selinux-policy/policy/modules/kernel/selinux.if

406 lines
9.0 KiB
Plaintext
Raw Normal View History

2005-06-14 20:40:09 +00:00
## <summary>
2005-08-12 19:28:30 +00:00
## Policy for kernel security interface, in particular, selinuxfs.
2005-06-14 20:40:09 +00:00
## </summary>
2005-07-05 17:47:15 +00:00
## <required val="true">
## Contains the policy for the kernel SELinux security interface.
## </required>
2005-06-14 20:40:09 +00:00
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Gets the caller the mountpoint of the selinuxfs filesystem.
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type requesting the selinuxfs mountpoint.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_get_fs_mount',`
2005-06-14 20:40:09 +00:00
# read /proc/filesystems to see if selinuxfs is supported
# then read /proc/self/mount to see where selinuxfs is mounted
kernel_read_system_state($1)
')
2005-09-02 19:11:07 +00:00
########################################
## <summary>
## Do not audit attempts to get the
## attributes of the selinuxfs directory.
## </summary>
## <param name="domain">
## <summary>
2005-09-02 19:11:07 +00:00
## Domain to not audit.
## </summary>
2005-09-02 19:11:07 +00:00
## </param>
#
interface(`selinux_dontaudit_getattr_dir',`
gen_require(`
type security_t;
')
dontaudit $1 security_t:dir getattr;
')
########################################
## <summary>
## Search selinuxfs.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`selinux_search_fs',`
gen_require(`
type security_t;
')
allow $1 security_t:dir search;
')
2005-06-14 20:40:09 +00:00
########################################
## <summary>
## Do not audit attempts to search selinuxfs.
## </summary>
## <param name="domain">
## <summary>
## Domain to not audit.
## </summary>
## </param>
#
interface(`selinux_dontaudit_search_fs',`
gen_require(`
type security_t;
')
dontaudit $1 security_t:dir search;
')
2005-10-24 19:50:21 +00:00
########################################
## <summary>
## Do not audit attempts to read
## generic selinuxfs entries
## </summary>
## <param name="domain">
## <summary>
2005-10-24 19:50:21 +00:00
## Domain to not audit.
## </summary>
2005-10-24 19:50:21 +00:00
## </param>
#
interface(`selinux_dontaudit_read_fs',`
gen_require(`
type security_t;
')
dontaudit $1 security_t:dir search;
dontaudit $1 security_t:file { getattr read };
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allows the caller to get the mode of policy enforcement
## (enforcing or permissive mode).
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type to allow to get the enforcing mode.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_get_enforce_mode',`
gen_require(`
type security_t;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read };
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allow caller to set the mode of policy enforcement
## (enforcing or permissive mode).
## </summary>
2005-08-12 19:28:30 +00:00
## <desc>
## <p>
## Allow caller to set the mode of policy enforcement
## (enforcing or permissive mode).
## </p>
## <p>
## Since this is a security event, this action is
## always audited.
## </p>
## </desc>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type to allow to set the enforcement mode.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_set_enforce_mode',`
gen_require(`
type security_t;
attribute can_setenforce;
bool secure_mode_policyload;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
typeattribute $1 can_setenforce;
if(!secure_mode_policyload) {
allow $1 security_t:security setenforce;
auditallow $1 security_t:security setenforce;
}
2005-06-14 20:40:09 +00:00
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allow caller to load the policy into the kernel.
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type that will load the policy.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_load_policy',`
gen_require(`
type security_t;
attribute can_load_policy;
bool secure_mode_policyload;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
typeattribute $1 can_load_policy;
if(!secure_mode_policyload) {
allow $1 security_t:security load_policy;
auditallow $1 security_t:security load_policy;
}
2005-06-14 20:40:09 +00:00
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allow caller to set the state of Booleans to
## enable or disable conditional portions of the policy.
## </summary>
2005-08-12 19:28:30 +00:00
## <desc>
## <p>
## Allow caller to set the state of Booleans to
## enable or disable conditional portions of the policy.
## </p>
## <p>
## Since this is a security event, this action is
## always audited.
## </p>
## </desc>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type allowed to set the Boolean.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_set_boolean',`
gen_require(`
type security_t;
2005-12-06 16:33:40 +00:00
bool secure_mode_policyload;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir search;
allow $1 security_t:dir { getattr search read };
allow $1 security_t:file { getattr read write };
if(!secure_mode_policyload) {
allow $1 security_t:security setbool;
ifdef(`distro_rhel4',`
# needed for systems without audit support
auditallow $1 security_t:security setbool;
')
}
2005-06-14 20:40:09 +00:00
')
########################################
## <summary>
2005-08-12 19:28:30 +00:00
## Allow caller to set SELinux access vector cache parameters.
## </summary>
2005-08-12 19:28:30 +00:00
## <desc>
## <p>
## Allow caller to set SELinux access vector cache parameters.
## The allows the domain to set performance related parameters
## of the AVC, such as cache threshold.
## </p>
## <p>
## Since this is a security event, this action is
## always audited.
## </p>
## </desc>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type to allow to set security parameters.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_set_parameters',`
gen_require(`
type security_t;
attribute can_setsecparam;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security setsecparam;
auditallow $1 security_t:security setsecparam;
typeattribute $1 can_setsecparam;
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allows caller to validate security contexts.
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type permitted to validate contexts.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_validate_context',`
gen_require(`
type security_t;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security check_context;
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allows caller to compute an access vector.
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type allowed to compute an access vector.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_compute_access_vector',`
gen_require(`
type security_t;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security compute_av;
')
########################################
## <summary>
2005-08-12 19:28:30 +00:00
## Calculate the default type for object creation.
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-08-12 19:28:30 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_compute_create_context',`
gen_require(`
type security_t;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security compute_create;
')
2005-09-15 21:03:29 +00:00
########################################
## <summary>
## Allows caller to compute polyinstatntiated
## directory members.
## </summary>
## <param name="domain">
## <summary>
2005-09-15 21:03:29 +00:00
## Domain allowed access.
## </summary>
2005-09-15 21:03:29 +00:00
## </param>
#
interface(`selinux_compute_member',`
gen_require(`
type security_t;
')
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security compute_member;
')
2005-06-14 20:40:09 +00:00
########################################
## <summary>
2005-08-12 19:28:30 +00:00
## Calculate the context for relabeling objects.
## </summary>
2005-08-12 19:28:30 +00:00
## <desc>
## <p>
## Calculate the context for relabeling objects.
## This is determined by using the type_change
## rules in the policy, and is generally used
## for determining the context for relabeling
## a terminal when a user logs in.
## </p>
## </desc>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-08-12 19:28:30 +00:00
## Domain allowed access.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_compute_relabel_context',`
gen_require(`
type security_t;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security compute_relabel;
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Allows caller to compute possible contexts for a user.
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## <summary>
2005-06-23 21:30:57 +00:00
## The process type allowed to compute user contexts.
## </summary>
2005-06-23 21:30:57 +00:00
## </param>
2005-06-14 20:40:09 +00:00
#
interface(`selinux_compute_user_contexts',`
gen_require(`
type security_t;
')
2005-06-14 20:40:09 +00:00
allow $1 security_t:dir { read search getattr };
allow $1 security_t:file { getattr read write };
allow $1 security_t:security compute_user;
')
2005-07-05 20:59:51 +00:00
########################################
## <summary>
2005-08-12 19:28:30 +00:00
## Unconfined access to the SELinux kernel security server.
## </summary>
2005-07-05 20:59:51 +00:00
## <param name="domain">
## <summary>
2005-07-05 20:59:51 +00:00
## Domain allowed access.
## </summary>
2005-07-05 20:59:51 +00:00
## </param>
#
interface(`selinux_unconfined',`
gen_require(`
attribute selinux_unconfined_type;
2005-07-05 20:59:51 +00:00
')
typeattribute $1 selinux_unconfined_type;
2005-07-05 20:59:51 +00:00
')