rpms/selinux-policy/F-9 policy-20071130.patch, 1.214, 1.215 selinux-policy.spec, 1.710, 1.711

Daniel J Walsh dwalsh at fedoraproject.org
Tue Sep 23 20:09:58 UTC 2008


Author: dwalsh

Update of /cvs/extras/rpms/selinux-policy/F-9
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv12131

Modified Files:
	policy-20071130.patch selinux-policy.spec 
Log Message:
* Tue Sep 23 2008 Dan Walsh <dwalsh at redhat.com> 3.3.1-94
- Update to latest policy for NetworkManager 


policy-20071130.patch:

Index: policy-20071130.patch
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-9/policy-20071130.patch,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -r1.214 -r1.215
--- policy-20071130.patch	23 Sep 2008 14:04:56 -0000	1.214
+++ policy-20071130.patch	23 Sep 2008 20:09:57 -0000	1.215
@@ -15267,7 +15267,7 @@
  /var/run/dbus(/.*)?		gen_context(system_u:object_r:system_dbusd_var_run_t,s0)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dbus.if serefpolicy-3.3.1/policy/modules/services/dbus.if
 --- nsaserefpolicy/policy/modules/services/dbus.if	2008-06-12 23:38:02.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/dbus.if	2008-09-08 11:45:12.000000000 -0400
++++ serefpolicy-3.3.1/policy/modules/services/dbus.if	2008-09-23 15:34:07.000000000 -0400
 @@ -53,6 +53,7 @@
  	gen_require(`
  		type system_dbusd_exec_t, system_dbusd_t, dbusd_etc_t;
@@ -15479,7 +15479,7 @@
  ##	Read dbus configuration.
  ## </summary>
  ## <param name="domain">
-@@ -366,3 +431,73 @@
+@@ -366,3 +431,74 @@
  
  	allow $1 system_dbusd_t:dbus *;
  ')
@@ -15552,10 +15552,11 @@
 +	')
 +
 +	allow $1 system_dbusd_t:tcp_socket { read write };
++	allow $1 system_dbusd_t:fd use;
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dbus.te serefpolicy-3.3.1/policy/modules/services/dbus.te
 --- nsaserefpolicy/policy/modules/services/dbus.te	2008-06-12 23:38:01.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/dbus.te	2008-09-08 11:45:12.000000000 -0400
++++ serefpolicy-3.3.1/policy/modules/services/dbus.te	2008-09-23 15:32:58.000000000 -0400
 @@ -9,9 +9,10 @@
  #
  # Delcarations
@@ -15628,20 +15629,25 @@
  
  domain_use_interactive_fds(system_dbusd_t)
  
-@@ -91,6 +107,8 @@
+@@ -91,6 +107,9 @@
  
  init_use_fds(system_dbusd_t)
  init_use_script_ptys(system_dbusd_t)
 +init_dbus_chat_script(system_dbusd_t)
 +init_bin_domtrans_spec(system_dbusd_t)
++init_domtrans_script(system_dbusd_t)
  
  libs_use_ld_so(system_dbusd_t)
  libs_use_shared_libs(system_dbusd_t)
-@@ -121,9 +139,37 @@
+@@ -121,9 +140,37 @@
  ')
  
  optional_policy(`
-+	networkmanager_init_script_domtrans_spec(system_dbusd_t)
++	consolekit_dbus_chat(system_dbusd_t)
++')
++
++optional_policy(`
++	networkmanager_script_domtrans(system_dbusd_t)
 +')
 +
 +optional_policy(`
@@ -15658,10 +15664,6 @@
  ')
 +
 +optional_policy(`
-+	consolekit_dbus_chat(system_dbusd_t)
-+')
-+
-+optional_policy(`
 +	gen_require(`
 +		type unconfined_dbusd_t;
 +		attribute domain;
@@ -20330,24 +20332,36 @@
  #
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.fc serefpolicy-3.3.1/policy/modules/services/networkmanager.fc
 --- nsaserefpolicy/policy/modules/services/networkmanager.fc	2008-06-12 23:38:02.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/networkmanager.fc	2008-09-08 11:45:12.000000000 -0400
-@@ -1,7 +1,13 @@
++++ serefpolicy-3.3.1/policy/modules/services/networkmanager.fc	2008-09-23 15:27:49.000000000 -0400
+@@ -1,7 +1,16 @@
++/etc/NetworkManager/dispatcher\.d(/.*)	gen_context(system_u:object_r:NetworkManager_script_exec_t,s0)
++
++/sbin/wpa_supplicant		--	gen_context(system_u:object_r:NetworkManager_exec_t,s0)
++
  /usr/s?bin/NetworkManager	--	gen_context(system_u:object_r:NetworkManager_exec_t,s0)
  /usr/s?bin/wpa_supplicant	--	gen_context(system_u:object_r:NetworkManager_exec_t,s0)
 +/usr/sbin/NetworkManagerDispatcher	--	gen_context(system_u:object_r:NetworkManager_exec_t,s0)
 +/usr/sbin/nm-system-settings	--	gen_context(system_u:object_r:NetworkManager_exec_t,s0)
++
++/var/log/wpa_supplicant.*	--	gen_context(system_u:object_r:NetworkManager_log_t,s0)
  
  /var/run/NetworkManager\.pid	--	gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
  /var/run/NetworkManager(/.*)?		gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
  /var/run/wpa_supplicant(/.*)?		gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
  /var/run/wpa_supplicant-global	-s	gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
 +/var/run/nm-dhclient.*			gen_context(system_u:object_r:NetworkManager_var_run_t,s0)
-+
-+/var/log/wpa_supplicant\.log.*	--	gen_context(system_u:object_r:NetworkManager_log_t,s0)
-+/etc/NetworkManager/dispatcher.d(/.*)	gen_context(system_u:object_r:NetworkManager_script_exec_t,s0)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.if serefpolicy-3.3.1/policy/modules/services/networkmanager.if
 --- nsaserefpolicy/policy/modules/services/networkmanager.if	2008-06-12 23:38:01.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/networkmanager.if	2008-09-08 11:45:12.000000000 -0400
++++ serefpolicy-3.3.1/policy/modules/services/networkmanager.if	2008-09-23 15:27:57.000000000 -0400
+@@ -74,7 +74,7 @@
+ 	')
+ 
+ 	corecmd_search_bin($1)
+-	domtrans_pattern($1,NetworkManager_exec_t,NetworkManager_t)
++	domtrans_pattern($1, NetworkManager_exec_t, NetworkManager_t)
+ ')
+ 
+ ########################################
 @@ -97,3 +97,58 @@
  	allow $1 NetworkManager_t:dbus send_msg;
  	allow NetworkManager_t $1:dbus send_msg;
@@ -20381,7 +20395,7 @@
 +##	</summary>
 +## </param>
 +#
-+interface(`networkmanager_init_script_domtrans_spec',`
++interface(`networkmanager_script_domtrans',`
 +	gen_require(`
 +		type NetworkManager_script_exec_t;
 +	')
@@ -20405,44 +20419,66 @@
 +	')
 +
 +	files_search_pids($1)
-+	read_files_pattern($1, NetworkManager_var_run_t, NetworkManager_var_run_t)
++	allow $1 NetworkManager_var_run_t:file read_file_perms;
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/networkmanager.te serefpolicy-3.3.1/policy/modules/services/networkmanager.te
 --- nsaserefpolicy/policy/modules/services/networkmanager.te	2008-06-12 23:38:02.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/networkmanager.te	2008-09-08 11:45:12.000000000 -0400
-@@ -13,6 +13,13 @@
- type NetworkManager_var_run_t;
- files_pid_file(NetworkManager_var_run_t)
++++ serefpolicy-3.3.1/policy/modules/services/networkmanager.te	2008-09-23 16:07:05.000000000 -0400
+@@ -1,5 +1,5 @@
  
+-policy_module(networkmanager,1.9.0)
++policy_module(networkmanager, 1.10.2)
+ 
+ ########################################
+ #
+@@ -8,7 +8,16 @@
+ 
+ type NetworkManager_t;
+ type NetworkManager_exec_t;
+-init_daemon_domain(NetworkManager_t,NetworkManager_exec_t)
++init_daemon_domain(NetworkManager_t, NetworkManager_exec_t)
++
 +type NetworkManager_log_t;
 +logging_log_file(NetworkManager_log_t)
 +
 +type NetworkManager_script_exec_t;
 +init_script_file(NetworkManager_script_exec_t)
-+init_script_domtrans_spec(NetworkManager_t, NetworkManager_script_exec_t)
 +
- ########################################
- #
- # Local policy
-@@ -20,9 +27,9 @@
++type NetworkManager_tmp_t;
++files_tmp_file(NetworkManager_tmp_t)
+ 
+ type NetworkManager_var_run_t;
+ files_pid_file(NetworkManager_var_run_t)
+@@ -20,9 +29,9 @@
  
  # networkmanager will ptrace itself if gdb is installed
  # and it receives a unexpected signal (rh bug #204161) 
 -allow NetworkManager_t self:capability { kill setgid setuid sys_nice dac_override net_admin net_raw net_bind_service ipc_lock };
-+allow NetworkManager_t self:capability { chown fsetid kill setgid setuid sys_nice dac_override net_admin net_raw net_bind_service ipc_lock };
++allow NetworkManager_t self:capability { chown fsetid kill setgid setuid sys_admin sys_nice dac_override net_admin net_raw net_bin_dservice ipc_lock };
  dontaudit NetworkManager_t self:capability { sys_tty_config sys_ptrace };
 -allow NetworkManager_t self:process { ptrace setcap setpgid getsched signal_perms };
 +allow NetworkManager_t self:process { ptrace getcap setcap setpgid getsched setsched signal_perms };
  allow NetworkManager_t self:fifo_file rw_fifo_file_perms;
  allow NetworkManager_t self:unix_dgram_socket { sendto create_socket_perms };
  allow NetworkManager_t self:unix_stream_socket create_stream_socket_perms;
-@@ -38,10 +45,14 @@
- manage_sock_files_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
+@@ -33,15 +42,22 @@
+ 
+ can_exec(NetworkManager_t, NetworkManager_exec_t)
+ 
+-manage_dirs_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
+-manage_files_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
+-manage_sock_files_pattern(NetworkManager_t,NetworkManager_var_run_t,NetworkManager_var_run_t)
++manage_files_pattern(NetworkManager_t, NetworkManager_log_t, NetworkManager_log_t)
++logging_log_filetrans(NetworkManager_t, NetworkManager_log_t, file)
++
++manage_sock_files_pattern(NetworkManager_t, NetworkManager_tmp_t, NetworkManager_tmp_t)
++files_tmp_filetrans(NetworkManager_t, NetworkManager_tmp_t, sock_file)
++
++manage_dirs_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
++manage_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
++manage_sock_files_pattern(NetworkManager_t, NetworkManager_var_run_t, NetworkManager_var_run_t)
  files_pid_filetrans(NetworkManager_t,NetworkManager_var_run_t, { dir file sock_file })
  
-+manage_files_pattern(NetworkManager_t,NetworkManager_log_t,NetworkManager_log_t)
-+logging_log_filetrans(NetworkManager_t,NetworkManager_log_t, file)
-+
  kernel_read_system_state(NetworkManager_t)
  kernel_read_network_state(NetworkManager_t)
  kernel_read_kernel_sysctls(NetworkManager_t)
@@ -20451,7 +20487,7 @@
  
  corenet_all_recvfrom_unlabeled(NetworkManager_t)
  corenet_all_recvfrom_netlabel(NetworkManager_t)
-@@ -64,9 +75,11 @@
+@@ -64,9 +80,11 @@
  dev_read_sysfs(NetworkManager_t)
  dev_read_rand(NetworkManager_t)
  dev_read_urand(NetworkManager_t)
@@ -20463,14 +20499,12 @@
  
  mls_file_read_all_levels(NetworkManager_t)
  
-@@ -82,10 +95,16 @@
- files_read_etc_files(NetworkManager_t)
+@@ -83,9 +101,14 @@
  files_read_etc_runtime_files(NetworkManager_t)
  files_read_usr_files(NetworkManager_t)
-+files_list_tmp(NetworkManager_t)
-+
-+storage_getattr_fixed_disk_dev(NetworkManager_t)
  
++storage_getattr_fixed_disk_dev(NetworkManager_t)
++
  init_read_utmp(NetworkManager_t)
 +init_dontaudit_write_utmp(NetworkManager_t)
  init_domtrans_script(NetworkManager_t)
@@ -20480,23 +20514,29 @@
  libs_use_ld_so(NetworkManager_t)
  libs_use_shared_libs(NetworkManager_t)
  
-@@ -113,6 +132,9 @@
+@@ -109,10 +132,14 @@
+ sysnet_etc_filetrans_config(NetworkManager_t)
+ 
+ userdom_dontaudit_use_unpriv_user_fds(NetworkManager_t)
+-userdom_dontaudit_search_sysadm_home_dirs(NetworkManager_t)
  userdom_dontaudit_use_unpriv_users_ttys(NetworkManager_t)
  # Read gnome-keyring
  userdom_read_unpriv_users_home_content_files(NetworkManager_t)
 +userdom_unpriv_users_stream_connect(NetworkManager_t)
 +
++userdom_dontaudit_search_sysadm_home_dirs(NetworkManager_t)
++
 +cron_read_system_job_lib_files(NetworkManager_t)
  
  optional_policy(`
  	bind_domtrans(NetworkManager_t)
-@@ -129,21 +151,21 @@
+@@ -129,21 +156,26 @@
  ')
  
  optional_policy(`
 -	dbus_system_bus_client_template(NetworkManager,NetworkManager_t)
 -	dbus_connect_system_bus(NetworkManager_t)
-+	dbus_system_domain(NetworkManager_t,NetworkManager_exec_t)
++	dbus_system_domain(NetworkManager_t, NetworkManager_exec_t)
  ')
  
  optional_policy(`
@@ -20511,14 +20551,23 @@
  
  optional_policy(`
 -	nscd_socket_use(NetworkManager_t)
++	nscd_domtrans(NetworkManager_t)
  	nscd_signal(NetworkManager_t)
 +	nscd_script_domtrans(NetworkManager_t)
-+	nscd_domtrans(NetworkManager_t)
++')
++
++optional_policy(`
++	# Dispatcher starting and stoping ntp
++	ntp_script_domtrans(NetworkManager_t)
  ')
  
  optional_policy(`
-@@ -155,19 +177,21 @@
- 	ppp_domtrans(NetworkManager_t)
+@@ -152,22 +184,25 @@
+ ')
+ 
+ optional_policy(`
+-	ppp_domtrans(NetworkManager_t)
++	ppp_script_domtrans(NetworkManager_t)
  	ppp_read_pid_files(NetworkManager_t)
  	ppp_signal(NetworkManager_t)
 +	ppp_signull(NetworkManager_t)
@@ -20527,8 +20576,9 @@
  
  optional_policy(`
 -	seutil_sigchld_newrole(NetworkManager_t)
-+	# Dispatcher starting and stoping ntp
-+	ntp_script_domtrans(NetworkManager_t)
++	rpm_exec(NetworkManager_t)
++	rpm_read_db(NetworkManager_t)
++	rpm_dontaudit_manage_db(NetworkManager_t)
  ')
  
  optional_policy(`
@@ -23461,17 +23511,20 @@
  
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ppp.fc serefpolicy-3.3.1/policy/modules/services/ppp.fc
 --- nsaserefpolicy/policy/modules/services/ppp.fc	2008-06-12 23:38:01.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/ppp.fc	2008-09-08 11:45:12.000000000 -0400
-@@ -33,3 +33,5 @@
- 
- /var/log/ppp-connect-errors.*	--	gen_context(system_u:object_r:pppd_log_t,s0)
- /var/log/ppp/.*			--	gen_context(system_u:object_r:pppd_log_t,s0)
-+
++++ serefpolicy-3.3.1/policy/modules/services/ppp.fc	2008-09-23 15:54:31.000000000 -0400
+@@ -1,6 +1,8 @@
+ #
+ # /etc
+ #
 +/etc/rc\.d/init\.d/ppp	--	gen_context(system_u:object_r:pppd_script_exec_t,s0)
++
+ /etc/ppp			-d	gen_context(system_u:object_r:pppd_etc_t,s0)
+ /etc/ppp(/.*)?			--	gen_context(system_u:object_r:pppd_etc_rw_t,s0)
+ /etc/ppp/peers(/.*)?			gen_context(system_u:object_r:pppd_etc_rw_t,s0)
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ppp.if serefpolicy-3.3.1/policy/modules/services/ppp.if
 --- nsaserefpolicy/policy/modules/services/ppp.if	2008-06-12 23:38:01.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/ppp.if	2008-09-08 11:45:12.000000000 -0400
-@@ -95,6 +95,24 @@
++++ serefpolicy-3.3.1/policy/modules/services/ppp.if	2008-09-23 15:53:51.000000000 -0400
+@@ -76,6 +76,24 @@
  
  ########################################
  ## <summary>
@@ -23493,16 +23546,62 @@
 +
 +########################################
 +## <summary>
- ##	 Conditionally execute ppp daemon on behalf of a user or staff type.
+ ##	 Execute domain in the ppp domain.
  ## </summary>
  ## <param name="domain">
-@@ -297,38 +315,42 @@
+@@ -102,6 +120,16 @@
+ ##	 Domain allowed access.
+ ##	</summary>
+ ## </param>
++## <param name="role">
++##	<summary>
++##	The role to allow the ppp domain.
++##	</summary>
++## </param>
++## <param name="terminal">
++##	<summary>
++##	The type of the terminal allow the ppp domain to use.
++##	</summary>
++## </param>
+ ## <rolecap/>
+ #
+ interface(`ppp_run_cond',`
+@@ -272,6 +300,24 @@
+ 
+ ########################################
+ ## <summary>
++##	Execute ppp server in the ntpd domain.
++## </summary>
++## <param name="domain">
++##	<summary>
++##	The type of the process performing this action.
++##	</summary>
++## </param>
++#
++interface(`ppp_script_domtrans',`
++	gen_require(`
++		type pppd_script_exec_t;
++	')
++
++	init_script_domtrans_spec($1, pppd_script_exec_t)
++')
++
++########################################
++## <summary>
+ ##	All of the rules required to administrate 
+ ##	an ppp environment
+ ## </summary>
+@@ -295,40 +341,51 @@
+ interface(`ppp_admin',`
+ 	gen_require(`
  		type pppd_t, pppd_tmp_t, pppd_log_t, pppd_lock_t;
- 		type pppd_etc_t, pppd_script_t, pppd_secret_t;
- 		type pppd_etc_rw_t, pppd_var_lib_t, pppd_var_run_t;
--
+-		type pppd_etc_t, pppd_script_t, pppd_secret_t;
+-		type pppd_etc_rw_t, pppd_var_lib_t, pppd_var_run_t;
++		type pppd_etc_t, pppd_secret_t;
++		type pppd_etc_rw_t, pppd_var_run_t;
+ 
  		type pptp_t, pptp_log_t, pptp_var_run_t;
-+		type pppd_script_exec_t;
++ 		type pppd_script_exec_t;
  	')
  
  	allow $1 pppd_t:process { ptrace signal_perms getattr };
@@ -23511,6 +23610,12 @@
 +	allow $1 pptp_t:process { ptrace signal_perms getattr };
 +	ps_process_pattern($1, pptp_t)
 +
++	# Allow admin domain to restart the pppd_t service
++	ppp_script_domtrans($1)
++	domain_system_change_exemption($1)
++	role_transition $2 pppd_script_exec_t system_r;
++	allow $2 system_r;
++
  	files_list_tmp($1)
 -	manage_files_pattern($1, pppd_tmp_t, pppd_tmp_t)
 +        manage_all_pattern($1,pppd_tmp_t)
@@ -23518,22 +23623,22 @@
  	logging_list_logs($1)
 -	manage_files_pattern($1, pppd_log_t, pppd_log_t)
 +        manage_all_pattern($1,pppd_log_t)
++
++        manage_all_pattern($1,pptp_log_t)
  
 -	manage_files_pattern($1, pppd_lock_t, pppd_lock_t)
-+        manage_all_pattern($1,pptp_log_t)
-+
 +        manage_all_pattern($1,pppd_lock_t)
  
  	files_list_etc($1)
 -	manage_files_pattern($1, pppd_etc_t, pppd_etc_t)
 +	manage_all_pattern($1,pppd_etc_t)
-+
-+	manage_all_pattern($1,pppd_etc_rw_t)
  
 -	manage_files_pattern($1, pppd_etc_rw_t, pppd_etc_rw_t)
-+	manage_all_pattern($1,pppd_secret_t)
++	manage_all_pattern($1,pppd_etc_rw_t)
  
 -	manage_files_pattern($1, pppd_secret_t, pppd_secret_t)
++	manage_all_pattern($1,pppd_secret_t)
++
 +	manage_all_pattern($1,pppd_script_exec_t)
  
  	files_list_var_lib($1)
@@ -28744,7 +28849,7 @@
 +')
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/squid.te serefpolicy-3.3.1/policy/modules/services/squid.te
 --- nsaserefpolicy/policy/modules/services/squid.te	2008-06-12 23:38:01.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/services/squid.te	2008-09-08 11:45:13.000000000 -0400
++++ serefpolicy-3.3.1/policy/modules/services/squid.te	2008-09-23 15:23:50.000000000 -0400
 @@ -31,12 +31,15 @@
  type squid_var_run_t;
  files_pid_file(squid_var_run_t)
@@ -28795,7 +28900,11 @@
  
  libs_use_ld_so(squid_t)
  libs_use_shared_libs(squid_t)
-@@ -148,11 +156,7 @@
+@@ -145,14 +153,11 @@
+ 
+ tunable_policy(`squid_connect_any',`
+ 	corenet_tcp_connect_all_ports(squid_t)
++	corenet_tcp_bind_all_ports(squid_t)
  ')
  
  optional_policy(`
@@ -28808,7 +28917,7 @@
  ')
  
  optional_policy(`
-@@ -167,7 +171,12 @@
+@@ -167,7 +172,12 @@
  	udev_read_db(squid_t)
  ')
  
@@ -32875,7 +32984,7 @@
 +
 diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/init.te serefpolicy-3.3.1/policy/modules/system/init.te
 --- nsaserefpolicy/policy/modules/system/init.te	2008-06-12 23:38:01.000000000 -0400
-+++ serefpolicy-3.3.1/policy/modules/system/init.te	2008-09-08 11:45:13.000000000 -0400
++++ serefpolicy-3.3.1/policy/modules/system/init.te	2008-09-23 15:44:00.000000000 -0400
 @@ -10,6 +10,20 @@
  # Declarations
  #
@@ -33054,7 +33163,15 @@
  
  selinux_get_enforce_mode(initrc_t)
  
-@@ -496,6 +535,31 @@
+@@ -352,6 +391,7 @@
+ libs_use_shared_libs(initrc_t)
+ libs_exec_lib_files(initrc_t)
+ 
++logging_send_audit_msgs(initrc_t)
+ logging_send_syslog_msg(initrc_t)
+ logging_manage_generic_logs(initrc_t)
+ logging_read_all_logs(initrc_t)
+@@ -496,6 +536,31 @@
  	')
  ')
  
@@ -33086,7 +33203,7 @@
  optional_policy(`
  	amavis_search_lib(initrc_t)
  	amavis_setattr_pid_files(initrc_t)
-@@ -554,16 +618,12 @@
+@@ -554,16 +619,12 @@
  	dbus_read_config(initrc_t)
  
  	optional_policy(`
@@ -33107,7 +33224,7 @@
  ')
  
  optional_policy(`
-@@ -639,12 +699,6 @@
+@@ -639,12 +700,6 @@
  	mta_read_config(initrc_t)
  	mta_dontaudit_read_spool_symlinks(initrc_t)
  ')
@@ -33120,7 +33237,7 @@
  
  optional_policy(`
  	ifdef(`distro_redhat',`
-@@ -705,6 +759,9 @@
+@@ -705,6 +760,9 @@
  
  	# why is this needed:
  	rpm_manage_db(initrc_t)
@@ -33130,7 +33247,7 @@
  ')
  
  optional_policy(`
-@@ -717,9 +774,11 @@
+@@ -717,9 +775,11 @@
  	squid_manage_logs(initrc_t)
  ')
  
@@ -33145,7 +33262,7 @@
  ')
  
  optional_policy(`
-@@ -738,6 +797,11 @@
+@@ -738,6 +798,11 @@
  	uml_setattr_util_sockets(initrc_t)
  ')
  
@@ -33157,7 +33274,7 @@
  optional_policy(`
  	unconfined_domain(initrc_t)
  
-@@ -752,6 +816,10 @@
+@@ -752,6 +817,10 @@
  ')
  
  optional_policy(`
@@ -33168,7 +33285,7 @@
  	vmware_read_system_config(initrc_t)
  	vmware_append_system_config(initrc_t)
  ')
-@@ -774,3 +842,4 @@
+@@ -774,3 +843,4 @@
  optional_policy(`
  	zebra_read_config(initrc_t)
  ')


Index: selinux-policy.spec
===================================================================
RCS file: /cvs/extras/rpms/selinux-policy/F-9/selinux-policy.spec,v
retrieving revision 1.710
retrieving revision 1.711
diff -u -r1.710 -r1.711
--- selinux-policy.spec	23 Sep 2008 13:27:34 -0000	1.710
+++ selinux-policy.spec	23 Sep 2008 20:09:58 -0000	1.711
@@ -17,7 +17,7 @@
 Summary: SELinux policy configuration
 Name: selinux-policy
 Version: 3.3.1
-Release: 93%{?dist}
+Release: 94%{?dist}
 License: GPLv2+
 Group: System Environment/Base
 Source: serefpolicy-%{version}.tgz
@@ -386,6 +386,9 @@
 %endif
 
 %changelog
+* Tue Sep 23 2008 Dan Walsh <dwalsh at redhat.com> 3.3.1-94
+- Update to latest policy for NetworkManager 
+
 * Mon Sep 22 2008 Dan Walsh <dwalsh at redhat.com> 3.3.1-93
 - Add /dev/msp* support
 - Update prewikka support




More information about the fedora-extras-commits mailing list