selinux-policy/refpolicy/policy/modules/kernel/bootloader.if

418 lines
9.0 KiB
Plaintext
Raw Normal View History

2005-05-23 15:47:13 +00:00
## <summary>Policy for the kernel modules, kernel image, and bootloader.</summary>
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Execute bootloader in the bootloader domain.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-05-23 15:47:13 +00:00
#
interface(`bootloader_domtrans',`
gen_require(`
2005-10-18 18:25:33 +00:00
type bootloader_t, bootloader_exec_t;
')
2005-06-08 20:28:45 +00:00
domain_auto_trans($1, bootloader_exec_t, bootloader_t)
allow $1 bootloader_t:fd use;
allow bootloader_t $1:fd use;
allow bootloader_t $1:fifo_file rw_file_perms;
allow bootloader_t $1:process sigchld;
2005-05-23 15:47:13 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Execute bootloader interactively and do
## a domain transition to the bootloader domain.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
## <param name="role">
## The role to be allowed the bootloader domain.
## </param>
## <param name="terminal">
## The type of the terminal allow the bootloader domain to use.
## </param>
2005-05-23 15:47:13 +00:00
#
interface(`bootloader_run',`
gen_require(`
type bootloader_t;
')
2005-06-10 01:01:13 +00:00
bootloader_domtrans($1)
role $2 types bootloader_t;
2005-06-08 20:28:45 +00:00
allow bootloader_t $3:chr_file rw_file_perms;
2005-05-23 15:47:13 +00:00
')
2005-12-09 20:08:10 +00:00
########################################
## <summary>
## Get attributes of the /boot directory.
## </summary>
## <param name="domain">
## Domain to not audit.
## </param>
#
interface(`bootloader_getattr_boot_dir',`
gen_require(`
type boot_t;
')
allow $1 boot_t:dir getattr;
')
2005-09-02 19:11:07 +00:00
########################################
## <summary>
## Do not audit attempts to get attributes
## of the /boot directory.
## </summary>
## <param name="domain">
## Domain to not audit.
## </param>
#
interface(`bootloader_dontaudit_getattr_boot_dir',`
gen_require(`
type boot_t;
')
dontaudit $1 boot_t:dir getattr;
')
2005-05-12 20:50:09 +00:00
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Search the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-05-12 20:50:09 +00:00
#
interface(`bootloader_search_boot',`
gen_require(`
type boot_t;
')
allow $1 boot_t:dir search;
2005-05-12 20:50:09 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Do not audit attempts to search the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-05-12 20:50:09 +00:00
#
interface(`bootloader_dontaudit_search_boot',`
gen_require(`
type boot_t;
')
dontaudit $1 boot_t:dir search;
2005-05-12 20:50:09 +00:00
')
2005-05-24 15:55:57 +00:00
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Read and write symbolic links
## in the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-05-24 15:55:57 +00:00
#
interface(`bootloader_rw_boot_symlinks',`
gen_require(`
type boot_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir r_dir_perms;
allow $1 boot_t:lnk_file rw_file_perms;
2005-05-24 15:55:57 +00:00
')
2005-04-14 20:18:17 +00:00
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Install a kernel into the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_create_kernel',`
gen_require(`
type boot_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir ra_dir_perms;
allow $1 boot_t:file { getattr read write create };
allow $1 boot_t:lnk_file { getattr read create unlink };
2005-04-14 20:18:17 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Install a system.map into the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_create_kernel_symbol_table',`
gen_require(`
type boot_t, system_map_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir ra_dir_perms;
allow $1 system_map_t:file { rw_file_perms create };
2005-04-14 20:18:17 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Read system.map in the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_read_kernel_symbol_table',`
gen_require(`
type boot_t, system_map_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir r_dir_perms;
2005-06-10 01:01:13 +00:00
allow $1 system_map_t:file r_file_perms;
2005-11-08 22:00:30 +00:00
# cjp: this should be dropped:
allow $1 boot_t:file { getattr read };
2005-04-14 20:18:17 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Delete a kernel from /boot.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_delete_kernel',`
gen_require(`
type boot_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir { r_dir_perms write remove_name };
allow $1 boot_t:file { getattr unlink };
2005-04-14 20:18:17 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Delete a system.map in the /boot directory.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_delete_kernel_symbol_table',`
gen_require(`
type boot_t, system_map_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir { r_dir_perms write remove_name };
allow $1 system_map_t:file { getattr unlink };
2005-04-14 20:18:17 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Read the bootloader configuration file.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_read_config',`
gen_require(`
type bootloader_etc_t;
')
2005-06-08 20:28:45 +00:00
allow $1 bootloader_etc_t:file r_file_perms;
2005-04-14 20:18:17 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Read and write the bootloader
## configuration file.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_rw_config',`
gen_require(`
type bootloader_etc_t;
')
2005-06-08 20:28:45 +00:00
allow $1 bootloader_etc_t:file rw_file_perms;
2005-04-14 20:18:17 +00:00
')
2005-05-13 14:37:13 +00:00
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Read and write the bootloader
## temporary data in /tmp.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-05-13 14:37:13 +00:00
#
interface(`bootloader_rw_tmp_file',`
gen_require(`
type bootloader_tmp_t;
')
# FIXME: read tmp_t dir
2005-06-08 20:28:45 +00:00
allow $1 bootloader_tmp_t:file rw_file_perms;
2005-05-13 14:37:13 +00:00
')
2005-04-14 20:18:17 +00:00
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Read and write the bootloader
## temporary data in /tmp.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-04-14 20:18:17 +00:00
#
interface(`bootloader_create_runtime_file',`
gen_require(`
type boot_t, boot_runtime_t;
')
2005-06-08 20:28:45 +00:00
allow $1 boot_t:dir rw_dir_perms;
allow $1 boot_runtime_t:file { rw_file_perms create unlink };
type_transition $1 boot_t:file boot_runtime_t;
2005-04-14 20:18:17 +00:00
')
2005-09-22 21:59:50 +00:00
########################################
## <summary>
## Search the contents of the kernel module directories.
## </summary>
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`bootloader_search_kernel_modules',`
gen_require(`
type modules_object_t;
')
allow $1 modules_object_t:dir search;
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## List the contents of the kernel module directories.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`bootloader_list_kernel_modules',`
gen_require(`
type modules_object_t;
')
2005-06-08 20:28:45 +00:00
allow $1 modules_object_t:dir r_dir_perms;
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
## Get the attributes of kernel module files.
## </summary>
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`bootloader_getattr_kernel_modules',`
gen_require(`
type modules_object_t;
')
allow $1 modules_object_t:dir search;
allow $1 modules_object_t:dir getattr;
')
########################################
## <summary>
2005-06-23 21:30:57 +00:00
## Read kernel module files.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`bootloader_read_kernel_modules',`
gen_require(`
type modules_object_t;
')
2005-06-08 20:28:45 +00:00
allow $1 modules_object_t:dir r_dir_perms;
allow $1 modules_object_t:lnk_file r_file_perms;
allow $1 modules_object_t:file r_file_perms;
')
2005-05-26 20:38:45 +00:00
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Write kernel module files.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
2005-05-26 20:38:45 +00:00
#
interface(`bootloader_write_kernel_modules',`
gen_require(`
attribute rw_kern_modules;
type modules_object_t;
')
2005-06-08 20:28:45 +00:00
allow $1 modules_object_t:dir r_dir_perms;
2005-06-09 19:22:27 +00:00
allow $1 modules_object_t:file { write append };
2005-06-13 17:35:46 +00:00
typeattribute $1 rw_kern_modules;
2005-05-26 20:38:45 +00:00
')
########################################
2005-07-14 18:15:47 +00:00
## <summary>
2005-06-23 21:30:57 +00:00
## Create, read, write, and delete
## kernel module files.
2005-07-14 18:15:47 +00:00
## </summary>
2005-06-23 21:30:57 +00:00
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`bootloader_manage_kernel_modules',`
gen_require(`
# attribute rw_kern_modules;
type modules_object_t;
')
2005-06-08 20:28:45 +00:00
allow $1 modules_object_t:file { rw_file_perms create setattr unlink };
allow $1 modules_object_t:dir rw_dir_perms;
# typeattribute $1 rw_kern_modules;
')
########################################
#
# bootloader_create_modules(domain,privatetype,[class(es)])
#
interface(`bootloader_create_modules',`
gen_require(`
type modules_object_t;
')
allow $1 modules_object_t:dir rw_dir_perms;
# if a class is specified use it, else use file as default
ifelse(`$3',`',`
type_transition $1 modules_object_t:file $2;
',`
type_transition $1 modules_object_t:$3 $2;
')
')