Skip to content
Snippets Groups Projects
Commit 5622cca0 authored by Stephen Smalley's avatar Stephen Smalley
Browse files

entrypoint should always be explicitly allowed.


Also rewrite to use positive permission sets, macros, and
eliminate duplication.

Change-Id: I4dc340784f770e569160025a5db2dc3da90d2629
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent 43b9cfd3
No related branches found
No related tags found
No related merge requests found
...@@ -59,9 +59,12 @@ allow unconfineddomain { ...@@ -59,9 +59,12 @@ allow unconfineddomain {
-security_file -security_file
-shell_data_file -shell_data_file
}:{ dir lnk_file sock_file fifo_file } ~relabelto; }:{ dir lnk_file sock_file fifo_file } ~relabelto;
allow unconfineddomain exec_type:{ file dir lnk_file } ~{ create write setattr relabelfrom relabelto append unlink link rename }; allow unconfineddomain exec_type:dir r_dir_perms;
allow unconfineddomain system_file:{ dir lnk_file } ~{ create write setattr relabelfrom relabelto append unlink link rename }; allow unconfineddomain exec_type:file { rx_file_perms execmod };
allow unconfineddomain system_file:file ~{ create write setattr relabelfrom relabelto append unlink link rename entrypoint }; allow unconfineddomain exec_type:lnk_file r_file_perms;
allow unconfineddomain system_file:dir r_dir_perms;
allow unconfineddomain system_file:file { rx_file_perms execmod };
allow unconfineddomain system_file:lnk_file r_file_perms;
allow unconfineddomain { allow unconfineddomain {
fs_type fs_type
-usermodehelper -usermodehelper
...@@ -78,7 +81,7 @@ allow unconfineddomain { ...@@ -78,7 +81,7 @@ allow unconfineddomain {
-security_file -security_file
-shell_data_file -shell_data_file
}:{ chr_file file } ~{entrypoint execmod execute relabelto}; }:{ chr_file file } ~{entrypoint execmod execute relabelto};
allow unconfineddomain { rootfs system_file exec_type }:file execute; allow unconfineddomain rootfs:file execute;
allow unconfineddomain contextmount_type:dir r_dir_perms; allow unconfineddomain contextmount_type:dir r_dir_perms;
allow unconfineddomain contextmount_type:notdevfile_class_set r_file_perms; allow unconfineddomain contextmount_type:notdevfile_class_set r_file_perms;
allow unconfineddomain node_type:node *; allow unconfineddomain node_type:node *;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment