2018-07-10 15:03:14

by Jason Zaman

[permalink] [raw]
Subject: [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets

---
policy/modules/kernel/selinux.if | 1 +
1 file changed, 1 insertion(+)

diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
index 8123b25f..6790e5d0 100644
--- a/policy/modules/kernel/selinux.if
+++ b/policy/modules/kernel/selinux.if
@@ -534,6 +534,7 @@ interface(`selinux_compute_access_vector',`
')

dev_search_sysfs($1)
+ allow $1 self:netlink_selinux_socket create_socket_perms;
allow $1 security_t:dir list_dir_perms;
allow $1 security_t:file rw_file_perms;
allow $1 security_t:security compute_av;
--
2.16.4


2018-07-10 15:03:15

by Jason Zaman

[permalink] [raw]
Subject: [refpolicy] [PATCH 2/5] mozilla: xdg updates

---
policy/modules/apps/mozilla.te | 3 +++
1 file changed, 3 insertions(+)

diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
index 2e119896..b9222354 100644
--- a/policy/modules/apps/mozilla.te
+++ b/policy/modules/apps/mozilla.te
@@ -206,6 +206,7 @@ userdom_use_user_ptys(mozilla_t)

userdom_manage_user_tmp_dirs(mozilla_t)
userdom_manage_user_tmp_files(mozilla_t)
+userdom_map_user_tmp_files(mozilla_t)

userdom_user_content_access_template(mozilla, { mozilla_t mozilla_plugin_t })
userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
@@ -219,6 +220,7 @@ xdg_read_config_files(mozilla_t)
xdg_read_data_files(mozilla_t)
xdg_manage_downloads(mozilla_t)

+xserver_rw_mesa_shader_cache(mozilla_t)
xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
xserver_dontaudit_getattr_xdm_tmp_sockets(mozilla_t)
@@ -519,6 +521,7 @@ miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)

userdom_manage_user_tmp_dirs(mozilla_plugin_t)
userdom_manage_user_tmp_files(mozilla_plugin_t)
+userdom_map_user_tmp_files(mozilla_plugin_t)

userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })

--
2.16.4

2018-07-10 15:03:16

by Jason Zaman

[permalink] [raw]
Subject: [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t

---
policy/modules/services/xserver.fc | 1 +
policy/modules/services/xserver.if | 1 +
policy/modules/services/xserver.te | 2 +-
3 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
index 3a193743..fa8db862 100644
--- a/policy/modules/services/xserver.fc
+++ b/policy/modules/services/xserver.fc
@@ -2,6 +2,7 @@
# HOME_DIR
#
HOME_DIR/\.cache/mesa_shader_cache(/.*)? gen_context(system_u:object_r:mesa_shader_cache_t,s0)
+HOME_DIR/\.cache/fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0)
HOME_DIR/\.dmrc -- gen_context(system_u:object_r:dmrc_home_t,s0)
HOME_DIR/\.fonts\.conf -- gen_context(system_u:object_r:user_fonts_config_t,s0)
HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0)
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index d4c883c7..c1dbf0bf 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -516,6 +516,7 @@ interface(`xserver_use_user_fonts',`
allow $1 user_fonts_config_t:file read_file_perms;

userdom_search_user_home_dirs($1)
+ xdg_search_cache_dirs($1)
')

########################################
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 96db8335..3b39bdd9 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -125,7 +125,7 @@ userdom_user_home_content(user_fonts_t)
type user_fonts_cache_t;
typealias user_fonts_cache_t alias { staff_fonts_cache_t sysadm_fonts_cache_t };
typealias user_fonts_cache_t alias { auditadm_fonts_cache_t secadm_fonts_cache_t };
-userdom_user_home_content(user_fonts_cache_t)
+xdg_cache_content(user_fonts_cache_t)

type user_fonts_config_t;
typealias user_fonts_config_t alias { staff_fonts_config_t sysadm_fonts_config_t };
--
2.16.4

2018-07-10 15:03:17

by Jason Zaman

[permalink] [raw]
Subject: [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver

---
policy/modules/kernel/devices.if | 18 ++++++++++++++++++
policy/modules/services/xserver.if | 1 +
policy/modules/services/xserver.te | 1 +
policy/modules/system/init.te | 1 +
4 files changed, 21 insertions(+)

diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
index be1a1d4b..6bbea59e 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -5079,6 +5079,24 @@ interface(`dev_rw_xserver_misc',`
rw_chr_files_pattern($1, device_t, xserver_misc_device_t)
')

+########################################
+## <summary>
+## Map X server miscellaneous devices.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`dev_map_xserver_misc',`
+ gen_require(`
+ type xserver_misc_device_t;
+ ')
+
+ allow $1 xserver_misc_device_t:chr_file map;
+')
+
########################################
## <summary>
## Read and write to the zero device (/dev/zero).
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index c1dbf0bf..1b25ff5c 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -82,6 +82,7 @@ interface(`xserver_restricted_role',`
allow $2 xserver_tmp_t:file { getattr read };

dev_rw_xserver_misc($2)
+ dev_map_xserver_misc($2)
dev_rw_power_management($2)
dev_read_input($2)
dev_read_misc($2)
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 3b39bdd9..83e00c01 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -749,6 +749,7 @@ dev_read_raw_memory(xserver_t)
dev_wx_raw_memory(xserver_t)
# for other device nodes such as the NVidia binary-only driver
dev_rw_xserver_misc(xserver_t)
+dev_map_xserver_misc(xserver_t)
# read events - the synaptics touchpad driver reads raw events
dev_rw_input_dev(xserver_t)
dev_rwx_zero(xserver_t)
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index a72b31d0..f9320285 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -635,6 +635,7 @@ dev_delete_generic_symlinks(initrc_t)
dev_getattr_all_blk_files(initrc_t)
dev_getattr_all_chr_files(initrc_t)
dev_rw_xserver_misc(initrc_t)
+dev_map_xserver_misc(initrc_t)

domain_kill_all_domains(initrc_t)
domain_signal_all_domains(initrc_t)
--
2.16.4

2018-07-10 15:03:18

by Jason Zaman

[permalink] [raw]
Subject: [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0

The binary changed from /sbin/xtables-multi to xtables-legacy-multi and
xtables-nft-multi
---
policy/modules/system/iptables.fc | 4 ++++
1 file changed, 4 insertions(+)

diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc
index 32877b26..ba65e811 100644
--- a/policy/modules/system/iptables.fc
+++ b/policy/modules/system/iptables.fc
@@ -20,7 +20,9 @@
/usr/bin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0)
/usr/bin/nft -- gen_context(system_u:object_r:iptables_exec_t,s0)
/usr/bin/xtables-compat-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/bin/xtables-legacy-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
/usr/bin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/bin/xtables-nft-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)

/usr/lib/systemd/system/[^/]*arptables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
/usr/lib/systemd/system/[^/]*ebtables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
@@ -40,4 +42,6 @@
/usr/sbin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0)
/usr/sbin/nft -- gen_context(system_u:object_r:iptables_exec_t,s0)
/usr/sbin/xtables-compat-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/sbin/xtables-legacy-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
/usr/sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/sbin/xtables-nft-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
--
2.16.4

2018-07-11 00:08:14

by Chris PeBenito

[permalink] [raw]
Subject: [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
> policy/modules/kernel/selinux.if | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
> index 8123b25f..6790e5d0 100644
> --- a/policy/modules/kernel/selinux.if
> +++ b/policy/modules/kernel/selinux.if
> @@ -534,6 +534,7 @@ interface(`selinux_compute_access_vector',`
> ')
>
> dev_search_sysfs($1)
> + allow $1 self:netlink_selinux_socket create_socket_perms;
> allow $1 security_t:dir list_dir_perms;
> allow $1 security_t:file rw_file_perms;
> allow $1 security_t:security compute_av;

Merged.

--
Chris PeBenito

2018-07-11 00:08:25

by Chris PeBenito

[permalink] [raw]
Subject: [refpolicy] [PATCH 2/5] mozilla: xdg updates

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
> policy/modules/apps/mozilla.te | 3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
> index 2e119896..b9222354 100644
> --- a/policy/modules/apps/mozilla.te
> +++ b/policy/modules/apps/mozilla.te
> @@ -206,6 +206,7 @@ userdom_use_user_ptys(mozilla_t)
>
> userdom_manage_user_tmp_dirs(mozilla_t)
> userdom_manage_user_tmp_files(mozilla_t)
> +userdom_map_user_tmp_files(mozilla_t)
>
> userdom_user_content_access_template(mozilla, { mozilla_t mozilla_plugin_t })
> userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
> @@ -219,6 +220,7 @@ xdg_read_config_files(mozilla_t)
> xdg_read_data_files(mozilla_t)
> xdg_manage_downloads(mozilla_t)
>
> +xserver_rw_mesa_shader_cache(mozilla_t)
> xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
> xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
> xserver_dontaudit_getattr_xdm_tmp_sockets(mozilla_t)
> @@ -519,6 +521,7 @@ miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)
>
> userdom_manage_user_tmp_dirs(mozilla_plugin_t)
> userdom_manage_user_tmp_files(mozilla_plugin_t)
> +userdom_map_user_tmp_files(mozilla_plugin_t)
>
> userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })

Merged.

--
Chris PeBenito

2018-07-11 00:08:43

by Chris PeBenito

[permalink] [raw]
Subject: [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
> policy/modules/services/xserver.fc | 1 +
> policy/modules/services/xserver.if | 1 +
> policy/modules/services/xserver.te | 2 +-
> 3 files changed, 3 insertions(+), 1 deletion(-)
>
> diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
> index 3a193743..fa8db862 100644
> --- a/policy/modules/services/xserver.fc
> +++ b/policy/modules/services/xserver.fc
> @@ -2,6 +2,7 @@
> # HOME_DIR
> #
> HOME_DIR/\.cache/mesa_shader_cache(/.*)? gen_context(system_u:object_r:mesa_shader_cache_t,s0)
> +HOME_DIR/\.cache/fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0)
> HOME_DIR/\.dmrc -- gen_context(system_u:object_r:dmrc_home_t,s0)
> HOME_DIR/\.fonts\.conf -- gen_context(system_u:object_r:user_fonts_config_t,s0)
> HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0)
> diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
> index d4c883c7..c1dbf0bf 100644
> --- a/policy/modules/services/xserver.if
> +++ b/policy/modules/services/xserver.if
> @@ -516,6 +516,7 @@ interface(`xserver_use_user_fonts',`
> allow $1 user_fonts_config_t:file read_file_perms;
>
> userdom_search_user_home_dirs($1)
> + xdg_search_cache_dirs($1)
> ')
>
> ########################################
> diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
> index 96db8335..3b39bdd9 100644
> --- a/policy/modules/services/xserver.te
> +++ b/policy/modules/services/xserver.te
> @@ -125,7 +125,7 @@ userdom_user_home_content(user_fonts_t)
> type user_fonts_cache_t;
> typealias user_fonts_cache_t alias { staff_fonts_cache_t sysadm_fonts_cache_t };
> typealias user_fonts_cache_t alias { auditadm_fonts_cache_t secadm_fonts_cache_t };
> -userdom_user_home_content(user_fonts_cache_t)
> +xdg_cache_content(user_fonts_cache_t)
>
> type user_fonts_config_t;
> typealias user_fonts_config_t alias { staff_fonts_config_t sysadm_fonts_config_t };

Merged.

--
Chris PeBenito

2018-07-11 00:08:50

by Chris PeBenito

[permalink] [raw]
Subject: [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
> policy/modules/kernel/devices.if | 18 ++++++++++++++++++
> policy/modules/services/xserver.if | 1 +
> policy/modules/services/xserver.te | 1 +
> policy/modules/system/init.te | 1 +
> 4 files changed, 21 insertions(+)
>
> diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
> index be1a1d4b..6bbea59e 100644
> --- a/policy/modules/kernel/devices.if
> +++ b/policy/modules/kernel/devices.if
> @@ -5079,6 +5079,24 @@ interface(`dev_rw_xserver_misc',`
> rw_chr_files_pattern($1, device_t, xserver_misc_device_t)
> ')
>
> +########################################
> +## <summary>
> +## Map X server miscellaneous devices.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +#
> +interface(`dev_map_xserver_misc',`
> + gen_require(`
> + type xserver_misc_device_t;
> + ')
> +
> + allow $1 xserver_misc_device_t:chr_file map;
> +')
> +
> ########################################
> ## <summary>
> ## Read and write to the zero device (/dev/zero).
> diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
> index c1dbf0bf..1b25ff5c 100644
> --- a/policy/modules/services/xserver.if
> +++ b/policy/modules/services/xserver.if
> @@ -82,6 +82,7 @@ interface(`xserver_restricted_role',`
> allow $2 xserver_tmp_t:file { getattr read };
>
> dev_rw_xserver_misc($2)
> + dev_map_xserver_misc($2)
> dev_rw_power_management($2)
> dev_read_input($2)
> dev_read_misc($2)
> diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
> index 3b39bdd9..83e00c01 100644
> --- a/policy/modules/services/xserver.te
> +++ b/policy/modules/services/xserver.te
> @@ -749,6 +749,7 @@ dev_read_raw_memory(xserver_t)
> dev_wx_raw_memory(xserver_t)
> # for other device nodes such as the NVidia binary-only driver
> dev_rw_xserver_misc(xserver_t)
> +dev_map_xserver_misc(xserver_t)
> # read events - the synaptics touchpad driver reads raw events
> dev_rw_input_dev(xserver_t)
> dev_rwx_zero(xserver_t)
> diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
> index a72b31d0..f9320285 100644
> --- a/policy/modules/system/init.te
> +++ b/policy/modules/system/init.te
> @@ -635,6 +635,7 @@ dev_delete_generic_symlinks(initrc_t)
> dev_getattr_all_blk_files(initrc_t)
> dev_getattr_all_chr_files(initrc_t)
> dev_rw_xserver_misc(initrc_t)
> +dev_map_xserver_misc(initrc_t)
>
> domain_kill_all_domains(initrc_t)
> domain_signal_all_domains(initrc_t)

Merged.

--
Chris PeBenito

2018-07-11 00:08:56

by Chris PeBenito

[permalink] [raw]
Subject: [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> The binary changed from /sbin/xtables-multi to xtables-legacy-multi and
> xtables-nft-multi
> ---
> policy/modules/system/iptables.fc | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc
> index 32877b26..ba65e811 100644
> --- a/policy/modules/system/iptables.fc
> +++ b/policy/modules/system/iptables.fc
> @@ -20,7 +20,9 @@
> /usr/bin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0)
> /usr/bin/nft -- gen_context(system_u:object_r:iptables_exec_t,s0)
> /usr/bin/xtables-compat-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/bin/xtables-legacy-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
> /usr/bin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/bin/xtables-nft-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
>
> /usr/lib/systemd/system/[^/]*arptables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
> /usr/lib/systemd/system/[^/]*ebtables.* -- gen_context(system_u:object_r:iptables_unit_t,s0)
> @@ -40,4 +42,6 @@
> /usr/sbin/ipvsadm-save -- gen_context(system_u:object_r:iptables_exec_t,s0)
> /usr/sbin/nft -- gen_context(system_u:object_r:iptables_exec_t,s0)
> /usr/sbin/xtables-compat-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/sbin/xtables-legacy-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
> /usr/sbin/xtables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/sbin/xtables-nft-multi -- gen_context(system_u:object_r:iptables_exec_t,s0)

Merged.

--
Chris PeBenito