Oreon-Lime-R2/selinux-policy/selinux-policy-bc228bd/selinux-policy-bc228bd0c249a9e4aa3dcf238c2b1bb138943b07/policy/modules/contrib/sectoolm.te

116 lines
2.6 KiB
Text
Raw Permalink Normal View History

policy_module(sectoolm, 1.1.0)
########################################
#
# Declarations
#
type sectoolm_t;
type sectoolm_exec_t;
init_daemon_domain(sectoolm_t, sectoolm_exec_t)
type sectool_var_lib_t;
files_type(sectool_var_lib_t)
type sectool_var_log_t;
logging_log_file(sectool_var_log_t)
type sectool_tmp_t;
files_tmp_file(sectool_tmp_t)
########################################
#
# sectool local policy
#
allow sectoolm_t self:capability { dac_read_search net_admin sys_nice sys_ptrace };
allow sectoolm_t self:process { getcap getsched signull setsched };
dontaudit sectoolm_t self:process { execstack execmem };
allow sectoolm_t self:fifo_file rw_fifo_file_perms;
allow sectoolm_t self:unix_dgram_socket { create_socket_perms sendto };
manage_dirs_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t)
manage_files_pattern(sectoolm_t, sectool_tmp_t, sectool_tmp_t)
files_tmp_filetrans(sectoolm_t, sectool_tmp_t, { file dir })
manage_files_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t)
manage_dirs_pattern(sectoolm_t, sectool_var_lib_t, sectool_var_lib_t)
files_var_lib_filetrans(sectoolm_t, sectool_var_lib_t, { file dir })
manage_files_pattern(sectoolm_t, sectool_var_log_t, sectool_var_log_t)
logging_log_filetrans(sectoolm_t, sectool_var_log_t, file)
kernel_read_net_sysctls(sectoolm_t)
kernel_read_network_state(sectoolm_t)
kernel_read_kernel_sysctls(sectoolm_t)
corecmd_exec_bin(sectoolm_t)
corecmd_exec_shell(sectoolm_t)
dev_read_sysfs(sectoolm_t)
dev_read_urand(sectoolm_t)
dev_getattr_all_blk_files(sectoolm_t)
dev_getattr_all_chr_files(sectoolm_t)
domain_getattr_all_domains(sectoolm_t)
domain_read_all_domains_state(sectoolm_t)
files_getattr_all_pipes(sectoolm_t)
files_getattr_all_sockets(sectoolm_t)
files_read_all_files(sectoolm_t)
files_read_all_symlinks(sectoolm_t)
fs_getattr_all_fs(sectoolm_t)
fs_list_noxattr_fs(sectoolm_t)
selinux_validate_context(sectoolm_t)
# tcp_wrappers test
application_exec_all(sectoolm_t)
auth_use_nsswitch(sectoolm_t)
libs_exec_ld_so(sectoolm_t)
logging_send_syslog_msg(sectoolm_t)
# tests related to network
sysnet_domtrans_ifconfig(sectoolm_t)
userdom_manage_user_tmp_sockets(sectoolm_t)
userdom_dgram_send(sectoolm_t)
optional_policy(`
dbus_system_domain(sectoolm_t, sectoolm_exec_t)
')
optional_policy(`
# tests related to network
hostname_exec(sectoolm_t)
')
optional_policy(`
# tests related to network
iptables_domtrans(sectoolm_t)
')
optional_policy(`
mount_exec(sectoolm_t)
')
optional_policy(`
policykit_dbus_chat(sectoolm_t)
')
# suid test using
# rpm -Vf option
optional_policy(`
prelink_domtrans(sectoolm_t)
')
optional_policy(`
rpm_exec(sectoolm_t)
rpm_dontaudit_manage_db(sectoolm_t)
')