From: sven.vermeulen@siphos.be (Sven Vermeulen) Date: Wed, 25 Jun 2014 21:53:00 +0200 Subject: [refpolicy] [PATCH v2 1/3] Support initrc_t generated pid files with file transition In-Reply-To: <1403725982-10043-1-git-send-email-sven.vermeulen@siphos.be> References: <1403725982-10043-1-git-send-email-sven.vermeulen@siphos.be> Message-ID: <1403725982-10043-2-git-send-email-sven.vermeulen@siphos.be> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com For some daemons, it is the init script that is responsible for creating the PID file of the daemon. As we do not want to update the init SELinux policy module for each of these situations, we need to introduce an interface that can be called by the SELinux policy module of the caller (the daemon domain). The initial suggestion was to transform the init_daemon_run_dir interface, which offers a similar approach for directories in /run, into a class-agnostic interface. Several names have been suggested, such as init_script_spec_run_content or init_script_generic_run_filetrans_spec, but in the end init_daemon_pid_file was used. The interface requires the class(es) on which the file transition should occur, like so: init_daemon_pid_file(xdm_var_run_t, dir, "xdm") init_daemon_pid_file(postgresql_var_run_t, file, "postgresql.pid") Signed-off-by: Sven Vermeulen --- policy/modules/system/init.if | 33 +++++++++++++++++++++++++++++++++ policy/modules/system/init.te | 6 ++++++ 2 files changed, 39 insertions(+) diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if index 4c66daf..a168713 100644 --- a/policy/modules/system/init.if +++ b/policy/modules/system/init.if @@ -412,6 +412,39 @@ interface(`init_ranged_system_domain',` ######################################## ## +## Mark the file type as a daemon pid file, allowing initrc_t +## to create it +## +## +## +## Type to mark as a daemon pid file +## +## +## +## +## Class on which the type is applied +## +## +## +## +## Filename of the file that the init script creates +## +## +# +interface(`init_daemon_pid_file',` + gen_require(` + attribute daemonpidfile; + type initrc_t; + ') + + typeattribute $1 daemonpidfile; + + files_pid_file($1) + files_pid_filetrans(initrc_t, $1, $2, $3) +') + +######################################## +## ## Mark the file type as a daemon run dir, allowing initrc_t ## to create it ## diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index 5dc9bfd..17ecd36 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -23,6 +23,8 @@ attribute init_run_all_scripts_domain; # Mark process types as daemons attribute daemon; +# Mark file type as a daemon pid file +attribute daemonpidfile; # Mark file type as a daemon run directory attribute daemonrundir; @@ -251,6 +253,10 @@ init_telinit(initrc_t) can_exec(initrc_t, init_script_file_type) +create_dirs_pattern(initrc_t, daemonpidfile, daemonpidfile) +manage_files_pattern(initrc_t, daemonpidfile, daemonpidfile) +setattr_dirs_pattern(initrc_t, daemonpidfile, daemonpidfile) + create_dirs_pattern(initrc_t, daemonrundir, daemonrundir) setattr_dirs_pattern(initrc_t, daemonrundir, daemonrundir) -- 1.8.5.5