PERFORCE change 97366 for review

Todd Miller millert at FreeBSD.org
Wed May 17 19:05:37 UTC 2006


http://perforce.freebsd.org/chv.cgi?CH=97366

Change 97366 by millert at millert_ibook on 2006/05/17 19:04:33

	Properly label all tty and disk device nodes and add
	transitions for fsck, mount, etc.

Affected files ...

.. //depot/projects/trustedbsd/sedarwin7/src/sedarwin/policy/devfs#3 edit
.. //depot/projects/trustedbsd/sedarwin7/src/sedarwin/policy/rules#10 edit
.. //depot/projects/trustedbsd/sedarwin7/src/sedarwin/policy/sebsd-relabel.sh#5 edit

Differences ...

==== //depot/projects/trustedbsd/sedarwin7/src/sedarwin/policy/devfs#3 (text+ko) ====

@@ -9,6 +9,22 @@
 genfscon devfs /random		system_u:object_r:random_device_t
 genfscon devfs /urandom		system_u:object_r:random_device_t
 genfscon devfs /ttyp		system_u:object_r:devpts_t
+genfscon devfs /ttyq		system_u:object_r:devpts_t
+genfscon devfs /ttyr		system_u:object_r:devpts_t
+genfscon devfs /ttys		system_u:object_r:devpts_t
+genfscon devfs /ttyt		system_u:object_r:devpts_t
+genfscon devfs /ttyu		system_u:object_r:devpts_t
+genfscon devfs /ttyv		system_u:object_r:devpts_t
+genfscon devfs /ttyw		system_u:object_r:devpts_t
 genfscon devfs /ptyp		system_u:object_r:devpts_t
+genfscon devfs /ptyq		system_u:object_r:devpts_t
+genfscon devfs /ptyr		system_u:object_r:devpts_t
+genfscon devfs /ptys		system_u:object_r:devpts_t
+genfscon devfs /ptyt		system_u:object_r:devpts_t
+genfscon devfs /ptyu		system_u:object_r:devpts_t
+genfscon devfs /ptyv		system_u:object_r:devpts_t
+genfscon devfs /ptyw		system_u:object_r:devpts_t
+genfscon devfs /disk		system_u:object_r:disk_device_t
+#genfscon devfs /bpf		system_u:object_r:bpf_device_t
 
 # FLASK

==== //depot/projects/trustedbsd/sedarwin7/src/sedarwin/policy/rules#10 (text+ko) ====

@@ -32,6 +32,7 @@
 type sysadm_devpts_t;
 type tmpfs_t;
 type device_t;
+type disk_device_t;
 type memory_device_t;
 type null_device_t;
 type zero_device_t;
@@ -62,6 +63,7 @@
 type notifyd_d, domain, domain2;
 type mtest_d, domain, domain2;
 type diskarbitrationd_d, domain, domain2;
+type fsadm_d, domain, domain2;
 type configd_d, domain, domain2;
 
 type pbs_exec_t, file;
@@ -76,6 +78,7 @@
 type notifyd_exec_t, file;
 type mtest_exec_t, file;
 type diskarbitrationd_exec_t, file;
+type fsadm_exec_t, file;
 type configd_exec_t, file;
 
 role system_r types init_d;
@@ -97,6 +100,7 @@
 role system_r types notifyd_d;
 role system_r types mtest_d;
 role system_r types diskarbitrationd_d;
+role system_r types fsadm_d;
 role system_r types configd_d;
 role system_r types security_t;
 role system_r types unlabeled_t;
@@ -177,6 +181,8 @@
 allow domain2 file:{file lnk_file sock_file fifo_file} {create_file_perms execute };
 allow domain2 file:file execute_no_trans;
 allow domain2 file:dir { create_dir_perms };
+allow domain2 device_t:dir { read search getattr };
+allow domain2 {device_t disk_device_t}:{blk_file} { getattr };
 allow domain2 {null_device_t console_device_t memory_device_t random_device_t zero_device_t device_t}:{file chr_file} create_file_perms;
 allow domain2 device_t:blk_file create_file_perms;
 allow domain2 {devpts_t user_devpts_t sysadm_devpts_t}:chr_file create_file_perms;
@@ -212,6 +218,13 @@
 # Transitions for mtest
 domain_auto_trans(user_secret_d,mtest_exec_t,mtest_d);
 
+# Transitions for fsck*
+domain_auto_trans(init_d,fsadm_exec_t,fsadm_d);
+allow_mach_ipc(fsadm_d,mach_init_d);
+allow_mach_ipc(fsadm_d,unlabeled_t);
+allow fsadm_d device_t:dir { read search getattr };
+allow fsadm_d disk_device_t:blk_file { read write getattr };
+
 domain_auto_trans(systemstarter_d,windowserver_exec_t,windowserver_d);
 domain_auto_trans(systemstarter_d,securityserver_exec_t,securityserver_d);
 domain_auto_trans(systemstarter_d,coreservices_exec_t,coreservices_d);
@@ -325,6 +338,7 @@
 allow_mach_ipc(diskarbitrationd_d,lookupd_d);
 allow_mach_ipc(diskarbitrationd_d,securityserver_d);
 allow_mach_ipc(diskarbitrationd_d,systemstarter_d);
+allow diskarbitrationd_d disk_device_t:blk_file { read write getattr };
 
 # user_d rules
 allow_notify_ipc(user_d);

==== //depot/projects/trustedbsd/sedarwin7/src/sedarwin/policy/sebsd-relabel.sh#5 (text+ko) ====

@@ -12,6 +12,8 @@
 $SETFMAC sebsd/system_u:object_r:bin_t /bin/*
 $SETFMAC sebsd/system_u:object_r:bin_t /usr/bin/*
 $SETFMAC sebsd/system_u:object_r:bin_t /usr/local/bin/*
+$SETFMAC sebsd/system_u:object_r:fsadm_exec_t /sbin/fsck*
+$SETFMAC sebsd/system_u:object_r:fsadm_exec_t /sbin/mount*
 $SETFMAC sebsd/system_u:object_r:shell_exec_t /bin/*sh       
 $SETFMAC sebsd/system_u:object_r:login_exec_t /usr/bin/login
 $SETFMAC sebsd/system_u:object_r:sshd_exec_t /usr/sbin/sshd


More information about the trustedbsd-cvs mailing list