-##
--## Do a domain transition to the specified
--## domain when executing a program in the
--## user home directory.
+##
+##
+## Domain allowed access.
@@ -56629,13 +56811,10 @@ index 28b88de..c68006d 100644
+##
+##
+##
-+## Do a domain transition to the specified
-+## domain when executing a program in the
-+## user home directory.
- ##
- ##
- ## No interprocess communication (signals, pipes,
-@@ -1589,6 +1928,8 @@ interface(`userdom_dontaudit_search_user_home_content',`
+ ## Do a domain transition to the specified
+ ## domain when executing a program in the
+ ## user home directory.
+@@ -1589,6 +1932,8 @@ interface(`userdom_dontaudit_search_user_home_content',`
')
dontaudit $1 user_home_t:dir search_dir_perms;
@@ -56644,7 +56823,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -1603,10 +1944,12 @@ interface(`userdom_dontaudit_search_user_home_content',`
+@@ -1603,10 +1948,12 @@ interface(`userdom_dontaudit_search_user_home_content',`
#
interface(`userdom_list_user_home_content',`
gen_require(`
@@ -56659,7 +56838,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -1649,6 +1992,25 @@ interface(`userdom_delete_user_home_content_dirs',`
+@@ -1649,6 +1996,25 @@ interface(`userdom_delete_user_home_content_dirs',`
########################################
##
@@ -56685,7 +56864,7 @@ index 28b88de..c68006d 100644
## Do not audit attempts to set the
## attributes of user home files.
##
-@@ -1700,12 +2062,32 @@ interface(`userdom_read_user_home_content_files',`
+@@ -1700,12 +2066,32 @@ interface(`userdom_read_user_home_content_files',`
type user_home_dir_t, user_home_t;
')
@@ -56718,7 +56897,7 @@ index 28b88de..c68006d 100644
## Do not audit attempts to read user home files.
##
##
-@@ -1716,11 +2098,14 @@ interface(`userdom_read_user_home_content_files',`
+@@ -1716,11 +2102,14 @@ interface(`userdom_read_user_home_content_files',`
#
interface(`userdom_dontaudit_read_user_home_content_files',`
gen_require(`
@@ -56736,7 +56915,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -1810,8 +2195,7 @@ interface(`userdom_read_user_home_content_symlinks',`
+@@ -1810,8 +2199,7 @@ interface(`userdom_read_user_home_content_symlinks',`
type user_home_dir_t, user_home_t;
')
@@ -56746,7 +56925,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -1827,21 +2211,15 @@ interface(`userdom_read_user_home_content_symlinks',`
+@@ -1827,20 +2215,14 @@ interface(`userdom_read_user_home_content_symlinks',`
#
interface(`userdom_exec_user_home_content_files',`
gen_require(`
@@ -56760,19 +56939,18 @@ index 28b88de..c68006d 100644
-
- tunable_policy(`use_nfs_home_dirs',`
- fs_exec_nfs_files($1)
+- ')
+-
+- tunable_policy(`use_samba_home_dirs',`
+- fs_exec_cifs_files($1)
+ exec_files_pattern($1, { user_home_dir_t user_home_type }, user_home_type)
+ dontaudit $1 user_home_type:sock_file execute;
')
-
-- tunable_policy(`use_samba_home_dirs',`
-- fs_exec_cifs_files($1)
-- ')
-')
--
+
########################################
##
- ## Do not audit attempts to execute user home files.
-@@ -2182,7 +2560,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',`
+@@ -2182,7 +2564,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',`
type user_tmp_t;
')
@@ -56781,7 +56959,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -2435,13 +2813,14 @@ interface(`userdom_read_user_tmpfs_files',`
+@@ -2435,13 +2817,14 @@ interface(`userdom_read_user_tmpfs_files',`
')
read_files_pattern($1, user_tmpfs_t, user_tmpfs_t)
@@ -56797,7 +56975,7 @@ index 28b88de..c68006d 100644
##
##
##
-@@ -2462,26 +2841,6 @@ interface(`userdom_rw_user_tmpfs_files',`
+@@ -2462,26 +2845,6 @@ interface(`userdom_rw_user_tmpfs_files',`
########################################
##
@@ -56824,7 +57002,7 @@ index 28b88de..c68006d 100644
## Get the attributes of a user domain tty.
##
##
-@@ -2572,6 +2931,24 @@ interface(`userdom_use_user_ttys',`
+@@ -2572,6 +2935,24 @@ interface(`userdom_use_user_ttys',`
########################################
##
@@ -56849,7 +57027,7 @@ index 28b88de..c68006d 100644
## Read and write a user domain pty.
##
##
-@@ -2590,22 +2967,34 @@ interface(`userdom_use_user_ptys',`
+@@ -2590,22 +2971,34 @@ interface(`userdom_use_user_ptys',`
########################################
##
@@ -56892,7 +57070,7 @@ index 28b88de..c68006d 100644
##
##
##
-@@ -2614,14 +3003,13 @@ interface(`userdom_use_user_ptys',`
+@@ -2614,14 +3007,33 @@ interface(`userdom_use_user_ptys',`
##
##
#
@@ -56907,10 +57085,30 @@ index 28b88de..c68006d 100644
- term_list_ptys($1)
+ allow $1 user_tty_device_t:chr_file rw_inherited_term_perms;
+ allow $1 user_devpts_t:chr_file rw_inherited_term_perms;
++')
++
++#######################################
++##
++## Allow attempts to read and write
++## a user domain tty and pty.
++##
++##
++##
++## Domain to not audit.
++##
++##
++#
++interface(`userdom_use_user_terminals',`
++ gen_require(`
++ type user_tty_device_t, user_devpts_t;
++ ')
++
++ allow $1 user_tty_device_t:chr_file rw_term_perms;
++ allow $1 user_devpts_t:chr_file rw_term_perms;
')
########################################
-@@ -2815,7 +3203,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
+@@ -2815,7 +3227,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
domain_entry_file_spec_domtrans($1, unpriv_userdomain)
allow unpriv_userdomain $1:fd use;
@@ -56919,7 +57117,7 @@ index 28b88de..c68006d 100644
allow unpriv_userdomain $1:process sigchld;
')
-@@ -2831,11 +3219,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
+@@ -2831,11 +3243,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',`
#
interface(`userdom_search_user_home_content',`
gen_require(`
@@ -56935,7 +57133,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -2917,7 +3307,7 @@ interface(`userdom_dontaudit_use_user_ptys',`
+@@ -2917,7 +3331,7 @@ interface(`userdom_dontaudit_use_user_ptys',`
type user_devpts_t;
')
@@ -56944,7 +57142,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -2972,7 +3362,45 @@ interface(`userdom_write_user_tmp_files',`
+@@ -2972,7 +3386,45 @@ interface(`userdom_write_user_tmp_files',`
type user_tmp_t;
')
@@ -56991,7 +57189,7 @@ index 28b88de..c68006d 100644
')
########################################
-@@ -3009,6 +3437,7 @@ interface(`userdom_read_all_users_state',`
+@@ -3009,6 +3461,7 @@ interface(`userdom_read_all_users_state',`
')
read_files_pattern($1, userdomain, userdomain)
@@ -56999,7 +57197,7 @@ index 28b88de..c68006d 100644
kernel_search_proc($1)
')
-@@ -3139,3 +3568,1058 @@ interface(`userdom_dbus_send_all_users',`
+@@ -3139,3 +3592,1058 @@ interface(`userdom_dbus_send_all_users',`
allow $1 userdomain:dbus send_msg;
')
diff --git a/selinux-policy.spec b/selinux-policy.spec
index ba5a03d..4938235 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -21,7 +21,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.9.16
-Release: 6%{?dist}
+Release: 7%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -472,6 +472,22 @@ exit 0
%endif
%changelog
+* Fri Mar 25 2011 Miroslav Grepl 3.9.16-7
+- Allow $1_sudo_t and $1_su_t open access to user terminals
+- Allow initrc_t to use generic terminals
+- Make Makefile/Rules.modular run sepolgen-ifgen during build to check if files for bugs
+-systemd is going to be useing /run and /run/lock for early bootup files.
+- Fix some comments in rlogin.if
+- Add policy for KDE backlighthelper
+- sssd needs to read ~/.k5login in nfs, cifs or fusefs file systems
+- sssd wants to read .k5login file in users homedir
+- setroubleshoot reads executables to see if they have TEXTREL
+- Add /var/spool/audit support for new version of audit
+- Remove kerberos_connect_524() interface calling
+- Combine kerberos_master_port_t and kerberos_port_t
+- systemd has setup /dev/kmsg as stderr for apps it executes
+- Need these access so that init can impersonate sockets on unix_dgram_socket
+
* Wed Mar 23 2011 Miroslav Grepl 3.9.16-6
- Remove some unconfined domains
- Remove permissive domains