add ldconfig
This commit is contained in:
parent
e32c0d3b86
commit
48e0dbd63e
@ -19,6 +19,11 @@
|
|||||||
/opt/.*/lib(64)?(/.*)? context_template(system_u:object_r:lib_t,s0)
|
/opt/.*/lib(64)?(/.*)? context_template(system_u:object_r:lib_t,s0)
|
||||||
/opt/.*/lib(64)?/.*\.so(\.[^/]*)* -- context_template(system_u:object_r:shlib_t,s0)
|
/opt/.*/lib(64)?/.*\.so(\.[^/]*)* -- context_template(system_u:object_r:shlib_t,s0)
|
||||||
|
|
||||||
|
#
|
||||||
|
# /sbin
|
||||||
|
#
|
||||||
|
/sbin/ldconfig -- context_template(system_u:object_r:ldconfig_exec_t,s0)
|
||||||
|
|
||||||
#
|
#
|
||||||
# /usr
|
# /usr
|
||||||
#
|
#
|
||||||
|
@ -1,4 +1,60 @@
|
|||||||
# Copyright (C) 2005 Tresys Technology, LLC
|
# Copyright (C) 2005 Tresys Technology, LLC
|
||||||
|
## <module name="libraries" layer="system">
|
||||||
|
## <summary>Policy for system libraries.</summary>
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <interface name="libraries_ldconfig_transition">
|
||||||
|
## <description>
|
||||||
|
## Execute ldconfig in the ldconfig domain.
|
||||||
|
## </description>
|
||||||
|
## <parameter name="domain">
|
||||||
|
## The type of the process performing this action.
|
||||||
|
## </parameter>
|
||||||
|
## <infoflow type="write" weight="10"/>
|
||||||
|
## </interface>
|
||||||
|
#
|
||||||
|
define(`libraries_ldconfig_transition',`
|
||||||
|
requires_block_template(`$0'_depend)
|
||||||
|
allow $1 ldconfig_exec_t:file { getattr read execute };
|
||||||
|
allow $1 ldconfig_t:process transition;
|
||||||
|
type_transition $1 ldconfig_exec_t:file ldconfig_t;
|
||||||
|
dontaudit $1 ldconfig_t:process { noatsecure siginh rlimitinh };
|
||||||
|
')
|
||||||
|
|
||||||
|
define(`libraries_ldconfig_transition_depend',`
|
||||||
|
type ldconfig_t, ldconfig_exec_t;
|
||||||
|
class file { getattr read execute };
|
||||||
|
class process { transition noatsecure siginh rlimitinh };
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <interface name="libraries_ldconfig_transition_add_role_use_terminal">
|
||||||
|
## <description>
|
||||||
|
## Execute ldconfig in the ldconfig domain.
|
||||||
|
## </description>
|
||||||
|
## <parameter name="domain">
|
||||||
|
## The type of the process performing this action.
|
||||||
|
## </parameter>
|
||||||
|
## <parameter name="role">
|
||||||
|
## The role to allow the ldconfig domain.
|
||||||
|
## </parameter>
|
||||||
|
## <parameter name="terminal">
|
||||||
|
## The type of the terminal allow the ldconfig domain to use.
|
||||||
|
## </parameter>
|
||||||
|
## <infoflow type="both" weight="10"/>
|
||||||
|
## </interface>
|
||||||
|
#
|
||||||
|
define(`libraries_ldconfig_transition_add_role_use_terminal',`
|
||||||
|
requires_block_template(`$0'_depend)
|
||||||
|
libraries_ldconfig_transition($1)
|
||||||
|
role $2 types ldconfig_t;
|
||||||
|
allow ldconfig_t $3:chr_file { getattr read write ioctl };
|
||||||
|
')
|
||||||
|
|
||||||
|
define(`libraries_ldconfig_transition_add_role_use_terminal_depend',`
|
||||||
|
type ldconfig_t;
|
||||||
|
class chr_file { getattr read write ioctl };
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -6,7 +62,7 @@
|
|||||||
#
|
#
|
||||||
define(`libraries_use_dynamic_loader',`
|
define(`libraries_use_dynamic_loader',`
|
||||||
requires_block_template(`$0'_depend)
|
requires_block_template(`$0'_depend)
|
||||||
allow $1 lib_t:dir { getattr read search };
|
allow $1 lib_t:dir { getattr search read };
|
||||||
allow $1 lib_t:lnk_file { getattr read };
|
allow $1 lib_t:lnk_file { getattr read };
|
||||||
allow $1 ld_so_t:lnk_file { getattr read };
|
allow $1 ld_so_t:lnk_file { getattr read };
|
||||||
allow $1 ld_so_t:file { getattr read execute };
|
allow $1 ld_so_t:file { getattr read execute };
|
||||||
@ -15,7 +71,7 @@ allow $1 ld_so_cache_t:file { getattr read };
|
|||||||
|
|
||||||
define(`libraries_use_dynamic_loader_depend',`
|
define(`libraries_use_dynamic_loader_depend',`
|
||||||
type lib_t, ld_so_t, ld_so_cache_t;
|
type lib_t, ld_so_t, ld_so_cache_t;
|
||||||
class dir { getattr read search };
|
class dir { getattr search read };
|
||||||
class lnk_file { getattr read };
|
class lnk_file { getattr read };
|
||||||
class file { getattr read execute };
|
class file { getattr read execute };
|
||||||
')
|
')
|
||||||
@ -43,7 +99,7 @@ class file { execute execmod };
|
|||||||
#
|
#
|
||||||
define(`libraries_execute_dynamic_loader',`
|
define(`libraries_execute_dynamic_loader',`
|
||||||
requires_block_template(`$0'_depend)
|
requires_block_template(`$0'_depend)
|
||||||
allow $1 lib_t:dir { getattr read search };
|
allow $1 lib_t:dir { getattr search read };
|
||||||
allow $1 lib_t:lnk_file { getattr read };
|
allow $1 lib_t:lnk_file { getattr read };
|
||||||
allow $1 ld_so_t:lnk_file { getattr read };
|
allow $1 ld_so_t:lnk_file { getattr read };
|
||||||
allow $1 ld_so_t:file { getattr read execute execute_no_trans };
|
allow $1 ld_so_t:file { getattr read execute execute_no_trans };
|
||||||
@ -51,7 +107,7 @@ allow $1 ld_so_t:file { getattr read execute execute_no_trans };
|
|||||||
|
|
||||||
define(`libraries_execute_dynamic_loader_depend',`
|
define(`libraries_execute_dynamic_loader_depend',`
|
||||||
type lib_t, ld_so_t;
|
type lib_t, ld_so_t;
|
||||||
class dir { getattr read search };
|
class dir { getattr search read };
|
||||||
class lnk_file { getattr read };
|
class lnk_file { getattr read };
|
||||||
class file { getattr read execute execute_no_trans };
|
class file { getattr read execute execute_no_trans };
|
||||||
')
|
')
|
||||||
@ -76,7 +132,7 @@ class file { getattr read write };
|
|||||||
#
|
#
|
||||||
define(`libraries_use_shared_libraries',`
|
define(`libraries_use_shared_libraries',`
|
||||||
requires_block_template(`$0'_depend)
|
requires_block_template(`$0'_depend)
|
||||||
allow $1 lib_t:dir { getattr read search };
|
allow $1 lib_t:dir { getattr search read };
|
||||||
allow $1 lib_t:lnk_file { getattr read };
|
allow $1 lib_t:lnk_file { getattr read };
|
||||||
allow $1 { shlib_t texrel_shlib_t }:lnk_file { getattr read };
|
allow $1 { shlib_t texrel_shlib_t }:lnk_file { getattr read };
|
||||||
allow $1 { shlib_t texrel_shlib_t }:file { getattr read execute };
|
allow $1 { shlib_t texrel_shlib_t }:file { getattr read execute };
|
||||||
@ -84,7 +140,7 @@ allow $1 { shlib_t texrel_shlib_t }:file { getattr read execute };
|
|||||||
|
|
||||||
define(`libraries_use_shared_libraries_depend',`
|
define(`libraries_use_shared_libraries_depend',`
|
||||||
type lib_t, shlib_t, texrel_shlib_t;
|
type lib_t, shlib_t, texrel_shlib_t;
|
||||||
class dir { getattr read search };
|
class dir { getattr searc read };
|
||||||
class lnk_file { getattr read };
|
class lnk_file { getattr read };
|
||||||
class file { getattr read execute };
|
class file { getattr read execute };
|
||||||
')
|
')
|
||||||
@ -138,3 +194,5 @@ class dir { getattr read search };
|
|||||||
class lnk_file { getattr read };
|
class lnk_file { getattr read };
|
||||||
class file { getattr read execute execute_no_trans };
|
class file { getattr read execute execute_no_trans };
|
||||||
')
|
')
|
||||||
|
|
||||||
|
## </module>
|
||||||
|
@ -2,12 +2,18 @@
|
|||||||
|
|
||||||
policy_module(libraries,1.0)
|
policy_module(libraries,1.0)
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
# Declarations
|
||||||
|
#
|
||||||
|
|
||||||
#
|
#
|
||||||
# ld_so_cache_t is the type of /etc/ld.so.cache.
|
# ld_so_cache_t is the type of /etc/ld.so.cache.
|
||||||
#
|
#
|
||||||
type ld_so_cache_t;
|
type ld_so_cache_t;
|
||||||
files_make_file(ld_so_cache_t)
|
files_make_file(ld_so_cache_t)
|
||||||
|
|
||||||
|
#
|
||||||
# ld_so_t is the type of the system dynamic loaders.
|
# ld_so_t is the type of the system dynamic loaders.
|
||||||
#
|
#
|
||||||
type ld_so_t;
|
type ld_so_t;
|
||||||
@ -32,3 +38,64 @@ files_make_file(shlib_t)
|
|||||||
#
|
#
|
||||||
type texrel_shlib_t;
|
type texrel_shlib_t;
|
||||||
files_make_file(texrel_shlib_t)
|
files_make_file(texrel_shlib_t)
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
# ldconfig local policy
|
||||||
|
#
|
||||||
|
type ldconfig_t;
|
||||||
|
type ldconfig_exec_t;
|
||||||
|
init_make_system_domain(ldconfig_t,ldconfig_exec_t)
|
||||||
|
role system_r types ldconfig_t;
|
||||||
|
|
||||||
|
allow ldconfig_t ld_so_cache_t:file { create ioctl read getattr lock write setattr append link unlink rename };
|
||||||
|
files_create_private_config(ldconfig_t,ld_so_cache_t,file)
|
||||||
|
|
||||||
|
allow ldconfig_t lib_t:dir { getattr search read write add_name remove_name };
|
||||||
|
allow ldconfig_t lib_t:lnk_file { getattr create read unlink };
|
||||||
|
allow ldconfig_t ld_so_t:lnk_file { getattr read };
|
||||||
|
allow ldconfig_t ld_so_t:file { getattr read execute };
|
||||||
|
allow ldconfig_t ld_so_cache_t:file { getattr read };
|
||||||
|
allow ldconfig_t { shlib_t texrel_shlib_t }:lnk_file { getattr read };
|
||||||
|
allow ldconfig_t { shlib_t texrel_shlib_t }:file { getattr read execute };
|
||||||
|
|
||||||
|
kernel_read_system_state(ldconfig_t)
|
||||||
|
|
||||||
|
filesystem_get_persistent_filesystem_attributes(ldconfig_t)
|
||||||
|
|
||||||
|
domain_use_widely_inheritable_file_descriptors(ldconfig_t)
|
||||||
|
|
||||||
|
files_read_general_system_config(ldconfig_t)
|
||||||
|
# for when /etc/ld.so.cache is mislabeled:
|
||||||
|
files_remove_general_system_config(ldconfig_t)
|
||||||
|
|
||||||
|
init_script_use_pseudoterminal(ldconfig_t)
|
||||||
|
|
||||||
|
logging_send_system_log_message(ldconfig_t)
|
||||||
|
|
||||||
|
userdomain_use_all_users_file_descriptors(ldconfig_t)
|
||||||
|
|
||||||
|
|
||||||
|
ifdef(`TODO',`
|
||||||
|
|
||||||
|
allow ldconfig_t tmp_t:dir search;
|
||||||
|
|
||||||
|
ifdef(`apache.te', `
|
||||||
|
# dontaudit access to /usr/lib/apache, normal programs cannot read these libs anyway
|
||||||
|
dontaudit ldconfig_t httpd_modules_t:dir search;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow ldconfig_t { var_t var_lib_t }:dir search;
|
||||||
|
|
||||||
|
ifdef(`hide_broken_symptoms', `
|
||||||
|
ifdef(`unconfined.te',`
|
||||||
|
dontaudit ldconfig_t unconfined_t:tcp_socket { read write };
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
|
ifdef(`targeted_policy', `
|
||||||
|
allow ldconfig_t lib_t:file r_file_perms;
|
||||||
|
unconfined_domain(ldconfig_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
') dnl end TODO
|
||||||
|
Loading…
Reference in New Issue
Block a user