##
@@ -30477,7 +30487,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
##
##
## This template creates a user domain, types, and
-@@ -954,8 +1010,8 @@
+@@ -954,8 +1011,8 @@
# Declarations
#
@@ -30487,7 +30497,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
userdom_common_user_template($1)
##############################
-@@ -964,11 +1020,12 @@
+@@ -964,11 +1021,12 @@
#
# port access is audited even if dac would not have allowed it, so dontaudit it here
@@ -30502,7 +30512,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
# cjp: why?
files_read_kernel_symbol_table($1_t)
-@@ -986,37 +1043,47 @@
+@@ -986,37 +1044,47 @@
')
')
@@ -30564,7 +30574,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
#######################################
-@@ -1050,7 +1117,7 @@
+@@ -1050,7 +1118,7 @@
#
template(`userdom_admin_user_template',`
gen_require(`
@@ -30573,7 +30583,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
##############################
-@@ -1059,8 +1126,7 @@
+@@ -1059,8 +1127,7 @@
#
# Inherit rules for ordinary users.
@@ -30583,7 +30593,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
domain_obj_id_change_exemption($1_t)
role system_r types $1_t;
-@@ -1083,7 +1149,8 @@
+@@ -1083,7 +1150,8 @@
# Skip authentication when pam_rootok is specified.
allow $1_t self:passwd rootok;
@@ -30593,7 +30603,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
kernel_read_software_raid_state($1_t)
kernel_getattr_core_if($1_t)
-@@ -1099,6 +1166,7 @@
+@@ -1099,6 +1167,7 @@
kernel_sigstop_unlabeled($1_t)
kernel_signull_unlabeled($1_t)
kernel_sigchld_unlabeled($1_t)
@@ -30601,7 +30611,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
corenet_tcp_bind_generic_port($1_t)
# allow setting up tunnels
-@@ -1106,8 +1174,6 @@
+@@ -1106,8 +1175,6 @@
dev_getattr_generic_blk_files($1_t)
dev_getattr_generic_chr_files($1_t)
@@ -30610,7 +30620,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
# Allow MAKEDEV to work
dev_create_all_blk_files($1_t)
dev_create_all_chr_files($1_t)
-@@ -1162,20 +1228,6 @@
+@@ -1162,20 +1229,6 @@
# But presently necessary for installing the file_contexts file.
seutil_manage_bin_policy($1_t)
@@ -30631,7 +30641,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
optional_policy(`
postgresql_unconfined($1_t)
')
-@@ -1221,6 +1273,7 @@
+@@ -1221,6 +1274,7 @@
dev_relabel_all_dev_nodes($1)
files_create_boot_flag($1)
@@ -30639,7 +30649,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
# Necessary for managing /boot/efi
fs_manage_dos_files($1)
-@@ -1286,11 +1339,15 @@
+@@ -1286,11 +1340,15 @@
interface(`userdom_user_home_content',`
gen_require(`
type user_home_t;
@@ -30655,7 +30665,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -1387,7 +1444,7 @@
+@@ -1387,7 +1445,7 @@
########################################
##
@@ -30664,7 +30674,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
##
##
##
-@@ -1420,6 +1477,14 @@
+@@ -1420,6 +1478,14 @@
allow $1 user_home_dir_t:dir list_dir_perms;
files_search_home($1)
@@ -30679,7 +30689,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -1435,9 +1500,11 @@
+@@ -1435,9 +1501,11 @@
interface(`userdom_dontaudit_list_user_home_dirs',`
gen_require(`
type user_home_dir_t;
@@ -30691,7 +30701,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -1494,6 +1561,25 @@
+@@ -1494,6 +1562,25 @@
allow $1 user_home_dir_t:dir relabelto;
')
@@ -30717,7 +30727,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
########################################
##
## Create directories in the home dir root with
-@@ -1547,9 +1633,9 @@
+@@ -1547,9 +1634,9 @@
type user_home_dir_t, user_home_t;
')
@@ -30729,7 +30739,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -1568,6 +1654,8 @@
+@@ -1568,6 +1655,8 @@
')
dontaudit $1 user_home_t:dir search_dir_perms;
@@ -30738,7 +30748,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -1643,6 +1731,7 @@
+@@ -1643,6 +1732,7 @@
type user_home_dir_t, user_home_t;
')
@@ -30746,7 +30756,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
read_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t)
files_search_home($1)
')
-@@ -1741,6 +1830,62 @@
+@@ -1741,6 +1831,62 @@
########################################
##
@@ -30809,7 +30819,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
## Execute user home files.
##
##
-@@ -1757,14 +1902,6 @@
+@@ -1757,14 +1903,6 @@
files_search_home($1)
exec_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t)
@@ -30824,7 +30834,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -1787,6 +1924,46 @@
+@@ -1787,6 +1925,46 @@
########################################
##
@@ -30871,7 +30881,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
## Create, read, write, and delete files
## in a user home subdirectory.
##
-@@ -1799,6 +1976,7 @@
+@@ -1799,6 +1977,7 @@
interface(`userdom_manage_user_home_content_files',`
gen_require(`
type user_home_dir_t, user_home_t;
@@ -30879,7 +30889,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
manage_files_pattern($1, user_home_t, user_home_t)
-@@ -1921,7 +2099,7 @@
+@@ -1921,7 +2100,7 @@
########################################
##
@@ -30888,7 +30898,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
## with an automatic type transition to
## a specified private type.
##
-@@ -1941,28 +2119,58 @@
+@@ -1941,28 +2120,58 @@
##
##
#
@@ -30954,7 +30964,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
##
## The class of the object to be created.
##
-@@ -2336,6 +2544,27 @@
+@@ -2336,6 +2545,27 @@
##
##
#
@@ -30982,7 +30992,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
interface(`userdom_rw_user_tmpfs_files',`
gen_require(`
type user_tmpfs_t;
-@@ -2709,6 +2938,24 @@
+@@ -2709,6 +2939,24 @@
########################################
##
@@ -31007,7 +31017,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
## Inherit the file descriptors from unprivileged user domains.
##
##
-@@ -2814,7 +3061,43 @@
+@@ -2814,7 +3062,43 @@
type user_tmp_t;
')
@@ -31052,7 +31062,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
########################################
-@@ -2851,6 +3134,7 @@
+@@ -2851,6 +3135,7 @@
')
read_files_pattern($1,userdomain,userdomain)
@@ -31060,7 +31070,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
kernel_search_proc($1)
')
-@@ -2965,6 +3249,24 @@
+@@ -2965,6 +3250,24 @@
########################################
##
@@ -31085,7 +31095,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
## Send a dbus message to all user domains.
##
##
-@@ -2981,3 +3283,313 @@
+@@ -2981,3 +3284,313 @@
allow $1 userdomain:dbus send_msg;
')
@@ -31485,6 +31495,161 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
+ fs_read_cifs_named_sockets(userhomereader)
+ fs_read_cifs_named_pipes(userhomereader)
+')
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/virtual.fc serefpolicy-3.6.6/policy/modules/system/virtual.fc
+--- nsaserefpolicy/policy/modules/system/virtual.fc 1969-12-31 19:00:00.000000000 -0500
++++ serefpolicy-3.6.6/policy/modules/system/virtual.fc 2009-02-26 17:48:30.000000000 -0500
+@@ -0,0 +1 @@
++# No application file contexts.
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/virtual.if serefpolicy-3.6.6/policy/modules/system/virtual.if
+--- nsaserefpolicy/policy/modules/system/virtual.if 1969-12-31 19:00:00.000000000 -0500
++++ serefpolicy-3.6.6/policy/modules/system/virtual.if 2009-02-26 17:56:43.000000000 -0500
+@@ -0,0 +1,70 @@
++## Virtual machine emulator and virtualizer
++
++########################################
++##
++## Make the specified type a virtual domain
++##
++##
++##
++## Make the specified type a virtual domain
++##
++##
++## Gives the basic access required for a virtual operatins system
++##
++##
++##
++##
++## Type granted access
++##
++##
++#
++interface(`virtual_domain',`
++ gen_require(`
++ attribute virtualdomain;
++ ')
++
++ typeattribute $1 virtualdomain;
++')
++
++########################################
++##
++## Make the specified type usable as a virtual os image
++##
++##
++##
++## Type to be used as a virtual image
++##
++##
++#
++interface(`virtual_image',`
++ gen_require(`
++ attribute virtual_image_type;
++ ')
++
++ typeattribute $1 virtual_image_type;
++ files_type($1)
++
++ # virt images can be assigned to blk devices
++ dev_node($1)
++')
++
++########################################
++##
++## Allow domain to manage virt image files
++##
++##
++##
++## Domain to not audit.
++##
++##
++#
++interface(`virtual_manage_image',`
++ gen_require(`
++ type virtual_image_type;
++ ')
++
++ manage_dirs_pattern($1, virtual_image_type, virtual_image_type)
++ manage_files_pattern($1, virtual_image_type, virtual_image_type)
++ manage_lnk_files_pattern($1, virtual_image_type, virtual_image_type)
++ rw_blk_files_pattern($1, virtual_image_type, virtual_image_type)
++')
+diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/virtual.te serefpolicy-3.6.6/policy/modules/system/virtual.te
+--- nsaserefpolicy/policy/modules/system/virtual.te 1969-12-31 19:00:00.000000000 -0500
++++ serefpolicy-3.6.6/policy/modules/system/virtual.te 2009-02-26 17:57:06.000000000 -0500
+@@ -0,0 +1,72 @@
++
++policy_module(virtualization, 1.1.2)
++
++########################################
++#
++# Declarations
++#
++
++attribute virtualdomain;
++attribute virtual_image_type;
++
++########################################
++#
++# qemu common policy
++#
++allow virtualdomain self:capability { dac_read_search dac_override };
++allow virtualdomain self:process { execstack execmem signal getsched signull };
++
++allow virtualdomain self:fifo_file rw_file_perms;
++allow virtualdomain self:shm create_shm_perms;
++allow virtualdomain self:unix_stream_socket create_stream_socket_perms;
++allow virtualdomain self:tcp_socket create_stream_socket_perms;
++
++kernel_read_system_state(virtualdomain)
++
++corenet_all_recvfrom_unlabeled(virtualdomain)
++corenet_all_recvfrom_netlabel(virtualdomain)
++corenet_tcp_sendrecv_generic_if(virtualdomain)
++corenet_tcp_sendrecv_generic_node(virtualdomain)
++corenet_tcp_sendrecv_all_ports(virtualdomain)
++corenet_tcp_bind_generic_node(virtualdomain)
++corenet_tcp_bind_vnc_port(virtualdomain)
++corenet_rw_tun_tap_dev(virtualdomain)
++
++dev_read_sound(virtualdomain)
++dev_write_sound(virtualdomain)
++dev_rw_kvm(virtualdomain)
++dev_rw_qemu(virtualdomain)
++
++domain_use_interactive_fds(virtualdomain)
++
++files_read_etc_files(virtualdomain)
++files_read_usr_files(virtualdomain)
++files_read_var_files(virtualdomain)
++files_search_all(virtualdomain)
++
++fs_list_inotifyfs(virtualdomain)
++fs_rw_anon_inodefs_files(virtualdomain)
++fs_rw_tmpfs_files(virtualdomain)
++
++term_use_all_terms(virtualdomain)
++term_getattr_pty_fs(virtualdomain)
++term_use_generic_ptys(virtualdomain)
++term_use_ptmx(virtualdomain)
++
++auth_use_nsswitch(virtualdomain)
++
++miscfiles_read_localization(virtualdomain)
++
++optional_policy(`
++ virt_read_config(virtualdomain)
++ virt_read_lib_files(virtualdomain)
++ virt_read_content(virtualdomain)
++')
++
++optional_policy(`
++ xserver_stream_connect(virtualdomain)
++ xserver_read_xdm_tmp_files(virtualdomain)
++ xserver_read_xdm_pid(virtualdomain)
++ xserver_rw_shm(virtualdomain)
++')
++
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.fc serefpolicy-3.6.6/policy/modules/system/xen.fc
--- nsaserefpolicy/policy/modules/system/xen.fc 2009-01-05 15:39:43.000000000 -0500
+++ serefpolicy-3.6.6/policy/modules/system/xen.fc 2009-02-16 13:18:06.000000000 -0500
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 49c1949..c11579a 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -20,7 +20,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.6.6
-Release: 7%{?dist}
+Release: 8%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -446,6 +446,9 @@ exit 0
%endif
%changelog
+* Fri Feb 27 2009 Dan Walsh 3.6.6-8
+- Further confinement of qemu images via svirt
+
* Wed Feb 25 2009 Fedora Release Engineering - 3.6.6-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild