selinux-refpolicy/policy/modules/kernel/devices.if

5600 lines
108 KiB
Plaintext
Raw Normal View History

2005-06-13 19:22:00 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Device nodes and interfaces for many basic system devices.
2005-06-13 19:22:00 +00:00
## </summary>
2005-06-23 16:00:05 +00:00
## <desc>
2005-06-23 21:30:57 +00:00
## <p>
## This module creates the device node concept and provides
## the policy for many of the device files. Notable exceptions are
## the mass storage and terminal devices that are covered by other
## modules.
## </p>
## <p>
## This module creates the concept of a device node. That is a
## char or block device file, usually in /dev. All types that
## are used to label device nodes should use the dev_node macro.
## </p>
## <p>
## Additionally, this module controls access to three things:
## <ul>
## <li>the device directories containing device nodes</li>
## <li>device nodes as a group</li>
## <li>individual access to specific device nodes covered by
## this module.</li>
## </ul>
## </p>
2005-06-23 16:00:05 +00:00
## </desc>
## <required val="true">
## Depended on by other required modules.
## </required>
2005-06-13 16:22:32 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Make the specified type usable for device
## nodes in a filesystem.
2005-06-23 21:30:57 +00:00
## </summary>
## <desc>
## <p>
## Make the specified type usable for device nodes
## in a filesystem. Types used for device nodes that
## do not use this interface, or an interface that
## calls this one, will have unexpected behaviors
## while the system is running.
## </p>
## <p>
## Example:
## </p>
## <p>
## type mydev_t;
## dev_node(mydev_t)
## allow mydomain_t mydev_t:chr_file read_chr_file_perms;
## </p>
## <p>
## Related interfaces:
## </p>
## <ul>
## <li>term_tty()</li>
## <li>term_pty()</li>
## </ul>
## </desc>
## <param name="type">
## <summary>
## Type to be used for device nodes.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
## <infoflow type="none"/>
2005-04-14 20:18:17 +00:00
#
interface(`dev_node',`
gen_require(`
attribute device_node;
')
2005-06-02 20:26:48 +00:00
typeattribute $1 device_node;
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Associate the specified file type with device filesystem.
## </summary>
## <param name="file_type">
## <summary>
## The type of the file to be associated.
## </summary>
## </param>
#
interface(`dev_associate',`
gen_require(`
type device_t;
')
allow $1 device_t:filesystem associate;
fs_associate_tmpfs($1) #For backwards compatibility
')
########################################
## <summary>
## Get attributes of device filesystems.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_fs',`
gen_require(`
type device_t;
')
allow $1 device_t:filesystem getattr;
')
########################################
## <summary>
## Watch the directories in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_watch_dev_dirs',`
gen_require(`
type device_t;
')
allow $1 device_t:dir watch;
')
########################################
## <summary>
## Mount a filesystem on /dev
## </summary>
## <param name="domain">
## <summary>
## Domain allow access.
## </summary>
## </param>
#
interface(`dev_mounton',`
gen_require(`
type device_t;
')
allow $1 device_t:dir mounton;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow full relabeling (to and from) of all device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`dev_relabel_all_dev_nodes',`
gen_require(`
attribute device_node;
type device_t;
')
2005-06-02 20:26:48 +00:00
relabelfrom_dirs_pattern($1, device_t, { device_t device_node })
relabelfrom_files_pattern($1, device_t, { device_t device_node })
2009-03-05 15:36:41 +00:00
relabelfrom_lnk_files_pattern($1, device_t, { device_t device_node })
relabelfrom_fifo_files_pattern($1, device_t, { device_t device_node })
relabelfrom_sock_files_pattern($1, device_t, { device_t device_node })
2009-11-19 14:44:19 +00:00
relabel_blk_files_pattern($1, device_t, { device_t device_node })
relabel_chr_files_pattern($1, device_t, { device_t device_node })
')
2017-02-24 01:03:23 +00:00
########################################
## <summary>
## Allow full relabeling (to and from) of all device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`dev_relabel_all_dev_files',`
gen_require(`
type device_t;
')
relabel_files_pattern($1, device_t, device_t)
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## List all of the device nodes in a device directory.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_list_all_dev_nodes',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
list_dirs_pattern($1, device_t, device_t)
read_lnk_files_pattern($1, device_t, device_t)
2005-04-14 20:18:17 +00:00
')
2005-07-08 20:44:57 +00:00
########################################
## <summary>
## Set the attributes of /dev directories.
## </summary>
## <param name="domain">
## <summary>
2005-07-08 20:44:57 +00:00
## Domain allowed access.
## </summary>
2005-07-08 20:44:57 +00:00
## </param>
#
interface(`dev_setattr_generic_dirs',`
2005-07-08 20:44:57 +00:00
gen_require(`
type device_t;
')
setattr_dirs_pattern($1, device_t, device_t)
2005-07-08 20:44:57 +00:00
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit attempts to list all device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_dontaudit_list_all_dev_nodes',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
2006-12-12 20:08:08 +00:00
dontaudit $1 device_t:dir list_dir_perms;
')
########################################
## <summary>
## Add entries to directories in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
2006-12-12 20:08:08 +00:00
## </summary>
## </param>
#
interface(`dev_add_entry_generic_dirs',`
gen_require(`
type device_t;
')
allow $1 device_t:dir add_entry_dir_perms;
2005-04-14 20:18:17 +00:00
')
2009-12-18 15:33:50 +00:00
########################################
## <summary>
## Remove entries from directories in /dev.
2009-12-18 15:33:50 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
2009-12-18 15:33:50 +00:00
## </summary>
## </param>
#
interface(`dev_remove_entry_generic_dirs',`
gen_require(`
type device_t;
')
allow $1 device_t:dir del_entry_dir_perms;
')
2005-06-01 13:51:54 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create a directory in the device directory.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-01 13:51:54 +00:00
#
interface(`dev_create_generic_dirs',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
2007-10-29 18:35:32 +00:00
allow $1 device_t:dir list_dir_perms;
create_dirs_pattern($1, device_t, device_t)
2005-06-01 13:51:54 +00:00
')
2006-09-19 17:02:29 +00:00
########################################
## <summary>
## Delete a directory in the device directory.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
2006-09-19 17:02:29 +00:00
## </summary>
## </param>
#
interface(`dev_delete_generic_dirs',`
gen_require(`
type device_t;
')
delete_dirs_pattern($1, device_t, device_t)
2006-09-19 17:02:29 +00:00
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Manage of directories in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
2009-03-05 15:36:41 +00:00
## </summary>
## </param>
#
interface(`dev_manage_generic_dirs',`
gen_require(`
type device_t;
')
manage_dirs_pattern($1, device_t, device_t)
')
2005-06-13 17:35:46 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow full relabeling (to and from) of directories in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-13 17:35:46 +00:00
#
interface(`dev_relabel_generic_dev_dirs',`
gen_require(`
type device_t;
')
2005-06-13 17:35:46 +00:00
relabel_dirs_pattern($1, device_t, device_t)
2005-06-13 17:35:46 +00:00
')
########################################
## <summary>
## dontaudit getattr generic files in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_getattr_generic_files',`
gen_require(`
type device_t;
')
dontaudit $1 device_t:file getattr;
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Read generic files in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_read_generic_files',`
gen_require(`
type device_t;
')
read_files_pattern($1, device_t, device_t)
')
########################################
## <summary>
## Read and write generic files in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_generic_files',`
gen_require(`
type device_t;
')
rw_files_pattern($1, device_t, device_t)
')
2005-09-15 21:03:29 +00:00
########################################
## <summary>
## Delete generic files in /dev.
## </summary>
## <param name="domain">
## <summary>
2005-09-15 21:03:29 +00:00
## Domain allowed access.
## </summary>
2005-09-15 21:03:29 +00:00
## </param>
#
interface(`dev_delete_generic_files',`
2005-09-15 21:03:29 +00:00
gen_require(`
type device_t;
')
delete_files_pattern($1, device_t, device_t)
2005-09-15 21:03:29 +00:00
')
2005-06-10 01:01:13 +00:00
########################################
## <summary>
## Create a file in the device directory.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_generic_files',`
gen_require(`
type device_t;
')
manage_files_pattern($1, device_t, device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit getattr on generic pipes.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-10 01:01:13 +00:00
#
interface(`dev_dontaudit_getattr_generic_pipes',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
dontaudit $1 device_t:fifo_file getattr;
2005-05-30 21:17:20 +00:00
')
########################################
## <summary>
## Write generic socket files in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_write_generic_sockets',`
gen_require(`
type device_t;
')
write_sock_files_pattern($1, device_t, device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow getattr on generic block devices.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_getattr_generic_blk_files',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
getattr_blk_files_pattern($1, device_t, device_t)
')
2005-05-13 14:37:13 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit getattr on generic block devices.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-13 14:37:13 +00:00
#
interface(`dev_dontaudit_getattr_generic_blk_files',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
dontaudit $1 device_t:blk_file getattr;
2005-05-13 14:37:13 +00:00
')
########################################
## <summary>
## Set the attributes on generic
## block devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_generic_blk_files',`
gen_require(`
type device_t;
')
allow $1 device_t:blk_file setattr;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit setattr on generic block devices.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_dontaudit_setattr_generic_blk_files',`
gen_require(`
type device_t;
')
dontaudit $1 device_t:blk_file setattr;
')
2005-05-30 21:17:20 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create generic block device files.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-30 21:17:20 +00:00
#
interface(`dev_create_generic_blk_files',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
create_blk_files_pattern($1, device_t, device_t)
')
########################################
## <summary>
## Delete generic block device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_delete_generic_blk_files',`
gen_require(`
type device_t;
')
delete_blk_files_pattern($1, device_t, device_t)
2005-05-30 21:17:20 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow getattr for generic character device files.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_getattr_generic_chr_files',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
getattr_chr_files_pattern($1, device_t, device_t)
')
2005-05-13 14:37:13 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit getattr for generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-13 14:37:13 +00:00
#
interface(`dev_dontaudit_getattr_generic_chr_files',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
dontaudit $1 device_t:chr_file getattr;
2005-05-13 14:37:13 +00:00
')
########################################
## <summary>
## Set the attributes for generic
## character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_generic_chr_files',`
gen_require(`
type device_t;
')
allow $1 device_t:chr_file setattr;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit setattr for generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_dontaudit_setattr_generic_chr_files',`
gen_require(`
type device_t;
')
dontaudit $1 device_t:chr_file setattr;
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Read generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_generic_chr_files',`
gen_require(`
type device_t;
')
allow $1 device_t:chr_file read_chr_file_perms;
')
2010-03-04 20:30:22 +00:00
########################################
## <summary>
## Read and write generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_generic_chr_files',`
gen_require(`
type device_t;
')
allow $1 device_t:chr_file rw_chr_file_perms;
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Read and write generic block device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_generic_blk_files',`
gen_require(`
type device_t;
')
allow $1 device_t:blk_file rw_blk_file_perms;
2011-03-07 15:47:09 +00:00
')
########################################
## <summary>
## Dontaudit attempts to read/write generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain to dontaudit access.
## </summary>
## </param>
#
interface(`dev_dontaudit_rw_generic_chr_files',`
gen_require(`
type device_t;
')
dontaudit $1 device_t:chr_file rw_chr_file_perms;
')
########################################
## <summary>
## Create generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_generic_chr_files',`
gen_require(`
type device_t;
')
create_chr_files_pattern($1, device_t, device_t)
')
########################################
## <summary>
## Delete generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_delete_generic_chr_files',`
gen_require(`
type device_t;
')
delete_chr_files_pattern($1, device_t, device_t)
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Relabel from generic character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_relabelfrom_generic_chr_files',`
gen_require(`
type device_t;
')
allow $1 device_t:chr_file relabelfrom_chr_file_perms;
2011-03-07 15:47:09 +00:00
')
########################################
## <summary>
## Do not audit attempts to set the attributes
## of symbolic links in device directories (/dev).
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_setattr_generic_symlinks',`
gen_require(`
type device_t;
')
dontaudit $1 device_t:lnk_file setattr;
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Read symbolic links in device directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_generic_symlinks',`
gen_require(`
type device_t;
')
allow $1 device_t:lnk_file read_lnk_file_perms;
')
2006-09-06 22:07:25 +00:00
########################################
## <summary>
## Create symbolic links in device directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_generic_symlinks',`
gen_require(`
type device_t;
')
create_lnk_files_pattern($1, device_t, device_t)
2006-09-06 22:07:25 +00:00
')
2005-05-24 15:55:57 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Delete symbolic links in device directories.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-24 15:55:57 +00:00
#
interface(`dev_delete_generic_symlinks',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
delete_lnk_files_pattern($1, device_t, device_t)
2005-05-24 15:55:57 +00:00
')
2005-05-13 14:37:13 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create, delete, read, and write symbolic links in device directories.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-13 14:37:13 +00:00
#
interface(`dev_manage_generic_symlinks',`
gen_require(`
type device_t;
')
2005-06-02 20:26:48 +00:00
manage_lnk_files_pattern($1, device_t, device_t)
2005-05-13 14:37:13 +00:00
')
2005-06-28 17:32:57 +00:00
########################################
## <summary>
## Relabel symbolic links in device directories.
## </summary>
## <param name="domain">
## <summary>
2005-06-28 17:32:57 +00:00
## Domain allowed access.
## </summary>
2005-06-28 17:32:57 +00:00
## </param>
#
interface(`dev_relabel_generic_symlinks',`
gen_require(`
type device_t;
')
relabel_lnk_files_pattern($1, device_t, device_t)
2005-06-28 17:32:57 +00:00
')
########################################
## <summary>
## Write generic sock files in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_write_generic_sock_files',`
gen_require(`
type device_t;
')
write_sock_files_pattern($1, device_t, device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create, delete, read, and write device nodes in device directories.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_manage_all_dev_nodes',`
gen_require(`
attribute device_node, memory_raw_read, memory_raw_write;
type device_t;
')
manage_dirs_pattern($1, device_t, device_t)
manage_sock_files_pattern($1, device_t, device_t)
manage_lnk_files_pattern($1, device_t, device_t)
manage_chr_files_pattern($1, device_t, { device_t device_node })
manage_blk_files_pattern($1, device_t, { device_t device_node })
relabel_dirs_pattern($1, device_t, device_t)
relabel_chr_files_pattern($1, device_t, { device_t device_node })
relabel_blk_files_pattern($1, device_t, { device_t device_node })
allow $1 { device_t device_node }:dir watch;
allow $1 { device_t device_node }:sock_file watch;
allow $1 { device_t device_node }:lnk_file watch;
allow $1 { device_t device_node }:chr_file watch;
allow $1 { device_t device_node }:blk_file watch;
# these next rules are to satisfy assertions broken by the above lines.
# the permissions hopefully can be cut back a lot
storage_raw_read_fixed_disk($1)
storage_raw_write_fixed_disk($1)
storage_read_scsi_generic($1)
storage_write_scsi_generic($1)
typeattribute $1 memory_raw_read;
typeattribute $1 memory_raw_write;
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit getattr for generic device files.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_dontaudit_rw_generic_dev_nodes',`
gen_require(`
type device_t;
')
dontaudit $1 device_t:{ chr_file blk_file } { getattr read write ioctl };
2005-04-14 20:18:17 +00:00
')
2005-05-27 21:56:01 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create, delete, read, and write block device files.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-27 21:56:01 +00:00
#
interface(`dev_manage_generic_blk_files',`
gen_require(`
type device_t;
')
manage_blk_files_pattern($1, device_t, device_t)
2005-05-27 21:56:01 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create, delete, read, and write character device files.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-27 21:56:01 +00:00
#
interface(`dev_manage_generic_chr_files',`
gen_require(`
type device_t;
')
manage_chr_files_pattern($1, device_t, device_t)
2005-05-27 21:56:01 +00:00
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Create, read, and write device nodes. The node
## will be transitioned to the type provided.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
## <param name="file">
## <summary>
2005-06-23 21:30:57 +00:00
## Type to which the created node will be transitioned.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
## <param name="objectclass(es)">
## <summary>
2005-06-23 21:30:57 +00:00
## Object class(es) (single or set including {}) for which this
## the transition will occur.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
2005-04-14 20:18:17 +00:00
#
2006-02-21 18:40:44 +00:00
interface(`dev_filetrans',`
gen_require(`
type device_t;
')
filetrans_pattern($1, device_t, $2, $3, $4)
dev_associate($2)
2005-11-01 15:45:00 +00:00
files_associate_tmp($2)
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Create, read, and write device nodes. The node
## will be transitioned to the type provided. This is
## a temporary interface until devtmpfs functionality
## fixed.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="objectclass(es)">
## <summary>
## Object class(es) (single or set including {}) for which this
## the transition will occur.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`dev_tmpfs_filetrans_dev',`
gen_require(`
type device_t;
')
fs_tmpfs_filetrans($1, device_t, $2, $3)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Getattr on all block file device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`dev_getattr_all_blk_files',`
gen_require(`
attribute device_node;
2006-12-12 20:08:08 +00:00
type device_t;
')
getattr_blk_files_pattern($1, device_t, device_node)
')
2005-05-13 14:37:13 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit getattr on all block file device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-13 14:37:13 +00:00
#
interface(`dev_dontaudit_getattr_all_blk_files',`
gen_require(`
attribute device_node;
2009-03-05 15:36:41 +00:00
type device_t;
')
2009-03-05 15:36:41 +00:00
dontaudit $1 { device_t device_node }:blk_file getattr;
2005-05-13 14:37:13 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Getattr on all character file device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`dev_getattr_all_chr_files',`
gen_require(`
attribute device_node;
type device_t;
')
getattr_chr_files_pattern($1, device_t, device_node)
')
2005-05-13 14:37:13 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dontaudit getattr on all character file device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-13 14:37:13 +00:00
#
interface(`dev_dontaudit_getattr_all_chr_files',`
gen_require(`
attribute device_node;
2009-03-05 15:36:41 +00:00
type device_t;
')
2009-03-05 15:36:41 +00:00
dontaudit $1 { device_t device_node }:chr_file getattr;
2005-05-13 14:37:13 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Setattr on all block file device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`dev_setattr_all_blk_files',`
gen_require(`
attribute device_node;
type device_t;
')
setattr_blk_files_pattern($1, device_t, device_node)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Setattr on all character file device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
#
interface(`dev_setattr_all_chr_files',`
gen_require(`
attribute device_node;
type device_t;
')
setattr_chr_files_pattern($1, device_t, device_node)
')
2005-09-16 21:20:37 +00:00
########################################
## <summary>
## Dontaudit read on all block file device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain to not audit.
## </summary>
2005-09-16 21:20:37 +00:00
## </param>
#
interface(`dev_dontaudit_read_all_blk_files',`
gen_require(`
attribute device_node;
')
dontaudit $1 device_node:blk_file { getattr read };
')
2010-03-04 20:30:22 +00:00
########################################
## <summary>
## Dontaudit write on all block file device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_write_all_blk_files',`
gen_require(`
attribute device_node;
')
dontaudit $1 device_node:blk_file write;
')
2005-09-16 21:20:37 +00:00
########################################
## <summary>
## Dontaudit read on all character file device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain to not audit.
## </summary>
2005-09-16 21:20:37 +00:00
## </param>
#
interface(`dev_dontaudit_read_all_chr_files',`
gen_require(`
attribute device_node;
')
dontaudit $1 device_node:chr_file { getattr read };
')
2010-03-04 20:30:22 +00:00
########################################
## <summary>
## Dontaudit write on all character file device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_write_all_chr_files',`
gen_require(`
attribute device_node;
')
dontaudit $1 device_node:chr_file write;
')
2006-09-06 22:07:25 +00:00
########################################
## <summary>
## Create all block device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_all_blk_files',`
gen_require(`
attribute device_node;
type device_t;
2006-09-06 22:07:25 +00:00
')
create_blk_files_pattern($1, device_t, device_node)
2006-09-06 22:07:25 +00:00
')
########################################
## <summary>
## Create all character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_all_chr_files',`
gen_require(`
attribute device_node;
type device_t;
2006-09-06 22:07:25 +00:00
')
create_chr_files_pattern($1, device_t, device_node)
2006-09-06 22:07:25 +00:00
')
########################################
## <summary>
## Delete all block device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_delete_all_blk_files',`
gen_require(`
attribute device_node;
type device_t;
2006-09-06 22:07:25 +00:00
')
delete_blk_files_pattern($1, device_t, device_node)
2006-09-06 22:07:25 +00:00
')
########################################
## <summary>
## Delete all character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_delete_all_chr_files',`
gen_require(`
attribute device_node;
type device_t;
2006-09-06 22:07:25 +00:00
')
delete_chr_files_pattern($1, device_t, device_node)
2006-09-06 22:07:25 +00:00
')
########################################
## <summary>
## Rename all block device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rename_all_blk_files',`
gen_require(`
attribute device_node;
type device_t;
2006-09-06 22:07:25 +00:00
')
rename_blk_files_pattern($1, device_t, device_node)
2006-09-06 22:07:25 +00:00
')
########################################
## <summary>
## Rename all character device files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rename_all_chr_files',`
gen_require(`
attribute device_node;
type device_t;
2006-09-06 22:07:25 +00:00
')
rename_chr_files_pattern($1, device_t, device_node)
2006-09-06 22:07:25 +00:00
')
2005-05-27 21:56:01 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read, write, create, and delete all block device files.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-27 21:56:01 +00:00
#
interface(`dev_manage_all_blk_files',`
gen_require(`
attribute device_node;
type device_t;
')
manage_blk_files_pattern($1, device_t, device_node)
# these next rules are to satisfy assertions broken by the above lines.
storage_raw_read_fixed_disk($1)
storage_raw_write_fixed_disk($1)
storage_read_scsi_generic($1)
storage_write_scsi_generic($1)
2005-05-27 21:56:01 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read, write, create, and delete all character device files.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-27 21:56:01 +00:00
#
interface(`dev_manage_all_chr_files',`
gen_require(`
attribute device_node, memory_raw_read, memory_raw_write;
type device_t;
')
manage_chr_files_pattern($1, device_t, device_node)
typeattribute $1 memory_raw_read, memory_raw_write;
2005-05-27 21:56:01 +00:00
')
2006-01-19 21:04:33 +00:00
########################################
## <summary>
## Get the attributes of the apm bios device node.
2006-01-19 21:04:33 +00:00
## </summary>
## <param name="domain">
## <summary>
2006-01-19 21:04:33 +00:00
## Domain allowed access.
## </summary>
2006-01-19 21:04:33 +00:00
## </param>
#
interface(`dev_getattr_acpi_bios_dev',`
2006-01-19 21:04:33 +00:00
gen_require(`
type device_t, acpi_bios_t;
2006-01-19 21:04:33 +00:00
')
getattr_chr_files_pattern($1, device_t, acpi_bios_t)
2006-01-19 21:04:33 +00:00
')
########################################
## <summary>
## Do not audit attempts to get the attributes of
## the apm bios device node.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_getattr_acpi_bios_dev',`
gen_require(`
type acpi_bios_t;
')
dontaudit $1 acpi_bios_t:chr_file getattr;
')
2005-06-30 18:54:08 +00:00
########################################
## <summary>
## Set the attributes of the apm bios device node.
2005-06-30 18:54:08 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain allowed access.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_setattr_acpi_bios_dev',`
2005-06-30 18:54:08 +00:00
gen_require(`
type device_t, acpi_bios_t;
2005-06-30 18:54:08 +00:00
')
setattr_chr_files_pattern($1, device_t, acpi_bios_t)
2005-06-30 18:54:08 +00:00
')
########################################
## <summary>
## Do not audit attempts to set the attributes of
2005-06-30 18:54:08 +00:00
## the apm bios device node.
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain to not audit.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_dontaudit_setattr_acpi_bios_dev',`
2005-06-30 18:54:08 +00:00
gen_require(`
type acpi_bios_t;
2005-06-30 18:54:08 +00:00
')
dontaudit $1 acpi_bios_t:chr_file setattr;
2005-06-30 18:54:08 +00:00
')
########################################
## <summary>
## Read and write the apm bios.
2005-06-30 18:54:08 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain allowed access.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_rw_acpi_bios',`
2005-06-30 18:54:08 +00:00
gen_require(`
type device_t, acpi_bios_t;
2005-06-30 18:54:08 +00:00
')
rw_chr_files_pattern($1, device_t, acpi_bios_t)
2005-06-30 18:54:08 +00:00
')
########################################
## <summary>
## Getattr the agp devices.
2005-06-30 18:54:08 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_getattr_agp_dev',`
2005-06-30 18:54:08 +00:00
gen_require(`
type device_t, agp_device_t;
2005-06-30 18:54:08 +00:00
')
getattr_chr_files_pattern($1, device_t, agp_device_t)
2005-06-30 18:54:08 +00:00
')
2005-06-29 20:53:53 +00:00
########################################
## <summary>
## Read and write the agp devices.
2005-06-29 20:53:53 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-29 20:53:53 +00:00
## Domain allowed access.
## </summary>
2005-06-29 20:53:53 +00:00
## </param>
#
interface(`dev_rw_agp',`
2005-06-29 20:53:53 +00:00
gen_require(`
type device_t, agp_device_t;
2005-06-29 20:53:53 +00:00
')
rw_chr_files_pattern($1, device_t, agp_device_t)
2005-06-29 20:53:53 +00:00
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Get the attributes of the autofs device node.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_autofs_dev',`
gen_require(`
type device_t, autofs_device_t;
')
getattr_chr_files_pattern($1, device_t, autofs_device_t)
')
########################################
## <summary>
## Do not audit attempts to get the attributes of
## the autofs device node.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_getattr_autofs_dev',`
gen_require(`
type autofs_device_t;
')
dontaudit $1 autofs_device_t:chr_file getattr;
')
########################################
## <summary>
## Set the attributes of the autofs device node.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_autofs_dev',`
gen_require(`
type device_t, autofs_device_t;
')
setattr_chr_files_pattern($1, device_t, autofs_device_t)
')
########################################
## <summary>
## Do not audit attempts to set the attributes of
## the autofs device node.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_setattr_autofs_dev',`
gen_require(`
type autofs_device_t;
')
dontaudit $1 autofs_device_t:chr_file setattr;
')
########################################
## <summary>
## Read and write the autofs device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_autofs',`
gen_require(`
type device_t, autofs_device_t;
')
rw_chr_files_pattern($1, device_t, autofs_device_t)
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Relabel the autofs device node.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_relabel_autofs_dev',`
gen_require(`
type autofs_device_t;
')
allow $1 autofs_device_t:chr_file relabel_chr_file_perms;
')
########################################
## <summary>
## Read and write cachefiles character
## device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_cachefiles',`
gen_require(`
type device_t, cachefiles_device_t;
')
rw_chr_files_pattern($1, device_t, cachefiles_device_t)
')
2005-11-08 22:00:30 +00:00
########################################
## <summary>
## Read and write the PCMCIA card manager device.
## </summary>
## <param name="domain">
## <summary>
2005-11-08 22:00:30 +00:00
## Domain allowed access.
## </summary>
2005-11-08 22:00:30 +00:00
## </param>
#
interface(`dev_rw_cardmgr',`
gen_require(`
type cardmgr_dev_t, device_t;
2005-11-08 22:00:30 +00:00
')
rw_chr_files_pattern($1, device_t, cardmgr_dev_t)
2005-11-08 22:00:30 +00:00
')
########################################
## <summary>
## Do not audit attempts to read and
## write the PCMCIA card manager device.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_rw_cardmgr',`
gen_require(`
type cardmgr_dev_t;
')
dontaudit $1 cardmgr_dev_t:chr_file { read write };
')
########################################
## <summary>
## Create, read, write, and delete
## the PCMCIA card manager device
## with the correct type.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_cardmgr_dev',`
gen_require(`
type device_t, cardmgr_dev_t;
')
create_chr_files_pattern($1, device_t, cardmgr_dev_t)
create_blk_files_pattern($1, device_t, cardmgr_dev_t)
')
2005-11-29 21:27:15 +00:00
########################################
## <summary>
## Create, read, write, and delete
## the PCMCIA card manager device.
## </summary>
## <param name="domain">
## <summary>
2005-11-29 21:27:15 +00:00
## Domain allowed access.
## </summary>
2005-11-29 21:27:15 +00:00
## </param>
#
interface(`dev_manage_cardmgr_dev',`
2005-11-29 21:27:15 +00:00
gen_require(`
type device_t, cardmgr_dev_t;
')
manage_chr_files_pattern($1, device_t, cardmgr_dev_t)
manage_blk_files_pattern($1, device_t, cardmgr_dev_t)
2005-11-29 21:27:15 +00:00
')
########################################
## <summary>
## Automatic type transition to the type
## for PCMCIA card manager device nodes when
## created in /dev.
2005-11-29 21:27:15 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-11-29 21:27:15 +00:00
## Domain allowed access.
## </summary>
2005-11-29 21:27:15 +00:00
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
2005-11-29 21:27:15 +00:00
#
interface(`dev_filetrans_cardmgr',`
2005-11-29 21:27:15 +00:00
gen_require(`
type device_t, cardmgr_dev_t;
')
filetrans_pattern($1, device_t, cardmgr_dev_t, { chr_file blk_file }, $2)
2005-11-29 21:27:15 +00:00
')
2005-09-20 18:15:35 +00:00
########################################
## <summary>
## Get the attributes of the CPU
## microcode and id interfaces.
## </summary>
## <param name="domain">
## <summary>
2005-09-20 18:15:35 +00:00
## Domain allowed access.
## </summary>
2005-09-20 18:15:35 +00:00
## </param>
#
interface(`dev_getattr_cpu_dev',`
2005-09-20 18:15:35 +00:00
gen_require(`
type device_t, cpu_device_t;
')
getattr_chr_files_pattern($1, device_t, cpu_device_t)
2005-09-20 18:15:35 +00:00
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Set the attributes of the CPU
## microcode and id interfaces.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_cpu_dev',`
gen_require(`
type device_t, cpu_device_t;
')
setattr_chr_files_pattern($1, device_t, cpu_device_t)
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read the CPU identity.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_read_cpuid',`
gen_require(`
type device_t, cpu_device_t;
')
read_chr_files_pattern($1, device_t, cpu_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and write the the CPU microcode device. This
## is required to load CPU microcode.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_rw_cpu_microcode',`
gen_require(`
type device_t, cpu_device_t;
')
rw_chr_files_pattern($1, device_t, cpu_device_t)
2005-04-14 20:18:17 +00:00
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Read the kernel crash device
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_crash',`
gen_require(`
type device_t, crash_device_t;
')
read_chr_files_pattern($1, device_t, crash_device_t)
')
2005-10-12 16:23:22 +00:00
########################################
## <summary>
## Read and write the the hardware SSL accelerator.
## </summary>
## <param name="domain">
## <summary>
2005-10-12 16:23:22 +00:00
## Domain allowed access.
## </summary>
2005-10-12 16:23:22 +00:00
## </param>
#
interface(`dev_rw_crypto',`
gen_require(`
type device_t, crypt_device_t;
')
rw_chr_files_pattern($1, device_t, crypt_device_t)
2005-10-12 16:23:22 +00:00
')
2010-03-04 20:30:22 +00:00
#######################################
## <summary>
## Set the attributes of the dlm control devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_dlm_control',`
gen_require(`
type device_t, dlm_control_device_t;
2010-03-04 20:30:22 +00:00
')
setattr_chr_files_pattern($1, device_t, dlm_control_device_t)
')
#######################################
## <summary>
## Read and write the the dlm control device
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_dlm_control',`
gen_require(`
type device_t, dlm_control_device_t;
')
rw_chr_files_pattern($1, device_t, dlm_control_device_t)
')
########################################
## <summary>
## getattr the dri devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_dri_dev',`
gen_require(`
type device_t, dri_device_t;
')
getattr_chr_files_pattern($1, device_t, dri_device_t)
')
########################################
## <summary>
## Setattr the dri devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_dri_dev',`
gen_require(`
type device_t, dri_device_t;
')
setattr_chr_files_pattern($1, device_t, dri_device_t)
')
Changes to support plymouth working in enforcing plymouth is started very early in the boot process. Looks like before the SELinux policy is loaded so plymouthd is running as kernel_t rather than plymouthd_t. Due to this I needed to allow a few permissions on kernel_t to get the system to boot. type=AVC msg=audit(1554917011.127:225): avc: denied { write } for pid=2585 comm="plymouthd" name="plymouth" dev="tmpfs" ino=18877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_run_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1554917011.127:226): avc: denied { remove_name } for pid=2585 comm="plymouthd" name="pid" dev="tmpfs" ino=18883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_run_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1554917011.127:227): avc: denied { unlink } for pid=2585 comm="plymouthd" name="pid" dev="tmpfs" ino=18883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_run_t:s0 tclass=file permissive=1 type=AVC msg=audit(1554917011.116:224): avc: denied { write } for pid=2585 comm="plymouthd" name="boot-duration" dev="dm-16" ino=2097285 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_lib_t:s0 tclass=file permissive=1 type=AVC msg=audit(1555069712.938:237): avc: denied { ioctl } for pid=2554 comm="plymouthd" path="/dev/dri/card0" dev="devtmpfs" ino=12229 ioctlcmd=64b1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=0
2019-04-11 12:56:12 +00:00
########################################
## <summary>
## IOCTL the dri devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_ioctl_dri_dev',`
gen_require(`
type dri_device_t;
Changes to support plymouth working in enforcing plymouth is started very early in the boot process. Looks like before the SELinux policy is loaded so plymouthd is running as kernel_t rather than plymouthd_t. Due to this I needed to allow a few permissions on kernel_t to get the system to boot. type=AVC msg=audit(1554917011.127:225): avc: denied { write } for pid=2585 comm="plymouthd" name="plymouth" dev="tmpfs" ino=18877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_run_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1554917011.127:226): avc: denied { remove_name } for pid=2585 comm="plymouthd" name="pid" dev="tmpfs" ino=18883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_run_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1554917011.127:227): avc: denied { unlink } for pid=2585 comm="plymouthd" name="pid" dev="tmpfs" ino=18883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_run_t:s0 tclass=file permissive=1 type=AVC msg=audit(1554917011.116:224): avc: denied { write } for pid=2585 comm="plymouthd" name="boot-duration" dev="dm-16" ino=2097285 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:plymouthd_var_lib_t:s0 tclass=file permissive=1 type=AVC msg=audit(1555069712.938:237): avc: denied { ioctl } for pid=2554 comm="plymouthd" path="/dev/dri/card0" dev="devtmpfs" ino=12229 ioctlcmd=64b1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=0
2019-04-11 12:56:12 +00:00
')
allow $1 dri_device_t:chr_file ioctl;
')
2005-05-30 21:17:20 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
2006-01-19 21:04:33 +00:00
## Read and write the dri devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-30 21:17:20 +00:00
#
interface(`dev_rw_dri',`
gen_require(`
type device_t, dri_device_t;
')
rw_chr_files_pattern($1, device_t, dri_device_t)
refpolicy: Define and allow map permission Kernel commit 6941857e82ae ("selinux: add a map permission check for mmap") added a map permission check on mmap so that we can distinguish memory mapped access (since it has different implications for revocation). The purpose of a separate map permission check on mmap(2) is to permit policy to prohibit memory mapping of specific files for which we need to ensure that every access is revalidated, particularly useful for scenarios where we expect the file to be relabeled at runtime in order to reflect state changes (e.g. cross-domain solution, assured pipeline without data copying). The kernel commit is anticipated to be included in Linux 4.13. This refpolicy change defines map permission for refpolicy. It mirrors the definition in the kernel classmap by adding it to the common definitions for files and sockets. This will break compatibility for kernels that predate the dynamic class/perm mapping support (< 2.6.33, < RHEL 6); on such kernels, one would instead need to add map permission to the end of each file and socket access vector. This change only allows map permission as needed, e.g. only in the mmap_file_perms and exec_file_perms object permission sets (since map is always required there) and only in specific interfaces or modules where denials were observed in limited testing. It is important to note that effective use of this permission requires complete removal of unconfined, as otherwise unconfined domains will be able to map all file types and therefore bypass the intended protection. If we wanted to exclude map permission to all file types by default from unconfined, we would need to add it to the list of permissions excluded from files_unconfined_type in kernel/files.te. Policies that depend on this permission not being allowed to specific file types should also make use of neverallow rules to ensure that this is not undermined by any allow rule, and ensure that they are performing neverallow checking at policy build time (e.g. make validate) or runtime (e.g. semanage.conf expand-check=1). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2017-05-24 19:40:18 +00:00
allow $1 dri_device_t:chr_file map;
2005-05-30 21:17:20 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
2006-01-19 21:04:33 +00:00
## Dontaudit read and write on the dri devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-30 21:17:20 +00:00
#
interface(`dev_dontaudit_rw_dri',`
gen_require(`
2006-01-19 21:04:33 +00:00
type dri_device_t;
')
2009-03-05 15:36:41 +00:00
dontaudit $1 dri_device_t:chr_file rw_chr_file_perms;
2005-05-30 21:17:20 +00:00
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
2006-01-19 21:04:33 +00:00
## Create, read, write, and delete the dri devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2006-01-19 21:04:33 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
2006-01-19 21:04:33 +00:00
interface(`dev_manage_dri_dev',`
gen_require(`
2006-01-19 21:04:33 +00:00
type device_t, dri_device_t;
')
manage_chr_files_pattern($1, device_t, dri_device_t)
allow $1 dri_device_t:chr_file map;
')
########################################
## <summary>
## Automatic type transition to the type
## for DRI device nodes when created in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`dev_filetrans_dri',`
gen_require(`
type device_t, dri_device_t;
')
filetrans_pattern($1, device_t, dri_device_t, chr_file, $2)
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Automatic type transition to the type
## for event device nodes when created in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`dev_filetrans_input_dev',`
gen_require(`
type device_t, event_device_t;
')
filetrans_pattern($1, device_t, event_device_t, chr_file, $2)
')
2007-10-29 18:35:32 +00:00
########################################
## <summary>
## Get the attributes of the event devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_input_dev',`
gen_require(`
type device_t, event_device_t;
')
allow $1 device_t:dir list_dir_perms;
allow $1 event_device_t:chr_file getattr;
')
########################################
## <summary>
## Set the attributes of the event devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_input_dev',`
gen_require(`
type device_t, event_device_t;
')
allow $1 device_t:dir list_dir_perms;
allow $1 event_device_t:chr_file setattr;
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read input event devices (/dev/input).
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_read_input',`
gen_require(`
type device_t, event_device_t;
')
read_chr_files_pattern($1, device_t, event_device_t)
2005-04-14 20:18:17 +00:00
')
2006-01-19 21:04:33 +00:00
########################################
## <summary>
## Read and write input event devices (/dev/input).
2006-01-19 21:04:33 +00:00
## </summary>
## <param name="domain">
## <summary>
2006-01-19 21:04:33 +00:00
## Domain allowed access.
## </summary>
2006-01-19 21:04:33 +00:00
## </param>
#
interface(`dev_rw_input_dev',`
gen_require(`
type device_t, event_device_t;
')
rw_chr_files_pattern($1, device_t, event_device_t)
2006-01-19 21:04:33 +00:00
')
########################################
## <summary>
## Create, read, write, and delete input event devices (/dev/input).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_input_dev',`
gen_require(`
type device_t, event_device_t;
')
manage_chr_files_pattern($1, device_t, event_device_t)
')
########################################
## <summary>
## IOCTL the input event devices (/dev/input).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_ioctl_input_dev',`
gen_require(`
type event_device_t;
')
allow $1 event_device_t:chr_file ioctl;
')
########################################
## <summary>
## Read and write ipmi devices (/dev/ipmi*).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_ipmi_dev',`
gen_require(`
type device_t, ipmi_device_t;
')
rw_chr_files_pattern($1, device_t, ipmi_device_t)
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of the framebuffer device node.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_getattr_framebuffer_dev',`
gen_require(`
type device_t, framebuf_device_t;
')
getattr_chr_files_pattern($1, device_t, framebuf_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of the framebuffer device node.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_setattr_framebuffer_dev',`
gen_require(`
type device_t, framebuf_device_t;
')
setattr_chr_files_pattern($1, device_t, framebuf_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Dot not audit attempts to set the attributes
## of the framebuffer device node.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_dontaudit_setattr_framebuffer_dev',`
gen_require(`
type framebuf_device_t;
')
dontaudit $1 framebuf_device_t:chr_file setattr;
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read the framebuffer.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_read_framebuffer',`
gen_require(`
type framebuf_device_t, device_t;
')
read_chr_files_pattern($1, device_t, framebuf_device_t)
')
2005-05-30 21:17:20 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Do not audit attempts to read the framebuffer.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-30 21:17:20 +00:00
#
interface(`dev_dontaudit_read_framebuffer',`
gen_require(`
type framebuf_device_t;
')
dontaudit $1 framebuf_device_t:chr_file { getattr read };
2005-05-30 21:17:20 +00:00
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write the framebuffer.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_write_framebuffer',`
gen_require(`
type device_t, framebuf_device_t;
')
write_chr_files_pattern($1, device_t, framebuf_device_t)
2005-04-14 20:18:17 +00:00
')
2006-01-19 21:04:33 +00:00
########################################
## <summary>
## Read and write the framebuffer.
## </summary>
## <param name="domain">
## <summary>
2006-01-19 21:04:33 +00:00
## Domain allowed access.
## </summary>
2006-01-19 21:04:33 +00:00
## </param>
#
interface(`dev_rw_framebuffer',`
gen_require(`
type device_t, framebuf_device_t;
')
rw_chr_files_pattern($1, device_t, framebuf_device_t)
2006-01-19 21:04:33 +00:00
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Read the kernel messages
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_kmsg',`
gen_require(`
type device_t, kmsg_device_t;
')
read_chr_files_pattern($1, device_t, kmsg_device_t)
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Do not audit attempts to read the kernel messages
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_read_kmsg',`
gen_require(`
type kmsg_device_t;
')
dontaudit $1 kmsg_device_t:chr_file read;
')
2010-03-04 20:30:22 +00:00
########################################
## <summary>
## Write to the kernel messages device
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_write_kmsg',`
gen_require(`
type device_t, kmsg_device_t;
')
write_chr_files_pattern($1, device_t, kmsg_device_t)
')
########################################
## <summary>
## Read and write to the kernel messages device
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_kmsg',`
gen_require(`
type device_t, kmsg_device_t;
')
rw_chr_files_pattern($1, device_t, kmsg_device_t)
')
########################################
## <summary>
## Mount on the kernel messages device
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_mounton_kmsg',`
gen_require(`
type kmsg_device_t;
')
allow $1 kmsg_device_t:chr_file mounton;
')
2009-11-19 14:44:19 +00:00
########################################
## <summary>
## Get the attributes of the ksm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_ksm_dev',`
gen_require(`
type device_t, ksm_device_t;
')
getattr_chr_files_pattern($1, device_t, ksm_device_t)
')
########################################
## <summary>
## Set the attributes of the ksm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_ksm_dev',`
gen_require(`
type device_t, ksm_device_t;
')
setattr_chr_files_pattern($1, device_t, ksm_device_t)
')
########################################
## <summary>
## Read the ksm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_ksm',`
gen_require(`
type device_t, ksm_device_t;
')
read_chr_files_pattern($1, device_t, ksm_device_t)
')
########################################
## <summary>
## Read and write to ksm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_ksm',`
gen_require(`
type device_t, ksm_device_t;
')
rw_chr_files_pattern($1, device_t, ksm_device_t)
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Get the attributes of the kvm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_kvm_dev',`
gen_require(`
type device_t, kvm_device_t;
')
getattr_chr_files_pattern($1, device_t, kvm_device_t)
')
########################################
## <summary>
## Set the attributes of the kvm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_kvm_dev',`
gen_require(`
type device_t, kvm_device_t;
')
setattr_chr_files_pattern($1, device_t, kvm_device_t)
')
########################################
## <summary>
## Read the kvm devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_kvm',`
gen_require(`
type device_t, kvm_device_t;
')
read_chr_files_pattern($1, device_t, kvm_device_t)
')
########################################
## <summary>
2009-06-26 14:40:13 +00:00
## Read and write to kvm devices.
2009-03-05 15:36:41 +00:00
## </summary>
## <param name="domain">
## <summary>
2009-06-26 14:40:13 +00:00
## Domain allowed access.
2009-03-05 15:36:41 +00:00
## </summary>
## </param>
#
interface(`dev_rw_kvm',`
gen_require(`
type device_t, kvm_device_t;
')
rw_chr_files_pattern($1, device_t, kvm_device_t)
')
2009-11-19 14:44:19 +00:00
######################################
## <summary>
## Read the lirc device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_lirc',`
gen_require(`
type device_t, lirc_device_t;
')
read_chr_files_pattern($1, device_t, lirc_device_t)
')
######################################
## <summary>
## Read and write the lirc device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_lirc',`
gen_require(`
type device_t, lirc_device_t;
')
rw_chr_files_pattern($1, device_t, lirc_device_t)
')
######################################
## <summary>
## Automatic type transition to the type
## for lirc device nodes when created in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`dev_filetrans_lirc',`
gen_require(`
type device_t, lirc_device_t;
')
filetrans_pattern($1, device_t, lirc_device_t, chr_file, $2)
')
2009-11-19 14:44:19 +00:00
######################################
## <summary>
## Read and write the loop-control device.
2009-11-19 14:44:19 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_loop_control',`
2009-11-19 14:44:19 +00:00
gen_require(`
type device_t, loop_control_device_t;
2009-11-19 14:44:19 +00:00
')
rw_chr_files_pattern($1, device_t, loop_control_device_t)
2009-11-19 14:44:19 +00:00
')
########################################
## <summary>
## Get the attributes of the lvm comtrol device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_lvm_control',`
gen_require(`
type device_t, lvm_control_t;
')
getattr_chr_files_pattern($1, device_t, lvm_control_t)
')
2005-05-05 21:19:18 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read the lvm comtrol device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-05-05 21:19:18 +00:00
#
interface(`dev_read_lvm_control',`
gen_require(`
type device_t, lvm_control_t;
')
read_chr_files_pattern($1, device_t, lvm_control_t)
2005-05-05 21:19:18 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and write the lvm control device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_rw_lvm_control',`
gen_require(`
type device_t, lvm_control_t;
')
rw_chr_files_pattern($1, device_t, lvm_control_t)
')
2009-11-19 14:44:19 +00:00
########################################
## <summary>
## Do not audit attempts to read and write lvm control device.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2009-11-19 14:44:19 +00:00
## </summary>
## </param>
#
interface(`dev_dontaudit_rw_lvm_control',`
gen_require(`
type lvm_control_t;
')
dontaudit $1 lvm_control_t:chr_file rw_chr_file_perms;
2009-11-19 14:44:19 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Delete the lvm control device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_delete_lvm_control_dev',`
gen_require(`
type device_t, lvm_control_t;
')
delete_chr_files_pattern($1, device_t, lvm_control_t)
')
2006-01-17 17:50:10 +00:00
########################################
## <summary>
## dontaudit getattr raw memory devices (e.g. /dev/mem).
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2006-01-17 17:50:10 +00:00
## </param>
#
interface(`dev_dontaudit_getattr_memory_dev',`
gen_require(`
type memory_device_t;
')
dontaudit $1 memory_device_t:chr_file getattr;
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read raw memory devices (e.g. /dev/mem).
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_read_raw_memory',`
gen_require(`
type device_t, memory_device_t;
attribute memory_raw_read;
')
read_chr_files_pattern($1, device_t, memory_device_t)
allow $1 self:capability sys_rawio;
typeattribute $1 memory_raw_read;
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Read raw memory devices (e.g. /dev/mem) if a tunable is set.
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="tunable">
## <summary>
## Tunable to depend on
## </summary>
## </param>
#
interface(`dev_read_raw_memory_cond',`
gen_require(`
type device_t, memory_device_t;
attribute memory_raw_read;
')
typeattribute $1 memory_raw_read;
tunable_policy(`$2', `
read_chr_files_pattern($1, device_t, memory_device_t)
allow $1 self:capability sys_rawio;
')
')
2010-03-04 20:30:22 +00:00
########################################
## <summary>
## Do not audit attempts to read raw memory devices
## (e.g. /dev/mem).
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
2010-03-04 20:30:22 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_read_raw_memory',`
gen_require(`
type memory_device_t;
')
dontaudit $1 memory_device_t:chr_file read_chr_file_perms;
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write raw memory devices (e.g. /dev/mem).
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_write_raw_memory',`
gen_require(`
type device_t, memory_device_t;
attribute memory_raw_write;
')
write_chr_files_pattern($1, device_t, memory_device_t)
allow $1 self:capability sys_rawio;
typeattribute $1 memory_raw_write;
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Write raw memory devices (e.g. /dev/mem) if a tunable is set.
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="tunable">
## <summary>
## Tunable to depend on
## </summary>
## </param>
#
interface(`dev_write_raw_memory_cond',`
gen_require(`
type device_t, memory_device_t;
attribute memory_raw_write;
')
typeattribute $1 memory_raw_write;
tunable_policy(`$2', `
write_chr_files_pattern($1, device_t, memory_device_t)
allow $1 self:capability sys_rawio;
')
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and execute raw memory devices (e.g. /dev/mem).
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_rx_raw_memory',`
gen_require(`
type memory_device_t;
')
dev_read_raw_memory($1)
refpolicy: Define and allow map permission Kernel commit 6941857e82ae ("selinux: add a map permission check for mmap") added a map permission check on mmap so that we can distinguish memory mapped access (since it has different implications for revocation). The purpose of a separate map permission check on mmap(2) is to permit policy to prohibit memory mapping of specific files for which we need to ensure that every access is revalidated, particularly useful for scenarios where we expect the file to be relabeled at runtime in order to reflect state changes (e.g. cross-domain solution, assured pipeline without data copying). The kernel commit is anticipated to be included in Linux 4.13. This refpolicy change defines map permission for refpolicy. It mirrors the definition in the kernel classmap by adding it to the common definitions for files and sockets. This will break compatibility for kernels that predate the dynamic class/perm mapping support (< 2.6.33, < RHEL 6); on such kernels, one would instead need to add map permission to the end of each file and socket access vector. This change only allows map permission as needed, e.g. only in the mmap_file_perms and exec_file_perms object permission sets (since map is always required there) and only in specific interfaces or modules where denials were observed in limited testing. It is important to note that effective use of this permission requires complete removal of unconfined, as otherwise unconfined domains will be able to map all file types and therefore bypass the intended protection. If we wanted to exclude map permission to all file types by default from unconfined, we would need to add it to the list of permissions excluded from files_unconfined_type in kernel/files.te. Policies that depend on this permission not being allowed to specific file types should also make use of neverallow rules to ensure that this is not undermined by any allow rule, and ensure that they are performing neverallow checking at policy build time (e.g. make validate) or runtime (e.g. semanage.conf expand-check=1). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2017-05-24 19:40:18 +00:00
allow $1 memory_device_t:chr_file { map execute };
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write and execute raw memory devices (e.g. /dev/mem).
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_wx_raw_memory',`
gen_require(`
type memory_device_t;
')
dev_write_raw_memory($1)
refpolicy: Define and allow map permission Kernel commit 6941857e82ae ("selinux: add a map permission check for mmap") added a map permission check on mmap so that we can distinguish memory mapped access (since it has different implications for revocation). The purpose of a separate map permission check on mmap(2) is to permit policy to prohibit memory mapping of specific files for which we need to ensure that every access is revalidated, particularly useful for scenarios where we expect the file to be relabeled at runtime in order to reflect state changes (e.g. cross-domain solution, assured pipeline without data copying). The kernel commit is anticipated to be included in Linux 4.13. This refpolicy change defines map permission for refpolicy. It mirrors the definition in the kernel classmap by adding it to the common definitions for files and sockets. This will break compatibility for kernels that predate the dynamic class/perm mapping support (< 2.6.33, < RHEL 6); on such kernels, one would instead need to add map permission to the end of each file and socket access vector. This change only allows map permission as needed, e.g. only in the mmap_file_perms and exec_file_perms object permission sets (since map is always required there) and only in specific interfaces or modules where denials were observed in limited testing. It is important to note that effective use of this permission requires complete removal of unconfined, as otherwise unconfined domains will be able to map all file types and therefore bypass the intended protection. If we wanted to exclude map permission to all file types by default from unconfined, we would need to add it to the list of permissions excluded from files_unconfined_type in kernel/files.te. Policies that depend on this permission not being allowed to specific file types should also make use of neverallow rules to ensure that this is not undermined by any allow rule, and ensure that they are performing neverallow checking at policy build time (e.g. make validate) or runtime (e.g. semanage.conf expand-check=1). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2017-05-24 19:40:18 +00:00
allow $1 memory_device_t:chr_file { map execute };
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
## This is extremely dangerous as it can bypass the
## SELinux protections, and should only be used by trusted
## domains.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="tunable">
## <summary>
## Tunable to depend on
## </summary>
## </param>
#
interface(`dev_wx_raw_memory_cond',`
gen_require(`
type memory_device_t;
attribute memory_raw_write;
')
typeattribute $1 memory_raw_write;
dev_write_raw_memory_cond($1, $2)
tunable_policy(`$2', `
allow $1 memory_device_t:chr_file { map execute };
')
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of miscellaneous devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_getattr_misc_dev',`
gen_require(`
type device_t, misc_device_t;
')
getattr_chr_files_pattern($1, device_t, misc_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Do not audit attempts to get the attributes
## of miscellaneous devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_dontaudit_getattr_misc_dev',`
gen_require(`
type misc_device_t;
')
dontaudit $1 misc_device_t:chr_file getattr;
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of miscellaneous devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_setattr_misc_dev',`
gen_require(`
type device_t, misc_device_t;
')
setattr_chr_files_pattern($1, device_t, misc_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Do not audit attempts to set the attributes
## of miscellaneous devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_dontaudit_setattr_misc_dev',`
gen_require(`
type misc_device_t;
')
dontaudit $1 misc_device_t:chr_file setattr;
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read miscellaneous devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_read_misc',`
gen_require(`
type device_t, misc_device_t;
')
read_chr_files_pattern($1, device_t, misc_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write miscellaneous devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_write_misc',`
gen_require(`
type device_t, misc_device_t;
')
write_chr_files_pattern($1, device_t, misc_device_t)
2005-04-14 20:18:17 +00:00
')
2006-01-20 22:02:24 +00:00
########################################
## <summary>
## Do not audit attempts to read and write miscellaneous devices.
## </summary>
## <param name="domain">
## <summary>
2006-01-20 22:02:24 +00:00
## Domain allowed access.
## </summary>
2006-01-20 22:02:24 +00:00
## </param>
#
interface(`dev_dontaudit_rw_misc',`
gen_require(`
type misc_device_t;
')
dontaudit $1 misc_device_t:chr_file rw_chr_file_perms;
2006-01-20 22:02:24 +00:00
')
2009-11-19 14:44:19 +00:00
########################################
## <summary>
## Get the attributes of the modem devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_modem_dev',`
gen_require(`
type device_t, modem_device_t;
')
getattr_chr_files_pattern($1, device_t, modem_device_t)
')
########################################
## <summary>
## Set the attributes of the modem devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_modem_dev',`
gen_require(`
type device_t, modem_device_t;
')
setattr_chr_files_pattern($1, device_t, modem_device_t)
')
########################################
## <summary>
## Read the modem devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_modem',`
gen_require(`
type device_t, modem_device_t;
')
read_chr_files_pattern($1, device_t, modem_device_t)
')
########################################
## <summary>
## Read and write to modem devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_modem',`
gen_require(`
type device_t, modem_device_t;
')
rw_chr_files_pattern($1, device_t, modem_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of the mouse devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_getattr_mouse_dev',`
gen_require(`
type device_t, mouse_device_t;
')
getattr_chr_files_pattern($1, device_t, mouse_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of the mouse devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_setattr_mouse_dev',`
gen_require(`
type device_t, mouse_device_t;
')
setattr_chr_files_pattern($1, device_t, mouse_device_t)
2005-06-30 18:54:08 +00:00
')
########################################
## <summary>
## Read the mouse devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_read_mouse',`
gen_require(`
type device_t, mouse_device_t;
')
read_chr_files_pattern($1, device_t, mouse_device_t)
2005-04-14 20:18:17 +00:00
')
2005-09-23 19:38:34 +00:00
########################################
## <summary>
2008-12-03 19:16:20 +00:00
## Read and write to mouse devices.
2005-09-23 19:38:34 +00:00
## </summary>
## <param name="domain">
## <summary>
2008-12-03 19:16:20 +00:00
## Domain allowed access.
## </summary>
2005-09-23 19:38:34 +00:00
## </param>
#
interface(`dev_rw_mouse',`
gen_require(`
type device_t, mouse_device_t;
')
rw_chr_files_pattern($1, device_t, mouse_device_t)
2005-09-23 19:38:34 +00:00
')
2005-10-31 22:19:16 +00:00
########################################
## <summary>
## Get the attributes of the memory type range
## registers (MTRR) device.
2005-10-31 22:19:16 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-10-31 22:19:16 +00:00
## Domain allowed access.
## </summary>
2005-10-31 22:19:16 +00:00
## </param>
#
interface(`dev_getattr_mtrr_dev',`
2005-10-31 22:19:16 +00:00
gen_require(`
type device_t, mtrr_device_t;
')
getattr_files_pattern($1, device_t, mtrr_device_t)
getattr_chr_files_pattern($1, device_t, mtrr_device_t)
2005-10-31 22:19:16 +00:00
')
2010-03-04 20:30:22 +00:00
########################################
## <summary>
## Do not audit attempts to write the memory type
## range registers (MTRR).
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_write_mtrr',`
gen_require(`
type mtrr_device_t;
')
dontaudit $1 mtrr_device_t:file write;
2010-03-04 20:30:22 +00:00
dontaudit $1 mtrr_device_t:chr_file write;
')
2006-01-19 21:04:33 +00:00
########################################
## <summary>
## Read and write the memory type range registers (MTRR).
2006-01-19 21:04:33 +00:00
## </summary>
## <param name="domain">
## <summary>
2006-01-19 21:04:33 +00:00
## Domain allowed access.
## </summary>
2006-01-19 21:04:33 +00:00
## </param>
#
interface(`dev_rw_mtrr',`
gen_require(`
type device_t, mtrr_device_t;
')
rw_files_pattern($1, device_t, mtrr_device_t)
rw_chr_files_pattern($1, device_t, mtrr_device_t)
2006-01-19 21:04:33 +00:00
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Get the attributes of the network control device (Deprecated)
2009-03-05 15:36:41 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_netcontrol_dev',`
refpolicywarn(`$0() has been deprecated, use dev_getattr_pmqos_dev() instead.')
dev_getattr_pmqos_dev($1)
2009-03-05 15:36:41 +00:00
')
########################################
## <summary>
## Read the network control identity. (Deprecated)
2009-03-05 15:36:41 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_netcontrol',`
refpolicywarn(`$0() has been deprecated, use dev_read_pmqos() instead.')
dev_read_pmqos($1)
2009-03-05 15:36:41 +00:00
')
########################################
## <summary>
## Read and write the the network control device. (Deprecated)
2009-03-05 15:36:41 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_netcontrol',`
refpolicywarn(`$0() has been deprecated, use dev_rw_pmqos() instead.')
dev_rw_pmqos($1)
2009-03-05 15:36:41 +00:00
')
########################################
## <summary>
## Get the attributes of the null device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_null_dev',`
gen_require(`
type device_t, null_device_t;
')
getattr_chr_files_pattern($1, device_t, null_device_t)
')
########################################
## <summary>
## Set the attributes of the null device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_null_dev',`
gen_require(`
type device_t, null_device_t;
')
setattr_chr_files_pattern($1, device_t, null_device_t)
')
2009-11-19 14:44:19 +00:00
########################################
## <summary>
## Delete the null device (/dev/null).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_delete_null',`
gen_require(`
type device_t, null_device_t;
')
delete_chr_files_pattern($1, device_t, null_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and write to the null device (/dev/null).
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_rw_null',`
gen_require(`
type device_t, null_device_t;
')
rw_chr_files_pattern($1, device_t, null_device_t)
')
2006-08-23 03:47:39 +00:00
########################################
## <summary>
## Create the null device (/dev/null).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_null_dev',`
gen_require(`
type device_t, null_device_t;
')
create_chr_files_pattern($1, device_t, null_device_t)
2006-08-23 03:47:39 +00:00
')
2017-02-19 21:13:14 +00:00
########################################
## <summary>
## Manage services with script type null_device_t for when
## /lib/systemd/system/something.service is a link to /dev/null
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_null_service',`
gen_require(`
type null_device_t;
class service { status start stop reload };
')
allow $1 null_device_t:service { status start stop reload };
')
2006-09-29 14:24:57 +00:00
########################################
## <summary>
## Do not audit attempts to get the attributes
## of the BIOS non-volatile RAM device.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2006-09-29 14:24:57 +00:00
## </summary>
## </param>
#
interface(`dev_dontaudit_getattr_nvram_dev',`
gen_require(`
type nvram_device_t;
')
dontaudit $1 nvram_device_t:chr_file getattr;
')
########################################
## <summary>
## Read and write BIOS non-volatile RAM.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_nvram',`
gen_require(`
type nvram_device_t, device_t;
')
rw_chr_files_pattern($1, device_t, nvram_device_t)
')
2006-06-08 17:18:25 +00:00
########################################
## <summary>
## Get the attributes of the printer device nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_printer_dev',`
gen_require(`
type device_t, printer_device_t;
')
getattr_chr_files_pattern($1, device_t, printer_device_t)
2006-06-08 17:18:25 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of the printer device nodes.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_setattr_printer_dev',`
gen_require(`
type device_t, printer_device_t;
')
setattr_chr_files_pattern($1, device_t, printer_device_t)
')
2005-10-22 21:09:03 +00:00
########################################
## <summary>
## Append the printer device.
## </summary>
## <param name="domain">
## <summary>
2005-10-22 21:09:03 +00:00
## Domain allowed access.
## </summary>
2005-10-22 21:09:03 +00:00
## </param>
#
# cjp: added for lpd/checkpc_t
interface(`dev_append_printer',`
gen_require(`
type device_t, printer_device_t;
')
append_chr_files_pattern($1, device_t, printer_device_t)
2005-10-22 21:09:03 +00:00
')
2005-09-02 20:29:52 +00:00
########################################
## <summary>
## Read and write the printer device.
## </summary>
## <param name="domain">
## <summary>
2005-09-02 20:29:52 +00:00
## Domain allowed access.
## </summary>
2005-09-02 20:29:52 +00:00
## </param>
#
interface(`dev_rw_printer',`
gen_require(`
type device_t, printer_device_t;
')
rw_chr_files_pattern($1, device_t, printer_device_t)
2005-09-02 20:29:52 +00:00
')
########################################
## <summary>
## Get the attributes of PM QoS devices
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_pmqos_dev',`
gen_require(`
type device_t, pmqos_device_t;
')
getattr_chr_files_pattern($1, device_t, pmqos_device_t)
')
########################################
## <summary>
## Read the PM QoS devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_pmqos',`
gen_require(`
type device_t, pmqos_device_t;
')
read_chr_files_pattern($1, device_t, pmqos_device_t)
')
########################################
## <summary>
## Read and write the the PM QoS devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_pmqos',`
gen_require(`
type device_t, pmqos_device_t;
')
rw_chr_files_pattern($1, device_t, pmqos_device_t)
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Get the attributes of the QEMU
## microcode and id interfaces.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_qemu_dev',`
gen_require(`
type device_t, qemu_device_t;
')
getattr_chr_files_pattern($1, device_t, qemu_device_t)
')
########################################
## <summary>
## Set the attributes of the QEMU
## microcode and id interfaces.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_qemu_dev',`
gen_require(`
type device_t, qemu_device_t;
')
setattr_chr_files_pattern($1, device_t, qemu_device_t)
')
########################################
## <summary>
## Read the QEMU device
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_qemu',`
gen_require(`
type device_t, qemu_device_t;
')
read_chr_files_pattern($1, device_t, qemu_device_t)
')
########################################
## <summary>
## Read and write the the QEMU device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_qemu',`
gen_require(`
type device_t, qemu_device_t;
')
rw_chr_files_pattern($1, device_t, qemu_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
2006-01-18 14:48:24 +00:00
## Read from random number generator
## devices (e.g., /dev/random).
2005-06-23 21:30:57 +00:00
## </summary>
## <desc>
## <p>
## Allow the specified domain to read from random number
## generator devices (e.g., /dev/random). Typically this is
## used in situations when a cryptographically secure random
## number is needed.
## </p>
## <p>
## Related interface:
## </p>
## <ul>
## <li>dev_read_urand()</li>
## </ul>
## </desc>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
## <infoflow type="read" weight="10"/>
#
interface(`dev_read_rand',`
gen_require(`
type device_t, random_device_t;
')
read_chr_files_pattern($1, device_t, random_device_t)
')
2006-01-18 14:48:24 +00:00
########################################
## <summary>
## Do not audit attempts to read from random
## number generator devices (e.g., /dev/random)
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2006-01-18 14:48:24 +00:00
## </param>
#
interface(`dev_dontaudit_read_rand',`
gen_require(`
type random_device_t;
')
dontaudit $1 random_device_t:chr_file { getattr read };
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Do not audit attempts to append to random
## number generator devices (e.g., /dev/random)
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2009-03-05 15:36:41 +00:00
## </summary>
## </param>
#
interface(`dev_dontaudit_append_rand',`
gen_require(`
type random_device_t;
')
dontaudit $1 random_device_t:chr_file append_chr_file_perms;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write to the random device (e.g., /dev/random). This adds
## entropy used to generate the random data read from the
## random device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_write_rand',`
gen_require(`
type device_t, random_device_t;
')
write_chr_files_pattern($1, device_t, random_device_t)
')
########################################
## <summary>
## Create the random device (/dev/random).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_rand_dev',`
gen_require(`
type device_t, random_device_t;
')
create_chr_files_pattern($1, device_t, random_device_t)
')
2005-04-14 20:18:17 +00:00
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read the realtime clock (/dev/rtc).
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_read_realtime_clock',`
gen_require(`
type device_t, clock_device_t;
')
read_chr_files_pattern($1, device_t, clock_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the realtime clock (/dev/rtc).
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_write_realtime_clock',`
gen_require(`
type device_t, clock_device_t;
')
write_chr_files_pattern($1, device_t, clock_device_t)
2006-12-12 20:08:08 +00:00
allow $1 clock_device_t:chr_file setattr;
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and set the realtime clock (/dev/rtc).
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_rw_realtime_clock',`
dev_read_realtime_clock($1)
dev_write_realtime_clock($1)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of the scanner device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_getattr_scanner_dev',`
gen_require(`
type device_t, scanner_device_t;
')
getattr_chr_files_pattern($1, device_t, scanner_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Do not audit attempts to get the attributes of
## the scanner device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_dontaudit_getattr_scanner_dev',`
gen_require(`
type scanner_device_t;
')
dontaudit $1 scanner_device_t:chr_file getattr;
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of the scanner device.
2005-07-08 20:44:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-07-08 20:44:57 +00:00
## Domain allowed access.
## </summary>
2005-07-08 20:44:57 +00:00
## </param>
#
interface(`dev_setattr_scanner_dev',`
2005-07-08 20:44:57 +00:00
gen_require(`
type device_t, scanner_device_t;
2005-07-08 20:44:57 +00:00
')
setattr_chr_files_pattern($1, device_t, scanner_device_t)
2005-07-08 20:44:57 +00:00
')
########################################
## <summary>
## Do not audit attempts to set the attributes of
## the scanner device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_dontaudit_setattr_scanner_dev',`
gen_require(`
type scanner_device_t;
')
dontaudit $1 scanner_device_t:chr_file setattr;
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and write the scanner device.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_rw_scanner',`
gen_require(`
type device_t, scanner_device_t;
')
rw_chr_files_pattern($1, device_t, scanner_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of the sound devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_getattr_sound_dev',`
gen_require(`
type device_t, sound_device_t;
')
getattr_chr_files_pattern($1, device_t, sound_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of the sound devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_setattr_sound_dev',`
gen_require(`
type device_t, sound_device_t;
')
setattr_chr_files_pattern($1, device_t, sound_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read the sound devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_read_sound',`
gen_require(`
type device_t, sound_device_t;
')
read_chr_files_pattern($1, device_t, sound_device_t)
allow $1 sound_device_t:chr_file map;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write the sound devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_write_sound',`
gen_require(`
type device_t, sound_device_t;
')
write_chr_files_pattern($1, device_t, sound_device_t)
allow $1 sound_device_t:chr_file map;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read the sound mixer devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_read_sound_mixer',`
gen_require(`
type device_t, sound_device_t;
')
read_chr_files_pattern($1, device_t, sound_device_t)
refpolicy: Define and allow map permission Kernel commit 6941857e82ae ("selinux: add a map permission check for mmap") added a map permission check on mmap so that we can distinguish memory mapped access (since it has different implications for revocation). The purpose of a separate map permission check on mmap(2) is to permit policy to prohibit memory mapping of specific files for which we need to ensure that every access is revalidated, particularly useful for scenarios where we expect the file to be relabeled at runtime in order to reflect state changes (e.g. cross-domain solution, assured pipeline without data copying). The kernel commit is anticipated to be included in Linux 4.13. This refpolicy change defines map permission for refpolicy. It mirrors the definition in the kernel classmap by adding it to the common definitions for files and sockets. This will break compatibility for kernels that predate the dynamic class/perm mapping support (< 2.6.33, < RHEL 6); on such kernels, one would instead need to add map permission to the end of each file and socket access vector. This change only allows map permission as needed, e.g. only in the mmap_file_perms and exec_file_perms object permission sets (since map is always required there) and only in specific interfaces or modules where denials were observed in limited testing. It is important to note that effective use of this permission requires complete removal of unconfined, as otherwise unconfined domains will be able to map all file types and therefore bypass the intended protection. If we wanted to exclude map permission to all file types by default from unconfined, we would need to add it to the list of permissions excluded from files_unconfined_type in kernel/files.te. Policies that depend on this permission not being allowed to specific file types should also make use of neverallow rules to ensure that this is not undermined by any allow rule, and ensure that they are performing neverallow checking at policy build time (e.g. make validate) or runtime (e.g. semanage.conf expand-check=1). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2017-05-24 19:40:18 +00:00
allow $1 sound_device_t:chr_file map;
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Write the sound mixer devices.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_write_sound_mixer',`
gen_require(`
type device_t, sound_device_t;
')
write_chr_files_pattern($1, device_t, sound_device_t)
allow $1 sound_device_t:chr_file map;
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of the the power management device.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_getattr_power_mgmt_dev',`
gen_require(`
type device_t, power_device_t;
')
getattr_chr_files_pattern($1, device_t, power_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Set the attributes of the the power management device.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_setattr_power_mgmt_dev',`
gen_require(`
type device_t, power_device_t;
')
setattr_chr_files_pattern($1, device_t, power_device_t)
2005-04-14 20:18:17 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read and write the the power management device.
## </summary>
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`dev_rw_power_management',`
gen_require(`
type device_t, power_device_t;
')
rw_chr_files_pattern($1, device_t, power_device_t)
2005-04-14 20:18:17 +00:00
')
2007-06-11 15:01:10 +00:00
########################################
## <summary>
## Getattr on smartcard devices
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_smartcard_dev',`
gen_require(`
type smartcard_device_t;
')
allow $1 smartcard_device_t:chr_file getattr;
')
########################################
## <summary>
## dontaudit getattr on smartcard devices
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
2007-06-11 15:01:10 +00:00
## </summary>
## </param>
#
interface(`dev_dontaudit_getattr_smartcard_dev',`
gen_require(`
type smartcard_device_t;
')
dontaudit $1 smartcard_device_t:chr_file getattr;
')
########################################
## <summary>
## Read and write smartcard devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_smartcard',`
gen_require(`
type device_t, smartcard_device_t;
')
rw_chr_files_pattern($1, device_t, smartcard_device_t)
2007-06-11 15:01:10 +00:00
')
########################################
## <summary>
## Create, read, write, and delete smartcard devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_smartcard',`
gen_require(`
type device_t, smartcard_device_t;
')
manage_chr_files_pattern($1, device_t, smartcard_device_t)
2007-06-11 15:01:10 +00:00
')
########################################
## <summary>
## Read, write and map the sysdig device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_sysdig',`
gen_require(`
type device_t, sysdig_device_t;
')
rw_chr_files_pattern($1, device_t, sysdig_device_t)
allow $1 sysdig_device_t:chr_file map;
')
########################################
## <summary>
## Mount a filesystem on sysfs.
## </summary>
## <param name="domain">
## <summary>
## Domain allow access.
## </summary>
## </param>
#
interface(`dev_mounton_sysfs',`
gen_require(`
type sysfs_t;
')
allow $1 sysfs_t:dir mounton;
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Associate a file to a sysfs filesystem.
## </summary>
## <param name="file_type">
## <summary>
## The type of the file to be associated to sysfs.
## </summary>
## </param>
#
interface(`dev_associate_sysfs',`
gen_require(`
type sysfs_t;
')
allow $1 sysfs_t:filesystem associate;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of sysfs directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_getattr_sysfs_dirs',`
gen_require(`
type sysfs_t;
')
2006-12-12 20:08:08 +00:00
allow $1 sysfs_t:dir getattr_dir_perms;
2005-04-14 20:18:17 +00:00
')
########################################
## <summary>
## Get the attributes of sysfs filesystem
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_sysfs',`
gen_require(`
type sysfs_t;
')
allow $1 sysfs_t:filesystem getattr;
')
########################################
## <summary>
## mount a sysfs filesystem
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_mount_sysfs',`
gen_require(`
type sysfs_t;
')
allow $1 sysfs_t:filesystem mount;
')
########################################
## <summary>
## Do not audit getting the attributes of sysfs filesystem
## </summary>
## <param name="domain">
## <summary>
## Domain to dontaudit access from
## </summary>
## </param>
#
interface(`dev_dontaudit_getattr_sysfs',`
gen_require(`
type sysfs_t;
')
dontaudit $1 sysfs_t:filesystem getattr;
')
########################################
## <summary>
## Dont audit attempts to read hardware state information
## </summary>
## <param name="domain">
## <summary>
## Domain for which the attempts do not need to be audited
## </summary>
## </param>
#
interface(`dev_dontaudit_read_sysfs',`
gen_require(`
type sysfs_t;
')
dontaudit $1 sysfs_t:file read_file_perms;
dontaudit $1 sysfs_t:dir list_dir_perms;
dontaudit $1 sysfs_t:lnk_file read_lnk_file_perms;
')
########################################
## <summary>
## mounton sysfs directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_mounton_sysfs_dirs',`
gen_require(`
type sysfs_t;
')
allow $1 sysfs_t:dir mounton;
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
2005-07-12 20:34:24 +00:00
## Search the sysfs directories.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_search_sysfs',`
gen_require(`
type sysfs_t;
')
search_dirs_pattern($1, sysfs_t, sysfs_t)
')
2005-06-29 20:53:53 +00:00
########################################
## <summary>
## Do not audit attempts to search sysfs.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
2005-06-29 20:53:53 +00:00
## </param>
#
interface(`dev_dontaudit_search_sysfs',`
gen_require(`
type sysfs_t;
')
2006-12-12 20:08:08 +00:00
dontaudit $1 sysfs_t:dir search_dir_perms;
2005-06-29 20:53:53 +00:00
')
2005-07-12 20:34:24 +00:00
########################################
## <summary>
## List the contents of the sysfs directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-07-12 20:34:24 +00:00
## </param>
#
interface(`dev_list_sysfs',`
gen_require(`
type sysfs_t;
')
list_dirs_pattern($1, sysfs_t, sysfs_t)
2005-07-12 20:34:24 +00:00
')
########################################
## <summary>
## Write in a sysfs directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
# cjp: added for cpuspeed
interface(`dev_write_sysfs_dirs',`
gen_require(`
type sysfs_t;
')
allow $1 sysfs_t:dir write;
')
########################################
## <summary>
## Do not audit attempts to write in a sysfs directory.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_write_sysfs_dirs',`
gen_require(`
type sysfs_t;
')
dontaudit $1 sysfs_t:dir write;
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Create, read, write, and delete sysfs
## directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_sysfs_dirs',`
gen_require(`
type sysfs_t;
')
manage_dirs_pattern($1, sysfs_t, sysfs_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read hardware state information.
2005-06-23 21:30:57 +00:00
## </summary>
## <desc>
## <p>
## Allow the specified domain to read the contents of
## the sysfs filesystem. This filesystem contains
## information, parameters, and other settings on the
## hardware installed on the system.
## </p>
## </desc>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
## <infoflow type="read" weight="10"/>
#
interface(`dev_read_sysfs',`
gen_require(`
type sysfs_t;
')
read_files_pattern($1, sysfs_t, sysfs_t)
read_lnk_files_pattern($1, sysfs_t, sysfs_t)
2006-12-12 20:08:08 +00:00
list_dirs_pattern($1, sysfs_t, sysfs_t)
')
########################################
## <summary>
## Write to hardware state information.
## </summary>
## <desc>
## <p>
## Allow the specified domain to write to the sysfs
## filesystem.
## </p>
## </desc>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <infoflow type="read" weight="10"/>
#
interface(`dev_write_sysfs',`
gen_require(`
type sysfs_t;
')
list_dirs_pattern($1, sysfs_t, sysfs_t)
write_files_pattern($1, sysfs_t, sysfs_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow caller to modify hardware state information.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_rw_sysfs',`
gen_require(`
type sysfs_t;
')
rw_files_pattern($1, sysfs_t, sysfs_t)
read_lnk_files_pattern($1, sysfs_t, sysfs_t)
2006-12-12 20:08:08 +00:00
list_dirs_pattern($1, sysfs_t, sysfs_t)
')
########################################
## <summary>
## Add a sysfs file
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_sysfs_files',`
gen_require(`
type sysfs_t;
')
create_files_pattern($1, sysfs_t, sysfs_t)
')
2017-02-24 01:03:23 +00:00
########################################
## <summary>
## Relabel hardware state directories.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_relabel_sysfs_dirs',`
gen_require(`
type sysfs_t;
')
relabel_dirs_pattern($1, sysfs_t, sysfs_t)
')
########################################
## <summary>
## Relabel from/to all sysfs types.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_relabel_all_sysfs',`
gen_require(`
attribute sysfs_types;
')
allow $1 sysfs_types:dir { list_dir_perms relabel_dir_perms };
allow $1 sysfs_types:file relabel_file_perms;
allow $1 sysfs_types:lnk_file relabel_lnk_file_perms;
')
########################################
## <summary>
## Set the attributes of sysfs files, directories and symlinks.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_all_sysfs',`
gen_require(`
attribute sysfs_types;
')
allow $1 sysfs_types:dir { search_dir_perms setattr };
allow $1 sysfs_types:file setattr;
allow $1 sysfs_types:lnk_file { read_lnk_file_perms setattr };
')
########################################
## <summary>
## Read and write the TPM device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_tpm',`
gen_require(`
type device_t, tpm_device_t;
')
rw_chr_files_pattern($1, device_t, tpm_device_t)
')
########################################
## <summary>
## Read from pseudo random number generator devices (e.g., /dev/urandom).
## </summary>
## <desc>
## <p>
## Allow the specified domain to read from pseudo random number
## generator devices (e.g., /dev/urandom). Typically this is
## used in situations when a cryptographically secure random
## number is not necessarily needed. One example is the Stack
## Smashing Protector (SSP, formerly known as ProPolice) support
## that may be compiled into programs.
## </p>
## <p>
## Related interface:
## </p>
## <ul>
## <li>dev_read_rand()</li>
## </ul>
## <p>
## Related tunable:
## </p>
## <ul>
## <li>global_ssp</li>
## </ul>
## </desc>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <infoflow type="read" weight="10"/>
#
interface(`dev_read_urand',`
gen_require(`
type device_t, urandom_device_t;
')
read_chr_files_pattern($1, device_t, urandom_device_t)
')
2006-04-28 20:20:40 +00:00
########################################
## <summary>
## Do not audit attempts to read from pseudo
## random devices (e.g., /dev/urandom)
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`dev_dontaudit_read_urand',`
gen_require(`
type urandom_device_t;
')
dontaudit $1 urandom_device_t:chr_file { getattr read };
')
########################################
## <summary>
## Write to the pseudo random device (e.g., /dev/urandom). This
## sets the random number generator seed.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_write_urand',`
gen_require(`
type device_t, urandom_device_t;
')
write_chr_files_pattern($1, device_t, urandom_device_t)
')
########################################
## <summary>
## Create the urandom device (/dev/urandom).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_urand_dev',`
gen_require(`
type device_t, urandom_device_t;
')
create_chr_files_pattern($1, device_t, urandom_device_t)
')
########################################
## <summary>
## Getattr generic the USB devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_getattr_generic_usb_dev',`
gen_require(`
type usb_device_t, device_t;
')
getattr_chr_files_pattern($1, device_t, usb_device_t)
')
########################################
## <summary>
## Setattr generic the USB devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_generic_usb_dev',`
gen_require(`
type usb_device_t, device_t;
')
setattr_chr_files_pattern($1, device_t, usb_device_t)
')
2009-03-05 15:36:41 +00:00
########################################
## <summary>
## Read generic the USB devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_generic_usb_dev',`
gen_require(`
type usb_device_t, device_t;
2009-03-05 15:36:41 +00:00
')
read_chr_files_pattern($1, device_t, usb_device_t)
')
########################################
## <summary>
2012-10-30 20:11:32 +00:00
## Read and write generic the USB devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
2012-10-30 20:11:32 +00:00
interface(`dev_rw_generic_usb_dev',`
gen_require(`
2012-10-30 20:11:32 +00:00
type device_t, usb_device_t;
')
2012-10-30 20:11:32 +00:00
rw_chr_files_pattern($1, device_t, usb_device_t)
')
########################################
## <summary>
2012-10-30 20:11:32 +00:00
## Relabel generic the USB devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
2012-10-30 20:11:32 +00:00
interface(`dev_relabel_generic_usb_dev',`
gen_require(`
type usb_device_t, device_t;
')
2012-10-30 20:11:32 +00:00
relabel_chr_files_pattern($1, device_t, usb_device_t)
')
########################################
## <summary>
## Read USB monitor devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_usbmon_dev',`
gen_require(`
type device_t, usbmon_device_t;
')
read_chr_files_pattern($1, device_t, usbmon_device_t)
')
2011-03-07 15:47:09 +00:00
########################################
## <summary>
## Write USB monitor devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_write_usbmon_dev',`
gen_require(`
type device_t, usbmon_device_t;
')
write_chr_files_pattern($1, device_t, usbmon_device_t)
')
2005-06-30 18:54:08 +00:00
########################################
## <summary>
## Mount a usbfs filesystem.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_mount_usbfs',`
gen_require(`
type usbfs_t;
')
allow $1 usbfs_t:filesystem mount;
')
2005-10-25 02:51:07 +00:00
########################################
## <summary>
2006-01-31 15:59:20 +00:00
## Associate a file to a usbfs filesystem.
2005-10-25 02:51:07 +00:00
## </summary>
2006-01-31 15:59:20 +00:00
## <param name="file_type">
## <summary>
2006-01-31 15:59:20 +00:00
## The type of the file to be associated to usbfs.
## </summary>
2005-10-25 02:51:07 +00:00
## </param>
#
interface(`dev_associate_usbfs',`
gen_require(`
type usbfs_t;
')
allow $1 usbfs_t:filesystem associate;
')
2005-07-08 20:44:57 +00:00
########################################
## <summary>
## Get the attributes of a directory in the usb filesystem.
## </summary>
## <param name="domain">
## <summary>
2005-07-08 20:44:57 +00:00
## Domain allowed access.
## </summary>
2005-07-08 20:44:57 +00:00
## </param>
#
interface(`dev_getattr_usbfs_dirs',`
2005-07-08 20:44:57 +00:00
gen_require(`
type usbfs_t;
')
2006-12-12 20:08:08 +00:00
allow $1 usbfs_t:dir getattr_dir_perms;
2005-07-08 20:44:57 +00:00
')
2005-11-08 22:00:30 +00:00
########################################
## <summary>
## Do not audit attempts to get the attributes
## of a directory in the usb filesystem.
## </summary>
## <param name="domain">
## <summary>
2005-11-08 22:00:30 +00:00
## Domain to not audit.
## </summary>
2005-11-08 22:00:30 +00:00
## </param>
#
interface(`dev_dontaudit_getattr_usbfs_dirs',`
2005-11-08 22:00:30 +00:00
gen_require(`
type usbfs_t;
')
2006-12-12 20:08:08 +00:00
dontaudit $1 usbfs_t:dir getattr_dir_perms;
2005-11-08 22:00:30 +00:00
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Search the directory containing USB hardware information.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_search_usbfs',`
gen_require(`
type usbfs_t;
')
search_dirs_pattern($1, usbfs_t, usbfs_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow caller to get a list of usb hardware.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_list_usbfs',`
gen_require(`
type usbfs_t;
')
read_lnk_files_pattern($1, usbfs_t, usbfs_t)
getattr_files_pattern($1, usbfs_t, usbfs_t)
2006-12-12 20:08:08 +00:00
list_dirs_pattern($1, usbfs_t, usbfs_t)
')
########################################
## <summary>
## Set the attributes of usbfs filesystem.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_setattr_usbfs_files',`
gen_require(`
type usbfs_t;
')
setattr_files_pattern($1, usbfs_t, usbfs_t)
list_dirs_pattern($1, usbfs_t, usbfs_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Read USB hardware information using
## the usbfs filesystem interface.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_read_usbfs',`
gen_require(`
type usbfs_t;
')
read_files_pattern($1, usbfs_t, usbfs_t)
read_lnk_files_pattern($1, usbfs_t, usbfs_t)
list_dirs_pattern($1, usbfs_t, usbfs_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Allow caller to modify usb hardware configuration files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_rw_usbfs',`
gen_require(`
type usbfs_t;
')
list_dirs_pattern($1, usbfs_t, usbfs_t)
rw_files_pattern($1, usbfs_t, usbfs_t)
read_lnk_files_pattern($1, usbfs_t, usbfs_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
## Get the attributes of video4linux devices.
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_getattr_video_dev',`
gen_require(`
type device_t, v4l_device_t;
')
getattr_chr_files_pattern($1, device_t, v4l_device_t)
')
2010-03-04 20:30:22 +00:00
######################################
## <summary>
## Read and write userio device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_userio_dev',`
gen_require(`
type device_t, userio_device_t;
')
rw_chr_files_pattern($1, device_t, userio_device_t)
')
########################################
2005-06-23 21:30:57 +00:00
## <summary>
2005-06-30 18:54:08 +00:00
## Do not audit attempts to get the attributes
## of video4linux device nodes.
2005-06-23 21:30:57 +00:00
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain to not audit.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_dontaudit_getattr_video_dev',`
gen_require(`
type v4l_device_t;
')
dontaudit $1 v4l_device_t:chr_file getattr;
')
########################################
## <summary>
## Set the attributes of video4linux device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
#
interface(`dev_setattr_video_dev',`
gen_require(`
type device_t, v4l_device_t;
')
setattr_chr_files_pattern($1, device_t, v4l_device_t)
')
2005-06-30 18:54:08 +00:00
########################################
## <summary>
## Do not audit attempts to set the attributes
## of video4linux device nodes.
## </summary>
## <param name="domain">
## <summary>
2005-06-30 18:54:08 +00:00
## Domain to not audit.
## </summary>
2005-06-30 18:54:08 +00:00
## </param>
#
interface(`dev_dontaudit_setattr_video_dev',`
gen_require(`
type v4l_device_t;
')
dontaudit $1 v4l_device_t:chr_file setattr;
')
2005-07-05 20:59:51 +00:00
2006-03-09 20:28:51 +00:00
########################################
## <summary>
## Read the video4linux devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_video_dev',`
gen_require(`
type device_t, v4l_device_t;
')
read_chr_files_pattern($1, device_t, v4l_device_t)
2006-03-09 20:28:51 +00:00
')
########################################
## <summary>
## Write the video4linux devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_write_video_dev',`
gen_require(`
type device_t, v4l_device_t;
')
write_chr_files_pattern($1, device_t, v4l_device_t)
')
########################################
## <summary>
## Read and write vfio devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_vfio_dev',`
gen_require(`
type device_t, vfio_device_t;
')
rw_chr_files_pattern($1, device_t, vfio_device_t)
')
########################################
## <summary>
## Relabel vfio devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_relabelfrom_vfio_dev',`
gen_require(`
type device_t, vfio_device_t;
')
relabelfrom_chr_files_pattern($1, device_t, vfio_device_t)
')
############################
## <summary>
## Allow read/write the vhost devices
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_vhost',`
gen_require(`
2011-03-07 15:47:09 +00:00
type device_t, vhost_device_t;
')
2011-03-07 15:47:09 +00:00
rw_chr_files_pattern($1, device_t, vhost_device_t)
')
2006-04-26 18:18:15 +00:00
########################################
## <summary>
## Read and write VMWare devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_vmware',`
gen_require(`
type device_t, vmware_device_t;
')
rw_chr_files_pattern($1, device_t, vmware_device_t)
2006-04-26 18:18:15 +00:00
')
2006-04-26 20:30:08 +00:00
########################################
## <summary>
## Read, write, and mmap VMWare devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rwx_vmware',`
gen_require(`
type vmware_device_t;
2006-04-26 20:30:08 +00:00
')
2006-12-12 20:08:08 +00:00
dev_rw_vmware($1)
refpolicy: Define and allow map permission Kernel commit 6941857e82ae ("selinux: add a map permission check for mmap") added a map permission check on mmap so that we can distinguish memory mapped access (since it has different implications for revocation). The purpose of a separate map permission check on mmap(2) is to permit policy to prohibit memory mapping of specific files for which we need to ensure that every access is revalidated, particularly useful for scenarios where we expect the file to be relabeled at runtime in order to reflect state changes (e.g. cross-domain solution, assured pipeline without data copying). The kernel commit is anticipated to be included in Linux 4.13. This refpolicy change defines map permission for refpolicy. It mirrors the definition in the kernel classmap by adding it to the common definitions for files and sockets. This will break compatibility for kernels that predate the dynamic class/perm mapping support (< 2.6.33, < RHEL 6); on such kernels, one would instead need to add map permission to the end of each file and socket access vector. This change only allows map permission as needed, e.g. only in the mmap_file_perms and exec_file_perms object permission sets (since map is always required there) and only in specific interfaces or modules where denials were observed in limited testing. It is important to note that effective use of this permission requires complete removal of unconfined, as otherwise unconfined domains will be able to map all file types and therefore bypass the intended protection. If we wanted to exclude map permission to all file types by default from unconfined, we would need to add it to the list of permissions excluded from files_unconfined_type in kernel/files.te. Policies that depend on this permission not being allowed to specific file types should also make use of neverallow rules to ensure that this is not undermined by any allow rule, and ensure that they are performing neverallow checking at policy build time (e.g. make validate) or runtime (e.g. semanage.conf expand-check=1). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2017-05-24 19:40:18 +00:00
allow $1 vmware_device_t:chr_file { map execute };
2006-04-26 20:30:08 +00:00
')
########################################
## <summary>
## Read from watchdog devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_watchdog',`
gen_require(`
type device_t, watchdog_device_t;
')
read_chr_files_pattern($1, device_t, watchdog_device_t)
')
2006-04-28 20:20:40 +00:00
########################################
## <summary>
## Write to watchdog devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_write_watchdog',`
gen_require(`
type device_t, watchdog_device_t;
')
write_chr_files_pattern($1, device_t, watchdog_device_t)
2006-04-28 20:20:40 +00:00
')
########################################
## <summary>
## Read the wireless device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_wireless',`
gen_require(`
type device_t, wireless_device_t;
')
read_chr_files_pattern($1, device_t, wireless_device_t)
')
2009-11-19 14:44:19 +00:00
########################################
## <summary>
## Read and write the the wireless device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_wireless',`
gen_require(`
type device_t, wireless_device_t;
')
rw_chr_files_pattern($1, device_t, wireless_device_t)
')
########################################
## <summary>
## manage the wireless device.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_wireless',`
gen_require(`
type device_t, wireless_device_t;
')
manage_chr_files_pattern($1, device_t, wireless_device_t)
')
########################################
## <summary>
## Read and write Xen devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_xen',`
gen_require(`
type device_t, xen_device_t;
')
rw_chr_files_pattern($1, device_t, xen_device_t)
allow $1 xen_device_t:chr_file map;
')
########################################
## <summary>
## Create, read, write, and delete Xen devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_manage_xen',`
gen_require(`
type device_t, xen_device_t;
')
manage_chr_files_pattern($1, device_t, xen_device_t)
')
########################################
## <summary>
## Automatic type transition to the type
## for xen device nodes when created in /dev.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="name" optional="true">
## <summary>
## The name of the object being created.
## </summary>
## </param>
#
interface(`dev_filetrans_xen',`
gen_require(`
type device_t, xen_device_t;
')
filetrans_pattern($1, device_t, xen_device_t, chr_file, $2)
')
2005-09-16 21:20:37 +00:00
########################################
## <summary>
## Get the attributes of X server miscellaneous devices.
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain allowed access.
## </summary>
2005-09-16 21:20:37 +00:00
## </param>
#
interface(`dev_getattr_xserver_misc_dev',`
gen_require(`
type device_t, xserver_misc_device_t;
')
getattr_chr_files_pattern($1, device_t, xserver_misc_device_t)
2005-09-16 21:20:37 +00:00
')
########################################
## <summary>
## Set the attributes of X server miscellaneous devices.
## </summary>
## <param name="domain">
## <summary>
2005-09-16 21:20:37 +00:00
## Domain allowed access.
## </summary>
2005-09-16 21:20:37 +00:00
## </param>
#
interface(`dev_setattr_xserver_misc_dev',`
gen_require(`
type device_t, xserver_misc_device_t;
')
setattr_chr_files_pattern($1, device_t, xserver_misc_device_t)
2005-09-16 21:20:37 +00:00
')
2006-01-19 21:04:33 +00:00
########################################
## <summary>
## Read and write X server miscellaneous devices.
## </summary>
## <param name="domain">
## <summary>
2006-01-19 21:04:33 +00:00
## Domain allowed access.
## </summary>
2006-01-19 21:04:33 +00:00
## </param>
#
interface(`dev_rw_xserver_misc',`
2006-01-19 21:04:33 +00:00
gen_require(`
type device_t, xserver_misc_device_t;
')
rw_chr_files_pattern($1, device_t, xserver_misc_device_t)
2006-01-19 21:04:33 +00:00
')
########################################
## <summary>
## Map X server miscellaneous devices.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_map_xserver_misc',`
gen_require(`
type xserver_misc_device_t;
')
allow $1 xserver_misc_device_t:chr_file map;
')
########################################
## <summary>
## Read and write to the zero device (/dev/zero).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rw_zero',`
gen_require(`
type device_t, zero_device_t;
')
rw_chr_files_pattern($1, device_t, zero_device_t)
')
########################################
## <summary>
## Read, write, and execute the zero device (/dev/zero).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_rwx_zero',`
gen_require(`
type zero_device_t;
')
dev_rw_zero($1)
refpolicy: Define and allow map permission Kernel commit 6941857e82ae ("selinux: add a map permission check for mmap") added a map permission check on mmap so that we can distinguish memory mapped access (since it has different implications for revocation). The purpose of a separate map permission check on mmap(2) is to permit policy to prohibit memory mapping of specific files for which we need to ensure that every access is revalidated, particularly useful for scenarios where we expect the file to be relabeled at runtime in order to reflect state changes (e.g. cross-domain solution, assured pipeline without data copying). The kernel commit is anticipated to be included in Linux 4.13. This refpolicy change defines map permission for refpolicy. It mirrors the definition in the kernel classmap by adding it to the common definitions for files and sockets. This will break compatibility for kernels that predate the dynamic class/perm mapping support (< 2.6.33, < RHEL 6); on such kernels, one would instead need to add map permission to the end of each file and socket access vector. This change only allows map permission as needed, e.g. only in the mmap_file_perms and exec_file_perms object permission sets (since map is always required there) and only in specific interfaces or modules where denials were observed in limited testing. It is important to note that effective use of this permission requires complete removal of unconfined, as otherwise unconfined domains will be able to map all file types and therefore bypass the intended protection. If we wanted to exclude map permission to all file types by default from unconfined, we would need to add it to the list of permissions excluded from files_unconfined_type in kernel/files.te. Policies that depend on this permission not being allowed to specific file types should also make use of neverallow rules to ensure that this is not undermined by any allow rule, and ensure that they are performing neverallow checking at policy build time (e.g. make validate) or runtime (e.g. semanage.conf expand-check=1). Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
2017-05-24 19:40:18 +00:00
allow $1 zero_device_t:chr_file { map execute };
')
2006-03-09 20:28:51 +00:00
########################################
## <summary>
## Execmod the zero device (/dev/zero).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_execmod_zero',`
gen_require(`
type zero_device_t;
')
dev_rw_zero($1)
allow $1 zero_device_t:chr_file execmod;
')
2006-08-23 03:47:39 +00:00
########################################
## <summary>
## Create the zero device (/dev/zero).
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_create_zero_dev',`
gen_require(`
type device_t, zero_device_t;
')
create_chr_files_pattern($1, device_t, zero_device_t)
2006-08-23 03:47:39 +00:00
')
########################################
## <summary>
## Read cpu online hardware state information
## </summary>
## <desc>
## <p>
## Allow the specified domain to read /sys/devices/system/cpu/online
## </p>
## </desc>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`dev_read_cpu_online',`
gen_require(`
type cpu_online_t;
')
allow $1 cpu_online_t:file read_file_perms;
dev_search_sysfs($1)
')
2005-07-05 20:59:51 +00:00
########################################
## <summary>
## Unconfined access to devices.
## </summary>
## <param name="domain">
## <summary>
2005-07-05 20:59:51 +00:00
## Domain allowed access.
## </summary>
2005-07-05 20:59:51 +00:00
## </param>
#
interface(`dev_unconfined',`
gen_require(`
attribute devices_unconfined_type;
2005-07-05 20:59:51 +00:00
')
typeattribute $1 devices_unconfined_type;
2005-07-05 20:59:51 +00:00
')