]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy; branch 'maste...
authorDan Walsh <dwalsh@redhat.com>
Tue, 12 Oct 2010 20:44:50 +0000 (16:44 -0400)
committerDan Walsh <dwalsh@redhat.com>
Tue, 12 Oct 2010 20:44:50 +0000 (16:44 -0400)
Conflicts:
policy/support/obj_perm_sets.spt

1  2 
policy/modules/admin/consoletype.te
policy/modules/admin/su.if
policy/modules/admin/sudo.if
policy/modules/admin/sudo.te
policy/modules/kernel/devices.if
policy/modules/kernel/devices.te
policy/modules/services/dbus.if
policy/modules/services/dbus.te
policy/modules/system/init.if
policy/modules/system/init.te
policy/support/obj_perm_sets.spt

Simple merge
Simple merge
index bb95e79c43a37bd4968cd250bac1d93662dd96a0,975af1a007339de343231c0eb4cc23c5d3d85afe..30a7f389128e84232b706f21b352f7fe28bc512a
@@@ -80,10 -76,8 +80,10 @@@ template(`sudo_role_template',
        # By default, revert to the calling domain when a shell is executed.
        corecmd_shell_domtrans($1_sudo_t, $3)
        corecmd_bin_domtrans($1_sudo_t, $3)
 +      userdom_domtrans_user_home($1_sudo_t, $3)
 +      userdom_domtrans_user_tmp($1_sudo_t, $3)
        allow $3 $1_sudo_t:fd use;
-       allow $3 $1_sudo_t:fifo_file rw_file_perms;
+       allow $3 $1_sudo_t:fifo_file rw_fifo_file_perms;
        allow $3 $1_sudo_t:process signal_perms;
  
        kernel_read_kernel_sysctls($1_sudo_t)
        selinux_validate_context($1_sudo_t)
        selinux_compute_relabel_context($1_sudo_t)
  
+       term_getattr_pty_fs($1_sudo_t)
        term_relabel_all_ttys($1_sudo_t)
        term_relabel_all_ptys($1_sudo_t)
 +      term_getattr_pty_fs($1_sudo_t)
  
        auth_run_chk_passwd($1_sudo_t, $2)
        # sudo stores a token in the pam_pid directory
Simple merge
Simple merge
Simple merge
Simple merge
Simple merge
Simple merge
Simple merge
index d9b0868d613dbf01ea51d4e80583913371ee6aec,effb6c59aa5b63e0637b3fe748fdac67b44e8438..a9034444b6e0a820eb7e0ca786be5592cf5ab083
@@@ -311,8 -305,7 +311,8 @@@ define(`relabel_chr_file_perms',`{ geta
  #
  # Use (read and write) terminals
  #
- define(`rw_inherited_term_perms', `{ getattr open read write ioctl append }')
- define(`rw_term_perms', `{ open rw_inherited_term_perms }')
+ define(`rw_term_perms', `{ getattr open read write append ioctl }')
++define(`rw_inherited_term_perms', `{ rw_term_perms -open }')
  
  #
  # Sockets