eef53e3ddc
This patch removes every macro and interface that was deprecated in 20190201. Some of them date back to 2016 or 2017. I chose 20190201 as that is the one that is in the previous release of Debian. For any distribution I don't think it makes sense to carry interfaces that were deprecated in version N to version N+1. One thing that particularly annoys me is when audit2allow -R gives deprecated interfaces in it's output. Removing some of these should reduce the incidence of that. I believe this is worthy of merging. Signed-off-by: Russell Coker <russell@coker.com.au>
111 lines
2.0 KiB
Cheetah
111 lines
2.0 KiB
Cheetah
#
|
|
# Common domain transition pattern perms
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. entry point file type
|
|
# 3. target domain
|
|
#
|
|
define(`domain_transition_pattern',`
|
|
allow $1 $2:file mmap_exec_file_perms;
|
|
allow $1 $3:process transition;
|
|
dontaudit $1 $3:process { noatsecure siginh rlimitinh };
|
|
')
|
|
|
|
|
|
#
|
|
# Specified domain transition patterns
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. entry point file type
|
|
# 3. target domain
|
|
#
|
|
define(`spec_domtrans_pattern',`
|
|
allow $1 self:process setexec;
|
|
domain_transition_pattern($1,$2,$3)
|
|
|
|
allow $3 $1:fd use;
|
|
allow $3 $1:fifo_file rw_inherited_fifo_file_perms;
|
|
allow $3 $1:process sigchld;
|
|
')
|
|
|
|
#
|
|
# Automatic domain transition patterns
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. entry point file type
|
|
# 3. target domain
|
|
#
|
|
define(`domain_auto_transition_pattern',`
|
|
domain_transition_pattern($1,$2,$3)
|
|
type_transition $1 $2:process $3;
|
|
')
|
|
|
|
#
|
|
# Automatic domain transition patterns
|
|
# with feedback permissions
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. entry point file type
|
|
# 3. target domain
|
|
#
|
|
define(`domtrans_pattern',`
|
|
domain_auto_transition_pattern($1,$2,$3)
|
|
|
|
allow $3 $1:fd use;
|
|
allow $3 $1:fifo_file rw_inherited_fifo_file_perms;
|
|
allow $3 $1:process sigchld;
|
|
')
|
|
|
|
#
|
|
# Dynamic transition pattern
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. target domain
|
|
#
|
|
define(`dyntrans_pattern',`
|
|
allow $1 self:process setcurrent;
|
|
allow $1 $2:process dyntransition;
|
|
allow $2 $1:process sigchld;
|
|
')
|
|
|
|
#
|
|
# Read foreign domain proc data
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. target domain
|
|
#
|
|
define(`ps_process_pattern',`
|
|
allow $1 $2:dir list_dir_perms;
|
|
allow $1 $2:file read_file_perms;
|
|
allow $1 $2:lnk_file read_lnk_file_perms;
|
|
allow $1 $2:process getattr;
|
|
')
|
|
|
|
#
|
|
# Process administration pattern
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. target domain
|
|
#
|
|
define(`admin_process_pattern',`
|
|
ps_process_pattern($1, $2)
|
|
|
|
allow $1 $2:process { ptrace signal_perms };
|
|
')
|
|
|
|
#
|
|
# File execution pattern
|
|
#
|
|
# Parameters:
|
|
# 1. source domain
|
|
# 2. executable file type
|
|
#
|
|
define(`can_exec',`allow $1 $2:file { mmap_exec_file_perms ioctl lock execute_no_trans };')
|