From 7f74a4172141d2956a0b4396b90e4ee871ceb64f Mon Sep 17 00:00:00 2001 From: Chris PeBenito Date: Tue, 21 Mar 2006 18:50:58 +0000 Subject: [PATCH] add audioentropy, bug 1515 --- refpolicy/Changelog | 1 + .../policy/modules/services/audioentropy.fc | 4 ++ .../policy/modules/services/audioentropy.if | 1 + .../policy/modules/services/audioentropy.te | 72 +++++++++++++++++++ 4 files changed, 78 insertions(+) create mode 100644 refpolicy/policy/modules/services/audioentropy.fc create mode 100644 refpolicy/policy/modules/services/audioentropy.if create mode 100644 refpolicy/policy/modules/services/audioentropy.te diff --git a/refpolicy/Changelog b/refpolicy/Changelog index 7b7d13f6..17306999 100644 --- a/refpolicy/Changelog +++ b/refpolicy/Changelog @@ -11,6 +11,7 @@ - Added modules: amavis (Erich Schubert) apt (Erich Schubert) + audioentropy clamav (Erich Schubert) dpkg (Erich Schubert) ethereal diff --git a/refpolicy/policy/modules/services/audioentropy.fc b/refpolicy/policy/modules/services/audioentropy.fc new file mode 100644 index 00000000..bcf3e1c7 --- /dev/null +++ b/refpolicy/policy/modules/services/audioentropy.fc @@ -0,0 +1,4 @@ +# +# /usr +# +/usr/sbin/audio-entropyd -- gen_context(system_u:object_r:entropyd_exec_t,s0) diff --git a/refpolicy/policy/modules/services/audioentropy.if b/refpolicy/policy/modules/services/audioentropy.if new file mode 100644 index 00000000..67906f01 --- /dev/null +++ b/refpolicy/policy/modules/services/audioentropy.if @@ -0,0 +1 @@ +## Generate entropy from audio input diff --git a/refpolicy/policy/modules/services/audioentropy.te b/refpolicy/policy/modules/services/audioentropy.te new file mode 100644 index 00000000..c01456c5 --- /dev/null +++ b/refpolicy/policy/modules/services/audioentropy.te @@ -0,0 +1,72 @@ + +policy_module(audio_entropy,1.0.0) + +######################################## +# +# Declarations +# + +type entropyd_t; +type entropyd_exec_t; +init_daemon_domain(entropyd_t,entropyd_exec_t) + +type entropyd_var_run_t; +files_pid_file(entropyd_var_run_t) + +######################################## +# +# Local policy +# + +allow entropyd_t self:capability { ipc_lock sys_admin }; +dontaudit entropyd_t self:capability sys_tty_config; +allow entropyd_t self:process signal_perms; + +allow entropyd_t entropyd_var_run_t:file manage_file_perms; +allow entropyd_t entropyd_var_run_t:dir rw_dir_perms; +files_pid_filetrans(entropyd_t,entropyd_var_run_t,file) + +kernel_read_kernel_sysctls(entropyd_t) +kernel_list_proc(entropyd_t) +kernel_read_proc_symlinks(entropyd_t) + +dev_read_sysfs(entropyd_t) +dev_read_urand(entropyd_t) +dev_write_urand(entropyd_t) +dev_read_sound(entropyd_t) + +fs_getattr_all_fs(entropyd_t) +fs_search_auto_mountpoints(entropyd_t) + +term_dontaudit_use_console(entropyd_t) + +domain_use_interactive_fds(entropyd_t) + +init_use_fds(entropyd_t) +init_use_script_ptys(entropyd_t) + +libs_use_ld_so(entropyd_t) +libs_use_shared_libs(entropyd_t) + +logging_send_syslog_msg(entropyd_t) + +miscfiles_read_localization(entropyd_t) + +userdom_dontaudit_use_unpriv_user_fds(entropyd_t) +userdom_dontaudit_search_sysadm_home_dirs(entropyd_t) + +ifdef(`targeted_policy', ` + files_dontaudit_read_root_files(entropyd_t) + + term_dontaudit_use_unallocated_ttys(entropyd_t) + term_dontaudit_use_generic_ptys(entropyd_t) +') + +optional_policy(`selinuxutil',` + seutil_sigchld_newrole(entropyd_t) +') + +optional_policy(`udev',` + udev_read_db(entropyd_t) +') +