
+ fs_read_cifs_files(rshd_t)
+ fs_read_cifs_symlinks(rshd_t)
')
optional_policy(`kerberos.te',`
diff --git a/refpolicy/policy/modules/services/samba.if b/refpolicy/policy/modules/services/samba.if
index d28ba60..3e9a0a5 100644
--- a/refpolicy/policy/modules/services/samba.if
+++ b/refpolicy/policy/modules/services/samba.if
@@ -197,6 +197,24 @@ interface(`samba_read_secrets',`
########################################
##
+## Allow the specified domain to search
+## samba /var directories.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`samba_search_var',`
+ gen_require(`
+ type samba_var_t;
+ ')
+
+ files_search_var($1)
+ allow $1 samba_var_t:dir search_dir_perms;
+')
+
+########################################
+##
## Allow the specified domain to write to smbmount tcp sockets.
##
##
diff --git a/refpolicy/policy/modules/services/samba.te b/refpolicy/policy/modules/services/samba.te
index 7702c76..47e8ead 100644
--- a/refpolicy/policy/modules/services/samba.te
+++ b/refpolicy/policy/modules/services/samba.te
@@ -233,6 +233,7 @@ corenet_tcp_connect_smbd_port(smbd_t)
dev_read_sysfs(smbd_t)
dev_read_urand(smbd_t)
+dev_dontaudit_getattr_usbfs_dir(smbd_t)
fs_getattr_all_fs(smbd_t)
fs_get_xattr_fs_quotas(smbd_t)
diff --git a/refpolicy/policy/modules/services/snmp.te b/refpolicy/policy/modules/services/snmp.te
index 45b81a3..b5cfae2 100644
--- a/refpolicy/policy/modules/services/snmp.te
+++ b/refpolicy/policy/modules/services/snmp.te
@@ -146,6 +146,15 @@ ifdef(`TODO',`
can_udp_send(sysadm_t, snmpd_t)
can_udp_send(snmpd_t, sysadm_t)
+optional_policy(`cupsd.te', `
+ allow snmpd_t cupsd_rw_etc_t:file { getattr read };
+')
+
+optional_policy(`rhgb.te',`
+ rhgb_domain(snmpd_t)
+')
+') dnl end TODO
+
ifdef(`distro_redhat', `
optional_policy(`rpm.te', `
dontaudit snmpd_t rpm_var_lib_t:dir write;
@@ -153,20 +162,9 @@ ifdef(`distro_redhat', `
')
')
-dontaudit snmpd_t rpc_pipefs_t:dir getattr;
-allow snmpd_t rpc_pipefs_t:dir getattr;
-
optional_policy(`amanda.te', `
dontaudit snmpd_t amanda_dumpdates_t:file { getattr read };
')
-optional_policy(`cupsd.te', `
- allow snmpd_t cupsd_rw_etc_t:file { getattr read };
-')
-
+allow snmpd_t rpc_pipefs_t:dir getattr;
allow snmpd_t var_lib_nfs_t:dir search;
-
-optional_policy(`rhgb.te',`
- rhgb_domain(snmpd_t)
-')
-') dnl end TODO
diff --git a/refpolicy/policy/modules/services/spamassassin.te b/refpolicy/policy/modules/services/spamassassin.te
index 1ec9f1a..f872211 100644
--- a/refpolicy/policy/modules/services/spamassassin.te
+++ b/refpolicy/policy/modules/services/spamassassin.te
@@ -37,6 +37,7 @@ dontaudit spamd_t self:capability sys_tty_config;
allow spamd_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
allow spamd_t self:fd use;
allow spamd_t self:fifo_file rw_file_perms;
+allow spamd_t self:sock_file r_file_perms;
allow spamd_t self:shm create_shm_perms;
allow spamd_t self:sem create_sem_perms;
allow spamd_t self:msgq create_msgq_perms;
diff --git a/refpolicy/policy/modules/system/authlogin.te b/refpolicy/policy/modules/system/authlogin.te
index 6bc464a..ee6fd72 100644
--- a/refpolicy/policy/modules/system/authlogin.te
+++ b/refpolicy/policy/modules/system/authlogin.te
@@ -262,16 +262,22 @@ ifdef(`xdm.te', `
allow system_chkpwd_t self:capability setuid;
allow system_chkpwd_t self:process getattr;
+allow system_chkpwd_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
allow system_chkpwd_t shadow_t:file { getattr read };
# is_selinux_enabled
kernel_read_system_state(system_chkpwd_t)
+dev_read_rand(system_chkpwd_t)
+dev_read_urand(system_chkpwd_t)
+
fs_dontaudit_getattr_xattr_fs(system_chkpwd_t)
term_dontaudit_use_unallocated_tty(system_chkpwd_t)
+corecmd_search_sbin(system_chkpwd_t)
+
domain_dontaudit_use_wide_inherit_fd(system_chkpwd_t)
files_read_etc_files(system_chkpwd_t)
diff --git a/refpolicy/policy/modules/system/clock.te b/refpolicy/policy/modules/system/clock.te
index 2853222..ff622fa 100644
--- a/refpolicy/policy/modules/system/clock.te
+++ b/refpolicy/policy/modules/system/clock.te
@@ -61,7 +61,7 @@ logging_send_syslog_msg(hwclock_t)
miscfiles_read_localization(hwclock_t)
-ifdef(`targeted_policy', `
+ifdef(`targeted_policy',`
term_dontaudit_use_unallocated_tty(hwclock_t)
term_dontaudit_use_generic_pty(hwclock_t)
files_dontaudit_read_root_file(hwclock_t)
diff --git a/refpolicy/policy/modules/system/corecommands.if b/refpolicy/policy/modules/system/corecommands.if
index 821170f..a1b9b4e 100644
--- a/refpolicy/policy/modules/system/corecommands.if
+++ b/refpolicy/policy/modules/system/corecommands.if
@@ -54,7 +54,7 @@ interface(`corecmd_list_bin',`
## Get the attributes of files in bin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_getattr_bin_file',`
@@ -71,7 +71,7 @@ interface(`corecmd_getattr_bin_file',`
## Read files in bin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_bin_file',`
@@ -90,7 +90,7 @@ interface(`corecmd_read_bin_file',`
## Read symbolic links in bin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_bin_symlink',`
@@ -109,7 +109,7 @@ interface(`corecmd_read_bin_symlink',`
## Read pipes in bin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_bin_pipe',`
@@ -128,7 +128,7 @@ interface(`corecmd_read_bin_pipe',`
## Read named sockets in bin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_bin_socket',`
@@ -183,7 +183,7 @@ interface(`corecmd_exec_bin',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The type of the new process.
@@ -259,7 +259,7 @@ interface(`corecmd_dontaudit_getattr_sbin_file',`
## Read files in sbin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_sbin_file',`
@@ -278,7 +278,7 @@ interface(`corecmd_read_sbin_file',`
## Read symbolic links in sbin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_sbin_symlink',`
@@ -297,7 +297,7 @@ interface(`corecmd_read_sbin_symlink',`
## Read named pipes in sbin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_sbin_pipe',`
@@ -316,7 +316,7 @@ interface(`corecmd_read_sbin_pipe',`
## Read named sockets in sbin directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`corecmd_read_sbin_socket',`
@@ -371,7 +371,7 @@ interface(`corecmd_exec_sbin',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The type of the new process.
@@ -391,6 +391,24 @@ interface(`corecmd_sbin_domtrans',`
')
########################################
+##
+## Check if a shell is executable (DAC-wise).
+##
+##
+## Domain allowed access.
+##
+#
+interface(`corecmd_check_exec_shell',`
+ gen_require(`
+ type bin_t, shell_exec_t;
+ ')
+
+ allow $1 bin_t:dir r_dir_perms;
+ allow $1 bin_t:lnk_file r_file_perms;
+ allow $1 shell_exec_t:file execute;
+')
+
+########################################
#
# corecmd_exec_shell(domain)
#
@@ -441,7 +459,7 @@ interface(`corecmd_exec_ls',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The type of the shell process.
@@ -475,7 +493,7 @@ interface(`corecmd_shell_spec_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The type of the shell process.
diff --git a/refpolicy/policy/modules/system/files.if b/refpolicy/policy/modules/system/files.if
index 6bfabae..c7b547c 100644
--- a/refpolicy/policy/modules/system/files.if
+++ b/refpolicy/policy/modules/system/files.if
@@ -2067,13 +2067,12 @@ interface(`files_search_tmp',`
## The type of the process performing this action.
##
#
-interface(`files_read_tmp',`
+interface(`files_list_tmp',`
gen_require(`
type tmp_t;
- class dir r_dir_perms;
')
- allow $1 tmp_t:dir r_dir_perms;
+ allow $1 tmp_t:dir list_dir_perms;
')
########################################
@@ -2084,12 +2083,12 @@ interface(`files_read_tmp',`
## The type of the process performing this action.
##
#
-interface(`files_read_tmp_files',`
+interface(`files_read_generic_tmp_files',`
gen_require(`
type tmp_t;
- class file r_file_perms;
')
+ allow $1 tmp_t:dir search_dir_perms;
allow $1 tmp_t:file r_file_perms;
')
@@ -2101,12 +2100,12 @@ interface(`files_read_tmp_files',`
## The type of the process performing this action.
##
#
-interface(`files_read_tmp_symlinks',`
+interface(`files_read_generic_tmp_symlinks',`
gen_require(`
type tmp_t;
- class lnk_file r_file_perms;
')
+ allow $1 tmp_t:dir search_dir_perms;
allow $1 tmp_t:lnk_file r_file_perms;
')
@@ -2339,7 +2338,7 @@ interface(`files_dontaudit_search_src',`
type src_t;
')
- allow $1 src_t:dir search;
+ dontaudit $1 src_t:dir search;
')
########################################
diff --git a/refpolicy/policy/modules/system/fstools.te b/refpolicy/policy/modules/system/fstools.te
index 8efec44..7439c4d 100644
--- a/refpolicy/policy/modules/system/fstools.te
+++ b/refpolicy/policy/modules/system/fstools.te
@@ -28,6 +28,7 @@ allow fsadm_t self:capability { ipc_lock sys_rawio sys_admin sys_tty_config dac_
allow fsadm_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execmem execheap };
allow fsadm_t self:fd use;
allow fsadm_t self:fifo_file rw_file_perms;
+allow fsadm_t self:sock_file r_file_perms;
allow fsadm_t self:unix_dgram_socket create_socket_perms;
allow fsadm_t self:unix_stream_socket create_stream_socket_perms;
allow fsadm_t self:unix_dgram_socket sendto;
@@ -133,6 +134,11 @@ seutil_read_config(fsadm_t)
userdom_use_unpriv_users_fd(fsadm_t)
+ifdef(`targeted_policy',`
+ term_use_unallocated_tty(fsadm_t)
+ term_use_generic_pty(fsadm_t)
+')
+
tunable_policy(`read_default_t',`
files_list_default(fsadm_t)
files_read_default_files(fsadm_t)
@@ -151,7 +157,8 @@ optional_policy(`nis.te',`
')
ifdef(`TODO',`
-allow fsadm_t tmpfs_t:file { read write };
-allow fsadm_t ramfs_t:fifo_file rw_file_perms;
ifdef(`gnome-pty-helper.te', `allow fsadm_t sysadm_gph_t:fd use;')
') dnl end TODO
+
+allow fsadm_t tmpfs_t:file { read write };
+allow fsadm_t ramfs_t:fifo_file rw_file_perms;
diff --git a/refpolicy/policy/modules/system/getty.te b/refpolicy/policy/modules/system/getty.te
index 7c2b7ea..5821b22 100644
--- a/refpolicy/policy/modules/system/getty.te
+++ b/refpolicy/policy/modules/system/getty.te
@@ -113,5 +113,5 @@ optional_policy(`ppp.te',`
')
optional_policy(`udev.te',`
- udev_read_db(system_dbusd_t)
+ udev_read_db(getty_t)
')
diff --git a/refpolicy/policy/modules/system/hotplug.te b/refpolicy/policy/modules/system/hotplug.te
index 666ed22..c39d43a 100644
--- a/refpolicy/policy/modules/system/hotplug.te
+++ b/refpolicy/policy/modules/system/hotplug.te
@@ -14,7 +14,7 @@ init_daemon_domain(hotplug_t,hotplug_exec_t)
type hotplug_etc_t;
files_config_file(hotplug_etc_t)
kernel_search_from(hotplug_etc_t)
-domain_entry_file(hotplug_t,hotplug_etc_t)
+init_daemon_domain(hotplug_t,hotplug_etc_t)
type hotplug_var_run_t;
files_pid_file(hotplug_var_run_t)
@@ -150,6 +150,10 @@ optional_policy(`fstools.te',`
fstools_domtrans(hotplug_t)
')
+optional_policy(`hal.te',`
+ hal_dgram_sendto(hotplug_t)
+')
+
optional_policy(`hostname.te',`
hostname_exec(hotplug_t)
')
@@ -207,7 +211,4 @@ rhgb_domain(hotplug_t)
dontaudit hotplug_t { init_t kernel_t }:file read;
-optional_policy(`hald.te', `
- allow hotplug_t hald_t:unix_dgram_socket sendto;
-')
') dnl end TODO
diff --git a/refpolicy/policy/modules/system/init.if b/refpolicy/policy/modules/system/init.if
index 4c92dfa..3a9e940 100644
--- a/refpolicy/policy/modules/system/init.if
+++ b/refpolicy/policy/modules/system/init.if
@@ -346,7 +346,7 @@ interface(`init_dontaudit_use_fd',`
## Send UDP network traffic to init.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_udp_sendto',`
@@ -392,7 +392,7 @@ interface(`init_domtrans_script',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The role to be performing this action.
@@ -415,6 +415,22 @@ interface(`init_run_daemon',`
########################################
##
+## Write an init script unnamed pipe.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`init_write_script_pipe',`
+ gen_require(`
+ type initrc_t;
+ ')
+
+ allow $1 initrc_t:fifo_file write;
+')
+
+########################################
+##
## Allow the specified domain to connect to
## init scripts with a unix domain stream socket.
##
@@ -484,7 +500,7 @@ interface(`init_exec_script',`
## Read the process state (/proc/pid) of the init scripts.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_read_script_process_state',`
@@ -552,7 +568,7 @@ interface(`init_get_script_process_group',`
## Send SIGCHLD signals to init scripts.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_sigchld_script',`
@@ -568,7 +584,7 @@ interface(`init_sigchld_script',`
## Read and write init script unnamed pipes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_rw_script_pipe',`
@@ -585,7 +601,7 @@ interface(`init_rw_script_pipe',`
## Send UDP network traffic to init scripts.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_udp_sendto_script',`
@@ -629,7 +645,7 @@ interface(`init_unix_connect_script',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_use_script_pty',`
@@ -663,7 +679,7 @@ interface(`init_dontaudit_use_script_pty',`
## Read init scripts.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_read_script_file',`
@@ -681,7 +697,7 @@ interface(`init_read_script_file',`
## Read and write init script temporary data.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`init_rw_script_tmp_files',`
diff --git a/refpolicy/policy/modules/system/init.te b/refpolicy/policy/modules/system/init.te
index 23cd161..44d9301 100644
--- a/refpolicy/policy/modules/system/init.te
+++ b/refpolicy/policy/modules/system/init.te
@@ -366,6 +366,7 @@ mls_process_read_up(initrc_t)
mls_process_write_down(initrc_t)
modutils_read_module_conf(initrc_t)
+modutils_domtrans_insmod(initrc_t)
seutil_read_config(initrc_t)
@@ -480,7 +481,6 @@ optional_policy(`bind.te',`
# Allow init script to cp localtime to named_conf_t
bind_write_config(initrc_t)
')
-
')
optional_policy(`bluetooth.te',`
@@ -488,7 +488,7 @@ optional_policy(`bluetooth.te',`
')
optional_policy(`cpucontrol.te',`
- cpucontrol_stub()
+ cpucontrol_stub(initrc_t)
dev_getattr_cpu(initrc_t)
')
diff --git a/refpolicy/policy/modules/system/libraries.te b/refpolicy/policy/modules/system/libraries.te
index f226777..3ff19d7 100644
--- a/refpolicy/policy/modules/system/libraries.te
+++ b/refpolicy/policy/modules/system/libraries.te
@@ -95,9 +95,7 @@ ifdef(`targeted_policy',`
unconfined_domain_template(ldconfig_t)
')
-ifdef(`TODO',`
optional_policy(`apache.te',`
# dontaudit access to /usr/lib/apache, normal programs cannot read these libs anyway
dontaudit ldconfig_t httpd_modules_t:dir search;
')
-') dnl end TODO
diff --git a/refpolicy/policy/modules/system/locallogin.te b/refpolicy/policy/modules/system/locallogin.te
index 750f9b5..075a824 100644
--- a/refpolicy/policy/modules/system/locallogin.te
+++ b/refpolicy/policy/modules/system/locallogin.te
@@ -41,6 +41,7 @@ allow local_login_t self:process ~{ ptrace setcurrent setexec setfscreate setrli
allow local_login_t self:process { setrlimit setexec };
allow local_login_t self:fd use;
allow local_login_t self:fifo_file rw_file_perms;
+allow local_login_t self:sock_file r_file_perms;
allow local_login_t self:unix_dgram_socket create_socket_perms;
allow local_login_t self:unix_stream_socket create_stream_socket_perms;
allow local_login_t self:unix_dgram_socket sendto;
diff --git a/refpolicy/policy/modules/system/logging.te b/refpolicy/policy/modules/system/logging.te
index 77e6b6e..3d3f9bb 100644
--- a/refpolicy/policy/modules/system/logging.te
+++ b/refpolicy/policy/modules/system/logging.te
@@ -229,6 +229,8 @@ logging_send_syslog_msg(klogd_t)
miscfiles_read_localization(klogd_t)
+userdom_dontaudit_search_sysadm_home_dir(klogd_t)
+
optional_policy(`udev.te', `
udev_read_db(klogd_t)
')
@@ -238,6 +240,10 @@ ifdef(`targeted_policy',`
term_dontaudit_use_unallocated_tty(klogd_t)
')
+optional_policy(`selinuxutil.te',`
+ seutil_sigchld_newrole(klogd_t)
+')
+
########################################
#
# syslogd local policy
diff --git a/refpolicy/policy/modules/system/modutils.if b/refpolicy/policy/modules/system/modutils.if
index 29a53bc..11724cd 100644
--- a/refpolicy/policy/modules/system/modutils.if
+++ b/refpolicy/policy/modules/system/modutils.if
@@ -36,7 +36,7 @@ interface(`modutils_read_module_conf',`
files_search_etc($1)
bootloader_search_boot($1)
- allow $1 modules_conf_t:file r_file_perms;
+ allow $1 modules_conf_t:{ file lnk_file } r_file_perms;
')
########################################
diff --git a/refpolicy/policy/modules/system/modutils.te b/refpolicy/policy/modules/system/modutils.te
index 5613a7a..e74fc19 100644
--- a/refpolicy/policy/modules/system/modutils.te
+++ b/refpolicy/policy/modules/system/modutils.te
@@ -16,7 +16,6 @@ files_type(modules_dep_t)
type insmod_t;
type insmod_exec_t;
-kernel_userland_entry(insmod_t,insmod_exec_t)
init_system_domain(insmod_t,insmod_exec_t)
mls_file_write_down(insmod_t)
role system_r types insmod_t;
@@ -110,6 +109,10 @@ logging_search_logs(insmod_t)
miscfiles_read_localization(insmod_t)
+if( ! secure_mode_insmod ) {
+ kernel_userland_entry(insmod_t,insmod_exec_t)
+}
+
ifdef(`hide_broken_symptoms',`
dev_dontaudit_rw_cardmgr(insmod_t)
')
diff --git a/refpolicy/policy/modules/system/pcmcia.if b/refpolicy/policy/modules/system/pcmcia.if
index c86414e..3f9ca2f 100644
--- a/refpolicy/policy/modules/system/pcmcia.if
+++ b/refpolicy/policy/modules/system/pcmcia.if
@@ -2,6 +2,20 @@
########################################
##
+## PCMCIA stub interface. No access allowed.
+##
+##
+## N/A
+##
+#
+interface(`pcmcia_stub',`
+ gen_require(`
+ type cardmgr_t;
+ ')
+')
+
+########################################
+##
## Execute cardmgr in the cardmgr domain.
##
##
@@ -99,6 +113,7 @@ interface(`pcmcia_read_pid',`
files_search_pids($1)
allow $1 cardmgr_var_run_t:dir r_dir_perms;
allow $1 cardmgr_var_run_t:file r_file_perms;
+ allow $1 cardmgr_var_run_t:lnk_file { getattr read };
')
########################################
diff --git a/refpolicy/policy/modules/system/selinuxutil.te b/refpolicy/policy/modules/system/selinuxutil.te
index 982dded..0fd52e0 100644
--- a/refpolicy/policy/modules/system/selinuxutil.te
+++ b/refpolicy/policy/modules/system/selinuxutil.te
@@ -202,6 +202,7 @@ allow newrole_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit
allow newrole_t self:process setexec;
allow newrole_t self:fd use;
allow newrole_t self:fifo_file rw_file_perms;
+allow newrole_t self:sock_file r_file_perms;
allow newrole_t self:shm create_shm_perms;
allow newrole_t self:sem create_sem_perms;
allow newrole_t self:msgq create_msgq_perms;
@@ -242,6 +243,9 @@ term_relabel_all_user_ptys(newrole_t)
auth_domtrans_chk_passwd(newrole_t)
+corecmd_list_bin(newrole_t)
+corecmd_read_bin_symlink(newrole_t)
+
domain_use_wide_inherit_fd(newrole_t)
# for when the user types "exec newrole" at the command line:
domain_sigchld_wide_inherit_fd(newrole_t)
@@ -251,6 +255,7 @@ init_rw_script_pid(newrole_t)
files_read_etc_files(newrole_t)
files_read_var_files(newrole_t)
+files_read_var_symlink(newrole_t)
libs_use_ld_so(newrole_t)
libs_use_shared_libs(newrole_t)
@@ -377,6 +382,8 @@ domain_auto_trans(dpkg_t, restorecon_exec_t, restorecon_t)
')
') dnl endif TODO
+allow restorecon_t kernel_t:unix_dgram_socket { read write };
+
#################################
#
# Run_init local policy
diff --git a/refpolicy/policy/modules/system/sysnetwork.te b/refpolicy/policy/modules/system/sysnetwork.te
index 07b155f..507905c 100644
--- a/refpolicy/policy/modules/system/sysnetwork.te
+++ b/refpolicy/policy/modules/system/sysnetwork.te
@@ -206,6 +206,9 @@ optional_policy(`netutils.te',`
optional_policy(`nis.te',`
nis_use_ypbind(dhcpc_t)
nis_signal_ypbind(dhcpc_t)
+ nis_read_ypbind_pid(dhcpc_t)
+ nis_delete_ypbind_pid(dhcpc_t)
+
# dhclient sometimes starts ypbind
init_exec_script(dhcpc_t)
nis_domtrans_ypbind(dhcpc_t)
@@ -222,6 +225,11 @@ optional_policy(`ntp.te',`
ntp_domtrans(dhcpc_t)
')
+optional_policy(`pcmcia.te',`
+ pcmcia_stub(dhcpc_t)
+ dev_rw_cardmgr(dhcpc_t)
+')
+
optional_policy(`selinuxutil.te',`
seutil_sigchld_newrole(dhcpc_t)
seutil_dontaudit_search_config(dhcpc_t)
@@ -236,27 +244,6 @@ optional_policy(`userdomain.te',`
')
ifdef(`TODO',`
-ifdef(`cardmgr.te',`
-allow dhcpc_t cardmgr_dev_t:chr_file { read write };
-')
-
-ifdef(`ypbind.te',`
-allow dhcpc_t ypbind_var_run_t:file { r_file_perms unlink };
-')
-
-ifdef(`dbusd.te', `
-dbusd_client(system, dhcpc)
-domain_auto_trans(system_dbusd_t, dhcpc_exec_t, dhcpc_t)
-allow dhcpc_t system_dbusd_t:dbus { acquire_svc send_msg };
-allow dhcpc_t self:dbus send_msg;
-allow { NetworkManager_t initrc_t } dhcpc_t:dbus send_msg;
-allow dhcpc_t { NetworkManager_t initrc_t }:dbus send_msg;
-ifdef(`unconfined.te', `
-allow unconfined_t dhcpc_t:dbus send_msg;
-allow dhcpc_t unconfined_t:dbus send_msg;
-')dnl end ifdef unconfined.te
-')
-
optional_policy(`rhgb.te',`
rhgb_domain(dhcpc_t)
')
diff --git a/refpolicy/policy/modules/system/userdomain.if b/refpolicy/policy/modules/system/userdomain.if
index 953d2cf..615afb0 100644
--- a/refpolicy/policy/modules/system/userdomain.if
+++ b/refpolicy/policy/modules/system/userdomain.if
@@ -992,7 +992,7 @@ template(`admin_user_template',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_search_user_home',`
@@ -1024,7 +1024,7 @@ template(`userdom_search_user_home',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_home_subdirs',`
@@ -1055,7 +1055,7 @@ template(`userdom_manage_user_home_subdirs',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_read_user_home_files',`
@@ -1087,7 +1087,7 @@ template(`userdom_read_user_home_files',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_exec_user_home_files',`
@@ -1121,7 +1121,7 @@ template(`userdom_exec_user_home_files',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_home_subdir_files',`
@@ -1155,7 +1155,7 @@ template(`userdom_manage_user_home_subdir_files',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_home_subdir_symlinks',`
@@ -1189,7 +1189,7 @@ template(`userdom_manage_user_home_subdir_symlinks',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_home_subdir_pipes',`
@@ -1223,7 +1223,7 @@ template(`userdom_manage_user_home_subdir_pipes',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_home_subdir_sockets',`
@@ -1256,7 +1256,7 @@ template(`userdom_manage_user_home_subdir_sockets',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
## The class of the object to be created. If not
@@ -1299,7 +1299,7 @@ template(`userdom_create_user_home',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_tmp_dirs',`
@@ -1331,7 +1331,7 @@ template(`userdom_manage_user_tmp_dirs',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_tmp_files',`
@@ -1364,7 +1364,7 @@ template(`userdom_manage_user_tmp_files',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_tmp_symlinks',`
@@ -1397,7 +1397,7 @@ template(`userdom_manage_user_tmp_symlinks',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_tmp_pipes',`
@@ -1430,7 +1430,7 @@ template(`userdom_manage_user_tmp_pipes',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_manage_user_tmp_sockets',`
@@ -1461,7 +1461,7 @@ template(`userdom_manage_user_tmp_sockets',`
## is the prefix for user_t).
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
template(`userdom_use_user_terminals',`
@@ -1486,7 +1486,7 @@ template(`userdom_use_user_terminals',`
## caller to use setexeccon().
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_spec_domtrans_all_users',`
@@ -1504,7 +1504,7 @@ interface(`userdom_spec_domtrans_all_users',`
## caller to use setexeccon().
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_spec_domtrans_unpriv_users',`
@@ -1520,7 +1520,7 @@ interface(`userdom_spec_domtrans_unpriv_users',`
## Execute a shell in the sysadm domain.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_shell_domtrans_sysadm',`
@@ -1580,7 +1580,7 @@ interface(`userdom_dontaudit_search_staff_home_dir',`
## Read files in the staff users home directory.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_read_staff_home_files',`
@@ -1598,7 +1598,7 @@ interface(`userdom_read_staff_home_files',`
## Send a SIGCHLD signal to sysadm users.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_sigchld_sysadm',`
@@ -1615,10 +1615,31 @@ interface(`userdom_sigchld_sysadm',`
########################################
##
+## Do not audit attepts to get the attributes
+## of sysadm ttys.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`userdom_dontaudit_getattr_sysadm_tty',`
+ ifdef(`targeted_policy',`
+ term_dontaudit_getattr_unallocated_ttys($1)
+ ',`
+ gen_require(`
+ type sysadm_tty_device_t;
+ ')
+
+ dontaudit $1 sysadm_tty_device_t:chr_file getattr;
+ ')
+')
+
+########################################
+##
## Read and write sysadm ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_use_sysadm_tty',`
@@ -1660,7 +1681,7 @@ interface(`userdom_dontaudit_use_sysadm_tty',`
## Read and write sysadm ptys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_use_sysadm_pty',`
@@ -1702,7 +1723,7 @@ interface(`userdom_dontaudit_use_sysadm_pty',`
## Read and write sysadm ttys and ptys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_use_sysadm_terms',`
@@ -1735,7 +1756,7 @@ interface(`userdom_dontaudit_use_sysadm_terms',`
## Inherit and use sysadm file descriptors
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_use_sysadm_fd',`
@@ -1756,7 +1777,7 @@ interface(`userdom_use_sysadm_fd',`
## Read and write sysadm user unnamed pipes.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_rw_sysadm_pipe',`
@@ -1842,6 +1863,22 @@ interface(`userdom_dontaudit_search_sysadm_home_dir',`
########################################
##
+## List the sysadm users home directory.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`userdom_list_sysadm_home_dir',`
+ gen_require(`
+ type sysadm_home_dir_t;
+ ')
+
+ allow $1 sysadm_home_dir_t:dir list_dir_perms;
+')
+
+########################################
+##
## Do not audit attempts to list the sysadm
## users home directory.
##
@@ -1854,7 +1891,7 @@ interface(`userdom_dontaudit_list_sysadm_home_dir',`
type sysadm_home_dir_t;
')
- dontaudit $1 sysadm_home_dir_t:dir r_dir_perms;
+ dontaudit $1 sysadm_home_dir_t:dir list_dir_perms;
')
########################################
@@ -1913,7 +1950,7 @@ interface(`userdom_search_sysadm_home_subdirs',`
## Read files in the sysadm users home directory.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_read_sysadm_home_files',`
@@ -1931,7 +1968,7 @@ interface(`userdom_read_sysadm_home_files',`
## Search all users home directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_search_all_users_home',`
@@ -1964,7 +2001,7 @@ interface(`userdom_dontaudit_search_all_users_home',`
## Read all files in all users home directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_read_all_user_files',`
@@ -1983,7 +2020,7 @@ interface(`userdom_read_all_user_files',`
## in all users home directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_manage_all_user_dirs',`
@@ -2001,7 +2038,7 @@ interface(`userdom_manage_all_user_dirs',`
## in all users home directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_manage_all_user_files',`
@@ -2020,7 +2057,7 @@ interface(`userdom_manage_all_user_files',`
## in all users home directories.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_manage_all_user_symlinks',`
@@ -2048,7 +2085,7 @@ interface(`userdom_manage_all_user_symlinks',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_priveleged_home_dir_manager',`
@@ -2065,7 +2102,7 @@ interface(`userdom_priveleged_home_dir_manager',`
## Send general signals to unprivileged user domains.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_signal_unpriv_users',`
@@ -2081,7 +2118,7 @@ interface(`userdom_signal_unpriv_users',`
## Inherit the file descriptors from unprivileged user domains.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_use_unpriv_users_fd',`
@@ -2098,7 +2135,7 @@ interface(`userdom_use_unpriv_users_fd',`
## file descriptors from all user domains.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_dontaudit_use_unpriv_user_fd',`
@@ -2328,18 +2365,38 @@ interface(`userdom_read_unpriv_user_home_files',`
########################################
##
-## Read all unprivileged users temporary directories.
+## Set the attributes of user ptys.
##
##
## Domain allowed access.
##
#
-interface(`userdom_list_unpriv_user_tmp',`
+interface(`userdom_setattr_unpriv_user_pty',`
gen_require(`
- attribute user_tmpfile;
+ attribute user_ptynode;
')
- allow $1 user_tmpfile:dir list_dir_perms;
+ allow $1 user_ptynode:chr_file setattr;
+')
+
+########################################
+##
+## Read all unprivileged users temporary directories.
+##
+##
+## Domain allowed access.
+##
+#
+interface(`userdom_list_unpriv_user_tmp',`
+ ifdef(`targeted_policy',`
+ files_list_tmp($1)
+ ',`
+ gen_require(`
+ attribute user_tmpfile;
+ ')
+
+ allow $1 user_tmpfile:dir list_dir_perms;
+ ')
')
########################################
@@ -2351,11 +2408,15 @@ interface(`userdom_list_unpriv_user_tmp',`
##
#
interface(`userdom_read_unpriv_user_tmp_files',`
- gen_require(`
- attribute user_tmpfile;
- ')
+ ifdef(`targeted_policy',`
+ files_read_generic_tmp_files($1)
+ ',`
+ gen_require(`
+ attribute user_tmpfile;
+ ')
- allow $1 user_tmpfile:file { read getattr };
+ allow $1 user_tmpfile:file { read getattr };
+ ')
')
########################################
@@ -2367,11 +2428,15 @@ interface(`userdom_read_unpriv_user_tmp_files',`
##
#
interface(`userdom_read_unpriv_user_tmp_symlinks',`
- gen_require(`
- attribute user_tmpfile;
- ')
+ ifdef(`targeted_policy',`
+ files_read_generic_tmp_symlinks($1)
+ ',`
+ gen_require(`
+ attribute user_tmpfile;
+ ')
- allow $1 user_tmpfile:lnk_file { getattr read };
+ allow $1 user_tmpfile:lnk_file { getattr read };
+ ')
')
########################################
@@ -2379,7 +2444,7 @@ interface(`userdom_read_unpriv_user_tmp_symlinks',`
## Write all unprivileged users files in /tmp
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_write_unpriv_user_tmp',`
@@ -2396,7 +2461,7 @@ interface(`userdom_write_unpriv_user_tmp',`
## user ttys.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_dontaudit_use_unpriv_user_tty',`
@@ -2412,7 +2477,7 @@ interface(`userdom_dontaudit_use_unpriv_user_tty',`
## Inherit the file descriptors from all user domains
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_use_all_user_fd',`
@@ -2445,7 +2510,7 @@ interface(`userdom_dontaudit_use_all_user_fd',`
## Send general signals to all user domains.
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
#
interface(`userdom_signal_all_users',`