[selinux-policy: 1484/3172] more packets

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 21:13:37 UTC 2010


commit 72fcec8c66b7ba3ed0ffbb7f1071653ef0652fab
Author: Chris PeBenito <cpebenito at tresys.com>
Date:   Fri May 26 19:04:18 2006 +0000

    more packets

 refpolicy/policy/modules/kernel/kernel.te  |   21 +++++++++++----------
 refpolicy/policy/modules/services/samba.te |    7 +++----
 2 files changed, 14 insertions(+), 14 deletions(-)
---
diff --git a/refpolicy/policy/modules/kernel/kernel.te b/refpolicy/policy/modules/kernel/kernel.te
index 04de822..0ec50e2 100644
--- a/refpolicy/policy/modules/kernel/kernel.te
+++ b/refpolicy/policy/modules/kernel/kernel.te
@@ -161,13 +161,7 @@ sid tcp_socket		gen_context(system_u:object_r:unlabeled_t,s15:c0.c255)
 # kernel local policy
 #
 
-# Use capabilities. need to investigate which capabilities are actually used
 allow kernel_t self:capability *;
-
-# Other possible mount points for the root fs are in files
-allow kernel_t unlabeled_t:dir mounton;
-
-# old general_domain_access()
 allow kernel_t self:process ~{ ptrace setcurrent setexec setfscreate setrlimit execmem execstack execheap };
 allow kernel_t self:shm create_shm_perms;
 allow kernel_t self:sem create_sem_perms;
@@ -181,20 +175,27 @@ allow kernel_t self:fifo_file rw_file_perms;
 allow kernel_t self:sock_file r_file_perms;
 allow kernel_t self:fd use;
 
-# old general_proc_read_access():
 allow kernel_t proc_t:dir r_dir_perms;
 allow kernel_t proc_t:{ lnk_file file } r_file_perms;
+
 allow kernel_t proc_net_t:dir r_dir_perms;
 allow kernel_t proc_net_t:file r_file_perms;
+
 allow kernel_t proc_mdstat_t:file r_file_perms;
+
 allow kernel_t proc_kcore_t:file getattr;
+
 allow kernel_t proc_kmsg_t:file getattr;
-allow kernel_t sysctl_t:dir r_dir_perms;
+
 allow kernel_t sysctl_kernel_t:dir r_dir_perms;
 allow kernel_t sysctl_kernel_t:file r_file_perms;
+allow kernel_t sysctl_t:dir r_dir_perms;
 
-# cjp: this seems questionable
-allow kernel_t unlabeled_t:fifo_file rw_file_perms;
+# Other possible mount points for the root fs are in files
+allow kernel_t unlabeled_t:dir mounton;
+# Kernel-generated traffic e.g., TCP resets on
+# connections with invalidated labels:
+allow kernel_t unlabeled_t:packet send;
 
 corenet_non_ipsec_sendrecv(kernel_t)
 # Kernel-generated traffic e.g., ICMP replies:
diff --git a/refpolicy/policy/modules/services/samba.te b/refpolicy/policy/modules/services/samba.te
index 3f59ac4..256153b 100644
--- a/refpolicy/policy/modules/services/samba.te
+++ b/refpolicy/policy/modules/services/samba.te
@@ -376,18 +376,17 @@ kernel_read_network_state(nmbd_t)
 kernel_read_software_raid_state(nmbd_t)
 kernel_read_system_state(nmbd_t)
 
+corenet_non_ipsec_sendrecv(nmbd_t)
 corenet_tcp_sendrecv_all_if(nmbd_t)
 corenet_udp_sendrecv_all_if(nmbd_t)
-corenet_raw_sendrecv_all_if(nmbd_t)
 corenet_tcp_sendrecv_all_nodes(nmbd_t)
 corenet_udp_sendrecv_all_nodes(nmbd_t)
-corenet_raw_sendrecv_all_nodes(nmbd_t)
 corenet_tcp_sendrecv_all_ports(nmbd_t)
 corenet_udp_sendrecv_all_ports(nmbd_t)
-corenet_non_ipsec_sendrecv(nmbd_t)
-corenet_tcp_bind_all_nodes(nmbd_t)
 corenet_udp_bind_all_nodes(nmbd_t)
 corenet_udp_bind_nmbd_port(nmbd_t)
+corenet_sendrecv_nmbd_server_packets(nmbd_t)
+corenet_sendrecv_nmbd_client_packets(nmbd_t)
 
 dev_read_sysfs(nmbd_t)
 dev_getattr_mtrr_dev(nmbd_t)


More information about the scm-commits mailing list