add avc for openEuler
This commit is contained in:
parent
899b6a7957
commit
8ad71f4dc6
31
add-allow-shadow-tool-to-access-sssd-var-lib-file-di.patch
Normal file
31
add-allow-shadow-tool-to-access-sssd-var-lib-file-di.patch
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
From edba62fdaa8115c0c194ad6d86981e8c9692b8e7 Mon Sep 17 00:00:00 2001
|
||||||
|
From: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
Date: Thu, 4 Jun 2020 21:11:52 +0800
|
||||||
|
Subject: [PATCH] add allow shadow tool to access sssd var lib file/dir
|
||||||
|
|
||||||
|
Signed-off-by: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
---
|
||||||
|
policy/modules/admin/usermanage.te | 5 +++++
|
||||||
|
1 file changed, 5 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/policy/modules/admin/usermanage.te b/policy/modules/admin/usermanage.te
|
||||||
|
index 1977309..b8d51ba 100644
|
||||||
|
--- a/policy/modules/admin/usermanage.te
|
||||||
|
+++ b/policy/modules/admin/usermanage.te
|
||||||
|
@@ -666,8 +666,13 @@ optional_policy(`
|
||||||
|
# avc for openEuler
|
||||||
|
#sssd_var_lib_dir(groupadd_t)
|
||||||
|
optional_policy(`
|
||||||
|
+ sssd_var_lib_dir(groupadd_t)
|
||||||
|
sssd_var_lib_map_file(groupadd_t)
|
||||||
|
sssd_var_lib_write_file(groupadd_t)
|
||||||
|
+ sssd_var_lib_map_file(passwd_t)
|
||||||
|
+ sssd_var_lib_write_file(passwd_t)
|
||||||
|
sssd_var_lib_map_file(useradd_t)
|
||||||
|
sssd_var_lib_write_file(useradd_t)
|
||||||
|
+ sssd_var_lib_create_file(useradd_t)
|
||||||
|
+ sssd_var_lib_dir(useradd_t)
|
||||||
|
')
|
||||||
|
--
|
||||||
|
1.8.3.1
|
||||||
|
|
||||||
25
add-map-to-zerp-device-at-dev_rw_zero-interface.patch
Normal file
25
add-map-to-zerp-device-at-dev_rw_zero-interface.patch
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
From 9c9bbde91da9f0a90ae7e70d71638ec9c2d207da Mon Sep 17 00:00:00 2001
|
||||||
|
From: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
Date: Thu, 4 Jun 2020 20:25:12 +0800
|
||||||
|
Subject: [PATCH] add map to zerp device at dev_rw_zero interface
|
||||||
|
|
||||||
|
Signed-off-by: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
---
|
||||||
|
policy/modules/kernel/devices.if | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
|
||||||
|
index c3659c7..65c21e1 100644
|
||||||
|
--- a/policy/modules/kernel/devices.if
|
||||||
|
+++ b/policy/modules/kernel/devices.if
|
||||||
|
@@ -6094,6 +6094,7 @@ interface(`dev_rw_zero',`
|
||||||
|
')
|
||||||
|
|
||||||
|
rw_chr_files_pattern($1, device_t, zero_device_t)
|
||||||
|
+ allow $1 zero_device_t:chr_file map;
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
--
|
||||||
|
1.8.3.1
|
||||||
|
|
||||||
26
allow-ipmievd-to-read-the-process-state-proc-pid-of-.patch
Normal file
26
allow-ipmievd-to-read-the-process-state-proc-pid-of-.patch
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
From d366d95268da066ab3e1655593010856ecead2d6 Mon Sep 17 00:00:00 2001
|
||||||
|
From: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
Date: Thu, 4 Jun 2020 20:22:30 +0800
|
||||||
|
Subject: [PATCH] allow ipmievd to read the process state (/proc/pid) of init
|
||||||
|
|
||||||
|
Signed-off-by: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
---
|
||||||
|
policy/modules/contrib/ipmievd.te | 2 ++
|
||||||
|
1 file changed, 2 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/policy/modules/contrib/ipmievd.te b/policy/modules/contrib/ipmievd.te
|
||||||
|
index d36f842..2c727c3 100644
|
||||||
|
--- a/policy/modules/contrib/ipmievd.te
|
||||||
|
+++ b/policy/modules/contrib/ipmievd.te
|
||||||
|
@@ -46,6 +46,8 @@ dev_read_sysfs(ipmievd_t)
|
||||||
|
files_read_kernel_modules(ipmievd_t)
|
||||||
|
files_map_kernel_modules(ipmievd_t)
|
||||||
|
|
||||||
|
+init_read_state(ipmievd_t)
|
||||||
|
+
|
||||||
|
logging_send_syslog_msg(ipmievd_t)
|
||||||
|
|
||||||
|
miscfiles_read_certs(ipmievd_t)
|
||||||
|
--
|
||||||
|
1.8.3.1
|
||||||
|
|
||||||
25
allow-systemd-to-mount-unlabeled-filesystemd.patch
Normal file
25
allow-systemd-to-mount-unlabeled-filesystemd.patch
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
From 79198658c50f0747b4ea8636db7e349bbd6f3571 Mon Sep 17 00:00:00 2001
|
||||||
|
From: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
Date: Thu, 4 Jun 2020 20:27:15 +0800
|
||||||
|
Subject: [PATCH] allow systemd to mount unlabeled filesystemd
|
||||||
|
|
||||||
|
Signed-off-by: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
---
|
||||||
|
policy/modules/system/init.te | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
|
||||||
|
index 8de5b08..e3e8b37 100644
|
||||||
|
--- a/policy/modules/system/init.te
|
||||||
|
+++ b/policy/modules/system/init.te
|
||||||
|
@@ -282,6 +282,7 @@ files_dontaudit_mounton_modules_object(init_t)
|
||||||
|
files_manage_mnt_dirs(init_t)
|
||||||
|
files_manage_mnt_files(init_t)
|
||||||
|
files_mounton_etc(init_t)
|
||||||
|
+files_mounton_isid(init_t)
|
||||||
|
|
||||||
|
fs_list_inotifyfs(init_t)
|
||||||
|
# cjp: this may be related to /dev/log
|
||||||
|
--
|
||||||
|
1.8.3.1
|
||||||
|
|
||||||
25
fix-selinux-label-for-hostname-digest-list.patch
Normal file
25
fix-selinux-label-for-hostname-digest-list.patch
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
From 7d436dc2f9498bc77d55cbd1da0be8233bdc190e Mon Sep 17 00:00:00 2001
|
||||||
|
From: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
Date: Thu, 4 Jun 2020 20:31:18 +0800
|
||||||
|
Subject: [PATCH] fix selinux label for hostname digest list
|
||||||
|
|
||||||
|
Signed-off-by: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
---
|
||||||
|
policy/modules/system/systemd.fc | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/policy/modules/system/systemd.fc b/policy/modules/system/systemd.fc
|
||||||
|
index cfafbfa..bb5e759 100644
|
||||||
|
--- a/policy/modules/system/systemd.fc
|
||||||
|
+++ b/policy/modules/system/systemd.fc
|
||||||
|
@@ -3,6 +3,7 @@ HOME_DIR/\.config/systemd/user(/.*)? gen_context(system_u:object_r:systemd_unit
|
||||||
|
/root/\.local/share/systemd(/.*)? gen_context(system_u:object_r:systemd_home_t,s0)
|
||||||
|
|
||||||
|
/etc/.*hostname.* -- gen_context(system_u:object_r:hostname_etc_t,s0)
|
||||||
|
+/etc/[^/]*hostname.* -- gen_context(system_u:object_r:hostname_etc_t,s0)
|
||||||
|
/etc/machine-info -- gen_context(system_u:object_r:hostname_etc_t,s0)
|
||||||
|
/etc/udev/.*hwdb.* -- gen_context(system_u:object_r:systemd_hwdb_etc_t,s0)
|
||||||
|
|
||||||
|
--
|
||||||
|
1.8.3.1
|
||||||
|
|
||||||
@ -12,7 +12,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.14.2
|
Version: 3.14.2
|
||||||
Release: 53
|
Release: 54
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
URL: https://github.com/fedora-selinux/selinux-policy/
|
URL: https://github.com/fedora-selinux/selinux-policy/
|
||||||
|
|
||||||
@ -67,7 +67,12 @@ Patch16: add-avc-for-systemd-journald.patch
|
|||||||
Patch17: add-avc-for-systemd-hostnamed-and-systemd-logind.patch
|
Patch17: add-avc-for-systemd-hostnamed-and-systemd-logind.patch
|
||||||
Patch18: add-allowed-avc-for-systemd-1.patch
|
Patch18: add-allowed-avc-for-systemd-1.patch
|
||||||
Patch19: add-allow-to-be-access-to-sssd-dir-and-file.patch
|
Patch19: add-allow-to-be-access-to-sssd-dir-and-file.patch
|
||||||
Patch20: add-allow-passwd-to-write-sssd-var-lib.patch
|
Patch20: add-allow-shadow-tool-to-access-sssd-var-lib-file-di.patch
|
||||||
|
Patch21: add-map-to-zerp-device-at-dev_rw_zero-interface.patch
|
||||||
|
Patch22: allow-ipmievd-to-read-the-process-state-proc-pid-of-.patch
|
||||||
|
Patch23: allow-systemd-to-mount-unlabeled-filesystemd.patch
|
||||||
|
Patch24: fix-selinux-label-for-hostname-digest-list.patch
|
||||||
|
Patch25: solve-shutdown-permission-denied-caused-by-dracut.patch
|
||||||
|
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
BuildRequires: python3 gawk checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils-devel >= %{POLICYCOREUTILSVER} bzip2 gcc
|
BuildRequires: python3 gawk checkpolicy >= %{CHECKPOLICYVER} m4 policycoreutils-devel >= %{POLICYCOREUTILSVER} bzip2 gcc
|
||||||
@ -664,6 +669,13 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Jun 4 2020 openEuler Buildteam <buildteam@openeuler.org> - 3.14.2-54
|
||||||
|
- add map to zerp device at dev_rw_zero interface;
|
||||||
|
allow ipmievd to read the process state (/proc/pid) of init;
|
||||||
|
allow systemd to mount unlabeled filesystemd;
|
||||||
|
fix selinux label for hostname digest list;
|
||||||
|
solve shutdown permission denied caused by dracut
|
||||||
|
|
||||||
* Sat May 30 2020 openEuler Buildteam <buildteam@openeuler.org> - 3.14.2-53
|
* Sat May 30 2020 openEuler Buildteam <buildteam@openeuler.org> - 3.14.2-53
|
||||||
- allow passwd to map and write sssd var lib
|
- allow passwd to map and write sssd var lib
|
||||||
|
|
||||||
|
|||||||
52
solve-shutdown-permission-denied-caused-by-dracut.patch
Normal file
52
solve-shutdown-permission-denied-caused-by-dracut.patch
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
From f14eec646bb7aaef59c4e5a9fa37be21e9797964 Mon Sep 17 00:00:00 2001
|
||||||
|
From: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
Date: Thu, 4 Jun 2020 20:41:46 +0800
|
||||||
|
Subject: [PATCH] solve shutdown permission denied caused by dracut
|
||||||
|
|
||||||
|
Signed-off-by: guoxiaoqi <guoxiaoqi2@huawei.com>
|
||||||
|
---
|
||||||
|
policy/modules/system/init.te | 2 ++
|
||||||
|
policy/modules/system/lvm.te | 1 +
|
||||||
|
policy/modules/system/mount.te | 1 +
|
||||||
|
3 files changed, 4 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
|
||||||
|
index e3e8b37..73cccdc 100644
|
||||||
|
--- a/policy/modules/system/init.te
|
||||||
|
+++ b/policy/modules/system/init.te
|
||||||
|
@@ -215,6 +215,8 @@ dev_filetrans(init_t, initctl_t, fifo_file)
|
||||||
|
# Modify utmp.
|
||||||
|
allow init_t initrc_var_run_t:file { rw_file_perms setattr };
|
||||||
|
|
||||||
|
+allow init_t root_t:dir create;
|
||||||
|
+
|
||||||
|
kernel_read_system_state(init_t)
|
||||||
|
kernel_share_state(init_t)
|
||||||
|
kernel_stream_connect(init_t)
|
||||||
|
diff --git a/policy/modules/system/lvm.te b/policy/modules/system/lvm.te
|
||||||
|
index 99babc9..77fb8f7 100644
|
||||||
|
--- a/policy/modules/system/lvm.te
|
||||||
|
+++ b/policy/modules/system/lvm.te
|
||||||
|
@@ -323,6 +323,7 @@ init_use_fds(lvm_t)
|
||||||
|
init_dontaudit_getattr_initctl(lvm_t)
|
||||||
|
init_use_script_ptys(lvm_t)
|
||||||
|
init_read_script_state(lvm_t)
|
||||||
|
+init_nnp_daemon_domain(lvm_t)
|
||||||
|
|
||||||
|
logging_send_syslog_msg(lvm_t)
|
||||||
|
logging_stream_connect_syslog(lvm_t)
|
||||||
|
diff --git a/policy/modules/system/mount.te b/policy/modules/system/mount.te
|
||||||
|
index 816066d..e884bf5 100644
|
||||||
|
--- a/policy/modules/system/mount.te
|
||||||
|
+++ b/policy/modules/system/mount.te
|
||||||
|
@@ -186,6 +186,7 @@ init_use_script_ptys(mount_t)
|
||||||
|
init_dontaudit_getattr_initctl(mount_t)
|
||||||
|
init_stream_connect_script(mount_t)
|
||||||
|
init_rw_script_stream_sockets(mount_t)
|
||||||
|
+init_nnp_daemon_domain(mount_t)
|
||||||
|
|
||||||
|
logging_send_syslog_msg(mount_t)
|
||||||
|
|
||||||
|
--
|
||||||
|
1.8.3.1
|
||||||
|
|
||||||
Loading…
x
Reference in New Issue
Block a user