trunk: ntp and setrans update from dan.
This commit is contained in:
parent
52ceaaac6e
commit
8786916e8d
@ -1,11 +1,14 @@
|
|||||||
|
|
||||||
/etc/ntp(d)?\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
|
|
||||||
|
|
||||||
/etc/cron\.(daily|weekly)/ntp-simple -- gen_context(system_u:object_r:ntpd_exec_t,s0)
|
/etc/cron\.(daily|weekly)/ntp-simple -- gen_context(system_u:object_r:ntpd_exec_t,s0)
|
||||||
/etc/cron\.(daily|weekly)/ntp-server -- gen_context(system_u:object_r:ntpd_exec_t,s0)
|
/etc/cron\.(daily|weekly)/ntp-server -- gen_context(system_u:object_r:ntpd_exec_t,s0)
|
||||||
|
|
||||||
/etc/ntp/step-tickers.* -- gen_context(system_u:object_r:net_conf_t,s0)
|
/etc/ntpd?\.conf.* -- gen_context(system_u:object_r:net_conf_t,s0)
|
||||||
|
/etc/ntp/crypto(/.*)? gen_context(system_u:object_r:ntpd_key_t,s0)
|
||||||
/etc/ntp/data(/.*)? gen_context(system_u:object_r:ntp_drift_t,s0)
|
/etc/ntp/data(/.*)? gen_context(system_u:object_r:ntp_drift_t,s0)
|
||||||
|
/etc/ntp/keys -- gen_context(system_u:object_r:ntpd_key_t,s0)
|
||||||
|
/etc/ntp/step-tickers.* -- gen_context(system_u:object_r:net_conf_t,s0)
|
||||||
|
|
||||||
|
/etc/rc\.d/init\.d/ntpd -- gen_context(system_u:object_r:ntpd_script_exec_t,s0)
|
||||||
|
|
||||||
/usr/sbin/ntpd -- gen_context(system_u:object_r:ntpd_exec_t,s0)
|
/usr/sbin/ntpd -- gen_context(system_u:object_r:ntpd_exec_t,s0)
|
||||||
/usr/sbin/ntpdate -- gen_context(system_u:object_r:ntpdate_exec_t,s0)
|
/usr/sbin/ntpdate -- gen_context(system_u:object_r:ntpdate_exec_t,s0)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(ntp, 1.6.1)
|
policy_module(ntp, 1.6.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -13,9 +13,15 @@ type ntpd_t;
|
|||||||
type ntpd_exec_t;
|
type ntpd_exec_t;
|
||||||
init_daemon_domain(ntpd_t, ntpd_exec_t)
|
init_daemon_domain(ntpd_t, ntpd_exec_t)
|
||||||
|
|
||||||
|
type ntpd_key_t;
|
||||||
|
files_type(ntpd_key_t)
|
||||||
|
|
||||||
type ntpd_log_t;
|
type ntpd_log_t;
|
||||||
logging_log_file(ntpd_log_t)
|
logging_log_file(ntpd_log_t)
|
||||||
|
|
||||||
|
type ntpd_script_exec_t;
|
||||||
|
init_script_file(ntpd_script_exec_t)
|
||||||
|
|
||||||
type ntpd_tmp_t;
|
type ntpd_tmp_t;
|
||||||
files_tmp_file(ntpd_tmp_t)
|
files_tmp_file(ntpd_tmp_t)
|
||||||
|
|
||||||
@ -34,7 +40,7 @@ init_system_domain(ntpd_t, ntpdate_exec_t)
|
|||||||
# ntpdate wants sys_nice
|
# ntpdate wants sys_nice
|
||||||
allow ntpd_t self:capability { chown dac_override kill setgid setuid sys_time ipc_lock sys_chroot sys_nice sys_resource };
|
allow ntpd_t self:capability { chown dac_override kill setgid setuid sys_time ipc_lock sys_chroot sys_nice sys_resource };
|
||||||
dontaudit ntpd_t self:capability { net_admin sys_tty_config fsetid sys_nice };
|
dontaudit ntpd_t self:capability { net_admin sys_tty_config fsetid sys_nice };
|
||||||
allow ntpd_t self:process { signal_perms setcap setsched setrlimit };
|
allow ntpd_t self:process { signal_perms getcap setcap setsched setrlimit };
|
||||||
allow ntpd_t self:fifo_file { read write getattr };
|
allow ntpd_t self:fifo_file { read write getattr };
|
||||||
allow ntpd_t self:unix_dgram_socket create_socket_perms;
|
allow ntpd_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow ntpd_t self:unix_stream_socket create_socket_perms;
|
allow ntpd_t self:unix_stream_socket create_socket_perms;
|
||||||
@ -45,6 +51,8 @@ manage_files_pattern(ntpd_t, ntp_drift_t, ntp_drift_t)
|
|||||||
|
|
||||||
can_exec(ntpd_t,ntpd_exec_t)
|
can_exec(ntpd_t,ntpd_exec_t)
|
||||||
|
|
||||||
|
read_files_pattern(ntpd_t, ntpd_key_t, ntpd_key_t)
|
||||||
|
|
||||||
allow ntpd_t ntpd_log_t:dir setattr;
|
allow ntpd_t ntpd_log_t:dir setattr;
|
||||||
manage_files_pattern(ntpd_t,ntpd_log_t,ntpd_log_t)
|
manage_files_pattern(ntpd_t,ntpd_log_t,ntpd_log_t)
|
||||||
logging_log_filetrans(ntpd_t,ntpd_log_t,{ file dir })
|
logging_log_filetrans(ntpd_t,ntpd_log_t,{ file dir })
|
||||||
@ -83,6 +91,8 @@ dev_read_urand(ntpd_t)
|
|||||||
fs_getattr_all_fs(ntpd_t)
|
fs_getattr_all_fs(ntpd_t)
|
||||||
fs_search_auto_mountpoints(ntpd_t)
|
fs_search_auto_mountpoints(ntpd_t)
|
||||||
|
|
||||||
|
term_use_ptmx(ntpd_t)
|
||||||
|
|
||||||
auth_use_nsswitch(ntpd_t)
|
auth_use_nsswitch(ntpd_t)
|
||||||
|
|
||||||
corecmd_exec_bin(ntpd_t)
|
corecmd_exec_bin(ntpd_t)
|
||||||
@ -108,6 +118,7 @@ miscfiles_read_localization(ntpd_t)
|
|||||||
userdom_dontaudit_use_unpriv_user_fds(ntpd_t)
|
userdom_dontaudit_use_unpriv_user_fds(ntpd_t)
|
||||||
|
|
||||||
sysadm_list_home_dirs(ntpd_t)
|
sysadm_list_home_dirs(ntpd_t)
|
||||||
|
sysadm_dontaudit_list_home_dirs(ntpd_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
# for cron jobs
|
# for cron jobs
|
||||||
@ -120,6 +131,10 @@ optional_policy(`
|
|||||||
firstboot_dontaudit_rw_stream_sockets(ntpd_t)
|
firstboot_dontaudit_rw_stream_sockets(ntpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
hal_dontaudit_write_log(ntpd_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
logrotate_exec(ntpd_t)
|
logrotate_exec(ntpd_t)
|
||||||
')
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(setrans,1.4.0)
|
policy_module(setrans, 1.4.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -28,7 +28,7 @@ ifdef(`enable_mls',`
|
|||||||
#
|
#
|
||||||
|
|
||||||
allow setrans_t self:capability sys_resource;
|
allow setrans_t self:capability sys_resource;
|
||||||
allow setrans_t self:process { setrlimit setcap signal_perms };
|
allow setrans_t self:process { setrlimit getcap setcap signal_perms };
|
||||||
allow setrans_t self:unix_stream_socket create_stream_socket_perms;
|
allow setrans_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
allow setrans_t self:unix_dgram_socket create_socket_perms;
|
allow setrans_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow setrans_t self:netlink_selinux_socket create_socket_perms;
|
allow setrans_t self:netlink_selinux_socket create_socket_perms;
|
||||||
|
Loading…
Reference in New Issue
Block a user