* Tue May 24 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-191
- Label /usr/share/ovirt-guest-agent/ovirt-guest-agent.py as rhev_agentd_exec_t - Allow dnssec_trigger_t to create lnk_file labeled as dnssec_trigger_var_run_t. BZ(1335954) - Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus. - Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t. - Merge pull request #122 from NetworkManager/th/nm-dnsmasq-dbus - Merge pull request #125 from rhatdan/typebounds - Typebounds user domains - Allow systemd_resolved_t to check if ipv6 is disabled. - systemd added a new directory for unit files /run/systemd/transient. It should be labelled system_u:object_r:systemd_unit_file_t:s0, the same as /run/systemd/system, PID 1 will write units there. Resolves: #120 - Label /dev/xen/privcmd as xen_device_t. BZ(1334115)
This commit is contained in:
parent
5e78b00393
commit
4c0ceef239
Binary file not shown.
@ -6288,7 +6288,7 @@ index 3f6e168..340e49f 100644
|
||||
')
|
||||
|
||||
diff --git a/policy/modules/kernel/devices.fc b/policy/modules/kernel/devices.fc
|
||||
index b31c054..50a45cf 100644
|
||||
index b31c054..012cc6f 100644
|
||||
--- a/policy/modules/kernel/devices.fc
|
||||
+++ b/policy/modules/kernel/devices.fc
|
||||
@@ -15,15 +15,18 @@
|
||||
@ -6396,7 +6396,7 @@ index b31c054..50a45cf 100644
|
||||
/dev/card.* -c gen_context(system_u:object_r:xserver_misc_device_t,s0)
|
||||
/dev/cmx.* -c gen_context(system_u:object_r:smartcard_device_t,s0)
|
||||
|
||||
@@ -172,11 +193,16 @@ ifdef(`distro_suse', `
|
||||
@@ -172,15 +193,21 @@ ifdef(`distro_suse', `
|
||||
/dev/touchscreen/ucb1x00 -c gen_context(system_u:object_r:mouse_device_t,s0)
|
||||
/dev/touchscreen/mk712 -c gen_context(system_u:object_r:mouse_device_t,s0)
|
||||
|
||||
@ -6413,7 +6413,12 @@ index b31c054..50a45cf 100644
|
||||
/dev/xen/blktap.* -c gen_context(system_u:object_r:xen_device_t,s0)
|
||||
/dev/xen/evtchn -c gen_context(system_u:object_r:xen_device_t,s0)
|
||||
/dev/xen/gntdev -c gen_context(system_u:object_r:xen_device_t,s0)
|
||||
@@ -198,12 +224,27 @@ ifdef(`distro_debian',`
|
||||
/dev/xen/gntalloc -c gen_context(system_u:object_r:xen_device_t,s0)
|
||||
+/dev/xen/privcmd -c gen_context(system_u:object_r:xen_device_t,s0)
|
||||
|
||||
ifdef(`distro_debian',`
|
||||
# this is a static /dev dir "backup mount"
|
||||
@@ -198,12 +225,27 @@ ifdef(`distro_debian',`
|
||||
/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0)
|
||||
/lib/udev/devices/zero -c gen_context(system_u:object_r:zero_device_t,s0)
|
||||
|
||||
@ -6444,7 +6449,7 @@ index b31c054..50a45cf 100644
|
||||
+/usr/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0)
|
||||
+/usr/lib/udev/devices/zero -c gen_context(system_u:object_r:zero_device_t,s0)
|
||||
diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
|
||||
index 76f285e..c542dd3 100644
|
||||
index 76f285e..5cd2702 100644
|
||||
--- a/policy/modules/kernel/devices.if
|
||||
+++ b/policy/modules/kernel/devices.if
|
||||
@@ -143,13 +143,32 @@ interface(`dev_relabel_all_dev_nodes',`
|
||||
@ -8716,7 +8721,7 @@ index 76f285e..c542dd3 100644
|
||||
## Read and write to the zero device (/dev/zero).
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
@@ -4851,3 +5915,1019 @@ interface(`dev_unconfined',`
|
||||
@@ -4851,3 +5915,1020 @@ interface(`dev_unconfined',`
|
||||
|
||||
typeattribute $1 devices_unconfined_type;
|
||||
')
|
||||
@ -9619,6 +9624,7 @@ index 76f285e..c542dd3 100644
|
||||
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "blktap9")
|
||||
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "gntdev")
|
||||
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "gntalloc")
|
||||
+ filetrans_pattern($1, device_t, xen_device_t, chr_file, "privcmd")
|
||||
+ filetrans_pattern($1, device_t, sound_device_t, chr_file, "controlC0")
|
||||
+ filetrans_pattern($1, device_t, sound_device_t, chr_file, "controlC1")
|
||||
+ filetrans_pattern($1, device_t, sound_device_t, chr_file, "controlC2")
|
||||
@ -46330,10 +46336,10 @@ index a392fc4..78fa512 100644
|
||||
+')
|
||||
diff --git a/policy/modules/system/systemd.fc b/policy/modules/system/systemd.fc
|
||||
new file mode 100644
|
||||
index 0000000..0e4185f
|
||||
index 0000000..6cf3942
|
||||
--- /dev/null
|
||||
+++ b/policy/modules/system/systemd.fc
|
||||
@@ -0,0 +1,68 @@
|
||||
@@ -0,0 +1,69 @@
|
||||
+HOME_DIR/\.local/share/systemd(/.*)? gen_context(system_u:object_r:systemd_home_t,s0)
|
||||
+/root/\.local/share/systemd(/.*)? gen_context(system_u:object_r:systemd_home_t,s0)
|
||||
+
|
||||
@ -46356,6 +46362,7 @@ index 0000000..0e4185f
|
||||
+
|
||||
+/usr/lib/dracut/modules.d/.*\.service gen_context(system_u:object_r:systemd_unit_file_t,s0)
|
||||
+/usr/lib/systemd/system(/.*)? gen_context(system_u:object_r:systemd_unit_file_t,s0)
|
||||
+/run/systemd/transient(/.*)? gen_context(system_u:object_r:systemd_unit_file_t,s0)
|
||||
+/usr/lib/systemd/system/systemd-machined\.service -- gen_context(system_u:object_r:systemd_machined_unit_file_t,s0)
|
||||
+/usr/lib/systemd/system/systemd-networkd\.service gen_context(system_u:object_r:systemd_networkd_unit_file_t,s0)
|
||||
+/usr/lib/systemd/system/systemd-resolved\.service gen_context(system_u:object_r:systemd_resolved_unit_file_t,s0)
|
||||
@ -48126,10 +48133,10 @@ index 0000000..ebd6cc8
|
||||
+')
|
||||
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
||||
new file mode 100644
|
||||
index 0000000..6c16f21
|
||||
index 0000000..f799c5b
|
||||
--- /dev/null
|
||||
+++ b/policy/modules/system/systemd.te
|
||||
@@ -0,0 +1,928 @@
|
||||
@@ -0,0 +1,929 @@
|
||||
+policy_module(systemd, 1.0.0)
|
||||
+
|
||||
+#######################################
|
||||
@ -49012,6 +49019,7 @@ index 0000000..6c16f21
|
||||
+corenet_udp_bind_llmnr_port(systemd_resolved_t)
|
||||
+
|
||||
+dev_write_kmsg(systemd_resolved_t)
|
||||
+dev_read_sysfs(systemd_resolved_t)
|
||||
+
|
||||
+sysnet_manage_config(systemd_resolved_t)
|
||||
+
|
||||
|
@ -25419,7 +25419,7 @@ index 23ab808..84735a8 100644
|
||||
+/var/run/dnsmasq.* gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
|
||||
/var/run/libvirt/network(/.*)? gen_context(system_u:object_r:dnsmasq_var_run_t,s0)
|
||||
diff --git a/dnsmasq.if b/dnsmasq.if
|
||||
index 19aa0b8..45c70c1 100644
|
||||
index 19aa0b8..a79982c 100644
|
||||
--- a/dnsmasq.if
|
||||
+++ b/dnsmasq.if
|
||||
@@ -10,7 +10,6 @@
|
||||
@ -25666,7 +25666,7 @@ index 19aa0b8..45c70c1 100644
|
||||
init_labeled_script_domtrans($1, dnsmasq_initrc_exec_t)
|
||||
domain_system_change_exemption($1)
|
||||
role_transition $2 dnsmasq_initrc_exec_t system_r;
|
||||
@@ -281,9 +395,13 @@ interface(`dnsmasq_admin',`
|
||||
@@ -281,9 +395,36 @@ interface(`dnsmasq_admin',`
|
||||
files_list_var_lib($1)
|
||||
admin_pattern($1, dnsmasq_lease_t)
|
||||
|
||||
@ -25680,9 +25680,32 @@ index 19aa0b8..45c70c1 100644
|
||||
+ dnsmasq_systemctl($1)
|
||||
+ admin_pattern($1, dnsmasq_unit_file_t)
|
||||
+ allow $1 dnsmasq_unit_file_t:service all_service_perms;
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+## <summary>
|
||||
+## Send and receive messages from
|
||||
+## dnsmasq over dbus.
|
||||
+## </summary>
|
||||
+## <param name="domain">
|
||||
+## <summary>
|
||||
+## Domain allowed access.
|
||||
+## </summary>
|
||||
+## </param>
|
||||
+#
|
||||
+interface(`dnsmasq_dbus_chat',`
|
||||
+ gen_require(`
|
||||
+ type dnsmasq_t;
|
||||
+ class dbus send_msg;
|
||||
+ ')
|
||||
+
|
||||
+ allow $1 dnsmasq_t:dbus send_msg;
|
||||
+ allow dnsmasq_t $1:dbus send_msg;
|
||||
')
|
||||
+
|
||||
+
|
||||
diff --git a/dnsmasq.te b/dnsmasq.te
|
||||
index 37a3b7b..921056a 100644
|
||||
index 37a3b7b..0a64088 100644
|
||||
--- a/dnsmasq.te
|
||||
+++ b/dnsmasq.te
|
||||
@@ -24,6 +24,9 @@ logging_log_file(dnsmasq_var_log_t)
|
||||
@ -25731,7 +25754,7 @@ index 37a3b7b..921056a 100644
|
||||
|
||||
userdom_dontaudit_use_unpriv_user_fds(dnsmasq_t)
|
||||
userdom_dontaudit_search_user_home_dirs(dnsmasq_t)
|
||||
@@ -98,12 +105,21 @@ optional_policy(`
|
||||
@@ -98,12 +105,25 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -25741,20 +25764,24 @@ index 37a3b7b..921056a 100644
|
||||
+optional_policy(`
|
||||
dbus_connect_system_bus(dnsmasq_t)
|
||||
dbus_system_bus_client(dnsmasq_t)
|
||||
+
|
||||
+ optional_policy(`
|
||||
+ networkmanager_dbus_chat(dnsmasq_t)
|
||||
+ ')
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ dnsmasq_domtrans(dnsmasq_t)
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
- networkmanager_read_pid_files(dnsmasq_t)
|
||||
+ dnsmasq_domtrans(dnsmasq_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ networkmanager_read_conf(dnsmasq_t)
|
||||
+ networkmanager_manage_pid_files(dnsmasq_t)
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -124,6 +140,14 @@ optional_policy(`
|
||||
@@ -124,6 +144,14 @@ optional_policy(`
|
||||
|
||||
optional_policy(`
|
||||
virt_manage_lib_files(dnsmasq_t)
|
||||
@ -25912,10 +25939,10 @@ index 0000000..d22ed69
|
||||
+')
|
||||
diff --git a/dnssec.te b/dnssec.te
|
||||
new file mode 100644
|
||||
index 0000000..181a31b
|
||||
index 0000000..f186d85
|
||||
--- /dev/null
|
||||
+++ b/dnssec.te
|
||||
@@ -0,0 +1,87 @@
|
||||
@@ -0,0 +1,88 @@
|
||||
+policy_module(dnssec, 1.0.0)
|
||||
+
|
||||
+########################################
|
||||
@ -25949,8 +25976,9 @@ index 0000000..181a31b
|
||||
+
|
||||
+manage_dirs_pattern(dnssec_trigger_t, dnssec_trigger_var_run_t, dnssec_trigger_var_run_t)
|
||||
+manage_files_pattern(dnssec_trigger_t, dnssec_trigger_var_run_t, dnssec_trigger_var_run_t)
|
||||
+manage_lnk_files_pattern(dnssec_trigger_t, dnssec_trigger_var_run_t, dnssec_trigger_var_run_t)
|
||||
+allow dnssec_trigger_t dnssec_trigger_var_run_t:file relabelfrom_file_perms;
|
||||
+files_pid_filetrans(dnssec_trigger_t, dnssec_trigger_var_run_t, { dir file })
|
||||
+files_pid_filetrans(dnssec_trigger_t, dnssec_trigger_var_run_t, { dir file lnk_file })
|
||||
+
|
||||
+manage_files_pattern(dnssec_trigger_t,dnssec_trigger_tmp_t,dnssec_trigger_tmp_t)
|
||||
+manage_dirs_pattern(dnssec_trigger_t,dnssec_trigger_tmp_t,dnssec_trigger_tmp_t)
|
||||
@ -31935,10 +31963,10 @@ index 0000000..764ae00
|
||||
+
|
||||
diff --git a/glusterd.te b/glusterd.te
|
||||
new file mode 100644
|
||||
index 0000000..59e84ca
|
||||
index 0000000..33654d5
|
||||
--- /dev/null
|
||||
+++ b/glusterd.te
|
||||
@@ -0,0 +1,295 @@
|
||||
@@ -0,0 +1,297 @@
|
||||
+policy_module(glusterd, 1.1.3)
|
||||
+
|
||||
+## <desc>
|
||||
@ -32176,6 +32204,7 @@ index 0000000..59e84ca
|
||||
+optional_policy(`
|
||||
+ dbus_system_bus_client(glusterd_t)
|
||||
+ dbus_connect_system_bus(glusterd_t)
|
||||
+ unconfined_dbus_chat(glusterd_t)
|
||||
+
|
||||
+ optional_policy(`
|
||||
+ policykit_dbus_chat(glusterd_t)
|
||||
@ -32221,6 +32250,7 @@ index 0000000..59e84ca
|
||||
+ rpc_domtrans_nfsd(glusterd_t)
|
||||
+ rpc_domtrans_rpcd(glusterd_t)
|
||||
+ rpc_manage_nfs_state_data(glusterd_t)
|
||||
+ rpc_manage_nfs_state_data_dir(glusterd_t)
|
||||
+ rpcbind_stream_connect(glusterd_t)
|
||||
+')
|
||||
+
|
||||
@ -58382,7 +58412,7 @@ index 86dc29d..7380935 100644
|
||||
+ logging_log_filetrans($1, NetworkManager_var_lib_t, file, "wpa_supplicant.log")
|
||||
')
|
||||
diff --git a/networkmanager.te b/networkmanager.te
|
||||
index 55f2009..2646460 100644
|
||||
index 55f2009..ab2d757 100644
|
||||
--- a/networkmanager.te
|
||||
+++ b/networkmanager.te
|
||||
@@ -9,15 +9,18 @@ type NetworkManager_t;
|
||||
@ -58640,7 +58670,7 @@ index 55f2009..2646460 100644
|
||||
consoletype_exec(NetworkManager_t)
|
||||
')
|
||||
|
||||
@@ -210,16 +260,11 @@ optional_policy(`
|
||||
@@ -210,31 +260,34 @@ optional_policy(`
|
||||
optional_policy(`
|
||||
dbus_system_domain(NetworkManager_t, NetworkManager_exec_t)
|
||||
|
||||
@ -58659,7 +58689,12 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
')
|
||||
|
||||
@@ -231,10 +276,17 @@ optional_policy(`
|
||||
optional_policy(`
|
||||
dnsmasq_read_pid_files(NetworkManager_t)
|
||||
+ dnsmasq_dbus_chat(NetworkManager_t)
|
||||
dnsmasq_delete_pid_files(NetworkManager_t)
|
||||
dnsmasq_domtrans(NetworkManager_t)
|
||||
dnsmasq_initrc_domtrans(NetworkManager_t)
|
||||
dnsmasq_kill(NetworkManager_t)
|
||||
dnsmasq_signal(NetworkManager_t)
|
||||
dnsmasq_signull(NetworkManager_t)
|
||||
@ -58678,7 +58713,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -246,10 +298,26 @@ optional_policy(`
|
||||
@@ -246,10 +299,26 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -58705,7 +58740,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -257,15 +325,19 @@ optional_policy(`
|
||||
@@ -257,15 +326,19 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -58727,7 +58762,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -274,10 +346,17 @@ optional_policy(`
|
||||
@@ -274,10 +347,17 @@ optional_policy(`
|
||||
nscd_signull(NetworkManager_t)
|
||||
nscd_kill(NetworkManager_t)
|
||||
nscd_initrc_domtrans(NetworkManager_t)
|
||||
@ -58745,7 +58780,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -286,9 +365,12 @@ optional_policy(`
|
||||
@@ -286,9 +366,12 @@ optional_policy(`
|
||||
openvpn_kill(NetworkManager_t)
|
||||
openvpn_signal(NetworkManager_t)
|
||||
openvpn_signull(NetworkManager_t)
|
||||
@ -58758,7 +58793,7 @@ index 55f2009..2646460 100644
|
||||
policykit_domtrans_auth(NetworkManager_t)
|
||||
policykit_read_lib(NetworkManager_t)
|
||||
policykit_read_reload(NetworkManager_t)
|
||||
@@ -296,7 +378,7 @@ optional_policy(`
|
||||
@@ -296,7 +379,7 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -58767,7 +58802,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -307,6 +389,7 @@ optional_policy(`
|
||||
@@ -307,6 +390,7 @@ optional_policy(`
|
||||
ppp_signal(NetworkManager_t)
|
||||
ppp_signull(NetworkManager_t)
|
||||
ppp_read_config(NetworkManager_t)
|
||||
@ -58775,7 +58810,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -320,14 +403,21 @@ optional_policy(`
|
||||
@@ -320,14 +404,21 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -58802,7 +58837,7 @@ index 55f2009..2646460 100644
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -338,6 +428,13 @@ optional_policy(`
|
||||
@@ -338,6 +429,13 @@ optional_policy(`
|
||||
vpn_relabelfrom_tun_socket(NetworkManager_t)
|
||||
')
|
||||
|
||||
@ -58816,7 +58851,7 @@ index 55f2009..2646460 100644
|
||||
########################################
|
||||
#
|
||||
# wpa_cli local policy
|
||||
@@ -357,6 +454,4 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
|
||||
@@ -357,6 +455,4 @@ rw_sock_files_pattern(wpa_cli_t, NetworkManager_var_run_t, NetworkManager_var_ru
|
||||
init_dontaudit_use_fds(wpa_cli_t)
|
||||
init_use_script_ptys(wpa_cli_t)
|
||||
|
||||
@ -86765,15 +86800,16 @@ index 6cf79c4..1a605f9 100644
|
||||
')
|
||||
diff --git a/rhev.fc b/rhev.fc
|
||||
new file mode 100644
|
||||
index 0000000..4b66adf
|
||||
index 0000000..013d1d9
|
||||
--- /dev/null
|
||||
+++ b/rhev.fc
|
||||
@@ -0,0 +1,13 @@
|
||||
@@ -0,0 +1,14 @@
|
||||
+/usr/share/rhev-agent/rhev-agentd\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
|
||||
+/usr/share/ovirt-guest-agent -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
|
||||
+
|
||||
+/usr/share/rhev-agent/LockActiveSession\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
|
||||
+/usr/share/ovirt-guest-agent/LockActiveSession\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
|
||||
+/usr/share/ovirt-guest-agent/ovirt-guest-agent\.py -- gen_context(system_u:object_r:rhev_agentd_exec_t,s0)
|
||||
+
|
||||
+/usr/lib/systemd/system/ovirt-guest-agent.* -- gen_context(system_u:object_r:rhev_agentd_unit_file_t,s0)
|
||||
+
|
||||
@ -88928,7 +88964,7 @@ index a6fb30c..38a2f09 100644
|
||||
+/var/run/rpc\.statd\.pid -- gen_context(system_u:object_r:rpcd_var_run_t,s0)
|
||||
+
|
||||
diff --git a/rpc.if b/rpc.if
|
||||
index 0bf13c2..4f3c2b9 100644
|
||||
index 0bf13c2..ed393a0 100644
|
||||
--- a/rpc.if
|
||||
+++ b/rpc.if
|
||||
@@ -1,4 +1,4 @@
|
||||
@ -89240,7 +89276,7 @@ index 0bf13c2..4f3c2b9 100644
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
@@ -326,12 +345,31 @@ interface(`rpc_search_nfs_state_data',`
|
||||
@@ -326,12 +345,50 @@ interface(`rpc_search_nfs_state_data',`
|
||||
')
|
||||
|
||||
files_search_var_lib($1)
|
||||
@ -89270,11 +89306,30 @@ index 0bf13c2..4f3c2b9 100644
|
||||
+
|
||||
+########################################
|
||||
+## <summary>
|
||||
+## Manage NFS state data in /var/lib/nfs.
|
||||
+## </summary>
|
||||
+## <param name="domain">
|
||||
+## <summary>
|
||||
+## Domain allowed access.
|
||||
+## </summary>
|
||||
+## </param>
|
||||
+#
|
||||
+interface(`rpc_manage_nfs_state_data_dir',`
|
||||
+ gen_require(`
|
||||
+ type var_lib_nfs_t;
|
||||
+ ')
|
||||
+
|
||||
+ files_search_var_lib($1)
|
||||
+ allow $1 var_lib_nfs_t:dir manage_dir_perms;
|
||||
+')
|
||||
+
|
||||
+########################################
|
||||
+## <summary>
|
||||
+## Read NFS state data in /var/lib/nfs.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
@@ -350,8 +388,7 @@ interface(`rpc_read_nfs_state_data',`
|
||||
@@ -350,8 +407,7 @@ interface(`rpc_read_nfs_state_data',`
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
@ -89284,7 +89339,7 @@ index 0bf13c2..4f3c2b9 100644
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
@@ -366,31 +403,68 @@ interface(`rpc_manage_nfs_state_data',`
|
||||
@@ -366,31 +422,68 @@ interface(`rpc_manage_nfs_state_data',`
|
||||
|
||||
files_search_var_lib($1)
|
||||
manage_files_pattern($1, var_lib_nfs_t, var_lib_nfs_t)
|
||||
@ -89359,7 +89414,7 @@ index 0bf13c2..4f3c2b9 100644
|
||||
')
|
||||
|
||||
allow $1 rpc_domain:process { ptrace signal_perms };
|
||||
@@ -411,7 +485,7 @@ interface(`rpc_admin',`
|
||||
@@ -411,7 +504,7 @@ interface(`rpc_admin',`
|
||||
admin_pattern($1, rpcd_var_run_t)
|
||||
|
||||
files_list_all($1)
|
||||
|
@ -19,7 +19,7 @@
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 3.13.1
|
||||
Release: 190%{?dist}
|
||||
Release: 191%{?dist}
|
||||
License: GPLv2+
|
||||
Group: System Environment/Base
|
||||
Source: serefpolicy-%{version}.tgz
|
||||
@ -647,6 +647,18 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Tue May 24 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-191
|
||||
- Label /usr/share/ovirt-guest-agent/ovirt-guest-agent.py as rhev_agentd_exec_t
|
||||
- Allow dnssec_trigger_t to create lnk_file labeled as dnssec_trigger_var_run_t. BZ(1335954)
|
||||
- Allow ganesha-ha.sh script running under unconfined_t domain communicate with glusterd_t domains via dbus.
|
||||
- Allow ganesha daemon labeled as glusterd_t create /var/lib/nfs/ganesha dir labeled as var_lib_nfs_t.
|
||||
- Merge pull request #122 from NetworkManager/th/nm-dnsmasq-dbus
|
||||
- Merge pull request #125 from rhatdan/typebounds
|
||||
- Typebounds user domains
|
||||
- Allow systemd_resolved_t to check if ipv6 is disabled.
|
||||
- systemd added a new directory for unit files /run/systemd/transient. It should be labelled system_u:object_r:systemd_unit_file_t:s0, the same as /run/systemd/system, PID 1 will write units there. Resolves: #120
|
||||
- Label /dev/xen/privcmd as xen_device_t. BZ(1334115)
|
||||
|
||||
* Mon May 16 2016 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-190
|
||||
- Label /var/log/ganesha.log as gluster_log_t Allow glusterd_t domain to create glusterd_log_t files. Label /var/run/ganesha.pid as gluster_var_run_t.
|
||||
- Allow zabbix to connect to postgresql port
|
||||
|
Loading…
Reference in New Issue
Block a user