selinux-policy/policy/modules/apps/loadkeys.if
2006-12-12 20:08:08 +00:00

85 lines
1.8 KiB
Plaintext

## <summary>Load keyboard mappings.</summary>
########################################
## <summary>
## Execute the loadkeys program in the loadkeys domain.
## </summary>
## <param name="domain">
## <summary>
## The type of the process performing this action.
## </summary>
## </param>
#
interface(`loadkeys_domtrans',`
ifdef(`strict_policy',`
gen_require(`
type loadkeys_t, loadkeys_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, loadkeys_exec_t, loadkeys_t)
',`
refpolicywarn(`$0($*) has no effect in targeted policy.')
')
')
########################################
## <summary>
## Execute the loadkeys program in the loadkeys domain.
## </summary>
## <param name="domain">
## <summary>
## The type of the process performing this action.
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to allow the loadkeys domain.
## </summary>
## </param>
## <param name="terminal">
## <summary>
## The type of the terminal allow the loadkeys domain to use.
## </summary>
## </param>
## <rolecap/>
#
interface(`loadkeys_run',`
ifdef(`targeted_policy',`
# $0(): disabled in targeted policy as there
# is no loadkeys domain.
',`
gen_require(`
type loadkeys_t;
')
loadkeys_domtrans($1)
role $2 types loadkeys_t;
allow loadkeys_t $3:chr_file rw_term_perms;
')
')
########################################
## <summary>
## Execute the loadkeys program in the caller domain.
## </summary>
## <param name="domain">
## <summary>
## The type of the process performing this action.
## </summary>
## </param>
#
interface(`loadkeys_exec',`
ifdef(`targeted_policy',`
# $0(): the loadkeys program is an alias
# of generic bin programs.
corecmd_exec_bin($1)
',`
gen_require(`
type loadkeys_exec_t;
')
can_exec($1,loadkeys_exec_t)
')
')