All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets
@ 2018-07-10 15:03 Jason Zaman
  2018-07-10 15:03 ` [refpolicy] [PATCH 2/5] mozilla: xdg updates Jason Zaman
                   ` (4 more replies)
  0 siblings, 5 replies; 10+ messages in thread
From: Jason Zaman @ 2018-07-10 15:03 UTC (permalink / raw)
  To: refpolicy

---
 policy/modules/kernel/selinux.if | 1 +
 1 file changed, 1 insertion(+)

diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
index 8123b25f..6790e5d0 100644
--- a/policy/modules/kernel/selinux.if
+++ b/policy/modules/kernel/selinux.if
@@ -534,6 +534,7 @@ interface(`selinux_compute_access_vector',`
 	')
 
 	dev_search_sysfs($1)
+	allow $1 self:netlink_selinux_socket create_socket_perms;
 	allow $1 security_t:dir list_dir_perms;
 	allow $1 security_t:file rw_file_perms;
 	allow $1 security_t:security compute_av;
-- 
2.16.4

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 2/5] mozilla: xdg updates
  2018-07-10 15:03 [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Jason Zaman
@ 2018-07-10 15:03 ` Jason Zaman
  2018-07-11  0:08   ` Chris PeBenito
  2018-07-10 15:03 ` [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t Jason Zaman
                   ` (3 subsequent siblings)
  4 siblings, 1 reply; 10+ messages in thread
From: Jason Zaman @ 2018-07-10 15:03 UTC (permalink / raw)
  To: refpolicy

---
 policy/modules/apps/mozilla.te | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
index 2e119896..b9222354 100644
--- a/policy/modules/apps/mozilla.te
+++ b/policy/modules/apps/mozilla.te
@@ -206,6 +206,7 @@ userdom_use_user_ptys(mozilla_t)
 
 userdom_manage_user_tmp_dirs(mozilla_t)
 userdom_manage_user_tmp_files(mozilla_t)
+userdom_map_user_tmp_files(mozilla_t)
 
 userdom_user_content_access_template(mozilla, { mozilla_t mozilla_plugin_t })
 userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
@@ -219,6 +220,7 @@ xdg_read_config_files(mozilla_t)
 xdg_read_data_files(mozilla_t)
 xdg_manage_downloads(mozilla_t)
 
+xserver_rw_mesa_shader_cache(mozilla_t)
 xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
 xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
 xserver_dontaudit_getattr_xdm_tmp_sockets(mozilla_t)
@@ -519,6 +521,7 @@ miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)
 
 userdom_manage_user_tmp_dirs(mozilla_plugin_t)
 userdom_manage_user_tmp_files(mozilla_plugin_t)
+userdom_map_user_tmp_files(mozilla_plugin_t)
 
 userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })
 
-- 
2.16.4

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t
  2018-07-10 15:03 [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Jason Zaman
  2018-07-10 15:03 ` [refpolicy] [PATCH 2/5] mozilla: xdg updates Jason Zaman
@ 2018-07-10 15:03 ` Jason Zaman
  2018-07-11  0:08   ` Chris PeBenito
  2018-07-10 15:03 ` [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver Jason Zaman
                   ` (2 subsequent siblings)
  4 siblings, 1 reply; 10+ messages in thread
From: Jason Zaman @ 2018-07-10 15:03 UTC (permalink / raw)
  To: refpolicy

---
 policy/modules/services/xserver.fc | 1 +
 policy/modules/services/xserver.if | 1 +
 policy/modules/services/xserver.te | 2 +-
 3 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
index 3a193743..fa8db862 100644
--- a/policy/modules/services/xserver.fc
+++ b/policy/modules/services/xserver.fc
@@ -2,6 +2,7 @@
 # HOME_DIR
 #
 HOME_DIR/\.cache/mesa_shader_cache(/.*)?	gen_context(system_u:object_r:mesa_shader_cache_t,s0)
+HOME_DIR/\.cache/fontconfig(/.*)?	gen_context(system_u:object_r:user_fonts_cache_t,s0)
 HOME_DIR/\.dmrc		--	gen_context(system_u:object_r:dmrc_home_t,s0)
 HOME_DIR/\.fonts\.conf	--	gen_context(system_u:object_r:user_fonts_config_t,s0)
 HOME_DIR/\.fonts(/.*)?		gen_context(system_u:object_r:user_fonts_t,s0)
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index d4c883c7..c1dbf0bf 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -516,6 +516,7 @@ interface(`xserver_use_user_fonts',`
 	allow $1 user_fonts_config_t:file read_file_perms;
 
 	userdom_search_user_home_dirs($1)
+	xdg_search_cache_dirs($1)
 ')
 
 ########################################
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 96db8335..3b39bdd9 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -125,7 +125,7 @@ userdom_user_home_content(user_fonts_t)
 type user_fonts_cache_t;
 typealias user_fonts_cache_t alias { staff_fonts_cache_t sysadm_fonts_cache_t };
 typealias user_fonts_cache_t alias { auditadm_fonts_cache_t secadm_fonts_cache_t };
-userdom_user_home_content(user_fonts_cache_t)
+xdg_cache_content(user_fonts_cache_t)
 
 type user_fonts_config_t;
 typealias user_fonts_config_t alias { staff_fonts_config_t sysadm_fonts_config_t };
-- 
2.16.4

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver
  2018-07-10 15:03 [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Jason Zaman
  2018-07-10 15:03 ` [refpolicy] [PATCH 2/5] mozilla: xdg updates Jason Zaman
  2018-07-10 15:03 ` [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t Jason Zaman
@ 2018-07-10 15:03 ` Jason Zaman
  2018-07-11  0:08   ` Chris PeBenito
  2018-07-10 15:03 ` [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0 Jason Zaman
  2018-07-11  0:08 ` [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Chris PeBenito
  4 siblings, 1 reply; 10+ messages in thread
From: Jason Zaman @ 2018-07-10 15:03 UTC (permalink / raw)
  To: refpolicy

---
 policy/modules/kernel/devices.if   | 18 ++++++++++++++++++
 policy/modules/services/xserver.if |  1 +
 policy/modules/services/xserver.te |  1 +
 policy/modules/system/init.te      |  1 +
 4 files changed, 21 insertions(+)

diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
index be1a1d4b..6bbea59e 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -5079,6 +5079,24 @@ interface(`dev_rw_xserver_misc',`
 	rw_chr_files_pattern($1, device_t, xserver_misc_device_t)
 ')
 
+########################################
+## <summary>
+##	Map X server miscellaneous devices.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`dev_map_xserver_misc',`
+	gen_require(`
+		type xserver_misc_device_t;
+	')
+
+	allow $1 xserver_misc_device_t:chr_file map;
+')
+
 ########################################
 ## <summary>
 ##	Read and write to the zero device (/dev/zero).
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index c1dbf0bf..1b25ff5c 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -82,6 +82,7 @@ interface(`xserver_restricted_role',`
 	allow $2 xserver_tmp_t:file { getattr read };
 
 	dev_rw_xserver_misc($2)
+	dev_map_xserver_misc($2)
 	dev_rw_power_management($2)
 	dev_read_input($2)
 	dev_read_misc($2)
diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
index 3b39bdd9..83e00c01 100644
--- a/policy/modules/services/xserver.te
+++ b/policy/modules/services/xserver.te
@@ -749,6 +749,7 @@ dev_read_raw_memory(xserver_t)
 dev_wx_raw_memory(xserver_t)
 # for other device nodes such as the NVidia binary-only driver
 dev_rw_xserver_misc(xserver_t)
+dev_map_xserver_misc(xserver_t)
 # read events - the synaptics touchpad driver reads raw events
 dev_rw_input_dev(xserver_t)
 dev_rwx_zero(xserver_t)
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index a72b31d0..f9320285 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -635,6 +635,7 @@ dev_delete_generic_symlinks(initrc_t)
 dev_getattr_all_blk_files(initrc_t)
 dev_getattr_all_chr_files(initrc_t)
 dev_rw_xserver_misc(initrc_t)
+dev_map_xserver_misc(initrc_t)
 
 domain_kill_all_domains(initrc_t)
 domain_signal_all_domains(initrc_t)
-- 
2.16.4

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0
  2018-07-10 15:03 [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Jason Zaman
                   ` (2 preceding siblings ...)
  2018-07-10 15:03 ` [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver Jason Zaman
@ 2018-07-10 15:03 ` Jason Zaman
  2018-07-11  0:08   ` Chris PeBenito
  2018-07-11  0:08 ` [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Chris PeBenito
  4 siblings, 1 reply; 10+ messages in thread
From: Jason Zaman @ 2018-07-10 15:03 UTC (permalink / raw)
  To: refpolicy

The binary changed from /sbin/xtables-multi to xtables-legacy-multi and
xtables-nft-multi
---
 policy/modules/system/iptables.fc | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc
index 32877b26..ba65e811 100644
--- a/policy/modules/system/iptables.fc
+++ b/policy/modules/system/iptables.fc
@@ -20,7 +20,9 @@
 /usr/bin/ipvsadm-save			--	gen_context(system_u:object_r:iptables_exec_t,s0)
 /usr/bin/nft				--	gen_context(system_u:object_r:iptables_exec_t,s0)
 /usr/bin/xtables-compat-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/bin/xtables-legacy-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
 /usr/bin/xtables-multi			--	gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/bin/xtables-nft-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
 
 /usr/lib/systemd/system/[^/]*arptables.* --	gen_context(system_u:object_r:iptables_unit_t,s0)
 /usr/lib/systemd/system/[^/]*ebtables.*	 --	gen_context(system_u:object_r:iptables_unit_t,s0)
@@ -40,4 +42,6 @@
 /usr/sbin/ipvsadm-save			--	gen_context(system_u:object_r:iptables_exec_t,s0)
 /usr/sbin/nft				--	gen_context(system_u:object_r:iptables_exec_t,s0)
 /usr/sbin/xtables-compat-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/sbin/xtables-legacy-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
 /usr/sbin/xtables-multi			--	gen_context(system_u:object_r:iptables_exec_t,s0)
+/usr/sbin/xtables-nft-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
-- 
2.16.4

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets
  2018-07-10 15:03 [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Jason Zaman
                   ` (3 preceding siblings ...)
  2018-07-10 15:03 ` [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0 Jason Zaman
@ 2018-07-11  0:08 ` Chris PeBenito
  4 siblings, 0 replies; 10+ messages in thread
From: Chris PeBenito @ 2018-07-11  0:08 UTC (permalink / raw)
  To: refpolicy

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
>   policy/modules/kernel/selinux.if | 1 +
>   1 file changed, 1 insertion(+)
> 
> diff --git a/policy/modules/kernel/selinux.if b/policy/modules/kernel/selinux.if
> index 8123b25f..6790e5d0 100644
> --- a/policy/modules/kernel/selinux.if
> +++ b/policy/modules/kernel/selinux.if
> @@ -534,6 +534,7 @@ interface(`selinux_compute_access_vector',`
>   	')
>   
>   	dev_search_sysfs($1)
> +	allow $1 self:netlink_selinux_socket create_socket_perms;
>   	allow $1 security_t:dir list_dir_perms;
>   	allow $1 security_t:file rw_file_perms;
>   	allow $1 security_t:security compute_av;

Merged.

-- 
Chris PeBenito

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 2/5] mozilla: xdg updates
  2018-07-10 15:03 ` [refpolicy] [PATCH 2/5] mozilla: xdg updates Jason Zaman
@ 2018-07-11  0:08   ` Chris PeBenito
  0 siblings, 0 replies; 10+ messages in thread
From: Chris PeBenito @ 2018-07-11  0:08 UTC (permalink / raw)
  To: refpolicy

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
>   policy/modules/apps/mozilla.te | 3 +++
>   1 file changed, 3 insertions(+)
> 
> diff --git a/policy/modules/apps/mozilla.te b/policy/modules/apps/mozilla.te
> index 2e119896..b9222354 100644
> --- a/policy/modules/apps/mozilla.te
> +++ b/policy/modules/apps/mozilla.te
> @@ -206,6 +206,7 @@ userdom_use_user_ptys(mozilla_t)
>   
>   userdom_manage_user_tmp_dirs(mozilla_t)
>   userdom_manage_user_tmp_files(mozilla_t)
> +userdom_map_user_tmp_files(mozilla_t)
>   
>   userdom_user_content_access_template(mozilla, { mozilla_t mozilla_plugin_t })
>   userdom_user_home_dir_filetrans_user_home_content(mozilla_t, { dir file })
> @@ -219,6 +220,7 @@ xdg_read_config_files(mozilla_t)
>   xdg_read_data_files(mozilla_t)
>   xdg_manage_downloads(mozilla_t)
>   
> +xserver_rw_mesa_shader_cache(mozilla_t)
>   xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
>   xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
>   xserver_dontaudit_getattr_xdm_tmp_sockets(mozilla_t)
> @@ -519,6 +521,7 @@ miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)
>   
>   userdom_manage_user_tmp_dirs(mozilla_plugin_t)
>   userdom_manage_user_tmp_files(mozilla_plugin_t)
> +userdom_map_user_tmp_files(mozilla_plugin_t)
>   
>   userdom_user_home_dir_filetrans_user_home_content(mozilla_plugin_t, { dir file })

Merged.

-- 
Chris PeBenito

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t
  2018-07-10 15:03 ` [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t Jason Zaman
@ 2018-07-11  0:08   ` Chris PeBenito
  0 siblings, 0 replies; 10+ messages in thread
From: Chris PeBenito @ 2018-07-11  0:08 UTC (permalink / raw)
  To: refpolicy

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
>   policy/modules/services/xserver.fc | 1 +
>   policy/modules/services/xserver.if | 1 +
>   policy/modules/services/xserver.te | 2 +-
>   3 files changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/policy/modules/services/xserver.fc b/policy/modules/services/xserver.fc
> index 3a193743..fa8db862 100644
> --- a/policy/modules/services/xserver.fc
> +++ b/policy/modules/services/xserver.fc
> @@ -2,6 +2,7 @@
>   # HOME_DIR
>   #
>   HOME_DIR/\.cache/mesa_shader_cache(/.*)?	gen_context(system_u:object_r:mesa_shader_cache_t,s0)
> +HOME_DIR/\.cache/fontconfig(/.*)?	gen_context(system_u:object_r:user_fonts_cache_t,s0)
>   HOME_DIR/\.dmrc		--	gen_context(system_u:object_r:dmrc_home_t,s0)
>   HOME_DIR/\.fonts\.conf	--	gen_context(system_u:object_r:user_fonts_config_t,s0)
>   HOME_DIR/\.fonts(/.*)?		gen_context(system_u:object_r:user_fonts_t,s0)
> diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
> index d4c883c7..c1dbf0bf 100644
> --- a/policy/modules/services/xserver.if
> +++ b/policy/modules/services/xserver.if
> @@ -516,6 +516,7 @@ interface(`xserver_use_user_fonts',`
>   	allow $1 user_fonts_config_t:file read_file_perms;
>   
>   	userdom_search_user_home_dirs($1)
> +	xdg_search_cache_dirs($1)
>   ')
>   
>   ########################################
> diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
> index 96db8335..3b39bdd9 100644
> --- a/policy/modules/services/xserver.te
> +++ b/policy/modules/services/xserver.te
> @@ -125,7 +125,7 @@ userdom_user_home_content(user_fonts_t)
>   type user_fonts_cache_t;
>   typealias user_fonts_cache_t alias { staff_fonts_cache_t sysadm_fonts_cache_t };
>   typealias user_fonts_cache_t alias { auditadm_fonts_cache_t secadm_fonts_cache_t };
> -userdom_user_home_content(user_fonts_cache_t)
> +xdg_cache_content(user_fonts_cache_t)
>   
>   type user_fonts_config_t;
>   typealias user_fonts_config_t alias { staff_fonts_config_t sysadm_fonts_config_t };

Merged.

-- 
Chris PeBenito

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver
  2018-07-10 15:03 ` [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver Jason Zaman
@ 2018-07-11  0:08   ` Chris PeBenito
  0 siblings, 0 replies; 10+ messages in thread
From: Chris PeBenito @ 2018-07-11  0:08 UTC (permalink / raw)
  To: refpolicy

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> ---
>   policy/modules/kernel/devices.if   | 18 ++++++++++++++++++
>   policy/modules/services/xserver.if |  1 +
>   policy/modules/services/xserver.te |  1 +
>   policy/modules/system/init.te      |  1 +
>   4 files changed, 21 insertions(+)
> 
> diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
> index be1a1d4b..6bbea59e 100644
> --- a/policy/modules/kernel/devices.if
> +++ b/policy/modules/kernel/devices.if
> @@ -5079,6 +5079,24 @@ interface(`dev_rw_xserver_misc',`
>   	rw_chr_files_pattern($1, device_t, xserver_misc_device_t)
>   ')
>   
> +########################################
> +## <summary>
> +##	Map X server miscellaneous devices.
> +## </summary>
> +## <param name="domain">
> +##	<summary>
> +##	Domain allowed access.
> +##	</summary>
> +## </param>
> +#
> +interface(`dev_map_xserver_misc',`
> +	gen_require(`
> +		type xserver_misc_device_t;
> +	')
> +
> +	allow $1 xserver_misc_device_t:chr_file map;
> +')
> +
>   ########################################
>   ## <summary>
>   ##	Read and write to the zero device (/dev/zero).
> diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
> index c1dbf0bf..1b25ff5c 100644
> --- a/policy/modules/services/xserver.if
> +++ b/policy/modules/services/xserver.if
> @@ -82,6 +82,7 @@ interface(`xserver_restricted_role',`
>   	allow $2 xserver_tmp_t:file { getattr read };
>   
>   	dev_rw_xserver_misc($2)
> +	dev_map_xserver_misc($2)
>   	dev_rw_power_management($2)
>   	dev_read_input($2)
>   	dev_read_misc($2)
> diff --git a/policy/modules/services/xserver.te b/policy/modules/services/xserver.te
> index 3b39bdd9..83e00c01 100644
> --- a/policy/modules/services/xserver.te
> +++ b/policy/modules/services/xserver.te
> @@ -749,6 +749,7 @@ dev_read_raw_memory(xserver_t)
>   dev_wx_raw_memory(xserver_t)
>   # for other device nodes such as the NVidia binary-only driver
>   dev_rw_xserver_misc(xserver_t)
> +dev_map_xserver_misc(xserver_t)
>   # read events - the synaptics touchpad driver reads raw events
>   dev_rw_input_dev(xserver_t)
>   dev_rwx_zero(xserver_t)
> diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
> index a72b31d0..f9320285 100644
> --- a/policy/modules/system/init.te
> +++ b/policy/modules/system/init.te
> @@ -635,6 +635,7 @@ dev_delete_generic_symlinks(initrc_t)
>   dev_getattr_all_blk_files(initrc_t)
>   dev_getattr_all_chr_files(initrc_t)
>   dev_rw_xserver_misc(initrc_t)
> +dev_map_xserver_misc(initrc_t)
>   
>   domain_kill_all_domains(initrc_t)
>   domain_signal_all_domains(initrc_t)

Merged.

-- 
Chris PeBenito

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0
  2018-07-10 15:03 ` [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0 Jason Zaman
@ 2018-07-11  0:08   ` Chris PeBenito
  0 siblings, 0 replies; 10+ messages in thread
From: Chris PeBenito @ 2018-07-11  0:08 UTC (permalink / raw)
  To: refpolicy

On 07/10/2018 11:03 AM, Jason Zaman wrote:
> The binary changed from /sbin/xtables-multi to xtables-legacy-multi and
> xtables-nft-multi
> ---
>   policy/modules/system/iptables.fc | 4 ++++
>   1 file changed, 4 insertions(+)
> 
> diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc
> index 32877b26..ba65e811 100644
> --- a/policy/modules/system/iptables.fc
> +++ b/policy/modules/system/iptables.fc
> @@ -20,7 +20,9 @@
>   /usr/bin/ipvsadm-save			--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   /usr/bin/nft				--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   /usr/bin/xtables-compat-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/bin/xtables-legacy-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   /usr/bin/xtables-multi			--	gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/bin/xtables-nft-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   
>   /usr/lib/systemd/system/[^/]*arptables.* --	gen_context(system_u:object_r:iptables_unit_t,s0)
>   /usr/lib/systemd/system/[^/]*ebtables.*	 --	gen_context(system_u:object_r:iptables_unit_t,s0)
> @@ -40,4 +42,6 @@
>   /usr/sbin/ipvsadm-save			--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   /usr/sbin/nft				--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   /usr/sbin/xtables-compat-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/sbin/xtables-legacy-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)
>   /usr/sbin/xtables-multi			--	gen_context(system_u:object_r:iptables_exec_t,s0)
> +/usr/sbin/xtables-nft-multi		--	gen_context(system_u:object_r:iptables_exec_t,s0)

Merged.

-- 
Chris PeBenito

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2018-07-11  0:08 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-07-10 15:03 [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Jason Zaman
2018-07-10 15:03 ` [refpolicy] [PATCH 2/5] mozilla: xdg updates Jason Zaman
2018-07-11  0:08   ` Chris PeBenito
2018-07-10 15:03 ` [refpolicy] [PATCH 3/5] xserver: label .cache/fontconfig as user_fonts_cache_t Jason Zaman
2018-07-11  0:08   ` Chris PeBenito
2018-07-10 15:03 ` [refpolicy] [PATCH 4/5] Allow map xserver_misc_device_t for nvidia driver Jason Zaman
2018-07-11  0:08   ` Chris PeBenito
2018-07-10 15:03 ` [refpolicy] [PATCH 5/5] iptables: fcontexts for 1.8.0 Jason Zaman
2018-07-11  0:08   ` Chris PeBenito
2018-07-11  0:08 ` [refpolicy] [PATCH 1/5] selinux: compute_access_vector requires creating netlink_selinux_sockets Chris PeBenito

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.