2018-03-21 10:57:45

by Christian Göttsche

[permalink] [raw]
Subject: [refpolicy] [PATCH] add definition of bpf class and systemd perms

---
policy/flask/access_vectors | 9 +++++++++
policy/flask/security_classes | 2 ++
policy/modules/system/init.te | 1 +
3 files changed, 12 insertions(+)

diff --git a/policy/flask/access_vectors b/policy/flask/access_vectors
index 9c9db71bf..b213ce5b0 100644
--- a/policy/flask/access_vectors
+++ b/policy/flask/access_vectors
@@ -1079,3 +1079,12 @@ inherits socket

class smc_socket
inherits socket
+
+class bpf
+{
+ map_create
+ map_read
+ map_write
+ prog_load
+ prog_run
+}
diff --git a/policy/flask/security_classes b/policy/flask/security_classes
index 3ff1b72d2..2ae343060 100644
--- a/policy/flask/security_classes
+++ b/policy/flask/security_classes
@@ -190,4 +190,6 @@ class smc_socket

class process2

+class bpf
+
# FLASK
diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
index 057c33e87..bd5620457 100644
--- a/policy/modules/system/init.te
+++ b/policy/modules/system/init.te
@@ -228,6 +228,7 @@ ifdef(`init_systemd',`
allow init_t self:netlink_route_socket create_netlink_socket_perms;
allow init_t initrc_t:unix_dgram_socket create_socket_perms;
allow init_t self:capability2 audit_read;
+ allow init_t self:bpf { map_create map_read map_write prog_load prog_run };

# for /run/systemd/inaccessible/{chr,blk}
allow init_t init_var_run_t:blk_file { create getattr };
--
2.16.2


2018-03-21 18:13:34

by Chris PeBenito

[permalink] [raw]
Subject: [refpolicy] [PATCH] add definition of bpf class and systemd perms

On 03/21/2018 06:57 AM, Christian G?ttsche via refpolicy wrote:
> ---
> policy/flask/access_vectors | 9 +++++++++
> policy/flask/security_classes | 2 ++
> policy/modules/system/init.te | 1 +
> 3 files changed, 12 insertions(+)
>
> diff --git a/policy/flask/access_vectors b/policy/flask/access_vectors
> index 9c9db71bf..b213ce5b0 100644
> --- a/policy/flask/access_vectors
> +++ b/policy/flask/access_vectors
> @@ -1079,3 +1079,12 @@ inherits socket
>
> class smc_socket
> inherits socket
> +
> +class bpf
> +{
> + map_create
> + map_read
> + map_write
> + prog_load
> + prog_run
> +}
> diff --git a/policy/flask/security_classes b/policy/flask/security_classes
> index 3ff1b72d2..2ae343060 100644
> --- a/policy/flask/security_classes
> +++ b/policy/flask/security_classes
> @@ -190,4 +190,6 @@ class smc_socket
>
> class process2
>
> +class bpf
> +
> # FLASK
> diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te
> index 057c33e87..bd5620457 100644
> --- a/policy/modules/system/init.te
> +++ b/policy/modules/system/init.te
> @@ -228,6 +228,7 @@ ifdef(`init_systemd',`
> allow init_t self:netlink_route_socket create_netlink_socket_perms;
> allow init_t initrc_t:unix_dgram_socket create_socket_perms;
> allow init_t self:capability2 audit_read;
> + allow init_t self:bpf { map_create map_read map_write prog_load prog_run };
>
> # for /run/systemd/inaccessible/{chr,blk}
> allow init_t init_var_run_t:blk_file { create getattr };

Merged.

--
Chris PeBenito