[selinux-policy/f14/master] * Wed Aug 4 2010 Dan Walsh <dwalsh at redhat.com> 3.8.8-10 - Allow pcscd to read sysfs - systemd fixes
Daniel J Walsh
dwalsh at fedoraproject.org
Wed Aug 4 20:34:36 UTC 2010
commit 60d435ee1c5d8ba62284bf1b4c2fdc289116e8f7
Author: Dan Walsh <dwalsh at redhat.com>
Date: Wed Aug 4 16:34:31 2010 -0400
* Wed Aug 4 2010 Dan Walsh <dwalsh at redhat.com> 3.8.8-10
- Allow pcscd to read sysfs
- systemd fixes
- Fix wine_mmap_zero_ignore boolean
policy-F14.patch | 11 ++++++-----
1 files changed, 6 insertions(+), 5 deletions(-)
---
diff --git a/policy-F14.patch b/policy-F14.patch
index af9df7a..ca3d6d5 100644
--- a/policy-F14.patch
+++ b/policy-F14.patch
@@ -2100,7 +2100,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/rpm.if
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/rpm.te serefpolicy-3.8.8/policy/modules/admin/rpm.te
--- nsaserefpolicy/policy/modules/admin/rpm.te 2010-07-27 16:06:04.000000000 -0400
-+++ serefpolicy-3.8.8/policy/modules/admin/rpm.te 2010-07-30 14:06:53.000000000 -0400
++++ serefpolicy-3.8.8/policy/modules/admin/rpm.te 2010-08-04 16:24:06.000000000 -0400
@@ -1,10 +1,11 @@
policy_module(rpm, 1.11.1)
@@ -10774,8 +10774,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/roles/unconfi
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/roles/unconfineduser.te serefpolicy-3.8.8/policy/modules/roles/unconfineduser.te
--- nsaserefpolicy/policy/modules/roles/unconfineduser.te 1969-12-31 19:00:00.000000000 -0500
-+++ serefpolicy-3.8.8/policy/modules/roles/unconfineduser.te 2010-07-30 14:06:53.000000000 -0400
-@@ -0,0 +1,448 @@
++++ serefpolicy-3.8.8/policy/modules/roles/unconfineduser.te 2010-08-04 16:24:57.000000000 -0400
+@@ -0,0 +1,449 @@
+policy_module(unconfineduser, 1.0.0)
+
+########################################
@@ -11185,6 +11185,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/roles/unconfi
+ unconfined_domain_noaudit(unconfined_execmem_t)
+ allow unconfined_execmem_t unconfined_t:process transition;
+ rpm_transition_script(unconfined_execmem_t)
++ role system_r types unconfined_execmem_t;
+
+ optional_policy(`
+ init_dbus_chat_script(unconfined_execmem_t)
@@ -20600,7 +20601,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pira
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/piranha.te serefpolicy-3.8.8/policy/modules/services/piranha.te
--- nsaserefpolicy/policy/modules/services/piranha.te 1969-12-31 19:00:00.000000000 -0500
-+++ serefpolicy-3.8.8/policy/modules/services/piranha.te 2010-08-04 13:10:54.000000000 -0400
++++ serefpolicy-3.8.8/policy/modules/services/piranha.te 2010-08-04 16:34:08.000000000 -0400
@@ -0,0 +1,215 @@
+policy_module(piranha,1.0.0)
+
@@ -20691,7 +20692,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pira
+manage_files_pattern(piranha_web_t, piranha_web_tmp_t, piranha_web_tmp_t)
+files_tmp_filetrans(piranha_web_t, piranha_web_tmp_t, { file dir })
+
-+manage_dirs_patter(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t)
++manage_dirs_pattern(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t)
+manage_files_pattern(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t)
+fs_tmpfs_filetrans(piranha_web_t, piranha_web_tmpfs_t, { dir file })
+
More information about the scm-commits
mailing list