da07333345
Allow hugetlbfs_t to be on device_t file system Fix for ajaxterm policy Fix type in dbus_delete_pid_files Change openvpn to only allow search of users home dir
393 lines
8.4 KiB
Plaintext
393 lines
8.4 KiB
Plaintext
|
|
## <summary>policy for nsplugin</summary>
|
|
|
|
########################################
|
|
## <summary>
|
|
## Create, read, write, and delete
|
|
## nsplugin rw files.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_manage_rw_files',`
|
|
gen_require(`
|
|
type nsplugin_rw_t;
|
|
')
|
|
|
|
allow $1 nsplugin_rw_t:file manage_file_perms;
|
|
allow $1 nsplugin_rw_t:dir rw_dir_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Manage nsplugin rw files.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_manage_rw',`
|
|
gen_require(`
|
|
type nsplugin_rw_t;
|
|
')
|
|
|
|
manage_dirs_pattern($1, nsplugin_rw_t, nsplugin_rw_t)
|
|
manage_files_pattern($1, nsplugin_rw_t, nsplugin_rw_t)
|
|
manage_lnk_files_pattern($1, nsplugin_rw_t, nsplugin_rw_t)
|
|
')
|
|
|
|
#######################################
|
|
## <summary>
|
|
## The per role template for the nsplugin module.
|
|
## </summary>
|
|
## <param name="user_role">
|
|
## <summary>
|
|
## The role associated with the user domain.
|
|
## </summary>
|
|
## </param>
|
|
## <param name="user_domain">
|
|
## <summary>
|
|
## The type of the user domain.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_role_notrans',`
|
|
gen_require(`
|
|
type nsplugin_rw_t;
|
|
type nsplugin_home_t;
|
|
type nsplugin_exec_t;
|
|
type nsplugin_config_exec_t;
|
|
type nsplugin_t;
|
|
type nsplugin_config_t;
|
|
class x_drawable all_x_drawable_perms;
|
|
class x_resource all_x_resource_perms;
|
|
class dbus send_msg;
|
|
')
|
|
|
|
role $1 types nsplugin_t;
|
|
role $1 types nsplugin_config_t;
|
|
|
|
allow nsplugin_t $2:process signull;
|
|
allow nsplugin_t $2:dbus send_msg;
|
|
allow $2 nsplugin_t:dbus send_msg;
|
|
|
|
list_dirs_pattern($2, nsplugin_rw_t, nsplugin_rw_t)
|
|
read_files_pattern($2, nsplugin_rw_t, nsplugin_rw_t)
|
|
read_lnk_files_pattern($2, nsplugin_rw_t, nsplugin_rw_t)
|
|
can_exec($2, nsplugin_rw_t)
|
|
|
|
#Leaked File Descriptors
|
|
ifdef(`hide_broken_symptoms', `
|
|
dontaudit nsplugin_t $2:socket_class_set { read write };
|
|
dontaudit nsplugin_t $2:fifo_file rw_inherited_fifo_file_perms;
|
|
dontaudit nsplugin_config_t $2:socket_class_set { read write };
|
|
dontaudit nsplugin_config_t $2:fifo_file rw_inherited_fifo_file_perms;
|
|
')
|
|
allow nsplugin_t $2:unix_stream_socket connectto;
|
|
dontaudit nsplugin_t $2:process ptrace;
|
|
allow nsplugin_t $2:sem rw_sem_perms;
|
|
allow nsplugin_t $2:shm rw_shm_perms;
|
|
dontaudit nsplugin_t $2:shm destroy;
|
|
allow $2 nsplugin_t:sem rw_sem_perms;
|
|
|
|
allow $2 nsplugin_t:process { getattr ptrace signal_perms };
|
|
allow $2 nsplugin_t:unix_stream_socket connectto;
|
|
|
|
# Connect to pulseaudit server
|
|
stream_connect_pattern(nsplugin_t, user_home_t, user_home_t, $2)
|
|
gnome_stream_connect(nsplugin_t, $2)
|
|
|
|
userdom_use_user_terminals(nsplugin_t)
|
|
userdom_use_user_terminals(nsplugin_config_t)
|
|
userdom_dontaudit_setattr_user_home_content_files(nsplugin_t)
|
|
userdom_manage_tmpfs_role($1, nsplugin_t)
|
|
|
|
optional_policy(`
|
|
pulseaudio_role($1, nsplugin_t)
|
|
')
|
|
')
|
|
|
|
#######################################
|
|
## <summary>
|
|
## Role access for nsplugin
|
|
## </summary>
|
|
## <param name="userdomain_prefix">
|
|
## <summary>
|
|
## The prefix of the user domain (e.g., user
|
|
## is the prefix for user_t).
|
|
## </summary>
|
|
## </param>
|
|
## <param name="user_role">
|
|
## <summary>
|
|
## The role associated with the user domain.
|
|
## </summary>
|
|
## </param>
|
|
## <param name="user_domain">
|
|
## <summary>
|
|
## The type of the user domain.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_role',`
|
|
gen_require(`
|
|
type nsplugin_exec_t;
|
|
type nsplugin_config_exec_t;
|
|
type nsplugin_t;
|
|
type nsplugin_config_t;
|
|
')
|
|
|
|
nsplugin_role_notrans($1, $2)
|
|
|
|
domtrans_pattern($2, nsplugin_exec_t, nsplugin_t)
|
|
domtrans_pattern($2, nsplugin_config_exec_t, nsplugin_config_t)
|
|
|
|
')
|
|
|
|
#######################################
|
|
## <summary>
|
|
## The per role template for the nsplugin module.
|
|
## </summary>
|
|
## <param name="user_domain">
|
|
## <summary>
|
|
## The type of the user domain.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_domtrans',`
|
|
gen_require(`
|
|
type nsplugin_exec_t;
|
|
type nsplugin_t;
|
|
')
|
|
|
|
domtrans_pattern($1, nsplugin_exec_t, nsplugin_t)
|
|
allow $1 nsplugin_t:unix_stream_socket connectto;
|
|
allow nsplugin_t $1:process signal;
|
|
')
|
|
#######################################
|
|
## <summary>
|
|
## The per role template for the nsplugin module.
|
|
## </summary>
|
|
## <param name="user_domain">
|
|
## <summary>
|
|
## The type of the user domain.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_domtrans_config',`
|
|
gen_require(`
|
|
type nsplugin_config_exec_t;
|
|
type nsplugin_config_t;
|
|
')
|
|
|
|
domtrans_pattern($1, nsplugin_config_exec_t, nsplugin_config_t)
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Search nsplugin rw directories.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_search_rw_dir',`
|
|
gen_require(`
|
|
type nsplugin_rw_t;
|
|
')
|
|
|
|
allow $1 nsplugin_rw_t:dir search_dir_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read nsplugin rw files.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_read_rw_files',`
|
|
gen_require(`
|
|
type nsplugin_rw_t;
|
|
')
|
|
|
|
list_dirs_pattern($1, nsplugin_rw_t, nsplugin_rw_t)
|
|
read_files_pattern($1, nsplugin_rw_t, nsplugin_rw_t)
|
|
read_lnk_files_pattern($1, nsplugin_rw_t, nsplugin_rw_t)
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read nsplugin home files.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_read_home',`
|
|
gen_require(`
|
|
type nsplugin_home_t;
|
|
')
|
|
|
|
list_dirs_pattern($1, nsplugin_home_t, nsplugin_home_t)
|
|
read_files_pattern($1, nsplugin_home_t, nsplugin_home_t)
|
|
read_lnk_files_pattern($1, nsplugin_home_t, nsplugin_home_t)
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Exec nsplugin rw files.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_rw_exec',`
|
|
gen_require(`
|
|
type nsplugin_rw_t;
|
|
')
|
|
|
|
can_exec($1, nsplugin_rw_t)
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Create, read, write, and delete
|
|
## nsplugin home files.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_manage_home_files',`
|
|
gen_require(`
|
|
type nsplugin_home_t;
|
|
')
|
|
|
|
manage_files_pattern($1, nsplugin_home_t, nsplugin_home_t)
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## manage nnsplugin home dirs.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_manage_home_dirs',`
|
|
gen_require(`
|
|
type nsplugin_home_t;
|
|
')
|
|
|
|
manage_dirs_pattern($1, nsplugin_home_t, nsplugin_home_t)
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Allow attempts to read and write to
|
|
## nsplugin named pipes.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain to not audit.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_rw_pipes',`
|
|
gen_require(`
|
|
type nsplugin_home_t;
|
|
')
|
|
|
|
allow $1 nsplugin_home_t:fifo_file rw_fifo_file_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Read and write to nsplugin shared memory.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_rw_shm',`
|
|
gen_require(`
|
|
type nsplugin_t;
|
|
')
|
|
|
|
allow $1 nsplugin_t:shm rw_shm_perms;
|
|
')
|
|
|
|
#####################################
|
|
## <summary>
|
|
## Allow read and write access to nsplugin semaphores.
|
|
## </summary>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_rw_semaphores',`
|
|
gen_require(`
|
|
type nsplugin_t;
|
|
')
|
|
|
|
allow $1 nsplugin_t:sem rw_sem_perms;
|
|
')
|
|
|
|
########################################
|
|
## <summary>
|
|
## Execute nsplugin_exec_t
|
|
## in the specified domain.
|
|
## </summary>
|
|
## <desc>
|
|
## <p>
|
|
## Execute a nsplugin_exec_t
|
|
## in the specified domain.
|
|
## </p>
|
|
## <p>
|
|
## No interprocess communication (signals, pipes,
|
|
## etc.) is provided by this interface since
|
|
## the domains are not owned by this module.
|
|
## </p>
|
|
## </desc>
|
|
## <param name="domain">
|
|
## <summary>
|
|
## Domain allowed access.
|
|
## </summary>
|
|
## </param>
|
|
## <param name="target_domain">
|
|
## <summary>
|
|
## The type of the new process.
|
|
## </summary>
|
|
## </param>
|
|
#
|
|
interface(`nsplugin_exec_domtrans',`
|
|
gen_require(`
|
|
type nsplugin_exec_t;
|
|
')
|
|
|
|
allow $2 nsplugin_exec_t:file entrypoint;
|
|
domtrans_pattern($1, nsplugin_exec_t, $2)
|
|
')
|