rpms/selinux-policy/F-13 policy-F13.patch,1.79,1.80
Daniel J Walsh
dwalsh at fedoraproject.org
Mon Mar 15 21:18:26 UTC 2010
Author: dwalsh
Update of /cvs/extras/rpms/selinux-policy/F-13
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv12468
Modified Files:
policy-F13.patch
Log Message:
* Sun Mar 14 2010 Dan Walsh <dwalsh at redhat.com> 3.7.14-4
- Allow shutdown dac_override
policy-F13.patch:
Makefile | 2
policy/global_tunables | 24
policy/modules/admin/acct.te | 1
policy/modules/admin/alsa.te | 2
policy/modules/admin/anaconda.te | 3
policy/modules/admin/brctl.te | 2
policy/modules/admin/certwatch.te | 2
policy/modules/admin/consoletype.if | 3
policy/modules/admin/consoletype.te | 1
policy/modules/admin/firstboot.te | 6
policy/modules/admin/kismet.te | 1
policy/modules/admin/logrotate.te | 38
policy/modules/admin/mcelog.fc | 2
policy/modules/admin/mcelog.if | 21
policy/modules/admin/mcelog.te | 32
policy/modules/admin/mrtg.te | 1
policy/modules/admin/netutils.fc | 1
policy/modules/admin/netutils.te | 20
policy/modules/admin/prelink.fc | 1
policy/modules/admin/prelink.if | 23
policy/modules/admin/prelink.te | 79 +
policy/modules/admin/quota.te | 1
policy/modules/admin/readahead.te | 3
policy/modules/admin/rpm.fc | 21
policy/modules/admin/rpm.if | 387 +++++++
policy/modules/admin/rpm.te | 104 +
policy/modules/admin/shorewall.te | 2
policy/modules/admin/shutdown.fc | 5
policy/modules/admin/shutdown.if | 118 ++
policy/modules/admin/shutdown.te | 57 +
policy/modules/admin/smoltclient.fc | 4
policy/modules/admin/smoltclient.if | 1
policy/modules/admin/smoltclient.te | 66 +
policy/modules/admin/su.if | 8
policy/modules/admin/sudo.if | 9
policy/modules/admin/tmpreaper.te | 18
policy/modules/admin/usermanage.if | 20
policy/modules/admin/usermanage.te | 18
policy/modules/admin/vbetool.te | 6
policy/modules/admin/vpn.te | 8
policy/modules/apps/chrome.fc | 2
policy/modules/apps/chrome.if | 90 +
policy/modules/apps/chrome.te | 81 +
policy/modules/apps/cpufreqselector.te | 2
policy/modules/apps/execmem.fc | 45
policy/modules/apps/execmem.if | 118 ++
policy/modules/apps/execmem.te | 11
policy/modules/apps/firewallgui.fc | 3
policy/modules/apps/firewallgui.if | 23
policy/modules/apps/firewallgui.te | 66 +
policy/modules/apps/gitosis.if | 44
policy/modules/apps/gnome.fc | 24
policy/modules/apps/gnome.if | 242 ++++
policy/modules/apps/gnome.te | 116 ++
policy/modules/apps/gpg.fc | 1
policy/modules/apps/gpg.if | 5
policy/modules/apps/gpg.te | 14
policy/modules/apps/java.fc | 7
policy/modules/apps/java.if | 4
policy/modules/apps/java.te | 8
policy/modules/apps/kdumpgui.fc | 2
policy/modules/apps/kdumpgui.if | 2
policy/modules/apps/kdumpgui.te | 68 +
policy/modules/apps/livecd.fc | 2
policy/modules/apps/livecd.if | 52
policy/modules/apps/livecd.te | 27
policy/modules/apps/loadkeys.if | 3
policy/modules/apps/loadkeys.te | 6
policy/modules/apps/mono.if | 2
policy/modules/apps/mozilla.fc | 2
policy/modules/apps/mozilla.if | 62 +
policy/modules/apps/mozilla.te | 22
policy/modules/apps/mplayer.if | 36
policy/modules/apps/nsplugin.fc | 10
policy/modules/apps/nsplugin.if | 390 +++++++
policy/modules/apps/nsplugin.te | 295 +++++
policy/modules/apps/openoffice.fc | 3
policy/modules/apps/openoffice.if | 129 ++
policy/modules/apps/openoffice.te | 17
policy/modules/apps/podsleuth.te | 3
policy/modules/apps/ptchown.if | 24
policy/modules/apps/ptchown.te | 1
policy/modules/apps/pulseaudio.fc | 8
policy/modules/apps/pulseaudio.if | 74 +
policy/modules/apps/pulseaudio.te | 44
policy/modules/apps/qemu.if | 64 +
policy/modules/apps/qemu.te | 9
policy/modules/apps/sambagui.fc | 1
policy/modules/apps/sambagui.if | 2
policy/modules/apps/sambagui.te | 66 +
policy/modules/apps/sandbox.fc | 1
policy/modules/apps/sandbox.if | 250 ++++
policy/modules/apps/sandbox.te | 365 ++++++
policy/modules/apps/screen.if | 1
policy/modules/apps/seunshare.if | 78 -
policy/modules/apps/seunshare.te | 35
policy/modules/apps/slocate.te | 2
policy/modules/apps/userhelper.fc | 1
policy/modules/apps/userhelper.if | 48
policy/modules/apps/userhelper.te | 42
policy/modules/apps/vmware.if | 19
policy/modules/apps/vmware.te | 10
policy/modules/apps/wine.if | 11
policy/modules/apps/wine.te | 20
policy/modules/apps/wm.if | 16
policy/modules/kernel/corecommands.fc | 21
policy/modules/kernel/corecommands.if | 2
policy/modules/kernel/corenetwork.te.in | 20
policy/modules/kernel/devices.fc | 1
policy/modules/kernel/devices.if | 73 +
policy/modules/kernel/devices.te | 11
policy/modules/kernel/domain.if | 164 +++
policy/modules/kernel/domain.te | 108 ++
policy/modules/kernel/files.fc | 15
policy/modules/kernel/files.if | 579 ++++++++++
policy/modules/kernel/files.te | 11
policy/modules/kernel/filesystem.if | 26
policy/modules/kernel/filesystem.te | 2
policy/modules/kernel/kernel.if | 94 +
policy/modules/kernel/kernel.te | 26
policy/modules/kernel/selinux.if | 25
policy/modules/kernel/terminal.if | 10
policy/modules/roles/auditadm.te | 2
policy/modules/roles/guest.te | 6
policy/modules/roles/staff.te | 103 +
policy/modules/roles/sysadm.te | 96 +
policy/modules/roles/unconfineduser.fc | 10
policy/modules/roles/unconfineduser.if | 667 ++++++++++++
policy/modules/roles/unconfineduser.te | 417 +++++++
policy/modules/roles/unprivuser.te | 21
policy/modules/roles/xguest.te | 72 +
policy/modules/services/abrt.fc | 8
policy/modules/services/abrt.if | 143 ++
policy/modules/services/abrt.te | 144 ++
policy/modules/services/afs.if | 2
policy/modules/services/afs.te | 6
policy/modules/services/aiccu.fc | 5
policy/modules/services/aiccu.if | 119 ++
policy/modules/services/aiccu.te | 41
policy/modules/services/aisexec.fc | 10
policy/modules/services/aisexec.if | 106 ++
policy/modules/services/aisexec.te | 115 ++
policy/modules/services/amavis.if | 23
policy/modules/services/amavis.te | 4
policy/modules/services/apache.fc | 62 +
policy/modules/services/apache.if | 492 ++++++---
policy/modules/services/apache.te | 500 ++++++++-
policy/modules/services/apcupsd.te | 4
policy/modules/services/arpwatch.te | 4
policy/modules/services/asterisk.if | 19
policy/modules/services/asterisk.te | 43
policy/modules/services/avahi.fc | 2
policy/modules/services/avahi.if | 1
policy/modules/services/avahi.te | 13
policy/modules/services/bind.if | 23
policy/modules/services/bind.te | 4
policy/modules/services/bluetooth.te | 3
policy/modules/services/boinc.fc | 6
policy/modules/services/boinc.if | 151 ++
policy/modules/services/boinc.te | 76 +
policy/modules/services/cachefilesd.fc | 28
policy/modules/services/cachefilesd.if | 41
policy/modules/services/cachefilesd.te | 146 ++
policy/modules/services/ccs.te | 5
policy/modules/services/certmaster.fc | 1
policy/modules/services/certmonger.fc | 6
policy/modules/services/certmonger.if | 217 ++++
policy/modules/services/certmonger.te | 74 +
policy/modules/services/cgroup.fc | 7
policy/modules/services/cgroup.if | 35
policy/modules/services/cgroup.te | 87 +
policy/modules/services/chronyd.fc | 2
policy/modules/services/chronyd.if | 4
policy/modules/services/chronyd.te | 19
policy/modules/services/clamav.te | 5
policy/modules/services/clogd.fc | 4
policy/modules/services/clogd.if | 82 +
policy/modules/services/clogd.te | 65 +
policy/modules/services/cobbler.if | 4
policy/modules/services/cobbler.te | 12
policy/modules/services/consolekit.fc | 3
policy/modules/services/consolekit.if | 39
policy/modules/services/consolekit.te | 35
policy/modules/services/corosync.fc | 14
policy/modules/services/corosync.if | 108 ++
policy/modules/services/corosync.te | 115 ++
policy/modules/services/cron.fc | 6
policy/modules/services/cron.if | 76 +
policy/modules/services/cron.te | 92 +
policy/modules/services/cups.fc | 14
policy/modules/services/cups.te | 65 +
policy/modules/services/cvs.te | 2
policy/modules/services/cyrus.te | 2
policy/modules/services/dbus.if | 56 -
policy/modules/services/dbus.te | 31
policy/modules/services/dcc.te | 2
policy/modules/services/denyhosts.fc | 7
policy/modules/services/denyhosts.if | 90 +
policy/modules/services/denyhosts.te | 72 +
policy/modules/services/devicekit.fc | 6
policy/modules/services/devicekit.if | 22
policy/modules/services/devicekit.te | 94 +
policy/modules/services/dhcp.te | 4
policy/modules/services/djbdns.if | 38
policy/modules/services/djbdns.te | 8
policy/modules/services/dnsmasq.fc | 2
policy/modules/services/dnsmasq.if | 4
policy/modules/services/dnsmasq.te | 22
policy/modules/services/dovecot.fc | 1
policy/modules/services/dovecot.te | 34
policy/modules/services/fail2ban.if | 58 +
policy/modules/services/fetchmail.te | 1
policy/modules/services/fprintd.te | 2
policy/modules/services/ftp.fc | 2
policy/modules/services/ftp.if | 38
policy/modules/services/ftp.te | 179 +++
policy/modules/services/git.fc | 19
policy/modules/services/git.if | 536 ++++++++++
policy/modules/services/git.te | 179 +++
policy/modules/services/gpsd.te | 2
policy/modules/services/hal.te | 33
policy/modules/services/howl.te | 2
policy/modules/services/icecast.fc | 7
policy/modules/services/icecast.if | 199 +++
policy/modules/services/icecast.te | 59 +
policy/modules/services/inn.te | 1
policy/modules/services/kerberos.if | 6
policy/modules/services/kerberos.te | 3
policy/modules/services/ksmtuned.fc | 5
policy/modules/services/ksmtuned.if | 76 +
policy/modules/services/ksmtuned.te | 44
policy/modules/services/ldap.fc | 3
policy/modules/services/ldap.if | 38
policy/modules/services/ldap.te | 13
policy/modules/services/lircd.te | 21
policy/modules/services/mailman.fc | 10
policy/modules/services/memcached.te | 10
policy/modules/services/modemmanager.te | 5
policy/modules/services/mta.fc | 2
policy/modules/services/mta.if | 68 +
policy/modules/services/mta.te | 17
policy/modules/services/munin.fc | 3
policy/modules/services/munin.te | 13
policy/modules/services/mysql.te | 2
policy/modules/services/nagios.fc | 83 +
policy/modules/services/nagios.if | 142 ++
policy/modules/services/nagios.te | 282 ++++-
policy/modules/services/networkmanager.fc | 20
policy/modules/services/networkmanager.if | 86 +
policy/modules/services/networkmanager.te | 121 +-
policy/modules/services/nis.fc | 10
policy/modules/services/nis.if | 78 +
policy/modules/services/nis.te | 21
policy/modules/services/nscd.if | 20
policy/modules/services/nscd.te | 23
policy/modules/services/ntop.fc | 1
policy/modules/services/ntop.te | 34
policy/modules/services/ntp.te | 2
policy/modules/services/nut.te | 21
policy/modules/services/nx.fc | 12
policy/modules/services/nx.if | 67 +
policy/modules/services/nx.te | 13
policy/modules/services/oddjob.if | 1
policy/modules/services/oddjob.te | 5
policy/modules/services/openvpn.te | 7
policy/modules/services/pcscd.if | 38
policy/modules/services/pegasus.te | 28
policy/modules/services/plymouthd.fc | 9
policy/modules/services/plymouthd.if | 322 ++++++
policy/modules/services/plymouthd.te | 105 +
policy/modules/services/policykit.fc | 5
policy/modules/services/policykit.if | 71 +
policy/modules/services/policykit.te | 74 +
policy/modules/services/portreserve.te | 3
policy/modules/services/postfix.fc | 2
policy/modules/services/postfix.if | 187 +++
policy/modules/services/postfix.te | 149 ++
policy/modules/services/postgresql.fc | 8
policy/modules/services/postgresql.if | 17
policy/modules/services/postgresql.te | 6
policy/modules/services/ppp.fc | 1
policy/modules/services/ppp.if | 4
policy/modules/services/ppp.te | 8
policy/modules/services/prelude.te | 3
policy/modules/services/procmail.te | 12
policy/modules/services/pyzor.fc | 4
policy/modules/services/pyzor.if | 47
policy/modules/services/pyzor.te | 37
policy/modules/services/radvd.te | 12
policy/modules/services/razor.fc | 1
policy/modules/services/razor.if | 42
policy/modules/services/razor.te | 32
policy/modules/services/rdisc.if | 19
policy/modules/services/rgmanager.fc | 8
policy/modules/services/rgmanager.if | 98 +
policy/modules/services/rgmanager.te | 223 ++++
policy/modules/services/rhcs.fc | 23
policy/modules/services/rhcs.if | 424 ++++++++
policy/modules/services/rhcs.te | 248 ++++
policy/modules/services/ricci.te | 39
policy/modules/services/rpc.fc | 4
policy/modules/services/rpc.if | 46
policy/modules/services/rpc.te | 35
policy/modules/services/rsync.if | 4
policy/modules/services/rsync.te | 25
policy/modules/services/rtkit.if | 20
policy/modules/services/rtkit.te | 4
policy/modules/services/samba.fc | 4
policy/modules/services/samba.if | 138 ++
policy/modules/services/samba.te | 120 +-
policy/modules/services/sasl.te | 15
policy/modules/services/sendmail.if | 19
policy/modules/services/sendmail.te | 17
policy/modules/services/setroubleshoot.fc | 2
policy/modules/services/setroubleshoot.if | 124 ++
policy/modules/services/setroubleshoot.te | 91 +
policy/modules/services/smokeping.fc | 12
policy/modules/services/smokeping.if | 193 +++
policy/modules/services/smokeping.te | 81 +
policy/modules/services/snmp.te | 2
policy/modules/services/snort.te | 10
policy/modules/services/spamassassin.fc | 15
policy/modules/services/spamassassin.if | 107 ++
policy/modules/services/spamassassin.te | 141 ++
policy/modules/services/squid.te | 9
policy/modules/services/ssh.fc | 2
policy/modules/services/ssh.if | 65 -
policy/modules/services/ssh.te | 53 -
policy/modules/services/sssd.fc | 4
policy/modules/services/sssd.if | 47
policy/modules/services/sssd.te | 17
policy/modules/services/sysstat.te | 5
policy/modules/services/telnet.te | 1
policy/modules/services/tftp.te | 3
policy/modules/services/tor.fc | 3
policy/modules/services/tor.te | 13
policy/modules/services/tuned.fc | 3
policy/modules/services/tuned.te | 16
policy/modules/services/ucspitcp.te | 5
policy/modules/services/usbmuxd.fc | 4
policy/modules/services/usbmuxd.if | 39
policy/modules/services/usbmuxd.te | 50
policy/modules/services/uucp.te | 3
policy/modules/services/vhostmd.fc | 6
policy/modules/services/vhostmd.if | 228 ++++
policy/modules/services/vhostmd.te | 84 +
policy/modules/services/virt.fc | 4
policy/modules/services/virt.if | 42
policy/modules/services/virt.te | 55 -
policy/modules/services/w3c.te | 7
policy/modules/services/xserver.fc | 55 -
policy/modules/services/xserver.if | 383 +++++++
policy/modules/services/xserver.te | 380 ++++++-
policy/modules/services/zebra.if | 20
policy/modules/system/application.te | 11
policy/modules/system/authlogin.fc | 8
policy/modules/system/authlogin.if | 212 +++-
policy/modules/system/authlogin.te | 11
policy/modules/system/daemontools.if | 62 +
policy/modules/system/daemontools.te | 26
policy/modules/system/fstools.fc | 2
policy/modules/system/fstools.te | 4
policy/modules/system/getty.te | 7
policy/modules/system/hostname.te | 3
policy/modules/system/init.fc | 7
policy/modules/system/init.if | 203 +++
policy/modules/system/init.te | 250 ++++
policy/modules/system/ipsec.fc | 4
policy/modules/system/ipsec.if | 19
policy/modules/system/ipsec.te | 41
policy/modules/system/iptables.fc | 2
policy/modules/system/iptables.if | 4
policy/modules/system/iptables.te | 20
policy/modules/system/libraries.fc | 227 +++-
policy/modules/system/libraries.if | 5
policy/modules/system/libraries.te | 28
policy/modules/system/locallogin.te | 39
policy/modules/system/logging.fc | 18
policy/modules/system/logging.if | 38
policy/modules/system/logging.te | 51
policy/modules/system/lvm.fc | 1
policy/modules/system/lvm.if | 2
policy/modules/system/lvm.te | 16
policy/modules/system/modutils.te | 22
policy/modules/system/mount.fc | 8
policy/modules/system/mount.if | 138 ++
policy/modules/system/mount.te | 145 ++
policy/modules/system/raid.te | 1
policy/modules/system/selinuxutil.fc | 17
policy/modules/system/selinuxutil.if | 330 ++++++
policy/modules/system/selinuxutil.te | 231 +---
policy/modules/system/sosreport.fc | 2
policy/modules/system/sosreport.if | 74 +
policy/modules/system/sosreport.te | 129 ++
policy/modules/system/sysnetwork.fc | 9
policy/modules/system/sysnetwork.if | 133 ++
policy/modules/system/sysnetwork.te | 77 +
policy/modules/system/udev.fc | 1
policy/modules/system/udev.if | 1
policy/modules/system/udev.te | 17
policy/modules/system/unconfined.fc | 14
policy/modules/system/unconfined.if | 440 --------
policy/modules/system/unconfined.te | 224 ----
policy/modules/system/userdomain.fc | 8
policy/modules/system/userdomain.if | 1585 ++++++++++++++++++++++++------
policy/modules/system/userdomain.te | 44
policy/modules/system/xen.if | 22
policy/modules/system/xen.te | 32
policy/support/misc_patterns.spt | 4
policy/support/obj_perm_sets.spt | 33
policy/users | 17
411 files changed, 21555 insertions(+), 2344 deletions(-)
Index: policy-F13.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-13/policy-F13.patch,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -p -r1.79 -r1.80
--- policy-F13.patch 15 Mar 2010 21:02:56 -0000 1.79
+++ policy-F13.patch 15 Mar 2010 21:18:24 -0000 1.80
@@ -15731,7 +15731,7 @@ diff --exclude-from=exclude -N -u -r nsa
allow $1 devicekit_t:process { ptrace signal_perms getattr };
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/devicekit.te serefpolicy-3.7.14/policy/modules/services/devicekit.te
--- nsaserefpolicy/policy/modules/services/devicekit.te 2009-07-29 15:15:33.000000000 -0400
-+++ serefpolicy-3.7.14/policy/modules/services/devicekit.te 2010-03-12 09:30:00.000000000 -0500
++++ serefpolicy-3.7.14/policy/modules/services/devicekit.te 2010-03-15 17:07:58.000000000 -0400
@@ -42,6 +42,8 @@
files_read_etc_files(devicekit_t)
@@ -15834,15 +15834,23 @@ diff --exclude-from=exclude -N -u -r nsa
fstools_domtrans(devicekit_disk_t)
')
-@@ -110,6 +156,7 @@
+@@ -110,28 +156,27 @@
')
optional_policy(`
++ mount_domtrans(devicekit_disk_t)
++')
++
++optional_policy(`
+ policykit_dbus_chat(devicekit_disk_t)
policykit_domtrans_auth(devicekit_disk_t)
policykit_read_lib(devicekit_disk_t)
policykit_read_reload(devicekit_disk_t)
-@@ -120,18 +167,12 @@
+ ')
+
+ optional_policy(`
+- mount_domtrans(devicekit_disk_t)
++ raid_domtrans_mdadm(devicekit_disk_t)
')
optional_policy(`
@@ -15864,7 +15872,7 @@ diff --exclude-from=exclude -N -u -r nsa
')
########################################
-@@ -139,9 +180,11 @@
+@@ -139,9 +184,11 @@
# DeviceKit-Power local policy
#
@@ -15877,7 +15885,7 @@ diff --exclude-from=exclude -N -u -r nsa
manage_dirs_pattern(devicekit_power_t, devicekit_var_lib_t, devicekit_var_lib_t)
manage_files_pattern(devicekit_power_t, devicekit_var_lib_t, devicekit_var_lib_t)
-@@ -151,6 +194,8 @@
+@@ -151,6 +198,8 @@
kernel_read_system_state(devicekit_power_t)
kernel_rw_hotplug_sysctls(devicekit_power_t)
kernel_rw_kernel_sysctl(devicekit_power_t)
@@ -15886,7 +15894,7 @@ diff --exclude-from=exclude -N -u -r nsa
corecmd_exec_bin(devicekit_power_t)
corecmd_exec_shell(devicekit_power_t)
-@@ -159,7 +204,9 @@
+@@ -159,7 +208,9 @@
domain_read_all_domains_state(devicekit_power_t)
@@ -15896,7 +15904,7 @@ diff --exclude-from=exclude -N -u -r nsa
dev_rw_netcontrol(devicekit_power_t)
dev_rw_sysfs(devicekit_power_t)
-@@ -167,12 +214,17 @@
+@@ -167,12 +218,17 @@
files_read_etc_files(devicekit_power_t)
files_read_usr_files(devicekit_power_t)
@@ -15914,7 +15922,7 @@ diff --exclude-from=exclude -N -u -r nsa
userdom_read_all_users_state(devicekit_power_t)
optional_policy(`
-@@ -180,6 +232,10 @@
+@@ -180,6 +236,10 @@
')
optional_policy(`
@@ -15925,7 +15933,7 @@ diff --exclude-from=exclude -N -u -r nsa
dbus_system_bus_client(devicekit_power_t)
allow devicekit_power_t devicekit_t:dbus send_msg;
-@@ -203,17 +259,23 @@
+@@ -203,17 +263,23 @@
optional_policy(`
hal_domtrans_mac(devicekit_power_t)
@@ -27794,7 +27802,7 @@ diff --exclude-from=exclude -N -u -r nsa
+')
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/xserver.te serefpolicy-3.7.14/policy/modules/services/xserver.te
--- nsaserefpolicy/policy/modules/services/xserver.te 2010-02-12 10:33:09.000000000 -0500
-+++ serefpolicy-3.7.14/policy/modules/services/xserver.te 2010-03-12 09:30:01.000000000 -0500
++++ serefpolicy-3.7.14/policy/modules/services/xserver.te 2010-03-15 17:15:49.000000000 -0400
@@ -36,6 +36,13 @@
## <desc>
@@ -28236,7 +28244,7 @@ diff --exclude-from=exclude -N -u -r nsa
storage_dontaudit_read_fixed_disk(xdm_t)
storage_dontaudit_write_fixed_disk(xdm_t)
-@@ -447,14 +576,18 @@
+@@ -447,14 +576,19 @@
storage_dontaudit_raw_write_removable_device(xdm_t)
storage_dontaudit_setattr_removable_dev(xdm_t)
storage_dontaudit_rw_scsi_generic(xdm_t)
@@ -28247,6 +28255,7 @@ diff --exclude-from=exclude -N -u -r nsa
term_use_unallocated_ttys(xdm_t)
term_setattr_unallocated_ttys(xdm_t)
+term_relabel_all_ttys(xdm_t)
++term_relabel_unallocated_ttys(xdm_t)
auth_domtrans_pam_console(xdm_t)
auth_manage_pam_pid(xdm_t)
@@ -28255,7 +28264,7 @@ diff --exclude-from=exclude -N -u -r nsa
auth_rw_faillog(xdm_t)
auth_write_login_records(xdm_t)
-@@ -465,10 +598,12 @@
+@@ -465,10 +599,12 @@
logging_read_generic_logs(xdm_t)
@@ -28270,7 +28279,7 @@ diff --exclude-from=exclude -N -u -r nsa
userdom_dontaudit_use_unpriv_user_fds(xdm_t)
userdom_create_all_users_keys(xdm_t)
-@@ -477,6 +612,11 @@
+@@ -477,6 +613,11 @@
# Search /proc for any user domain processes.
userdom_read_all_users_state(xdm_t)
userdom_signal_all_users(xdm_t)
@@ -28282,7 +28291,7 @@ diff --exclude-from=exclude -N -u -r nsa
xserver_rw_session(xdm_t, xdm_tmpfs_t)
xserver_unconfined(xdm_t)
-@@ -509,10 +649,12 @@
+@@ -509,10 +650,12 @@
optional_policy(`
alsa_domtrans(xdm_t)
@@ -28295,7 +28304,7 @@ diff --exclude-from=exclude -N -u -r nsa
')
optional_policy(`
-@@ -520,12 +662,49 @@
+@@ -520,12 +663,49 @@
')
optional_policy(`
@@ -28345,7 +28354,7 @@ diff --exclude-from=exclude -N -u -r nsa
hostname_exec(xdm_t)
')
-@@ -543,9 +722,43 @@
+@@ -543,9 +723,43 @@
')
optional_policy(`
@@ -28389,7 +28398,7 @@ diff --exclude-from=exclude -N -u -r nsa
optional_policy(`
seutil_sigchld_newrole(xdm_t)
')
-@@ -555,8 +768,9 @@
+@@ -555,8 +769,9 @@
')
optional_policy(`
@@ -28401,7 +28410,7 @@ diff --exclude-from=exclude -N -u -r nsa
ifndef(`distro_redhat',`
allow xdm_t self:process { execheap execmem };
-@@ -565,7 +779,6 @@
+@@ -565,7 +780,6 @@
ifdef(`distro_rhel4',`
allow xdm_t self:process { execheap execmem };
')
@@ -28409,7 +28418,7 @@ diff --exclude-from=exclude -N -u -r nsa
optional_policy(`
userhelper_dontaudit_search_config(xdm_t)
-@@ -576,6 +789,10 @@
+@@ -576,6 +790,10 @@
')
optional_policy(`
@@ -28420,7 +28429,7 @@ diff --exclude-from=exclude -N -u -r nsa
xfs_stream_connect(xdm_t)
')
-@@ -600,10 +817,9 @@
+@@ -600,10 +818,9 @@
# execheap needed until the X module loader is fixed.
# NVIDIA Needs execstack
@@ -28432,7 +28441,7 @@ diff --exclude-from=exclude -N -u -r nsa
allow xserver_t self:fd use;
allow xserver_t self:fifo_file rw_fifo_file_perms;
allow xserver_t self:sock_file read_sock_file_perms;
-@@ -615,6 +831,18 @@
+@@ -615,6 +832,18 @@
allow xserver_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow xserver_t self:tcp_socket create_stream_socket_perms;
allow xserver_t self:udp_socket create_socket_perms;
@@ -28451,7 +28460,7 @@ diff --exclude-from=exclude -N -u -r nsa
manage_dirs_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t)
manage_files_pattern(xserver_t, xserver_tmp_t, xserver_tmp_t)
-@@ -634,12 +862,19 @@
+@@ -634,12 +863,19 @@
manage_lnk_files_pattern(xserver_t, xkb_var_lib_t, xkb_var_lib_t)
files_search_var_lib(xserver_t)
@@ -28473,7 +28482,7 @@ diff --exclude-from=exclude -N -u -r nsa
kernel_read_system_state(xserver_t)
kernel_read_device_sysctls(xserver_t)
-@@ -673,7 +908,6 @@
+@@ -673,7 +909,6 @@
dev_rw_agp(xserver_t)
dev_rw_framebuffer(xserver_t)
dev_manage_dri_dev(xserver_t)
@@ -28481,7 +28490,7 @@ diff --exclude-from=exclude -N -u -r nsa
dev_create_generic_dirs(xserver_t)
dev_setattr_generic_dirs(xserver_t)
# raw memory access is needed if not using the frame buffer
-@@ -683,9 +917,12 @@
+@@ -683,9 +918,12 @@
dev_rw_xserver_misc(xserver_t)
# read events - the synaptics touchpad driver reads raw events
dev_rw_input_dev(xserver_t)
@@ -28495,7 +28504,7 @@ diff --exclude-from=exclude -N -u -r nsa
files_read_etc_files(xserver_t)
files_read_etc_runtime_files(xserver_t)
-@@ -700,8 +937,13 @@
+@@ -700,8 +938,13 @@
fs_search_nfs(xserver_t)
fs_search_auto_mountpoints(xserver_t)
fs_search_ramfs(xserver_t)
@@ -28509,7 +28518,7 @@ diff --exclude-from=exclude -N -u -r nsa
selinux_validate_context(xserver_t)
selinux_compute_access_vector(xserver_t)
-@@ -723,11 +965,14 @@
+@@ -723,11 +966,14 @@
miscfiles_read_localization(xserver_t)
miscfiles_read_fonts(xserver_t)
@@ -28524,7 +28533,7 @@ diff --exclude-from=exclude -N -u -r nsa
userdom_search_user_home_dirs(xserver_t)
userdom_use_user_ttys(xserver_t)
-@@ -779,12 +1024,24 @@
+@@ -779,12 +1025,24 @@
')
optional_policy(`
@@ -28550,7 +28559,7 @@ diff --exclude-from=exclude -N -u -r nsa
unconfined_domtrans(xserver_t)
')
-@@ -811,7 +1068,7 @@
+@@ -811,7 +1069,7 @@
allow xserver_t xdm_var_lib_t:file { getattr read };
dontaudit xserver_t xdm_var_lib_t:dir search;
@@ -28559,7 +28568,7 @@ diff --exclude-from=exclude -N -u -r nsa
# Label pid and temporary files with derived types.
manage_files_pattern(xserver_t, xdm_tmp_t, xdm_tmp_t)
-@@ -832,9 +1089,14 @@
+@@ -832,9 +1090,14 @@
# to read ROLE_home_t - examine this in more detail
# (xauth?)
userdom_read_user_home_content_files(xserver_t)
@@ -28574,7 +28583,7 @@ diff --exclude-from=exclude -N -u -r nsa
tunable_policy(`use_nfs_home_dirs',`
fs_manage_nfs_dirs(xserver_t)
fs_manage_nfs_files(xserver_t)
-@@ -849,11 +1111,14 @@
+@@ -849,11 +1112,14 @@
optional_policy(`
dbus_system_bus_client(xserver_t)
@@ -28591,7 +28600,7 @@ diff --exclude-from=exclude -N -u -r nsa
')
optional_policy(`
-@@ -999,3 +1264,33 @@
+@@ -999,3 +1265,33 @@
allow xserver_unconfined_type xextension_type:x_extension *;
allow xserver_unconfined_type { x_domain xserver_t }:x_resource *;
allow xserver_unconfined_type xevent_type:{ x_event x_synthetic_event } *;
More information about the scm-commits
mailing list