append_lnk_files_pattern

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Why do we have the pattern append_lnk_files_pattern?  It's not used anywhere 
in refpolicy along with write_lnk_files_pattern.  The sesearch command shows 
only the following uses of append permission for lnk_file.

# sesearch -A -c lnk_file -p append
allow files_unconfined_type file_type:lnk_file { append create execmod execute 
getattr ioctl link lock map mounton open quotaon read relabelfrom relabelto 
rename setattr unlink watch write };
allow filesystem_unconfined_type filesystem_type:lnk_file { append create 
execmod execute getattr ioctl link lock map mounton open quotaon read 
relabelfrom relabelto rename setattr unlink watch write };
allow kern_unconfined proc_type:lnk_file { append create execmod execute 
getattr ioctl link lock map mounton open quotaon read relabelfrom relabelto 
rename setattr unlink watch write };
allow kern_unconfined unlabeled_t:lnk_file { append create execmod execute 
getattr ioctl link lock map mounton open quotaon read relabelfrom relabelto 
rename setattr unlink watch write };

I guess that the kern_unconfined stuff is related to the magic symlinks in /
proc/PID directories.  Is there any other way where a symlink can be appended?

Does it make sense to have the append macros and the write macros with append 
permission included?

-- 
My Main Blog         http://etbe.coker.com.au/
My Documents Blog    http://doc.coker.com.au/






[Index of Archives]     [AMD Graphics]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux