File suse_modifications_systemd.patch of Package selinux-policy.37503

Index: serefpolicy-20140730/policy/modules/system/systemd.te
===================================================================
--- serefpolicy-20140730.orig/policy/modules/system/systemd.te	2015-06-24 14:42:23.931790867 +0200
+++ serefpolicy-20140730/policy/modules/system/systemd.te	2015-06-24 15:34:50.677937166 +0200
@@ -189,6 +189,9 @@ userdom_manage_tmpfs_role(system_r, syst
 
 xserver_dbus_chat(systemd_logind_t)
 
+allow systemd_logind_t var_run_t:sock_file write;
+files_rw_inherited_generic_pid_files(systemd_logind_t)
+
 optional_policy(`
 	apache_read_tmp_files(systemd_logind_t)
 ')
@@ -528,9 +531,14 @@ allow systemd_hostnamed_t self:unix_stre
 allow systemd_hostnamed_t self:unix_dgram_socket create_socket_perms;
 
 manage_files_pattern(systemd_hostnamed_t, hostname_etc_t, hostname_etc_t)
+manage_files_pattern(systemd_hostnamed_t, hostname_etc_t, hostname_etc_t)
 manage_lnk_files_pattern(systemd_hostnamed_t, hostname_etc_t, hostname_etc_t)
 files_etc_filetrans(systemd_hostnamed_t, hostname_etc_t, file, "hostname" )
 files_etc_filetrans(systemd_hostnamed_t, hostname_etc_t, file, "machine-info" )
+# since we have unpredictable filenames for the link file we can't use a named transition
+create_lnk_files_pattern( systemd_hostnamed_t, etc_t, etc_t )
+delete_lnk_files_pattern( systemd_hostnamed_t, etc_t, etc_t )
+rename_lnk_files_pattern( systemd_hostnamed_t, etc_t, etc_t )
 
 kernel_dgram_send(systemd_hostnamed_t)
 
@@ -608,6 +616,10 @@ optional_policy(`
 ')
 
 optional_policy(`
+	unconfined_dbus_send(systemd_timedated_t)
+')
+
+optional_policy(`
 	gnome_manage_usr_config(systemd_timedated_t)
 	gnome_manage_home_config(systemd_timedated_t)
 	gnome_manage_home_config_dirs(systemd_timedated_t)
openSUSE Build Service is sponsored by