trunk: podsleuth and hal updates from dan.

This commit is contained in:
Chris PeBenito 2008-06-17 14:07:44 +00:00
parent eb4216397c
commit 131634a581
8 changed files with 119 additions and 7 deletions

View File

@ -13,6 +13,7 @@
- Added modules: - Added modules:
kerneloops (Dan Walsh) kerneloops (Dan Walsh)
kismet (Dan Walsh) kismet (Dan Walsh)
podsleuth (Dan Walsh)
prelude (Dan Walsh) prelude (Dan Walsh)
qemu (Dan Walsh) qemu (Dan Walsh)
virt (Dan Walsh) virt (Dan Walsh)

View File

@ -18,3 +18,22 @@ interface(`mono_domtrans',`
corecmd_search_bin($1) corecmd_search_bin($1)
domtrans_pattern($1, mono_exec_t, mono_t) domtrans_pattern($1, mono_exec_t, mono_t)
') ')
########################################
## <summary>
## Execute the mono program in the caller domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`mono_exec',`
gen_require(`
type mono_t, mono_exec_t;
')
corecmd_search_bin($1)
can_exec($1, mono_exec_t)
')

View File

@ -1,5 +1,5 @@
policy_module(mono,1.4.1) policy_module(mono,1.4.2)
######################################## ########################################
# #

View File

@ -0,0 +1,2 @@
/usr/bin/podsleuth -- gen_context(system_u:object_r:podsleuth_exec_t,s0)

View File

@ -0,0 +1,19 @@
## <summary>Podsleuth is a tool to get information about an Apple (TM) iPod (TM)</summary>
########################################
## <summary>
## Execute a domain transition to run podsleuth.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`podsleuth_domtrans',`
gen_require(`
type podsleuth_t, podsleuth_exec_t;
')
domtrans_pattern($1, podsleuth_exec_t, podsleuth_t)
')

View File

@ -0,0 +1,38 @@
policy_module(podsleuth, 1.0.0)
########################################
#
# Declarations
#
type podsleuth_t;
type podsleuth_exec_t;
application_domain(podsleuth_t, podsleuth_exec_t)
role system_r types podsleuth_t;
########################################
#
# podsleuth local policy
#
allow podsleuth_t self:process { signal getsched execheap execmem };
allow podsleuth_t self:fifo_file rw_file_perms;
allow podsleuth_t self:unix_stream_socket create_stream_socket_perms;
kernel_read_system_state(podsleuth_t)
dev_read_urand(podsleuth_t)
files_read_etc_files(podsleuth_t)
libs_use_ld_so(podsleuth_t)
libs_use_shared_libs(podsleuth_t)
miscfiles_read_localization(podsleuth_t)
dbus_system_bus_client_template(podsleuth, podsleuth_t)
mono_exec(podsleuth_t)
hal_dbus_chat(podsleuth_t)

View File

@ -8,6 +8,7 @@
/usr/libexec/hal-hotplug-map -- gen_context(system_u:object_r:hald_exec_t,s0) /usr/libexec/hal-hotplug-map -- gen_context(system_u:object_r:hald_exec_t,s0)
/usr/libexec/hal-system-sonypic -- gen_context(system_u:object_r:hald_sonypic_exec_t,s0) /usr/libexec/hal-system-sonypic -- gen_context(system_u:object_r:hald_sonypic_exec_t,s0)
/usr/libexec/hald-addon-macbookpro-backlight -- gen_context(system_u:object_r:hald_mac_exec_t,s0) /usr/libexec/hald-addon-macbookpro-backlight -- gen_context(system_u:object_r:hald_mac_exec_t,s0)
/usr/libexec/hald-addon-macbook-backlight -- gen_context(system_u:object_r:hald_mac_exec_t,s0)
/usr/sbin/hald -- gen_context(system_u:object_r:hald_exec_t,s0) /usr/sbin/hald -- gen_context(system_u:object_r:hald_exec_t,s0)
@ -15,10 +16,14 @@
/var/lib/hal(/.*)? gen_context(system_u:object_r:hald_var_lib_t,s0) /var/lib/hal(/.*)? gen_context(system_u:object_r:hald_var_lib_t,s0)
/var/log/pm(/.*)? gen_context(system_u:object_r:hald_log_t,s0)
/var/log/pm-suspend\.log gen_context(system_u:object_r:hald_log_t,s0) /var/log/pm-suspend\.log gen_context(system_u:object_r:hald_log_t,s0)
/var/run/hald(/.*)? gen_context(system_u:object_r:hald_var_run_t,s0)
/var/run/haldaemon\.pid -- gen_context(system_u:object_r:hald_var_run_t,s0) /var/run/haldaemon\.pid -- gen_context(system_u:object_r:hald_var_run_t,s0)
/var/run/vbestate -- gen_context(system_u:object_r:hald_var_run_t,s0) /var/run/pm(/.*)? gen_context(system_u:object_r:hald_var_run_t,s0)
/var/run/pm-utils(/.*)? gen_context(system_u:object_r:hald_var_run_t,s0)
/var/run/vbe.* -- gen_context(system_u:object_r:hald_var_run_t,s0)
ifdef(`distro_gentoo',` ifdef(`distro_gentoo',`
/var/lib/cache/hald(/.*)? gen_context(system_u:object_r:hald_cache_t,s0) /var/lib/cache/hald(/.*)? gen_context(system_u:object_r:hald_cache_t,s0)

View File

@ -1,5 +1,5 @@
policy_module(hal,1.9.2) policy_module(hal,1.9.3)
######################################## ########################################
# #
@ -57,7 +57,7 @@ files_type(hald_var_lib_t)
# execute openvt which needs setuid # execute openvt which needs setuid
allow hald_t self:capability { chown setuid setgid kill net_admin sys_admin sys_nice dac_override dac_read_search mknod sys_rawio sys_tty_config }; allow hald_t self:capability { chown setuid setgid kill net_admin sys_admin sys_nice dac_override dac_read_search mknod sys_rawio sys_tty_config };
dontaudit hald_t self:capability {sys_ptrace sys_tty_config }; dontaudit hald_t self:capability {sys_ptrace sys_tty_config };
allow hald_t self:process signal_perms; allow hald_t self:process { getattr signal_perms };
allow hald_t self:fifo_file rw_fifo_file_perms; allow hald_t self:fifo_file rw_fifo_file_perms;
allow hald_t self:unix_stream_socket { create_stream_socket_perms connectto }; allow hald_t self:unix_stream_socket { create_stream_socket_perms connectto };
allow hald_t self:unix_dgram_socket create_socket_perms; allow hald_t self:unix_dgram_socket create_socket_perms;
@ -70,7 +70,7 @@ allow hald_t self:netlink_socket create_socket_perms;
manage_files_pattern(hald_t,hald_cache_t,hald_cache_t) manage_files_pattern(hald_t,hald_cache_t,hald_cache_t)
# log files for hald # log files for hald
allow hald_t hald_log_t:file manage_file_perms; manage_files_pattern(hald_t, hald_log_t, hald_log_t)
logging_log_filetrans(hald_t,hald_log_t,file) logging_log_filetrans(hald_t,hald_log_t,file)
manage_dirs_pattern(hald_t,hald_tmp_t,hald_tmp_t) manage_dirs_pattern(hald_t,hald_tmp_t,hald_tmp_t)
@ -82,8 +82,9 @@ manage_dirs_pattern(hald_t,hald_var_lib_t,hald_var_lib_t)
manage_files_pattern(hald_t,hald_var_lib_t,hald_var_lib_t) manage_files_pattern(hald_t,hald_var_lib_t,hald_var_lib_t)
manage_sock_files_pattern(hald_t,hald_var_lib_t,hald_var_lib_t) manage_sock_files_pattern(hald_t,hald_var_lib_t,hald_var_lib_t)
manage_dirs_pattern(hald_t, hald_var_run_t, hald_var_run_t)
manage_files_pattern(hald_t,hald_var_run_t,hald_var_run_t) manage_files_pattern(hald_t,hald_var_run_t,hald_var_run_t)
files_pid_filetrans(hald_t,hald_var_run_t,file) files_pid_filetrans(hald_t, hald_var_run_t, { dir file })
kernel_read_system_state(hald_t) kernel_read_system_state(hald_t)
kernel_read_network_state(hald_t) kernel_read_network_state(hald_t)
@ -93,6 +94,7 @@ kernel_read_fs_sysctls(hald_t)
kernel_rw_irq_sysctls(hald_t) kernel_rw_irq_sysctls(hald_t)
kernel_rw_vm_sysctls(hald_t) kernel_rw_vm_sysctls(hald_t)
kernel_write_proc_files(hald_t) kernel_write_proc_files(hald_t)
kernel_setsched(hald_t)
auth_read_pam_console_data(hald_t) auth_read_pam_console_data(hald_t)
@ -119,8 +121,10 @@ dev_rw_generic_usb_dev(hald_t)
dev_setattr_generic_usb_dev(hald_t) dev_setattr_generic_usb_dev(hald_t)
dev_setattr_usbfs_files(hald_t) dev_setattr_usbfs_files(hald_t)
dev_rw_power_management(hald_t) dev_rw_power_management(hald_t)
dev_read_raw_memory(hald_t)
# hal is now execing pm-suspend # hal is now execing pm-suspend
dev_rw_sysfs(hald_t) dev_rw_sysfs(hald_t)
dev_read_video_dev(hald_t)
domain_use_interactive_fds(hald_t) domain_use_interactive_fds(hald_t)
domain_read_all_domains_state(hald_t) domain_read_all_domains_state(hald_t)
@ -166,6 +170,8 @@ term_dontaudit_use_unallocated_ttys(hald_t)
auth_use_nsswitch(hald_t) auth_use_nsswitch(hald_t)
fstools_getattr_swap_files(hald_t)
init_domtrans_script(hald_t) init_domtrans_script(hald_t)
init_read_utmp(hald_t) init_read_utmp(hald_t)
#hal runs shutdown, probably need a shutdown domain #hal runs shutdown, probably need a shutdown domain
@ -244,6 +250,10 @@ optional_policy(`
dmidecode_domtrans(hald_t) dmidecode_domtrans(hald_t)
') ')
optional_policy(`
gpm_dontaudit_getattr_gpmctl(hald_t)
')
optional_policy(` optional_policy(`
hotplug_read_config(hald_t) hotplug_read_config(hald_t)
') ')
@ -265,6 +275,10 @@ optional_policy(`
pcmcia_manage_pid_chr_files(hald_t) pcmcia_manage_pid_chr_files(hald_t)
') ')
optional_policy(`
podsleuth_domtrans(hald_t)
')
optional_policy(` optional_policy(`
rpc_search_nfs_state_data(hald_t) rpc_search_nfs_state_data(hald_t)
') ')
@ -292,7 +306,8 @@ optional_policy(`
# #
allow hald_acl_t self:capability { dac_override fowner }; allow hald_acl_t self:capability { dac_override fowner };
allow hald_acl_t self:fifo_file read_fifo_file_perms; allow hald_acl_t self:process { getattr signal };
allow hald_acl_t self:fifo_file rw_fifo_file_perms;
domtrans_pattern(hald_t, hald_acl_exec_t, hald_acl_t) domtrans_pattern(hald_t, hald_acl_exec_t, hald_acl_t)
allow hald_t hald_acl_t:process signal; allow hald_t hald_acl_t:process signal;
@ -302,9 +317,14 @@ manage_dirs_pattern(hald_acl_t,hald_var_lib_t,hald_var_lib_t)
manage_files_pattern(hald_acl_t,hald_var_lib_t,hald_var_lib_t) manage_files_pattern(hald_acl_t,hald_var_lib_t,hald_var_lib_t)
files_search_var_lib(hald_acl_t) files_search_var_lib(hald_acl_t)
manage_dirs_pattern(hald_acl_t, hald_var_run_t, hald_var_run_t)
manage_files_pattern(hald_acl_t, hald_var_run_t, hald_var_run_t)
files_pid_filetrans(hald_acl_t, hald_var_run_t, { dir file })
corecmd_exec_bin(hald_acl_t) corecmd_exec_bin(hald_acl_t)
dev_getattr_all_chr_files(hald_acl_t) dev_getattr_all_chr_files(hald_acl_t)
dev_setattr_all_chr_files(hald_acl_t)
dev_getattr_generic_usb_dev(hald_acl_t) dev_getattr_generic_usb_dev(hald_acl_t)
dev_getattr_video_dev(hald_acl_t) dev_getattr_video_dev(hald_acl_t)
dev_setattr_video_dev(hald_acl_t) dev_setattr_video_dev(hald_acl_t)
@ -339,7 +359,11 @@ manage_dirs_pattern(hald_mac_t,hald_var_lib_t,hald_var_lib_t)
manage_files_pattern(hald_mac_t,hald_var_lib_t,hald_var_lib_t) manage_files_pattern(hald_mac_t,hald_var_lib_t,hald_var_lib_t)
files_search_var_lib(hald_mac_t) files_search_var_lib(hald_mac_t)
kernel_read_system_state(hald_mac_t)
dev_read_raw_memory(hald_mac_t)
dev_write_raw_memory(hald_mac_t) dev_write_raw_memory(hald_mac_t)
dev_read_sysfs(hald_mac_t)
files_read_usr_files(hald_mac_t) files_read_usr_files(hald_mac_t)
@ -392,3 +416,7 @@ libs_use_ld_so(hald_keymap_t)
libs_use_shared_libs(hald_keymap_t) libs_use_shared_libs(hald_keymap_t)
miscfiles_read_localization(hald_keymap_t) miscfiles_read_localization(hald_keymap_t)
# This is caused by a bug in hald and PolicyKit.
# Should be removed when this is fixed
#cron_read_system_job_lib_files(hald_t)