67 lines
2 KiB
Text
67 lines
2 KiB
Text
|
policy_module(sandbox,1.0.0)
|
||
|
|
||
|
attribute sandbox_domain;
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
# Declarations
|
||
|
#
|
||
|
sandbox_domain_template(sandbox)
|
||
|
|
||
|
########################################
|
||
|
#
|
||
|
# sandbox local policy
|
||
|
#
|
||
|
allow sandbox_domain self:process { getattr signal_perms getsched setsched setpgid execstack };
|
||
|
tunable_policy(`deny_execmem',`',`
|
||
|
allow sandbox_domain self:process execmem;
|
||
|
')
|
||
|
|
||
|
allow sandbox_domain self:fifo_file manage_file_perms;
|
||
|
allow sandbox_domain self:sem create_sem_perms;
|
||
|
allow sandbox_domain self:shm create_shm_perms;
|
||
|
allow sandbox_domain self:msgq create_msgq_perms;
|
||
|
allow sandbox_domain self:unix_stream_socket create_stream_socket_perms;
|
||
|
allow sandbox_domain self:unix_dgram_socket { sendto create_socket_perms };
|
||
|
dontaudit sandbox_domain self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
|
||
|
|
||
|
dev_rw_all_inherited_chr_files(sandbox_domain)
|
||
|
dev_rw_all_inherited_blk_files(sandbox_domain)
|
||
|
|
||
|
# sandbox_file_t was moved to sandboxX.te
|
||
|
optional_policy(`
|
||
|
sandbox_exec_file(sandbox_domain)
|
||
|
sandbox_manage_content(sandbox_domain)
|
||
|
sandbox_dontaudit_mounton(sandbox_domain)
|
||
|
sandbox_manage_tmpfs_files(sandbox_domain)
|
||
|
')
|
||
|
|
||
|
gen_require(`
|
||
|
type usr_t, lib_t, locale_t, device_t;
|
||
|
type var_t, var_run_t, rpm_log_t, locale_t;
|
||
|
attribute exec_type, configfile;
|
||
|
')
|
||
|
|
||
|
kernel_dontaudit_read_system_state(sandbox_domain)
|
||
|
kernel_dontaudit_getattr_core_if(sandbox_domain)
|
||
|
|
||
|
corecmd_exec_all_executables(sandbox_domain)
|
||
|
|
||
|
dev_dontaudit_getattr_all(sandbox_domain)
|
||
|
|
||
|
files_rw_all_inherited_files(sandbox_domain, -exec_type -configfile -usr_t -lib_t -locale_t -var_t -var_run_t -device_t -rpm_log_t )
|
||
|
corecmd_entrypoint_all_executables(sandbox_domain)
|
||
|
files_entrypoint_all_mountpoint(sandbox_domain)
|
||
|
|
||
|
files_read_config_files(sandbox_domain)
|
||
|
files_read_var_files(sandbox_domain)
|
||
|
files_read_all_mountpoint_symlinks(sandbox_domain)
|
||
|
files_dontaudit_search_all_dirs(sandbox_domain)
|
||
|
|
||
|
fs_dontaudit_getattr_all_fs(sandbox_domain)
|
||
|
|
||
|
userdom_use_inherited_user_terminals(sandbox_domain)
|
||
|
|
||
|
mta_dontaudit_read_spool_symlinks(sandbox_domain)
|
||
|
|