forked from pool/selinux-policy
44 lines
1.5 KiB
Diff
44 lines
1.5 KiB
Diff
|
Index: serefpolicy-20140730/policy/modules/system/systemd.te
|
||
|
===================================================================
|
||
|
--- serefpolicy-20140730.orig/policy/modules/system/systemd.te
|
||
|
+++ serefpolicy-20140730/policy/modules/system/systemd.te
|
||
|
@@ -320,6 +320,11 @@ dev_read_cpu_online(systemd_tmpfiles_t)
|
||
|
dev_manage_all_dev_nodes(systemd_tmpfiles_t)
|
||
|
dev_relabel_all_dev_nodes(systemd_tmpfiles_t)
|
||
|
|
||
|
+# allow tmpfiles to create files/dirs in /dev
|
||
|
+systemd_tmpfiles_xconsole_create(systemd_tmpfiles_t)
|
||
|
+dev_getattr_autofs_dev(systemd_tmpfiles_t);
|
||
|
+dev_getattr_lvm_control(systemd_tmpfiles_t);
|
||
|
+dev_create_generic_dirs(systemd_tmpfiles_t);
|
||
|
domain_obj_id_change_exemption(systemd_tmpfiles_t)
|
||
|
|
||
|
# systemd-tmpfiles relabel /run/lock and creates /run/lock/lockdev
|
||
|
Index: serefpolicy-20140730/policy/modules/system/systemd.if
|
||
|
===================================================================
|
||
|
--- serefpolicy-20140730.orig/policy/modules/system/systemd.if
|
||
|
+++ serefpolicy-20140730/policy/modules/system/systemd.if
|
||
|
@@ -1458,3 +1458,22 @@ interface(`systemd_dontaudit_dbus_chat',
|
||
|
|
||
|
dontaudit $1 systemd_domain:dbus send_msg;
|
||
|
')
|
||
|
+
|
||
|
+########################################
|
||
|
+## <summary>
|
||
|
+## Allow systemd-tmpfiles to create xconsole_device_t
|
||
|
+## </summary>
|
||
|
+## <param name="domain">
|
||
|
+## <summary>
|
||
|
+## Domain to not audit.
|
||
|
+## </summary>
|
||
|
+## </param>
|
||
|
+#
|
||
|
+interface(`systemd_tmpfiles_xconsole_create',`
|
||
|
+ gen_require(`
|
||
|
+ type device_t, xconsole_device_t;
|
||
|
+ ')
|
||
|
+
|
||
|
+ create_fifo_files_pattern($1, device_t, xconsole_device_t);
|
||
|
+')
|
||
|
+
|