diff options
Diffstat (limited to 'policy/modules/admin/sectoolm.te')
-rw-r--r-- | policy/modules/admin/sectoolm.te | 108 |
1 files changed, 108 insertions, 0 deletions
diff --git a/policy/modules/admin/sectoolm.te b/policy/modules/admin/sectoolm.te new file mode 100644 index 00000000..ba3360f4 --- /dev/null +++ b/policy/modules/admin/sectoolm.te @@ -0,0 +1,108 @@ +policy_module(sectoolm, 1.1.1) + +######################################## +# +# Declarations +# + +type sectoolm_t; +type sectoolm_exec_t; +init_system_domain(sectoolm_t, sectoolm_exec_t) + +type sectool_var_lib_t; +files_type(sectool_var_lib_t) + +type sectool_var_log_t; +logging_log_file(sectool_var_log_t) + +type sectool_tmp_t; +files_tmp_file(sectool_tmp_t) + +######################################## +# +# Local policy +# + +allow sectoolm_t self:capability { dac_override net_admin sys_nice }; +allow sectoolm_t self:process { getcap getsched signull setsched }; +dontaudit sectoolm_t self:process { execstack execmem }; +allow sectoolm_t self:fifo_file rw_fifo_file_perms; +allow sectoolm_t self:unix_dgram_socket sendto; + +manage_dirs_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t) +manage_files_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t) +files_tmp_filetrans(sectoolm_t, sectool_tmp_t, { file dir }) + +manage_files_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t) +manage_dirs_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t) +files_var_lib_filetrans(sectoolm_t, sectool_var_lib_t, { file dir }) + +allow sectoolm_t sectool_var_log_t:file { append_file_perms create_file_perms setattr_file_perms }; +logging_log_filetrans(sectoolm_t, sectool_var_log_t, file) + +kernel_read_net_sysctls(sectoolm_t) +kernel_read_network_state(sectoolm_t) +kernel_read_kernel_sysctls(sectoolm_t) + +corecmd_exec_bin(sectoolm_t) +corecmd_exec_shell(sectoolm_t) + +dev_read_sysfs(sectoolm_t) +dev_read_urand(sectoolm_t) +dev_getattr_all_blk_files(sectoolm_t) +dev_getattr_all_chr_files(sectoolm_t) + +domain_getattr_all_domains(sectoolm_t) +domain_read_all_domains_state(sectoolm_t) + +files_getattr_all_pipes(sectoolm_t) +files_getattr_all_sockets(sectoolm_t) +files_read_all_files(sectoolm_t) +files_read_all_symlinks(sectoolm_t) + +fs_getattr_all_fs(sectoolm_t) +fs_list_noxattr_fs(sectoolm_t) + +selinux_validate_context(sectoolm_t) + +application_exec_all(sectoolm_t) + +auth_use_nsswitch(sectoolm_t) + +libs_exec_ld_so(sectoolm_t) + +logging_send_syslog_msg(sectoolm_t) + +sysnet_domtrans_ifconfig(sectoolm_t) + +userdom_write_user_tmp_sockets(sectoolm_t) + +optional_policy(` + mount_exec(sectoolm_t) +') + +optional_policy(` + dbus_system_domain(sectoolm_t, sectoolm_exec_t) + + optional_policy(` + policykit_dbus_chat(sectoolm_t) + ') +') + +optional_policy(` + hostname_exec(sectoolm_t) +') + +optional_policy(` + iptables_domtrans(sectoolm_t) +') + +optional_policy(` + prelink_domtrans(sectoolm_t) +') + +optional_policy(` + rpm_exec(sectoolm_t) + rpm_dontaudit_manage_db(sectoolm_t) +') + |