selinux-policy/policy/modules/apps/loadkeys.if

68 lines
1.3 KiB
Plaintext
Raw Normal View History

2005-08-15 14:46:17 +00:00
## <summary>Load keyboard mappings.</summary>
########################################
## <summary>
## Execute the loadkeys program in the loadkeys domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-08-15 14:46:17 +00:00
## </param>
#
interface(`loadkeys_domtrans',`
gen_require(`
type loadkeys_t, loadkeys_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, loadkeys_exec_t, loadkeys_t)
ifdef(`hide_broken_symptoms',`
dontaudit loadkeys_t $1:socket_class_set { read write };
')
2005-08-15 14:46:17 +00:00
')
########################################
## <summary>
## Execute the loadkeys program in the loadkeys domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-08-15 14:46:17 +00:00
## </param>
## <param name="role">
## <summary>
2005-08-15 14:46:17 +00:00
## The role to allow the loadkeys domain.
## </summary>
2005-08-15 14:46:17 +00:00
## </param>
2006-09-06 22:07:25 +00:00
## <rolecap/>
2005-08-15 14:46:17 +00:00
#
interface(`loadkeys_run',`
gen_require(`
type loadkeys_t;
')
loadkeys_domtrans($1)
role $2 types loadkeys_t;
2005-08-15 14:46:17 +00:00
')
########################################
## <summary>
## Execute the loadkeys program in the caller domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
2005-08-15 14:46:17 +00:00
## </param>
#
interface(`loadkeys_exec',`
gen_require(`
type loadkeys_exec_t;
')
can_exec($1, loadkeys_exec_t)
2005-08-15 14:46:17 +00:00
')