a few missed renames, and start fixing up tunables
This commit is contained in:
parent
94670f292b
commit
31908be07f
@ -2,9 +2,15 @@
|
|||||||
## Enable extra rules in the cron domain
|
## Enable extra rules in the cron domain
|
||||||
## to support fcron.
|
## to support fcron.
|
||||||
## </tunable>
|
## </tunable>
|
||||||
tunable_def(fcron_crond,false)
|
gen_tunable(fcron_crond,false)
|
||||||
|
|
||||||
## <tunable name="use_dns" dftval="false">
|
## <tunable name="use_dns" dftval="false">
|
||||||
## Allow the use of DNS for name resolution.
|
## Allow the use of DNS for name resolution.
|
||||||
## </tunable>
|
## </tunable>
|
||||||
tunable_def(use_dns,false)
|
gen_tunable(use_dns,false)
|
||||||
|
|
||||||
|
## <tunable name="cron_can_relabel" dftval="false">
|
||||||
|
## Allow system cron jobs to relabel filesystem
|
||||||
|
## for restoring file contexts.
|
||||||
|
## </tunable>
|
||||||
|
gen_tunable(cron_can_relabel,false)
|
||||||
|
@ -51,7 +51,7 @@ userdom_dontaudit_use_unpriv_user_fd(dmesg_t)
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(dmesg_t)
|
term_dontaudit_use_unallocated_tty(dmesg_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(dmesg_t)
|
term_dontaudit_use_generic_pty(dmesg_t)
|
||||||
files_dontaudit_read_root_file(dmesg_t)
|
files_dontaudit_read_root_file(dmesg_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -6,9 +6,6 @@ policy_module(cron, 1.0)
|
|||||||
# Declarations
|
# Declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
# Allow system cron jobs to relabel filesystem for restoring file contexts.
|
|
||||||
bool cron_can_relabel false;
|
|
||||||
|
|
||||||
type anacron_exec_t;
|
type anacron_exec_t;
|
||||||
files_file_type(anacron_exec_t)
|
files_file_type(anacron_exec_t)
|
||||||
|
|
||||||
@ -126,7 +123,7 @@ tunable_policy(`fcron_crond', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(crond_t)
|
term_dontaudit_use_unallocated_tty(crond_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(crond_t)
|
term_dontaudit_use_generic_pty(crond_t)
|
||||||
files_dontaudit_read_root_file(crond_t)
|
files_dontaudit_read_root_file(crond_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -292,9 +289,9 @@ miscfiles_rw_man_cache(system_crond_t)
|
|||||||
|
|
||||||
selinux_read_config(system_crond_t)
|
selinux_read_config(system_crond_t)
|
||||||
|
|
||||||
if (cron_can_relabel) {
|
tunable_policy(`cron_can_relabel',`
|
||||||
selinux_domtrans_setfiles(system_crond_t)
|
selinux_domtrans_setfiles(system_crond_t)
|
||||||
} else {
|
',`
|
||||||
kernel_get_selinuxfs_mount_point(system_crond_t)
|
kernel_get_selinuxfs_mount_point(system_crond_t)
|
||||||
kernel_validate_context(system_crond_t)
|
kernel_validate_context(system_crond_t)
|
||||||
kernel_compute_access_vector(system_crond_t)
|
kernel_compute_access_vector(system_crond_t)
|
||||||
@ -302,7 +299,7 @@ if (cron_can_relabel) {
|
|||||||
kernel_compute_relabel_context(system_crond_t)
|
kernel_compute_relabel_context(system_crond_t)
|
||||||
kernel_compute_reachable_user_contexts(system_crond_t)
|
kernel_compute_reachable_user_contexts(system_crond_t)
|
||||||
selinux_read_file_contexts(system_crond_t)
|
selinux_read_file_contexts(system_crond_t)
|
||||||
}
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
|
|
||||||
|
@ -90,7 +90,7 @@ sysnet_read_config(sendmail_t)
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(sendmail_t)
|
term_dontaudit_use_unallocated_tty(sendmail_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(sendmail_t)
|
term_dontaudit_use_generic_pty(sendmail_t)
|
||||||
files_dontaudit_read_root_file(sendmail_t)
|
files_dontaudit_read_root_file(sendmail_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -151,7 +151,6 @@ term_use_console(pam_console_t)
|
|||||||
term_getattr_unallocated_ttys(pam_console_t)
|
term_getattr_unallocated_ttys(pam_console_t)
|
||||||
term_setattr_unallocated_ttys(pam_console_t)
|
term_setattr_unallocated_ttys(pam_console_t)
|
||||||
|
|
||||||
init_use_fd(pam_console_t)
|
|
||||||
init_use_fd(pam_console_t)
|
init_use_fd(pam_console_t)
|
||||||
init_use_script_pty(pam_console_t)
|
init_use_script_pty(pam_console_t)
|
||||||
|
|
||||||
@ -176,7 +175,7 @@ ifdef(`direct_sysadm_daemon', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(pam_console_t)
|
term_dontaudit_use_unallocated_tty(pam_console_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(pam_console_t)
|
term_dontaudit_use_generic_pty(pam_console_t)
|
||||||
files_dontaudit_read_root_file(pam_console_t)
|
files_dontaudit_read_root_file(pam_console_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -59,7 +59,7 @@ miscfiles_read_localization(hwclock_t)
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(hwclock_t)
|
term_dontaudit_use_unallocated_tty(hwclock_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(hwclock_t)
|
term_dontaudit_use_generic_pty(hwclock_t)
|
||||||
files_dontaudit_read_root_file(hwclock_t)
|
files_dontaudit_read_root_file(hwclock_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -29,8 +29,6 @@ kernel_read_kernel_sysctl(hostname_t)
|
|||||||
kernel_read_hardware_state(hostname_t)
|
kernel_read_hardware_state(hostname_t)
|
||||||
kernel_dontaudit_use_fd(hostname_t)
|
kernel_dontaudit_use_fd(hostname_t)
|
||||||
|
|
||||||
files_read_generic_etc_files(hostname_t)
|
|
||||||
files_dontaudit_search_var(hostname_t)
|
|
||||||
fs_getattr_xattr_fs(hostname_t)
|
fs_getattr_xattr_fs(hostname_t)
|
||||||
|
|
||||||
term_dontaudit_use_console(hostname_t)
|
term_dontaudit_use_console(hostname_t)
|
||||||
@ -42,6 +40,8 @@ init_use_script_pty(hostname_t)
|
|||||||
|
|
||||||
domain_use_wide_inherit_fd(hostname_t)
|
domain_use_wide_inherit_fd(hostname_t)
|
||||||
|
|
||||||
|
files_read_generic_etc_files(hostname_t)
|
||||||
|
files_dontaudit_search_var(hostname_t)
|
||||||
# for when /usr is not mounted:
|
# for when /usr is not mounted:
|
||||||
files_dontaudit_search_isid_type_dir(hostname_t)
|
files_dontaudit_search_isid_type_dir(hostname_t)
|
||||||
|
|
||||||
@ -60,7 +60,7 @@ ifdef(`distro_redhat', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(hostname_t)
|
term_dontaudit_use_unallocated_tty(hostname_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(hostname_t)
|
term_dontaudit_use_generic_pty(hostname_t)
|
||||||
files_dontaudit_read_root_file(hostname_t)
|
files_dontaudit_read_root_file(hostname_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ ifdef(`distro_redhat', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(hotplug_t)
|
term_dontaudit_use_unallocated_tty(hotplug_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(hotplug_t)
|
term_dontaudit_use_generic_pty(hotplug_t)
|
||||||
files_dontaudit_read_root_file(hotplug_t)
|
files_dontaudit_read_root_file(hotplug_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -98,7 +98,7 @@ optional_policy(`udev.te', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(iptables_t)
|
term_dontaudit_use_unallocated_tty(iptables_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(iptables_t)
|
term_dontaudit_use_generic_pty(iptables_t)
|
||||||
|
|
||||||
files_dontaudit_read_root_file(iptables_t)
|
files_dontaudit_read_root_file(iptables_t)
|
||||||
')
|
')
|
||||||
|
@ -81,7 +81,7 @@ miscfiles_read_localization(auditd_t)
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(auditd_t)
|
term_dontaudit_use_unallocated_tty(auditd_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(auditd_t)
|
term_dontaudit_use_generic_pty(auditd_t)
|
||||||
files_dontaudit_read_root_file(auditd_t)
|
files_dontaudit_read_root_file(auditd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -245,7 +245,7 @@ ifdef(`klogd.te', `', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(syslogd_t)
|
term_dontaudit_use_unallocated_tty(syslogd_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(syslogd_t)
|
term_dontaudit_use_generic_pty(syslogd_t)
|
||||||
files_dontaudit_read_root_file(syslogd_t)
|
files_dontaudit_read_root_file(syslogd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -143,7 +143,7 @@ ifdef(`distro_redhat',`
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(lvm_t)
|
term_dontaudit_use_unallocated_tty(lvm_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(lvm_t)
|
term_dontaudit_use_generic_pty(lvm_t)
|
||||||
|
|
||||||
files_dontaudit_read_root_file(lvm_t)
|
files_dontaudit_read_root_file(lvm_t)
|
||||||
')
|
')
|
||||||
|
@ -139,7 +139,7 @@ ifdef(`distro_redhat', `
|
|||||||
|
|
||||||
ifdef(`targeted_policy', `
|
ifdef(`targeted_policy', `
|
||||||
term_dontaudit_use_unallocated_tty(dhcpc_t)
|
term_dontaudit_use_unallocated_tty(dhcpc_t)
|
||||||
terminal_ignore_use_general_pseudoterminal(dhcpc_t)
|
term_dontaudit_use_generic_pty(dhcpc_t)
|
||||||
|
|
||||||
files_dontaudit_read_root_file(dhcpc_t)
|
files_dontaudit_read_root_file(dhcpc_t)
|
||||||
')
|
')
|
||||||
@ -153,7 +153,7 @@ optional_policy(`hostname.te',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`nscd.te',`
|
optional_policy(`nscd.te',`
|
||||||
nscd_transition(dhcpc_t)
|
nscd_domtrans(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`selinux.te',`
|
optional_policy(`selinux.te',`
|
||||||
@ -173,10 +173,10 @@ optional_policy(`userdomain.te',`
|
|||||||
#
|
#
|
||||||
init_exec_script(dhcpc_t)
|
init_exec_script(dhcpc_t)
|
||||||
optional_policy(`ypbind.te',`
|
optional_policy(`ypbind.te',`
|
||||||
ypbind_transition(dhcpc_t)
|
ypbind_domtrans(dhcpc_t)
|
||||||
')
|
')
|
||||||
optional_policy(`ntpd.te',`
|
optional_policy(`ntpd.te',`
|
||||||
ntpd_transition(dhcpc_t)
|
ntpd_domtrans(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
|
@ -61,15 +61,15 @@ define(`optional_policy',`
|
|||||||
# tunable value as specified by the policy
|
# tunable value as specified by the policy
|
||||||
# or if the override value should be used
|
# or if the override value should be used
|
||||||
#
|
#
|
||||||
define(`deflt_or_overr',`ifdef(`$1',$1,$2)')
|
define(`dflt_or_overr',`ifdef(`$1',$1,$2)')
|
||||||
|
|
||||||
##############################
|
##############################
|
||||||
#
|
#
|
||||||
# Tunable declaration
|
# Tunable declaration
|
||||||
#
|
#
|
||||||
define(`tunable_def',`
|
define(`gen_tunable',`
|
||||||
ifdef(`monolithic_policy',`
|
ifdef(`monolithic_policy',`
|
||||||
bool $1 deflt_or_overr(`$1'_conf,$2);
|
bool $1 dflt_or_overr(`$1'_conf,$2);
|
||||||
',`
|
',`
|
||||||
# loadable module tunable
|
# loadable module tunable
|
||||||
# declaration will go here
|
# declaration will go here
|
||||||
|
Loading…
Reference in New Issue
Block a user