[selinux-policy] - Treat Bip with bitlbee policy * Bip is an IRC proxy - Add port definition for interwise port

Miroslav Grepl mgrepl at fedoraproject.org
Mon Jan 23 15:15:24 UTC 2012


commit 8cd443307d839fd9c78a5bed3e62606322e8e788
Author: Miroslav Grepl <mgrepl at redhat.com>
Date:   Mon Jan 23 16:15:05 2012 +0100

    - Treat Bip with bitlbee policy
          * Bip is an IRC proxy
    - Add port definition for interwise port
    - Add support for ipa_memcached socket
    - systemd_jounald needs to getattr on all processes
    - mdadmin fixes
         * uses getpw
    - amavisd calls getpwnam()
    - denyhosts calls getpwall()

 policy-F16.patch    |  207 ++++++++++++++++++++++++++++++++++-----------------
 selinux-policy.spec |   15 +++-
 2 files changed, 153 insertions(+), 69 deletions(-)
---
diff --git a/policy-F16.patch b/policy-F16.patch
index 2fa1838..918a032 100644
--- a/policy-F16.patch
+++ b/policy-F16.patch
@@ -14484,7 +14484,7 @@ index 4f3b542..f4e36ee 100644
  	corenet_udp_recvfrom_labeled($1, $2)
  	corenet_raw_recvfrom_labeled($1, $2)
 diff --git a/policy/modules/kernel/corenetwork.te.in b/policy/modules/kernel/corenetwork.te.in
-index 99b71cb..f7cc16e 100644
+index 99b71cb..58a5523 100644
 --- a/policy/modules/kernel/corenetwork.te.in
 +++ b/policy/modules/kernel/corenetwork.te.in
 @@ -11,11 +11,15 @@ attribute netif_type;
@@ -14610,7 +14610,7 @@ index 99b71cb..f7cc16e 100644
  network_port(gopher, tcp,70,s0, udp,70,s0)
  network_port(gpsd, tcp,2947,s0)
  network_port(hadoop_datanode, tcp,50010,s0)
-@@ -115,11 +157,12 @@ network_port(hddtemp, tcp,7634,s0)
+@@ -115,11 +157,13 @@ network_port(hddtemp, tcp,7634,s0)
  network_port(howl, tcp,5335,s0, udp,5353,s0)
  network_port(hplip, tcp,1782,s0, tcp,2207,s0, tcp,2208,s0, tcp, 8290,s0, tcp,50000,s0, tcp,50002,s0, tcp,8292,s0, tcp,9100,s0, tcp,9101,s0, tcp,9102,s0, tcp,9220,s0, tcp,9221,s0, tcp,9222,s0, tcp,9280,s0, tcp,9281,s0, tcp,9282,s0, tcp,9290,s0, tcp,9291,s0, tcp,9292,s0)
  network_port(http, tcp,80,s0, tcp,443,s0, tcp,488,s0, tcp,8008,s0, tcp,8009,s0, tcp,8443,s0) #8443 is mod_nss default port
@@ -14620,11 +14620,12 @@ index 99b71cb..f7cc16e 100644
  network_port(imaze, tcp,5323,s0, udp,5323,s0)
  network_port(inetd_child, tcp,1,s0, udp,1,s0, tcp,7,s0, udp,7,s0, tcp,9,s0, udp,9,s0, tcp,13,s0, udp,13,s0, tcp,19,s0, udp,19,s0, tcp,37,s0, udp,37,s0, tcp,512,s0, tcp,543,s0, tcp,544,s0, tcp,891,s0, udp,891,s0, tcp,892,s0, udp,892,s0, tcp,2105,s0, tcp,5666,s0)
  network_port(innd, tcp,119,s0)
++network_port(interwise, tcp,7778,s0, udp,7778,s0)
 +network_port(ionixnetmon, tcp,7410,s0, udp,7410,s0)
  network_port(ipmi, udp,623,s0, udp,664,s0)
  network_port(ipp, tcp,631,s0, udp,631,s0, tcp,8610-8614,s0, udp,8610-8614,s0)
  network_port(ipsecnat, tcp,4500,s0, udp,4500,s0)
-@@ -129,20 +172,27 @@ network_port(iscsi, tcp,3260,s0)
+@@ -129,20 +173,27 @@ network_port(iscsi, tcp,3260,s0)
  network_port(isns, tcp,3205,s0, udp,3205,s0)
  network_port(jabber_client, tcp,5222,s0, tcp,5223,s0)
  network_port(jabber_interserver, tcp,5269,s0)
@@ -14655,7 +14656,7 @@ index 99b71cb..f7cc16e 100644
  network_port(mpd, tcp,6600,s0)
  network_port(msnp, tcp,1863,s0, udp,1863,s0)
  network_port(mssql, tcp,1433-1434,s0, udp,1433-1434,s0)
-@@ -152,21 +202,31 @@ network_port(mysqlmanagerd, tcp,2273,s0)
+@@ -152,21 +203,31 @@ network_port(mysqlmanagerd, tcp,2273,s0)
  network_port(nessus, tcp,1241,s0)
  network_port(netport, tcp,3129,s0, udp,3129,s0)
  network_port(netsupport, tcp,5404,s0, udp,5404,s0, tcp,5405,s0, udp,5405,s0)
@@ -14688,7 +14689,7 @@ index 99b71cb..f7cc16e 100644
  network_port(prelude, tcp,4690,s0, udp,4690,s0)
  network_port(presence, tcp,5298-5299,s0, udp,5298-5299,s0)
  network_port(printer, tcp,515,s0)
-@@ -179,34 +239,40 @@ network_port(radacct, udp,1646,s0, udp,1813,s0)
+@@ -179,34 +240,40 @@ network_port(radacct, udp,1646,s0, udp,1813,s0)
  network_port(radius, udp,1645,s0, udp,1812,s0)
  network_port(radsec, tcp,2083,s0)
  network_port(razor, tcp,2703,s0)
@@ -14734,7 +14735,7 @@ index 99b71cb..f7cc16e 100644
  network_port(traceroute, udp,64000-64010,s0)
  network_port(transproxy, tcp,8081,s0)
  network_port(ups, tcp,3493,s0)
-@@ -215,9 +281,11 @@ network_port(uucpd, tcp,540,s0)
+@@ -215,9 +282,11 @@ network_port(uucpd, tcp,540,s0)
  network_port(varnishd, tcp,6081-6082,s0)
  network_port(virt, tcp,16509,s0, udp,16509,s0, tcp,16514,s0, udp,16514,s0)
  network_port(virt_migration, tcp,49152-49216,s0)
@@ -14747,7 +14748,7 @@ index 99b71cb..f7cc16e 100644
  network_port(xdmcp, udp,177,s0, tcp,177,s0)
  network_port(xen, tcp,8002,s0)
  network_port(xfs, tcp,7100,s0)
-@@ -229,6 +297,7 @@ network_port(zookeeper_client, tcp,2181,s0)
+@@ -229,6 +298,7 @@ network_port(zookeeper_client, tcp,2181,s0)
  network_port(zookeeper_election, tcp,3888,s0)
  network_port(zookeeper_leader, tcp,2888,s0)
  network_port(zebra, tcp,2600-2604,s0, tcp,2606,s0, udp,2600-2604,s0, udp,2606,s0)
@@ -14755,7 +14756,7 @@ index 99b71cb..f7cc16e 100644
  network_port(zope, tcp,8021,s0)
  
  # Defaults for reserved ports.	Earlier portcon entries take precedence;
-@@ -238,6 +307,12 @@ portcon tcp 512-1023 gen_context(system_u:object_r:hi_reserved_port_t, s0)
+@@ -238,6 +308,12 @@ portcon tcp 512-1023 gen_context(system_u:object_r:hi_reserved_port_t, s0)
  portcon udp 512-1023 gen_context(system_u:object_r:hi_reserved_port_t, s0)
  portcon tcp 1-511 gen_context(system_u:object_r:reserved_port_t, s0)
  portcon udp 1-511 gen_context(system_u:object_r:reserved_port_t, s0)
@@ -14768,7 +14769,7 @@ index 99b71cb..f7cc16e 100644
  
  ########################################
  #
-@@ -282,9 +357,10 @@ typealias netif_t alias { lo_netif_t netif_lo_t };
+@@ -282,9 +358,10 @@ typealias netif_t alias { lo_netif_t netif_lo_t };
  allow corenet_unconfined_type node_type:node *;
  allow corenet_unconfined_type netif_type:netif *;
  allow corenet_unconfined_type packet_type:packet *;
@@ -25244,7 +25245,7 @@ index e31d92a..e515cb8 100644
   	domain_system_change_exemption($1)
   	role_transition $2 amavis_initrc_exec_t system_r;
 diff --git a/policy/modules/services/amavis.te b/policy/modules/services/amavis.te
-index deca9d3..ae8c579 100644
+index deca9d3..ac92fce 100644
 --- a/policy/modules/services/amavis.te
 +++ b/policy/modules/services/amavis.te
 @@ -38,7 +38,7 @@ type amavis_quarantine_t;
@@ -25264,7 +25265,15 @@ index deca9d3..ae8c579 100644
  
  domain_use_interactive_fds(amavis_t)
  
-@@ -153,24 +154,28 @@ sysnet_use_ldap(amavis_t)
+@@ -137,6 +138,7 @@ files_read_usr_files(amavis_t)
+ 
+ fs_getattr_xattr_fs(amavis_t)
+ 
++auth_use_nsswitch(amavis_t)
+ auth_dontaudit_read_shadow(amavis_t)
+ 
+ # uses uptime which reads utmp - redhat bug 561383
+@@ -153,24 +155,28 @@ sysnet_use_ldap(amavis_t)
  
  userdom_dontaudit_search_user_home_dirs(amavis_t)
  
@@ -28230,16 +28239,23 @@ index 4deca04..7859fa1 100644
  
  optional_policy(`
 diff --git a/policy/modules/services/bitlbee.fc b/policy/modules/services/bitlbee.fc
-index 0197980..f8bce2c 100644
+index 0197980..909ce04 100644
 --- a/policy/modules/services/bitlbee.fc
 +++ b/policy/modules/services/bitlbee.fc
-@@ -4,3 +4,6 @@
+@@ -1,6 +1,13 @@
+ /etc/rc\.d/init\.d/bitlbee --	gen_context(system_u:object_r:bitlbee_initrc_exec_t,s0)
+ /etc/bitlbee(/.*)?		gen_context(system_u:object_r:bitlbee_conf_t,s0)
+ 
++/usr/bin/bip		--	gen_context(system_u:object_r:bitlbee_exec_t,s0)
  /usr/sbin/bitlbee	--	gen_context(system_u:object_r:bitlbee_exec_t,s0)
  
  /var/lib/bitlbee(/.*)?		gen_context(system_u:object_r:bitlbee_var_t,s0)
 +
++/var/log/bip(/.*)?			gen_context(system_u:object_r:bitlbee_log_t,s0)
++
 +/var/run/bitlbee\.pid	--	gen_context(system_u:object_r:bitlbee_var_run_t,s0)
 +/var/run/bitlbee\.sock	-s	gen_context(system_u:object_r:bitlbee_var_run_t,s0)
++/var/run/bip(/.*)?			gen_context(system_u:object_r:bitlbee_var_run_t,s0)
 diff --git a/policy/modules/services/bitlbee.if b/policy/modules/services/bitlbee.if
 index de0bd67..1df2048 100644
 --- a/policy/modules/services/bitlbee.if
@@ -28260,13 +28276,16 @@ index de0bd67..1df2048 100644
  	domain_system_change_exemption($1)
  	role_transition $2 bitlbee_initrc_exec_t system_r;
 diff --git a/policy/modules/services/bitlbee.te b/policy/modules/services/bitlbee.te
-index f4e7ad3..2faf42a 100644
+index f4e7ad3..6b577c2 100644
 --- a/policy/modules/services/bitlbee.te
 +++ b/policy/modules/services/bitlbee.te
-@@ -22,29 +22,40 @@ files_tmp_file(bitlbee_tmp_t)
+@@ -22,29 +22,47 @@ files_tmp_file(bitlbee_tmp_t)
  type bitlbee_var_t;
  files_type(bitlbee_var_t)
  
++type bitlbee_log_t;
++logging_log_file(bitlbee_log_t)
++
 +type bitlbee_var_run_t;
 +files_type(bitlbee_var_run_t)
 +
@@ -28277,7 +28296,7 @@ index f4e7ad3..2faf42a 100644
  
 -allow bitlbee_t self:capability { setgid setuid };
 -allow bitlbee_t self:process signal;
-+allow bitlbee_t self:capability { dac_override setgid setuid sys_nice };
++allow bitlbee_t self:capability { dac_override kill setgid setuid sys_nice };
 +allow bitlbee_t self:process { setsched signal };
 +
 +allow bitlbee_t self:fifo_file rw_fifo_file_perms;
@@ -28300,6 +28319,10 @@ index f4e7ad3..2faf42a 100644
  manage_files_pattern(bitlbee_t, bitlbee_var_t, bitlbee_var_t)
  files_var_lib_filetrans(bitlbee_t, bitlbee_var_t, file)
  
++# log files
++manage_dirs_pattern(bitlbee_t, bitlbee_log_t, bitlbee_log_t)
++manage_files_pattern(bitlbee_t, bitlbee_log_t, bitlbee_log_t)
++
 +manage_dirs_pattern(bitlbee_t, bitlbee_var_run_t, bitlbee_var_run_t)
 +manage_files_pattern(bitlbee_t, bitlbee_var_run_t, bitlbee_var_run_t)
 +manage_sock_files_pattern(bitlbee_t, bitlbee_var_run_t, bitlbee_var_run_t)
@@ -28308,7 +28331,7 @@ index f4e7ad3..2faf42a 100644
  kernel_read_system_state(bitlbee_t)
  
  corenet_all_recvfrom_unlabeled(bitlbee_t)
-@@ -52,6 +63,7 @@ corenet_udp_sendrecv_generic_if(bitlbee_t)
+@@ -52,6 +70,7 @@ corenet_udp_sendrecv_generic_if(bitlbee_t)
  corenet_udp_sendrecv_generic_node(bitlbee_t)
  corenet_tcp_sendrecv_generic_if(bitlbee_t)
  corenet_tcp_sendrecv_generic_node(bitlbee_t)
@@ -28316,13 +28339,15 @@ index f4e7ad3..2faf42a 100644
  # Allow bitlbee to connect to jabber servers
  corenet_tcp_connect_jabber_client_port(bitlbee_t)
  corenet_tcp_sendrecv_jabber_client_port(bitlbee_t)
-@@ -69,6 +81,9 @@ corenet_tcp_connect_http_port(bitlbee_t)
+@@ -69,6 +88,11 @@ corenet_tcp_connect_http_port(bitlbee_t)
  corenet_tcp_sendrecv_http_port(bitlbee_t)
  corenet_tcp_connect_http_cache_port(bitlbee_t)
  corenet_tcp_sendrecv_http_cache_port(bitlbee_t)
 +corenet_tcp_bind_ircd_port(bitlbee_t)
 +corenet_tcp_sendrecv_ircd_port(bitlbee_t)
 +corenet_sendrecv_ircd_server_packets(bitlbee_t)
++corenet_tcp_bind_interwise_port(bitlbee_t)
++corenet_tcp_sendrecv_interwise_port(bitlbee_t)
  
  dev_read_rand(bitlbee_t)
  dev_read_urand(bitlbee_t)
@@ -35612,7 +35637,7 @@ index 567865f..3a57eb9 100644
  	admin_pattern($1, denyhosts_var_lock_t)
  ')
 diff --git a/policy/modules/services/denyhosts.te b/policy/modules/services/denyhosts.te
-index 8ba9425..b10da2c 100644
+index 8ba9425..555058a 100644
 --- a/policy/modules/services/denyhosts.te
 +++ b/policy/modules/services/denyhosts.te
 @@ -25,7 +25,8 @@ logging_log_file(denyhosts_var_log_t)
@@ -35625,7 +35650,7 @@ index 8ba9425..b10da2c 100644
  allow denyhosts_t self:netlink_route_socket create_netlink_socket_perms;
  allow denyhosts_t self:tcp_socket create_socket_perms;
  allow denyhosts_t self:udp_socket create_socket_perms;
-@@ -53,20 +54,28 @@ corenet_tcp_sendrecv_generic_if(denyhosts_t)
+@@ -53,20 +54,30 @@ corenet_tcp_sendrecv_generic_if(denyhosts_t)
  corenet_tcp_sendrecv_generic_node(denyhosts_t)
  corenet_tcp_bind_generic_node(denyhosts_t)
  corenet_tcp_connect_smtp_port(denyhosts_t)
@@ -35636,6 +35661,8 @@ index 8ba9425..b10da2c 100644
  
  files_read_etc_files(denyhosts_t)
 +files_read_usr_files(denyhosts_t)
++
++auth_use_nsswitch(denyhosts_t)
  
  # /var/log/secure
  logging_read_generic_logs(denyhosts_t)
@@ -45146,6 +45173,16 @@ index 98d28b4..1c1d012 100644
 +
 +        delete_files_pattern($1, httpd_mediawiki_tmp_t, httpd_mediawiki_tmp_t)
 +')
+diff --git a/policy/modules/services/memcached.fc b/policy/modules/services/memcached.fc
+index 4d69477..4079870 100644
+--- a/policy/modules/services/memcached.fc
++++ b/policy/modules/services/memcached.fc
+@@ -2,4 +2,5 @@
+ 
+ /usr/bin/memcached		--	gen_context(system_u:object_r:memcached_exec_t,s0)
+ 
++/var/run/ipa_memcached	-s	gen_context(system_u:object_r:memcached_var_run_t,s0)
+ /var/run/memcached(/.*)?		gen_context(system_u:object_r:memcached_var_run_t,s0)
 diff --git a/policy/modules/services/memcached.if b/policy/modules/services/memcached.if
 index db4fd6f..ce07b3f 100644
 --- a/policy/modules/services/memcached.if
@@ -45194,7 +45231,7 @@ index db4fd6f..ce07b3f 100644
  	admin_pattern($1, memcached_var_run_t)
  ')
 diff --git a/policy/modules/services/memcached.te b/policy/modules/services/memcached.te
-index b681608..08b1b49 100644
+index b681608..0934c95 100644
 --- a/policy/modules/services/memcached.te
 +++ b/policy/modules/services/memcached.te
 @@ -20,7 +20,7 @@ files_pid_file(memcached_var_run_t)
@@ -45206,6 +45243,16 @@ index b681608..08b1b49 100644
  dontaudit memcached_t self:capability sys_tty_config;
  allow memcached_t self:process { setrlimit signal_perms };
  allow memcached_t self:tcp_socket create_stream_socket_perms;
+@@ -42,7 +42,8 @@ corenet_udp_bind_memcache_port(memcached_t)
+ 
+ manage_dirs_pattern(memcached_t, memcached_var_run_t, memcached_var_run_t)
+ manage_files_pattern(memcached_t, memcached_var_run_t, memcached_var_run_t)
+-files_pid_filetrans(memcached_t, memcached_var_run_t, { file dir })
++manage_sock_files_pattern(memcached_t, memcached_var_run_t, memcached_var_run_t)
++files_pid_filetrans(memcached_t, memcached_var_run_t, { file dir sock_file })
+ 
+ kernel_read_kernel_sysctls(memcached_t)
+ kernel_read_system_state(memcached_t)
 diff --git a/policy/modules/services/milter.fc b/policy/modules/services/milter.fc
 index 55a3e2f..bc489e0 100644
 --- a/policy/modules/services/milter.fc
@@ -60717,7 +60764,7 @@ index bcdd16c..039b0c8 100644
  	files_list_var_lib($1)
  	admin_pattern($1, setroubleshoot_var_lib_t)
 diff --git a/policy/modules/services/setroubleshoot.te b/policy/modules/services/setroubleshoot.te
-index 086cd5f..a181f01 100644
+index 086cd5f..6e66656 100644
 --- a/policy/modules/services/setroubleshoot.te
 +++ b/policy/modules/services/setroubleshoot.te
 @@ -32,6 +32,8 @@ files_pid_file(setroubleshoot_var_run_t)
@@ -60778,7 +60825,7 @@ index 086cd5f..a181f01 100644
  seutil_read_config(setroubleshootd_t)
  seutil_read_file_contexts(setroubleshootd_t)
  seutil_read_bin_policy(setroubleshootd_t)
-@@ -121,6 +128,18 @@ seutil_read_bin_policy(setroubleshootd_t)
+@@ -121,10 +128,23 @@ seutil_read_bin_policy(setroubleshootd_t)
  userdom_dontaudit_read_user_home_content_files(setroubleshootd_t)
  
  optional_policy(`
@@ -60797,7 +60844,12 @@ index 086cd5f..a181f01 100644
  	dbus_system_domain(setroubleshootd_t, setroubleshootd_exec_t)
  ')
  
-@@ -151,7 +170,11 @@ kernel_read_system_state(setroubleshoot_fixit_t)
+ optional_policy(`
++	rpm_exec(setroubleshootd_t)
+ 	rpm_signull(setroubleshootd_t)
+ 	rpm_read_db(setroubleshootd_t)
+ 	rpm_dontaudit_manage_db(setroubleshootd_t)
+@@ -151,7 +171,11 @@ kernel_read_system_state(setroubleshoot_fixit_t)
  corecmd_exec_bin(setroubleshoot_fixit_t)
  corecmd_exec_shell(setroubleshoot_fixit_t)
  
@@ -60809,7 +60861,7 @@ index 086cd5f..a181f01 100644
  
  files_read_usr_files(setroubleshoot_fixit_t)
  files_read_etc_files(setroubleshoot_fixit_t)
-@@ -164,6 +187,13 @@ logging_send_syslog_msg(setroubleshoot_fixit_t)
+@@ -164,6 +188,13 @@ logging_send_syslog_msg(setroubleshoot_fixit_t)
  
  miscfiles_read_localization(setroubleshoot_fixit_t)
  
@@ -75252,7 +75304,7 @@ index 831b909..118f708 100644
  	init_labeled_script_domtrans($1, syslogd_initrc_exec_t)
  	domain_system_change_exemption($1)
 diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te
-index b6ec597..688f59a 100644
+index b6ec597..dc551f4 100644
 --- a/policy/modules/system/logging.te
 +++ b/policy/modules/system/logging.te
 @@ -5,6 +5,13 @@ policy_module(logging, 1.17.2)
@@ -75404,7 +75456,7 @@ index b6ec597..688f59a 100644
  # manage pid file
  manage_files_pattern(syslogd_t, syslogd_var_run_t, syslogd_var_run_t)
  files_pid_filetrans(syslogd_t, syslogd_var_run_t, file)
-@@ -426,10 +466,21 @@ corenet_sendrecv_syslogd_server_packets(syslogd_t)
+@@ -426,10 +466,22 @@ corenet_sendrecv_syslogd_server_packets(syslogd_t)
  corenet_sendrecv_postgresql_client_packets(syslogd_t)
  corenet_sendrecv_mysqld_client_packets(syslogd_t)
  
@@ -75423,10 +75475,11 @@ index b6ec597..688f59a 100644
 +domain_read_all_domains_state(syslogd_t)
  domain_use_interactive_fds(syslogd_t)
 +domain_read_all_domains_state(syslogd_t)
++domain_getattr_all_domains(syslogd_t)
  
  files_read_etc_files(syslogd_t)
  files_read_usr_files(syslogd_t)
-@@ -447,7 +498,9 @@ mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and
+@@ -447,7 +499,9 @@ mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and
  term_write_console(syslogd_t)
  # Allow syslog to a terminal
  term_write_unallocated_ttys(syslogd_t)
@@ -75436,7 +75489,7 @@ index b6ec597..688f59a 100644
  # for sending messages to logged in users
  init_read_utmp(syslogd_t)
  init_dontaudit_write_utmp(syslogd_t)
-@@ -459,6 +512,7 @@ init_use_fds(syslogd_t)
+@@ -459,6 +513,7 @@ init_use_fds(syslogd_t)
  
  # cjp: this doesnt make sense
  logging_send_syslog_msg(syslogd_t)
@@ -75444,7 +75497,7 @@ index b6ec597..688f59a 100644
  
  miscfiles_read_localization(syslogd_t)
  
-@@ -496,11 +550,20 @@ optional_policy(`
+@@ -496,11 +551,20 @@ optional_policy(`
  ')
  
  optional_policy(`
@@ -77105,7 +77158,7 @@ index b1a85b5..db0d815 100644
  ## </summary>
  ## <desc>
 diff --git a/policy/modules/system/raid.te b/policy/modules/system/raid.te
-index a19ecea..99c4da1 100644
+index a19ecea..486d7f2 100644
 --- a/policy/modules/system/raid.te
 +++ b/policy/modules/system/raid.te
 @@ -10,11 +10,9 @@ type mdadm_exec_t;
@@ -77122,7 +77175,7 @@ index a19ecea..99c4da1 100644
  
  ########################################
  #
-@@ -23,18 +21,19 @@ files_pid_file(mdadm_var_run_t)
+@@ -23,18 +21,20 @@ files_pid_file(mdadm_var_run_t)
  
  allow mdadm_t self:capability { dac_override sys_admin ipc_lock };
  dontaudit mdadm_t self:capability sys_tty_config;
@@ -77138,6 +77191,7 @@ index a19ecea..99c4da1 100644
 +manage_dirs_pattern(mdadm_t, mdadm_var_run_t, mdadm_var_run_t)
  manage_files_pattern(mdadm_t, mdadm_var_run_t, mdadm_var_run_t)
 -files_pid_filetrans(mdadm_t, mdadm_var_run_t, file)
++manage_lnk_files_pattern(mdadm_t, mdadm_var_run_t, mdadm_var_run_t)
 +manage_sock_files_pattern(mdadm_t, mdadm_var_run_t, mdadm_var_run_t)
 +files_pid_filetrans(mdadm_t, mdadm_var_run_t, { file dir })
 +dev_filetrans(mdadm_t, mdadm_var_run_t, { file dir sock_file })
@@ -77148,12 +77202,13 @@ index a19ecea..99c4da1 100644
  kernel_rw_software_raid_state(mdadm_t)
  kernel_getattr_core_if(mdadm_t)
  
-@@ -52,13 +51,16 @@ dev_dontaudit_getattr_generic_blk_files(mdadm_t)
+@@ -52,13 +52,17 @@ dev_dontaudit_getattr_generic_blk_files(mdadm_t)
  dev_read_realtime_clock(mdadm_t)
  # unfortunately needed for DMI decoding:
  dev_read_raw_memory(mdadm_t)
 +dev_read_generic_files(mdadm_t)
  
++domain_read_all_domains_state(mdadm_t)
  domain_use_interactive_fds(mdadm_t)
  
  files_read_etc_files(mdadm_t)
@@ -77166,7 +77221,7 @@ index a19ecea..99c4da1 100644
  fs_dontaudit_list_tmpfs(mdadm_t)
  
  mls_file_read_all_levels(mdadm_t)
-@@ -68,6 +70,7 @@ mls_file_write_all_levels(mdadm_t)
+@@ -68,9 +72,12 @@ mls_file_write_all_levels(mdadm_t)
  storage_manage_fixed_disk(mdadm_t)
  storage_dev_filetrans_fixed_disk(mdadm_t)
  storage_read_scsi_generic(mdadm_t)
@@ -77174,7 +77229,12 @@ index a19ecea..99c4da1 100644
  
  term_dontaudit_list_ptys(mdadm_t)
  
-@@ -84,6 +87,10 @@ userdom_dontaudit_use_user_terminals(mdadm_t)
++auth_use_nsswitch(mdadm_t)
++
+ init_dontaudit_getattr_initctl(mdadm_t)
+ 
+ logging_send_syslog_msg(mdadm_t)
+@@ -84,6 +91,10 @@ userdom_dontaudit_use_user_terminals(mdadm_t)
  mta_send_mail(mdadm_t)
  
  optional_policy(`
@@ -81035,7 +81095,7 @@ index db75976..ce61aed 100644
 +
 +/var/run/user(/.*)?	gen_context(system_u:object_r:user_tmp_t,s0)
 diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
-index 4b2878a..330f877 100644
+index 4b2878a..eeb5b5a 100644
 --- a/policy/modules/system/userdomain.if
 +++ b/policy/modules/system/userdomain.if
 @@ -30,9 +30,11 @@ template(`userdom_base_user_template',`
@@ -82671,12 +82731,16 @@ index 4b2878a..330f877 100644
  ##	Mmap user home files.
  ## </summary>
  ## <param name="domain">
-@@ -1700,12 +2186,32 @@ interface(`userdom_read_user_home_content_files',`
+@@ -1698,14 +2184,35 @@ interface(`userdom_mmap_user_home_content_files',`
+ interface(`userdom_read_user_home_content_files',`
+ 	gen_require(`
  		type user_home_dir_t, user_home_t;
++		attribute user_home_type;
  	')
  
-+	list_dirs_pattern($1, { user_home_dir_t user_home_t }, { user_home_dir_t user_home_t })
- 	read_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t)
+-	read_files_pattern($1, { user_home_dir_t user_home_t }, user_home_t)
++	list_dirs_pattern($1, { user_home_dir_t user_home_type }, { user_home_dir_t user_home_type })
++	read_files_pattern($1, { user_home_dir_t user_home_type }, user_home_type)
  	files_search_home($1)
  ')
  
@@ -82704,7 +82768,7 @@ index 4b2878a..330f877 100644
  ##	Do not audit attempts to read user home files.
  ## </summary>
  ## <param name="domain">
-@@ -1716,11 +2222,14 @@ interface(`userdom_read_user_home_content_files',`
+@@ -1716,11 +2223,14 @@ interface(`userdom_read_user_home_content_files',`
  #
  interface(`userdom_dontaudit_read_user_home_content_files',`
  	gen_require(`
@@ -82722,7 +82786,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -1779,6 +2288,60 @@ interface(`userdom_delete_user_home_content_files',`
+@@ -1779,6 +2289,60 @@ interface(`userdom_delete_user_home_content_files',`
  
  ########################################
  ## <summary>
@@ -82783,7 +82847,7 @@ index 4b2878a..330f877 100644
  ##	Do not audit attempts to write user home files.
  ## </summary>
  ## <param name="domain">
-@@ -1810,8 +2373,7 @@ interface(`userdom_read_user_home_content_symlinks',`
+@@ -1810,8 +2374,7 @@ interface(`userdom_read_user_home_content_symlinks',`
  		type user_home_dir_t, user_home_t;
  	')
  
@@ -82793,7 +82857,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -1827,20 +2389,14 @@ interface(`userdom_read_user_home_content_symlinks',`
+@@ -1827,20 +2390,14 @@ interface(`userdom_read_user_home_content_symlinks',`
  #
  interface(`userdom_exec_user_home_content_files',`
  	gen_require(`
@@ -82818,7 +82882,16 @@ index 4b2878a..330f877 100644
  
  ########################################
  ## <summary>
-@@ -1941,6 +2497,24 @@ interface(`userdom_delete_user_home_content_symlinks',`
+@@ -1920,7 +2477,7 @@ interface(`userdom_manage_user_home_content_symlinks',`
+ 	allow $1 user_home_dir_t:dir search_dir_perms;
+ 	files_search_home($1)
+ ')
+-
++/
+ ########################################
+ ## <summary>
+ ##	Delete symbolic links in a user home directory.
+@@ -1941,6 +2498,24 @@ interface(`userdom_delete_user_home_content_symlinks',`
  
  ########################################
  ## <summary>
@@ -82843,7 +82916,7 @@ index 4b2878a..330f877 100644
  ##	Create, read, write, and delete named pipes
  ##	in a user home subdirectory.
  ## </summary>
-@@ -2008,7 +2582,7 @@ interface(`userdom_user_home_dir_filetrans',`
+@@ -2008,7 +2583,7 @@ interface(`userdom_user_home_dir_filetrans',`
  		type user_home_dir_t;
  	')
  
@@ -82852,7 +82925,7 @@ index 4b2878a..330f877 100644
  	files_search_home($1)
  ')
  
-@@ -2039,7 +2613,7 @@ interface(`userdom_user_home_content_filetrans',`
+@@ -2039,7 +2614,7 @@ interface(`userdom_user_home_content_filetrans',`
  		type user_home_dir_t, user_home_t;
  	')
  
@@ -82861,7 +82934,7 @@ index 4b2878a..330f877 100644
  	allow $1 user_home_dir_t:dir search_dir_perms;
  	files_search_home($1)
  ')
-@@ -2182,7 +2756,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',`
+@@ -2182,7 +2757,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',`
  		type user_tmp_t;
  	')
  
@@ -82870,7 +82943,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -2390,7 +2964,7 @@ interface(`userdom_user_tmp_filetrans',`
+@@ -2390,7 +2965,7 @@ interface(`userdom_user_tmp_filetrans',`
  		type user_tmp_t;
  	')
  
@@ -82879,7 +82952,7 @@ index 4b2878a..330f877 100644
  	files_search_tmp($1)
  ')
  
-@@ -2419,6 +2993,25 @@ interface(`userdom_tmp_filetrans_user_tmp',`
+@@ -2419,6 +2994,25 @@ interface(`userdom_tmp_filetrans_user_tmp',`
  	files_tmp_filetrans($1, user_tmp_t, $2)
  ')
  
@@ -82905,7 +82978,7 @@ index 4b2878a..330f877 100644
  ########################################
  ## <summary>
  ##	Read user tmpfs files.
-@@ -2435,13 +3028,14 @@ interface(`userdom_read_user_tmpfs_files',`
+@@ -2435,13 +3029,14 @@ interface(`userdom_read_user_tmpfs_files',`
  	')
  
  	read_files_pattern($1, user_tmpfs_t, user_tmpfs_t)
@@ -82921,7 +82994,7 @@ index 4b2878a..330f877 100644
  ## </summary>
  ## <param name="domain">
  ##	<summary>
-@@ -2462,7 +3056,7 @@ interface(`userdom_rw_user_tmpfs_files',`
+@@ -2462,7 +3057,7 @@ interface(`userdom_rw_user_tmpfs_files',`
  
  ########################################
  ## <summary>
@@ -82930,7 +83003,7 @@ index 4b2878a..330f877 100644
  ## </summary>
  ## <param name="domain">
  ##	<summary>
-@@ -2470,14 +3064,30 @@ interface(`userdom_rw_user_tmpfs_files',`
+@@ -2470,14 +3065,30 @@ interface(`userdom_rw_user_tmpfs_files',`
  ##	</summary>
  ## </param>
  #
@@ -82965,7 +83038,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -2572,6 +3182,24 @@ interface(`userdom_use_user_ttys',`
+@@ -2572,6 +3183,24 @@ interface(`userdom_use_user_ttys',`
  
  ########################################
  ## <summary>
@@ -82990,7 +83063,7 @@ index 4b2878a..330f877 100644
  ##	Read and write a user domain pty.
  ## </summary>
  ## <param name="domain">
-@@ -2590,22 +3218,34 @@ interface(`userdom_use_user_ptys',`
+@@ -2590,22 +3219,34 @@ interface(`userdom_use_user_ptys',`
  
  ########################################
  ## <summary>
@@ -83033,7 +83106,7 @@ index 4b2878a..330f877 100644
  ## </desc>
  ## <param name="domain">
  ##	<summary>
-@@ -2614,14 +3254,33 @@ interface(`userdom_use_user_ptys',`
+@@ -2614,14 +3255,33 @@ interface(`userdom_use_user_ptys',`
  ## </param>
  ## <infoflow type="both" weight="10"/>
  #
@@ -83071,7 +83144,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -2640,8 +3299,27 @@ interface(`userdom_dontaudit_use_user_terminals',`
+@@ -2640,8 +3300,27 @@ interface(`userdom_dontaudit_use_user_terminals',`
  		type user_tty_device_t, user_devpts_t;
  	')
  
@@ -83101,7 +83174,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -2713,45 +3391,45 @@ interface(`userdom_spec_domtrans_unpriv_users',`
+@@ -2713,45 +3392,45 @@ interface(`userdom_spec_domtrans_unpriv_users',`
  	allow unpriv_userdomain $1:process sigchld;
  ')
  
@@ -83167,7 +83240,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -2772,25 +3450,6 @@ interface(`userdom_manage_unpriv_user_semaphores',`
+@@ -2772,25 +3451,6 @@ interface(`userdom_manage_unpriv_user_semaphores',`
  	allow $1 unpriv_userdomain:sem create_sem_perms;
  ')
  
@@ -83193,7 +83266,7 @@ index 4b2878a..330f877 100644
  ########################################
  ## <summary>
  ##	Manage unpriviledged user SysV shared
-@@ -2852,7 +3511,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
+@@ -2852,7 +3512,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
  
  	domain_entry_file_spec_domtrans($1, unpriv_userdomain)
  	allow unpriv_userdomain $1:fd use;
@@ -83202,7 +83275,7 @@ index 4b2878a..330f877 100644
  	allow unpriv_userdomain $1:process sigchld;
  ')
  
-@@ -2868,29 +3527,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
+@@ -2868,29 +3528,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
  #
  interface(`userdom_search_user_home_content',`
  	gen_require(`
@@ -83236,7 +83309,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -2972,7 +3615,7 @@ interface(`userdom_dontaudit_use_user_ptys',`
+@@ -2972,7 +3616,7 @@ interface(`userdom_dontaudit_use_user_ptys',`
  		type user_devpts_t;
  	')
  
@@ -83245,7 +83318,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -3027,7 +3670,45 @@ interface(`userdom_write_user_tmp_files',`
+@@ -3027,7 +3671,45 @@ interface(`userdom_write_user_tmp_files',`
  		type user_tmp_t;
  	')
  
@@ -83292,7 +83365,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -3045,7 +3726,7 @@ interface(`userdom_dontaudit_use_user_ttys',`
+@@ -3045,7 +3727,7 @@ interface(`userdom_dontaudit_use_user_ttys',`
  		type user_tty_device_t;
  	')
  
@@ -83301,7 +83374,7 @@ index 4b2878a..330f877 100644
  ')
  
  ########################################
-@@ -3064,6 +3745,7 @@ interface(`userdom_read_all_users_state',`
+@@ -3064,6 +3746,7 @@ interface(`userdom_read_all_users_state',`
  	')
  
  	read_files_pattern($1, userdomain, userdomain)
@@ -83309,7 +83382,7 @@ index 4b2878a..330f877 100644
  	kernel_search_proc($1)
  ')
  
-@@ -3142,6 +3824,24 @@ interface(`userdom_signal_all_users',`
+@@ -3142,6 +3825,24 @@ interface(`userdom_signal_all_users',`
  
  ########################################
  ## <summary>
@@ -83334,7 +83407,7 @@ index 4b2878a..330f877 100644
  ##	Send a SIGCHLD signal to all user domains.
  ## </summary>
  ## <param name="domain">
-@@ -3160,6 +3860,24 @@ interface(`userdom_sigchld_all_users',`
+@@ -3160,6 +3861,24 @@ interface(`userdom_sigchld_all_users',`
  
  ########################################
  ## <summary>
@@ -83359,7 +83432,7 @@ index 4b2878a..330f877 100644
  ##	Create keys for all user domains.
  ## </summary>
  ## <param name="domain">
-@@ -3194,3 +3912,1236 @@ interface(`userdom_dbus_send_all_users',`
+@@ -3194,3 +3913,1236 @@ interface(`userdom_dbus_send_all_users',`
  
  	allow $1 userdomain:dbus send_msg;
  ')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 865308c..9f4b498 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -16,7 +16,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.10.0
-Release: 76%{?dist}
+Release: 77%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -471,6 +471,17 @@ SELinux Reference policy mls base module.
 %endif
 
 %changelog
+* Mon Jan 23 2012 Miroslav Grepl <mgrepl at redhat.com> 3.10.0-77
+- Treat Bip with bitlbee policy
+      * Bip is an IRC proxy
+- Add port definition for interwise port
+- Add support for ipa_memcached socket
+- systemd_jounald needs to getattr on all processes
+- mdadmin fixes
+     * uses getpw
+- amavisd calls getpwnam()
+- denyhosts calls getpwall()
+
 * Fri Jan 20 2012 Miroslav Grepl <mgrepl at redhat.com> 3.10.0-76
 - Setup labeling of /var/rsa and /var/lib/rsa to allow login programs to write there
 - bluetooth says they do not use /tmp and want to remove the type
@@ -479,7 +490,7 @@ SELinux Reference policy mls base module.
 - Allow postfix_smtpd_t to connect to spamd
 - Add boolean to allow ftp to connect to all ports > 1023
 - Allow sendmain to write to inherited dovecot tmp files
-
+- setroubleshoot needs to be able to execute rpm to see what version of packages
 * Mon Jan 16 2012 Miroslav Grepl <mgrepl at redhat.com> 3.10.0-75
 - Merge systemd patch
 - systemd-tmpfiles wants to relabel /sys/devices/system/cpu/online


More information about the scm-commits mailing list