mirror of
https://github.com/SELinuxProject/refpolicy
synced 2025-03-31 15:56:35 +00:00
enhanced setransd support from darrel goeddel
This commit is contained in:
parent
248cccf7ce
commit
a8671ae5b2
@ -1,3 +1,5 @@
|
|||||||
|
- Enhanced setransd support from Darrel Goeddel.
|
||||||
|
|
||||||
* Wed Oct 18 2006 Chris PeBenito <selinux@tresys.com> - 20061018
|
* Wed Oct 18 2006 Chris PeBenito <selinux@tresys.com> - 20061018
|
||||||
- Patch from Russell Coker Thu, 5 Oct 2006
|
- Patch from Russell Coker Thu, 5 Oct 2006
|
||||||
- Move range transitions to modules.
|
- Move range transitions to modules.
|
||||||
|
@ -253,6 +253,7 @@ class process
|
|||||||
execstack
|
execstack
|
||||||
execheap
|
execheap
|
||||||
setkeycreate
|
setkeycreate
|
||||||
|
setsockcreate
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -630,3 +631,8 @@ class key
|
|||||||
setattr
|
setattr
|
||||||
create
|
create
|
||||||
}
|
}
|
||||||
|
|
||||||
|
class context
|
||||||
|
{
|
||||||
|
translate
|
||||||
|
}
|
||||||
|
@ -93,4 +93,6 @@ class packet
|
|||||||
# Kernel access key retention
|
# Kernel access key retention
|
||||||
class key
|
class key
|
||||||
|
|
||||||
|
class context # userspace
|
||||||
|
|
||||||
# FLASK
|
# FLASK
|
||||||
|
@ -587,4 +587,13 @@ mlsconstrain association { polmatch }
|
|||||||
((( l1 dom l2 ) and ( h1 domby h2 )) or
|
((( l1 dom l2 ) and ( h1 domby h2 )) or
|
||||||
( t2 == unlabeled_t ));
|
( t2 == unlabeled_t ));
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# MLS policy for the context class
|
||||||
|
#
|
||||||
|
|
||||||
|
mlsconstrain context translate
|
||||||
|
(( h1 dom h2 ) or ( t1 == mlstranslate ));
|
||||||
|
|
||||||
') dnl end enable_mls
|
') dnl end enable_mls
|
||||||
|
@ -451,3 +451,22 @@ interface(`mls_fd_share_all_levels',`
|
|||||||
|
|
||||||
typeattribute $1 mlsfdshare;
|
typeattribute $1 mlsfdshare;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Make specified domain MLS trusted
|
||||||
|
## for translating contexts at all levels.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## <summary>
|
||||||
|
## Domain allowed access.
|
||||||
|
## </summary>
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`mls_context_translate_all_levels',`
|
||||||
|
gen_require(`
|
||||||
|
attribute mlstranslate;
|
||||||
|
')
|
||||||
|
|
||||||
|
typeattribute $1 mlstranslate;
|
||||||
|
')
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(mls,1.4.0)
|
policy_module(mls,1.4.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -49,3 +49,5 @@ attribute mlsrangetrans;
|
|||||||
|
|
||||||
attribute mlsfduse;
|
attribute mlsfduse;
|
||||||
attribute mlsfdshare;
|
attribute mlsfdshare;
|
||||||
|
|
||||||
|
attribute mlstranslate;
|
||||||
|
@ -7,10 +7,11 @@
|
|||||||
/etc/selinux/([^/]*/)?contexts(/.*)? gen_context(system_u:object_r:default_context_t,s0)
|
/etc/selinux/([^/]*/)?contexts(/.*)? gen_context(system_u:object_r:default_context_t,s0)
|
||||||
/etc/selinux/([^/]*/)?contexts/files(/.*)? gen_context(system_u:object_r:file_context_t,s0)
|
/etc/selinux/([^/]*/)?contexts/files(/.*)? gen_context(system_u:object_r:file_context_t,s0)
|
||||||
/etc/selinux/([^/]*/)?policy(/.*)? gen_context(system_u:object_r:policy_config_t,mls_systemhigh)
|
/etc/selinux/([^/]*/)?policy(/.*)? gen_context(system_u:object_r:policy_config_t,mls_systemhigh)
|
||||||
|
/etc/selinux/([^/]*/)?setrans\.conf -- gen_context(system_u:object_r:selinux_config_t,mls_systemhigh)
|
||||||
/etc/selinux/([^/]*/)?seusers -- gen_context(system_u:object_r:selinux_config_t,mls_systemhigh)
|
/etc/selinux/([^/]*/)?seusers -- gen_context(system_u:object_r:selinux_config_t,mls_systemhigh)
|
||||||
/etc/selinux/([^/]*/)?modules/(active|tmp|previous)(/.*)? gen_context(system_u:object_r:semanage_store_t,s0)
|
/etc/selinux/([^/]*/)?modules/(active|tmp|previous)(/.*)? gen_context(system_u:object_r:semanage_store_t,s0)
|
||||||
/etc/selinux/([^/]*/)?modules/semanage\.read\.LOCK -- gen_context(system_u:object_r:semanage_read_lock_t,s0)
|
/etc/selinux/([^/]*/)?modules/semanage\.read\.LOCK -- gen_context(system_u:object_r:semanage_read_lock_t,s0)
|
||||||
/etc/selinux/([^/]*/)?modules/semanage\.trans\.LOCK -- gen_context(system_u:object_r:semanage_trans_lock_t,s0)
|
/etc/selinux/([^/]*/)?modules/semanage\.trans\.LOCK -- gen_context(system_u:object_r:semanage_trans_lock_t,s0)
|
||||||
/etc/selinux/([^/]*/)?users(/.*)? -- gen_context(system_u:object_r:selinux_config_t,mls_systemhigh)
|
/etc/selinux/([^/]*/)?users(/.*)? -- gen_context(system_u:object_r:selinux_config_t,mls_systemhigh)
|
||||||
|
|
||||||
#
|
#
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(selinuxutil,1.3.0)
|
policy_module(selinuxutil,1.3.1)
|
||||||
|
|
||||||
ifdef(`strict_policy',`
|
ifdef(`strict_policy',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
|
@ -17,6 +17,7 @@ interface(`setrans_translate_context',`
|
|||||||
|
|
||||||
allow $1 self:unix_stream_socket create_stream_socket_perms;
|
allow $1 self:unix_stream_socket create_stream_socket_perms;
|
||||||
|
|
||||||
|
allow $1 setrans_t:context translate;
|
||||||
allow $1 setrans_t:unix_stream_socket connectto;
|
allow $1 setrans_t:unix_stream_socket connectto;
|
||||||
allow $1 setrans_var_run_t:unix_stream_socket rw_socket_perms;
|
allow $1 setrans_var_run_t:unix_stream_socket rw_socket_perms;
|
||||||
allow $1 setrans_var_run_t:sock_file rw_file_perms;
|
allow $1 setrans_var_run_t:sock_file rw_file_perms;
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(setrans,1.1.0)
|
policy_module(setrans,1.1.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -57,6 +57,7 @@ mls_file_read_up(setrans_t)
|
|||||||
mls_file_write_down(setrans_t)
|
mls_file_write_down(setrans_t)
|
||||||
mls_net_receive_all_levels(setrans_t)
|
mls_net_receive_all_levels(setrans_t)
|
||||||
mls_rangetrans_target(setrans_t)
|
mls_rangetrans_target(setrans_t)
|
||||||
|
mls_socket_write_all_levels(setrans_t)
|
||||||
|
|
||||||
selinux_compute_access_vector(setrans_t)
|
selinux_compute_access_vector(setrans_t)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user