Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package selinux-policy for openSUSE:Factory checked in at 2022-07-18 18:32:44 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/selinux-policy (Old) and /work/SRC/openSUSE:Factory/.selinux-policy.new.1523 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "selinux-policy" Mon Jul 18 18:32:44 2022 rev:28 rq:989143 version:20220714 Changes: -------- --- /work/SRC/openSUSE:Factory/selinux-policy/selinux-policy.changes 2022-07-13 14:55:57.187021449 +0200 +++ /work/SRC/openSUSE:Factory/.selinux-policy.new.1523/selinux-policy.changes 2022-07-18 18:32:44.773655833 +0200 @@ -1,0 +2,7 @@ +Thu Jul 14 08:44:12 UTC 2022 - Johannes Segitz <jseg...@suse.com> + +- Update to version 20220714. Refreshed: + * fix_init.patch + * fix_systemd_watch.patch + +------------------------------------------------------------------- Old: ---- fedora-policy-20220624.tar.bz2 New: ---- fedora-policy-20220714.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ selinux-policy.spec ++++++ --- /var/tmp/diff_new_pack.sXEwo7/_old 2022-07-18 18:32:45.933657483 +0200 +++ /var/tmp/diff_new_pack.sXEwo7/_new 2022-07-18 18:32:45.937657489 +0200 @@ -33,7 +33,7 @@ License: GPL-2.0-or-later Group: System/Management Name: selinux-policy -Version: 20220624 +Version: 20220714 Release: 0 Source: fedora-policy-%{version}.tar.bz2 Source1: selinux-policy-rpmlintrc ++++++ fedora-policy-20220624.tar.bz2 -> fedora-policy-20220714.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/amanda.te new/fedora-policy-20220714/policy/modules/contrib/amanda.te --- old/fedora-policy-20220624/policy/modules/contrib/amanda.te 2022-06-24 08:28:15.514217177 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/amanda.te 2022-07-14 10:41:34.263983037 +0200 @@ -106,6 +106,7 @@ can_exec(amanda_t, { amanda_exec_t amanda_inetd_exec_t }) kernel_read_kernel_sysctls(amanda_t) +kernel_read_net_sysctls(amanda_t) kernel_read_system_state(amanda_t) kernel_read_network_state(amanda_t) kernel_dontaudit_getattr_unlabeled_files(amanda_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/cups.te new/fedora-policy-20220714/policy/modules/contrib/cups.te --- old/fedora-policy-20220624/policy/modules/contrib/cups.te 2022-06-24 08:28:15.522217291 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/cups.te 2022-07-14 10:41:34.279983278 +0200 @@ -562,6 +562,7 @@ stream_connect_pattern(cupsd_lpd_t, cupsd_var_run_t, cupsd_var_run_t, cupsd_t) kernel_read_kernel_sysctls(cupsd_lpd_t) +kernel_read_net_sysctls(cupsd_lpd_t) kernel_read_system_state(cupsd_lpd_t) corenet_all_recvfrom_netlabel(cupsd_lpd_t) @@ -647,6 +648,7 @@ fs_search_auto_mountpoints(cups_pdf_t) +kernel_read_net_sysctls(cups_pdf_t) kernel_read_system_state(cups_pdf_t) auth_use_nsswitch(cups_pdf_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/dbus.te new/fedora-policy-20220714/policy/modules/contrib/dbus.te --- old/fedora-policy-20220624/policy/modules/contrib/dbus.te 2022-06-24 08:28:15.522217291 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/dbus.te 2022-07-14 10:41:34.279983278 +0200 @@ -215,6 +215,10 @@ ') optional_policy(` + rpm_script_rw_stream_sockets(system_dbusd_t) +') + +optional_policy(` snapper_read_inherited_pipe(system_dbusd_t) ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/ddclient.if new/fedora-policy-20220714/policy/modules/contrib/ddclient.if --- old/fedora-policy-20220624/policy/modules/contrib/ddclient.if 2022-06-24 08:28:15.522217291 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/ddclient.if 2022-07-14 10:41:34.283983338 +0200 @@ -100,3 +100,21 @@ files_list_tmp($1) admin_pattern($1, ddclient_tmp_t) ') + +######################################## +## <summary> +## Get the attributes of ddclient PID files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`ddclient_getattr_pid_files',` + gen_require(` + type ddclient_var_run_t; + ') + + getattr_files_pattern($1, ddclient_var_run_t, ddclient_var_run_t) +') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/firewalld.te new/fedora-policy-20220714/policy/modules/contrib/firewalld.te --- old/fedora-policy-20220624/policy/modules/contrib/firewalld.te 2022-06-24 08:28:15.526217348 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/firewalld.te 2022-07-14 10:41:34.287983399 +0200 @@ -81,7 +81,7 @@ corecmd_exec_shell(firewalld_t) dev_read_urand(firewalld_t) -dev_search_sysfs(firewalld_t) +dev_read_sysfs(firewalld_t) domain_use_interactive_fds(firewalld_t) domain_obj_id_change_exemption(firewalld_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/insights_client.if new/fedora-policy-20220714/policy/modules/contrib/insights_client.if --- old/fedora-policy-20220624/policy/modules/contrib/insights_client.if 2022-06-24 08:28:15.530217406 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/insights_client.if 2022-07-14 10:41:34.291983459 +0200 @@ -58,6 +58,26 @@ ######################################## ## <summary> +## Allow the specified domain to search +## insights configuration dirs. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`insights_search_config',` + gen_require(` + type insights_client_etc_t; + ') + + files_search_etc($1) + allow $1 insights_client_etc_t:dir search_dir_perms; +') + +######################################## +## <summary> ## Transition to insights_client named content ## </summary> ## <param name="domain"> @@ -73,8 +93,10 @@ type insights_client_tmp_t; ') + filetrans_pattern($1, insights_client_etc_t, insights_client_etc_rw_t, file, ".cache.json") filetrans_pattern($1, insights_client_etc_t, insights_client_etc_rw_t, file, ".cache.json.asc") filetrans_pattern($1, insights_client_etc_t, insights_client_etc_rw_t, file, ".insights-core.etag") + filetrans_pattern($1, insights_client_etc_t, insights_client_etc_rw_t, file, ".insights-core-gpg-sig.etag") filetrans_pattern($1, insights_client_etc_t, insights_client_etc_rw_t, file, ".lastupload") filetrans_pattern($1, insights_client_etc_t, insights_client_etc_rw_t, file, ".last-upload.results") diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/keepalived.te new/fedora-policy-20220714/policy/modules/contrib/keepalived.te --- old/fedora-policy-20220624/policy/modules/contrib/keepalived.te 2022-06-24 08:28:15.534217463 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/keepalived.te 2022-07-14 10:41:34.295983519 +0200 @@ -81,6 +81,7 @@ domain_read_all_domains_state(keepalived_t) domain_getattr_all_domains(keepalived_t) +dev_read_sysfs(keepalived_t) dev_read_urand(keepalived_t) files_dontaudit_mounton_rootfs(keepalived_var_run_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/kerberos.te new/fedora-policy-20220714/policy/modules/contrib/kerberos.te --- old/fedora-policy-20220624/policy/modules/contrib/kerberos.te 2022-06-24 08:28:15.534217463 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/kerberos.te 2022-07-14 10:41:34.295983519 +0200 @@ -369,6 +369,7 @@ kernel_read_system_state(kpropd_t) kernel_read_network_state(kpropd_t) +kernel_read_net_sysctls(kpropd_t) can_exec(kpropd_t,kpropd_exec_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/networkmanager.te new/fedora-policy-20220714/policy/modules/contrib/networkmanager.te --- old/fedora-policy-20220624/policy/modules/contrib/networkmanager.te 2022-06-24 08:28:15.538217520 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/networkmanager.te 2022-07-14 10:41:34.299983580 +0200 @@ -554,6 +554,8 @@ allow NetworkManager_dispatcher_tlp_t self:capability sys_nice; allow NetworkManager_dispatcher_t self:process setsched; allow NetworkManager_dispatcher_tlp_t self:process setsched; +allow NetworkManager_dispatcher_console_t self:process setfscreate; + allow NetworkManager_dispatcher_t self:netlink_route_socket create_netlink_socket_perms; allow NetworkManager_dispatcher_ddclient_t self:netlink_route_socket create_netlink_socket_perms; allow NetworkManager_dispatcher_custom_t self:netlink_route_socket create_netlink_socket_perms; @@ -562,10 +564,12 @@ allow NetworkManager_dispatcher_ddclient_t self:udp_socket create_socket_perms; allow NetworkManager_dispatcher_t self:unix_dgram_socket { create_socket_perms sendto }; allow NetworkManager_dispatcher_ddclient_t self:unix_dgram_socket { create_socket_perms sendto }; +allow NetworkManager_dispatcher_custom_t self:unix_dgram_socket { create_socket_perms sendto }; allow NetworkManager_dispatcher_t NetworkManager_unit_file_t:file getattr; allow NetworkManager_dispatcher_cloud_t NetworkManager_unit_file_t:file getattr; list_dirs_pattern(NetworkManager_dispatcher_t, NetworkManager_etc_t, NetworkManager_dispatcher_script_t) +list_dirs_pattern(networkmanager_dispatcher_plugin, NetworkManager_etc_t, NetworkManager_dispatcher_script_t) list_dirs_pattern(NetworkManager_dispatcher_t, NetworkManager_dispatcher_script_t, networkmanager_dispatcher_script) read_files_pattern(NetworkManager_dispatcher_t, NetworkManager_dispatcher_script_t, networkmanager_dispatcher_script) read_lnk_files_pattern(NetworkManager_dispatcher_t, NetworkManager_dispatcher_script_t, networkmanager_dispatcher_script) @@ -594,8 +598,7 @@ domain_read_all_domains_state(NetworkManager_dispatcher_dnssec_t) -files_create_etc_files(NetworkManager_dispatcher_console_t) -files_rw_etc_files(NetworkManager_dispatcher_console_t) +files_manage_etc_files(NetworkManager_dispatcher_console_t) init_status(NetworkManager_dispatcher_cloud_t) init_status(NetworkManager_dispatcher_ddclient_t) @@ -626,6 +629,10 @@ ') optional_policy(` + ddclient_getattr_pid_files(NetworkManager_dispatcher_ddclient_t) +') + +optional_policy(` dnssec_trigger_domtrans(NetworkManager_dispatcher_dnssec_t) ') @@ -643,6 +650,8 @@ ') optional_policy(` + samba_domtrans_smbcontrol(NetworkManager_dispatcher_winbind_t) + samba_read_config(NetworkManager_dispatcher_winbind_t) samba_service_status(NetworkManager_dispatcher_winbind_t) ') @@ -663,6 +672,9 @@ systemd_exec_systemctl(NetworkManager_dispatcher_winbind_t) systemd_exec_systemctl(NetworkManager_dispatcher_custom_t) systemd_getattr_unit_files(NetworkManager_dispatcher_ddclient_t) + systemd_start_systemd_services(NetworkManager_dispatcher_ddclient_t) + systemd_stop_systemd_services(NetworkManager_dispatcher_ddclient_t) + systemd_status_systemd_services(NetworkManager_dispatcher_ddclient_t) systemd_start_systemd_services(NetworkManager_dispatcher_sendmail_t) ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/rabbitmq.te new/fedora-policy-20220714/policy/modules/contrib/rabbitmq.te --- old/fedora-policy-20220624/policy/modules/contrib/rabbitmq.te 2022-06-24 08:28:15.550217692 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/rabbitmq.te 2022-07-14 10:41:34.311983761 +0200 @@ -81,6 +81,8 @@ fs_tmpfs_filetrans(rabbitmq_t, rabbitmq_tmpfs_t, file) can_exec(rabbitmq_t, rabbitmq_tmpfs_t) +init_stream_connect(rabbitmq_t) + kernel_dgram_send(rabbitmq_t) kernel_read_system_state(rabbitmq_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/rhcd.te new/fedora-policy-20220714/policy/modules/contrib/rhcd.te --- old/fedora-policy-20220624/policy/modules/contrib/rhcd.te 2022-06-24 08:28:15.550217692 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/rhcd.te 2022-07-14 10:41:34.311983761 +0200 @@ -22,11 +22,23 @@ # rhcd local policy # allow rhcd_t self:fifo_file rw_fifo_file_perms; -allow rhcd_t self:unix_stream_socket create_stream_socket_perms; +allow rhcd_t self:netlink_route_socket create_netlink_socket_perms; +allow rhcd_t self:tcp_socket create_stream_socket_perms; +allow rhcd_t self:udp_socket create_socket_perms; +allow rhcd_t self:unix_stream_socket { connectto create_stream_socket_perms }; manage_dirs_pattern(rhcd_t, rhcd_var_run_t, rhcd_var_run_t) +manage_files_pattern(rhcd_t, rhcd_var_run_t, rhcd_var_run_t) files_pid_filetrans(rhcd_t, rhcd_var_run_t, { dir }) +kernel_read_net_sysctls(rhcd_t) +kernel_read_proc_files(rhcd_t) + +corecmd_exec_bin(rhcd_t) +corecmd_watch_bin_dirs(rhcd_t) + +corenet_tcp_connect_http_port(rhcd_t) + dev_read_sysfs(rhcd_t) domain_use_interactive_fds(rhcd_t) @@ -35,3 +47,13 @@ miscfiles_read_generic_certs(rhcd_t) miscfiles_read_localization(rhcd_t) + +sysnet_read_config(rhcd_t) + +optional_policy(` + insights_search_config(rhcd_t) +') + +optional_policy(` + udev_read_pid_files(rhcd_t) +') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/rpm.if new/fedora-policy-20220714/policy/modules/contrib/rpm.if --- old/fedora-policy-20220624/policy/modules/contrib/rpm.if 2022-06-24 08:28:15.550217692 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/rpm.if 2022-07-14 10:41:34.315983821 +0200 @@ -977,6 +977,7 @@ rpm_run($1, $2) ') +####################################### ## <summary> ## Allow the specified domain to ioctl rpm_script_t ## with a unix domain stream socket. @@ -994,3 +995,22 @@ allow $1 rpm_script_t:unix_stream_socket ioctl; ') + +####################################### +## <summary> +## Allow the specified domain read and write to rpm_script_t +## over a unix domain stream socket. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`rpm_script_rw_stream_sockets',` + gen_require(` + type rpm_script_t; + ') + + allow $1 rpm_script_t:unix_stream_socket { read write }; +') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/samba.te new/fedora-policy-20220714/policy/modules/contrib/samba.te --- old/fedora-policy-20220624/policy/modules/contrib/samba.te 2022-06-24 08:28:15.554217749 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/samba.te 2022-07-14 10:41:34.315983821 +0200 @@ -1208,6 +1208,7 @@ ') optional_policy(` + kerberos_read_keytab(winbind_rpcd_t) kerberos_use(winbind_rpcd_t) ') @@ -1216,6 +1217,10 @@ ') optional_policy(` + miscfiles_read_generic_certs(winbind_rpcd_t) +') + +optional_policy(` sssd_read_public_files(winbind_rpcd_t) sssd_stream_connect(winbind_rpcd_t) ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/stalld.te new/fedora-policy-20220714/policy/modules/contrib/stalld.te --- old/fedora-policy-20220624/policy/modules/contrib/stalld.te 2022-06-24 08:28:15.558217806 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/stalld.te 2022-07-14 10:41:34.319983882 +0200 @@ -32,6 +32,7 @@ kernel_getsched(stalld_t) kernel_manage_debugfs(stalld_t) kernel_read_all_proc(stalld_t) +kernel_setsched(stalld_t) dev_read_sysfs(stalld_t) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/targetd.fc new/fedora-policy-20220714/policy/modules/contrib/targetd.fc --- old/fedora-policy-20220624/policy/modules/contrib/targetd.fc 2022-06-24 08:28:15.558217806 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/targetd.fc 2022-07-14 10:41:34.319983882 +0200 @@ -3,10 +3,12 @@ /root/\.targetcli(/.*)? gen_context(system_u:object_r:targetclid_home_t,s0) /usr/bin/targetd -- gen_context(system_u:object_r:targetd_exec_t,s0) -/usr/bin/targetclid -- gen_context(system_u:object_r:targetclid_exec_t,s0) +/usr/bin/targetclid -- gen_context(system_u:object_r:targetclid_exec_t,s0) /usr/lib/systemd/system/targetd.* -- gen_context(system_u:object_r:targetd_unit_file_t,s0) /usr/lib/systemd/system/targetclid.* -- gen_context(system_u:object_r:targetclid_unit_file_t,s0) +/var/target(/.*)? gen_context(system_u:object_r:targetd_var_t,s0) + /var/run/targetclid\.pid -- gen_context(system_u:object_r:targetclid_var_run_t,s0) /var/run/targetclid\.sock -s gen_context(system_u:object_r:targetclid_var_run_t,s0) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/contrib/targetd.te new/fedora-policy-20220714/policy/modules/contrib/targetd.te --- old/fedora-policy-20220624/policy/modules/contrib/targetd.te 2022-06-24 08:28:15.558217806 +0200 +++ new/fedora-policy-20220714/policy/modules/contrib/targetd.te 2022-07-14 10:41:34.319983882 +0200 @@ -22,6 +22,9 @@ type targetclid_unit_file_t; systemd_unit_file(targetclid_unit_file_t) +type targetd_var_t; +files_type(targetd_var_t) + type targetd_tmp_t; files_tmp_file(targetd_tmp_t) @@ -133,6 +136,9 @@ manage_files_pattern(targetclid_t, targetclid_home_t, targetclid_home_t) userdom_admin_home_dir_filetrans(targetclid_t, targetclid_home_t, dir, ".targetcli") +list_dirs_pattern(targetclid_t, targetd_var_t, targetd_var_t) +read_files_pattern(targetclid_t, targetd_var_t, targetd_var_t) + manage_files_pattern(targetclid_t, targetclid_var_run_t, targetclid_var_run_t) manage_sock_files_pattern(targetclid_t, targetclid_var_run_t, targetclid_var_run_t) files_pid_filetrans(targetclid_t, targetclid_var_run_t, { file sock_file }) @@ -167,6 +173,7 @@ ') optional_policy(` + miscfiles_read_generic_certs(targetclid_t) miscfiles_read_localization(targetclid_t) ') diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/kernel/domain.te new/fedora-policy-20220714/policy/modules/kernel/domain.te --- old/fedora-policy-20220624/policy/modules/kernel/domain.te 2022-06-24 08:28:15.566217921 +0200 +++ new/fedora-policy-20220714/policy/modules/kernel/domain.te 2022-07-14 10:41:34.331984062 +0200 @@ -121,7 +121,7 @@ # Rules applied to all domains # -allow domain self:anon_inode common_anon_inode_perms; +allow domain domain:anon_inode common_anon_inode_perms; # read /proc/(pid|self) entries allow domain self:dir { list_dir_perms watch_dir_perms }; allow domain self:lnk_file { read_lnk_file_perms lock ioctl }; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/kernel/kernel.if new/fedora-policy-20220714/policy/modules/kernel/kernel.if --- old/fedora-policy-20220624/policy/modules/kernel/kernel.if 2022-06-24 08:28:15.566217921 +0200 +++ new/fedora-policy-20220714/policy/modules/kernel/kernel.if 2022-07-14 10:41:34.331984062 +0200 @@ -1114,6 +1114,24 @@ ######################################## ## <summary> +## Read generic files in /proc. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`kernel_read_proc_files',` + gen_require(` + type proc_t; + ') + + read_files_pattern($1, proc_t, proc_t) +') + +######################################## +## <summary> ## Read generic symbolic links in /proc. ## </summary> ## <desc> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/system/init.te new/fedora-policy-20220714/policy/modules/system/init.te --- old/fedora-policy-20220624/policy/modules/system/init.te 2022-06-24 08:28:15.570217978 +0200 +++ new/fedora-policy-20220714/policy/modules/system/init.te 2022-07-14 10:41:34.335984123 +0200 @@ -526,6 +526,7 @@ optional_policy(` rpm_read_db(init_t) rpm_script_ioctl_stream_sockets(init_t) + rpm_script_rw_stream_sockets(init_t) ') optional_policy(` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/policy/modules/system/systemd.if new/fedora-policy-20220714/policy/modules/system/systemd.if --- old/fedora-policy-20220624/policy/modules/system/systemd.if 2022-06-24 08:28:15.574218035 +0200 +++ new/fedora-policy-20220714/policy/modules/system/systemd.if 2022-07-14 10:41:34.335984123 +0200 @@ -1442,6 +1442,42 @@ allow $1 systemd_unit_file_t:service start; ') +######################################## +## <summary> +## Allow the specified domain to stop systemd services. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`systemd_stop_systemd_services',` + gen_require(` + type systemd_unit_file_t; + ') + + allow $1 systemd_unit_file_t:service stop; +') + +######################################## +## <summary> +## Allow the specified domain to status systemd services. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`systemd_status_systemd_services',` + gen_require(` + type systemd_unit_file_t; + ') + + allow $1 systemd_unit_file_t:service status; +') + ####################################### ## <summary> ## Allow the specified domain to reload all systemd services. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/fedora-policy-20220624/support/sedoctool.py new/fedora-policy-20220714/support/sedoctool.py --- old/fedora-policy-20220624/support/sedoctool.py 2022-06-24 08:28:15.574218035 +0200 +++ new/fedora-policy-20220714/support/sedoctool.py 2022-07-14 10:41:34.339984183 +0200 @@ -272,7 +272,7 @@ desc_buf = '' for desc in node.childNodes: if desc.nodeName == "#text": - if desc.data is not '': + if desc.data != '': if desc.parentNode.nodeName != "p": desc_buf += "<p>" + desc.data + "</p>" else: ++++++ fix_init.patch ++++++ --- /var/tmp/diff_new_pack.sXEwo7/_old 2022-07-18 18:32:46.853658791 +0200 +++ /var/tmp/diff_new_pack.sXEwo7/_new 2022-07-18 18:32:46.857658797 +0200 @@ -1,7 +1,7 @@ -Index: fedora-policy-20220624/policy/modules/system/init.te +Index: fedora-policy-20220714/policy/modules/system/init.te =================================================================== ---- fedora-policy-20220624.orig/policy/modules/system/init.te -+++ fedora-policy-20220624/policy/modules/system/init.te +--- fedora-policy-20220714.orig/policy/modules/system/init.te ++++ fedora-policy-20220714/policy/modules/system/init.te @@ -187,6 +187,8 @@ allow init_t self:bpf { map_create map_r # setuid (from /sbin/shutdown) # sys_chroot (from /usr/bin/chroot): now provided by corecmd_chroot_exec_chroot() @@ -48,7 +48,7 @@ optional_policy(` anaconda_stream_connect(init_t) anaconda_create_unix_stream_sockets(init_t) -@@ -580,10 +595,10 @@ tunable_policy(`init_audit_control',` +@@ -581,10 +596,10 @@ tunable_policy(`init_audit_control',` allow init_t self:system all_system_perms; allow init_t self:system module_load; allow init_t self:unix_dgram_socket { create_socket_perms sendto }; @@ -61,7 +61,7 @@ allow init_t self:netlink_selinux_socket create_socket_perms; allow init_t self:unix_dgram_socket lock; # Until systemd is fixed -@@ -642,6 +657,7 @@ files_delete_all_spool_sockets(init_t) +@@ -643,6 +658,7 @@ files_delete_all_spool_sockets(init_t) files_create_var_lib_dirs(init_t) files_create_var_lib_symlinks(init_t) files_read_var_lib_symlinks(init_t) @@ -69,7 +69,7 @@ files_manage_urandom_seed(init_t) files_list_locks(init_t) files_list_spool(init_t) -@@ -679,7 +695,7 @@ fs_list_all(init_t) +@@ -680,7 +696,7 @@ fs_list_all(init_t) fs_list_auto_mountpoints(init_t) fs_register_binary_executable_type(init_t) fs_relabel_tmpfs_sock_file(init_t) @@ -78,7 +78,7 @@ fs_relabel_cgroup_dirs(init_t) fs_search_cgroup_dirs(init_t) # for network namespaces -@@ -735,6 +751,7 @@ systemd_write_inherited_logind_sessions_ +@@ -736,6 +752,7 @@ systemd_write_inherited_logind_sessions_ create_sock_files_pattern(init_t, init_sock_file_type, init_sock_file_type) create_dirs_pattern(init_t, var_log_t, var_log_t) @@ -86,7 +86,7 @@ auth_use_nsswitch(init_t) auth_rw_login_records(init_t) -@@ -1589,6 +1606,8 @@ optional_policy(` +@@ -1590,6 +1607,8 @@ optional_policy(` optional_policy(` postfix_list_spool(initrc_t) ++++++ fix_systemd_watch.patch ++++++ --- /var/tmp/diff_new_pack.sXEwo7/_old 2022-07-18 18:32:46.917658883 +0200 +++ /var/tmp/diff_new_pack.sXEwo7/_new 2022-07-18 18:32:46.921658888 +0200 @@ -1,8 +1,8 @@ -Index: fedora-policy-20220428/policy/modules/system/systemd.te +Index: fedora-policy-20220714/policy/modules/system/systemd.te =================================================================== ---- fedora-policy-20220428.orig/policy/modules/system/systemd.te -+++ fedora-policy-20220428/policy/modules/system/systemd.te -@@ -1445,6 +1445,12 @@ fstools_rw_swap_files(systemd_sleep_t) +--- fedora-policy-20220714.orig/policy/modules/system/systemd.te ++++ fedora-policy-20220714/policy/modules/system/systemd.te +@@ -1447,6 +1447,12 @@ fstools_rw_swap_files(systemd_sleep_t) storage_getattr_fixed_disk_dev(systemd_sleep_t) storage_getattr_removable_dev(systemd_sleep_t)