## ## Policy for kernel security interface, in particular, selinuxfs. ## ## ## Contains the policy for the kernel SELinux security interface. ## ######################################## ## ## Make the specified type used for labeling SELinux Booleans. ## This interface is only usable in the base module. ## ## ##

## Make the specified type used for labeling SELinux Booleans. ##

##

## This makes use of genfscon statements, which are only ## available in the base module. Thus any module which calls this ## interface must be included in the base module. ##

##
## ## ## Type used for labeling a Boolean. ## ## ## ## ## Name of the Boolean. ## ## # interface(`selinux_labeled_boolean',` gen_require(` attribute boolean_type; ') typeattribute $1 boolean_type; # because of this statement, any module which # calls this interface must be in the base module: genfscon selinuxfs /booleans/$2 -- gen_context(system_u:object_r:$1,s0) ') ######################################## ## ## Get the mountpoint of the selinuxfs filesystem. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_get_fs_mount',` gen_require(` type security_t; ') # starting in libselinux 2.0.5, init_selinuxmnt() will # attempt to short circuit by checking if SELINUXMNT # (/selinux) is already a selinuxfs allow $1 security_t:filesystem getattr; # Same for /sys/fs/selinux dev_getattr_sysfs($1) dev_search_sysfs($1) # read /proc/filesystems to see if selinuxfs is supported # then read /proc/self/mount to see where selinuxfs is mounted kernel_read_system_state($1) ') ######################################## ## ## Do not audit attempts to get the mountpoint ## of the selinuxfs filesystem. ## ## ## ## Domain to not audit. ## ## # interface(`selinux_dontaudit_get_fs_mount',` gen_require(` type security_t; ') # starting in libselinux 2.0.5, init_selinuxmnt() will # attempt to short circuit by checking if SELINUXMNT # (/selinux) is already a selinuxfs dontaudit $1 security_t:filesystem getattr; # Same for /sys/fs/selinux dev_dontaudit_getattr_sysfs($1) dev_dontaudit_search_sysfs($1) # read /proc/filesystems to see if selinuxfs is supported # then read /proc/self/mount to see where selinuxfs is mounted kernel_dontaudit_read_system_state($1) ') ######################################## ## ## Mount the selinuxfs filesystem. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_mount_fs',` gen_require(` type security_t; ') allow $1 security_t:filesystem mount; ') ######################################## ## ## Remount the selinuxfs filesystem. ## This allows some mount options to be changed. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_remount_fs',` gen_require(` type security_t; ') allow $1 security_t:filesystem remount; ') ######################################## ## ## Unmount the selinuxfs filesystem. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_unmount_fs',` gen_require(` type security_t; ') allow $1 security_t:filesystem unmount; ') ######################################## ## ## Mount on the selinuxfs filesystem. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_mounton_fs',` gen_require(` type security_t; ') allow $1 security_t:dir mounton_dir_perms; ') ######################################## ## ## Get the attributes of the selinuxfs filesystem ## ## ## ## Domain allowed access. ## ## # interface(`selinux_getattr_fs',` gen_require(` type security_t; ') allow $1 security_t:filesystem getattr; dev_getattr_sysfs($1) dev_search_sysfs($1) ') ######################################## ## ## Do not audit attempts to get the ## attributes of the selinuxfs filesystem ## ## ## ## Domain to not audit. ## ## # interface(`selinux_dontaudit_getattr_fs',` gen_require(` type security_t; ') dontaudit $1 security_t:filesystem getattr; dev_dontaudit_getattr_sysfs($1) dev_dontaudit_search_sysfs($1) ') ######################################## ## ## Get the attributes of the selinuxfs ## directory. ## ## ## ## Domain to not audit. ## ## # interface(`selinux_getattr_dirs',` gen_require(` type security_t; ') allow $1 security_t:dir getattr; ') ######################################## ## ## Do not audit attempts to get the ## attributes of the selinuxfs directory. ## ## ## ## Domain to not audit. ## ## # interface(`selinux_dontaudit_getattr_dir',` gen_require(` type security_t; ') dontaudit $1 security_t:dir getattr; ') ######################################## ## ## Search selinuxfs. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_search_fs',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir search_dir_perms; ') ######################################## ## ## Do not audit attempts to search selinuxfs. ## ## ## ## Domain to not audit. ## ## # interface(`selinux_dontaudit_search_fs',` gen_require(` type security_t; ') dontaudit $1 security_t:dir search_dir_perms; ') ######################################## ## ## Do not audit attempts to read ## generic selinuxfs entries ## ## ## ## Domain to not audit. ## ## # interface(`selinux_dontaudit_read_fs',` gen_require(` type security_t; ') dontaudit $1 security_t:dir search_dir_perms; dontaudit $1 security_t:file read_file_perms; ') ######################################## ## ## Mount on the selinuxfs directory. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_mounton_dirs',` gen_require(` type security_t; ') allow $1 security_t:dir mounton; ') ######################################## ## ## Allows the caller to get the mode of policy enforcement ## (enforcing or permissive mode). ## ## ## ## Domain allowed access. ## ## ## # interface(`selinux_get_enforce_mode',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file read_file_perms; ') ######################################## ## ## Allow caller to set the mode of policy enforcement ## (enforcing or permissive mode). ## ## ##

## Allow caller to set the mode of policy enforcement ## (enforcing or permissive mode). ##

##

## Since this is a security event, this action is ## always audited. ##

##
## ## ## Domain allowed access. ## ## ## # interface(`selinux_set_enforce_mode',` gen_require(` attribute can_setenforce; ') typeattribute $1 can_setenforce; ') ######################################## ## ## Allow caller to load the policy into the kernel. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_load_policy',` gen_require(` attribute can_load_policy; ') typeattribute $1 can_load_policy; ') ######################################## ## ## Allow caller to read the policy from the kernel. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_read_policy',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file read_file_perms; allow $1 security_t:security read_policy; ') ######################################## ## ## Allow caller to set the state of generic Booleans to ## enable or disable conditional portions of the policy. ## ## ##

## Allow caller to set the state of generic Booleans to ## enable or disable conditional portions of the policy. ##

##

## Since this is a security event, this action is ## always audited. ##

##
## ## ## Domain allowed access. ## ## ## # interface(`selinux_set_generic_booleans',` gen_require(` type boolean_t, security_t; bool secure_mode_setbool; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 boolean_t:file read_file_perms; if(secure_mode_setbool) { dontaudit $1 { boolean_t security_t }:file write_file_perms; dontaudit $1 security_t:security setbool; } else { allow $1 { boolean_t security_t }:file write_file_perms; allow $1 security_t:security setbool; } ') ######################################## ## ## Allow caller to set the state of all Booleans to ## enable or disable conditional portions of the policy. ## ## ##

## Allow caller to set the state of all Booleans to ## enable or disable conditional portions of the policy. ##

##

## Since this is a security event, this action is ## always audited. ##

##
## ## ## Domain allowed access. ## ## ## # interface(`selinux_set_all_booleans',` gen_require(` type security_t, secure_mode_policyload_t; attribute boolean_type; bool secure_mode_policyload, secure_mode_setbool; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 boolean_type:file read_file_perms; allow $1 secure_mode_policyload_t:file read_file_perms; if (secure_mode_setbool) { dontaudit $1 security_t:security setbool; dontaudit $1 security_t:file write_file_perms; dontaudit $1 { boolean_type -secure_mode_policyload_t }:file write_file_perms; } else { allow $1 security_t:security setbool; allow $1 security_t:file write_file_perms; allow $1 { boolean_type -secure_mode_policyload_t }:file write_file_perms; } if(!secure_mode_policyload && !secure_mode_setbool) { allow $1 secure_mode_policyload_t:file write_file_perms; } else { dontaudit $1 secure_mode_policyload_t:file write_file_perms; } ') ######################################## ## ## Allow caller to get the state of all Booleans to ## view conditional portions of the policy. ## ## ## ## Domain allowed access. ## ## ## # interface(`selinux_get_all_booleans',` gen_require(` type security_t; attribute boolean_type; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 boolean_type:file read_file_perms; ') ######################################## ## ## Allow caller to set SELinux access vector cache parameters. ## ## ##

## Allow caller to set SELinux access vector cache parameters. ## The allows the domain to set performance related parameters ## of the AVC, such as cache threshold. ##

##

## Since this is a security event, this action is ## always audited. ##

##
## ## ## Domain allowed access. ## ## ## # interface(`selinux_set_parameters',` gen_require(` attribute can_setsecparam; ') typeattribute $1 can_setsecparam; ') ######################################## ## ## Allows caller to validate security contexts. ## ## ## ## Domain allowed access. ## ## ## # interface(`selinux_validate_context',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file rw_file_perms; allow $1 security_t:security check_context; ') ######################################## ## ## Do not audit attempts to validate security contexts. ## ## ## ## Domain to not audit. ## ## ## # interface(`selinux_dontaudit_validate_context',` gen_require(` type security_t; ') dontaudit $1 security_t:dir list_dir_perms; dontaudit $1 security_t:file rw_file_perms; dontaudit $1 security_t:security check_context; ') ######################################## ## ## Allows caller to compute an access vector. ## ## ## ## Domain allowed access. ## ## ## # interface(`selinux_compute_access_vector',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 self:netlink_selinux_socket create_socket_perms; allow $1 security_t:dir list_dir_perms; allow $1 security_t:file rw_file_perms; allow $1 security_t:security compute_av; ') ######################################## ## ## Calculate the default type for object creation. ## ## ## ## Domain allowed access. ## ## ## # interface(`selinux_compute_create_context',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file rw_file_perms; allow $1 security_t:security compute_create; ') ######################################## ## ## Allows caller to compute polyinstatntiated ## directory members. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_compute_member',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file rw_file_perms; allow $1 security_t:security compute_member; ') ######################################## ## ## Calculate the context for relabeling objects. ## ## ##

## Calculate the context for relabeling objects. ## This is determined by using the type_change ## rules in the policy, and is generally used ## for determining the context for relabeling ## a terminal when a user logs in. ##

##
## ## ## Domain allowed access. ## ## # interface(`selinux_compute_relabel_context',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file rw_file_perms; allow $1 security_t:security compute_relabel; ') ######################################## ## ## Allows caller to compute possible contexts for a user. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_compute_user_contexts',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file rw_file_perms; allow $1 security_t:security compute_user; ') ######################################## ## ## Allows the caller to use the SELinux status page. ## ## ## ## Domain allowed access. ## ## ## # interface(`selinux_use_status_page',` gen_require(` type security_t; ') dev_search_sysfs($1) allow $1 security_t:dir list_dir_perms; allow $1 security_t:file mmap_read_file_perms; ') ######################################## ## ## Unconfined access to the SELinux kernel security server. ## ## ## ## Domain allowed access. ## ## # interface(`selinux_unconfined',` gen_require(` attribute selinux_unconfined_type; ') typeattribute $1 selinux_unconfined_type; ')