SELinuxPolicy
Line 20: | Line 20: | ||
restore permission to itself. | restore permission to itself. | ||
− | < | + | <pre> |
− | + | ||
cd /usr/share/selinux | cd /usr/share/selinux | ||
cp -r devel cr | cp -r devel cr | ||
Line 49: | Line 48: | ||
make | make | ||
semodule -i cr.pp | semodule -i cr.pp | ||
− | </ | + | </pre> |
− | + |
Latest revision as of 20:29, 4 March 2010
For checkpoint/restart we introduce a new 'restore' permission to a few SELinux object classes: process, file, ipc, and msg.
Note that for the most part you can simply not use -k and not need the restore permissions. However if the application was checkpointed with non-empty sysvipc message queues, then msg:restore permission will still be needed. (This will probably change.)
When restarting a process, you can specify the '-k' flag to request the checkpointed SELinux labels be restored. Doing so requires that the domain in which /bin/restart is running have the class:restore permission for the checkpointed label.
To do so, you can do one of two things. First, you can compile a policy which defaults to 'allow' for unknown permissions. See the UNK_PERMS variable in refpolicy/build.conf. Alternatively, you can recompile your SELinux policy to be aware of the restore labels. You'll want to edit refpolicy-$version/policy/flask/access_vectors to add 'restore' to the common ipc, class file, class ipc, and class msg. After recompiling and installing, you'll need to go to /usr/share/selinux/devel/include/support and edit all_perms.spt to add restore to all_file_perms, all_process_perms, all_ipc_perms, and all_msg_perms.
Of course the above should all be done in upstream policy when checkpoint/restart hits upstream kernel.
You can then compile a small module, such as the one below, which gives unconfined_t restore permission to itself.
cd /usr/share/selinux cp -r devel cr cd cr rm example* touch cr.if touch cr.fc cat > cr.te << EOF policy_module(cr,1.0.0) ######################################## # # Declarations # gen_require(` type unconfined_t; ') allow unconfined_t unconfined_t:process restore; allow unconfined_t unconfined_t:ipc restore; allow unconfined_t unconfined_t:file restore; allow unconfined_t unconfined_t:file fown_restore; allow unconfined_t unconfined_t:msg restore; EOF make semodule -i cr.pp