Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/contrib/pcmcia.if

160 lines
3 KiB
Text
Raw Permalink Normal View History

## <summary>PCMCIA card management services.</summary>
########################################
## <summary>
## PCMCIA stub interface. No access allowed.
## </summary>
## <param name="domain" unused="true">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pcmcia_stub',`
gen_require(`
type cardmgr_t;
')
')
########################################
## <summary>
## Execute cardmgr in the cardmgr domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`pcmcia_domtrans_cardmgr',`
gen_require(`
type cardmgr_t, cardmgr_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, cardmgr_exec_t, cardmgr_t)
')
########################################
## <summary>
## Inherit and use cardmgr file descriptors.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pcmcia_use_cardmgr_fds',`
gen_require(`
type cardmgr_t;
')
allow $1 cardmgr_t:fd use;
')
########################################
## <summary>
## Execute cardctl in the cardmgr domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`pcmcia_domtrans_cardctl',`
gen_require(`
type cardmgr_t, cardctl_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, cardctl_exec_t, cardmgr_t)
')
########################################
## <summary>
## Execute cardctl in the cardmgr
## domain, and allow the specified
## role the cardmgr domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`pcmcia_run_cardctl',`
gen_require(`
attribute_role cardmgr_roles;
')
pcmcia_domtrans_cardctl($1)
roleattribute $2 cardmgr_roles;
')
########################################
## <summary>
## Read cardmgr pid files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pcmcia_read_pid',`
gen_require(`
type cardmgr_var_run_t;
')
files_search_pids($1)
read_files_pattern($1, cardmgr_var_run_t, cardmgr_var_run_t)
')
########################################
## <summary>
## Create, read, write, and delete
## cardmgr pid files.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pcmcia_manage_pid',`
gen_require(`
type cardmgr_var_run_t;
')
files_search_pids($1)
manage_files_pattern($1, cardmgr_var_run_t, cardmgr_var_run_t)
')
########################################
## <summary>
## Create, read, write, and delete
## cardmgr runtime character nodes.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`pcmcia_manage_pid_chr_files',`
gen_require(`
type cardmgr_var_run_t;
')
files_search_pids($1)
manage_chr_files_pattern($1, cardmgr_var_run_t, cardmgr_var_run_t)
')