Re: [RFC][PATCH] selinux: Remove unused permission definitions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Jun 14, 2015 at 07:33:49AM +0200, Dominick Grift wrote:
> On Wed, May 27, 2015 at 11:03:25AM -0400, Stephen Smalley wrote:
> > Remove unused permission definitions from SELinux.
> > Many of these were only ever used in pre-mainline
> > versions of SELinux, prior to Linux 2.6.0.  Some of them
> > were used in the legacy network or compat_net=1 checks
> > that were disabled by default in Linux 2.6.18 and
> > fully removed in Linux 2.6.30.
> > 
> > Permissions never used in mainline Linux:
> > file swapon
> 
> I think that blk_file (fixed disk) swapon is actually used in my policy by fstools (i think swapon command)

Nah, Probably added to my policy by assumption (Sometimes i just can't resist the temptation to assume..)

We'll see .. i won't be removing these permissions from my policy until Fedora 23 (Kernel 4.2) at the least anyway's

> 
> > filesystem transition
> > tcp_socket { connectto newconn acceptfrom }
> > node enforce_dest
> > unix_stream_socket { newconn acceptfrom }
> > 
> > Legacy network checks, removed in 2.6.30:
> > socket { recv_msg send_msg }
> > node { tcp_recv tcp_send udp_recv udp_send rawip_recv rawip_send dccp_recv dccp_send }
> > netif { tcp_recv tcp_send udp_recv udp_send rawip_recv rawip_send dccp_recv dccp_send }
> > 
> > Signed-off-by: Stephen Smalley <sds@xxxxxxxxxxxxx>
> > ---
> >  security/selinux/include/classmap.h | 22 ++++++++--------------
> >  1 file changed, 8 insertions(+), 14 deletions(-)
> > 
> > diff --git a/security/selinux/include/classmap.h b/security/selinux/include/classmap.h
> > index 1d8b924..5a4eef5 100644
> > --- a/security/selinux/include/classmap.h
> > +++ b/security/selinux/include/classmap.h
> > @@ -2,12 +2,12 @@
> >      "getattr", "setattr", "lock", "relabelfrom", "relabelto", "append"
> >  
> >  #define COMMON_FILE_PERMS COMMON_FILE_SOCK_PERMS, "unlink", "link", \
> > -    "rename", "execute", "swapon", "quotaon", "mounton", "audit_access", \
> > +    "rename", "execute", "quotaon", "mounton", "audit_access", \
> >      "open", "execmod"
> >  
> >  #define COMMON_SOCK_PERMS COMMON_FILE_SOCK_PERMS, "bind", "connect", \
> >      "listen", "accept", "getopt", "setopt", "shutdown", "recvfrom",  \
> > -    "sendto", "recv_msg", "send_msg", "name_bind"
> > +    "sendto", "name_bind"
> >  
> >  #define COMMON_IPC_PERMS "create", "destroy", "getattr", "setattr", "read", \
> >  	    "write", "associate", "unix_read", "unix_write"
> > @@ -44,7 +44,7 @@ struct security_class_mapping secclass_map[] = {
> >  	    "audit_control", "setfcap", NULL } },
> >  	{ "filesystem",
> >  	  { "mount", "remount", "unmount", "getattr",
> > -	    "relabelfrom", "relabelto", "transition", "associate", "quotamod",
> > +	    "relabelfrom", "relabelto", "associate", "quotamod",
> >  	    "quotaget", NULL } },
> >  	{ "file",
> >  	  { COMMON_FILE_PERMS,
> > @@ -67,7 +67,7 @@ struct security_class_mapping secclass_map[] = {
> >  	  { COMMON_SOCK_PERMS, NULL } },
> >  	{ "tcp_socket",
> >  	  { COMMON_SOCK_PERMS,
> > -	    "connectto", "newconn", "acceptfrom", "node_bind", "name_connect",
> > +	    "node_bind", "name_connect",
> >  	    NULL } },
> >  	{ "udp_socket",
> >  	  { COMMON_SOCK_PERMS,
> > @@ -76,13 +76,9 @@ struct security_class_mapping secclass_map[] = {
> >  	  { COMMON_SOCK_PERMS,
> >  	    "node_bind", NULL } },
> >  	{ "node",
> > -	  { "tcp_recv", "tcp_send", "udp_recv", "udp_send",
> > -	    "rawip_recv", "rawip_send", "enforce_dest",
> > -	    "dccp_recv", "dccp_send", "recvfrom", "sendto", NULL } },
> > +	  { "recvfrom", "sendto", NULL } },
> >  	{ "netif",
> > -	  {  "tcp_recv", "tcp_send", "udp_recv", "udp_send",
> > -	     "rawip_recv", "rawip_send", "dccp_recv", "dccp_send",
> > -	     "ingress", "egress", NULL } },
> > +	  { "ingress", "egress", NULL } },
> >  	{ "netlink_socket",
> >  	  { COMMON_SOCK_PERMS, NULL } },
> >  	{ "packet_socket",
> > @@ -90,11 +86,9 @@ struct security_class_mapping secclass_map[] = {
> >  	{ "key_socket",
> >  	  { COMMON_SOCK_PERMS, NULL } },
> >  	{ "unix_stream_socket",
> > -	  { COMMON_SOCK_PERMS, "connectto", "newconn", "acceptfrom", NULL
> > -	  } },
> > +	  { COMMON_SOCK_PERMS, "connectto", NULL } },
> >  	{ "unix_dgram_socket",
> > -	  { COMMON_SOCK_PERMS, NULL
> > -	  } },
> > +	  { COMMON_SOCK_PERMS, NULL } },
> >  	{ "sem",
> >  	  { COMMON_IPC_PERMS, NULL } },
> >  	{ "msg", { "send", "receive", NULL } },
> > -- 
> > 2.1.0
> > 
> > _______________________________________________
> > Selinux mailing list
> > Selinux@xxxxxxxxxxxxx
> > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> > To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.
> 
> -- 
> 02DFF788
> 4D30 903A 1CF3 B756 FB48  1514 3148 83A2 02DF F788
> http://keys.gnupg.net/pks/lookup?op=vindex&search=0x314883A202DFF788
> Dominick Grift



-- 
02DFF788
4D30 903A 1CF3 B756 FB48  1514 3148 83A2 02DF F788
http://keys.gnupg.net/pks/lookup?op=vindex&search=0x314883A202DFF788
Dominick Grift

Attachment: pgp30DGUZ4Ziv.pgp
Description: PGP signature

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux