Browse Source

Bug 594745 - Get rid of dirsrv_lib_t label

The dirsrv_lib_t label used to label the dirsrv libraries is causing
AVCs to occur from prelink.  It turns out that the dirsrv_lib_t
label is not really necessary.  We can just allow our libraries to
use the default label of lib_t.
Nathan Kinder 15 năm trước cách đây
mục cha
commit
b0b88c2096
3 tập tin đã thay đổi với 0 bổ sung33 xóa
  1. 0 2
      selinux/dirsrv.fc.in
  2. 0 22
      selinux/dirsrv.if
  3. 0 9
      selinux/dirsrv.te

+ 0 - 2
selinux/dirsrv.fc.in

@@ -8,8 +8,6 @@
 @sbindir@/ldap-agent-bin		--	gen_context(system_u:object_r:dirsrv_snmp_exec_t,s0)
 @sbindir@/start-dirsrv			--	gen_context(system_u:object_r:initrc_exec_t,s0)
 @sbindir@/restart-dirsrv		--	gen_context(system_u:object_r:initrc_exec_t,s0)
-@serverdir@					gen_context(system_u:object_r:dirsrv_lib_t,s0)
-@serverdir@(/.*)				gen_context(system_u:object_r:dirsrv_lib_t,s0)
 @localstatedir@/run/@package_name@		gen_context(system_u:object_r:dirsrv_var_run_t,s0)
 @localstatedir@/run/@package_name@(/.*)		gen_context(system_u:object_r:dirsrv_var_run_t,s0)
 @localstatedir@/run/ldap-agent.pid		gen_context(system_u:object_r:dirsrv_snmp_var_run_t,s0)

+ 0 - 22
selinux/dirsrv.if

@@ -172,28 +172,6 @@ interface(`dirsrv_manage_config',`
 	allow $1 dirsrv_config_t:file manage_file_perms;
 ')
 
-########################################
-## <summary>
-##      Read and exec dirsrv lib files.
-## </summary>
-## <param name="domain">
-##      <summary>
-##      Domain allowed access.
-##      </summary>
-## </param>
-#
-interface(`dirsrv_exec_lib',`
-	gen_require(`
-		type dirsrv_lib_t;
-	')
-
-	allow $1 dirsrv_lib_t:dir search_dir_perms;
-	allow $1 dirsrv_lib_t:file exec_file_perms;
-	allow $1 dirsrv_lib_t:link_file exec_file_perms;
-	# Not all platforms include ioctl in exec_file_perms
-	allow $1 dirsrv_lib_t:file ioctl;
-')
-
 ########################################
 ## <summary>
 ##      Read dirsrv share files.

+ 0 - 9
selinux/dirsrv.te

@@ -25,10 +25,6 @@ type dirsrv_snmp_exec_t;
 domain_type(dirsrv_snmp_t)
 init_daemon_domain(dirsrv_snmp_t, dirsrv_snmp_exec_t)
 
-# dynamic libraries
-type dirsrv_lib_t;
-files_type(dirsrv_lib_t)
-
 # var/lib files
 type dirsrv_var_lib_t;
 files_type(dirsrv_var_lib_t)
@@ -93,11 +89,6 @@ allow dirsrv_t self:sem all_sem_perms;
 manage_files_pattern(dirsrv_t, dirsrv_tmpfs_t, dirsrv_tmpfs_t)
 fs_tmpfs_filetrans(dirsrv_t, dirsrv_tmpfs_t, file)
 
-# dynamic libraries
-allow dirsrv_t dirsrv_lib_t:file exec_file_perms;
-allow dirsrv_t dirsrv_lib_t:lnk_file read_lnk_file_perms;
-allow dirsrv_t dirsrv_lib_t:dir search_dir_perms;
-
 # var/lib files for dirsrv
 manage_files_pattern(dirsrv_t, dirsrv_var_lib_t, dirsrv_var_lib_t)
 manage_dirs_pattern(dirsrv_t, dirsrv_var_lib_t, dirsrv_var_lib_t)