rpms/selinux-policy/devel policy-20070219.patch, 1.51, 1.52 selinux-policy.spec, 1.436, 1.437

fedora-cvs-commits at redhat.com fedora-cvs-commits at redhat.com
Wed Apr 18 20:50:09 UTC 2007


Author: dwalsh

Update of /cvs/dist/rpms/selinux-policy/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv10646

Modified Files:
	policy-20070219.patch selinux-policy.spec 
Log Message:
* Wed Apr 18 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-7
- Fixes for alsactl and pppd_t


policy-20070219.patch:
 Rules.modular                           |   12 +
 policy/flask/access_vectors             |    4 
 policy/global_booleans                  |    2 
 policy/global_tunables                  |    7 
 policy/mls                              |   31 ++-
 policy/modules/admin/acct.te            |    1 
 policy/modules/admin/alsa.fc            |    1 
 policy/modules/admin/amtu.fc            |    3 
 policy/modules/admin/amtu.if            |   53 ++++++
 policy/modules/admin/amtu.te            |   56 ++++++
 policy/modules/admin/bootloader.te      |    3 
 policy/modules/admin/consoletype.te     |   10 -
 policy/modules/admin/dmesg.te           |    1 
 policy/modules/admin/kudzu.te           |    6 
 policy/modules/admin/logwatch.te        |    4 
 policy/modules/admin/netutils.te        |    6 
 policy/modules/admin/rpm.fc             |    3 
 policy/modules/admin/rpm.if             |   85 +++++++---
 policy/modules/admin/rpm.te             |    2 
 policy/modules/admin/su.if              |    4 
 policy/modules/admin/usermanage.if      |    2 
 policy/modules/admin/usermanage.te      |   26 +++
 policy/modules/apps/gnome.if            |   26 ++-
 policy/modules/apps/gpg.fc              |    2 
 policy/modules/apps/loadkeys.if         |   44 +----
 policy/modules/apps/mozilla.if          |    1 
 policy/modules/apps/slocate.te          |    5 
 policy/modules/apps/uml.if              |   27 ---
 policy/modules/kernel/corecommands.fc   |    5 
 policy/modules/kernel/corecommands.if   |   20 ++
 policy/modules/kernel/corenetwork.te.in |   15 +
 policy/modules/kernel/devices.if        |   36 ++++
 policy/modules/kernel/domain.if         |   18 ++
 policy/modules/kernel/domain.te         |   46 +++++
 policy/modules/kernel/files.fc          |    1 
 policy/modules/kernel/files.if          |   83 ++++++++-
 policy/modules/kernel/filesystem.if     |   39 ++++
 policy/modules/kernel/filesystem.te     |   13 +
 policy/modules/kernel/kernel.if         |   42 ++++
 policy/modules/kernel/kernel.te         |    2 
 policy/modules/kernel/mls.if            |   20 ++
 policy/modules/kernel/mls.te            |    3 
 policy/modules/kernel/selinux.if        |   38 ++++
 policy/modules/kernel/storage.if        |    2 
 policy/modules/kernel/terminal.if       |    2 
 policy/modules/kernel/terminal.te       |    1 
 policy/modules/services/amavis.te       |    3 
 policy/modules/services/apache.fc       |   14 -
 policy/modules/services/apache.if       |  171 +++++++++++++++++++-
 policy/modules/services/apache.te       |   72 ++++++++
 policy/modules/services/apcupsd.fc      |    9 +
 policy/modules/services/apcupsd.if      |  108 ++++++++++++
 policy/modules/services/apcupsd.te      |   91 ++++++++++
 policy/modules/services/automount.te    |    2 
 policy/modules/services/avahi.if        |   19 ++
 policy/modules/services/avahi.te        |    4 
 policy/modules/services/bluetooth.te    |    2 
 policy/modules/services/consolekit.te   |   31 ++-
 policy/modules/services/cron.fc         |    1 
 policy/modules/services/cron.if         |   33 +--
 policy/modules/services/cron.te         |   43 ++++-
 policy/modules/services/cups.te         |    6 
 policy/modules/services/cvs.te          |    1 
 policy/modules/services/cyrus.te        |    1 
 policy/modules/services/dbus.if         |   63 +++++++
 policy/modules/services/dhcp.te         |    2 
 policy/modules/services/djbdns.te       |    5 
 policy/modules/services/dovecot.te      |    5 
 policy/modules/services/ftp.te          |    5 
 policy/modules/services/hal.fc          |    8 
 policy/modules/services/hal.if          |   39 ++++
 policy/modules/services/hal.te          |  145 ++++++++++++++++-
 policy/modules/services/inetd.te        |    5 
 policy/modules/services/kerberos.if     |   79 ++-------
 policy/modules/services/kerberos.te     |   36 ++++
 policy/modules/services/mailman.if      |   19 ++
 policy/modules/services/mta.if          |   19 ++
 policy/modules/services/mta.te          |    2 
 policy/modules/services/nis.if          |    4 
 policy/modules/services/nis.te          |    4 
 policy/modules/services/nscd.te         |   10 +
 policy/modules/services/ntp.te          |    4 
 policy/modules/services/pegasus.if      |   18 ++
 policy/modules/services/pegasus.te      |    6 
 policy/modules/services/postfix.if      |    1 
 policy/modules/services/postfix.te      |    8 
 policy/modules/services/ppp.te          |    2 
 policy/modules/services/procmail.te     |    1 
 policy/modules/services/pyzor.te        |    7 
 policy/modules/services/radius.te       |    4 
 policy/modules/services/rpc.if          |    5 
 policy/modules/services/rsync.te        |    1 
 policy/modules/services/rwho.fc         |    3 
 policy/modules/services/rwho.if         |   84 +++++++++
 policy/modules/services/rwho.te         |   65 +++++++
 policy/modules/services/samba.fc        |    3 
 policy/modules/services/samba.if        |   86 ++++++++++
 policy/modules/services/samba.te        |   85 +++++++++-
 policy/modules/services/sendmail.if     |   22 ++
 policy/modules/services/smartmon.te     |    1 
 policy/modules/services/snmp.te         |   15 +
 policy/modules/services/spamassassin.te |    7 
 policy/modules/services/squid.fc        |    2 
 policy/modules/services/squid.if        |   22 ++
 policy/modules/services/squid.te        |   12 +
 policy/modules/services/ssh.if          |   39 ++++
 policy/modules/services/ssh.te          |   10 -
 policy/modules/services/w3c.fc          |    2 
 policy/modules/services/w3c.if          |    1 
 policy/modules/services/w3c.te          |   14 +
 policy/modules/system/application.fc    |    1 
 policy/modules/system/application.if    |  104 ++++++++++++
 policy/modules/system/application.te    |   14 +
 policy/modules/system/authlogin.if      |   83 ++++++++-
 policy/modules/system/authlogin.te      |    3 
 policy/modules/system/fstools.fc        |    1 
 policy/modules/system/fstools.te        |    1 
 policy/modules/system/fusermount.fc     |    6 
 policy/modules/system/fusermount.if     |   41 ++++
 policy/modules/system/fusermount.te     |   45 +++++
 policy/modules/system/getty.te          |    3 
 policy/modules/system/hostname.te       |   14 +
 policy/modules/system/init.if           |   42 ++++
 policy/modules/system/init.te           |   35 +++-
 policy/modules/system/ipsec.if          |   20 ++
 policy/modules/system/ipsec.te          |    3 
 policy/modules/system/iptables.te       |    4 
 policy/modules/system/libraries.fc      |    3 
 policy/modules/system/libraries.te      |    4 
 policy/modules/system/locallogin.te     |    7 
 policy/modules/system/logging.if        |   21 ++
 policy/modules/system/logging.te        |    2 
 policy/modules/system/lvm.te            |    6 
 policy/modules/system/modutils.te       |    7 
 policy/modules/system/mount.fc          |    3 
 policy/modules/system/mount.if          |   37 ++++
 policy/modules/system/mount.te          |   64 +++++++
 policy/modules/system/raid.te           |    1 
 policy/modules/system/selinuxutil.fc    |    1 
 policy/modules/system/selinuxutil.if    |    5 
 policy/modules/system/selinuxutil.te    |   59 +++----
 policy/modules/system/setrans.if        |    1 
 policy/modules/system/sysnetwork.te     |    3 
 policy/modules/system/udev.te           |   12 +
 policy/modules/system/unconfined.fc     |    1 
 policy/modules/system/unconfined.if     |   10 -
 policy/modules/system/unconfined.te     |   24 ++
 policy/modules/system/userdomain.if     |  269 +++++++++++++++++++-------------
 policy/modules/system/userdomain.te     |   46 ++++-
 policy/modules/system/xen.te            |   35 ++++
 policy/support/obj_perm_sets.spt        |   12 +
 151 files changed, 3017 insertions(+), 440 deletions(-)

Index: policy-20070219.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/policy-20070219.patch,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -r1.51 -r1.52
--- policy-20070219.patch	18 Apr 2007 20:45:20 -0000	1.51
+++ policy-20070219.patch	18 Apr 2007 20:50:02 -0000	1.52
@@ -144,6 +144,15 @@
  
  type acct_data_t;
  logging_log_file(acct_data_t)
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/alsa.fc serefpolicy-2.5.12/policy/modules/admin/alsa.fc
+--- nsaserefpolicy/policy/modules/admin/alsa.fc	2006-11-16 17:15:26.000000000 -0500
++++ serefpolicy-2.5.12/policy/modules/admin/alsa.fc	2007-04-18 16:47:23.000000000 -0400
+@@ -1,4 +1,5 @@
+ 
+ /etc/alsa/pcm(/.*)?		gen_context(system_u:object_r:alsa_etc_rw_t,s0)
++/etc/asound(/.*)?		gen_context(system_u:object_r:alsa_etc_rw_t,s0)
+ 
+ /usr/bin/ainit 		--	gen_context(system_u:object_r:alsa_exec_t,s0)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/admin/amtu.fc serefpolicy-2.5.12/policy/modules/admin/amtu.fc
 --- nsaserefpolicy/policy/modules/admin/amtu.fc	1969-12-31 19:00:00.000000000 -0500
 +++ serefpolicy-2.5.12/policy/modules/admin/amtu.fc	2007-04-11 17:07:34.000000000 -0400
@@ -2858,7 +2867,7 @@
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/hal.te serefpolicy-2.5.12/policy/modules/services/hal.te
 --- nsaserefpolicy/policy/modules/services/hal.te	2007-03-20 23:38:00.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/services/hal.te	2007-04-13 11:13:52.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/services/hal.te	2007-04-18 16:48:38.000000000 -0400
 @@ -16,9 +16,33 @@
  type hald_var_run_t;
  files_pid_file(hald_var_run_t)
@@ -2902,7 +2911,16 @@
  allow hald_t self:process signal_perms;
  allow hald_t self:fifo_file rw_fifo_file_perms;
  allow hald_t self:unix_stream_socket { create_stream_socket_perms connectto };
-@@ -48,14 +72,20 @@
+@@ -39,6 +63,8 @@
+ 
+ send_audit_msgs_pattern(hald_t)
+ 
++alsa_read_rw_config(hald_t)
++
+ manage_dirs_pattern(hald_t,hald_tmp_t,hald_tmp_t)
+ manage_files_pattern(hald_t,hald_tmp_t,hald_tmp_t)
+ files_tmp_filetrans(hald_t, hald_tmp_t, { file dir })
+@@ -48,14 +74,20 @@
  manage_files_pattern(hald_t,hald_var_lib_t,hald_var_lib_t)
  manage_sock_files_pattern(hald_t,hald_var_lib_t,hald_var_lib_t)
  
@@ -2925,7 +2943,7 @@
  kernel_rw_vm_sysctls(hald_t)
  kernel_write_proc_files(hald_t)
  
-@@ -85,9 +115,13 @@
+@@ -85,9 +117,13 @@
  dev_rw_power_management(hald_t)
  # hal is now execing pm-suspend
  dev_rw_sysfs(hald_t)
@@ -2939,7 +2957,7 @@
  
  files_exec_etc_files(hald_t)
  files_read_etc_files(hald_t)
-@@ -101,9 +135,11 @@
+@@ -101,9 +137,11 @@
  files_create_boot_flag(hald_t)
  files_getattr_all_dirs(hald_t)
  files_read_kernel_img(hald_t)
@@ -2951,7 +2969,7 @@
  fs_list_auto_mountpoints(hald_t)
  files_getattr_all_mountpoints(hald_t)
  
-@@ -128,10 +164,10 @@
+@@ -128,10 +166,10 @@
  auth_use_nsswitch(hald_t)
  
  init_domtrans_script(hald_t)
@@ -2963,7 +2981,7 @@
  
  libs_use_ld_so(hald_t)
  libs_use_shared_libs(hald_t)
-@@ -245,3 +281,102 @@
+@@ -245,3 +283,102 @@
  optional_policy(`
  	vbetool_domtrans(hald_t)
  ')
@@ -3534,6 +3552,18 @@
  	postgrey_stream_connect(postfix_smtpd_t)
  ')
  
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ppp.te serefpolicy-2.5.12/policy/modules/services/ppp.te
+--- nsaserefpolicy/policy/modules/services/ppp.te	2007-03-26 16:24:12.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/services/ppp.te	2007-04-18 16:35:40.000000000 -0400
+@@ -155,7 +155,7 @@
+ 
+ files_exec_etc_files(pppd_t)
+ files_manage_etc_runtime_files(pppd_t)
+-files_etc_filetrans_etc_runtime(pppd_t, { dir file })
++sysnet_etc_filetrans_config(pppd_t)
+ files_dontaudit_write_etc_files(pppd_t)
+ 
+ # for scripts
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/procmail.te serefpolicy-2.5.12/policy/modules/services/procmail.te
 --- nsaserefpolicy/policy/modules/services/procmail.te	2007-03-26 10:39:05.000000000 -0400
 +++ serefpolicy-2.5.12/policy/modules/services/procmail.te	2007-04-11 17:07:34.000000000 -0400
@@ -5637,7 +5667,7 @@
 +
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/sysnetwork.te serefpolicy-2.5.12/policy/modules/system/sysnetwork.te
 --- nsaserefpolicy/policy/modules/system/sysnetwork.te	2007-03-26 10:39:07.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/system/sysnetwork.te	2007-04-16 12:03:06.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/system/sysnetwork.te	2007-04-18 16:40:12.000000000 -0400
 @@ -164,6 +164,8 @@
  	dbus_connect_system_bus(dhcpc_t)
  	dbus_send_system_bus(dhcpc_t)


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/selinux-policy.spec,v
retrieving revision 1.436
retrieving revision 1.437
diff -u -r1.436 -r1.437
--- selinux-policy.spec	18 Apr 2007 20:45:20 -0000	1.436
+++ selinux-policy.spec	18 Apr 2007 20:50:02 -0000	1.437
@@ -17,7 +17,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 2.5.12
-Release: 6%{?dist}
+Release: 7%{?dist}
 License: GPL
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -358,6 +358,9 @@
 %endif
 
 %changelog
+* Wed Apr 18 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-7
+- Fixes for alsactl and pppd_t
+
 * Wed Apr 18 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-6
 - Fixes for consolekit
 




More information about the fedora-cvs-commits mailing list