2005-06-20 18:40:44 +00:00
|
|
|
## <module name="bootloader">
|
2005-05-23 15:47:13 +00:00
|
|
|
## <summary>Policy for the kernel modules, kernel image, and bootloader.</summary>
|
|
|
|
|
|
|
|
########################################
|
2005-06-08 18:00:04 +00:00
|
|
|
## <interface name="bootloader_domtrans">
|
2005-05-23 15:47:13 +00:00
|
|
|
## <description>
|
|
|
|
## Execute bootloader in the bootloader domain.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
|
|
|
#
|
2005-06-08 18:00:04 +00:00
|
|
|
define(`bootloader_domtrans',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type bootloader_t;
|
|
|
|
class process sigchld;
|
|
|
|
class fd use;
|
|
|
|
class fifo_file rw_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
domain_auto_trans($1, bootloader_exec_t, bootloader_t)
|
2005-06-02 18:55:47 +00:00
|
|
|
|
|
|
|
allow $1 bootloader_t:fd use;
|
|
|
|
allow bootloader_t $1:fd use;
|
|
|
|
allow bootloader_t $1:fifo_file rw_file_perms;
|
|
|
|
allow bootloader_t $1:process sigchld;
|
2005-05-23 15:47:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-08 18:00:04 +00:00
|
|
|
## <interface name="bootloader_run">
|
2005-05-23 15:47:13 +00:00
|
|
|
## <description>
|
2005-06-09 19:22:27 +00:00
|
|
|
## Execute bootloader interactively and do
|
|
|
|
## a domain transition to the bootloader domain.
|
2005-05-23 15:47:13 +00:00
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="role">
|
|
|
|
## The role to be allowed the bootloader domain.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="terminal">
|
|
|
|
## The type of the terminal allow the bootloader domain to use.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
|
|
|
#
|
2005-06-08 18:00:04 +00:00
|
|
|
define(`bootloader_run',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type bootloader_t;
|
|
|
|
class chr_file rw_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-10 01:01:13 +00:00
|
|
|
bootloader_domtrans($1)
|
2005-06-02 18:55:47 +00:00
|
|
|
|
|
|
|
role $2 types bootloader_t;
|
2005-06-08 20:28:45 +00:00
|
|
|
allow bootloader_t $3:chr_file rw_file_perms;
|
2005-05-23 15:47:13 +00:00
|
|
|
')
|
|
|
|
|
2005-05-12 20:50:09 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_search_boot_dir">
|
|
|
|
## <description>
|
|
|
|
## Search the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-12 20:50:09 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_search_boot_dir',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
|
|
|
allow $1 boot_t:dir search;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-10 01:01:13 +00:00
|
|
|
## <interface name="bootloader_dontaudit_search_boot">
|
2005-06-09 19:22:27 +00:00
|
|
|
## <description>
|
|
|
|
## Do not audit attempts to search the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-12 20:50:09 +00:00
|
|
|
#
|
2005-06-10 01:01:13 +00:00
|
|
|
define(`bootloader_dontaudit_search_boot',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
|
|
|
dontaudit $1 boot_t:dir search;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-24 15:55:57 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_rw_boot_symlinks">
|
|
|
|
## <description>
|
|
|
|
## Read and write symbolic links
|
|
|
|
## in the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-24 15:55:57 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_rw_boot_symlinks',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class lnk_file rw_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir r_dir_perms;
|
|
|
|
allow $1 boot_t:lnk_file rw_file_perms;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_create_kernel">
|
|
|
|
## <description>
|
|
|
|
## Install a kernel into the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_create_kernel',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t;
|
|
|
|
class dir ra_dir_perms;
|
|
|
|
class file { getattr read write create };
|
|
|
|
class lnk_file { getattr read create unlink };
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir ra_dir_perms;
|
2005-06-02 18:55:47 +00:00
|
|
|
allow $1 boot_t:file { getattr read write create };
|
|
|
|
allow $1 boot_t:lnk_file { getattr read create unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_create_kernel_symbol_table">
|
|
|
|
## <description>
|
|
|
|
## Install a system.map into the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_create_kernel_symbol_table',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t, system_map_t;
|
|
|
|
class dir ra_dir_perms;
|
|
|
|
class file { rw_file_perms create };
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir ra_dir_perms;
|
|
|
|
allow $1 system_map_t:file { rw_file_perms create };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_read_kernel_symbol_table">
|
|
|
|
## <description>
|
|
|
|
## Read system.map in the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`bootloader_read_kernel_symbol_table',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t, system_map_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir r_dir_perms;
|
2005-06-10 01:01:13 +00:00
|
|
|
allow $1 system_map_t:file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_delete_kernel">
|
|
|
|
## <description>
|
|
|
|
## Delete a kernel from /boot.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_delete_kernel',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t;
|
|
|
|
class dir { r_dir_perms write remove_name };
|
|
|
|
class file { getattr unlink };
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir { r_dir_perms write remove_name };
|
2005-06-02 18:55:47 +00:00
|
|
|
allow $1 boot_t:file { getattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_delete_kernel_symbol_table">
|
|
|
|
## <description>
|
|
|
|
## Delete a system.map in the /boot directory.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_delete_kernel_symbol_table',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t, system_map_t;
|
|
|
|
class dir { r_dir_perms write remove_name };
|
|
|
|
class file { getattr unlink };
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir { r_dir_perms write remove_name };
|
2005-06-02 18:55:47 +00:00
|
|
|
allow $1 system_map_t:file { getattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_read_config">
|
|
|
|
## <description>
|
|
|
|
## Read the bootloader configuration file.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`bootloader_read_config',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type bootloader_etc_t;
|
|
|
|
class file r_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 bootloader_etc_t:file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_rw_config">
|
|
|
|
## <description>
|
|
|
|
## Read and write the bootloader
|
|
|
|
## configuration file.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_rw_config',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type bootloader_etc_t;
|
|
|
|
class file rw_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 bootloader_etc_t:file rw_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-13 14:37:13 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_rw_tmp_file">
|
|
|
|
## <description>
|
|
|
|
## Read and write the bootloader
|
|
|
|
## temporary data in /tmp.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-13 14:37:13 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_rw_tmp_file',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type bootloader_tmp_t;
|
|
|
|
class file rw_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-22 16:07:14 +00:00
|
|
|
# FIXME: read tmp_t dir
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 bootloader_tmp_t:file rw_file_perms;
|
2005-05-13 14:37:13 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_create_runtime_file">
|
|
|
|
## <description>
|
|
|
|
## Read and write the bootloader
|
|
|
|
## temporary data in /tmp.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-09 19:22:27 +00:00
|
|
|
define(`bootloader_create_runtime_file',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type boot_t, boot_runtime_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file { rw_file_perms create unlink };
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 boot_t:dir rw_dir_perms;
|
|
|
|
allow $1 boot_runtime_t:file { rw_file_perms create unlink };
|
2005-06-02 18:55:47 +00:00
|
|
|
type_transition $1 boot_t:file boot_runtime_t;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-25 21:32:09 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_list_kernel_modules">
|
|
|
|
## <description>
|
|
|
|
## List the contents of the kernel module directories.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-25 21:32:09 +00:00
|
|
|
#
|
|
|
|
define(`bootloader_list_kernel_modules',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type modules_object_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 modules_object_t:dir r_dir_perms;
|
2005-04-25 21:32:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_read_kernel_modules">
|
|
|
|
## <description>
|
|
|
|
## Read kernel module files.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-25 21:32:09 +00:00
|
|
|
#
|
|
|
|
define(`bootloader_read_kernel_modules',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type modules_object_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class lnk_file r_file_perms;
|
|
|
|
class file r_file_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 modules_object_t:dir r_dir_perms;
|
|
|
|
allow $1 modules_object_t:lnk_file r_file_perms;
|
|
|
|
allow $1 modules_object_t:file r_file_perms;
|
2005-04-25 21:32:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-26 20:38:45 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_write_kernel_modules">
|
|
|
|
## <description>
|
|
|
|
## Write kernel module files.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-05-26 20:38:45 +00:00
|
|
|
#
|
|
|
|
define(`bootloader_write_kernel_modules',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
attribute rw_kern_modules;
|
|
|
|
type modules_object_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class file { write append };
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 modules_object_t:dir r_dir_perms;
|
2005-06-09 19:22:27 +00:00
|
|
|
allow $1 modules_object_t:file { write append };
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-13 17:35:46 +00:00
|
|
|
typeattribute $1 rw_kern_modules;
|
2005-05-26 20:38:45 +00:00
|
|
|
')
|
|
|
|
|
2005-04-25 21:32:09 +00:00
|
|
|
########################################
|
2005-06-09 19:22:27 +00:00
|
|
|
## <interface name="bootloader_manage_kernel_modules">
|
|
|
|
## <description>
|
|
|
|
## Create, read, write, and delete
|
|
|
|
## kernel module files.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## </interface>
|
2005-04-25 21:32:09 +00:00
|
|
|
#
|
2005-05-26 20:38:45 +00:00
|
|
|
define(`bootloader_manage_kernel_modules',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
attribute rw_kern_modules;
|
|
|
|
type modules_object_t;
|
|
|
|
class file { getattr create read write setattr unlink };
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-08 20:28:45 +00:00
|
|
|
allow $1 modules_object_t:file { rw_file_perms create setattr unlink };
|
|
|
|
allow $1 modules_object_t:dir rw_dir_perms;
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-13 17:35:46 +00:00
|
|
|
typeattribute $1 rw_kern_modules;
|
2005-04-25 21:32:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# bootloader_create_private_module_dir_entry(domain,privatetype,[class(es)])
|
2005-04-25 21:32:09 +00:00
|
|
|
#
|
|
|
|
define(`bootloader_create_private_module_dir_entry',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type modules_object_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
')
|
2005-06-02 18:55:47 +00:00
|
|
|
|
2005-06-22 16:07:14 +00:00
|
|
|
allow $1 modules_object_t:dir rw_dir_perms;
|
2005-06-02 18:55:47 +00:00
|
|
|
|
|
|
|
# if a class is specified use it, else use file as default
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 modules_object_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 modules_object_t:$3 $2;
|
|
|
|
')
|
2005-04-25 21:32:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-23 15:47:13 +00:00
|
|
|
## </module>
|