- Remove ifdef strict policy from upstream
This commit is contained in:
parent
628851b917
commit
269acb5ee8
51
booleans-olpc.conf
Normal file
51
booleans-olpc.conf
Normal file
@ -0,0 +1,51 @@
|
||||
# Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.
|
||||
#
|
||||
allow_execmem = false
|
||||
|
||||
# Allow making a modified private filemapping executable (text relocation).
|
||||
#
|
||||
allow_execmod = false
|
||||
|
||||
# Allow making the stack executable via mprotect.Also requires allow_execmem.
|
||||
#
|
||||
allow_execstack = false
|
||||
|
||||
# Allow ftp servers to modify public filesused for public file transfer services.
|
||||
#
|
||||
allow_ftpd_anon_write = false
|
||||
|
||||
# Allow gssd to read temp directory.
|
||||
#
|
||||
allow_gssd_read_tmp = false
|
||||
|
||||
# Allow sysadm to ptrace all processes
|
||||
#
|
||||
allow_ptrace = false
|
||||
|
||||
# Allow reading of default_t files.
|
||||
#
|
||||
read_default_t = false
|
||||
|
||||
# Allow system cron jobs to relabel filesystemfor restoring file contexts.
|
||||
#
|
||||
cron_can_relabel = false
|
||||
|
||||
# Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashrc)
|
||||
#
|
||||
staff_read_sysadm_file = false
|
||||
|
||||
# Allow users to read system messages.
|
||||
#
|
||||
user_dmesg = false
|
||||
|
||||
# Allow sysadm to ptrace all processes
|
||||
#
|
||||
allow_ptrace = false
|
||||
|
||||
## Control users use of ping and traceroute
|
||||
user_ping = true
|
||||
|
||||
# Allow unlabeled packets to flow
|
||||
#
|
||||
allow_unlabeled_packets = true
|
||||
|
397
modules-olpc.conf
Normal file
397
modules-olpc.conf
Normal file
@ -0,0 +1,397 @@
|
||||
#
|
||||
# This file contains a listing of available modules.
|
||||
# To prevent a module from being used in policy
|
||||
# creation, set the module name to "off".
|
||||
#
|
||||
# For monolithic policies, modules set to "base" and "module"
|
||||
# will be built into the policy.
|
||||
#
|
||||
# For modular policies, modules set to "base" will be
|
||||
# included in the base module. "module" will be compiled
|
||||
# as individual loadable modules.
|
||||
#
|
||||
|
||||
# Layer: admin
|
||||
# Module: acct
|
||||
#
|
||||
# Berkeley process accounting
|
||||
#
|
||||
acct = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: alsa
|
||||
#
|
||||
# Ainit ALSA configuration tool
|
||||
#
|
||||
alsa = base
|
||||
|
||||
# Layer: apps
|
||||
# Module: ada
|
||||
#
|
||||
# ada executable
|
||||
#
|
||||
ada = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: anaconda
|
||||
#
|
||||
# Policy for the Anaconda installer.
|
||||
#
|
||||
anaconda = base
|
||||
|
||||
# Layer: system
|
||||
# Module: application
|
||||
# Required in base
|
||||
#
|
||||
# Defines attributs and interfaces for all user applications
|
||||
#
|
||||
application = base
|
||||
|
||||
# Layer: system
|
||||
# Module: authlogin
|
||||
#
|
||||
# Common policy for authentication and user login.
|
||||
#
|
||||
authlogin = base
|
||||
|
||||
# Layer: services
|
||||
# Module: canna
|
||||
#
|
||||
# Canna - kana-kanji conversion server
|
||||
#
|
||||
canna = base
|
||||
|
||||
# Layer: system
|
||||
# Module: clock
|
||||
#
|
||||
# Policy for reading and setting the hardware clock.
|
||||
#
|
||||
clock = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: consoletype
|
||||
#
|
||||
# Determine of the console connected to the controlling terminal.
|
||||
#
|
||||
consoletype = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: corecommands
|
||||
# Required in base
|
||||
#
|
||||
# Core policy for shells, and generic programs
|
||||
# in /bin, /sbin, /usr/bin, and /usr/sbin.
|
||||
#
|
||||
corecommands = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: corenetwork
|
||||
# Required in base
|
||||
#
|
||||
# Policy controlling access to network objects
|
||||
#
|
||||
corenetwork = base
|
||||
|
||||
# Layer: services
|
||||
# Module: cpucontrol
|
||||
#
|
||||
# Services for loading CPU microcode and CPU frequency scaling.
|
||||
#
|
||||
cpucontrol = base
|
||||
|
||||
# Layer: services
|
||||
# Module: dbus
|
||||
#
|
||||
# Desktop messaging bus
|
||||
#
|
||||
dbus = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: devices
|
||||
# Required in base
|
||||
#
|
||||
# Device nodes and interfaces for many basic system devices.
|
||||
#
|
||||
devices = base
|
||||
|
||||
# Layer: services
|
||||
# Module: dhcp
|
||||
#
|
||||
# Dynamic host configuration protocol (DHCP) server
|
||||
#
|
||||
dhcp = base
|
||||
|
||||
# Layer: system
|
||||
# Module: domain
|
||||
# Required in base
|
||||
#
|
||||
# Core policy for domains.
|
||||
#
|
||||
domain = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: files
|
||||
# Required in base
|
||||
#
|
||||
# Basic filesystem types and interfaces.
|
||||
#
|
||||
files = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: filesystem
|
||||
# Required in base
|
||||
#
|
||||
# Policy for filesystems.
|
||||
#
|
||||
filesystem = base
|
||||
|
||||
# Layer: system
|
||||
# Module: fstools
|
||||
#
|
||||
# Tools for filesystem management, such as mkfs and fsck.
|
||||
#
|
||||
fstools = base
|
||||
|
||||
# Layer: system
|
||||
# Module: getty
|
||||
#
|
||||
# Policy for getty.
|
||||
#
|
||||
getty = base
|
||||
|
||||
# Layer: services
|
||||
# Module: hal
|
||||
#
|
||||
# Hardware abstraction layer
|
||||
#
|
||||
hal = base
|
||||
|
||||
# Layer: system
|
||||
# Module: hotplug
|
||||
#
|
||||
# Policy for hotplug system, for supporting the
|
||||
# connection and disconnection of devices at runtime.
|
||||
#
|
||||
hotplug = base
|
||||
|
||||
# Layer: system
|
||||
# Module: init
|
||||
#
|
||||
# System initialization programs (init and init scripts).
|
||||
#
|
||||
init = base
|
||||
|
||||
# Layer: system
|
||||
# Module: iptables
|
||||
#
|
||||
# Policy for iptables.
|
||||
#
|
||||
iptables = base
|
||||
|
||||
# Layer: apps
|
||||
# Module: java
|
||||
#
|
||||
# java executable
|
||||
#
|
||||
java = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: kernel
|
||||
# Required in base
|
||||
#
|
||||
# Policy for kernel threads, proc filesystem,and unlabeled processes and objects.
|
||||
#
|
||||
kernel = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: kudzu
|
||||
#
|
||||
# Hardware detection and configuration tools
|
||||
#
|
||||
kudzu = base
|
||||
|
||||
# Layer: system
|
||||
# Module: libraries
|
||||
#
|
||||
# Policy for system libraries.
|
||||
#
|
||||
libraries = base
|
||||
|
||||
# Layer: system
|
||||
# Module: locallogin
|
||||
#
|
||||
# Policy for local logins.
|
||||
#
|
||||
locallogin = base
|
||||
|
||||
# Layer: system
|
||||
# Module: logging
|
||||
#
|
||||
# Policy for the kernel message logger and system logging daemon.
|
||||
#
|
||||
logging = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: mcs
|
||||
# Required in base
|
||||
#
|
||||
# MultiCategory security policy
|
||||
#
|
||||
mcs = base
|
||||
|
||||
# Layer: system
|
||||
# Module: miscfiles
|
||||
#
|
||||
# Miscelaneous files.
|
||||
#
|
||||
miscfiles = base
|
||||
|
||||
# Layer: system
|
||||
# Module: modutils
|
||||
#
|
||||
# Policy for kernel module utilities
|
||||
#
|
||||
modutils = base
|
||||
|
||||
# Layer: apps
|
||||
# Module: mono
|
||||
#
|
||||
# mono executable
|
||||
#
|
||||
mono = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: netutils
|
||||
#
|
||||
# Network analysis utilities
|
||||
#
|
||||
netutils = base
|
||||
|
||||
# Layer: services
|
||||
# Module: networkmanager
|
||||
#
|
||||
# Manager for dynamically switching between networks.
|
||||
#
|
||||
networkmanager = base
|
||||
|
||||
# Layer: services
|
||||
# Module: nscd
|
||||
#
|
||||
# Name service cache daemon
|
||||
#
|
||||
nscd = base
|
||||
|
||||
# Layer: services
|
||||
# Module: ntp
|
||||
#
|
||||
# Network time protocol daemon
|
||||
#
|
||||
ntp = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: prelink
|
||||
#
|
||||
# Manage temporary directory sizes and file ages
|
||||
#
|
||||
prelink = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: readahead
|
||||
#
|
||||
# Readahead, read files into page cache for improved performance
|
||||
#
|
||||
readahead = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: rpm
|
||||
#
|
||||
# Policy for the RPM package manager.
|
||||
#
|
||||
rpm = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: selinux
|
||||
# Required in base
|
||||
#
|
||||
# Policy for kernel security interface, in particular, selinuxfs.
|
||||
#
|
||||
selinux = base
|
||||
|
||||
# Layer: system
|
||||
# Module: selinuxutil
|
||||
#
|
||||
# Policy for SELinux policy and userland applications.
|
||||
#
|
||||
selinuxutil = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: storage
|
||||
#
|
||||
# Policy controlling access to storage devices
|
||||
#
|
||||
storage = base
|
||||
|
||||
# Layer: system
|
||||
# Module: sysnetwork
|
||||
#
|
||||
# Policy for network configuration: ifconfig and dhcp client.
|
||||
#
|
||||
sysnetwork = base
|
||||
|
||||
# Layer: system
|
||||
# Module: udev
|
||||
#
|
||||
# Policy for udev.
|
||||
#
|
||||
udev = base
|
||||
|
||||
# Layer: system
|
||||
# Module: userdomain
|
||||
#
|
||||
# Policy for user domains
|
||||
#
|
||||
userdomain = base
|
||||
|
||||
# Layer: system
|
||||
# Module: unconfined
|
||||
#
|
||||
# The unconfined domain.
|
||||
#
|
||||
unconfined = base
|
||||
|
||||
# Layer: admin
|
||||
# Module: usbmodules
|
||||
#
|
||||
# List kernel modules of USB devices
|
||||
#
|
||||
usbmodules = base
|
||||
|
||||
# Layer: services
|
||||
# Module: xfs
|
||||
#
|
||||
# X Windows Font Server
|
||||
#
|
||||
xfs = base
|
||||
|
||||
# Layer: services
|
||||
# Module: xserver
|
||||
#
|
||||
# X windows login display manager
|
||||
#
|
||||
xserver = base
|
||||
|
||||
# Module: terminal
|
||||
# Required in base
|
||||
#
|
||||
# Policy for terminals.
|
||||
#
|
||||
terminal = base
|
||||
|
||||
# Layer: kernel
|
||||
# Module: mls
|
||||
# Required in base
|
||||
#
|
||||
# Multilevel security policy
|
||||
#
|
||||
mls = base
|
||||
|
@ -1,3 +1,11 @@
|
||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/config/appconfig-strict-mls/guest_u_default_contexts serefpolicy-3.0.1/config/appconfig-strict-mls/guest_u_default_contexts
|
||||
--- nsaserefpolicy/config/appconfig-strict-mls/guest_u_default_contexts 1969-12-31 19:00:00.000000000 -0500
|
||||
+++ serefpolicy-3.0.1/config/appconfig-strict-mls/guest_u_default_contexts 2007-06-26 07:57:11.000000000 -0400
|
||||
@@ -0,0 +1,4 @@
|
||||
+system_r:local_login_t:s0 guest_r:guest_t:s0
|
||||
+system_r:remote_login_t:s0 guest_r:guest_t:s0
|
||||
+system_r:sshd_t:s0 guest_r:guest_t:s0
|
||||
+system_r:crond_t:s0 guest_r:guest_crond_t:s0
|
||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/config/appconfig-strict-mls/staff_u_default_contexts serefpolicy-3.0.1/config/appconfig-strict-mls/staff_u_default_contexts
|
||||
--- nsaserefpolicy/config/appconfig-strict-mls/staff_u_default_contexts 1969-12-31 19:00:00.000000000 -0500
|
||||
+++ serefpolicy-3.0.1/config/appconfig-strict-mls/staff_u_default_contexts 2007-06-19 17:06:27.000000000 -0400
|
||||
@ -4650,8 +4658,16 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/dove
|
||||
')
|
||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ftp.te serefpolicy-3.0.1/policy/modules/services/ftp.te
|
||||
--- nsaserefpolicy/policy/modules/services/ftp.te 2007-06-11 16:05:30.000000000 -0400
|
||||
+++ serefpolicy-3.0.1/policy/modules/services/ftp.te 2007-06-19 17:06:27.000000000 -0400
|
||||
@@ -156,6 +156,7 @@
|
||||
+++ serefpolicy-3.0.1/policy/modules/services/ftp.te 2007-06-26 07:22:44.000000000 -0400
|
||||
@@ -88,6 +88,7 @@
|
||||
allow ftpd_t self:unix_stream_socket create_stream_socket_perms;
|
||||
allow ftpd_t self:tcp_socket create_stream_socket_perms;
|
||||
allow ftpd_t self:udp_socket create_socket_perms;
|
||||
+allow ftpd_t self:key { search write link };
|
||||
|
||||
allow ftpd_t ftpd_etc_t:file read_file_perms;
|
||||
|
||||
@@ -156,6 +157,7 @@
|
||||
|
||||
auth_use_nsswitch(ftpd_t)
|
||||
auth_domtrans_chk_passwd(ftpd_t)
|
||||
@ -4659,15 +4675,17 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/ftp.
|
||||
# Append to /var/log/wtmp.
|
||||
auth_append_login_records(ftpd_t)
|
||||
#kerberized ftp requires the following
|
||||
@@ -167,6 +168,7 @@
|
||||
@@ -167,7 +169,9 @@
|
||||
libs_use_ld_so(ftpd_t)
|
||||
libs_use_shared_libs(ftpd_t)
|
||||
|
||||
+logging_send_audit_msgs(ftpd_t)
|
||||
logging_send_syslog_msg(ftpd_t)
|
||||
+logging_set_loginuid(ftpd_t)
|
||||
|
||||
miscfiles_read_localization(ftpd_t)
|
||||
@@ -216,6 +218,14 @@
|
||||
miscfiles_read_public_files(ftpd_t)
|
||||
@@ -216,6 +220,14 @@
|
||||
userdom_manage_all_users_home_content_dirs(ftpd_t)
|
||||
userdom_manage_all_users_home_content_files(ftpd_t)
|
||||
userdom_manage_all_users_home_content_symlinks(ftpd_t)
|
||||
@ -9661,7 +9679,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/unconf
|
||||
+corecmd_exec_all_executables(unconfined_t)
|
||||
diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdomain.if serefpolicy-3.0.1/policy/modules/system/userdomain.if
|
||||
--- nsaserefpolicy/policy/modules/system/userdomain.if 2007-06-19 16:23:35.000000000 -0400
|
||||
+++ serefpolicy-3.0.1/policy/modules/system/userdomain.if 2007-06-21 14:03:09.000000000 -0400
|
||||
+++ serefpolicy-3.0.1/policy/modules/system/userdomain.if 2007-06-26 07:46:18.000000000 -0400
|
||||
@@ -62,6 +62,10 @@
|
||||
|
||||
allow $1_t $1_tty_device_t:chr_file { setattr rw_chr_file_perms };
|
||||
@ -9749,7 +9767,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
')
|
||||
|
||||
#######################################
|
||||
@@ -677,16 +674,6 @@
|
||||
@@ -677,67 +674,39 @@
|
||||
attribute unpriv_userdomain;
|
||||
')
|
||||
|
||||
@ -9766,12 +9784,16 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
userdom_untrusted_content_template($1)
|
||||
|
||||
userdom_basic_networking_template($1)
|
||||
@@ -695,49 +682,29 @@
|
||||
|
||||
userdom_xwindows_client_template($1)
|
||||
userdom_exec_generic_pgms_template($1)
|
||||
|
||||
- userdom_change_password_template($1)
|
||||
- userdom_xwindows_client_template($1)
|
||||
-
|
||||
- userdom_change_password_template($1)
|
||||
+ optional_policy(`
|
||||
+ userdom_xwindows_client_template($1)
|
||||
+ ')
|
||||
|
||||
##############################
|
||||
#
|
||||
# User domain Local policy
|
||||
@ -9816,7 +9838,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
files_exec_etc_files($1_t)
|
||||
files_search_locks($1_t)
|
||||
# Check to see if cdrom is mounted
|
||||
@@ -750,12 +717,6 @@
|
||||
@@ -750,12 +719,6 @@
|
||||
# Stat lost+found.
|
||||
files_getattr_lost_found_dirs($1_t)
|
||||
|
||||
@ -9829,7 +9851,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
# cjp: some of this probably can be removed
|
||||
selinux_get_fs_mount($1_t)
|
||||
selinux_validate_context($1_t)
|
||||
@@ -768,31 +729,16 @@
|
||||
@@ -768,31 +731,16 @@
|
||||
storage_getattr_fixed_disk_dev($1_t)
|
||||
|
||||
auth_read_login_records($1_t)
|
||||
@ -9863,7 +9885,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
seutil_run_newrole($1_t,$1_r,{ $1_devpts_t $1_tty_device_t })
|
||||
seutil_exec_checkpolicy($1_t)
|
||||
seutil_exec_setfiles($1_t)
|
||||
@@ -807,19 +753,12 @@
|
||||
@@ -807,19 +755,12 @@
|
||||
files_read_default_symlinks($1_t)
|
||||
files_read_default_sockets($1_t)
|
||||
files_read_default_pipes($1_t)
|
||||
@ -9883,7 +9905,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
optional_policy(`
|
||||
alsa_read_rw_config($1_t)
|
||||
')
|
||||
@@ -834,34 +773,14 @@
|
||||
@@ -834,34 +775,14 @@
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -9918,7 +9940,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -889,17 +808,19 @@
|
||||
@@ -889,17 +810,19 @@
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -9944,7 +9966,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@@ -913,16 +834,6 @@
|
||||
@@ -913,16 +836,6 @@
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -9961,7 +9983,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
resmgr_stream_connect($1_t)
|
||||
')
|
||||
|
||||
@@ -932,11 +843,6 @@
|
||||
@@ -932,11 +845,6 @@
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -9973,7 +9995,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
samba_stream_connect_winbind($1_t)
|
||||
')
|
||||
|
||||
@@ -967,21 +873,122 @@
|
||||
@@ -967,21 +875,122 @@
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
@ -10102,7 +10124,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
domain_interactive_fd($1_t)
|
||||
|
||||
typeattribute $1_devpts_t user_ptynode;
|
||||
@@ -990,15 +997,45 @@
|
||||
@@ -990,15 +999,45 @@
|
||||
typeattribute $1_tmp_t user_tmpfile;
|
||||
typeattribute $1_tty_device_t user_ttynode;
|
||||
|
||||
@ -10152,7 +10174,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
|
||||
# port access is audited even if dac would not have allowed it, so dontaudit it here
|
||||
corenet_dontaudit_tcp_bind_all_reserved_ports($1_t)
|
||||
@@ -1038,14 +1075,6 @@
|
||||
@@ -1038,14 +1077,6 @@
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
@ -10167,7 +10189,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
netutils_run_ping_cond($1_t,$1_r,{ $1_tty_device_t $1_devpts_t })
|
||||
netutils_run_traceroute_cond($1_t,$1_r,{ $1_tty_device_t $1_devpts_t })
|
||||
')
|
||||
@@ -1059,12 +1088,8 @@
|
||||
@@ -1059,12 +1090,8 @@
|
||||
setroubleshoot_stream_connect($1_t)
|
||||
')
|
||||
|
||||
@ -10181,7 +10203,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
# Do not audit write denials to /etc/ld.so.cache.
|
||||
dontaudit $1_t ld_so_cache_t:file write;
|
||||
|
||||
@@ -1107,6 +1132,8 @@
|
||||
@@ -1107,6 +1134,8 @@
|
||||
class passwd { passwd chfn chsh rootok crontab };
|
||||
')
|
||||
|
||||
@ -10190,7 +10212,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
##############################
|
||||
#
|
||||
# Declarations
|
||||
@@ -1132,7 +1159,7 @@
|
||||
@@ -1132,7 +1161,7 @@
|
||||
# $1_t local policy
|
||||
#
|
||||
|
||||
@ -10199,7 +10221,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
allow $1_t self:process { setexec setfscreate };
|
||||
|
||||
# Set password information for other users.
|
||||
@@ -1144,8 +1171,6 @@
|
||||
@@ -1144,8 +1173,6 @@
|
||||
# Manipulate other users crontab.
|
||||
allow $1_t self:passwd crontab;
|
||||
|
||||
@ -10208,7 +10230,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
kernel_read_software_raid_state($1_t)
|
||||
kernel_getattr_core_if($1_t)
|
||||
kernel_getattr_message_if($1_t)
|
||||
@@ -3083,7 +3108,7 @@
|
||||
@@ -3083,7 +3110,7 @@
|
||||
#
|
||||
template(`userdom_tmp_filetrans_user_tmp',`
|
||||
gen_require(`
|
||||
@ -10217,7 +10239,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
')
|
||||
|
||||
files_tmp_filetrans($2,$1_tmp_t,$3)
|
||||
@@ -5553,6 +5578,26 @@
|
||||
@@ -5553,6 +5580,26 @@
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
@ -10244,7 +10266,7 @@ diff --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/system/userdo
|
||||
## Unconfined access to user domains. (Deprecated)
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
@@ -5564,3 +5609,124 @@
|
||||
@@ -5564,3 +5611,124 @@
|
||||
interface(`userdom_unconfined',`
|
||||
refpolicywarn(`$0($*) has been deprecated.')
|
||||
')
|
||||
|
0
securetty_types-olpc
Normal file
0
securetty_types-olpc
Normal file
@ -172,7 +172,7 @@ fi;
|
||||
|
||||
%description
|
||||
SELinux Reference Policy - modular.
|
||||
Based off of reference policy: Checked out revision 2336.
|
||||
Based off of reference policy: Checked out revision 2348.
|
||||
|
||||
%prep
|
||||
%setup -q -n serefpolicy-%{version}
|
||||
|
19
setrans-olpc.conf
Normal file
19
setrans-olpc.conf
Normal file
@ -0,0 +1,19 @@
|
||||
#
|
||||
# Multi-Category Security translation table for SELinux
|
||||
#
|
||||
# Uncomment the following to disable translation libary
|
||||
# disable=1
|
||||
#
|
||||
# Objects can be categorized with 0-1023 categories defined by the admin.
|
||||
# Objects can be in more than one category at a time.
|
||||
# Categories are stored in the system as c0-c1023. Users can use this
|
||||
# table to translate the categories into a more meaningful output.
|
||||
# Examples:
|
||||
# s0:c0=CompanyConfidential
|
||||
# s0:c1=PatientRecord
|
||||
# s0:c2=Unclassified
|
||||
# s0:c3=TopSecret
|
||||
# s0:c1,c3=CompanyConfidentialRedHat
|
||||
s0=
|
||||
s0-s0:c0.c1023=SystemLow-SystemHigh
|
||||
s0:c0.c1023=SystemHigh
|
Loading…
Reference in New Issue
Block a user