add sysstat
This commit is contained in:
parent
686f1347b2
commit
0f73fdea9b
@ -1,3 +1,6 @@
|
|||||||
|
- Added modules:
|
||||||
|
sysstat
|
||||||
|
|
||||||
* Wed Dec 07 2005 Chris PeBenito <selinux@tresys.com> - 20051207
|
* Wed Dec 07 2005 Chris PeBenito <selinux@tresys.com> - 20051207
|
||||||
- Add unlabeled IPSEC association rule to domains with
|
- Add unlabeled IPSEC association rule to domains with
|
||||||
networking permissions.
|
networking permissions.
|
||||||
|
@ -155,6 +155,23 @@ interface(`term_write_console',`
|
|||||||
allow $1 console_device_t:chr_file write;
|
allow $1 console_device_t:chr_file write;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Read from the console.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`term_read_console',`
|
||||||
|
gen_require(`
|
||||||
|
type console_device_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
dev_list_all_dev_nodes($1)
|
||||||
|
allow $1 console_device_t:chr_file read;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read from and write to the console.
|
## Read from and write to the console.
|
||||||
|
@ -398,6 +398,10 @@ ifdef(`targeted_policy',`
|
|||||||
#samba_read_secrets(system_crond_t)
|
#samba_read_secrets(system_crond_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`sysstat',`
|
||||||
|
sysstat_manage_log(system_crond_t)
|
||||||
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
dontaudit userdomain system_crond_t:fd use;
|
dontaudit userdomain system_crond_t:fd use;
|
||||||
|
|
||||||
|
8
refpolicy/policy/modules/services/sysstat.fc
Normal file
8
refpolicy/policy/modules/services/sysstat.fc
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
|
||||||
|
/usr/lib(64)?/atsar/atsa.* -- gen_context(system_u:object_r:sysstat_exec_t,s0)
|
||||||
|
/usr/lib(64)?/sa/sadc -- gen_context(system_u:object_r:sysstat_exec_t,s0)
|
||||||
|
/usr/lib(64)?/sysstat/sa.* -- gen_context(system_u:object_r:sysstat_exec_t,s0)
|
||||||
|
|
||||||
|
/var/log/atsar(/.*)? gen_context(system_u:object_r:sysstat_log_t,s0)
|
||||||
|
/var/log/sa(/.*)? gen_context(system_u:object_r:sysstat_log_t,s0)
|
||||||
|
/var/log/sysstat(/.*)? gen_context(system_u:object_r:sysstat_log_t,s0)
|
19
refpolicy/policy/modules/services/sysstat.if
Normal file
19
refpolicy/policy/modules/services/sysstat.if
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
## <summary>Policy for sysstat. Reports on various system states</summary>
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Manage sysstat logs.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`sysstat_manage_log',`
|
||||||
|
gen_require(`
|
||||||
|
type sysstat_log_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
logging_search_logs($1)
|
||||||
|
allow $1 sysstat_log_t:dir rw_dir_perms;
|
||||||
|
allow $1 sysstat_log_t:file manage_file_perms;
|
||||||
|
')
|
71
refpolicy/policy/modules/services/sysstat.te
Normal file
71
refpolicy/policy/modules/services/sysstat.te
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
|
||||||
|
policy_module(sysstat,1.0.0)
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
# Declarations
|
||||||
|
#
|
||||||
|
|
||||||
|
type sysstat_t;
|
||||||
|
type sysstat_exec_t;
|
||||||
|
init_system_domain(sysstat_t,sysstat_exec_t)
|
||||||
|
role system_r types sysstat_t;
|
||||||
|
|
||||||
|
type sysstat_log_t;
|
||||||
|
logging_log_file(sysstat_log_t)
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
# Local policy
|
||||||
|
#
|
||||||
|
|
||||||
|
allow sysstat_t self:capability sys_resource;
|
||||||
|
dontaudit sysstat_t self:capability sys_admin;
|
||||||
|
allow sysstat_t self:fifo_file rw_file_perms;
|
||||||
|
|
||||||
|
can_exec(sysstat_t, sysstat_exec_t)
|
||||||
|
|
||||||
|
allow sysstat_t sysstat_log_t:file create_file_perms;
|
||||||
|
allow sysstat_t sysstat_log_t:dir rw_dir_perms;
|
||||||
|
logging_create_log(sysstat_t,sysstat_log_t,{ file dir })
|
||||||
|
|
||||||
|
# get info from /proc
|
||||||
|
kernel_read_system_state(sysstat_t)
|
||||||
|
kernel_read_network_state(sysstat_t)
|
||||||
|
kernel_read_kernel_sysctl(sysstat_t)
|
||||||
|
kernel_read_fs_sysctl(sysstat_t)
|
||||||
|
kernel_read_rpc_sysctl(sysstat_t)
|
||||||
|
|
||||||
|
corecmd_dontaudit_search_sbin(sysstat_t)
|
||||||
|
corecmd_exec_bin(sysstat_t)
|
||||||
|
|
||||||
|
dev_read_urand(sysstat_t)
|
||||||
|
|
||||||
|
files_search_var(sysstat_t)
|
||||||
|
# for mtab
|
||||||
|
files_read_etc_runtime_files(sysstat_t)
|
||||||
|
#for fstab
|
||||||
|
files_read_etc_files(sysstat_t)
|
||||||
|
|
||||||
|
fs_getattr_xattr_fs(sysstat_t)
|
||||||
|
|
||||||
|
term_use_controlling_term(sysstat_t)
|
||||||
|
term_rw_console(sysstat_t)
|
||||||
|
|
||||||
|
init_use_fd(sysstat_t)
|
||||||
|
init_use_script_pty(sysstat_t)
|
||||||
|
|
||||||
|
libs_use_ld_so(sysstat_t)
|
||||||
|
libs_use_shared_libs(sysstat_t)
|
||||||
|
|
||||||
|
miscfiles_read_localization(sysstat_t)
|
||||||
|
|
||||||
|
userdom_dontaudit_read_sysadm_home_dir(sysstat_t)
|
||||||
|
|
||||||
|
optional_policy(`cron',`
|
||||||
|
cron_system_entry(sysstat_t,sysstat_exec_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`logging',`
|
||||||
|
logging_send_syslog_msg(sysstat_t)
|
||||||
|
')
|
Loading…
Reference in New Issue
Block a user