trunk: add kerneloops from dan.
This commit is contained in:
parent
ff79b83c51
commit
782c10e949
@ -8,6 +8,7 @@
|
||||
- Patch to fix leaky interface/template call depth calculator from Vaclav
|
||||
Ovsik.
|
||||
- Added modules:
|
||||
kerneloops (Dan Walsh)
|
||||
kismet (Dan Walsh)
|
||||
|
||||
* Wed Apr 02 2008 Chris PeBenito <selinux@tresys.com> - 20080402
|
||||
|
1
policy/modules/services/kerneloops.fc
Normal file
1
policy/modules/services/kerneloops.fc
Normal file
@ -0,0 +1 @@
|
||||
/usr/sbin/kerneloops -- gen_context(system_u:object_r:kerneloops_exec_t,s0)
|
93
policy/modules/services/kerneloops.if
Normal file
93
policy/modules/services/kerneloops.if
Normal file
@ -0,0 +1,93 @@
|
||||
## <summary>policy for kerneloops</summary>
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Execute a domain transition to run kerneloops.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed to transition.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`kerneloops_domtrans',`
|
||||
gen_require(`
|
||||
type kerneloops_t;
|
||||
type kerneloops_exec_t;
|
||||
')
|
||||
|
||||
domtrans_pattern($1, kerneloops_exec_t, kerneloops_t)
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Send and receive messages from
|
||||
## kerneloops over dbus.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`kerneloops_dbus_chat',`
|
||||
gen_require(`
|
||||
type kerneloops_t;
|
||||
class dbus send_msg;
|
||||
')
|
||||
|
||||
allow $1 kerneloops_t:dbus send_msg;
|
||||
allow kerneloops_t $1:dbus send_msg;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## dontaudit attempts to Send and receive messages from
|
||||
## kerneloops over dbus.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`kerneloops_dontaudit_dbus_chat',`
|
||||
gen_require(`
|
||||
type kerneloops_t;
|
||||
class dbus send_msg;
|
||||
')
|
||||
|
||||
dontaudit $1 kerneloops_t:dbus send_msg;
|
||||
dontaudit kerneloops_t $1:dbus send_msg;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## All of the rules required to administrate
|
||||
## an kerneloops environment
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
## <param name="role">
|
||||
## <summary>
|
||||
## The role to be allowed to manage the kerneloops domain.
|
||||
## </summary>
|
||||
## </param>
|
||||
## <param name="terminal">
|
||||
## <summary>
|
||||
## The type of the user terminal.
|
||||
## </summary>
|
||||
## </param>
|
||||
## <rolecap/>
|
||||
#
|
||||
interface(`kerneloops_admin',`
|
||||
gen_require(`
|
||||
type kerneloops_t;
|
||||
')
|
||||
|
||||
allow $1 kerneloops_t:process { ptrace signal_perms };
|
||||
ps_process_pattern($1, kerneloops_t)
|
||||
')
|
49
policy/modules/services/kerneloops.te
Normal file
49
policy/modules/services/kerneloops.te
Normal file
@ -0,0 +1,49 @@
|
||||
policy_module(kerneloops,1.0.0)
|
||||
|
||||
########################################
|
||||
#
|
||||
# Declarations
|
||||
#
|
||||
|
||||
type kerneloops_t;
|
||||
type kerneloops_exec_t;
|
||||
init_daemon_domain(kerneloops_t, kerneloops_exec_t)
|
||||
|
||||
########################################
|
||||
#
|
||||
# kerneloops local policy
|
||||
#
|
||||
|
||||
allow kerneloops_t self:capability sys_nice;
|
||||
allow kerneloops_t self:process { setsched getsched };
|
||||
allow kerneloops_t self:fifo_file rw_file_perms;
|
||||
|
||||
kernel_read_ring_buffer(kerneloops_t)
|
||||
|
||||
# Init script handling
|
||||
domain_use_interactive_fds(kerneloops_t)
|
||||
|
||||
corenet_all_recvfrom_unlabeled(kerneloops_t)
|
||||
corenet_all_recvfrom_netlabel(kerneloops_t)
|
||||
corenet_tcp_sendrecv_all_if(kerneloops_t)
|
||||
corenet_tcp_sendrecv_all_nodes(kerneloops_t)
|
||||
corenet_tcp_sendrecv_all_ports(kerneloops_t)
|
||||
corenet_tcp_bind_http_port(kerneloops_t)
|
||||
corenet_tcp_connect_http_port(kerneloops_t)
|
||||
|
||||
files_read_etc_files(kerneloops_t)
|
||||
|
||||
libs_use_ld_so(kerneloops_t)
|
||||
libs_use_shared_libs(kerneloops_t)
|
||||
|
||||
logging_send_syslog_msg(kerneloops_t)
|
||||
logging_read_generic_logs(kerneloops_t)
|
||||
|
||||
miscfiles_read_localization(kerneloops_t)
|
||||
|
||||
sysnet_dns_name_resolve(kerneloops_t)
|
||||
|
||||
optional_policy(`
|
||||
dbus_system_bus_client_template(kerneloops, kerneloops_t)
|
||||
dbus_connect_system_bus(kerneloops_t)
|
||||
')
|
Loading…
Reference in New Issue
Block a user