Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:next commit in: policy/modules/system/
Date: Sun, 10 Sep 2017 14:04:00
Message-Id: 1505049044.d9d2a067d727b222feb528d67103b4aec0e3c77a.perfinion@gentoo
1 commit: d9d2a067d727b222feb528d67103b4aec0e3c77a
2 Author: Jason Zaman <jason <AT> perfinion <DOT> com>
3 AuthorDate: Sun Sep 10 13:09:48 2017 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sun Sep 10 13:10:44 2017 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=d9d2a067
7
8 selinuxutil: allow semanage map perms
9
10 policy/modules/system/selinuxutil.te | 4 +++-
11 policy/modules/system/userdomain.if | 18 ++++++++++++++++++
12 2 files changed, 21 insertions(+), 1 deletion(-)
13
14 diff --git a/policy/modules/system/selinuxutil.te b/policy/modules/system/selinuxutil.te
15 index 0629d437..35ba57c2 100644
16 --- a/policy/modules/system/selinuxutil.te
17 +++ b/policy/modules/system/selinuxutil.te
18 @@ -489,7 +489,7 @@ allow semanage_t policy_src_t:dir search;
19 filetrans_pattern(semanage_t, selinux_config_t, semanage_store_t, dir, "modules")
20
21 allow semanage_t semanage_tmp_t:dir manage_dir_perms;
22 -allow semanage_t semanage_tmp_t:file { manage_file_perms mmap_file_perms };
23 +allow semanage_t semanage_tmp_t:file { manage_file_perms mmap_file_perms map };
24 files_tmp_filetrans(semanage_t, semanage_tmp_t, { file dir })
25
26 kernel_read_system_state(semanage_t)
27 @@ -540,7 +540,9 @@ seutil_manage_default_contexts(semanage_t)
28
29 # Handle pp files created in homedir and /tmp
30 userdom_read_user_home_content_files(semanage_t)
31 +userdom_mmap_user_home_content_files(semanage_t)
32 userdom_read_user_tmp_files(semanage_t)
33 +userdom_mmap_user_tmp_files(semanage_t)
34
35 ifdef(`distro_debian',`
36 files_read_var_lib_files(semanage_t)
37
38 diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
39 index 16789a3c..88fdb823 100644
40 --- a/policy/modules/system/userdomain.if
41 +++ b/policy/modules/system/userdomain.if
42 @@ -2565,6 +2565,24 @@ interface(`userdom_read_user_tmp_files',`
43
44 ########################################
45 ## <summary>
46 +## Mmap user temporary files.
47 +## </summary>
48 +## <param name="domain">
49 +## <summary>
50 +## Domain allowed access.
51 +## </summary>
52 +## </param>
53 +#
54 +interface(`userdom_mmap_user_tmp_files',`
55 + gen_require(`
56 + type user_tmp_t;
57 + ')
58 +
59 + allow $1 user_tmp_t:file map;
60 +')
61 +
62 +########################################
63 +## <summary>
64 ## Do not audit attempts to read users
65 ## temporary files.
66 ## </summary>