commit: 85b4cc48c489b4f2cb3591d0650d0182974aa691 Author: Jason Zaman <jason <AT> perfinion <DOT> com> AuthorDate: Sat Oct 25 19:19:22 2014 +0000 Commit: Jason Zaman <gentoo <AT> perfinion <DOT> com> CommitDate: Sat Oct 25 19:19:22 2014 +0000 URL: http://sources.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=85b4cc48
regenerated corenetwork.te after adding adb ports --- policy/modules/kernel/corenetwork.if | 443 +++++++++++++++++++++++++++++++++++ policy/modules/kernel/corenetwork.te | 7 + 2 files changed, 450 insertions(+) diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if index 5431c56..3385d83 100644 --- a/policy/modules/kernel/corenetwork.if +++ b/policy/modules/kernel/corenetwork.if @@ -3161,6 +3161,449 @@ interface(`corenet_unconfined',` ######################################## ## <summary> +## Send and receive TCP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="both" weight="10"/> +# +interface(`corenet_tcp_sendrecv_adb_port',` + gen_require(` + type adb_port_t; + ') + + allow $1 adb_port_t:tcp_socket { send_msg recv_msg }; +') + +######################################## +## <summary> +## Send UDP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="write" weight="10"/> +# +interface(`corenet_udp_send_adb_port',` + gen_require(` + type adb_port_t; + ') + + allow $1 adb_port_t:udp_socket send_msg; +') + +######################################## +## <summary> +## Do not audit attempts to send UDP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_udp_send_adb_port',` + gen_require(` + type adb_port_t; + ') + + dontaudit $1 adb_port_t:udp_socket send_msg; +') + +######################################## +## <summary> +## Receive UDP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="read" weight="10"/> +# +interface(`corenet_udp_receive_adb_port',` + gen_require(` + type adb_port_t; + ') + + allow $1 adb_port_t:udp_socket recv_msg; +') + +######################################## +## <summary> +## Do not audit attempts to receive UDP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_udp_receive_adb_port',` + gen_require(` + type adb_port_t; + ') + + dontaudit $1 adb_port_t:udp_socket recv_msg; +') + +######################################## +## <summary> +## Send and receive UDP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="both" weight="10"/> +# +interface(`corenet_udp_sendrecv_adb_port',` + corenet_udp_send_adb_port($1) + corenet_udp_receive_adb_port($1) +') + +######################################## +## <summary> +## Do not audit attempts to send and receive +## UDP traffic on the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_udp_sendrecv_adb_port',` + corenet_dontaudit_udp_send_adb_port($1) + corenet_dontaudit_udp_receive_adb_port($1) +') + +######################################## +## <summary> +## Bind TCP sockets to the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_tcp_bind_adb_port',` + gen_require(` + type adb_port_t; + ') + + allow $1 adb_port_t:tcp_socket name_bind; + +') + +######################################## +## <summary> +## Bind UDP sockets to the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_udp_bind_adb_port',` + gen_require(` + type adb_port_t; + ') + + allow $1 adb_port_t:udp_socket name_bind; + +') + +######################################## +## <summary> +## Make a TCP connection to the adb port. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`corenet_tcp_connect_adb_port',` + gen_require(` + type adb_port_t; + ') + + allow $1 adb_port_t:tcp_socket name_connect; +') + + +######################################## +## <summary> +## Send adb_client packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="write" weight="10"/> +# +interface(`corenet_send_adb_client_packets',` + gen_require(` + type adb_client_packet_t; + ') + + allow $1 adb_client_packet_t:packet send; +') + +######################################## +## <summary> +## Do not audit attempts to send adb_client packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_send_adb_client_packets',` + gen_require(` + type adb_client_packet_t; + ') + + dontaudit $1 adb_client_packet_t:packet send; +') + +######################################## +## <summary> +## Receive adb_client packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="read" weight="10"/> +# +interface(`corenet_receive_adb_client_packets',` + gen_require(` + type adb_client_packet_t; + ') + + allow $1 adb_client_packet_t:packet recv; +') + +######################################## +## <summary> +## Do not audit attempts to receive adb_client packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_receive_adb_client_packets',` + gen_require(` + type adb_client_packet_t; + ') + + dontaudit $1 adb_client_packet_t:packet recv; +') + +######################################## +## <summary> +## Send and receive adb_client packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="both" weight="10"/> +# +interface(`corenet_sendrecv_adb_client_packets',` + corenet_send_adb_client_packets($1) + corenet_receive_adb_client_packets($1) +') + +######################################## +## <summary> +## Do not audit attempts to send and receive adb_client packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_sendrecv_adb_client_packets',` + corenet_dontaudit_send_adb_client_packets($1) + corenet_dontaudit_receive_adb_client_packets($1) +') + +######################################## +## <summary> +## Relabel packets to adb_client the packet type. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`corenet_relabelto_adb_client_packets',` + gen_require(` + type adb_client_packet_t; + ') + + allow $1 adb_client_packet_t:packet relabelto; +') + + +######################################## +## <summary> +## Send adb_server packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="write" weight="10"/> +# +interface(`corenet_send_adb_server_packets',` + gen_require(` + type adb_server_packet_t; + ') + + allow $1 adb_server_packet_t:packet send; +') + +######################################## +## <summary> +## Do not audit attempts to send adb_server packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_send_adb_server_packets',` + gen_require(` + type adb_server_packet_t; + ') + + dontaudit $1 adb_server_packet_t:packet send; +') + +######################################## +## <summary> +## Receive adb_server packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="read" weight="10"/> +# +interface(`corenet_receive_adb_server_packets',` + gen_require(` + type adb_server_packet_t; + ') + + allow $1 adb_server_packet_t:packet recv; +') + +######################################## +## <summary> +## Do not audit attempts to receive adb_server packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_receive_adb_server_packets',` + gen_require(` + type adb_server_packet_t; + ') + + dontaudit $1 adb_server_packet_t:packet recv; +') + +######################################## +## <summary> +## Send and receive adb_server packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +## <infoflow type="both" weight="10"/> +# +interface(`corenet_sendrecv_adb_server_packets',` + corenet_send_adb_server_packets($1) + corenet_receive_adb_server_packets($1) +') + +######################################## +## <summary> +## Do not audit attempts to send and receive adb_server packets. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +## <infoflow type="none"/> +# +interface(`corenet_dontaudit_sendrecv_adb_server_packets',` + corenet_dontaudit_send_adb_server_packets($1) + corenet_dontaudit_receive_adb_server_packets($1) +') + +######################################## +## <summary> +## Relabel packets to adb_server the packet type. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed access. +## </summary> +## </param> +# +interface(`corenet_relabelto_adb_server_packets',` + gen_require(` + type adb_server_packet_t; + ') + + allow $1 adb_server_packet_t:packet relabelto; +') + + + + +######################################## +## <summary> ## Send and receive TCP traffic on the afs_bos port. ## </summary> ## <param name="domain"> diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te index f1830c7..1bbf3c5 100644 --- a/policy/modules/kernel/corenetwork.te +++ b/policy/modules/kernel/corenetwork.te @@ -78,6 +78,13 @@ type hi_reserved_port_t, port_type, reserved_port_type, rpc_port_type; type server_packet_t, packet_type, server_packet_type; +type adb_port_t, port_type, defined_port_type; +type adb_client_packet_t, packet_type, client_packet_type; +type adb_server_packet_t, packet_type, server_packet_type; +typeattribute adb_port_t unreserved_port_type; +portcon tcp 5037 gen_context(system_u:object_r:adb_port_t,s0) + + type afs_bos_port_t, port_type, defined_port_type; type afs_bos_client_packet_t, packet_type, client_packet_type; type afs_bos_server_packet_t, packet_type, server_packet_type;