initial commit

This commit is contained in:
Chris PeBenito 2005-05-26 15:50:53 +00:00
parent efd8ede34d
commit c220381539
3 changed files with 132 additions and 0 deletions

View File

@ -0,0 +1,3 @@
# Copyright (C) 2005 Tresys Technology, LLC
/bin/dmesg -- system_u:object_r:dmesg_exec_t

View File

@ -0,0 +1,52 @@
# Copyright (C) 2005 Tresys Technology, LLC
## <module name="dmesg" layer="keyservices">
## <summary>Policy for dmesg.</summary>
########################################
## <interface name="dmesg_transition">
## <description>
## Execute dmesg in the dmesg domain.
## </description>
## <parameter name="domain">
## The type of the process performing this action.
## </parameter>
## <infoflow type="write" weight="10"/>
## </interface>
#
define(`dmesg_transition',`
requires_block_template(`$0'_depend)
allow $1 dmesg_exec_t:file { getattr read execute };
allow $1 dmesg_t:process transition;
type_transition $1 dmesg_exec_t:process dmesg_t;
dontaudit $1 dmesg_t:process { noatsecure siginh rlimitinh };
')
define(`dmesg_transition_depend',`
type dmesg_t, dmesg_exec_t;
class file { getattr read execute };
class process { transition noatsecure siginh rlimitinh };
')
########################################
## <interface name="dmesg_execute">
## <description>
## Execute dmesg in the caller domain.
## </description>
## <parameter name="domain">
## The type of the process performing this action.
## </parameter>
## <infoflow type="none"/>
## </interface>
#
define(`dmesg_execute',`
requires_block_template(`$0'_depend)
allow $1 dmesg_exec_t:file { getattr read execute execute_no_trans };
')
define(`dmesg_execute_depend',`
type dmesg_exec_t;
class file { getattr read execute execute_no_trans };
')
## </module>

View File

@ -0,0 +1,77 @@
# Copyright (C) 2005 Tresys Technology, LLC
policy_module(dmesg, 1.0)
########################################
#
# Declarations
#
type dmesg_t;
type dmesg_exec_t;
init_make_daemon_domain(dmesg_t,dmesg_exec_t)
role system_r types dmesg_t;
########################################
#
# Local policy
#
allow dmesg_t self:capability sys_admin;
dontaudit dmesg_t self:capability sys_tty_config;
allow dmesg_t self:process { sigchld sigkill sigstop signull signal };
kernel_read_kernel_sysctl(dmesg_t)
kernel_read_hardware_state(dmesg_t)
kernel_read_ring_buffer(dmesg_t)
kernel_clear_ring_buffer(dmesg_t)
kernel_change_ring_buffer_level(dmesg_t)
terminal_ignore_use_console(dmesg_t)
domain_use_widely_inheritable_file_descriptors(dmesg_t)
init_use_file_descriptors(dmesg_t)
init_script_use_pseudoterminal(dmesg_t)
libraries_use_dynamic_loader(dmesg_t)
libraries_use_shared_libraries(dmesg_t)
logging_send_system_log_message(dmesg_t)
logging_write_system_logs(dmesg_t)
miscfiles_read_localization(dmesg_t)
userdomain_use_admin_terminals(dmesg_t)
userdomain_ignore_use_all_unprivileged_users_file_descriptors(dmesg_t)
tunable_policy(`targeted_policy', `
terminal_ignore_use_general_physical_terminal(dmesg_t)
terminal_ignore_use_general_pseudoterminal(dmesg_t)
files_ignore_read_rootfs_file(dmesg_t)
')
optional_policy(`selinux.te',`
selinux_newrole_sigchld(dmesg_t)
')
optional_policy(`udev.te', `
udev_read_database(dmesg_t)
')
ifdef(`TODO',`
allow dmesg_t proc_t:dir r_dir_perms;
allow dmesg_t proc_t:lnk_file read;
optional_policy(`rhgb.te', `
allow dmesg_t rhgb_t:process sigchld;
allow dmesg_t rhgb_t:fd use;
allow dmesg_t rhgb_t:fifo_file { read write };
')
allow dmesg_t autofs_t:dir { search getattr };
# for when /usr is not mounted
dontaudit dmesg_t file_t:dir search;
') dnl endif TODO