more updates

This commit is contained in:
Chris PeBenito 2005-05-02 21:03:31 +00:00
parent 07d6e32f44
commit 428b57e55c

View File

@ -231,6 +231,11 @@
# Attributes # Attributes
# #
#
# admin_tty_type: complete
#
{ sysadm_tty_device_t sysadm_devpts_t }
# #
# file_type: complete # file_type: complete
# #
@ -415,6 +420,18 @@ kernel_compute_create($1)
kernel_compute_relabel($1) kernel_compute_relabel($1)
kernel_compute_reachable_user_contexts($1) kernel_compute_reachable_user_contexts($1)
#
# can_kerberos():
#
ifdef(`kerberos.te',`
if (allow_kerberos) {
can_network_client($1, `kerberos_port_t')
can_resolve($1)
}
') dnl kerberos.te
dontaudit $1 krb5_conf_t:file write;
allow $1 krb5_conf_t:file { getattr read };
# #
# can_ldap(): # can_ldap():
# #
@ -635,9 +652,14 @@ domain_use_widely_inheritable_file_descriptors($1_t)
libraries_use_dynamic_loader($1_t) libraries_use_dynamic_loader($1_t)
libraries_read_shared_libraries($1_t) libraries_read_shared_libraries($1_t)
logging_send_system_log_message($1_t) logging_send_system_log_message($1_t)
allow $1_t { self proc_t }:dir r_dir_perms; tunable_policy(`targeted_policy', `
allow $1_t { self proc_t }:lnk_file read; terminal_ignore_use_general_physical_terminal($1_t)
ifdef(`rhgb.te', ` terminal_ignore_use_general_pseudoterminal($1_t)
files_ignore_read_rootfs_file($1_t)
')dnl end targeted_policy tunable
allow $1_t proc_t:dir r_dir_perms;
allow $1_t proc_t:lnk_file read;
optional_policy(`rhgb.te', `
allow $1_t rhgb_t:process sigchld; allow $1_t rhgb_t:process sigchld;
allow $1_t rhgb_t:fd use; allow $1_t rhgb_t:fd use;
allow $1_t rhgb_t:fifo_file { read write }; allow $1_t rhgb_t:fifo_file { read write };
@ -648,14 +670,12 @@ udev_read_database($1_t)
allow $1_t null_device_t:chr_file r_file_perms; allow $1_t null_device_t:chr_file r_file_perms;
dontaudit $1_t unpriv_userdomain:fd use; dontaudit $1_t unpriv_userdomain:fd use;
allow $1_t autofs_t:dir { search getattr }; allow $1_t autofs_t:dir { search getattr };
ifdef(`targeted_policy', ` tunable_policy(`direct_sysadm_daemon', `
dontaudit $1_t { tty_device_t devpts_t }:chr_file { read write };
dontaudit $1_t root_t:file { getattr read };
')dnl end if targeted_policy
ifdef(`direct_sysadm_daemon', `
dontaudit $1_t admin_tty_type:chr_file rw_file_perms; dontaudit $1_t admin_tty_type:chr_file rw_file_perms;
') ')
ifdef(`newrole.te', `allow $1_t newrole_t:process sigchld;') optional_policy(`selinux.te',`
selinux_newrole_sigchld($1_t)
')
# #
@ -682,25 +702,28 @@ logging_send_system_log_message($1_t)
libraries_use_dynamic_loader($1_t) libraries_use_dynamic_loader($1_t)
libraries_read_shared_libraries($1_t) libraries_read_shared_libraries($1_t)
miscfiles_read_localization($1_t) miscfiles_read_localization($1_t)
allow $1_t proc_t:dir r_dir_perms;
allow $1_t proc_t:lnk_file read;
optional_policy(`udev.te', ` optional_policy(`udev.te', `
udev_read_database($1_t) udev_read_database($1_t)
') ')
tunable_policy(`targeted_policy', `
terminal_ignore_use_general_physical_terminal($1_t)
terminal_ignore_use_general_pseudoterminal($1_t)
files_ignore_read_rootfs_file($1_t)
')dnl end targeted_policy tunable
allow $1_t proc_t:dir r_dir_perms;
allow $1_t proc_t:lnk_file read;
allow $1_t null_device_t:chr_file r_file_perms; allow $1_t null_device_t:chr_file r_file_perms;
dontaudit $1_t unpriv_userdomain:fd use; dontaudit $1_t unpriv_userdomain:fd use;
allow $1_t autofs_t:dir { search getattr }; allow $1_t autofs_t:dir { search getattr };
ifdef(`targeted_policy', `
dontaudit $1_t { tty_device_t devpts_t }:chr_file { read write };
dontaudit $1_t root_t:file { getattr read };
')dnl end if targeted_policy
dontaudit $1_t sysadm_home_dir_t:dir search; dontaudit $1_t sysadm_home_dir_t:dir search;
ifdef(`rhgb.te', ` optional_policy(`rhgb.te', `
allow $1_t rhgb_t:process sigchld; allow $1_t rhgb_t:process sigchld;
allow $1_t rhgb_t:fd use; allow $1_t rhgb_t:fd use;
allow $1_t rhgb_t:fifo_file { read write }; allow $1_t rhgb_t:fifo_file { read write };
') ')
ifdef(`newrole.te', `allow $1_t newrole_t:process sigchld;') optional_policy(`selinux.te',`
selinux_newrole_sigchld($1_t)
')
# #
# daemon_sub_domain(): # daemon_sub_domain():
@ -843,6 +866,11 @@ libraries_use_dynamic_loader($1_t)
libraries_read_shared_libraries($1_t) libraries_read_shared_libraries($1_t)
logging_send_system_log_message($1_t) logging_send_system_log_message($1_t)
devices_discard_data_stream($1_t) devices_discard_data_stream($1_t)
tunable_policy(`targeted_policy', `
terminal_ignore_use_general_physical_terminal($1_t)
terminal_ignore_use_general_pseudoterminal($1_t)
files_ignore_read_rootfs_file($1_t)
')dnl end targeted_policy tunable
allow $1_t proc_t:dir r_dir_perms; allow $1_t proc_t:dir r_dir_perms;
allow $1_t proc_t:lnk_file read; allow $1_t proc_t:lnk_file read;
optional_policy(`udev.te', ` optional_policy(`udev.te', `
@ -851,10 +879,6 @@ udev_read_database($1_t)
allow $1_t null_device_t:chr_file r_file_perms; allow $1_t null_device_t:chr_file r_file_perms;
allow $1_t autofs_t:dir { search getattr }; allow $1_t autofs_t:dir { search getattr };
dontaudit $1_t unpriv_userdomain:fd use; dontaudit $1_t unpriv_userdomain:fd use;
ifdef(`targeted_policy', `
dontaudit $1_t { tty_device_t devpts_t }:chr_file { read write };
dontaudit $1_t root_t:file { getattr read };
')dnl end if targeted_policy
# #
# legacy_domain(): complete # legacy_domain(): complete