Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2214293ybb; Sun, 5 Apr 2020 01:44:08 -0700 (PDT) X-Google-Smtp-Source: APiQypLACQgIhENdgq0IDAiKtsX9eX1B1LEYbIlHuat9+vRrDyh1li6r2G/tj+OZ17APqrBIPxm/ X-Received: by 2002:a05:6808:18b:: with SMTP id w11mr8708191oic.94.1586076248306; Sun, 05 Apr 2020 01:44:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586076248; cv=none; d=google.com; s=arc-20160816; b=PIzoS741/3m34k/yUC8lgv6pkZlZmS1BPzbLppDlfOfopbWFKIhDY8UNGJhjNFOgzn rZBzvR5oaQhswMDHxIKJjaPoGmFGakZ3FT2dQd0u5q+1iuPSsWC3L6aMh+4JT4I0mlh4 LY17yV7trwlHEACEVg0HbTj4w2JrmO1E4J6G5efL0RWSOlYKA9mjN2VZJgD2ypuV5NEp fY4B5ocp9jeSBvEIAEoEc3sVmeF0kSAMkLsUxci76MtJ9YrmDPOn/WyHsPCqsPy/hzMS jDTnbwdOG1R60dlli0zCqRtZyfT7+wHSjk3hWCH9gLFCftg6xrbc3Y+lKw0Mr3Hpa01X P9pg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:to:from:date:dkim-signature; bh=kBq07XOSqBXQLCOM5VZx+86DUbDXDFNi8FhqN+ALBgk=; b=BV7hMNvXGvvkl/wAC+diljH33PrATT0/So9kzlXctp1/npElHv+tVwKTRXzt2upJlQ Uv0t9nhPEdrel+IL+5sqNlP1pBc1xoiT3N4UKcHz2eeM93Snl7Wdjlhro8sjd0ijdaPW /lcTVgiD26znj4ScLIAk5OdXx/ba5Ss+hAk7OWCAFpUkIioHmk3mxIBpDT6YtVw6kxFr Yq6Wzbo5EcZQMxqdo/6AB7PYG+51jHOq7s/lOqyiIsPaxa9JMRypYAVzbRqtU5z7NPur x43HgmJnB9aX7hRFGrZ+GLJGqtK+TX9E3IVRGc1ZavMUTfJOEvYtmMS4nb8eIY/9lG6p 4v3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@coker.com.au header.s=2008 header.b=oyiO3D1O; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=coker.com.au Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e13si6253245oom.86.2020.04.05.01.44.06; Sun, 05 Apr 2020 01:44:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@coker.com.au header.s=2008 header.b=oyiO3D1O; spf=pass (google.com: best guess record for domain of selinux-refpolicy-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=selinux-refpolicy-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=coker.com.au Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726364AbgDEIoG (ORCPT + 13 others); Sun, 5 Apr 2020 04:44:06 -0400 Received: from smtp.sws.net.au ([46.4.88.250]:45126 "EHLO smtp.sws.net.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726308AbgDEIoF (ORCPT ); Sun, 5 Apr 2020 04:44:05 -0400 Received: from xev.coker.com.au (localhost [127.0.0.1]) by smtp.sws.net.au (Postfix) with ESMTP id 5FEF0F398 for ; Sun, 5 Apr 2020 18:44:04 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=coker.com.au; s=2008; t=1586076244; bh=kBq07XOSqBXQLCOM5VZx+86DUbDXDFNi8FhqN+ALBgk=; l=1834; h=Date:From:To:Subject:From; b=oyiO3D1O/TMpNJQ47ksEbAdlkROMeSSCjCG7NmxerPt8iO7JtqfBdESRlk0qyJIHT jJO8stvwHu2p3CNsXRfFDtqZjLovNWdzc7I8OSmZPpGAtcSkpjx0lWI607gT1vEfWC fJ9ftIGRlv+O0az0GljDghrqOTew0bS3XsyCDY1g= Received: by xev.coker.com.au (Postfix, from userid 1001) id 2E525FF29CB; Sun, 5 Apr 2020 18:44:00 +1000 (AEST) Date: Sun, 5 Apr 2020 18:44:00 +1000 From: Russell Coker To: selinux-refpolicy@vger.kernel.org Subject: pulseaudio patch Message-ID: <20200405084400.GC177560@xev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: selinux-refpolicy-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux-refpolicy@vger.kernel.org Patch for pulseaudio against latest GIT Signed-off-by: Russell Coker Index: refpolicy-2.20200209/policy/modules/apps/pulseaudio.te =================================================================== --- refpolicy-2.20200209.orig/policy/modules/apps/pulseaudio.te +++ refpolicy-2.20200209/policy/modules/apps/pulseaudio.te @@ -92,6 +92,8 @@ files_pid_filetrans(pulseaudio_t, pulsea manage_dirs_pattern(pulseaudio_t, pulseaudio_xdg_config_t, pulseaudio_xdg_config_t) manage_files_pattern(pulseaudio_t, pulseaudio_xdg_config_t, pulseaudio_xdg_config_t) +allow pulseaudio_t pulseaudio_xdg_config_t:file map; + xdg_config_filetrans(pulseaudio_t, pulseaudio_xdg_config_t, dir, "pulse") allow pulseaudio_t pulseaudio_client:process signull; @@ -146,7 +148,7 @@ miscfiles_read_localization(pulseaudio_t seutil_read_config(pulseaudio_t) -userdom_read_user_tmpfs_files(pulseaudio_t) +userdom_rw_user_tmpfs_files(pulseaudio_t) userdom_map_user_tmpfs_files(pulseaudio_t) userdom_delete_user_tmpfs_files(pulseaudio_t) userdom_search_user_home_dirs(pulseaudio_t) @@ -155,6 +157,7 @@ userdom_search_user_home_content(pulseau userdom_manage_user_tmp_dirs(pulseaudio_t) userdom_manage_user_tmp_files(pulseaudio_t) userdom_manage_user_tmp_sockets(pulseaudio_t) +userdom_write_all_user_runtime_named_sockets(pulseaudio_t) tunable_policy(`pulseaudio_execmem',` allow pulseaudio_t self:process execmem; @@ -224,6 +227,13 @@ optional_policy(` ') optional_policy(` + # for /run/systemd/seats and /run/systemd/sessions + systemd_read_logind_sessions_files(pulseaudio_t) + # for /run/systemd/users/$PID + systemd_read_logind_pids(pulseaudio_t) +') + +optional_policy(` udev_read_pid_files(pulseaudio_t) udev_read_state(pulseaudio_t) udev_read_db(pulseaudio_t)