- Cleanups from dgrift
This commit is contained in:
parent
daebd59668
commit
08b890455e
168
policy-F13.patch
168
policy-F13.patch
@ -4657,8 +4657,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sambagui
|
|||||||
+
|
+
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sambagui.te serefpolicy-3.7.5/policy/modules/apps/sambagui.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sambagui.te serefpolicy-3.7.5/policy/modules/apps/sambagui.te
|
||||||
--- nsaserefpolicy/policy/modules/apps/sambagui.te 1969-12-31 19:00:00.000000000 -0500
|
--- nsaserefpolicy/policy/modules/apps/sambagui.te 1969-12-31 19:00:00.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/apps/sambagui.te 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/apps/sambagui.te 2009-12-23 12:39:59.000000000 -0500
|
||||||
@@ -0,0 +1,60 @@
|
@@ -0,0 +1,61 @@
|
||||||
+policy_module(sambagui,1.0.0)
|
+policy_module(sambagui,1.0.0)
|
||||||
+
|
+
|
||||||
+########################################
|
+########################################
|
||||||
@ -4675,6 +4675,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sambagui
|
|||||||
+# system-config-samba local policy
|
+# system-config-samba local policy
|
||||||
+#
|
+#
|
||||||
+
|
+
|
||||||
|
+allow sambagui_t self:capability dac_override;
|
||||||
+allow sambagui_t self:fifo_file rw_fifo_file_perms;
|
+allow sambagui_t self:fifo_file rw_fifo_file_perms;
|
||||||
+allow sambagui_t self:unix_dgram_socket create_socket_perms;
|
+allow sambagui_t self:unix_dgram_socket create_socket_perms;
|
||||||
+
|
+
|
||||||
@ -4952,8 +4953,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sandbox.
|
|||||||
+')
|
+')
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sandbox.te serefpolicy-3.7.5/policy/modules/apps/sandbox.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sandbox.te serefpolicy-3.7.5/policy/modules/apps/sandbox.te
|
||||||
--- nsaserefpolicy/policy/modules/apps/sandbox.te 1969-12-31 19:00:00.000000000 -0500
|
--- nsaserefpolicy/policy/modules/apps/sandbox.te 1969-12-31 19:00:00.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/apps/sandbox.te 2009-12-21 14:43:49.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/apps/sandbox.te 2009-12-23 12:55:41.000000000 -0500
|
||||||
@@ -0,0 +1,340 @@
|
@@ -0,0 +1,342 @@
|
||||||
+policy_module(sandbox,1.0.0)
|
+policy_module(sandbox,1.0.0)
|
||||||
+dbus_stub()
|
+dbus_stub()
|
||||||
+attribute sandbox_domain;
|
+attribute sandbox_domain;
|
||||||
@ -5196,6 +5197,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/sandbox.
|
|||||||
+allow sandbox_web_client_t self:dbus { acquire_svc send_msg };
|
+allow sandbox_web_client_t self:dbus { acquire_svc send_msg };
|
||||||
+allow sandbox_web_client_t self:netlink_selinux_socket create_socket_perms;
|
+allow sandbox_web_client_t self:netlink_selinux_socket create_socket_perms;
|
||||||
+
|
+
|
||||||
|
+kernel_dontaudit_search_kernel_sysctl(sandbox_web_client_t)
|
||||||
|
+
|
||||||
+dev_read_rand(sandbox_web_client_t)
|
+dev_read_rand(sandbox_web_client_t)
|
||||||
+
|
+
|
||||||
+# Browse the web, connect to printer
|
+# Browse the web, connect to printer
|
||||||
@ -6455,7 +6458,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/files.
|
|||||||
/var/lib/nfs/rpc_pipefs(/.*)? <<none>>
|
/var/lib/nfs/rpc_pipefs(/.*)? <<none>>
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/files.if serefpolicy-3.7.5/policy/modules/kernel/files.if
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/files.if serefpolicy-3.7.5/policy/modules/kernel/files.if
|
||||||
--- nsaserefpolicy/policy/modules/kernel/files.if 2009-11-25 11:47:19.000000000 -0500
|
--- nsaserefpolicy/policy/modules/kernel/files.if 2009-11-25 11:47:19.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/kernel/files.if 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/kernel/files.if 2009-12-23 12:48:27.000000000 -0500
|
||||||
@@ -932,10 +932,8 @@
|
@@ -932,10 +932,8 @@
|
||||||
relabel_lnk_files_pattern($1, { file_type $2 }, { file_type $2 })
|
relabel_lnk_files_pattern($1, { file_type $2 }, { file_type $2 })
|
||||||
relabel_fifo_files_pattern($1, { file_type $2 }, { file_type $2 })
|
relabel_fifo_files_pattern($1, { file_type $2 }, { file_type $2 })
|
||||||
@ -6969,7 +6972,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/files.
|
|||||||
#
|
#
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/filesystem.if serefpolicy-3.7.5/policy/modules/kernel/filesystem.if
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/filesystem.if serefpolicy-3.7.5/policy/modules/kernel/filesystem.if
|
||||||
--- nsaserefpolicy/policy/modules/kernel/filesystem.if 2009-11-25 11:47:19.000000000 -0500
|
--- nsaserefpolicy/policy/modules/kernel/filesystem.if 2009-11-25 11:47:19.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/kernel/filesystem.if 2009-12-23 07:46:46.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/kernel/filesystem.if 2009-12-23 08:58:51.000000000 -0500
|
||||||
@@ -906,7 +906,7 @@
|
@@ -906,7 +906,7 @@
|
||||||
type cifs_t;
|
type cifs_t;
|
||||||
')
|
')
|
||||||
@ -7014,7 +7017,32 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/filesy
|
|||||||
#########################################
|
#########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read named sockets on a NFS filesystem.
|
## Read named sockets on a NFS filesystem.
|
||||||
@@ -4181,3 +4200,175 @@
|
@@ -3684,6 +3703,24 @@
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
+## Search the XENFS filesystem.
|
||||||
|
+## </summary>
|
||||||
|
+## <param name="domain">
|
||||||
|
+## <summary>
|
||||||
|
+## Domain allowed access.
|
||||||
|
+## </summary>
|
||||||
|
+## </param>
|
||||||
|
+#
|
||||||
|
+interface(`fs_search_xenfs',`
|
||||||
|
+ gen_require(`
|
||||||
|
+ type xenfs_t;
|
||||||
|
+ ')
|
||||||
|
+
|
||||||
|
+ allow $1 xenfs_t:dir search_dir_perms;
|
||||||
|
+')
|
||||||
|
+
|
||||||
|
+########################################
|
||||||
|
+## <summary>
|
||||||
|
## Mount a XENFS filesystem.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
@@ -4181,3 +4218,175 @@
|
||||||
relabelfrom_blk_files_pattern($1, noxattrfs, noxattrfs)
|
relabelfrom_blk_files_pattern($1, noxattrfs, noxattrfs)
|
||||||
relabelfrom_chr_files_pattern($1, noxattrfs, noxattrfs)
|
relabelfrom_chr_files_pattern($1, noxattrfs, noxattrfs)
|
||||||
')
|
')
|
||||||
@ -12576,7 +12604,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cert
|
|||||||
+')
|
+')
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cgroup.fc serefpolicy-3.7.5/policy/modules/services/cgroup.fc
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cgroup.fc serefpolicy-3.7.5/policy/modules/services/cgroup.fc
|
||||||
--- nsaserefpolicy/policy/modules/services/cgroup.fc 1969-12-31 19:00:00.000000000 -0500
|
--- nsaserefpolicy/policy/modules/services/cgroup.fc 1969-12-31 19:00:00.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/services/cgroup.fc 2009-12-22 11:06:28.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/services/cgroup.fc 2009-12-23 13:32:50.000000000 -0500
|
||||||
@@ -0,0 +1,7 @@
|
@@ -0,0 +1,7 @@
|
||||||
+/etc/rc\.d/init\.d/cgconfig -- gen_context(system_u:object_r:cgconfig_initrc_exec_t, s0)
|
+/etc/rc\.d/init\.d/cgconfig -- gen_context(system_u:object_r:cgconfig_initrc_exec_t, s0)
|
||||||
+/etc/rc\.d/init\.d/cgred -- gen_context(system_u:object_r:cgred_initrc_exec_t, s0)
|
+/etc/rc\.d/init\.d/cgred -- gen_context(system_u:object_r:cgred_initrc_exec_t, s0)
|
||||||
@ -14100,7 +14128,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
+/usr/local/linuxprinter/ppd(/.*)? gen_context(system_u:object_r:cupsd_rw_etc_t,s0)
|
+/usr/local/linuxprinter/ppd(/.*)? gen_context(system_u:object_r:cupsd_rw_etc_t,s0)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups.te serefpolicy-3.7.5/policy/modules/services/cups.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups.te serefpolicy-3.7.5/policy/modules/services/cups.te
|
||||||
--- nsaserefpolicy/policy/modules/services/cups.te 2009-08-14 16:14:31.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/cups.te 2009-08-14 16:14:31.000000000 -0400
|
||||||
+++ serefpolicy-3.7.5/policy/modules/services/cups.te 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/services/cups.te 2009-12-23 12:11:21.000000000 -0500
|
||||||
@@ -23,6 +23,9 @@
|
@@ -23,6 +23,9 @@
|
||||||
type cupsd_initrc_exec_t;
|
type cupsd_initrc_exec_t;
|
||||||
init_script_file(cupsd_initrc_exec_t)
|
init_script_file(cupsd_initrc_exec_t)
|
||||||
@ -14162,7 +14190,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
corenet_tcp_bind_reserved_port(cupsd_t)
|
corenet_tcp_bind_reserved_port(cupsd_t)
|
||||||
corenet_dontaudit_tcp_bind_all_reserved_ports(cupsd_t)
|
corenet_dontaudit_tcp_bind_all_reserved_ports(cupsd_t)
|
||||||
corenet_tcp_bind_all_rpc_ports(cupsd_t)
|
corenet_tcp_bind_all_rpc_ports(cupsd_t)
|
||||||
@@ -250,6 +262,7 @@
|
@@ -191,6 +203,7 @@
|
||||||
|
|
||||||
|
fs_getattr_all_fs(cupsd_t)
|
||||||
|
fs_search_auto_mountpoints(cupsd_t)
|
||||||
|
+fs_search_fusefs(cupsd_t)
|
||||||
|
fs_read_anon_inodefs_files(cupsd_t)
|
||||||
|
|
||||||
|
mls_file_downgrade(cupsd_t)
|
||||||
|
@@ -250,6 +263,7 @@
|
||||||
miscfiles_read_localization(cupsd_t)
|
miscfiles_read_localization(cupsd_t)
|
||||||
# invoking ghostscript needs to read fonts
|
# invoking ghostscript needs to read fonts
|
||||||
miscfiles_read_fonts(cupsd_t)
|
miscfiles_read_fonts(cupsd_t)
|
||||||
@ -14170,7 +14206,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
|
|
||||||
seutil_read_config(cupsd_t)
|
seutil_read_config(cupsd_t)
|
||||||
sysnet_exec_ifconfig(cupsd_t)
|
sysnet_exec_ifconfig(cupsd_t)
|
||||||
@@ -317,6 +330,10 @@
|
@@ -317,6 +331,10 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -14181,7 +14217,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
udev_read_db(cupsd_t)
|
udev_read_db(cupsd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -327,7 +344,7 @@
|
@@ -327,7 +345,7 @@
|
||||||
|
|
||||||
allow cupsd_config_t self:capability { chown dac_override sys_tty_config };
|
allow cupsd_config_t self:capability { chown dac_override sys_tty_config };
|
||||||
dontaudit cupsd_config_t self:capability sys_tty_config;
|
dontaudit cupsd_config_t self:capability sys_tty_config;
|
||||||
@ -14190,7 +14226,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
allow cupsd_config_t self:fifo_file rw_fifo_file_perms;
|
allow cupsd_config_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow cupsd_config_t self:unix_stream_socket create_socket_perms;
|
allow cupsd_config_t self:unix_stream_socket create_socket_perms;
|
||||||
allow cupsd_config_t self:unix_dgram_socket create_socket_perms;
|
allow cupsd_config_t self:unix_dgram_socket create_socket_perms;
|
||||||
@@ -378,6 +395,8 @@
|
@@ -378,6 +396,8 @@
|
||||||
dev_read_rand(cupsd_config_t)
|
dev_read_rand(cupsd_config_t)
|
||||||
dev_rw_generic_usb_dev(cupsd_config_t)
|
dev_rw_generic_usb_dev(cupsd_config_t)
|
||||||
|
|
||||||
@ -14199,7 +14235,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
fs_getattr_all_fs(cupsd_config_t)
|
fs_getattr_all_fs(cupsd_config_t)
|
||||||
fs_search_auto_mountpoints(cupsd_config_t)
|
fs_search_auto_mountpoints(cupsd_config_t)
|
||||||
|
|
||||||
@@ -407,6 +426,7 @@
|
@@ -407,6 +427,7 @@
|
||||||
|
|
||||||
userdom_dontaudit_use_unpriv_user_fds(cupsd_config_t)
|
userdom_dontaudit_use_unpriv_user_fds(cupsd_config_t)
|
||||||
userdom_dontaudit_search_user_home_dirs(cupsd_config_t)
|
userdom_dontaudit_search_user_home_dirs(cupsd_config_t)
|
||||||
@ -14207,7 +14243,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
|
|
||||||
cups_stream_connect(cupsd_config_t)
|
cups_stream_connect(cupsd_config_t)
|
||||||
|
|
||||||
@@ -419,12 +439,15 @@
|
@@ -419,12 +440,15 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -14225,7 +14261,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
hal_dbus_chat(cupsd_config_t)
|
hal_dbus_chat(cupsd_config_t)
|
||||||
@@ -446,6 +469,10 @@
|
@@ -446,6 +470,10 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -14236,7 +14272,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
rpm_read_db(cupsd_config_t)
|
rpm_read_db(cupsd_config_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -457,6 +484,10 @@
|
@@ -457,6 +485,10 @@
|
||||||
udev_read_db(cupsd_config_t)
|
udev_read_db(cupsd_config_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -14247,7 +14283,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Cups lpd support
|
# Cups lpd support
|
||||||
@@ -542,6 +573,8 @@
|
@@ -542,6 +574,8 @@
|
||||||
manage_dirs_pattern(cups_pdf_t, cups_pdf_tmp_t, cups_pdf_tmp_t)
|
manage_dirs_pattern(cups_pdf_t, cups_pdf_tmp_t, cups_pdf_tmp_t)
|
||||||
files_tmp_filetrans(cups_pdf_t, cups_pdf_tmp_t, { file dir })
|
files_tmp_filetrans(cups_pdf_t, cups_pdf_tmp_t, { file dir })
|
||||||
|
|
||||||
@ -14256,7 +14292,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
kernel_read_system_state(cups_pdf_t)
|
kernel_read_system_state(cups_pdf_t)
|
||||||
|
|
||||||
files_read_etc_files(cups_pdf_t)
|
files_read_etc_files(cups_pdf_t)
|
||||||
@@ -556,11 +589,15 @@
|
@@ -556,11 +590,15 @@
|
||||||
miscfiles_read_fonts(cups_pdf_t)
|
miscfiles_read_fonts(cups_pdf_t)
|
||||||
|
|
||||||
userdom_home_filetrans_user_home_dir(cups_pdf_t)
|
userdom_home_filetrans_user_home_dir(cups_pdf_t)
|
||||||
@ -14272,7 +14308,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
|
|
||||||
tunable_policy(`use_nfs_home_dirs',`
|
tunable_policy(`use_nfs_home_dirs',`
|
||||||
fs_manage_nfs_dirs(cups_pdf_t)
|
fs_manage_nfs_dirs(cups_pdf_t)
|
||||||
@@ -601,6 +638,9 @@
|
@@ -601,6 +639,9 @@
|
||||||
read_lnk_files_pattern(hplip_t, hplip_etc_t, hplip_etc_t)
|
read_lnk_files_pattern(hplip_t, hplip_etc_t, hplip_etc_t)
|
||||||
files_search_etc(hplip_t)
|
files_search_etc(hplip_t)
|
||||||
|
|
||||||
@ -14282,7 +14318,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cups
|
|||||||
manage_fifo_files_pattern(hplip_t, hplip_tmp_t, hplip_tmp_t)
|
manage_fifo_files_pattern(hplip_t, hplip_tmp_t, hplip_tmp_t)
|
||||||
files_tmp_filetrans(hplip_t, hplip_tmp_t, fifo_file )
|
files_tmp_filetrans(hplip_t, hplip_tmp_t, fifo_file )
|
||||||
|
|
||||||
@@ -627,6 +667,7 @@
|
@@ -627,6 +668,7 @@
|
||||||
corenet_tcp_connect_ipp_port(hplip_t)
|
corenet_tcp_connect_ipp_port(hplip_t)
|
||||||
corenet_sendrecv_hplip_client_packets(hplip_t)
|
corenet_sendrecv_hplip_client_packets(hplip_t)
|
||||||
corenet_receive_hplip_server_packets(hplip_t)
|
corenet_receive_hplip_server_packets(hplip_t)
|
||||||
@ -14954,7 +14990,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
|||||||
/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)
|
/var/spool/dovecot(/.*)? gen_context(system_u:object_r:dovecot_spool_t,s0)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.te serefpolicy-3.7.5/policy/modules/services/dovecot.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dovecot.te serefpolicy-3.7.5/policy/modules/services/dovecot.te
|
||||||
--- nsaserefpolicy/policy/modules/services/dovecot.te 2009-08-14 16:14:31.000000000 -0400
|
--- nsaserefpolicy/policy/modules/services/dovecot.te 2009-08-14 16:14:31.000000000 -0400
|
||||||
+++ serefpolicy-3.7.5/policy/modules/services/dovecot.te 2009-12-22 15:39:45.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/services/dovecot.te 2009-12-23 12:49:57.000000000 -0500
|
||||||
@@ -56,7 +56,7 @@
|
@@ -56,7 +56,7 @@
|
||||||
|
|
||||||
allow dovecot_t self:capability { dac_override dac_read_search chown net_bind_service setgid setuid sys_chroot };
|
allow dovecot_t self:capability { dac_override dac_read_search chown net_bind_service setgid setuid sys_chroot };
|
||||||
@ -14964,10 +15000,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
|||||||
allow dovecot_t self:fifo_file rw_fifo_file_perms;
|
allow dovecot_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow dovecot_t self:tcp_socket create_stream_socket_perms;
|
allow dovecot_t self:tcp_socket create_stream_socket_perms;
|
||||||
allow dovecot_t self:unix_dgram_socket create_socket_perms;
|
allow dovecot_t self:unix_dgram_socket create_socket_perms;
|
||||||
@@ -73,8 +73,9 @@
|
@@ -73,8 +73,14 @@
|
||||||
|
|
||||||
can_exec(dovecot_t, dovecot_exec_t)
|
can_exec(dovecot_t, dovecot_exec_t)
|
||||||
|
|
||||||
|
+# Allow dovecot to create and read SSL parameters file
|
||||||
|
+manage_files_pattern(dovecot_t, dovecot_var_lib_t, dovecot_var_lib_t)
|
||||||
|
+files_search_var_lib(dovecot_t)
|
||||||
|
+files_read_var_symlinks(dovecot_t)
|
||||||
|
+
|
||||||
+manage_dirs_pattern(dovecot_t, dovecot_var_log_t, dovecot_var_log_t)
|
+manage_dirs_pattern(dovecot_t, dovecot_var_log_t, dovecot_var_log_t)
|
||||||
manage_files_pattern(dovecot_t, dovecot_var_log_t, dovecot_var_log_t)
|
manage_files_pattern(dovecot_t, dovecot_var_log_t, dovecot_var_log_t)
|
||||||
-logging_log_filetrans(dovecot_t, dovecot_var_log_t, file)
|
-logging_log_filetrans(dovecot_t, dovecot_var_log_t, file)
|
||||||
@ -14975,7 +15016,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
|||||||
|
|
||||||
manage_dirs_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
manage_dirs_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||||
manage_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
manage_files_pattern(dovecot_t, dovecot_spool_t, dovecot_spool_t)
|
||||||
@@ -103,6 +104,7 @@
|
@@ -103,6 +109,7 @@
|
||||||
dev_read_urand(dovecot_t)
|
dev_read_urand(dovecot_t)
|
||||||
|
|
||||||
fs_getattr_all_fs(dovecot_t)
|
fs_getattr_all_fs(dovecot_t)
|
||||||
@ -14983,7 +15024,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
|||||||
fs_search_auto_mountpoints(dovecot_t)
|
fs_search_auto_mountpoints(dovecot_t)
|
||||||
fs_list_inotifyfs(dovecot_t)
|
fs_list_inotifyfs(dovecot_t)
|
||||||
|
|
||||||
@@ -142,6 +144,10 @@
|
@@ -142,6 +149,10 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -14994,7 +15035,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
|||||||
seutil_sigchld_newrole(dovecot_t)
|
seutil_sigchld_newrole(dovecot_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -159,7 +165,7 @@
|
@@ -159,7 +170,7 @@
|
||||||
#
|
#
|
||||||
|
|
||||||
allow dovecot_auth_t self:capability { chown dac_override setgid setuid };
|
allow dovecot_auth_t self:capability { chown dac_override setgid setuid };
|
||||||
@ -15003,6 +15044,30 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
|||||||
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
|
allow dovecot_auth_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
|
allow dovecot_auth_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow dovecot_auth_t self:unix_stream_socket create_stream_socket_perms;
|
allow dovecot_auth_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
@@ -172,11 +183,6 @@
|
||||||
|
manage_files_pattern(dovecot_auth_t, dovecot_auth_tmp_t, dovecot_auth_tmp_t)
|
||||||
|
files_tmp_filetrans(dovecot_auth_t, dovecot_auth_tmp_t, { file dir })
|
||||||
|
|
||||||
|
-# Allow dovecot to create and read SSL parameters file
|
||||||
|
-manage_files_pattern(dovecot_t, dovecot_var_lib_t, dovecot_var_lib_t)
|
||||||
|
-files_search_var_lib(dovecot_t)
|
||||||
|
-files_read_var_symlinks(dovecot_t)
|
||||||
|
-
|
||||||
|
allow dovecot_auth_t dovecot_var_run_t:dir list_dir_perms;
|
||||||
|
manage_sock_files_pattern(dovecot_auth_t, dovecot_var_run_t, dovecot_var_run_t)
|
||||||
|
dovecot_stream_connect_auth(dovecot_auth_t)
|
||||||
|
@@ -197,9 +203,9 @@
|
||||||
|
files_search_pids(dovecot_auth_t)
|
||||||
|
files_read_usr_files(dovecot_auth_t)
|
||||||
|
files_read_usr_symlinks(dovecot_auth_t)
|
||||||
|
+files_read_var_lib_files(dovecot_auth_t)
|
||||||
|
files_search_tmp(dovecot_auth_t)
|
||||||
|
-files_read_var_lib_files(dovecot_t)
|
||||||
|
-
|
||||||
|
+files_search_var_log(dovecot_auth_t)
|
||||||
|
init_rw_utmp(dovecot_auth_t)
|
||||||
|
|
||||||
|
miscfiles_read_localization(dovecot_auth_t)
|
||||||
@@ -220,15 +226,23 @@
|
@@ -220,15 +226,23 @@
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -16761,7 +16826,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/mysq
|
|||||||
## Send a generic signal to MySQL.
|
## Send a generic signal to MySQL.
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/mysql.te serefpolicy-3.7.5/policy/modules/services/mysql.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/mysql.te serefpolicy-3.7.5/policy/modules/services/mysql.te
|
||||||
--- nsaserefpolicy/policy/modules/services/mysql.te 2009-12-18 11:38:25.000000000 -0500
|
--- nsaserefpolicy/policy/modules/services/mysql.te 2009-12-18 11:38:25.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/services/mysql.te 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/services/mysql.te 2009-12-23 12:06:39.000000000 -0500
|
||||||
@@ -1,6 +1,13 @@
|
@@ -1,6 +1,13 @@
|
||||||
|
|
||||||
policy_module(mysql, 1.11.1)
|
policy_module(mysql, 1.11.1)
|
||||||
@ -16788,7 +16853,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/mysq
|
|||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
# because Fedora has the sock_file in the database directory
|
# because Fedora has the sock_file in the database directory
|
||||||
type_transition mysqld_t mysqld_db_t:sock_file mysqld_var_run_t;
|
type_transition mysqld_t mysqld_db_t:sock_file mysqld_var_run_t;
|
||||||
@@ -131,20 +143,22 @@
|
@@ -131,20 +143,24 @@
|
||||||
# Local mysqld_safe policy
|
# Local mysqld_safe policy
|
||||||
#
|
#
|
||||||
|
|
||||||
@ -16806,6 +16871,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/mysq
|
|||||||
|
|
||||||
domain_read_all_domains_state(mysqld_safe_t)
|
domain_read_all_domains_state(mysqld_safe_t)
|
||||||
|
|
||||||
|
+files_dontaudit_search_all_mountpoints(mysqld_safe_t)
|
||||||
|
+
|
||||||
logging_log_filetrans(mysqld_safe_t, mysqld_log_t, file)
|
logging_log_filetrans(mysqld_safe_t, mysqld_log_t, file)
|
||||||
|
|
||||||
kernel_read_system_state(mysqld_safe_t)
|
kernel_read_system_state(mysqld_safe_t)
|
||||||
@ -19336,7 +19403,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
')
|
')
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/policykit.te serefpolicy-3.7.5/policy/modules/services/policykit.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/policykit.te serefpolicy-3.7.5/policy/modules/services/policykit.te
|
||||||
--- nsaserefpolicy/policy/modules/services/policykit.te 2009-11-17 10:54:26.000000000 -0500
|
--- nsaserefpolicy/policy/modules/services/policykit.te 2009-11-17 10:54:26.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/services/policykit.te 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/services/policykit.te 2009-12-23 12:07:18.000000000 -0500
|
||||||
@@ -36,11 +36,12 @@
|
@@ -36,11 +36,12 @@
|
||||||
# policykit local policy
|
# policykit local policy
|
||||||
#
|
#
|
||||||
@ -19354,7 +19421,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
|
|
||||||
policykit_domtrans_auth(policykit_t)
|
policykit_domtrans_auth(policykit_t)
|
||||||
|
|
||||||
@@ -57,32 +58,52 @@
|
@@ -57,10 +58,14 @@
|
||||||
manage_files_pattern(policykit_t, policykit_var_run_t, policykit_var_run_t)
|
manage_files_pattern(policykit_t, policykit_var_run_t, policykit_var_run_t)
|
||||||
files_pid_filetrans(policykit_t, policykit_var_run_t, { file dir })
|
files_pid_filetrans(policykit_t, policykit_var_run_t, { file dir })
|
||||||
|
|
||||||
@ -19363,12 +19430,13 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
|
|
||||||
files_read_etc_files(policykit_t)
|
files_read_etc_files(policykit_t)
|
||||||
files_read_usr_files(policykit_t)
|
files_read_usr_files(policykit_t)
|
||||||
|
+files_dontaudit_search_all_mountpoints(policykit_t)
|
||||||
+fs_list_inotifyfs(policykit_t)
|
|
||||||
+
|
+
|
||||||
|
+fs_list_inotifyfs(policykit_t)
|
||||||
|
|
||||||
auth_use_nsswitch(policykit_t)
|
auth_use_nsswitch(policykit_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(policykit_t)
|
@@ -68,21 +73,38 @@
|
||||||
|
|
||||||
miscfiles_read_localization(policykit_t)
|
miscfiles_read_localization(policykit_t)
|
||||||
|
|
||||||
@ -19411,7 +19479,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
|
|
||||||
rw_files_pattern(policykit_auth_t, policykit_reload_t, policykit_reload_t)
|
rw_files_pattern(policykit_auth_t, policykit_reload_t, policykit_reload_t)
|
||||||
|
|
||||||
@@ -92,21 +113,25 @@
|
@@ -92,21 +114,25 @@
|
||||||
manage_files_pattern(policykit_auth_t, policykit_var_run_t, policykit_var_run_t)
|
manage_files_pattern(policykit_auth_t, policykit_var_run_t, policykit_var_run_t)
|
||||||
files_pid_filetrans(policykit_auth_t, policykit_var_run_t, { file dir })
|
files_pid_filetrans(policykit_auth_t, policykit_var_run_t, { file dir })
|
||||||
|
|
||||||
@ -19440,7 +19508,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
dbus_session_bus_client(policykit_auth_t)
|
dbus_session_bus_client(policykit_auth_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -119,6 +144,14 @@
|
@@ -119,6 +145,14 @@
|
||||||
hal_read_state(policykit_auth_t)
|
hal_read_state(policykit_auth_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -19455,7 +19523,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# polkit_grant local policy
|
# polkit_grant local policy
|
||||||
@@ -126,7 +159,8 @@
|
@@ -126,7 +160,8 @@
|
||||||
|
|
||||||
allow policykit_grant_t self:capability setuid;
|
allow policykit_grant_t self:capability setuid;
|
||||||
allow policykit_grant_t self:process getattr;
|
allow policykit_grant_t self:process getattr;
|
||||||
@ -19465,7 +19533,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
allow policykit_grant_t self:unix_dgram_socket create_socket_perms;
|
allow policykit_grant_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow policykit_grant_t self:unix_stream_socket create_stream_socket_perms;
|
allow policykit_grant_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
|
||||||
@@ -156,9 +190,12 @@
|
@@ -156,9 +191,12 @@
|
||||||
userdom_read_all_users_state(policykit_grant_t)
|
userdom_read_all_users_state(policykit_grant_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -19479,7 +19547,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/poli
|
|||||||
consolekit_dbus_chat(policykit_grant_t)
|
consolekit_dbus_chat(policykit_grant_t)
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
@@ -170,7 +207,8 @@
|
@@ -170,7 +208,8 @@
|
||||||
|
|
||||||
allow policykit_resolve_t self:capability { setuid sys_nice sys_ptrace };
|
allow policykit_resolve_t self:capability { setuid sys_nice sys_ptrace };
|
||||||
allow policykit_resolve_t self:process getattr;
|
allow policykit_resolve_t self:process getattr;
|
||||||
@ -26477,7 +26545,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/xser
|
|||||||
+')
|
+')
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/xserver.te serefpolicy-3.7.5/policy/modules/services/xserver.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/xserver.te serefpolicy-3.7.5/policy/modules/services/xserver.te
|
||||||
--- nsaserefpolicy/policy/modules/services/xserver.te 2009-12-04 09:43:33.000000000 -0500
|
--- nsaserefpolicy/policy/modules/services/xserver.te 2009-12-04 09:43:33.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/services/xserver.te 2009-12-22 09:44:04.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/services/xserver.te 2009-12-23 09:07:52.000000000 -0500
|
||||||
@@ -36,6 +36,13 @@
|
@@ -36,6 +36,13 @@
|
||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
@ -26903,12 +26971,12 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/xser
|
|||||||
|
|
||||||
logging_read_generic_logs(xdm_t)
|
logging_read_generic_logs(xdm_t)
|
||||||
|
|
||||||
+miscfiles_manage_fonts_cache(xserver_t)
|
|
||||||
+miscfiles_search_man_pages(xdm_t)
|
+miscfiles_search_man_pages(xdm_t)
|
||||||
miscfiles_read_localization(xdm_t)
|
miscfiles_read_localization(xdm_t)
|
||||||
miscfiles_read_fonts(xdm_t)
|
miscfiles_read_fonts(xdm_t)
|
||||||
-
|
-
|
||||||
-sysnet_read_config(xdm_t)
|
-sysnet_read_config(xdm_t)
|
||||||
|
+miscfiles_manage_fonts_cache(xdm_t)
|
||||||
+miscfiles_manage_localization(xdm_t)
|
+miscfiles_manage_localization(xdm_t)
|
||||||
+miscfiles_read_hwdata(xdm_t)
|
+miscfiles_read_hwdata(xdm_t)
|
||||||
|
|
||||||
@ -28945,7 +29013,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/kdump.
|
|||||||
+permissive kdump_t;
|
+permissive kdump_t;
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.fc serefpolicy-3.7.5/policy/modules/system/libraries.fc
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.fc serefpolicy-3.7.5/policy/modules/system/libraries.fc
|
||||||
--- nsaserefpolicy/policy/modules/system/libraries.fc 2009-08-14 16:14:31.000000000 -0400
|
--- nsaserefpolicy/policy/modules/system/libraries.fc 2009-08-14 16:14:31.000000000 -0400
|
||||||
+++ serefpolicy-3.7.5/policy/modules/system/libraries.fc 2009-12-23 07:33:05.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/system/libraries.fc 2009-12-23 12:43:23.000000000 -0500
|
||||||
@@ -60,12 +60,15 @@
|
@@ -60,12 +60,15 @@
|
||||||
#
|
#
|
||||||
# /opt
|
# /opt
|
||||||
@ -29161,7 +29229,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/librar
|
|||||||
') dnl end distro_redhat
|
') dnl end distro_redhat
|
||||||
|
|
||||||
#
|
#
|
||||||
@@ -307,10 +316,114 @@
|
@@ -307,10 +316,115 @@
|
||||||
|
|
||||||
/var/mailman/pythonlib(/.*)?/.+\.so(\..*)? -- gen_context(system_u:object_r:lib_t,s0)
|
/var/mailman/pythonlib(/.*)?/.+\.so(\..*)? -- gen_context(system_u:object_r:lib_t,s0)
|
||||||
|
|
||||||
@ -29276,6 +29344,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/librar
|
|||||||
+/usr/local/zend/lib/apache2/libphp5\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
+/usr/local/zend/lib/apache2/libphp5\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
+
|
+
|
||||||
+/usr/lib(64)?/python.*/site-packages/pymedia/muxer\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
+/usr/lib(64)?/python.*/site-packages/pymedia/muxer\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
|
+/usr/local/games/darwinia/lib/libSDL.*\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.if serefpolicy-3.7.5/policy/modules/system/libraries.if
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.if serefpolicy-3.7.5/policy/modules/system/libraries.if
|
||||||
--- nsaserefpolicy/policy/modules/system/libraries.if 2009-07-14 14:19:57.000000000 -0400
|
--- nsaserefpolicy/policy/modules/system/libraries.if 2009-07-14 14:19:57.000000000 -0400
|
||||||
+++ serefpolicy-3.7.5/policy/modules/system/libraries.if 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/system/libraries.if 2009-12-21 13:07:09.000000000 -0500
|
||||||
@ -34735,7 +34804,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.if
|
|||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.te serefpolicy-3.7.5/policy/modules/system/xen.te
|
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.te serefpolicy-3.7.5/policy/modules/system/xen.te
|
||||||
--- nsaserefpolicy/policy/modules/system/xen.te 2009-11-25 11:47:19.000000000 -0500
|
--- nsaserefpolicy/policy/modules/system/xen.te 2009-11-25 11:47:19.000000000 -0500
|
||||||
+++ serefpolicy-3.7.5/policy/modules/system/xen.te 2009-12-21 13:07:09.000000000 -0500
|
+++ serefpolicy-3.7.5/policy/modules/system/xen.te 2009-12-23 08:58:19.000000000 -0500
|
||||||
@@ -85,6 +85,7 @@
|
@@ -85,6 +85,7 @@
|
||||||
type xenconsoled_t;
|
type xenconsoled_t;
|
||||||
type xenconsoled_exec_t;
|
type xenconsoled_exec_t;
|
||||||
@ -34752,7 +34821,16 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.te
|
|||||||
|
|
||||||
storage_raw_read_fixed_disk(xend_t)
|
storage_raw_read_fixed_disk(xend_t)
|
||||||
storage_raw_write_fixed_disk(xend_t)
|
storage_raw_write_fixed_disk(xend_t)
|
||||||
@@ -421,6 +423,12 @@
|
@@ -340,6 +342,8 @@
|
||||||
|
|
||||||
|
files_read_usr_files(xenstored_t)
|
||||||
|
|
||||||
|
+fs_search_xenfs(xenstored_t)
|
||||||
|
+
|
||||||
|
storage_raw_read_fixed_disk(xenstored_t)
|
||||||
|
storage_raw_write_fixed_disk(xenstored_t)
|
||||||
|
storage_raw_read_removable_device(xenstored_t)
|
||||||
|
@@ -421,6 +425,12 @@
|
||||||
xen_stream_connect_xenstore(xm_t)
|
xen_stream_connect_xenstore(xm_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -34765,7 +34843,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/xen.te
|
|||||||
virt_manage_images(xm_t)
|
virt_manage_images(xm_t)
|
||||||
virt_stream_connect(xm_t)
|
virt_stream_connect(xm_t)
|
||||||
')
|
')
|
||||||
@@ -438,6 +446,8 @@
|
@@ -438,6 +448,8 @@
|
||||||
fs_manage_xenfs_dirs(xm_ssh_t)
|
fs_manage_xenfs_dirs(xm_ssh_t)
|
||||||
fs_manage_xenfs_files(xm_ssh_t)
|
fs_manage_xenfs_files(xm_ssh_t)
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
t%define distro redhat
|
%define distro redhat
|
||||||
%define polyinstatiate n
|
%define polyinstatiate n
|
||||||
%define monolithic n
|
%define monolithic n
|
||||||
%if %{?BUILD_TARGETED:0}%{!?BUILD_TARGETED:1}
|
%if %{?BUILD_TARGETED:0}%{!?BUILD_TARGETED:1}
|
||||||
|
Loading…
Reference in New Issue
Block a user