All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] [PATCH 1/1] xserver_t needs to enter dirs labeled xdm_var_run_t
@ 2014-05-22 16:44 Sven Vermeulen
  2014-05-27 12:50 ` Christopher J. PeBenito
  0 siblings, 1 reply; 2+ messages in thread
From: Sven Vermeulen @ 2014-05-22 16:44 UTC (permalink / raw)
  To: refpolicy

The LightDM application stores its xauth file in a subdirectory
(/var/run/lightdm/root) which is labeled as xdm_var_run_t. As a result,
X11 (xserver_t) needs search rights to this location.

With this setup, X is run as follows:
  /usr/bin/X :0 -auth /var/run/lightdm/root/:0

Signed-off-by: Jason Zaman <jason@perfinion.com>
Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
---
 policy/modules/services/xserver.te | 1 +
 1 file changed, 1 insertion(+)

diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index f81fcac..c4239f0 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -821,6 +821,7 @@ allow xserver_t xdm_var_lib_t:file { getattr read };
 dontaudit xserver_t xdm_var_lib_t:dir search;
 
 allow xserver_t xdm_var_run_t:file read_file_perms;
+allow xserver_t xdm_var_run_t:dir search_dir_perms;
 
 # Label pid and temporary files with derived types.
 manage_files_pattern(xserver_t, xdm_tmp_t, xdm_tmp_t)
-- 
1.8.5.5

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* [refpolicy] [PATCH 1/1] xserver_t needs to enter dirs labeled xdm_var_run_t
  2014-05-22 16:44 [refpolicy] [PATCH 1/1] xserver_t needs to enter dirs labeled xdm_var_run_t Sven Vermeulen
@ 2014-05-27 12:50 ` Christopher J. PeBenito
  0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2014-05-27 12:50 UTC (permalink / raw)
  To: refpolicy

On 05/22/2014 12:44 PM, Sven Vermeulen wrote:
> The LightDM application stores its xauth file in a subdirectory
> (/var/run/lightdm/root) which is labeled as xdm_var_run_t. As a result,
> X11 (xserver_t) needs search rights to this location.
> 
> With this setup, X is run as follows:
>   /usr/bin/X :0 -auth /var/run/lightdm/root/:0
> 
> Signed-off-by: Jason Zaman <jason@perfinion.com>
> Signed-off-by: Sven Vermeulen <sven.vermeulen@siphos.be>
> ---
>  policy/modules/services/xserver.te | 1 +
>  1 file changed, 1 insertion(+)
> 
> diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
> index f81fcac..c4239f0 100644
> --- a/policy/modules/services/xserver.te
> +++ b/policy/modules/services/xserver.te
> @@ -821,6 +821,7 @@ allow xserver_t xdm_var_lib_t:file { getattr read };
>  dontaudit xserver_t xdm_var_lib_t:dir search;
>  
>  allow xserver_t xdm_var_run_t:file read_file_perms;
> +allow xserver_t xdm_var_run_t:dir search_dir_perms;
>  
>  # Label pid and temporary files with derived types.
>  manage_files_pattern(xserver_t, xdm_tmp_t, xdm_tmp_t)
 
I'd prefer to change that added line and the line above it to read_files_pattern.

-- 
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2014-05-27 12:50 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-05-22 16:44 [refpolicy] [PATCH 1/1] xserver_t needs to enter dirs labeled xdm_var_run_t Sven Vermeulen
2014-05-27 12:50 ` Christopher J. PeBenito

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.