more testing fixes
This commit is contained in:
parent
5b4ff3a104
commit
d15dd5a739
@ -1798,6 +1798,27 @@ interface(`dev_rw_null',`
|
||||
allow $1 null_device_t:chr_file rw_file_perms;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Create the null device (/dev/null).
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`dev_create_null_dev',`
|
||||
gen_require(`
|
||||
type device_t, null_device_t;
|
||||
')
|
||||
|
||||
allow $1 device_t:dir add_entry_dir_perms;
|
||||
allow $1 null_device_t:chr_file create;
|
||||
|
||||
allow $1 self:capability mknod;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Get the attributes of the printer device nodes.
|
||||
@ -2975,6 +2996,27 @@ interface(`dev_execmod_zero',`
|
||||
allow $1 zero_device_t:chr_file execmod;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Create the zero device (/dev/zero).
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`dev_create_zero_dev',`
|
||||
gen_require(`
|
||||
type device_t, zero_device_t;
|
||||
')
|
||||
|
||||
allow $1 device_t:dir add_entry_dir_perms;
|
||||
allow $1 zero_device_t:chr_file create;
|
||||
|
||||
allow $1 self:capability mknod;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Unconfined access to devices.
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(devices,1.1.17)
|
||||
policy_module(devices,1.1.18)
|
||||
|
||||
########################################
|
||||
#
|
||||
|
@ -254,6 +254,27 @@ interface(`term_setattr_console',`
|
||||
allow $1 console_device_t:chr_file setattr;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Create the console device (/dev/console).
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`term_create_console_dev',`
|
||||
gen_require(`
|
||||
type device_t, console_device_t;
|
||||
')
|
||||
|
||||
allow $1 device_t:dir add_entry_dir_perms;
|
||||
allow $1 console_device_t:chr_file create;
|
||||
|
||||
allow $1 self:capability mknod;
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Do not audit attempts to get the
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(terminal,1.1.3)
|
||||
policy_module(terminal,1.1.4)
|
||||
|
||||
########################################
|
||||
#
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(rpc,1.2.10)
|
||||
policy_module(rpc,1.2.11)
|
||||
|
||||
########################################
|
||||
#
|
||||
@ -37,8 +37,8 @@ files_mountpoint(var_lib_nfs_t)
|
||||
# RPC local policy
|
||||
#
|
||||
|
||||
allow rpcd_t self:capability { chown dac_override setgid setuid };
|
||||
allow rpcd_t self:fifo_file rw_file_perms;
|
||||
allow rpcd_t self:file { getattr read };
|
||||
|
||||
allow rpcd_t rpcd_var_run_t:file manage_file_perms;
|
||||
allow rpcd_t rpcd_var_run_t:dir { rw_dir_perms setattr };
|
||||
@ -64,11 +64,6 @@ miscfiles_read_certs(rpcd_t)
|
||||
|
||||
seutil_dontaudit_search_config(rpcd_t)
|
||||
|
||||
|
||||
ifdef(`distro_redhat',`
|
||||
allow rpcd_t self:capability { chown dac_override setgid setuid };
|
||||
')
|
||||
|
||||
optional_policy(`
|
||||
nis_read_ypserv_config(rpcd_t)
|
||||
')
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(init,1.3.20)
|
||||
policy_module(init,1.3.21)
|
||||
|
||||
gen_require(`
|
||||
class passwd rootok;
|
||||
@ -173,6 +173,10 @@ seutil_read_config(init_t)
|
||||
|
||||
miscfiles_read_localization(init_t)
|
||||
|
||||
ifdef(`distro_gentoo',`
|
||||
allow init_t self:process { getcap setcap };
|
||||
')
|
||||
|
||||
ifdef(`distro_redhat',`
|
||||
fs_rw_tmpfs_chr_files(init_t)
|
||||
fs_tmpfs_filetrans(init_t,initctl_t,fifo_file)
|
||||
@ -397,6 +401,15 @@ ifdef(`distro_debian',`
|
||||
')
|
||||
|
||||
ifdef(`distro_gentoo',`
|
||||
kernel_dontaudit_getattr_core_if(initrc_t)
|
||||
|
||||
# seed udev /dev
|
||||
allow initrc_t self:process setfscreate;
|
||||
dev_create_null_dev(initrc_t)
|
||||
dev_create_zero_dev(initrc_t)
|
||||
dev_create_generic_dirs(initrc_t)
|
||||
term_create_console_dev(initrc_t)
|
||||
|
||||
# needed until baselayout is fixed to have the
|
||||
# restorecon on /dev to again be immediately after
|
||||
# mounting tmpfs on /dev
|
||||
@ -487,7 +500,7 @@ ifdef(`targeted_policy',`
|
||||
mono_domtrans(initrc_t)
|
||||
')
|
||||
',`
|
||||
# cjp: require doesnt work in optionals :\
|
||||
# cjp: require doesnt work in the else of optionals :\
|
||||
# this also would result in a type transition
|
||||
# conflict if sendmail is enabled
|
||||
# optional_policy(`',`
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
policy_module(modutils,1.1.4)
|
||||
policy_module(modutils,1.1.5)
|
||||
|
||||
gen_require(`
|
||||
bool secure_mode_insmod;
|
||||
@ -275,6 +275,14 @@ miscfiles_read_localization(update_modules_t)
|
||||
|
||||
userdom_dontaudit_search_sysadm_home_dirs(update_modules_t)
|
||||
|
||||
ifdef(`distro_gentoo',`
|
||||
files_search_pids(update_modules_t)
|
||||
|
||||
optional_policy(`
|
||||
consoletype_exec(update_modules_t)
|
||||
')
|
||||
')
|
||||
|
||||
ifdef(`targeted_policy',`
|
||||
term_use_generic_ptys(update_modules_t)
|
||||
term_use_unallocated_ttys(update_modules_t)
|
||||
|
Loading…
Reference in New Issue
Block a user