selinux-policy/refpolicy/policy/modules/system/pcmcia.if
Chris PeBenito 2ec4c9d38f more cleanup
2005-07-19 18:40:31 +00:00

138 lines
3.1 KiB
Plaintext

## <summary>PCMCIA card management services</summary>
########################################
## <summary>
## Execute cardmgr in the cardmgr domain.
## </summary>
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`pcmcia_domtrans_cardmgr',`
gen_require(`
type cardmgr_t, cardmgr_exec_t;
class process sigchld;
class fd use;
class fifo_file rw_file_perms;
')
domain_auto_trans($1,cardmgr_exec_t,cardmgr_t)
allow $1 cardmgr_t:fd use;
allow cardmgr_t $1:fd use;
allow cardmgr_t $1:fifo_file rw_file_perms;
allow cardmgr_t $1:process sigchld;
')
########################################
## <summary>
## Execute cardctl in the cardmgr domain.
## </summary>
## <param name="domain">
## The type of the process performing this action.
## </param>
#
interface(`pcmcia_domtrans_cardctl',`
gen_require(`
type cardmgr_t, cardctl_exec_t;
class process sigchld;
class fd use;
class fifo_file rw_file_perms;
')
domain_auto_trans($1,cardctl_exec_t,cardmgr_t)
allow $1 cardmgr_t:fd use;
allow cardmgr_t $1:fd use;
allow cardmgr_t $1:fifo_file rw_file_perms;
allow cardmgr_t $1:process sigchld;
')
########################################
## <summary>
## Execute cardmgr in the cardctl domain, and
## allow the specified role the cardmgr domain.
## </summary>
## <param name="domain">
## The type of the process performing this action.
## </param>
## <param name="role">
## The role to be allowed the cardmgr domain.
## </param>
## <param name="terminal">
## The type of the terminal allow the cardmgr domain to use.
## </param>
#
interface(`pcmcia_run_cardctl',`
gen_require(`
type cardmgr_t;
class chr_file rw_term_perms;
')
pcmcia_domtrans_cardctl($1)
role $2 types cardmgr_t;
allow cardmgr_t $3:chr_file rw_term_perms;
')
########################################
## <summary>
## Read cardmgr pid files.
## </summary>
## <param name="domain">
## Domain allowed access.
## </param>
#
interface(`pcmcia_read_pid',`
gen_require(`
type cardmgr_var_run_t;
class dir r_dir_perms;
class file r_file_perms;
')
files_search_pids($1)
allow $1 cardmgr_var_run_t:dir r_dir_perms;
allow $1 cardmgr_var_run_t:file r_file_perms;
')
########################################
## <summary>
## Create, read, write, and delete
## cardmgr pid files.
## </summary>
## <param name="domain">
## Domain allowed access.
## </param>
#
interface(`pcmcia_manage_pid',`
gen_require(`
type cardmgr_var_run_t;
class dir rw_dir_perms;
class file create_file_perms;
')
files_search_pids($1)
allow $1 cardmgr_var_run_t:dir rw_dir_perms;
allow $1 cardmgr_var_run_t:file create_file_perms;
')
########################################
## <summary>
## Create, read, write, and delete
## cardmgr runtime character nodes.
## </summary>
## <param name="domain">
## Domain allowed access.
## </param>
#
interface(`pcmcia_manage_runtime_chr',`
gen_require(`
type cardmgr_var_run_t;
class dir rw_dir_perms;
class chr_file create_file_perms;
')
files_search_pids($1)
allow $1 cardmgr_var_run_t:dir rw_dir_perms;
allow $1 cardmgr_var_run_t:chr_file create_file_perms;
')