selinux-refpolicy.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [refpolicy] [PATCH] add definition of bpf class and systemd perms
@ 2018-03-21 10:57 Christian Göttsche
  2018-03-21 18:13 ` Chris PeBenito
  0 siblings, 1 reply; 2+ messages in thread
From: Christian Göttsche @ 2018-03-21 10:57 UTC (permalink / raw)
  To: refpolicy

---
 policy/flask/access_vectors   | 9 +++++++++
 policy/flask/security_classes | 2 ++
 policy/modules/system/init.te | 1 +
 3 files changed, 12 insertions(+)

diff --git a/policy/flask/access_vectors b/policy/flask/access_vectors
index 9c9db71bf..b213ce5b0 100644
--- a/policy/flask/access_vectors
+++ b/policy/flask/access_vectors
@@ -1079,3 +1079,12 @@ inherits socket
 
 class smc_socket
 inherits socket
+
+class bpf
+{
+	map_create
+	map_read
+	map_write
+	prog_load
+	prog_run
+}
diff --git a/policy/flask/security_classes b/policy/flask/security_classes
index 3ff1b72d2..2ae343060 100644
--- a/policy/flask/security_classes
+++ b/policy/flask/security_classes
@@ -190,4 +190,6 @@ class smc_socket
 
 class process2
 
+class bpf
+
 # FLASK
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 057c33e87..bd5620457 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -228,6 +228,7 @@ ifdef(`init_systemd',`
 	allow init_t self:netlink_route_socket create_netlink_socket_perms;
 	allow init_t initrc_t:unix_dgram_socket create_socket_perms;
 	allow init_t self:capability2 audit_read;
+	allow init_t self:bpf { map_create map_read map_write prog_load prog_run };
 
 	# for /run/systemd/inaccessible/{chr,blk}
 	allow init_t init_var_run_t:blk_file { create getattr };
-- 
2.16.2

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* [refpolicy] [PATCH] add definition of bpf class and systemd perms
  2018-03-21 10:57 [refpolicy] [PATCH] add definition of bpf class and systemd perms Christian Göttsche
@ 2018-03-21 18:13 ` Chris PeBenito
  0 siblings, 0 replies; 2+ messages in thread
From: Chris PeBenito @ 2018-03-21 18:13 UTC (permalink / raw)
  To: refpolicy

On 03/21/2018 06:57 AM, Christian G?ttsche via refpolicy wrote:
> ---
>   policy/flask/access_vectors   | 9 +++++++++
>   policy/flask/security_classes | 2 ++
>   policy/modules/system/init.te | 1 +
>   3 files changed, 12 insertions(+)
> 
> diff --git a/policy/flask/access_vectors b/policy/flask/access_vectors
> index 9c9db71bf..b213ce5b0 100644
> --- a/policy/flask/access_vectors
> +++ b/policy/flask/access_vectors
> @@ -1079,3 +1079,12 @@ inherits socket
>   
>   class smc_socket
>   inherits socket
> +
> +class bpf
> +{
> +	map_create
> +	map_read
> +	map_write
> +	prog_load
> +	prog_run
> +}
> diff --git a/policy/flask/security_classes b/policy/flask/security_classes
> index 3ff1b72d2..2ae343060 100644
> --- a/policy/flask/security_classes
> +++ b/policy/flask/security_classes
> @@ -190,4 +190,6 @@ class smc_socket
>   
>   class process2
>   
> +class bpf
> +
>   # FLASK
> diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
> index 057c33e87..bd5620457 100644
> --- a/policy/modules/system/init.te
> +++ b/policy/modules/system/init.te
> @@ -228,6 +228,7 @@ ifdef(`init_systemd',`
>   	allow init_t self:netlink_route_socket create_netlink_socket_perms;
>   	allow init_t initrc_t:unix_dgram_socket create_socket_perms;
>   	allow init_t self:capability2 audit_read;
> +	allow init_t self:bpf { map_create map_read map_write prog_load prog_run };
>   
>   	# for /run/systemd/inaccessible/{chr,blk}
>   	allow init_t init_var_run_t:blk_file { create getattr };

Merged.

-- 
Chris PeBenito

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2018-03-21 18:13 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-03-21 10:57 [refpolicy] [PATCH] add definition of bpf class and systemd perms Christian Göttsche
2018-03-21 18:13 ` Chris PeBenito

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).