diff -ru /usr/src/se/policy/domains/admin.te ./domains/admin.te --- /usr/src/se/policy/domains/admin.te 2004-05-30 16:26:57.000000000 +1000 +++ ./domains/admin.te 2004-07-08 19:20:25.000000000 +1000 @@ -31,4 +31,3 @@ # Add/remove user home directories file_type_auto_trans(sysadm_t, home_root_t, user_home_dir_t, dir) -file_type_auto_trans(sysadm_t, user_home_dir_t, user_home_t) diff -ru /usr/src/se/policy/domains/program/checkpolicy.te ./domains/program/checkpolicy.te --- /usr/src/se/policy/domains/program/checkpolicy.te 2004-06-03 14:11:05.000000000 +1000 +++ ./domains/program/checkpolicy.te 2004-07-09 11:17:36.000000000 +1000 @@ -23,7 +23,7 @@ # able to create and modify binary policy files allow checkpolicy_t policy_config_t:dir rw_dir_perms; -allow checkpolicy_t policy_config_t:notdevfile_class_set create_file_perms; +allow checkpolicy_t policy_config_t:file create_file_perms; ########################### # constrain what checkpolicy can use as source files @@ -31,7 +31,7 @@ # only allow read of policy source files allow checkpolicy_t policy_src_t:dir r_dir_perms; -allow checkpolicy_t policy_src_t:notdevfile_class_set r_file_perms; +allow checkpolicy_t policy_src_t:{ file lnk_file } r_file_perms; # allow test policies to be created in src directories file_type_auto_trans(checkpolicy_t, policy_src_t, policy_config_t, file) diff -ru /usr/src/se/policy/domains/program/crond.te ./domains/program/crond.te --- /usr/src/se/policy/domains/program/crond.te 2004-07-11 17:37:09.000000000 +1000 +++ ./domains/program/crond.te 2004-07-09 07:17:19.000000000 +1000 @@ -61,7 +61,7 @@ allow crond_t cron_spool_t:file r_file_perms; # Read /etc/security/default_contexts. -r_dir_file( crond_t, default_context_t) +r_dir_file(crond_t, default_context_t) allow crond_t etc_t:file { getattr read }; allow crond_t etc_t:lnk_file read; @@ -147,7 +147,8 @@ ') # Stat any file and search any directory for find. -allow system_crond_t file_type:file_class_set getattr; +allow system_crond_t file_type:notdevfile_class_set getattr; +allow system_crond_t device_type:{ chr_file blk_file } getattr; allow system_crond_t file_type:dir { read search getattr }; # Create temporary files. diff -ru /usr/src/se/policy/domains/program/dmesg.te ./domains/program/dmesg.te --- /usr/src/se/policy/domains/program/dmesg.te 2004-06-17 15:10:38.000000000 +1000 +++ ./domains/program/dmesg.te 2004-07-04 18:17:42.000000000 +1000 @@ -9,7 +9,10 @@ # # dmesg_exec_t is the type of the dmesg executable. # -daemon_base_domain(dmesg) +# while sysadm_t has the sys_admin capability there is no point in using +# dmesg_t when run from sysadm_t, so we use nosysadm. +# +daemon_base_domain(dmesg, , `nosysadm') # # Rules used for dmesg