[selinux-policy: 1354/3172] add speedtouch, bug 1548

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 21:02:31 UTC 2010


commit 5501be59f0adb216cc6c15ec88335088ec80da5a
Author: Chris PeBenito <cpebenito at tresys.com>
Date:   Wed Apr 12 18:22:54 2006 +0000

    add speedtouch, bug 1548

 refpolicy/Changelog                             |    1 +
 refpolicy/policy/modules/services/speedtouch.fc |    2 +
 refpolicy/policy/modules/services/speedtouch.if |    1 +
 refpolicy/policy/modules/services/speedtouch.te |   77 +++++++++++++++++++++++
 4 files changed, 81 insertions(+), 0 deletions(-)
---
diff --git a/refpolicy/Changelog b/refpolicy/Changelog
index a841562..c8b877a 100644
--- a/refpolicy/Changelog
+++ b/refpolicy/Changelog
@@ -53,6 +53,7 @@
 	qmail (Petre Rodan)
 	rhgb
 	snort
+	speedtouch
 	thunderbird
 	tor (Erich Schubert)
 	transproxy
diff --git a/refpolicy/policy/modules/services/speedtouch.fc b/refpolicy/policy/modules/services/speedtouch.fc
new file mode 100644
index 0000000..9760d15
--- /dev/null
+++ b/refpolicy/policy/modules/services/speedtouch.fc
@@ -0,0 +1,2 @@
+/usr/sbin/speedmgmt	--	gen_context(system_u:object_r:speedmgmt_exec_t,s0)
+
diff --git a/refpolicy/policy/modules/services/speedtouch.if b/refpolicy/policy/modules/services/speedtouch.if
new file mode 100644
index 0000000..826e2db
--- /dev/null
+++ b/refpolicy/policy/modules/services/speedtouch.if
@@ -0,0 +1 @@
+## <summary>Alcatel speedtouch USB ADSL modem</summary>
diff --git a/refpolicy/policy/modules/services/speedtouch.te b/refpolicy/policy/modules/services/speedtouch.te
new file mode 100644
index 0000000..edf09ce
--- /dev/null
+++ b/refpolicy/policy/modules/services/speedtouch.te
@@ -0,0 +1,77 @@
+
+policy_module(speedtouch,1.0.0)
+
+#######################################
+#
+# Rules for the speedmgmt_t domain.
+#
+
+type speedmgmt_t;
+type speedmgmt_exec_t;
+init_daemon_domain(speedmgmt_t,speedmgmt_exec_t)
+
+type speedmgmt_tmp_t;
+files_tmp_file(speedmgmt_tmp_t)
+
+type speedmgmt_var_run_t;
+files_pid_file(speedmgmt_var_run_t)
+
+########################################
+#
+# Local policy
+#
+
+dontaudit speedmgmt_t self:capability sys_tty_config;
+allow speedmgmt_t self:process signal_perms;
+
+allow speedmgmt_t speedmgmt_tmp_t:dir create_dir_perms;
+allow speedmgmt_t speedmgmt_tmp_t:file create_file_perms;
+files_tmp_filetrans(speedmgmt_t, speedmgmt_tmp_t, { file dir })
+
+allow speedmgmt_t speedmgmt_var_run_t:file create_file_perms;
+allow speedmgmt_t speedmgmt_var_run_t:dir rw_dir_perms;
+files_pid_filetrans(speedmgmt_t,speedmgmt_var_run_t,file)
+
+kernel_read_kernel_sysctls(speedmgmt_t)
+kernel_list_proc(speedmgmt_t)
+kernel_read_proc_symlinks(speedmgmt_t)
+
+dev_read_sysfs(speedmgmt_t)
+dev_read_usbfs(speedmgmt_t)
+
+domain_use_interactive_fds(speedmgmt_t)
+
+files_read_etc_files(speedmgmt_t)
+files_read_usr_files(speedmgmt_t)
+
+fs_getattr_all_fs(speedmgmt_t)
+fs_search_auto_mountpoints(speedmgmt_t)
+
+term_dontaudit_use_console(speedmgmt_t)
+
+init_use_fds(speedmgmt_t)
+init_use_script_ptys(speedmgmt_t)
+
+libs_use_ld_so(speedmgmt_t)
+libs_use_shared_libs(speedmgmt_t)
+
+logging_send_syslog_msg(speedmgmt_t)
+
+miscfiles_read_localization(speedmgmt_t)
+
+userdom_dontaudit_use_unpriv_user_fds(speedmgmt_t)
+userdom_dontaudit_search_sysadm_home_dirs(speedmgmt_t)
+
+ifdef(`targeted_policy',`
+	term_dontaudit_use_unallocated_ttys(speedmgmt_t)
+	term_dontaudit_use_generic_ptys(speedmgmt_t)
+	files_dontaudit_read_root_files(speedmgmt_t)
+')
+
+optional_policy(`
+	seutil_sigchld_newrole(speedmgmt_t)
+')
+
+optional_policy(`
+	udev_read_db(speedmgmt_t)
+')


More information about the scm-commits mailing list