selinux-refpolicy/policy/modules/kernel/files.te

231 lines
5.6 KiB
Plaintext
Raw Normal View History

policy_module(files, 1.27.5)
2005-06-30 18:54:08 +00:00
########################################
#
# Declarations
#
2005-04-14 20:18:17 +00:00
attribute file_type;
attribute files_unconfined_type;
2005-04-14 20:18:17 +00:00
attribute lockfile;
2005-05-23 15:49:31 +00:00
attribute mountpoint;
2005-04-14 20:18:17 +00:00
attribute pidfile;
attribute configfile;
attribute spoolfile;
2005-09-19 21:17:45 +00:00
# For labeling types that are to be polyinstantiated
attribute polydir;
# And for labeling the parent directories of those polyinstantiated directories
# This is necessary for remounting the original in the parent to give
# security aware apps access
attribute polyparent;
# And labeling for the member directories
attribute polymember;
# sensitive security files whose accesses should
# not be dontaudited for uses
attribute security_file_type;
# and its opposite
attribute non_security_file_type;
# sensitive authentication files whose accesses should
# not be dontaudited for uses
attribute auth_file_type;
# and its opposite
attribute non_auth_file_type;
2005-04-14 20:18:17 +00:00
attribute tmpfile;
2005-05-23 15:49:31 +00:00
attribute tmpfsfile;
2005-04-14 20:18:17 +00:00
# this attribute is not currently used and will be removed in the future.
# unfortunately, this attribute can not be removed yet because it may cause
# some policies to fail to link if it is still required.
attribute usercanread;
#
# boot_t is the type for files in /boot
#
type boot_t;
files_mountpoint(boot_t)
2005-04-14 20:18:17 +00:00
# default_t is the default type for files that do not
# match any specification in the file_contexts configuration
# other than the generic /.* specification.
type default_t;
files_mountpoint(default_t)
2005-04-14 20:18:17 +00:00
#
# etc_t is the type of the system etc directories.
#
2009-11-24 13:49:15 +00:00
type etc_t, configfile;
files_type(etc_t)
2005-04-14 20:18:17 +00:00
#
# etc_runtime_t is the type of various
# files in /etc that are automatically
# generated during initialization.
#
type etc_runtime_t;
files_type(etc_runtime_t)
2005-04-14 20:18:17 +00:00
#
# home_root_t is the type for the directory where user home directories
# are created
#
type home_root_t;
files_mountpoint(home_root_t)
files_poly_parent(home_root_t)
2005-04-14 20:18:17 +00:00
#
# lost_found_t is the type for the lost+found directories.
#
type lost_found_t;
files_type(lost_found_t)
2005-04-14 20:18:17 +00:00
#
# mnt_t is the type for mount points such as /mnt/cdrom
#
type mnt_t;
files_mountpoint(mnt_t)
2005-04-14 20:18:17 +00:00
#
# modules_object_t is the type for kernel modules
#
type modules_object_t;
files_type(modules_object_t)
type no_access_t;
files_type(no_access_t)
type poly_t;
files_type(poly_t)
type readable_t;
files_type(readable_t)
2005-04-28 21:41:09 +00:00
#
# root_t is the type for rootfs and the root directory.
#
type root_t;
files_mountpoint(root_t)
files_poly_parent(root_t)
2005-06-10 01:01:13 +00:00
kernel_rootfs_mountpoint(root_t)
genfscon rootfs / gen_context(system_u:object_r:root_t,s0)
2005-04-28 21:41:09 +00:00
2005-04-14 20:18:17 +00:00
#
# src_t is the type of files in the system src directories.
#
type src_t;
files_mountpoint(src_t)
2005-04-14 20:18:17 +00:00
#
# system_map_t is for the system.map files in /boot
#
type system_map_t;
files_type(system_map_t)
genfscon proc /kallsyms gen_context(system_u:object_r:system_map_t,s0)
2005-04-14 20:18:17 +00:00
#
# tmp_t is the type of the temporary directories
#
type tmp_t;
2005-10-25 20:06:27 +00:00
files_tmp_file(tmp_t)
files_mountpoint(tmp_t)
files_poly(tmp_t)
files_poly_parent(tmp_t)
2005-04-14 20:18:17 +00:00
#
# usr_t is the type for /usr.
#
type usr_t;
files_mountpoint(usr_t)
2005-04-14 20:18:17 +00:00
#
# var_t is the type of /var
#
type var_t;
files_mountpoint(var_t)
2005-04-14 20:18:17 +00:00
#
# var_lib_t is the type of /var/lib
#
type var_lib_t;
files_mountpoint(var_lib_t)
2005-04-14 20:18:17 +00:00
#
# var_lock_t is tye type of /var/lock
#
type var_lock_t;
files_lock_file(var_lock_t)
files_mountpoint(var_lock_t)
2005-04-14 20:18:17 +00:00
#
# var_run_t is the type of /var/run, usually
# used for pid and other runtime files.
#
type var_run_t;
files_pid_file(var_run_t)
2008-12-02 22:40:49 +00:00
files_mountpoint(var_run_t)
2005-04-14 20:18:17 +00:00
2017-02-24 01:03:23 +00:00
optional_policy(`
systemd_tmpfilesd_managed(var_run_t, lnk_file)
')
2005-04-14 20:18:17 +00:00
#
# var_spool_t is the type of /var/spool
#
2005-10-25 20:06:27 +00:00
type var_spool_t;
files_tmp_file(var_spool_t)
########################################
#
# Rules for all file types
#
allow file_type self:filesystem associate;
fs_associate(file_type)
fs_associate_noxattr(file_type)
fs_associate_tmpfs(file_type)
2007-10-29 18:35:32 +00:00
fs_associate_ramfs(file_type)
fs_associate_hugetlbfs(file_type)
########################################
#
# Rules for all tmp file types
#
2009-06-11 15:00:48 +00:00
allow file_type tmp_t:filesystem associate;
fs_associate_tmpfs(tmpfile)
########################################
#
# Rules for all tmpfs file types
#
fs_associate_tmpfs(tmpfsfile)
########################################
#
# Unconfined access to this module
#
# Create/access any file in a labeled filesystem;
allow files_unconfined_type file_type:file { manage_file_perms relabelfrom relabelto map execute quotaon mounton execute_no_trans audit_access watch };
allow files_unconfined_type file_type:lnk_file { manage_lnk_file_perms relabelfrom relabelto append map execute quotaon mounton open audit_access execmod watch };
allow files_unconfined_type file_type:sock_file { manage_sock_file_perms relabelfrom relabelto map execute quotaon mounton audit_access execmod watch };
allow files_unconfined_type file_type:fifo_file { manage_fifo_file_perms relabelfrom relabelto map execute quotaon mounton audit_access execmod watch };
allow files_unconfined_type file_type:blk_file { manage_blk_file_perms relabelfrom relabelto map execute quotaon mounton audit_access execmod watch };
allow files_unconfined_type file_type:chr_file { manage_chr_file_perms relabelfrom relabelto map execute quotaon mounton audit_access watch };
allow files_unconfined_type file_type:dir { manage_dir_perms relabelfrom relabelto append map execute quotaon mounton add_name remove_name reparent search rmdir audit_access execmod watch };
2009-11-24 16:11:38 +00:00
# Mount/unmount any filesystem with the context= option.
allow files_unconfined_type file_type:filesystem { mount remount unmount getattr relabelfrom relabelto associate quotamod quotaget watch };
tunable_policy(`allow_execmod',`
allow files_unconfined_type file_type:file execmod;
')