PERFORCE change 23688 for review
Brian Feldman
green at freebsd.org
Mon Jan 13 19:23:23 GMT 2003
http://perforce.freebsd.org/chv.cgi?CH=23688
Change 23688 by green at green_laptop_2 on 2003/01/13 11:23:04
* Add the uses_kld() macro, and use it in a few utilities so
far that need it.
* Implement cleanvar.te policy for use in /etc/rc.d/cleanvar.
Affected files ...
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/assert.te#2 edit
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/cleanvar.te#1 add
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/ifconfig.te#2 edit
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/initrc.te#4 edit
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/mount.te#3 edit
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/file_contexts/program/initrc.fc#3 edit
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/files.lst#8 edit
.. //depot/projects/trustedbsd/mac/contrib/sebsd/policy/macros/global_macros.te#3 edit
Differences ...
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/assert.te#2 (text+ko) ====
@@ -27,12 +27,6 @@
neverallow domain ~domain:process transition;
#
-# Verify that only the kmod_t, insmod_t, and ifconfig_t domains
-# have the sys_module capability.
-#
-neverallow ~{ kmod_t insmod_t ifconfig_t } self:capability sys_module;
-
-#
# Verify that executable types, the system dynamic loaders, and the
# system shared libraries can only be modified by administrators.
#
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/ifconfig.te#2 (text+ko) ====
@@ -13,6 +13,7 @@
role system_r types ifconfig_t;
role sysadm_r types ifconfig_t;
every_domain(ifconfig_t)
+uses_kld(ifconfig_t)
type ifconfig_exec_t, file_type, sysadmfile, exec_type;
domain_auto_trans(initrc_t, ifconfig_exec_t, ifconfig_t)
type_transition init_t ifconfig_exec_t:process ifconfig_t;
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/initrc.te#4 (text+ko) ====
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/domains/program/mount.te#3 (text+ko) ====
@@ -13,6 +13,7 @@
role system_r types mount_t;
role sysadm_r types mount_t;
every_domain(mount_t)
+uses_kld(mount_t)
type mount_exec_t, file_type, sysadmfile, exec_type;
domain_auto_trans(initrc_t, mount_exec_t, mount_t)
type_transition init_t mount_exec_t:process mount_t;
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/file_contexts/program/initrc.fc#3 (text+ko) ====
@@ -4,6 +4,7 @@
/etc/rc.d/rc system_u:object_r:initrc_exec_t
/etc/rc.d/rc.sysinit system_u:object_r:initrc_exec_t
/etc/rc.d/rc.local system_u:object_r:initrc_exec_t
+/etc/rc.d/cleanvar system_u:object_r:cleanvar_exec_t
/etc/init.d/rc.* system_u:object_r:initrc_exec_t
/var/run/utmp system_u:object_r:initrc_var_run_t
/var/run/runlevel.dir system_u:object_r:initrc_var_run_t
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/files.lst#8 (text+ko) ====
@@ -143,6 +143,7 @@
domains/program/backup.te
domains/program/bootloader.te
domains/program/cardmgr.te
+domains/program/cleanvar.te
domains/program/courier.te
domains/program/crack.te
domains/program/crond.te
==== //depot/projects/trustedbsd/mac/contrib/sebsd/policy/macros/global_macros.te#3 (text+ko) ====
@@ -262,6 +262,18 @@
#################################
#
+# uses_kld(domain)
+#
+# Permissions for using kernel modules.
+#
+define(`uses_kld',`
+allow $1 boot_t:dir r_dir_perms;
+allow $1 boot_t:file r_file_perms;
+allow $1 self:capability sys_module;
+')
+
+#################################
+#
# uses_shlib(domain)
#
# Permissions for using shared libraries.
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-cvs" in the body of the message
More information about the trustedbsd-cvs
mailing list