Re: pipefs AVC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/29/2010 01:45 PM, Mr Dash Four wrote:
> 
>> its a fifo_file on device pipefs with name/path: pipe:[11951]
>>
>> This type of internal communication is very common. We use the following
>> policy for this:
>>
>> allow voip_sandbox_t self:fifo_file rw_fifo_file_perms;
>>   
> Is 'rw_fifo_file_perms' custom-defined somewhere?
> 
> All I can see on the fifo_file is { append create execute getattr ioctl
> link lock mounton quotaon read relabelfrom relabelto rename setattr
> swapon unlink write }, of which, 'read' and 'write' are the relevant
> ones. If I do 'allow voip_sandbox_t self:fifo_file { read write }' would
> that be the same thing or am I missing something?
> 

http://oss.tresys.com/projects/refpolicy/browser/policy/support/obj_perm_sets.spt

line 241:

define(`rw_fifo_file_perms',`{ getattr open read write append ioctl lock }')

Basically a set of common permissions to read and write fifo files. Not
quite the same as just  { read write } but not too excessive either.

I always use "macros" where ever possible that will make policy
maintenance much easier.

Attachment: signature.asc
Description: OpenPGP digital signature

--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux