2005-06-01 14:17:43 +00:00
|
|
|
## <summary>Policy for filesystems.</summary>
|
2005-07-05 17:47:15 +00:00
|
|
|
## <required val="true">
|
|
|
|
## Contains the initial SID for the filesystems.
|
|
|
|
## </required>
|
2005-04-20 19:07:16 +00:00
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Transform specified type into a filesystem type.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-28 17:48:59 +00:00
|
|
|
interface(`fs_type',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
typeattribute $1 filesystem_type;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-06-10 01:01:13 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Transform specified type into a filesystem
|
|
|
|
## type which does not have extended attribute
|
|
|
|
## support.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-06-10 01:01:13 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_make_noxattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
attribute noxattrfs;
|
|
|
|
')
|
2005-06-10 01:01:13 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
fs_type($1)
|
2005-06-10 01:01:13 +00:00
|
|
|
|
|
|
|
typeattribute $1 noxattrfs;
|
|
|
|
')
|
|
|
|
|
2005-04-16 17:20:59 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Associate the specified file type to persistent
|
|
|
|
## filesystems with extended attributes. This
|
|
|
|
## allows a file of this type to be created on
|
|
|
|
## a filesystem such as ext3, JFS, and XFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="file_type">
|
|
|
|
## The type of the to be associated.
|
|
|
|
## </param>
|
2005-04-16 17:20:59 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_associate',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem associate;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 fs_t:filesystem associate;
|
2005-04-16 17:20:59 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Associate the specified file type to
|
|
|
|
## filesystems which lack extended attributes
|
|
|
|
## support. This allows a file of this type
|
|
|
|
## to be created on a filesystem such as
|
|
|
|
## FAT32, and NFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="file_type">
|
|
|
|
## The type of the to be associated.
|
|
|
|
## </param>
|
2005-04-16 17:20:59 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_associate_noxattr',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
attribute noxattrfs;
|
|
|
|
class filesystem associate;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-09 15:20:31 +00:00
|
|
|
allow $1 noxattrfs:filesystem associate;
|
2005-04-16 17:20:59 +00:00
|
|
|
')
|
|
|
|
|
2005-07-19 18:40:31 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute files on a filesystem that does
|
|
|
|
## not support extended attributes.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_exec_noxattr',`
|
|
|
|
gen_require(`
|
|
|
|
attribute noxattrfs;
|
|
|
|
')
|
|
|
|
|
|
|
|
can_exec($1,noxattrfs)
|
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a persistent filesystem which
|
|
|
|
## has extended attributes, such as
|
|
|
|
## ext3, JFS, or XFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_xattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 fs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a persistent filesystem which
|
|
|
|
## has extended attributes, such as
|
|
|
|
## ext3, JFS, or XFS. This allows
|
|
|
|
## some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_xattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 fs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a persistent filesystem which
|
|
|
|
## has extended attributes, such as
|
|
|
|
## ext3, JFS, or XFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_xattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 fs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a persistent
|
|
|
|
## filesystem which has extended
|
|
|
|
## attributes, such as ext3, JFS, or XFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_xattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 fs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-19 18:56:47 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-10-13 20:59:36 +00:00
|
|
|
## Get the quotas of a persistent
|
|
|
|
## filesystem which has extended
|
|
|
|
## attributes, such as ext3, JFS, or XFS.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain getting quotas.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_get_xattr_fs_quotas',`
|
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 fs_t:filesystem quotaget;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Do not audit attempts to
|
|
|
|
## get the attributes of a persistent
|
|
|
|
## filesystem which has extended
|
|
|
|
## attributes, such as ext3, JFS, or XFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
2005-04-19 18:56:47 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_dontaudit_getattr_xattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
dontaudit $1 fs_t:filesystem getattr;
|
2005-04-19 18:56:47 +00:00
|
|
|
')
|
|
|
|
|
2005-05-24 15:55:57 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Allow changing of the label of a
|
|
|
|
## filesystem with extended attributes
|
|
|
|
## using the context= mount option.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-05-24 15:55:57 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_relabelfrom_xattr_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem relabelfrom;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 fs_t:filesystem relabelfrom;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-08-11 14:49:58 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Get the filesystem quotas of a filesystem
|
|
|
|
## with extended attributes.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_get_xattr_fs_quota',`
|
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem quotaget;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 fs_t:filesystem quotaget;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Set the filesystem quotas of a filesystem
|
|
|
|
## with extended attributes.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_set_xattr_fs_quota',`
|
|
|
|
gen_require(`
|
|
|
|
type fs_t;
|
|
|
|
class filesystem quotamod;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 fs_t:filesystem quotamod;
|
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount an automount pseudo filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_autofs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type autofs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 autofs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-06-09 15:20:31 +00:00
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount an automount pseudo filesystem
|
|
|
|
## This allows some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_autofs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type autofs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 autofs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount an automount pseudo filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_autofs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type autofs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 autofs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of an automount
|
|
|
|
## pseudo filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_autofs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type autofs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 autofs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-06-27 16:30:55 +00:00
|
|
|
## <summary>
|
|
|
|
## Search automount filesystem to use automatically
|
|
|
|
## mounted filesystems.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain performing this action.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_search_auto_mountpoints',`
|
|
|
|
gen_require(`
|
|
|
|
type autofs_t;
|
|
|
|
class dir { getattr search };
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 autofs_t:dir { getattr search };
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Register an interpreter for new binary
|
|
|
|
## file types, using the kernel binfmt_misc
|
|
|
|
## support. A common use for this is to
|
|
|
|
## register a JVM as an interpreter for
|
|
|
|
## Java byte code. Registered binaries
|
|
|
|
## can be directly executed on a command line
|
|
|
|
## without specifying the interpreter.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain registering
|
|
|
|
## the interpreter.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_register_binary_executable_type',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type binfmt_misc_fs_t;
|
|
|
|
class dir { getattr search };
|
|
|
|
class file { getattr ioctl write };
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 binfmt_misc_fs_t:dir { getattr search };
|
|
|
|
allow $1 binfmt_misc_fs_t:file { getattr ioctl write };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_cifs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a CIFS or SMB network filesystem.
|
|
|
|
## This allows some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_cifs',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_cifs',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-08-31 16:54:19 +00:00
|
|
|
allow $1 cifs_t:filesystem unmount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a CIFS or
|
|
|
|
## SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_cifs',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-08-08 21:03:23 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Search directories on a CIFS or SMB filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the files.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_search_cifs',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 cifs_t:dir search;
|
|
|
|
')
|
|
|
|
|
2005-09-14 18:33:53 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## List the contents of directories on a
|
|
|
|
## CIFS or SMB filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the files.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_list_cifs',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 cifs_t:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to list the contents
|
|
|
|
## of directories on a CIFS or SMB filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_list_cifs',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 cifs_t:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read files on a CIFS or SMB filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the files.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_read_cifs_files',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
allow $1 cifs_t:dir r_dir_perms;
|
|
|
|
allow $1 cifs_t:file r_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to read
|
|
|
|
## files on a CIFS or SMB filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_read_cifs_files',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 cifs_t:file r_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Do not audit attempts to read or
|
|
|
|
## write files on a CIFS or SMB filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_dontaudit_rw_cifs_files',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 cifs_t:file { read write };
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read symbolic links on a CIFS or SMB filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the symbolic links.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_read_cifs_symlinks',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class lnk_file r_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 cifs_t:dir r_dir_perms;
|
|
|
|
allow $1 cifs_t:lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-16 21:10:33 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Execute files on a CIFS or SMB
|
|
|
|
## network filesystem, in the caller
|
|
|
|
## domain.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain executing the files.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_execute_cifs_files',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:dir r_dir_perms;
|
2005-06-08 20:28:45 +00:00
|
|
|
can_exec($1, cifs_t)
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Do not audit attempts to read or
|
|
|
|
## write files on a CIFS or SMB filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_read_cifs_files',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class file { read write };
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 cifs_t:file { read write };
|
|
|
|
')
|
|
|
|
|
2005-05-16 21:10:33 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete directories
|
|
|
|
## on a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the directories.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_cifs_dirs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
allow $1 cifs_t:dir create_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to create, read,
|
|
|
|
## write, and delete directories
|
|
|
|
## on a CIFS or SMB network filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the directories.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_manage_cifs_dirs',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 cifs_t:dir create_dir_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete files
|
|
|
|
## on a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the files.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_cifs_files',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:dir rw_dir_perms;
|
|
|
|
allow $1 cifs_t:file create_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to create, read,
|
|
|
|
## write, and delete files
|
|
|
|
## on a CIFS or SMB network filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_manage_cifs_files',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 cifs_t:file create_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-05-16 21:10:33 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete symbolic links
|
|
|
|
## on a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the symbolic links.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_cifs_symlinks',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class lnk_file create_lnk_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:dir rw_dir_perms;
|
|
|
|
allow $1 cifs_t:lnk_file create_lnk_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete named pipes
|
|
|
|
## on a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the pipes.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_cifs_named_pipes',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class fifo_file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:dir rw_dir_perms;
|
|
|
|
allow $1 cifs_t:fifo_file create_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete named sockets
|
|
|
|
## on a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the sockets.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_cifs_named_sockets',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class sock_file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 cifs_t:dir rw_file_perms;
|
|
|
|
allow $1 cifs_t:sock_file create_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-07-13 18:29:08 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a file on a CIFS or SMB filesystem
|
|
|
|
## in the specified domain.
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## Execute a file on a CIFS or SMB filesystem
|
|
|
|
## in the specified domain. This allows
|
|
|
|
## the specified domain to execute any file
|
|
|
|
## on these filesystems in the specified
|
|
|
|
## domain. This is not suggested.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## No interprocess communication (signals, pipes,
|
|
|
|
## etc.) is provided by this interface since
|
|
|
|
## the domains are not owned by this module.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## This interface was added to handle
|
|
|
|
## home directories on CIFS/SMB filesystems,
|
|
|
|
## in particular used by the ssh-agent policy.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
## <param name="target_domain">
|
|
|
|
## The type of the new process.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_cifs_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type cifs_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 cifs_t:dir search;
|
|
|
|
|
|
|
|
domain_auto_trans($1,cifs_t,$2)
|
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a DOS filesystem, such as
|
|
|
|
## FAT32 or NTFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_dos_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type dosfs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 dosfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a DOS filesystem, such as
|
|
|
|
## FAT32 or NTFS. This allows
|
|
|
|
## some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_dos_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type dosfs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 dosfs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a DOS filesystem, such as
|
|
|
|
## FAT32 or NTFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_dos_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type dosfs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 dosfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a DOS
|
|
|
|
## filesystem, such as FAT32 or NTFS.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_dos_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type dosfs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 dosfs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-24 15:55:57 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Allow changing of the label of a
|
|
|
|
## DOS filesystem using the context= mount option.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-05-24 15:55:57 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_relabelfrom_dos_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type dosfs_t;
|
|
|
|
class filesystem relabelfrom;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 dosfs_t:filesystem relabelfrom;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount an iso9660 filesystem, which
|
|
|
|
## is usually used on CDs.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_iso9660_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type iso9660_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 iso9660_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount an iso9660 filesystem, which
|
|
|
|
## is usually used on CDs. This allows
|
|
|
|
## some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_iso9660_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type iso9660_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 iso9660_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount an iso9660 filesystem, which
|
|
|
|
## is usually used on CDs.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_iso9660_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type iso9660_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 iso9660_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of an iso9660
|
|
|
|
## filesystem, which is usually used on CDs.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_iso9660_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type iso9660_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 iso9660_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_nfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a NFS filesystem. This allows
|
|
|
|
## some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_nfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_nfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_nfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-08-08 21:03:23 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Search directories on a NFS filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the files.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_search_nfs',`
|
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 nfs_t:dir search;
|
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to list the contents
|
|
|
|
## of directories on a NFS filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_list_nfs',`
|
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 nfs_t:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read files on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the files.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_read_nfs_files',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 nfs_t:dir r_dir_perms;
|
|
|
|
allow $1 nfs_t:file r_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to read
|
|
|
|
## files on a NFS filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_read_nfs_files',`
|
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 nfs_t:file r_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-05-16 21:10:33 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Execute files on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain executing the files.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_execute_nfs_files',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:dir r_dir_perms;
|
2005-06-08 20:28:45 +00:00
|
|
|
can_exec($1, nfs_t)
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Do not audit attempts to read or
|
|
|
|
## write files on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_dontaudit_rw_nfs_files',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-16 20:33:51 +00:00
|
|
|
dontaudit $1 nfs_t:file { read write };
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read symbolic links on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain reading the symbolic links.
|
|
|
|
## </param>
|
2005-06-16 20:33:51 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_read_nfs_symlinks',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class lnk_file r_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 nfs_t:dir r_dir_perms;
|
|
|
|
allow $1 nfs_t:lnk_file r_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete directories
|
|
|
|
## on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the directories.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_nfs_dirs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir create_dir_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:dir create_dir_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to create, read,
|
|
|
|
## write, and delete directories
|
|
|
|
## on a NFS filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_manage_nfs_dirs',`
|
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 nfs_t:dir create_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-05-16 21:10:33 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete files
|
|
|
|
## on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the files.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_nfs_files',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 nfs_t:file create_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to create,
|
|
|
|
## read, write, and delete files
|
|
|
|
## on a NFS filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_manage_nfs_files',`
|
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 nfs_t:file create_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-06-09 15:20:31 +00:00
|
|
|
#########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete symbolic links
|
|
|
|
## on a CIFS or SMB network filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the symbolic links.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_nfs_symlinks',`
|
2005-06-16 20:33:51 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class lnk_file create_lnk_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 nfs_t:lnk_file create_lnk_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-06-09 15:20:31 +00:00
|
|
|
#########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete named pipes
|
|
|
|
## on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the pipes.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_nfs_named_pipes',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class fifo_file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 nfs_t:fifo_file create_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-06-09 15:20:31 +00:00
|
|
|
#########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Create, read, write, and delete named sockets
|
|
|
|
## on a NFS filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain managing the sockets.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_manage_nfs_named_sockets',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class sock_file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 nfs_t:sock_file create_file_perms;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-07-13 18:29:08 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a file on a NFS filesystem
|
|
|
|
## in the specified domain.
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## Execute a file on a NFS filesystem
|
|
|
|
## in the specified domain. This allows
|
|
|
|
## the specified domain to execute any file
|
|
|
|
## on a NFS filesystem in the specified
|
|
|
|
## domain. This is not suggested.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## No interprocess communication (signals, pipes,
|
|
|
|
## etc.) is provided by this interface since
|
|
|
|
## the domains are not owned by this module.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## This interface was added to handle
|
|
|
|
## home directories on NFS filesystems,
|
|
|
|
## in particular used by the ssh-agent policy.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
## <param name="target_domain">
|
|
|
|
## The type of the new process.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_nfs_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type nfs_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 nfs_t:dir search;
|
|
|
|
|
|
|
|
domain_auto_trans($1,nfs_t,$2)
|
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a NFS server pseudo filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_nfsd_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfsd_fs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfsd_fs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a NFS server pseudo filesystem.
|
|
|
|
## This allows some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_nfsd_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfsd_fs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfsd_fs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a NFS server pseudo filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_nfsd_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfsd_fs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfsd_fs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a NFS server
|
|
|
|
## pseudo filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_nfsd_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type nfsd_fs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 nfsd_fs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a RAM filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_ramfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type ramfs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 ramfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a RAM filesystem. This allows
|
|
|
|
## some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_ramfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type ramfs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 ramfs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a RAM filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_ramfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type ramfs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 ramfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a RAM filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_ramfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type ramfs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 ramfs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-09-23 19:38:34 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Search directories on a ramfs
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_search_ramfs',`
|
|
|
|
gen_require(`
|
|
|
|
type ramfs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 ramfs_t:dir search;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Write to named socket on a ramfs filesystem.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_write_ramfs_socket',`
|
|
|
|
gen_require(`
|
|
|
|
type ramfs_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 ramfs_t:sock_file write;
|
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a ROM filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_romfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type romfs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 romfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a ROM filesystem. This allows
|
|
|
|
## some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_romfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type romfs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 romfs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a ROM filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_romfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type romfs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 romfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a ROM
|
|
|
|
## filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_romfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type romfs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 romfs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a RPC pipe filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_rpc_pipefs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type rpc_pipefs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 rpc_pipefs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a RPC pipe filesystem. This
|
|
|
|
## allows some mount option to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_rpc_pipefs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type rpc_pipefs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 rpc_pipefs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a RPC pipe filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_rpc_pipefs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type rpc_pipefs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 rpc_pipefs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a RPC pipe
|
|
|
|
## filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_rpc_pipefs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type rpc_pipefs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 rpc_pipefs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount a tmpfs filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_tmpfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount a tmpfs filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain remounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_tmpfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount a tmpfs filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_tmpfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of a tmpfs
|
|
|
|
## filesystem.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_tmpfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:filesystem getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Allow the type to associate to tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="type">
|
|
|
|
## The type of the object to be associated.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_associate_tmpfs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class filesystem associate;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:filesystem associate;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-07-08 20:44:57 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Get the attributes of tmpfs directories.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_getattr_tmpfs_dir',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir getattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir getattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Set the attributes of tmpfs directories.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_setattr_tmpfs_dir',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir setattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir setattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Search tmpfs directories.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_search_tmpfs',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir search;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir search;
|
|
|
|
')
|
|
|
|
|
2005-07-18 18:31:49 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## List the contents of generic tmpfs directories.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_list_tmpfs',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to list the
|
|
|
|
## contents of generic tmpfs directories.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain to not audit.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_list_tmpfs',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 tmpfs_t:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-09-15 21:03:29 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Create, read, write, and delete
|
|
|
|
## tmpfs directories
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_manage_tmpfs_dirs',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir create_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir create_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-06-08 16:18:08 +00:00
|
|
|
# fs_create_tmpfs_data(domain,derivedtype,[class])
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_create_tmpfs_data',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class filesystem associate;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $2 tmpfs_t:filesystem associate;
|
|
|
|
allow $1 tmpfs_t:dir rw_dir_perms;
|
|
|
|
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 tmpfs_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 tmpfs_t:$3 $2;
|
|
|
|
')
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read and write character nodes on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-05-19 21:06:06 +00:00
|
|
|
#
|
2005-06-29 20:53:53 +00:00
|
|
|
interface(`fs_use_tmpfs_chr_dev',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class chr_file rw_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir r_dir_perms;
|
|
|
|
allow $1 tmpfs_t:chr_file rw_file_perms;
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
2005-05-25 20:58:21 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Relabel character nodes on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-05-25 20:58:21 +00:00
|
|
|
#
|
2005-06-29 20:53:53 +00:00
|
|
|
interface(`fs_relabel_tmpfs_chr_dev',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class chr_file { getattr relabelfrom relabelto };
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir r_dir_perms;
|
|
|
|
allow $1 tmpfs_t:chr_file { getattr relabelfrom relabelto };
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read and write block nodes on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-05-19 21:06:06 +00:00
|
|
|
#
|
2005-06-29 20:53:53 +00:00
|
|
|
interface(`fs_use_tmpfs_blk_dev',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class blk_file rw_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir r_dir_perms;
|
|
|
|
allow $1 tmpfs_t:blk_file rw_file_perms;
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Relabel block nodes on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-05-25 20:58:21 +00:00
|
|
|
#
|
2005-06-29 20:53:53 +00:00
|
|
|
interface(`fs_relabel_tmpfs_blk_dev',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class blk_file { getattr relabelfrom relabelto };
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir r_dir_perms;
|
|
|
|
allow $1 tmpfs_t:blk_file { getattr relabelfrom relabelto };
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
2005-09-15 21:03:29 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Read and write, create and delete generic
|
|
|
|
## files on tmpfs filesystems.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_manage_tmpfs_files',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file create_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 tmpfs_t:file create_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-06-29 20:53:53 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-29 20:53:53 +00:00
|
|
|
## Read and write, create and delete symbolic
|
|
|
|
## links on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-29 20:53:53 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_manage_tmpfs_symlinks',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class chr_file create_lnk_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 tmpfs_t:chr_file create_lnk_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-29 20:53:53 +00:00
|
|
|
## Read and write, create and delete socket
|
|
|
|
## files on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-29 20:53:53 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_manage_tmpfs_sockets',`
|
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class sock_file create_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 tmpfs_t:sock_file create_file_perms;
|
|
|
|
')
|
|
|
|
|
2005-05-25 20:58:21 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read and write, create and delete character
|
|
|
|
## nodes on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-05-19 21:06:06 +00:00
|
|
|
#
|
2005-06-29 20:53:53 +00:00
|
|
|
interface(`fs_manage_tmpfs_chr_dev',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class chr_file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 tmpfs_t:chr_file create_file_perms;
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Read and write, create and delete block nodes
|
|
|
|
## on tmpfs filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </param>
|
2005-05-19 21:06:06 +00:00
|
|
|
#
|
2005-06-29 20:53:53 +00:00
|
|
|
interface(`fs_manage_tmpfs_blk_dev',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
|
|
|
type tmpfs_t;
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class blk_file create_file_perms;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
allow $1 tmpfs_t:dir rw_dir_perms;
|
|
|
|
allow $1 tmpfs_t:blk_file create_file_perms;
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Mount all filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_mount_all_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
class filesystem mount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:filesystem mount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Remount all filesystems. This
|
|
|
|
## allows some mount options to be changed.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain mounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_remount_all_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
class filesystem remount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:filesystem remount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Unmount all filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain unmounting the filesystem.
|
|
|
|
## </param>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_unmount_all_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
class filesystem unmount;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:filesystem unmount;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-25 19:54:27 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the attributes of all persistent
|
|
|
|
## filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
2005-04-25 19:54:27 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_all_fs',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
class filesystem getattr;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:filesystem getattr;
|
2005-04-25 19:54:27 +00:00
|
|
|
')
|
|
|
|
|
2005-06-22 21:14:48 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Do not audit attempts to get the attributes
|
|
|
|
## all filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain to not audit.
|
|
|
|
## </param>
|
2005-06-22 21:14:48 +00:00
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_getattr_all_fs',`
|
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 21:14:48 +00:00
|
|
|
class filesystem getattr;
|
|
|
|
')
|
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
dontaudit $1 filesystem_type:filesystem getattr;
|
2005-06-22 21:14:48 +00:00
|
|
|
')
|
|
|
|
|
2005-05-16 21:10:33 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Get the quotas of all filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain getting quotas.
|
|
|
|
## </param>
|
2005-05-16 21:10:33 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_get_all_fs_quotas',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
class filesystem quotaget;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:filesystem quotaget;
|
2005-05-16 21:10:33 +00:00
|
|
|
')
|
|
|
|
|
2005-05-18 13:20:38 +00:00
|
|
|
########################################
|
2005-07-08 20:44:57 +00:00
|
|
|
## <summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## Set the quotas of all filesystems.
|
2005-07-08 20:44:57 +00:00
|
|
|
## </summary>
|
2005-06-23 21:30:57 +00:00
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain setting quotas.
|
|
|
|
## </param>
|
2005-05-18 13:20:38 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_set_all_quotas',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
class filesystem quotamod;
|
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:filesystem quotamod;
|
2005-05-18 13:20:38 +00:00
|
|
|
')
|
|
|
|
|
2005-09-16 21:20:37 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Relabelfrom all filesystems.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## The type of the domain doing the
|
|
|
|
## getattr on the filesystem.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_relabelfrom_all_fs',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:filesystem relabelfrom;
|
|
|
|
')
|
|
|
|
|
2005-09-19 21:17:45 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Search all directories with a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_search_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
class dir { getattr search };
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:dir { getattr search };
|
|
|
|
')
|
|
|
|
|
2005-07-11 19:02:50 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## List all directories with a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_list_all',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:dir r_dir_perms;
|
|
|
|
')
|
|
|
|
|
2005-05-12 20:50:09 +00:00
|
|
|
########################################
|
2005-10-10 18:11:46 +00:00
|
|
|
## <summary>
|
|
|
|
## Get the attributes of all files with
|
|
|
|
## a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
2005-05-12 20:50:09 +00:00
|
|
|
#
|
2005-06-22 19:21:31 +00:00
|
|
|
interface(`fs_getattr_all_files',`
|
2005-06-22 16:07:14 +00:00
|
|
|
gen_require(`
|
2005-06-28 17:48:59 +00:00
|
|
|
attribute filesystem_type;
|
2005-06-22 16:07:14 +00:00
|
|
|
')
|
2005-06-03 12:25:14 +00:00
|
|
|
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:dir { search getattr };
|
|
|
|
allow $1 filesystem_type:file getattr;
|
2005-10-10 18:11:46 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Get the attributes of all symbolic links with
|
|
|
|
## a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_getattr_all_symlinks',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:dir { search getattr };
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:lnk_file getattr;
|
2005-10-10 18:11:46 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Get the attributes of all named pipes with
|
|
|
|
## a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_getattr_all_pipes',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:dir { search getattr };
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:fifo_file getattr;
|
2005-10-10 18:11:46 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Get the attributes of all named sockets with
|
|
|
|
## a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_getattr_all_sockets',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:dir { search getattr };
|
2005-06-28 17:48:59 +00:00
|
|
|
allow $1 filesystem_type:sock_file getattr;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
2005-10-10 18:11:46 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to get the attributes
|
|
|
|
## of all files with a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_getattr_all_files',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 filesystem_type:file getattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to get the attributes
|
|
|
|
## of all symbolic links with a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_getattr_all_symlinks',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 filesystem_type:lnk_file getattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to get the attributes
|
|
|
|
## of all named pipes with a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_getattr_all_pipes',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 filesystem_type:fifo_file getattr;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Do not audit attempts to get the attributes
|
|
|
|
## of all named sockets with a filesystem type.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_dontaudit_getattr_all_sockets',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
dontaudit $1 filesystem_type:sock_file getattr;
|
|
|
|
')
|
|
|
|
|
2005-07-05 20:59:51 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Unconfined access to filesystems
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## Domain allowed access.
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`fs_unconfined',`
|
|
|
|
gen_require(`
|
|
|
|
attribute filesystem_type;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 filesystem_type:filesystem *;
|
|
|
|
|
|
|
|
# Create/access other files. fs_type is to pick up various
|
|
|
|
# pseudo filesystem types that are applied to both the filesystem
|
|
|
|
# and its files.
|
|
|
|
allow $1 filesystem_type:{ dir lnk_file sock_file fifo_file blk_file } *;
|
|
|
|
')
|