diff --git a/refpolicy/policy/modules/admin/bootloader.te b/refpolicy/policy/modules/admin/bootloader.te
index 304a39a..9ee5bd6 100644
--- a/refpolicy/policy/modules/admin/bootloader.te
+++ b/refpolicy/policy/modules/admin/bootloader.te
@@ -207,17 +207,3 @@ optional_policy(`
userdom_dontaudit_search_staff_home_dirs(bootloader_t)
userdom_dontaudit_search_sysadm_home_dirs(bootloader_t)
')
-
-ifdef(`TODO',`
-ifdef(`distro_debian', `
- # cjp: there is no setfscreate or type_transition, and
- # bootloader_t cannot rw a usr_t or lib_t directory, so
- # how can this work? This is probably rw_file_perms,
- # possibly with unlink. Files are probably "created"
- # by the above relabeling permissions.
- allow bootloader_t { usr_t lib_t }:file create_file_perms;
-
- allow bootloader_t dpkg_var_lib_t:dir r_dir_perms;
- allow bootloader_t dpkg_var_lib_t:file { getattr read };
-')
-') dnl end TODO
diff --git a/refpolicy/policy/modules/admin/consoletype.te b/refpolicy/policy/modules/admin/consoletype.te
index e5df4c6..6e1250e 100644
--- a/refpolicy/policy/modules/admin/consoletype.te
+++ b/refpolicy/policy/modules/admin/consoletype.te
@@ -107,21 +107,3 @@ optional_policy(`
optional_policy(`
userdom_use_unpriv_users_fds(consoletype_t)
')
-
-ifdef(`TODO',`
-optional_policy(`
-allow consoletype_t xdm_tmp_t:file rw_file_perms;
-')
-
-# this goes to xdm module
-ifdef(`targeted_policy',`
- optional_policy(`
- consoletype_domtrans(xdm_t)
- ')
-')
-
-optional_policy(`
-allow consoletype_t printconf_t:file r_file_perms;
-')
-
-') dnl end TODO
diff --git a/refpolicy/policy/modules/admin/netutils.te b/refpolicy/policy/modules/admin/netutils.te
index 07d4544..1145517 100644
--- a/refpolicy/policy/modules/admin/netutils.te
+++ b/refpolicy/policy/modules/admin/netutils.te
@@ -87,10 +87,6 @@ optional_policy(`
nis_use_ypbind(netutils_t)
')
-ifdef(`TODO',`
-ifdef(`gnome-pty-helper.te', `allow netutils_t sysadm_gph_t:fd use;')
-') dnl end TODO
-
########################################
#
# Ping local policy
@@ -162,12 +158,6 @@ optional_policy(`
hotplug_use_fds(ping_t)
')
-ifdef(`TODO',`
-if(user_ping) {
- ifdef(`gnome-pty-helper.te', `allow ping_t gphdomain:fd use;')
-}
-') dnl end TODO
-
########################################
#
# Traceroute local policy
@@ -235,9 +225,3 @@ optional_policy(`
optional_policy(`
nscd_socket_use(traceroute_t)
')
-
-ifdef(`TODO',`
-ifdef(`gnome-pty-helper.te', `allow traceroute_t sysadm_gph_t:fd use;')
-#rules needed for nmap
-dontaudit traceroute_t userdomain:dir search;
-') dnl end TODO
diff --git a/refpolicy/policy/modules/admin/su.if b/refpolicy/policy/modules/admin/su.if
index 2e1116f..e51472d 100644
--- a/refpolicy/policy/modules/admin/su.if
+++ b/refpolicy/policy/modules/admin/su.if
@@ -284,20 +284,8 @@ template(`su_per_userdomain_template',`
')
ifdef(`TODO',`
- # Caused by su - init scripts
- dontaudit $1_su_t initrc_devpts_t:chr_file { getattr ioctl };
-
- # Inherit and use descriptors from gnome-pty-helper.
- ifdef(`gnome-pty-helper.te', `allow $1_su_t $1_gph_t:fd use;')
-
allow $1_su_t $1_home_t:file create_file_perms;
- ifdef(`user_canbe_sysadm', `
- allow $1_su_t home_dir_type:dir { search write };
- ', `
- dontaudit $1_su_t home_dir_type:dir { search write };
- ')
-
ifdef(`ssh.te', `
# Access sshd cookie files.
allow $1_su_t sshd_tmp_t:file rw_file_perms;
diff --git a/refpolicy/policy/modules/admin/sudo.if b/refpolicy/policy/modules/admin/sudo.if
index 0cf001e..e0ff588 100644
--- a/refpolicy/policy/modules/admin/sudo.if
+++ b/refpolicy/policy/modules/admin/sudo.if
@@ -138,14 +138,11 @@ template(`sudo_per_userdomain_template',`
')
ifdef(`TODO',`
- ifdef(`gnome-pty-helper.te', `allow $1_sudo_t gphdomain:fd use;')
-
# for when the network connection is killed
dontaudit unpriv_userdomain $1_sudo_t:process signal;
ifdef(`mta.te', `
domain_auto_trans($1_sudo_t, sendmail_exec_t, $1_mail_t)
- allow $1_mail_t $1_sudo_t:fifo_file rw_file_perms;
')
ifdef(`pam.te', `
diff --git a/refpolicy/policy/modules/admin/tmpreaper.te b/refpolicy/policy/modules/admin/tmpreaper.te
index ca46e5c..8809daf 100644
--- a/refpolicy/policy/modules/admin/tmpreaper.te
+++ b/refpolicy/policy/modules/admin/tmpreaper.te
@@ -47,7 +47,3 @@ cron_system_entry(tmpreaper_t,tmpreaper_exec_t)
optional_policy(`
lpd_manage_spool(tmpreaper_t)
')
-
-ifdef(`TODO',`
-allow tmpreaper_t { home_type file_t }:notdevfile_class_set { getattr unlink };
-')
diff --git a/refpolicy/policy/modules/services/apm.te b/refpolicy/policy/modules/services/apm.te
index 651b74e..48ad02e 100644
--- a/refpolicy/policy/modules/services/apm.te
+++ b/refpolicy/policy/modules/services/apm.te
@@ -1,5 +1,5 @@
-policy_module(apm,1.2.2)
+policy_module(apm,1.2.3)
########################################
#
@@ -86,6 +86,7 @@ files_pid_filetrans(apmd_t, apmd_var_run_t, { file sock_file })
kernel_read_kernel_sysctls(apmd_t)
kernel_rw_all_sysctls(apmd_t)
kernel_read_system_state(apmd_t)
+kernel_write_proc_files(apmd_t)
dev_read_realtime_clock(apmd_t)
dev_read_urand(apmd_t)
@@ -238,11 +239,3 @@ optional_policy(`
optional_policy(`
xserver_domtrans_xdm_xserver(apmd_t)
')
-
-ifdef(`TODO',`
-allow apmd_t proc_t:file write;
-allow apmd_t user_tty_type:chr_file { ioctl read getattr lock write append };
-optional_policy(`
- allow apmd_t crond_t:fifo_file { getattr read write ioctl };
-')
-')
diff --git a/refpolicy/policy/modules/services/bind.te b/refpolicy/policy/modules/services/bind.te
index 2e26d01..3993d4c 100644
--- a/refpolicy/policy/modules/services/bind.te
+++ b/refpolicy/policy/modules/services/bind.te
@@ -206,12 +206,6 @@ optional_policy(`
udev_read_db(named_t)
')
-ifdef(`TODO',`
-can_udp_send(domain, named_t)
-can_udp_send(named_t, domain)
-can_tcp_connect(domain, named_t)
-')
-
########################################
#
# NDC local policy
diff --git a/refpolicy/policy/modules/services/cron.if b/refpolicy/policy/modules/services/cron.if
index e5825e0..871f458 100644
--- a/refpolicy/policy/modules/services/cron.if
+++ b/refpolicy/policy/modules/services/cron.if
@@ -256,9 +256,6 @@ template(`cron_per_userdomain_template',`
# Read user crontabs
dontaudit $1_crontab_t $1_home_dir_t:dir write;
-
- # Inherit and use descriptors from gnome-pty-helper.
- ifdef(`gnome-pty-helper.te', `allow $1_crontab_t $1_gph_t:fd use;')
') dnl endif TODO
')
diff --git a/refpolicy/policy/modules/services/cron.te b/refpolicy/policy/modules/services/cron.te
index 78acdb5..d5bc52e 100644
--- a/refpolicy/policy/modules/services/cron.te
+++ b/refpolicy/policy/modules/services/cron.te
@@ -1,5 +1,5 @@
-policy_module(cron,1.3.2)
+policy_module(cron,1.3.3)
gen_require(`
class passwd rootok;
@@ -392,6 +392,10 @@ ifdef(`targeted_policy',`
')
optional_policy(`
+ mta_send_mail(system_crond_t)
+ ')
+
+ optional_policy(`
mysql_read_config(system_crond_t)
')
@@ -436,13 +440,8 @@ ifdef(`targeted_policy',`
allow system_crond_t mail_spool_t:lnk_file read;
ifdef(`mta.te', `
- mta_send_mail_transition(system_crond_t)
allow mta_user_agent system_crond_t:fd use;
r_dir_file(system_mail_t, crond_tmp_t)
')
-
- # for daemon re-start
- allow system_crond_t syslogd_t:lnk_file read;
-
') dnl end TODO
')
diff --git a/refpolicy/policy/modules/services/gpm.te b/refpolicy/policy/modules/services/gpm.te
index faf01f4..0b68e0d 100644
--- a/refpolicy/policy/modules/services/gpm.te
+++ b/refpolicy/policy/modules/services/gpm.te
@@ -1,5 +1,5 @@
-policy_module(gpm,1.1.0)
+policy_module(gpm,1.1.1)
########################################
#
@@ -54,7 +54,8 @@ kernel_read_proc_symlinks(gpm_t)
dev_read_sysfs(gpm_t)
# Access the mouse.
-dev_read_input(gpm_t)
+# cjp: why write?
+dev_rw_input_dev(event_device_t)
dev_rw_mouse(gpm_t)
fs_getattr_all_fs(gpm_t)
@@ -91,9 +92,3 @@ optional_policy(`
optional_policy(`
udev_read_db(gpm_t)
')
-
-ifdef(`TODO',`
-# Access the mouse.
-# cjp: why write?
-allow gpm_t event_device_t:chr_file rw_file_perms;
-')
diff --git a/refpolicy/policy/modules/services/mta.if b/refpolicy/policy/modules/services/mta.if
index 3f76942..3bac4bd 100644
--- a/refpolicy/policy/modules/services/mta.if
+++ b/refpolicy/policy/modules/services/mta.if
@@ -246,13 +246,6 @@ template(`mta_per_userdomain_template',`
postfix_read_config($1_mail_t)
postfix_list_spool($1_mail_t)
')
-
-
- ifdef(`TODO',`
- # if you do not want to allow dead.letter then use the following instead
- #allow $1_mail_t { $1_home_dir_t $1_home_t }:dir r_dir_perms;
- #allow $1_mail_t $1_home_t:file r_file_perms;
- ') dnl end TODO
')
########################################
diff --git a/refpolicy/policy/modules/services/ntp.te b/refpolicy/policy/modules/services/ntp.te
index 39f0b90..b29010e 100644
--- a/refpolicy/policy/modules/services/ntp.te
+++ b/refpolicy/policy/modules/services/ntp.te
@@ -158,11 +158,3 @@ optional_policy(`
optional_policy(`
udev_read_db(ntpd_t)
')
-
-ifdef(`TODO',`
-allow ntpd_t sysadm_t:udp_socket sendto;
-allow sysadm_t ntpd_t:udp_socket recvfrom;
-
-allow sysadm_t ntpd_t:udp_socket sendto;
-allow ntpd_t sysadm_t:udp_socket recvfrom;
-') dnl end TODO
diff --git a/refpolicy/policy/modules/services/postfix.te b/refpolicy/policy/modules/services/postfix.te
index cd496b0..6c44c06 100644
--- a/refpolicy/policy/modules/services/postfix.te
+++ b/refpolicy/policy/modules/services/postfix.te
@@ -490,10 +490,6 @@ init_use_script_fds(postfix_postqueue_t)
sysnet_dontaudit_read_config(postfix_postqueue_t)
-ifdef(`TODO',`
-optional_policy(`allow postfix_postqueue_t user_gph_t:fd use;')
-')
-
########################################
#
# Postfix qmgr local policy
diff --git a/refpolicy/policy/modules/services/samba.te b/refpolicy/policy/modules/services/samba.te
index ef4fa9e..9e3f045 100644
--- a/refpolicy/policy/modules/services/samba.te
+++ b/refpolicy/policy/modules/services/samba.te
@@ -1,5 +1,5 @@
-policy_module(samba,1.2.1)
+policy_module(samba,1.2.2)
#################################
#
@@ -166,10 +166,6 @@ optional_policy(`
nscd_socket_use(samba_net_t)
')
-ifdef(`TODO',`
-in_user_role(samba_net_t)
-')
-
########################################
#
# smbd Local policy
@@ -516,17 +512,15 @@ userdom_use_all_users_fds(smbmount_t)
userdom_use_sysadm_ttys(smbmount_t)
optional_policy(`
- nis_use_ypbind(smbmount_t)
+ cups_read_rw_config(smbd_t)
')
optional_policy(`
- nscd_socket_use(smbmount_t)
+ nis_use_ypbind(smbmount_t)
')
-ifdef(`TODO',`
-ifdef(`cups.te', `
- allow smbd_t cupsd_rw_etc_t:file { getattr read };
-')
+optional_policy(`
+ nscd_socket_use(smbmount_t)
')
########################################
diff --git a/refpolicy/policy/modules/services/snmp.te b/refpolicy/policy/modules/services/snmp.te
index df50f2f..c96d72c 100644
--- a/refpolicy/policy/modules/services/snmp.te
+++ b/refpolicy/policy/modules/services/snmp.te
@@ -156,8 +156,3 @@ optional_policy(`
optional_policy(`
udev_read_db(snmpd_t)
')
-
-ifdef(`TODO',`
-can_udp_send(sysadm_t, snmpd_t)
-can_udp_send(snmpd_t, sysadm_t)
-') dnl end TODO
diff --git a/refpolicy/policy/modules/services/squid.te b/refpolicy/policy/modules/services/squid.te
index 808b1fe..93d2cbe 100644
--- a/refpolicy/policy/modules/services/squid.te
+++ b/refpolicy/policy/modules/services/squid.te
@@ -181,11 +181,6 @@ ifdef(`TODO',`
ifdef(`apache.te',`
can_tcp_connect(squid_t, httpd_t)
')
-
-ifdef(`winbind.te', `
-domain_auto_trans(squid_t, winbind_helper_exec_t, winbind_helper_t)
-allow winbind_helper_t squid_t:tcp_socket rw_socket_perms;
-')
#squid requires the following when run in diskd mode, the recommended setting
allow squid_t tmpfs_t:file { read write };
') dnl end TODO
diff --git a/refpolicy/policy/modules/services/xserver.if b/refpolicy/policy/modules/services/xserver.if
index 1f77907..332cbd8 100644
--- a/refpolicy/policy/modules/services/xserver.if
+++ b/refpolicy/policy/modules/services/xserver.if
@@ -902,6 +902,25 @@ interface(`xserver_xsession_spec_domtrans',`
########################################
##
+## Get the attributes of X server logs.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`xserver_getattr_log',`
+ gen_require(`
+ type xserver_log_t;
+ ')
+
+ logging_search_logs($1)
+ allow $1 xserver_log_t:file getattr;
+')
+
+########################################
+##
## Do not audit attempts to write the X server
## log files.
##
diff --git a/refpolicy/policy/modules/services/xserver.te b/refpolicy/policy/modules/services/xserver.te
index 06867a9..6e318d6 100644
--- a/refpolicy/policy/modules/services/xserver.te
+++ b/refpolicy/policy/modules/services/xserver.te
@@ -1,5 +1,5 @@
-policy_module(xserver,1.1.2)
+policy_module(xserver,1.1.3)
########################################
#
@@ -320,6 +320,10 @@ tunable_policy(`use_samba_home_dirs',`
')
optional_policy(`
+ consoletype_domtrans(xdm_t)
+')
+
+optional_policy(`
# Talk to the console mouse server.
gpm_stream_connect(xdm_t)
gpm_setattr_gpmctl(xdm_t)
diff --git a/refpolicy/policy/modules/system/authlogin.te b/refpolicy/policy/modules/system/authlogin.te
index da36856..ecbf208 100644
--- a/refpolicy/policy/modules/system/authlogin.te
+++ b/refpolicy/policy/modules/system/authlogin.te
@@ -1,5 +1,5 @@
-policy_module(authlogin,1.3.1)
+policy_module(authlogin,1.3.2)
########################################
#
@@ -247,11 +247,9 @@ optional_policy(`
udev_read_db(pam_console_t)
')
-ifdef(`TODO',`
-ifdef(`xdm.te', `
- allow pam_console_t xdm_var_run_t:file { getattr read };
+optional_policy(`
+ xserver_read_xdm_pid(pam_console_t)
')
-') dnl endif TODO
########################################
#
diff --git a/refpolicy/policy/modules/system/init.te b/refpolicy/policy/modules/system/init.te
index 0b6f2d9..9a4e18b 100644
--- a/refpolicy/policy/modules/system/init.te
+++ b/refpolicy/policy/modules/system/init.te
@@ -1,5 +1,5 @@
-policy_module(init,1.3.4)
+policy_module(init,1.3.5)
gen_require(`
class passwd rootok;
@@ -152,6 +152,9 @@ files_exec_etc_files(init_t)
files_dontaudit_rw_root_files(init_t)
files_dontaudit_rw_root_chr_files(init_t)
+# cjp: this may be related to /dev/log
+fs_write_ramfs_sockets(init_t)
+
libs_use_ld_so(init_t)
libs_use_shared_libs(init_t)
libs_rw_ld_so_cache(init_t)
@@ -195,10 +198,6 @@ optional_policy(`
userdom_shell_domtrans_sysadm(init_t)
')
-ifdef(`TODO',`
-allow init_t ramfs_t:sock_file write;
-')
-
########################################
#
# Init script local policy
diff --git a/refpolicy/policy/modules/system/logging.if b/refpolicy/policy/modules/system/logging.if
index 7bc0d88..3a5eb64 100644
--- a/refpolicy/policy/modules/system/logging.if
+++ b/refpolicy/policy/modules/system/logging.if
@@ -67,6 +67,37 @@ interface(`logging_domtrans_auditctl',`
########################################
##
+## Execute auditctl in the auditctl domain, and
+## allow the specified role the auditctl domain.
+##
+##
+##
+## The type of the process performing this action.
+##
+##
+##
+##
+## The role to be allowed the auditctl domain.
+##
+##
+##
+##
+## The type of the terminal allow the auditctl domain to use.
+##
+##
+#
+interface(`logging_run_auditctl',`
+ gen_require(`
+ type auditctl_t;
+ ')
+
+ logging_domtrans_auditctl($1)
+ role $2 types auditctl_t;
+ allow auditctl_t $3:chr_file rw_term_perms;
+')
+
+########################################
+##
## Execute syslogd in the syslog domain.
##
##
diff --git a/refpolicy/policy/modules/system/logging.te b/refpolicy/policy/modules/system/logging.te
index 2268747..f31af3a 100644
--- a/refpolicy/policy/modules/system/logging.te
+++ b/refpolicy/policy/modules/system/logging.te
@@ -1,5 +1,5 @@
-policy_module(logging,1.3.1)
+policy_module(logging,1.3.2)
########################################
#
@@ -94,21 +94,6 @@ ifdef(`targeted_policy',`
term_use_unallocated_ttys(auditctl_t)
')
-ifdef(`TODO',`
-role secadm_r types auditctl_t;
-role sysadm_r types auditctl_t;
-audit_manager_domain(secadm_t)
-
-ifdef(`targeted_policy', `', `
-ifdef(`enable_mls', `
-audit_manager_domain(secadm_t)
-', `
-audit_manager_domain(sysadm_t)
-')
-allow auditctl_t admin_tty_type:chr_file rw_file_perms;
-')
-') dnl end TODO
-
########################################
#
# Auditd local policy
@@ -385,14 +370,6 @@ optional_policy(`
')
ifdef(`TODO',`
-allow syslogd_t tmpfs_t:dir search;
-dontaudit syslogd_t { userpty_type devpts_t }:chr_file getattr;
-
# log to the xconsole
allow syslogd_t xconsole_device_t:fifo_file { ioctl read write };
-
-#
-# Special case to handle crashes
-#
-allow syslogd_t { device_t file_t }:sock_file { getattr unlink };
') dnl end TODO
diff --git a/refpolicy/policy/modules/system/miscfiles.te b/refpolicy/policy/modules/system/miscfiles.te
index 3720757..dbe8c96 100644
--- a/refpolicy/policy/modules/system/miscfiles.te
+++ b/refpolicy/policy/modules/system/miscfiles.te
@@ -57,7 +57,3 @@ files_type(test_file_t)
#
type tetex_data_t;
files_tmp_file(tetex_data_t)
-
-ifdef(`TODO',`
-allow customizable self:filesystem associate;
-') dnl end TODO
diff --git a/refpolicy/policy/modules/system/modutils.te b/refpolicy/policy/modules/system/modutils.te
index 415ad30..6440467 100644
--- a/refpolicy/policy/modules/system/modutils.te
+++ b/refpolicy/policy/modules/system/modutils.te
@@ -1,5 +1,5 @@
-policy_module(modutils,1.1.0)
+policy_module(modutils,1.1.1)
gen_require(`
bool secure_mode_insmod;
@@ -53,12 +53,9 @@ allow insmod_t { modules_conf_t modules_dep_t }:file r_file_perms;
can_exec(insmod_t, insmod_exec_t)
-# make sediff happy (no effect)
-dontaudit insmod_t self:process { noatsecure rlimitinh siginh };
-type_transition insmod_t insmod_exec_t:process insmod_t;
-
kernel_load_module(insmod_t)
kernel_read_system_state(insmod_t)
+kernel_write_proc_files(insmod_t)
kernel_mount_debugfs(insmod_t)
kernel_read_debugfs(insmod_t)
# Rules for /proc/sys/kernel/tainted
@@ -157,12 +154,11 @@ optional_policy(`
rpm_rw_pipes(insmod_t)
')
-ifdef(`TODO',`
-allow insmod_t proc_t:file rw_file_perms;
optional_policy(`
+ # cjp: why is this needed:
+ dev_rw_xserver_misc(insmod_t)
+
xserver_getattr_log(insmod_t)
- allow insmod_t xserver_misc_device_t:chr_file { read write };
-')
')
########################################
@@ -218,12 +214,6 @@ optional_policy(`
rpm_rw_pipes(depmod_t)
')
-ifdef(`TODO',`
-ifdef(`gnome-pty-helper.te', `allow depmod_t sysadm_gph_t:fd use;')
-') dnl end ifdef TODO
-
-allow depmod_t modules_object_t:file unlink;
-
#################################
#
# update-modules local policy
diff --git a/refpolicy/policy/modules/system/mount.te b/refpolicy/policy/modules/system/mount.te
index 9dc0be6..48c2212 100644
--- a/refpolicy/policy/modules/system/mount.te
+++ b/refpolicy/policy/modules/system/mount.te
@@ -1,5 +1,5 @@
-policy_module(mount,1.3.2)
+policy_module(mount,1.3.3)
########################################
#
@@ -149,14 +149,3 @@ optional_policy(`
optional_policy(`
samba_domtrans_smbmount(mount_t)
')
-
-ifdef(`TODO',`
-# TODO: Need to examine this further. Not sure how to handle this
-#type sysadm_mount_source_t, file_type, sysadmfile, $1_file_type;
-#allow sysadm_t sysadm_mount_source_t:file create_file_perms;
-#allow sysadm_t sysadm_mount_source_t:file { relabelto relabelfrom };
-#allow mount_t sysadm_mount_source_t:file rw_file_perms;
-
-# for when /etc/mtab loses its type
-allow mount_t file_t:file unlink;
-') dnl endif TODO
diff --git a/refpolicy/policy/modules/system/raid.te b/refpolicy/policy/modules/system/raid.te
index e34eb6c..44db206 100644
--- a/refpolicy/policy/modules/system/raid.te
+++ b/refpolicy/policy/modules/system/raid.te
@@ -86,6 +86,4 @@ optional_policy(`
ifdef(`TODO',`
# Ignore attempts to read every device file
dontaudit mdadm_t device_t:{ fifo_file file chr_file blk_file } { read getattr };
-
-allow mdadm_t var_t:dir getattr;
') dnl TODO
diff --git a/refpolicy/policy/modules/system/selinuxutil.te b/refpolicy/policy/modules/system/selinuxutil.te
index 7797059..ae09a1c 100644
--- a/refpolicy/policy/modules/system/selinuxutil.te
+++ b/refpolicy/policy/modules/system/selinuxutil.te
@@ -1,5 +1,5 @@
-policy_module(selinuxutil,1.2.3)
+policy_module(selinuxutil,1.2.4)
gen_require(`
bool secure_mode;
@@ -346,6 +346,7 @@ allow restorecon_t { policy_src_t policy_config_t file_context_t selinux_config_
kernel_use_fds(restorecon_t)
kernel_rw_pipes(restorecon_t)
kernel_read_system_state(restorecon_t)
+kernel_rw_unix_dgram_sockets(restorecon_t)
kernel_relabelfrom_unlabeled_dirs(restorecon_t)
kernel_relabelfrom_unlabeled_files(restorecon_t)
kernel_relabelfrom_unlabeled_symlinks(restorecon_t)
@@ -413,17 +414,6 @@ optional_policy(`
hotplug_use_fds(restorecon_t)
')
-ifdef(`TODO',`
-# for upgrading glibc and other shared objects - without this the upgrade
-# scripts will put things in a state such that restorecon can not be run!
-allow restorecon_t lib_t:file { read execute };
-ifdef(`dpkg.te', `
-domain_auto_trans(dpkg_t, restorecon_exec_t, restorecon_t)
-')
-') dnl endif TODO
-
-allow restorecon_t kernel_t:unix_dgram_socket { read write };
-
########################################
#
# Restorecond local policy
diff --git a/refpolicy/policy/modules/system/udev.te b/refpolicy/policy/modules/system/udev.te
index 7c32ad7..f27e29d 100644
--- a/refpolicy/policy/modules/system/udev.te
+++ b/refpolicy/policy/modules/system/udev.te
@@ -1,5 +1,5 @@
-policy_module(udev,1.3.1)
+policy_module(udev,1.3.2)
########################################
#
@@ -199,10 +199,6 @@ optional_policy(`
sysnet_domtrans_dhcpc(udev_t)
')
-#optional_policy(`
-# xdm_read_pid(udev_t)
-#')
-
-ifdef(`TODO',`
-dontaudit udev_t ttyfile:chr_file unlink;
-') dnl endif TODO
+optional_policy(`
+ xserver_read_xdm_pid(udev_t)
+')
diff --git a/refpolicy/policy/modules/system/userdomain.te b/refpolicy/policy/modules/system/userdomain.te
index eda29fa..d27778b 100644
--- a/refpolicy/policy/modules/system/userdomain.te
+++ b/refpolicy/policy/modules/system/userdomain.te
@@ -1,5 +1,5 @@
-policy_module(userdomain,1.3.7)
+policy_module(userdomain,1.3.8)
gen_require(`
role sysadm_r, staff_r, user_r;
@@ -179,11 +179,12 @@ ifdef(`targeted_policy',`
mls_file_downgrade(secadm_t)
init_exec(secadm_t)
logging_read_audit_log(secadm_t)
- logging_domtrans_auditctl(secadm_t)
+ logging_run_auditctl(secadm_t,secadm_r,{ secadm_tty_device_t secadm_devpts_t })
userdom_dontaudit_append_staff_home_content_files(secadm_t)
', `
logging_domtrans_auditctl(sysadm_t)
logging_read_audit_log(sysadm_t)
+ logging_run_auditctl(sysadm_t,sysadm_r,admin_terminal)
')
tunable_policy(`allow_ptrace',`