1 |
commit: e830cfda08709f50e13176b45de8c801cb155cff |
2 |
Author: Jason Zaman <jason <AT> perfinion <DOT> com> |
3 |
AuthorDate: Wed Jun 1 16:12:38 2016 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Jun 1 18:31:01 2016 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=e830cfda |
7 |
|
8 |
consolekit: allow managing user runtime |
9 |
|
10 |
policy/modules/contrib/consolekit.te | 16 ++++++++++++++-- |
11 |
1 file changed, 14 insertions(+), 2 deletions(-) |
12 |
|
13 |
diff --git a/policy/modules/contrib/consolekit.te b/policy/modules/contrib/consolekit.te |
14 |
index cd02890..e02e105 100644 |
15 |
--- a/policy/modules/contrib/consolekit.te |
16 |
+++ b/policy/modules/contrib/consolekit.te |
17 |
@@ -24,8 +24,8 @@ init_daemon_pid_file(consolekit_var_run_t, dir, "ConsoleKit") |
18 |
# Local policy |
19 |
# |
20 |
|
21 |
-allow consolekit_t self:capability { chown setuid setgid sys_tty_config dac_override sys_nice sys_ptrace }; |
22 |
-allow consolekit_t self:process { getsched signal }; |
23 |
+allow consolekit_t self:capability { chown fowner setuid setgid sys_admin sys_tty_config dac_override sys_nice sys_ptrace }; |
24 |
+allow consolekit_t self:process { getsched signal setfscreate }; |
25 |
allow consolekit_t self:fifo_file rw_fifo_file_perms; |
26 |
allow consolekit_t self:unix_stream_socket { accept listen }; |
27 |
|
28 |
@@ -61,9 +61,15 @@ files_read_var_lib_files(consolekit_t) |
29 |
files_search_all_mountpoints(consolekit_t) |
30 |
|
31 |
fs_list_inotifyfs(consolekit_t) |
32 |
+fs_mount_tmpfs(consolekit_t) |
33 |
+fs_unmount_tmpfs(consolekit_t) |
34 |
+fs_relabelfrom_tmpfs(consolekit_t) |
35 |
|
36 |
mcs_ptrace_all(consolekit_t) |
37 |
|
38 |
+seutil_libselinux_linked(consolekit_t) |
39 |
+seutil_read_file_contexts(consolekit_t) |
40 |
+ |
41 |
term_use_all_terms(consolekit_t) |
42 |
|
43 |
auth_use_nsswitch(consolekit_t) |
44 |
@@ -79,6 +85,12 @@ miscfiles_read_localization(consolekit_t) |
45 |
|
46 |
userdom_dontaudit_read_user_home_content_files(consolekit_t) |
47 |
userdom_read_user_tmp_files(consolekit_t) |
48 |
+userdom_manage_user_runtime_root_dirs(consolekit_t) |
49 |
+userdom_manage_user_runtime_dirs(consolekit_t) |
50 |
+userdom_mounton_user_runtime_dirs(consolekit_t) |
51 |
+userdom_relabelto_user_runtime_dirs(consolekit_t) |
52 |
+userdom_pid_filetrans_user_runtime_root(consolekit_t, dir, "user") |
53 |
+userdom_user_runtime_root_filetrans_user_runtime(consolekit_t, dir) |
54 |
|
55 |
tunable_policy(`use_nfs_home_dirs',` |
56 |
fs_read_nfs_files(consolekit_t) |