- Add fusectl file system

This commit is contained in:
Daniel J Walsh 2008-02-21 19:43:52 +00:00
parent 8d4af9d064
commit 8bd036a289
2 changed files with 133 additions and 93 deletions

View File

@ -1443,7 +1443,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/tmpreap
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/usermanage.te serefpolicy-3.2.9/policy/modules/admin/usermanage.te
--- nsaserefpolicy/policy/modules/admin/usermanage.te 2008-02-19 17:24:26.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/admin/usermanage.te 2008-02-20 14:28:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/admin/usermanage.te 2008-02-21 10:16:14.000000000 -0500
@@ -97,6 +97,7 @@
# allow checking if a shell is executable
@ -1452,7 +1452,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/userman
domain_use_interactive_fds(chfn_t)
@@ -297,6 +298,7 @@
@@ -238,6 +239,7 @@
userdom_use_unpriv_users_fds(groupadd_t)
# for when /root is the cwd
userdom_dontaudit_search_sysadm_home_dirs(groupadd_t)
+userdom_dontaudit_search_all_users_home_content(groupadd_t)
optional_policy(`
dpkg_use_fds(groupadd_t)
@@ -297,6 +299,7 @@
term_use_all_user_ttys(passwd_t)
term_use_all_user_ptys(passwd_t)
@ -1460,7 +1468,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/userman
auth_manage_shadow(passwd_t)
auth_relabel_shadow(passwd_t)
auth_etc_filetrans_shadow(passwd_t)
@@ -316,6 +318,7 @@
@@ -316,6 +319,7 @@
# /usr/bin/passwd asks for w access to utmp, but it will operate
# correctly without it. Do not audit write denials to utmp.
init_dontaudit_rw_utmp(passwd_t)
@ -1468,7 +1476,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/userman
libs_use_ld_so(passwd_t)
libs_use_shared_libs(passwd_t)
@@ -525,6 +528,12 @@
@@ -503,6 +507,7 @@
userdom_use_unpriv_users_fds(useradd_t)
# for when /root is the cwd
userdom_dontaudit_search_sysadm_home_dirs(useradd_t)
+userdom_dontaudit_search_all_users_home_content(useradd_t)
# Add/remove user home directories
userdom_home_filetrans_generic_user_home_dir(useradd_t)
userdom_manage_all_users_home_content_dirs(useradd_t)
@@ -525,6 +530,12 @@
')
optional_policy(`
@ -5669,7 +5685,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/filesy
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/filesystem.te serefpolicy-3.2.9/policy/modules/kernel/filesystem.te
--- nsaserefpolicy/policy/modules/kernel/filesystem.te 2007-12-19 05:32:07.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/kernel/filesystem.te 2008-02-20 14:28:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/kernel/filesystem.te 2008-02-21 11:21:21.000000000 -0500
@@ -25,6 +25,8 @@
fs_use_xattr encfs gen_context(system_u:object_r:fs_t,s0);
fs_use_xattr ext2 gen_context(system_u:object_r:fs_t,s0);
@ -5691,6 +5707,14 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/filesy
type vxfs_t;
fs_noxattr_type(vxfs_t)
files_mountpoint(vxfs_t)
@@ -199,6 +206,7 @@
allow fusefs_t fs_t:filesystem associate;
genfscon fuse / gen_context(system_u:object_r:fusefs_t,s0)
genfscon fuseblk / gen_context(system_u:object_r:fusefs_t,s0)
+genfscon fusectl / gen_context(system_u:object_r:fusefs_t,s0)
#
# iso9660_t is the type for CD filesystems
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/kernel.if serefpolicy-3.2.9/policy/modules/kernel/kernel.if
--- nsaserefpolicy/policy/modules/kernel/kernel.if 2007-10-29 18:02:31.000000000 -0400
+++ serefpolicy-3.2.9/policy/modules/kernel/kernel.if 2008-02-20 14:28:23.000000000 -0500
@ -5876,7 +5900,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/storag
/dev/gscd -b gen_context(system_u:object_r:removable_device_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/storage.if serefpolicy-3.2.9/policy/modules/kernel/storage.if
--- nsaserefpolicy/policy/modules/kernel/storage.if 2007-10-29 18:02:31.000000000 -0400
+++ serefpolicy-3.2.9/policy/modules/kernel/storage.if 2008-02-20 14:28:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/kernel/storage.if 2008-02-21 14:16:08.000000000 -0500
@@ -81,6 +81,26 @@
########################################
@ -10047,7 +10071,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dbus
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dbus.te serefpolicy-3.2.9/policy/modules/services/dbus.te
--- nsaserefpolicy/policy/modules/services/dbus.te 2007-12-19 05:32:17.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/services/dbus.te 2008-02-20 14:28:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/services/dbus.te 2008-02-21 11:25:16.000000000 -0500
@@ -9,6 +9,7 @@
#
# Delcarations
@ -10065,6 +10089,15 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dbus
type system_dbusd_var_run_t;
files_pid_file(system_dbusd_var_run_t)
@@ -35,7 +36,7 @@
# cjp: dac_override should probably go in a distro_debian
allow system_dbusd_t self:capability { dac_override setgid setpcap setuid };
dontaudit system_dbusd_t self:capability sys_tty_config;
-allow system_dbusd_t self:process { getattr signal_perms setcap };
+allow system_dbusd_t self:process { getattr signal_perms getcap setcap };
allow system_dbusd_t self:fifo_file { read write };
allow system_dbusd_t self:dbus { send_msg acquire_svc };
allow system_dbusd_t self:unix_stream_socket { connectto create_stream_socket_perms connectto };
@@ -65,6 +66,7 @@
fs_getattr_all_fs(system_dbusd_t)
@ -14537,7 +14570,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ntp.
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ntp.te serefpolicy-3.2.9/policy/modules/services/ntp.te
--- nsaserefpolicy/policy/modules/services/ntp.te 2007-12-19 05:32:17.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/services/ntp.te 2008-02-20 14:28:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/services/ntp.te 2008-02-21 11:25:51.000000000 -0500
@@ -25,6 +25,12 @@
type ntpdate_exec_t;
init_system_domain(ntpd_t,ntpdate_exec_t)
@ -14551,9 +14584,12 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ntp.
########################################
#
# Local policy
@@ -36,6 +42,7 @@
@@ -34,8 +40,9 @@
# ntpdate wants sys_nice
allow ntpd_t self:capability { chown dac_override kill setgid setuid sys_time ipc_lock sys_chroot sys_nice sys_resource };
dontaudit ntpd_t self:capability { net_admin sys_tty_config fsetid sys_nice };
allow ntpd_t self:process { signal_perms setcap setsched setrlimit };
-allow ntpd_t self:process { signal_perms setcap setsched setrlimit };
+allow ntpd_t self:process { signal_perms getcap setcap setsched setrlimit };
allow ntpd_t self:fifo_file { read write getattr };
+allow ntpd_t self:shm create_shm_perms;
allow ntpd_t self:unix_dgram_socket create_socket_perms;
@ -14601,7 +14637,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ntp.
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/nx.fc serefpolicy-3.2.9/policy/modules/services/nx.fc
--- nsaserefpolicy/policy/modules/services/nx.fc 2006-11-16 17:15:20.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/services/nx.fc 2008-02-20 14:28:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/services/nx.fc 2008-02-21 10:10:55.000000000 -0500
@@ -1,3 +1,5 @@
+
+/usr/libexec/nx/nxserver -- gen_context(system_u:object_r:nx_server_exec_t,s0)
@ -25870,7 +25906,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
+/root(/.*)? gen_context(system_u:object_r:admin_home_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdomain.if serefpolicy-3.2.9/policy/modules/system/userdomain.if
--- nsaserefpolicy/policy/modules/system/userdomain.if 2008-02-15 09:52:56.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/system/userdomain.if 2008-02-20 15:39:23.000000000 -0500
+++ serefpolicy-3.2.9/policy/modules/system/userdomain.if 2008-02-21 14:19:41.000000000 -0500
@@ -29,9 +29,14 @@
')
@ -26413,7 +26449,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## <summary>
## The prefix of the user domain (e.g., user
## is the prefix for user_t).
@@ -692,183 +666,192 @@
@@ -692,183 +666,193 @@
dontaudit $1_t self:netlink_socket { create ioctl read getattr write setattr append bind connect getopt setopt shutdown };
dontaudit $1_t self:netlink_route_socket { create ioctl read getattr write setattr append bind connect getopt setopt shutdown nlmsg_read nlmsg_write };
@ -26499,6 +26535,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
# for eject
- storage_getattr_fixed_disk_dev($1_t)
+ storage_getattr_fixed_disk_dev($1_usertype)
+ storage_rw_fuse($1_usertype)
- auth_use_nsswitch($1_t)
- auth_read_login_records($1_t)
@ -26687,7 +26724,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
optional_policy(`
@@ -895,6 +878,8 @@
@@ -895,6 +879,8 @@
## </param>
#
template(`userdom_login_user_template', `
@ -26696,7 +26733,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
userdom_base_user_template($1)
userdom_manage_home_template($1)
@@ -923,26 +908,26 @@
@@ -923,26 +909,26 @@
allow $1_t self:context contains;
@ -26737,7 +26774,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
auth_dontaudit_write_login_records($1_t)
@@ -950,43 +935,43 @@
@@ -950,43 +936,43 @@
# The library functions always try to open read-write first,
# then fall back to read-only if it fails.
@ -26799,7 +26836,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
')
@@ -1020,9 +1005,6 @@
@@ -1020,9 +1006,6 @@
domain_interactive_fd($1_t)
typeattribute $1_devpts_t user_ptynode;
@ -26809,7 +26846,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
typeattribute $1_tty_device_t user_ttynode;
##############################
@@ -1031,16 +1013,29 @@
@@ -1031,16 +1014,29 @@
#
# privileged home directory writers
@ -26845,7 +26882,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
#######################################
@@ -1068,6 +1063,13 @@
@@ -1068,6 +1064,13 @@
userdom_restricted_user_template($1)
@ -26859,7 +26896,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
userdom_xwindows_client_template($1)
##############################
@@ -1076,14 +1078,14 @@
@@ -1076,14 +1079,14 @@
#
authlogin_per_role_template($1, $1_t, $1_r)
@ -26879,7 +26916,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
logging_dontaudit_send_audit_msgs($1_t)
# Need to to this just so screensaver will work. Should be moved to screensaver domain
@@ -1091,32 +1093,21 @@
@@ -1091,32 +1094,21 @@
selinux_get_enforce_mode($1_t)
optional_policy(`
@ -26920,7 +26957,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
')
@@ -1127,10 +1118,10 @@
@@ -1127,10 +1119,10 @@
## </summary>
## <desc>
## <p>
@ -26935,7 +26972,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## This template creates a user domain, types, and
## rules for the user's tty, pty, home directories,
## tmp, and tmpfs files.
@@ -1193,12 +1184,11 @@
@@ -1193,12 +1185,11 @@
# and may change other protocols
tunable_policy(`user_tcp_server',`
corenet_tcp_bind_all_nodes($1_t)
@ -26950,7 +26987,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
# Run pppd in pppd_t by default for user
@@ -1207,7 +1197,23 @@
@@ -1207,7 +1198,23 @@
')
optional_policy(`
@ -26975,7 +27012,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
')
@@ -1284,8 +1290,6 @@
@@ -1284,8 +1291,6 @@
# Manipulate other users crontab.
allow $1_t self:passwd crontab;
@ -26984,7 +27021,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
kernel_read_software_raid_state($1_t)
kernel_getattr_core_if($1_t)
kernel_getattr_message_if($1_t)
@@ -1363,13 +1367,6 @@
@@ -1363,13 +1368,6 @@
# But presently necessary for installing the file_contexts file.
seutil_manage_bin_policy($1_t)
@ -26998,7 +27035,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
optional_policy(`
userhelper_exec($1_t)
')
@@ -1422,6 +1419,7 @@
@@ -1422,6 +1420,7 @@
dev_relabel_all_dev_nodes($1)
files_create_boot_flag($1)
@ -27006,7 +27043,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
# Necessary for managing /boot/efi
fs_manage_dos_files($1)
@@ -1787,10 +1785,14 @@
@@ -1787,10 +1786,14 @@
template(`userdom_user_home_content',`
gen_require(`
attribute $1_file_type;
@ -27022,7 +27059,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -1886,11 +1888,11 @@
@@ -1886,11 +1889,11 @@
#
template(`userdom_search_user_home_dirs',`
gen_require(`
@ -27036,7 +27073,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -1920,11 +1922,11 @@
@@ -1920,11 +1923,11 @@
#
template(`userdom_list_user_home_dirs',`
gen_require(`
@ -27050,7 +27087,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -1968,12 +1970,12 @@
@@ -1968,12 +1971,12 @@
#
template(`userdom_user_home_domtrans',`
gen_require(`
@ -27066,7 +27103,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2003,10 +2005,10 @@
@@ -2003,10 +2006,10 @@
#
template(`userdom_dontaudit_list_user_home_dirs',`
gen_require(`
@ -27079,7 +27116,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2038,11 +2040,47 @@
@@ -2038,11 +2041,47 @@
#
template(`userdom_manage_user_home_content_dirs',`
gen_require(`
@ -27129,7 +27166,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2074,10 +2112,10 @@
@@ -2074,10 +2113,10 @@
#
template(`userdom_dontaudit_setattr_user_home_content_files',`
gen_require(`
@ -27142,7 +27179,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2107,11 +2145,11 @@
@@ -2107,11 +2146,11 @@
#
template(`userdom_read_user_home_content_files',`
gen_require(`
@ -27156,7 +27193,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2141,11 +2179,11 @@
@@ -2141,11 +2180,11 @@
#
template(`userdom_dontaudit_read_user_home_content_files',`
gen_require(`
@ -27171,7 +27208,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2175,10 +2213,14 @@
@@ -2175,10 +2214,14 @@
#
template(`userdom_dontaudit_write_user_home_content_files',`
gen_require(`
@ -27188,7 +27225,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2208,11 +2250,11 @@
@@ -2208,11 +2251,11 @@
#
template(`userdom_read_user_home_content_symlinks',`
gen_require(`
@ -27202,7 +27239,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2242,11 +2284,11 @@
@@ -2242,11 +2285,11 @@
#
template(`userdom_exec_user_home_content_files',`
gen_require(`
@ -27216,7 +27253,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2276,10 +2318,10 @@
@@ -2276,10 +2319,10 @@
#
template(`userdom_dontaudit_exec_user_home_content_files',`
gen_require(`
@ -27229,7 +27266,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2311,12 +2353,12 @@
@@ -2311,12 +2354,12 @@
#
template(`userdom_manage_user_home_content_files',`
gen_require(`
@ -27245,7 +27282,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2348,10 +2390,10 @@
@@ -2348,10 +2391,10 @@
#
template(`userdom_dontaudit_manage_user_home_content_dirs',`
gen_require(`
@ -27258,7 +27295,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2383,12 +2425,12 @@
@@ -2383,12 +2426,12 @@
#
template(`userdom_manage_user_home_content_symlinks',`
gen_require(`
@ -27274,7 +27311,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2420,12 +2462,12 @@
@@ -2420,12 +2463,12 @@
#
template(`userdom_manage_user_home_content_pipes',`
gen_require(`
@ -27290,7 +27327,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2457,12 +2499,12 @@
@@ -2457,12 +2500,12 @@
#
template(`userdom_manage_user_home_content_sockets',`
gen_require(`
@ -27306,7 +27343,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2507,11 +2549,11 @@
@@ -2507,11 +2550,11 @@
#
template(`userdom_user_home_dir_filetrans',`
gen_require(`
@ -27320,7 +27357,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2556,11 +2598,11 @@
@@ -2556,11 +2599,11 @@
#
template(`userdom_user_home_content_filetrans',`
gen_require(`
@ -27334,7 +27371,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2600,11 +2642,11 @@
@@ -2600,11 +2643,11 @@
#
template(`userdom_user_home_dir_filetrans_user_home_content',`
gen_require(`
@ -27348,7 +27385,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2634,11 +2676,11 @@
@@ -2634,11 +2677,11 @@
#
template(`userdom_write_user_tmp_sockets',`
gen_require(`
@ -27362,7 +27399,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2668,11 +2710,11 @@
@@ -2668,11 +2711,11 @@
#
template(`userdom_list_user_tmp',`
gen_require(`
@ -27376,7 +27413,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2704,10 +2746,10 @@
@@ -2704,10 +2747,10 @@
#
template(`userdom_dontaudit_list_user_tmp',`
gen_require(`
@ -27389,7 +27426,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2739,10 +2781,10 @@
@@ -2739,10 +2782,10 @@
#
template(`userdom_dontaudit_manage_user_tmp_dirs',`
gen_require(`
@ -27402,7 +27439,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2772,12 +2814,12 @@
@@ -2772,12 +2815,12 @@
#
template(`userdom_read_user_tmp_files',`
gen_require(`
@ -27418,7 +27455,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2809,10 +2851,10 @@
@@ -2809,10 +2852,10 @@
#
template(`userdom_dontaudit_read_user_tmp_files',`
gen_require(`
@ -27431,7 +27468,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2844,10 +2886,48 @@
@@ -2844,10 +2887,48 @@
#
template(`userdom_dontaudit_append_user_tmp_files',`
gen_require(`
@ -27482,7 +27519,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2877,12 +2957,12 @@
@@ -2877,12 +2958,12 @@
#
template(`userdom_rw_user_tmp_files',`
gen_require(`
@ -27498,7 +27535,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2914,10 +2994,10 @@
@@ -2914,10 +2995,10 @@
#
template(`userdom_dontaudit_manage_user_tmp_files',`
gen_require(`
@ -27511,7 +27548,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2949,12 +3029,12 @@
@@ -2949,12 +3030,12 @@
#
template(`userdom_read_user_tmp_symlinks',`
gen_require(`
@ -27527,7 +27564,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -2986,11 +3066,11 @@
@@ -2986,11 +3067,11 @@
#
template(`userdom_manage_user_tmp_dirs',`
gen_require(`
@ -27541,7 +27578,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -3022,11 +3102,11 @@
@@ -3022,11 +3103,11 @@
#
template(`userdom_manage_user_tmp_files',`
gen_require(`
@ -27555,7 +27592,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -3058,11 +3138,11 @@
@@ -3058,11 +3139,11 @@
#
template(`userdom_manage_user_tmp_symlinks',`
gen_require(`
@ -27569,7 +27606,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -3094,11 +3174,11 @@
@@ -3094,11 +3175,11 @@
#
template(`userdom_manage_user_tmp_pipes',`
gen_require(`
@ -27583,7 +27620,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -3130,11 +3210,11 @@
@@ -3130,11 +3211,11 @@
#
template(`userdom_manage_user_tmp_sockets',`
gen_require(`
@ -27597,7 +27634,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -3179,10 +3259,10 @@
@@ -3179,10 +3260,10 @@
#
template(`userdom_user_tmp_filetrans',`
gen_require(`
@ -27610,7 +27647,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
files_search_tmp($2)
')
@@ -3223,10 +3303,10 @@
@@ -3223,10 +3304,10 @@
#
template(`userdom_tmp_filetrans_user_tmp',`
gen_require(`
@ -27623,7 +27660,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -3254,6 +3334,42 @@
@@ -3254,6 +3335,42 @@
## </summary>
## </param>
#
@ -27666,7 +27703,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
template(`userdom_rw_user_tmpfs_files',`
gen_require(`
type $1_tmpfs_t;
@@ -4231,11 +4347,11 @@
@@ -4231,11 +4348,11 @@
#
interface(`userdom_search_staff_home_dirs',`
gen_require(`
@ -27680,7 +27717,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4251,10 +4367,10 @@
@@ -4251,10 +4368,10 @@
#
interface(`userdom_dontaudit_search_staff_home_dirs',`
gen_require(`
@ -27693,7 +27730,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4270,11 +4386,11 @@
@@ -4270,11 +4387,11 @@
#
interface(`userdom_manage_staff_home_dirs',`
gen_require(`
@ -27707,7 +27744,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4289,16 +4405,16 @@
@@ -4289,16 +4406,16 @@
#
interface(`userdom_relabelto_staff_home_dirs',`
gen_require(`
@ -27727,7 +27764,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## users home directory.
## </summary>
## <param name="domain">
@@ -4307,12 +4423,27 @@
@@ -4307,12 +4424,27 @@
## </summary>
## </param>
#
@ -27758,7 +27795,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4327,13 +4458,13 @@
@@ -4327,13 +4459,13 @@
#
interface(`userdom_read_staff_home_content_files',`
gen_require(`
@ -27776,7 +27813,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4531,10 +4662,10 @@
@@ -4531,10 +4663,10 @@
#
interface(`userdom_getattr_sysadm_home_dirs',`
gen_require(`
@ -27789,7 +27826,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4551,10 +4682,10 @@
@@ -4551,10 +4683,10 @@
#
interface(`userdom_dontaudit_getattr_sysadm_home_dirs',`
gen_require(`
@ -27802,7 +27839,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4569,10 +4700,10 @@
@@ -4569,10 +4701,10 @@
#
interface(`userdom_search_sysadm_home_dirs',`
gen_require(`
@ -27815,7 +27852,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4588,10 +4719,10 @@
@@ -4588,10 +4720,10 @@
#
interface(`userdom_dontaudit_search_sysadm_home_dirs',`
gen_require(`
@ -27828,7 +27865,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4606,10 +4737,10 @@
@@ -4606,10 +4738,10 @@
#
interface(`userdom_list_sysadm_home_dirs',`
gen_require(`
@ -27841,7 +27878,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4625,10 +4756,10 @@
@@ -4625,10 +4757,10 @@
#
interface(`userdom_dontaudit_list_sysadm_home_dirs',`
gen_require(`
@ -27854,7 +27891,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4644,12 +4775,11 @@
@@ -4644,12 +4776,11 @@
#
interface(`userdom_dontaudit_read_sysadm_home_content_files',`
gen_require(`
@ -27870,7 +27907,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4676,10 +4806,10 @@
@@ -4676,10 +4807,10 @@
#
interface(`userdom_sysadm_home_dir_filetrans',`
gen_require(`
@ -27883,7 +27920,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4694,10 +4824,10 @@
@@ -4694,10 +4825,10 @@
#
interface(`userdom_search_sysadm_home_content_dirs',`
gen_require(`
@ -27896,7 +27933,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4712,13 +4842,13 @@
@@ -4712,13 +4843,13 @@
#
interface(`userdom_read_sysadm_home_content_files',`
gen_require(`
@ -27914,7 +27951,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4754,11 +4884,49 @@
@@ -4754,11 +4885,49 @@
#
interface(`userdom_search_all_users_home_dirs',`
gen_require(`
@ -27965,7 +28002,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4778,6 +4946,14 @@
@@ -4778,6 +4947,14 @@
files_list_home($1)
allow $1 home_dir_type:dir list_dir_perms;
@ -27980,7 +28017,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
########################################
@@ -4839,6 +5015,26 @@
@@ -4839,6 +5016,26 @@
########################################
## <summary>
@ -28007,7 +28044,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## Create, read, write, and delete all directories
## in all users home directories.
## </summary>
@@ -4859,6 +5055,25 @@
@@ -4859,6 +5056,25 @@
########################################
## <summary>
@ -28033,7 +28070,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## Create, read, write, and delete all files
## in all users home directories.
## </summary>
@@ -4879,6 +5094,26 @@
@@ -4879,6 +5095,26 @@
########################################
## <summary>
@ -28060,7 +28097,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## Create, read, write, and delete all symlinks
## in all users home directories.
## </summary>
@@ -5115,7 +5350,7 @@
@@ -5115,7 +5351,7 @@
#
interface(`userdom_relabelto_generic_user_home_dirs',`
gen_require(`
@ -28069,7 +28106,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
')
files_search_home($1)
@@ -5304,6 +5539,50 @@
@@ -5304,6 +5540,50 @@
########################################
## <summary>
@ -28120,7 +28157,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## Create, read, write, and delete directories in
## unprivileged users home directories.
## </summary>
@@ -5509,6 +5788,42 @@
@@ -5509,6 +5789,42 @@
########################################
## <summary>
@ -28163,7 +28200,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## Read and write unprivileged user ttys.
## </summary>
## <param name="domain">
@@ -5674,6 +5989,42 @@
@@ -5674,6 +5990,42 @@
########################################
## <summary>
@ -28206,7 +28243,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
## Send a dbus message to all user domains.
## </summary>
## <param name="domain">
@@ -5704,3 +6055,368 @@
@@ -5704,3 +6056,368 @@
interface(`userdom_unconfined',`
refpolicywarn(`$0($*) has been deprecated.')
')

View File

@ -17,7 +17,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.2.9
Release: 1%{?dist}
Release: 2%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@ -387,6 +387,9 @@ exit 0
%endif
%changelog
* Thu Feb 21 2008 Dan Walsh <dwalsh@redhat.com> 3.2.9-2
- Add fusectl file system
* Wed Feb 20 2008 Dan Walsh <dwalsh@redhat.com> 3.2.9-1
- Fixes from yum-cron
- Update to latest upstream