All of lore.kernel.org
 help / color / mirror / Atom feed
* [refpolicy] SELinux xscreensaver policy support
@ 2009-09-11 12:21 corentin.labbe
  2009-09-15 13:23 ` Christopher J. PeBenito
  0 siblings, 1 reply; 2+ messages in thread
From: corentin.labbe @ 2009-09-11 12:21 UTC (permalink / raw)
  To: refpolicy

Hello

This a patch for adding xscreensaver policy.

I think it need a specific policy because of the auth_domtrans_chk_passwd.

cordially
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-xscreensaver.patch
Type: text/x-patch
Size: 3340 bytes
Desc: not available
Url : http://oss.tresys.com/pipermail/refpolicy/attachments/20090911/fcea1fab/attachment.bin 

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [refpolicy] SELinux xscreensaver policy support
  2009-09-11 12:21 [refpolicy] SELinux xscreensaver policy support corentin.labbe
@ 2009-09-15 13:23 ` Christopher J. PeBenito
  0 siblings, 0 replies; 2+ messages in thread
From: Christopher J. PeBenito @ 2009-09-15 13:23 UTC (permalink / raw)
  To: refpolicy

On Fri, 2009-09-11 at 14:21 +0200, corentin.labbe wrote:
> This a patch for adding xscreensaver policy.
> 
> I think it need a specific policy because of the
> auth_domtrans_chk_passwd.

Merged.

> 
> 
> 
> 
> 
> differences
> between files
> attachment
> (0001-xscreensaver.patch)
> 
> >From 26d2dab058753557ea6c61f4f837c8df1a07ea5e Mon Sep 17 00:00:00 2001
> From: LABBE Corentin <corentin.labbe@geomatys.fr>
> Date: Fri, 11 Sep 2009 14:08:47 +0200
> Subject: [PATCH] xscreensaver
> 
> 
> Signed-off-by: LABBE Corentin <corentin.labbe@geomatys.fr>
> ---
>  policy/modules/apps/xscreensaver.fc |    1 +
>  policy/modules/apps/xscreensaver.if |   34 +++++++++++++++++++++++
>  policy/modules/apps/xscreensaver.te |   52 +++++++++++++++++++++++++++++++++++
>  3 files changed, 87 insertions(+), 0 deletions(-)
>  create mode 100644 policy/modules/apps/xscreensaver.fc
>  create mode 100644 policy/modules/apps/xscreensaver.if
>  create mode 100644 policy/modules/apps/xscreensaver.te
> 
> diff --git a/policy/modules/apps/xscreensaver.fc b/policy/modules/apps/xscreensaver.fc
> new file mode 100644
> index 0000000..64cd5fc
> --- /dev/null
> +++ b/policy/modules/apps/xscreensaver.fc
> @@ -0,0 +1 @@
> +/usr/bin/xscreensaver  -- gen_context(system_u:object_r:xscreensaver_exec_t,s0)
> diff --git a/policy/modules/apps/xscreensaver.if b/policy/modules/apps/xscreensaver.if
> new file mode 100644
> index 0000000..5a1c63c
> --- /dev/null
> +++ b/policy/modules/apps/xscreensaver.if
> @@ -0,0 +1,34 @@
> +## <summary>xscreensaver policy interface</summary>
> +
> +########################################
> +## <summary>
> +##     Role access for xscreensaver
> +## </summary>
> +## <param name="role">
> +##     <summary>
> +##     Role allowed access
> +##     </summary>
> +## </param>
> +## <param name="domain">
> +##     <summary>
> +##     User domain for the role
> +##     </summary>
> +## </param>
> +#
> +interface(`xscreensaver_role',`
> +       gen_require(`
> +               type xscreensaver_t, xscreensaver_exec_t;
> +       ')
> +
> +       role $1 types xscreensaver_t;
> +
> +       domtrans_pattern($2, xscreensaver_exec_t, xscreensaver_t)
> +
> +       allow xscreensaver_t $2:fd use;
> +
> +       # Allow the user domain to signal/ps.
> +       ps_process_pattern($2, xscreensaver_t)
> +       allow $2 xscreensaver_t:process signal_perms;
> +       allow xscreensaver_t $2:process sigchld;
> +
> +')
> diff --git a/policy/modules/apps/xscreensaver.te b/policy/modules/apps/xscreensaver.te
> new file mode 100644
> index 0000000..f4f8b00
> --- /dev/null
> +++ b/policy/modules/apps/xscreensaver.te
> @@ -0,0 +1,52 @@
> +policy_module(xscreensaver, 1.0.0)
> +
> +########################################
> +#
> +# Declarations
> +#
> +
> +type xscreensaver_t;
> +type xscreensaver_exec_t;
> +application_domain(xscreensaver_t, xscreensaver_exec_t)
> +
> +type xscreensaver_tmpfs_t;
> +files_tmpfs_file(xscreensaver_tmpfs_t)
> +ubac_constrained(xscreensaver_tmpfs_t)
> +
> +########################################
> +#
> +# Local policy
> +#
> +auth_use_nsswitch(xscreensaver_t)
> +
> +logging_send_audit_msgs(xscreensaver_t)
> +logging_send_syslog_msg(xscreensaver_t)
> +miscfiles_read_localization(xscreensaver_t)
> +
> +allow xscreensaver_t self:fifo_file rw_fifo_file_perms;
> +allow xscreensaver_t self:process signal;
> +
> +#access to .icons and ~/.xscreensaver
> +userdom_read_user_home_content_files(xscreensaver_t)
> +
> +userdom_use_user_ptys(xscreensaver_t)
> +
> +files_read_usr_files(xscreensaver_t)
> +
> +auth_domtrans_chk_passwd(xscreensaver_t)
> +
> +#/var/run/utmp
> +init_read_utmp(xscreensaver_t)
> +
> +########################################
> +#
> +# X Serveur and co
> +#
> +xserver_user_x_domain_template(xscreensaver, xscreensaver_t, xscreensaver_tmpfs_t)
> +
> +########################################
> +#
> +# process, kernel and /proc /dev /sys
> +#
> +
> +kernel_read_system_state(xscreensaver_t)
> -- 
> 1.6.3.3

-- 
Chris PeBenito
Tresys Technology, LLC
(410) 290-1411 x150

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2009-09-15 13:23 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-09-11 12:21 [refpolicy] SELinux xscreensaver policy support corentin.labbe
2009-09-15 13:23 ` Christopher J. PeBenito

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.