rpms/selinux-policy/F-10 policy-20080710.patch, 1.103, 1.104 selinux-policy.spec, 1.753, 1.754

Daniel J Walsh dwalsh at fedoraproject.org
Tue Nov 25 18:31:44 UTC 2008


Author: dwalsh

Update of /cvs/extras/rpms/selinux-policy/F-10
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv4859

Modified Files:
	policy-20080710.patch selinux-policy.spec 
Log Message:
* Tue Nov 25 2008 Dan Walsh <dwalsh at redhat.com> 3.5.13-26
- Allow dhcpc to read ypbind.pid


policy-20080710.patch:

Index: policy-20080710.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-10/policy-20080710.patch,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -r1.103 -r1.104
--- policy-20080710.patch	25 Nov 2008 16:20:06 -0000	1.103
+++ policy-20080710.patch	25 Nov 2008 18:31:43 -0000	1.104
@@ -31686,7 +31686,7 @@
 +')
 diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/sysnetwork.te serefpolicy-3.5.13/policy/modules/system/sysnetwork.te
 --- nsaserefpolicy/policy/modules/system/sysnetwork.te	2008-10-17 08:49:13.000000000 -0400
-+++ serefpolicy-3.5.13/policy/modules/system/sysnetwork.te	2008-11-24 10:49:49.000000000 -0500
++++ serefpolicy-3.5.13/policy/modules/system/sysnetwork.te	2008-11-25 13:30:04.000000000 -0500
 @@ -20,6 +20,9 @@
  init_daemon_domain(dhcpc_t,dhcpc_exec_t)
  role system_r types dhcpc_t;
@@ -31742,7 +31742,7 @@
  ifdef(`distro_redhat', `
  	files_exec_etc_files(dhcpc_t)
  ')
-@@ -185,25 +187,22 @@
+@@ -185,25 +187,23 @@
  ')
  
  optional_policy(`
@@ -31750,16 +31750,16 @@
 -	nis_signal_ypbind(dhcpc_t)
 -	nis_read_ypbind_pid(dhcpc_t)
 -	nis_delete_ypbind_pid(dhcpc_t)
--
--	# dhclient sometimes starts ypbind
--	init_exec_script_files(dhcpc_t)
--	nis_domtrans_ypbind(dhcpc_t)
 +	networkmanager_domtrans(dhcpc_t)
 +	networkmanager_read_pid_files(dhcpc_t)
 +')
-+
+ 
+-	# dhclient sometimes starts ypbind
+-	init_exec_script_files(dhcpc_t)
+-	nis_domtrans_ypbind(dhcpc_t)
 +optional_policy(`
 +	nis_ypbind_initrc_domtrans(dhcpc_t)
++	nis_read_ypbind_pid(dhcpc_t)
  ')
  
  optional_policy(`
@@ -31776,7 +31776,7 @@
  ')
  
  optional_policy(`
-@@ -214,6 +213,11 @@
+@@ -214,6 +214,11 @@
  optional_policy(`
  	seutil_sigchld_newrole(dhcpc_t)
  	seutil_dontaudit_search_config(dhcpc_t)
@@ -31788,7 +31788,7 @@
  ')
  
  optional_policy(`
-@@ -225,6 +229,10 @@
+@@ -225,6 +230,10 @@
  ')
  
  optional_policy(`
@@ -31799,7 +31799,7 @@
  	kernel_read_xen_state(dhcpc_t)
  	kernel_write_xen_state(dhcpc_t)
  	xen_append_log(dhcpc_t)
-@@ -238,7 +246,6 @@
+@@ -238,7 +247,6 @@
  
  allow ifconfig_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execheap execstack };
  allow ifconfig_t self:capability { net_raw net_admin sys_tty_config };
@@ -31807,7 +31807,7 @@
  
  allow ifconfig_t self:fd use;
  allow ifconfig_t self:fifo_file rw_fifo_file_perms;
-@@ -252,6 +259,7 @@
+@@ -252,6 +260,7 @@
  allow ifconfig_t self:sem create_sem_perms;
  allow ifconfig_t self:msgq create_msgq_perms;
  allow ifconfig_t self:msg { send receive };
@@ -31815,7 +31815,7 @@
  
  # Create UDP sockets, necessary when called from dhcpc
  allow ifconfig_t self:udp_socket create_socket_perms;
-@@ -261,13 +269,20 @@
+@@ -261,13 +270,20 @@
  allow ifconfig_t self:netlink_route_socket create_netlink_socket_perms;
  allow ifconfig_t self:netlink_xfrm_socket { create_netlink_socket_perms nlmsg_read };
  allow ifconfig_t self:tcp_socket { create ioctl };
@@ -31836,7 +31836,7 @@
  
  corenet_rw_tun_tap_dev(ifconfig_t)
  
-@@ -278,8 +293,13 @@
+@@ -278,8 +294,13 @@
  fs_getattr_xattr_fs(ifconfig_t)
  fs_search_auto_mountpoints(ifconfig_t)
  
@@ -31850,7 +31850,7 @@
  
  domain_use_interactive_fds(ifconfig_t)
  
-@@ -300,6 +320,8 @@
+@@ -300,6 +321,8 @@
  
  seutil_use_runinit_fds(ifconfig_t)
  
@@ -31859,7 +31859,7 @@
  userdom_use_all_users_fds(ifconfig_t)
  
  ifdef(`distro_ubuntu',`
-@@ -335,6 +357,14 @@
+@@ -335,6 +358,14 @@
  ')
  
  optional_policy(`


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-10/selinux-policy.spec,v
retrieving revision 1.753
retrieving revision 1.754
diff -u -r1.753 -r1.754
--- selinux-policy.spec	25 Nov 2008 16:20:06 -0000	1.753
+++ selinux-policy.spec	25 Nov 2008 18:31:43 -0000	1.754
@@ -20,7 +20,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.5.13
-Release: 25%{?dist}
+Release: 26%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -457,6 +457,9 @@
 %endif
 
 %changelog
+* Tue Nov 25 2008 Dan Walsh <dwalsh at redhat.com> 3.5.13-26
+- Allow dhcpc to read ypbind.pid
+
 * Tue Nov 25 2008 Dan Walsh <dwalsh at redhat.com> 3.5.13-25
 - Allow postfix_smtpd to getattr on directories and file systems
 




More information about the fedora-extras-commits mailing list