]> git.ipfire.org Git - people/stevee/selinux-policy.git/commitdiff
Merge various apps layer changes from the Fedora policy.
authorChris PeBenito <cpebenito@tresys.com>
Wed, 8 Jun 2011 17:05:34 +0000 (13:05 -0400)
committerChris PeBenito <cpebenito@tresys.com>
Wed, 8 Jun 2011 17:05:34 +0000 (13:05 -0400)
35 files changed:
policy/modules/apps/awstats.te
policy/modules/apps/calamaris.te
policy/modules/apps/cdrecord.te
policy/modules/apps/cpufreqselector.if
policy/modules/apps/cpufreqselector.te
policy/modules/apps/kdumpgui.te
policy/modules/apps/livecd.if
policy/modules/apps/livecd.te
policy/modules/apps/mozilla.if
policy/modules/apps/mozilla.te
policy/modules/apps/podsleuth.te
policy/modules/apps/pulseaudio.if
policy/modules/apps/pulseaudio.te
policy/modules/apps/qemu.if
policy/modules/apps/qemu.te
policy/modules/apps/rssh.if
policy/modules/apps/rssh.te
policy/modules/apps/sambagui.te
policy/modules/apps/screen.fc
policy/modules/apps/screen.if
policy/modules/apps/screen.te
policy/modules/apps/slocate.te
policy/modules/apps/telepathy.fc
policy/modules/apps/telepathy.if
policy/modules/apps/telepathy.te
policy/modules/apps/vmware.fc
policy/modules/apps/vmware.te
policy/modules/apps/webalizer.te
policy/modules/apps/wine.if
policy/modules/apps/wine.te
policy/modules/apps/wm.fc
policy/modules/apps/wm.if
policy/modules/apps/wm.te
policy/modules/system/userdomain.if
policy/modules/system/userdomain.te

index 1f42250363591d6525021a296090206c683691bc..427f599ebd214e917c60f5f1e2b21dc19b78fbd7 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(awstats, 1.3.0)
+policy_module(awstats, 1.3.1)
 
 ########################################
 #
@@ -70,6 +70,10 @@ optional_policy(`
        nscd_dontaudit_search_pid(awstats_t)
 ')
 
+optional_policy(`
+       squid_read_log(awstats_t)
+')
+
 ########################################
 #
 # awstats cgi script policy
index 47d81d1cc2cd0ad89526ea2f3dcf767b9cee2c5c..acaf6583f026226b79a9c5987c41cc502aea8af6 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(calamaris, 1.6.0)
+policy_module(calamaris, 1.6.1)
 
 ########################################
 #
@@ -66,8 +66,6 @@ miscfiles_read_localization(calamaris_t)
 
 userdom_dontaudit_list_user_home_dirs(calamaris_t)
 
-squid_read_log(calamaris_t)
-
 optional_policy(`
        apache_search_sys_content(calamaris_t)
 ')
@@ -79,3 +77,7 @@ optional_policy(`
 optional_policy(`
        mta_send_mail(calamaris_t)
 ')
+
+optional_policy(`
+       squid_read_log(calamaris_t)
+')
index 14038356b4de7e5e6fe0dd280cfabf5a8e37bf21..46ea44f8d59b497450e31b4b6a826ac94bbab847 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(cdrecord, 2.3.0)
+policy_module(cdrecord, 2.3.1)
 
 ########################################
 #
@@ -27,15 +27,15 @@ ubac_constrained(cdrecord_t)
 #
 
 allow cdrecord_t self:capability { ipc_lock sys_nice setuid dac_override sys_rawio };
-allow cdrecord_t self:process { getcap getsched setsched sigkill };
+allow cdrecord_t self:process { getcap getsched setrlimit setsched sigkill };
 allow cdrecord_t self:unix_dgram_socket create_socket_perms;
 allow cdrecord_t self:unix_stream_socket create_stream_socket_perms;
 
 # growisofs uses mkisofs
-corecmd_exec_bin(cdrecord_t) 
+corecmd_exec_bin(cdrecord_t)
 
 # allow searching for cdrom-drive
-dev_list_all_dev_nodes(cdrecord_t) 
+dev_list_all_dev_nodes(cdrecord_t)
 dev_read_sysfs(cdrecord_t)
 
 domain_interactive_fd(cdrecord_t)
index ed949751e030b0277155e3f397730c3925889dee..932fa532140599a61d738cd463a85499e3ba9d16 100644 (file)
@@ -1 +1,22 @@
 ## <summary>Command-line CPU frequency settings.</summary>
+
+########################################
+## <summary>
+##     Send and receive messages from
+##     cpufreq-selector over dbus.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`cpufreqselector_dbus_chat',`
+       gen_require(`
+               type cpufreqselector_t;
+               class dbus send_msg;
+       ')
+
+       allow $1 cpufreqselector_t:dbus send_msg;
+       allow cpufreqselector_t $1:dbus send_msg;
+')
index 79539d13241217d828d3fa3fef2f0cfce994b20b..37475dd8332bfdefb7f59ee95389d571763d60e9 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(cpufreqselector, 1.2.2)
+policy_module(cpufreqselector, 1.2.3)
 
 ########################################
 #
index f63c4c2d007f20df6826edaeec74d0142c13009d..2dde73ae751e1853b3d9f19bf7d4b756bb1becde 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(kdumpgui, 1.0.0)
+policy_module(kdumpgui, 1.0.1)
 
 ########################################
 #
@@ -14,6 +14,7 @@ dbus_system_domain(kdumpgui_t, kdumpgui_exec_t)
 # system-config-kdump local policy
 #
 
+allow kdumpgui_t self:capability { net_admin sys_admin sys_rawio };
 allow kdumpgui_t self:fifo_file rw_fifo_file_perms;
 allow kdumpgui_t self:netlink_kobject_uevent_socket create_socket_perms;
 
@@ -33,27 +34,32 @@ files_manage_etc_symlinks(kdumpgui_t)
 # for blkid.tab
 files_manage_etc_runtime_files(kdumpgui_t)
 files_etc_filetrans_etc_runtime(kdumpgui_t, file)
+files_read_usr_files(kdumpgui_t)
 
 storage_raw_read_fixed_disk(kdumpgui_t)
 storage_raw_write_fixed_disk(kdumpgui_t)
 
 auth_use_nsswitch(kdumpgui_t)
 
-consoletype_exec(kdumpgui_t)
-
-kdump_manage_config(kdumpgui_t)
-kdump_initrc_domtrans(kdumpgui_t)
-
 logging_send_syslog_msg(kdumpgui_t)
 
 miscfiles_read_localization(kdumpgui_t)
 
 init_dontaudit_read_all_script_files(kdumpgui_t)
 
+optional_policy(`
+       consoletype_exec(kdumpgui_t)
+')
+
 optional_policy(`
        dev_rw_lvm_control(kdumpgui_t)
 ')
 
+optional_policy(`
+       kdump_manage_config(kdumpgui_t)
+       kdump_initrc_domtrans(kdumpgui_t)
+')
+
 optional_policy(`
        policykit_dbus_chat(kdumpgui_t)
 ')
index 12b772fb33c28d34188283a8706e141bee31fae9..b2e27ec0663f40728fe853415bd524b834d487c1 100644 (file)
@@ -82,7 +82,7 @@ interface(`livecd_rw_tmp_files',`
        ')
 
        files_search_tmp($1)
-       allow $1 livecd_tmp_t:file rw_file_perms;
+       rw_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
 ')
 
 ########################################
index 49abe8e2db217662ef4e567b725c4a588555a96d..a0be4efdad8ddd5acc93f65f27d7b0dc2d3222cf 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(livecd, 1.0.0)
+policy_module(livecd, 1.0.1)
 
 ########################################
 #
index 9a6d67dc8ab77805834cbb88443b562a0dcc14ad..ec2236c4c8c903e57b40bb0a79113d1d92ef8bbf 100644 (file)
@@ -46,6 +46,7 @@ interface(`mozilla_role',`
        relabel_files_pattern($2, mozilla_home_t, mozilla_home_t)
        relabel_lnk_files_pattern($2, mozilla_home_t, mozilla_home_t)
 
+       mozilla_run_plugin(mozilla_t, $2)
        mozilla_dbus_chat($2)
 
        optional_policy(`
@@ -130,6 +131,24 @@ interface(`mozilla_dontaudit_manage_user_home_files',`
        dontaudit $1 mozilla_home_t:file manage_file_perms;
 ')
 
+########################################
+## <summary>
+##     Execute mozilla home directory content.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`mozilla_exec_user_home_files',`
+       gen_require(`
+               type mozilla_home_t;
+       ')
+
+       can_exec($1, mozilla_home_t)
+')
+
 ########################################
 ## <summary>
 ##     Execmod mozilla home directory content.
@@ -166,6 +185,51 @@ interface(`mozilla_domtrans',`
        domtrans_pattern($1, mozilla_exec_t, mozilla_t)
 ')
 
+########################################
+## <summary>
+##     Execute a domain transition to run mozilla_plugin.
+## </summary>
+## <param name="domain">
+## <summary>
+##     Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`mozilla_domtrans_plugin',`
+       gen_require(`
+               type mozilla_plugin_t, mozilla_plugin_exec_t, mozilla_plugin_tmpfs_t;
+               class dbus send_msg;
+       ')
+
+       domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t)
+       allow mozilla_plugin_t $1:process signull;
+')
+
+########################################
+## <summary>
+##     Execute mozilla_plugin in the mozilla_plugin domain, and
+##     allow the specified role the mozilla_plugin domain.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access
+##     </summary>
+## </param>
+## <param name="role">
+##     <summary>
+##     The role to be allowed the mozilla_plugin domain.
+##     </summary>
+## </param>
+#
+interface(`mozilla_run_plugin',`
+       gen_require(`
+               type mozilla_plugin_t;
+       ')
+
+       mozilla_domtrans_plugin($1)
+       role $2 types mozilla_plugin_t;
+')
+
 ########################################
 ## <summary>
 ##     Send and receive messages from
@@ -204,3 +268,39 @@ interface(`mozilla_rw_tcp_sockets',`
 
        allow $1 mozilla_t:tcp_socket rw_socket_perms;
 ')
+
+########################################
+## <summary>
+##     Read mozilla_plugin tmpfs files
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access
+##     </summary>
+## </param>
+#
+interface(`mozilla_plugin_read_tmpfs_files',`
+       gen_require(`
+               type mozilla_plugin_tmpfs_t;
+       ')
+
+       allow $1 mozilla_plugin_tmpfs_t:file read_file_perms;
+')
+
+########################################
+## <summary>
+##     Delete mozilla_plugin tmpfs files
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access
+##     </summary>
+## </param>
+#
+interface(`mozilla_plugin_delete_tmpfs_files',`
+       gen_require(`
+               type mozilla_plugin_tmpfs_t;
+       ')
+
+       allow $1 mozilla_plugin_tmpfs_t:file unlink;
+')
index fd0cb8548620b834984b152afc4d2beaa118b659..9cfa69664fd8afd451f44cc85e873b583f35be47 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(mozilla, 2.3.1)
+policy_module(mozilla, 2.3.2)
 
 ########################################
 #
@@ -7,7 +7,7 @@ policy_module(mozilla, 2.3.1)
 
 ## <desc>
 ## <p>
-## Control mozilla content access
+## Allow confined web browsers to read home directory content
 ## </p>
 ## </desc>
 gen_tunable(mozilla_read_content, false)
@@ -27,6 +27,19 @@ typealias mozilla_home_t alias { user_mozilla_home_t staff_mozilla_home_t sysadm
 typealias mozilla_home_t alias { auditadm_mozilla_home_t secadm_mozilla_home_t };
 userdom_user_home_content(mozilla_home_t)
 
+type mozilla_plugin_t;
+type mozilla_plugin_exec_t;
+application_domain(mozilla_plugin_t, mozilla_plugin_exec_t)
+role system_r types mozilla_plugin_t;
+
+type mozilla_plugin_tmp_t;
+files_tmp_file(mozilla_plugin_tmp_t)
+ubac_constrained(mozilla_plugin_tmp_t)
+
+type mozilla_plugin_tmpfs_t;
+files_tmpfs_file(mozilla_plugin_tmpfs_t)
+ubac_constrained(mozilla_plugin_tmpfs_t)
+
 type mozilla_tmp_t;
 files_tmp_file(mozilla_tmp_t)
 ubac_constrained(mozilla_tmp_t)
@@ -97,16 +110,19 @@ corenet_tcp_sendrecv_generic_node(mozilla_t)
 corenet_raw_sendrecv_generic_node(mozilla_t)
 corenet_tcp_sendrecv_http_port(mozilla_t)
 corenet_tcp_sendrecv_http_cache_port(mozilla_t)
+corenet_tcp_sendrecv_squid_port(mozilla_t)
 corenet_tcp_sendrecv_ftp_port(mozilla_t)
 corenet_tcp_sendrecv_ipp_port(mozilla_t)
 corenet_tcp_connect_http_port(mozilla_t)
 corenet_tcp_connect_http_cache_port(mozilla_t)
+corenet_tcp_connect_squid_port(mozilla_t)
 corenet_tcp_connect_ftp_port(mozilla_t)
 corenet_tcp_connect_ipp_port(mozilla_t)
 corenet_tcp_connect_generic_port(mozilla_t)
 corenet_tcp_connect_soundd_port(mozilla_t)
 corenet_sendrecv_http_client_packets(mozilla_t)
 corenet_sendrecv_http_cache_client_packets(mozilla_t)
+corenet_sendrecv_squid_client_packets(mozilla_t)
 corenet_sendrecv_ftp_client_packets(mozilla_t)
 corenet_sendrecv_ipp_client_packets(mozilla_t)
 corenet_sendrecv_generic_client_packets(mozilla_t)
@@ -204,7 +220,7 @@ tunable_policy(`mozilla_read_content',`
        userdom_read_user_home_content_files(mozilla_t)
        userdom_read_user_home_content_symlinks(mozilla_t)
 
-       ifdef(`enable_mls',`',`
+       ifndef(`enable_mls',`
                fs_search_removable(mozilla_t)
                fs_read_removable_files(mozilla_t)
                fs_read_removable_symlinks(mozilla_t)
@@ -274,3 +290,166 @@ optional_policy(`
 optional_policy(`
        thunderbird_domtrans(mozilla_t)
 ')
+
+########################################
+#
+# mozilla_plugin local policy
+#
+
+dontaudit mozilla_plugin_t self:capability { sys_ptrace };
+allow mozilla_plugin_t self:process { setsched signal_perms execmem };
+allow mozilla_plugin_t self:fifo_file manage_fifo_file_perms;
+allow mozilla_plugin_t self:unix_stream_socket { connectto create_stream_socket_perms };
+allow mozilla_plugin_t self:tcp_socket create_stream_socket_perms;
+allow mozilla_plugin_t self:udp_socket create_socket_perms;
+allow mozilla_plugin_t self:netlink_route_socket r_netlink_socket_perms;
+allow mozilla_plugin_t self:netlink_kobject_uevent_socket create_socket_perms;
+allow mozilla_plugin_t self:sem create_sem_perms;
+allow mozilla_plugin_t self:shm create_shm_perms;
+
+can_exec(mozilla_plugin_t, mozilla_home_t)
+read_files_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_home_t)
+
+manage_dirs_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
+manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
+manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
+files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file })
+userdom_user_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file })
+
+manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
+manage_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
+manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
+manage_sock_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
+fs_tmpfs_filetrans(mozilla_plugin_t, mozilla_plugin_tmpfs_t, { file lnk_file sock_file fifo_file })
+
+can_exec(mozilla_plugin_t, mozilla_exec_t)
+
+kernel_read_kernel_sysctls(mozilla_plugin_t)
+kernel_read_system_state(mozilla_plugin_t)
+kernel_read_network_state(mozilla_plugin_t)
+kernel_request_load_module(mozilla_plugin_t)
+
+corecmd_exec_bin(mozilla_plugin_t)
+corecmd_exec_shell(mozilla_plugin_t)
+
+corenet_all_recvfrom_netlabel(mozilla_plugin_t)
+corenet_all_recvfrom_unlabeled(mozilla_plugin_t)
+corenet_tcp_sendrecv_generic_if(mozilla_plugin_t)
+corenet_tcp_sendrecv_generic_node(mozilla_plugin_t)
+corenet_tcp_connect_generic_port(mozilla_plugin_t)
+corenet_tcp_connect_pulseaudio_port(mozilla_plugin_t)
+corenet_tcp_connect_http_port(mozilla_plugin_t)
+corenet_tcp_connect_http_cache_port(mozilla_plugin_t)
+corenet_tcp_connect_squid_port(mozilla_plugin_t)
+corenet_tcp_connect_ipp_port(mozilla_plugin_t)
+corenet_tcp_connect_mmcc_port(mozilla_plugin_t)
+corenet_tcp_connect_speech_port(mozilla_plugin_t)
+
+dev_read_rand(mozilla_plugin_t)
+dev_read_urand(mozilla_plugin_t)
+dev_read_video_dev(mozilla_plugin_t)
+dev_write_video_dev(mozilla_plugin_t)
+dev_read_sysfs(mozilla_plugin_t)
+dev_read_sound(mozilla_plugin_t)
+dev_write_sound(mozilla_plugin_t)
+# for nvidia driver
+dev_rw_xserver_misc(mozilla_plugin_t)
+dev_dontaudit_rw_dri(mozilla_plugin_t)
+
+domain_use_interactive_fds(mozilla_plugin_t)
+domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
+
+files_read_config_files(mozilla_plugin_t)
+files_read_usr_files(mozilla_plugin_t)
+files_list_mnt(mozilla_plugin_t)
+
+fs_getattr_all_fs(mozilla_plugin_t)
+fs_list_dos(mozilla_plugin_t)
+fs_read_dos_files(mozilla_plugin_t)
+
+application_dontaudit_signull(mozilla_plugin_t)
+
+auth_use_nsswitch(mozilla_plugin_t)
+
+logging_send_syslog_msg(mozilla_plugin_t)
+
+miscfiles_read_localization(mozilla_plugin_t)
+miscfiles_read_fonts(mozilla_plugin_t)
+miscfiles_read_generic_certs(mozilla_plugin_t)
+miscfiles_dontaudit_setattr_fonts_dirs(mozilla_plugin_t)
+miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)
+
+sysnet_dns_name_resolve(mozilla_plugin_t)
+
+term_getattr_all_ttys(mozilla_plugin_t)
+term_getattr_all_ptys(mozilla_plugin_t)
+
+userdom_rw_user_tmpfs_files(mozilla_plugin_t)
+userdom_dontaudit_use_user_terminals(mozilla_plugin_t)
+userdom_manage_user_tmp_sockets(mozilla_plugin_t)
+userdom_manage_user_tmp_dirs(mozilla_plugin_t)
+userdom_read_user_tmp_files(mozilla_plugin_t)
+userdom_read_user_tmp_symlinks(mozilla_plugin_t)
+userdom_read_user_home_content_files(mozilla_plugin_t)
+userdom_read_user_home_content_symlinks(mozilla_plugin_t)
+
+tunable_policy(`allow_execmem',`
+       allow mozilla_plugin_t self:process { execmem execstack };
+')
+
+tunable_policy(`allow_execstack',`
+       allow mozilla_plugin_t self:process { execstack };
+')
+
+tunable_policy(`use_nfs_home_dirs',`
+       fs_manage_nfs_dirs(mozilla_plugin_t)
+       fs_manage_nfs_files(mozilla_plugin_t)
+       fs_manage_nfs_symlinks(mozilla_plugin_t)
+')
+
+tunable_policy(`use_samba_home_dirs',`
+       fs_manage_cifs_dirs(mozilla_plugin_t)
+       fs_manage_cifs_files(mozilla_plugin_t)
+       fs_manage_cifs_symlinks(mozilla_plugin_t)
+')
+
+optional_policy(`
+       alsa_read_rw_config(mozilla_plugin_t)
+       alsa_read_home_files(mozilla_plugin_t)
+')
+
+optional_policy(`
+       dbus_system_bus_client(mozilla_plugin_t)
+       dbus_session_bus_client(mozilla_plugin_t)
+       dbus_read_lib_files(mozilla_plugin_t)
+')
+
+optional_policy(`
+       gnome_manage_config(mozilla_plugin_t)
+')
+
+optional_policy(`
+       java_exec(mozilla_plugin_t)
+')
+
+optional_policy(`
+       mplayer_exec(mozilla_plugin_t)
+       mplayer_read_user_home_files(mozilla_plugin_t)
+')
+
+optional_policy(`
+       pcscd_stream_connect(mozilla_plugin_t)
+')
+
+optional_policy(`
+       pulseaudio_exec(mozilla_plugin_t)
+       pulseaudio_stream_connect(mozilla_plugin_t)
+       pulseaudio_setattr_home_dir(mozilla_plugin_t)
+       pulseaudio_manage_home_files(mozilla_plugin_t)
+')
+
+optional_policy(`
+       xserver_read_xdm_pid(mozilla_plugin_t)
+       xserver_stream_connect(mozilla_plugin_t)
+       xserver_use_user_fonts(mozilla_plugin_t)
+')
index a2f612497ea6c7dbbcfeb660747a46b15c02d339..ccc15aba7394464b3f3e5e324f3e8ad5efd81a28 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(podsleuth, 1.4.0)
+policy_module(podsleuth, 1.4.1)
 
 ########################################
 #
@@ -27,7 +27,7 @@ ubac_constrained(podsleuth_tmpfs_t)
 # podsleuth local policy
 #
 allow podsleuth_t self:capability { kill dac_override sys_admin sys_rawio };
-allow podsleuth_t self:process { ptrace signal getsched execheap execmem execstack };
+allow podsleuth_t self:process { ptrace signal signull getsched execheap execmem execstack };
 allow podsleuth_t self:fifo_file rw_file_perms;
 allow podsleuth_t self:unix_stream_socket create_stream_socket_perms;
 allow podsleuth_t self:sem create_sem_perms;
@@ -73,6 +73,7 @@ miscfiles_read_localization(podsleuth_t)
 sysnet_dns_name_resolve(podsleuth_t)
 
 userdom_signal_unpriv_users(podsleuth_t)
+userdom_signull_unpriv_users(podsleuth_t)
 userdom_read_user_tmpfs_files(podsleuth_t)
 
 optional_policy(`
index 2ba7787164bb2f264caa468a0a7ef7fb69c7846b..f40c64dc49cedbb43113ba359c2a7b742d05d09e 100644 (file)
@@ -17,7 +17,7 @@
 #
 interface(`pulseaudio_role',`
        gen_require(`
-               type pulseaudio_t, pulseaudio_exec_t, print_spool_t;
+               type pulseaudio_t, pulseaudio_exec_t;
                class dbus { acquire_svc send_msg };
        ')
 
@@ -215,6 +215,7 @@ interface(`pulseaudio_read_home_files',`
 
        userdom_search_user_home_dirs($1)
        read_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
+       read_lnk_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
 ')
 
 ########################################
@@ -233,6 +234,7 @@ interface(`pulseaudio_rw_home_files',`
        ')
 
        rw_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
+       read_lnk_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
        userdom_search_user_home_dirs($1)
 ')
 
index c2d20a279d154517a94b3626ed1ad4f1b80bf4b8..d1eace5050d2993a685d6dd76f571402fd890db2 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(pulseaudio, 1.3.0)
+policy_module(pulseaudio, 1.3.1)
 
 ########################################
 #
index c1d5f50a8dbb438a480eea1e4823470e95a6121d..268d69130ac77b945c2c5b2d0cc86c50891e13bc 100644 (file)
@@ -169,6 +169,7 @@ interface(`qemu_domtrans',`
 ##     The role to allow the qemu domain.
 ##     </summary>
 ## </param>
+## <rolecap/>
 #
 interface(`qemu_run',`
        gen_require(`
@@ -177,10 +178,8 @@ interface(`qemu_run',`
 
        qemu_domtrans($1)
        role $2 types qemu_t;
-
-       optional_policy(`
-               samba_run_smb(qemu_t, $2, $3)
-       ')
+       allow qemu_t $1:process signull;
+       allow $1 qemu_t:process signull;
 ')
 
 ########################################
index 5ef2f7dde8781e20dd65335297c647eed019f61f..1813e16c0ba16ecf21708c4ed50b5bd3aafa215d 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(qemu, 1.5.0)
+policy_module(qemu, 1.5.1)
 
 ########################################
 #
@@ -21,7 +21,7 @@ gen_tunable(qemu_use_cifs, true)
 
 ## <desc>
 ## <p>
-## Allow qemu to user serial/parallel communication ports
+## Allow qemu to use serial/parallel communication ports
 ## </p>
 ## </desc>
 gen_tunable(qemu_use_comm, false)
@@ -59,10 +59,10 @@ userdom_read_user_tmpfs_files(qemu_t)
 tunable_policy(`qemu_full_network',`
        allow qemu_t self:udp_socket create_socket_perms;
 
-       corenet_udp_sendrecv_all_if(qemu_t)
-       corenet_udp_sendrecv_all_nodes(qemu_t)
+       corenet_udp_sendrecv_generic_if(qemu_t)
+       corenet_udp_sendrecv_generic_node(qemu_t)
        corenet_udp_sendrecv_all_ports(qemu_t)
-       corenet_udp_bind_all_nodes(qemu_t)
+       corenet_udp_bind_generic_node(qemu_t)
        corenet_udp_bind_all_ports(qemu_t)
        corenet_tcp_bind_all_ports(qemu_t)
        corenet_tcp_connect_all_ports(qemu_t)
@@ -90,7 +90,12 @@ tunable_policy(`qemu_use_usb',`
 ')
 
 optional_policy(`
-       samba_domtrans_smbd(qemu_t)
+       dbus_read_lib_files(qemu_t)
+')
+
+optional_policy(`
+       pulseaudio_manage_home_files(qemu_t)
+       pulseaudio_stream_connect(qemu_t)
 ')
 
 optional_policy(`
@@ -102,6 +107,11 @@ optional_policy(`
        xen_rw_image_files(qemu_t)
 ')
 
+optional_policy(`
+       xserver_read_xdm_pid(qemu_t)
+       xserver_stream_connect(qemu_t)
+')
+
 ########################################
 #
 # Unconfined qemu local policy
index 7cdac1e63a84961a000919ca1ade8c474de7506a..cb3d9737bc53db697c6c390a936a25caeb024aad 100644 (file)
@@ -45,6 +45,43 @@ interface(`rssh_spec_domtrans',`
        spec_domtrans_pattern($1, rssh_exec_t, rssh_t)
 ')
 
+########################################
+## <summary>
+##     Execute the rssh program
+##     in the caller domain.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`rssh_exec',`
+       gen_require(`
+               type rssh_exec_t;
+       ')
+
+       can_exec($1, rssh_exec_t)
+')
+
+########################################
+## <summary>
+##     Execute a domain transition to run rssh_chroot_helper.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`rssh_domtrans_chroot_helper',`
+       gen_require(`
+               type rssh_chroot_helper_t, rssh_chroot_helper_exec_t;
+       ')
+
+       domtrans_pattern($1, rssh_chroot_helper_exec_t, rssh_chroot_helper_t)
+')
+
 ########################################
 ## <summary>
 ##     Read all users rssh read-only content.
index c605046bc9dda0774cc383e9619a1213ccb7c842..951c203cf2a18ec0ac17b18fd8cf96b39f59a3d6 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(rssh, 2.0.0)
+policy_module(rssh, 2.0.1)
 
 ########################################
 #
@@ -15,6 +15,10 @@ domain_interactive_fd(rssh_t)
 ubac_constrained(rssh_t)
 role system_r types rssh_t;
 
+type rssh_chroot_helper_t;
+type rssh_chroot_helper_exec_t;
+init_system_domain(rssh_chroot_helper_t, rssh_chroot_helper_exec_t)
+
 type rssh_devpts_t;
 typealias rssh_devpts_t alias { user_rssh_devpts_t staff_rssh_devpts_t sysadm_rssh_devpts_t };
 typealias rssh_devpts_t alias { auditadm_rssh_devpts_t secadm_rssh_devpts_t };
@@ -72,9 +76,30 @@ logging_send_syslog_msg(rssh_t)
 
 miscfiles_read_localization(rssh_t)
 
+rssh_domtrans_chroot_helper(rssh_t)
+
 ssh_rw_tcp_sockets(rssh_t)
 ssh_rw_stream_sockets(rssh_t)
 
 optional_policy(`
        nis_use_ypbind(rssh_t)
 ')
+
+########################################
+#
+# rssh_chroot_helper local policy
+#
+
+allow rssh_chroot_helper_t self:capability { sys_chroot setuid };
+allow rssh_chroot_helper_t self:fifo_file rw_fifo_file_perms;
+allow rssh_chroot_helper_t self:unix_stream_socket create_stream_socket_perms;
+
+domain_use_interactive_fds(rssh_chroot_helper_t)
+
+files_read_etc_files(rssh_chroot_helper_t)
+
+auth_use_nsswitch(rssh_chroot_helper_t)
+
+logging_send_syslog_msg(rssh_chroot_helper_t)
+
+miscfiles_read_localization(rssh_chroot_helper_t)
index 9ec14787ea62341458358ccfe6d2bd5bdb45bf7a..f594e1221ed1b7ec8752971569a53ca618730743 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(sambagui, 1.0.0)
+policy_module(sambagui, 1.0.1)
 
 ########################################
 #
@@ -29,7 +29,7 @@ dev_dontaudit_read_urand(sambagui_t)
 
 files_read_etc_files(sambagui_t)
 files_search_var_lib(sambagui_t)
-files_search_usr(sambagui_t)
+files_read_usr_files(sambagui_t)
 
 auth_use_nsswitch(sambagui_t)
 
@@ -37,21 +37,25 @@ logging_send_syslog_msg(sambagui_t)
 
 miscfiles_read_localization(sambagui_t)
 
-nscd_dontaudit_search_pid(sambagui_t)
-
-# handling with samba conf files
-samba_append_log(sambagui_t)
-samba_manage_config(sambagui_t)
-samba_manage_var_files(sambagui_t)
-samba_read_secrets(sambagui_t)
-samba_initrc_domtrans(sambagui_t)
-samba_domtrans_smbd(sambagui_t)
-samba_domtrans_nmbd(sambagui_t)
-
 optional_policy(`
        consoletype_exec(sambagui_t)
 ')
 
+optional_policy(`
+       nscd_dontaudit_search_pid(sambagui_t)
+')
+
 optional_policy(`
        policykit_dbus_chat(sambagui_t)
 ')
+
+optional_policy(`
+       # handling with samba conf files
+       samba_append_log(sambagui_t)
+       samba_manage_config(sambagui_t)
+       samba_manage_var_files(sambagui_t)
+       samba_read_secrets(sambagui_t)
+       samba_initrc_domtrans(sambagui_t)
+       samba_domtrans_smbd(sambagui_t)
+       samba_domtrans_nmbd(sambagui_t)
+')
index 1f2cde4b223005def5bdcafd076e876cda2917de..c8254dd872a7754ad061cf471c24809b1fa8a7b4 100644 (file)
@@ -1,6 +1,7 @@
 #
 # /home
 #
+HOME_DIR/\.screen(/.*)?                        gen_context(system_u:object_r:screen_home_t,s0)
 HOME_DIR/\.screenrc            --      gen_context(system_u:object_r:screen_home_t,s0)
 
 #
index 320df265e1a4d8394e2787102b832b298b7b774f..a57e81e147214463752da9f54c6f3caf93d74bfe 100644 (file)
@@ -50,7 +50,7 @@ template(`screen_role_template',`
        allow $1_screen_t self:udp_socket create_socket_perms;
        # Internal screen networking
        allow $1_screen_t self:fd use;
-       allow $1_screen_t self:unix_stream_socket create_socket_perms;
+       allow $1_screen_t self:unix_stream_socket { create_socket_perms connectto };
        allow $1_screen_t self:unix_dgram_socket create_socket_perms;
 
        manage_dirs_pattern($1_screen_t, screen_tmp_t, screen_tmp_t)
@@ -61,9 +61,13 @@ template(`screen_role_template',`
        # Create fifo
        manage_fifo_files_pattern($1_screen_t, screen_var_run_t, screen_var_run_t)
        manage_dirs_pattern($1_screen_t, screen_var_run_t, screen_var_run_t)
+       manage_sock_files_pattern($1_screen_t, screen_var_run_t, screen_var_run_t)
        files_pid_filetrans($1_screen_t, screen_var_run_t, dir)
 
        allow $1_screen_t screen_home_t:dir list_dir_perms;
+       manage_dirs_pattern($1_screen_t, screen_home_t, screen_home_t)
+       manage_fifo_files_pattern($1_screen_t, screen_home_t, screen_home_t)
+       userdom_user_home_dir_filetrans($1_screen_t, screen_home_t, dir)
        read_files_pattern($1_screen_t, screen_home_t, screen_home_t)
        read_lnk_files_pattern($1_screen_t, screen_home_t, screen_home_t)
 
@@ -71,8 +75,10 @@ template(`screen_role_template',`
 
        domtrans_pattern($3, screen_exec_t, $1_screen_t)
        allow $3 $1_screen_t:process { signal sigchld };
+       dontaudit $3 $1_screen_t:unix_stream_socket { read write };
        allow $1_screen_t $3:process signal;
 
+       manage_fifo_files_pattern($3, screen_home_t, screen_home_t)
        manage_dirs_pattern($3, screen_home_t, screen_home_t)
        manage_files_pattern($3, screen_home_t, screen_home_t)
        manage_lnk_files_pattern($3, screen_home_t, screen_home_t)
index 8c65cc66b24bb0cc9e6fc42e66b9cc5a7c7d12f2..553bc7338afb918795194871ecdd8be3fcdf7c91 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(screen, 2.3.0)
+policy_module(screen, 2.3.1)
 
 ########################################
 #
index e43c380b4e36fa6cfaa4900a2814ab5b1c393b80..e6d13225a11bde4eb297791bffe7708bca3a8469 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(slocate, 1.10.0)
+policy_module(slocate, 1.10.1)
 
 #################################
 #
@@ -38,6 +38,7 @@ dev_getattr_all_blk_files(locate_t)
 dev_getattr_all_chr_files(locate_t)
 
 files_list_all(locate_t)
+files_dontaudit_read_all_symlinks(locate_t)
 files_getattr_all_files(locate_t)
 files_getattr_all_pipes(locate_t)
 files_getattr_all_sockets(locate_t)
index 90d238e8aea20275d01bf13056269bcf49c40a4a..b07ee1968862503ed00948d6a731c1bf84472e18 100644 (file)
@@ -1,14 +1,17 @@
 HOME_DIR/\.cache/\.mc_connections      --      gen_context(system_u:object_r:telepathy_mission_control_cache_home_t, s0)
+HOME_DIR/\.cache/telepathy/logger/sqlite-data-journal -- gen_context(system_u:object_r:telepathy_logger_cache_home_t,s0)
 HOME_DIR/\.cache/telepathy/gabble(/.*)?                gen_context(system_u:object_r:telepathy_gabble_cache_home_t, s0)
 HOME_DIR/\.cache/wocky(/.*)?                   gen_context(system_u:object_r:telepathy_gabble_cache_home_t, s0)
 HOME_DIR/\.mission-control(/.*)?               gen_context(system_u:object_r:telepathy_mission_control_home_t, s0)
 HOME_DIR/\.telepathy-sunshine(/.*)?            gen_context(system_u:object_r:telepathy_sunshine_home_t, s0)
+HOME_DIR/\.local/share/TpLogger(/.*)?          gen_context(system_u:object_r:telepathy_logger_data_home_t,s0)
 
 /usr/libexec/mission-control-5         --      gen_context(system_u:object_r:telepathy_mission_control_exec_t, s0)
 /usr/libexec/telepathy-butterfly       --      gen_context(system_u:object_r:telepathy_msn_exec_t, s0)
 /usr/libexec/telepathy-gabble          --      gen_context(system_u:object_r:telepathy_gabble_exec_t, s0)
 /usr/libexec/telepathy-haze            --      gen_context(system_u:object_r:telepathy_msn_exec_t, s0)
 /usr/libexec/telepathy-idle            --      gen_context(system_u:object_r:telepathy_idle_exec_t, s0)
+/usr/libexec/telepathy-logger          --      gen_context(system_u:object_r:telepathy_logger_exec_t,s0)
 /usr/libexec/telepathy-salut           --      gen_context(system_u:object_r:telepathy_salut_exec_t, s0)
 /usr/libexec/telepathy-sofiasip                --      gen_context(system_u:object_r:telepathy_sofiasip_exec_t, s0)
 /usr/libexec/telepathy-stream-engine   --      gen_context(system_u:object_r:telepathy_stream_engine_exec_t, s0)
index caba58a2b10a976c529fb7d798f05c48d6ec3a83..3cfb12804b47a70bb6cda9bd94775d8346c13da9 100644 (file)
@@ -52,8 +52,9 @@ template(`telepathy_role', `
                type telepathy_mission_control_t, telepathy_salut_t, telepathy_sunshine_t;
                type telepathy_stream_engine_t, telepathy_msn_t, telepathy_gabble_exec_t;
                type telepathy_sofiasip_exec_t, telepathy_idle_exec_t;
+               type telepathy_logger_t, telepathy_logger_exec_t;
                type telepathy_mission_control_exec_t, telepathy_salut_exec_t;
-               type telepathy_sunshine_exec_t,telepathy_stream_engine_exec_t;
+               type telepathy_sunshine_exec_t, telepathy_stream_engine_exec_t;
                type telepathy_msn_exec_t;
        ')
 
@@ -69,6 +70,7 @@ template(`telepathy_role', `
        dbus_session_domain($3, telepathy_gabble_exec_t, telepathy_gabble_t)
        dbus_session_domain($3, telepathy_sofiasip_exec_t, telepathy_sofiasip_t)
        dbus_session_domain($3, telepathy_idle_exec_t, telepathy_idle_t)
+       dbus_session_domain($3, telepathy_logger_exec_t, telepathy_logger_t)
        dbus_session_domain($3, telepathy_mission_control_exec_t, telepathy_mission_control_t)
        dbus_session_domain($3, telepathy_salut_exec_t, telepathy_salut_t)
        dbus_session_domain($3, telepathy_sunshine_exec_t, telepathy_sunshine_t)
index d27b92758b0d4e4242f6d0334abfbdfe4af69173..2533ea0632acf782190225cf63cd600af29f4fe5 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(telepathy, 1.0.0)
+policy_module(telepathy, 1.0.1)
 
 ########################################
 #
@@ -30,6 +30,14 @@ type telepathy_gabble_cache_home_t;
 userdom_user_home_content(telepathy_gabble_cache_home_t)
 
 telepathy_domain_template(idle)
+telepathy_domain_template(logger)
+
+type telepathy_logger_cache_home_t;
+userdom_user_home_content(telepathy_logger_cache_home_t)
+
+type telepathy_logger_data_home_t;
+userdom_user_home_content(telepathy_logger_data_home_t)
+
 telepathy_domain_template(mission_control)
 
 type telepathy_mission_control_home_t;
@@ -132,6 +140,34 @@ tunable_policy(`telepathy_tcp_connect_generic_network_ports',`
        corenet_sendrecv_generic_client_packets(telepathy_idle_t)
 ')
 
+#######################################
+#
+# Telepathy Logger local policy.
+#
+
+allow telepathy_logger_t self:unix_stream_socket create_socket_perms;
+
+manage_files_pattern(telepathy_logger_t, telepathy_logger_cache_home_t, telepathy_logger_cache_home_t)
+
+manage_dirs_pattern(telepathy_logger_t, telepathy_logger_data_home_t, telepathy_logger_data_home_t)
+manage_files_pattern(telepathy_logger_t, telepathy_logger_data_home_t, telepathy_logger_data_home_t)
+
+files_read_etc_files(telepathy_logger_t)
+files_read_usr_files(telepathy_logger_t)
+files_search_pids(telepathy_logger_t)
+
+fs_getattr_all_fs(telepathy_logger_t)
+
+tunable_policy(`use_nfs_home_dirs',`
+       fs_manage_nfs_dirs(telepathy_logger_t)
+       fs_manage_nfs_files(telepathy_logger_t)
+')
+
+tunable_policy(`use_samba_home_dirs',`
+       fs_manage_cifs_dirs(telepathy_logger_t)
+       fs_manage_cifs_files(telepathy_logger_t)
+')
+
 #######################################
 #
 # Telepathy Mission-Control local policy.
index 5872ea208f75a01d992a37d1229e6ed63d370712..f647c7e181de8a5f7d4b1b74164581afb7cd1c6a 100644 (file)
@@ -67,4 +67,5 @@ ifdef(`distro_gentoo',`
 /var/log/vnetlib.*             --      gen_context(system_u:object_r:vmware_log_t,s0)
 
 /var/run/vmnat.*               -s      gen_context(system_u:object_r:vmware_var_run_t,s0)
+/var/run/vmnet.*                       gen_context(system_u:object_r:vmware_var_run_t,s0)
 /var/run/vmware.*                      gen_context(system_u:object_r:vmware_var_run_t,s0)
index c76ceb29cd550f726dc5ff5cb496dd855f77518c..23066a1a44015d5669aba1a69657dee97533c233 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(vmware, 2.3.0)
+policy_module(vmware, 2.3.1)
 
 ########################################
 #
@@ -95,7 +95,7 @@ manage_files_pattern(vmware_host_t, vmware_var_run_t, vmware_var_run_t)
 manage_sock_files_pattern(vmware_host_t, vmware_var_run_t, vmware_var_run_t)
 files_pid_filetrans(vmware_host_t, vmware_var_run_t, { file sock_file })
 
-manage_files_pattern(vmware_host_t, vmware_log_t, vmware_log_t)        
+manage_files_pattern(vmware_host_t, vmware_log_t, vmware_log_t)
 logging_log_filetrans(vmware_host_t, vmware_log_t, { file dir })
 
 kernel_read_kernel_sysctls(vmware_host_t)
@@ -133,6 +133,7 @@ domain_dontaudit_read_all_domains_state(vmware_host_t)
 files_list_tmp(vmware_host_t)
 files_read_etc_files(vmware_host_t)
 files_read_etc_runtime_files(vmware_host_t)
+files_read_usr_files(vmware_host_t)
 
 fs_getattr_all_fs(vmware_host_t)
 fs_search_auto_mountpoints(vmware_host_t)
@@ -151,6 +152,7 @@ logging_send_syslog_msg(vmware_host_t)
 miscfiles_read_localization(vmware_host_t)
 
 sysnet_dns_name_resolve(vmware_host_t)
+sysnet_domtrans_ifconfig(vmware_host_t)
 
 userdom_dontaudit_use_unpriv_user_fds(vmware_host_t)
 userdom_dontaudit_search_user_home_dirs(vmware_host_t)
@@ -158,29 +160,32 @@ userdom_dontaudit_search_user_home_dirs(vmware_host_t)
 netutils_domtrans_ping(vmware_host_t)
 
 optional_policy(`
-       seutil_sigchld_newrole(vmware_host_t)
+       hostname_exec(vmware_host_t)
+')
 
+optional_policy(`
+       modutils_domtrans_insmod(vmware_host_t)
 ')
 
 optional_policy(`
-       udev_read_db(vmware_host_t)
+       samba_read_config(vmware_host_t)
 ')
 
 optional_policy(`
-       xserver_read_tmp_files(vmware_host_t)
-       xserver_read_xdm_pid(vmware_host_t)
+       seutil_sigchld_newrole(vmware_host_t)
 ')
 
-ifdef(`TODO',`
-# VMWare need access to pcmcia devices for network
 optional_policy(`
-allow kernel_t cardmgr_var_lib_t:dir { getattr search };
-allow kernel_t cardmgr_var_lib_t:file { getattr ioctl read };
+       shutdown_domtrans(vmware_host_t)
 ')
-# Vmware create network devices
-allow kernel_t self:capability net_admin;
-allow kernel_t self:netlink_route_socket { bind create getattr nlmsg_read nlmsg_write read write };
-allow kernel_t self:socket create;
+
+optional_policy(`
+       udev_read_db(vmware_host_t)
+')
+
+optional_policy(`
+       xserver_read_tmp_files(vmware_host_t)
+       xserver_read_xdm_pid(vmware_host_t)
 ')
 
 ##############################
index f79314b9c414c09847fd33a52df0e7109dbc4f83..b11941af6546e89ff3f64909baa4ab269851eddc 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(webalizer, 1.10.0)
+policy_module(webalizer, 1.10.1)
 
 ########################################
 #
@@ -103,3 +103,7 @@ optional_policy(`
 optional_policy(`
        nscd_socket_use(webalizer_t)
 ')
+
+optional_policy(`
+       squid_read_log(webalizer_t)
+')
index 0440b4cb84161efba2d46f4bb79e363a972f9e9a..f9a73d040377818f0c348015fad5507d807d59e6 100644 (file)
@@ -157,3 +157,22 @@ interface(`wine_run',`
        wine_domtrans($1)
        role $2 types wine_t;
 ')
+
+########################################
+## <summary>
+##     Read and write wine Shared
+##     memory segments.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`wine_rw_shm',`
+       gen_require(`
+               type wine_t;
+       ')
+
+       allow $1 wine_t:shm rw_shm_perms;
+')
index 953cb28f53376debb6f17eccbd21eaaaf9524541..be9246b0b26df9ba6c4bc76d0af32c841885bb94 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(wine, 1.8.0)
+policy_module(wine, 1.8.1)
 
 ########################################
 #
@@ -51,7 +51,11 @@ optional_policy(`
 ')
 
 optional_policy(`
-       unconfined_domain_noaudit(wine_t)
+       policykit_dbus_chat(wine_t)
+')
+
+optional_policy(`
+       unconfined_domain(wine_t)
 ')
 
 optional_policy(`
index be30d554394187355825b199ad7856afdca23d77..c1d10a11b0661187c6d2e4bd8d87bcbd096864ca 100644 (file)
@@ -1,3 +1,4 @@
-/usr/bin/twm           --      gen_context(system_u:object_r:wm_exec_t,s0)
+/usr/bin/gnome-shell   --      gen_context(system_u:object_r:wm_exec_t,s0)
 /usr/bin/openbox       --      gen_context(system_u:object_r:wm_exec_t,s0)
 /usr/bin/metacity      --      gen_context(system_u:object_r:wm_exec_t,s0)
+/usr/bin/twm           --      gen_context(system_u:object_r:wm_exec_t,s0)
index 82842a098bbb785c713966a49904c74dfda6bd35..b3efef7b54f0dfcb4fdc7a57301cd820e93d30e6 100644 (file)
@@ -44,7 +44,7 @@ template(`wm_role_template',`
 
        allow $1_wm_t $3:unix_stream_socket connectto;
        allow $3 $1_wm_t:unix_stream_socket connectto;
-       allow $3 $1_wm_t:process { signal sigchld };
+       allow $3 $1_wm_t:process { signal sigchld signull };
        allow $1_wm_t $3:process { signull sigkill };
 
        allow $1_wm_t $3:dbus send_msg;
@@ -72,6 +72,8 @@ template(`wm_role_template',`
 
        auth_use_nsswitch($1_wm_t)
 
+       application_signull($1_wm_t)
+
        miscfiles_read_fonts($1_wm_t)
        miscfiles_read_localization($1_wm_t)
 
index 66995de81b54097956eca98c3b7f05c76553cfdf..03cd479fc2848a2c3e9b63bd3e7c44ca872e6297 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(wm, 1.1.0)
+policy_module(wm, 1.1.1)
 
 ########################################
 #
index e14540bab6f065503d9d7215cba46b98270f170b..4b2878a60ac3cd3c8ae4c21e784a16fbad144c0a 100644 (file)
@@ -2875,6 +2875,24 @@ interface(`userdom_search_user_home_content',`
        allow $1 { user_home_dir_t user_home_t }:dir search_dir_perms;
 ')
 
+########################################
+## <summary>
+##     Send signull to unprivileged user domains.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`userdom_signull_unpriv_users',`
+       gen_require(`
+               attribute unpriv_userdomain;
+       ')
+
+       allow $1 unpriv_userdomain:process signull;
+')
+
 ########################################
 ## <summary>
 ##     Send general signals to unprivileged user domains.
index 6f99b7c2ff00381fa1a76c87edac7c12ae66dd0e..9b4a930dc748121a8a01dd723ee3de13daab56bf 100644 (file)
@@ -1,4 +1,4 @@
-policy_module(userdomain, 4.5.1)
+policy_module(userdomain, 4.5.2)
 
 ########################################
 #