+- Add labeling for udisks2
+- Allow fsadmin to communicate with the systemd process
This commit is contained in:
parent
8cd443307d
commit
75a7b93abc
@ -28276,7 +28276,7 @@ index de0bd67..1df2048 100644
|
||||
domain_system_change_exemption($1)
|
||||
role_transition $2 bitlbee_initrc_exec_t system_r;
|
||||
diff --git a/policy/modules/services/bitlbee.te b/policy/modules/services/bitlbee.te
|
||||
index f4e7ad3..6b577c2 100644
|
||||
index f4e7ad3..8ca4f90 100644
|
||||
--- a/policy/modules/services/bitlbee.te
|
||||
+++ b/policy/modules/services/bitlbee.te
|
||||
@@ -22,29 +22,47 @@ files_tmp_file(bitlbee_tmp_t)
|
||||
@ -28287,7 +28287,7 @@ index f4e7ad3..6b577c2 100644
|
||||
+logging_log_file(bitlbee_log_t)
|
||||
+
|
||||
+type bitlbee_var_run_t;
|
||||
+files_type(bitlbee_var_run_t)
|
||||
+files_pid_file(bitlbee_var_run_t)
|
||||
+
|
||||
########################################
|
||||
#
|
||||
@ -35682,29 +35682,34 @@ index 8ba9425..555058a 100644
|
||||
+ gnome_dontaudit_search_config(denyhosts_t)
|
||||
+')
|
||||
diff --git a/policy/modules/services/devicekit.fc b/policy/modules/services/devicekit.fc
|
||||
index 418a5a0..1041039 100644
|
||||
index 418a5a0..d13814e 100644
|
||||
--- a/policy/modules/services/devicekit.fc
|
||||
+++ b/policy/modules/services/devicekit.fc
|
||||
@@ -1,3 +1,7 @@
|
||||
@@ -1,3 +1,8 @@
|
||||
+/lib/udev/udisks-part-id -- gen_context(system_u:object_r:devicekit_disk_exec_t,s0)
|
||||
+/lib/udisks2/udisksd -- gen_context(system_u:object_r:devicekit_disk_exec_t,s0)
|
||||
+
|
||||
+/usr/lib/udev/udisks-part-id -- gen_context(system_u:object_r:devicekit_disk_exec_t,s0)
|
||||
+
|
||||
/usr/libexec/devkit-daemon -- gen_context(system_u:object_r:devicekit_exec_t,s0)
|
||||
/usr/libexec/devkit-disks-daemon -- gen_context(system_u:object_r:devicekit_disk_exec_t,s0)
|
||||
/usr/libexec/devkit-power-daemon -- gen_context(system_u:object_r:devicekit_power_exec_t,s0)
|
||||
@@ -8,7 +12,12 @@
|
||||
/var/lib/upower(/.*)? gen_context(system_u:object_r:devicekit_var_lib_t,s0)
|
||||
/var/lib/udisks(/.*)? gen_context(system_u:object_r:devicekit_var_lib_t,s0)
|
||||
@@ -6,9 +11,14 @@
|
||||
|
||||
/var/lib/DeviceKit-.* gen_context(system_u:object_r:devicekit_var_lib_t,s0)
|
||||
/var/lib/upower(/.*)? gen_context(system_u:object_r:devicekit_var_lib_t,s0)
|
||||
-/var/lib/udisks(/.*)? gen_context(system_u:object_r:devicekit_var_lib_t,s0)
|
||||
+/var/lib/udisks.* gen_context(system_u:object_r:devicekit_var_lib_t,s0)
|
||||
+
|
||||
+/var/log/pm-powersave\.log -- gen_context(system_u:object_r:devicekit_var_log_t,s0)
|
||||
+/var/log/pm-suspend\.log -- gen_context(system_u:object_r:devicekit_var_log_t,s0)
|
||||
+
|
||||
|
||||
/var/run/devkit(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
/var/run/DeviceKit-disks(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
-/var/run/udisks(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
+/var/run/pm-utils(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
+
|
||||
/var/run/udisks(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
+/var/run/udisks.* gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
/var/run/upower(/.*)? gen_context(system_u:object_r:devicekit_var_run_t,s0)
|
||||
diff --git a/policy/modules/services/devicekit.if b/policy/modules/services/devicekit.if
|
||||
index f706b99..d41e4fe 100644
|
||||
@ -71330,7 +71335,7 @@ index a97a096..368d3c2 100644
|
||||
|
||||
/var/log/fsck(/.*)? gen_context(system_u:object_r:fsadm_log_t,s0)
|
||||
diff --git a/policy/modules/system/fstools.te b/policy/modules/system/fstools.te
|
||||
index c28da1c..10bc43c 100644
|
||||
index c28da1c..1c68a7f 100644
|
||||
--- a/policy/modules/system/fstools.te
|
||||
+++ b/policy/modules/system/fstools.te
|
||||
@@ -44,6 +44,8 @@ can_exec(fsadm_t, fsadm_exec_t)
|
||||
@ -71368,7 +71373,7 @@ index c28da1c..10bc43c 100644
|
||||
mls_file_read_all_levels(fsadm_t)
|
||||
mls_file_write_all_levels(fsadm_t)
|
||||
|
||||
@@ -133,10 +142,12 @@ storage_raw_write_fixed_disk(fsadm_t)
|
||||
@@ -133,13 +142,16 @@ storage_raw_write_fixed_disk(fsadm_t)
|
||||
storage_raw_read_removable_device(fsadm_t)
|
||||
storage_raw_write_removable_device(fsadm_t)
|
||||
storage_read_scsi_generic(fsadm_t)
|
||||
@ -71381,7 +71386,11 @@ index c28da1c..10bc43c 100644
|
||||
init_use_fds(fsadm_t)
|
||||
init_use_script_ptys(fsadm_t)
|
||||
init_dontaudit_getattr_initctl(fsadm_t)
|
||||
@@ -147,7 +158,7 @@ miscfiles_read_localization(fsadm_t)
|
||||
+init_stream_connect(fsadm_t)
|
||||
|
||||
logging_send_syslog_msg(fsadm_t)
|
||||
|
||||
@@ -147,7 +159,7 @@ miscfiles_read_localization(fsadm_t)
|
||||
|
||||
seutil_read_config(fsadm_t)
|
||||
|
||||
@ -71390,7 +71399,7 @@ index c28da1c..10bc43c 100644
|
||||
|
||||
ifdef(`distro_redhat',`
|
||||
optional_policy(`
|
||||
@@ -166,6 +177,11 @@ optional_policy(`
|
||||
@@ -166,6 +178,11 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -71402,7 +71411,7 @@ index c28da1c..10bc43c 100644
|
||||
hal_dontaudit_write_log(fsadm_t)
|
||||
')
|
||||
|
||||
@@ -192,6 +208,10 @@ optional_policy(`
|
||||
@@ -192,6 +209,10 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -77109,13 +77118,13 @@ index 4d06ae3..e81b7ac 100644
|
||||
seutil_sigchld_newrole(cardmgr_t)
|
||||
')
|
||||
diff --git a/policy/modules/system/raid.fc b/policy/modules/system/raid.fc
|
||||
index ed9c70d..480267e 100644
|
||||
index ed9c70d..c298507 100644
|
||||
--- a/policy/modules/system/raid.fc
|
||||
+++ b/policy/modules/system/raid.fc
|
||||
@@ -1,6 +1,14 @@
|
||||
-/dev/.mdadm.map -- gen_context(system_u:object_r:mdadm_map_t,s0)
|
||||
+/dev/.mdadm\.map -- gen_context(system_u:object_r:mdadm_var_run_t,s0)
|
||||
+/dev/md(/.*)? gen_context(system_u:object_r:mdadm_var_run_t,s0)
|
||||
+/dev/md/.* -- gen_context(system_u:object_r:mdadm_var_run_t,s0)
|
||||
|
||||
/sbin/mdadm -- gen_context(system_u:object_r:mdadm_exec_t,s0)
|
||||
/sbin/mdmpd -- gen_context(system_u:object_r:mdadm_exec_t,s0)
|
||||
@ -79439,10 +79448,10 @@ index 0000000..19ba4e1
|
||||
+
|
||||
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
|
||||
new file mode 100644
|
||||
index 0000000..115f05e
|
||||
index 0000000..6677509
|
||||
--- /dev/null
|
||||
+++ b/policy/modules/system/systemd.te
|
||||
@@ -0,0 +1,387 @@
|
||||
@@ -0,0 +1,393 @@
|
||||
+policy_module(systemd, 1.0.0)
|
||||
+
|
||||
+#######################################
|
||||
@ -79549,9 +79558,6 @@ index 0000000..115f05e
|
||||
+
|
||||
+authlogin_read_state(systemd_logind_t)
|
||||
+
|
||||
+dbus_connect_system_bus(systemd_logind_t)
|
||||
+dbus_system_bus_client(systemd_logind_t)
|
||||
+
|
||||
+init_dbus_chat(systemd_logind_t)
|
||||
+init_dbus_chat_script(systemd_logind_t)
|
||||
+init_read_script_state(systemd_logind_t)
|
||||
@ -79576,6 +79582,15 @@ index 0000000..115f05e
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ dbus_connect_system_bus(systemd_logind_t)
|
||||
+ dbus_system_bus_client(systemd_logind_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ devicekit_dbus_chat_power(systemd_logind_t)
|
||||
+')
|
||||
+
|
||||
+optional_policy(`
|
||||
+ # we label /run/user/$USER/dconf as config_home_t
|
||||
+ gnome_manage_home_config_dirs(systemd_logind_t)
|
||||
+ gnome_manage_home_config(systemd_logind_t)
|
||||
|
@ -16,7 +16,7 @@
|
||||
Summary: SELinux policy configuration
|
||||
Name: selinux-policy
|
||||
Version: 3.10.0
|
||||
Release: 77%{?dist}
|
||||
Release: 78%{?dist}
|
||||
License: GPLv2+
|
||||
Group: System Environment/Base
|
||||
Source: serefpolicy-%{version}.tgz
|
||||
@ -471,6 +471,10 @@ SELinux Reference policy mls base module.
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Mon Jan 23 2012 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-78
|
||||
- Add labeling for udisks2
|
||||
- Allow fsadmin to communicate with the systemd process
|
||||
|
||||
* Mon Jan 23 2012 Miroslav Grepl <mgrepl@redhat.com> 3.10.0-77
|
||||
- Treat Bip with bitlbee policy
|
||||
* Bip is an IRC proxy
|
||||
|
Loading…
Reference in New Issue
Block a user