2008-05-07 15:13:49 +00:00
|
|
|
diff --exclude-from=exclude --exclude=sepolgen-1.0.11 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/Makefile policycoreutils-2.0.47/Makefile
|
2007-12-19 17:55:58 +00:00
|
|
|
--- nsapolicycoreutils/Makefile 2007-12-19 06:02:52.000000000 -0500
|
2008-05-16 15:16:20 +00:00
|
|
|
+++ policycoreutils-2.0.47/Makefile 2008-05-07 11:11:19.000000000 -0400
|
2006-11-14 16:03:27 +00:00
|
|
|
@@ -1,4 +1,4 @@
|
2007-12-19 17:55:58 +00:00
|
|
|
-SUBDIRS = setfiles semanage load_policy newrole run_init secon audit2allow audit2why scripts sestatus semodule_package semodule semodule_link semodule_expand semodule_deps setsebool po
|
|
|
|
+SUBDIRS = setfiles semanage load_policy newrole run_init secon audit2allow audit2why scripts sestatus semodule_package semodule semodule_link semodule_expand semodule_deps setsebool po gui
|
2006-11-14 16:03:27 +00:00
|
|
|
|
2007-12-19 17:55:58 +00:00
|
|
|
INOTIFYH = $(shell ls /usr/include/sys/inotify.h 2>/dev/null)
|
|
|
|
|
2008-05-07 15:13:49 +00:00
|
|
|
diff --exclude-from=exclude --exclude=sepolgen-1.0.11 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.c policycoreutils-2.0.47/restorecond/restorecond.c
|
2007-07-20 16:09:40 +00:00
|
|
|
--- nsapolicycoreutils/restorecond/restorecond.c 2007-07-16 14:20:41.000000000 -0400
|
2008-05-16 15:16:20 +00:00
|
|
|
+++ policycoreutils-2.0.47/restorecond/restorecond.c 2008-05-07 11:11:19.000000000 -0400
|
2006-11-29 17:48:22 +00:00
|
|
|
@@ -210,9 +210,10 @@
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fsetfilecon(fd, scontext) < 0) {
|
|
|
|
- syslog(LOG_ERR,
|
|
|
|
- "set context %s->%s failed:'%s'\n",
|
|
|
|
- filename, scontext, strerror(errno));
|
|
|
|
+ if (errno != EOPNOTSUPP)
|
|
|
|
+ syslog(LOG_ERR,
|
|
|
|
+ "set context %s->%s failed:'%s'\n",
|
|
|
|
+ filename, scontext, strerror(errno));
|
|
|
|
if (retcontext >= 0)
|
|
|
|
free(prev_context);
|
|
|
|
free(scontext);
|
|
|
|
@@ -225,8 +226,9 @@
|
|
|
|
if (retcontext >= 0)
|
|
|
|
free(prev_context);
|
|
|
|
} else {
|
|
|
|
- syslog(LOG_ERR, "get context on %s failed: '%s'\n",
|
|
|
|
- filename, strerror(errno));
|
|
|
|
+ if (errno != EOPNOTSUPP)
|
|
|
|
+ syslog(LOG_ERR, "get context on %s failed: '%s'\n",
|
|
|
|
+ filename, strerror(errno));
|
|
|
|
}
|
|
|
|
free(scontext);
|
|
|
|
close(fd);
|
2008-05-07 15:13:49 +00:00
|
|
|
diff --exclude-from=exclude --exclude=sepolgen-1.0.11 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/restorecond/restorecond.init policycoreutils-2.0.47/restorecond/restorecond.init
|
2008-05-07 11:38:31 +00:00
|
|
|
--- nsapolicycoreutils/restorecond/restorecond.init 2007-07-16 14:20:41.000000000 -0400
|
2008-05-16 15:16:20 +00:00
|
|
|
+++ policycoreutils-2.0.47/restorecond/restorecond.init 2008-05-07 11:11:19.000000000 -0400
|
2008-05-07 11:38:31 +00:00
|
|
|
@@ -2,7 +2,7 @@
|
|
|
|
#
|
|
|
|
# restorecond: Daemon used to maintain path file context
|
|
|
|
#
|
|
|
|
-# chkconfig: 2345 12 87
|
|
|
|
+# chkconfig: - 12 87
|
|
|
|
# description: restorecond uses inotify to look for creation of new files \
|
|
|
|
# listed in the /etc/selinux/restorecond.conf file, and restores the \
|
|
|
|
# correct security context.
|
2008-05-07 15:13:49 +00:00
|
|
|
diff --exclude-from=exclude --exclude=sepolgen-1.0.11 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/scripts/fixfiles policycoreutils-2.0.47/scripts/fixfiles
|
2008-05-16 15:16:20 +00:00
|
|
|
--- nsapolicycoreutils/scripts/fixfiles 2008-05-06 14:33:04.000000000 -0400
|
|
|
|
+++ policycoreutils-2.0.47/scripts/fixfiles 2008-05-07 11:20:16.000000000 -0400
|
2008-05-07 15:13:49 +00:00
|
|
|
@@ -151,6 +151,7 @@
|
|
|
|
relabel() {
|
|
|
|
if [ ! -z "$RPMFILES" ]; then
|
|
|
|
restore
|
|
|
|
+ rm -rf /tmp/gconfd-* /tmp/pulse-* /tmp/orbit-*
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ $fullFlag == 1 ]; then
|
2008-05-16 15:16:20 +00:00
|
|
|
@@ -180,6 +181,10 @@
|
|
|
|
check) restore -n -v;;
|
|
|
|
verify) restore -n -o -;;
|
|
|
|
relabel) relabel;;
|
|
|
|
+ onboot)
|
|
|
|
+ touch /.autorelabel
|
|
|
|
+ echo "System will relabel on next boot"
|
|
|
|
+ ;;
|
|
|
|
*)
|
|
|
|
usage
|
|
|
|
exit 1
|
|
|
|
@@ -189,6 +194,7 @@
|
|
|
|
echo $"Usage: $0 [-l logfile ] [-o outputfile ] { check | restore|[-F] relabel } [[dir] ... ] "
|
|
|
|
echo or
|
|
|
|
echo $"Usage: $0 -R rpmpackage[,rpmpackage...] -C PREVIOUS_FILECONTEXT [-l logfile ] [-o outputfile ] { check | restore }"
|
|
|
|
+ echo $"Usage: $0 onboot"
|
|
|
|
}
|
|
|
|
|
|
|
|
if [ $# = 0 ]; then
|
|
|
|
diff --exclude-from=exclude --exclude=sepolgen-1.0.11 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/scripts/fixfiles.8 policycoreutils-2.0.47/scripts/fixfiles.8
|
|
|
|
--- nsapolicycoreutils/scripts/fixfiles.8 2008-05-06 14:33:04.000000000 -0400
|
|
|
|
+++ policycoreutils-2.0.47/scripts/fixfiles.8 2008-05-07 11:22:34.000000000 -0400
|
|
|
|
@@ -7,6 +7,8 @@
|
|
|
|
|
|
|
|
.B fixfiles [-F] [-l logfile ] [-o outputfile ] { check | restore|[-f] relabel | verify } [[dir/file] ... ]
|
|
|
|
|
|
|
|
+.B fixfiles onboot
|
|
|
|
+
|
|
|
|
.SH "DESCRIPTION"
|
|
|
|
This manual page describes the
|
|
|
|
.BR fixfiles
|
|
|
|
@@ -20,6 +22,9 @@
|
|
|
|
as you expect. By default it will relabel all mounted ext2, ext3, xfs and
|
|
|
|
jfs file systems as long as they do not have a security context mount
|
|
|
|
option. You can use the -R flag to use rpmpackages as an alternative.
|
|
|
|
+.P
|
|
|
|
+.B fixfiles onboot
|
|
|
|
+will setup the machine to relabel on the next reboot.
|
|
|
|
|
|
|
|
.SH "OPTIONS"
|
|
|
|
.TP
|
2008-05-07 15:13:49 +00:00
|
|
|
diff --exclude-from=exclude --exclude=sepolgen-1.0.11 --exclude=gui --exclude=po -N -u -r nsapolicycoreutils/semanage/seobject.py policycoreutils-2.0.47/semanage/seobject.py
|
2008-05-16 15:16:20 +00:00
|
|
|
--- nsapolicycoreutils/semanage/seobject.py 2008-05-16 10:55:38.000000000 -0400
|
|
|
|
+++ policycoreutils-2.0.47/semanage/seobject.py 2008-05-16 09:08:55.000000000 -0400
|
2008-03-20 12:43:37 +00:00
|
|
|
@@ -464,7 +464,7 @@
|
|
|
|
def __init__(self, store = ""):
|
|
|
|
semanageRecords.__init__(self, store)
|
|
|
|
|
|
|
|
- def add(self, name, roles, selevel, serange, prefix):
|
|
|
|
+ def add(self, name, roles, selevel, serange, prefix = "user"):
|
|
|
|
if is_mls_enabled == 1:
|
|
|
|
if serange == "":
|
|
|
|
serange = "s0"
|