selinux-refpolicy/policy/modules/system/setrans.te
Chris PeBenito d387e79989 Bump module versions for release.
Signed-off-by: Chris PeBenito <pebenito@ieee.org>
2020-08-18 09:09:10 -04:00

95 lines
2.4 KiB
Plaintext

policy_module(setrans, 1.17.0)
gen_require(`
class context contains;
')
########################################
#
# Declarations
#
type setrans_t;
type setrans_exec_t;
init_daemon_domain(setrans_t, setrans_exec_t)
type setrans_initrc_exec_t;
init_script_file(setrans_initrc_exec_t)
type setrans_runtime_t alias setrans_var_run_t;
files_runtime_file(setrans_runtime_t)
mls_trusted_object(setrans_runtime_t)
type setrans_unit_t;
init_unit_file(setrans_unit_t)
ifdef(`distro_debian',`
init_daemon_runtime_file(setrans_runtime_t, dir, "setrans")
')
ifdef(`enable_mcs',`
init_ranged_daemon_domain(setrans_t, setrans_exec_t, s0 - mcs_systemhigh)
')
ifdef(`enable_mls',`
init_ranged_daemon_domain(setrans_t, setrans_exec_t, mls_systemhigh)
')
########################################
#
# setrans local policy
#
allow setrans_t self:capability sys_resource;
allow setrans_t self:process { setrlimit getcap setcap signal_perms };
allow setrans_t self:unix_stream_socket create_stream_socket_perms;
allow setrans_t self:unix_dgram_socket create_socket_perms;
allow setrans_t self:netlink_selinux_socket create_socket_perms;
allow setrans_t self:context contains;
can_exec(setrans_t, setrans_exec_t)
corecmd_search_bin(setrans_t)
# create unix domain socket in /var
manage_dirs_pattern(setrans_t, setrans_runtime_t, setrans_runtime_t)
manage_files_pattern(setrans_t, setrans_runtime_t, setrans_runtime_t)
manage_sock_files_pattern(setrans_t, setrans_runtime_t, setrans_runtime_t)
files_runtime_filetrans(setrans_t, setrans_runtime_t, { file dir })
kernel_read_kernel_sysctls(setrans_t)
kernel_read_system_state(setrans_t)
# allow performing getpidcon() on all processes
domain_read_all_domains_state(setrans_t)
domain_dontaudit_search_all_domains_state(setrans_t)
domain_getattr_all_domains(setrans_t)
domain_getsession_all_domains(setrans_t)
files_read_etc_runtime_files(setrans_t)
mls_file_read_all_levels(setrans_t)
mls_file_write_all_levels(setrans_t)
mls_net_receive_all_levels(setrans_t)
mls_socket_write_all_levels(setrans_t)
mls_process_read_all_levels(setrans_t)
mls_socket_read_all_levels(setrans_t)
selinux_compute_access_vector(setrans_t)
term_dontaudit_use_generic_ptys(setrans_t)
term_dontaudit_use_unallocated_ttys(setrans_t)
init_dontaudit_use_script_ptys(setrans_t)
locallogin_dontaudit_use_fds(setrans_t)
logging_send_syslog_msg(setrans_t)
miscfiles_read_localization(setrans_t)
seutil_libselinux_linked(setrans_t)
optional_policy(`
rpm_use_script_fds(setrans_t)
')