Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home
Allow clamd to send signals to itself Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm.
This commit is contained in:
parent
24ea653911
commit
5212892e22
@ -24,36 +24,37 @@ manage_files_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t)
|
|||||||
manage_dirs_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t)
|
manage_dirs_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t)
|
||||||
files_tmp_filetrans(firewallgui_t,firewallgui_tmp_t, { file dir })
|
files_tmp_filetrans(firewallgui_t,firewallgui_tmp_t, { file dir })
|
||||||
|
|
||||||
files_manage_system_conf_files(firewallgui_t)
|
|
||||||
files_etc_filetrans_system_conf(firewallgui_t)
|
|
||||||
|
|
||||||
corecmd_exec_shell(firewallgui_t)
|
|
||||||
corecmd_exec_bin(firewallgui_t)
|
|
||||||
consoletype_exec(firewallgui_t)
|
|
||||||
|
|
||||||
kernel_read_system_state(firewallgui_t)
|
kernel_read_system_state(firewallgui_t)
|
||||||
kernel_read_network_state(firewallgui_t)
|
kernel_read_network_state(firewallgui_t)
|
||||||
kernel_rw_net_sysctls(firewallgui_t)
|
kernel_rw_net_sysctls(firewallgui_t)
|
||||||
kernel_rw_kernel_sysctl(firewallgui_t)
|
kernel_rw_kernel_sysctl(firewallgui_t)
|
||||||
kernel_rw_vm_sysctls(firewallgui_t)
|
kernel_rw_vm_sysctls(firewallgui_t)
|
||||||
|
|
||||||
|
corecmd_exec_shell(firewallgui_t)
|
||||||
|
corecmd_exec_bin(firewallgui_t)
|
||||||
|
consoletype_exec(firewallgui_t)
|
||||||
|
|
||||||
|
dev_read_urand(firewallgui_t)
|
||||||
|
dev_read_sysfs(firewallgui_t)
|
||||||
|
|
||||||
|
files_manage_system_conf_files(firewallgui_t)
|
||||||
|
files_etc_filetrans_system_conf(firewallgui_t)
|
||||||
files_read_etc_files(firewallgui_t)
|
files_read_etc_files(firewallgui_t)
|
||||||
files_read_usr_files(firewallgui_t)
|
files_read_usr_files(firewallgui_t)
|
||||||
files_search_kernel_modules(firewallgui_t)
|
files_search_kernel_modules(firewallgui_t)
|
||||||
files_list_kernel_modules(firewallgui_t)
|
files_list_kernel_modules(firewallgui_t)
|
||||||
|
|
||||||
|
iptables_domtrans(firewallgui_t)
|
||||||
|
iptables_initrc_domtrans(firewallgui_t)
|
||||||
|
|
||||||
modutils_getattr_module_deps(firewallgui_t)
|
modutils_getattr_module_deps(firewallgui_t)
|
||||||
|
|
||||||
dev_read_urand(firewallgui_t)
|
|
||||||
dev_read_sysfs(firewallgui_t)
|
|
||||||
|
|
||||||
nscd_dontaudit_search_pid(firewallgui_t)
|
|
||||||
nscd_socket_use(firewallgui_t)
|
|
||||||
|
|
||||||
miscfiles_read_localization(firewallgui_t)
|
miscfiles_read_localization(firewallgui_t)
|
||||||
|
|
||||||
iptables_domtrans(firewallgui_t)
|
userdom_dontaudit_search_user_home_dirs(firewallgui_t)
|
||||||
iptables_initrc_domtrans(firewallgui_t)
|
|
||||||
|
nscd_dontaudit_search_pid(firewallgui_t)
|
||||||
|
nscd_socket_use(firewallgui_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
gnome_read_gconf_home_files(firewallgui_t)
|
gnome_read_gconf_home_files(firewallgui_t)
|
||||||
|
@ -346,8 +346,10 @@ term_getattr_all_ttys(mozilla_plugin_t)
|
|||||||
term_getattr_all_ptys(mozilla_plugin_t)
|
term_getattr_all_ptys(mozilla_plugin_t)
|
||||||
|
|
||||||
userdom_rw_user_tmpfs_files(mozilla_plugin_t)
|
userdom_rw_user_tmpfs_files(mozilla_plugin_t)
|
||||||
|
userdom_delete_user_tmpfs_files(mozilla_plugin_t)
|
||||||
userdom_stream_connect(mozilla_plugin_t)
|
userdom_stream_connect(mozilla_plugin_t)
|
||||||
userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
|
userdom_dontaudit_use_user_ptys(mozilla_plugin_t)
|
||||||
|
userdom_read_user_home_content_files(mozilla_plugin_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
alsa_read_rw_config(mozilla_plugin_t)
|
alsa_read_rw_config(mozilla_plugin_t)
|
||||||
|
@ -64,6 +64,8 @@ logging_log_file(freshclam_var_log_t)
|
|||||||
|
|
||||||
allow clamd_t self:capability { kill setgid setuid dac_override };
|
allow clamd_t self:capability { kill setgid setuid dac_override };
|
||||||
dontaudit clamd_t self:capability sys_tty_config;
|
dontaudit clamd_t self:capability sys_tty_config;
|
||||||
|
allow clamd_t self:process signal;
|
||||||
|
|
||||||
allow clamd_t self:fifo_file rw_fifo_file_perms;
|
allow clamd_t self:fifo_file rw_fifo_file_perms;
|
||||||
allow clamd_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
allow clamd_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
||||||
allow clamd_t self:unix_dgram_socket create_socket_perms;
|
allow clamd_t self:unix_dgram_socket create_socket_perms;
|
||||||
|
Loading…
Reference in New Issue
Block a user