Improve documentation on kernel_read_system_state(), kernel_read_network_state(), and kernel_read_proc_symlinks().
This commit is contained in:
parent
fd813456a4
commit
7a0c0b4088
@ -759,13 +759,22 @@ interface(`kernel_getattr_proc_files',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read symbolic links in /proc.
|
## Read generic symbolic links in /proc.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow the specified domain to read (follow) generic
|
||||||
|
## symbolic links (symlinks) in the proc filesystem (/proc).
|
||||||
|
## This interface does not include access to the targets of
|
||||||
|
## these links. An example symlink is /proc/self.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
|
## <infoflow type="read" weight="10"/>
|
||||||
#
|
#
|
||||||
interface(`kernel_read_proc_symlinks',`
|
interface(`kernel_read_proc_symlinks',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
@ -777,13 +786,33 @@ interface(`kernel_read_proc_symlinks',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allows caller to read system state information in proc.
|
## Allows caller to read system state information in /proc.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow the specified domain to read general system
|
||||||
|
## state information from the proc filesystem (/proc).
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Generally it should be safe to allow this access. Some
|
||||||
|
## example files that can be read based on this interface:
|
||||||
|
## </p>
|
||||||
|
## <ul>
|
||||||
|
## <li>/proc/cpuinfo</li>
|
||||||
|
## <li>/proc/meminfo</li>
|
||||||
|
## <li>/proc/uptime</li>
|
||||||
|
## </ul>
|
||||||
|
## <p>
|
||||||
|
## This does not allow access to sysctl entries (/proc/sys/*)
|
||||||
|
## nor process state information (/proc/pid).
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The process type reading the system state information.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
|
## <infoflow type="read" weight="10"/>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
interface(`kernel_read_system_state',`
|
interface(`kernel_read_system_state',`
|
||||||
@ -1082,13 +1111,24 @@ interface(`kernel_search_network_state',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow caller to read the network state information.
|
## Read the network state information.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow the specified domain to read the networking
|
||||||
|
## state information. This includes several pieces
|
||||||
|
## of networking information, such as network interface
|
||||||
|
## names, netfilter (iptables) statistics, protocol
|
||||||
|
## information, routes, and remote procedure call (RPC)
|
||||||
|
## information.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The process type reading the state.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
|
## <infoflow type="read" weight="10"/>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
interface(`kernel_read_network_state',`
|
interface(`kernel_read_network_state',`
|
||||||
@ -1650,13 +1690,35 @@ interface(`kernel_read_crypto_sysctls',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read generic kernel sysctls.
|
## Read general kernel sysctls.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow the specified domain to read general
|
||||||
|
## kernel sysctl settings. These settings are typically
|
||||||
|
## read using the sysctl program. The settings
|
||||||
|
## that are included by this interface are prefixed
|
||||||
|
## with "kernel.", for example, kernel.sysrq.
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## This does not include access to the hotplug
|
||||||
|
## handler setting (kernel.hotplug)
|
||||||
|
## nor the module installer handler setting
|
||||||
|
## (kernel.modprobe).
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Related interfaces:
|
||||||
|
## </p>
|
||||||
|
## <ul>
|
||||||
|
## <li>kernel_rw_kernel_sysctl()</li>
|
||||||
|
## </ul>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
|
## <infoflow type="read" weight="10"/>
|
||||||
#
|
#
|
||||||
interface(`kernel_read_kernel_sysctls',`
|
interface(`kernel_read_kernel_sysctls',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
|
Loading…
Reference in New Issue
Block a user