RPM patch from Dan Walsh.
This commit is contained in:
parent
2d839c6791
commit
b70dfcdf8f
|
@ -1,5 +1,7 @@
|
||||||
|
|
||||||
/bin/rpm -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
/bin/rpm -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
|
|
||||||
|
/usr/bin/debuginfo-install -- gen_context(system_u:object_r:debuginfo_exec_t,s0)
|
||||||
/usr/bin/rpm -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
/usr/bin/rpm -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
/usr/bin/smart -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
/usr/bin/smart -- gen_context(system_u:object_r:rpm_exec_t,s0)
|
||||||
|
|
||||||
|
|
|
@ -20,6 +20,27 @@ interface(`rpm_domtrans',`
|
||||||
domtrans_pattern($1, rpm_exec_t, rpm_t)
|
domtrans_pattern($1, rpm_exec_t, rpm_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Execute debuginfo_install programs in the rpm domain.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`rpm_debuginfo_domtrans',`
|
||||||
|
gen_require(`
|
||||||
|
type rpm_t;
|
||||||
|
type debuginfo_exec_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_usr($1)
|
||||||
|
corecmd_search_bin($1)
|
||||||
|
domtrans_pattern($1, debuginfo_exec_t, rpm_t)
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute rpm_script programs in the rpm_script domain.
|
## Execute rpm_script programs in the rpm_script domain.
|
||||||
|
|
|
@ -1,10 +1,13 @@
|
||||||
policy_module(rpm, 1.11.0)
|
policy_module(rpm, 1.11.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Declarations
|
# Declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
|
type debuginfo_exec_t;
|
||||||
|
domain_entry_file(rpm_t, debuginfo_exec_t)
|
||||||
|
|
||||||
type rpm_t;
|
type rpm_t;
|
||||||
type rpm_exec_t;
|
type rpm_exec_t;
|
||||||
init_system_domain(rpm_t, rpm_exec_t)
|
init_system_domain(rpm_t, rpm_exec_t)
|
||||||
|
@ -193,6 +196,7 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
dbus_system_domain(rpm_t, rpm_exec_t)
|
dbus_system_domain(rpm_t, rpm_exec_t)
|
||||||
|
dbus_system_domain(rpm_t, debuginfo_exec_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
hal_dbus_chat(rpm_t)
|
hal_dbus_chat(rpm_t)
|
||||||
|
@ -219,8 +223,8 @@ optional_policy(`
|
||||||
# rpm-script Local policy
|
# rpm-script Local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow rpm_script_t self:capability { chown dac_override dac_read_search fowner fsetid setgid setuid ipc_lock sys_chroot sys_nice mknod kill };
|
allow rpm_script_t self:capability { chown dac_override dac_read_search fowner fsetid setgid setuid ipc_lock sys_admin sys_chroot sys_ptrace sys_rawio sys_nice mknod kill net_admin };
|
||||||
allow rpm_script_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
|
allow rpm_script_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execheap };
|
||||||
allow rpm_script_t self:fd use;
|
allow rpm_script_t self:fd use;
|
||||||
allow rpm_script_t self:fifo_file rw_fifo_file_perms;
|
allow rpm_script_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow rpm_script_t self:unix_dgram_socket create_socket_perms;
|
allow rpm_script_t self:unix_dgram_socket create_socket_perms;
|
||||||
|
@ -231,6 +235,7 @@ allow rpm_script_t self:shm create_shm_perms;
|
||||||
allow rpm_script_t self:sem create_sem_perms;
|
allow rpm_script_t self:sem create_sem_perms;
|
||||||
allow rpm_script_t self:msgq create_msgq_perms;
|
allow rpm_script_t self:msgq create_msgq_perms;
|
||||||
allow rpm_script_t self:msg { send receive };
|
allow rpm_script_t self:msg { send receive };
|
||||||
|
allow rpm_script_t self:netlink_kobject_uevent_socket create_socket_perms;
|
||||||
|
|
||||||
allow rpm_script_t rpm_tmp_t:file read_file_perms;
|
allow rpm_script_t rpm_tmp_t:file read_file_perms;
|
||||||
|
|
||||||
|
@ -293,6 +298,7 @@ auth_dontaudit_getattr_shadow(rpm_script_t)
|
||||||
auth_use_nsswitch(rpm_script_t)
|
auth_use_nsswitch(rpm_script_t)
|
||||||
# ideally we would not need this
|
# ideally we would not need this
|
||||||
auth_manage_all_files_except_shadow(rpm_script_t)
|
auth_manage_all_files_except_shadow(rpm_script_t)
|
||||||
|
auth_relabel_shadow(rpm_script_t)
|
||||||
|
|
||||||
corecmd_exec_all_executables(rpm_script_t)
|
corecmd_exec_all_executables(rpm_script_t)
|
||||||
|
|
||||||
|
@ -306,6 +312,7 @@ domain_signull_all_domains(rpm_script_t)
|
||||||
files_exec_etc_files(rpm_script_t)
|
files_exec_etc_files(rpm_script_t)
|
||||||
files_read_etc_runtime_files(rpm_script_t)
|
files_read_etc_runtime_files(rpm_script_t)
|
||||||
files_exec_usr_files(rpm_script_t)
|
files_exec_usr_files(rpm_script_t)
|
||||||
|
files_relabel_all_files(rpm_script_t)
|
||||||
|
|
||||||
init_domtrans_script(rpm_script_t)
|
init_domtrans_script(rpm_script_t)
|
||||||
init_telinit(rpm_script_t)
|
init_telinit(rpm_script_t)
|
||||||
|
@ -341,6 +348,10 @@ optional_policy(`
|
||||||
bootloader_domtrans(rpm_script_t)
|
bootloader_domtrans(rpm_script_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
dbus_system_bus_client(rpm_script_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
lvm_domtrans(rpm_script_t)
|
lvm_domtrans(rpm_script_t)
|
||||||
')
|
')
|
||||||
|
|
Loading…
Reference in New Issue