colord: add watch perms
avc: denied { watch } for pid=12656 comm="gmain" path="/var/lib/colord/icc" dev="zfs" ino=100677 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:colord_var_lib_t:s0 tclass=dir permissive=0 avc: denied { watch } for pid=12656 comm="gmain" path="/usr/share/color/icc/colord" dev="zfs" ino=67586 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Signed-off-by: Jason Zaman <jason@perfinion.com>
This commit is contained in:
parent
575f9494e7
commit
9f8194fdf4
|
@ -42,6 +42,7 @@ fs_tmpfs_filetrans(colord_t, colord_tmpfs_t, { dir file })
|
|||
manage_dirs_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||
manage_files_pattern(colord_t, colord_var_lib_t, colord_var_lib_t)
|
||||
files_var_lib_filetrans(colord_t, colord_var_lib_t, dir)
|
||||
allow colord_t colord_var_lib_t:dir watch;
|
||||
|
||||
kernel_read_crypto_sysctls(colord_t)
|
||||
kernel_read_device_sysctls(colord_t)
|
||||
|
@ -82,6 +83,7 @@ domain_use_interactive_fds(colord_t)
|
|||
files_list_mnt(colord_t)
|
||||
files_read_usr_files(colord_t)
|
||||
files_map_usr_files(colord_t)
|
||||
files_watch_usr_dirs(colord_t)
|
||||
|
||||
fs_getattr_noxattr_fs(colord_t)
|
||||
fs_getattr_tmpfs(colord_t)
|
||||
|
|
Loading…
Reference in New Issue