Blob Blame History Raw
policy_module(sandbox,1.0.0)

attribute sandbox_domain;

########################################
#
# Declarations
#
sandbox_domain_template(sandbox)

########################################
#
# sandbox local policy
#
allow sandbox_domain self:process { getattr signal_perms getsched setsched setpgid execstack };
tunable_policy(`deny_execmem',`',`
	allow sandbox_domain self:process execmem;
')

allow sandbox_domain self:fifo_file manage_file_perms;
allow sandbox_domain self:sem create_sem_perms;
allow sandbox_domain self:shm create_shm_perms;
allow sandbox_domain self:msgq create_msgq_perms;
allow sandbox_domain self:unix_stream_socket create_stream_socket_perms;
allow sandbox_domain self:unix_dgram_socket { sendto create_socket_perms };
dontaudit sandbox_domain self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };

dev_rw_all_inherited_chr_files(sandbox_domain)
dev_rw_all_inherited_blk_files(sandbox_domain)

# sandbox_file_t was moved to sandboxX.te
optional_policy(`
	sandbox_exec_file(sandbox_domain)
	sandbox_manage_content(sandbox_domain)
	sandbox_dontaudit_mounton(sandbox_domain)
	sandbox_manage_tmpfs_files(sandbox_domain)
')

gen_require(`
	type usr_t, lib_t, locale_t, device_t;
	type var_t, var_run_t, rpm_log_t, locale_t;
	attribute exec_type, configfile;
')

kernel_dontaudit_read_system_state(sandbox_domain)

corecmd_exec_all_executables(sandbox_domain)

dev_dontaudit_getattr_all(sandbox_domain)

files_rw_all_inherited_files(sandbox_domain, -exec_type -configfile -usr_t -lib_t -locale_t -var_t -var_run_t -device_t -rpm_log_t )
files_entrypoint_all_files(sandbox_domain)

files_read_config_files(sandbox_domain)
files_read_var_files(sandbox_domain)
files_dontaudit_search_all_dirs(sandbox_domain)

fs_dontaudit_getattr_all_fs(sandbox_domain)


userdom_dontaudit_use_user_terminals(sandbox_domain)

mta_dontaudit_read_spool_symlinks(sandbox_domain)