first part of dans patch Fri, 14 Apr 2006 08:08:43 -0400
This commit is contained in:
parent
2ba3de9690
commit
cdc86ee57f
@ -278,6 +278,13 @@ gen_tunable(run_ssh_inetd,false)
|
|||||||
## </desc>
|
## </desc>
|
||||||
gen_tunable(samba_enable_home_dirs,false)
|
gen_tunable(samba_enable_home_dirs,false)
|
||||||
|
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow samba to export NFS volumes.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
|
gen_tunable(samba_share_nfs,false)
|
||||||
|
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Allow spamassassin to do DNS lookups
|
## Allow spamassassin to do DNS lookups
|
||||||
|
@ -134,14 +134,18 @@ level s0:c0.c255;
|
|||||||
# the high range of the file. We use the high range of the process so
|
# the high range of the file. We use the high range of the process so
|
||||||
# that processes can always simply run at s0.
|
# that processes can always simply run at s0.
|
||||||
#
|
#
|
||||||
# Only files are constrained by MCS at this stage.
|
# Note that getattr on files is always permitted.
|
||||||
#
|
#
|
||||||
mlsconstrain file { write setattr append unlink link rename ioctl lock execute relabelfrom }
|
mlsconstrain file { write setattr append unlink link rename ioctl lock execute relabelfrom }
|
||||||
( h1 dom h2 );
|
( h1 dom h2 );
|
||||||
|
|
||||||
|
# New filesystem object labels must be dominated by the relabeling subject
|
||||||
|
# clearance, also the objects are single-level.
|
||||||
mlsconstrain file { create relabelto }
|
mlsconstrain file { create relabelto }
|
||||||
(( h1 dom h2 ) and ( l2 eq h2 ));
|
(( h1 dom h2 ) and ( l2 eq h2 ));
|
||||||
|
|
||||||
|
# At this time we do not restrict "ps" type operations via MCS. This
|
||||||
|
# will probably change in future.
|
||||||
mlsconstrain file { read }
|
mlsconstrain file { read }
|
||||||
(( h1 dom h2 ) or ( t2 == domain ) or ( t1 == mlsfileread ));
|
(( h1 dom h2 ) or ( t2 == domain ) or ( t1 == mlsfileread ));
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(amanda,1.3.0)
|
policy_module(amanda,1.3.1)
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
#
|
#
|
||||||
@ -8,7 +8,7 @@ policy_module(amanda,1.3.0)
|
|||||||
|
|
||||||
type amanda_t;
|
type amanda_t;
|
||||||
type amanda_inetd_exec_t;
|
type amanda_inetd_exec_t;
|
||||||
inetd_udp_service_domain(amanda_t,amanda_inetd_exec_t)
|
inetd_service_domain(amanda_t,amanda_inetd_exec_t)
|
||||||
role system_r types amanda_t;
|
role system_r types amanda_t;
|
||||||
|
|
||||||
type amanda_exec_t;
|
type amanda_exec_t;
|
||||||
@ -189,7 +189,7 @@ optional_policy(`
|
|||||||
#
|
#
|
||||||
# Amanda recover local policy
|
# Amanda recover local policy
|
||||||
|
|
||||||
allow amanda_recover_t self:capability { fowner fsetid kill setgid setuid chown dac_override net_bind_service };
|
allow amanda_recover_t self:capability { fowner fsetid kill setgid setuid chown dac_override };
|
||||||
allow amanda_recover_t self:process { sigkill sigstop signal };
|
allow amanda_recover_t self:process { sigkill sigstop signal };
|
||||||
allow amanda_recover_t self:fifo_file { getattr ioctl read write };
|
allow amanda_recover_t self:fifo_file { getattr ioctl read write };
|
||||||
allow amanda_recover_t self:unix_stream_socket { connect create read write };
|
allow amanda_recover_t self:unix_stream_socket { connect create read write };
|
||||||
@ -229,6 +229,7 @@ corenet_udp_sendrecv_all_ports(amanda_recover_t)
|
|||||||
corenet_non_ipsec_sendrecv(amanda_recover_t)
|
corenet_non_ipsec_sendrecv(amanda_recover_t)
|
||||||
corenet_tcp_bind_all_nodes(amanda_recover_t)
|
corenet_tcp_bind_all_nodes(amanda_recover_t)
|
||||||
corenet_udp_bind_all_nodes(amanda_recover_t)
|
corenet_udp_bind_all_nodes(amanda_recover_t)
|
||||||
|
corenet_tcp_bind_reserved_port(amanda_recover_t)
|
||||||
corenet_tcp_connect_amanda_port(amanda_recover_t)
|
corenet_tcp_connect_amanda_port(amanda_recover_t)
|
||||||
|
|
||||||
corecmd_exec_shell(amanda_recover_t)
|
corecmd_exec_shell(amanda_recover_t)
|
||||||
@ -261,3 +262,7 @@ optional_policy(`
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
nis_use_ypbind(amanda_recover_t)
|
nis_use_ypbind(amanda_recover_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
nscd_socket_use(amanda_recover_t)
|
||||||
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(bootloader,1.2.1)
|
policy_module(bootloader,1.2.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -88,6 +88,8 @@ dev_read_raw_memory(bootloader_t)
|
|||||||
fs_getattr_xattr_fs(bootloader_t)
|
fs_getattr_xattr_fs(bootloader_t)
|
||||||
fs_read_tmpfs_symlinks(bootloader_t)
|
fs_read_tmpfs_symlinks(bootloader_t)
|
||||||
|
|
||||||
|
mls_file_read_up(bootloader_t)
|
||||||
|
|
||||||
term_getattr_all_user_ttys(bootloader_t)
|
term_getattr_all_user_ttys(bootloader_t)
|
||||||
term_dontaudit_manage_pty_dirs(bootloader_t)
|
term_dontaudit_manage_pty_dirs(bootloader_t)
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(usermanage,1.3.2)
|
policy_module(usermanage,1.3.3)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -514,6 +514,7 @@ userdom_dontaudit_search_sysadm_home_dirs(useradd_t)
|
|||||||
# Add/remove user home directories
|
# Add/remove user home directories
|
||||||
userdom_home_filetrans_generic_user_home_dir(useradd_t)
|
userdom_home_filetrans_generic_user_home_dir(useradd_t)
|
||||||
userdom_manage_generic_user_home_content_dirs(useradd_t)
|
userdom_manage_generic_user_home_content_dirs(useradd_t)
|
||||||
|
userdom_manage_staff_home_dirs(useradd_t)
|
||||||
userdom_generic_user_home_dir_filetrans_generic_user_home_content(useradd_t,notdevfile_class_set)
|
userdom_generic_user_home_dir_filetrans_generic_user_home_content(useradd_t,notdevfile_class_set)
|
||||||
|
|
||||||
mta_manage_spool(useradd_t)
|
mta_manage_spool(useradd_t)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(java,1.1.1)
|
policy_module(java,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -7,10 +7,8 @@ policy_module(java,1.1.1)
|
|||||||
#
|
#
|
||||||
|
|
||||||
type java_t;
|
type java_t;
|
||||||
domain_type(java_t)
|
|
||||||
|
|
||||||
type java_exec_t;
|
type java_exec_t;
|
||||||
files_type(java_exec_t)
|
init_system_domain(java_t,java_exec_t)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(mono,1.1.1)
|
policy_module(mono,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -22,6 +22,8 @@ ifdef(`targeted_policy',`
|
|||||||
unconfined_domain_noaudit(mono_t)
|
unconfined_domain_noaudit(mono_t)
|
||||||
role system_r types mono_t;
|
role system_r types mono_t;
|
||||||
|
|
||||||
|
init_dbus_chat_script(mono_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
avahi_dbus_chat(mono_t)
|
avahi_dbus_chat(mono_t)
|
||||||
')
|
')
|
||||||
@ -29,4 +31,8 @@ ifdef(`targeted_policy',`
|
|||||||
optional_policy(`
|
optional_policy(`
|
||||||
hal_dbus_chat(mono_t)
|
hal_dbus_chat(mono_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
networkmanager_dbus_chat(mono_t)
|
||||||
|
')
|
||||||
')
|
')
|
||||||
|
@ -2701,7 +2701,7 @@ interface(`dev_rw_xen',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
allow $1 device_t:dir r_dir_perms;
|
allow $1 device_t:dir r_dir_perms;
|
||||||
allow $1 xen_device_t:chr_file r_file_perms;
|
allow $1 xen_device_t:chr_file rw_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -2720,7 +2720,7 @@ interface(`dev_manage_xen',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
allow $1 device_t:dir r_dir_perms;
|
allow $1 device_t:dir r_dir_perms;
|
||||||
allow $1 xen_device_t:chr_file r_file_perms;
|
allow $1 xen_device_t:chr_file manage_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(devices,1.1.10)
|
policy_module(devices,1.1.11)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -946,6 +946,24 @@ interface(`files_mounton_all_mountpoints',`
|
|||||||
allow $1 mountpoint:file { getattr mounton };
|
allow $1 mountpoint:file { getattr mounton };
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Get the attributes of all mount points.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`files_getattr_all_mountpoints',`
|
||||||
|
gen_require(`
|
||||||
|
attribute mountpoint;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 mountpoint:dir getattr;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# files_list_root(domain)
|
# files_list_root(domain)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(files,1.2.6)
|
policy_module(files,1.2.7)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1150,6 +1150,9 @@ interface(`kernel_rw_vm_sysctls',`
|
|||||||
allow $1 sysctl_t:dir r_dir_perms;
|
allow $1 sysctl_t:dir r_dir_perms;
|
||||||
allow $1 sysctl_vm_t:dir list_dir_perms;
|
allow $1 sysctl_vm_t:dir list_dir_perms;
|
||||||
allow $1 sysctl_vm_t:file rw_file_perms;
|
allow $1 sysctl_vm_t:file rw_file_perms;
|
||||||
|
|
||||||
|
# hal needs this
|
||||||
|
allow $1 sysctl_vm_t:dir write;
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(kernel,1.3.4)
|
policy_module(kernel,1.3.5)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -32,6 +32,10 @@ type unconfined_t;
|
|||||||
type xdm_exec_t;
|
type xdm_exec_t;
|
||||||
|
|
||||||
ifdef(`enable_mcs',`
|
ifdef(`enable_mcs',`
|
||||||
|
# The eventual plan is to have a range_transition to s0 for the daemon by
|
||||||
|
# default and have the daemons which need to run with all categories be
|
||||||
|
# exceptions. But while range_transitions have to be in the base module
|
||||||
|
# this is not possible.
|
||||||
range_transition getty_t login_exec_t s0 - s0:c0.c255;
|
range_transition getty_t login_exec_t s0 - s0:c0.c255;
|
||||||
range_transition init_t xdm_exec_t s0 - s0:c0.c255;
|
range_transition init_t xdm_exec_t s0 - s0:c0.c255;
|
||||||
range_transition initrc_t crond_exec_t s0 - s0:c0.c255;
|
range_transition initrc_t crond_exec_t s0 - s0:c0.c255;
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(avahi,1.2.0)
|
policy_module(avahi,1.2.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -92,6 +92,7 @@ optional_policy(`
|
|||||||
dbus_system_bus_client_template(avahi,avahi_t)
|
dbus_system_bus_client_template(avahi,avahi_t)
|
||||||
dbus_connect_system_bus(avahi_t)
|
dbus_connect_system_bus(avahi_t)
|
||||||
dbus_send_system_bus(avahi_t)
|
dbus_send_system_bus(avahi_t)
|
||||||
|
init_dbus_chat_script(avahi_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(hal,1.3.4)
|
policy_module(hal,1.3.5)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -103,6 +103,7 @@ files_getattr_default_dirs(hald_t)
|
|||||||
fs_getattr_all_fs(hald_t)
|
fs_getattr_all_fs(hald_t)
|
||||||
fs_search_all(hald_t)
|
fs_search_all(hald_t)
|
||||||
fs_list_auto_mountpoints(hald_t)
|
fs_list_auto_mountpoints(hald_t)
|
||||||
|
files_getattr_all_mountpoints(hald_t)
|
||||||
|
|
||||||
mls_file_read_up(hald_t)
|
mls_file_read_up(hald_t)
|
||||||
|
|
||||||
|
@ -198,6 +198,45 @@ interface(`mailman_search_data',`
|
|||||||
allow $1 mailman_data_t:dir search_dir_perms;
|
allow $1 mailman_data_t:dir search_dir_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
#######################################
|
||||||
|
## <summary>
|
||||||
|
## Allow domain to to read mailman data files.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`mailman_read_data_files',`
|
||||||
|
gen_require(`
|
||||||
|
type mailman_data_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 mailman_data_t:dir search_dir_perms;
|
||||||
|
allow $1 mailman_data_t:file read_file_perms;
|
||||||
|
')
|
||||||
|
|
||||||
|
#######################################
|
||||||
|
## <summary>
|
||||||
|
## Allow domain to to create mailman data files
|
||||||
|
## and write the directory.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`mailman_manage_data_files',`
|
||||||
|
gen_require(`
|
||||||
|
type mailman_data_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 mailman_data_t:dir rw_dir_perms;
|
||||||
|
allow $1 mailman_data_t:file manage_file_perms;
|
||||||
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## List the contents of mailman data directories.
|
## List the contents of mailman data directories.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(mailman,1.1.1)
|
policy_module(mailman,1.1.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(postfix,1.2.1)
|
policy_module(postfix,1.2.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -174,6 +174,11 @@ sysnet_read_config(postfix_master_t)
|
|||||||
mta_rw_aliases(postfix_master_t)
|
mta_rw_aliases(postfix_master_t)
|
||||||
mta_read_sendmail_bin(postfix_master_t)
|
mta_read_sendmail_bin(postfix_master_t)
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
# for postalias
|
||||||
|
mailman_manage_data_files(postfix_master_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
mount_send_nfs_client_request(postfix_master_t)
|
mount_send_nfs_client_request(postfix_master_t)
|
||||||
')
|
')
|
||||||
@ -280,6 +285,11 @@ mta_delete_spool(postfix_local_t)
|
|||||||
# For reading spamassasin
|
# For reading spamassasin
|
||||||
mta_read_config(postfix_local_t)
|
mta_read_config(postfix_local_t)
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
# for postalias
|
||||||
|
mailman_read_data_files(postfix_local_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
procmail_domtrans(postfix_local_t)
|
procmail_domtrans(postfix_local_t)
|
||||||
')
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(rpc,1.2.1)
|
policy_module(rpc,1.2.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -110,13 +110,13 @@ portmap_tcp_connect(nfsd_t)
|
|||||||
portmap_udp_chat(nfsd_t)
|
portmap_udp_chat(nfsd_t)
|
||||||
|
|
||||||
tunable_policy(`nfs_export_all_rw',`
|
tunable_policy(`nfs_export_all_rw',`
|
||||||
auth_read_all_dirs_except_shadow(nfsd_t)
|
|
||||||
fs_read_noxattr_fs_files(nfsd_t)
|
fs_read_noxattr_fs_files(nfsd_t)
|
||||||
|
auth_manage_all_files_except_shadow(nfsd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`nfs_export_all_ro',`
|
tunable_policy(`nfs_export_all_ro',`
|
||||||
auth_read_all_dirs_except_shadow(nfsd_t)
|
|
||||||
fs_read_noxattr_fs_files(nfsd_t)
|
fs_read_noxattr_fs_files(nfsd_t)
|
||||||
|
auth_read_all_files_except_shadow(nfsd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -33,6 +33,7 @@ template(`samba_per_userdomain_template',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
tunable_policy(`samba_enable_home_dirs',`
|
tunable_policy(`samba_enable_home_dirs',`
|
||||||
|
userdom_manage_user_home_content_dirs($1,smbd_t)
|
||||||
userdom_manage_user_home_content_files($1,smbd_t)
|
userdom_manage_user_home_content_files($1,smbd_t)
|
||||||
userdom_manage_user_home_content_symlinks($1,smbd_t)
|
userdom_manage_user_home_content_symlinks($1,smbd_t)
|
||||||
userdom_manage_user_home_content_sockets($1,smbd_t)
|
userdom_manage_user_home_content_sockets($1,smbd_t)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(samba,1.2.3)
|
policy_module(samba,1.2.4)
|
||||||
|
|
||||||
#################################
|
#################################
|
||||||
#
|
#
|
||||||
@ -296,6 +296,12 @@ tunable_policy(`allow_smbd_anon_write',`
|
|||||||
miscfiles_manage_public_files(smbd_t)
|
miscfiles_manage_public_files(smbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
# Support Samba sharing of NFS mount points
|
||||||
|
tunable_policy(`samba_share_nfs',`
|
||||||
|
fs_manage_nfs_dirs(smbd_t)
|
||||||
|
fs_manage_nfs_files(smbd_t)
|
||||||
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
cups_read_rw_config(smbd_t)
|
cups_read_rw_config(smbd_t)
|
||||||
')
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(unconfined,1.3.5)
|
policy_module(unconfined,1.3.6)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -62,6 +62,8 @@ ifdef(`targeted_policy',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
init_dbus_chat_script(unconfined_t)
|
||||||
|
|
||||||
dbus_stub(unconfined_t)
|
dbus_stub(unconfined_t)
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
|
@ -3400,6 +3400,35 @@ interface(`userdom_dontaudit_search_staff_home_dirs',`
|
|||||||
dontaudit $1 staff_home_dir_t:dir search;
|
dontaudit $1 staff_home_dir_t:dir search;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create, read, write, and delete staff
|
||||||
|
## home directories.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`userdom_manage_staff_home_dirs',`
|
||||||
|
ifdef(`targeted_policy',`
|
||||||
|
gen_require(`
|
||||||
|
type user_home_dir_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_home($1)
|
||||||
|
allow $1 user_home_dir_t:dir manage_dir_perms;
|
||||||
|
',`
|
||||||
|
gen_require(`
|
||||||
|
type staff_home_dir_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_home($1)
|
||||||
|
allow $1 staff_home_dir_t:dir manage_dir_perms;
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to append to the staff
|
## Do not audit attempts to append to the staff
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(userdomain,1.3.14)
|
policy_module(userdomain,1.3.15)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
role sysadm_r, staff_r, user_r;
|
role sysadm_r, staff_r, user_r;
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(xen,1.0.0)
|
policy_module(xen,1.0.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -19,6 +19,8 @@ init_daemon_domain(xend_t, xend_exec_t)
|
|||||||
# var/lib files
|
# var/lib files
|
||||||
type xend_var_lib_t;
|
type xend_var_lib_t;
|
||||||
files_type(xend_var_lib_t)
|
files_type(xend_var_lib_t)
|
||||||
|
# for mounting an NFS store
|
||||||
|
files_mountpoint(xend_var_lib_t)
|
||||||
|
|
||||||
# log files
|
# log files
|
||||||
type xend_var_log_t;
|
type xend_var_log_t;
|
||||||
@ -122,6 +124,7 @@ domain_read_all_domains_state(xend_t)
|
|||||||
domain_dontaudit_read_all_domains_state(xend_t)
|
domain_dontaudit_read_all_domains_state(xend_t)
|
||||||
|
|
||||||
files_read_etc_files(xend_t)
|
files_read_etc_files(xend_t)
|
||||||
|
files_read_kernel_symbol_table(xend_t)
|
||||||
|
|
||||||
storage_raw_read_fixed_disk(xend_t)
|
storage_raw_read_fixed_disk(xend_t)
|
||||||
|
|
||||||
@ -208,6 +211,7 @@ kernel_read_xen_state(xenstored_t)
|
|||||||
dev_create_generic_dirs(xenstored_t)
|
dev_create_generic_dirs(xenstored_t)
|
||||||
dev_manage_xen(xenconsoled_t)
|
dev_manage_xen(xenconsoled_t)
|
||||||
dev_filetrans_xen(xenstored_t)
|
dev_filetrans_xen(xenstored_t)
|
||||||
|
dev_rw_xen(xenstored_t)
|
||||||
|
|
||||||
term_dontaudit_use_generic_ptys(xenstored_t)
|
term_dontaudit_use_generic_ptys(xenstored_t)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user