Commit Graph

1532 Commits

Author SHA1 Message Date
Chris PeBenito
ffc0b4f058 Whitespace fixes in raid.if. 2011-05-02 12:55:45 -04:00
Sven Vermeulen
681831da06 system admin needs to use mdadm, but type is not allowed
After a quick discussion with dominique, new attempt due to two issues:

1. No need (or even forbidden) to have "role $1 types foo_exec_t"
2. Suggestion to use the raid_run_mdadm name instead of raid_mdadm_role. The
   idea here is to use raid_mdadm_role for prefixed domains (cfr. screen)
   whereas raid_run_mdadm is to transition and run into a specific domain

Without wanting to (re?)start any discussion on prefixed versus non-prefixed
domains, such a naming convention could help us to keep the reference policy
cleaner (and naming conventions easy).

Also, refpolicy InterfaceNaming document only talks about run, not role.

So, without much further ado... ;-)

  The system administrator (sysadm_r role) needs to use mdadm, but is not
  allowed to use the mdadm_t type.

  Rather than extend raid_domtrans_mdadm to allow this as well, use a
  raid_mdadm_role (a bit more conform other role usages).

  The other users of raid_domtrans_mdadm are all domains that run in system_r
  role, which does have this type allowed (as per the system/raid.te
  definition), so it wouldn't hurt to use raid_domtrans_mdadm for this.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-05-02 12:54:03 -04:00
Chris PeBenito
2983a08467 Module version bump and changelog for Portage updates from Sven Vermeulen. 2011-05-02 12:46:28 -04:00
Sven Vermeulen
f13b563891 setfscreate privilege is needed to be able to install java-config package
During the installation of for instance java-config, Portage wants to set
its default file creation context to root:object_r:portage_tmp_t which isn't
allowed:

creating /var/tmp/portage/dev-java/java-config-2.1.11-r3/temp/images/3.1/etc/revdep-rebuild
copying src/revdep-rebuild/60-java -> /var/tmp/portage/dev-java/java-config-2.1.11-r3/temp/images/3.1/etc/revdep-rebuild/
running install_egg_info
Writing /var/tmp/portage/dev-java/java-config-2.1.11-r3/temp/images/3.1/usr/lib64/python3.1/site-packages/java_config-2.1.11-py3.1.egg-info
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
...
ERROR: dev-java/java-config-2.1.11-r3 failed:
   Merging of intermediate installation image for Python ABI '2.6 into installation image failed

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-05-02 11:41:17 -04:00
Sven Vermeulen
fd9ec1f728 Allow portage_sandbox_t ptrace capabilities
During installation of system packages like python, ustr, ... the
portage_sandbox_t domain requires ptrace capabilities.

If not allowed, the following error is returned:

/sbin/ldconfig -n /var/tmp/portage/dev-libs/ustr-1.0.4-r1/image//usr/lib64
ISE:_do_ptrace ^[[0mptrace(PTRACE_TRACEME, ..., 0x0000000000000000, 0x0000000000000000): Permission denied
/usr/lib/libsandbox.so(+0x3812)[0x7535af0ca812]
/usr/lib/libsandbox.so(+0x38a3)[0x7535af0ca8a3]
/usr/lib/libsandbox.so(+0x5595)[0x7535af0cc595]
/usr/lib/libsandbox.so(+0x5a87)[0x7535af0cca87]
/usr/lib/libsandbox.so(+0x68de)[0x7535af0cd8de]
/usr/lib/libsandbox.so(execvp+0x6c)[0x7535af0ceb3c]
make(+0x1159e)[0x337b918159e]
make(+0x11eec)[0x337b9181eec]
make(+0x12b34)[0x337b9182b34]
make(+0x1e759)[0x337b918e759]
/proc/5977/cmdline: make -j4 install
DESTDIR=/var/tmp/portage/dev-libs/ustr-1.0.4-r1/image/ HIDE=
libdir=/usr/lib64 mandir=/usr/share/man SHRDIR=/usr/share/doc/ustr-1.0.4-r1
DOCSHRDIR=/usr/share/doc/ustr-1.0.4-r1

This seems to be during a standard "make install" of the package but part of
Portage' sandbox usage (above error for ustr, but packages like python exhibit
the same problem.)

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-05-02 11:31:46 -04:00
Sven Vermeulen
4061b06a4a Allow portage to set file capabilities, needed for installations like for wireshark
The installation of the wireshark package (and perhaps others) requires
portage setting file capabilities (through the setcap binary).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-05-02 11:30:36 -04:00
Chris PeBenito
9ec9808df5 Pull in cgroup changes from Fedora policy, in particular to handle systemd usage. 2011-04-29 13:22:47 -04:00
Chris PeBenito
3979c6886f Fix init_system_domain() description, pointed out by Elia Pinto. 2011-04-27 10:42:47 -04:00
Chris PeBenito
cca4b7e619 Fix ring buffer rules capability2 usage. 2011-04-18 13:06:31 -04:00
Chris PeBenito
6835095671 Changelog and module version bump for postgresql selabel_lookup update from KaiGai Kohei. 2011-04-15 10:25:10 -04:00
Kohei Kaigai
90bbc401dc allow postgresql_t to read selabel files
The attached patch allows postgresql_t domain to read selabel definition files
(such as /etc/selinux/targeted/contexts/sepgsql_contexts).

The upcoming version (v9.1) uses selabel_lookup(3) to assign initial security context
of database objects, we need to allow this reference.

Thanks,
--
NEC Europe Ltd, SAP Global Competence Center
KaiGai Kohei <kohei.kaigai@eu.nec.com>
2011-04-15 10:16:30 -04:00
Chris PeBenito
127d617b31 Pull in some changes from Fedora policy system layer. 2011-04-14 11:36:56 -04:00
Chris PeBenito
5e8cdeab27 Rearrange and whitespace fix filesystem.fc. 2011-04-14 10:17:18 -04:00
Chris PeBenito
e541d13ae5 Pull in additional kernel layer Fedora policy changes. 2011-04-14 10:05:56 -04:00
Chris PeBenito
2b5cb1ff64 Dovecot managesieve support from Mika Pfluger.
For using the dovecot managesieve daemon on the standard (RFC 5804) port,
dovecot needs corenet_tcp_bind_sieve_port.
2011-04-04 14:37:29 -04:00
Elia Pinto
52ddc47029 trunk: remove unnecessary semicolons after interface/template calls everywhere
Signed-off-by: Elia Pinto <gitter.spiros@gmail.com>
2011-04-04 13:32:02 -04:00
Chris PeBenito
1bc5de22c0 Start pulling in pieces of Fedora policy in system layer. 2011-03-31 13:29:59 -04:00
Chris PeBenito
ed17ee5394 Pull in additional changes in kernel layer from Fedora. 2011-03-31 09:49:01 -04:00
Chris PeBenito
22633ec985 Whitespace fix in filesystem. 2011-03-31 08:55:05 -04:00
Chris PeBenito
f940ca9db6 Remove eventpollfs_t.
Eventpollfs was changed to task SID in 2006.  Remove the dead type.
2011-03-31 08:52:07 -04:00
Chris PeBenito
515889b13c Pull in mcs constraint changes from Fedora. 2011-03-31 08:28:01 -04:00
Chris PeBenito
0de0ea5c9e Start pulling in kernel layer pieces from Fedora. 2011-03-29 10:33:43 -04:00
Chris PeBenito
6f76afe44e Update access vectors. 2011-03-28 11:45:46 -04:00
Chris PeBenito
b4e7ad65ab Module version bump for mplayer updates from Sven Vermeulen. 2011-03-23 13:58:28 -04:00
Chris PeBenito
0ebe50d890 Move domain_use_interactive_fds() line in mplayer. 2011-03-23 11:56:22 -04:00
Sven Vermeulen
7cc1a0e4be Support mplayer as plugin for others
Allow mplayer to behave as a plugin for higher-level (interactive)
applications, such as browser plugins

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-23 11:55:39 -04:00
Sven Vermeulen
96a78a6f7e mplayer support for webcams
In order to work with webcams, mplayer domain needs write access to the
v4l_device_t (updates and reconfiguration of the video device)

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-23 11:55:19 -04:00
Chris PeBenito
7aa8ff324c Module version bump for postfix fc updates from Sven Vermeulen. 2011-03-23 08:56:14 -04:00
Chris PeBenito
6e85b846e1 Whitespace fix in postfix.fc. 2011-03-23 08:49:52 -04:00
Sven Vermeulen
7fbdfbc324 Update postfix file contexts to support amd64 setup
Updates on the file contexts, supporting AMD64 multilib environment

( Patch 10 has been revoked a-la-last-minute, needs further testing )

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-23 08:48:47 -04:00
Sven Vermeulen
4a8e6d054c postalias command should stay bin_t
postalias should stay bin_t, is manually executed (no role executes
postfix_master_exec_t as it is only to be launched through init scripts).

The postalias command is used to regenerate the aliases.db file from the
mail aliases and as such is a system administrative activity. However, by
default, no role has execute rights on any postfix_master_exec_t domains as
the domain is apparently meant only to be started from the run_init_t
domain.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-23 08:43:52 -04:00
Chris PeBenito
3e6982a423 Module version bump for sasl fc from Sven Vermeulen. 2011-03-22 09:08:19 -04:00
Sven Vermeulen
60924a0c09 Cyrus sasl /var/lib/sasl2 location support
Cyrus sasl by default looks in /var/lib/sasl2 for its PID file, socket
creation and lock files.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-22 09:07:45 -04:00
Chris PeBenito
88e6b506b6 Module version bump and changelog for courier from Sven Vermeulen. 2011-03-22 08:50:43 -04:00
Chris PeBenito
81c58afb5c Move Gentoo-specific couriertcpd fc line. 2011-03-22 08:47:47 -04:00
Sven Vermeulen
2aa70bc0c4 Fix file contexts, add Gentoo-specific (?) location
Update on the file contexts for courier-imap. Also fixes a few context
directives which didn't update the directory itself.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-22 08:45:22 -04:00
Sven Vermeulen
3db4e7fb5a Allow authdaemon to create unix_stream_sockets
The authdaemon needs the create_stream_socket_perms privs in order to be able to start up.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-22 08:39:36 -04:00
Chris PeBenito
1b35a7c3be Module version bump for alsactl location patch from Sven Vermeulen. 2011-03-22 08:33:47 -04:00
Chris PeBenito
649d2d077a Move /usr/sbin/alsactl fc line. 2011-03-22 08:32:06 -04:00
Sven Vermeulen
98f0504476 Support /usr/sbin/alsactl location too (fex. Gentoo, Slackware, Arch)
The alsactl binary is often installed in /usr/sbin instead of /sbin (not a
necessity to start up the system). Used in distributions such as Gentoo,
Slackware and Arch.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
2011-03-22 08:30:26 -04:00
Chris PeBenito
ec5d81e1ca Aisexec patch from Miroslav Grepl.
* openais needs ipc_owner and read/write user SysV sempaphores/shared memory
2011-03-21 11:23:26 -04:00
Chris PeBenito
6c4f41ced1 Whitespace fixes in userdomain. 2011-03-21 11:14:34 -04:00
Chris PeBenito
0037b6084b Amavis patch for connecting to nslcd from Miroslav Grepl.
* needs to talk to nslcd
* needs sigkill
* executes shell
2011-03-21 10:22:10 -04:00
Chris PeBenito
86460648a6 Sysnetwork patch from Miroslav Grepl.
* adds support for "ip xfrm" command which allows assign a context
2011-03-21 09:48:05 -04:00
Chris PeBenito
1ca577db8c Shorewall patch from Miroslav Grepl. 2011-03-21 09:42:12 -04:00
Chris PeBenito
d23f88c874 Module version bump for xauth patch from Guido Trentalancia. 2011-03-16 08:48:08 -04:00
Chris PeBenito
db9cae615c Rearrange lines for xauth change. 2011-03-16 08:47:40 -04:00
Guido Trentalancia
848bc57cff xauth label and module request
When starting the X server from the console (using the startx script
that is being shipped with package xinit from X.Org), a few more
permissions are needed from the reference policy.

The label is for a file created by the startx script (from X.Org) and
the module being requested is ipv6 (which can be disabled by other
means).
2011-03-16 08:41:35 -04:00
Chris PeBenito
79c8dfe162 Module version bump for audisp patch from Guido Trentalancia. 2011-03-16 08:37:04 -04:00
Guido Trentalancia
ff07d7d209 patch to allow the audit dispatcher to read the system state
This patch allows the audit dispatcher to read the system
state.
2011-03-16 08:35:53 -04:00