commit: f65b4a5c66cee88e554361b57195a47e21b90d9d
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
AuthorDate: Sat Nov 22 18:04:38 2014 +0000
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Sat Nov 22 18:04:38 2014 +0000
URL:
http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=f65b4a5c
Reshuffle to better match upstream
---
policy/modules/kernel/files.if | 285 ++++++++++++++++++++---------------------
1 file changed, 142 insertions(+), 143 deletions(-)
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index fd1f8e9..dd16f74 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -1450,7 +1450,6 @@ interface(`files_relabel_non_auth_files',`
# to allow files_relabel_non_auth_files to be an optional setting
(tunable).
')
-
#############################################
## <summary>
## Manage all configuration directories on filesystem
@@ -1604,6 +1603,24 @@ interface(`files_setattr_all_mountpoints',`
########################################
## <summary>
+## Do not audit attempts to set the attributes on all mount points.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`files_dontaudit_setattr_all_mountpoints',`
+ gen_require(`
+ attribute mountpoint;
+ ')
+
+ dontaudit $1 mountpoint:dir setattr;
+')
+
+########################################
+## <summary>
## Search all mount points.
## </summary>
## <param name="domain">
@@ -1676,11 +1693,11 @@ interface(`files_dontaudit_list_all_mountpoints',`
########################################
## <summary>
-## Do not audit write attempts on mount points.
+## Do not audit attempts to write to mount points.
## </summary>
## <param name="domain">
## <summary>
-## Domain to ignore write attempts from
+## Domain to not audit.
## </summary>
## </param>
#
@@ -1694,24 +1711,6 @@ interface(`files_dontaudit_write_all_mountpoints',`
########################################
## <summary>
-## Do not audit setattr attempts on mount points.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain to ignore setattr attempts from
-## </summary>
-## </param>
-#
-interface(`files_dontaudit_setattr_all_mountpoints',`
- gen_require(`
- attribute mountpoint;
- ')
-
- dontaudit $1 mountpoint:dir setattr;
-')
-
-########################################
-## <summary>
## List the contents of the root directory.
## </summary>
## <param name="domain">
@@ -2669,25 +2668,6 @@ interface(`files_manage_etc_dirs',`
########################################
## <summary>
-## Do not audit attempts to read files
-## in /etc
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain to not audit.
-## </summary>
-## </param>
-#
-interface(`files_dontaudit_read_etc_files',`
- gen_require(`
- type etc_t;
- ')
-
- dontaudit $1 etc_t:file { getattr read };
-')
-
-########################################
-## <summary>
## Read generic files in /etc.
## </summary>
## <desc>
@@ -3003,24 +2983,6 @@ interface(`files_dontaudit_setattr_etc_runtime_files',`
########################################
## <summary>
-## Do not audit attempts to read etc_runtime resources
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`files_dontaudit_read_etc_runtime',`
- gen_require(`
- type etc_runtime_t;
- ')
-
- dontaudit $1 etc_runtime_t:file read_file_perms;
-')
-
-########################################
-## <summary>
## Read files in /etc that are dynamically
## created on boot, such as mtab.
## </summary>
@@ -3142,26 +3104,6 @@ interface(`files_manage_etc_runtime_files',`
########################################
## <summary>
-## Create, read, write, and delete symbolic links in
-## /etc that are dynamically created on boot.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-## <rolecap/>
-#
-interface(`files_manage_etc_runtime_lnk_files',`
- gen_require(`
- type etc_t, etc_runtime_t;
- ')
-
- manage_lnk_files_pattern($1, { etc_t etc_runtime_t }, etc_runtime_t)
-')
-
-########################################
-## <summary>
## Create, etc runtime objects with an automatic
## type transition.
## </summary>
@@ -5660,6 +5602,24 @@ interface(`files_manage_mounttab',`
########################################
## <summary>
+## Set the attributes of the generic lock directories.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`files_setattr_lock_dirs',`
+ gen_require(`
+ type var_t, var_lock_t;
+ ')
+
+ setattr_dirs_pattern($1, var_t, var_lock_t)
+')
+
+########################################
+## <summary>
## Search the locks directory (/var/lock).
## </summary>
## <param name="domain">
@@ -5738,11 +5698,11 @@ interface(`files_rw_lock_dirs',`
########################################
## <summary>
-## Create lock directories.
+## Create lock directories
## </summary>
## <param name="domain">
-## <summary>
-## Domain allowed access.
+## <summary>
+## Domain allowed access
## </summary>
## </param>
#
@@ -5756,7 +5716,6 @@ interface(`files_create_lock_dirs',`
create_dirs_pattern($1, var_lock_t, var_lock_t)
')
-
########################################
## <summary>
## Relabel to and from all lock directory types.
@@ -5802,24 +5761,6 @@ interface(`files_getattr_generic_locks',`
########################################
## <summary>
-## Set the attributes of generic lock directories
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`files_setattr_lock_dirs',`
- gen_require(`
- type var_t, var_lock_t;
- ')
-
- setattr_dirs_pattern($1, var_t, var_lock_t)
-')
-
-########################################
-## <summary>
## Delete generic lock files.
## </summary>
## <param name="domain">
@@ -6101,29 +6042,6 @@ interface(`files_write_generic_pid_pipes',`
allow $1 var_run_t:lnk_file read_lnk_file_perms;
allow $1 var_run_t:fifo_file write;
')
-########################################
-## <summary>
-## Write dirs in /var/run with the lock file type
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-## <param name="name" optional="true">
-## <summary>
-## Name of the directory that the file transition will work on
-## </summary>
-## </param>
-#
-interface(`files_pid_filetrans_lock_dir',`
- gen_require(`
- type var_t, var_run_t;
- ')
-
- files_pid_filetrans($1, var_lock_t, dir, $2)
-')
-
########################################
## <summary>
@@ -6189,6 +6107,29 @@ interface(`files_pid_filetrans',`
########################################
## <summary>
+## Create a generic lock directory within the run directories
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access
+## </summary>
+## </param>
+## <param name="name" optional="true">
+## <summary>
+## The name of the object being created.
+## </summary>
+## </param>
+#
+interface(`files_pid_filetrans_lock_dir',`
+ gen_require(`
+ type var_lock_t;
+ ')
+
+ files_pid_filetrans($1, var_lock_t, dir, $2)
+')
+
+########################################
+## <summary>
## Read and write generic process ID files.
## </summary>
## <param name="domain">
@@ -6291,26 +6232,6 @@ interface(`files_read_all_pids',`
########################################
## <summary>
-## Create PID directories.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`files_create_pid_dirs',`
- gen_require(`
- type var_t, var_run_t;
- ')
-
- allow $1 var_t:dir search_dir_perms;
- allow $1 var_run_t:lnk_file read_lnk_file_perms;
- create_dirs_pattern($1, var_run_t, var_run_t)
-')
-
-########################################
-## <summary>
## Delete all process IDs.
## </summary>
## <param name="domain">
@@ -6623,6 +6544,84 @@ interface(`files_unconfined',`
# should be in an ifdef distro_gentoo but cannot do so for interfaces
+########################################
+## <summary>
+## Create PID directories.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`files_create_pid_dirs',`
+ gen_require(`
+ type var_t, var_run_t;
+ ')
+
+ allow $1 var_t:dir search_dir_perms;
+ allow $1 var_run_t:lnk_file read_lnk_file_perms;
+ create_dirs_pattern($1, var_run_t, var_run_t)
+')
+
+########################################
+## <summary>
+## Create, read, write, and delete symbolic links in
+## /etc that are dynamically created on boot.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <rolecap/>
+#
+interface(`files_manage_etc_runtime_lnk_files',`
+ gen_require(`
+ type etc_t, etc_runtime_t;
+ ')
+
+ manage_lnk_files_pattern($1, { etc_t etc_runtime_t }, etc_runtime_t)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to read etc_runtime resources
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`files_dontaudit_read_etc_runtime',`
+ gen_require(`
+ type etc_runtime_t;
+ ')
+
+ dontaudit $1 etc_runtime_t:file read_file_perms;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to read files
+## in /etc
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`files_dontaudit_read_etc_files',`
+ gen_require(`
+ type etc_t;
+ ')
+
+ dontaudit $1 etc_t:file { getattr read };
+')
+
+
#########################################
## <summary>
## List usr/src files