- Put back in lircd_etc_t so policy will install
This commit is contained in:
parent
426cf8ea7a
commit
d6719f6ecb
187
policy-F15.patch
187
policy-F15.patch
@ -118,7 +118,7 @@ index 3316f6e..6e82b1e 100644
|
|||||||
+gen_tunable(allow_console_login,false)
|
+gen_tunable(allow_console_login,false)
|
||||||
+
|
+
|
||||||
diff --git a/policy/mcs b/policy/mcs
|
diff --git a/policy/mcs b/policy/mcs
|
||||||
index af90ef2..9fef0f8 100644
|
index af90ef2..bc9693c 100644
|
||||||
--- a/policy/mcs
|
--- a/policy/mcs
|
||||||
+++ b/policy/mcs
|
+++ b/policy/mcs
|
||||||
@@ -86,10 +86,10 @@ mlsconstrain file { create relabelto }
|
@@ -86,10 +86,10 @@ mlsconstrain file { create relabelto }
|
||||||
@ -144,6 +144,14 @@ index af90ef2..9fef0f8 100644
|
|||||||
#
|
#
|
||||||
# MCS policy for SELinux-enabled databases
|
# MCS policy for SELinux-enabled databases
|
||||||
#
|
#
|
||||||
|
@@ -132,4 +135,7 @@ mlsconstrain db_procedure { drop getattr setattr execute install }
|
||||||
|
mlsconstrain db_blob { drop getattr setattr relabelfrom read write import export }
|
||||||
|
( h1 dom h2 );
|
||||||
|
|
||||||
|
+mlsconstrain packet { send recv }
|
||||||
|
+ ( h1 dom h2 );
|
||||||
|
+
|
||||||
|
') dnl end enable_mcs
|
||||||
diff --git a/policy/modules/admin/alsa.if b/policy/modules/admin/alsa.if
|
diff --git a/policy/modules/admin/alsa.if b/policy/modules/admin/alsa.if
|
||||||
index 90d5203..1392679 100644
|
index 90d5203..1392679 100644
|
||||||
--- a/policy/modules/admin/alsa.if
|
--- a/policy/modules/admin/alsa.if
|
||||||
@ -508,7 +516,7 @@ index 56c43c0..de535e4 100644
|
|||||||
+/var/run/mcelog-client -s gen_context(system_u:object_r:mcelog_var_run_t,s0)
|
+/var/run/mcelog-client -s gen_context(system_u:object_r:mcelog_var_run_t,s0)
|
||||||
+
|
+
|
||||||
diff --git a/policy/modules/admin/mcelog.te b/policy/modules/admin/mcelog.te
|
diff --git a/policy/modules/admin/mcelog.te b/policy/modules/admin/mcelog.te
|
||||||
index 5a9cebf..2e08bef 100644
|
index 5a9cebf..ef413f2 100644
|
||||||
--- a/policy/modules/admin/mcelog.te
|
--- a/policy/modules/admin/mcelog.te
|
||||||
+++ b/policy/modules/admin/mcelog.te
|
+++ b/policy/modules/admin/mcelog.te
|
||||||
@@ -7,9 +7,13 @@ policy_module(mcelog, 1.0.1)
|
@@ -7,9 +7,13 @@ policy_module(mcelog, 1.0.1)
|
||||||
@ -525,7 +533,7 @@ index 5a9cebf..2e08bef 100644
|
|||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# mcelog local policy
|
# mcelog local policy
|
||||||
@@ -17,10 +21,16 @@ cron_system_entry(mcelog_t, mcelog_exec_t)
|
@@ -17,10 +21,18 @@ cron_system_entry(mcelog_t, mcelog_exec_t)
|
||||||
|
|
||||||
allow mcelog_t self:capability sys_admin;
|
allow mcelog_t self:capability sys_admin;
|
||||||
|
|
||||||
@ -536,6 +544,8 @@ index 5a9cebf..2e08bef 100644
|
|||||||
+
|
+
|
||||||
kernel_read_system_state(mcelog_t)
|
kernel_read_system_state(mcelog_t)
|
||||||
|
|
||||||
|
+corecmd_exec_bin(mcelog_t)
|
||||||
|
+
|
||||||
dev_read_raw_memory(mcelog_t)
|
dev_read_raw_memory(mcelog_t)
|
||||||
dev_read_kmsg(mcelog_t)
|
dev_read_kmsg(mcelog_t)
|
||||||
+dev_rw_sysfs(mcelog_t)
|
+dev_rw_sysfs(mcelog_t)
|
||||||
@ -23181,110 +23191,11 @@ index ae9d49f..65e6d81 100644
|
|||||||
|
|
||||||
manage_files_pattern(netlogond_t, likewise_etc_t, likewise_etc_t)
|
manage_files_pattern(netlogond_t, likewise_etc_t, likewise_etc_t)
|
||||||
|
|
||||||
diff --git a/policy/modules/services/lircd.if b/policy/modules/services/lircd.if
|
|
||||||
index 418cc81..b9a3327 100644
|
|
||||||
--- a/policy/modules/services/lircd.if
|
|
||||||
+++ b/policy/modules/services/lircd.if
|
|
||||||
@@ -5,9 +5,9 @@
|
|
||||||
## Execute a domain transition to run lircd.
|
|
||||||
## </summary>
|
|
||||||
## <param name="domain">
|
|
||||||
-## <summary>
|
|
||||||
+## <summary>
|
|
||||||
## Domain allowed to transition.
|
|
||||||
-## </summary>
|
|
||||||
+## </summary>
|
|
||||||
## </param>
|
|
||||||
#
|
|
||||||
interface(`lircd_domtrans',`
|
|
||||||
@@ -16,7 +16,6 @@ interface(`lircd_domtrans',`
|
|
||||||
')
|
|
||||||
|
|
||||||
domain_auto_trans($1, lircd_exec_t, lircd_t)
|
|
||||||
-
|
|
||||||
')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
@@ -39,24 +38,6 @@ interface(`lircd_stream_connect',`
|
|
||||||
stream_connect_pattern($1, lircd_var_run_t, lircd_var_run_t, lircd_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
-#######################################
|
|
||||||
-## <summary>
|
|
||||||
-## Read lircd etc file
|
|
||||||
-## </summary>
|
|
||||||
-## <param name="domain">
|
|
||||||
-## <summary>
|
|
||||||
-## Domain allowed access.
|
|
||||||
-## </summary>
|
|
||||||
-## </param>
|
|
||||||
-#
|
|
||||||
-interface(`lircd_read_config',`
|
|
||||||
- gen_require(`
|
|
||||||
- type lircd_etc_t;
|
|
||||||
- ')
|
|
||||||
-
|
|
||||||
- read_files_pattern($1, lircd_etc_t, lircd_etc_t)
|
|
||||||
-')
|
|
||||||
-
|
|
||||||
########################################
|
|
||||||
## <summary>
|
|
||||||
## All of the rules required to administrate
|
|
||||||
@@ -77,7 +58,7 @@ interface(`lircd_read_config',`
|
|
||||||
interface(`lircd_admin',`
|
|
||||||
gen_require(`
|
|
||||||
type lircd_t, lircd_var_run_t;
|
|
||||||
- type lircd_initrc_exec_t, lircd_etc_t;
|
|
||||||
+ type lircd_initrc_exec_t;
|
|
||||||
')
|
|
||||||
|
|
||||||
allow $1 lircd_t:process { ptrace signal_perms };
|
|
||||||
@@ -88,9 +69,6 @@ interface(`lircd_admin',`
|
|
||||||
role_transition $2 lircd_initrc_exec_t system_r;
|
|
||||||
allow $2 system_r;
|
|
||||||
|
|
||||||
- files_search_etc($1)
|
|
||||||
- admin_pattern($1, lircd_etc_t)
|
|
||||||
-
|
|
||||||
- files_search_pids($1)
|
|
||||||
+ files_list_pids($1)
|
|
||||||
admin_pattern($1, lircd_var_run_t)
|
|
||||||
')
|
|
||||||
diff --git a/policy/modules/services/lircd.te b/policy/modules/services/lircd.te
|
diff --git a/policy/modules/services/lircd.te b/policy/modules/services/lircd.te
|
||||||
index 6a78de1..d90cb9b 100644
|
index 6a78de1..b229ba0 100644
|
||||||
--- a/policy/modules/services/lircd.te
|
--- a/policy/modules/services/lircd.te
|
||||||
+++ b/policy/modules/services/lircd.te
|
+++ b/policy/modules/services/lircd.te
|
||||||
@@ -12,9 +12,6 @@ init_daemon_domain(lircd_t, lircd_exec_t)
|
@@ -44,13 +44,13 @@ corenet_tcp_bind_lirc_port(lircd_t)
|
||||||
type lircd_initrc_exec_t;
|
|
||||||
init_script_file(lircd_initrc_exec_t)
|
|
||||||
|
|
||||||
-type lircd_etc_t;
|
|
||||||
-files_type(lircd_etc_t)
|
|
||||||
-
|
|
||||||
type lircd_var_run_t alias lircd_sock_t;
|
|
||||||
files_pid_file(lircd_var_run_t)
|
|
||||||
|
|
||||||
@@ -24,17 +21,15 @@ files_pid_file(lircd_var_run_t)
|
|
||||||
#
|
|
||||||
|
|
||||||
allow lircd_t self:capability { chown kill sys_admin };
|
|
||||||
+allow lircd_t self:process { fork signal };
|
|
||||||
allow lircd_t self:fifo_file rw_fifo_file_perms;
|
|
||||||
allow lircd_t self:unix_dgram_socket create_socket_perms;
|
|
||||||
allow lircd_t self:tcp_socket create_stream_socket_perms;
|
|
||||||
|
|
||||||
-# etc file
|
|
||||||
-read_files_pattern(lircd_t, lircd_etc_t, lircd_etc_t)
|
|
||||||
-
|
|
||||||
manage_dirs_pattern(lircd_t, lircd_var_run_t, lircd_var_run_t)
|
|
||||||
manage_files_pattern(lircd_t, lircd_var_run_t, lircd_var_run_t)
|
|
||||||
manage_sock_files_pattern(lircd_t, lircd_var_run_t, lircd_var_run_t)
|
|
||||||
-files_pid_filetrans(lircd_t, lircd_var_run_t, { dir file })
|
|
||||||
+files_pid_filetrans(lircd_t, lircd_var_run_t, { file dir })
|
|
||||||
# /dev/lircd socket
|
|
||||||
dev_filetrans(lircd_t, lircd_var_run_t, sock_file)
|
|
||||||
|
|
||||||
@@ -44,13 +39,13 @@ corenet_tcp_bind_lirc_port(lircd_t)
|
|
||||||
corenet_tcp_sendrecv_all_ports(lircd_t)
|
corenet_tcp_sendrecv_all_ports(lircd_t)
|
||||||
corenet_tcp_connect_lirc_port(lircd_t)
|
corenet_tcp_connect_lirc_port(lircd_t)
|
||||||
|
|
||||||
@ -40930,7 +40841,7 @@ index df3fa64..852a6ad 100644
|
|||||||
+ allow $1 init_t:unix_stream_socket rw_stream_socket_perms;
|
+ allow $1 init_t:unix_stream_socket rw_stream_socket_perms;
|
||||||
+')
|
+')
|
||||||
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
|
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
|
||||||
index 8a105fd..3f105f0 100644
|
index 8a105fd..fda765f 100644
|
||||||
--- a/policy/modules/system/init.te
|
--- a/policy/modules/system/init.te
|
||||||
+++ b/policy/modules/system/init.te
|
+++ b/policy/modules/system/init.te
|
||||||
@@ -16,6 +16,27 @@ gen_require(`
|
@@ -16,6 +16,27 @@ gen_require(`
|
||||||
@ -41060,7 +40971,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
corecmd_shell_domtrans(init_t, initrc_t)
|
corecmd_shell_domtrans(init_t, initrc_t)
|
||||||
',`
|
',`
|
||||||
# Run the shell in the sysadm role for single-user mode.
|
# Run the shell in the sysadm role for single-user mode.
|
||||||
@@ -186,12 +221,113 @@ tunable_policy(`init_upstart',`
|
@@ -186,12 +221,114 @@ tunable_policy(`init_upstart',`
|
||||||
sysadm_shell_domtrans(init_t)
|
sysadm_shell_domtrans(init_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -41130,6 +41041,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
+ files_relabel_all_pid_files(init_t)
|
+ files_relabel_all_pid_files(init_t)
|
||||||
+ files_manage_all_pids(init_t)
|
+ files_manage_all_pids(init_t)
|
||||||
+ files_manage_all_locks(init_t)
|
+ files_manage_all_locks(init_t)
|
||||||
|
+ files_setattr_all_tmp_dirs(init_t)
|
||||||
+
|
+
|
||||||
+ files_purge_tmp(init_t)
|
+ files_purge_tmp(init_t)
|
||||||
+ files_manage_generic_tmp_files(init_t)
|
+ files_manage_generic_tmp_files(init_t)
|
||||||
@ -41174,7 +41086,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -199,10 +335,24 @@ optional_policy(`
|
@@ -199,10 +336,24 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41199,7 +41111,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
unconfined_domain(init_t)
|
unconfined_domain(init_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -212,7 +362,7 @@ optional_policy(`
|
@@ -212,7 +363,7 @@ optional_policy(`
|
||||||
#
|
#
|
||||||
|
|
||||||
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
|
allow initrc_t self:process { getpgid setsched setpgid setrlimit getsched };
|
||||||
@ -41208,7 +41120,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
dontaudit initrc_t self:capability sys_module; # sysctl is triggering this
|
dontaudit initrc_t self:capability sys_module; # sysctl is triggering this
|
||||||
allow initrc_t self:passwd rootok;
|
allow initrc_t self:passwd rootok;
|
||||||
allow initrc_t self:key manage_key_perms;
|
allow initrc_t self:key manage_key_perms;
|
||||||
@@ -241,12 +391,14 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
|
@@ -241,12 +392,14 @@ manage_fifo_files_pattern(initrc_t, initrc_state_t, initrc_state_t)
|
||||||
|
|
||||||
allow initrc_t initrc_var_run_t:file manage_file_perms;
|
allow initrc_t initrc_var_run_t:file manage_file_perms;
|
||||||
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
|
files_pid_filetrans(initrc_t, initrc_var_run_t, file)
|
||||||
@ -41223,7 +41135,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
|
|
||||||
init_write_initctl(initrc_t)
|
init_write_initctl(initrc_t)
|
||||||
|
|
||||||
@@ -258,11 +410,23 @@ kernel_change_ring_buffer_level(initrc_t)
|
@@ -258,11 +411,23 @@ kernel_change_ring_buffer_level(initrc_t)
|
||||||
kernel_clear_ring_buffer(initrc_t)
|
kernel_clear_ring_buffer(initrc_t)
|
||||||
kernel_get_sysvipc_info(initrc_t)
|
kernel_get_sysvipc_info(initrc_t)
|
||||||
kernel_read_all_sysctls(initrc_t)
|
kernel_read_all_sysctls(initrc_t)
|
||||||
@ -41247,7 +41159,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
|
|
||||||
corecmd_exec_all_executables(initrc_t)
|
corecmd_exec_all_executables(initrc_t)
|
||||||
|
|
||||||
@@ -291,6 +455,7 @@ dev_read_sound_mixer(initrc_t)
|
@@ -291,6 +456,7 @@ dev_read_sound_mixer(initrc_t)
|
||||||
dev_write_sound_mixer(initrc_t)
|
dev_write_sound_mixer(initrc_t)
|
||||||
dev_setattr_all_chr_files(initrc_t)
|
dev_setattr_all_chr_files(initrc_t)
|
||||||
dev_rw_lvm_control(initrc_t)
|
dev_rw_lvm_control(initrc_t)
|
||||||
@ -41255,7 +41167,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
dev_delete_lvm_control_dev(initrc_t)
|
dev_delete_lvm_control_dev(initrc_t)
|
||||||
dev_manage_generic_symlinks(initrc_t)
|
dev_manage_generic_symlinks(initrc_t)
|
||||||
dev_manage_generic_files(initrc_t)
|
dev_manage_generic_files(initrc_t)
|
||||||
@@ -298,13 +463,13 @@ dev_manage_generic_files(initrc_t)
|
@@ -298,13 +464,13 @@ dev_manage_generic_files(initrc_t)
|
||||||
dev_delete_generic_symlinks(initrc_t)
|
dev_delete_generic_symlinks(initrc_t)
|
||||||
dev_getattr_all_blk_files(initrc_t)
|
dev_getattr_all_blk_files(initrc_t)
|
||||||
dev_getattr_all_chr_files(initrc_t)
|
dev_getattr_all_chr_files(initrc_t)
|
||||||
@ -41271,7 +41183,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
domain_sigchld_all_domains(initrc_t)
|
domain_sigchld_all_domains(initrc_t)
|
||||||
domain_read_all_domains_state(initrc_t)
|
domain_read_all_domains_state(initrc_t)
|
||||||
domain_getattr_all_domains(initrc_t)
|
domain_getattr_all_domains(initrc_t)
|
||||||
@@ -323,8 +488,10 @@ files_getattr_all_symlinks(initrc_t)
|
@@ -323,8 +489,10 @@ files_getattr_all_symlinks(initrc_t)
|
||||||
files_getattr_all_pipes(initrc_t)
|
files_getattr_all_pipes(initrc_t)
|
||||||
files_getattr_all_sockets(initrc_t)
|
files_getattr_all_sockets(initrc_t)
|
||||||
files_purge_tmp(initrc_t)
|
files_purge_tmp(initrc_t)
|
||||||
@ -41283,7 +41195,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
files_delete_all_pids(initrc_t)
|
files_delete_all_pids(initrc_t)
|
||||||
files_delete_all_pid_dirs(initrc_t)
|
files_delete_all_pid_dirs(initrc_t)
|
||||||
files_read_etc_files(initrc_t)
|
files_read_etc_files(initrc_t)
|
||||||
@@ -340,8 +507,12 @@ files_list_isid_type_dirs(initrc_t)
|
@@ -340,8 +508,12 @@ files_list_isid_type_dirs(initrc_t)
|
||||||
files_mounton_isid_type_dirs(initrc_t)
|
files_mounton_isid_type_dirs(initrc_t)
|
||||||
files_list_default(initrc_t)
|
files_list_default(initrc_t)
|
||||||
files_mounton_default(initrc_t)
|
files_mounton_default(initrc_t)
|
||||||
@ -41297,7 +41209,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
fs_list_inotifyfs(initrc_t)
|
fs_list_inotifyfs(initrc_t)
|
||||||
fs_register_binary_executable_type(initrc_t)
|
fs_register_binary_executable_type(initrc_t)
|
||||||
# rhgb-console writes to ramfs
|
# rhgb-console writes to ramfs
|
||||||
@@ -351,6 +522,8 @@ fs_mount_all_fs(initrc_t)
|
@@ -351,6 +523,8 @@ fs_mount_all_fs(initrc_t)
|
||||||
fs_unmount_all_fs(initrc_t)
|
fs_unmount_all_fs(initrc_t)
|
||||||
fs_remount_all_fs(initrc_t)
|
fs_remount_all_fs(initrc_t)
|
||||||
fs_getattr_all_fs(initrc_t)
|
fs_getattr_all_fs(initrc_t)
|
||||||
@ -41306,7 +41218,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
|
|
||||||
# initrc_t needs to do a pidof which requires ptrace
|
# initrc_t needs to do a pidof which requires ptrace
|
||||||
mcs_ptrace_all(initrc_t)
|
mcs_ptrace_all(initrc_t)
|
||||||
@@ -363,6 +536,7 @@ mls_process_read_up(initrc_t)
|
@@ -363,6 +537,7 @@ mls_process_read_up(initrc_t)
|
||||||
mls_process_write_down(initrc_t)
|
mls_process_write_down(initrc_t)
|
||||||
mls_rangetrans_source(initrc_t)
|
mls_rangetrans_source(initrc_t)
|
||||||
mls_fd_share_all_levels(initrc_t)
|
mls_fd_share_all_levels(initrc_t)
|
||||||
@ -41314,7 +41226,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
|
|
||||||
selinux_get_enforce_mode(initrc_t)
|
selinux_get_enforce_mode(initrc_t)
|
||||||
|
|
||||||
@@ -374,6 +548,7 @@ term_use_all_terms(initrc_t)
|
@@ -374,6 +549,7 @@ term_use_all_terms(initrc_t)
|
||||||
term_reset_tty_labels(initrc_t)
|
term_reset_tty_labels(initrc_t)
|
||||||
|
|
||||||
auth_rw_login_records(initrc_t)
|
auth_rw_login_records(initrc_t)
|
||||||
@ -41322,7 +41234,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
auth_setattr_login_records(initrc_t)
|
auth_setattr_login_records(initrc_t)
|
||||||
auth_rw_lastlog(initrc_t)
|
auth_rw_lastlog(initrc_t)
|
||||||
auth_read_pam_pid(initrc_t)
|
auth_read_pam_pid(initrc_t)
|
||||||
@@ -394,13 +569,14 @@ logging_read_audit_config(initrc_t)
|
@@ -394,13 +570,14 @@ logging_read_audit_config(initrc_t)
|
||||||
|
|
||||||
miscfiles_read_localization(initrc_t)
|
miscfiles_read_localization(initrc_t)
|
||||||
# slapd needs to read cert files from its initscript
|
# slapd needs to read cert files from its initscript
|
||||||
@ -41338,7 +41250,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
userdom_read_user_home_content_files(initrc_t)
|
userdom_read_user_home_content_files(initrc_t)
|
||||||
# Allow access to the sysadm TTYs. Note that this will give access to the
|
# Allow access to the sysadm TTYs. Note that this will give access to the
|
||||||
# TTYs to any process in the initrc_t domain. Therefore, daemons and such
|
# TTYs to any process in the initrc_t domain. Therefore, daemons and such
|
||||||
@@ -473,7 +649,7 @@ ifdef(`distro_redhat',`
|
@@ -473,7 +650,7 @@ ifdef(`distro_redhat',`
|
||||||
|
|
||||||
# Red Hat systems seem to have a stray
|
# Red Hat systems seem to have a stray
|
||||||
# fd open from the initrd
|
# fd open from the initrd
|
||||||
@ -41347,7 +41259,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
files_dontaudit_read_root_files(initrc_t)
|
files_dontaudit_read_root_files(initrc_t)
|
||||||
|
|
||||||
# These seem to be from the initrd
|
# These seem to be from the initrd
|
||||||
@@ -519,6 +695,23 @@ ifdef(`distro_redhat',`
|
@@ -519,6 +696,23 @@ ifdef(`distro_redhat',`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
bind_manage_config_dirs(initrc_t)
|
bind_manage_config_dirs(initrc_t)
|
||||||
bind_write_config(initrc_t)
|
bind_write_config(initrc_t)
|
||||||
@ -41371,7 +41283,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -526,10 +719,17 @@ ifdef(`distro_redhat',`
|
@@ -526,10 +720,17 @@ ifdef(`distro_redhat',`
|
||||||
rpc_write_exports(initrc_t)
|
rpc_write_exports(initrc_t)
|
||||||
rpc_manage_nfs_state_data(initrc_t)
|
rpc_manage_nfs_state_data(initrc_t)
|
||||||
')
|
')
|
||||||
@ -41389,7 +41301,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -544,6 +744,35 @@ ifdef(`distro_suse',`
|
@@ -544,6 +745,35 @@ ifdef(`distro_suse',`
|
||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -41425,7 +41337,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
amavis_search_lib(initrc_t)
|
amavis_search_lib(initrc_t)
|
||||||
amavis_setattr_pid_files(initrc_t)
|
amavis_setattr_pid_files(initrc_t)
|
||||||
@@ -556,6 +785,8 @@ optional_policy(`
|
@@ -556,6 +786,8 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
apache_read_config(initrc_t)
|
apache_read_config(initrc_t)
|
||||||
apache_list_modules(initrc_t)
|
apache_list_modules(initrc_t)
|
||||||
@ -41434,7 +41346,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -572,6 +803,7 @@ optional_policy(`
|
@@ -572,6 +804,7 @@ optional_policy(`
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
cgroup_stream_connect_cgred(initrc_t)
|
cgroup_stream_connect_cgred(initrc_t)
|
||||||
@ -41442,7 +41354,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -584,6 +816,11 @@ optional_policy(`
|
@@ -584,6 +817,11 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41454,7 +41366,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
dev_getattr_printer_dev(initrc_t)
|
dev_getattr_printer_dev(initrc_t)
|
||||||
|
|
||||||
cups_read_log(initrc_t)
|
cups_read_log(initrc_t)
|
||||||
@@ -600,9 +837,13 @@ optional_policy(`
|
@@ -600,9 +838,13 @@ optional_policy(`
|
||||||
dbus_connect_system_bus(initrc_t)
|
dbus_connect_system_bus(initrc_t)
|
||||||
dbus_system_bus_client(initrc_t)
|
dbus_system_bus_client(initrc_t)
|
||||||
dbus_read_config(initrc_t)
|
dbus_read_config(initrc_t)
|
||||||
@ -41468,7 +41380,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -701,7 +942,13 @@ optional_policy(`
|
@@ -701,7 +943,13 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41482,7 +41394,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
mta_dontaudit_read_spool_symlinks(initrc_t)
|
mta_dontaudit_read_spool_symlinks(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -724,6 +971,10 @@ optional_policy(`
|
@@ -724,6 +972,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41493,7 +41405,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
postgresql_manage_db(initrc_t)
|
postgresql_manage_db(initrc_t)
|
||||||
postgresql_read_config(initrc_t)
|
postgresql_read_config(initrc_t)
|
||||||
')
|
')
|
||||||
@@ -737,6 +988,10 @@ optional_policy(`
|
@@ -737,6 +989,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41504,7 +41416,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
quota_manage_flags(initrc_t)
|
quota_manage_flags(initrc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@@ -745,6 +1000,10 @@ optional_policy(`
|
@@ -745,6 +1001,10 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41515,7 +41427,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
fs_write_ramfs_sockets(initrc_t)
|
fs_write_ramfs_sockets(initrc_t)
|
||||||
fs_search_ramfs(initrc_t)
|
fs_search_ramfs(initrc_t)
|
||||||
|
|
||||||
@@ -766,8 +1025,6 @@ optional_policy(`
|
@@ -766,8 +1026,6 @@ optional_policy(`
|
||||||
# bash tries ioctl for some reason
|
# bash tries ioctl for some reason
|
||||||
files_dontaudit_ioctl_all_pids(initrc_t)
|
files_dontaudit_ioctl_all_pids(initrc_t)
|
||||||
|
|
||||||
@ -41524,7 +41436,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -776,14 +1033,21 @@ optional_policy(`
|
@@ -776,14 +1034,21 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41546,7 +41458,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
ssh_dontaudit_read_server_keys(initrc_t)
|
ssh_dontaudit_read_server_keys(initrc_t)
|
||||||
@@ -805,11 +1069,19 @@ optional_policy(`
|
@@ -805,11 +1070,19 @@ optional_policy(`
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -41567,7 +41479,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
# system-config-services causes avc messages that should be dontaudited
|
# system-config-services causes avc messages that should be dontaudited
|
||||||
@@ -819,6 +1091,25 @@ optional_policy(`
|
@@ -819,6 +1092,25 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
mono_domtrans(initrc_t)
|
mono_domtrans(initrc_t)
|
||||||
')
|
')
|
||||||
@ -41593,7 +41505,7 @@ index 8a105fd..3f105f0 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@@ -844,3 +1135,59 @@ optional_policy(`
|
@@ -844,3 +1136,59 @@ optional_policy(`
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
zebra_read_config(initrc_t)
|
zebra_read_config(initrc_t)
|
||||||
')
|
')
|
||||||
@ -43082,7 +42994,7 @@ index 7711464..a8bd9fe 100644
|
|||||||
ifdef(`distro_debian',`
|
ifdef(`distro_debian',`
|
||||||
/var/lib/msttcorefonts(/.*)? gen_context(system_u:object_r:fonts_t,s0)
|
/var/lib/msttcorefonts(/.*)? gen_context(system_u:object_r:fonts_t,s0)
|
||||||
diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
|
diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
|
||||||
index fe4e741..9ce4a4f 100644
|
index fe4e741..1dfa62a 100644
|
||||||
--- a/policy/modules/system/miscfiles.if
|
--- a/policy/modules/system/miscfiles.if
|
||||||
+++ b/policy/modules/system/miscfiles.if
|
+++ b/policy/modules/system/miscfiles.if
|
||||||
@@ -414,9 +414,6 @@ interface(`miscfiles_read_localization',`
|
@@ -414,9 +414,6 @@ interface(`miscfiles_read_localization',`
|
||||||
@ -43095,7 +43007,7 @@ index fe4e741..9ce4a4f 100644
|
|||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@@ -585,6 +582,25 @@ interface(`miscfiles_manage_man_pages',`
|
@@ -585,6 +582,26 @@ interface(`miscfiles_manage_man_pages',`
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -43113,6 +43025,7 @@ index fe4e741..9ce4a4f 100644
|
|||||||
+ ')
|
+ ')
|
||||||
+
|
+
|
||||||
+ files_search_usr($1)
|
+ files_search_usr($1)
|
||||||
|
+ relabel_dirs_pattern($1, man_t, man_t)
|
||||||
+ relabel_files_pattern($1, man_t, man_t)
|
+ relabel_files_pattern($1, man_t, man_t)
|
||||||
+')
|
+')
|
||||||
+
|
+
|
||||||
|
@ -21,7 +21,7 @@
|
|||||||
Summary: SELinux policy configuration
|
Summary: SELinux policy configuration
|
||||||
Name: selinux-policy
|
Name: selinux-policy
|
||||||
Version: 3.9.9
|
Version: 3.9.9
|
||||||
Release: 2%{?dist}
|
Release: 3%{?dist}
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
Group: System Environment/Base
|
Group: System Environment/Base
|
||||||
Source: serefpolicy-%{version}.tgz
|
Source: serefpolicy-%{version}.tgz
|
||||||
@ -471,6 +471,9 @@ exit 0
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Nov 18 2010 Dan Walsh <dwalsh@redhat.com> 3.9.9-3
|
||||||
|
- Put back in lircd_etc_t so policy will install
|
||||||
|
|
||||||
* Thu Nov 18 2010 Miroslav Grepl <mgrepl@redhat.com> 3.9.9-2
|
* Thu Nov 18 2010 Miroslav Grepl <mgrepl@redhat.com> 3.9.9-2
|
||||||
- Turn on allow_postfix_local_write_mail_spool
|
- Turn on allow_postfix_local_write_mail_spool
|
||||||
- Allow initrc_t to transition to shutdown_t
|
- Allow initrc_t to transition to shutdown_t
|
||||||
|
Loading…
Reference in New Issue
Block a user