fix typos and import some rules from NSA cvs to make targeted policy work
This commit is contained in:
parent
474f43d13d
commit
689f6ddb35
@ -95,6 +95,26 @@ interface(`nscd_use_shared_mem',`
|
|||||||
dontaudit $1 nscd_var_run_t:file { getattr read };
|
dontaudit $1 nscd_var_run_t:file { getattr read };
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Read NSCD pid file.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`nscd_read_pid',`
|
||||||
|
gen_require(`
|
||||||
|
type nscd_var_run_t;
|
||||||
|
class dir search;
|
||||||
|
class file { getattr read };
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_pids($1)
|
||||||
|
allow $1 nscd_var_run_t:dir search;
|
||||||
|
allow $1 nscd_var_run_t:file { getattr read };
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Unconfined access to NSCD services.
|
## Unconfined access to NSCD services.
|
||||||
|
@ -37,7 +37,7 @@ allow nscd_t self:nscd { admin getstat };
|
|||||||
|
|
||||||
allow nscd_t nscd_var_run_t:file create_file_perms;
|
allow nscd_t nscd_var_run_t:file create_file_perms;
|
||||||
allow nscd_t nscd_var_run_t:sock_file create_file_perms;
|
allow nscd_t nscd_var_run_t:sock_file create_file_perms;
|
||||||
files_create_pid(nscd_t,nscd_var_run_t,{ file sock_file})
|
files_create_pid(nscd_t,nscd_var_run_t,{ file sock_file })
|
||||||
|
|
||||||
kernel_read_kernel_sysctl(nscd_t)
|
kernel_read_kernel_sysctl(nscd_t)
|
||||||
kernel_list_proc(nscd_t)
|
kernel_list_proc(nscd_t)
|
||||||
|
@ -181,6 +181,8 @@ domain_use_wide_inherit_fd(pam_console_t)
|
|||||||
files_read_etc_files(pam_console_t)
|
files_read_etc_files(pam_console_t)
|
||||||
files_search_pids(pam_console_t)
|
files_search_pids(pam_console_t)
|
||||||
files_list_mnt(pam_console_t)
|
files_list_mnt(pam_console_t)
|
||||||
|
# read /etc/mtab
|
||||||
|
files_read_etc_runtime_files(pam_console_t)
|
||||||
|
|
||||||
init_use_fd(pam_console_t)
|
init_use_fd(pam_console_t)
|
||||||
init_use_script_pty(pam_console_t)
|
init_use_script_pty(pam_console_t)
|
||||||
|
@ -107,7 +107,7 @@ ifdef(`hide_broken_symptoms',`
|
|||||||
dev_dontaudit_rw_cardmgr(insmod_t)
|
dev_dontaudit_rw_cardmgr(insmod_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`tunable_policy',`
|
ifdef(`targeted_policy',`
|
||||||
unconfined_domain_template(insmod_t)
|
unconfined_domain_template(insmod_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -56,7 +56,7 @@ allow dhcpc_t dhcp_etc_t:dir r_dir_perms;
|
|||||||
allow dhcpc_t dhcp_etc_t:lnk_file r_file_perms;
|
allow dhcpc_t dhcp_etc_t:lnk_file r_file_perms;
|
||||||
allow dhcpc_t dhcp_etc_t:file { r_file_perms execute execute_no_trans };
|
allow dhcpc_t dhcp_etc_t:file { r_file_perms execute execute_no_trans };
|
||||||
|
|
||||||
allow dhcpc_t dhcpc_state_t:dir rw_dir_perms;
|
allow dhcpc_t dhcp_state_t:dir rw_dir_perms;
|
||||||
allow dhcpc_t dhcpc_state_t:file create_file_perms;
|
allow dhcpc_t dhcpc_state_t:file create_file_perms;
|
||||||
type_transition dhcpc_t dhcp_state_t:file dhcpc_state_t;
|
type_transition dhcpc_t dhcp_state_t:file dhcpc_state_t;
|
||||||
|
|
||||||
@ -181,6 +181,7 @@ optional_policy(`nis.te',`
|
|||||||
|
|
||||||
optional_policy(`nscd.te',`
|
optional_policy(`nscd.te',`
|
||||||
nscd_domtrans(dhcpc_t)
|
nscd_domtrans(dhcpc_t)
|
||||||
|
nscd_read_pid(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`ntpd.te',`
|
optional_policy(`ntpd.te',`
|
||||||
|
Loading…
Reference in New Issue
Block a user