selinux-refpolicy/mls/macros/program/cdrecord_macros.te

54 lines
1.6 KiB
Plaintext

# macros for the cdrecord domain
# Author: Thomas Bleher <ThomasBleher@gmx.de>
define(`cdrecord_domain', `
type $1_cdrecord_t, domain, privlog;
domain_auto_trans($1_t, cdrecord_exec_t, $1_cdrecord_t)
# The user role is authorized for this domain.
role $1_r types $1_cdrecord_t;
uses_shlib($1_cdrecord_t)
read_locale($1_cdrecord_t)
# allow ps to show cdrecord and allow the user to kill it
can_ps($1_t, $1_cdrecord_t)
allow $1_t $1_cdrecord_t:process signal;
# write to the user domain tty.
access_terminal($1_cdrecord_t, $1)
allow $1_cdrecord_t privfd:fd use;
allow $1_cdrecord_t $1_t:unix_stream_socket { getattr read write ioctl };
allow $1_cdrecord_t self:unix_dgram_socket create_socket_perms;
allow $1_cdrecord_t self:unix_stream_socket create_stream_socket_perms;
can_resmgrd_connect($1_cdrecord_t)
read_content($1_cdrecord_t, $1, cdrecord)
allow $1_cdrecord_t etc_t:file { getattr read };
# allow searching for cdrom-drive
allow $1_cdrecord_t device_t:dir r_dir_perms;
allow $1_cdrecord_t device_t:lnk_file { getattr read };
# allow cdrecord to write the CD
allow $1_cdrecord_t removable_device_t:blk_file { getattr read write ioctl };
allow $1_cdrecord_t scsi_generic_device_t:chr_file { getattr read write ioctl };
allow $1_cdrecord_t self:capability { ipc_lock sys_nice setuid dac_override sys_rawio };
allow $1_cdrecord_t self:process { getsched setsched fork sigchld sigkill };
can_access_pty($1_cdrecord_t, $1)
allow $1_cdrecord_t $1_home_t:dir search;
allow $1_cdrecord_t $1_home_dir_t:dir r_dir_perms;
allow $1_cdrecord_t $1_home_t:file r_file_perms;
if (use_nfs_home_dirs) {
allow $1_cdrecord_t mnt_t:dir search;
r_dir_file($1_cdrecord_t, nfs_t)
}
')