more of patch from dan Thu, 20 Apr 2006 14:06:03 -0400
This commit is contained in:
parent
5540e76ac7
commit
0e1c461e05
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(netutils,1.1.1)
|
policy_module(netutils,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -98,6 +98,7 @@ dontaudit ping_t self:capability sys_tty_config;
|
|||||||
allow ping_t self:tcp_socket create_socket_perms;
|
allow ping_t self:tcp_socket create_socket_perms;
|
||||||
allow ping_t self:udp_socket create_socket_perms;
|
allow ping_t self:udp_socket create_socket_perms;
|
||||||
allow ping_t self:rawip_socket { create ioctl read write bind getopt setopt };
|
allow ping_t self:rawip_socket { create ioctl read write bind getopt setopt };
|
||||||
|
allow ping_t self:packet_socket { create ioctl read write bind getopt setopt };
|
||||||
|
|
||||||
corenet_tcp_sendrecv_all_if(ping_t)
|
corenet_tcp_sendrecv_all_if(ping_t)
|
||||||
corenet_udp_sendrecv_all_if(ping_t)
|
corenet_udp_sendrecv_all_if(ping_t)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(usermanage,1.3.3)
|
policy_module(usermanage,1.3.4)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -514,6 +514,7 @@ userdom_dontaudit_search_sysadm_home_dirs(useradd_t)
|
|||||||
# Add/remove user home directories
|
# Add/remove user home directories
|
||||||
userdom_home_filetrans_generic_user_home_dir(useradd_t)
|
userdom_home_filetrans_generic_user_home_dir(useradd_t)
|
||||||
userdom_manage_generic_user_home_content_dirs(useradd_t)
|
userdom_manage_generic_user_home_content_dirs(useradd_t)
|
||||||
|
userdom_manage_generic_user_home_content_files(useradd_t)
|
||||||
userdom_manage_staff_home_dirs(useradd_t)
|
userdom_manage_staff_home_dirs(useradd_t)
|
||||||
userdom_generic_user_home_dir_filetrans_generic_user_home_content(useradd_t,notdevfile_class_set)
|
userdom_generic_user_home_dir_filetrans_generic_user_home_content(useradd_t,notdevfile_class_set)
|
||||||
|
|
||||||
|
@ -145,7 +145,7 @@ ifdef(`distro_gentoo',`
|
|||||||
/usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird-bin -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib(64)?/[^/]*thunderbird[^/]*/thunderbird-bin -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib(64)?/[^/]*thunderbird[^/]*/open-browser\.sh -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib(64)?/[^/]*thunderbird[^/]*/open-browser\.sh -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib(64)?/[^/]*/run-mozilla\.sh -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib(64)?/[^/]*/run-mozilla\.sh -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib(64)?/[^/]*/mozilla-xremote-client -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib(64)?/[^/]*/mozilla-xremote-client -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/lib(64)?/thunderbird.*/mozilla-xremote-client -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib(64)?/thunderbird.*/mozilla-xremote-client -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
|
|
||||||
@ -177,8 +177,9 @@ ifdef(`distro_gentoo', `
|
|||||||
ifdef(`distro_redhat', `
|
ifdef(`distro_redhat', `
|
||||||
/usr/lib/.*/program(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
/usr/lib/.*/program(/.*)? gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/share/authconfig/authconfig-gtk\.py -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/share/authconfig/authconfig-gtk\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
|
/usr/share/authconfig/authconfig-tui\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/share/cvs/contrib/rcs2log -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/share/cvs/contrib/rcs2log -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/share/hwbrowser/hwbrowser -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/share/hwbrowser/hwbrowser -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/share/pwlib/make/ptlib-config -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/share/pwlib/make/ptlib-config -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/share/pydict/pydict\.py -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/share/pydict/pydict\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
/usr/share/rhn/rhn_applet/applet\.py -- gen_context(system_u:object_r:bin_t,s0)
|
/usr/share/rhn/rhn_applet/applet\.py -- gen_context(system_u:object_r:bin_t,s0)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(corecommands,1.3.9)
|
policy_module(corecommands,1.3.10)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1266,6 +1266,26 @@ interface(`files_manage_boot_symlinks',`
|
|||||||
allow $1 boot_t:lnk_file manage_file_perms;
|
allow $1 boot_t:lnk_file manage_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Read kernel files in the /boot directory.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`files_read_kernel_img',`
|
||||||
|
gen_require(`
|
||||||
|
type boot_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 boot_t:dir list_dir_perms;
|
||||||
|
allow $1 boot_t:file { getattr read };
|
||||||
|
allow $1 boot_t:lnk_file { getattr read };
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Install a kernel into the /boot directory.
|
## Install a kernel into the /boot directory.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(files,1.2.7)
|
policy_module(files,1.2.8)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -174,7 +174,7 @@ interface(`term_write_console',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
dev_list_all_dev_nodes($1)
|
dev_list_all_dev_nodes($1)
|
||||||
allow $1 console_device_t:chr_file write;
|
allow $1 console_device_t:chr_file { getattr write append };
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(terminal,1.1.0)
|
policy_module(terminal,1.1.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(pegasus,1.1.1)
|
policy_module(pegasus,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -79,11 +79,16 @@ corenet_tcp_connect_pegasus_http_port(pegasus_t)
|
|||||||
corenet_tcp_connect_pegasus_https_port(pegasus_t)
|
corenet_tcp_connect_pegasus_https_port(pegasus_t)
|
||||||
corenet_tcp_connect_generic_port(pegasus_t)
|
corenet_tcp_connect_generic_port(pegasus_t)
|
||||||
|
|
||||||
|
corecmd_exec_sbin(pegasus_t)
|
||||||
|
corecmd_exec_bin(pegasus_t)
|
||||||
|
corecmd_exec_shell(pegasus_t)
|
||||||
|
|
||||||
dev_read_sysfs(pegasus_t)
|
dev_read_sysfs(pegasus_t)
|
||||||
dev_read_urand(pegasus_t)
|
dev_read_urand(pegasus_t)
|
||||||
|
|
||||||
fs_getattr_all_fs(pegasus_t)
|
fs_getattr_all_fs(pegasus_t)
|
||||||
fs_search_auto_mountpoints(pegasus_t)
|
fs_search_auto_mountpoints(pegasus_t)
|
||||||
|
files_getattr_all_dirs(pegasus_t)
|
||||||
|
|
||||||
term_dontaudit_use_console(pegasus_t)
|
term_dontaudit_use_console(pegasus_t)
|
||||||
|
|
||||||
@ -98,6 +103,8 @@ files_list_var_lib(pegasus_t)
|
|||||||
files_read_var_lib_files(pegasus_t)
|
files_read_var_lib_files(pegasus_t)
|
||||||
files_read_var_lib_symlinks(pegasus_t)
|
files_read_var_lib_symlinks(pegasus_t)
|
||||||
|
|
||||||
|
hostname_exec(pegasus_t)
|
||||||
|
|
||||||
init_use_fds(pegasus_t)
|
init_use_fds(pegasus_t)
|
||||||
init_use_script_ptys(pegasus_t)
|
init_use_script_ptys(pegasus_t)
|
||||||
init_rw_utmp(pegasus_t)
|
init_rw_utmp(pegasus_t)
|
||||||
@ -116,6 +123,7 @@ ifdef(`targeted_policy', `
|
|||||||
term_dontaudit_use_unallocated_ttys(pegasus_t)
|
term_dontaudit_use_unallocated_ttys(pegasus_t)
|
||||||
term_dontaudit_use_generic_ptys(pegasus_t)
|
term_dontaudit_use_generic_ptys(pegasus_t)
|
||||||
files_dontaudit_read_root_files(pegasus_t)
|
files_dontaudit_read_root_files(pegasus_t)
|
||||||
|
unconfined_signull(pegasus_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(samba,1.2.4)
|
policy_module(samba,1.2.5)
|
||||||
|
|
||||||
#################################
|
#################################
|
||||||
#
|
#
|
||||||
@ -107,7 +107,7 @@ files_tmp_filetrans(samba_net_t, samba_net_tmp_t, { file dir })
|
|||||||
|
|
||||||
allow samba_net_t samba_var_t:dir rw_dir_perms;
|
allow samba_net_t samba_var_t:dir rw_dir_perms;
|
||||||
allow samba_net_t samba_var_t:lnk_file create_lnk_perms;
|
allow samba_net_t samba_var_t:lnk_file create_lnk_perms;
|
||||||
allow samba_net_t samba_var_t:file create_lnk_perms;
|
allow samba_net_t samba_var_t:file create_file_perms;
|
||||||
|
|
||||||
kernel_read_proc_symlinks(samba_net_t)
|
kernel_read_proc_symlinks(samba_net_t)
|
||||||
|
|
||||||
|
@ -71,13 +71,8 @@ ifdef(`distro_gentoo',`
|
|||||||
|
|
||||||
/usr/(.*/)?nvidia/.*\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(.*/)?nvidia/.*\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
|
|
||||||
/usr/lib(64)?/pgsql/test/regress/.*\.so -- gen_context(system_u:object_r:shlib_t,s0)
|
|
||||||
|
|
||||||
/usr/lib/win32/.* -- gen_context(system_u:object_r:shlib_t,s0)
|
/usr/lib/win32/.* -- gen_context(system_u:object_r:shlib_t,s0)
|
||||||
|
|
||||||
/usr/lib(64)?/im/.*\.so.* -- gen_context(system_u:object_r:shlib_t,s0)
|
|
||||||
/usr/lib(64)?/iiim/.*\.so.* -- gen_context(system_u:object_r:shlib_t,s0)
|
|
||||||
|
|
||||||
/usr/(.*/)?lib(64)?(/.*)?/nvidia/.*\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(.*/)?lib(64)?(/.*)?/nvidia/.*\.so(\..*)? -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/libsipphoneapi\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/libsipphoneapi\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/(nvidia/)?libGL(core)?\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/(nvidia/)?libGL(core)?\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
@ -104,7 +99,6 @@ ifdef(`distro_gentoo',`
|
|||||||
/usr/lib(64)?/xorg/modules/extensions/nvidia(-[^/]*)?/libglx\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/xorg/modules/extensions/nvidia(-[^/]*)?/libglx\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
/usr/lib(64)?/.*/program/.*\.so.* gen_context(system_u:object_r:shlib_t,s0)
|
|
||||||
/usr/share/rhn/rhn_applet/eggtrayiconmodule\.so -- gen_context(system_u:object_r:shlib_t,s0)
|
/usr/share/rhn/rhn_applet/eggtrayiconmodule\.so -- gen_context(system_u:object_r:shlib_t,s0)
|
||||||
|
|
||||||
# The following are libraries with text relocations in need of execmod permissions
|
# The following are libraries with text relocations in need of execmod permissions
|
||||||
@ -118,7 +112,7 @@ ifdef(`distro_redhat',`
|
|||||||
/usr/lib(64)?/libstdc\+\+\.so\.2\.7\.2\.8 -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/libstdc\+\+\.so\.2\.7\.2\.8 -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/libg\+\+\.so\.2\.7\.2\.8 -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/libg\+\+\.so\.2\.7\.2\.8 -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/libglide3\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/libglide3\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/libglide-v[0-9]*\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/libglide3-v[0-9]*\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/libdv\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/libdv\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/helix/plugins/oggfformat\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/helix/plugins/oggfformat\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/lib(64)?/helix/plugins/theorarend\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/lib(64)?/helix/plugins/theorarend\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
@ -203,16 +197,12 @@ HOME_DIR/.*/plugins/libflashplayer\.so.* -- gen_context(system_u:object_r:textre
|
|||||||
/usr/(.*/)?jre.*/libdeploy.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(.*/)?jre.*/libdeploy.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/(.*/)?jre.*/libjvm.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(.*/)?jre.*/libjvm.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
|
|
||||||
/usr/(.*/)?intellinux/nppdf\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(local/)?Adobe/(.*/)?intellinux/nppdf\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/(.*/)?intellinux/lib/\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(local/)?Adobe/(.*/)?lib/[^/]*\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/(.*/)?intellinux/plug_ins/.*\.api -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(local/)?Adobe/.*\.api -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
/usr/(.*/)?intellinux/SPPlugins/ADMPlugin\.apl -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
/usr/(.*/)?intellinux/SPPlugins/ADMPlugin\.apl -- gen_context(system_u:object_r:textrel_shlib_t,s0)
|
||||||
') dnl end distro_redhat
|
') dnl end distro_redhat
|
||||||
|
|
||||||
ifdef(`distro_suse',`
|
|
||||||
/usr/lib(64)?/samba/classic/[^/]*\.so(\.[^/]*)* -- gen_context(system_u:object_r:shlib_t,s0)
|
|
||||||
')
|
|
||||||
|
|
||||||
#
|
#
|
||||||
# /var
|
# /var
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(libraries,1.3.4)
|
policy_module(libraries,1.3.5)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(logging,1.3.3)
|
policy_module(logging,1.3.4)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -140,7 +140,7 @@ files_list_usr(auditd_t)
|
|||||||
init_use_fds(auditd_t)
|
init_use_fds(auditd_t)
|
||||||
init_exec(auditd_t)
|
init_exec(auditd_t)
|
||||||
init_write_initctl(auditd_t)
|
init_write_initctl(auditd_t)
|
||||||
init_use_script_ptys(auditd_t)
|
init_dontaudit_use_script_ptys(auditd_t)
|
||||||
|
|
||||||
logging_send_syslog_msg(auditd_t)
|
logging_send_syslog_msg(auditd_t)
|
||||||
|
|
||||||
@ -293,7 +293,7 @@ dev_read_sysfs(syslogd_t)
|
|||||||
|
|
||||||
fs_search_auto_mountpoints(syslogd_t)
|
fs_search_auto_mountpoints(syslogd_t)
|
||||||
|
|
||||||
term_dontaudit_use_console(syslogd_t)
|
term_write_console(syslogd_t)
|
||||||
# Allow syslog to a terminal
|
# Allow syslog to a terminal
|
||||||
term_write_unallocated_ttys(syslogd_t)
|
term_write_unallocated_ttys(syslogd_t)
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(sysnetwork,1.1.1)
|
policy_module(sysnetwork,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -248,6 +248,7 @@ optional_policy(`
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
xen_append_log(dhcpc_t)
|
xen_append_log(dhcpc_t)
|
||||||
|
xen_dontaudit_rw_unix_stream_sockets(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -346,4 +347,5 @@ optional_policy(`
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
xen_append_log(ifconfig_t)
|
xen_append_log(ifconfig_t)
|
||||||
|
xen_dontaudit_rw_unix_stream_sockets(ifconfig_t)
|
||||||
')
|
')
|
||||||
|
@ -222,6 +222,24 @@ interface(`unconfined_sigchld',`
|
|||||||
allow $1 unconfined_t:process sigchld;
|
allow $1 unconfined_t:process sigchld;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Send a SIGNULL signal to the unconfined domain.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`unconfined_signull',`
|
||||||
|
gen_require(`
|
||||||
|
type unconfined_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 unconfined_t:process signull;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Send generic signals to the unconfined domain.
|
## Send generic signals to the unconfined domain.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(unconfined,1.3.6)
|
policy_module(unconfined,1.3.7)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -45,6 +45,25 @@ interface(`xen_append_log',`
|
|||||||
dontaudit $1 xend_var_log_t:file write;
|
dontaudit $1 xend_var_log_t:file write;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Do not audit attempts to read and write
|
||||||
|
## Xen unix domain stream sockets.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain to don't audit.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`xen_dontaudit_rw_unix_stream_sockets',`
|
||||||
|
gen_require(`
|
||||||
|
type xend_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
dontaudit $1 xend_t:unix_stream_socket { read write };
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Connect to xenstored over an unix stream socket.
|
## Connect to xenstored over an unix stream socket.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(xen,1.0.1)
|
policy_module(xen,1.0.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -125,6 +125,7 @@ domain_dontaudit_read_all_domains_state(xend_t)
|
|||||||
|
|
||||||
files_read_etc_files(xend_t)
|
files_read_etc_files(xend_t)
|
||||||
files_read_kernel_symbol_table(xend_t)
|
files_read_kernel_symbol_table(xend_t)
|
||||||
|
files_read_kernel_img(xend_t)
|
||||||
|
|
||||||
storage_raw_read_fixed_disk(xend_t)
|
storage_raw_read_fixed_disk(xend_t)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user