commit:     72a11e865ba2ee22f8648e776eb8c8f69a54f26e
Author:     Stephen Smalley <sds <AT> tycho <DOT> nsa <DOT> gov>
AuthorDate: Wed May 24 19:41:22 2017 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Thu May 25 16:31:51 2017 +0000
URL:        
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=72a11e86

contrib: allow map permission where needed

Allow map permission where needed, based on limited testing.
Introduced in the kernel in commit 6941857e82ae ("selinux: add a map
permission check for mmap").  Depends on "refpolicy: Define and
allow map permission" to define the permission.

Signed-off-by: Stephen Smalley <sds <AT> tycho.nsa.gov>

 policy/modules/contrib/abrt.te           | 2 ++
 policy/modules/contrib/gnome.if          | 2 +-
 policy/modules/contrib/networkmanager.if | 3 +++
 policy/modules/contrib/rpm.if            | 3 +++
 4 files changed, 9 insertions(+), 1 deletion(-)

diff --git a/policy/modules/contrib/abrt.te b/policy/modules/contrib/abrt.te
index 9fb4f3ff..6098ee58 100644
--- a/policy/modules/contrib/abrt.te
+++ b/policy/modules/contrib/abrt.te
@@ -397,6 +397,8 @@ domain_use_interactive_fds(abrt_dump_oops_t)
 fs_list_inotifyfs(abrt_dump_oops_t)
 
 logging_read_generic_logs(abrt_dump_oops_t)
+logging_mmap_generic_logs(abrt_dump_oops_t)
+logging_mmap_journal(abrt_dump_oops_t)
 
 #######################################
 #

diff --git a/policy/modules/contrib/gnome.if b/policy/modules/contrib/gnome.if
index 4fcc6905..edf4d4e6 100644
--- a/policy/modules/contrib/gnome.if
+++ b/policy/modules/contrib/gnome.if
@@ -332,7 +332,7 @@ interface(`gnome_read_generic_home_content',`
 
        userdom_search_user_home_dirs($1)
        allow $1 gnome_home_t:dir list_dir_perms;
-       allow $1 gnome_home_t:file read_file_perms;
+       allow $1 gnome_home_t:file { read_file_perms map };
        allow $1 gnome_home_t:fifo_file read_fifo_file_perms;
        allow $1 gnome_home_t:lnk_file read_lnk_file_perms;
        allow $1 gnome_home_t:sock_file read_sock_file_perms;

diff --git a/policy/modules/contrib/networkmanager.if 
b/policy/modules/contrib/networkmanager.if
index e57453fc..371ebfbd 100644
--- a/policy/modules/contrib/networkmanager.if
+++ b/policy/modules/contrib/networkmanager.if
@@ -209,6 +209,7 @@ interface(`networkmanager_manage_lib_files',`
 
        files_search_var_lib($1)
        manage_files_pattern($1, NetworkManager_var_lib_t, 
NetworkManager_var_lib_t)
+       allow $1 NetworkManager_var_lib_t:file map;
 ')
 
 ########################################
@@ -229,6 +230,7 @@ interface(`networkmanager_read_lib_files',`
        files_search_var_lib($1)
        list_dirs_pattern($1, NetworkManager_var_lib_t, 
NetworkManager_var_lib_t)
        read_files_pattern($1, NetworkManager_var_lib_t, 
NetworkManager_var_lib_t)
+       allow $1 NetworkManager_var_lib_t:file map;
 ')
 
 ########################################
@@ -328,6 +330,7 @@ interface(`networkmanager_admin',`
 
        files_search_var_lib($1)
        admin_pattern($1, NetworkManager_var_lib_t)
+       allow $1 NetworkManager_var_lib_t:file map;
 
        files_search_pids($1)
        admin_pattern($1, NetworkManager_var_run_t)

diff --git a/policy/modules/contrib/rpm.if b/policy/modules/contrib/rpm.if
index 2344edd5..304e97cb 100644
--- a/policy/modules/contrib/rpm.if
+++ b/policy/modules/contrib/rpm.if
@@ -459,6 +459,7 @@ interface(`rpm_read_db',`
        allow $1 rpm_var_lib_t:dir list_dir_perms;
        read_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
        read_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+       allow $1 rpm_var_lib_t:file map;
 ')
 
 ########################################
@@ -499,6 +500,7 @@ interface(`rpm_manage_db',`
        files_search_var_lib($1)
        manage_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
        manage_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+       allow $1 rpm_var_lib_t:file map;
 ')
 
 ########################################
@@ -520,6 +522,7 @@ interface(`rpm_dontaudit_manage_db',`
        dontaudit $1 rpm_var_lib_t:dir rw_dir_perms;
        dontaudit $1 rpm_var_lib_t:file manage_file_perms;
        dontaudit $1 rpm_var_lib_t:lnk_file manage_lnk_file_perms;
+       dontaudit $1 rpm_var_lib_t:file map;
 ')
 
 #####################################

Reply via email to