kismet patch from dan.
This commit is contained in:
parent
aaff2fcfcd
commit
a9e9678fc7
|
@ -16,6 +16,7 @@ interface(`kismet_domtrans',`
|
|||
')
|
||||
|
||||
domtrans_pattern($1, kismet_exec_t, kismet_t)
|
||||
allow kismet_t $1:process signull;
|
||||
')
|
||||
|
||||
########################################
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
|
||||
policy_module(kismet, 1.3.0)
|
||||
policy_module(kismet, 1.3.1)
|
||||
|
||||
########################################
|
||||
#
|
||||
|
@ -17,6 +17,9 @@ logging_log_file(kismet_log_t)
|
|||
type kismet_tmp_t;
|
||||
files_tmp_file(kismet_tmp_t)
|
||||
|
||||
type kismet_tmpfs_t;
|
||||
files_tmp_file(kismet_tmpfs_t)
|
||||
|
||||
type kismet_var_lib_t;
|
||||
files_type(kismet_var_lib_t)
|
||||
|
||||
|
@ -44,6 +47,10 @@ manage_dirs_pattern(kismet_t, kismet_tmp_t, kismet_tmp_t)
|
|||
manage_files_pattern(kismet_t, kismet_tmp_t, kismet_tmp_t)
|
||||
files_tmp_filetrans(kismet_t, kismet_tmp_t, { file dir })
|
||||
|
||||
manage_dirs_pattern(kismet_t, kismet_tmpfs_t, kismet_tmpfs_t)
|
||||
manage_files_pattern(kismet_t, kismet_tmpfs_t, kismet_tmpfs_t)
|
||||
fs_tmpfs_filetrans(kismet_t, kismet_tmpfs_t, { dir file })
|
||||
|
||||
allow kismet_t kismet_var_lib_t:file manage_file_perms;
|
||||
allow kismet_t kismet_var_lib_t:dir manage_dir_perms;
|
||||
files_var_lib_filetrans(kismet_t, kismet_var_lib_t, { file dir })
|
||||
|
@ -53,6 +60,7 @@ allow kismet_t kismet_var_run_t:dir manage_dir_perms;
|
|||
files_pid_filetrans(kismet_t, kismet_var_run_t, { file dir })
|
||||
|
||||
kernel_search_debugfs(kismet_t)
|
||||
kernel_read_system_state(kismet_t)
|
||||
|
||||
corecmd_exec_bin(kismet_t)
|
||||
|
||||
|
@ -74,3 +82,10 @@ files_read_usr_files(kismet_t)
|
|||
miscfiles_read_localization(kismet_t)
|
||||
|
||||
userdom_use_user_terminals(kismet_t)
|
||||
userdom_read_user_tmpfs_files(kismet_t)
|
||||
|
||||
optional_policy(`
|
||||
dbus_system_bus_client(kismet_t)
|
||||
|
||||
networkmanager_dbus_chat(kismet_t)
|
||||
')
|
||||
|
|
|
@ -2389,6 +2389,26 @@ interface(`userdom_tmp_filetrans_user_tmp',`
|
|||
files_tmp_filetrans($1, user_tmp_t, $2)
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Read user tmpfs files.
|
||||
## </summary>
|
||||
## <param name="domain">
|
||||
## <summary>
|
||||
## Domain allowed access.
|
||||
## </summary>
|
||||
## </param>
|
||||
#
|
||||
interface(`userdom_read_user_tmpfs_files',`
|
||||
gen_require(`
|
||||
type user_tmpfs_t;
|
||||
')
|
||||
|
||||
read_files_pattern($1, user_tmpfs_t, user_tmpfs_t)
|
||||
allow $1 user_tmpfs_t:dir list_dir_perms;
|
||||
fs_search_tmpfs($1)
|
||||
')
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
## Read user tmpfs files.
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
|
||||
policy_module(userdomain, 4.2.3)
|
||||
policy_module(userdomain, 4.2.4)
|
||||
|
||||
########################################
|
||||
#
|
||||
|
|
Loading…
Reference in New Issue