Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory.
Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets Allow confined users to read xdm_etc_t files Allow xdm_t to transition to xauth_t for lxdm program
This commit is contained in:
parent
fd595eb487
commit
4e6b3f6dd9
@ -297,14 +297,17 @@ optional_policy(`
|
|||||||
# mozilla_plugin local policy
|
# mozilla_plugin local policy
|
||||||
#
|
#
|
||||||
allow mozilla_plugin_t self:process { setsched signal_perms execmem };
|
allow mozilla_plugin_t self:process { setsched signal_perms execmem };
|
||||||
|
allow mozilla_plugin_t self:netlink_route_socket r_netlink_socket_perms;
|
||||||
|
allow mozilla_plugin_t self:tcp_socket create_socket_perms;
|
||||||
|
allow mozilla_plugin_t self:udp_socket create_socket_perms;
|
||||||
|
|
||||||
allow mozilla_plugin_t self:sem create_sem_perms;
|
allow mozilla_plugin_t self:sem create_sem_perms;
|
||||||
allow mozilla_plugin_t self:shm create_shm_perms;
|
allow mozilla_plugin_t self:shm create_shm_perms;
|
||||||
allow mozilla_plugin_t self:fifo_file manage_fifo_file_perms;
|
allow mozilla_plugin_t self:fifo_file manage_fifo_file_perms;
|
||||||
allow mozilla_plugin_t self:unix_stream_socket { connectto create_stream_socket_perms };
|
allow mozilla_plugin_t self:unix_stream_socket { connectto create_stream_socket_perms };
|
||||||
|
|
||||||
read_files_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_home_t)
|
|
||||||
can_exec(mozilla_plugin_t, mozilla_home_t)
|
can_exec(mozilla_plugin_t, mozilla_home_t)
|
||||||
|
read_files_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_home_t)
|
||||||
|
|
||||||
manage_dirs_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
|
manage_dirs_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
|
||||||
manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
|
manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
|
||||||
@ -330,6 +333,7 @@ dev_read_video_dev(mozilla_plugin_t)
|
|||||||
dev_read_sysfs(mozilla_plugin_t)
|
dev_read_sysfs(mozilla_plugin_t)
|
||||||
dev_read_sound(mozilla_plugin_t)
|
dev_read_sound(mozilla_plugin_t)
|
||||||
dev_write_sound(mozilla_plugin_t)
|
dev_write_sound(mozilla_plugin_t)
|
||||||
|
dev_dontaudit_rw_dri(mozilla_plugin_t)
|
||||||
|
|
||||||
domain_use_interactive_fds(mozilla_plugin_t)
|
domain_use_interactive_fds(mozilla_plugin_t)
|
||||||
domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
|
domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
|
||||||
@ -349,13 +353,20 @@ userdom_rw_user_tmpfs_files(mozilla_plugin_t)
|
|||||||
userdom_delete_user_tmpfs_files(mozilla_plugin_t)
|
userdom_delete_user_tmpfs_files(mozilla_plugin_t)
|
||||||
userdom_stream_connect(mozilla_plugin_t)
|
userdom_stream_connect(mozilla_plugin_t)
|
||||||
userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
|
userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
|
||||||
|
|
||||||
|
userdom_list_user_tmp(mozilla_plugin_t)
|
||||||
|
userdom_read_user_tmp_files(mozilla_plugin_t)
|
||||||
|
userdom_read_user_tmp_symlinks(mozilla_plugin_t)
|
||||||
userdom_read_user_home_content_files(mozilla_plugin_t)
|
userdom_read_user_home_content_files(mozilla_plugin_t)
|
||||||
|
userdom_read_user_home_content_files(mozilla_plugin_t)
|
||||||
|
userdom_read_user_home_content_symlinks(mozilla_plugin_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
alsa_read_rw_config(mozilla_plugin_t)
|
alsa_read_rw_config(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
dbus_session_bus_client(mozilla_plugin_t)
|
||||||
dbus_read_lib_files(mozilla_plugin_t)
|
dbus_read_lib_files(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -369,6 +380,7 @@ optional_policy(`
|
|||||||
nsplugin_rw_exec(mozilla_plugin_t)
|
nsplugin_rw_exec(mozilla_plugin_t)
|
||||||
nsplugin_manage_home_dirs(mozilla_plugin_t)
|
nsplugin_manage_home_dirs(mozilla_plugin_t)
|
||||||
nsplugin_manage_home_files(mozilla_plugin_t)
|
nsplugin_manage_home_files(mozilla_plugin_t)
|
||||||
|
nsplugin_user_home_dir_filetrans(mozilla_plugin_t)
|
||||||
nsplugin_signal(mozilla_plugin_t)
|
nsplugin_signal(mozilla_plugin_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -409,3 +409,28 @@ interface(`nsplugin_signal',`
|
|||||||
|
|
||||||
allow $1 nsplugin_t:process signal;
|
allow $1 nsplugin_t:process signal;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create objects in a user home directory
|
||||||
|
## with an automatic type transition to
|
||||||
|
## the nsplugin home file type.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
## <param name="object_class">
|
||||||
|
## <summary>
|
||||||
|
## The class of the object to be created.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`nsplugin_user_home_dir_filetrans',`
|
||||||
|
gen_require(`
|
||||||
|
type nsplugin_home_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
userdom_user_home_content_filetrans($1, nsplugin_home_t, $2)
|
||||||
|
')
|
||||||
|
@ -114,6 +114,7 @@ interface(`xserver_restricted_role',`
|
|||||||
xserver_create_xdm_tmp_sockets($2)
|
xserver_create_xdm_tmp_sockets($2)
|
||||||
# Needed for escd, remove if we get escd policy
|
# Needed for escd, remove if we get escd policy
|
||||||
xserver_manage_xdm_tmp_files($2)
|
xserver_manage_xdm_tmp_files($2)
|
||||||
|
xserver_read_xdm_etc_files($2)
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms',`
|
ifdef(`hide_broken_symptoms',`
|
||||||
dontaudit iceauth_t $2:socket_class_set { read write };
|
dontaudit iceauth_t $2:socket_class_set { read write };
|
||||||
|
@ -650,6 +650,7 @@ application_signal(xdm_t)
|
|||||||
|
|
||||||
xserver_rw_session(xdm_t, xdm_tmpfs_t)
|
xserver_rw_session(xdm_t, xdm_tmpfs_t)
|
||||||
xserver_unconfined(xdm_t)
|
xserver_unconfined(xdm_t)
|
||||||
|
xserver_domtrans_xauth(xdm_t)
|
||||||
|
|
||||||
ifndef(`distro_redhat',`
|
ifndef(`distro_redhat',`
|
||||||
allow xdm_t self:process { execheap execmem };
|
allow xdm_t self:process { execheap execmem };
|
||||||
|
Loading…
Reference in New Issue
Block a user