From: guido@trentalancia.com (Guido Trentalancia)
Date: Wed, 16 Feb 2011 07:22:05 +0100
Subject: [refpolicy] [PATCH 18/34]: patch for the policykit module (labeling,
start from dbus, read xdm files)
Message-ID: <1297837325.3205.75.camel@tesla.lan>
To: refpolicy@oss.tresys.com
List-Id: refpolicy.oss.tresys.com
This patch adds a file context for the /var/lib/polkit-1 directory.
It then allows policykit to be started from dbus. It also adds
some other permissions needed to run policykit and a new interface
which is used to read xdm files.
diff -pruN refpolicy-git-02022011-test-apply2/policy/modules/services/policykit.fc refpolicy-git-02022011-test-apply3/policy/modules/services/policykit.fc
--- refpolicy-git-02022011-test-apply2/policy/modules/services/policykit.fc 2011-01-08 19:07:21.280747356 +0100
+++ refpolicy-git-02022011-test-apply3/policy/modules/services/policykit.fc 2011-02-07 03:31:53.547856778 +0100
@@ -11,5 +11,6 @@
/var/lib/misc/PolicyKit.reload gen_context(system_u:object_r:policykit_reload_t,s0)
/var/lib/PolicyKit(/.*)? gen_context(system_u:object_r:policykit_var_lib_t,s0)
/var/lib/PolicyKit-public(/.*)? gen_context(system_u:object_r:policykit_var_lib_t,s0)
+/var/lib/polkit-1(/.*)? gen_context(system_u:object_r:policykit_var_lib_t,s0)
/var/run/PolicyKit(/.*)? gen_context(system_u:object_r:policykit_var_run_t,s0)
diff -pruN refpolicy-git-02022011-test-apply2/policy/modules/services/policykit.te refpolicy-git-02022011-test-apply3/policy/modules/services/policykit.te
--- refpolicy-git-02022011-test-apply2/policy/modules/services/policykit.te 2011-02-07 03:31:24.763790944 +0100
+++ refpolicy-git-02022011-test-apply3/policy/modules/services/policykit.te 2011-02-07 03:31:53.550857306 +0100
@@ -35,8 +35,8 @@ files_pid_file(policykit_var_run_t)
# policykit local policy
#
-allow policykit_t self:capability { setgid setuid };
-allow policykit_t self:process getattr;
+allow policykit_t self:capability { setgid setuid sys_ptrace };
+allow policykit_t self:process { getattr getsched signal };
allow policykit_t self:fifo_file rw_file_perms;
allow policykit_t self:unix_dgram_socket create_socket_perms;
allow policykit_t self:unix_stream_socket create_stream_socket_perms;
@@ -57,6 +57,7 @@ manage_files_pattern(policykit_t, policy
files_pid_filetrans(policykit_t, policykit_var_run_t, { file dir })
kernel_read_kernel_sysctls(policykit_t)
+kernel_read_system_state(policykit_t)
files_read_etc_files(policykit_t)
files_read_usr_files(policykit_t)
@@ -78,6 +79,14 @@ optional_policy(`
gnome_read_config(policykit_t)
')
+optional_policy(`
+ dbus_system_domain(policykit_t, policykit_exec_t)
+')
+
+optional_policy(`
+ xserver_read_xdm_files(policykit_t)
+')
+
########################################
#
# polkit_auth local policy
diff -pruN refpolicy-git-02022011-test-apply2/policy/modules/services/xserver.if refpolicy-git-02022011-test-apply3/policy/modules/services/xserver.if
--- refpolicy-git-02022011-test-apply2/policy/modules/services/xserver.if 2011-01-08 19:07:21.344757464 +0100
+++ refpolicy-git-02022011-test-apply3/policy/modules/services/xserver.if 2011-02-07 03:31:53.552857658 +0100
@@ -638,6 +638,25 @@ interface(`xserver_rw_console',`
########################################
##
+## Read xdm files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`xserver_read_xdm_files',`
+ gen_require(`
+ type xdm_t;
+ ')
+
+ allow $1 xdm_t:dir list_dir_perms;
+ read_files_pattern($1, xdm_t, xdm_t)
+')
+
+########################################
+##
## Use file descriptors for xdm.
##
##