selinux-policy/policy/constraints

93 lines
1.8 KiB
Plaintext
Raw Normal View History

#
# Define the constraints
#
# constrain class_set perm_set expression ;
#
# expression : ( expression )
# | not expression
# | expression and expression
# | expression or expression
# | u1 op u2
# | r1 role_op r2
# | t1 op t2
# | u1 op names
# | u2 op names
# | r1 op names
# | r2 op names
# | t1 op names
# | t2 op names
#
# op : == | !=
# role_op : == | != | eq | dom | domby | incomp
#
# names : name | { name_list }
# name_list : name | name_list name
#
#
# SELinux process identity change constraint:
#
constrain process transition
( u1 == u2
2005-07-06 20:28:29 +00:00
ifdef(`targeted_policy',`
or t1 == can_change_process_identity
2005-07-06 20:28:29 +00:00
',`
or ( t1 == can_change_process_identity and t2 == process_user_target )
2005-07-06 20:28:29 +00:00
or ( t1 == cron_source_domain
and ( t2 == cron_job_domain or u2 == system_u )
)
or (t1 == process_uncond_exempt)
2005-07-06 20:28:29 +00:00
or (t1 == can_system_change and u2 == system_u )
2005-06-28 20:54:49 +00:00
')
2005-07-06 20:28:29 +00:00
);
#
# SELinux process role change constraint:
#
constrain process transition
( r1 == r2
2005-07-06 20:28:29 +00:00
ifdef(`targeted_policy',`
or t1 == can_change_process_role
2005-07-06 20:28:29 +00:00
',`
or ( t1 == can_change_process_role and t2 == process_user_target )
2005-07-06 20:28:29 +00:00
or ( t1 == cron_source_domain and t2 == cron_job_domain )
2005-07-06 20:28:29 +00:00
or ( t1 == process_uncond_exempt )
2005-07-06 20:28:29 +00:00
2006-03-14 18:53:22 +00:00
# FIXME:
2005-07-06 20:28:29 +00:00
ifdef(`postfix.te',`
ifdef(`direct_sysadm_daemon',`
or (
t1 == sysadm_mail_t
and t2 == system_mail_t
and r2 == system_r
)
')
')
or (t1 == can_system_change and r2 == system_r )
')
2005-07-06 20:28:29 +00:00
);
#
# SELinux dynamic transition constraint:
#
constrain process dyntransition
( u1 == u2 and r1 == r2 );
#
# SElinux object identity change constraint:
#
constrain dir_file_class_set { create relabelto relabelfrom }
( u1 == u2 or t1 == can_change_object_identity );
constrain socket_class_set { create relabelto relabelfrom }
( u1 == u2 or t1 == can_change_object_identity );