[selinux-policy/f14/master] * Wed Aug 4 2010 Dan Walsh <dwalsh at redhat.com> 3.8.8-10 - Allow pcscd to read sysfs - systemd fixes

Daniel J Walsh dwalsh at fedoraproject.org
Wed Aug 4 20:34:36 UTC 2010


commit 60d435ee1c5d8ba62284bf1b4c2fdc289116e8f7
Author: Dan Walsh <dwalsh at redhat.com>
Date:   Wed Aug 4 16:34:31 2010 -0400

    * Wed Aug 4 2010 Dan Walsh <dwalsh at redhat.com> 3.8.8-10
    - Allow pcscd to read sysfs
    - systemd fixes
    - Fix wine_mmap_zero_ignore boolean

 policy-F14.patch |   11 ++++++-----
 1 files changed, 6 insertions(+), 5 deletions(-)
---
diff --git a/policy-F14.patch b/policy-F14.patch
index af9df7a..ca3d6d5 100644
--- a/policy-F14.patch
+++ b/policy-F14.patch
@@ -2100,7 +2100,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/rpm.if
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/rpm.te serefpolicy-3.8.8/policy/modules/admin/rpm.te
 --- nsaserefpolicy/policy/modules/admin/rpm.te	2010-07-27 16:06:04.000000000 -0400
-+++ serefpolicy-3.8.8/policy/modules/admin/rpm.te	2010-07-30 14:06:53.000000000 -0400
++++ serefpolicy-3.8.8/policy/modules/admin/rpm.te	2010-08-04 16:24:06.000000000 -0400
 @@ -1,10 +1,11 @@
  policy_module(rpm, 1.11.1)
  
@@ -10774,8 +10774,8 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/roles/unconfi
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/roles/unconfineduser.te serefpolicy-3.8.8/policy/modules/roles/unconfineduser.te
 --- nsaserefpolicy/policy/modules/roles/unconfineduser.te	1969-12-31 19:00:00.000000000 -0500
-+++ serefpolicy-3.8.8/policy/modules/roles/unconfineduser.te	2010-07-30 14:06:53.000000000 -0400
-@@ -0,0 +1,448 @@
++++ serefpolicy-3.8.8/policy/modules/roles/unconfineduser.te	2010-08-04 16:24:57.000000000 -0400
+@@ -0,0 +1,449 @@
 +policy_module(unconfineduser, 1.0.0)
 +
 +########################################
@@ -11185,6 +11185,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/roles/unconfi
 +	unconfined_domain_noaudit(unconfined_execmem_t)
 +	allow unconfined_execmem_t unconfined_t:process transition;
 +	rpm_transition_script(unconfined_execmem_t)
++	role system_r types unconfined_execmem_t;
 +
 +	optional_policy(`
 +		init_dbus_chat_script(unconfined_execmem_t)
@@ -20600,7 +20601,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pira
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/piranha.te serefpolicy-3.8.8/policy/modules/services/piranha.te
 --- nsaserefpolicy/policy/modules/services/piranha.te	1969-12-31 19:00:00.000000000 -0500
-+++ serefpolicy-3.8.8/policy/modules/services/piranha.te	2010-08-04 13:10:54.000000000 -0400
++++ serefpolicy-3.8.8/policy/modules/services/piranha.te	2010-08-04 16:34:08.000000000 -0400
 @@ -0,0 +1,215 @@
 +policy_module(piranha,1.0.0)
 +
@@ -20691,7 +20692,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/pira
 +manage_files_pattern(piranha_web_t, piranha_web_tmp_t, piranha_web_tmp_t)
 +files_tmp_filetrans(piranha_web_t, piranha_web_tmp_t, { file dir })
 +
-+manage_dirs_patter(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t)
++manage_dirs_pattern(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t)
 +manage_files_pattern(piranha_web_t, piranha_web_tmpfs_t, piranha_web_tmpfs_t)
 +fs_tmpfs_filetrans(piranha_web_t, piranha_web_tmpfs_t, { dir file })
 +


More information about the scm-commits mailing list