From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id DE5D1139694 for ; Thu, 25 May 2017 16:43:59 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id DFA2B21C22F; Thu, 25 May 2017 16:43:50 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 92ACE21C22F for ; Thu, 25 May 2017 16:43:35 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 7ED343416BA for ; Thu, 25 May 2017 16:43:34 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id A26BA746B for ; Thu, 25 May 2017 16:43:31 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1495729911.72a11e865ba2ee22f8648e776eb8c8f69a54f26e.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/abrt.te policy/modules/contrib/gnome.if policy/modules/contrib/networkmanager.if policy/modules/contrib/rpm.if X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 72a11e865ba2ee22f8648e776eb8c8f69a54f26e X-VCS-Branch: master Date: Thu, 25 May 2017 16:43:31 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: abd642b7-7ed4-47a0-a090-26925ce94c08 X-Archives-Hash: 2ca6d053e37fff42fbfa3616a18a291f commit: 72a11e865ba2ee22f8648e776eb8c8f69a54f26e Author: Stephen Smalley tycho nsa gov> AuthorDate: Wed May 24 19:41:22 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Thu May 25 16:31:51 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=72a11e86 contrib: allow map permission where needed Allow map permission where needed, based on limited testing. Introduced in the kernel in commit 6941857e82ae ("selinux: add a map permission check for mmap"). Depends on "refpolicy: Define and allow map permission" to define the permission. Signed-off-by: Stephen Smalley tycho.nsa.gov> policy/modules/contrib/abrt.te | 2 ++ policy/modules/contrib/gnome.if | 2 +- policy/modules/contrib/networkmanager.if | 3 +++ policy/modules/contrib/rpm.if | 3 +++ 4 files changed, 9 insertions(+), 1 deletion(-) diff --git a/policy/modules/contrib/abrt.te b/policy/modules/contrib/abrt.te index 9fb4f3ff..6098ee58 100644 --- a/policy/modules/contrib/abrt.te +++ b/policy/modules/contrib/abrt.te @@ -397,6 +397,8 @@ domain_use_interactive_fds(abrt_dump_oops_t) fs_list_inotifyfs(abrt_dump_oops_t) logging_read_generic_logs(abrt_dump_oops_t) +logging_mmap_generic_logs(abrt_dump_oops_t) +logging_mmap_journal(abrt_dump_oops_t) ####################################### # diff --git a/policy/modules/contrib/gnome.if b/policy/modules/contrib/gnome.if index 4fcc6905..edf4d4e6 100644 --- a/policy/modules/contrib/gnome.if +++ b/policy/modules/contrib/gnome.if @@ -332,7 +332,7 @@ interface(`gnome_read_generic_home_content',` userdom_search_user_home_dirs($1) allow $1 gnome_home_t:dir list_dir_perms; - allow $1 gnome_home_t:file read_file_perms; + allow $1 gnome_home_t:file { read_file_perms map }; allow $1 gnome_home_t:fifo_file read_fifo_file_perms; allow $1 gnome_home_t:lnk_file read_lnk_file_perms; allow $1 gnome_home_t:sock_file read_sock_file_perms; diff --git a/policy/modules/contrib/networkmanager.if b/policy/modules/contrib/networkmanager.if index e57453fc..371ebfbd 100644 --- a/policy/modules/contrib/networkmanager.if +++ b/policy/modules/contrib/networkmanager.if @@ -209,6 +209,7 @@ interface(`networkmanager_manage_lib_files',` files_search_var_lib($1) manage_files_pattern($1, NetworkManager_var_lib_t, NetworkManager_var_lib_t) + allow $1 NetworkManager_var_lib_t:file map; ') ######################################## @@ -229,6 +230,7 @@ interface(`networkmanager_read_lib_files',` files_search_var_lib($1) list_dirs_pattern($1, NetworkManager_var_lib_t, NetworkManager_var_lib_t) read_files_pattern($1, NetworkManager_var_lib_t, NetworkManager_var_lib_t) + allow $1 NetworkManager_var_lib_t:file map; ') ######################################## @@ -328,6 +330,7 @@ interface(`networkmanager_admin',` files_search_var_lib($1) admin_pattern($1, NetworkManager_var_lib_t) + allow $1 NetworkManager_var_lib_t:file map; files_search_pids($1) admin_pattern($1, NetworkManager_var_run_t) diff --git a/policy/modules/contrib/rpm.if b/policy/modules/contrib/rpm.if index 2344edd5..304e97cb 100644 --- a/policy/modules/contrib/rpm.if +++ b/policy/modules/contrib/rpm.if @@ -459,6 +459,7 @@ interface(`rpm_read_db',` allow $1 rpm_var_lib_t:dir list_dir_perms; read_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t) read_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t) + allow $1 rpm_var_lib_t:file map; ') ######################################## @@ -499,6 +500,7 @@ interface(`rpm_manage_db',` files_search_var_lib($1) manage_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t) manage_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t) + allow $1 rpm_var_lib_t:file map; ') ######################################## @@ -520,6 +522,7 @@ interface(`rpm_dontaudit_manage_db',` dontaudit $1 rpm_var_lib_t:dir rw_dir_perms; dontaudit $1 rpm_var_lib_t:file manage_file_perms; dontaudit $1 rpm_var_lib_t:lnk_file manage_lnk_file_perms; + dontaudit $1 rpm_var_lib_t:file map; ') #####################################