Re: first cut of window manager/metacity policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jun 24, 2008 at 1:51 PM, Xavier Toth <txtoth@xxxxxxxxx> wrote:
> --- serefpolicy-3.4.1/policy/modules/apps/wm.if 1969-12-31
> 17:00:00.000000000 -0700
> +++ serefpolicy-3.4.1.new/policy/modules/apps/wm.if     2008-06-24
> 12:01:56.000000000 -0500
> @@ -0,0 +1,105 @@
> +## <summary>Window Manager.</summary>
> +
> +#######################################
> +## <summary>
> +##     Template to create types and rules common to
> +##     any window manager domains.
> +## </summary>
> +## <param name="prefix">
> +##     <summary>
> +##     The prefix of the domain (e.g., user
> +##     is the prefix for user_t).
> +##     </summary>
> +## </param>
> +## <param name="prefix">
> +##     <summary>
> +##     The prefix of the X server domain (e.g., user
> +##     is the prefix for user_t).
> +##     </summary>
> +## </param>
> +#
> +template(`wm_domain_template',`
> +       gen_require(`
> +               type $1_t;
> +               type wm_exec_t;
> +               type tmpfs_t;
> +               type $1_dbusd_t;
> +               type $1_tmp_t;
> +               type $2_rootwindow_t, $2_xproperty_t, $2_xserver_t, $2_var_run_t;
> +               type $1_xproperty_t, $1_input_xevent_t, $1_manage_xevent_t,
> $1_property_xevent_t;
> +               type $1_focus_xevent_t, $1_client_xevent_t;
> +               type output_xext_t;
> +               class x_colormap { install uninstall };
> +               class x_drawable manage;
> +               class x_property write;
> +               class x_device { setfocus grab force_cursor freeze };
> +               class x_screen setattr;
> +       ')
> +
> +       type $1_wm_t;
> +       domain_type($1_wm_t)
> +       domain_entry_file($1_wm_t,wm_exec_t)
> +       role $1_r types $1_wm_t;
> +
> +       domtrans_pattern($1_t, wm_exec_t, $1_wm_t)
> +
> +       type $1_wm_tmpfs_t;
> +       xserver_user_x_domain_template($1, $1_wm, $1_wm_t, $1_wm_tmpfs_t)
> +
> +       files_read_etc_files($1_wm_t)
> +
> +       libs_use_ld_so($1_wm_t)
> +       libs_use_shared_libs($1_wm_t)
> +
> +       nscd_dontaudit_search_pid($1_wm_t)
> +
> +       miscfiles_read_localization($1_wm_t)
> +
> +       dev_read_urand($1_wm_t)
> +
> +       files_list_tmp($1_wm_t)
> +
> +       dbus_user_bus_client_template($1,$1,$1_wm_t)
> +
> +       allow $1_wm_t info_xproperty_t:x_property write;
> +
> +       allow $1_wm_t self:process getsched;
> +       allow $1_wm_t self:x_drawable blend;
> +
> +       allow $1_wm_t tmpfs_t:file { read write };
> +       allow $1_wm_t $1_client_xevent_t:x_synthetic_event send;
> +       allow $1_wm_t $1_focus_xevent_t:x_event receive;
> +       allow $1_wm_t $1_home_t:dir search;
> +       allow $1_wm_t $1_home_t:file { read append };
> +       allow $1_wm_t $1_input_xevent_t:x_event receive;
> +       allow $1_wm_t $1_manage_xevent_t:x_event receive;
> +       allow $1_wm_t $1_manage_xevent_t:x_synthetic_event { receive send };
> +       allow $1_wm_t $1_property_xevent_t:x_event receive;
> +       allow $1_wm_t $1_t:unix_stream_socket connectto;
> +       allow $1_wm_t $1_t:x_drawable { get_property setattr show receive
> manage send read getattr list_child set_property };
> +       allow $1_wm_t $1_tmp_t:dir { write search setattr remove_name
> getattr add_name };
> +       allow $1_wm_t $1_tmp_t:sock_file { write create unlink };
> +       allow $1_wm_t $1_xproperty_t:x_property { read write };
> +       allow $1_wm_t usr_t:file { read getattr };
> +       allow $1_wm_t usr_t:lnk_file read;
> +       allow $1_wm_t $2_rootwindow_t:x_colormap install;
> +       allow $1_wm_t $2_rootwindow_t:x_drawable { read write manage setattr };
> +       allow $1_wm_t $2_var_run_t:dir search;
> +       allow $1_wm_t $2_var_run_t:file { read getattr };
> +       allow $1_wm_t $2_xproperty_t:x_property { write read };
> +       allow $1_wm_t $2_xserver_t:x_device { setfocus use setattr grab
> manage getattr freeze };
> +       allow $1_wm_t $2_xserver_t:x_resource write;
> +       allow $1_wm_t $2_xserver_t:x_screen setattr;
> +       allow $1_wm_t xselection_t:x_selection setattr;
> +       allow $1_wm_t $2_rootwindow_t:x_colormap uninstall;
> +       allow $1_wm_t $2_xserver_t:x_device force_cursor;
> +
> +       ifdef(`enable_mls',`
> +               mls_file_read_all_levels($1_wm_t)
> +               mls_xwin_write_to_clearance($1_wm_t)
> +       ')
> +
> +       allow $1_t $1_wm_t:unix_stream_socket connectto;
> +       allow $1_t $1_wm_t:x_drawable { receive get_property getattr list_child };
> +')
> +
> --- serefpolicy-3.4.1/policy/modules/apps/wm.te 1969-12-31
> 17:00:00.000000000 -0700
> +++ serefpolicy-3.4.1.new/policy/modules/apps/wm.te     2008-06-24
> 12:01:56.000000000 -0500
> @@ -0,0 +1,8 @@
> +policy_module(wm,0.0.1)
> +
> +########################################
> +#
> +# Declarations
> +#
> +
> +type wm_exec_t;
> --- serefpolicy-3.4.1/policy/modules/apps/wm.fc 1969-12-31
> 17:00:00.000000000 -0700
> +++ serefpolicy-3.4.1.new/policy/modules/apps/wm.fc     2008-06-24
> 12:01:56.000000000 -0500
> @@ -0,0 +1 @@
> +
> --- serefpolicy-3.4.1/policy/modules/apps/metacity.fc   1969-12-31
> 17:00:00.000000000 -0700
> +++ serefpolicy-3.4.1.new/policy/modules/apps/metacity.fc       2008-06-24
> 12:01:26.000000000 -0500
> @@ -0,0 +1,5 @@
> +#
> +# /usr
> +#
> +
> +/usr/bin/metacity      --      gen_context(system_u:object_r:wm_exec_t,s0)
> --- serefpolicy-3.4.1/policy/modules/apps/metacity.if   1969-12-31
> 17:00:00.000000000 -0700
> +++ serefpolicy-3.4.1.new/policy/modules/apps/metacity.if       2008-06-24
> 12:01:26.000000000 -0500
> @@ -0,0 +1 @@
> +## <summary></summary>
> --- serefpolicy-3.4.1/policy/modules/apps/metacity.te   1969-12-31
> 17:00:00.000000000 -0700
> +++ serefpolicy-3.4.1.new/policy/modules/apps/metacity.te       2008-06-24
> 12:01:26.000000000 -0500
> @@ -0,0 +1,8 @@
> +policy_module(metacity,0.0.1)
> +
> +########################################
> +#
> +# Declarations
> +#
> +
> +wm_domain_template(user,xdm)


I'm trying to build the latest rawhide policy with this patch but am
getting an error 'attribute user_x_domain is not declared'.
'typeattribute $2_t $1_x_domain' was added to
xserver_common_x_domain_template and as you see in the patch I'm using
xserver_user_x_domain_template which calls it. Who should be defining
this attribute?

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux