From 0417386142191a2303cd87dd89ccc5e23ef4cd5c Mon Sep 17 00:00:00 2001 From: Chris PeBenito Date: Mar 17 2010 15:16:25 +0000 Subject: Kernel patch from Dan Walsh. --- diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if index aad46d8..0352a19 100644 --- a/policy/modules/kernel/kernel.if +++ b/policy/modules/kernel/kernel.if @@ -144,6 +144,24 @@ interface(`kernel_sigchld',` ######################################## ## +## Send a kill signal to kernel threads. +## +## +## +## The type of the process sending the signal. +## +## +# +interface(`kernel_kill',` + gen_require(` + type kernel_t; + ') + + allow $1 kernel_t:process sigkill; +') + +######################################## +## ## Send a generic signal to kernel threads. ## ## @@ -624,6 +642,24 @@ interface(`kernel_search_debugfs',` ######################################## ## +## Do not audit attempts to search the kernel debugging filesystem. +## +## +## +## Domain allowed access. +## +## +# +interface(`kernel_dontaudit_search_debugfs',` + gen_require(` + type debugfs_t; + ') + + dontaudit $1 debugfs_t:dir search_dir_perms; +') + +######################################## +## ## Read information from the debugging filesystem. ## ## @@ -1994,6 +2030,25 @@ interface(`kernel_kill_unlabeled',` ######################################## ## +## Mount a kernel unlabeled filesystem. +## +## +## +## The type of the domain mounting the filesystem. +## +## +# +interface(`kernel_mount_unlabeled',` + gen_require(` + type unlabeled_t; + ') + + allow $1 unlabeled_t:filesystem mount; +') + + +######################################## +## ## Send general signals to unlabeled processes. ## ## diff --git a/policy/modules/kernel/kernel.te b/policy/modules/kernel/kernel.te index 400bee5..3ef6a62 100644 --- a/policy/modules/kernel/kernel.te +++ b/policy/modules/kernel/kernel.te @@ -1,5 +1,5 @@ -policy_module(kernel, 1.11.2) +policy_module(kernel, 1.11.3) ######################################## #