Hal patch from Dan Walsh.
This commit is contained in:
parent
3079cbceb1
commit
21673b238a
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(corenetwork, 1.13.5)
|
||||
policy_module(corenetwork, 1.13.6)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -97,7 +97,7 @@ network_port(dict, tcp,2628,s0)
|
||||
network_port(distccd, tcp,3632,s0)
|
||||
network_port(dns, udp,53,s0, tcp,53,s0)
|
||||
network_port(fingerd, tcp,79,s0)
|
||||
network_port(ftp, tcp,21,s0)
|
||||
network_port(ftp, tcp,21,s0, tcp,990,s0, udp,990,s0)
|
||||
network_port(ftp_data, tcp,20,s0)
|
||||
network_port(gatekeeper, udp,1718,s0, udp,1719,s0, tcp,1721,s0, tcp,7000,s0)
|
||||
network_port(giftd, tcp,1213,s0)
|
||||
|
@ -25,6 +25,7 @@
|
||||
/var/run/haldaemon\.pid -- gen_context(system_u:object_r:hald_var_run_t,s0)
|
||||
/var/run/pm(/.*)? gen_context(system_u:object_r:hald_var_run_t,s0)
|
||||
/var/run/pm-utils(/.*)? gen_context(system_u:object_r:hald_var_run_t,s0)
|
||||
/var/run/synce.* gen_context(system_u:object_r:hald_var_run_t,s0)
|
||||
/var/run/vbe.* -- gen_context(system_u:object_r:hald_var_run_t,s0)
|
||||
|
||||
ifdef(`distro_gentoo',`
|
||||
|
@ -184,6 +184,24 @@ interface(`hal_stream_connect',`
|
||||
allow $1 hald_t:unix_stream_socket connectto;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Dontaudit read/write to a hal unix datagram socket.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`hal_dontaudit_rw_dgram_sockets',`
|
||||
gen_require(`
|
||||
type hald_t;
|
||||
')
|
||||
|
||||
dontaudit $1 hald_t:unix_dgram_socket { read write };
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Send a dbus message to hal.
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(hal, 1.12.0)
|
||||
policy_module(hal, 1.12.1)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -101,6 +101,7 @@ kernel_rw_irq_sysctls(hald_t)
|
||||
kernel_rw_vm_sysctls(hald_t)
|
||||
kernel_write_proc_files(hald_t)
|
||||
kernel_setsched(hald_t)
|
||||
kernel_request_load_module(hald_t)
|
||||
|
||||
auth_read_pam_console_data(hald_t)
|
||||
|
||||
@ -156,6 +157,11 @@ fs_getattr_all_fs(hald_t)
|
||||
fs_search_all(hald_t)
|
||||
fs_list_inotifyfs(hald_t)
|
||||
fs_list_auto_mountpoints(hald_t)
|
||||
fs_mount_dos_fs(hald_t)
|
||||
fs_unmount_dos_fs(hald_t)
|
||||
fs_manage_dos_files(hald_t)
|
||||
fs_manage_fusefs_dirs(hald_t)
|
||||
|
||||
files_getattr_all_mountpoints(hald_t)
|
||||
|
||||
mls_file_read_all_levels(hald_t)
|
||||
@ -197,6 +203,7 @@ miscfiles_read_localization(hald_t)
|
||||
miscfiles_read_hwdata(hald_t)
|
||||
|
||||
modutils_domtrans_insmod(hald_t)
|
||||
modutils_read_module_deps(hald_t)
|
||||
|
||||
seutil_read_config(hald_t)
|
||||
seutil_read_default_contexts(hald_t)
|
||||
@ -204,6 +211,8 @@ seutil_read_file_contexts(hald_t)
|
||||
|
||||
sysnet_read_config(hald_t)
|
||||
sysnet_domtrans_dhcpc(hald_t)
|
||||
sysnet_domtrans_ifconfig(hald_t)
|
||||
sysnet_read_dhcp_config(hald_t)
|
||||
|
||||
userdom_dontaudit_use_unpriv_user_fds(hald_t)
|
||||
userdom_dontaudit_search_user_home_dirs(hald_t)
|
||||
@ -290,6 +299,7 @@ optional_policy(`
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
policykit_dbus_chat(hald_t)
|
||||
policykit_domtrans_auth(hald_t)
|
||||
policykit_domtrans_resolve(hald_t)
|
||||
policykit_read_lib(hald_t)
|
||||
@ -357,6 +367,8 @@ dev_setattr_usbfs_files(hald_acl_t)
|
||||
files_read_usr_files(hald_acl_t)
|
||||
files_read_etc_files(hald_acl_t)
|
||||
|
||||
fs_getattr_all_fs(hald_acl_t)
|
||||
|
||||
storage_getattr_removable_dev(hald_acl_t)
|
||||
storage_setattr_removable_dev(hald_acl_t)
|
||||
storage_getattr_fixed_disk_dev(hald_acl_t)
|
||||
@ -369,6 +381,7 @@ logging_send_syslog_msg(hald_acl_t)
|
||||
miscfiles_read_localization(hald_acl_t)
|
||||
|
||||
optional_policy(`
|
||||
policykit_dbus_chat(hald_acl_t)
|
||||
policykit_domtrans_auth(hald_acl_t)
|
||||
policykit_read_lib(hald_acl_t)
|
||||
policykit_read_reload(hald_acl_t)
|
||||
@ -455,8 +468,9 @@ miscfiles_read_localization(hald_keymap_t)
|
||||
# Local hald dccm policy
|
||||
#
|
||||
|
||||
allow hald_dccm_t self:capability { net_bind_service };
|
||||
allow hald_dccm_t self:capability { chown net_bind_service };
|
||||
allow hald_dccm_t self:process getsched;
|
||||
allow hald_dccm_t self:fifo_file rw_fifo_file_perms;
|
||||
allow hald_dccm_t self:tcp_socket create_stream_socket_perms;
|
||||
allow hald_dccm_t self:udp_socket create_socket_perms;
|
||||
allow hald_dccm_t self:netlink_route_socket rw_netlink_socket_perms;
|
||||
@ -469,10 +483,20 @@ manage_dirs_pattern(hald_dccm_t, hald_var_lib_t, hald_var_lib_t)
|
||||
manage_files_pattern(hald_dccm_t, hald_var_lib_t, hald_var_lib_t)
|
||||
files_search_var_lib(hald_dccm_t)
|
||||
|
||||
manage_dirs_pattern(hald_dccm_t, hald_var_run_t, hald_var_run_t)
|
||||
manage_files_pattern(hald_dccm_t, hald_var_run_t, hald_var_run_t)
|
||||
manage_sock_files_pattern(hald_dccm_t, hald_var_run_t, hald_var_run_t)
|
||||
files_pid_filetrans(hald_dccm_t, hald_var_run_t, { dir file sock_file })
|
||||
|
||||
manage_sock_files_pattern(hald_dccm_t, hald_tmp_t, hald_tmp_t)
|
||||
files_tmp_filetrans(hald_dccm_t, hald_tmp_t, sock_file)
|
||||
|
||||
write_files_pattern(hald_dccm_t, hald_log_t, hald_log_t)
|
||||
|
||||
kernel_search_network_sysctl(hald_dccm_t)
|
||||
|
||||
dev_read_urand(hald_dccm_t)
|
||||
|
||||
corenet_all_recvfrom_unlabeled(hald_dccm_t)
|
||||
corenet_all_recvfrom_netlabel(hald_dccm_t)
|
||||
corenet_tcp_sendrecv_generic_if(hald_dccm_t)
|
||||
@ -484,6 +508,7 @@ corenet_udp_sendrecv_all_ports(hald_dccm_t)
|
||||
corenet_tcp_bind_generic_node(hald_dccm_t)
|
||||
corenet_udp_bind_generic_node(hald_dccm_t)
|
||||
corenet_udp_bind_dhcpc_port(hald_dccm_t)
|
||||
corenet_tcp_bind_ftp_port(hald_dccm_t)
|
||||
corenet_tcp_bind_dccm_port(hald_dccm_t)
|
||||
|
||||
logging_send_syslog_msg(hald_dccm_t)
|
||||
@ -491,3 +516,9 @@ logging_send_syslog_msg(hald_dccm_t)
|
||||
files_read_usr_files(hald_dccm_t)
|
||||
|
||||
miscfiles_read_localization(hald_dccm_t)
|
||||
|
||||
hal_dontaudit_rw_dgram_sockets(hald_dccm_t)
|
||||
|
||||
optional_policy(`
|
||||
dbus_system_bus_client(hald_dccm_t)
|
||||
')
|
||||
|
Loading…
Reference in New Issue
Block a user