]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Add policy-term.patch from Dan
authorMiroslav Grepl <mgrepl@redhat.com>
Wed, 23 Mar 2011 21:35:36 +0000 (21:35 +0000)
committerMiroslav Grepl <mgrepl@redhat.com>
Wed, 23 Mar 2011 21:35:36 +0000 (21:35 +0000)
111 files changed:
policy/modules/admin/amanda.te
policy/modules/admin/amtu.te
policy/modules/admin/apt.te
policy/modules/admin/backup.te
policy/modules/admin/bootloader.te
policy/modules/admin/certwatch.te
policy/modules/admin/consoletype.te
policy/modules/admin/ddcprobe.te
policy/modules/admin/dmesg.te
policy/modules/admin/dmidecode.te
policy/modules/admin/dpkg.te
policy/modules/admin/firstboot.te
policy/modules/admin/kismet.te
policy/modules/admin/kudzu.te
policy/modules/admin/logrotate.te
policy/modules/admin/mrtg.te
policy/modules/admin/ncftool.te
policy/modules/admin/netutils.te
policy/modules/admin/portage.if
policy/modules/admin/portage.te
policy/modules/admin/prelink.te
policy/modules/admin/quota.te
policy/modules/admin/rpm.te
policy/modules/admin/shutdown.te
policy/modules/admin/su.if
policy/modules/admin/sudo.if
policy/modules/admin/tripwire.te
policy/modules/admin/tzdata.te
policy/modules/admin/usbmodules.te
policy/modules/admin/usermanage.te
policy/modules/admin/vpn.te
policy/modules/apps/ada.te
policy/modules/apps/cdrecord.te
policy/modules/apps/evolution.te
policy/modules/apps/gift.te
policy/modules/apps/gnome.te
policy/modules/apps/gpg.te
policy/modules/apps/irc.te
policy/modules/apps/loadkeys.te
policy/modules/apps/lockdev.te
policy/modules/apps/mozilla.te
policy/modules/apps/mplayer.te
policy/modules/apps/nsplugin.if
policy/modules/apps/pulseaudio.te
policy/modules/apps/qemu.if
policy/modules/apps/sandbox.te
policy/modules/apps/screen.if
policy/modules/apps/seunshare.te
policy/modules/apps/telepathy.te
policy/modules/apps/tvtime.te
policy/modules/apps/uml.te
policy/modules/apps/usernetctl.te
policy/modules/apps/vlock.te
policy/modules/apps/vmware.te
policy/modules/apps/webalizer.te
policy/modules/apps/wine.te
policy/modules/apps/xscreensaver.te
policy/modules/apps/yam.te
policy/modules/kernel/terminal.if
policy/modules/services/aide.te
policy/modules/services/apache.te
policy/modules/services/apcupsd.te
policy/modules/services/apm.te
policy/modules/services/bind.te
policy/modules/services/clockspeed.te
policy/modules/services/cron.if
policy/modules/services/dbus.if
policy/modules/services/dcc.te
policy/modules/services/devicekit.te
policy/modules/services/ftp.te
policy/modules/services/git.te
policy/modules/services/gpm.te
policy/modules/services/hadoop.te
policy/modules/services/ksmtuned.te
policy/modules/services/ktalk.te
policy/modules/services/lpd.te
policy/modules/services/mta.te
policy/modules/services/oav.te
policy/modules/services/openvpn.te
policy/modules/services/portmap.te
policy/modules/services/portslave.te
policy/modules/services/postfix.te
policy/modules/services/ppp.te
policy/modules/services/privoxy.te
policy/modules/services/razor.te
policy/modules/services/samba.te
policy/modules/services/samhain.te
policy/modules/services/ssh.if
policy/modules/services/ssh.te
policy/modules/services/sysstat.te
policy/modules/services/virt.te
policy/modules/services/xserver.te
policy/modules/system/authlogin.te
policy/modules/system/clock.te
policy/modules/system/fstools.te
policy/modules/system/hostname.te
policy/modules/system/init.te
policy/modules/system/ipsec.te
policy/modules/system/iptables.te
policy/modules/system/libraries.te
policy/modules/system/logging.te
policy/modules/system/lvm.te
policy/modules/system/modutils.te
policy/modules/system/mount.te
policy/modules/system/netlabel.te
policy/modules/system/pcmcia.te
policy/modules/system/selinuxutil.if
policy/modules/system/selinuxutil.te
policy/modules/system/sysnetwork.te
policy/modules/system/userdomain.if
policy/support/obj_perm_sets.spt

index d84142481324b1c73ae75396eca5e49f983375a5..3305e150234a2cd855026295859b61ab85bc88f1 100644 (file)
@@ -204,7 +204,7 @@ logging_search_logs(amanda_recover_t)
 
 miscfiles_read_localization(amanda_recover_t)
 
-userdom_use_user_terminals(amanda_recover_t)
+userdom_use_inherited_user_terminals(amanda_recover_t)
 userdom_search_user_home_content(amanda_recover_t)
 
 optional_policy(`
index 057abb0c7af27f4c6f372b70dd47401eb1caf0c1..c75e9e9ac55774a447b1e329eb6529488a397e33 100644 (file)
@@ -23,7 +23,7 @@ files_read_etc_files(amtu_t)
 
 logging_send_audit_msgs(amtu_t)
 
-userdom_use_user_terminals(amtu_t)
+userdom_use_inherited_user_terminals(amtu_t)
 
 optional_policy(`
        nscd_dontaudit_search_pid(amtu_t)
index 40447100d5d967a6a369d196ca887bd7824ff580..3491c7f8fa7adf89d5be2cb705dbda3af7fd4ca6 100644 (file)
@@ -121,7 +121,7 @@ fs_getattr_all_fs(apt_t)
 
 term_create_pty(apt_t, apt_devpts_t)
 term_list_ptys(apt_t)
-term_use_all_terms(apt_t)
+term_use_all_inherited_terms(apt_t)
 
 libs_exec_ld_so(apt_t)
 libs_exec_lib_files(apt_t)
@@ -134,7 +134,7 @@ seutil_use_newrole_fds(apt_t)
 
 sysnet_read_config(apt_t)
 
-userdom_use_user_terminals(apt_t)
+userdom_use_inherited_user_terminals(apt_t)
 
 # with boolean, for cron-apt and such?
 #optional_policy(`
index 0bfc9588b6d1499a39725b601f7c4cce8c641e37..af95b7ae620f27f898bf42a074424306470b43b2 100644 (file)
@@ -70,7 +70,7 @@ logging_send_syslog_msg(backup_t)
 
 sysnet_read_config(backup_t)
 
-userdom_use_user_terminals(backup_t)
+userdom_use_inherited_user_terminals(backup_t)
 
 optional_policy(`
        cron_system_entry(backup_t, backup_exec_t)
index a9c9ff2b60572ca2121daef97dc91eb7c969fe16..25fd06ee5f1376b533e4132c50176c46d7c870b8 100644 (file)
@@ -125,7 +125,7 @@ seutil_read_bin_policy(bootloader_t)
 seutil_read_loadpolicy(bootloader_t)
 seutil_dontaudit_search_config(bootloader_t)
 
-userdom_use_user_terminals(bootloader_t)
+userdom_use_inherited_user_terminals(bootloader_t)
 userdom_dontaudit_search_user_home_dirs(bootloader_t)
 
 ifdef(`distro_debian',`
index 682e78e018425a37b4be455396a45249469ea0eb..a8067151579583ab217fb11ca29170509fccd732 100644 (file)
@@ -34,7 +34,7 @@ logging_send_syslog_msg(certwatch_t)
 miscfiles_read_all_certs(certwatch_t)
 miscfiles_read_localization(certwatch_t)
 
-userdom_use_user_terminals(certwatch_t)
+userdom_use_inherited_user_terminals(certwatch_t)
 userdom_dontaudit_list_admin_dir(certwatch_t)
 
 optional_policy(`
index a4a739e41ef61ae8e32b88299dc67f81c82a83d4..50e9ee44a2bd5a9d205ada9a5d15af85bc5e055b 100644 (file)
@@ -47,7 +47,7 @@ fs_list_inotifyfs(consoletype_t)
 mls_file_read_all_levels(consoletype_t)
 mls_file_write_all_levels(consoletype_t)
 
-term_use_all_terms(consoletype_t)
+term_use_all_inherited_terms(consoletype_t)
 term_use_ptmx(consoletype_t)
 
 init_use_fds(consoletype_t)
@@ -56,7 +56,7 @@ init_use_script_fds(consoletype_t)
 init_rw_script_pipes(consoletype_t)
 init_rw_inherited_script_tmp_files(consoletype_t)
 
-userdom_use_user_terminals(consoletype_t)
+userdom_use_inherited_user_terminals(consoletype_t)
 
 ifdef(`distro_redhat',`
        fs_rw_tmpfs_chr_files(consoletype_t)
index 8854858d08e7c9c7e726e8f8e7eddc623bf01c52..3cbfffb673a24813434f577e2bceb0c12d231bb5 100644 (file)
@@ -42,7 +42,7 @@ libs_read_lib_files(ddcprobe_t)
 
 miscfiles_read_localization(ddcprobe_t)
 
-userdom_use_user_terminals(ddcprobe_t)
+userdom_use_inherited_user_terminals(ddcprobe_t)
 userdom_use_all_users_fds(ddcprobe_t)
 
 optional_policy(`
index ed0210388dd91e428e406338a70be8a74d4fe568..9b39fcde8a99a0fe95f2e8ad658c24940d9298c7 100644 (file)
@@ -48,7 +48,7 @@ logging_write_generic_logs(dmesg_t)
 miscfiles_read_localization(dmesg_t)
 
 userdom_dontaudit_use_unpriv_user_fds(dmesg_t)
-userdom_use_user_terminals(dmesg_t)
+userdom_use_inherited_user_terminals(dmesg_t)
 
 optional_policy(`
        abrt_cache_append(dmesg_t)
index d6356b539d7fd1cc09532ebddd9c915823bebbe8..5db989e92b765feb2520cc4041dc2c8e6c0da35a 100644 (file)
@@ -27,4 +27,4 @@ files_list_usr(dmidecode_t)
 
 locallogin_use_fds(dmidecode_t)
 
-userdom_use_user_terminals(dmidecode_t)
+userdom_use_inherited_user_terminals(dmidecode_t)
index a1482b00c6eb9d9c8abb22f34cdcf8d3b7a541e3..cae6e9690d42689a49985ecd415a54c591baa24d 100644 (file)
@@ -161,7 +161,7 @@ seutil_manage_bin_policy(dpkg_t)
 
 sysnet_read_config(dpkg_t)
 
-userdom_use_user_terminals(dpkg_t)
+userdom_use_inherited_user_terminals(dpkg_t)
 userdom_use_unpriv_users_fds(dpkg_t)
 
 # transition to dpkg script:
@@ -287,7 +287,7 @@ selinux_compute_user_contexts(dpkg_script_t)
 storage_raw_read_fixed_disk(dpkg_script_t)
 storage_raw_write_fixed_disk(dpkg_script_t)
 
-term_use_all_terms(dpkg_script_t)
+term_use_all_inherited_terms(dpkg_script_t)
 
 auth_dontaudit_getattr_shadow(dpkg_script_t)
 # ideally we would not need this
index dbdc14cb9ceee4a15925ab5434efa2ff7c54789f..d62fdd258953942da83aa45f3fc5812dafdb58b5 100644 (file)
@@ -75,7 +75,7 @@ logging_send_syslog_msg(firstboot_t)
 
 miscfiles_read_localization(firstboot_t)
 
-userdom_use_user_terminals(firstboot_t)
+userdom_use_inherited_user_terminals(firstboot_t)
 # Add/remove user home directories
 userdom_manage_user_home_content_dirs(firstboot_t)
 userdom_manage_user_home_content_files(firstboot_t)
index 9dd6880ea2a9f33edeed675bfcd9e6925df0a0ad..4b7fa27de27e1619b674f4bdd04d076f7cbcfdb6 100644 (file)
@@ -91,7 +91,7 @@ files_read_usr_files(kismet_t)
 
 miscfiles_read_localization(kismet_t)
 
-userdom_use_user_terminals(kismet_t)
+userdom_use_inherited_user_terminals(kismet_t)
 userdom_read_user_tmpfs_files(kismet_t)
 
 optional_policy(`
index 3405a102e36f59022634864235f5d8f6a81467d0..44d9882c67c5a653f1ae653cc28703c5940d050e 100644 (file)
@@ -114,7 +114,7 @@ miscfiles_read_localization(kudzu_t)
 
 sysnet_read_config(kudzu_t)
 
-userdom_use_user_terminals(kudzu_t)
+userdom_use_inherited_user_terminals(kudzu_t)
 userdom_dontaudit_use_unpriv_user_fds(kudzu_t)
 userdom_search_user_home_dirs(kudzu_t)
 
index ce5af6e451af78b559ed741f1ea18f3a0b957e08..2f3bab7e4a530a4a5cd2b406943d6eb750ed1799 100644 (file)
@@ -116,7 +116,7 @@ miscfiles_read_localization(logrotate_t)
 
 seutil_dontaudit_read_config(logrotate_t)
 
-userdom_use_user_terminals(logrotate_t)
+userdom_use_inherited_user_terminals(logrotate_t)
 userdom_list_user_home_dirs(logrotate_t)
 userdom_use_unpriv_users_fds(logrotate_t)
 userdom_dontaudit_list_admin_dir(logrotate_t)
index 54c3ea2455fec462f3115b79d02675fa285e7ffe..a3a38b15540708caaae7349db51adccf0cf45224 100644 (file)
@@ -115,7 +115,7 @@ miscfiles_read_localization(mrtg_t)
 
 selinux_dontaudit_getattr_dir(mrtg_t)
 
-userdom_use_user_terminals(mrtg_t)
+userdom_use_inherited_user_terminals(mrtg_t)
 userdom_dontaudit_read_user_home_content_files(mrtg_t)
 userdom_dontaudit_use_unpriv_user_fds(mrtg_t)
 userdom_dontaudit_list_admin_dir(mrtg_t)
index 104253de8a201f3345460820e09227a529e94b7d..73ffa81bc5401172172ac29df504e65fe98af76b 100644 (file)
@@ -47,7 +47,7 @@ files_read_etc_files(ncftool_t)
 files_read_etc_runtime_files(ncftool_t)
 files_read_usr_files(ncftool_t)
 
-term_use_all_terms(ncftool_t)
+term_use_all_inherited_terms(ncftool_t)
 
 miscfiles_read_localization(ncftool_t)
 
index c083ea8f20cf3fe4ba6109ab5f54cc2041c04280..373882d60b9914fcaeba5c9bad11eadb738b14ba 100644 (file)
@@ -88,7 +88,7 @@ logging_send_syslog_msg(netutils_t)
 miscfiles_read_localization(netutils_t)
 
 term_dontaudit_use_console(netutils_t)
-userdom_use_user_terminals(netutils_t)
+userdom_use_inherited_user_terminals(netutils_t)
 userdom_use_all_users_fds(netutils_t)
 
 optional_policy(`
@@ -150,7 +150,7 @@ ifdef(`hide_broken_symptoms',`
        ')
 ')
 
-term_use_all_terms(ping_t)
+term_use_all_inherited_terms(ping_t)
 
 tunable_policy(`user_ping',`
        term_use_all_ttys(ping_t)
@@ -228,7 +228,7 @@ miscfiles_read_localization(traceroute_t)
 dev_read_rand(traceroute_t)
 dev_read_urand(traceroute_t)
 
-term_use_all_terms(traceroute_t)
+term_use_all_inherited_terms(traceroute_t)
 
 tunable_policy(`user_ping',`
        term_use_all_ttys(traceroute_t)
index 8aaa46d82ffcf2b9bf8190b6ceb991027404b51c..8714d7fa1cf559198daf88f9f71fb20d2310bdfd 100644 (file)
@@ -183,7 +183,7 @@ interface(`portage_compile_domain',`
 
        logging_send_syslog_msg($1)
 
-       userdom_use_user_terminals($1)
+       userdom_use_inherited_user_terminals($1)
 
        # SELinux-enabled programs running in the sandbox
        seutil_libselinux_linked($1)
index c489eec36428fe0419d8df3fbd992f5438217589..d1e56f6ac1f670af4f3e339263e4187300c8a46c 100644 (file)
@@ -105,7 +105,7 @@ logging_send_syslog_msg(gcc_config_t)
 
 miscfiles_read_localization(gcc_config_t)
 
-userdom_use_user_terminals(gcc_config_t)
+userdom_use_inherited_user_terminals(gcc_config_t)
 
 optional_policy(`
        consoletype_exec(gcc_config_t)
@@ -256,7 +256,7 @@ miscfiles_read_localization(portage_fetch_t)
 sysnet_read_config(portage_fetch_t)
 sysnet_dns_name_resolve(portage_fetch_t)
 
-userdom_use_user_terminals(portage_fetch_t)
+userdom_use_inherited_user_terminals(portage_fetch_t)
 userdom_dontaudit_read_user_home_content_files(portage_fetch_t)
 
 ifdef(`hide_broken_symptoms',`
index f77e89731b044231540d917bd2efbd249f75e58a..2579179bdce53815bb18970e9f16476ddc679166 100644 (file)
@@ -102,7 +102,7 @@ libs_delete_lib_symlinks(prelink_t)
 
 miscfiles_read_localization(prelink_t)
 
-userdom_use_user_terminals(prelink_t)
+userdom_use_inherited_user_terminals(prelink_t)
 userdom_manage_user_home_content(prelink_t)
 userdom_execmod_user_home_files(prelink_t)
 
index 5dd42f5f1e726923cfeaf3ea1f9750d5de419a20..f13ac4137947a7d574d42fcdb06ed1c760beb64c 100644 (file)
@@ -72,7 +72,7 @@ init_use_script_ptys(quota_t)
 
 logging_send_syslog_msg(quota_t)
 
-userdom_use_user_terminals(quota_t)
+userdom_use_inherited_user_terminals(quota_t)
 userdom_dontaudit_use_unpriv_user_fds(quota_t)
 
 optional_policy(`
index bca3b72db79828378c85b9c50b3158968756fc48..ba240df05de97c306a222aeb9064126f4ba132a0 100644 (file)
@@ -199,7 +199,7 @@ logging_send_syslog_msg(rpm_t)
 seutil_manage_src_policy(rpm_t)
 seutil_manage_bin_policy(rpm_t)
 
-userdom_use_user_terminals(rpm_t)
+userdom_use_inherited_user_terminals(rpm_t)
 userdom_use_unpriv_users_fds(rpm_t)
 
 optional_policy(`
@@ -311,7 +311,7 @@ storage_raw_write_fixed_disk(rpm_script_t)
 
 term_getattr_unallocated_ttys(rpm_script_t)
 term_list_ptys(rpm_script_t)
-term_use_all_terms(rpm_script_t)
+term_use_all_inherited_terms(rpm_script_t)
 
 auth_dontaudit_getattr_shadow(rpm_script_t)
 auth_use_nsswitch(rpm_script_t)
index a3928ef0cbaa5d70facdf31a785bdcf132f426e3..f4e6c4b78d33a6d18b9fbd29097e661bd80c86a6 100644 (file)
@@ -43,7 +43,7 @@ files_read_generic_pids(shutdown_t)
 
 mls_file_write_to_clearance(shutdown_t)
 
-term_use_all_terms(shutdown_t)
+term_use_all_inherited_terms(shutdown_t)
 
 auth_use_nsswitch(shutdown_t)
 auth_write_login_records(shutdown_t)
index 1a46f560bb1dc26ee9eac27e2767aa3bb702eea6..5fdb1228137c7120f3c627e01bdfd27143f64783 100644 (file)
@@ -232,7 +232,7 @@ template(`su_role_template',`
 
        miscfiles_read_localization($1_su_t)
 
-       userdom_use_user_terminals($1_su_t)
+       userdom_use_inherited_user_terminals($1_su_t)
        userdom_search_user_home_dirs($1_su_t)
        userdom_search_admin_dir($1_su_t)
 
index bae65ee2470d1f34faf1fbcbedc428366561e65e..37d10139d1eefd02b7986180c9a76a19a785c667 100644 (file)
@@ -143,7 +143,7 @@ template(`sudo_role_template',`
        userdom_manage_user_home_content_symlinks($1_sudo_t)
        userdom_manage_user_tmp_files($1_sudo_t)
        userdom_manage_user_tmp_symlinks($1_sudo_t)
-       userdom_use_user_terminals($1_sudo_t)
+       userdom_use_inherited_user_terminals($1_sudo_t)
        userdom_signal_all_users($1_sudo_t)
        # for some PAM modules and for cwd
        userdom_search_user_home_content($1_sudo_t)
index 2ae8b62cb11ce873c5e834c81c8ecc8e62810432..a8e786b64c60e8699464e7644dacf294daeb42db 100644 (file)
@@ -80,7 +80,7 @@ files_getattr_all_sockets(tripwire_t)
 
 logging_send_syslog_msg(tripwire_t)
 
-userdom_use_user_terminals(tripwire_t)
+userdom_use_inherited_user_terminals(tripwire_t)
 
 optional_policy(`
        cron_system_entry(tripwire_t, tripwire_exec_t)
@@ -101,7 +101,7 @@ logging_send_syslog_msg(twadmin_t)
 
 miscfiles_read_localization(twadmin_t)
 
-userdom_use_user_terminals(twadmin_t)
+userdom_use_inherited_user_terminals(twadmin_t)
 
 ########################################
 #
@@ -127,7 +127,7 @@ logging_send_syslog_msg(twprint_t)
 
 miscfiles_read_localization(twprint_t)
 
-userdom_use_user_terminals(twprint_t)
+userdom_use_inherited_user_terminals(twprint_t)
 
 ########################################
 #
@@ -143,4 +143,4 @@ logging_send_syslog_msg(siggen_t)
 
 miscfiles_read_localization(siggen_t)
 
-userdom_use_user_terminals(siggen_t)
+userdom_use_inherited_user_terminals(siggen_t)
index 7df0825c4938d5e686acdd76f4cf437a384ceac0..834a56d4b2af2f75bba858e50e058523849661d9 100644 (file)
@@ -28,7 +28,7 @@ miscfiles_read_localization(tzdata_t)
 miscfiles_manage_localization(tzdata_t)
 miscfiles_etc_filetrans_localization(tzdata_t)
 
-userdom_use_user_terminals(tzdata_t)
+userdom_use_inherited_user_terminals(tzdata_t)
 
 # tzdata looks for /var/spool/postfix/etc/localtime.
 optional_policy(`
index 0852738fc0ac12531a3ca20cf4c7efe621f4826c..f04565f1b167154eb0530195fa8aecf41f782dcd 100644 (file)
@@ -34,7 +34,7 @@ init_use_fds(usbmodules_t)
 
 miscfiles_read_hwdata(usbmodules_t)
 
-userdom_use_user_terminals(usbmodules_t)
+userdom_use_inherited_user_terminals(usbmodules_t)
 
 optional_policy(`
        hotplug_read_config(usbmodules_t)
index 89a126f5d4b539691c3c9b0910d94d9f18e6b2a1..c835fa783797274d75e2d295ecf52f40f74ccbed 100644 (file)
@@ -79,8 +79,8 @@ selinux_compute_create_context(chfn_t)
 selinux_compute_relabel_context(chfn_t)
 selinux_compute_user_contexts(chfn_t)
 
-term_use_all_ttys(chfn_t)
-term_use_all_ptys(chfn_t)
+term_use_all_inherited_ttys(chfn_t)
+term_use_all_inherited_ptys(chfn_t)
 
 fs_getattr_xattr_fs(chfn_t)
 fs_search_auto_mountpoints(chfn_t)
@@ -196,7 +196,7 @@ selinux_compute_create_context(groupadd_t)
 selinux_compute_relabel_context(groupadd_t)
 selinux_compute_user_contexts(groupadd_t)
 
-term_use_all_terms(groupadd_t)
+term_use_all_inherited_terms(groupadd_t)
 
 init_use_fds(groupadd_t)
 init_read_utmp(groupadd_t)
@@ -292,7 +292,7 @@ selinux_compute_create_context(passwd_t)
 selinux_compute_relabel_context(passwd_t)
 selinux_compute_user_contexts(passwd_t)
 
-term_use_all_terms(passwd_t)
+term_use_all_inherited_terms(passwd_t)
 
 auth_manage_shadow(passwd_t)
 auth_relabel_shadow(passwd_t)
@@ -325,7 +325,7 @@ miscfiles_read_localization(passwd_t)
 
 seutil_dontaudit_search_config(passwd_t)
 
-userdom_use_user_terminals(passwd_t)
+userdom_use_inherited_user_terminals(passwd_t)
 userdom_use_unpriv_users_fds(passwd_t)
 # make sure that getcon succeeds
 userdom_getattr_all_users(passwd_t)
@@ -384,7 +384,7 @@ dev_read_urand(sysadm_passwd_t)
 fs_getattr_xattr_fs(sysadm_passwd_t)
 fs_search_auto_mountpoints(sysadm_passwd_t)
 
-term_use_all_terms(sysadm_passwd_t)
+term_use_all_inherited_terms(sysadm_passwd_t)
 
 auth_manage_shadow(sysadm_passwd_t)
 auth_relabel_shadow(sysadm_passwd_t)
@@ -471,7 +471,7 @@ selinux_compute_create_context(useradd_t)
 selinux_compute_relabel_context(useradd_t)
 selinux_compute_user_contexts(useradd_t)
 
-term_use_all_terms(useradd_t)
+term_use_all_inherited_terms(useradd_t)
 
 auth_domtrans_chk_passwd(useradd_t)
 auth_rw_lastlog(useradd_t)
index f66327601883ca01b3053b087567fdffb42e6642..6dcf1dae462726ae4ddbb185d69a68286571e8f2 100644 (file)
@@ -77,8 +77,8 @@ domain_use_interactive_fds(vpnc_t)
 fs_getattr_xattr_fs(vpnc_t)
 fs_getattr_tmpfs(vpnc_t)
 
-term_use_all_ptys(vpnc_t)
-term_use_all_ttys(vpnc_t)
+term_use_all_inherited_ptys(vpnc_t)
+term_use_all_inherited_ttys(vpnc_t)
 
 corecmd_exec_all_executables(vpnc_t)
 
index 39c75fb48eb3a720c9f3aa27ada3048843d76d3d..057d8b1d951ab33180b2555b7809b4024b78754d 100644 (file)
@@ -17,7 +17,7 @@ role system_r types ada_t;
 
 allow ada_t self:process { execstack execmem };
 
-userdom_use_user_terminals(ada_t)
+userdom_use_inherited_user_terminals(ada_t)
 
 optional_policy(`
        unconfined_domain(ada_t)
index 2e9a72cade6e4fdde7c369ec4d80b05f3d6a8f44..128f63435cb0345619f1e0504302d3a738e47ce5 100644 (file)
@@ -56,7 +56,7 @@ logging_send_syslog_msg(cdrecord_t)
 miscfiles_read_localization(cdrecord_t)
 
 # write to the user domain tty.
-userdom_use_user_terminals(cdrecord_t)
+userdom_use_inherited_user_terminals(cdrecord_t)
 userdom_read_user_home_content_files(cdrecord_t)
 
 # Handle nfs home dirs
index cd709580798384343d0f48afe249b11680b9d559..126d7ea4d831a61b5488579bbf2226f0207b135a 100644 (file)
@@ -215,7 +215,7 @@ userdom_rw_user_tmp_files(evolution_t)
 userdom_manage_user_tmp_dirs(evolution_t)
 userdom_manage_user_tmp_sockets(evolution_t)
 userdom_manage_user_tmp_files(evolution_t)
-userdom_use_user_terminals(evolution_t)
+userdom_use_inherited_user_terminals(evolution_t)
 # FIXME: suppress access to .local/.icons/.themes until properly implemented
 # FIXME: suppress access to .gaim/blist.xml (buddy list synchronization)
 # until properly implemented
index 6e4add56d91ad179357f983a00606b6244f4bc4c..10a2ce4a424e6be0a931419815b8785a082f8d86 100644 (file)
@@ -132,7 +132,7 @@ miscfiles_read_localization(giftd_t)
 
 sysnet_read_config(giftd_t)
 
-userdom_use_user_terminals(giftd_t)
+userdom_use_inherited_user_terminals(giftd_t)
 
 tunable_policy(`use_nfs_home_dirs',`
        fs_manage_nfs_dirs(giftd_t)
index 857e7df669e4365768f5b91f2140c76db9f6e780..ca56b50ca2b2c7bf23ec6568ebce2b3a3dc6b288 100644 (file)
@@ -257,4 +257,4 @@ optional_policy(`
        ssh_read_user_home_files(gkeyringd_domain)
 ')
 
-userdom_use_user_terminals(gnome_domain)
+userdom_use_inherited_user_terminals(gnome_domain)
index af842c17b146f60e6b884429a533d7915f307ff3..65d207a46cd083f7f32392af11434e3a346e8cfa 100644 (file)
@@ -139,7 +139,7 @@ logging_send_syslog_msg(gpg_t)
 
 miscfiles_read_localization(gpg_t)
 
-userdom_use_user_terminals(gpg_t)
+userdom_use_inherited_user_terminals(gpg_t)
 # sign/encrypt user files
 userdom_manage_all_user_tmp_content(gpg_t)
 #userdom_manage_user_home_content(gpg_t)
@@ -215,7 +215,7 @@ files_read_etc_files(gpg_helper_t)
 
 auth_use_nsswitch(gpg_helper_t)
 
-userdom_use_user_terminals(gpg_helper_t)
+userdom_use_inherited_user_terminals(gpg_helper_t)
 
 tunable_policy(`use_nfs_home_dirs',`
        fs_dontaudit_rw_nfs_files(gpg_helper_t)
@@ -264,7 +264,7 @@ fs_dontaudit_list_inotifyfs(gpg_agent_t)
 miscfiles_read_localization(gpg_agent_t)
 
 # Write to the user domain tty.
-userdom_use_user_terminals(gpg_agent_t)
+userdom_use_inherited_user_terminals(gpg_agent_t)
 # read and write ~/.gnupg (gpg-agent stores secret keys in ~/.gnupg/private-keys-v1.d )
 userdom_search_user_home_dirs(gpg_agent_t)
 
index 52db7eb073f16a4a21ba99a27eaa23fe99843699..9c45e4449f624b72fe3ad3fc209ccd24ee56bf48 100644 (file)
@@ -108,7 +108,7 @@ seutil_use_newrole_fds(irc_t)
 sysnet_read_config(irc_t)
 
 # Write to the user domain tty.
-userdom_use_user_terminals(irc_t)
+userdom_use_inherited_user_terminals(irc_t)
 
 tunable_policy(`use_nfs_home_dirs',`
        fs_manage_nfs_dirs(irc_t)
@@ -174,7 +174,7 @@ auth_use_nsswitch(irssi_t)
 
 miscfiles_read_localization(irssi_t)
 
-userdom_use_user_terminals(irssi_t)
+userdom_use_inherited_user_terminals(irssi_t)
 
 tunable_policy(`irssi_use_full_network', `
        corenet_tcp_bind_all_unreserved_ports(irssi_t)
index 113a08b737e171632e83d1e1ca67b83c0beaacd6..50629a8eec8a30bfc114457cabafd64e8e6b293f 100644 (file)
@@ -38,7 +38,7 @@ locallogin_use_fds(loadkeys_t)
 
 miscfiles_read_localization(loadkeys_t)
 
-userdom_use_user_ttys(loadkeys_t)
+userdom_use_inherited_user_ttys(loadkeys_t)
 userdom_list_user_home_content(loadkeys_t)
 
 ifdef(`hide_broken_symptoms',`
index 0bac99632bae55d0cb92722f1532de82d8652478..ca2388d3c39602bb976d4a861d786fd7860ac7b4 100644 (file)
@@ -35,5 +35,5 @@ fs_getattr_xattr_fs(lockdev_t)
 
 logging_send_syslog_msg(lockdev_t)
 
-userdom_use_user_terminals(lockdev_t)
+userdom_use_inherited_user_terminals(lockdev_t)
 
index 3188ebc13e32fccbd124ff23d56a4e2dc35b3f75..a80dbc5f2112633a3bfc8ae814eacc2b51c4e04d 100644 (file)
@@ -160,7 +160,7 @@ miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t)
 # Browse the web, connect to printer
 sysnet_dns_name_resolve(mozilla_t)
 
-userdom_use_user_ptys(mozilla_t)
+userdom_use_inherited_user_ptys(mozilla_t)
 
 xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
 xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
index e8c67959dbd36f90e140bf96d6dac3762b2b13c6..92752c4224e3c01017f924f89a6d391b995841ef 100644 (file)
@@ -77,7 +77,7 @@ storage_raw_read_removable_device(mencoder_t)
 
 miscfiles_read_localization(mencoder_t)
 
-userdom_use_user_terminals(mencoder_t)
+userdom_use_inherited_user_terminals(mencoder_t)
 # Handle removable media, /tmp, and /home
 userdom_list_user_tmp(mencoder_t)
 userdom_read_user_tmp_files(mencoder_t)
@@ -229,7 +229,7 @@ logging_send_syslog_msg(mplayer_t)
 miscfiles_read_localization(mplayer_t)
 miscfiles_read_fonts(mplayer_t)
 
-userdom_use_user_terminals(mplayer_t)
+userdom_use_inherited_user_terminals(mplayer_t)
 # Read media files
 userdom_list_user_tmp(mplayer_t)
 userdom_read_user_tmp_files(mplayer_t)
index 4f9cb05640983b1cf989acb1278290e03ddccca5..37449c0f8fe6d3155a785a460ef83523829e7e48 100644 (file)
@@ -102,8 +102,8 @@ ifdef(`hide_broken_symptoms', `
        stream_connect_pattern(nsplugin_t, user_home_t, user_home_t, $2)
        gnome_stream_connect(nsplugin_t, $2)
 
-       userdom_use_user_terminals(nsplugin_t)
-       userdom_use_user_terminals(nsplugin_config_t)
+       userdom_use_inherited_user_terminals(nsplugin_t)
+       userdom_use_inherited_user_terminals(nsplugin_config_t)
        userdom_dontaudit_setattr_user_home_content_files(nsplugin_t)
        userdom_manage_tmpfs_role($1, nsplugin_t)
 
index ae61e3cae2a68fcec036b7b43736e86a4ed00a07..be062b9e1d98c2d3bf7a70a66c44a8c0546f0686 100644 (file)
@@ -86,8 +86,8 @@ fs_rw_anon_inodefs_files(pulseaudio_t)
 fs_getattr_tmpfs(pulseaudio_t)
 fs_list_inotifyfs(pulseaudio_t)
 
-term_use_all_ttys(pulseaudio_t)
-term_use_all_ptys(pulseaudio_t)
+term_use_all_inherited_ttys(pulseaudio_t)
+term_use_all_inherited_ptys(pulseaudio_t)
 
 auth_use_nsswitch(pulseaudio_t)
 
index 85fb63bb045d5150f77ff5b8bd3bc34b69078a31..9e34fbdac35d0d22841b2056baa163257af8f04e 100644 (file)
@@ -76,7 +76,7 @@ template(`qemu_domain_template',`
 
        sysnet_read_config($1_t)
 
-       userdom_use_user_terminals($1_t)
+       userdom_use_inherited_user_terminals($1_t)
        userdom_attach_admin_tun_iface($1_t)
 
        optional_policy(`
index 26d0f567b7bf4b711294ccd692bb3296aa2ac008..7c04fb7b8b92671209e223b43ee027835348dcc4 100644 (file)
@@ -98,7 +98,7 @@ auth_use_nsswitch(sandbox_xserver_t)
 logging_send_syslog_msg(sandbox_xserver_t)
 logging_send_audit_msgs(sandbox_xserver_t)
 
-userdom_use_user_terminals(sandbox_xserver_t)
+userdom_use_inherited_user_terminals(sandbox_xserver_t)
 userdom_dontaudit_search_user_home_content(sandbox_xserver_t)
 
 xserver_entry_type(sandbox_xserver_t)
index 0e4ead0dec07fee7b79a9d65ede904b5c01bbeea..f505865df4c260ae2a82c774a905f81007ae5561 100644 (file)
@@ -141,7 +141,7 @@ template(`screen_role_template',`
 
        seutil_read_config($1_screen_t)
 
-       userdom_use_user_terminals($1_screen_t)
+       userdom_use_inherited_user_terminals($1_screen_t)
        userdom_create_user_pty($1_screen_t)
        userdom_user_home_domtrans($1_screen_t, $3)
        userdom_setattr_user_ptys($1_screen_t)
index 080ea5407f577bde2eb3d97b2def86a68caf403b..708e1f2a2236208e569b6412bae292ea130f3355 100644 (file)
@@ -38,7 +38,7 @@ logging_send_syslog_msg(seunshare_domain)
 
 miscfiles_read_localization(seunshare_domain)
 
-userdom_use_user_terminals(seunshare_domain)
+userdom_use_inherited_user_terminals(seunshare_domain)
 userdom_list_user_home_content(seunshare_domain)
 ifdef(`hide_broken_symptoms', `
        fs_dontaudit_rw_anon_inodefs_files(seunshare_domain)
index 1ee3b2a00ea0da10ee2495a126186e7a9f72263e..4992acdeee9ca81aa0bce0c6b16699ac1654a153 100644 (file)
@@ -308,11 +308,9 @@ fs_search_auto_mountpoints(telepathy_domain)
 
 miscfiles_read_localization(telepathy_domain)
 
-sysnet_dns_name_resolve(telepathy_domain)
-
 # This interface does not facilitate files_search_tmp which appears to be a bug.
 userdom_stream_connect(telepathy_domain)
-userdom_use_user_terminals(telepathy_domain)
+userdom_use_inherited_user_terminals(telepathy_domain)
 
 tunable_policy(`telepathy_tcp_connect_generic_network_ports', `
         corenet_tcp_connect_generic_port(telepathy_domain)
index 11fe4f26ec8426447a4c191ee1b02522be83eb86..98bfbf3c263f3491eb79c37db10b5cba65719193 100644 (file)
@@ -73,7 +73,7 @@ fs_search_auto_mountpoints(tvtime_t)
 miscfiles_read_localization(tvtime_t)
 miscfiles_read_fonts(tvtime_t)
 
-userdom_use_user_terminals(tvtime_t)
+userdom_use_inherited_user_terminals(tvtime_t)
 userdom_read_user_home_content_files(tvtime_t)
 
 # X access, Home files
index 2df1343eead429270df72a8e1806f799da9b9fb9..7a11f39311ebb55f60b74c94957cb918d1560a79 100644 (file)
@@ -134,7 +134,7 @@ seutil_use_newrole_fds(uml_t)
 # Use the network.
 sysnet_read_config(uml_t)
 
-userdom_use_user_terminals(uml_t)
+userdom_use_inherited_user_terminals(uml_t)
 userdom_attach_admin_tun_iface(uml_t)
 
 optional_policy(`
index 958681859e307dda89142c697242ba977ad669b7..f93802426b5eeafb49c126a8a04117247451214b 100644 (file)
@@ -58,7 +58,7 @@ seutil_read_config(usernetctl_t)
 
 sysnet_read_config(usernetctl_t)
 
-userdom_use_user_terminals(usernetctl_t)
+userdom_use_inherited_user_terminals(usernetctl_t)
 
 optional_policy(`
        hostname_exec(usernetctl_t)
index 03fc70177fc7a648d293f7a6daec936fa3e00765..f58654e4db5ebaa3a404c1b071b007bbea6202e8 100644 (file)
@@ -50,4 +50,4 @@ logging_send_syslog_msg(vlock_t)
 miscfiles_read_localization(vlock_t)
 
 userdom_dontaudit_search_user_home_dirs(vlock_t)
-userdom_use_user_terminals(vlock_t)
+userdom_use_inherited_user_terminals(vlock_t)
index 9562e789dd38c20e2ce0802333b4d03184b8b110..e174a83918d643e3f12ee6624c984882ee76c013 100644 (file)
@@ -288,7 +288,7 @@ libs_read_lib_files(vmware_t)
 
 miscfiles_read_localization(vmware_t)
 
-userdom_use_user_terminals(vmware_t)
+userdom_use_inherited_user_terminals(vmware_t)
 userdom_list_user_home_dirs(vmware_t)
 # cjp: why?
 userdom_read_user_home_content_files(vmware_t)
index 8325a8d684ac45e26f70ffba0945031245188493..381d5eb7587aab124881d13c2614d87768ff0db0 100644 (file)
@@ -81,7 +81,7 @@ miscfiles_read_public_files(webalizer_t)
 sysnet_dns_name_resolve(webalizer_t)
 sysnet_read_config(webalizer_t)
 
-userdom_use_user_terminals(webalizer_t)
+userdom_use_inherited_user_terminals(webalizer_t)
 userdom_use_unpriv_users_fds(webalizer_t)
 userdom_dontaudit_search_user_home_content(webalizer_t)
 
index 646620a0875551285745ba0078e3f6f9ebffcd61..bf6c62e086eb9d382c475e635ecdbfaf308e2c2c 100644 (file)
@@ -40,7 +40,7 @@ domain_mmap_low(wine_t)
 
 files_execmod_all_files(wine_t)
 
-userdom_use_user_terminals(wine_t)
+userdom_use_inherited_user_terminals(wine_t)
 
 tunable_policy(`wine_mmap_zero_ignore',`
        dontaudit wine_t self:memprotect mmap_zero;
index 1bdeb163df6717d65475496fa55a830d34f228fa..775f78819d4c7ad9dcedef26726d7dfa2c7c48a7 100644 (file)
@@ -37,7 +37,7 @@ logging_send_syslog_msg(xscreensaver_t)
 
 miscfiles_read_localization(xscreensaver_t)
 
-userdom_use_user_ptys(xscreensaver_t)
+userdom_use_inherited_user_ptys(xscreensaver_t)
 #access to .icons and ~/.xscreensaver
 userdom_read_user_home_content_files(xscreensaver_t)
 
index 223ad437d797bd1b60c8fd0fb4e0171ff0e5e329..d400ef64b9c9430d4c2d92ed4cc13d57dcf62997 100644 (file)
@@ -92,7 +92,7 @@ seutil_read_config(yam_t)
 sysnet_dns_name_resolve(yam_t)
 sysnet_read_config(yam_t)
 
-userdom_use_user_terminals(yam_t)
+userdom_use_inherited_user_terminals(yam_t)
 userdom_use_unpriv_users_fds(yam_t)
 # Reading dotfiles...
 # cjp: ?
index 4cbc36c3315970993863128538fd166865b74d76..eceb42d2d30c717d5ba540470661fca3f2dec4c1 100644 (file)
@@ -206,6 +206,27 @@ interface(`term_use_all_terms',`
        allow $1 { devpts_t console_device_t tty_device_t ttynode ptynode }:chr_file rw_chr_file_perms;
 ')
 
+########################################
+## <summary>
+##     Read and write the inherited console, all inherited 
+##     ttys and ptys.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <rolecap/>
+#
+interface(`term_use_all_inherited_terms',`
+       gen_require(`
+               attribute ttynode, ptynode;
+               type console_device_t, devpts_t, tty_device_t;
+       ')
+
+       allow $1 { devpts_t console_device_t tty_device_t ttynode ptynode }:chr_file rw_inherited_term_perms;
+')
+
 ########################################
 ## <summary>
 ##     Write to the console.
@@ -860,6 +881,26 @@ interface(`term_use_all_ptys',`
        allow $1 ptynode:chr_file { rw_term_perms lock append };
 ')
 
+########################################
+## <summary>
+##     Read and write all inherited ptys.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <rolecap/>
+#
+interface(`term_use_all_inherited_ptys',`
+       gen_require(`
+               attribute ptynode;
+               type devpts_t;
+       ')
+
+       allow $1 ptynode:chr_file { rw_inherited_term_perms lock };
+')
+
 ########################################
 ## <summary>
 ##     Do not audit attempts to read or write any ptys.
@@ -1364,7 +1405,27 @@ interface(`term_use_all_ttys',`
        ')
 
        dev_list_all_dev_nodes($1)
-       allow $1 ttynode:chr_file rw_chr_file_perms;
+       allow $1 ttynode:chr_file rw_term_perms;
+')
+
+########################################
+## <summary>
+##     Read and write all inherited ttys.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <rolecap/>
+#
+interface(`term_use_all_inherited_ttys',`
+       gen_require(`
+               attribute ttynode;
+       ')
+
+       dev_list_all_dev_nodes($1)
+       allow $1 ttynode:chr_file rw_inherited_term_perms;
 ')
 
 ########################################
index 2509dd2c6ea07ff7b737eea9198443b05cb83c2c..615e9578eaabe63893a42bca2210c9248f26d6b5 100644 (file)
@@ -39,4 +39,4 @@ logging_send_syslog_msg(aide_t)
 
 seutil_use_newrole_fds(aide_t)
 
-userdom_use_user_terminals(aide_t)
+userdom_use_inherited_user_terminals(aide_t)
index 700b734a154e55a9280ae5e8a4ff3d4d63c228bf..1bf05a62bc05ad28a6e4fd5414c80b9d4182bb1a 100644 (file)
@@ -657,8 +657,8 @@ tunable_policy(`httpd_ssi_exec',`
 # to run correctly without this permission, so the permission
 # are dontaudited here.
 tunable_policy(`httpd_tty_comm',`
-       userdom_use_user_terminals(httpd_t)
-       userdom_use_user_terminals(httpd_suexec_t)
+       userdom_use_inherited_user_terminals(httpd_t)
+       userdom_use_inherited_user_terminals(httpd_suexec_t)
 ',`
        userdom_dontaudit_use_user_terminals(httpd_t)
        userdom_dontaudit_use_user_terminals(httpd_suexec_t)
@@ -825,10 +825,10 @@ allow httpd_helper_t httpd_log_t:file append_file_perms;
 
 logging_send_syslog_msg(httpd_helper_t)
 
-userdom_use_user_terminals(httpd_helper_t)
+userdom_use_inherited_user_terminals(httpd_helper_t)
 
 tunable_policy(`httpd_tty_comm',`
-       userdom_use_user_terminals(httpd_helper_t)
+       userdom_use_inherited_user_terminals(httpd_helper_t)
 ')
 
 ########################################
index 8478ecae5e7553617a8b3b744de82ebf154e6e03..ec553147d92da2369a643285745801342d55ded4 100644 (file)
@@ -87,7 +87,7 @@ miscfiles_read_localization(apcupsd_t)
 
 sysnet_dns_name_resolve(apcupsd_t)
 
-userdom_use_user_ttys(apcupsd_t)
+userdom_use_inherited_user_ttys(apcupsd_t)
 
 optional_policy(`
        hostname_exec(apcupsd_t)
index ca71f13bf637e8e2e4b4e09657306b733d4ffc13..63ecf3b3e0c1e7cd09f8e02c1eb2e3f82a65ac2f 100644 (file)
@@ -46,7 +46,7 @@ dev_rw_apm_bios(apm_t)
 
 fs_getattr_xattr_fs(apm_t)
 
-term_use_all_terms(apm_t)
+term_use_all_inherited_terms(apm_t)
 
 domain_use_interactive_fds(apm_t)
 
index 42aa0336ccf9e2fdf1d87f96499ba120d75b5275..14d5f4ce5687f37cde1774611891d8e67e14bb7d 100644 (file)
@@ -239,7 +239,7 @@ miscfiles_read_localization(ndc_t)
 sysnet_read_config(ndc_t)
 sysnet_dns_name_resolve(ndc_t)
 
-userdom_use_user_terminals(ndc_t)
+userdom_use_inherited_user_terminals(ndc_t)
 
 term_dontaudit_use_console(ndc_t)
 
index b40f3f7b96feaf46ca9679291bde77f46a6c5d2a..3676eccf06176e6c69e41e13434343526f4cdd15 100644 (file)
@@ -38,7 +38,7 @@ files_read_etc_files(clockspeed_cli_t)
 
 miscfiles_read_localization(clockspeed_cli_t)
 
-userdom_use_user_terminals(clockspeed_cli_t)
+userdom_use_inherited_user_terminals(clockspeed_cli_t)
 
 ########################################
 #
index b6402c9f29930716c343d49cc8ddd916abec1b17..b6c4cc94d255661010b0bbe91f2bad9ff51fa03f 100644 (file)
@@ -83,7 +83,7 @@ template(`cron_common_crontab_template',`
        userdom_manage_user_tmp_dirs($1_t)
        userdom_manage_user_tmp_files($1_t)
        # Access terminals.
-       userdom_use_user_terminals($1_t)
+       userdom_use_inherited_user_terminals($1_t)
        # Read user crontabs
        userdom_read_user_home_content_files($1_t)
        userdom_read_user_home_content_symlinks($1_t)
index cee56c80c31efd2875fa51b73ff25568bc714072..85a1dc0eb2533113a34089238d04f2afadd9a094 100644 (file)
@@ -149,7 +149,7 @@ template(`dbus_role_template',`
        seutil_read_config($1_dbusd_t)
        seutil_read_default_contexts($1_dbusd_t)
 
-       term_use_all_terms($1_dbusd_t)
+       term_use_all_inherited_terms($1_dbusd_t)
 
        userdom_dontaudit_search_admin_dir($1_dbusd_t)
        userdom_manage_user_home_content_dirs($1_dbusd_t)
index d1104562a857566b81dac84b4b85284974a9f5a0..2f8401708d1e6768ff1a9e1bb57bff7fb944e1c2 100644 (file)
@@ -110,7 +110,7 @@ logging_send_syslog_msg(cdcc_t)
 
 miscfiles_read_localization(cdcc_t)
 
-userdom_use_user_terminals(cdcc_t)
+userdom_use_inherited_user_terminals(cdcc_t)
 
 ########################################
 #
@@ -152,7 +152,7 @@ logging_send_syslog_msg(dcc_client_t)
 
 miscfiles_read_localization(dcc_client_t)
 
-userdom_use_user_terminals(dcc_client_t)
+userdom_use_inherited_user_terminals(dcc_client_t)
 
 optional_policy(`
        amavis_read_spool_files(dcc_client_t)
@@ -197,7 +197,7 @@ logging_send_syslog_msg(dcc_dbclean_t)
 
 miscfiles_read_localization(dcc_dbclean_t)
 
-userdom_use_user_terminals(dcc_dbclean_t)
+userdom_use_inherited_user_terminals(dcc_dbclean_t)
 
 ########################################
 #
index beb01638388a48a9a8e7d3ebbb4b594d306e2f85..fbf109ed53c778de50020a347c2820f06b6b84e8 100644 (file)
@@ -135,7 +135,7 @@ storage_raw_write_fixed_disk(devicekit_disk_t)
 storage_raw_read_removable_device(devicekit_disk_t)
 storage_raw_write_removable_device(devicekit_disk_t)
 
-term_use_all_terms(devicekit_disk_t)
+term_use_all_inherited_terms(devicekit_disk_t)
 
 auth_use_nsswitch(devicekit_disk_t)
 
@@ -251,7 +251,7 @@ files_read_usr_files(devicekit_power_t)
 fs_list_inotifyfs(devicekit_power_t)
 fs_getattr_all_fs(devicekit_power_t)
 
-term_use_all_terms(devicekit_power_t)
+term_use_all_inherited_terms(devicekit_power_t)
 
 auth_use_nsswitch(devicekit_power_t)
 
index 826e699ce88847bf8d827ed4fe258b8dcede80c9..194e143c2104ba22018cdc4b52433286b20615ac 100644 (file)
@@ -398,7 +398,7 @@ files_tmp_filetrans(ftpdctl_t, ftpdctl_tmp_t, sock_file)
 # Allow ftpdctl to read config files
 files_read_etc_files(ftpdctl_t)
 
-userdom_use_user_terminals(ftpdctl_t)
+userdom_use_inherited_user_terminals(ftpdctl_t)
 
 ########################################
 #
index 8d10fc5b40a1cad5b959f7dbeda1248175209eda..0b39a8bd142b133e9ff2f635e7d627073b2e37d3 100644 (file)
@@ -155,7 +155,7 @@ list_dirs_pattern(git_session_t, git_session_content_t, git_session_content_t)
 read_files_pattern(git_session_t, git_session_content_t, git_session_content_t)
 userdom_search_user_home_dirs(git_session_t)
 
-userdom_use_user_terminals(git_session_t)
+userdom_use_inherited_user_terminals(git_session_t)
 
 tunable_policy(`git_session_bind_all_unreserved_ports',`
        corenet_tcp_bind_all_unreserved_ports(git_session_t)
index 4b27e25e6e6adb61bd2d5156da534bca3cd55827..c4cfc6d09a80b68d141cf80eabcaa40fc3dc6b5e 100644 (file)
@@ -69,7 +69,7 @@ miscfiles_read_localization(gpm_t)
 
 userdom_dontaudit_use_unpriv_user_fds(gpm_t)
 userdom_dontaudit_search_user_home_dirs(gpm_t)
-userdom_use_user_terminals(gpm_t)
+userdom_use_inherited_user_terminals(gpm_t)
 
 optional_policy(`
        seutil_sigchld_newrole(gpm_t)
index 9821a883ce014f747cf1c33dab3aaa7e624a8b0d..1367b080684e129515d0b6e8b183b0cc64f1ec6a 100644 (file)
@@ -165,7 +165,7 @@ miscfiles_read_localization(hadoop_t)
 
 sysnet_read_config(hadoop_t)
 
-userdom_use_user_terminals(hadoop_t)
+userdom_use_inherited_user_terminals(hadoop_t)
 
 java_exec(hadoop_t)
 
@@ -345,7 +345,7 @@ miscfiles_read_localization(zookeeper_t)
 
 sysnet_read_config(zookeeper_t)
 
-userdom_use_user_terminals(zookeeper_t)
+userdom_use_inherited_user_terminals(zookeeper_t)
 userdom_dontaudit_search_user_home_dirs(zookeeper_t)
 
 java_exec(zookeeper_t)
index 83a4f3843bd52e7f5760649ed464befc8bbb420b..7fa55e856da93ba55c3cf2aa3d72778648c0e0e9 100644 (file)
@@ -46,7 +46,7 @@ files_read_etc_files(ksmtuned_t)
 
 mls_file_read_to_clearance(ksmtuned_t)
 
-term_use_all_terms(ksmtuned_t)
+term_use_all_inherited_terms(ksmtuned_t)
 
 logging_send_syslog_msg(ksmtuned_t)
 
index ca5cfdfe1d2433f424fc0b146af108fab7b2a7ab..554ad30e892b77b1eb697d3d4674ef1832cd3024 100644 (file)
@@ -68,7 +68,7 @@ fs_getattr_xattr_fs(ktalkd_t)
 files_read_etc_files(ktalkd_t)
 
 term_search_ptys(ktalkd_t)
-term_use_all_terms(ktalkd_t)
+term_use_all_inherited_terms(ktalkd_t)
 
 auth_use_nsswitch(ktalkd_t)
 
index 96a105a66146d6af5c8b5c55759d0faea2ba1f1a..c08de17e889d76b8e00352b78d9636c343188449 100644 (file)
@@ -113,7 +113,7 @@ init_use_fds(checkpc_t)
 
 sysnet_read_config(checkpc_t)
 
-userdom_use_user_terminals(checkpc_t)
+userdom_use_inherited_user_terminals(checkpc_t)
 
 optional_policy(`
        cron_system_entry(checkpc_t, checkpc_exec_t)
@@ -278,7 +278,7 @@ miscfiles_read_localization(lpr_t)
 
 userdom_read_user_tmp_symlinks(lpr_t)
 # Write to the user domain tty.
-userdom_use_user_terminals(lpr_t)
+userdom_use_inherited_user_terminals(lpr_t)
 userdom_read_user_home_content_files(lpr_t)
 userdom_read_user_tmp_files(lpr_t)
 
index 0d7da33fed1c4d514b1d29b4bc1c5cf046efc341..9ddac5228ea303a3b84d8a4ee9a87f5bf7c0fa7f 100644 (file)
@@ -69,7 +69,7 @@ term_dontaudit_use_unallocated_ttys(system_mail_t)
 
 init_use_script_ptys(system_mail_t)
 
-userdom_use_user_terminals(system_mail_t)
+userdom_use_inherited_user_terminals(system_mail_t)
 userdom_dontaudit_search_user_home_dirs(system_mail_t)
 userdom_dontaudit_list_admin_dir(system_mail_t)
 
@@ -266,9 +266,9 @@ optional_policy(`
 
 domain_use_interactive_fds(user_mail_t)
 
-userdom_use_user_terminals(user_mail_t)
+userdom_use_inherited_user_terminals(user_mail_t)
 # Write to the user domain tty. cjp: why?
-userdom_use_user_terminals(mta_user_agent)
+userdom_use_inherited_user_terminals(mta_user_agent)
 # Create dead.letter in user home directories.
 userdom_manage_user_home_content_files(user_mail_t)
 userdom_user_home_dir_filetrans_user_home_content(user_mail_t, file)
index b4c5f86339f838d8e1d13c0b7a58575e236ed14e..0f1549d137fb190e70242213f4bb29c6d4cbbbf5 100644 (file)
@@ -66,7 +66,7 @@ logging_send_syslog_msg(oav_update_t)
 
 sysnet_read_config(oav_update_t)
 
-userdom_use_user_terminals(oav_update_t)
+userdom_use_inherited_user_terminals(oav_update_t)
 
 optional_policy(`
        cron_system_entry(oav_update_t, oav_update_exec_t)
index e41ff4786801273b0eec2ba4e4df09318922a58c..f7291dfdcb49e1ec9743735d33152fa4414689b0 100644 (file)
@@ -121,7 +121,7 @@ sysnet_exec_ifconfig(openvpn_t)
 sysnet_manage_config(openvpn_t)
 sysnet_etc_filetrans_config(openvpn_t)
 
-userdom_use_user_terminals(openvpn_t)
+userdom_use_inherited_user_terminals(openvpn_t)
 userdom_read_home_certs(openvpn_t)
 userdom_attach_admin_tun_iface(openvpn_t)
 
index d1cf513399a38c5c7776e328524f34ee2f6f40b5..dcca269a2615e56120a076f7a90f1bdd16d657d1 100644 (file)
@@ -141,7 +141,7 @@ logging_send_syslog_msg(portmap_helper_t)
 
 sysnet_read_config(portmap_helper_t)
 
-userdom_use_user_terminals(portmap_helper_t)
+userdom_use_inherited_user_terminals(portmap_helper_t)
 userdom_dontaudit_use_all_users_fds(portmap_helper_t)
 
 optional_policy(`
index 69c331ee6fee377c41b55074d699acc734ab507d..055563594fa95d9e472813a000e6df9fed92003a 100644 (file)
@@ -79,7 +79,7 @@ fs_getattr_xattr_fs(portslave_t)
 
 term_use_unallocated_ttys(portslave_t)
 term_setattr_unallocated_ttys(portslave_t)
-term_use_all_ttys(portslave_t)
+term_use_all_inherited_ttys(portslave_t)
 term_search_ptys(portslave_t)
 
 auth_rw_login_records(portslave_t)
index 37036715d7f331c499115f551da1508e5cc516ac..8bf015c0f5142c868394a14c893def425b9cdbb0 100644 (file)
@@ -532,8 +532,8 @@ write_fifo_files_pattern(postfix_postqueue_t, postfix_public_t, postfix_public_t
 domtrans_pattern(postfix_postqueue_t, postfix_showq_exec_t, postfix_showq_t)
 
 # to write the mailq output, it really should not need read access!
-term_use_all_ptys(postfix_postqueue_t)
-term_use_all_ttys(postfix_postqueue_t)
+term_use_all_inherited_ptys(postfix_postqueue_t)
+term_use_all_inherited_ttys(postfix_postqueue_t)
 
 init_sigchld_script(postfix_postqueue_t)
 init_use_script_fds(postfix_postqueue_t)
index 74e09841437155d0ec799190edc0bab996ae00e1..ba8f18530759a0d5b42df78de863f72b5e74a2da 100644 (file)
@@ -179,7 +179,7 @@ sysnet_exec_ifconfig(pppd_t)
 sysnet_manage_config(pppd_t)
 sysnet_etc_filetrans_config(pppd_t)
 
-userdom_use_user_terminals(pppd_t)
+userdom_use_inherited_user_terminals(pppd_t)
 userdom_dontaudit_use_unpriv_user_fds(pppd_t)
 userdom_search_user_home_dirs(pppd_t)
 
index abb4475cd0879ccdfdcec4347c96d2a7ff171c12..3625895f074af298ea722b5f0b90fcab3865dc80 100644 (file)
@@ -87,7 +87,7 @@ miscfiles_read_localization(privoxy_t)
 userdom_dontaudit_use_unpriv_user_fds(privoxy_t)
 userdom_dontaudit_search_user_home_dirs(privoxy_t)
 # cjp: this should really not be needed
-userdom_use_user_terminals(privoxy_t)
+userdom_use_inherited_user_terminals(privoxy_t)
 
 tunable_policy(`privoxy_connect_any',`
        corenet_tcp_connect_all_ports(privoxy_t)
index 1244ab22984b0bf30b80de2c1b28e7d656f89874..4427b21c5af9a4072a545734f68eb4991ecc1d55 100644 (file)
@@ -123,7 +123,7 @@ ifdef(`distro_redhat',`
        logging_send_syslog_msg(razor_t)
 
        userdom_search_user_home_dirs(razor_t)
-       userdom_use_user_terminals(razor_t)
+       userdom_use_inherited_user_terminals(razor_t)
 
        tunable_policy(`use_nfs_home_dirs',`
                fs_manage_nfs_dirs(razor_t)
index ef1edc616ee9598bc6004e5be25deb5ab9631cd4..2c24007861f79bf1331ad03e1cbdd2ca54b4e14d 100644 (file)
@@ -212,7 +212,7 @@ miscfiles_read_localization(samba_net_t)
 
 samba_read_var_files(samba_net_t)
 
-userdom_use_user_terminals(samba_net_t)
+userdom_use_inherited_user_terminals(samba_net_t)
 userdom_list_user_home_dirs(samba_net_t)
 
 optional_policy(`
@@ -576,7 +576,7 @@ files_read_etc_files(smbcontrol_t)
 
 miscfiles_read_localization(smbcontrol_t)
 
-userdom_use_user_terminals(smbcontrol_t)
+userdom_use_inherited_user_terminals(smbcontrol_t)
 
 ########################################
 #
@@ -646,7 +646,7 @@ locallogin_use_fds(smbmount_t)
 
 logging_search_logs(smbmount_t)
 
-userdom_use_user_terminals(smbmount_t)
+userdom_use_inherited_user_terminals(smbmount_t)
 userdom_use_all_users_fds(smbmount_t)
 
 optional_policy(`
@@ -911,7 +911,7 @@ logging_send_syslog_msg(winbind_helper_t)
 
 miscfiles_read_localization(winbind_helper_t) 
 
-userdom_use_user_terminals(winbind_helper_t)
+userdom_use_inherited_user_terminals(winbind_helper_t)
 
 optional_policy(`
        apache_append_log(winbind_helper_t)
@@ -938,7 +938,7 @@ optional_policy(`
 
        manage_files_pattern(samba_unconfined_net_t, samba_etc_t, samba_secrets_t)
        filetrans_pattern(samba_unconfined_net_t, samba_etc_t, samba_secrets_t, file)
-       userdom_use_user_terminals(samba_unconfined_net_t)
+       userdom_use_inherited_user_terminals(samba_unconfined_net_t)
 ')
 
        type samba_unconfined_script_t;
index 150c85d204360355f2731f2ad49339bd9c63438d..71e931559c3942dcdbf8f68f105727d2773e3298 100644 (file)
@@ -55,7 +55,7 @@ domain_use_interactive_fds(samhain_t)
 
 seutil_sigchld_newrole(samhain_t)
 
-userdom_use_user_terminals(samhain_t)
+userdom_use_inherited_user_terminals(samhain_t)
 
 ########################################
 #
index d9913e09c30a8acdf8665972e30c088abc2e15b6..80b2f2e3fb16bfc207c0855ac31f7652dafe18a9 100644 (file)
@@ -408,7 +408,7 @@ template(`ssh_role_template',`
        seutil_dontaudit_read_config($1_ssh_agent_t)
 
        # Write to the user domain tty.
-       userdom_use_user_terminals($1_ssh_agent_t)
+       userdom_use_inherited_user_terminals($1_ssh_agent_t)
 
        # for the transition back to normal privs upon exec
        userdom_search_user_home_content($1_ssh_agent_t)
index 92e24a927785150c0638597549d2287aab692863..f12b5ccc72b4aee4aaef307ffeb91476b4f7e52e 100644 (file)
@@ -175,7 +175,7 @@ seutil_read_config(ssh_t)
 userdom_dontaudit_list_user_home_dirs(ssh_t)
 userdom_search_user_home_dirs(ssh_t)
 # Write to the user domain tty.
-userdom_use_user_terminals(ssh_t)
+userdom_use_inherited_user_terminals(ssh_t)
 # needs to read krb/write tgt
 userdom_read_user_tmp_files(ssh_t)
 userdom_write_user_tmp_files(ssh_t)
index 3645a226c23b5f8a62dd029fa02cf61e78349c03..6bfbf45a804d4425da3f78d8ee7a15563d13b547 100644 (file)
@@ -49,7 +49,7 @@ fs_getattr_xattr_fs(sysstat_t)
 fs_list_inotifyfs(sysstat_t)
 
 term_use_console(sysstat_t)
-term_use_all_terms(sysstat_t)
+term_use_all_inherited_terms(sysstat_t)
 
 init_use_fds(sysstat_t)
 
index a541a0a47b963118b10e561472117cd78b47ddd8..6c7cef3264665bca4f9f8887749adf5e56346f8f 100644 (file)
@@ -559,7 +559,7 @@ fs_rw_inherited_noxattr_fs_files(virt_domain)
 miscfiles_read_public_files(virt_domain)
 storage_raw_read_removable_device(virt_domain)
 
-term_use_all_terms(virt_domain)
+term_use_all_inherited_terms(virt_domain)
 term_getattr_pty_fs(virt_domain)
 term_use_generic_ptys(virt_domain)
 term_use_ptmx(virt_domain)
@@ -637,7 +637,7 @@ fs_search_auto_mountpoints(virsh_t)
 
 storage_raw_read_fixed_disk(virsh_t)
 
-term_use_all_terms(virsh_t)
+term_use_all_inherited_terms(virsh_t)
 
 init_stream_connect_script(virsh_t)
 init_rw_script_stream_sockets(virsh_t)
index 4f1be575050cccd286a69a93fb707167ac4d4c3e..4a834647c5e5db6de4c1c00899185bea82de61bd 100644 (file)
@@ -283,7 +283,7 @@ dev_read_rand(iceauth_t)
 
 fs_search_auto_mountpoints(iceauth_t)
 
-userdom_use_user_terminals(iceauth_t)
+userdom_use_inherited_user_terminals(iceauth_t)
 userdom_read_user_tmp_files(iceauth_t)
 userdom_read_all_users_state(iceauth_t)
 
@@ -365,7 +365,7 @@ term_dontaudit_use_console(xauth_t)
 
 auth_use_nsswitch(xauth_t)
 
-userdom_use_user_terminals(xauth_t)
+userdom_use_inherited_user_terminals(xauth_t)
 userdom_read_user_tmp_files(xauth_t)
 userdom_read_all_users_state(xauth_t)
 
index 66a0a2564261ef4c0526a78aa1763e11d348f6cb..335900fd9b071da85a45a63a2c1289f0220b8fd9 100644 (file)
@@ -135,7 +135,7 @@ miscfiles_read_localization(chkpwd_t)
 seutil_read_config(chkpwd_t)
 seutil_dontaudit_use_newrole_fds(chkpwd_t)
 
-userdom_use_user_terminals(chkpwd_t)
+userdom_use_inherited_user_terminals(chkpwd_t)
 
 ifdef(`distro_ubuntu',`
        optional_policy(`
@@ -360,7 +360,7 @@ logging_send_syslog_msg(updpwd_t)
 
 miscfiles_read_localization(updpwd_t)
 
-userdom_use_user_terminals(updpwd_t)
+userdom_use_inherited_user_terminals(updpwd_t)
 
 ifdef(`distro_ubuntu',`
        optional_policy(`
@@ -394,7 +394,7 @@ domain_use_interactive_fds(utempter_t)
 
 logging_search_logs(utempter_t)
 
-userdom_use_user_terminals(utempter_t)
+userdom_use_inherited_user_terminals(utempter_t)
 # Allow utemper to write to /tmp/.xses-*
 userdom_write_user_tmp_files(utempter_t)
 
index b9ed25bc2bd3cf893b1da75f368c0a7ca3bf5e8b..de3738c16899fc7180260ea02468482b5063093a 100644 (file)
@@ -46,8 +46,8 @@ fs_search_auto_mountpoints(hwclock_t)
 
 term_dontaudit_use_console(hwclock_t)
 term_use_unallocated_ttys(hwclock_t)
-term_use_all_ttys(hwclock_t)
-term_use_all_ptys(hwclock_t)
+term_use_all_inherited_ttys(hwclock_t)
+term_use_all_inherited_ptys(hwclock_t)
 
 domain_use_interactive_fds(hwclock_t)
 
index 8cc63f7478a06f46118bad708d46aa4ccf31d30d..7d0c1d67c55f9a120f9e648f9832a44b83e99499 100644 (file)
@@ -153,7 +153,7 @@ miscfiles_read_localization(fsadm_t)
 
 seutil_read_config(fsadm_t)
 
-term_use_all_terms(fsadm_t)
+term_use_all_inherited_terms(fsadm_t)
 
 ifdef(`distro_redhat',`
        optional_policy(`
index 80e513b48a41f8739cba51f9bce09d6d405ff8ec..ec32c5e1827a89c5e8ef684e1be8f469928ac591 100644 (file)
@@ -43,8 +43,8 @@ fs_dontaudit_leaks(hostname_t)
 fs_dontaudit_use_tmpfs_chr_dev(hostname_t)
 
 term_dontaudit_use_console(hostname_t)
-term_use_all_ttys(hostname_t)
-term_use_all_ptys(hostname_t)
+term_use_all_inherited_ttys(hostname_t)
+term_use_all_inherited_ptys(hostname_t)
 
 init_use_fds(hostname_t)
 init_use_script_fds(hostname_t)
index 42835712f9ac1358bb856ec8aa2f110af4182418..399f3802649ac70f9379ac4983b2f4ad9479aadc 100644 (file)
@@ -173,7 +173,6 @@ files_read_all_pids(init_t)
 files_read_system_conf_files(init_t)
 files_rw_generic_pids(init_t)
 files_dontaudit_search_isid_type_dirs(init_t)
-files_read_etc_runtime_files(init_t)
 files_manage_etc_runtime_files(init_t)
 files_etc_filetrans_etc_runtime(init_t, file)
 # Run /etc/X11/prefdm:
@@ -197,7 +196,9 @@ mls_rangetrans_source(initrc_t)
 
 selinux_set_all_booleans(init_t)
 
-term_use_all_terms(init_t)
+term_use_unallocated_ttys(init_t)
+term_use_console(init_t)
+term_use_all_inherited_terms(init_t)
 
 # Run init scripts.
 init_domtrans_script(init_t)
@@ -551,7 +552,7 @@ storage_getattr_fixed_disk_dev(initrc_t)
 storage_setattr_fixed_disk_dev(initrc_t)
 storage_setattr_removable_dev(initrc_t)
 
-term_use_all_terms(initrc_t)
+term_use_all_inherited_terms(initrc_t)
 term_reset_tty_labels(initrc_t)
 
 auth_rw_login_records(initrc_t)
@@ -586,7 +587,7 @@ userdom_read_user_home_content_files(initrc_t)
 # Allow access to the sysadm TTYs. Note that this will give access to the
 # TTYs to any process in the initrc_t domain. Therefore, daemons and such
 # started from init should be placed in their own domain.
-userdom_use_user_terminals(initrc_t)
+userdom_use_inherited_user_terminals(initrc_t)
 
 ifdef(`distro_debian',`
        dev_setattr_generic_dirs(initrc_t)
@@ -1107,11 +1108,6 @@ optional_policy(`
 optional_policy(`
        unconfined_domain(initrc_t)
        domain_role_change_exemption(initrc_t)
-       mcs_file_read_all(initrc_t)
-       mcs_file_write_all(initrc_t)
-       mcs_socket_write_all_levels(initrc_t)
-       mcs_killall(initrc_t)
-       mcs_ptrace_all(initrc_t)
 
        ifdef(`distro_redhat',`
                # system-config-services causes avc messages that should be dontaudited
index dc6114a8ba97c84af4d61b31bc9c249a99d73008..e46bddafea4276dbb0feff41ac22d3233391c9bb 100644 (file)
@@ -290,7 +290,7 @@ fs_getattr_xattr_fs(ipsec_mgmt_t)
 fs_list_tmpfs(ipsec_mgmt_t)
 
 term_use_console(ipsec_mgmt_t)
-term_use_all_terms(ipsec_mgmt_t)
+term_use_all_inherited_terms(ipsec_mgmt_t)
 
 auth_dontaudit_read_login_records(ipsec_mgmt_t)
 
@@ -310,7 +310,7 @@ sysnet_manage_config(ipsec_mgmt_t)
 sysnet_domtrans_ifconfig(ipsec_mgmt_t)
 sysnet_etc_filetrans_config(ipsec_mgmt_t)
 
-userdom_use_user_terminals(ipsec_mgmt_t)
+userdom_use_inherited_user_terminals(ipsec_mgmt_t)
 
 optional_policy(`
        consoletype_exec(ipsec_mgmt_t)
@@ -463,6 +463,6 @@ miscfiles_read_localization(setkey_t)
 
 seutil_read_config(setkey_t)
 
-userdom_use_user_terminals(setkey_t)
+userdom_use_inherited_user_terminals(setkey_t)
 userdom_read_user_tmp_files(setkey_t)
 
index 3240adf8601afa69c31a789becdd690c426ecc8f..0c4026ec96c1352d93082957ee080a57112c218b 100644 (file)
@@ -70,7 +70,7 @@ fs_list_inotifyfs(iptables_t)
 mls_file_read_all_levels(iptables_t)
 
 term_dontaudit_use_console(iptables_t)
-term_use_all_terms(iptables_t)
+term_use_all_inherited_terms(iptables_t)
 
 domain_use_interactive_fds(iptables_t)
 
@@ -94,7 +94,7 @@ miscfiles_read_localization(iptables_t)
 sysnet_domtrans_ifconfig(iptables_t)
 sysnet_dns_name_resolve(iptables_t)
 
-userdom_use_user_terminals(iptables_t)
+userdom_use_inherited_user_terminals(iptables_t)
 userdom_use_all_users_fds(iptables_t)
 
 optional_policy(`
index 99d7f60f66313f53888af205aaebb38a8e5cf359..27a8af47ef751054dd5393b2bd33e41aecee6be6 100644 (file)
@@ -96,7 +96,7 @@ miscfiles_read_localization(ldconfig_t)
 logging_send_syslog_msg(ldconfig_t)
 
 term_use_console(ldconfig_t)
-userdom_use_user_terminals(ldconfig_t)
+userdom_use_inherited_user_terminals(ldconfig_t)
 userdom_use_all_users_fds(ldconfig_t)
 
 ifdef(`distro_ubuntu',`
index 67bcfc3d584a5f4a03ebd9ebb6491e195cbc3e71..5ce2b025ba8a433e686c66fbf39230a826f20d28 100644 (file)
@@ -108,7 +108,7 @@ domain_use_interactive_fds(auditctl_t)
 
 mls_file_read_all_levels(auditctl_t)
 
-term_use_all_terms(auditctl_t)
+term_use_all_inherited_terms(auditctl_t)
 
 init_dontaudit_use_fds(auditctl_t)
 
@@ -191,7 +191,7 @@ seutil_dontaudit_read_config(auditd_t)
 
 sysnet_dns_name_resolve(auditd_t)
 
-userdom_use_user_terminals(auditd_t)
+userdom_use_inherited_user_terminals(auditd_t)
 userdom_dontaudit_use_unpriv_user_fds(auditd_t)
 userdom_dontaudit_search_user_home_dirs(auditd_t)
 
index e35b2482e7eceead2d868cc08723401b889a0a77..b4b4d27242bfc5912276fb54eca7c19fd280b5cd 100644 (file)
@@ -305,7 +305,7 @@ storage_dev_filetrans_fixed_disk(lvm_t)
 # Access raw devices and old /dev/lvm (c 109,0).  Is this needed?
 storage_manage_fixed_disk(lvm_t)
 
-term_use_all_terms(lvm_t)
+term_use_all_inherited_terms(lvm_t)
 
 init_use_fds(lvm_t)
 init_dontaudit_getattr_initctl(lvm_t)
@@ -321,7 +321,7 @@ seutil_read_file_contexts(lvm_t)
 seutil_search_default_contexts(lvm_t)
 seutil_sigchld_newrole(lvm_t)
 
-userdom_use_user_terminals(lvm_t)
+userdom_use_inherited_user_terminals(lvm_t)
 
 ifdef(`distro_redhat',`
        # this is from the initrd:
index 75e256fb36c9a9248bb0ba3dc4a7f13197076238..51e7052409e34f7ca968eb5373ce9228c8431fb9 100644 (file)
@@ -77,7 +77,7 @@ init_use_fds(depmod_t)
 init_use_script_fds(depmod_t)
 init_use_script_ptys(depmod_t)
 
-userdom_use_user_terminals(depmod_t)
+userdom_use_inherited_user_terminals(depmod_t)
 # Read System.map from home directories.
 files_list_home(depmod_t)
 userdom_read_user_home_content_files(depmod_t)
@@ -192,7 +192,7 @@ miscfiles_read_localization(insmod_t)
 
 seutil_read_file_contexts(insmod_t)
 
-term_use_all_terms(insmod_t)
+term_use_all_inherited_terms(insmod_t)
 userdom_dontaudit_search_user_home_dirs(insmod_t)
 
 if( ! secure_mode_insmod ) {
@@ -320,7 +320,7 @@ logging_send_syslog_msg(update_modules_t)
 
 miscfiles_read_localization(update_modules_t)
 
-userdom_use_user_terminals(update_modules_t)
+userdom_use_inherited_user_terminals(update_modules_t)
 userdom_dontaudit_search_user_home_dirs(update_modules_t)
 
 ifdef(`distro_gentoo',`
index 00f5ea9ace0f560594496551567006b78c106352..43f0a0b3ad008eb9ede9394ff7b40cad1b770b14 100644 (file)
@@ -172,7 +172,7 @@ storage_raw_read_removable_device(mount_t)
 storage_raw_write_removable_device(mount_t)
 storage_rw_fuse(mount_t)
 
-term_use_all_terms(mount_t)
+term_use_all_inherited_terms(mount_t)
 
 auth_use_nsswitch(mount_t)
 
@@ -379,4 +379,4 @@ miscfiles_read_localization(showmount_t)
 
 sysnet_dns_name_resolve(showmount_t)
 
-userdom_use_user_terminals(showmount_t)
+userdom_use_inherited_user_terminals(showmount_t)
index cbbda4a3e1b20a7cefd43b19795c7d48e85c27f6..81ce417634a0d0725dd624bb46341d8d6eafe4af 100644 (file)
@@ -25,4 +25,4 @@ files_read_etc_files(netlabel_mgmt_t)
 
 seutil_use_newrole_fds(netlabel_mgmt_t)
 
-userdom_use_user_terminals(netlabel_mgmt_t)
+userdom_use_inherited_user_terminals(netlabel_mgmt_t)
index a9918e052da5a774f8a794fa497c0d3a19a8c152..ebd5ed44354af6e92153ec2f288cd2948474cc86 100644 (file)
@@ -103,7 +103,7 @@ sysnet_domtrans_ifconfig(cardmgr_t)
 sysnet_etc_filetrans_config(cardmgr_t)
 sysnet_manage_config(cardmgr_t)
 
-userdom_use_user_terminals(cardmgr_t)
+userdom_use_inherited_user_terminals(cardmgr_t)
 userdom_dontaudit_use_unpriv_user_fds(cardmgr_t)
 userdom_dontaudit_search_user_home_dirs(cardmgr_t)
 
index 540a936f7caec7a8836039f50e0e7cc7e08ea57d..0aa893aa4d33d717591d0bdb455a3958ac43c861 100644 (file)
@@ -1358,7 +1358,7 @@ interface(`seutil_semanage_policy',`
        selinux_validate_context($1)
        selinux_get_enforce_mode($1)
 
-       term_use_all_terms($1)
+       term_use_all_inherited_terms($1)
 
        locallogin_use_fds($1)
 
@@ -1449,7 +1449,7 @@ selinux_compute_create_context($1)
 selinux_compute_relabel_context($1)
 selinux_compute_user_contexts($1)
 
-term_use_all_terms($1)
+term_use_all_inherited_terms($1)
 
 # this is to satisfy the assertion:
 auth_relabelto_shadow($1)
index 293555e08ee7fa77587b41523e54f53435236fd1..da97fb320086e24dd165dfe3eb817c615dfed8fd 100644 (file)
@@ -156,7 +156,7 @@ term_use_console(checkpolicy_t)
 init_use_fds(checkpolicy_t)
 init_use_script_ptys(checkpolicy_t)
 
-userdom_use_user_terminals(checkpolicy_t)
+userdom_use_inherited_user_terminals(checkpolicy_t)
 userdom_use_all_users_fds(checkpolicy_t)
 
 ifdef(`distro_ubuntu',`
@@ -199,7 +199,7 @@ miscfiles_read_localization(load_policy_t)
 
 seutil_libselinux_linked(load_policy_t)
 
-userdom_use_user_terminals(load_policy_t)
+userdom_use_inherited_user_terminals(load_policy_t)
 userdom_use_all_users_fds(load_policy_t)
 
 ifdef(`distro_ubuntu',`
@@ -426,7 +426,7 @@ miscfiles_read_localization(run_init_t)
 seutil_libselinux_linked(run_init_t)
 seutil_read_default_contexts(run_init_t)
 
-userdom_use_user_terminals(run_init_t)
+userdom_use_inherited_user_terminals(run_init_t)
 
 ifndef(`direct_sysadm_daemon',`
        ifdef(`distro_gentoo',`
index e8d03fb09dd08d27505a67bb6587c943ed884595..e372b51f1f217dfd41b70aaf76a4fa6c40253940 100644 (file)
@@ -155,7 +155,7 @@ logging_send_syslog_msg(dhcpc_t)
 miscfiles_read_generic_certs(dhcpc_t)
 miscfiles_read_localization(dhcpc_t)
 
-userdom_use_user_terminals(dhcpc_t)
+userdom_use_inherited_user_terminals(dhcpc_t)
 userdom_dontaudit_search_user_home_dirs(dhcpc_t)
 
 ifdef(`distro_redhat', `
@@ -352,7 +352,7 @@ seutil_use_runinit_fds(ifconfig_t)
 
 sysnet_dns_name_resolve(ifconfig_t)
 
-userdom_use_user_terminals(ifconfig_t)
+userdom_use_inherited_user_terminals(ifconfig_t)
 userdom_use_all_users_fds(ifconfig_t)
 
 ifdef(`distro_ubuntu',`
index 405abc608191feb1e51ae116633457107e0dd3db..4f58746a4ba5a061629d6aa82a6b3a0c1c24b08d 100644 (file)
@@ -1388,7 +1388,7 @@ template(`userdom_admin_user_template',`
        storage_raw_write_removable_device($1_t)
        storage_dontaudit_read_fixed_disk($1_t)
 
-       term_use_all_terms($1_t)
+       term_use_all_inherited_terms($1_t)
 
        auth_getattr_shadow($1_t)
        # Manage almost all files
@@ -2929,6 +2929,24 @@ interface(`userdom_use_user_ttys',`
        allow $1 user_tty_device_t:chr_file rw_term_perms;
 ')
 
+########################################
+## <summary>
+##     Read and write a inherited user domain tty.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`userdom_use_inherited_user_ttys',`
+       gen_require(`
+               type user_tty_device_t;
+       ')
+
+       allow $1 user_tty_device_t:chr_file rw_inherited_term_perms;
+')
+
 ########################################
 ## <summary>
 ##     Read and write a user domain pty.
@@ -2947,6 +2965,24 @@ interface(`userdom_use_user_ptys',`
        allow $1 user_devpts_t:chr_file rw_term_perms;
 ')
 
+########################################
+## <summary>
+##     Read and write a inherited user domain pty.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`userdom_use_inherited_user_ptys',`
+       gen_require(`
+               type user_devpts_t;
+       ')
+
+       allow $1 user_devpts_t:chr_file rw_inherited_term_perms;
+')
+
 ########################################
 ## <summary>
 ##     Read and write a user TTYs and PTYs.
@@ -2973,7 +3009,7 @@ interface(`userdom_use_user_ptys',`
 ## </param>
 ## <infoflow type="both" weight="10"/>
 #
-interface(`userdom_use_user_terminals',`
+interface(`userdom_use_inherited_user_terminals',`
        gen_require(`
                type user_tty_device_t, user_devpts_t;
        ')
@@ -2983,6 +3019,35 @@ interface(`userdom_use_user_terminals',`
        term_list_ptys($1)
 ')
 
+########################################
+## <summary>
+##     Read and write a inherited user TTYs and PTYs.
+## </summary>
+## <desc>
+##     <p>
+##     Allow the specified domain to read and write inherited user
+##     TTYs and PTYs. This will allow the domain to
+##     interact with the user via the terminal. Typically
+##     all interactive applications will require this
+##     access.
+##     </p>
+## </desc>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`userdom_use_inherited_user_terminals',`
+       gen_require(`
+               type user_tty_device_t, user_devpts_t;
+       ')
+
+       allow $1 user_tty_device_t:chr_file rw_inherited_term_perms;
+       allow $1 user_devpts_t:chr_file rw_inherited_term_perms;
+')
+
 ########################################
 ## <summary>
 ##     Do not audit attempts to read and write
index 51867f65c5f5fa2f13c1e74f7cc04a38ec4fd45c..e991e4a2444f9ad2664c69d94f4aa63f0ba795f7 100644 (file)
@@ -28,7 +28,8 @@ define(`devfile_class_set', `{ chr_file blk_file }')
 #
 # All socket classes.
 #
-define(`socket_class_set', `{ socket tcp_socket udp_socket rawip_socket netlink_socket packet_socket unix_stream_socket unix_dgram_socket appletalk_socket netlink_route_socket netlink_firewall_socket netlink_tcpdiag_socket netlink_nflog_socket netlink_xfrm_socket netlink_selinux_socket netlink_audit_socket netlink_ip6fw_socket netlink_dnrt_socket netlink_kobject_uevent_socket tun_socket }')
+define(`socket_class_set', `{ tcp_socket udp_socket rawip_socket netlink_socket packet_socket unix_stream_socket unix_dgram_socket appletalk_socket netlink_route_socket netlink_firewall_socket netlink_tcpdiag_socket netlink_nflog_socket netlink_xfrm_socket netlink_selinux_socket netlink_audit_socket netlink_ip6fw_socket netlink_dnrt_socket netlink_kobject_uevent_socket tun_socket }')
+
 
 #
 # Datagram socket classes.
@@ -104,7 +105,7 @@ define(`mount_fs_perms', `{ mount remount unmount getattr }')
 #
 # Permissions for using sockets.
 # 
-define(`rw_socket_perms', `{ ioctl read getattr lock write setattr append bind connect getopt setopt shutdown }')
+define(`rw_socket_perms', `{ ioctl read getattr write setattr append bind connect getopt setopt shutdown }')
 
 #
 # Permissions for creating and using sockets.
@@ -198,14 +199,12 @@ define(`relabel_dir_perms',`{ getattr relabelfrom relabelto }')
 #
 define(`getattr_file_perms',`{ getattr }')
 define(`setattr_file_perms',`{ setattr }')
-define(`read_inherited_file_perms',`{ getattr read ioctl lock }')
-define(`read_file_perms',`{ open read_inherited_file_perms }')
+define(`read_file_perms',`{ getattr open read lock ioctl }')
 define(`mmap_file_perms',`{ getattr open read execute ioctl }')
 define(`exec_file_perms',`{ getattr open read execute ioctl execute_no_trans }')
 define(`append_file_perms',`{ getattr open append lock ioctl }')
 define(`write_file_perms',`{ getattr open write append lock ioctl }')
-define(`rw_inherited_file_perms',`{ getattr read write append ioctl lock }')
-define(`rw_file_perms',`{ open rw_inherited_file_perms }')
+define(`rw_file_perms',`{ getattr open read write append ioctl lock }')
 define(`create_file_perms',`{ getattr create open }')
 define(`rename_file_perms',`{ getattr rename }')
 define(`delete_file_perms',`{ getattr unlink }')
@@ -226,7 +225,7 @@ define(`rw_lnk_file_perms',`{ getattr read write lock ioctl }')
 define(`create_lnk_file_perms',`{ create getattr }')
 define(`rename_lnk_file_perms',`{ getattr rename }')
 define(`delete_lnk_file_perms',`{ getattr unlink }')
-define(`manage_lnk_file_perms',`{ create getattr setattr read write append rename link unlink ioctl lock }')
+define(`manage_lnk_file_perms',`{ create read write getattr setattr link unlink rename }')
 define(`relabelfrom_lnk_file_perms',`{ getattr relabelfrom }')
 define(`relabelto_lnk_file_perms',`{ getattr relabelto }')
 define(`relabel_lnk_file_perms',`{ getattr relabelfrom relabelto }')
@@ -239,8 +238,7 @@ define(`setattr_fifo_file_perms',`{ setattr }')
 define(`read_fifo_file_perms',`{ getattr open read lock ioctl }')
 define(`append_fifo_file_perms',`{ getattr open append lock ioctl }')
 define(`write_fifo_file_perms',`{ getattr open write append lock ioctl }')
-define(`rw_inherited_fifo_file_perms',`{ getattr read write append ioctl lock }')
-define(`rw_fifo_file_perms',`{ open rw_inherited_fifo_file_perms }')
+define(`rw_fifo_file_perms',`{ getattr open read write append ioctl lock }')
 define(`create_fifo_file_perms',`{ getattr create open }')
 define(`rename_fifo_file_perms',`{ getattr rename }')
 define(`delete_fifo_file_perms',`{ getattr unlink }')
@@ -256,8 +254,7 @@ define(`getattr_sock_file_perms',`{ getattr }')
 define(`setattr_sock_file_perms',`{ setattr }')
 define(`read_sock_file_perms',`{ getattr open read }')
 define(`write_sock_file_perms',`{ getattr write open append }')
-define(`rw_inherited_sock_file_perms',`{ getattr read write append }')
-define(`rw_sock_file_perms',`{ open rw_inherited_sock_file_perms }')
+define(`rw_sock_file_perms',`{ getattr open read write append }')
 define(`create_sock_file_perms',`{ getattr create open }')
 define(`rename_sock_file_perms',`{ getattr rename }')
 define(`delete_sock_file_perms',`{ getattr unlink }')
@@ -274,8 +271,7 @@ define(`setattr_blk_file_perms',`{ setattr }')
 define(`read_blk_file_perms',`{ getattr open read lock ioctl }')
 define(`append_blk_file_perms',`{ getattr open append lock ioctl }')
 define(`write_blk_file_perms',`{ getattr open write append lock ioctl }')
-define(`rw_inherited_blk_file_perms',`{ getattr read write append ioctl lock }')
-define(`rw_blk_file_perms',`{ open rw_inherited_blk_file_perms }')
+define(`rw_blk_file_perms',`{ getattr open read write append ioctl lock }')
 define(`create_blk_file_perms',`{ getattr create }')
 define(`rename_blk_file_perms',`{ getattr rename }')
 define(`delete_blk_file_perms',`{ getattr unlink }')
@@ -292,8 +288,7 @@ define(`setattr_chr_file_perms',`{ setattr }')
 define(`read_chr_file_perms',`{ getattr open read lock ioctl }')
 define(`append_chr_file_perms',`{ getattr open append lock ioctl }')
 define(`write_chr_file_perms',`{ getattr open write append lock ioctl }')
-define(`rw_inherited_chr_file_perms',`{ getattr read write append ioctl lock }')
-define(`rw_chr_file_perms',`{ open rw_inherited_chr_file_perms }')
+define(`rw_chr_file_perms',`{ getattr open read write append ioctl lock }')
 define(`create_chr_file_perms',`{ getattr create }')
 define(`rename_chr_file_perms',`{ getattr rename }')
 define(`delete_chr_file_perms',`{ getattr unlink }')
@@ -310,8 +305,7 @@ define(`relabel_chr_file_perms',`{ getattr relabelfrom relabelto }')
 #
 # Use (read and write) terminals
 #
-define(`rw_inherited_term_perms', `{ getattr read write append ioctl }')
-define(`rw_term_perms', `{ rw_inherited_term_perms open }')
+define(`rw_term_perms', `{ getattr open read write append ioctl }')
 
 #
 # Sockets