1 |
commit: 1cd6b4275bef63da2c4c37ad68574230fad38a3f |
2 |
Author: Guido Trentalancia <guido <AT> trentalancia <DOT> net> |
3 |
AuthorDate: Fri Dec 23 01:15:14 2016 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Sun Jan 1 16:26:28 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=1cd6b427 |
7 |
|
8 |
modutils: update to run in confined mode |
9 |
|
10 |
Update the modutils module so that it can run in confined |
11 |
mode instead of unconfined mode. |
12 |
|
13 |
Signed-off-by: Guido Trentalancia <guido <AT> trentalancia.net> |
14 |
|
15 |
policy/modules/kernel/files.if | 1 + |
16 |
policy/modules/system/modutils.te | 10 ++-------- |
17 |
2 files changed, 3 insertions(+), 8 deletions(-) |
18 |
|
19 |
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if |
20 |
index 82901bc..3fc0487 100644 |
21 |
--- a/policy/modules/kernel/files.if |
22 |
+++ b/policy/modules/kernel/files.if |
23 |
@@ -4102,6 +4102,7 @@ interface(`files_manage_kernel_modules',` |
24 |
type modules_object_t; |
25 |
') |
26 |
|
27 |
+ allow $1 modules_object_t:dir rw_dir_perms; |
28 |
manage_files_pattern($1, modules_object_t, modules_object_t) |
29 |
') |
30 |
|
31 |
|
32 |
diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te |
33 |
index 2448f06..1a138a8 100644 |
34 |
--- a/policy/modules/system/modutils.te |
35 |
+++ b/policy/modules/system/modutils.te |
36 |
@@ -89,8 +89,8 @@ files_read_usr_files(kmod_t) |
37 |
files_exec_etc_files(kmod_t) |
38 |
# for nscd: |
39 |
files_dontaudit_search_pids(kmod_t) |
40 |
-# for locking: (cjp: ????) |
41 |
-files_write_kernel_modules(kmod_t) |
42 |
+# to manage modules.dep |
43 |
+files_manage_kernel_modules(kmod_t) |
44 |
|
45 |
fs_getattr_xattr_fs(kmod_t) |
46 |
fs_dontaudit_use_tmpfs_chr_dev(kmod_t) |
47 |
@@ -166,12 +166,6 @@ optional_policy(` |
48 |
') |
49 |
|
50 |
optional_policy(` |
51 |
- unconfined_domain(kmod_t) |
52 |
- unconfined_dontaudit_rw_pipes(kmod_t) |
53 |
- unconfined_domtrans_to(kmod_t, kmod_exec_t) |
54 |
-') |
55 |
- |
56 |
-optional_policy(` |
57 |
# cjp: why is this needed: |
58 |
dev_rw_xserver_misc(kmod_t) |