1ec3d1a
policy_module(sandbox,1.0.0)
1ec3d1a
1ec3d1a
attribute sandbox_domain;
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# Declarations
1ec3d1a
#
1ec3d1a
sandbox_domain_template(sandbox)
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# sandbox local policy
1ec3d1a
#
1ec3d1a
allow sandbox_domain self:process { getattr signal_perms getsched setsched setpgid execstack };
1ec3d1a
tunable_policy(`deny_execmem',`',`
1ec3d1a
	allow sandbox_domain self:process execmem;
1ec3d1a
')
1ec3d1a
1ec3d1a
allow sandbox_domain self:fifo_file manage_file_perms;
1ec3d1a
allow sandbox_domain self:sem create_sem_perms;
1ec3d1a
allow sandbox_domain self:shm create_shm_perms;
1ec3d1a
allow sandbox_domain self:msgq create_msgq_perms;
1ec3d1a
allow sandbox_domain self:unix_stream_socket create_stream_socket_perms;
1ec3d1a
allow sandbox_domain self:unix_dgram_socket { sendto create_socket_perms };
1ec3d1a
dontaudit sandbox_domain self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
1ec3d1a
1ec3d1a
dev_rw_all_inherited_chr_files(sandbox_domain)
1ec3d1a
dev_rw_all_inherited_blk_files(sandbox_domain)
1ec3d1a
9e6ba0c
# sandbox_file_t was moved to sandboxX.te
9e6ba0c
optional_policy(`
9e6ba0c
	sandbox_exec_file(sandbox_domain)
9e6ba0c
	sandbox_manage_content(sandbox_domain)
9e6ba0c
	sandbox_dontaudit_mounton(sandbox_domain)
96ca8cc
	sandbox_manage_tmpfs_files(sandbox_domain)
9e6ba0c
')
1ec3d1a
1ec3d1a
gen_require(`
0c4eb28
	type usr_t, lib_t, locale_t, device_t;
1ec3d1a
	type var_t, var_run_t, rpm_log_t, locale_t;
1ec3d1a
	attribute exec_type, configfile;
1ec3d1a
')
1ec3d1a
1ec3d1a
kernel_dontaudit_read_system_state(sandbox_domain)
1ec3d1a
1ec3d1a
corecmd_exec_all_executables(sandbox_domain)
1ec3d1a
6cfdf6a
dev_dontaudit_getattr_all(sandbox_domain)
6cfdf6a
1ec3d1a
files_rw_all_inherited_files(sandbox_domain, -exec_type -configfile -usr_t -lib_t -locale_t -var_t -var_run_t -device_t -rpm_log_t )
1ec3d1a
files_entrypoint_all_files(sandbox_domain)
1ec3d1a
1ec3d1a
files_read_config_files(sandbox_domain)
1ec3d1a
files_read_var_files(sandbox_domain)
1ec3d1a
files_dontaudit_search_all_dirs(sandbox_domain)
1ec3d1a
6cfdf6a
fs_dontaudit_getattr_all_fs(sandbox_domain)
6cfdf6a
1ec3d1a
1ec3d1a
userdom_dontaudit_use_user_terminals(sandbox_domain)
1ec3d1a
1ec3d1a
mta_dontaudit_read_spool_symlinks(sandbox_domain)
1ec3d1a
96ca8cc