From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 7EC00139695 for ; Fri, 17 Feb 2017 08:44:16 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 799D321C03C; Fri, 17 Feb 2017 08:44:15 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 5B3E621C03C for ; Fri, 17 Feb 2017 08:44:15 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 65D88340EDA for ; Fri, 17 Feb 2017 08:44:14 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 3C95D4AC6 for ; Fri, 17 Feb 2017 08:44:12 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1487318655.0c21541d004818b56963b2462639800b0956e8ce.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/system/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/system/modutils.if policy/modules/system/modutils.te policy/modules/system/systemd.te X-VCS-Directories: policy/modules/system/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 0c21541d004818b56963b2462639800b0956e8ce X-VCS-Branch: master Date: Fri, 17 Feb 2017 08:44:12 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 06a02bde-de15-4d2b-85af-14eb1546e74e X-Archives-Hash: 5ecec2d86b38c1541ac4769190551e95 commit: 0c21541d004818b56963b2462639800b0956e8ce Author: Chris PeBenito ieee org> AuthorDate: Wed Feb 8 00:03:59 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Fri Feb 17 08:04:15 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=0c21541d Systemd tmpfiles fix for kmod.conf from Russell Coker. policy/modules/system/modutils.if | 18 ++++++++++++++++++ policy/modules/system/modutils.te | 2 +- policy/modules/system/systemd.te | 5 ++++- 3 files changed, 23 insertions(+), 2 deletions(-) diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if index ae082519..880730c9 100644 --- a/policy/modules/system/modutils.if +++ b/policy/modules/system/modutils.if @@ -333,3 +333,21 @@ interface(`modutils_exec_update_mods',` corecmd_search_bin($1) can_exec($1, update_modules_exec_t) ') + +######################################## +## +## Read kmod lib files. +## +## +## +## Domain allowed access. +## +## +# +interface(`modutils_read_var_run_files',` + gen_require(` + type kmod_var_run_t; + ') + + allow $1 kmod_var_run_t:file read_file_perms; +') diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te index 901cdea0..6e8cfb1c 100644 --- a/policy/modules/system/modutils.te +++ b/policy/modules/system/modutils.te @@ -1,4 +1,4 @@ -policy_module(modutils, 1.17.1) +policy_module(modutils, 1.17.2) ######################################## # diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index 48e9ee18..d16a3804 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -1,4 +1,4 @@ -policy_module(systemd, 1.3.1) +policy_module(systemd, 1.3.2) ######################################### # @@ -355,6 +355,9 @@ auth_manage_login_records(systemd_tmpfiles_t) auth_relabel_login_records(systemd_tmpfiles_t) auth_setattr_login_records(systemd_tmpfiles_t) +# for /run/tmpfiles.d/kmod.conf +modutils_read_var_run_files(systemd_tmpfiles_t) + seutil_read_file_contexts(systemd_tmpfiles_t) systemd_log_parse_environment(systemd_tmpfiles_t)