Merge branch 'master' of http://oss.tresys.com/git/refpolicy
Conflicts: policy/modules/kernel/domain.if policy/modules/services/xserver.te
This commit is contained in:
commit
cbadf720ba
@ -1,3 +1,4 @@
|
|||||||
|
- Conditional mmap_zero support from Dominick Grift.
|
||||||
- Added devtmpfs support.
|
- Added devtmpfs support.
|
||||||
- Dbadm updates from KaiGai Kohei.
|
- Dbadm updates from KaiGai Kohei.
|
||||||
- Virtio disk file context update from Mika Pfluger.
|
- Virtio disk file context update from Mika Pfluger.
|
||||||
|
@ -1,10 +1,17 @@
|
|||||||
policy_module(vbetool, 1.5.1)
|
policy_module(vbetool, 1.5.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Declarations
|
# Declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Ignore vbetool mmap_zero errors.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
|
gen_tunable(vbetool_mmap_zero_ignore, false)
|
||||||
|
|
||||||
type vbetool_t;
|
type vbetool_t;
|
||||||
type vbetool_exec_t;
|
type vbetool_exec_t;
|
||||||
init_system_domain(vbetool_t, vbetool_exec_t)
|
init_system_domain(vbetool_t, vbetool_exec_t)
|
||||||
@ -36,6 +43,10 @@ term_use_unallocated_ttys(vbetool_t)
|
|||||||
|
|
||||||
miscfiles_read_localization(vbetool_t)
|
miscfiles_read_localization(vbetool_t)
|
||||||
|
|
||||||
|
tunable_policy(`vbetool_mmap_zero_ignore',`
|
||||||
|
dontaudit vbetool_t self:memprotect mmap_zero;
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
hal_rw_pid_files(vbetool_t)
|
hal_rw_pid_files(vbetool_t)
|
||||||
hal_write_log(vbetool_t)
|
hal_write_log(vbetool_t)
|
||||||
|
@ -116,6 +116,10 @@ template(`wine_role_template',`
|
|||||||
dontaudit $1_wine_t self:memprotect mmap_zero;
|
dontaudit $1_wine_t self:memprotect mmap_zero;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
tunable_policy(`wine_mmap_zero_ignore',`
|
||||||
|
dontaudit $1_wine_t self:memprotect mmap_zero;
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
xserver_role($1_r, $1_wine_t)
|
xserver_role($1_r, $1_wine_t)
|
||||||
')
|
')
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
policy_module(wine, 1.7.1)
|
policy_module(wine, 1.7.2)
|
||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
@ -13,6 +13,13 @@ gen_tunable(wine_mmap_zero_ignore, false)
|
|||||||
# Declarations
|
# Declarations
|
||||||
#
|
#
|
||||||
|
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Ignore wine mmap_zero errors.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
|
gen_tunable(wine_mmap_zero_ignore, false)
|
||||||
|
|
||||||
type wine_t;
|
type wine_t;
|
||||||
type wine_exec_t;
|
type wine_exec_t;
|
||||||
application_domain(wine_t, wine_exec_t)
|
application_domain(wine_t, wine_exec_t)
|
||||||
@ -49,6 +56,10 @@ files_execmod_all_files(wine_t)
|
|||||||
|
|
||||||
userdom_use_user_terminals(wine_t)
|
userdom_use_user_terminals(wine_t)
|
||||||
|
|
||||||
|
tunable_policy(`wine_mmap_zero_ignore',`
|
||||||
|
dontaudit wine_t self:memprotect mmap_zero;
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
hal_dbus_chat(wine_t)
|
hal_dbus_chat(wine_t)
|
||||||
')
|
')
|
||||||
|
@ -1361,8 +1361,9 @@ interface(`domain_entry_file_spec_domtrans',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Ability to mmap a low area of the address space,
|
## Ability to mmap a low area of the address
|
||||||
## as configured by /proc/sys/kernel/mmap_min_addr.
|
## space conditionally, as configured by
|
||||||
|
## /proc/sys/kernel/mmap_min_addr.
|
||||||
## Preventing such mappings helps protect against
|
## Preventing such mappings helps protect against
|
||||||
## exploiting null deref bugs in the kernel.
|
## exploiting null deref bugs in the kernel.
|
||||||
## </summary>
|
## </summary>
|
||||||
@ -1372,12 +1373,41 @@ interface(`domain_entry_file_spec_domtrans',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`domain_mmap_low_type',`
|
interface(`domain_mmap_low',`
|
||||||
|
gen_require(`
|
||||||
|
attribute mmap_low_domain_type;
|
||||||
|
bool mmap_low_allowed;
|
||||||
|
')
|
||||||
|
|
||||||
|
typeattribute $1 mmap_low_domain_type;
|
||||||
|
|
||||||
|
if ( mmap_low_allowed ) {
|
||||||
|
allow $1 self:memprotect mmap_zero;
|
||||||
|
}
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Ability to mmap a low area of the address
|
||||||
|
## space unconditionally, as configured
|
||||||
|
## by /proc/sys/kernel/mmap_min_addr.
|
||||||
|
## Preventing such mappings helps protect against
|
||||||
|
## exploiting null deref bugs in the kernel.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`domain_mmap_low_uncond',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
attribute mmap_low_domain_type;
|
attribute mmap_low_domain_type;
|
||||||
')
|
')
|
||||||
|
|
||||||
typeattribute $1 mmap_low_domain_type;
|
typeattribute $1 mmap_low_domain_type;
|
||||||
|
|
||||||
|
allow $1 self:memprotect mmap_zero;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
policy_module(domain, 1.8.0)
|
policy_module(domain, 1.8.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -20,6 +20,14 @@ gen_tunable(allow_domain_fd_use, true)
|
|||||||
#
|
#
|
||||||
gen_tunable(domain_kernel_load_modules, false)
|
gen_tunable(domain_kernel_load_modules, false)
|
||||||
|
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Control the ability to mmap a low area of the address space,
|
||||||
|
## as configured by /proc/sys/kernel/mmap_min_addr.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
|
gen_tunable(mmap_low_allowed, false)
|
||||||
|
|
||||||
# Mark process types as domains
|
# Mark process types as domains
|
||||||
attribute domain;
|
attribute domain;
|
||||||
|
|
||||||
|
@ -716,6 +716,26 @@ interface(`kernel_rw_debugfs',`
|
|||||||
list_dirs_pattern($1, debugfs_t, debugfs_t)
|
list_dirs_pattern($1, debugfs_t, debugfs_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Manage information from the debugging filesystem.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`kernel_manage_debugfs',`
|
||||||
|
gen_require(`
|
||||||
|
type debugfs_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
manage_files_pattern($1, debugfs_t, debugfs_t)
|
||||||
|
read_lnk_files_pattern($1, debugfs_t, debugfs_t)
|
||||||
|
list_dirs_pattern($1, debugfs_t, debugfs_t)
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Mount a kernel VM filesystem.
|
## Mount a kernel VM filesystem.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
policy_module(xserver, 3.4.1)
|
policy_module(xserver, 3.4.2)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
class x_drawable all_x_drawable_perms;
|
class x_drawable all_x_drawable_perms;
|
||||||
@ -1031,6 +1031,7 @@ xserver_use_user_fonts(xserver_t)
|
|||||||
|
|
||||||
ifndef(`distro_redhat',`
|
ifndef(`distro_redhat',`
|
||||||
allow xserver_t self:process { execmem execheap execstack };
|
allow xserver_t self:process { execmem execheap execstack };
|
||||||
|
domain_mmap_low_uncond(xserver_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`distro_rhel4',`
|
ifdef(`distro_rhel4',`
|
||||||
|
@ -81,7 +81,7 @@ kernel_unmount_unlabeled(mount_t)
|
|||||||
kernel_read_system_state(mount_t)
|
kernel_read_system_state(mount_t)
|
||||||
kernel_read_network_state(mount_t)
|
kernel_read_network_state(mount_t)
|
||||||
kernel_read_kernel_sysctls(mount_t)
|
kernel_read_kernel_sysctls(mount_t)
|
||||||
kernel_rw_debugfs(mount_t)
|
kernel_manage_debugfs(mount_t)
|
||||||
kernel_setsched(mount_t)
|
kernel_setsched(mount_t)
|
||||||
kernel_use_fds(mount_t)
|
kernel_use_fds(mount_t)
|
||||||
kernel_request_load_module(mount_t)
|
kernel_request_load_module(mount_t)
|
||||||
|
@ -45,7 +45,7 @@ interface(`unconfined_domain_noaudit',`
|
|||||||
fs_unconfined($1)
|
fs_unconfined($1)
|
||||||
selinux_unconfined($1)
|
selinux_unconfined($1)
|
||||||
|
|
||||||
domain_mmap_low_type($1)
|
domain_mmap_low($1)
|
||||||
|
|
||||||
mls_file_read_all_levels($1)
|
mls_file_read_all_levels($1)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user