rpms/selinux-policy/devel policy-20070219.patch, 1.49, 1.50 selinux-policy.spec, 1.434, 1.435
fedora-cvs-commits at redhat.com
fedora-cvs-commits at redhat.com
Tue Apr 17 20:42:34 UTC 2007
- Previous message (by thread): rpms/kernel/FC-5 kernel-2.6.spec, 1.2312, 1.2313 linux-2.6-20.5z-ide_use_proper_error_recovery.patch, 1.1, NONE linux-2.6-20.5z-nfs_allow_64bit_cookies.patch, 1.1, NONE linux-2.6-20.5z-softmac_check_if_running.patch, 1.1, NONE linux-2.6-20.7a-ahci_ATI_SB600_workaround.patch, 1.1, NONE linux-2.6-20.7a-libata-lba48.patch, 1.1, NONE linux-2.6-20.7b-libata_blacklist.patch, 1.2, NONE linux-2.6-20.7b-libata_clear_tf_before_sense.patch, 1.1, NONE linux-2.6-20.7b-scsi_eh_scatterlist.patch, 1.1, NONE linux-2.6.20.5-rc1-ata_scsi_preserve_lba_bit.patch, 1.1, NONE linux-2.6.20.5-rc1-crypto_walk_fix_advance_by.patch, 1.1, NONE
- Next message (by thread): rpms/firefox/devel firefox.spec,1.180,1.181
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: dwalsh
Update of /cvs/dist/rpms/selinux-policy/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv1182
Modified Files:
policy-20070219.patch selinux-policy.spec
Log Message:
* Tue Apr 17 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-5
- Allow insmod_t to mount kvmfs_t filesystems
policy-20070219.patch:
Rules.modular | 12 +
policy/flask/access_vectors | 4
policy/global_booleans | 2
policy/global_tunables | 7
policy/mls | 31 ++-
policy/modules/admin/acct.te | 1
policy/modules/admin/amtu.fc | 3
policy/modules/admin/amtu.if | 53 ++++++
policy/modules/admin/amtu.te | 56 ++++++
policy/modules/admin/bootloader.te | 3
policy/modules/admin/consoletype.te | 10 -
policy/modules/admin/dmesg.te | 1
policy/modules/admin/kudzu.te | 6
policy/modules/admin/logwatch.te | 4
policy/modules/admin/netutils.te | 6
policy/modules/admin/rpm.fc | 3
policy/modules/admin/rpm.if | 85 +++++++---
policy/modules/admin/rpm.te | 2
policy/modules/admin/su.if | 4
policy/modules/admin/usermanage.if | 2
policy/modules/admin/usermanage.te | 26 +++
policy/modules/apps/gnome.if | 26 ++-
policy/modules/apps/gpg.fc | 2
policy/modules/apps/loadkeys.if | 44 +----
policy/modules/apps/mozilla.if | 1
policy/modules/apps/slocate.te | 5
policy/modules/apps/uml.if | 27 ---
policy/modules/kernel/corecommands.fc | 5
policy/modules/kernel/corecommands.if | 20 ++
policy/modules/kernel/corenetwork.te.in | 15 +
policy/modules/kernel/devices.if | 36 ++++
policy/modules/kernel/domain.if | 18 ++
policy/modules/kernel/domain.te | 46 +++++
policy/modules/kernel/files.fc | 1
policy/modules/kernel/files.if | 83 ++++++++-
policy/modules/kernel/filesystem.if | 39 ++++
policy/modules/kernel/filesystem.te | 13 +
policy/modules/kernel/kernel.if | 42 ++++
policy/modules/kernel/kernel.te | 2
policy/modules/kernel/mls.if | 20 ++
policy/modules/kernel/mls.te | 3
policy/modules/kernel/selinux.if | 38 ++++
policy/modules/kernel/storage.if | 2
policy/modules/kernel/terminal.if | 2
policy/modules/kernel/terminal.te | 1
policy/modules/services/amavis.te | 3
policy/modules/services/apache.fc | 14 -
policy/modules/services/apache.if | 171 +++++++++++++++++++-
policy/modules/services/apache.te | 72 ++++++++
policy/modules/services/apcupsd.fc | 9 +
policy/modules/services/apcupsd.if | 108 ++++++++++++
policy/modules/services/apcupsd.te | 91 ++++++++++
policy/modules/services/automount.te | 2
policy/modules/services/avahi.if | 19 ++
policy/modules/services/bluetooth.te | 2
policy/modules/services/consolekit.te | 21 +-
policy/modules/services/cron.fc | 1
policy/modules/services/cron.if | 33 +--
policy/modules/services/cron.te | 43 ++++-
policy/modules/services/cups.te | 6
policy/modules/services/cvs.te | 1
policy/modules/services/cyrus.te | 1
policy/modules/services/dbus.if | 63 +++++++
policy/modules/services/dhcp.te | 2
policy/modules/services/djbdns.te | 5
policy/modules/services/dovecot.te | 5
policy/modules/services/ftp.te | 5
policy/modules/services/hal.fc | 8
policy/modules/services/hal.if | 39 ++++
policy/modules/services/hal.te | 143 ++++++++++++++++-
policy/modules/services/inetd.te | 5
policy/modules/services/kerberos.if | 79 ++-------
policy/modules/services/kerberos.te | 36 ++++
policy/modules/services/mailman.if | 19 ++
policy/modules/services/mta.if | 19 ++
policy/modules/services/mta.te | 2
policy/modules/services/nis.if | 4
policy/modules/services/nis.te | 4
policy/modules/services/nscd.te | 10 +
policy/modules/services/ntp.te | 4
policy/modules/services/pegasus.if | 18 ++
policy/modules/services/pegasus.te | 6
policy/modules/services/postfix.if | 1
policy/modules/services/postfix.te | 8
policy/modules/services/procmail.te | 1
policy/modules/services/pyzor.te | 7
policy/modules/services/radius.te | 4
policy/modules/services/rpc.if | 5
policy/modules/services/rsync.te | 1
policy/modules/services/rwho.fc | 3
policy/modules/services/rwho.if | 84 +++++++++
policy/modules/services/rwho.te | 65 +++++++
policy/modules/services/samba.fc | 3
policy/modules/services/samba.if | 86 ++++++++++
policy/modules/services/samba.te | 83 +++++++++
policy/modules/services/sendmail.if | 22 ++
policy/modules/services/smartmon.te | 1
policy/modules/services/snmp.te | 15 +
policy/modules/services/spamassassin.te | 7
policy/modules/services/squid.fc | 2
policy/modules/services/squid.if | 22 ++
policy/modules/services/squid.te | 12 +
policy/modules/services/ssh.if | 39 ++++
policy/modules/services/ssh.te | 10 -
policy/modules/services/w3c.fc | 2
policy/modules/services/w3c.if | 1
policy/modules/services/w3c.te | 14 +
policy/modules/system/application.fc | 1
policy/modules/system/application.if | 104 ++++++++++++
policy/modules/system/application.te | 14 +
policy/modules/system/authlogin.if | 83 ++++++++-
policy/modules/system/authlogin.te | 3
policy/modules/system/fstools.fc | 1
policy/modules/system/fstools.te | 1
policy/modules/system/fusermount.fc | 6
policy/modules/system/fusermount.if | 41 ++++
policy/modules/system/fusermount.te | 45 +++++
policy/modules/system/getty.te | 3
policy/modules/system/hostname.te | 14 +
policy/modules/system/init.if | 42 ++++
policy/modules/system/init.te | 35 +++-
policy/modules/system/ipsec.if | 20 ++
policy/modules/system/ipsec.te | 3
policy/modules/system/iptables.te | 4
policy/modules/system/libraries.fc | 3
policy/modules/system/libraries.te | 3
policy/modules/system/locallogin.te | 7
policy/modules/system/logging.if | 21 ++
policy/modules/system/logging.te | 2
policy/modules/system/lvm.te | 6
policy/modules/system/modutils.te | 7
policy/modules/system/mount.fc | 3
policy/modules/system/mount.if | 37 ++++
policy/modules/system/mount.te | 64 +++++++
policy/modules/system/raid.te | 1
policy/modules/system/selinuxutil.fc | 1
policy/modules/system/selinuxutil.if | 5
policy/modules/system/selinuxutil.te | 52 +++---
policy/modules/system/sysnetwork.te | 3
policy/modules/system/udev.te | 12 +
policy/modules/system/unconfined.fc | 1
policy/modules/system/unconfined.if | 10 -
policy/modules/system/unconfined.te | 24 ++
policy/modules/system/userdomain.if | 269 +++++++++++++++++++-------------
policy/modules/system/userdomain.te | 46 ++++-
policy/modules/system/xen.te | 35 ++++
policy/support/obj_perm_sets.spt | 12 +
147 files changed, 2989 insertions(+), 438 deletions(-)
Index: policy-20070219.patch
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/policy-20070219.patch,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -r1.49 -r1.50
--- policy-20070219.patch 17 Apr 2007 19:28:14 -0000 1.49
+++ policy-20070219.patch 17 Apr 2007 20:42:32 -0000 1.50
@@ -1357,7 +1357,7 @@
genfscon futexfs / gen_context(system_u:object_r:futexfs_t,s0)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/kernel.if serefpolicy-2.5.12/policy/modules/kernel/kernel.if
--- nsaserefpolicy/policy/modules/kernel/kernel.if 2007-02-19 11:32:51.000000000 -0500
-+++ serefpolicy-2.5.12/policy/modules/kernel/kernel.if 2007-04-16 11:51:04.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/kernel/kernel.if 2007-04-17 15:50:55.000000000 -0400
@@ -1830,6 +1830,26 @@
########################################
@@ -1395,9 +1395,32 @@
')
########################################
+@@ -2408,3 +2425,22 @@
+
+ typeattribute $1 kern_unconfined;
+ ')
++
++########################################
++## <summary>
++## Mount a kernel vm filesystem.
++## </summary>
++## <param name="domain">
++## <summary>
++## The type of the domain mounting the filesystem.
++## </summary>
++## </param>
++#
++interface(`kernel_mount_kvmfs',`
++ gen_require(`
++ type kvmfs_t;
++ ')
++
++ allow $1 kvmfs_t:filesystem mount;
++')
++
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/kernel/kernel.te serefpolicy-2.5.12/policy/modules/kernel/kernel.te
--- nsaserefpolicy/policy/modules/kernel/kernel.te 2007-03-26 10:38:57.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/kernel/kernel.te 2007-04-11 17:07:34.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/kernel/kernel.te 2007-04-17 15:50:59.000000000 -0400
@@ -146,6 +146,8 @@
type unlabeled_t;
sid unlabeled gen_context(system_u:object_r:unlabeled_t,mls_systemhigh)
@@ -5044,6 +5067,19 @@
/usr/(.*/)?lib(64)?(/.*)?/nvidia/.+\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
/usr/lib(64)?(/.*)?/nvidia/.+\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
+diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/libraries.te serefpolicy-2.5.12/policy/modules/system/libraries.te
+--- nsaserefpolicy/policy/modules/system/libraries.te 2007-04-11 10:19:43.000000000 -0400
++++ serefpolicy-2.5.12/policy/modules/system/libraries.te 2007-04-17 15:56:34.000000000 -0400
+@@ -62,7 +62,8 @@
+
+ manage_dirs_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t)
+ manage_files_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t)
+-files_tmp_filetrans(ldconfig_t, ldconfig_tmp_t, { file dir })
++manage_lnk_files_pattern(ldconfig_t,ldconfig_tmp_t,ldconfig_tmp_t)
++files_tmp_filetrans(ldconfig_t, ldconfig_tmp_t, { file dir lnk_file })
+
+ manage_lnk_files_pattern(ldconfig_t,lib_t,lib_t)
+
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/locallogin.te serefpolicy-2.5.12/policy/modules/system/locallogin.te
--- nsaserefpolicy/policy/modules/system/locallogin.te 2007-03-26 10:39:07.000000000 -0400
+++ serefpolicy-2.5.12/policy/modules/system/locallogin.te 2007-04-11 17:07:34.000000000 -0400
@@ -5161,8 +5197,16 @@
term_list_ptys(lvm_t)
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/modutils.te serefpolicy-2.5.12/policy/modules/system/modutils.te
--- nsaserefpolicy/policy/modules/system/modutils.te 2007-04-11 15:52:54.000000000 -0400
-+++ serefpolicy-2.5.12/policy/modules/system/modutils.te 2007-04-11 17:07:34.000000000 -0400
-@@ -101,6 +101,7 @@
++++ serefpolicy-2.5.12/policy/modules/system/modutils.te 2007-04-17 15:50:53.000000000 -0400
+@@ -58,6 +58,7 @@
+ kernel_read_system_state(insmod_t)
+ kernel_write_proc_files(insmod_t)
+ kernel_mount_debugfs(insmod_t)
++kernel_mount_kvmfs(insmod_t)
+ kernel_read_debugfs(insmod_t)
+ # Rules for /proc/sys/kernel/tainted
+ kernel_read_kernel_sysctls(insmod_t)
+@@ -101,6 +102,7 @@
init_use_fds(insmod_t)
init_use_script_fds(insmod_t)
init_use_script_ptys(insmod_t)
@@ -5170,7 +5214,7 @@
libs_use_ld_so(insmod_t)
libs_use_shared_libs(insmod_t)
-@@ -163,6 +164,10 @@
+@@ -163,6 +165,10 @@
xserver_getattr_log(insmod_t)
')
@@ -5181,7 +5225,7 @@
########################################
#
# depmod local policy
-@@ -180,6 +185,7 @@
+@@ -180,6 +186,7 @@
files_read_kernel_symbol_table(depmod_t)
files_read_kernel_modules(depmod_t)
Index: selinux-policy.spec
===================================================================
RCS file: /cvs/dist/rpms/selinux-policy/devel/selinux-policy.spec,v
retrieving revision 1.434
retrieving revision 1.435
diff -u -r1.434 -r1.435
--- selinux-policy.spec 17 Apr 2007 19:28:14 -0000 1.434
+++ selinux-policy.spec 17 Apr 2007 20:42:32 -0000 1.435
@@ -17,7 +17,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 2.5.12
-Release: 4%{?dist}
+Release: 5%{?dist}
License: GPL
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -358,6 +358,9 @@
%endif
%changelog
+* Tue Apr 17 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-5
+- Allow insmod_t to mount kvmfs_t filesystems
+
* Tue Apr 17 2007 Dan Walsh <dwalsh at redhat.com> 2.5.12-4
- Rwho policy
- Fixes for consolekit
- Previous message (by thread): rpms/kernel/FC-5 kernel-2.6.spec, 1.2312, 1.2313 linux-2.6-20.5z-ide_use_proper_error_recovery.patch, 1.1, NONE linux-2.6-20.5z-nfs_allow_64bit_cookies.patch, 1.1, NONE linux-2.6-20.5z-softmac_check_if_running.patch, 1.1, NONE linux-2.6-20.7a-ahci_ATI_SB600_workaround.patch, 1.1, NONE linux-2.6-20.7a-libata-lba48.patch, 1.1, NONE linux-2.6-20.7b-libata_blacklist.patch, 1.2, NONE linux-2.6-20.7b-libata_clear_tf_before_sense.patch, 1.1, NONE linux-2.6-20.7b-scsi_eh_scatterlist.patch, 1.1, NONE linux-2.6.20.5-rc1-ata_scsi_preserve_lba_bit.patch, 1.1, NONE linux-2.6.20.5-rc1-crypto_walk_fix_advance_by.patch, 1.1, NONE
- Next message (by thread): rpms/firefox/devel firefox.spec,1.180,1.181
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-cvs-commits
mailing list