Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package container-selinux for 
openSUSE:Factory checked in at 2021-11-20 02:38:03
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/container-selinux (Old)
 and      /work/SRC/openSUSE:Factory/.container-selinux.new.1895 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "container-selinux"

Sat Nov 20 02:38:03 2021 rev:9 rq:931472 version:2.171.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/container-selinux/container-selinux.changes      
2021-08-12 09:01:48.066138103 +0200
+++ 
/work/SRC/openSUSE:Factory/.container-selinux.new.1895/container-selinux.changes
    2021-11-20 02:38:09.404974862 +0100
@@ -1,0 +2,10 @@
+Fri Nov 12 16:21:06 UTC 2021 - Richard Brown <rbr...@suse.com>
+
+- Update to version 2.171.0
+  * Define kubernetes_file_t as a config_type
+  * Allow containers to be socket activated by user domains and by systemd.
+  * Allow iptables to use fifo files of a container runtime
+  * Allow container_runtime create all tmpfs content as 
container_runtime_tmpfs_t
+  * Allow containers to create lnk_file on tmpfs_t directories.
+
+-------------------------------------------------------------------

Old:
----
  container-selinux-2.164.2.tar.gz

New:
----
  container-selinux-2.171.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ container-selinux.spec ++++++
--- /var/tmp/diff_new_pack.HOCAm8/_old  2021-11-20 02:38:09.884973278 +0100
+++ /var/tmp/diff_new_pack.HOCAm8/_new  2021-11-20 02:38:09.888973265 +0100
@@ -26,7 +26,7 @@
 # Version of SELinux we were using
 %define selinux_policyver %(rpm -q selinux-policy --qf '%%{version}')
 Name:           container-selinux
-Version:        2.164.2
+Version:        2.171.0
 Release:        0
 Summary:        SELinux policies for container runtimes
 License:        GPL-2.0-only

++++++ container-selinux-2.164.2.tar.gz -> container-selinux-2.171.0.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.164.2/README.md 
new/container-selinux-2.171.0/README.md
--- old/container-selinux-2.164.2/README.md     2021-08-02 19:18:31.000000000 
+0200
+++ new/container-selinux-2.171.0/README.md     2021-11-10 23:21:41.000000000 
+0100
@@ -2,29 +2,8 @@
 
 ## Blogs on SELinux Policy
 
-**[Docker and 
SELinux](https://www.projectatomic.io/docs/docker-and-selinux/)**  
-Interaction between SELinux policy and Docker
-
-**[Issues with Docker Volumes and 
SELinux](https://www.projectatomic.io/blog/2015/06/using-volumes-with-docker-can-cause-problems-with-selinux/
  )**  
-Use of volume mounted content with SELinux
-
-**[Docker SELinux 
Flag](https://www.projectatomic.io/blog/2016/07/docker-selinux-flag/)**  
-Information on `???selinux-enabled` flag in Docker daemon
-
-**[SELinux Policy for 
Containers](https://www.projectatomic.io/blog/2017/02/selinux-policy-containers/)**
  
-Tightening of SELinux policy to prevent information leaks
-
-**[Extending SELinux Policy for 
Containers](https://www.projectatomic.io/blog/2016/03/selinux-and-docker-part-2/)**
  
-Policy module for running containers as securely as possible
-
-**[Practical SELinux and 
Containers](https://www.projectatomic.io/blog/2016/03/dwalsh_selinux_containers/)**
  
-How to make SELinux and containers work well together with best security 
separation
-
-**[`no-new-privileges` Security Flag in Docker 
](https://www.projectatomic.io/blog/2016/03/no-new-privs-docker/)**  
-Explains `--no-new-privileges` flag usage
-
 **[Container Labeling](https://danwalsh.livejournal.com/81269.html)**  
-Explains `container_t` vs c`ontainer_var_lib_t`
+Explains `container_t` vs `container_var_lib_t`
 
 **[`container_t` versus 
`svirt_lxc_net_t`](https://danwalsh.livejournal.com/79191.html)**  
 Clarifys `container_t` versus `svirt_lxc_net_t` aliases
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.164.2/container.fc 
new/container-selinux-2.171.0/container.fc
--- old/container-selinux-2.164.2/container.fc  2021-08-02 19:18:31.000000000 
+0200
+++ new/container-selinux-2.171.0/container.fc  2021-11-10 23:21:41.000000000 
+0100
@@ -116,6 +116,8 @@
 /var/lib/rancher/k3s/agent/containerd/[^/]*/snapshots/[^/]*            -d      
gen_context(system_u:object_r:container_share_t,s0)
 /var/lib/rancher/k3s/agent/containerd/[^/]*/snapshots/[^/]*/.*                 
<<none>>
 /var/lib/rancher/k3s/agent/containerd/[^/]*/sandboxes(/.*)?                    
gen_context(system_u:object_r:container_share_t,s0)
+/var/lib/rancher/k3s/data/.lock                                     
gen_context(system_u:object_r:container_lock_t,s0)
+/var/lib/rancher/k3s/data/[^/]*/etc(/.*)?                           
gen_context(system_u:object_r:container_config_t,s0)
 /var/run/flannel(/.*)?                                                         
gen_context(system_u:object_r:container_var_run_t,s0)
 /var/run/k3s(/.*)?                                                             
gen_context(system_u:object_r:container_var_run_t,s0)
 /var/run/k3s/containerd/[^/]*/sandboxes/[^/]*/shm(/.*)?                        
        gen_context(system_u:object_r:container_runtime_tmpfs_t,s0)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.164.2/container.if 
new/container-selinux-2.171.0/container.if
--- old/container-selinux-2.164.2/container.if  2021-08-02 19:18:31.000000000 
+0200
+++ new/container-selinux-2.171.0/container.if  2021-11-10 23:21:41.000000000 
+0100
@@ -608,6 +608,7 @@
                type container_lock_t;
                type container_log_t;
                type container_config_t;
+               type container_file_t;
        ')
 
        allow $1 container_runtime_t:process { ptrace signal_perms };
@@ -631,6 +632,8 @@
        admin_pattern($1, container_unit_file_t)
        allow $1 container_unit_file_t:service all_service_perms;
 
+       admin_pattern($1, container_file_t)
+
        optional_policy(`
                systemd_passwd_agent_exec($1)
                systemd_read_fifo_file_passwd_run($1)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/container-selinux-2.164.2/container.te 
new/container-selinux-2.171.0/container.te
--- old/container-selinux-2.164.2/container.te  2021-08-02 19:18:31.000000000 
+0200
+++ new/container-selinux-2.171.0/container.te  2021-11-10 23:21:41.000000000 
+0100
@@ -1,4 +1,4 @@
-policy_module(container, 2.164.2)
+policy_module(container, 2.171.0)
 
 gen_require(`
        class passwd rootok;
@@ -57,7 +57,7 @@
 files_pid_file(spc_var_run_t)
 
 type kubernetes_file_t;
-files_type(kubernetes_file_t)
+files_config_file(kubernetes_file_t)
 
 type container_var_lib_t alias docker_var_lib_t;
 files_type(container_var_lib_t)
@@ -199,7 +199,7 @@
 manage_blk_files_pattern(container_runtime_domain, container_runtime_tmpfs_t, 
container_runtime_tmpfs_t)
 allow container_runtime_domain container_runtime_tmpfs_t:dir relabelfrom;
 can_exec(container_runtime_domain, container_runtime_tmpfs_t)
-fs_tmpfs_filetrans(container_runtime_domain, container_runtime_tmpfs_t, { dir 
file })
+fs_tmpfs_filetrans(container_runtime_domain, container_runtime_tmpfs_t, 
dir_file_class_set)
 allow container_runtime_domain container_runtime_tmpfs_t:chr_file mounton;
 
 manage_dirs_pattern(container_runtime_domain, container_ro_file_t, 
container_ro_file_t)
@@ -802,7 +802,7 @@
 manage_sock_files_pattern(container_domain, container_file_t, container_file_t)
 allow container_domain container_file_t:{file dir} mounton;
 allow container_domain container_file_t:filesystem { mount remount unmount };
-fs_tmpfs_filetrans(container_domain, container_file_t, { dir file })
+fs_tmpfs_filetrans(container_domain, container_file_t, { dir file lnk_file })
 allow container_domain container_file_t:dir_file_class_set { relabelfrom 
relabelto map };
 container_read_share_files(container_domain)
 container_exec_share_files(container_domain)
@@ -875,7 +875,6 @@
 gen_require(`
        type container_file_t;
 ')
-fs_noxattr_type(container_file_t)
 # fs_associate_cgroupfs(container_file_t)
 gen_require(`
        type cgroup_t;
@@ -1033,6 +1032,7 @@
 container_read_pid_files(iptables_t)
 container_read_state(iptables_t)
 container_append_file(iptables_t)
+allow iptables_t container_runtime_domain:fifo_file rw_fifo_file_perms;
 
 optional_policy(`
        gen_require(`
@@ -1112,6 +1112,8 @@
 container_domain_template(container_logreader)
 typeattribute container_logreader_t container_net_domain;
 logging_read_all_logs(container_logreader_t)
+# Remove once https://github.com/fedora-selinux/selinux-policy/pull/898 merges
+allow container_logreader_t logfile:lnk_file read_lnk_file_perms;
 logging_read_audit_log(container_logreader_t)
 logging_list_logs(container_logreader_t)
 
@@ -1126,6 +1128,7 @@
        gen_require(`
                type sysadm_t, staff_t, user_t;
                role sysadm_r, staff_r, user_r;
+               attribute userdomain;
        ')
 
        container_runtime_run(sysadm_t, sysadm_r)
@@ -1139,6 +1142,10 @@
        role user_r types container_user_domain;
 
        staff_role_change_to(system_r)
+
+       allow staff_t container_runtime_t:process signal_perms;
+       allow staff_t container_domain:process signal_perms;
+       allow container_domain userdomain:unix_stream_socket { accept ioctl 
read getattr lock write append getopt };
 ')
 
 gen_require(`
@@ -1157,6 +1164,7 @@
 ')
 dontaudit container_domain device_node:chr_file setattr;
 dontaudit container_domain sysctl_type:file write;
+allow container_domain init_t:unix_stream_socket { accept ioctl read getattr 
lock write append getopt };
 
 allow container_t proc_t:filesystem remount;
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/contrib/container-selinux.spec 
new/container-selinux-2.171.0/contrib/container-selinux.spec
--- old/container-selinux-2.164.2/contrib/container-selinux.spec        
2021-08-02 19:18:31.000000000 +0200
+++ new/container-selinux-2.171.0/contrib/container-selinux.spec        
2021-11-10 23:21:41.000000000 +0100
@@ -78,6 +78,8 @@
 install -d -p %{buildroot}%{_datadir}/selinux/devel/include/services
 install -p -m 644 container.if 
%{buildroot}%{_datadir}/selinux/devel/include/services
 install -m 0644 $MODULES %{buildroot}%{_datadir}/selinux/packages
+install -d %{buildroot}%{_datadir}/udica/templates
+install -m 0644 udica-templates/*.cil %{buildroot}%{_datadir}/udica/templates
 
 # remove spec file
 rm -rf container-selinux.spec
@@ -112,6 +114,7 @@
 %files
 %doc README.md
 %{_datadir}/selinux/*
+%{_datadir}/udica/templates/*
 
 %changelog
 * Fri Jan 06 2017 Dan Walsh <dwa...@redhat.com> - 2:2.1-1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/base_container.cil 
new/container-selinux-2.171.0/udica-templates/base_container.cil
--- old/container-selinux-2.164.2/udica-templates/base_container.cil    
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/base_container.cil    
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,14 @@
+(block container
+(type process)
+(type socket)
+(roletype system_r process)
+(typeattributeset domain (process ))
+(typeattributeset container_domain (process ))
+(typeattributeset svirt_sandbox_domain (process ))
+(typeattributeset mcs_constrained_type (process ))
+(typeattributeset file_type (socket ))
+(allow process socket (sock_file (create open getattr setattr read write 
rename link unlink ioctl lock append)))
+(allow process proc_type (file (getattr open read)))
+(allow process cpu_online_t (file (getattr open read)))
+(allow container_runtime_t process (key (create link read search setattr view 
write)))
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/config_container.cil 
new/container-selinux-2.171.0/udica-templates/config_container.cil
--- old/container-selinux-2.164.2/udica-templates/config_container.cil  
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/config_container.cil  
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,24 @@
+(block config_container
+       (optional config_container_optional
+               (allow process configfile (dir (ioctl read getattr lock search 
open)))
+               (allow process configfile (file (ioctl read getattr lock open)))
+               (allow process configfile (lnk_file (read getattr)))
+       )
+)
+
+(block config_rw_container
+       (blockinherit config_container)
+       (optional config_rw_container_optional
+               (allow process configfile (dir (ioctl read write getattr lock 
append open)))
+               (allow process configfile (file (ioctl read write getattr lock 
append open)))
+               (allow process configfile (lnk_file (ioctl read write getattr 
lock append open)))
+       )
+)
+
+(block config_manage_container
+       (optional config_manage_container_optional
+               (allow process configfile (dir (ioctl read write create getattr 
setattr lock unlink link rename add_name remove_name reparent search rmdir 
open)))
+               (allow process configfile (file (ioctl read write create 
getattr setattr lock append unlink link rename open)))
+               (allow process configfile (lnk_file (ioctl read write create 
getattr setattr lock append unlink link rename open)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/home_container.cil 
new/container-selinux-2.171.0/udica-templates/home_container.cil
--- old/container-selinux-2.164.2/udica-templates/home_container.cil    
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/home_container.cil    
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,37 @@
+(block home_container
+       (optional home_container_optional
+               (allow process process (capability (dac_override )))
+
+               (allow process user_home_dir_t (dir (getattr search open read 
lock ioctl)))
+               (allow process home_root_t (dir (getattr search open read lock 
ioctl)))
+               (allow process user_home_t (dir (getattr search open read lock 
ioctl)))
+
+               (allow process user_home_dir_t (file (getattr ioctl lock open 
read)))
+               (allow process user_home_t (file (getattr ioctl lock open 
read)))
+       )
+)
+
+
+(block home_rw_container
+       (blockinherit home_container)
+       (optional home_rw_container_optional
+               (allow process user_home_dir_t (dir (open getattr setattr read 
write link search add_name remove_name reparent lock ioctl)))
+               (allow process home_root_t (dir (open getattr setattr read 
write link search add_name remove_name reparent lock ioctl)))
+               (allow process user_home_t (dir (open getattr setattr read 
write link search add_name remove_name reparent lock ioctl)))
+
+               (allow process user_home_t (file (open getattr read write 
append ioctl lock)))
+               (allow process user_home_dir_t (file (open getattr read write 
append ioctl lock)))
+       )
+)
+
+(block home_manage_container
+       (blockinherit home_rw_container)
+       (optional home_manage_container_optional
+               (allow process user_home_dir_t (dir (create unlink rename rmdir 
)))
+               (allow process home_root_t (dir (create unlink rename rmdir )))
+               (allow process user_home_t (dir (create unlink rename rmdir )))
+
+               (allow process user_home_t (file (create rename link unlink )))
+               (allow process user_home_dir_t (file (create rename link unlink 
)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/log_container.cil 
new/container-selinux-2.171.0/udica-templates/log_container.cil
--- old/container-selinux-2.164.2/udica-templates/log_container.cil     
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/log_container.cil     
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,35 @@
+(block log_container
+       (optional log_container_optional
+               (allow process var_t (dir (getattr search open)))
+               (allow process logfile (dir (ioctl read getattr lock search 
open)))
+               (allow process logfile (file (ioctl read getattr lock open 
map)))
+               (allow process auditd_log_t (dir (ioctl read getattr lock 
search open)))
+               (allow process auditd_log_t (file (ioctl read getattr lock 
open)))
+       )
+)
+
+
+(block log_rw_container
+       (blockinherit log_container)
+
+       (optional log_rw_container_optional
+               (allow process logfile (dir (ioctl read write create getattr 
setattr lock add_name search open)))
+               (allow process logfile (file (ioctl read write create getattr 
setattr lock append open)))
+               (allow process logfile (lnk_file (ioctl read write getattr lock 
append open)))
+               (allow process var_t (dir (getattr search open)))
+               (allow process auditd_log_t (dir (ioctl read getattr lock 
search open)))
+               (allow process auditd_log_t (file (ioctl read getattr lock 
open)))
+       )
+)
+
+(block log_manage_container
+       (blockinherit log_rw_container)
+
+       (optional log_manage_container_optional
+               (allow process logfile (dir (ioctl read write create getattr 
setattr lock unlink link rename add_name remove_name reparent search rmdir 
open)))
+               (allow process logfile (file (ioctl read write create getattr 
setattr lock append unlink link rename open)))
+               (allow process logfile (lnk_file (ioctl read write create 
getattr setattr lock append unlink link rename)))
+               (allow process auditd_log_t (dir (ioctl read write getattr lock 
search open)))
+               (allow process auditd_log_t (file (ioctl read write getattr 
lock open)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/net_container.cil 
new/container-selinux-2.171.0/udica-templates/net_container.cil
--- old/container-selinux-2.164.2/udica-templates/net_container.cil     
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/net_container.cil     
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,25 @@
+(block net_container
+       (optional net_container_optional
+               (typeattributeset sandbox_net_domain (process))
+       )
+)
+
+(block restricted_net_container
+       (optional restricted_net_container_optional
+               (allow process process (tcp_socket (ioctl read getattr lock 
write setattr append bind connect getopt setopt shutdown create listen accept)))
+               (allow process process (udp_socket (ioctl read getattr lock 
write setattr append bind connect getopt setopt shutdown create)))
+               (allow process process (sctp_socket (ioctl read getattr lock 
write setattr append bind connect getopt setopt shutdown create)))
+
+               (allow process proc_t (lnk_file (read)))
+
+               (allow process node_t (node (tcp_recv tcp_send recvfrom 
sendto)))
+               (allow process node_t (node (udp_recv recvfrom)))
+               (allow process node_t (node (udp_send sendto)))
+
+               (allow process node_t (udp_socket (node_bind)))
+               (allow process node_t (tcp_socket (node_bind)))
+
+               (allow process http_port_t (tcp_socket (name_connect)))
+               (allow process http_port_t (tcp_socket (recv_msg send_msg)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/tmp_container.cil 
new/container-selinux-2.171.0/udica-templates/tmp_container.cil
--- old/container-selinux-2.164.2/udica-templates/tmp_container.cil     
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/tmp_container.cil     
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,15 @@
+(block tmp_container
+       (optional tmp_container_optional
+               (allow process tmpfile (dir (getattr search open)))
+               (allow process tmpfile (file (ioctl read getattr lock open)))
+       )
+)
+
+(block tmp_rw_container
+       (blockinherit tmp_container)
+
+       (optional tmp_rw_container_optional
+               (allow process tmpfile (file (ioctl read write getattr lock 
append open)))
+               (allow process tmpfile (dir (ioctl read write getattr lock 
append open)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/tty_container.cil 
new/container-selinux-2.171.0/udica-templates/tty_container.cil
--- old/container-selinux-2.164.2/udica-templates/tty_container.cil     
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/tty_container.cil     
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,9 @@
+(block tty_container
+       (optional tty_container_optional
+               (allow process device_t (dir (getattr search open)))
+               (allow process device_t (dir (ioctl read getattr lock search 
open)))
+               (allow process device_t (lnk_file (read getattr)))
+
+               (allow process devtty_t (chr_file (ioctl read write getattr 
lock append open)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/virt_container.cil 
new/container-selinux-2.171.0/udica-templates/virt_container.cil
--- old/container-selinux-2.164.2/udica-templates/virt_container.cil    
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/virt_container.cil    
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,14 @@
+(block virt_container
+       (optional virt_container_optional
+               (allow process var_t (dir (getattr search open)))
+               (allow process var_t (lnk_file (read getattr)))
+
+               (allow process var_run_t (dir (getattr search open)))
+               (allow process var_run_t (lnk_file (read getattr)))
+
+               (allow process virt_var_run_t (dir (getattr search open)))
+               (allow process virt_var_run_t (sock_file (write getattr append 
open)))
+
+               (allow process virtd_t (unix_stream_socket (connectto)))
+       )
+)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/container-selinux-2.164.2/udica-templates/x_container.cil 
new/container-selinux-2.171.0/udica-templates/x_container.cil
--- old/container-selinux-2.164.2/udica-templates/x_container.cil       
1970-01-01 01:00:00.000000000 +0100
+++ new/container-selinux-2.171.0/udica-templates/x_container.cil       
2021-11-10 23:21:41.000000000 +0100
@@ -0,0 +1,25 @@
+(block x_container
+       (optional x_container_optional
+               (allow xserver_t process (shm (getattr read write associate 
unix_read unix_write lock)))
+
+               (allow process xserver_t (unix_stream_socket (connectto)))
+
+               (allow process device_t (dir (getattr search open)))
+
+               (allow process dri_device_t (chr_file (ioctl read write getattr 
lock append open map)))
+
+               (allow process xserver_misc_device_t (chr_file (ioctl read 
write getattr lock append open map)))
+
+               (allow process urandom_device_t (chr_file (open read)))
+
+               (allow process tmpfs_t (dir (getattr search open)))
+
+               (allow process tmp_t (dir (getattr search open)))
+               (allow process tmp_t (lnk_file (read getattr)))
+
+               (allow process xserver_tmp_t (dir (getattr search open)))
+               (allow process xserver_tmp_t (sock_file (write getattr append 
open)))
+
+               (allow process xserver_exec_t (file (ioctl read getattr lock 
map execute execute_no_trans open)))
+       )
+)

Reply via email to