Whitespace, newline and tab fixes.
Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes. Whitespace, newline and tab fixes.
This commit is contained in:
parent
8b858f2652
commit
aaf8a677ba
@ -4,6 +4,7 @@ policy_module(virt, 1.4.0)
|
|||||||
#
|
#
|
||||||
# Declarations
|
# Declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
attribute virsh_transition_domain;
|
attribute virsh_transition_domain;
|
||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
@ -205,7 +206,6 @@ optional_policy(`
|
|||||||
|
|
||||||
allow virtd_t self:capability { chown dac_override fowner ipc_lock kill mknod net_admin net_raw setpcap setuid setgid sys_admin sys_nice sys_ptrace };
|
allow virtd_t self:capability { chown dac_override fowner ipc_lock kill mknod net_admin net_raw setpcap setuid setgid sys_admin sys_nice sys_ptrace };
|
||||||
allow virtd_t self:process { getcap getsched setcap sigkill signal signull execmem setexec setfscreate setsockcreate setsched };
|
allow virtd_t self:process { getcap getsched setcap sigkill signal signull execmem setexec setfscreate setsockcreate setsched };
|
||||||
|
|
||||||
allow virtd_t self:fifo_file rw_fifo_file_perms;
|
allow virtd_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow virtd_t self:unix_stream_socket create_stream_socket_perms;
|
allow virtd_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
allow virtd_t self:tcp_socket create_stream_socket_perms;
|
allow virtd_t self:tcp_socket create_stream_socket_perms;
|
||||||
@ -577,8 +577,6 @@ typealias virsh_exec_t alias xm_exec_t;
|
|||||||
|
|
||||||
allow virsh_t self:capability { dac_override ipc_lock sys_tty_config };
|
allow virsh_t self:capability { dac_override ipc_lock sys_tty_config };
|
||||||
allow virsh_t self:process { getcap getsched setcap signal };
|
allow virsh_t self:process { getcap getsched setcap signal };
|
||||||
|
|
||||||
# internal communication is often done using fifo and unix sockets.
|
|
||||||
allow virsh_t self:fifo_file rw_fifo_file_perms;
|
allow virsh_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow virsh_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
allow virsh_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
||||||
allow virsh_t self:tcp_socket create_stream_socket_perms;
|
allow virsh_t self:tcp_socket create_stream_socket_perms;
|
||||||
@ -671,4 +669,3 @@ optional_policy(`
|
|||||||
|
|
||||||
userdom_search_admin_dir(virsh_ssh_t)
|
userdom_search_admin_dir(virsh_ssh_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
policy_module(vnstatd,1.0.0)
|
policy_module(vnstatd, 1.0.0)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -24,13 +24,12 @@ cron_system_entry(vnstat_t, vnstat_exec_t)
|
|||||||
# vnstatd local policy
|
# vnstatd local policy
|
||||||
#
|
#
|
||||||
allow vnstatd_t self:process { fork signal };
|
allow vnstatd_t self:process { fork signal };
|
||||||
|
|
||||||
allow vnstatd_t self:fifo_file rw_fifo_file_perms;
|
allow vnstatd_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow vnstatd_t self:unix_stream_socket create_stream_socket_perms;
|
allow vnstatd_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
|
||||||
manage_dirs_pattern(vnstatd_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
manage_dirs_pattern(vnstatd_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
||||||
manage_files_pattern(vnstatd_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
manage_files_pattern(vnstatd_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
||||||
files_var_lib_filetrans(vnstatd_t, vnstatd_var_lib_t, { dir file } )
|
files_var_lib_filetrans(vnstatd_t, vnstatd_var_lib_t, { dir file })
|
||||||
|
|
||||||
domain_use_interactive_fds(vnstatd_t)
|
domain_use_interactive_fds(vnstatd_t)
|
||||||
|
|
||||||
@ -45,13 +44,12 @@ miscfiles_read_localization(vnstatd_t)
|
|||||||
# vnstat local policy
|
# vnstat local policy
|
||||||
#
|
#
|
||||||
allow vnstat_t self:process { signal };
|
allow vnstat_t self:process { signal };
|
||||||
|
|
||||||
allow vnstat_t self:fifo_file rw_fifo_file_perms;
|
allow vnstat_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow vnstat_t self:unix_stream_socket create_stream_socket_perms;
|
allow vnstat_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
|
||||||
manage_dirs_pattern(vnstat_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
manage_dirs_pattern(vnstat_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
||||||
manage_files_pattern(vnstat_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
manage_files_pattern(vnstat_t, vnstatd_var_lib_t, vnstatd_var_lib_t)
|
||||||
files_var_lib_filetrans(vnstat_t, vnstatd_var_lib_t, { dir file } )
|
files_var_lib_filetrans(vnstat_t, vnstatd_var_lib_t, { dir file })
|
||||||
|
|
||||||
kernel_read_network_state(vnstat_t)
|
kernel_read_network_state(vnstat_t)
|
||||||
kernel_read_system_state(vnstat_t)
|
kernel_read_system_state(vnstat_t)
|
||||||
@ -65,5 +63,3 @@ fs_getattr_xattr_fs(vnstat_t)
|
|||||||
logging_send_syslog_msg(vnstat_t)
|
logging_send_syslog_msg(vnstat_t)
|
||||||
|
|
||||||
miscfiles_read_localization(vnstat_t)
|
miscfiles_read_localization(vnstat_t)
|
||||||
|
|
||||||
|
|
||||||
|
@ -63,7 +63,6 @@ gen_tunable(user_direct_dri, false)
|
|||||||
|
|
||||||
attribute xdmhomewriter;
|
attribute xdmhomewriter;
|
||||||
attribute x_userdomain;
|
attribute x_userdomain;
|
||||||
|
|
||||||
attribute x_domain;
|
attribute x_domain;
|
||||||
|
|
||||||
# X Events
|
# X Events
|
||||||
@ -121,7 +120,7 @@ typealias user_input_xevent_t alias { auditadm_input_xevent_t secadm_input_xeven
|
|||||||
|
|
||||||
type remote_t;
|
type remote_t;
|
||||||
xserver_object_types_template(remote)
|
xserver_object_types_template(remote)
|
||||||
xserver_common_x_domain_template(remote,remote_t)
|
xserver_common_x_domain_template(remote, remote_t)
|
||||||
|
|
||||||
type user_fonts_t;
|
type user_fonts_t;
|
||||||
typealias user_fonts_t alias { staff_fonts_t sysadm_fonts_t };
|
typealias user_fonts_t alias { staff_fonts_t sysadm_fonts_t };
|
||||||
@ -292,7 +291,7 @@ tunable_policy(`use_samba_home_dirs',`
|
|||||||
fs_manage_cifs_files(iceauth_t)
|
fs_manage_cifs_files(iceauth_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
dev_dontaudit_read_urand(iceauth_t)
|
dev_dontaudit_read_urand(iceauth_t)
|
||||||
dev_dontaudit_rw_dri(iceauth_t)
|
dev_dontaudit_rw_dri(iceauth_t)
|
||||||
dev_dontaudit_rw_generic_dev_nodes(iceauth_t)
|
dev_dontaudit_rw_generic_dev_nodes(iceauth_t)
|
||||||
@ -362,7 +361,7 @@ userdom_use_user_terminals(xauth_t)
|
|||||||
userdom_read_user_tmp_files(xauth_t)
|
userdom_read_user_tmp_files(xauth_t)
|
||||||
userdom_read_all_users_state(xauth_t)
|
userdom_read_all_users_state(xauth_t)
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
fs_dontaudit_rw_anon_inodefs_files(xauth_t)
|
fs_dontaudit_rw_anon_inodefs_files(xauth_t)
|
||||||
fs_dontaudit_list_inotifyfs(xauth_t)
|
fs_dontaudit_list_inotifyfs(xauth_t)
|
||||||
userdom_manage_user_home_content_files(xauth_t)
|
userdom_manage_user_home_content_files(xauth_t)
|
||||||
@ -382,7 +381,7 @@ tunable_policy(`use_samba_home_dirs',`
|
|||||||
fs_manage_cifs_files(xauth_t)
|
fs_manage_cifs_files(xauth_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms',`
|
||||||
term_dontaudit_use_unallocated_ttys(xauth_t)
|
term_dontaudit_use_unallocated_ttys(xauth_t)
|
||||||
dev_dontaudit_rw_dri(xauth_t)
|
dev_dontaudit_rw_dri(xauth_t)
|
||||||
')
|
')
|
||||||
@ -728,10 +727,8 @@ optional_policy(`
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
networkmanager_dbus_chat(xdm_t)
|
networkmanager_dbus_chat(xdm_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
# Talk to the console mouse server.
|
# Talk to the console mouse server.
|
||||||
gpm_stream_connect(xdm_t)
|
gpm_stream_connect(xdm_t)
|
||||||
@ -822,13 +819,13 @@ optional_policy(`
|
|||||||
unconfined_signal(xdm_t)
|
unconfined_signal(xdm_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifndef(`distro_redhat',`
|
ifndef(`distro_redhat',`
|
||||||
allow xdm_t self:process { execheap execmem };
|
allow xdm_t self:process { execheap execmem };
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`distro_rhel4',`
|
ifdef(`distro_rhel4',`
|
||||||
allow xdm_t self:process { execheap execmem };
|
allow xdm_t self:process { execheap execmem };
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
userhelper_dontaudit_search_config(xdm_t)
|
userhelper_dontaudit_search_config(xdm_t)
|
||||||
|
@ -47,7 +47,7 @@ files_tmp_filetrans(zarafa_deliver_t, zarafa_deliver_tmp_t, { file dir })
|
|||||||
# zarafa_server local policy
|
# zarafa_server local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
allow zarafa_server_t self:capability { chown kill net_bind_service};
|
allow zarafa_server_t self:capability { chown kill net_bind_service };
|
||||||
allow zarafa_server_t self:process { setrlimit signal };
|
allow zarafa_server_t self:process { setrlimit signal };
|
||||||
|
|
||||||
corenet_tcp_bind_zarafa_port(zarafa_server_t)
|
corenet_tcp_bind_zarafa_port(zarafa_server_t)
|
||||||
@ -110,7 +110,6 @@ allow zarafa_monitor_t self:capability chown;
|
|||||||
|
|
||||||
# bad permission on /etc/zarafa
|
# bad permission on /etc/zarafa
|
||||||
allow zarafa_domain self:capability { dac_override setgid setuid };
|
allow zarafa_domain self:capability { dac_override setgid setuid };
|
||||||
|
|
||||||
allow zarafa_domain self:fifo_file rw_fifo_file_perms;
|
allow zarafa_domain self:fifo_file rw_fifo_file_perms;
|
||||||
allow zarafa_domain self:tcp_socket create_stream_socket_perms;
|
allow zarafa_domain self:tcp_socket create_stream_socket_perms;
|
||||||
allow zarafa_domain self:unix_stream_socket create_stream_socket_perms;
|
allow zarafa_domain self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
Loading…
Reference in New Issue
Block a user