2005-05-18 21:00:00 +00:00
|
|
|
## <module name="files" layer="system">
|
|
|
|
## <summary>Policy controlling access to general files</summary>
|
2005-04-20 19:07:16 +00:00
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_make_file(type)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_make_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-08 13:12:00 +00:00
|
|
|
fs_associate($1)
|
|
|
|
fs_noxattr_associate($1)
|
2005-06-03 12:25:14 +00:00
|
|
|
typeattribute $1 file_type;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_make_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-12 20:50:09 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_make_lock_file(type)
|
|
|
|
#
|
|
|
|
define(`files_make_lock_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
files_make_file($1)
|
|
|
|
typeattribute $1 lockfile;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_make_lock_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute lockfile;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-11 19:21:40 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-11 19:36:36 +00:00
|
|
|
# files_make_mountpoint(type)
|
2005-05-11 19:21:40 +00:00
|
|
|
#
|
2005-05-11 19:36:36 +00:00
|
|
|
define(`files_make_mountpoint',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
files_make_file($1)
|
|
|
|
typeattribute $1 mountpoint;
|
2005-05-11 19:21:40 +00:00
|
|
|
')
|
|
|
|
|
2005-05-11 19:36:36 +00:00
|
|
|
define(`files_make_mountpoint_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute mountpoint;
|
2005-05-11 19:21:40 +00:00
|
|
|
')
|
|
|
|
|
2005-04-28 21:41:09 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-11 19:36:36 +00:00
|
|
|
# files_make_daemon_runtime_file(type)
|
2005-04-28 21:41:09 +00:00
|
|
|
#
|
2005-05-11 19:36:36 +00:00
|
|
|
define(`files_make_daemon_runtime_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
files_make_file($1)
|
|
|
|
typeattribute $1 pidfile;
|
2005-04-28 21:41:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-11 19:36:36 +00:00
|
|
|
define(`files_make_daemon_runtime_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute pidfile;
|
2005-05-11 19:36:36 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_make_temporary_file(type)
|
|
|
|
#
|
|
|
|
define(`files_make_temporary_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
files_make_file($1)
|
|
|
|
typeattribute $1 tmpfile;
|
2005-05-11 19:36:36 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_make_temporary_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute tmpfile;
|
2005-04-28 21:41:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-23 15:49:31 +00:00
|
|
|
########################################
|
|
|
|
## <interface name="files_make_tmpfs_file">
|
|
|
|
## <description>
|
|
|
|
## Transform the type into a file, for use on a
|
|
|
|
## virtual memory filesystem (tmpfs).
|
|
|
|
## </description>
|
|
|
|
## <parameter name="type">
|
|
|
|
## The type to be transformed.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="none"/>
|
|
|
|
## </interface>
|
|
|
|
#
|
|
|
|
define(`files_make_tmpfs_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
files_make_file($1)
|
2005-06-08 13:12:00 +00:00
|
|
|
fs_tmpfs_associate($1)
|
2005-06-03 12:25:14 +00:00
|
|
|
typeattribute $1 tmpfsfile;
|
2005-05-23 15:49:31 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_make_tmpfs_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute tmpfsfile;
|
2005-05-23 15:49:31 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-18 21:00:00 +00:00
|
|
|
# files_get_all_file_attributes(domain)
|
2005-05-25 20:58:21 +00:00
|
|
|
|
2005-04-22 19:31:32 +00:00
|
|
|
define(`files_get_all_file_attributes',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_type:dir { search getattr };
|
|
|
|
allow $1 file_type:file getattr;
|
|
|
|
allow $1 file_type:lnk_file getattr;
|
|
|
|
allow $1 file_type:fifo_file getattr;
|
|
|
|
allow $1 file_type:sock_file getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-22 19:31:32 +00:00
|
|
|
define(`files_get_all_file_attributes_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
class dir { search getattr };
|
|
|
|
class file getattr;
|
|
|
|
class lnk_file getattr;
|
|
|
|
class fifo_file getattr;
|
|
|
|
class sock_file getattr;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-28 18:59:01 +00:00
|
|
|
########################################
|
2005-05-25 20:58:21 +00:00
|
|
|
## <interface name="files_relabel_all_files">
|
|
|
|
## <description>
|
|
|
|
## Relabel all files on the filesystem, except
|
|
|
|
## the listed exceptions.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the domain perfoming this action.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="exception_types" optional="true">
|
|
|
|
## The types to be excluded. Each type or attribute
|
|
|
|
## must be negated by the caller.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="both" weight="10"/>
|
|
|
|
## </interface>
|
2005-04-28 18:59:01 +00:00
|
|
|
#
|
2005-05-25 20:58:21 +00:00
|
|
|
define(`files_relabel_all_files',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 { file_type $2 }:dir { r_dir_perms relabelfrom relabelto };
|
|
|
|
allow $1 { file_type $2 }:file { getattr relabelfrom relabelto };
|
|
|
|
allow $1 { file_type $2 }:lnk_file { getattr relabelfrom relabelto };
|
|
|
|
allow $1 { file_type $2 }:fifo_file { getattr relabelfrom relabelto };
|
|
|
|
allow $1 { file_type $2 }:sock_file { getattr relabelfrom relabelto };
|
|
|
|
allow $1 { file_type $2 }:blk_file { getattr relabelfrom };
|
|
|
|
allow $1 { file_type $2 }:chr_file { getattr relabelfrom };
|
|
|
|
|
|
|
|
# satisfy the assertions:
|
|
|
|
selinux_relabelto_binary_policy($1)
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_relabel_all_files_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
class dir { r_dir_perms relabelfrom relabelto };
|
|
|
|
class file { relabelfrom relabelto };
|
|
|
|
class lnk_file { relabelfrom relabelto };
|
|
|
|
class fifo_file { relabelfrom relabelto };
|
|
|
|
class sock_file { relabelfrom relabelto };
|
|
|
|
class blk_file relabelfrom;
|
|
|
|
class chr_file relabelfrom;
|
2005-04-28 18:59:01 +00:00
|
|
|
')
|
|
|
|
|
2005-05-25 20:58:21 +00:00
|
|
|
########################################
|
|
|
|
## <interface name="files_manage_all_files">
|
|
|
|
## <description>
|
|
|
|
## Manage all files on the filesystem, except
|
|
|
|
## the listed exceptions.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the domain perfoming this action.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="exception_types" optional="true">
|
|
|
|
## The types to be excluded. Each type or attribute
|
|
|
|
## must be negated by the caller.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="both" weight="10"/>
|
|
|
|
## </interface>
|
|
|
|
#
|
|
|
|
define(`files_manage_all_files',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 { file_type $2 }:dir create_dir_perms;
|
|
|
|
allow $1 { file_type $2 }:file create_file_perms;
|
|
|
|
allow $1 { file_type $2 }:lnk_file create_lnk_perms;
|
|
|
|
allow $1 { file_type $2 }:fifo_file create_file_perms;
|
|
|
|
allow $1 { file_type $2 }:sock_file create_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
# satisfy the assertions:
|
|
|
|
selinux_write_binary_policy($1)
|
|
|
|
bootloader_manage_kernel_modules($1)
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_manage_all_files_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir create_dir_perms;
|
|
|
|
class file create_file_perms;
|
|
|
|
class lnk_file create_lnk_perms;
|
|
|
|
class fifo_file create_file_perms;
|
|
|
|
class sock_file create_file_perms;
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-04-26 21:12:32 +00:00
|
|
|
#
|
2005-05-02 18:40:42 +00:00
|
|
|
# files_search_all_directories(domain)
|
2005-04-26 21:12:32 +00:00
|
|
|
#
|
|
|
|
define(`files_search_all_directories',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_type:dir search;
|
2005-04-26 21:12:32 +00:00
|
|
|
')
|
|
|
|
|
2005-04-28 18:59:01 +00:00
|
|
|
define(`files_search_all_directories_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
class dir search;
|
2005-04-26 21:12:32 +00:00
|
|
|
')
|
|
|
|
|
2005-05-11 19:05:15 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_read_all_directories(domain)
|
|
|
|
#
|
|
|
|
define(`files_read_all_directories',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_type:dir r_dir_perms;
|
2005-05-11 19:05:15 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_all_directories_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
class dir r_dir_perms;
|
2005-05-11 19:05:15 +00:00
|
|
|
')
|
|
|
|
|
2005-05-02 18:40:42 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_ignore_search_all_directories(domain)
|
|
|
|
#
|
|
|
|
define(`files_ignore_search_all_directories',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 file_type:dir search;
|
2005-05-02 18:40:42 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_search_all_directories_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-02 18:40:42 +00:00
|
|
|
')
|
|
|
|
|
2005-05-24 15:55:57 +00:00
|
|
|
#######################################
|
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
# files_relabelto_all_file_type_fs(domain)
|
2005-05-24 15:55:57 +00:00
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_relabelto_all_file_type_fs',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_type:filesystem relabelto;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_relabelto_all_file_type_fs_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
filesystem relabelto;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
#######################################
|
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
# files_mount_all_file_type_fs(domain)
|
2005-05-24 15:55:57 +00:00
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_mount_all_file_type_fs',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_type:filesystem mount;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_mount_all_file_type_fs_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
filesystem mount;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
#######################################
|
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
# files_unmount_all_file_type_fs(domain)
|
2005-05-24 15:55:57 +00:00
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_unmount_all_file_type_fs',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_type:filesystem mount;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_unmount_all_file_type_fs_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute file_type;
|
|
|
|
|
|
|
|
filesystem mount;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-04-28 21:41:09 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-18 21:00:00 +00:00
|
|
|
# files_mount_on_all_mountpoints(domain)
|
2005-04-28 21:41:09 +00:00
|
|
|
#
|
|
|
|
define(`files_mount_on_all_mountpoints',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 mountpoint:dir { getattr search mounton };
|
2005-04-28 21:41:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_mount_on_all_mountpoints_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute mountpoint;
|
|
|
|
|
|
|
|
class dir { getattr search mounton };
|
2005-04-28 21:41:09 +00:00
|
|
|
')
|
|
|
|
|
2005-04-28 18:59:01 +00:00
|
|
|
########################################
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_read_root_dir(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_read_root_dir',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 root_t:dir r_dir_perms;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 root_t:lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_root_dir_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
|
|
|
class dir r_dir_perms;
|
2005-06-09 14:50:48 +00:00
|
|
|
class lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_create_root_dir_entry(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_create_root_dir_entry',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 root_t:dir ra_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_create_root_dir_entry_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
|
|
|
class dir ra_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-02 18:40:42 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_ignore_read_rootfs_file(domain)
|
|
|
|
#
|
|
|
|
define(`files_ignore_read_rootfs_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 root_t:file read;
|
2005-05-02 18:40:42 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_read_rootfs_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
|
|
|
class file read;
|
2005-05-02 18:40:42 +00:00
|
|
|
')
|
|
|
|
|
2005-04-19 18:57:13 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_ignore_modify_rootfs_file(domain)
|
2005-04-19 18:57:13 +00:00
|
|
|
#
|
|
|
|
define(`files_ignore_modify_rootfs_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 root_t:file { read write };
|
2005-04-19 18:57:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_modify_rootfs_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
|
|
|
class file { read write };
|
2005-04-19 18:57:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_ignore_modify_rootfs_device(domain)
|
2005-04-19 18:57:13 +00:00
|
|
|
#
|
|
|
|
define(`files_ignore_modify_rootfs_device',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 root_t:chr_file { read write };
|
2005-04-19 18:57:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_modify_rootfs_device_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
|
|
|
class chr_file { read write };
|
2005-04-19 18:57:13 +00:00
|
|
|
')
|
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
########################################
|
2005-05-18 21:00:00 +00:00
|
|
|
## <interface name="files_create_private_root_dir_entry">
|
|
|
|
## <description>
|
|
|
|
## Create an object in the root directory, with a private
|
|
|
|
## type. If no object class is specified, the
|
|
|
|
## default is file.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="private type">
|
|
|
|
## The type of the object to be created.
|
|
|
|
## </parameter>
|
|
|
|
## <parameter name="object" optional="true">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="write" weight="10"/>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_create_private_root_dir_entry',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 root_t:dir rw_dir_perms;
|
|
|
|
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 root_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 root_t:$3 $2;
|
|
|
|
') dnl end ifelse
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_create_private_root_dir_entry_depend',`
|
|
|
|
type root_t;
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
class dir rw_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_remove_root_dir_entry(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_remove_root_dir_entry',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 root_t:dir rw_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_remove_root_dir_entry_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-28 21:41:09 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
# files_unmount_root_fs(domain)
|
2005-04-28 21:41:09 +00:00
|
|
|
#
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_unmount_root_fs',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 root_t:filesystem unmount;
|
2005-04-28 21:41:09 +00:00
|
|
|
')
|
|
|
|
|
2005-06-08 13:12:00 +00:00
|
|
|
define(`files_unmount_root_fs_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t;
|
|
|
|
|
|
|
|
class filesystem unmount;
|
2005-04-28 21:41:09 +00:00
|
|
|
')
|
|
|
|
|
2005-05-11 16:48:10 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_search_general_system_config_directory(domain)
|
|
|
|
#
|
|
|
|
define(`files_search_general_system_config_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 etc_t:dir search;
|
2005-05-11 16:48:10 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_search_general_system_config_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-11 16:48:10 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_read_general_system_config_directory(domain)
|
|
|
|
#
|
|
|
|
define(`files_read_general_system_config_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir r_dir_perms;
|
2005-05-11 16:48:10 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_general_system_config_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-05-11 16:48:10 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-06-09 14:50:48 +00:00
|
|
|
A#
|
2005-05-04 19:15:13 +00:00
|
|
|
# files_read_general_system_config(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_read_general_system_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir r_dir_perms;
|
|
|
|
allow $1 etc_t:file r_file_perms;
|
|
|
|
allow $1 etc_t:lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_general_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
|
|
|
class lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 19:15:13 +00:00
|
|
|
# files_modify_general_system_config(domain)
|
|
|
|
#
|
|
|
|
define(`files_modify_general_system_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir r_dir_perms;
|
|
|
|
allow $1 etc_t:file rw_file_perms;
|
|
|
|
allow $1 etc_t:lnk_file r_file_perms;
|
2005-05-04 19:15:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_modify_general_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file rw_file_perms;
|
|
|
|
class lnk_file r_file_perms;
|
2005-05-04 19:15:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_manage_general_system_config(domain)
|
|
|
|
#
|
|
|
|
define(`files_manage_general_system_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir rw_dir_perms;
|
|
|
|
allow $1 etc_t:file create_file_perms;
|
|
|
|
allow $1 etc_t:lnk_file r_file_perms;
|
2005-05-04 19:15:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_manage_general_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file create_file_perms;
|
|
|
|
class lnk_file r_file_perms;
|
2005-05-04 19:15:13 +00:00
|
|
|
')
|
|
|
|
|
2005-05-23 15:49:31 +00:00
|
|
|
########################################
|
|
|
|
## <interface name="files_remove_general_system_config">
|
|
|
|
## <description>
|
|
|
|
## Delete system configuration files in /etc.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="write" weight="1"/>
|
|
|
|
## </interface>
|
|
|
|
#
|
|
|
|
define(`files_remove_general_system_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir rw_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 etc_t:file unlink;
|
2005-05-23 15:49:31 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_remove_general_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file unlink;
|
2005-05-23 15:49:31 +00:00
|
|
|
')
|
|
|
|
|
2005-05-04 19:15:13 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_execute_system_config_script(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_execute_system_config_script',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir r_dir_perms;
|
|
|
|
allow $1 etc_t:lnk_file r_file_perms;
|
|
|
|
can_exec($1,etc_t)
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_execute_system_config_script_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class lnk_file r_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file { getattr read execute execute_no_trans };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-06-03 12:25:14 +00:00
|
|
|
# files_create_boot_flag(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
# /halt, /.autofsck, etc
|
|
|
|
#
|
|
|
|
define(`files_create_boot_flag',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 root_t:dir rw_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 etc_runtime_t:file { create read write setattr unlink };
|
|
|
|
type_transition $1 root_t:file etc_runtime_t;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_create_boot_flag_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type root_t, etc_runtime_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file { create read write setattr unlink};
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-26 20:38:45 +00:00
|
|
|
# files_manage_runtime_system_config(type)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-26 20:38:45 +00:00
|
|
|
define(`files_manage_runtime_system_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir rw_dir_perms;
|
|
|
|
allow $1 etc_runtime_t:file create_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
type_transition $1 etc_t:file etc_runtime_t;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-26 20:38:45 +00:00
|
|
|
define(`files_manage_runtime_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t, etc_runtime_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file create_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_read_runtime_system_config(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_read_runtime_system_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 etc_t:dir r_dir_perms;
|
|
|
|
allow $1 etc_runtime_t:file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-26 20:38:45 +00:00
|
|
|
define(`files_read_runtime_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type etc_t, etc_runtime_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_create_private_config(domain,privatetype,[class(es)])
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_create_private_config',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 etc_t:dir rw_dir_perms;
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 etc_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 etc_t:$3 $2;
|
|
|
|
')
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_create_private_config_depend',`
|
|
|
|
type etc_t;
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
class dir rw_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-06-01 13:51:54 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_modify_isid_type_dir(domain)
|
|
|
|
#
|
|
|
|
define(`files_modify_isid_type_dir',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 file_t:dir rw_dir_perms;
|
2005-06-01 13:51:54 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_modify_isid_type_dir_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type file_t;
|
|
|
|
|
|
|
|
class dir rw_dir_perms;
|
2005-06-01 13:51:54 +00:00
|
|
|
')
|
|
|
|
|
2005-05-31 21:25:45 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_ignore_get_isid_type_dir_attrib(domain)
|
|
|
|
#
|
|
|
|
define(`files_ignore_get_isid_type_dir_attrib',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 file_t:dir search;
|
2005-05-31 21:25:45 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_get_isid_type_dir_attrib_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type file_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-31 21:25:45 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_ignore_search_isid_type_dir(domain)
|
|
|
|
#
|
|
|
|
define(`files_ignore_search_isid_type_dir',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 file_t:dir search;
|
2005-05-31 21:25:45 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_search_isid_type_dir_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type file_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-31 21:25:45 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
2005-05-19 21:06:06 +00:00
|
|
|
## <interface name="files_list_home_directories">
|
|
|
|
## <description>
|
|
|
|
## Get listing home home directories.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="read" weight="10"/>
|
|
|
|
## </interface>
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_list_home_directories',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 home_root_t:dir r_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_list_home_directories_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type home_root_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-26 20:38:45 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_read_mnt_dir(domain)
|
|
|
|
#
|
|
|
|
define(`files_read_mnt_dir',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 mnt_t:dir r_dir_perms;
|
2005-05-26 20:38:45 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_runtime_system_config_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type mnt_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-05-26 20:38:45 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_create_private_tmp_data(domain,private_type,[object class(es)])
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_create_private_tmp_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 tmp_t:dir rw_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 tmp_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 tmp_t:$3 $2;
|
|
|
|
')
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_create_private_tmp_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type tmp_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_remove_all_tmp_data(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_remove_all_tmp_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 tmpfile:dir { getattr search read write add_name remove_name rmdir };
|
|
|
|
allow $1 tmpfile:file { getattr unlink };
|
|
|
|
allow $1 tmpfile:lnk_file { getattr unlink };
|
|
|
|
allow $1 tmpfile:fifo_file { getattr unlink };
|
|
|
|
allow $1 tmpfile:sock_file { getattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_remove_all_tmp_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute tmpfile;
|
|
|
|
|
|
|
|
class dir { getattr search read write add_name remove_name rmdir };
|
|
|
|
class file { getattr unlink };
|
|
|
|
class lnk_file { getattr unlink };
|
|
|
|
class fifo_file { getattr unlink };
|
|
|
|
class sock_file { getattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-25 20:58:21 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_search_general_application_resources_dir(domain)
|
|
|
|
#
|
|
|
|
define(`files_search_general_application_resources_dir',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 usr_t:dir search;
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_search_general_application_resources_dir_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type usr_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_read_general_application_resources(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_read_general_application_resources',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 usr_t:dir r_dir_perms;
|
|
|
|
allow $1 usr_t:{ file lnk_file } r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_read_general_application_resources_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type usr_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
|
|
|
class lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
########################################
|
|
|
|
## <interface name="files_execute_system_source_code_scripts">
|
|
|
|
## <description>
|
|
|
|
## Execute programs in /usr/src in the caller domain.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="none"/>
|
|
|
|
## </interface>
|
|
|
|
#
|
|
|
|
define(`files_execute_system_source_code_scripts',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 usr_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 src_t:dir r_dir_perms;
|
|
|
|
allow $1 src_t:lnk_file r_file_perms;
|
|
|
|
can_exec($1,src_t)
|
|
|
|
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_system_source_code_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type usr_t, src_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file { getattr read execute execute_no_trans };
|
2005-06-09 14:50:48 +00:00
|
|
|
class lnk_file r_file_perms;
|
2005-05-19 21:06:06 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
# files_read_system_source_code(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_read_system_source_code',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 usr_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 src_t:dir r_dir_perms;
|
|
|
|
allow $1 src_t:{ file lnk_file } r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_read_system_source_code_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type usr_t, src_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
|
|
|
class lnk_file r_file_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
# files_search_system_state_data_directory(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_search_system_state_data_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_search_system_state_data_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-05 17:44:11 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_ignore_search_system_state_data_directory(domain)
|
|
|
|
#
|
|
|
|
define(`files_ignore_search_system_state_data_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 var_t:dir search;
|
2005-05-05 17:44:11 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_search_system_state_data_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
# files_manage_pseudorandom_saved_seed(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_manage_pseudorandom_saved_seed',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_lib_t:dir rw_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 var_lib_t:file { getattr create read write setattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_manage_pseudorandom_saved_seed_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_lib_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file { getattr create read write setattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-24 15:55:57 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_get_system_lock_file_attributes(domain)
|
|
|
|
#
|
|
|
|
define(`files_get_system_lock_file_attributes',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_lock_t:dir r_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 var_lock_t:file getattr;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_get_system_lock_file_attributes_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_lock_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file getattr;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_manage_system_lock_files(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-04-21 13:35:01 +00:00
|
|
|
define(`files_manage_system_lock_files',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_lock_t:dir { getattr search create read write setattr add_name remove_name rmdir };
|
|
|
|
allow $1 var_lock_t:file { getattr create read write setattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-04-21 13:35:01 +00:00
|
|
|
define(`files_manage_system_lock_files_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_lock_t;
|
|
|
|
|
|
|
|
class dir { getattr search create read write setattr add_name remove_name rmdir };
|
|
|
|
class file { getattr create read write setattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_remove_all_lock_files(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
|
|
|
define(`files_remove_all_lock_files',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 lockfile:dir rw_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 lockfile:file { getattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_remove_all_lock_files_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute lockfile;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_dir_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file { getattr unlink };
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-12 20:50:09 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_create_private_lock_file(domain,private_type,[object class(es)])
|
|
|
|
#
|
|
|
|
define(`files_create_private_lock_file',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
|
|
|
allow $1 var_lock_t:dir rw_dir_perms;
|
|
|
|
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 var_lock_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 var_lock_t:$3 $2;
|
|
|
|
')
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_create_private_lock_file_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_lock_t;
|
|
|
|
|
|
|
|
class dir rw_dir_perms;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
# files_search_runtime_data_directory(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_search_runtime_data_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
|
|
|
allow $1 var_run_t:dir search;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_search_runtime_data_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_run_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-12 20:50:09 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_ignore_search_runtime_data_directory(domain)
|
|
|
|
#
|
|
|
|
define(`files_ignore_search_runtime_data_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_run_t:dir search;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_search_runtime_data_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_run_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-12 20:50:09 +00:00
|
|
|
')
|
|
|
|
|
2005-04-14 20:18:17 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
# files_read_runtime_data_directory(domain)
|
2005-04-14 20:18:17 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_read_runtime_data_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_run_t:dir r_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_read_runtime_data_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_run_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-04-14 20:18:17 +00:00
|
|
|
')
|
2005-04-25 16:11:21 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
# files_create_daemon_runtime_data(domain,pidfile,[object class(es)])
|
2005-04-25 16:11:21 +00:00
|
|
|
#
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_create_daemon_runtime_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
|
|
|
allow $1 var_run_t:dir rw_dir_perms;
|
|
|
|
|
|
|
|
ifelse(`$3',`',`
|
|
|
|
type_transition $1 var_run_t:file $2;
|
|
|
|
',`
|
|
|
|
type_transition $1 var_run_t:$3 $2;
|
|
|
|
')
|
2005-04-25 16:11:21 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_create_daemon_runtime_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_run_t;
|
|
|
|
|
|
|
|
class dir rw_dir_perms;
|
2005-05-03 20:23:33 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_modify_system_runtime_data(domain)
|
2005-05-03 20:23:33 +00:00
|
|
|
#
|
|
|
|
define(`files_modify_system_runtime_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_run_t:dir r_dir_perms;
|
|
|
|
allow $1 var_run_t:file rw_file_perms;
|
2005-05-03 20:23:33 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_modify_system_runtime_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_run_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file rw_file_perms;
|
2005-05-03 20:23:33 +00:00
|
|
|
')
|
|
|
|
|
2005-05-24 15:55:57 +00:00
|
|
|
########################################
|
|
|
|
## <interface name="files_ignore_write_all_daemon_runtime_data">
|
|
|
|
## <description>
|
|
|
|
## Do not audit attempts to write to daemon runtime data files.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="none"/>
|
|
|
|
## </interface>
|
|
|
|
#
|
|
|
|
|
|
|
|
define(`files_ignore_write_all_daemon_runtime_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 pidfile:file write;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_write_all_daemon_runtime_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute pidfile;
|
|
|
|
|
|
|
|
class file write;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <interface name="files_ignore_ioctl_all_daemon_runtime_data">
|
|
|
|
## <description>
|
|
|
|
## Do not audit attempts to ioctl daemon runtime data files.
|
|
|
|
## </description>
|
|
|
|
## <parameter name="domain">
|
|
|
|
## The type of the process performing this action.
|
|
|
|
## </parameter>
|
|
|
|
## <infoflow type="none"/>
|
|
|
|
## </interface>
|
|
|
|
#
|
|
|
|
|
|
|
|
define(`files_ignore_ioctl_all_daemon_runtime_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
dontaudit $1 pidfile:file ioctl;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_ignore_ioctl_all_daemon_runtime_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute pidfile;
|
|
|
|
|
|
|
|
class file ioctl;
|
2005-05-24 15:55:57 +00:00
|
|
|
')
|
|
|
|
|
2005-05-31 23:02:11 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_read_all_daemon_runtime_data(domain)
|
|
|
|
#
|
|
|
|
define(`files_read_all_daemon_runtime_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
|
|
|
allow $1 pidfile:dir r_dir_perms;
|
|
|
|
allow $1 pidfile:file r_file_perms;
|
2005-05-31 23:02:11 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_all_daemon_runtime_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute pidfile;
|
|
|
|
|
|
|
|
type var_t;
|
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
2005-05-31 23:02:11 +00:00
|
|
|
')
|
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
########################################
|
|
|
|
#
|
2005-05-04 13:19:47 +00:00
|
|
|
# files_remove_all_daemon_runtime_data(domain)
|
2005-05-03 20:23:33 +00:00
|
|
|
#
|
|
|
|
define(`files_remove_all_daemon_runtime_data',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
|
|
|
allow $1 var_run_t:{ sock_file lnk_file } { getattr unlink };
|
|
|
|
allow $1 var_run_t:dir rmdir;
|
|
|
|
allow $1 pidfile:dir rw_dir_perms;
|
|
|
|
allow $1 pidfile:file { getattr unlink };
|
|
|
|
allow $1 pidfile:sock_file { getattr unlink };
|
2005-05-03 20:23:33 +00:00
|
|
|
')
|
2005-04-25 16:11:21 +00:00
|
|
|
|
2005-05-03 20:23:33 +00:00
|
|
|
define(`files_remove_all_daemon_runtime_data_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
attribute pidfile;
|
|
|
|
|
|
|
|
type var_t, var_run_t;
|
|
|
|
|
|
|
|
class dir rw_dir_perms;
|
|
|
|
class file { getattr unlink };
|
|
|
|
class lnk_file { getattr unlink };
|
|
|
|
class sock_file { getattr unlink };
|
2005-04-25 16:11:21 +00:00
|
|
|
')
|
2005-05-13 14:37:13 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_search_system_spool_directory(domain)
|
|
|
|
#
|
|
|
|
define(`files_search_system_spool_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
|
|
|
allow $1 var_spool_t:dir search;
|
2005-05-13 14:37:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_search_system_spool_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_spool_t;
|
|
|
|
|
|
|
|
class dir search;
|
2005-05-13 14:37:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_read_system_spool_directory(domain)
|
|
|
|
#
|
|
|
|
define(`files_read_system_spool_directory',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_spool_t:dir r_dir_perms;
|
2005-05-13 14:37:13 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_system_spool_directory_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_spool_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
2005-05-13 14:37:13 +00:00
|
|
|
')
|
2005-05-18 21:00:00 +00:00
|
|
|
|
2005-05-25 20:58:21 +00:00
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_read_system_spools(domain)
|
|
|
|
#
|
|
|
|
define(`files_read_system_spools',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_spool_t:dir r_dir_perms;
|
|
|
|
allow $1 var_spool_t:file r_file_perms;
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_read_system_spools_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_spool_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir r_dir_perms;
|
|
|
|
class file r_file_perms;
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# files_manage_system_spools(domain)
|
|
|
|
#
|
|
|
|
define(`files_manage_system_spools',`
|
2005-06-03 12:25:14 +00:00
|
|
|
requires_block_template(`$0'_depend)
|
|
|
|
|
|
|
|
allow $1 var_t:dir search;
|
2005-06-09 14:50:48 +00:00
|
|
|
allow $1 var_spool_t:dir rw_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
allow $1 var_spool_t:file { getattr create read write append unlink setattr };
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
define(`files_manage_system_spools_depend',`
|
2005-06-03 12:25:14 +00:00
|
|
|
type var_t, var_spool_t;
|
|
|
|
|
2005-06-09 14:50:48 +00:00
|
|
|
class dir rw_file_perms;
|
2005-06-03 12:25:14 +00:00
|
|
|
class file { getattr create read write append unlink setattr };
|
2005-05-25 20:58:21 +00:00
|
|
|
')
|
|
|
|
|
2005-05-18 21:00:00 +00:00
|
|
|
## </module>
|