commit:     a6a300d4692eb06f7de55d413099b844e142a7b2
Author:     Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
AuthorDate: Fri Aug  8 08:44:15 2014 +0000
Commit:     Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Fri Aug  8 08:44:15 2014 +0000
URL:        
http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=a6a300d4

Introduce files_relabel_all_pidfiles

This interface can be used by domains needing wide relabel privileges
towards the *_var_run_t and var_run_t types.

---
 policy/modules/kernel/files.if | 21 +++++++++++++++++++++
 1 file changed, 21 insertions(+)

diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index efd7836..33076ed 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -6781,3 +6781,24 @@ interface(`files_manage_all_non_security_file_types',`
        manage_sock_files_pattern($1, non_security_file_type, 
non_security_file_type)
 ')
 
+#########################################
+## <summary>
+##     Allow relabeling from and to any pidfile associated type
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`files_relabel_all_pidfiles',`
+       gen_require(`
+               attribute pidfile;
+       ')
+
+       allow $1 pidfile:dir list_dir_perms;
+
+       relabel_dirs_pattern($1, pidfile, pidfile)
+       relabel_files_pattern($1, pidfile, pidfile)
+       relabel_lnk_files_pattern($1, pidfile, pidfile)
+')

Reply via email to