All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] [PATCH] Changes to the xserver policy module
@ 2012-10-17 12:28 Dominick Grift
  2012-10-19 13:20 ` Christopher J. PeBenito
  0 siblings, 1 reply; 2+ messages in thread
From: Dominick Grift @ 2012-10-17 12:28 UTC (permalink / raw)
  To: refpolicy


These interfaces are needed by at least plymouth

Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index 130ced9..15abcfa 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -713,6 +713,47 @@
 
 ########################################
 ## <summary>
+##	Create, read, write, and delete
+##	xdm_spool files.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`xserver_manage_spool_files_xdm',`
+	gen_require(`
+		type xdm_spool_t;
+	')
+
+	files_search_spool($1)
+	manage_files_pattern($1, xdm_spool_t, xdm_spool_t)
+')
+
+########################################
+## <summary>
+##	Read xdm process state files.
+## </summary>
+## <param name="domain">
+##	<summary>
+##	Domain allowed access.
+##	</summary>
+## </param>
+#
+interface(`xserver_read_state_xdm',`
+	gen_require(`
+		type xdm_t;
+	')
+
+	kernel_search_proc($1)
+	allow $1 xdm_t:dir list_dir_perms;
+	allow $1 xdm_t:file read_file_perms;
+	allow $1 xdm_t:lnk_file read_lnk_file_perms;
+')
+
+########################################
+## <summary>
 ##	Connect to XDM over a unix domain
 ##	stream socket.
 ## </summary>

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* [refpolicy] [PATCH] Changes to the xserver policy module
  2012-10-17 12:28 [refpolicy] [PATCH] Changes to the xserver policy module Dominick Grift
@ 2012-10-19 13:20 ` Christopher J. PeBenito
  0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2012-10-19 13:20 UTC (permalink / raw)
  To: refpolicy

On 10/17/12 08:28, Dominick Grift wrote:
> 
> These interfaces are needed by at least plymouth
> 
> Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
> diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
> index 130ced9..15abcfa 100644
> --- a/policy/modules/services/xserver.if
> +++ b/policy/modules/services/xserver.if
> @@ -713,6 +713,47 @@
>  
>  ########################################
>  ## <summary>
> +##	Create, read, write, and delete
> +##	xdm_spool files.
> +## </summary>
> +## <param name="domain">
> +##	<summary>
> +##	Domain allowed access.
> +##	</summary>
> +## </param>
> +#
> +interface(`xserver_manage_spool_files_xdm',`
> +	gen_require(`
> +		type xdm_spool_t;
> +	')
> +
> +	files_search_spool($1)
> +	manage_files_pattern($1, xdm_spool_t, xdm_spool_t)
> +')
> +
> +########################################
> +## <summary>
> +##	Read xdm process state files.
> +## </summary>
> +## <param name="domain">
> +##	<summary>
> +##	Domain allowed access.
> +##	</summary>
> +## </param>
> +#
> +interface(`xserver_read_state_xdm',`
> +	gen_require(`
> +		type xdm_t;
> +	')
> +
> +	kernel_search_proc($1)
> +	allow $1 xdm_t:dir list_dir_perms;
> +	allow $1 xdm_t:file read_file_perms;
> +	allow $1 xdm_t:lnk_file read_lnk_file_perms;
> +')

Merged.  I swapped the interfaces and renamed them.

-- 
Chris PeBenito
Tresys Technology, LLC
www.tresys.com | oss.tresys.com

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2012-10-19 13:20 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-10-17 12:28 [refpolicy] [PATCH] Changes to the xserver policy module Dominick Grift
2012-10-19 13:20 ` Christopher J. PeBenito

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.