diff --git a/container-selinux.tgz b/container-selinux.tgz index 5803b56..be53f4f 100644 Binary files a/container-selinux.tgz and b/container-selinux.tgz differ diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch index 08e0d0d..5182051 100644 --- a/policy-rawhide-base.patch +++ b/policy-rawhide-base.patch @@ -6003,7 +6003,7 @@ index 8e0f9cd..b9f45b9 100644 define(`create_packet_interfaces',`` diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in -index b191055..4d57db3 100644 +index b191055..61c55fd 100644 --- a/policy/modules/kernel/corenetwork.te.in +++ b/policy/modules/kernel/corenetwork.te.in @@ -5,6 +5,7 @@ policy_module(corenetwork, 1.19.2) @@ -6077,7 +6077,7 @@ index b191055..4d57db3 100644 # reserved_port_t is the type of INET port numbers below 1024. # type reserved_port_t, port_type, reserved_port_type; -@@ -76,63 +99,80 @@ type server_packet_t, packet_type, server_packet_type; +@@ -76,63 +99,82 @@ type server_packet_t, packet_type, server_packet_type; network_port(afs_bos, udp,7007,s0) network_port(afs_fs, tcp,2040,s0, udp,7000,s0, udp,7005,s0) network_port(afs_ka, udp,7004,s0) @@ -6101,6 +6101,7 @@ index b191055..4d57db3 100644 network_port(audit, tcp,60,s0) network_port(auth, tcp,113,s0) +network_port(bacula, tcp,9103,s0, udp,9103,s0) ++network_port(bctp, tcp,8999,s0, udp,8999,s0) network_port(bgp, tcp,179,s0, udp,179,s0, tcp,2605,s0, udp,2605,s0) network_port(boinc, tcp,31416,s0) network_port(boinc_client, tcp,1043,s0, udp,1034,s0) @@ -6133,6 +6134,7 @@ index b191055..4d57db3 100644 network_port(dbskkd, tcp,1178,s0) network_port(dcc, udp,6276,s0, udp,6277,s0) network_port(dccm, tcp,5679,s0, udp,5679,s0) ++network_port(dey_keyneg, tcp,8750,s0, udp,8750,s0) +network_port(dey_sapi, tcp,4330,s0) network_port(dhcpc, udp,68,s0, tcp,68,s0, udp,546,s0, tcp, 546,s0, udp,5546,s0, tcp,5546,s0) network_port(dhcpd, udp,67,s0, udp,547,s0, tcp, 547,s0, udp,548,s0, tcp, 548,s0, tcp,647,s0, udp,647,s0, tcp,847,s0, udp,847,s0, tcp,7911,s0) @@ -6168,7 +6170,7 @@ index b191055..4d57db3 100644 network_port(gopher, tcp,70,s0, udp,70,s0) network_port(gpsd, tcp,2947,s0) network_port(hadoop_datanode, tcp,50010,s0) -@@ -140,45 +180,60 @@ network_port(hadoop_namenode, tcp,8020,s0) +@@ -140,45 +182,61 @@ network_port(hadoop_namenode, tcp,8020,s0) network_port(hddtemp, tcp,7634,s0) network_port(howl, tcp,5335,s0, udp,5353,s0) network_port(hplip, tcp,1782,s0, tcp,2207,s0, tcp,2208,s0, tcp, 8290,s0, tcp,50000,s0, tcp,50002,s0, tcp,8292,s0, tcp,9100,s0, tcp,9101,s0, tcp,9102,s0, tcp,9220,s0, tcp,9221,s0, tcp,9222,s0, tcp,9280,s0, tcp,9281,s0, tcp,9282,s0, tcp,9290,s0, tcp,9291,s0) @@ -6176,6 +6178,7 @@ index b191055..4d57db3 100644 -network_port(http_cache, tcp,3128,s0, udp,3130,s0, tcp,8080,s0, tcp,8118,s0, tcp,10001-10010,s0) # 8118 is for privoxy +network_port(http, tcp,80,s0, tcp,81,s0, tcp,443,s0, tcp,488,s0, tcp,8008,s0, tcp,8009,s0, tcp,8443,s0,tcp,9000, s0) #8443 is mod_nss default port +network_port(http_cache, udp,3130,s0, tcp,8080,s0, tcp,8118,s0, tcp,8123,s0, tcp,10001-10010,s0) # 8118 is for privoxy ++network_port(ibm_dt_2, tcp,1792,s0, udp,1792,s0) +network_port(intermapper, tcp,8181,s0) network_port(i18n_input, tcp,9010,s0) network_port(imaze, tcp,5323,s0, udp,5323,s0) @@ -6245,7 +6248,7 @@ index b191055..4d57db3 100644 network_port(msnp, tcp,1863,s0, udp,1863,s0) network_port(mssql, tcp,1433-1434,s0, udp,1433-1434,s0) network_port(ms_streaming, tcp,1755,s0, udp,1755,s0) -@@ -186,101 +241,130 @@ network_port(munin, tcp,4949,s0, udp,4949,s0) +@@ -186,101 +244,130 @@ network_port(munin, tcp,4949,s0, udp,4949,s0) network_port(mxi, tcp,8005,s0, udp,8005,s0) network_port(mysqld, tcp,1186,s0, tcp,3306,s0, tcp,63132-63164,s0) network_port(mysqlmanagerd, tcp,2273,s0) @@ -6396,7 +6399,7 @@ index b191055..4d57db3 100644 network_port(xserver, tcp,6000-6020,s0) network_port(zarafa, tcp,236,s0, tcp,237,s0) network_port(zabbix, tcp,10051,s0) -@@ -288,19 +372,23 @@ network_port(zabbix_agent, tcp,10050,s0) +@@ -288,19 +375,23 @@ network_port(zabbix_agent, tcp,10050,s0) network_port(zookeeper_client, tcp,2181,s0) network_port(zookeeper_election, tcp,3888,s0) network_port(zookeeper_leader, tcp,2888,s0) @@ -6423,7 +6426,7 @@ index b191055..4d57db3 100644 ######################################## # -@@ -333,6 +421,8 @@ sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh) +@@ -333,6 +424,8 @@ sid netif gen_context(system_u:object_r:netif_t,s0 - mls_systemhigh) build_option(`enable_mls',` network_interface(lo, lo, s0 - mls_systemhigh) @@ -6432,7 +6435,7 @@ index b191055..4d57db3 100644 ',` typealias netif_t alias { lo_netif_t netif_lo_t }; ') -@@ -345,9 +435,28 @@ typealias netif_t alias { lo_netif_t netif_lo_t }; +@@ -345,9 +438,28 @@ typealias netif_t alias { lo_netif_t netif_lo_t }; allow corenet_unconfined_type node_type:node *; allow corenet_unconfined_type netif_type:netif *; allow corenet_unconfined_type packet_type:packet *; @@ -10276,7 +10279,7 @@ index 6a1e4d1..4b87be8 100644 + allow $1 domain:process rlimitinh; ') diff --git a/policy/modules/kernel/domain.te b/policy/modules/kernel/domain.te -index cf04cb5..ac8eab0 100644 +index cf04cb5..5831355 100644 --- a/policy/modules/kernel/domain.te +++ b/policy/modules/kernel/domain.te @@ -4,17 +4,49 @@ policy_module(domain, 1.11.0) @@ -10444,7 +10447,7 @@ index cf04cb5..ac8eab0 100644 # Create/access any System V IPC objects. allow unconfined_domain_type domain:{ sem msgq shm } *; -@@ -160,11 +249,392 @@ allow unconfined_domain_type domain:msg { send receive }; +@@ -160,11 +249,393 @@ allow unconfined_domain_type domain:msg { send receive }; # For /proc/pid allow unconfined_domain_type domain:dir list_dir_perms; @@ -10757,6 +10760,7 @@ index cf04cb5..ac8eab0 100644 +') + +ifdef(`hide_broken_symptoms',` ++ dontaudit domain self:capability { net_admin }; + dontaudit domain self:udp_socket listen; + allow domain domain:key { link search }; + dontaudit domain domain:socket_class_set { read write }; @@ -15499,7 +15503,7 @@ index d7c11a0..f521a50 100644 /var/run/shm/.* <> -') diff --git a/policy/modules/kernel/filesystem.if b/policy/modules/kernel/filesystem.if -index 8416beb..5a4a6f0 100644 +index 8416beb..b5b7a0a 100644 --- a/policy/modules/kernel/filesystem.if +++ b/policy/modules/kernel/filesystem.if @@ -577,6 +577,24 @@ interface(`fs_mount_cgroup', ` @@ -15839,52 +15843,345 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -1542,6 +1740,63 @@ interface(`fs_cifs_domtrans',` +@@ -1542,48 +1740,48 @@ interface(`fs_cifs_domtrans',` domain_auto_transition_pattern($1, cifs_t, $2) ') +-####################################### +######################################## -+## + ## +-## Create, read, write, and delete dirs +-## on a configfs filesystem. +## Make general progams in cifs an entrypoint for +## the specified domain. + ## + ## + ## +-## Domain allowed access. ++## The domain for which cifs_t is an entrypoint. + ## + ## + # +-interface(`fs_manage_configfs_dirs',` ++interface(`fs_cifs_entry_type',` + gen_require(` +- type configfs_t; ++ type cifs_t; + ') + +- manage_dirs_pattern($1, configfs_t, configfs_t) ++ domain_entry_file($1, cifs_t) + ') + +-####################################### ++######################################## + ## +-## Create, read, write, and delete files +-## on a configfs filesystem. ++## Make general progams in CIFS an entrypoint for ++## the specified domain. + ## + ## + ## +-## Domain allowed access. ++## The domain for which cifs_t is an entrypoint. + ## + ## + # +-interface(`fs_manage_configfs_files',` ++interface(`fs_cifs_entrypoint',` + gen_require(` +- type configfs_t; ++ type cifs_t; + ') + +- manage_files_pattern($1, configfs_t, configfs_t) ++ allow $1 cifs_t:file entrypoint; + ') + +-######################################## ++####################################### + ## +-## Mount a DOS filesystem, such as +-## FAT32 or NTFS. ++## dontaudit write dirs ++## on a configfs filesystem. + ## + ## + ## +@@ -1591,19 +1789,18 @@ interface(`fs_manage_configfs_files',` + ## + ## + # +-interface(`fs_mount_dos_fs',` ++interface(`fs_dontaudit_write_configfs_dirs',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- allow $1 dosfs_t:filesystem mount; ++ dontaudit $1 configfs_t:dir write; + ') + +-######################################## ++####################################### + ## +-## Remount a DOS filesystem, such as +-## FAT32 or NTFS. This allows +-## some mount options to be changed. ++## Read dirs ++## on a configfs filesystem. + ## + ## + ## +@@ -1611,18 +1808,18 @@ interface(`fs_mount_dos_fs',` + ## + ## + # +-interface(`fs_remount_dos_fs',` ++interface(`fs_read_configfs_dirs',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- allow $1 dosfs_t:filesystem remount; ++ list_dirs_pattern($1, configfs_t, configfs_t) + ') + +-######################################## ++####################################### + ## +-## Unmount a DOS filesystem, such as +-## FAT32 or NTFS. ++## Create, read, write, and delete dirs ++## on a configfs filesystem. + ## + ## + ## +@@ -1630,38 +1827,37 @@ interface(`fs_remount_dos_fs',` + ## + ## + # +-interface(`fs_unmount_dos_fs',` ++interface(`fs_manage_configfs_dirs',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- allow $1 dosfs_t:filesystem unmount; ++ manage_dirs_pattern($1, configfs_t, configfs_t) + ') + +-######################################## ++####################################### + ## +-## Get the attributes of a DOS +-## filesystem, such as FAT32 or NTFS. ++## Read files ++## on a configfs filesystem. + ## + ## + ## + ## Domain allowed access. + ## + ## +-## + # +-interface(`fs_getattr_dos_fs',` ++interface(`fs_read_configfs_files',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- allow $1 dosfs_t:filesystem getattr; ++ read_files_pattern($1, configfs_t, configfs_t) + ') + +-######################################## ++####################################### + ## +-## Allow changing of the label of a +-## DOS filesystem using the context= mount option. ++## Create, read, write, and delete files ++## on a configfs filesystem. + ## + ## + ## +@@ -1669,17 +1865,18 @@ interface(`fs_getattr_dos_fs',` + ## + ## + # +-interface(`fs_relabelfrom_dos_fs',` ++interface(`fs_manage_configfs_files',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- allow $1 dosfs_t:filesystem relabelfrom; ++ manage_files_pattern($1, configfs_t, configfs_t) + ') + +-######################################## ++####################################### + ## +-## Search dosfs filesystem. ++## Create, read, write, and delete files ++## on a configfs filesystem. + ## + ## + ## +@@ -1687,17 +1884,17 @@ interface(`fs_relabelfrom_dos_fs',` + ## + ## + # +-interface(`fs_search_dos',` ++interface(`fs_manage_configfs_lnk_files',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- allow $1 dosfs_t:dir search_dir_perms; ++ manage_lnk_files_pattern($1, configfs_t, configfs_t) + ') + + ######################################## + ## +-## List dirs DOS filesystem. ++## Unmount a configfs filesystem + ## + ## + ## +@@ -1705,18 +1902,18 @@ interface(`fs_search_dos',` + ## + ## + # +-interface(`fs_list_dos',` ++interface(`fs_unmount_configfs',` + gen_require(` +- type dosfs_t; ++ type configfs_t; + ') + +- list_dirs_pattern($1, dosfs_t, dosfs_t) ++ allow $1 configfs_t:filesystem unmount; + ') + + ######################################## + ## +-## Create, read, write, and delete dirs +-## on a DOS filesystem. ++## Mount a DOS filesystem, such as ++## FAT32 or NTFS. + ## + ## + ## +@@ -1724,17 +1921,19 @@ interface(`fs_list_dos',` + ## + ## + # +-interface(`fs_manage_dos_dirs',` ++interface(`fs_mount_dos_fs',` + gen_require(` + type dosfs_t; + ') + +- manage_dirs_pattern($1, dosfs_t, dosfs_t) ++ allow $1 dosfs_t:filesystem mount; + ') + + ######################################## + ## +-## Read files on a DOS filesystem. ++## Remount a DOS filesystem, such as ++## FAT32 or NTFS. This allows ++## some mount options to be changed. + ## + ## + ## +@@ -1742,18 +1941,18 @@ interface(`fs_manage_dos_dirs',` + ## + ## + # +-interface(`fs_read_dos_files',` ++interface(`fs_remount_dos_fs',` + gen_require(` + type dosfs_t; + ') + +- read_files_pattern($1, dosfs_t, dosfs_t) ++ allow $1 dosfs_t:filesystem remount; + ') + + ######################################## + ## +-## Create, read, write, and delete files +-## on a DOS filesystem. ++## Unmount a DOS filesystem, such as ++## FAT32 or NTFS. + ## + ## + ## +@@ -1761,7 +1960,138 @@ interface(`fs_read_dos_files',` + ## + ## + # +-interface(`fs_manage_dos_files',` ++interface(`fs_unmount_dos_fs',` ++ gen_require(` ++ type dosfs_t; ++ ') ++ ++ allow $1 dosfs_t:filesystem unmount; ++') ++ ++######################################## ++## ++## Get the attributes of a DOS ++## filesystem, such as FAT32 or NTFS. +## +## +## -+## The domain for which cifs_t is an entrypoint. ++## Domain allowed access. +## +## ++## +# -+interface(`fs_cifs_entry_type',` ++interface(`fs_getattr_dos_fs',` + gen_require(` -+ type cifs_t; ++ type dosfs_t; + ') + -+ domain_entry_file($1, cifs_t) ++ allow $1 dosfs_t:filesystem getattr; +') + +######################################## +## -+## Make general progams in CIFS an entrypoint for -+## the specified domain. ++## Allow changing of the label of a ++## DOS filesystem using the context= mount option. +## +## +## -+## The domain for which cifs_t is an entrypoint. ++## Domain allowed access. +## +## +# -+interface(`fs_cifs_entrypoint',` ++interface(`fs_relabelfrom_dos_fs',` + gen_require(` -+ type cifs_t; ++ type dosfs_t; + ') + -+ allow $1 cifs_t:file entrypoint; ++ allow $1 dosfs_t:filesystem relabelfrom; +') + -+####################################### ++######################################## +## -+## dontaudit write dirs -+## on a configfs filesystem. ++## Search dosfs filesystem. +## +## +## @@ -15892,25 +16189,17 @@ index 8416beb..5a4a6f0 100644 +## +## +# -+interface(`fs_dontaudit_write_configfs_dirs',` ++interface(`fs_search_dos',` + gen_require(` -+ type configfs_t; ++ type dosfs_t; + ') + -+ dontaudit $1 configfs_t:dir write; ++ allow $1 dosfs_t:dir search_dir_perms; +') + - ####################################### - ## - ## Create, read, write, and delete dirs -@@ -1580,6 +1835,43 @@ interface(`fs_manage_configfs_files',` - manage_files_pattern($1, configfs_t, configfs_t) - ') - -+####################################### ++######################################## +## -+## Create, read, write, and delete files -+## on a configfs filesystem. ++## List dirs DOS filesystem. +## +## +## @@ -15918,17 +16207,18 @@ index 8416beb..5a4a6f0 100644 +## +## +# -+interface(`fs_manage_configfs_lnk_files',` ++interface(`fs_list_dos',` + gen_require(` -+ type configfs_t; ++ type dosfs_t; + ') + -+ manage_lnk_files_pattern($1, configfs_t, configfs_t) ++ list_dirs_pattern($1, dosfs_t, dosfs_t) +') + +######################################## +## -+## Unmount a configfs filesystem ++## Create, read, write, and delete dirs ++## on a DOS filesystem. +## +## +## @@ -15936,54 +16226,74 @@ index 8416beb..5a4a6f0 100644 +## +## +# -+interface(`fs_unmount_configfs',` ++interface(`fs_manage_dos_dirs',` + gen_require(` -+ type configfs_t; ++ type dosfs_t; + ') + -+ allow $1 configfs_t:filesystem unmount; ++ manage_dirs_pattern($1, dosfs_t, dosfs_t) +') + - ######################################## - ## - ## Mount a DOS filesystem, such as -@@ -1793,58 +2085,257 @@ interface(`fs_read_eventpollfs',` ++######################################## ++## ++## Read files on a DOS filesystem. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`fs_read_dos_files',` ++ gen_require(` ++ type dosfs_t; ++ ') ++ ++ read_files_pattern($1, dosfs_t, dosfs_t) ++') ++ ++######################################## ++## ++## Create, read, write, and delete files ++## on a DOS filesystem. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`fs_manage_dos_files',` + gen_require(` + type dosfs_t; + ') +@@ -1793,45 +2123,110 @@ interface(`fs_read_eventpollfs',` refpolicywarn(`$0($*) has been deprecated.') ') --######################################## + +####################################### - ## --## Mount a FUSE filesystem. ++## +## Search directories +## on a ecrypt filesystem. - ## - ## --## --## Domain allowed access. --## ++## ++## +## +## Domain allowed access. +## - ## - # --interface(`fs_mount_fusefs',` -- gen_require(` -- type fusefs_t; -- ') ++## ++# +interface(`fs_search_ecryptfs',` + gen_require(` + type ecryptfs_t; + ') - -- allow $1 fusefs_t:filesystem mount; ++ + allow $1 ecryptfs_t:dir search_dir_perms; - ') - ++') ++ ######################################## ## --## Unmount a FUSE filesystem. +-## Mount a FUSE filesystem. +## Create, read, write, and delete directories +## on a FUSEFS filesystem. ## @@ -15994,70 +16304,65 @@ index 8416beb..5a4a6f0 100644 ## +## # --interface(`fs_unmount_fusefs',` +-interface(`fs_mount_fusefs',` +interface(`fs_manage_ecryptfs_dirs',` gen_require(` - type fusefs_t; + type ecryptfs_t; ') -- allow $1 fusefs_t:filesystem unmount; +- allow $1 fusefs_t:filesystem mount; + manage_dirs_pattern($1, ecryptfs_t, ecryptfs_t) + allow $1 ecryptfs_t:dir manage_dir_perms; - ') - --######################################## ++') ++ +####################################### - ## --## Mounton a FUSEFS filesystem. ++## +## Create, read, write, and delete files +## on a FUSEFS filesystem. - ## - ## --## --## Domain allowed access. --## ++## ++## +## +## Domain allowed access. +## - ## ++## +## - # --interface(`fs_mounton_fusefs',` -- gen_require(` -- type fusefs_t; -- ') ++# +interface(`fs_read_ecryptfs_files',` + gen_require(` + type ecryptfs_t; + ') - -- allow $1 fusefs_t:dir mounton; -+ read_files_pattern($1, ecryptfs_t, ecryptfs_t) -+') + -+######################################## -+## ++ read_files_pattern($1, ecryptfs_t, ecryptfs_t) + ') + + ######################################## + ## +-## Unmount a FUSE filesystem. +## Create, read, write, and delete files +## on a FUSEFS filesystem. -+## -+## -+## -+## Domain allowed access. -+## -+## + ## + ## + ## + ## Domain allowed access. + ## + ## +## -+# + # +-interface(`fs_unmount_fusefs',` +interface(`fs_manage_ecryptfs_files',` -+ gen_require(` + gen_require(` +- type fusefs_t; + type ecryptfs_t; -+ ') -+ + ') + +- allow $1 fusefs_t:filesystem unmount; + manage_files_pattern($1, ecryptfs_t, ecryptfs_t) -+') -+ -+######################################## -+## + ') + + ######################################## + ## +-## Mounton a FUSEFS filesystem. +## Do not audit attempts to create, +## read, write, and delete files +## on a FUSEFS filesystem. @@ -16079,18 +16384,21 @@ index 8416beb..5a4a6f0 100644 +######################################## +## +## Read symbolic links on a FUSEFS filesystem. -+## -+## -+## -+## Domain allowed access. -+## -+## -+# + ## + ## + ## +@@ -1839,174 +2234,988 @@ interface(`fs_unmount_fusefs',` + ## + ## + # +-interface(`fs_mounton_fusefs',` +interface(`fs_read_ecryptfs_symlinks',` -+ gen_require(` + gen_require(` +- type fusefs_t; + type ecryptfs_t; -+ ') -+ + ') + +- allow $1 fusefs_t:dir mounton; + allow $1 ecryptfs_t:dir list_dir_perms; + read_lnk_files_pattern($1, ecryptfs_t, ecryptfs_t) +') @@ -16110,31 +16418,39 @@ index 8416beb..5a4a6f0 100644 + type ecryptfs_t; + ') + dontaudit $1 ecryptfs_t:file append; -+') -+ -+######################################## -+## + ') + + ######################################## + ## +-## Search directories +-## on a FUSEFS filesystem. +## Manage symbolic links on a FUSEFS filesystem. -+## -+## -+## -+## Domain allowed access. -+## -+## -+# + ## + ## + ## + ## Domain allowed access. + ## + ## +-## + # +-interface(`fs_search_fusefs',` +interface(`fs_manage_ecryptfs_symlinks',` -+ gen_require(` + gen_require(` +- type fusefs_t; + type ecryptfs_t; -+ ') -+ + ') + +- allow $1 fusefs_t:dir search_dir_perms; + manage_lnk_files_pattern($1, ecryptfs_t, ecryptfs_t) -+') -+ -+######################################## -+## + ') + + ######################################## + ## +-## Do not audit attempts to list the contents +-## of directories on a FUSEFS filesystem. +## Execute a file on a FUSE filesystem +## in the specified domain. -+## + ## +## +##

+## Execute a file on a FUSE filesystem @@ -16154,17 +16470,19 @@ index 8416beb..5a4a6f0 100644 +## in particular used by the ssh-agent policy. +##

+##
-+## -+## + ## + ## +-## Domain to not audit. +## Domain allowed to transition. +## +## +## +## +## The type of the new process. -+## -+## -+# + ## + ## + # +-interface(`fs_dontaudit_list_fusefs',` +interface(`fs_ecryptfs_domtrans',` + gen_require(` + type ecryptfs_t; @@ -16185,16 +16503,37 @@ index 8416beb..5a4a6f0 100644 +## +# +interface(`fs_mount_fusefs',` + gen_require(` + type fusefs_t; + ') + +- dontaudit $1 fusefs_t:dir list_dir_perms; ++ allow $1 fusefs_t:filesystem mount; + ') + + ######################################## + ## +-## Create, read, write, and delete directories +-## on a FUSEFS filesystem. ++## Unmount a FUSE filesystem. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`fs_unmount_fusefs',` + gen_require(` + type fusefs_t; + ') + -+ allow $1 fusefs_t:filesystem mount; ++ allow $1 fusefs_t:filesystem unmount; +') + +######################################## +## -+## Unmount a FUSE filesystem. ++## Mounton a FUSEFS filesystem. +## +## +## @@ -16202,38 +16541,63 @@ index 8416beb..5a4a6f0 100644 +## +## +# -+interface(`fs_unmount_fusefs',` ++interface(`fs_mounton_fusefs',` + gen_require(` + type fusefs_t; + ') + -+ allow $1 fusefs_t:filesystem unmount; ++ allow $1 fusefs_t:dir mounton; +') + +######################################## +## -+## Mounton a FUSEFS filesystem. ++## Search directories ++## on a FUSEFS filesystem. +## +## +## +## Domain allowed access. +## +## ++## +# -+interface(`fs_mounton_fusefs',` ++interface(`fs_search_fusefs',` + gen_require(` + type fusefs_t; + ') + -+ allow $1 fusefs_t:dir mounton; - ') - - ######################################## -@@ -1896,117 +2387,797 @@ interface(`fs_dontaudit_list_fusefs',` - ## Domain allowed access. - ##
- ## --## ++ allow $1 fusefs_t:dir search_dir_perms; ++') ++ ++######################################## ++## ++## Do not audit attempts to list the contents ++## of directories on a FUSEFS filesystem. ++## ++## ++## ++## Domain to not audit. ++## ++## ++# ++interface(`fs_dontaudit_list_fusefs',` ++ gen_require(` ++ type fusefs_t; ++ ') ++ ++ dontaudit $1 fusefs_t:dir list_dir_perms; ++') ++ ++######################################## ++## ++## Create, read, write, and delete directories ++## on a FUSEFS filesystem. ++## ++## ++## ++## Domain allowed access. ++## ++## +## +# +interface(`fs_manage_fusefs_dirs',` @@ -16912,12 +17276,13 @@ index 8416beb..5a4a6f0 100644 +## +## Read files on an iso9660 filesystem, which +## is usually used on CDs. -+## -+## -+## -+## Domain allowed access. -+## -+## + ##
+ ## + ## + ## Domain allowed access. + ## + ## +-## # -interface(`fs_manage_fusefs_dirs',` +interface(`fs_getattr_iso9660_files',` @@ -17062,7 +17427,7 @@ index 8416beb..5a4a6f0 100644 ##
## ## -@@ -2014,19 +3185,20 @@ interface(`fs_dontaudit_manage_fusefs_files',` +@@ -2014,19 +3223,20 @@ interface(`fs_dontaudit_manage_fusefs_files',` ## ## # @@ -17089,7 +17454,7 @@ index 8416beb..5a4a6f0 100644 ##
## ## -@@ -2034,17 +3206,18 @@ interface(`fs_read_fusefs_symlinks',` +@@ -2034,17 +3244,18 @@ interface(`fs_read_fusefs_symlinks',` ## ## # @@ -17112,7 +17477,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2052,17 +3225,38 @@ interface(`fs_getattr_hugetlbfs',` +@@ -2052,17 +3263,38 @@ interface(`fs_getattr_hugetlbfs',` ## ## # @@ -17155,7 +17520,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2070,17 +3264,19 @@ interface(`fs_list_hugetlbfs',` +@@ -2070,17 +3302,19 @@ interface(`fs_list_hugetlbfs',` ## ## # @@ -17179,7 +17544,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2088,35 +3284,41 @@ interface(`fs_manage_hugetlbfs_dirs',` +@@ -2088,35 +3322,41 @@ interface(`fs_manage_hugetlbfs_dirs',` ## ## # @@ -17232,7 +17597,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2124,17 +3326,19 @@ interface(`fs_associate_hugetlbfs',` +@@ -2124,17 +3364,19 @@ interface(`fs_associate_hugetlbfs',` ## ## # @@ -17256,7 +17621,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2142,17 +3346,23 @@ interface(`fs_search_inotifyfs',` +@@ -2142,17 +3384,23 @@ interface(`fs_search_inotifyfs',` ## ## # @@ -17284,7 +17649,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2160,53 +3370,39 @@ interface(`fs_list_inotifyfs',` +@@ -2160,53 +3408,39 @@ interface(`fs_list_inotifyfs',` ## ## # @@ -17350,7 +17715,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2214,19 +3410,18 @@ interface(`fs_hugetlbfs_filetrans',` +@@ -2214,19 +3448,18 @@ interface(`fs_hugetlbfs_filetrans',` ## ## # @@ -17375,7 +17740,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2234,18 +3429,18 @@ interface(`fs_mount_iso9660_fs',` +@@ -2234,18 +3467,18 @@ interface(`fs_mount_iso9660_fs',` ## ## # @@ -17399,7 +17764,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2253,58 +3448,54 @@ interface(`fs_remount_iso9660_fs',` +@@ -2253,58 +3486,54 @@ interface(`fs_remount_iso9660_fs',` ## ## # @@ -17471,7 +17836,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2312,19 +3503,17 @@ interface(`fs_getattr_iso9660_files',` +@@ -2312,19 +3541,17 @@ interface(`fs_getattr_iso9660_files',` ## ## # @@ -17495,7 +17860,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2332,18 +3521,17 @@ interface(`fs_read_iso9660_files',` +@@ -2332,18 +3559,17 @@ interface(`fs_read_iso9660_files',` ## ## # @@ -17517,7 +17882,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2351,240 +3539,243 @@ interface(`fs_mount_nfs',` +@@ -2351,240 +3577,243 @@ interface(`fs_mount_nfs',` ## ## # @@ -17817,7 +18182,7 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -2603,7 +3794,7 @@ interface(`fs_dontaudit_rw_nfs_files',` +@@ -2603,7 +3832,7 @@ interface(`fs_dontaudit_rw_nfs_files',` type nfs_t; ') @@ -17826,7 +18191,7 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -2627,7 +3818,7 @@ interface(`fs_read_nfs_symlinks',` +@@ -2627,7 +3856,7 @@ interface(`fs_read_nfs_symlinks',` ######################################## ## @@ -17835,7 +18200,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -2719,6 +3910,65 @@ interface(`fs_search_rpc',` +@@ -2719,6 +3948,65 @@ interface(`fs_search_rpc',` ######################################## ## @@ -17901,7 +18266,7 @@ index 8416beb..5a4a6f0 100644 ## Search removable storage directories. ## ## -@@ -2741,7 +3991,7 @@ interface(`fs_search_removable',` +@@ -2741,7 +4029,7 @@ interface(`fs_search_removable',` ## ## ## @@ -17910,7 +18275,7 @@ index 8416beb..5a4a6f0 100644 ## ## # -@@ -2777,7 +4027,7 @@ interface(`fs_read_removable_files',` +@@ -2777,7 +4065,7 @@ interface(`fs_read_removable_files',` ## ## ## @@ -17919,7 +18284,7 @@ index 8416beb..5a4a6f0 100644 ## ## # -@@ -2970,6 +4220,7 @@ interface(`fs_manage_nfs_dirs',` +@@ -2970,6 +4258,7 @@ interface(`fs_manage_nfs_dirs',` type nfs_t; ') @@ -17927,7 +18292,7 @@ index 8416beb..5a4a6f0 100644 allow $1 nfs_t:dir manage_dir_perms; ') -@@ -3010,6 +4261,7 @@ interface(`fs_manage_nfs_files',` +@@ -3010,6 +4299,7 @@ interface(`fs_manage_nfs_files',` type nfs_t; ') @@ -17935,7 +18300,7 @@ index 8416beb..5a4a6f0 100644 manage_files_pattern($1, nfs_t, nfs_t) ') -@@ -3050,6 +4302,7 @@ interface(`fs_manage_nfs_symlinks',` +@@ -3050,6 +4340,7 @@ interface(`fs_manage_nfs_symlinks',` type nfs_t; ') @@ -17943,7 +18308,7 @@ index 8416beb..5a4a6f0 100644 manage_lnk_files_pattern($1, nfs_t, nfs_t) ') -@@ -3137,6 +4390,24 @@ interface(`fs_nfs_domtrans',` +@@ -3137,6 +4428,24 @@ interface(`fs_nfs_domtrans',` ######################################## ## @@ -17968,7 +18333,7 @@ index 8416beb..5a4a6f0 100644 ## Mount a NFS server pseudo filesystem. ## ## -@@ -3239,15 +4510,198 @@ interface(`fs_search_nfsd_fs',` +@@ -3239,15 +4548,198 @@ interface(`fs_search_nfsd_fs',` # interface(`fs_list_nfsd_fs',` gen_require(` @@ -18170,7 +18535,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3255,35 +4709,35 @@ interface(`fs_list_nfsd_fs',` +@@ -3255,35 +4747,35 @@ interface(`fs_list_nfsd_fs',` ## ## # @@ -18215,7 +18580,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3291,12 +4745,12 @@ interface(`fs_rw_nfsd_fs',` +@@ -3291,12 +4783,12 @@ interface(`fs_rw_nfsd_fs',` ## ## # @@ -18231,7 +18596,7 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -3392,7 +4846,7 @@ interface(`fs_search_ramfs',` +@@ -3392,7 +4884,7 @@ interface(`fs_search_ramfs',` ######################################## ## @@ -18240,7 +18605,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3429,7 +4883,7 @@ interface(`fs_manage_ramfs_dirs',` +@@ -3429,7 +4921,7 @@ interface(`fs_manage_ramfs_dirs',` ######################################## ## @@ -18249,7 +18614,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3447,7 +4901,7 @@ interface(`fs_dontaudit_read_ramfs_files',` +@@ -3447,7 +4939,7 @@ interface(`fs_dontaudit_read_ramfs_files',` ######################################## ## @@ -18258,7 +18623,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3779,6 +5233,24 @@ interface(`fs_mount_tmpfs',` +@@ -3779,6 +5271,24 @@ interface(`fs_mount_tmpfs',` ######################################## ## @@ -18283,7 +18648,7 @@ index 8416beb..5a4a6f0 100644 ## Remount a tmpfs filesystem. ## ## -@@ -3815,6 +5287,24 @@ interface(`fs_unmount_tmpfs',` +@@ -3815,6 +5325,24 @@ interface(`fs_unmount_tmpfs',` ######################################## ## @@ -18308,7 +18673,7 @@ index 8416beb..5a4a6f0 100644 ## Get the attributes of a tmpfs ## filesystem. ## -@@ -3908,7 +5398,7 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',` +@@ -3908,7 +5436,7 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',` ######################################## ## @@ -18317,7 +18682,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3916,17 +5406,17 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',` +@@ -3916,17 +5444,17 @@ interface(`fs_dontaudit_getattr_tmpfs_dirs',` ## ## # @@ -18338,7 +18703,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3934,17 +5424,17 @@ interface(`fs_mounton_tmpfs',` +@@ -3934,17 +5462,17 @@ interface(`fs_mounton_tmpfs',` ## ## # @@ -18359,7 +18724,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3952,17 +5442,36 @@ interface(`fs_setattr_tmpfs_dirs',` +@@ -3952,17 +5480,36 @@ interface(`fs_setattr_tmpfs_dirs',` ## ## # @@ -18399,7 +18764,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -3970,31 +5479,48 @@ interface(`fs_search_tmpfs',` +@@ -3970,31 +5517,48 @@ interface(`fs_search_tmpfs',` ## ## # @@ -18455,7 +18820,7 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -4057,23 +5583,170 @@ interface(`fs_dontaudit_write_tmpfs_dirs',` +@@ -4057,23 +5621,170 @@ interface(`fs_dontaudit_write_tmpfs_dirs',` ## ## ## @@ -18632,7 +18997,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4081,18 +5754,18 @@ interface(`fs_tmpfs_filetrans',` +@@ -4081,18 +5792,18 @@ interface(`fs_tmpfs_filetrans',` ## ## # @@ -18655,7 +19020,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4100,54 +5773,53 @@ interface(`fs_dontaudit_getattr_tmpfs_files',` +@@ -4100,54 +5811,53 @@ interface(`fs_dontaudit_getattr_tmpfs_files',` ## ## # @@ -18722,7 +19087,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4155,17 +5827,18 @@ interface(`fs_read_tmpfs_files',` +@@ -4155,17 +5865,18 @@ interface(`fs_read_tmpfs_files',` ## ## # @@ -18744,7 +19109,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4173,17 +5846,18 @@ interface(`fs_rw_tmpfs_files',` +@@ -4173,17 +5884,18 @@ interface(`fs_rw_tmpfs_files',` ## ## # @@ -18766,7 +19131,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4191,37 +5865,36 @@ interface(`fs_read_tmpfs_symlinks',` +@@ -4191,37 +5903,36 @@ interface(`fs_read_tmpfs_symlinks',` ## ## # @@ -18812,7 +19177,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4229,18 +5902,18 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',` +@@ -4229,18 +5940,18 @@ interface(`fs_dontaudit_use_tmpfs_chr_dev',` ## ## # @@ -18834,7 +19199,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4248,18 +5921,19 @@ interface(`fs_relabel_tmpfs_chr_file',` +@@ -4248,18 +5959,19 @@ interface(`fs_relabel_tmpfs_chr_file',` ## ## # @@ -18858,7 +19223,7 @@ index 8416beb..5a4a6f0 100644 ## ## ## -@@ -4267,32 +5941,31 @@ interface(`fs_rw_tmpfs_blk_files',` +@@ -4267,32 +5979,31 @@ interface(`fs_rw_tmpfs_blk_files',` ## ## # @@ -18897,7 +19262,7 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -4407,6 +6080,25 @@ interface(`fs_search_xenfs',` +@@ -4407,6 +6118,25 @@ interface(`fs_search_xenfs',` allow $1 xenfs_t:dir search_dir_perms; ') @@ -18923,7 +19288,7 @@ index 8416beb..5a4a6f0 100644 ######################################## ## ## Create, read, write, and delete directories -@@ -4503,6 +6195,8 @@ interface(`fs_mount_all_fs',` +@@ -4503,6 +6233,8 @@ interface(`fs_mount_all_fs',` ') allow $1 filesystem_type:filesystem mount; @@ -18932,7 +19297,7 @@ index 8416beb..5a4a6f0 100644 ') ######################################## -@@ -4549,7 +6243,7 @@ interface(`fs_unmount_all_fs',` +@@ -4549,7 +6281,7 @@ interface(`fs_unmount_all_fs',` ## ##

## Allow the specified domain to @@ -18941,7 +19306,7 @@ index 8416beb..5a4a6f0 100644 ## Example attributes: ##

##
    -@@ -4596,6 +6290,26 @@ interface(`fs_dontaudit_getattr_all_fs',` +@@ -4596,6 +6328,26 @@ interface(`fs_dontaudit_getattr_all_fs',` ######################################## ## @@ -18968,7 +19333,7 @@ index 8416beb..5a4a6f0 100644 ## Get the quotas of all filesystems. ## ## -@@ -4671,6 +6385,25 @@ interface(`fs_getattr_all_dirs',` +@@ -4671,6 +6423,25 @@ interface(`fs_getattr_all_dirs',` ######################################## ## @@ -18994,7 +19359,7 @@ index 8416beb..5a4a6f0 100644 ## Search all directories with a filesystem type. ## ## -@@ -4912,3 +6645,176 @@ interface(`fs_unconfined',` +@@ -4912,3 +6683,176 @@ interface(`fs_unconfined',` typeattribute $1 filesystem_unconfined_type; ') @@ -27424,7 +27789,7 @@ index fe0c682..20f3ba4 100644 + ps_process_pattern($1, sshd_t) +') diff --git a/policy/modules/services/ssh.te b/policy/modules/services/ssh.te -index cc877c7..b8e6e98 100644 +index cc877c7..92de2d7 100644 --- a/policy/modules/services/ssh.te +++ b/policy/modules/services/ssh.te @@ -6,43 +6,69 @@ policy_module(ssh, 2.4.2) @@ -27946,7 +28311,7 @@ index cc877c7..b8e6e98 100644 optional_policy(` seutil_sigchld_newrole(ssh_keygen_t) -@@ -341,3 +527,148 @@ optional_policy(` +@@ -341,3 +527,150 @@ optional_policy(` optional_policy(` udev_read_db(ssh_keygen_t) ') @@ -27987,6 +28352,8 @@ index cc877c7..b8e6e98 100644 + +allow sshd_net_t self:process setrlimit; + ++dev_rw_crypto(sshd_net_t) ++ +init_ioctl_stream_sockets(sshd_net_t) +init_rw_tcp_sockets(sshd_net_t) + @@ -30025,7 +30392,7 @@ index 6bf0ecc..e6be63a 100644 +') + diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te -index 8b40377..da86a8e 100644 +index 8b40377..4758042 100644 --- a/policy/modules/services/xserver.te +++ b/policy/modules/services/xserver.te @@ -26,28 +26,66 @@ gen_require(` @@ -30529,7 +30896,7 @@ index 8b40377..da86a8e 100644 kernel_read_network_state(xdm_t) +kernel_request_load_module(xdm_t) +kernel_stream_connect(xdm_t) -+kernel_dontaudit_view_key(xdm_t) ++kernel_view_key(xdm_t) corecmd_exec_shell(xdm_t) corecmd_exec_bin(xdm_t) @@ -45734,10 +46101,10 @@ index 0000000..121b422 +/var/run/initramfs(/.*)? <> diff --git a/policy/modules/system/systemd.if b/policy/modules/system/systemd.if new file mode 100644 -index 0000000..86e3d01 +index 0000000..3303edd --- /dev/null +++ b/policy/modules/system/systemd.if -@@ -0,0 +1,1803 @@ +@@ -0,0 +1,1823 @@ +## SELinux policy for systemd components + +###################################### @@ -46015,6 +46382,26 @@ index 0000000..86e3d01 + +###################################### +## ++## Read systemd_resolved PID files. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`systemd_resolved_read_pid',` ++ gen_require(` ++ type systemd_resolved_var_run_t; ++ ') ++ ++ files_search_pids($1) ++ list_dirs_pattern($1, systemd_resolved_var_run_t, systemd_resolved_var_run_t) ++ read_files_pattern($1, systemd_resolved_var_run_t, systemd_resolved_var_run_t) ++') ++ ++###################################### ++## +## Read systemd_login PID files. +## +## diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch index 5c3fa78..24ad5d3 100644 --- a/policy-rawhide-contrib.patch +++ b/policy-rawhide-contrib.patch @@ -5537,7 +5537,7 @@ index f6eb485..fe461a3 100644 + ps_process_pattern(httpd_t, $1) ') diff --git a/apache.te b/apache.te -index 6649962..371039c 100644 +index 6649962..24e7705 100644 --- a/apache.te +++ b/apache.te @@ -5,280 +5,346 @@ policy_module(apache, 2.7.2) @@ -6791,7 +6791,7 @@ index 6649962..371039c 100644 ') optional_policy(` -@@ -786,35 +964,61 @@ optional_policy(` +@@ -786,35 +964,62 @@ optional_policy(` ') optional_policy(` @@ -6832,6 +6832,7 @@ index 6649962..371039c 100644 +optional_policy(` + kerberos_manage_host_rcache(httpd_t) + kerberos_read_keytab(httpd_t) ++ kerberos_read_kdc_config(httpd_t) + kerberos_tmp_filetrans_host_rcache(httpd_t, "HTTP_23") + kerberos_tmp_filetrans_host_rcache(httpd_t, "HTTP_48") + kerberos_use(httpd_t) @@ -6866,7 +6867,7 @@ index 6649962..371039c 100644 tunable_policy(`httpd_manage_ipa',` memcached_manage_pid_files(httpd_t) -@@ -822,8 +1026,31 @@ optional_policy(` +@@ -822,8 +1027,31 @@ optional_policy(` ') optional_policy(` @@ -6898,7 +6899,7 @@ index 6649962..371039c 100644 tunable_policy(`httpd_can_network_connect_db',` mysql_tcp_connect(httpd_t) -@@ -832,6 +1059,8 @@ optional_policy(` +@@ -832,6 +1060,8 @@ optional_policy(` optional_policy(` nagios_read_config(httpd_t) @@ -6907,7 +6908,7 @@ index 6649962..371039c 100644 ') optional_policy(` -@@ -842,20 +1071,44 @@ optional_policy(` +@@ -842,20 +1072,44 @@ optional_policy(` ') optional_policy(` @@ -6958,7 +6959,7 @@ index 6649962..371039c 100644 ') optional_policy(` -@@ -863,16 +1116,31 @@ optional_policy(` +@@ -863,16 +1117,31 @@ optional_policy(` ') optional_policy(` @@ -6992,7 +6993,7 @@ index 6649962..371039c 100644 ') optional_policy(` -@@ -883,65 +1151,189 @@ optional_policy(` +@@ -883,65 +1152,189 @@ optional_policy(` yam_read_content(httpd_t) ') @@ -7204,7 +7205,7 @@ index 6649962..371039c 100644 files_dontaudit_search_pids(httpd_suexec_t) files_search_home(httpd_suexec_t) -@@ -950,123 +1342,75 @@ auth_use_nsswitch(httpd_suexec_t) +@@ -950,123 +1343,75 @@ auth_use_nsswitch(httpd_suexec_t) logging_search_logs(httpd_suexec_t) logging_send_syslog_msg(httpd_suexec_t) @@ -7358,7 +7359,7 @@ index 6649962..371039c 100644 mysql_read_config(httpd_suexec_t) tunable_policy(`httpd_can_network_connect_db',` -@@ -1083,172 +1427,107 @@ optional_policy(` +@@ -1083,172 +1428,107 @@ optional_policy(` ') ') @@ -7596,7 +7597,7 @@ index 6649962..371039c 100644 ') tunable_policy(`httpd_read_user_content',` -@@ -1256,64 +1535,74 @@ tunable_policy(`httpd_read_user_content',` +@@ -1256,64 +1536,74 @@ tunable_policy(`httpd_read_user_content',` ') tunable_policy(`httpd_use_cifs',` @@ -7693,7 +7694,7 @@ index 6649962..371039c 100644 ######################################## # -@@ -1321,8 +1610,15 @@ miscfiles_read_localization(httpd_rotatelogs_t) +@@ -1321,8 +1611,15 @@ miscfiles_read_localization(httpd_rotatelogs_t) # optional_policy(` @@ -7710,7 +7711,7 @@ index 6649962..371039c 100644 ') ######################################## -@@ -1330,49 +1626,41 @@ optional_policy(` +@@ -1330,49 +1627,41 @@ optional_policy(` # User content local policy # @@ -7777,7 +7778,7 @@ index 6649962..371039c 100644 kernel_read_system_state(httpd_passwd_t) corecmd_exec_bin(httpd_passwd_t) -@@ -1382,38 +1670,109 @@ dev_read_urand(httpd_passwd_t) +@@ -1382,38 +1671,109 @@ dev_read_urand(httpd_passwd_t) domain_use_interactive_fds(httpd_passwd_t) @@ -16534,7 +16535,7 @@ index 881d92f..a2d588a 100644 + ') ') diff --git a/condor.te b/condor.te -index ce9f040..bd8d855 100644 +index ce9f040..e1e84a5 100644 --- a/condor.te +++ b/condor.te @@ -34,7 +34,7 @@ files_tmp_file(condor_startd_tmp_t) @@ -16614,22 +16615,24 @@ index ce9f040..bd8d855 100644 # -allow condor_master_t self:capability { setuid setgid dac_override sys_ptrace }; -+allow condor_master_t self:capability { chown setuid setgid sys_ptrace }; ++allow condor_master_t self:capability { chown setuid setgid sys_ptrace net_admin }; allow condor_master_t condor_domain:process { sigkill signal }; -@@ -138,6 +148,10 @@ manage_dirs_pattern(condor_master_t, condor_master_tmp_t, condor_master_tmp_t) +@@ -138,6 +148,12 @@ manage_dirs_pattern(condor_master_t, condor_master_tmp_t, condor_master_tmp_t) manage_files_pattern(condor_master_t, condor_master_tmp_t, condor_master_tmp_t) files_tmp_filetrans(condor_master_t, condor_master_tmp_t, { file dir }) +can_exec(condor_master_t, condor_master_exec_t) + +kernel_read_system_state(condor_master_t) ++kernel_read_fs_sysctls(condor_master_t) ++kernel_rw_net_sysctls(condor_master_t) + corenet_udp_sendrecv_generic_if(condor_master_t) corenet_udp_sendrecv_generic_node(condor_master_t) corenet_tcp_bind_generic_node(condor_master_t) -@@ -157,6 +171,8 @@ domain_read_all_domains_state(condor_master_t) +@@ -157,6 +173,8 @@ domain_read_all_domains_state(condor_master_t) auth_use_nsswitch(condor_master_t) @@ -16638,7 +16641,7 @@ index ce9f040..bd8d855 100644 optional_policy(` mta_send_mail(condor_master_t) mta_read_config(condor_master_t) -@@ -174,6 +190,8 @@ allow condor_collector_t condor_master_t:udp_socket rw_socket_perms; +@@ -174,6 +192,8 @@ allow condor_collector_t condor_master_t:udp_socket rw_socket_perms; kernel_read_network_state(condor_collector_t) @@ -16647,7 +16650,7 @@ index ce9f040..bd8d855 100644 ##################################### # # Negotiator local policy -@@ -183,12 +201,15 @@ allow condor_negotiator_t self:capability { setuid setgid }; +@@ -183,12 +203,15 @@ allow condor_negotiator_t self:capability { setuid setgid }; allow condor_negotiator_t condor_master_t:tcp_socket rw_stream_socket_perms; allow condor_negotiator_t condor_master_t:udp_socket getattr; @@ -16663,7 +16666,7 @@ index ce9f040..bd8d855 100644 allow condor_procd_t condor_domain:process sigkill; -@@ -206,6 +227,8 @@ allow condor_schedd_t condor_master_t:udp_socket getattr; +@@ -206,6 +229,8 @@ allow condor_schedd_t condor_master_t:udp_socket getattr; allow condor_schedd_t condor_var_lock_t:dir manage_file_perms; @@ -16672,7 +16675,7 @@ index ce9f040..bd8d855 100644 domtrans_pattern(condor_schedd_t, condor_procd_exec_t, condor_procd_t) domtrans_pattern(condor_schedd_t, condor_startd_exec_t, condor_startd_t) -@@ -214,6 +237,13 @@ manage_files_pattern(condor_schedd_t, condor_schedd_tmp_t, condor_schedd_tmp_t) +@@ -214,6 +239,13 @@ manage_files_pattern(condor_schedd_t, condor_schedd_tmp_t, condor_schedd_tmp_t) relabel_files_pattern(condor_schedd_t, condor_schedd_tmp_t, condor_schedd_tmp_t) files_tmp_filetrans(condor_schedd_t, condor_schedd_tmp_t, { file dir }) @@ -16686,7 +16689,7 @@ index ce9f040..bd8d855 100644 ##################################### # # Startd local policy -@@ -238,11 +268,10 @@ domain_read_all_domains_state(condor_startd_t) +@@ -238,11 +270,10 @@ domain_read_all_domains_state(condor_startd_t) mcs_process_set_categories(condor_startd_t) init_domtrans_script(condor_startd_t) @@ -16699,7 +16702,7 @@ index ce9f040..bd8d855 100644 optional_policy(` ssh_basic_client_template(condor_startd, condor_startd_t, system_r) ssh_domtrans(condor_startd_t) -@@ -254,3 +283,7 @@ optional_policy(` +@@ -254,3 +285,7 @@ optional_policy(` kerberos_use(condor_startd_ssh_t) ') ') @@ -20661,7 +20664,7 @@ index b25b01d..06895f3 100644 ') + diff --git a/ctdb.te b/ctdb.te -index 001b502..ac0508e 100644 +index 001b502..73da04a 100644 --- a/ctdb.te +++ b/ctdb.te @@ -24,6 +24,9 @@ files_tmp_file(ctdbd_tmp_t) @@ -20674,10 +20677,12 @@ index 001b502..ac0508e 100644 type ctdbd_var_run_t; files_pid_file(ctdbd_var_run_t) -@@ -33,12 +36,15 @@ files_pid_file(ctdbd_var_run_t) +@@ -32,13 +35,16 @@ files_pid_file(ctdbd_var_run_t) + # Local policy # - allow ctdbd_t self:capability { chown ipc_lock net_admin net_raw sys_nice }; +-allow ctdbd_t self:capability { chown ipc_lock net_admin net_raw sys_nice }; ++allow ctdbd_t self:capability { chown dac_override dac_read_search ipc_lock net_admin net_raw sys_nice }; +allow ctdbd_t self:capability2 block_suspend; allow ctdbd_t self:process { setpgid signal_perms setsched }; allow ctdbd_t self:fifo_file rw_fifo_file_perms; @@ -26190,7 +26195,7 @@ index 19aa0b8..a79982c 100644 + + diff --git a/dnsmasq.te b/dnsmasq.te -index 37a3b7b..0a64088 100644 +index 37a3b7b..9af09cc 100644 --- a/dnsmasq.te +++ b/dnsmasq.te @@ -24,6 +24,9 @@ logging_log_file(dnsmasq_var_log_t) @@ -26253,20 +26258,20 @@ index 37a3b7b..0a64088 100644 + optional_policy(` + networkmanager_dbus_chat(dnsmasq_t) + ') -+') -+ -+optional_policy(` -+ dnsmasq_domtrans(dnsmasq_t) ') optional_policy(` - networkmanager_read_pid_files(dnsmasq_t) ++ dnsmasq_domtrans(dnsmasq_t) ++') ++ ++optional_policy(` + networkmanager_read_conf(dnsmasq_t) + networkmanager_manage_pid_files(dnsmasq_t) ') optional_policy(` -@@ -124,6 +144,14 @@ optional_policy(` +@@ -124,6 +144,18 @@ optional_policy(` optional_policy(` virt_manage_lib_files(dnsmasq_t) @@ -26281,6 +26286,10 @@ index 37a3b7b..0a64088 100644 + neutron_rw_fifo_file(dnsmasq_t) + neutron_sigchld(dnsmasq_t) +') ++ ++optional_policy(` ++ systemd_resolved_read_pid(dnsmasq_t) ++') diff --git a/dnssec.fc b/dnssec.fc new file mode 100644 index 0000000..1714fa6 @@ -31099,10 +31108,10 @@ index e5b15fb..220622e 100644 diff --git a/ganesha.fc b/ganesha.fc new file mode 100644 -index 0000000..c5982d5 +index 0000000..855f58e --- /dev/null +++ b/ganesha.fc -@@ -0,0 +1,11 @@ +@@ -0,0 +1,12 @@ +/usr/bin/ganesha.nfsd -- gen_context(system_u:object_r:ganesha_exec_t,s0) + +/usr/lib/systemd/system/nfs-ganesha-config.* -- gen_context(system_u:object_r:ganesha_unit_file_t,s0) @@ -31112,6 +31121,7 @@ index 0000000..c5982d5 +/usr/lib/systemd/system/nfs-ganesha.*e -- gen_context(system_u:object_r:ganesha_unit_file_t,s0) + +/var/log/ganesha.log -- gen_context(system_u:object_r:ganesha_var_log_t,s0) ++/var/log/ganesha-gfapi.log -- gen_context(system_u:object_r:ganesha_var_log_t,s0) + +/var/run/ganesha(/.*)? gen_context(system_u:object_r:ganesha_var_run_t,s0) diff --git a/ganesha.if b/ganesha.if @@ -31269,10 +31279,10 @@ index 0000000..d9ba5fa +') diff --git a/ganesha.te b/ganesha.te new file mode 100644 -index 0000000..9542305 +index 0000000..3cf186e --- /dev/null +++ b/ganesha.te -@@ -0,0 +1,72 @@ +@@ -0,0 +1,109 @@ +policy_module(ganesha, 1.0.0) + +######################################## @@ -31280,18 +31290,26 @@ index 0000000..9542305 +# Declarations +# + ++## ++##

    ++## Allow ganesha to read/write fuse files ++##

    ++##
    ++gen_tunable(ganesha_use_fusefs, false) ++ +type ganesha_t; +type ganesha_exec_t; +init_daemon_domain(ganesha_t, ganesha_exec_t) + -+permissive ganesha_t; -+ +type ganesha_var_log_t; +logging_log_file(ganesha_var_log_t) + +type ganesha_var_run_t; +files_pid_file(ganesha_var_run_t) + ++type ganesha_tmp_t; ++files_tmp_file(ganesha_tmp_t) ++ +type ganesha_unit_file_t; +systemd_unit_file(ganesha_unit_file_t) + @@ -31299,6 +31317,9 @@ index 0000000..9542305 +# +# ganesha local policy +# ++dontaudit ganesha_t self:capability net_admin; ++ ++allow ganesha_t self:capability2 block_suspend; +allow ganesha_t self:process { setcap setrlimit }; +allow ganesha_t self:fifo_file rw_fifo_file_perms; +allow ganesha_t self:unix_stream_socket create_stream_socket_perms; @@ -31313,15 +31334,28 @@ index 0000000..9542305 +manage_files_pattern(ganesha_t, ganesha_var_log_t, ganesha_var_log_t) +logging_log_filetrans(ganesha_t, ganesha_var_log_t, { file dir }) + ++manage_dirs_pattern(ganesha_t, ganesha_tmp_t, ganesha_tmp_t) ++manage_files_pattern(ganesha_t, ganesha_tmp_t, ganesha_tmp_t) ++files_tmp_filetrans(ganesha_t, ganesha_tmp_t, { file dir }) ++ ++kernel_read_system_state(ganesha_t) ++kernel_search_network_sysctl(ganesha_t) ++kernel_read_net_sysctls(ganesha_t) ++ +auth_use_nsswitch(ganesha_t) + +corenet_tcp_bind_nfs_port(ganesha_t) +corenet_tcp_connect_generic_port(ganesha_t) ++corenet_tcp_connect_gluster_port(ganesha_t) ++corenet_udp_bind_dey_keyneg_port(ganesha_t) ++corenet_tcp_bind_dey_keyneg_port(ganesha_t) +corenet_udp_bind_nfs_port(ganesha_t) +corenet_udp_bind_all_rpc_ports(ganesha_t) +corenet_tcp_bind_all_rpc_ports(ganesha_t) +corenet_tcp_bind_mountd_port(ganesha_t) +corenet_udp_bind_mountd_port(ganesha_t) ++corenet_tcp_connect_virt_migration_port(ganesha_t) ++corenet_tcp_connect_all_rpc_ports(ganesha_t) + +dev_rw_infiniband_dev(ganesha_t) +dev_read_gpfs(ganesha_t) @@ -31336,6 +31370,11 @@ index 0000000..9542305 + unconfined_dbus_chat(ganesha_t) +') + ++optional_policy(` ++ glusterd_read_conf(ganesha_t) ++ glusterd_read_lib_files(ganesha_t) ++ glusterd_manage_pid(ganesha_t) ++') + +optional_policy(` + kerberos_read_keytab(ganesha_t) @@ -31343,8 +31382,16 @@ index 0000000..9542305 + +optional_policy(` + rpc_manage_nfs_state_data_dir(ganesha_t) ++ rpc_read_nfs_state_data(ganesha_t) + rpcbind_stream_connect(ganesha_t) +') ++ ++tunable_policy(`ganesha_use_fusefs',` ++ fs_manage_fusefs_dirs(ganesha_t) ++ fs_manage_fusefs_files(ganesha_t) ++ fs_read_fusefs_symlinks(ganesha_t) ++ fs_getattr_fusefs(ganesha_t) ++') diff --git a/gatekeeper.te b/gatekeeper.te index 2820368..88c98f4 100644 --- a/gatekeeper.te @@ -32683,10 +32730,10 @@ index 0000000..9806f50 +/var/run/glusterd.* -s gen_context(system_u:object_r:glusterd_var_run_t,s0) diff --git a/glusterd.if b/glusterd.if new file mode 100644 -index 0000000..764ae00 +index 0000000..4501460 --- /dev/null +++ b/glusterd.if -@@ -0,0 +1,261 @@ +@@ -0,0 +1,302 @@ + +## policy for glusterd + @@ -32787,6 +32834,26 @@ index 0000000..764ae00 + +######################################## +## ++## Manage glusterd PID files. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`glusterd_manage_pid',` ++ gen_require(` ++ type glusterd_var_run_t; ++ ') ++ ++ files_search_pids($1) ++ manage_dirs_pattern($1, glusterd_var_run_t, glusterd_var_run_t) ++ manage_files_pattern($1, glusterd_var_run_t, glusterd_var_run_t) ++') ++ ++######################################## ++## +## Manage glusterd log files +## +## @@ -32884,6 +32951,26 @@ index 0000000..764ae00 + +###################################### +## ++## Read /var/lib/glusterd files. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`glusterd_read_lib_files',` ++ gen_require(` ++ type glusterd_var_lib_t; ++ ') ++ ++ files_search_var_lib($1) ++ allow $1 glusterd_var_lib_t:dir search_dir_perms; ++ read_files_pattern($1, glusterd_var_lib_t, glusterd_var_lib_t) ++') ++ ++###################################### ++## +## Read and write /var/lib/glusterd files. +## +## @@ -32898,6 +32985,7 @@ index 0000000..764ae00 + ') + + files_search_var_lib($1) ++ allow $1 glusterd_var_lib_t:dir search_dir_perms; + manage_files_pattern($1, glusterd_var_lib_t, glusterd_var_lib_t) +') + @@ -42853,10 +42941,10 @@ index 0000000..bd7e7fa +') diff --git a/keepalived.te b/keepalived.te new file mode 100644 -index 0000000..c07a3fe +index 0000000..c4f0c32 --- /dev/null +++ b/keepalived.te -@@ -0,0 +1,94 @@ +@@ -0,0 +1,95 @@ +policy_module(keepalived, 1.0.0) + +######################################## @@ -42910,6 +42998,7 @@ index 0000000..c07a3fe +corenet_tcp_connect_smtp_port(keepalived_t) +corenet_tcp_connect_snmp_port(keepalived_t) +corenet_tcp_connect_agentx_port(keepalived_t) ++corenet_tcp_connect_squid_port(keepalived_t) + +domain_read_all_domains_state(keepalived_t) + @@ -43794,7 +43883,7 @@ index f6c00d8..79ea4d8 100644 + kerberos_tmp_filetrans_host_rcache($1, "ldap_55") ') diff --git a/kerberos.te b/kerberos.te -index 8833d59..3fde8ee 100644 +index 8833d59..ac3f3ee 100644 --- a/kerberos.te +++ b/kerberos.te @@ -6,11 +6,11 @@ policy_module(kerberos, 1.12.0) @@ -44004,7 +44093,7 @@ index 8833d59..3fde8ee 100644 logging_log_filetrans(krb5kdc_t, krb5kdc_log_t, file) allow krb5kdc_t krb5kdc_principal_t:file rw_file_perms; -@@ -201,71 +236,79 @@ manage_files_pattern(krb5kdc_t, krb5kdc_tmp_t, krb5kdc_tmp_t) +@@ -201,71 +236,83 @@ manage_files_pattern(krb5kdc_t, krb5kdc_tmp_t, krb5kdc_tmp_t) files_tmp_filetrans(krb5kdc_t, krb5kdc_tmp_t, { file dir }) manage_files_pattern(krb5kdc_t, krb5kdc_var_run_t, krb5kdc_var_run_t) @@ -44088,17 +44177,20 @@ index 8833d59..3fde8ee 100644 ') optional_policy(` -- nis_use_ypbind(krb5kdc_t) + dirsrv_stream_connect(krb5kdc_t) ++') ++ ++optional_policy(` + nis_use_ypbind(krb5kdc_t) ') optional_policy(` - sssd_read_public_files(krb5kdc_t) -+ nis_use_ypbind(krb5kdc_t) ++ realmd_read_var_lib(krb5kdc_t) ') optional_policy(` -@@ -273,6 +316,10 @@ optional_policy(` +@@ -273,6 +320,10 @@ optional_policy(` ') optional_policy(` @@ -44109,7 +44201,7 @@ index 8833d59..3fde8ee 100644 udev_read_db(krb5kdc_t) ') -@@ -281,10 +328,12 @@ optional_policy(` +@@ -281,10 +332,12 @@ optional_policy(` # kpropd local policy # @@ -44125,7 +44217,7 @@ index 8833d59..3fde8ee 100644 allow kpropd_t krb5_host_rcache_t:file manage_file_perms; -@@ -301,27 +350,26 @@ manage_dirs_pattern(kpropd_t, krb5kdc_tmp_t, krb5kdc_tmp_t) +@@ -301,27 +354,26 @@ manage_dirs_pattern(kpropd_t, krb5kdc_tmp_t, krb5kdc_tmp_t) manage_files_pattern(kpropd_t, krb5kdc_tmp_t, krb5kdc_tmp_t) files_tmp_filetrans(kpropd_t, krb5kdc_tmp_t, { file dir }) @@ -58853,7 +58945,7 @@ index 0641e97..f3b1111 100644 + admin_pattern($1, nrpe_etc_t) ') diff --git a/nagios.te b/nagios.te -index 7b3e682..d1e103e 100644 +index 7b3e682..c1f487c 100644 --- a/nagios.te +++ b/nagios.te @@ -5,6 +5,25 @@ policy_module(nagios, 1.13.0) @@ -58938,7 +59030,15 @@ index 7b3e682..d1e103e 100644 ######################################## # -@@ -96,11 +121,13 @@ allow nagios_t nagios_etc_t:dir list_dir_perms; +@@ -87,6 +112,7 @@ dontaudit nagios_t self:capability sys_tty_config; + allow nagios_t self:process { setpgid signal_perms }; + allow nagios_t self:fifo_file rw_fifo_file_perms; + allow nagios_t self:tcp_socket { accept listen }; ++allow nagios_t self:unix_stream_socket { connectto }; + + allow nagios_t nagios_plugin_domain:process signal_perms; + +@@ -96,11 +122,13 @@ allow nagios_t nagios_etc_t:dir list_dir_perms; allow nagios_t nagios_etc_t:file read_file_perms; allow nagios_t nagios_etc_t:lnk_file read_lnk_file_perms; @@ -58957,7 +59057,7 @@ index 7b3e682..d1e103e 100644 manage_dirs_pattern(nagios_t, nagios_tmp_t, nagios_tmp_t) manage_files_pattern(nagios_t, nagios_tmp_t, nagios_tmp_t) -@@ -110,11 +137,14 @@ manage_files_pattern(nagios_t, nagios_var_run_t, nagios_var_run_t) +@@ -110,11 +138,14 @@ manage_files_pattern(nagios_t, nagios_var_run_t, nagios_var_run_t) files_pid_filetrans(nagios_t, nagios_var_run_t, file) manage_fifo_files_pattern(nagios_t, nagios_spool_t, nagios_spool_t) @@ -58974,7 +59074,7 @@ index 7b3e682..d1e103e 100644 kernel_read_system_state(nagios_t) kernel_read_kernel_sysctls(nagios_t) -@@ -123,7 +153,6 @@ kernel_read_software_raid_state(nagios_t) +@@ -123,7 +154,6 @@ kernel_read_software_raid_state(nagios_t) corecmd_exec_bin(nagios_t) corecmd_exec_shell(nagios_t) @@ -58982,7 +59082,7 @@ index 7b3e682..d1e103e 100644 corenet_all_recvfrom_netlabel(nagios_t) corenet_tcp_sendrecv_generic_if(nagios_t) corenet_tcp_sendrecv_generic_node(nagios_t) -@@ -143,18 +172,16 @@ domain_read_all_domains_state(nagios_t) +@@ -143,18 +173,16 @@ domain_read_all_domains_state(nagios_t) files_read_etc_runtime_files(nagios_t) files_read_kernel_symbol_table(nagios_t) @@ -59002,7 +59102,7 @@ index 7b3e682..d1e103e 100644 userdom_dontaudit_use_unpriv_user_fds(nagios_t) userdom_dontaudit_search_user_home_dirs(nagios_t) -@@ -162,6 +189,37 @@ mta_send_mail(nagios_t) +@@ -162,6 +190,41 @@ mta_send_mail(nagios_t) mta_signal_system_mail(nagios_t) mta_kill_system_mail(nagios_t) @@ -59027,6 +59127,10 @@ index 7b3e682..d1e103e 100644 +') + +optional_policy(` ++ apache_systemctl(nagios_t) ++') ++ ++optional_policy(` + tunable_policy(`nagios_run_sudo',` + sudo_exec(nagios_t) + sudo_manage_db(nagios_t) @@ -59040,7 +59144,7 @@ index 7b3e682..d1e103e 100644 optional_policy(` netutils_kill_ping(nagios_t) ') -@@ -178,35 +236,37 @@ optional_policy(` +@@ -178,35 +241,37 @@ optional_policy(` # # CGI local policy # @@ -59096,7 +59200,7 @@ index 7b3e682..d1e103e 100644 ') ######################################## -@@ -214,7 +274,7 @@ optional_policy(` +@@ -214,7 +279,7 @@ optional_policy(` # Nrpe local policy # @@ -59105,7 +59209,7 @@ index 7b3e682..d1e103e 100644 dontaudit nrpe_t self:capability { sys_tty_config sys_resource }; allow nrpe_t self:process { setpgid signal_perms setsched setrlimit }; allow nrpe_t self:fifo_file rw_fifo_file_perms; -@@ -229,9 +289,9 @@ files_pid_filetrans(nrpe_t, nrpe_var_run_t, file) +@@ -229,9 +294,9 @@ files_pid_filetrans(nrpe_t, nrpe_var_run_t, file) domtrans_pattern(nrpe_t, nagios_checkdisk_plugin_exec_t, nagios_checkdisk_plugin_t) @@ -59116,7 +59220,7 @@ index 7b3e682..d1e103e 100644 corecmd_exec_bin(nrpe_t) corecmd_exec_shell(nrpe_t) -@@ -252,8 +312,8 @@ dev_read_urand(nrpe_t) +@@ -252,8 +317,8 @@ dev_read_urand(nrpe_t) domain_use_interactive_fds(nrpe_t) domain_read_all_domains_state(nrpe_t) @@ -59126,7 +59230,7 @@ index 7b3e682..d1e103e 100644 fs_getattr_all_fs(nrpe_t) fs_search_auto_mountpoints(nrpe_t) -@@ -262,10 +322,34 @@ auth_use_nsswitch(nrpe_t) +@@ -262,10 +327,34 @@ auth_use_nsswitch(nrpe_t) logging_send_syslog_msg(nrpe_t) @@ -59163,7 +59267,7 @@ index 7b3e682..d1e103e 100644 optional_policy(` inetd_tcp_service_domain(nrpe_t, nrpe_exec_t) ') -@@ -310,15 +394,15 @@ files_getattr_all_file_type_fs(nagios_admin_plugin_t) +@@ -310,15 +399,15 @@ files_getattr_all_file_type_fs(nagios_admin_plugin_t) # allow nagios_mail_plugin_t self:capability { setuid setgid dac_override }; @@ -59182,7 +59286,7 @@ index 7b3e682..d1e103e 100644 logging_send_syslog_msg(nagios_mail_plugin_t) sysnet_dns_name_resolve(nagios_mail_plugin_t) -@@ -345,6 +429,9 @@ allow nagios_checkdisk_plugin_t self:capability { sys_admin sys_rawio }; +@@ -345,9 +434,14 @@ allow nagios_checkdisk_plugin_t self:capability { sys_admin sys_rawio }; kernel_read_software_raid_state(nagios_checkdisk_plugin_t) @@ -59192,7 +59296,12 @@ index 7b3e682..d1e103e 100644 files_getattr_all_mountpoints(nagios_checkdisk_plugin_t) files_read_etc_runtime_files(nagios_checkdisk_plugin_t) -@@ -357,9 +444,11 @@ storage_raw_read_fixed_disk(nagios_checkdisk_plugin_t) ++fs_read_configfs_files(nagios_checkdisk_plugin_t) ++fs_read_configfs_dirs(nagios_checkdisk_plugin_t) + fs_getattr_all_fs(nagios_checkdisk_plugin_t) + + storage_raw_read_fixed_disk(nagios_checkdisk_plugin_t) +@@ -357,9 +451,11 @@ storage_raw_read_fixed_disk(nagios_checkdisk_plugin_t) # Services local policy # @@ -59206,7 +59315,7 @@ index 7b3e682..d1e103e 100644 corecmd_exec_bin(nagios_services_plugin_t) -@@ -391,6 +480,11 @@ optional_policy(` +@@ -391,6 +487,11 @@ optional_policy(` optional_policy(` mysql_stream_connect(nagios_services_plugin_t) @@ -59218,7 +59327,7 @@ index 7b3e682..d1e103e 100644 ') optional_policy(` -@@ -406,28 +500,36 @@ allow nagios_system_plugin_t self:capability dac_override; +@@ -406,28 +507,36 @@ allow nagios_system_plugin_t self:capability dac_override; dontaudit nagios_system_plugin_t self:capability { setuid setgid }; read_files_pattern(nagios_system_plugin_t, nagios_log_t, nagios_log_t) @@ -59257,7 +59366,7 @@ index 7b3e682..d1e103e 100644 ####################################### # # Event local policy -@@ -442,9 +544,39 @@ corecmd_exec_shell(nagios_eventhandler_plugin_t) +@@ -442,9 +551,39 @@ corecmd_exec_shell(nagios_eventhandler_plugin_t) init_domtrans_script(nagios_eventhandler_plugin_t) @@ -69954,10 +70063,10 @@ index 0000000..abb250d +') diff --git a/pcp.te b/pcp.te new file mode 100644 -index 0000000..7bd521e +index 0000000..69b47dc --- /dev/null +++ b/pcp.te -@@ -0,0 +1,309 @@ +@@ -0,0 +1,313 @@ +policy_module(pcp, 1.0.0) + +######################################## @@ -70228,8 +70337,12 @@ index 0000000..7bd521e + +fs_search_cgroup_dirs(pcp_pmie_t) + ++init_status(pcp_pmie_t) ++ +logging_send_syslog_msg(pcp_pmie_t) + ++systemd_exec_systemctl(pcp_pmie_t) ++systemd_read_unit_files(pcp_pmie_t) +systemd_search_unit_dirs(pcp_pmie_t) + +userdom_read_user_tmp_files(pcp_pmie_t) @@ -72393,10 +72506,10 @@ index 0000000..47cd0f8 +/usr/lib/systemd/system/pki-tomcat.* gen_context(system_u:object_r:pki_tomcat_unit_file_t,s0) diff --git a/pki.if b/pki.if new file mode 100644 -index 0000000..d8226f9 +index 0000000..f18fcc6 --- /dev/null +++ b/pki.if -@@ -0,0 +1,461 @@ +@@ -0,0 +1,479 @@ + +## policy for pki + @@ -72822,6 +72935,24 @@ index 0000000..d8226f9 + +######################################## +## ++## Allow execute pki_common_t files ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`pki_exec_common_files',` ++ gen_require(` ++ type pki_common_t; ++ ') ++ ++ exec_files_pattern($1, pki_common_t, pki_common_t) ++') ++ ++######################################## ++## +## Allow read pki_common_t files +## +## @@ -86456,7 +86587,7 @@ index 04babe3..3b92679 100644 + +/var/lib/ipa-client(/.*)? gen_context(system_u:object_r:realmd_var_lib_t,s0) diff --git a/realmd.if b/realmd.if -index bff31df..3b2a829 100644 +index bff31df..1663054 100644 --- a/realmd.if +++ b/realmd.if @@ -1,8 +1,9 @@ @@ -86471,7 +86602,7 @@ index bff31df..3b2a829 100644 ##
## ## -@@ -39,3 +40,101 @@ interface(`realmd_dbus_chat',` +@@ -39,3 +40,120 @@ interface(`realmd_dbus_chat',` allow $1 realmd_t:dbus send_msg; allow realmd_t $1:dbus send_msg; ') @@ -86573,6 +86704,25 @@ index bff31df..3b2a829 100644 + read_files_pattern($1, realmd_tmp_t, realmd_tmp_t) +') + ++####################################### ++## ++## Read realmd library files. ++## ++## ++## ++## Domain allowed access. ++## ++## ++# ++interface(`realmd_read_var_lib',` ++ gen_require(` ++ type realmd_var_lib_t; ++ ') ++ ++ list_dirs_pattern($1, realmd_var_lib_t, realmd_var_lib_t) ++ read_files_pattern($1, realmd_var_lib_t, realmd_var_lib_t) ++ ++') diff --git a/realmd.te b/realmd.te index 5bc878b..5736203 100644 --- a/realmd.te @@ -91572,7 +91722,7 @@ index a6fb30c..97ef313 100644 +/var/run/rpc\.statd\.lock -- gen_context(system_u:object_r:rpcd_lock_t,s0) + diff --git a/rpc.if b/rpc.if -index 0bf13c2..9572351 100644 +index 0bf13c2..79a2a9c 100644 --- a/rpc.if +++ b/rpc.if @@ -1,4 +1,4 @@ @@ -91937,7 +92087,12 @@ index 0bf13c2..9572351 100644 ## ## ## -@@ -350,8 +407,7 @@ interface(`rpc_read_nfs_state_data',` +@@ -346,12 +403,12 @@ interface(`rpc_read_nfs_state_data',` + + files_search_var_lib($1) + read_files_pattern($1, var_lib_nfs_t, var_lib_nfs_t) ++ read_lnk_files_pattern($1, var_lib_nfs_t, var_lib_nfs_t) + ') ######################################## ## @@ -91947,7 +92102,7 @@ index 0bf13c2..9572351 100644 ## ## ## -@@ -366,31 +422,68 @@ interface(`rpc_manage_nfs_state_data',` +@@ -366,31 +423,68 @@ interface(`rpc_manage_nfs_state_data',` files_search_var_lib($1) manage_files_pattern($1, var_lib_nfs_t, var_lib_nfs_t) @@ -92022,7 +92177,7 @@ index 0bf13c2..9572351 100644 ') allow $1 rpc_domain:process { ptrace signal_perms }; -@@ -411,10 +504,28 @@ interface(`rpc_admin',` +@@ -411,10 +505,28 @@ interface(`rpc_admin',` admin_pattern($1, rpcd_var_run_t) files_list_all($1) @@ -96030,7 +96185,7 @@ index 50d07fb..a34db48 100644 + allow $1 samba_unit_file_t:service all_service_perms; ') diff --git a/samba.te b/samba.te -index 2b7c441..c3db0c7 100644 +index 2b7c441..0aaed65 100644 --- a/samba.te +++ b/samba.te @@ -6,99 +6,86 @@ policy_module(samba, 1.16.3) @@ -96621,7 +96776,7 @@ index 2b7c441..c3db0c7 100644 ') optional_policy(` -@@ -474,11 +501,30 @@ optional_policy(` +@@ -474,11 +501,31 @@ optional_policy(` ') optional_policy(` @@ -96636,6 +96791,7 @@ index 2b7c441..c3db0c7 100644 +optional_policy(` + glusterd_read_conf(smbd_t) + glusterd_rw_lib(smbd_t) ++ glusterd_manage_pid(smbd_t) +') + +optional_policy(` @@ -96652,7 +96808,7 @@ index 2b7c441..c3db0c7 100644 lpd_exec_lpr(smbd_t) ') -@@ -488,6 +534,10 @@ optional_policy(` +@@ -488,6 +535,10 @@ optional_policy(` ') optional_policy(` @@ -96663,7 +96819,7 @@ index 2b7c441..c3db0c7 100644 rpc_search_nfs_state_data(smbd_t) ') -@@ -499,12 +549,53 @@ optional_policy(` +@@ -499,12 +550,53 @@ optional_policy(` udev_read_db(smbd_t) ') @@ -96718,7 +96874,7 @@ index 2b7c441..c3db0c7 100644 allow nmbd_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap }; allow nmbd_t self:fd use; allow nmbd_t self:fifo_file rw_fifo_file_perms; -@@ -512,9 +603,11 @@ allow nmbd_t self:msg { send receive }; +@@ -512,9 +604,11 @@ allow nmbd_t self:msg { send receive }; allow nmbd_t self:msgq create_msgq_perms; allow nmbd_t self:sem create_sem_perms; allow nmbd_t self:shm create_shm_perms; @@ -96733,7 +96889,7 @@ index 2b7c441..c3db0c7 100644 manage_dirs_pattern(nmbd_t, { smbd_var_run_t nmbd_var_run_t }, nmbd_var_run_t) manage_files_pattern(nmbd_t, nmbd_var_run_t, nmbd_var_run_t) -@@ -526,20 +619,16 @@ read_files_pattern(nmbd_t, samba_etc_t, samba_etc_t) +@@ -526,20 +620,16 @@ read_files_pattern(nmbd_t, samba_etc_t, samba_etc_t) read_lnk_files_pattern(nmbd_t, samba_etc_t, samba_etc_t) manage_dirs_pattern(nmbd_t, samba_log_t, samba_log_t) @@ -96758,7 +96914,7 @@ index 2b7c441..c3db0c7 100644 kernel_getattr_core_if(nmbd_t) kernel_getattr_message_if(nmbd_t) -@@ -547,53 +636,44 @@ kernel_read_kernel_sysctls(nmbd_t) +@@ -547,53 +637,44 @@ kernel_read_kernel_sysctls(nmbd_t) kernel_read_network_state(nmbd_t) kernel_read_software_raid_state(nmbd_t) kernel_read_system_state(nmbd_t) @@ -96827,7 +96983,7 @@ index 2b7c441..c3db0c7 100644 ') optional_policy(` -@@ -606,18 +686,29 @@ optional_policy(` +@@ -606,18 +687,29 @@ optional_policy(` ######################################## # @@ -96863,7 +97019,7 @@ index 2b7c441..c3db0c7 100644 samba_read_config(smbcontrol_t) samba_search_var(smbcontrol_t) -@@ -627,39 +718,38 @@ domain_use_interactive_fds(smbcontrol_t) +@@ -627,39 +719,38 @@ domain_use_interactive_fds(smbcontrol_t) dev_read_urand(smbcontrol_t) @@ -96915,7 +97071,7 @@ index 2b7c441..c3db0c7 100644 allow smbmount_t samba_secrets_t:file manage_file_perms; -@@ -668,26 +758,22 @@ manage_files_pattern(smbmount_t, samba_var_t, samba_var_t) +@@ -668,26 +759,22 @@ manage_files_pattern(smbmount_t, samba_var_t, samba_var_t) manage_lnk_files_pattern(smbmount_t, samba_var_t, samba_var_t) files_var_filetrans(smbmount_t, samba_var_t, dir, "samba") @@ -96951,7 +97107,7 @@ index 2b7c441..c3db0c7 100644 fs_getattr_cifs(smbmount_t) fs_mount_cifs(smbmount_t) -@@ -699,58 +785,77 @@ fs_read_cifs_files(smbmount_t) +@@ -699,58 +786,77 @@ fs_read_cifs_files(smbmount_t) storage_raw_read_fixed_disk(smbmount_t) storage_raw_write_fixed_disk(smbmount_t) @@ -97043,7 +97199,7 @@ index 2b7c441..c3db0c7 100644 manage_dirs_pattern(swat_t, swat_tmp_t, swat_tmp_t) manage_files_pattern(swat_t, swat_tmp_t, swat_tmp_t) -@@ -759,17 +864,13 @@ files_tmp_filetrans(swat_t, swat_tmp_t, { file dir }) +@@ -759,17 +865,13 @@ files_tmp_filetrans(swat_t, swat_tmp_t, { file dir }) manage_files_pattern(swat_t, swat_var_run_t, swat_var_run_t) files_pid_filetrans(swat_t, swat_var_run_t, file) @@ -97067,7 +97223,7 @@ index 2b7c441..c3db0c7 100644 kernel_read_kernel_sysctls(swat_t) kernel_read_system_state(swat_t) -@@ -777,36 +878,25 @@ kernel_read_network_state(swat_t) +@@ -777,36 +879,25 @@ kernel_read_network_state(swat_t) corecmd_search_bin(swat_t) @@ -97110,7 +97266,7 @@ index 2b7c441..c3db0c7 100644 auth_domtrans_chk_passwd(swat_t) auth_use_nsswitch(swat_t) -@@ -818,10 +908,11 @@ logging_send_syslog_msg(swat_t) +@@ -818,10 +909,11 @@ logging_send_syslog_msg(swat_t) logging_send_audit_msgs(swat_t) logging_search_logs(swat_t) @@ -97124,7 +97280,7 @@ index 2b7c441..c3db0c7 100644 optional_policy(` cups_read_rw_config(swat_t) cups_stream_connect(swat_t) -@@ -840,17 +931,20 @@ optional_policy(` +@@ -840,17 +932,20 @@ optional_policy(` # Winbind local policy # @@ -97151,7 +97307,7 @@ index 2b7c441..c3db0c7 100644 allow winbind_t samba_etc_t:dir list_dir_perms; read_files_pattern(winbind_t, samba_etc_t, samba_etc_t) -@@ -860,9 +954,7 @@ manage_files_pattern(winbind_t, samba_etc_t, samba_secrets_t) +@@ -860,9 +955,7 @@ manage_files_pattern(winbind_t, samba_etc_t, samba_secrets_t) filetrans_pattern(winbind_t, samba_etc_t, samba_secrets_t, file) manage_dirs_pattern(winbind_t, samba_log_t, samba_log_t) @@ -97162,7 +97318,7 @@ index 2b7c441..c3db0c7 100644 manage_lnk_files_pattern(winbind_t, samba_log_t, samba_log_t) manage_dirs_pattern(winbind_t, samba_var_t, samba_var_t) -@@ -873,38 +965,42 @@ files_var_filetrans(winbind_t, samba_var_t, dir, "samba") +@@ -873,38 +966,42 @@ files_var_filetrans(winbind_t, samba_var_t, dir, "samba") rw_files_pattern(winbind_t, smbd_tmp_t, smbd_tmp_t) @@ -97216,7 +97372,7 @@ index 2b7c441..c3db0c7 100644 corenet_tcp_connect_smbd_port(winbind_t) corenet_tcp_connect_epmap_port(winbind_t) corenet_tcp_connect_all_unreserved_ports(winbind_t) -@@ -912,38 +1008,52 @@ corenet_tcp_connect_all_unreserved_ports(winbind_t) +@@ -912,38 +1009,52 @@ corenet_tcp_connect_all_unreserved_ports(winbind_t) dev_read_sysfs(winbind_t) dev_read_urand(winbind_t) @@ -97275,7 +97431,7 @@ index 2b7c441..c3db0c7 100644 ') optional_policy(` -@@ -959,31 +1069,36 @@ optional_policy(` +@@ -959,31 +1070,36 @@ optional_policy(` # Winbind helper local policy # @@ -97319,7 +97475,7 @@ index 2b7c441..c3db0c7 100644 optional_policy(` apache_append_log(winbind_helper_t) -@@ -997,25 +1112,38 @@ optional_policy(` +@@ -997,25 +1113,38 @@ optional_policy(` ######################################## # @@ -99326,10 +99482,10 @@ index 0000000..7a058a8 +') diff --git a/sbd.te b/sbd.te new file mode 100644 -index 0000000..9c44c87 +index 0000000..469868d --- /dev/null +++ b/sbd.te -@@ -0,0 +1,54 @@ +@@ -0,0 +1,55 @@ +policy_module(sbd, 1.0.0) + +######################################## @@ -99351,7 +99507,7 @@ index 0000000..9c44c87 +# +# sbd local policy +# -+allow sbd_t self:capability { dac_override ipc_lock sys_nice sys_admin}; ++allow sbd_t self:capability { dac_override ipc_lock sys_boot sys_nice sys_admin}; +allow sbd_t self:process { fork setsched signal_perms }; +allow sbd_t self:fifo_file rw_fifo_file_perms; +allow sbd_t self:unix_stream_socket create_stream_socket_perms; @@ -99365,6 +99521,7 @@ index 0000000..9c44c87 +kernel_read_system_state(sbd_t) +kernel_dgram_send(sbd_t) +kernel_rw_kernel_sysctl(sbd_t) ++kernel_create_rpc_sysctls(sbd_t) + +dev_read_rand(sbd_t) +dev_write_watchdog(sbd_t) @@ -111050,10 +111207,10 @@ index 0000000..e5cec8f +') diff --git a/tomcat.te b/tomcat.te new file mode 100644 -index 0000000..cf2b1a7 +index 0000000..1d0e69b --- /dev/null +++ b/tomcat.te -@@ -0,0 +1,99 @@ +@@ -0,0 +1,106 @@ +policy_module(tomcat, 1.0.0) + +######################################## @@ -111075,6 +111232,9 @@ index 0000000..cf2b1a7 + +auth_use_nsswitch(tomcat_t) + ++# Temporary fix, while missing SELinux policies for HSM ++init_stream_connect_script(tomcat_t) ++ +optional_policy(` + pki_manage_tomcat_cert(tomcat_t) + pki_manage_apache_log_files(tomcat_t) @@ -111083,6 +111243,7 @@ index 0000000..cf2b1a7 + pki_search_log_dirs(tomcat_t) + pki_manage_tomcat_log(tomcat_t) + pki_manage_common_files(tomcat_t) ++ pki_exec_common_files(tomcat_t) + pki_stream_connect(tomcat_t) +') + @@ -111122,6 +111283,7 @@ index 0000000..cf2b1a7 +corenet_tcp_bind_http_port(tomcat_domain) +corenet_tcp_bind_http_cache_port(tomcat_domain) +corenet_tcp_bind_mxi_port(tomcat_domain) ++corenet_tcp_bind_bctp_port(tomcat_domain) +corenet_tcp_connect_http_port(tomcat_domain) +corenet_tcp_connect_ldap_port(tomcat_domain) +corenet_tcp_connect_mxi_port(tomcat_domain) @@ -111129,6 +111291,8 @@ index 0000000..cf2b1a7 +corenet_tcp_connect_postgresql_port(tomcat_domain) +corenet_tcp_connect_amqp_port(tomcat_domain) +corenet_tcp_connect_oracle_port(tomcat_domain) ++corenet_tcp_connect_ibm_dt_2_port(tomcat_domain) ++corenet_tcp_connect_unreserved_ports(tomcat_domain) + +dev_read_rand(tomcat_domain) +dev_read_urand(tomcat_domain) @@ -115754,10 +115918,10 @@ index facdee8..b5a815a 100644 + dontaudit $1 virtd_t:lnk_file read_lnk_file_perms; ') diff --git a/virt.te b/virt.te -index f03dcf5..6e0d11b 100644 +index f03dcf5..066b1c3 100644 --- a/virt.te +++ b/virt.te -@@ -1,451 +1,415 @@ +@@ -1,451 +1,422 @@ -policy_module(virt, 1.7.4) +policy_module(virt, 1.5.0) @@ -115840,6 +116004,13 @@ index f03dcf5..6e0d11b 100644 -## can use nfs file systems. -##

+##

++## Allow confined virtual guests to use glusterd ++##

++## ++gen_tunable(virt_use_glusterd, false) ++ ++## ++##

+## Allow sandbox containers to share apache content +##

+##
@@ -115931,8 +116102,7 @@ index f03dcf5..6e0d11b 100644 +##

+## +gen_tunable(virt_sandbox_use_audit, true) - --attribute svirt_lxc_domain; ++ +## +##

+## Allow sandbox containers to use netlink system calls @@ -115946,7 +116116,8 @@ index f03dcf5..6e0d11b 100644 +##

+##
+gen_tunable(virt_sandbox_use_sys_admin, false) -+ + +-attribute svirt_lxc_domain; +## +##

+## Allow sandbox containers to use mknod system calls @@ -115988,10 +116159,10 @@ index f03dcf5..6e0d11b 100644 + +virt_domain_template(svirt_tcg) +role system_r types svirt_tcg_t; -+ -+type qemu_exec_t, virt_file_type; -type virt_cache_t alias svirt_cache_t; ++type qemu_exec_t, virt_file_type; ++ +type virt_cache_t alias svirt_cache_t, virt_file_type; files_type(virt_cache_t) @@ -116362,10 +116533,10 @@ index f03dcf5..6e0d11b 100644 -manage_sock_files_pattern(svirt_t, svirt_home_t, svirt_home_t) - -filetrans_pattern(svirt_t, virt_home_t, svirt_home_t, dir, "qemu") +- +-stream_connect_pattern(svirt_t, svirt_home_t, svirt_home_t, virtd_t) +allow svirt_t self:process ptrace; --stream_connect_pattern(svirt_t, svirt_home_t, svirt_home_t, virtd_t) -- -corenet_udp_sendrecv_generic_if(svirt_t) -corenet_udp_sendrecv_generic_node(svirt_t) -corenet_udp_sendrecv_all_ports(svirt_t) @@ -116483,7 +116654,7 @@ index f03dcf5..6e0d11b 100644 read_files_pattern(virtd_t, virt_etc_t, virt_etc_t) read_lnk_files_pattern(virtd_t, virt_etc_t, virt_etc_t) -@@ -455,42 +419,29 @@ manage_files_pattern(virtd_t, virt_etc_rw_t, virt_etc_rw_t) +@@ -455,42 +426,29 @@ manage_files_pattern(virtd_t, virt_etc_rw_t, virt_etc_rw_t) manage_lnk_files_pattern(virtd_t, virt_etc_rw_t, virt_etc_rw_t) filetrans_pattern(virtd_t, virt_etc_t, virt_etc_rw_t, dir) @@ -116530,27 +116701,27 @@ index f03dcf5..6e0d11b 100644 logging_log_filetrans(virtd_t, virt_log_t, { file dir }) manage_dirs_pattern(virtd_t, virt_var_lib_t, virt_var_lib_t) -@@ -503,23 +454,24 @@ manage_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t) +@@ -503,23 +461,24 @@ manage_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t) manage_sock_files_pattern(virtd_t, virt_var_run_t, virt_var_run_t) files_pid_filetrans(virtd_t, virt_var_run_t, { file dir }) -manage_dirs_pattern(virtd_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t) -manage_files_pattern(virtd_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t) -filetrans_pattern(virtd_t, virt_var_run_t, virtd_lxc_var_run_t, dir, "lxc") +- +-stream_connect_pattern(virtd_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t, virtd_lxc_t) +-stream_connect_pattern(virtd_t, svirt_var_run_t, svirt_var_run_t, virt_domain) +manage_dirs_pattern(virtd_t, virt_lxc_var_run_t, virt_lxc_var_run_t) +manage_files_pattern(virtd_t, virt_lxc_var_run_t, virt_lxc_var_run_t) +filetrans_pattern(virtd_t, virt_var_run_t, virt_lxc_var_run_t, dir, "lxc") +allow virtd_t virt_lxc_var_run_t:file { relabelfrom relabelto }; +stream_connect_pattern(virtd_t, virt_lxc_var_run_t, virt_lxc_var_run_t, virtd_lxc_t) --stream_connect_pattern(virtd_t, virtd_lxc_var_run_t, virtd_lxc_var_run_t, virtd_lxc_t) --stream_connect_pattern(virtd_t, svirt_var_run_t, svirt_var_run_t, virt_domain) +-can_exec(virtd_t, virt_tmp_t) +# libvirtd is permitted to talk to virtlogd +stream_connect_pattern(virtd_t, virt_var_run_t, virtlogd_var_run_t, virtlogd_t) +allow virtd_t virtlogd_t:fifo_file rw_inherited_fifo_file_perms; --can_exec(virtd_t, virt_tmp_t) -- -kernel_read_crypto_sysctls(virtd_t) kernel_read_system_state(virtd_t) kernel_read_network_state(virtd_t) @@ -116564,7 +116735,7 @@ index f03dcf5..6e0d11b 100644 corecmd_exec_bin(virtd_t) corecmd_exec_shell(virtd_t) -@@ -527,24 +479,16 @@ corecmd_exec_shell(virtd_t) +@@ -527,24 +486,16 @@ corecmd_exec_shell(virtd_t) corenet_all_recvfrom_netlabel(virtd_t) corenet_tcp_sendrecv_generic_if(virtd_t) corenet_tcp_sendrecv_generic_node(virtd_t) @@ -116592,7 +116763,7 @@ index f03dcf5..6e0d11b 100644 dev_rw_sysfs(virtd_t) dev_read_urand(virtd_t) dev_read_rand(virtd_t) -@@ -555,20 +499,26 @@ dev_rw_vhost(virtd_t) +@@ -555,20 +506,26 @@ dev_rw_vhost(virtd_t) dev_setattr_generic_usb_dev(virtd_t) dev_relabel_generic_usb_dev(virtd_t) @@ -116623,7 +116794,7 @@ index f03dcf5..6e0d11b 100644 fs_list_auto_mountpoints(virtd_t) fs_getattr_all_fs(virtd_t) fs_rw_anon_inodefs_files(virtd_t) -@@ -601,15 +551,18 @@ term_use_ptmx(virtd_t) +@@ -601,15 +558,18 @@ term_use_ptmx(virtd_t) auth_use_nsswitch(virtd_t) @@ -116643,29 +116814,19 @@ index f03dcf5..6e0d11b 100644 selinux_validate_context(virtd_t) -@@ -620,18 +573,26 @@ seutil_read_file_contexts(virtd_t) +@@ -620,27 +580,35 @@ seutil_read_file_contexts(virtd_t) sysnet_signull_ifconfig(virtd_t) sysnet_signal_ifconfig(virtd_t) sysnet_domtrans_ifconfig(virtd_t) +sysnet_read_config(virtd_t) --userdom_read_all_users_state(virtd_t) -- --ifdef(`hide_broken_symptoms',` -- dontaudit virtd_t self:capability { sys_module sys_ptrace }; --') +systemd_dbus_chat_logind(virtd_t) +systemd_write_inhibit_pipes(virtd_t) - --tunable_policy(`virt_use_fusefs',` -- fs_manage_fusefs_dirs(virtd_t) -- fs_manage_fusefs_files(virtd_t) -- fs_read_fusefs_symlinks(virtd_t) --') ++ +userdom_list_admin_dir(virtd_t) +userdom_getattr_all_users(virtd_t) +userdom_list_user_home_content(virtd_t) -+userdom_read_all_users_state(virtd_t) + userdom_read_all_users_state(virtd_t) +userdom_read_user_home_content_files(virtd_t) +userdom_relabel_user_tmp_files(virtd_t) +userdom_setattr_user_tmp_files(virtd_t) @@ -116678,9 +116839,24 @@ index f03dcf5..6e0d11b 100644 +#userdom_user_home_dir_filetrans(virtd_t, virt_home_t, { dir file }) +virt_filetrans_home_content(virtd_t) - tunable_policy(`virt_use_nfs',` - fs_manage_nfs_dirs(virtd_t) -@@ -640,7 +601,7 @@ tunable_policy(`virt_use_nfs',` +-ifdef(`hide_broken_symptoms',` +- dontaudit virtd_t self:capability { sys_module sys_ptrace }; +-') +- +-tunable_policy(`virt_use_fusefs',` +- fs_manage_fusefs_dirs(virtd_t) +- fs_manage_fusefs_files(virtd_t) +- fs_read_fusefs_symlinks(virtd_t) +-') +- +-tunable_policy(`virt_use_nfs',` +- fs_manage_nfs_dirs(virtd_t) +- fs_manage_nfs_files(virtd_t) +- fs_read_nfs_symlinks(virtd_t) ++tunable_policy(`virt_use_nfs',` ++ fs_manage_nfs_dirs(virtd_t) ++ fs_manage_nfs_files(virtd_t) ++ fs_read_nfs_symlinks(virtd_t) ') tunable_policy(`virt_use_samba',` @@ -116689,7 +116865,7 @@ index f03dcf5..6e0d11b 100644 fs_manage_cifs_files(virtd_t) fs_read_cifs_symlinks(virtd_t) ') -@@ -665,20 +626,12 @@ optional_policy(` +@@ -665,20 +633,12 @@ optional_policy(` ') optional_policy(` @@ -116697,8 +116873,7 @@ index f03dcf5..6e0d11b 100644 - ') - - optional_policy(` -- hal_dbus_chat(virtd_t) -+ hal_dbus_chat(virtd_t) + hal_dbus_chat(virtd_t) ') optional_policy(` @@ -116711,7 +116886,7 @@ index f03dcf5..6e0d11b 100644 ') optional_policy(` -@@ -691,20 +644,26 @@ optional_policy(` +@@ -691,20 +651,26 @@ optional_policy(` dnsmasq_kill(virtd_t) dnsmasq_signull(virtd_t) dnsmasq_create_pid_dirs(virtd_t) @@ -116742,7 +116917,7 @@ index f03dcf5..6e0d11b 100644 ') optional_policy(` -@@ -712,11 +671,18 @@ optional_policy(` +@@ -712,11 +678,18 @@ optional_policy(` ') optional_policy(` @@ -116761,7 +116936,7 @@ index f03dcf5..6e0d11b 100644 policykit_domtrans_auth(virtd_t) policykit_domtrans_resolve(virtd_t) policykit_read_lib(virtd_t) -@@ -727,10 +693,18 @@ optional_policy(` +@@ -727,10 +700,18 @@ optional_policy(` ') optional_policy(` @@ -116780,7 +116955,7 @@ index f03dcf5..6e0d11b 100644 kernel_read_xen_state(virtd_t) kernel_write_xen_state(virtd_t) -@@ -746,44 +720,344 @@ optional_policy(` +@@ -746,44 +727,350 @@ optional_policy(` udev_read_pid_files(virtd_t) ') @@ -116893,7 +117068,7 @@ index f03dcf5..6e0d11b 100644 +manage_sock_files_pattern(virt_domain, svirt_home_t, svirt_home_t) +filetrans_pattern(virt_domain, virt_home_t, svirt_home_t, { dir sock_file file }) +stream_connect_pattern(virt_domain, svirt_home_t, svirt_home_t, virtd_t) - ++ +manage_dirs_pattern(virt_domain, virt_cache_t, virt_cache_t) +manage_files_pattern(virt_domain, virt_cache_t, virt_cache_t) +files_var_filetrans(virt_domain, virt_cache_t, { file dir }) @@ -116929,7 +117104,7 @@ index f03dcf5..6e0d11b 100644 +stream_connect_pattern(virt_domain, qemu_var_run_t, qemu_var_run_t, virtd_t) + +dontaudit virtd_t virt_domain:process { siginh noatsecure rlimitinh }; -+ + +dontaudit virt_domain virt_tmpfs_type:file { read write }; + +append_files_pattern(virt_domain, virt_log_t, virt_log_t) @@ -117047,6 +117222,12 @@ index f03dcf5..6e0d11b 100644 + fs_getattr_fusefs(virt_domain) +') + ++optional_policy(` ++ tunable_policy(`virt_use_glusterd',` ++ glusterd_manage_pid(virt_domain) ++ ') ++') ++ +tunable_policy(`virt_use_nfs',` + fs_manage_nfs_dirs(virt_domain) + fs_manage_nfs_files(virt_domain) @@ -117147,7 +117328,7 @@ index f03dcf5..6e0d11b 100644 kernel_read_system_state(virsh_t) kernel_read_network_state(virsh_t) kernel_read_kernel_sysctls(virsh_t) -@@ -794,25 +1068,18 @@ kernel_write_xen_state(virsh_t) +@@ -794,25 +1081,18 @@ kernel_write_xen_state(virsh_t) corecmd_exec_bin(virsh_t) corecmd_exec_shell(virsh_t) @@ -117174,7 +117355,7 @@ index f03dcf5..6e0d11b 100644 fs_getattr_all_fs(virsh_t) fs_manage_xenfs_dirs(virsh_t) -@@ -821,23 +1088,25 @@ fs_search_auto_mountpoints(virsh_t) +@@ -821,23 +1101,25 @@ fs_search_auto_mountpoints(virsh_t) storage_raw_read_fixed_disk(virsh_t) @@ -117208,7 +117389,7 @@ index f03dcf5..6e0d11b 100644 tunable_policy(`virt_use_nfs',` fs_manage_nfs_dirs(virsh_t) -@@ -856,14 +1125,20 @@ optional_policy(` +@@ -856,14 +1138,20 @@ optional_policy(` ') optional_policy(` @@ -117230,7 +117411,7 @@ index f03dcf5..6e0d11b 100644 xen_stream_connect(virsh_t) xen_stream_connect_xenstore(virsh_t) ') -@@ -888,49 +1163,66 @@ optional_policy(` +@@ -888,49 +1176,66 @@ optional_policy(` kernel_read_xen_state(virsh_ssh_t) kernel_write_xen_state(virsh_ssh_t) @@ -117315,7 +117496,7 @@ index f03dcf5..6e0d11b 100644 corecmd_exec_bin(virtd_lxc_t) corecmd_exec_shell(virtd_lxc_t) -@@ -942,17 +1234,16 @@ dev_read_urand(virtd_lxc_t) +@@ -942,17 +1247,16 @@ dev_read_urand(virtd_lxc_t) domain_use_interactive_fds(virtd_lxc_t) @@ -117335,7 +117516,7 @@ index f03dcf5..6e0d11b 100644 fs_getattr_all_fs(virtd_lxc_t) fs_manage_tmpfs_dirs(virtd_lxc_t) fs_manage_tmpfs_chr_files(virtd_lxc_t) -@@ -964,8 +1255,23 @@ fs_rw_cgroup_files(virtd_lxc_t) +@@ -964,8 +1268,23 @@ fs_rw_cgroup_files(virtd_lxc_t) fs_unmount_all_fs(virtd_lxc_t) fs_relabelfrom_tmpfs(virtd_lxc_t) @@ -117359,7 +117540,7 @@ index f03dcf5..6e0d11b 100644 selinux_get_enforce_mode(virtd_lxc_t) selinux_get_fs_mount(virtd_lxc_t) selinux_validate_context(virtd_lxc_t) -@@ -974,194 +1280,296 @@ selinux_compute_create_context(virtd_lxc_t) +@@ -974,194 +1293,296 @@ selinux_compute_create_context(virtd_lxc_t) selinux_compute_relabel_context(virtd_lxc_t) selinux_compute_user_contexts(virtd_lxc_t) @@ -117390,7 +117571,8 @@ index f03dcf5..6e0d11b 100644 +optional_policy(` + container_exec_lib(virtd_lxc_t) +') -+ + +-sysnet_domtrans_ifconfig(virtd_lxc_t) +optional_policy(` + gnome_read_generic_cache_files(virtd_lxc_t) +') @@ -117398,8 +117580,7 @@ index f03dcf5..6e0d11b 100644 +optional_policy(` + setrans_manage_pid_files(virtd_lxc_t) +') - --sysnet_domtrans_ifconfig(virtd_lxc_t) ++ +optional_policy(` + unconfined_domain(virtd_lxc_t) +') @@ -117611,26 +117792,26 @@ index f03dcf5..6e0d11b 100644 + apache_read_sys_content(svirt_sandbox_domain) + ') +') ++ ++optional_policy(` ++ mta_dontaudit_read_spool_symlinks(svirt_sandbox_domain) ++') ++ ++optional_policy(` ++ ssh_use_ptys(svirt_sandbox_domain) ++') optional_policy(` - udev_read_pid_files(svirt_lxc_domain) -+ mta_dontaudit_read_spool_symlinks(svirt_sandbox_domain) ++ udev_read_pid_files(svirt_sandbox_domain) ') optional_policy(` - apache_exec_modules(svirt_lxc_domain) - apache_read_sys_content(svirt_lxc_domain) -+ ssh_use_ptys(svirt_sandbox_domain) -+') -+ -+optional_policy(` -+ udev_read_pid_files(svirt_sandbox_domain) -+') -+ -+optional_policy(` + userhelper_dontaudit_write_config(svirt_sandbox_domain) -+') -+ + ') + +tunable_policy(`virt_use_nfs',` + fs_manage_nfs_dirs(svirt_sandbox_domain) + fs_manage_nfs_files(svirt_sandbox_domain) @@ -117667,16 +117848,23 @@ index f03dcf5..6e0d11b 100644 + container_spc_stream_connect(svirt_sandbox_domain) + fs_dontaudit_remount_tmpfs(svirt_sandbox_domain) + dev_dontaudit_mounton_sysfs(svirt_sandbox_domain) - ') - ++') ++ ++######################################## ++# ++# container_t local policy ++# ++virt_sandbox_domain_template(container) ++typealias container_t alias svirt_lxc_net_t; ++# Policy moved to container-selinux policy package ++ ######################################## # -# Lxc net local policy +# container_t local policy # -+virt_sandbox_domain_template(container) -+typealias container_t alias svirt_lxc_net_t; -+# Policy moved to container-selinux policy package ++virt_sandbox_domain_template(svirt_qemu_net) ++typeattribute svirt_qemu_net_t sandbox_net_domain; -allow svirt_lxc_net_t self:capability { chown dac_read_search dac_override fowner fsetid net_raw net_admin sys_admin sys_nice sys_ptrace sys_resource setpcap }; -dontaudit svirt_lxc_net_t self:capability2 block_suspend; @@ -117689,19 +117877,18 @@ index f03dcf5..6e0d11b 100644 -allow svirt_lxc_net_t self:netlink_socket create_socket_perms; -allow svirt_lxc_net_t self:netlink_tcpdiag_socket create_socket_perms; -allow svirt_lxc_net_t self:netlink_kobject_uevent_socket create_socket_perms; -+######################################## -+# -+# container_t local policy -+# -+virt_sandbox_domain_template(svirt_qemu_net) -+typeattribute svirt_qemu_net_t sandbox_net_domain; - --kernel_read_network_state(svirt_lxc_net_t) --kernel_read_irq_sysctls(svirt_lxc_net_t) +allow svirt_qemu_net_t self:capability { kill setuid setgid sys_boot ipc_lock chown dac_read_search dac_override fowner fsetid sys_chroot sys_admin sys_nice sys_ptrace sys_resource setpcap }; +dontaudit svirt_qemu_net_t self:capability2 block_suspend; +allow svirt_qemu_net_t self:process { execstack execmem }; +-kernel_read_network_state(svirt_lxc_net_t) +-kernel_read_irq_sysctls(svirt_lxc_net_t) ++tunable_policy(`virt_sandbox_use_netlink',` ++ allow svirt_qemu_net_t self:netlink_socket create_socket_perms; ++ allow svirt_qemu_net_t self:netlink_tcpdiag_socket create_netlink_socket_perms; ++ allow svirt_qemu_net_t self:netlink_kobject_uevent_socket create_socket_perms; ++') + -corenet_all_recvfrom_unlabeled(svirt_lxc_net_t) -corenet_all_recvfrom_netlabel(svirt_lxc_net_t) -corenet_tcp_sendrecv_generic_if(svirt_lxc_net_t) @@ -117712,15 +117899,6 @@ index f03dcf5..6e0d11b 100644 -corenet_udp_sendrecv_all_ports(svirt_lxc_net_t) -corenet_tcp_bind_generic_node(svirt_lxc_net_t) -corenet_udp_bind_generic_node(svirt_lxc_net_t) -+tunable_policy(`virt_sandbox_use_netlink',` -+ allow svirt_qemu_net_t self:netlink_socket create_socket_perms; -+ allow svirt_qemu_net_t self:netlink_tcpdiag_socket create_netlink_socket_perms; -+ allow svirt_qemu_net_t self:netlink_kobject_uevent_socket create_socket_perms; -+') - --corenet_sendrecv_all_server_packets(svirt_lxc_net_t) --corenet_udp_bind_all_ports(svirt_lxc_net_t) --corenet_tcp_bind_all_ports(svirt_lxc_net_t) +manage_dirs_pattern(sandbox_net_domain, svirt_home_t, svirt_home_t) +manage_files_pattern(sandbox_net_domain, svirt_home_t, svirt_home_t) +manage_fifo_files_pattern(sandbox_net_domain, svirt_home_t, svirt_home_t) @@ -117728,52 +117906,55 @@ index f03dcf5..6e0d11b 100644 +manage_sock_files_pattern(sandbox_net_domain, svirt_home_t, svirt_home_t) +filetrans_pattern(sandbox_net_domain, virt_home_t, svirt_home_t, { dir sock_file file }) --corenet_sendrecv_all_client_packets(svirt_lxc_net_t) --corenet_tcp_connect_all_ports(svirt_lxc_net_t) +-corenet_sendrecv_all_server_packets(svirt_lxc_net_t) +-corenet_udp_bind_all_ports(svirt_lxc_net_t) +-corenet_tcp_bind_all_ports(svirt_lxc_net_t) +term_use_generic_ptys(svirt_qemu_net_t) +term_use_ptmx(svirt_qemu_net_t) +-corenet_sendrecv_all_client_packets(svirt_lxc_net_t) +-corenet_tcp_connect_all_ports(svirt_lxc_net_t) ++dev_rw_kvm(svirt_qemu_net_t) + -dev_getattr_mtrr_dev(svirt_lxc_net_t) -dev_read_rand(svirt_lxc_net_t) -dev_read_sysfs(svirt_lxc_net_t) -dev_read_urand(svirt_lxc_net_t) -+dev_rw_kvm(svirt_qemu_net_t) ++manage_sock_files_pattern(svirt_qemu_net_t, qemu_var_run_t, qemu_var_run_t) -files_read_kernel_modules(svirt_lxc_net_t) -+manage_sock_files_pattern(svirt_qemu_net_t, qemu_var_run_t, qemu_var_run_t) ++list_dirs_pattern(svirt_qemu_net_t, virt_content_t, virt_content_t) ++read_files_pattern(svirt_qemu_net_t, virt_content_t, virt_content_t) -fs_mount_cgroup(svirt_lxc_net_t) -fs_manage_cgroup_dirs(svirt_lxc_net_t) -fs_rw_cgroup_files(svirt_lxc_net_t) -+list_dirs_pattern(svirt_qemu_net_t, virt_content_t, virt_content_t) -+read_files_pattern(svirt_qemu_net_t, virt_content_t, virt_content_t) - --auth_use_nsswitch(svirt_lxc_net_t) +append_files_pattern(svirt_qemu_net_t, virt_log_t, virt_log_t) --logging_send_audit_msgs(svirt_lxc_net_t) +-auth_use_nsswitch(svirt_lxc_net_t) +kernel_read_irq_sysctls(svirt_qemu_net_t) --userdom_use_user_ptys(svirt_lxc_net_t) +-logging_send_audit_msgs(svirt_lxc_net_t) +dev_read_sysfs(svirt_qemu_net_t) +dev_getattr_mtrr_dev(svirt_qemu_net_t) +dev_read_rand(svirt_qemu_net_t) +dev_read_urand(svirt_qemu_net_t) +-userdom_use_user_ptys(svirt_lxc_net_t) ++files_read_kernel_modules(svirt_qemu_net_t) + -optional_policy(` - rpm_read_db(svirt_lxc_net_t) -') -+files_read_kernel_modules(svirt_qemu_net_t) ++fs_noxattr_type(container_file_t) ++fs_mount_cgroup(svirt_qemu_net_t) ++fs_manage_cgroup_dirs(svirt_qemu_net_t) ++fs_manage_cgroup_files(svirt_qemu_net_t) -####################################### -# -# Prot exec local policy -# -+fs_noxattr_type(container_file_t) -+fs_mount_cgroup(svirt_qemu_net_t) -+fs_manage_cgroup_dirs(svirt_qemu_net_t) -+fs_manage_cgroup_files(svirt_qemu_net_t) -+ +term_pty(container_file_t) + +auth_use_nsswitch(svirt_qemu_net_t) @@ -117803,7 +117984,7 @@ index f03dcf5..6e0d11b 100644 allow virt_qmf_t self:tcp_socket create_stream_socket_perms; allow virt_qmf_t self:netlink_route_socket create_netlink_socket_perms; -@@ -1174,12 +1582,12 @@ dev_read_sysfs(virt_qmf_t) +@@ -1174,12 +1595,12 @@ dev_read_sysfs(virt_qmf_t) dev_read_rand(virt_qmf_t) dev_read_urand(virt_qmf_t) @@ -117818,7 +117999,7 @@ index f03dcf5..6e0d11b 100644 sysnet_read_config(virt_qmf_t) optional_policy(` -@@ -1192,7 +1600,7 @@ optional_policy(` +@@ -1192,7 +1613,7 @@ optional_policy(` ######################################## # @@ -117827,7 +118008,7 @@ index f03dcf5..6e0d11b 100644 # allow virt_bridgehelper_t self:process { setcap getcap }; -@@ -1201,11 +1609,262 @@ allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms; +@@ -1201,11 +1622,262 @@ allow virt_bridgehelper_t self:tcp_socket create_stream_socket_perms; allow virt_bridgehelper_t self:tun_socket create_socket_perms; allow virt_bridgehelper_t self:unix_dgram_socket create_socket_perms; diff --git a/selinux-policy.spec b/selinux-policy.spec index 69d7900..64a3b35 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -19,7 +19,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.13.1 -Release: 255%{?dist} +Release: 256%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -689,6 +689,47 @@ exit 0 %endif %changelog +* Mon Jun 05 2017 Lukas Vrabec - 3.13.1-256 +- Allow keepalived domain connect to squid tcp port +- Allow krb5kdc_t domain read realmd lib files. +- Allow tomcat to connect on all unreserved ports +- Allow keepalived domain connect to squid tcp port +- Allow krb5kdc_t domain read realmd lib files. +- Allow tomcat to connect on all unreserved ports +- Allow ganesha to connect to all rpc ports +- Update ganesha with few allow rules +- Update rpc_read_nfs_state_data() interface to allow read also lnk_files. +- virt_use_glusterd boolean should be in optional block +- Add new boolean virt_use_glusterd +- Add capability sys_boot for sbd_t domain Allow sbd_t domain to create rpc sysctls. +- Allow ganesha_t domain to manage glusterd_var_run_t pid files. +- Create new interface: glusterd_read_lib_files() Allow ganesha read glusterd lib files. Allow ganesha read network sysctls +- Add few allow rules to ganesha module +- Allow condor_master_t to read sysctls. +- Add dac_override cap to ctdbd_t domain +- Add ganesha_use_fusefs boolean. +- Allow httpd_t reading kerberos kdc config files +- Allow tomcat_t domain connect to ibm_dt_2 tcp port. +- Allow stream connect to initrc_t domains +- Add pki_exec_common_files() interface +- Allow dnsmasq_t domain to read systemd-resolved pid files. +- Allow tomcat domain name_bind on tcp bctp_port_t +- Allow smbd_t domain generate debugging files under /var/run/gluster. These files are created through the libgfapi.so library that provides integration of a GlusterFS client in the Samba (vfs_glusterfs) process. +- Allow condor_master_t write to sysctl_net_t +- Allow nagios check disk plugin read /sys/kernel/config/ +- Allow pcp_pmie_t domain execute systemctl binary +- Allow nagios to connect to stream sockets. Allow nagios start httpd via systemctl +- xdm_t should view kernel keys +- Hide broken symptoms when machine is configured with network bounding. +- Label 8750 tcp/udp port as dey_keyneg_port_t +- Label tcp/udp port 1792 as ibm_dt_2_port_t +- Add interface fs_read_configfs_dirs() +- Add interface fs_read_configfs_files() +- Fix systemd_resolved_read_pid interface +- Add interface systemd_resolved_read_pid() +- Allow sshd_net_t domain read/write into crypto devices +- Label 8999 tcp/udp as bctp_port_t + * Thu May 18 2017 Lukas Vrabec - 3.13.1-255 - Dontaudit net_admin capability for domains postfix_master_t and postfix_qmgr_t - Add interface pki_manage_common_files()