policy_module(sectoolm, 1.0.0) ######################################## # # Declarations # type sectoolm_t; type sectoolm_exec_t; init_daemon_domain(sectoolm_t, sectoolm_exec_t) type sectool_var_lib_t; files_type(sectool_var_lib_t) type sectool_var_log_t; logging_log_file(sectool_var_log_t) type sectool_tmp_t; files_tmp_file(sectool_tmp_t) ######################################## # # sectool local policy # allow sectoolm_t self:capability { dac_override net_admin sys_nice }; allow sectoolm_t self:process { getcap getsched signull setsched }; dontaudit sectoolm_t self:process { execstack execmem }; allow sectoolm_t self:fifo_file rw_fifo_file_perms; allow sectoolm_t self:unix_dgram_socket { create_socket_perms sendto }; manage_dirs_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t) manage_files_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t) files_tmp_filetrans(sectoolm_t, sectool_tmp_t, { file dir }) manage_files_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t) manage_dirs_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t) files_var_lib_filetrans(sectoolm_t, sectool_var_lib_t, { file dir }) manage_files_pattern(sectoolm_t, sectool_var_log_t, sectool_var_log_t) logging_log_filetrans(sectoolm_t, sectool_var_log_t, file) kernel_read_net_sysctls(sectoolm_t) kernel_read_network_state(sectoolm_t) kernel_read_kernel_sysctls(sectoolm_t) corecmd_exec_bin(sectoolm_t) corecmd_exec_shell(sectoolm_t) dev_read_sysfs(sectoolm_t) dev_read_urand(sectoolm_t) dev_getattr_all_blk_files(sectoolm_t) dev_getattr_all_chr_files(sectoolm_t) domain_getattr_all_domains(sectoolm_t) domain_read_all_domains_state(sectoolm_t) files_getattr_all_pipes(sectoolm_t) files_getattr_all_sockets(sectoolm_t) files_read_all_files(sectoolm_t) files_read_all_symlinks(sectoolm_t) fs_getattr_all_fs(sectoolm_t) fs_list_noxattr_fs(sectoolm_t) selinux_validate_context(sectoolm_t) # tcp_wrappers test application_exec_all(sectoolm_t) auth_use_nsswitch(sectoolm_t) libs_exec_ld_so(sectoolm_t) logging_send_syslog_msg(sectoolm_t) # tests related to network sysnet_domtrans_ifconfig(sectoolm_t) userdom_manage_user_tmp_sockets(sectoolm_t) userdom_dgram_send(sectoolm_t) optional_policy(` dbus_system_domain(sectoolm_t, sectoolm_exec_t) ') optional_policy(` # tests related to network hostname_exec(sectoolm_t) ') optional_policy(` # tests related to network iptables_domtrans(sectoolm_t) ') optional_policy(` mount_exec(sectoolm_t) ') optional_policy(` policykit_dbus_chat(sectoolm_t) ') # suid test using # rpm -Vf option optional_policy(` prelink_domtrans(sectoolm_t) ') optional_policy(` rpm_exec(sectoolm_t) rpm_dontaudit_manage_db(sectoolm_t) ')