Fixed mistakes in build.

This commit is contained in:
Lukas Vrabec 2014-11-03 16:31:25 +01:00
parent a38ffbf425
commit ba65f59092
2 changed files with 29 additions and 31 deletions

View File

@ -20732,7 +20732,7 @@ index dda905b..ccd0ba9 100644
/var/named/chroot/var/run/dbus(/.*)? gen_context(system_u:object_r:system_dbusd_var_run_t,s0)
+')
diff --git a/dbus.if b/dbus.if
index 62d22cb..5f27946 100644
index 62d22cb..e1b35aa 100644
--- a/dbus.if
+++ b/dbus.if
@@ -1,4 +1,4 @@
@ -20858,7 +20858,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -103,91 +129,86 @@ template(`dbus_role_template',`
@@ -103,91 +129,84 @@ template(`dbus_role_template',`
#
interface(`dbus_system_bus_client',`
gen_require(`
@ -20868,13 +20868,11 @@ index 62d22cb..5f27946 100644
+ type system_dbusd_var_run_t, system_dbusd_var_lib_t;
class dbus send_msg;
+ attribute dbusd_unconfined;
+ attribute system_bus_client;
')
- typeattribute $1 dbusd_system_bus_client;
-
+ # SE-DBus specific permissions
+ typeattribute $1 system_bus_client;
allow $1 { system_dbusd_t self }:dbus send_msg;
- allow system_dbusd_t $1:dbus send_msg;
+ allow { system_dbusd_t dbusd_unconfined } $1:dbus send_msg;
@ -20986,7 +20984,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -195,15 +216,18 @@ interface(`dbus_connect_spec_session_bus',`
@@ -195,15 +214,18 @@ interface(`dbus_connect_spec_session_bus',`
## </summary>
## </param>
#
@ -21011,7 +21009,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -211,57 +235,39 @@ interface(`dbus_session_bus_client',`
@@ -211,57 +233,39 @@ interface(`dbus_session_bus_client',`
## </summary>
## </param>
#
@ -21083,7 +21081,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -269,15 +275,19 @@ interface(`dbus_spec_session_bus_client',`
@@ -269,15 +273,19 @@ interface(`dbus_spec_session_bus_client',`
## </summary>
## </param>
#
@ -21109,7 +21107,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -285,44 +295,52 @@ interface(`dbus_send_session_bus',`
@@ -285,44 +293,52 @@ interface(`dbus_send_session_bus',`
## </summary>
## </param>
#
@ -21176,7 +21174,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -330,18 +348,18 @@ interface(`dbus_send_spec_session_bus',`
@@ -330,18 +346,18 @@ interface(`dbus_send_spec_session_bus',`
## </summary>
## </param>
#
@ -21200,7 +21198,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -349,20 +367,18 @@ interface(`dbus_read_config',`
@@ -349,20 +365,18 @@ interface(`dbus_read_config',`
## </summary>
## </param>
#
@ -21226,7 +21224,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -370,26 +386,20 @@ interface(`dbus_read_lib_files',`
@@ -370,26 +384,20 @@ interface(`dbus_read_lib_files',`
## </summary>
## </param>
#
@ -21259,7 +21257,7 @@ index 62d22cb..5f27946 100644
## <param name="domain">
## <summary>
## Type to be used as a domain.
@@ -397,81 +407,67 @@ interface(`dbus_manage_lib_files',`
@@ -397,81 +405,67 @@ interface(`dbus_manage_lib_files',`
## </param>
## <param name="entry_point">
## <summary>
@ -21369,7 +21367,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -479,18 +475,18 @@ interface(`dbus_spec_session_domain',`
@@ -479,18 +473,18 @@ interface(`dbus_spec_session_domain',`
## </summary>
## </param>
#
@ -21393,7 +21391,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -498,98 +494,100 @@ interface(`dbus_connect_system_bus',`
@@ -498,98 +492,100 @@ interface(`dbus_connect_system_bus',`
## </summary>
## </param>
#
@ -21537,7 +21535,7 @@ index 62d22cb..5f27946 100644
## </summary>
## <param name="domain">
## <summary>
@@ -597,28 +595,51 @@ interface(`dbus_use_system_bus_fds',`
@@ -597,28 +593,50 @@ interface(`dbus_use_system_bus_fds',`
## </summary>
## </param>
#
@ -21572,13 +21570,12 @@ index 62d22cb..5f27946 100644
gen_require(`
- attribute dbusd_unconfined;
+ attribute system_bus_type;
+ attribute system_bus_client;
+ class dbus send_msg;
')
- typeattribute $1 dbusd_unconfined;
+ allow $1 { system_bus_type system_bus_client }:dbus send_msg;
+ allow { system_bus_type system_bus_client } $1:dbus send_msg;
+ allow $1 system_bus_type:dbus send_msg;
+ allow system_bus_type $1:dbus send_msg;
+')
+
+#######################################
@ -21598,10 +21595,10 @@ index 62d22cb..5f27946 100644
+ files_var_filetrans($1, system_dbusd_var_lib_t, dir, "ibus")
')
diff --git a/dbus.te b/dbus.te
index c9998c8..4e0254d 100644
index c9998c8..94ff984 100644
--- a/dbus.te
+++ b/dbus.te
@@ -4,17 +4,16 @@ gen_require(`
@@ -4,17 +4,15 @@ gen_require(`
class dbus all_dbus_perms;
')
@ -21614,7 +21611,6 @@ index c9998c8..4e0254d 100644
attribute dbusd_unconfined;
+attribute system_bus_type;
+attribute system_bus_client;
attribute session_bus_type;
-attribute dbusd_system_bus_client;
@ -21623,7 +21619,7 @@ index c9998c8..4e0254d 100644
type dbusd_etc_t;
files_config_file(dbusd_etc_t)
@@ -22,9 +21,6 @@ type dbusd_exec_t;
@@ -22,9 +20,6 @@ type dbusd_exec_t;
corecmd_executable_file(dbusd_exec_t)
typealias dbusd_exec_t alias system_dbusd_exec_t;
@ -21633,7 +21629,7 @@ index c9998c8..4e0254d 100644
type session_dbusd_tmp_t;
typealias session_dbusd_tmp_t alias { user_dbusd_tmp_t staff_dbusd_tmp_t sysadm_dbusd_tmp_t };
typealias session_dbusd_tmp_t alias { auditadm_dbusd_tmp_t secadm_dbusd_tmp_t };
@@ -41,7 +37,8 @@ files_type(system_dbusd_var_lib_t)
@@ -41,7 +36,8 @@ files_type(system_dbusd_var_lib_t)
type system_dbusd_var_run_t;
files_pid_file(system_dbusd_var_run_t)
@ -21643,7 +21639,7 @@ index c9998c8..4e0254d 100644
ifdef(`enable_mcs',`
init_ranged_system_domain(system_dbusd_t, dbusd_exec_t, s0 - mcs_systemhigh)
@@ -51,59 +48,62 @@ ifdef(`enable_mls',`
@@ -51,59 +47,62 @@ ifdef(`enable_mls',`
init_ranged_system_domain(system_dbusd_t, dbusd_exec_t, s0 - mls_systemhigh)
')
@ -21723,7 +21719,7 @@ index c9998c8..4e0254d 100644
mls_fd_use_all_levels(system_dbusd_t)
mls_rangetrans_target(system_dbusd_t)
mls_file_read_all_levels(system_dbusd_t)
@@ -123,66 +123,165 @@ term_dontaudit_use_console(system_dbusd_t)
@@ -123,66 +122,165 @@ term_dontaudit_use_console(system_dbusd_t)
auth_use_nsswitch(system_dbusd_t)
auth_read_pam_console_data(system_dbusd_t)
@ -21903,7 +21899,7 @@ index c9998c8..4e0254d 100644
kernel_read_kernel_sysctls(session_bus_type)
corecmd_list_bin(session_bus_type)
@@ -191,23 +290,18 @@ corecmd_read_bin_files(session_bus_type)
@@ -191,23 +289,18 @@ corecmd_read_bin_files(session_bus_type)
corecmd_read_bin_pipes(session_bus_type)
corecmd_read_bin_sockets(session_bus_type)
@ -21928,7 +21924,7 @@ index c9998c8..4e0254d 100644
files_dontaudit_search_var(session_bus_type)
fs_getattr_romfs(session_bus_type)
@@ -215,7 +309,6 @@ fs_getattr_xattr_fs(session_bus_type)
@@ -215,7 +308,6 @@ fs_getattr_xattr_fs(session_bus_type)
fs_list_inotifyfs(session_bus_type)
fs_dontaudit_list_nfs(session_bus_type)
@ -21936,7 +21932,7 @@ index c9998c8..4e0254d 100644
selinux_validate_context(session_bus_type)
selinux_compute_access_vector(session_bus_type)
selinux_compute_create_context(session_bus_type)
@@ -225,18 +318,36 @@ selinux_compute_user_contexts(session_bus_type)
@@ -225,18 +317,36 @@ selinux_compute_user_contexts(session_bus_type)
auth_read_pam_console_data(session_bus_type)
logging_send_audit_msgs(session_bus_type)
@ -21978,7 +21974,7 @@ index c9998c8..4e0254d 100644
')
########################################
@@ -244,5 +355,9 @@ optional_policy(`
@@ -244,5 +354,9 @@ optional_policy(`
# Unconfined access to this module
#
@ -108556,7 +108552,7 @@ index ae919b9..32cbf8c 100644
optional_policy(`
diff --git a/wine.if b/wine.if
index fd2b6cc..111b5b7 100644
index fd2b6cc..c5ea35d 100644
--- a/wine.if
+++ b/wine.if
@@ -1,46 +1,58 @@
@ -108670,7 +108666,7 @@ index fd2b6cc..111b5b7 100644
userdom_unpriv_usertype($1, $1_wine_t)
- userdom_manage_user_tmpfs_files($1_wine_t)
+ userdom_manage_tmpfs_role($2, $1_wine_t)
+ userdom_manage_home_role($1_wine_t, $2)
+ userdom_manage_home_role($2 ,$1_wine_t)
domain_mmap_low($1_wine_t)

View File

@ -619,6 +619,8 @@ SELinux Reference policy mls base module.
- Allow nslcd to read /dev/urandom.
- Allow dovecot to create user's home directory when they log into IMAP.
- Label also logrotate.status.tmp as logrotate_var_lib_t. BZ(1158835)
- Allow wine domains to read user homedir content
- Add fixes to allow docker to create more content in tmpfs ,and donaudit reading /proc
* Wed Oct 29 2014 Lukas Vrabec <lvrabec@redhat.com> 3.13.1-89
- Allow keystone_cgi_script_t to bind on commplex_main_port. BZ (#1138424)