From: sven.vermeulen@siphos.be (Sven Vermeulen) Date: Tue, 30 Oct 2012 22:51:54 +0100 Subject: [refpolicy] [PATCH 2/4] Introduce files_manage_all_pids interface In-Reply-To: <1351633916-29606-1-git-send-email-sven.vermeulen@siphos.be> References: <1351633916-29606-1-git-send-email-sven.vermeulen@siphos.be> Message-ID: <1351633916-29606-3-git-send-email-sven.vermeulen@siphos.be> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com This interface will be used by domains that need to manage the various pidfile content (*_var_run_t). Signed-off-by: Sven Vermeulen --- policy/modules/kernel/files.if | 21 +++++++++++++++++++++ 1 files changed, 21 insertions(+), 0 deletions(-) diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if index 54c6dbd..7c4b4ae 100644 --- a/policy/modules/kernel/files.if +++ b/policy/modules/kernel/files.if @@ -6191,6 +6191,27 @@ interface(`files_dontaudit_getattr_all_pids',` ######################################## ## +## Create, read, write and delete all +## var_run (pid) content +## +## +## +## Domain alloed access. +## +## +# +interface(`files_manage_all_pids',` + gen_require(` + attribute pidfile; + ') + + manage_dirs_pattern($1, pidfile, pidfile) + manage_files_pattern($1, pidfile, pidfile) + manage_lnk_files_pattern($1, pidfile, pidfile) +') + +######################################## +## ## Do not audit attempts to write to daemon runtime data files. ## ## -- 1.7.8.6