2018-07-01 15:02:33 +00:00
|
|
|
policy_module(sectoolm, 1.2.0)
|
2018-06-23 13:00:56 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# Declarations
|
|
|
|
#
|
|
|
|
|
|
|
|
type sectoolm_t;
|
|
|
|
type sectoolm_exec_t;
|
|
|
|
init_system_domain(sectoolm_t, sectoolm_exec_t)
|
|
|
|
|
|
|
|
type sectool_var_lib_t;
|
|
|
|
files_type(sectool_var_lib_t)
|
|
|
|
|
|
|
|
type sectool_var_log_t;
|
|
|
|
logging_log_file(sectool_var_log_t)
|
|
|
|
|
|
|
|
type sectool_tmp_t;
|
|
|
|
files_tmp_file(sectool_tmp_t)
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# Local policy
|
|
|
|
#
|
|
|
|
|
|
|
|
allow sectoolm_t self:capability { dac_override net_admin sys_nice };
|
|
|
|
allow sectoolm_t self:process { getcap getsched signull setsched };
|
|
|
|
dontaudit sectoolm_t self:process { execstack execmem };
|
|
|
|
allow sectoolm_t self:fifo_file rw_fifo_file_perms;
|
|
|
|
allow sectoolm_t self:unix_dgram_socket sendto;
|
|
|
|
|
|
|
|
manage_dirs_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t)
|
|
|
|
manage_files_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t)
|
|
|
|
files_tmp_filetrans(sectoolm_t, sectool_tmp_t, { file dir })
|
|
|
|
|
|
|
|
manage_files_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t)
|
|
|
|
manage_dirs_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t)
|
|
|
|
files_var_lib_filetrans(sectoolm_t, sectool_var_lib_t, { file dir })
|
|
|
|
|
|
|
|
allow sectoolm_t sectool_var_log_t:file { append_file_perms create_file_perms setattr_file_perms };
|
|
|
|
logging_log_filetrans(sectoolm_t, sectool_var_log_t, file)
|
|
|
|
|
|
|
|
kernel_read_net_sysctls(sectoolm_t)
|
|
|
|
kernel_read_network_state(sectoolm_t)
|
|
|
|
kernel_read_kernel_sysctls(sectoolm_t)
|
|
|
|
|
|
|
|
corecmd_exec_bin(sectoolm_t)
|
|
|
|
corecmd_exec_shell(sectoolm_t)
|
|
|
|
|
|
|
|
dev_read_sysfs(sectoolm_t)
|
|
|
|
dev_read_urand(sectoolm_t)
|
|
|
|
dev_getattr_all_blk_files(sectoolm_t)
|
|
|
|
dev_getattr_all_chr_files(sectoolm_t)
|
|
|
|
|
|
|
|
domain_getattr_all_domains(sectoolm_t)
|
|
|
|
domain_read_all_domains_state(sectoolm_t)
|
|
|
|
|
|
|
|
files_getattr_all_pipes(sectoolm_t)
|
|
|
|
files_getattr_all_sockets(sectoolm_t)
|
|
|
|
files_read_all_files(sectoolm_t)
|
|
|
|
files_read_all_symlinks(sectoolm_t)
|
|
|
|
|
|
|
|
fs_getattr_all_fs(sectoolm_t)
|
|
|
|
fs_list_noxattr_fs(sectoolm_t)
|
|
|
|
|
|
|
|
selinux_validate_context(sectoolm_t)
|
|
|
|
|
|
|
|
application_exec_all(sectoolm_t)
|
|
|
|
|
|
|
|
auth_use_nsswitch(sectoolm_t)
|
|
|
|
|
|
|
|
libs_exec_ld_so(sectoolm_t)
|
|
|
|
|
|
|
|
logging_send_syslog_msg(sectoolm_t)
|
|
|
|
|
|
|
|
sysnet_domtrans_ifconfig(sectoolm_t)
|
|
|
|
|
|
|
|
userdom_write_user_tmp_sockets(sectoolm_t)
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
mount_exec(sectoolm_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
dbus_system_domain(sectoolm_t, sectoolm_exec_t)
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
policykit_dbus_chat(sectoolm_t)
|
|
|
|
')
|
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
hostname_exec(sectoolm_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
iptables_domtrans(sectoolm_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
prelink_domtrans(sectoolm_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
optional_policy(`
|
|
|
|
rpm_exec(sectoolm_t)
|
|
|
|
rpm_dontaudit_manage_db(sectoolm_t)
|
|
|
|
')
|
|
|
|
|