137 lines
2.9 KiB
Plaintext
137 lines
2.9 KiB
Plaintext
## <summary>Policy for the kernel modules, kernel image, and bootloader.</summary>
|
|
|
|
########################################
|
|
## <summary>
|
|
## Execute bootloader in the bootloader domain.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## The type of the process performing this action.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`bootloader_domtrans',`
|
|
gen_require(`
|
|
type bootloader_t, bootloader_exec_t;
|
|
')
|
|
|
|
domain_auto_trans($1, bootloader_exec_t, bootloader_t)
|
|
|
|
allow $1 bootloader_t:fd use;
|
|
allow bootloader_t $1:fd use;
|
|
allow bootloader_t $1:fifo_file rw_file_perms;
|
|
allow bootloader_t $1:process sigchld;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Execute bootloader interactively and do
|
|
## a domain transition to the bootloader domain.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## The type of the process performing this action.
|
|
## </summary>
|
|
## </param>
|
|
## <param name="role">
|
|
## <summary>
|
|
## The role to be allowed the bootloader domain.
|
|
## </summary>
|
|
## </param>
|
|
## <param name="terminal">
|
|
## <summary>
|
|
## The type of the terminal allow the bootloader domain to use.
|
|
## </summary>
|
|
## </param>
|
|
## <rolecap/>
|
|
#
|
|
interface(`bootloader_run',`
|
|
gen_require(`
|
|
type bootloader_t;
|
|
')
|
|
|
|
bootloader_domtrans($1)
|
|
|
|
role $2 types bootloader_t;
|
|
allow bootloader_t $3:chr_file rw_file_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read the bootloader configuration file.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## The type of the process performing this action.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`bootloader_read_config',`
|
|
gen_require(`
|
|
type bootloader_etc_t;
|
|
')
|
|
|
|
allow $1 bootloader_etc_t:file r_file_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read and write the bootloader
|
|
## configuration file.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## The type of the process performing this action.
|
|
## </summary>
|
|
## </param>
|
|
## <rolecap/>
|
|
#
|
|
interface(`bootloader_rw_config',`
|
|
gen_require(`
|
|
type bootloader_etc_t;
|
|
')
|
|
|
|
allow $1 bootloader_etc_t:file rw_file_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read and write the bootloader
|
|
## temporary data in /tmp.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## The type of the process performing this action.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`bootloader_rw_tmp_files',`
|
|
gen_require(`
|
|
type bootloader_tmp_t;
|
|
')
|
|
|
|
# FIXME: read tmp_t dir
|
|
allow $1 bootloader_tmp_t:file rw_file_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read and write the bootloader
|
|
## temporary data in /tmp.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## The type of the process performing this action.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`bootloader_create_runtime_file',`
|
|
gen_require(`
|
|
type boot_t, boot_runtime_t;
|
|
')
|
|
|
|
allow $1 boot_t:dir rw_dir_perms;
|
|
allow $1 boot_runtime_t:file { rw_file_perms create unlink };
|
|
type_transition $1 boot_t:file boot_runtime_t;
|
|
')
|