diff options
author | Anthony G. Basile <blueness@gentoo.org> | 2011-02-05 20:41:06 +0000 |
---|---|---|
committer | Anthony G. Basile <blueness@gentoo.org> | 2011-02-05 20:41:06 +0000 |
commit | af88519ebd969fe6ea8faa811812f13dbaef903e (patch) | |
tree | 512d24edcf8f63f0135a8d80d536cd736985e2aa /sec-policy/selinux-xserver | |
parent | Add ~amd64-linux/~x86-linux, use ED instead of D in a couple places (diff) | |
download | historical-af88519ebd969fe6ea8faa811812f13dbaef903e.tar.gz historical-af88519ebd969fe6ea8faa811812f13dbaef903e.tar.bz2 historical-af88519ebd969fe6ea8faa811812f13dbaef903e.zip |
Bulk addition of new selinux policies.
Package-Manager: portage-2.1.9.25/cvs/Linux x86_64
Diffstat (limited to 'sec-policy/selinux-xserver')
8 files changed, 210 insertions, 0 deletions
diff --git a/sec-policy/selinux-xserver/ChangeLog b/sec-policy/selinux-xserver/ChangeLog new file mode 100644 index 000000000000..5afe2fcb59a4 --- /dev/null +++ b/sec-policy/selinux-xserver/ChangeLog @@ -0,0 +1,19 @@ +# ChangeLog for sec-policy/selinux-xserver +# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-xserver/ChangeLog,v 1.1 2011/02/05 20:41:03 blueness Exp $ + + 05 Feb 2011; Anthony G. Basile <blueness@gentoo.org> ChangeLog: + Initial commit to portage. + +*selinux-xserver-2.20101213-r2 (02 Feb 2011) + + 02 Feb 2011; <swift@gentoo.org> +files/fix-services-xserver-r2.patch, + +selinux-xserver-2.20101213-r2.ebuild: + Allow use of ttys (improves console logging) + +*selinux-xserver-2.20101213-r1 (31 Jan 2011) + + 31 Jan 2011; <swift@gentoo.org> +files/fix-services-xserver-r1.patch, + +selinux-xserver-2.20101213-r1.ebuild: + Fix large timewait issues with xserver policy + diff --git a/sec-policy/selinux-xserver/files/fix-services-xserver-r1.patch b/sec-policy/selinux-xserver/files/fix-services-xserver-r1.patch new file mode 100644 index 000000000000..75046d36a321 --- /dev/null +++ b/sec-policy/selinux-xserver/files/fix-services-xserver-r1.patch @@ -0,0 +1,50 @@ +--- services/xserver.te 2010-12-13 15:11:02.000000000 +0100 ++++ services/xserver.te 2011-01-30 15:04:32.722000186 +0100 +@@ -234,9 +234,11 @@ + + allow xdm_t iceauth_home_t:file read_file_perms; + ++files_search_tmp(iceauth_t) + fs_search_auto_mountpoints(iceauth_t) + + userdom_use_user_terminals(iceauth_t) ++userdom_read_user_tmp_files(iceauth_t) + + tunable_policy(`use_nfs_home_dirs',` + fs_manage_nfs_files(iceauth_t) +@@ -279,6 +281,7 @@ + + userdom_use_user_terminals(xauth_t) + userdom_read_user_tmp_files(xauth_t) ++userdom_read_user_tmp_files(xserver_t) + + xserver_rw_xdm_tmp_files(xauth_t) + +@@ -588,6 +591,9 @@ + allow xserver_t { root_xdrawable_t x_domain }:x_drawable send; + allow xserver_t input_xevent_t:x_event send; + ++# Allow X to process keyboard events ++udev_read_db(xserver_t) ++ + # setuid/setgid for the wrapper program to change UID + # sys_rawio is for iopl access - should not be needed for frame-buffer + # sys_admin, locking shared mem? chowning IPC message queues or semaphores? +@@ -610,6 +616,7 @@ + allow xserver_t self:unix_stream_socket { create_stream_socket_perms connectto }; + allow xserver_t self:tcp_socket create_stream_socket_perms; + allow xserver_t self:udp_socket create_socket_perms; ++allow xserver_t self:netlink_kobject_uevent_socket create_socket_perms; + + manage_dirs_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) + manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) +--- services/xserver.fc 2010-08-03 15:11:09.000000000 +0200 ++++ services/xserver.fc 2011-01-03 23:07:16.852000013 +0100 +@@ -5,6 +5,7 @@ + HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0) + HOME_DIR/\.fonts/auto(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0) + HOME_DIR/\.fonts\.cache-.* -- gen_context(system_u:object_r:user_fonts_cache_t,s0) ++HOME_DIR/\.fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0) + HOME_DIR/\.ICEauthority.* -- gen_context(system_u:object_r:iceauth_home_t,s0) + HOME_DIR/\.xauth.* -- gen_context(system_u:object_r:xauth_home_t,s0) + HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0) diff --git a/sec-policy/selinux-xserver/files/fix-services-xserver-r2.patch b/sec-policy/selinux-xserver/files/fix-services-xserver-r2.patch new file mode 100644 index 000000000000..3c73d86c19f8 --- /dev/null +++ b/sec-policy/selinux-xserver/files/fix-services-xserver-r2.patch @@ -0,0 +1,52 @@ +--- services/xserver.te 2010-12-13 15:11:02.000000000 +0100 ++++ services/xserver.te 2011-02-01 18:16:07.421000056 +0100 +@@ -234,9 +234,13 @@ + + allow xdm_t iceauth_home_t:file read_file_perms; + ++files_search_tmp(iceauth_t) + fs_search_auto_mountpoints(iceauth_t) + + userdom_use_user_terminals(iceauth_t) ++userdom_read_user_tmp_files(iceauth_t) ++ ++getty_use_fds(iceauth_t) + + tunable_policy(`use_nfs_home_dirs',` + fs_manage_nfs_files(iceauth_t) +@@ -279,6 +283,7 @@ + + userdom_use_user_terminals(xauth_t) + userdom_read_user_tmp_files(xauth_t) ++userdom_read_user_tmp_files(xserver_t) + + xserver_rw_xdm_tmp_files(xauth_t) + +@@ -588,6 +593,9 @@ + allow xserver_t { root_xdrawable_t x_domain }:x_drawable send; + allow xserver_t input_xevent_t:x_event send; + ++# Allow X to process keyboard events ++udev_read_db(xserver_t) ++ + # setuid/setgid for the wrapper program to change UID + # sys_rawio is for iopl access - should not be needed for frame-buffer + # sys_admin, locking shared mem? chowning IPC message queues or semaphores? +@@ -610,6 +618,7 @@ + allow xserver_t self:unix_stream_socket { create_stream_socket_perms connectto }; + allow xserver_t self:tcp_socket create_stream_socket_perms; + allow xserver_t self:udp_socket create_socket_perms; ++allow xserver_t self:netlink_kobject_uevent_socket create_socket_perms; + + manage_dirs_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) + manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) +--- services/xserver.fc 2010-08-03 15:11:09.000000000 +0200 ++++ services/xserver.fc 2011-01-03 23:07:16.852000013 +0100 +@@ -5,6 +5,7 @@ + HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0) + HOME_DIR/\.fonts/auto(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0) + HOME_DIR/\.fonts\.cache-.* -- gen_context(system_u:object_r:user_fonts_cache_t,s0) ++HOME_DIR/\.fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0) + HOME_DIR/\.ICEauthority.* -- gen_context(system_u:object_r:iceauth_home_t,s0) + HOME_DIR/\.xauth.* -- gen_context(system_u:object_r:xauth_home_t,s0) + HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0) diff --git a/sec-policy/selinux-xserver/files/fix-xserver.patch b/sec-policy/selinux-xserver/files/fix-xserver.patch new file mode 100644 index 000000000000..4f6edf3def21 --- /dev/null +++ b/sec-policy/selinux-xserver/files/fix-xserver.patch @@ -0,0 +1,38 @@ +--- services/xserver.te 2010-12-13 15:11:02.000000000 +0100 ++++ ../../../refpolicy/policy/modules/services/xserver.te 2011-01-02 18:21:17.682000037 +0100 +@@ -279,6 +279,7 @@ + + userdom_use_user_terminals(xauth_t) + userdom_read_user_tmp_files(xauth_t) ++userdom_read_user_tmp_files(xserver_t) + + xserver_rw_xdm_tmp_files(xauth_t) + +@@ -588,6 +589,9 @@ + allow xserver_t { root_xdrawable_t x_domain }:x_drawable send; + allow xserver_t input_xevent_t:x_event send; + ++# Allow X to process keyboard events ++udev_read_db(xserver_t) ++ + # setuid/setgid for the wrapper program to change UID + # sys_rawio is for iopl access - should not be needed for frame-buffer + # sys_admin, locking shared mem? chowning IPC message queues or semaphores? +@@ -610,6 +614,7 @@ + allow xserver_t self:unix_stream_socket { create_stream_socket_perms connectto }; + allow xserver_t self:tcp_socket create_stream_socket_perms; + allow xserver_t self:udp_socket create_socket_perms; ++allow xserver_t self:netlink_kobject_uevent_socket create_socket_perms; + + manage_dirs_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) + manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t) +--- services/xserver.fc 2010-08-03 15:11:09.000000000 +0200 ++++ ../../../refpolicy/policy/modules/services/xserver.fc 2011-01-03 23:07:16.852000013 +0100 +@@ -5,6 +5,7 @@ + HOME_DIR/\.fonts(/.*)? gen_context(system_u:object_r:user_fonts_t,s0) + HOME_DIR/\.fonts/auto(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0) + HOME_DIR/\.fonts\.cache-.* -- gen_context(system_u:object_r:user_fonts_cache_t,s0) ++HOME_DIR/\.fontconfig(/.*)? gen_context(system_u:object_r:user_fonts_cache_t,s0) + HOME_DIR/\.ICEauthority.* -- gen_context(system_u:object_r:iceauth_home_t,s0) + HOME_DIR/\.xauth.* -- gen_context(system_u:object_r:xauth_home_t,s0) + HOME_DIR/\.Xauthority.* -- gen_context(system_u:object_r:xauth_home_t,s0) diff --git a/sec-policy/selinux-xserver/metadata.xml b/sec-policy/selinux-xserver/metadata.xml new file mode 100644 index 000000000000..e768672448a3 --- /dev/null +++ b/sec-policy/selinux-xserver/metadata.xml @@ -0,0 +1,6 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>hardened</herd> +<longdescription>Gentoo SELinux policy for the Xorg server</longdescription> +</pkgmetadata> diff --git a/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r1.ebuild b/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r1.ebuild new file mode 100644 index 000000000000..63f27f96a095 --- /dev/null +++ b/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r1.ebuild @@ -0,0 +1,15 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r1.ebuild,v 1.1 2011/02/05 20:41:03 blueness Exp $ + +IUSE="" + +MODS="xserver" + +inherit selinux-policy-2 + +DESCRIPTION="SELinux policy for general applications" + +KEYWORDS="~amd64 ~x86" + +POLICY_PATCH="${FILESDIR}/fix-services-xserver-r1.patch" diff --git a/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r2.ebuild b/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r2.ebuild new file mode 100644 index 000000000000..57ff047fa8ee --- /dev/null +++ b/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r2.ebuild @@ -0,0 +1,15 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-xserver/selinux-xserver-2.20101213-r2.ebuild,v 1.1 2011/02/05 20:41:03 blueness Exp $ + +IUSE="" + +MODS="xserver" + +inherit selinux-policy-2 + +DESCRIPTION="SELinux policy for general applications" + +KEYWORDS="~amd64 ~x86" + +POLICY_PATCH="${FILESDIR}/fix-services-xserver-r2.patch" diff --git a/sec-policy/selinux-xserver/selinux-xserver-2.20101213.ebuild b/sec-policy/selinux-xserver/selinux-xserver-2.20101213.ebuild new file mode 100644 index 000000000000..453800b67d3b --- /dev/null +++ b/sec-policy/selinux-xserver/selinux-xserver-2.20101213.ebuild @@ -0,0 +1,15 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-xserver/selinux-xserver-2.20101213.ebuild,v 1.1 2011/02/05 20:41:03 blueness Exp $ + +IUSE="" + +MODS="xserver" + +inherit selinux-policy-2 + +DESCRIPTION="SELinux policy for general applications" + +KEYWORDS="~amd64 ~x86" + +POLICY_PATCH="${FILESDIR}/fix-xserver.patch" |