Blob Blame History Raw
## <summary>Policy for SELinux policy and userland applications.</summary>

#######################################
## <summary>
##	Execute checkpolicy in the checkpolicy domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_domtrans_checkpol',`
	gen_require(`
		type checkpolicy_t, checkpolicy_exec_t;
		class process sigchld;
		class fd use;
		class fifo_file rw_file_perms;
	')

	files_search_usr($1)
	corecmd_search_bin($1)
	domain_auto_trans($1,checkpolicy_exec_t,checkpolicy_t)

	allow $1 checkpolicy_t:fd use;
	allow checkpolicy_t $1:fd use;
	allow checkpolicy_t $1:fifo_file rw_file_perms;
	allow checkpolicy_t $1:process sigchld;
')

########################################
## <summary>
##	Execute checkpolicy in the checkpolicy domain, and
##	allow the specified role the checkpolicy domain,
##	and use the caller's terminal.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the checkpolicy domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the checkpolicy domain to use.
## </param>
#
interface(`seutil_run_checkpol',`
	gen_require(`
		type checkpolicy_t;
		class chr_file rw_term_perms;
	')

	seutil_domtrans_checkpol($1)
	role $2 types checkpolicy_t;
	allow checkpolicy_t $3:chr_file rw_term_perms;
')

#######################################
#
# seutil_exec_checkpol(domain)
#
interface(`seutil_exec_checkpol',`
	gen_require(`
		type checkpolicy_exec_t;
	')

	files_search_usr($1)
	corecmd_search_bin($1)
	can_exec($1,checkpolicy_exec_t)
')

#######################################
## <summary>
##	Execute load_policy in the load_policy domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_domtrans_loadpol',`
	gen_require(`
		type load_policy_t, load_policy_exec_t;
		class process sigchld;
		class fd use;
		class fifo_file rw_file_perms;
	')

	corecmd_search_sbin($1)
	domain_auto_trans($1,load_policy_exec_t,load_policy_t)

	allow $1 load_policy_t:fd use;
	allow load_policy_t $1:fd use;
	allow load_policy_t $1:fifo_file rw_file_perms;
	allow load_policy_t $1:process sigchld;
')

########################################
## <summary>
##	Execute load_policy in the load_policy domain, and
##	allow the specified role the load_policy domain,
##	and use the caller's terminal.
##	Has a SIGCHLD signal backchannel.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the load_policy domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the load_policy domain to use.
## </param>
#
interface(`seutil_run_loadpol',`
	gen_require(`
		type load_policy_t;
		class chr_file rw_term_perms;
	')

	seutil_domtrans_loadpol($1)
	role $2 types load_policy_t;
	allow load_policy_t $3:chr_file rw_term_perms;
')

#######################################
#
# seutil_exec_loadpol(domain)
#
interface(`seutil_exec_loadpol',`
	gen_require(`
		type load_policy_exec_t;
	')

	corecmd_search_sbin($1)
	can_exec($1,load_policy_exec_t)
')

#######################################
#
# seutil_read_loadpol(domain)
#
interface(`seutil_read_loadpol',`
	gen_require(`
		type load_policy_exec_t;
		class file r_file_perms;
	')

	corecmd_search_sbin($1)
	allow $1 load_policy_exec_t:file r_file_perms;
')

#######################################
## <summary>
##	Execute newrole in the load_policy domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_domtrans_newrole',`
	gen_require(`
		type newrole_t, newrole_exec_t;
		class process sigchld;
		class fd use;
		class fifo_file rw_file_perms;
	')

	files_search_usr($1)
	corecmd_search_bin($1)
	domain_auto_trans($1,newrole_exec_t,newrole_t)

	allow $1 newrole_t:fd use;
	allow newrole_t $1:fd use;
	allow newrole_t $1:fifo_file rw_file_perms;
	allow newrole_t $1:process sigchld;
')

########################################
## <summary>
##	Execute newrole in the newrole domain, and
##	allow the specified role the newrole domain,
##	and use the caller's terminal.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the newrole domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the newrole domain to use.
## </param>
#
interface(`seutil_run_newrole',`
	gen_require(`
		type newrole_t;
		class chr_file rw_term_perms;
	')

	seutil_domtrans_newrole($1)
	role $2 types newrole_t;
	allow newrole_t $3:chr_file rw_term_perms;
')

#######################################
#
# seutil_exec_newrole(domain)
#
interface(`seutil_exec_newrole',`
	gen_require(`
		type newrole_t, newrole_exec_t;
	')

	files_search_usr($1)
	corecmd_search_bin($1)
	can_exec($1,newrole_exec_t)
')

########################################
## <summary>
##	Do not audit the caller attempts to send
##	a signal to newrole.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_dontaudit_signal_newrole',`
	gen_require(`
		type newrole_t;
		class process signal;
	')

	dontaudit $1 newrole_t:process signal;
')

#######################################
#
# seutil_sigchld_newrole(domain)
#
interface(`seutil_sigchld_newrole',`
	gen_require(`
		type newrole_t;
		class process sigchld;
	')

	allow $1 newrole_t:process sigchld;
')

#######################################
#
# seutil_use_newrole_fd(domain)
#
interface(`seutil_use_newrole_fd',`
	gen_require(`
		type newrole_t;
		class fd use;
	')

	allow $1 newrole_t:fd use;
')

#######################################
## <summary>
##	Execute restorecon in the restorecon domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_domtrans_restorecon',`
	gen_require(`
		type restorecon_t, restorecon_exec_t;
		class process sigchld;
		class fd use;
		class fifo_file rw_file_perms;
	')

	corecmd_search_sbin($1)
	domain_auto_trans($1,restorecon_exec_t,restorecon_t)

	allow $1 restorecon_t:fd use;
	allow restorecon_t $1:fd use;
	allow restorecon_t $1:fifo_file rw_file_perms;
	allow restorecon_t $1:process sigchld;
')

########################################
## <summary>
##	Execute restorecon in the restorecon domain, and
##	allow the specified role the restorecon domain,
##	and use the caller's terminal.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the restorecon domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the restorecon domain to use.
## </param>
#
interface(`seutil_run_restorecon',`
	gen_require(`
		type restorecon_t;
		class chr_file rw_term_perms;
	')

	seutil_domtrans_restorecon($1)
	role $2 types restorecon_t;
	allow restorecon_t $3:chr_file rw_term_perms;
')

#######################################
#
# seutil_exec_restorecon(domain)
#
interface(`seutil_exec_restorecon',`
	gen_require(`
		type restorecon_t, restorecon_exec_t;
	')

	corecmd_search_sbin($1)
	can_exec($1,restorecon_exec_t)
')

########################################
## <summary>
##	Execute run_init in the run_init domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_domtrans_runinit',`
	gen_require(`
		type run_init_t, run_init_exec_t;
		class process sigchld;
		class fd use;
		class fifo_file rw_file_perms;
	')

	files_search_usr($1)
	corecmd_search_sbin($1)
	domain_auto_trans($1,run_init_exec_t,run_init_t)

	allow $1 run_init_t:fd use;
	allow run_init_t $1:fd use;
	allow run_init_t $1:fifo_file rw_file_perms;
	allow run_init_t $1:process sigchld;
')

########################################
## <summary>
##	Execute run_init in the run_init domain, and
##	allow the specified role the run_init domain,
##	and use the caller's terminal.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the run_init domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the run_init domain to use.
## </param>
#
interface(`seutil_run_runinit',`
	gen_require(`
		type run_init_t;
		class chr_file rw_term_perms;
	')

	seutil_domtrans_runinit($1)
	role $2 types run_init_t;
	allow run_init_t $3:chr_file rw_term_perms;
')

########################################
#
# seutil_use_runinit_fd(domain)
#
interface(`seutil_use_runinit_fd',`
	gen_require(`
		type run_init_t;
		class fd use;
	')

	allow $1 run_init_t:fd use;
')

########################################
## <summary>
##	Execute setfiles in the setfiles domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_domtrans_setfiles',`
	gen_require(`
		type setfiles_t, setfiles_exec_t;
		class process sigchld;
		class fd use;
		class fifo_file rw_file_perms;
	')

	files_search_usr($1)
	corecmd_search_sbin($1)
	domain_auto_trans($1,setfiles_exec_t,setfiles_t)

	allow $1 setfiles_t:fd use;
	allow setfiles_t $1:fd use;
	allow setfiles_t $1:fifo_file rw_file_perms;
	allow setfiles_t $1:process sigchld;
')

########################################
## <summary>
##	Execute setfiles in the setfiles domain, and
##	allow the specified role the setfiles domain,
##	and use the caller's terminal.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the setfiles domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the setfiles domain to use.
## </param>
#
interface(`seutil_run_setfiles',`
	gen_require(`
		type setfiles_t;
		class chr_file rw_term_perms;
	')

	seutil_domtrans_setfiles($1)
	role $2 types setfiles_t;
	allow setfiles_t $3:chr_file rw_term_perms;
')

#######################################
#
# seutil_exec_setfiles(domain)
#
interface(`seutil_exec_setfiles',`
	gen_require(`
		type setfiles_exec_t;
	')

	files_search_usr($1)
	corecmd_search_sbin($1)
	can_exec($1,setfiles_exec_t)
')

########################################
## <summary>
##	Do not audit attempts to search the SELinux
##	configuration directory (/etc/selinux).
## </summary>
## <param name="domain">
##	Domain to not audit.
## </param>
#
interface(`seutil_dontaudit_search_config',`
	gen_require(`
		type selinux_config_t;
		class dir search;
	')

	dontaudit $1 selinux_config_t:dir search;
')

########################################
## <summary>
##	Do not audit attempts to read the SELinux
##	userland configuration (/etc/selinux).
## </summary>
## <param name="domain">
##	Domain to not audit.
## </param>
#
interface(`seutil_dontaudit_read_config',`
	gen_require(`
		type selinux_config_t;
	')

	dontaudit $1 selinux_config_t:dir search;
	dontaudit $1 selinux_config_t:file { getattr read };
')

########################################
#
# seutil_read_config(domain)
#
interface(`seutil_read_config',`
	gen_require(`
		type selinux_config_t;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir r_dir_perms;
	allow $1 selinux_config_t:file r_file_perms;
	allow $1 selinux_config_t:lnk_file { getattr read };
')

########################################
## <summary>
##	Search the policy directory with default_context files.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_search_default_contexts',`
	gen_require(`
		type selinux_config_t, default_context_t;
		class dir search;
	')

	files_search_etc($1)
	allow $1 { selinux_config_t default_context_t }:dir search;
')


########################################
#
# seutil_read_default_contexts(domain)
#
interface(`seutil_read_default_contexts',`
	gen_require(`
		type selinux_config_t, default_context_t;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 default_context_t:dir r_dir_perms;
	allow $1 default_context_t:file r_file_perms;
	allow $1 default_context_t:lnk_file { getattr read };
')

########################################
#
# seutil_read_file_contexts(domain)
#
interface(`seutil_read_file_contexts',`
	gen_require(`
		type selinux_config_t, file_context_t;
		class dir r_dir_perms;
		class file r_file_perms;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 file_context_t:dir r_dir_perms;
	allow $1 file_context_t:file r_file_perms;
')

########################################
#
# seutil_read_binary_pol(domain)
#
interface(`seutil_read_binary_pol',`
	gen_require(`
		type selinux_config_t, policy_config_t;
		class dir r_dir_perms;
		class file r_file_perms;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 policy_config_t:dir r_dir_perms;
	allow $1 policy_config_t:file r_file_perms;
')

########################################
#
# seutil_create_binary_pol(domain)
#
interface(`seutil_create_binary_pol',`
	gen_require(`
#		attribute can_write_binary_policy;
		type selinux_config_t, policy_config_t;
		class dir ra_dir_perms;
		class file { getattr create write };
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 policy_config_t:dir ra_dir_perms;
	allow $1 policy_config_t:file { getattr create write };
#	typeattribute $1 can_write_binary_policy;
')

########################################
## <summary>
##	Allow the caller to relabel a file to the binary policy type.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`seutil_relabelto_binary_pol',`
	gen_require(`
		attribute can_relabelto_binary_policy;
		type policy_config_t;
		class file relabelto;
	')

	allow $1 policy_config_t:file relabelto;
	typeattribute $1 can_relabelto_binary_policy;
')

########################################
#
# seutil_manage_binary_pol(domain)
#
interface(`seutil_manage_binary_pol',`
	gen_require(`
		attribute can_write_binary_policy;
		type selinux_config_t, policy_config_t;
		class dir rw_dir_perms;
		class file create_file_perms;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 policy_config_t:dir rw_dir_perms;
	allow $1 policy_config_t:file create_file_perms;
	typeattribute $1 can_write_binary_policy;
')

########################################
#
# seutil_read_src_pol(domain)
#
interface(`seutil_read_src_pol',`
	gen_require(`
		type selinux_config_t, policy_src_t;
		class dir r_dir_perms;
		class file r_file_perms;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 policy_src_t:dir r_dir_perms;
	allow $1 policy_src_t:file r_file_perms;
')

########################################
#
# seutil_manage_src_pol(domain)
#
interface(`seutil_manage_src_pol',`
	gen_require(`
		type selinux_config_t, policy_src_t;
		class dir create_dir_perms;
		class file create_file_perms;
	')

	files_search_etc($1)
	allow $1 selinux_config_t:dir search;
	allow $1 policy_src_t:dir create_dir_perms;
	allow $1 policy_src_t:file create_file_perms;
')