rpms/selinux-policy/F-12 policy-20100106.patch, 1.57, 1.58 selinux-policy.spec, 1.1043, 1.1044

Miroslav Grepl mgrepl at fedoraproject.org
Fri Apr 2 12:42:13 UTC 2010


Author: mgrepl

Update of /cvs/pkgs/rpms/selinux-policy/F-12
In directory cvs01.phx2.fedoraproject.org:/tmp/cvs-serv6361

Modified Files:
	policy-20100106.patch selinux-policy.spec 
Log Message:
- Allow hald to manage block device files


policy-20100106.patch:
 config/appconfig-mcs/x_contexts           |  109 ----
 config/appconfig-mls/x_contexts           |  109 ----
 config/appconfig-standard/x_contexts      |  109 ----
 policy/flask/access_vectors               |   55 +-
 policy/flask/security_classes             |    4 
 policy/modules/admin/alsa.te              |    2 
 policy/modules/admin/consoletype.if       |    4 
 policy/modules/admin/dmesg.fc             |    1 
 policy/modules/admin/logrotate.te         |   13 
 policy/modules/admin/logwatch.te          |    5 
 policy/modules/admin/mcelog.fc            |    2 
 policy/modules/admin/mcelog.if            |   20 
 policy/modules/admin/mcelog.te            |   31 +
 policy/modules/admin/netutils.fc          |    1 
 policy/modules/admin/netutils.te          |    6 
 policy/modules/admin/prelink.te           |    3 
 policy/modules/admin/quota.te             |    1 
 policy/modules/admin/readahead.te         |    3 
 policy/modules/admin/rpm.if               |   60 ++
 policy/modules/admin/rpm.te               |    2 
 policy/modules/admin/shutdown.fc          |    5 
 policy/modules/admin/shutdown.if          |  100 ++++
 policy/modules/admin/shutdown.te          |   57 ++
 policy/modules/admin/smoltclient.te       |    2 
 policy/modules/admin/usermanage.te        |    8 
 policy/modules/admin/vbetool.te           |   13 
 policy/modules/admin/vpn.te               |    7 
 policy/modules/apps/cdrecord.te           |    2 
 policy/modules/apps/chrome.if             |    5 
 policy/modules/apps/chrome.te             |   15 
 policy/modules/apps/execmem.if            |   10 
 policy/modules/apps/firewallgui.te        |    6 
 policy/modules/apps/gnome.fc              |    9 
 policy/modules/apps/gnome.if              |   99 +++-
 policy/modules/apps/gnome.te              |    8 
 policy/modules/apps/gpg.fc                |    2 
 policy/modules/apps/gpg.te                |   10 
 policy/modules/apps/java.if               |    1 
 policy/modules/apps/java.te               |    1 
 policy/modules/apps/kdumpgui.te           |    4 
 policy/modules/apps/livecd.if             |   57 ++
 policy/modules/apps/livecd.te             |    9 
 policy/modules/apps/mozilla.fc            |    1 
 policy/modules/apps/mozilla.if            |   36 +
 policy/modules/apps/nsplugin.fc           |    1 
 policy/modules/apps/nsplugin.if           |   40 +
 policy/modules/apps/nsplugin.te           |   10 
 policy/modules/apps/openoffice.if         |    1 
 policy/modules/apps/podsleuth.te          |    1 
 policy/modules/apps/ptchown.te            |    1 
 policy/modules/apps/pulseaudio.fc         |    7 
 policy/modules/apps/pulseaudio.if         |   70 ++
 policy/modules/apps/pulseaudio.te         |   41 +
 policy/modules/apps/qemu.te               |    1 
 policy/modules/apps/sambagui.te           |    4 
 policy/modules/apps/sandbox.if            |   54 +-
 policy/modules/apps/sandbox.te            |   49 +
 policy/modules/apps/slocate.te            |    3 
 policy/modules/apps/vmware.if             |   18 
 policy/modules/apps/vmware.te             |   11 
 policy/modules/apps/wine.if               |    5 
 policy/modules/apps/wine.te               |   18 
 policy/modules/apps/wm.if                 |   16 
 policy/modules/kernel/corecommands.fc     |    5 
 policy/modules/kernel/corenetwork.if.in   |  279 ++++++++++-
 policy/modules/kernel/corenetwork.te.in   |   46 -
 policy/modules/kernel/devices.fc          |    5 
 policy/modules/kernel/devices.if          |  335 ++++++++++++-
 policy/modules/kernel/devices.te          |   25 -
 policy/modules/kernel/domain.if           |   24 
 policy/modules/kernel/domain.te           |    6 
 policy/modules/kernel/files.fc            |    2 
 policy/modules/kernel/files.if            |  352 +++++++++++---
 policy/modules/kernel/files.te            |    7 
 policy/modules/kernel/filesystem.if       |  212 ++++++++
 policy/modules/kernel/filesystem.te       |   12 
 policy/modules/kernel/kernel.if           |   54 ++
 policy/modules/kernel/terminal.if         |  247 +++++++++-
 policy/modules/roles/auditadm.te          |    2 
 policy/modules/roles/secadm.te            |    2 
 policy/modules/roles/staff.te             |   20 
 policy/modules/roles/sysadm.te            |   12 
 policy/modules/roles/unconfineduser.fc    |    5 
 policy/modules/roles/unconfineduser.te    |   17 
 policy/modules/roles/unprivuser.te        |    2 
 policy/modules/roles/xguest.te            |    7 
 policy/modules/services/abrt.if           |    5 
 policy/modules/services/abrt.te           |   26 +
 policy/modules/services/afs.te            |   10 
 policy/modules/services/aisexec.fc        |    2 
 policy/modules/services/aisexec.te        |    8 
 policy/modules/services/amavis.te         |    1 
 policy/modules/services/apache.fc         |   11 
 policy/modules/services/apache.if         |   48 +
 policy/modules/services/apache.te         |   47 +
 policy/modules/services/apcupsd.te        |    6 
 policy/modules/services/arpwatch.te       |    2 
 policy/modules/services/asterisk.if       |   19 
 policy/modules/services/asterisk.te       |    1 
 policy/modules/services/avahi.fc          |    2 
 policy/modules/services/avahi.if          |    1 
 policy/modules/services/bind.if           |   19 
 policy/modules/services/bluetooth.te      |    2 
 policy/modules/services/cachefilesd.fc    |   28 +
 policy/modules/services/cachefilesd.if    |   41 +
 policy/modules/services/cachefilesd.te    |  146 +++++
 policy/modules/services/ccs.te            |    6 
 policy/modules/services/chronyd.fc        |    2 
 policy/modules/services/chronyd.te        |   15 
 policy/modules/services/clogd.if          |   24 
 policy/modules/services/clogd.te          |    7 
 policy/modules/services/cobbler.fc        |    5 
 policy/modules/services/cobbler.if        |  156 ++++++
 policy/modules/services/cobbler.te        |  132 +++++
 policy/modules/services/consolekit.te     |   19 
 policy/modules/services/corosync.fc       |    3 
 policy/modules/services/corosync.te       |   15 
 policy/modules/services/cron.if           |   18 
 policy/modules/services/cron.te           |    9 
 policy/modules/services/cups.te           |    8 
 policy/modules/services/dbus.if           |    7 
 policy/modules/services/dcc.te            |    2 
 policy/modules/services/devicekit.fc      |    4 
 policy/modules/services/devicekit.te      |   14 
 policy/modules/services/dhcp.if           |   19 
 policy/modules/services/dhcp.te           |    4 
 policy/modules/services/djbdns.if         |   38 +
 policy/modules/services/djbdns.te         |    8 
 policy/modules/services/dnsmasq.fc        |    2 
 policy/modules/services/dnsmasq.if        |   38 +
 policy/modules/services/dnsmasq.te        |    8 
 policy/modules/services/dovecot.te        |    6 
 policy/modules/services/exim.if           |   18 
 policy/modules/services/fail2ban.if       |   18 
 policy/modules/services/ftp.fc            |    2 
 policy/modules/services/ftp.if            |   37 +
 policy/modules/services/ftp.te            |  116 ++++
 policy/modules/services/git.fc            |   17 
 policy/modules/services/git.if            |  466 ++++++++++++++----
 policy/modules/services/git.te            |  145 +++--
 policy/modules/services/gpm.fc            |    2 
 policy/modules/services/hal.te            |   36 +
 policy/modules/services/inn.te            |    1 
 policy/modules/services/kerberos.if       |   21 
 policy/modules/services/ldap.fc           |    3 
 policy/modules/services/ldap.te           |   13 
 policy/modules/services/likewise.fc       |   54 ++
 policy/modules/services/likewise.if       |  105 ++++
 policy/modules/services/likewise.te       |  247 ++++++++++
 policy/modules/services/lircd.te          |    7 
 policy/modules/services/mailman.te        |    1 
 policy/modules/services/memcached.te      |   14 
 policy/modules/services/modemmanager.te   |    2 
 policy/modules/services/mta.if            |   38 +
 policy/modules/services/mta.te            |    1 
 policy/modules/services/munin.te          |    3 
 policy/modules/services/mysql.te          |    8 
 policy/modules/services/nagios.fc         |   46 +
 policy/modules/services/nagios.if         |   28 +
 policy/modules/services/nagios.te         |   90 +++
 policy/modules/services/networkmanager.fc |    1 
 policy/modules/services/networkmanager.if |   19 
 policy/modules/services/networkmanager.te |    2 
 policy/modules/services/nis.fc            |    5 
 policy/modules/services/nis.te            |    8 
 policy/modules/services/nut.te            |   11 
 policy/modules/services/nx.if             |   18 
 policy/modules/services/openvpn.te        |   10 
 policy/modules/services/plymouth.fc       |    5 
 policy/modules/services/plymouth.if       |  304 ------------
 policy/modules/services/plymouth.te       |  102 ----
 policy/modules/services/plymouthd.fc      |    9 
 policy/modules/services/plymouthd.if      |  322 +++++++++++++
 policy/modules/services/plymouthd.te      |  106 ++++
 policy/modules/services/policykit.te      |   21 
 policy/modules/services/postfix.if        |   37 +
 policy/modules/services/postfix.te        |    9 
 policy/modules/services/ppp.fc            |    2 
 policy/modules/services/ppp.te            |    9 
 policy/modules/services/prelude.te        |    2 
 policy/modules/services/qmail.if          |   18 
 policy/modules/services/qpidd.fc          |    9 
 policy/modules/services/qpidd.if          |  236 +++++++++
 policy/modules/services/qpidd.te          |   61 ++
 policy/modules/services/rgmanager.if      |   40 +
 policy/modules/services/rgmanager.te      |   58 +-
 policy/modules/services/rhcs.fc           |    9 
 policy/modules/services/rhcs.if           |   58 ++
 policy/modules/services/rhcs.te           |  278 ++---------
 policy/modules/services/ricci.te          |    8 
 policy/modules/services/rpc.if            |    1 
 policy/modules/services/rpc.te            |    8 
 policy/modules/services/rsync.if          |   38 +
 policy/modules/services/rsync.te          |    1 
 policy/modules/services/samba.te          |   20 
 policy/modules/services/sasl.te           |    2 
 policy/modules/services/sendmail.te       |    4 
 policy/modules/services/setroubleshoot.te |    4 
 policy/modules/services/snmp.te           |    5 
 policy/modules/services/snort.te          |    2 
 policy/modules/services/spamassassin.if   |   18 
 policy/modules/services/spamassassin.te   |    6 
 policy/modules/services/squid.te          |   12 
 policy/modules/services/ssh.if            |    4 
 policy/modules/services/ssh.te            |   84 ---
 policy/modules/services/sssd.fc           |    4 
 policy/modules/services/sssd.if           |   85 ++-
 policy/modules/services/sssd.te           |   20 
 policy/modules/services/tftp.if           |   20 
 policy/modules/services/tftp.te           |    1 
 policy/modules/services/tgtd.te           |    1 
 policy/modules/services/tor.fc            |    1 
 policy/modules/services/tuned.fc          |    3 
 policy/modules/services/tuned.te          |   15 
 policy/modules/services/ucspitcp.te       |    5 
 policy/modules/services/usbmuxd.fc        |    6 
 policy/modules/services/usbmuxd.if        |   64 ++
 policy/modules/services/usbmuxd.te        |   51 ++
 policy/modules/services/virt.if           |   10 
 policy/modules/services/virt.te           |   26 -
 policy/modules/services/xserver.fc        |   18 
 policy/modules/services/xserver.if        |  738 ++++++++++--------------------
 policy/modules/services/xserver.te        |  389 ++++++++-------
 policy/modules/system/application.te      |   16 
 policy/modules/system/authlogin.if        |    4 
 policy/modules/system/daemontools.if      |   62 ++
 policy/modules/system/daemontools.te      |   26 -
 policy/modules/system/fstools.fc          |    2 
 policy/modules/system/hostname.te         |    3 
 policy/modules/system/hotplug.te          |    4 
 policy/modules/system/init.if             |   38 +
 policy/modules/system/init.te             |   28 +
 policy/modules/system/ipsec.te            |   13 
 policy/modules/system/iptables.if         |   10 
 policy/modules/system/iptables.te         |    6 
 policy/modules/system/iscsi.fc            |    3 
 policy/modules/system/iscsi.te            |   10 
 policy/modules/system/libraries.fc        |   27 -
 policy/modules/system/locallogin.te       |   22 
 policy/modules/system/logging.fc          |    7 
 policy/modules/system/logging.if          |   18 
 policy/modules/system/logging.te          |   10 
 policy/modules/system/lvm.fc              |    1 
 policy/modules/system/lvm.if              |    4 
 policy/modules/system/lvm.te              |    6 
 policy/modules/system/miscfiles.fc        |    5 
 policy/modules/system/miscfiles.if        |   37 +
 policy/modules/system/modutils.te         |    2 
 policy/modules/system/mount.if            |   56 ++
 policy/modules/system/mount.te            |   56 ++
 policy/modules/system/selinuxutil.if      |   21 
 policy/modules/system/selinuxutil.te      |   25 -
 policy/modules/system/sosreport.fc        |    2 
 policy/modules/system/sosreport.if        |   74 +++
 policy/modules/system/sosreport.te        |  129 +++++
 policy/modules/system/sysnetwork.fc       |    1 
 policy/modules/system/sysnetwork.if       |    4 
 policy/modules/system/sysnetwork.te       |    3 
 policy/modules/system/udev.te             |    5 
 policy/modules/system/unconfined.if       |    2 
 policy/modules/system/userdomain.fc       |    2 
 policy/modules/system/userdomain.if       |   45 +
 policy/modules/system/xen.if              |    2 
 policy/modules/system/xen.te              |   22 
 policy/support/obj_perm_sets.spt          |    8 
 policy/users                              |    2 
 266 files changed, 7448 insertions(+), 2387 deletions(-)

Index: policy-20100106.patch
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/policy-20100106.patch,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -p -r1.57 -r1.58
--- policy-20100106.patch	30 Mar 2010 14:31:43 -0000	1.57
+++ policy-20100106.patch	2 Apr 2010 12:42:12 -0000	1.58
@@ -4886,7 +4886,7 @@ diff -b -B --ignore-all-space --exclude-
  # Rules for all filesystem types
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/kernel.if serefpolicy-3.6.32/policy/modules/kernel/kernel.if
 --- nsaserefpolicy/policy/modules/kernel/kernel.if	2010-01-18 18:24:22.708530703 +0100
-+++ serefpolicy-3.6.32/policy/modules/kernel/kernel.if	2010-03-03 10:57:00.705612069 +0100
++++ serefpolicy-3.6.32/policy/modules/kernel/kernel.if	2010-04-02 14:36:27.722599933 +0200
 @@ -610,6 +610,24 @@
  	search_dirs_pattern($1, debugfs_t, debugfs_t)
  ')
@@ -4912,7 +4912,32 @@ diff -b -B --ignore-all-space --exclude-
  ########################################
  ## <summary>
  ##	Read information from the debugging filesystem.
-@@ -2732,3 +2750,21 @@
+@@ -2063,6 +2081,24 @@
+ 	dontaudit $1 unlabeled_t:dir list_dir_perms;
+ ')
+ 
++#######################################
++## <summary>
++##	Read and write unlabeled files.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	Domain allowed access.
++##	</summary>
++## </param>
++#
++interface(`kernel_rw_unlabeled_files',`
++	gen_require(`
++		type unlabeled_t;
++	')
++
++	allow $1 unlabeled_t:file rw_file_perms;
++')
++
+ ########################################
+ ## <summary>
+ ##	Read and write unlabeled directories.
+@@ -2732,3 +2768,21 @@
  
  	allow $1 kernel_t:unix_stream_socket connectto;
  ')
@@ -5572,7 +5597,7 @@ diff -b -B --ignore-all-space --exclude-
  userdom_dontaudit_use_user_terminals(abrt_helper_t)
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/afs.te serefpolicy-3.6.32/policy/modules/services/afs.te
 --- nsaserefpolicy/policy/modules/services/afs.te	2010-01-18 18:24:22.729540009 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/afs.te	2010-01-20 13:19:16.795611181 +0100
++++ serefpolicy-3.6.32/policy/modules/services/afs.te	2010-04-02 10:04:52.832602649 +0200
 @@ -1,5 +1,5 @@
  
 -policy_module(afs, 1.5.0)
@@ -5589,12 +5614,16 @@ diff -b -B --ignore-all-space --exclude-
  allow afs_t self:udp_socket create_socket_perms;
  allow afs_t self:fifo_file rw_file_perms;
  allow afs_t self:unix_stream_socket create_stream_socket_perms;
-@@ -105,6 +105,8 @@
+@@ -105,6 +105,12 @@
  
  miscfiles_read_localization(afs_t)
  
 +sysnet_dns_name_resolve(afs_t)
 +
++ifdef(`hide_broken_symptoms', `
++	kernel_rw_unlabeled_files(afs_t)
++')    
++
  ########################################
  #
  # AFS bossserver local policy
@@ -8528,7 +8557,7 @@ diff -b -B --ignore-all-space --exclude-
 +/var/run/gpm\.pid  -- gen_context(system_u:object_r:gpm_var_run_t,s0) 
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.te serefpolicy-3.6.32/policy/modules/services/hal.te
 --- nsaserefpolicy/policy/modules/services/hal.te	2010-01-18 18:24:22.795530524 +0100
-+++ serefpolicy-3.6.32/policy/modules/services/hal.te	2010-03-30 08:54:31.516876450 +0200
++++ serefpolicy-3.6.32/policy/modules/services/hal.te	2010-04-02 10:03:49.167852833 +0200
 @@ -1,5 +1,5 @@
  
 -policy_module(hal, 1.12.0)
@@ -8556,7 +8585,15 @@ diff -b -B --ignore-all-space --exclude-
  dev_read_urand(hald_t)
  dev_read_input(hald_t)
  dev_read_mouse(hald_t)
-@@ -165,7 +166,6 @@
+@@ -128,6 +129,7 @@
+ dev_read_lvm_control(hald_t)
+ dev_getattr_all_chr_files(hald_t)
+ dev_manage_generic_chr_files(hald_t)
++dev_manage_generic_blk_files(hald_t)
+ dev_rw_generic_usb_dev(hald_t)
+ dev_setattr_generic_usb_dev(hald_t)
+ dev_setattr_usbfs_files(hald_t)
+@@ -165,7 +167,6 @@
  fs_unmount_dos_fs(hald_t)
  fs_manage_dos_files(hald_t)
  fs_manage_fusefs_dirs(hald_t)
@@ -8564,7 +8601,7 @@ diff -b -B --ignore-all-space --exclude-
  fs_rw_removable_blk_files(hald_t)
  
  files_getattr_all_mountpoints(hald_t)
-@@ -186,7 +186,7 @@
+@@ -186,7 +187,7 @@
  
  # hal_probe_serial causes these
  term_setattr_unallocated_ttys(hald_t)
@@ -8573,7 +8610,7 @@ diff -b -B --ignore-all-space --exclude-
  
  auth_use_nsswitch(hald_t)
  
-@@ -215,9 +215,9 @@
+@@ -215,9 +216,9 @@
  seutil_read_default_contexts(hald_t)
  seutil_read_file_contexts(hald_t)
  
@@ -8584,7 +8621,7 @@ diff -b -B --ignore-all-space --exclude-
  sysnet_read_dhcp_config(hald_t)
  
  userdom_dontaudit_use_unpriv_user_fds(hald_t)
-@@ -272,6 +272,10 @@
+@@ -272,6 +273,10 @@
  ')
  
  optional_policy(`
@@ -8595,7 +8632,7 @@ diff -b -B --ignore-all-space --exclude-
  	gpm_dontaudit_getattr_gpmctl(hald_t)
  ')
  
-@@ -322,11 +326,19 @@
+@@ -322,11 +327,19 @@
  ')
  
  optional_policy(`
@@ -8615,7 +8652,7 @@ diff -b -B --ignore-all-space --exclude-
  	updfstab_domtrans(hald_t)
  ')
  
-@@ -483,9 +495,10 @@
+@@ -483,9 +496,10 @@
  #
  # Local hald dccm policy
  #
@@ -8627,7 +8664,7 @@ diff -b -B --ignore-all-space --exclude-
  allow hald_dccm_t self:tcp_socket create_stream_socket_perms;
  allow hald_dccm_t self:udp_socket create_socket_perms;
  allow hald_dccm_t self:netlink_route_socket rw_netlink_socket_perms;
-@@ -508,11 +521,9 @@
+@@ -508,11 +522,9 @@
  
  write_files_pattern(hald_dccm_t, hald_log_t, hald_log_t)
  
@@ -8640,7 +8677,7 @@ diff -b -B --ignore-all-space --exclude-
  
  corenet_all_recvfrom_unlabeled(hald_dccm_t)
  corenet_all_recvfrom_netlabel(hald_dccm_t)
-@@ -525,7 +536,7 @@
+@@ -525,7 +537,7 @@
  corenet_tcp_bind_generic_node(hald_dccm_t)
  corenet_udp_bind_generic_node(hald_dccm_t)
  corenet_udp_bind_dhcpc_port(hald_dccm_t)
@@ -8649,7 +8686,7 @@ diff -b -B --ignore-all-space --exclude-
  corenet_tcp_bind_dccm_port(hald_dccm_t)
  
  logging_send_syslog_msg(hald_dccm_t)
-@@ -534,6 +545,8 @@
+@@ -534,6 +546,8 @@
  
  miscfiles_read_localization(hald_dccm_t)
  
@@ -15656,7 +15693,7 @@ diff -b -B --ignore-all-space --exclude-
  
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/init.if serefpolicy-3.6.32/policy/modules/system/init.if
 --- nsaserefpolicy/policy/modules/system/init.if	2010-01-18 18:24:22.933540325 +0100
-+++ serefpolicy-3.6.32/policy/modules/system/init.if	2010-03-19 16:25:23.634611767 +0100
++++ serefpolicy-3.6.32/policy/modules/system/init.if	2010-04-02 10:00:49.830602804 +0200
 @@ -165,6 +165,7 @@
  		type init_t;
  		role system_r;
@@ -15691,7 +15728,15 @@ diff -b -B --ignore-all-space --exclude-
  
  	ifdef(`hide_broken_symptoms',`
  		# RHEL4 systems seem to have a stray
-@@ -309,7 +315,7 @@
+@@ -292,6 +298,7 @@
+ 
+ 	userdom_dontaudit_search_user_home_dirs($1)
+ 	userdom_dontaudit_rw_stream($1)
++	userdom_dontaudit_write_user_tmp_files($1)
+ 
+ 	tunable_policy(`allow_daemons_use_tty',`
+ 	   term_use_all_user_ttys($1)
+@@ -309,7 +316,7 @@
  	')
  
  	 optional_policy(`
@@ -15700,7 +15745,7 @@ diff -b -B --ignore-all-space --exclude-
  	')
  
  	optional_policy(`
-@@ -554,7 +560,7 @@
+@@ -554,7 +561,7 @@
  	')
  
  	dev_list_all_dev_nodes($1)
@@ -15709,7 +15754,7 @@ diff -b -B --ignore-all-space --exclude-
  ')
  
  ########################################
-@@ -775,8 +781,10 @@
+@@ -775,8 +782,10 @@
  interface(`init_labeled_script_domtrans',`
  	gen_require(`
  		type initrc_t;
@@ -15720,7 +15765,7 @@ diff -b -B --ignore-all-space --exclude-
  	domtrans_pattern($1, $2, initrc_t)
  	files_search_etc($1)
  ')
-@@ -1544,7 +1552,7 @@
+@@ -1544,7 +1553,7 @@
  		type initrc_var_run_t;
  	')
  
@@ -15729,7 +15774,7 @@ diff -b -B --ignore-all-space --exclude-
  ')
  
  ########################################
-@@ -1686,3 +1694,26 @@
+@@ -1686,3 +1695,26 @@
  	allow $1 initrc_t:sem rw_sem_perms;
  ')
  


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/pkgs/rpms/selinux-policy/F-12/selinux-policy.spec,v
retrieving revision 1.1043
retrieving revision 1.1044
diff -u -p -r1.1043 -r1.1044
--- selinux-policy.spec	30 Mar 2010 14:31:44 -0000	1.1043
+++ selinux-policy.spec	2 Apr 2010 12:42:13 -0000	1.1044
@@ -20,7 +20,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.6.32
-Release: 108%{?dist}
+Release: 109%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -469,6 +469,9 @@ exit 0
 %endif
 
 %changelog
+* Fri Apr 2 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-109
+- Allow hald to manage block device files
+
 * Tue Mar 30 2010 Miroslav Grepl <mgrepl at redhat.com> 3.6.32-108
 - Add label for libgpac library
 - Fixes for openvpn



More information about the scm-commits mailing list