From 1b0ce6c9846cab9814020df7e9b7c2c2222a3028 Mon Sep 17 00:00:00 2001 From: Jeremy Solt Date: Fri, 24 Sep 2010 16:14:00 -0400 Subject: [PATCH] setrans patch from Dan Walsh Edits: - Leaving out the mls_trusted_object(setrans_t) for now --- policy/modules/system/setrans.te | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/policy/modules/system/setrans.te b/policy/modules/system/setrans.te index 4ec45a482..4dd54c8cf 100644 --- a/policy/modules/system/setrans.te +++ b/policy/modules/system/setrans.te @@ -44,9 +44,10 @@ can_exec(setrans_t, setrans_exec_t) corecmd_search_bin(setrans_t) # create unix domain socket in /var +manage_dirs_pattern(setrans_t, setrans_var_run_t, setrans_var_run_t) manage_files_pattern(setrans_t, setrans_var_run_t, setrans_var_run_t) manage_sock_files_pattern(setrans_t, setrans_var_run_t, setrans_var_run_t) -files_pid_filetrans(setrans_t, setrans_var_run_t, file) +files_pid_filetrans(setrans_t, setrans_var_run_t, { file dir }) kernel_read_kernel_sysctls(setrans_t) kernel_read_proc_symlinks(setrans_t)