From: Laurent Bigonville <[email protected]>
---
policy/modules/kernel/kernel.if | 40 ++++++++++++++++++++++++++++++++++++++++
1 file changed, 40 insertions(+)
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
index f1130d1..e0f23ec 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -3323,3 +3323,43 @@ interface(`kernel_unconfined',`
typeattribute $1 kern_unconfined;
kernel_load_module($1)
')
+
+########################################
+## <summary>
+## Read virtual memory overcommit sysctl.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <rolecap/>
+#
+interface(`kernel_read_vm_overcommit_sysctl',`
+ gen_require(`
+ type sysctl_vm_overcommit_t;
+ ')
+
+ kernel_search_vm_sysctl($1)
+ allow $1 sysctl_vm_overcommit_t:file read_file_perms;
+')
+
+########################################
+## <summary>
+## Read and write virtual memory overcommit sysctl.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <rolecap/>
+#
+interface(`kernel_rw_vm_overcommit_sysctl',`
+ gen_require(`
+ type sysctl_vm_overcommit_t;
+ ')
+
+ kernel_search_vm_sysctl($1)
+ allow $1 sysctl_vm_overcommit_t:file rw_file_perms;
+')
--
2.6.4
Le 11/12/15 14:03, Laurent Bigonville a ?crit :
> From: Laurent Bigonville <[email protected]>
>
> ---
> policy/modules/kernel/kernel.if | 40 ++++++++++++++++++++++++++++++++++++++++
> 1 file changed, 40 insertions(+)
>
> diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
> index f1130d1..e0f23ec 100644
> --- a/policy/modules/kernel/kernel.if
> +++ b/policy/modules/kernel/kernel.if
> @@ -3323,3 +3323,43 @@ interface(`kernel_unconfined',`
> typeattribute $1 kern_unconfined;
> kernel_load_module($1)
> ')
> +
> +########################################
> +## <summary>
> +## Read virtual memory overcommit sysctl.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +## <rolecap/>
Mhh I guess the rolecap should be removed?
> +#
> +interface(`kernel_read_vm_overcommit_sysctl',`
> + gen_require(`
> + type sysctl_vm_overcommit_t;
> + ')
> +
> + kernel_search_vm_sysctl($1)
> + allow $1 sysctl_vm_overcommit_t:file read_file_perms;
> +')
> +
> +########################################
> +## <summary>
> +## Read and write virtual memory overcommit sysctl.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +## <rolecap/>
> +#
> +interface(`kernel_rw_vm_overcommit_sysctl',`
> + gen_require(`
> + type sysctl_vm_overcommit_t;
> + ')
> +
> + kernel_search_vm_sysctl($1)
> + allow $1 sysctl_vm_overcommit_t:file rw_file_perms;
> +')
On 12/11/2015 8:03 AM, Laurent Bigonville wrote:
> From: Laurent Bigonville <[email protected]>
>
> ---
> policy/modules/kernel/kernel.if | 40 ++++++++++++++++++++++++++++++++++++++++
> 1 file changed, 40 insertions(+)
>
> diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
> index f1130d1..e0f23ec 100644
> --- a/policy/modules/kernel/kernel.if
> +++ b/policy/modules/kernel/kernel.if
> @@ -3323,3 +3323,43 @@ interface(`kernel_unconfined',`
> typeattribute $1 kern_unconfined;
> kernel_load_module($1)
> ')
> +
> +########################################
> +## <summary>
> +## Read virtual memory overcommit sysctl.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +## <rolecap/>
> +#
> +interface(`kernel_read_vm_overcommit_sysctl',`
> + gen_require(`
> + type sysctl_vm_overcommit_t;
> + ')
> +
> + kernel_search_vm_sysctl($1)
> + allow $1 sysctl_vm_overcommit_t:file read_file_perms;
> +')
> +
> +########################################
> +## <summary>
> +## Read and write virtual memory overcommit sysctl.
> +## </summary>
> +## <param name="domain">
> +## <summary>
> +## Domain allowed access.
> +## </summary>
> +## </param>
> +## <rolecap/>
> +#
> +interface(`kernel_rw_vm_overcommit_sysctl',`
> + gen_require(`
> + type sysctl_vm_overcommit_t;
> + ')
> +
> + kernel_search_vm_sysctl($1)
> + allow $1 sysctl_vm_overcommit_t:file rw_file_perms;
> +')
Merged.
--
Chris PeBenito
Tresys Technology, LLC
http://www.tresys.com | oss.tresys.com