more updates
This commit is contained in:
parent
07d6e32f44
commit
428b57e55c
@ -231,6 +231,11 @@
|
|||||||
# Attributes
|
# Attributes
|
||||||
#
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# admin_tty_type: complete
|
||||||
|
#
|
||||||
|
{ sysadm_tty_device_t sysadm_devpts_t }
|
||||||
|
|
||||||
#
|
#
|
||||||
# file_type: complete
|
# file_type: complete
|
||||||
#
|
#
|
||||||
@ -415,6 +420,18 @@ kernel_compute_create($1)
|
|||||||
kernel_compute_relabel($1)
|
kernel_compute_relabel($1)
|
||||||
kernel_compute_reachable_user_contexts($1)
|
kernel_compute_reachable_user_contexts($1)
|
||||||
|
|
||||||
|
#
|
||||||
|
# can_kerberos():
|
||||||
|
#
|
||||||
|
ifdef(`kerberos.te',`
|
||||||
|
if (allow_kerberos) {
|
||||||
|
can_network_client($1, `kerberos_port_t')
|
||||||
|
can_resolve($1)
|
||||||
|
}
|
||||||
|
') dnl kerberos.te
|
||||||
|
dontaudit $1 krb5_conf_t:file write;
|
||||||
|
allow $1 krb5_conf_t:file { getattr read };
|
||||||
|
|
||||||
#
|
#
|
||||||
# can_ldap():
|
# can_ldap():
|
||||||
#
|
#
|
||||||
@ -635,9 +652,14 @@ domain_use_widely_inheritable_file_descriptors($1_t)
|
|||||||
libraries_use_dynamic_loader($1_t)
|
libraries_use_dynamic_loader($1_t)
|
||||||
libraries_read_shared_libraries($1_t)
|
libraries_read_shared_libraries($1_t)
|
||||||
logging_send_system_log_message($1_t)
|
logging_send_system_log_message($1_t)
|
||||||
allow $1_t { self proc_t }:dir r_dir_perms;
|
tunable_policy(`targeted_policy', `
|
||||||
allow $1_t { self proc_t }:lnk_file read;
|
terminal_ignore_use_general_physical_terminal($1_t)
|
||||||
ifdef(`rhgb.te', `
|
terminal_ignore_use_general_pseudoterminal($1_t)
|
||||||
|
files_ignore_read_rootfs_file($1_t)
|
||||||
|
')dnl end targeted_policy tunable
|
||||||
|
allow $1_t proc_t:dir r_dir_perms;
|
||||||
|
allow $1_t proc_t:lnk_file read;
|
||||||
|
optional_policy(`rhgb.te', `
|
||||||
allow $1_t rhgb_t:process sigchld;
|
allow $1_t rhgb_t:process sigchld;
|
||||||
allow $1_t rhgb_t:fd use;
|
allow $1_t rhgb_t:fd use;
|
||||||
allow $1_t rhgb_t:fifo_file { read write };
|
allow $1_t rhgb_t:fifo_file { read write };
|
||||||
@ -648,14 +670,12 @@ udev_read_database($1_t)
|
|||||||
allow $1_t null_device_t:chr_file r_file_perms;
|
allow $1_t null_device_t:chr_file r_file_perms;
|
||||||
dontaudit $1_t unpriv_userdomain:fd use;
|
dontaudit $1_t unpriv_userdomain:fd use;
|
||||||
allow $1_t autofs_t:dir { search getattr };
|
allow $1_t autofs_t:dir { search getattr };
|
||||||
ifdef(`targeted_policy', `
|
tunable_policy(`direct_sysadm_daemon', `
|
||||||
dontaudit $1_t { tty_device_t devpts_t }:chr_file { read write };
|
|
||||||
dontaudit $1_t root_t:file { getattr read };
|
|
||||||
')dnl end if targeted_policy
|
|
||||||
ifdef(`direct_sysadm_daemon', `
|
|
||||||
dontaudit $1_t admin_tty_type:chr_file rw_file_perms;
|
dontaudit $1_t admin_tty_type:chr_file rw_file_perms;
|
||||||
')
|
')
|
||||||
ifdef(`newrole.te', `allow $1_t newrole_t:process sigchld;')
|
optional_policy(`selinux.te',`
|
||||||
|
selinux_newrole_sigchld($1_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
|
||||||
#
|
#
|
||||||
@ -682,25 +702,28 @@ logging_send_system_log_message($1_t)
|
|||||||
libraries_use_dynamic_loader($1_t)
|
libraries_use_dynamic_loader($1_t)
|
||||||
libraries_read_shared_libraries($1_t)
|
libraries_read_shared_libraries($1_t)
|
||||||
miscfiles_read_localization($1_t)
|
miscfiles_read_localization($1_t)
|
||||||
allow $1_t proc_t:dir r_dir_perms;
|
|
||||||
allow $1_t proc_t:lnk_file read;
|
|
||||||
optional_policy(`udev.te', `
|
optional_policy(`udev.te', `
|
||||||
udev_read_database($1_t)
|
udev_read_database($1_t)
|
||||||
')
|
')
|
||||||
|
tunable_policy(`targeted_policy', `
|
||||||
|
terminal_ignore_use_general_physical_terminal($1_t)
|
||||||
|
terminal_ignore_use_general_pseudoterminal($1_t)
|
||||||
|
files_ignore_read_rootfs_file($1_t)
|
||||||
|
')dnl end targeted_policy tunable
|
||||||
|
allow $1_t proc_t:dir r_dir_perms;
|
||||||
|
allow $1_t proc_t:lnk_file read;
|
||||||
allow $1_t null_device_t:chr_file r_file_perms;
|
allow $1_t null_device_t:chr_file r_file_perms;
|
||||||
dontaudit $1_t unpriv_userdomain:fd use;
|
dontaudit $1_t unpriv_userdomain:fd use;
|
||||||
allow $1_t autofs_t:dir { search getattr };
|
allow $1_t autofs_t:dir { search getattr };
|
||||||
ifdef(`targeted_policy', `
|
|
||||||
dontaudit $1_t { tty_device_t devpts_t }:chr_file { read write };
|
|
||||||
dontaudit $1_t root_t:file { getattr read };
|
|
||||||
')dnl end if targeted_policy
|
|
||||||
dontaudit $1_t sysadm_home_dir_t:dir search;
|
dontaudit $1_t sysadm_home_dir_t:dir search;
|
||||||
ifdef(`rhgb.te', `
|
optional_policy(`rhgb.te', `
|
||||||
allow $1_t rhgb_t:process sigchld;
|
allow $1_t rhgb_t:process sigchld;
|
||||||
allow $1_t rhgb_t:fd use;
|
allow $1_t rhgb_t:fd use;
|
||||||
allow $1_t rhgb_t:fifo_file { read write };
|
allow $1_t rhgb_t:fifo_file { read write };
|
||||||
')
|
')
|
||||||
ifdef(`newrole.te', `allow $1_t newrole_t:process sigchld;')
|
optional_policy(`selinux.te',`
|
||||||
|
selinux_newrole_sigchld($1_t)
|
||||||
|
')
|
||||||
|
|
||||||
#
|
#
|
||||||
# daemon_sub_domain():
|
# daemon_sub_domain():
|
||||||
@ -843,6 +866,11 @@ libraries_use_dynamic_loader($1_t)
|
|||||||
libraries_read_shared_libraries($1_t)
|
libraries_read_shared_libraries($1_t)
|
||||||
logging_send_system_log_message($1_t)
|
logging_send_system_log_message($1_t)
|
||||||
devices_discard_data_stream($1_t)
|
devices_discard_data_stream($1_t)
|
||||||
|
tunable_policy(`targeted_policy', `
|
||||||
|
terminal_ignore_use_general_physical_terminal($1_t)
|
||||||
|
terminal_ignore_use_general_pseudoterminal($1_t)
|
||||||
|
files_ignore_read_rootfs_file($1_t)
|
||||||
|
')dnl end targeted_policy tunable
|
||||||
allow $1_t proc_t:dir r_dir_perms;
|
allow $1_t proc_t:dir r_dir_perms;
|
||||||
allow $1_t proc_t:lnk_file read;
|
allow $1_t proc_t:lnk_file read;
|
||||||
optional_policy(`udev.te', `
|
optional_policy(`udev.te', `
|
||||||
@ -851,10 +879,6 @@ udev_read_database($1_t)
|
|||||||
allow $1_t null_device_t:chr_file r_file_perms;
|
allow $1_t null_device_t:chr_file r_file_perms;
|
||||||
allow $1_t autofs_t:dir { search getattr };
|
allow $1_t autofs_t:dir { search getattr };
|
||||||
dontaudit $1_t unpriv_userdomain:fd use;
|
dontaudit $1_t unpriv_userdomain:fd use;
|
||||||
ifdef(`targeted_policy', `
|
|
||||||
dontaudit $1_t { tty_device_t devpts_t }:chr_file { read write };
|
|
||||||
dontaudit $1_t root_t:file { getattr read };
|
|
||||||
')dnl end if targeted_policy
|
|
||||||
|
|
||||||
#
|
#
|
||||||
# legacy_domain(): complete
|
# legacy_domain(): complete
|
||||||
|
Loading…
Reference in New Issue
Block a user