more testing fixes
This commit is contained in:
parent
5b4ff3a104
commit
d15dd5a739
@ -1798,6 +1798,27 @@ interface(`dev_rw_null',`
|
|||||||
allow $1 null_device_t:chr_file rw_file_perms;
|
allow $1 null_device_t:chr_file rw_file_perms;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create the null device (/dev/null).
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`dev_create_null_dev',`
|
||||||
|
gen_require(`
|
||||||
|
type device_t, null_device_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 device_t:dir add_entry_dir_perms;
|
||||||
|
allow $1 null_device_t:chr_file create;
|
||||||
|
|
||||||
|
allow $1 self:capability mknod;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Get the attributes of the printer device nodes.
|
## Get the attributes of the printer device nodes.
|
||||||
@ -2975,6 +2996,27 @@ interface(`dev_execmod_zero',`
|
|||||||
allow $1 zero_device_t:chr_file execmod;
|
allow $1 zero_device_t:chr_file execmod;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create the zero device (/dev/zero).
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`dev_create_zero_dev',`
|
||||||
|
gen_require(`
|
||||||
|
type device_t, zero_device_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 device_t:dir add_entry_dir_perms;
|
||||||
|
allow $1 zero_device_t:chr_file create;
|
||||||
|
|
||||||
|
allow $1 self:capability mknod;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Unconfined access to devices.
|
## Unconfined access to devices.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(devices,1.1.17)
|
policy_module(devices,1.1.18)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -254,6 +254,27 @@ interface(`term_setattr_console',`
|
|||||||
allow $1 console_device_t:chr_file setattr;
|
allow $1 console_device_t:chr_file setattr;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Create the console device (/dev/console).
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`term_create_console_dev',`
|
||||||
|
gen_require(`
|
||||||
|
type device_t, console_device_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 device_t:dir add_entry_dir_perms;
|
||||||
|
allow $1 console_device_t:chr_file create;
|
||||||
|
|
||||||
|
allow $1 self:capability mknod;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to get the
|
## Do not audit attempts to get the
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(terminal,1.1.3)
|
policy_module(terminal,1.1.4)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(rpc,1.2.10)
|
policy_module(rpc,1.2.11)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -37,8 +37,8 @@ files_mountpoint(var_lib_nfs_t)
|
|||||||
# RPC local policy
|
# RPC local policy
|
||||||
#
|
#
|
||||||
|
|
||||||
|
allow rpcd_t self:capability { chown dac_override setgid setuid };
|
||||||
allow rpcd_t self:fifo_file rw_file_perms;
|
allow rpcd_t self:fifo_file rw_file_perms;
|
||||||
allow rpcd_t self:file { getattr read };
|
|
||||||
|
|
||||||
allow rpcd_t rpcd_var_run_t:file manage_file_perms;
|
allow rpcd_t rpcd_var_run_t:file manage_file_perms;
|
||||||
allow rpcd_t rpcd_var_run_t:dir { rw_dir_perms setattr };
|
allow rpcd_t rpcd_var_run_t:dir { rw_dir_perms setattr };
|
||||||
@ -64,11 +64,6 @@ miscfiles_read_certs(rpcd_t)
|
|||||||
|
|
||||||
seutil_dontaudit_search_config(rpcd_t)
|
seutil_dontaudit_search_config(rpcd_t)
|
||||||
|
|
||||||
|
|
||||||
ifdef(`distro_redhat',`
|
|
||||||
allow rpcd_t self:capability { chown dac_override setgid setuid };
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
nis_read_ypserv_config(rpcd_t)
|
nis_read_ypserv_config(rpcd_t)
|
||||||
')
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(init,1.3.20)
|
policy_module(init,1.3.21)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
class passwd rootok;
|
class passwd rootok;
|
||||||
@ -173,6 +173,10 @@ seutil_read_config(init_t)
|
|||||||
|
|
||||||
miscfiles_read_localization(init_t)
|
miscfiles_read_localization(init_t)
|
||||||
|
|
||||||
|
ifdef(`distro_gentoo',`
|
||||||
|
allow init_t self:process { getcap setcap };
|
||||||
|
')
|
||||||
|
|
||||||
ifdef(`distro_redhat',`
|
ifdef(`distro_redhat',`
|
||||||
fs_rw_tmpfs_chr_files(init_t)
|
fs_rw_tmpfs_chr_files(init_t)
|
||||||
fs_tmpfs_filetrans(init_t,initctl_t,fifo_file)
|
fs_tmpfs_filetrans(init_t,initctl_t,fifo_file)
|
||||||
@ -397,6 +401,15 @@ ifdef(`distro_debian',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`distro_gentoo',`
|
ifdef(`distro_gentoo',`
|
||||||
|
kernel_dontaudit_getattr_core_if(initrc_t)
|
||||||
|
|
||||||
|
# seed udev /dev
|
||||||
|
allow initrc_t self:process setfscreate;
|
||||||
|
dev_create_null_dev(initrc_t)
|
||||||
|
dev_create_zero_dev(initrc_t)
|
||||||
|
dev_create_generic_dirs(initrc_t)
|
||||||
|
term_create_console_dev(initrc_t)
|
||||||
|
|
||||||
# needed until baselayout is fixed to have the
|
# needed until baselayout is fixed to have the
|
||||||
# restorecon on /dev to again be immediately after
|
# restorecon on /dev to again be immediately after
|
||||||
# mounting tmpfs on /dev
|
# mounting tmpfs on /dev
|
||||||
@ -487,7 +500,7 @@ ifdef(`targeted_policy',`
|
|||||||
mono_domtrans(initrc_t)
|
mono_domtrans(initrc_t)
|
||||||
')
|
')
|
||||||
',`
|
',`
|
||||||
# cjp: require doesnt work in optionals :\
|
# cjp: require doesnt work in the else of optionals :\
|
||||||
# this also would result in a type transition
|
# this also would result in a type transition
|
||||||
# conflict if sendmail is enabled
|
# conflict if sendmail is enabled
|
||||||
# optional_policy(`',`
|
# optional_policy(`',`
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(modutils,1.1.4)
|
policy_module(modutils,1.1.5)
|
||||||
|
|
||||||
gen_require(`
|
gen_require(`
|
||||||
bool secure_mode_insmod;
|
bool secure_mode_insmod;
|
||||||
@ -275,6 +275,14 @@ miscfiles_read_localization(update_modules_t)
|
|||||||
|
|
||||||
userdom_dontaudit_search_sysadm_home_dirs(update_modules_t)
|
userdom_dontaudit_search_sysadm_home_dirs(update_modules_t)
|
||||||
|
|
||||||
|
ifdef(`distro_gentoo',`
|
||||||
|
files_search_pids(update_modules_t)
|
||||||
|
|
||||||
|
optional_policy(`
|
||||||
|
consoletype_exec(update_modules_t)
|
||||||
|
')
|
||||||
|
')
|
||||||
|
|
||||||
ifdef(`targeted_policy',`
|
ifdef(`targeted_policy',`
|
||||||
term_use_generic_ptys(update_modules_t)
|
term_use_generic_ptys(update_modules_t)
|
||||||
term_use_unallocated_ttys(update_modules_t)
|
term_use_unallocated_ttys(update_modules_t)
|
||||||
|
Loading…
Reference in New Issue
Block a user