More fixes
This commit is contained in:
parent
08e567dc56
commit
ac498fa5d9
@ -3824,6 +3824,24 @@ interface(`dev_rw_sysfs',`
|
|||||||
list_dirs_pattern($1, sysfs_t, sysfs_t)
|
list_dirs_pattern($1, sysfs_t, sysfs_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Allow caller to modify hardware state information.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`dev_manage_sysfs_dirs',`
|
||||||
|
gen_require(`
|
||||||
|
type sysfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
manage_dirs_pattern($1, sysfs_t, sysfs_t)
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read from pseudo random number generator devices (e.g., /dev/urandom).
|
## Read from pseudo random number generator devices (e.g., /dev/urandom).
|
||||||
|
@ -21,7 +21,7 @@ gen_tunable(dbadm_read_user_files, false)
|
|||||||
|
|
||||||
role dbadm_r;
|
role dbadm_r;
|
||||||
|
|
||||||
userdom_unpriv_user_template(dbadm)
|
userdom_base_user_template(dbadm)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -146,24 +146,6 @@ interface(`cobbler_manage_lib_files',`
|
|||||||
files_search_var_lib($1)
|
files_search_var_lib($1)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
|
||||||
## <summary>
|
|
||||||
## dontaudit read and write Cobbler log files.
|
|
||||||
## </summary>
|
|
||||||
## <param name="domain">
|
|
||||||
## <summary>
|
|
||||||
## Domain allowed access.
|
|
||||||
## </summary>
|
|
||||||
## </param>
|
|
||||||
#
|
|
||||||
interface(`cobbler_dontaudit_rw_log',`
|
|
||||||
gen_require(`
|
|
||||||
type cobbler_var_log_t;
|
|
||||||
')
|
|
||||||
|
|
||||||
dontaudit $1 cobbler_var_log_t:file rw_inherited_files_perms;
|
|
||||||
')
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to read and write
|
## Do not audit attempts to read and write
|
||||||
|
@ -228,6 +228,7 @@ dev_rw_generic_usb_dev(devicekit_power_t)
|
|||||||
dev_rw_generic_chr_files(devicekit_power_t)
|
dev_rw_generic_chr_files(devicekit_power_t)
|
||||||
dev_rw_netcontrol(devicekit_power_t)
|
dev_rw_netcontrol(devicekit_power_t)
|
||||||
dev_rw_sysfs(devicekit_power_t)
|
dev_rw_sysfs(devicekit_power_t)
|
||||||
|
dev_read_rand(devicekit_power_t)
|
||||||
|
|
||||||
files_read_kernel_img(devicekit_power_t)
|
files_read_kernel_img(devicekit_power_t)
|
||||||
files_read_etc_files(devicekit_power_t)
|
files_read_etc_files(devicekit_power_t)
|
||||||
|
@ -101,8 +101,6 @@ ifdef(`hide_broken_symptoms', `
|
|||||||
dev_getattr_agp_dev($2)
|
dev_getattr_agp_dev($2)
|
||||||
tunable_policy(`user_direct_dri',`
|
tunable_policy(`user_direct_dri',`
|
||||||
dev_rw_dri($2)
|
dev_rw_dri($2)
|
||||||
',`
|
|
||||||
dev_dontaudit_rw_dri($2)
|
|
||||||
')
|
')
|
||||||
|
|
||||||
# GNOME checks for usb and other devices:
|
# GNOME checks for usb and other devices:
|
||||||
|
@ -220,7 +220,7 @@ storage_raw_rw_fixed_disk(init_t)
|
|||||||
modutils_domtrans_insmod(init_t)
|
modutils_domtrans_insmod(init_t)
|
||||||
|
|
||||||
tunable_policy(`init_systemd',`
|
tunable_policy(`init_systemd',`
|
||||||
allow init_t self:unix_dgram_socket create_socket_perms;
|
allow init_t self:unix_dgram_socket { create_socket_perms sendto };
|
||||||
allow init_t self:process { setsockcreate setfscreate };
|
allow init_t self:process { setsockcreate setfscreate };
|
||||||
allow init_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
allow init_t self:unix_stream_socket { create_stream_socket_perms connectto };
|
||||||
allow init_t self:netlink_kobject_uevent_socket create_socket_perms;
|
allow init_t self:netlink_kobject_uevent_socket create_socket_perms;
|
||||||
@ -239,6 +239,7 @@ tunable_policy(`init_systemd',`
|
|||||||
dev_read_generic_chr_files(init_t)
|
dev_read_generic_chr_files(init_t)
|
||||||
dev_relabelfrom_generic_chr_files(init_t)
|
dev_relabelfrom_generic_chr_files(init_t)
|
||||||
dev_relabel_autofs_dev(init_t)
|
dev_relabel_autofs_dev(init_t)
|
||||||
|
dev_manage_sysfs_dirs(init_t)
|
||||||
|
|
||||||
files_mounton_all_mountpoints(init_t)
|
files_mounton_all_mountpoints(init_t)
|
||||||
files_manage_all_pids_dirs(init_t)
|
files_manage_all_pids_dirs(init_t)
|
||||||
@ -249,16 +250,17 @@ tunable_policy(`init_systemd',`
|
|||||||
fs_list_auto_mountpoints(init_t)
|
fs_list_auto_mountpoints(init_t)
|
||||||
fs_read_cgroup_files(init_t)
|
fs_read_cgroup_files(init_t)
|
||||||
fs_write_cgroup_files(init_t)
|
fs_write_cgroup_files(init_t)
|
||||||
|
fs_search_cgroup_dirs(daemon)
|
||||||
|
|
||||||
selinux_compute_create_context(init_t)
|
selinux_compute_create_context(init_t)
|
||||||
selinux_validate_context(init_t)
|
selinux_validate_context(init_t)
|
||||||
selinux_unmount_fs(init_t)
|
selinux_unmount_fs(init_t)
|
||||||
|
|
||||||
|
storage_getattr_removable_dev(init_t)
|
||||||
|
|
||||||
init_read_script_state(init_t)
|
init_read_script_state(init_t)
|
||||||
|
|
||||||
seutil_read_file_contexts(init_t)
|
seutil_read_file_contexts(init_t)
|
||||||
|
|
||||||
storage_getattr_removable_dev(init_t)
|
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
@ -286,6 +288,11 @@ optional_policy(`
|
|||||||
nscd_socket_use(init_t)
|
nscd_socket_use(init_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
plymouthd_stream_connect(init_t)
|
||||||
|
plymouthd_exec_plymouth(init_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
sssd_stream_connect(init_t)
|
sssd_stream_connect(init_t)
|
||||||
')
|
')
|
||||||
|
Loading…
Reference in New Issue
Block a user