Dominick Grift a8eb0d2
## <summary>Service for reporting kernel oopses to kerneloops.org.</summary>
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Execute a domain transition to run kerneloops.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
Chris PeBenito 9401ae1
## <summary>
Chris PeBenito 9401ae1
##	Domain allowed to transition.
Chris PeBenito 9401ae1
## </summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`kerneloops_domtrans',`
1ec3d1a
	gen_require(`
Dominick Grift a8eb0d2
		type kerneloops_t, kerneloops_exec_t;
1ec3d1a
	')
1ec3d1a
Dominick Grift a8eb0d2
	corecmd_search_bin($1)
1ec3d1a
	domtrans_pattern($1, kerneloops_exec_t, kerneloops_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
1ec3d1a
##	Send and receive messages from
1ec3d1a
##	kerneloops over dbus.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`kerneloops_dbus_chat',`
1ec3d1a
	gen_require(`
1ec3d1a
		type kerneloops_t;
1ec3d1a
		class dbus send_msg;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 kerneloops_t:dbus send_msg;
1ec3d1a
	allow kerneloops_t $1:dbus send_msg;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
Dominick Grift a8eb0d2
##	Do not audit attempts to Send and
Dominick Grift a8eb0d2
##	receive messages from kerneloops
Dominick Grift a8eb0d2
##	over dbus.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain to not audit.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`kerneloops_dontaudit_dbus_chat',`
1ec3d1a
	gen_require(`
1ec3d1a
		type kerneloops_t;
1ec3d1a
		class dbus send_msg;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	dontaudit $1 kerneloops_t:dbus send_msg;
1ec3d1a
	dontaudit kerneloops_t $1:dbus send_msg;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
Dominick Grift a8eb0d2
##	Create, read, write, and delete
Dominick Grift a8eb0d2
##	kerneloops temporary files.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
#
1ec3d1a
interface(`kerneloops_manage_tmp_files',`
1ec3d1a
	gen_require(`
1ec3d1a
		type kerneloops_tmp_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	files_search_tmp($1)
Dominick Grift a8eb0d2
	allow $1 kerneloops_tmp_t:file manage_file_perms;
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
## <summary>
Dominick Grift a8eb0d2
##	All of the rules required to
Dominick Grift a8eb0d2
##	administrate an kerneloops environment.
1ec3d1a
## </summary>
1ec3d1a
## <param name="domain">
1ec3d1a
##	<summary>
1ec3d1a
##	Domain allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <param name="role">
1ec3d1a
##	<summary>
Dominick Grift a8eb0d2
##	Role allowed access.
1ec3d1a
##	</summary>
1ec3d1a
## </param>
1ec3d1a
## <rolecap/>
1ec3d1a
#
1ec3d1a
interface(`kerneloops_admin',`
1ec3d1a
	gen_require(`
1ec3d1a
		type kerneloops_t, kerneloops_initrc_exec_t, kerneloops_tmp_t;
4371811
		type kerneloops_initrc_exec_t;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	allow $1 kerneloops_t:process signal_perms;
1ec3d1a
	ps_process_pattern($1, kerneloops_t)
521831c
1ec3d1a
	tunable_policy(`deny_ptrace',`',`
1ec3d1a
		allow $1 kerneloops_t:process ptrace;
1ec3d1a
	')
1ec3d1a
1ec3d1a
	init_labeled_script_domtrans($1, kerneloops_initrc_exec_t)
1ec3d1a
	domain_system_change_exemption($1)
1ec3d1a
	role_transition $2 kerneloops_initrc_exec_t system_r;
1ec3d1a
	allow $2 system_r;
1ec3d1a
Dominick Grift a8eb0d2
	files_search_tmp($1)
1ec3d1a
	admin_pattern($1, kerneloops_tmp_t)
1ec3d1a
')