2005-08-15 14:46:17 +00:00
|
|
|
|
2005-12-09 16:38:39 +00:00
|
|
|
policy_module(loadkeys,1.0.0)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# Declarations
|
|
|
|
#
|
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
ifdef(`targeted_policy',`
|
|
|
|
# for compatibility with strict:
|
|
|
|
corecmd_bin_alias(loadkeys_exec_t)
|
|
|
|
',`
|
|
|
|
# cjp: this should probably be rewritten
|
|
|
|
# per user domain, since it can rw
|
|
|
|
# all user domain ttys
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
type loadkeys_t;
|
|
|
|
domain_type(loadkeys_t)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
type loadkeys_exec_t;
|
|
|
|
domain_entry_file(loadkeys_t,loadkeys_exec_t)
|
|
|
|
')
|
2005-08-15 14:46:17 +00:00
|
|
|
|
|
|
|
########################################
|
|
|
|
#
|
|
|
|
# Local policy
|
|
|
|
#
|
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
ifdef(`targeted_policy',`
|
|
|
|
# loadkeys domain disabled in targeted policy
|
|
|
|
',`
|
|
|
|
allow loadkeys_t self:capability { setuid sys_tty_config };
|
|
|
|
allow loadkeys_t self:fifo_file rw_file_perms;
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
kernel_read_system_state(loadkeys_t)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
corecmd_exec_bin(loadkeys_t)
|
|
|
|
corecmd_exec_shell(loadkeys_t)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
files_dontaudit_read_etc_runtime_files(loadkeys_t)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
libs_use_ld_so(loadkeys_t)
|
|
|
|
libs_use_shared_libs(loadkeys_t)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2006-03-02 23:41:11 +00:00
|
|
|
locallogin_use_fds(loadkeys_t)
|
2005-08-15 14:46:17 +00:00
|
|
|
|
2005-11-14 20:26:41 +00:00
|
|
|
miscfiles_read_localization(loadkeys_t)
|
|
|
|
')
|