From: dominick.grift@gmail.com (Dominick Grift) Date: Thu, 18 Oct 2012 20:28:05 +0200 Subject: [refpolicy] [PATCH v1] Changes to the xserver policy module Message-ID: <1350584885-21452-1-git-send-email-dominick.grift@gmail.com> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com These interfaces are needed by at least plymouth Previous patch had a interface with improper name Signed-off-by: Dominick Grift diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if index 130ced9..322dd66 100644 --- a/policy/modules/services/xserver.if +++ b/policy/modules/services/xserver.if @@ -713,6 +713,47 @@ ######################################## ## +## Create, read, write, and delete +## xdm spool files. +## +## +## +## Domain allowed access. +## +## +# +interface(`xserver_manage_xdm_spool_files',` + gen_require(` + type xdm_spool_t; + ') + + files_search_spool($1) + manage_files_pattern($1, xdm_spool_t, xdm_spool_t) +') + +######################################## +## +## Read xdm process state files. +## +## +## +## Domain allowed access. +## +## +# +interface(`xserver_read_state_xdm',` + gen_require(` + type xdm_t; + ') + + kernel_search_proc($1) + allow $1 xdm_t:dir list_dir_perms; + allow $1 xdm_t:file read_file_perms; + allow $1 xdm_t:lnk_file read_lnk_file_perms; +') + +######################################## +## ## Connect to XDM over a unix domain ## stream socket. ##