]> git.ipfire.org Git - people/stevee/selinux-policy.git/log
people/stevee/selinux-policy.git
14 years agoallow sysadm_t to communicate with setroubleshoot, cleanup ordering of interfaces
Dan Walsh [Wed, 18 May 2011 12:33:38 +0000 (14:33 +0200)] 
allow sysadm_t to communicate with setroubleshoot, cleanup ordering of interfaces

14 years agofix callweaver stream connect interface
Dominick Grift [Tue, 17 May 2011 18:50:30 +0000 (20:50 +0200)] 
fix callweaver stream connect interface

14 years agomiscfiles_read_certs() has been deprecated, please use
Dominick Grift [Tue, 17 May 2011 18:44:34 +0000 (20:44 +0200)] 
miscfiles_read_certs() has been deprecated, please use
miscfiles_read_generic_certs() instead.

14 years agor_file_perms is deprecated please use read_file_perms instead.
Dominick Grift [Tue, 17 May 2011 18:42:47 +0000 (20:42 +0200)] 
r_file_perms is deprecated please use read_file_perms instead.

14 years agomiscfiles_read_certs() has been deprecated, please use
Dominick Grift [Tue, 17 May 2011 18:41:21 +0000 (20:41 +0200)] 
miscfiles_read_certs() has been deprecated, please use
miscfiles_read_generic_certs() instead.

14 years agomiscfiles_read_certs() has been deprecated, please use
Dominick Grift [Tue, 17 May 2011 18:40:03 +0000 (20:40 +0200)] 
miscfiles_read_certs() has been deprecated, please use
miscfiles_read_generic_certs() instead.

14 years agocorecmd_search_sbin() has been deprecated, please use
Dominick Grift [Tue, 17 May 2011 18:38:37 +0000 (20:38 +0200)] 
corecmd_search_sbin() has been deprecated, please use
corecmd_search_bin() instead.

14 years agor_file_perms is deprecated please use read_file_perms instead.
Dominick Grift [Tue, 17 May 2011 18:37:24 +0000 (20:37 +0200)] 
r_file_perms is deprecated please use read_file_perms instead.

14 years agoAllow logrotate to execute systemctl
Miroslav Grepl [Tue, 17 May 2011 18:08:44 +0000 (18:08 +0000)] 
Allow logrotate to execute systemctl

Conflicts:

policy/modules/admin/logrotate.te

14 years agoAllow mozilla_plugin to connect to pcscd over an unix stream socket
Miroslav Grepl [Mon, 16 May 2011 07:42:32 +0000 (07:42 +0000)] 
Allow mozilla_plugin to connect to pcscd over an unix stream socket

14 years agoAllow nsplugin_t to getattr on gpmctl
Dan Walsh [Tue, 17 May 2011 09:17:16 +0000 (11:17 +0200)] 
Allow nsplugin_t to getattr on gpmctl

14 years agoAllow colord to get the attributes of fixed disk device nodes
Miroslav Grepl [Tue, 17 May 2011 14:57:30 +0000 (14:57 +0000)] 
Allow colord to get the attributes of fixed disk device nodes

14 years agoFix dev_getattr_all_chr_files() interface
Miroslav Grepl [Tue, 17 May 2011 18:05:23 +0000 (18:05 +0000)] 
Fix dev_getattr_all_chr_files() interface

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Miroslav Grepl [Tue, 17 May 2011 18:04:17 +0000 (18:04 +0000)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

14 years agoAdd log specification for /var/log/freshclam.log
Dan Walsh [Tue, 17 May 2011 17:08:41 +0000 (19:08 +0200)] 
Add log specification for /var/log/freshclam.log
Allow nsplugin_t to getattr on gpmctl
Cleanup colord layout and add getattr on fixed disk
Dontaudit one virtdomain looking at anothers tmpfs_t (pulseaudio)

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Dan Walsh [Tue, 17 May 2011 08:59:29 +0000 (10:59 +0200)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

Conflicts:
policy/modules/system/sysnetwork.te

Add Initial Callweaver policy

14 years agoAllow shorewall to use inherited terms
Dan Walsh [Tue, 17 May 2011 08:12:54 +0000 (10:12 +0200)] 
Allow shorewall to use inherited terms

14 years agoAllow userhelper to getattr all chr_file devices
Dan Walsh [Tue, 17 May 2011 08:11:39 +0000 (10:11 +0200)] 
Allow userhelper to getattr all chr_file devices
Add transition names for sd* and sr*
Allow devicekit to use device_t file systems

14 years agosandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t
Dan Walsh [Sun, 15 May 2011 18:30:54 +0000 (20:30 +0200)] 
sandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t

14 years agosandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t
Dan Walsh [Sun, 15 May 2011 18:27:41 +0000 (20:27 +0200)] 
sandbox domains should be able to getattr and dontaudit search of sysctl_kernel_t

14 years agoAllow postfix_pickup_t to ignore mcs labels, httpd_sys_script_t needs to be able...
Dan Walsh [Sun, 15 May 2011 17:48:19 +0000 (19:48 +0200)] 
Allow postfix_pickup_t to ignore mcs labels, httpd_sys_script_t needs to be able to manage httpd_tmp_t

14 years agoThis seems to be a leak.
Dominick Grift [Fri, 13 May 2011 14:05:40 +0000 (16:05 +0200)] 
This seems to be a leak.

14 years agoOwns a sock file in its pid directory and needs to stream connect to
Dominick Grift [Fri, 13 May 2011 14:01:56 +0000 (16:01 +0200)] 
Owns a sock file in its pid directory and needs to stream connect to
self.

14 years agoReally needs "open" here.
Dominick Grift [Fri, 13 May 2011 14:00:02 +0000 (16:00 +0200)] 
Really needs "open" here.

14 years agoLabeling for ruby/gem helper scripts
Dan Walsh [Thu, 12 May 2011 14:57:28 +0000 (16:57 +0200)] 
Labeling for ruby/gem helper scripts
ifconfig dontaudit load_module

14 years agoFix labeling for ABRT Retrace Server
Miroslav Grepl [Wed, 11 May 2011 10:02:05 +0000 (10:02 +0000)] 
Fix labeling for ABRT Retrace Server

14 years agoFix typo
Miroslav Grepl [Mon, 9 May 2011 20:30:22 +0000 (20:30 +0000)] 
Fix typo

14 years agoDontaudit sys_module for ifconfig
Miroslav Grepl [Mon, 9 May 2011 20:13:52 +0000 (20:13 +0000)] 
Dontaudit sys_module for ifconfig

14 years agoMake telepathy and gkeyringd daemon working with confined users
Miroslav Grepl [Mon, 9 May 2011 20:12:26 +0000 (20:12 +0000)] 
Make telepathy and gkeyringd daemon working with confined users

14 years agoMerge branch 'remove_udev' into HEAD
Dominick Grift [Mon, 9 May 2011 18:50:18 +0000 (20:50 +0200)] 
Merge branch 'remove_udev' into HEAD

14 years agoLooks like udev and its helper apps do need to open more devices than
Dominick Grift [Mon, 9 May 2011 18:34:07 +0000 (20:34 +0200)] 
Looks like udev and its helper apps do need to open more devices than
thought.

Reverting commits:

85fcdb96e924d6ea6e0abe1de15fc18dc8fc4cf6
0abadcd6c2145d0ea45956641f905569d5d0b429

14 years agocolord wants to read files in users homedir
Dan Walsh [Mon, 9 May 2011 17:41:36 +0000 (13:41 -0400)] 
colord wants to read files in users homedir

14 years agoRemote login should be creating user_tmp_t not its own tmp files
Dan Walsh [Mon, 9 May 2011 16:27:36 +0000 (12:27 -0400)] 
Remote login should be creating user_tmp_t not its own tmp files

14 years agoAllow rlogind to r/w user terminals
Dan Walsh [Mon, 9 May 2011 16:20:45 +0000 (12:20 -0400)] 
Allow rlogind to r/w user terminals

14 years agoAllow gnomeclock_systemctl_t to list init_var_run_t
Dan Walsh [Mon, 9 May 2011 15:31:13 +0000 (11:31 -0400)] 
Allow gnomeclock_systemctl_t to list init_var_run_t

14 years agoTurn off allow_domain_fd_use boolean by default
Dan Walsh [Mon, 9 May 2011 15:20:33 +0000 (11:20 -0400)] 
Turn off allow_domain_fd_use boolean by default

14 years agoDbus domains will inherit fds from the init system
Dan Walsh [Mon, 9 May 2011 15:19:25 +0000 (11:19 -0400)] 
Dbus domains will inherit fds from the init system

14 years agoMore named filetrans devices
Dan Walsh [Fri, 6 May 2011 18:59:02 +0000 (14:59 -0400)] 
More named filetrans devices

14 years agoMore filetrans named rules
Dan Walsh [Fri, 6 May 2011 15:19:44 +0000 (11:19 -0400)] 
More filetrans named rules
Additional access needed for sandbox if you turn off ldap boolean
udev is execute udisk apps
snmp has a new /var/run/net-snmp directory
mount has a new /var/run/mount directory
confined admins need to be allowed to send audit messages since bash is trying to audit what they are doing.

14 years agoComment storage_filetrans_all_named_dev(kernel_t) line, it does not work on MLS machine
Miroslav Grepl [Thu, 5 May 2011 14:37:08 +0000 (14:37 +0000)] 
Comment storage_filetrans_all_named_dev(kernel_t) line, it does not work on MLS machine

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Miroslav Grepl [Thu, 5 May 2011 14:31:09 +0000 (14:31 +0000)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

14 years agoFix label for /usr/share/munin/plugins/munin_* plugins
Miroslav Grepl [Wed, 4 May 2011 13:32:41 +0000 (13:32 +0000)] 
Fix label for /usr/share/munin/plugins/munin_* plugins

14 years agoAdd support for zarafa-indexer
Miroslav Grepl [Wed, 4 May 2011 16:10:32 +0000 (16:10 +0000)] 
Add support for zarafa-indexer

14 years agoFix boolean description
Miroslav Grepl [Wed, 4 May 2011 16:25:00 +0000 (16:25 +0000)] 
Fix boolean description

14 years agoAllow colord to getattr on /proc/scsi/scsi
Miroslav Grepl [Thu, 5 May 2011 10:45:17 +0000 (10:45 +0000)] 
Allow colord to getattr on /proc/scsi/scsi

14 years agoAdd label for /lib/upstart/init
Miroslav Grepl [Thu, 5 May 2011 10:49:21 +0000 (10:49 +0000)] 
Add label for /lib/upstart/init

14 years agoModule version bump for mozilla tmp type patch from Sven Vermeulen.
Chris PeBenito [Wed, 4 May 2011 13:17:06 +0000 (09:17 -0400)] 
Module version bump for mozilla tmp type patch from Sven Vermeulen.

14 years agoRemove mozilla_tmp_t aliases as it is a new type and requires no compatibility aliases.
Chris PeBenito [Wed, 4 May 2011 13:16:22 +0000 (09:16 -0400)] 
Remove mozilla_tmp_t aliases as it is a new type and requires no compatibility aliases.

14 years agoRearrange mozilla tmp rules.
Chris PeBenito [Wed, 4 May 2011 13:15:28 +0000 (09:15 -0400)] 
Rearrange mozilla tmp rules.

14 years agoAllow mozilla/firefox to manage tempfiles
Sven Vermeulen [Mon, 2 May 2011 20:45:50 +0000 (22:45 +0200)] 
Allow mozilla/firefox to manage tempfiles

On Wed, Mar 23, 2011 at 09:10:37AM -0400, Christopher J. PeBenito wrote:
> >  userdom_use_user_ptys(mozilla_t)
> > +userdom_manage_user_tmp_files(mozilla_t)
> > +userdom_manage_user_tmp_sockets(mozilla_t)
>
> Do you have more info on these?  Such as what files and sockets are
> being managed?

Not anymore apparently. Been running now for quite some time without these
privileges and I get no problems with it. Retry:

Mozilla/Firefox creates temporary files for its plugin support (for instance
while viewing flc streams), like /tmp/plugtmp/plugin-crossdomain.xml.

Update policy to allow it to create its own tmp type and perform a file
transition when creating a file or directory in a tmp_t location (like
/tmp).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
14 years agoModule version bump for courier authdaemon /var/lib/courier/authdaemon dir creation.
Chris PeBenito [Wed, 4 May 2011 13:13:22 +0000 (09:13 -0400)] 
Module version bump for courier authdaemon /var/lib/courier/authdaemon dir creation.

14 years agoAllow socket creation for imapd/pop3d communication
Sven Vermeulen [Mon, 2 May 2011 20:22:13 +0000 (22:22 +0200)] 
Allow socket creation for imapd/pop3d communication

On Tue, Mar 22, 2011 at 08:44:49AM -0400, Christopher J. PeBenito wrote:
> > +manage_dirs_pattern(courier_authdaemon_t, courier_var_lib_t, courier_var_lib_t)
>
> It sounds like this should be create_dirs_pattern instead.

Indeed, create_dirs_pattern is sufficient here. Retry ;-)

During startup, authdaemon creates /var/lib/courier/authdaemon and creates a
socket for communication with courier imapd and pop3d daemons.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
14 years agoModule version bump for raid run interface.
Chris PeBenito [Wed, 4 May 2011 13:09:08 +0000 (09:09 -0400)] 
Module version bump for raid run interface.

14 years agoMove raid_run_mdadm() interface.
Chris PeBenito [Wed, 4 May 2011 13:07:54 +0000 (09:07 -0400)] 
Move raid_run_mdadm() interface.

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Dan Walsh [Tue, 3 May 2011 20:11:24 +0000 (16:11 -0400)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

Conflicts:
policy/modules/services/colord.te

14 years agoColord needs to list /mnt
Dan Walsh [Tue, 3 May 2011 20:09:33 +0000 (16:09 -0400)] 
Colord needs to list /mnt
firewalld executes bash which attempts to config the tty, dontaudit this access

14 years agoFix typo in kernel.if
Miroslav Grepl [Tue, 3 May 2011 19:50:17 +0000 (19:50 +0000)] 
Fix typo in kernel.if

14 years agoFix xserver_manage_home_fonts() interface
Miroslav Grepl [Tue, 3 May 2011 19:27:16 +0000 (19:27 +0000)] 
Fix xserver_manage_home_fonts() interface

14 years agoFix typo
Miroslav Grepl [Tue, 3 May 2011 18:56:18 +0000 (18:56 +0000)] 
Fix typo

14 years agoFix typo in xserver.te
Miroslav Grepl [Tue, 3 May 2011 18:47:17 +0000 (18:47 +0000)] 
Fix typo in xserver.te

14 years agoAllow colord signal
Miroslav Grepl [Tue, 3 May 2011 18:17:55 +0000 (18:17 +0000)] 
Allow colord signal

14 years agoprelink_cron_system_t needs to be able to detect systemd
Miroslav Grepl [Tue, 3 May 2011 17:40:35 +0000 (17:40 +0000)] 
prelink_cron_system_t needs to be able to detect systemd

14 years agoAllow cupsd_config_t to read user's symlinks in /tmp
Miroslav Grepl [Tue, 3 May 2011 15:37:11 +0000 (15:37 +0000)] 
Allow cupsd_config_t to read user's symlinks in /tmp

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Dan Walsh [Tue, 3 May 2011 15:27:50 +0000 (11:27 -0400)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

14 years agoWhitespace fixes in raid.if.
Chris PeBenito [Mon, 2 May 2011 16:55:45 +0000 (12:55 -0400)] 
Whitespace fixes in raid.if.

14 years agosystem admin needs to use mdadm, but type is not allowed
Sven Vermeulen [Thu, 28 Apr 2011 20:44:14 +0000 (16:44 -0400)] 
system admin needs to use mdadm, but type is not allowed

After a quick discussion with dominique, new attempt due to two issues:

1. No need (or even forbidden) to have "role $1 types foo_exec_t"
2. Suggestion to use the raid_run_mdadm name instead of raid_mdadm_role. The
   idea here is to use raid_mdadm_role for prefixed domains (cfr. screen)
   whereas raid_run_mdadm is to transition and run into a specific domain

Without wanting to (re?)start any discussion on prefixed versus non-prefixed
domains, such a naming convention could help us to keep the reference policy
cleaner (and naming conventions easy).

Also, refpolicy InterfaceNaming document only talks about run, not role.

So, without much further ado... ;-)

  The system administrator (sysadm_r role) needs to use mdadm, but is not
  allowed to use the mdadm_t type.

  Rather than extend raid_domtrans_mdadm to allow this as well, use a
  raid_mdadm_role (a bit more conform other role usages).

  The other users of raid_domtrans_mdadm are all domains that run in system_r
  role, which does have this type allowed (as per the system/raid.te
  definition), so it wouldn't hurt to use raid_domtrans_mdadm for this.

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
14 years agoModule version bump and changelog for Portage updates from Sven Vermeulen.
Chris PeBenito [Mon, 2 May 2011 16:46:28 +0000 (12:46 -0400)] 
Module version bump and changelog for Portage updates from Sven Vermeulen.

14 years agosetfscreate privilege is needed to be able to install java-config package
Sven Vermeulen [Thu, 28 Apr 2011 19:39:21 +0000 (15:39 -0400)] 
setfscreate privilege is needed to be able to install java-config package

During the installation of for instance java-config, Portage wants to set
its default file creation context to root:object_r:portage_tmp_t which isn't
allowed:

creating /var/tmp/portage/dev-java/java-config-2.1.11-r3/temp/images/3.1/etc/revdep-rebuild
copying src/revdep-rebuild/60-java -> /var/tmp/portage/dev-java/java-config-2.1.11-r3/temp/images/3.1/etc/revdep-rebuild/
running install_egg_info
Writing /var/tmp/portage/dev-java/java-config-2.1.11-r3/temp/images/3.1/usr/lib64/python3.1/site-packages/java_config-2.1.11-py3.1.egg-info
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
cp: failed to set default file creation context to `root:object_r:portage_tmp_t': Permission denied
...
ERROR: dev-java/java-config-2.1.11-r3 failed:
   Merging of intermediate installation image for Python ABI '2.6 into installation image failed

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
14 years agoAllow portage_sandbox_t ptrace capabilities
Sven Vermeulen [Thu, 28 Apr 2011 19:34:57 +0000 (15:34 -0400)] 
Allow portage_sandbox_t ptrace capabilities

During installation of system packages like python, ustr, ... the
portage_sandbox_t domain requires ptrace capabilities.

If not allowed, the following error is returned:

/sbin/ldconfig -n /var/tmp/portage/dev-libs/ustr-1.0.4-r1/image//usr/lib64
ISE:_do_ptrace ^[[0mptrace(PTRACE_TRACEME, ..., 0x0000000000000000, 0x0000000000000000): Permission denied
/usr/lib/libsandbox.so(+0x3812)[0x7535af0ca812]
/usr/lib/libsandbox.so(+0x38a3)[0x7535af0ca8a3]
/usr/lib/libsandbox.so(+0x5595)[0x7535af0cc595]
/usr/lib/libsandbox.so(+0x5a87)[0x7535af0cca87]
/usr/lib/libsandbox.so(+0x68de)[0x7535af0cd8de]
/usr/lib/libsandbox.so(execvp+0x6c)[0x7535af0ceb3c]
make(+0x1159e)[0x337b918159e]
make(+0x11eec)[0x337b9181eec]
make(+0x12b34)[0x337b9182b34]
make(+0x1e759)[0x337b918e759]
/proc/5977/cmdline: make -j4 install
DESTDIR=/var/tmp/portage/dev-libs/ustr-1.0.4-r1/image/ HIDE=
libdir=/usr/lib64 mandir=/usr/share/man SHRDIR=/usr/share/doc/ustr-1.0.4-r1
DOCSHRDIR=/usr/share/doc/ustr-1.0.4-r1

This seems to be during a standard "make install" of the package but part of
Portage' sandbox usage (above error for ustr, but packages like python exhibit
the same problem.)

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
14 years agoAllow portage to set file capabilities, needed for installations like for wireshark
Sven Vermeulen [Thu, 28 Apr 2011 19:30:12 +0000 (15:30 -0400)] 
Allow portage to set file capabilities, needed for installations like for wireshark

The installation of the wireshark package (and perhaps others) requires
portage setting file capabilities (through the setcap binary).

Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
14 years agoFixes for colord and vnstatd policy
Miroslav Grepl [Mon, 2 May 2011 13:40:44 +0000 (13:40 +0000)] 
Fixes for colord and vnstatd policy

Conflicts:

policy/modules/services/colord.te

14 years agoMultiple fixes to stop telepathy domains from being transitioned to from unconfined_t...
Dan Walsh [Fri, 29 Apr 2011 23:01:58 +0000 (19:01 -0400)] 
Multiple fixes to stop telepathy domains from being transitioned to from unconfined_t, also fixed gkeyringd on kde systems

14 years agoAllow telepathy domains to read nsswitch, remove permissive staff_gkeyringd_t
Dan Walsh [Fri, 29 Apr 2011 17:47:07 +0000 (13:47 -0400)] 
Allow telepathy domains to read nsswitch, remove permissive staff_gkeyringd_t

14 years agoAllow telepathy domains to call getpw
Dan Walsh [Fri, 29 Apr 2011 17:33:33 +0000 (13:33 -0400)] 
Allow telepathy domains to call getpw

14 years agoAllow telepathy domains to read/write gnome_cache files
Dan Walsh [Fri, 29 Apr 2011 17:28:15 +0000 (13:28 -0400)] 
Allow telepathy domains to read/write gnome_cache files

14 years agoPull in cgroup changes from Fedora policy, in particular to handle systemd usage.
Chris PeBenito [Fri, 29 Apr 2011 17:22:47 +0000 (13:22 -0400)] 
Pull in cgroup changes from Fedora policy, in particular to handle systemd usage.

14 years agoFix dontaudit messages to say Domain to not audit
Dan Walsh [Fri, 29 Apr 2011 14:44:13 +0000 (10:44 -0400)] 
Fix dontaudit messages to say Domain to not audit

14 years agoNetworkManager should be allowed to use /dev/rfkill
Dan Walsh [Fri, 29 Apr 2011 14:16:07 +0000 (10:16 -0400)] 
NetworkManager should be allowed to use /dev/rfkill

14 years agoForard port changes from F15 for telepathy
Dan Walsh [Fri, 29 Apr 2011 14:09:16 +0000 (10:09 -0400)] 
Forard port changes from F15 for telepathy

14 years agoFix kerberos interface name
Dan Walsh [Fri, 29 Apr 2011 13:08:11 +0000 (09:08 -0400)] 
Fix kerberos interface name
Fix xserver_filetrans_home_content
init needs mls overrides
audisp_remote appends to wtmp file

14 years agoFix xserver_filetrans_home_content() interface
Miroslav Grepl [Fri, 29 Apr 2011 13:04:37 +0000 (13:04 +0000)] 
Fix xserver_filetrans_home_content() interface

14 years agoAllow telepathy-gabble to get the attributes of all filesystems
Miroslav Grepl [Fri, 29 Apr 2011 09:16:02 +0000 (09:16 +0000)] 
Allow telepathy-gabble to get the attributes of all filesystems

14 years agoFix MLS override in unconfined.if to be mcs
Dan Walsh [Thu, 28 Apr 2011 15:09:56 +0000 (11:09 -0400)] 
Fix MLS override in unconfined.if to be mcs

14 years agoLet apps that are execing telinit to read process data
Dan Walsh [Thu, 28 Apr 2011 13:02:58 +0000 (09:02 -0400)] 
Let apps that are execing telinit to read process data

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Dan Walsh [Thu, 28 Apr 2011 12:19:28 +0000 (08:19 -0400)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

14 years agoStandardize on domain_filetrans_home_content, Add all these transitions to kernel_t...
Dan Walsh [Thu, 28 Apr 2011 12:19:10 +0000 (08:19 -0400)] 
Standardize on domain_filetrans_home_content, Add all these transitions to kernel_t to handle NFS servers labeling files correctly

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Miroslav Grepl [Wed, 27 Apr 2011 15:44:32 +0000 (15:44 +0000)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

14 years agoFix typo in mta_filetrans_named_content() interface
Miroslav Grepl [Wed, 27 Apr 2011 15:38:11 +0000 (15:38 +0000)] 
Fix typo in mta_filetrans_named_content() interface

14 years agoRemove another duplicate declaration of mta_filetrans_home_content for sysadm_t
Miroslav Grepl [Wed, 27 Apr 2011 15:17:53 +0000 (15:17 +0000)] 
Remove another duplicate declaration of mta_filetrans_home_content for sysadm_t

14 years agoFix duplicate declaration
Miroslav Grepl [Wed, 27 Apr 2011 14:58:33 +0000 (14:58 +0000)] 
Fix duplicate declaration

14 years agoFix init_system_domain() description, pointed out by Elia Pinto.
Chris PeBenito [Wed, 27 Apr 2011 14:42:47 +0000 (10:42 -0400)] 
Fix init_system_domain() description, pointed out by Elia Pinto.

14 years agoFix use_nfs_home_dirs interface in colord policy
Miroslav Grepl [Wed, 27 Apr 2011 13:09:37 +0000 (13:09 +0000)] 
Fix use_nfs_home_dirs interface in colord policy

14 years agoThese are no longer in use since Fedora runs udev helper apps in the
Dominick Grift [Wed, 27 Apr 2011 12:07:55 +0000 (14:07 +0200)] 
These are no longer in use since Fedora runs udev helper apps in the
udev_t domain and these apps need to read (and open) storage devices.

14 years agoMerge branch 'udev_helper_need_to_read_fixed_disk' into HEAD
Dominick Grift [Wed, 27 Apr 2011 11:59:07 +0000 (13:59 +0200)] 
Merge branch 'udev_helper_need_to_read_fixed_disk' into HEAD

14 years agoUdevd needs to read raw memory device. Udev-helper needs to read
Dominick Grift [Wed, 27 Apr 2011 11:57:31 +0000 (13:57 +0200)] 
Udevd needs to read raw memory device. Udev-helper needs to read
storage devices.

14 years agoMerge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy
Miroslav Grepl [Wed, 27 Apr 2011 10:08:44 +0000 (10:08 +0000)] 
Merge branch 'master' of ssh://git.fedorahosted.org/git/selinux-policy

14 years agoAdd label for /var/lock link
Miroslav Grepl [Wed, 27 Apr 2011 10:08:10 +0000 (10:08 +0000)] 
Add label for /var/lock link

14 years agoAllow init_t getcap and setcap
Miroslav Grepl [Wed, 27 Apr 2011 10:06:25 +0000 (10:06 +0000)] 
Allow init_t getcap and setcap

14 years agocolord_t needs to read ~/.local/share/icc
Dan Walsh [Tue, 26 Apr 2011 15:45:30 +0000 (11:45 -0400)] 
colord_t needs to read ~/.local/share/icc

14 years agoAllow namespace_init to use nsswitch
Dan Walsh [Tue, 26 Apr 2011 15:13:07 +0000 (11:13 -0400)] 
Allow namespace_init to use nsswitch
aisexec executes corosync