## GNU network object model environment (GNOME) ####################################### ## ## Role access for gnome. (Deprecated) ## ## ## ## Role allowed access. ## ## ## ## ## User domain for the role. ## ## # interface(`gnome_role',` refpolicywarn(`$0($*) has been deprecated') ') ###################################### ## ## The role template for the gnome-keyring-daemon. ## ## ## ## The user prefix. ## ## ## ## ## The user role. ## ## ## ## ## The user domain associated with the role. ## ## # interface(`gnome_role_gkeyringd',` refpolicywarn(`$0($*) has been deprecated') ') ###################################### ## ## The role template for gnome. ## ## ## ## The prefix of the user domain (e.g., user ## is the prefix for user_t). ## ## ## ## ## The role associated with the user domain. ## ## ## ## ## The type of the user domain. ## ## # template(`gnome_role_template',` gen_require(` attribute gnomedomain, gkeyringd_domain, gnome_home_type; attribute_role gconfd_roles; type gkeyringd_exec_t, gkeyringd_tmp_t; type gconfd_t, gconfd_exec_t, gconf_tmp_t; class dbus send_msg; ') ######################################## # # Gconf declarations # roleattribute $2 gconfd_roles; ######################################## # # Gkeyringd declarations # type $1_gkeyringd_t, gnomedomain, gkeyringd_domain; userdom_user_application_domain($1_gkeyringd_t, gkeyringd_exec_t) domain_user_exemption_target($1_gkeyringd_t) role $2 types $1_gkeyringd_t; ######################################## # # Gconf policy # domtrans_pattern($3, gconfd_exec_t, gconfd_t) allow $3 gconfd_t:process { signal_perms }; allow $3 gconfd_t:unix_stream_socket connectto; ps_process_pattern($3, gconfd_t) ######################################## # # Gkeyringd policy # allow $1_gkeyringd_t $3:unix_stream_socket { connectto create_stream_socket_perms }; allow $1_gkeyringd_t self:process setsched; domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t) allow $3 { gnome_home_type gkeyringd_tmp_t gconf_tmp_t }:dir { relabel_dir_perms manage_dir_perms }; allow $3 { gnome_home_type gkeyringd_tmp_t gconf_tmp_t }:file { relabel_file_perms manage_file_perms }; userdom_home_manager($1_gkeyringd_t) allow $3 gkeyringd_tmp_t:sock_file { relabel_sock_file_perms manage_sock_file_perms }; ps_process_pattern($3, $1_gkeyringd_t) allow $3 $1_gkeyringd_t:process signal_perms; dontaudit $3 gkeyringd_exec_t:file entrypoint; allow $1_gkeyringd_t $3:process sigkill; allow $3 $1_gkeyringd_t:fd use; allow $3 $1_gkeyringd_t:fifo_file rw_fifo_file_perms; allow $3 $1_gkeyringd_t:dbus { acquire_svc }; stream_connect_pattern($3, gkeyringd_tmp_t, gkeyringd_tmp_t, $1_gkeyringd_t) kernel_read_system_state($1_gkeyringd_t) corecmd_bin_domtrans($1_gkeyringd_t, $3) corecmd_shell_domtrans($1_gkeyringd_t, $3) gnome_stream_connect_gkeyringd($3) ps_process_pattern($1_gkeyringd_t, $3) auth_use_nsswitch($1_gkeyringd_t) logging_send_syslog_msg($1_gkeyringd_t) userdom_rw_user_tmp_sock_files($1_gkeyringd_t) allow $1_gkeyringd_t $3:dbus { acquire_svc send_msg }; allow $3 $1_gkeyringd_t:dbus send_msg; optional_policy(` dbus_session_domain($1, gkeyringd_exec_t, $1_gkeyringd_t) dbus_stream_connect_system_dbusd($1_gkeyringd_t) dbus_send_system_bus($1_gkeyringd_t) gnome_manage_generic_home_dirs($1_gkeyringd_t) gnome_read_generic_data_home_files($1_gkeyringd_t) gnome_read_generic_data_home_dirs($1_gkeyringd_t) optional_policy(` telepathy_mission_control_read_state($1_gkeyringd_t) telepathy_gabble_stream_connect_to($1_gkeyringd_t,gkeyringd_tmp_t,gkeyringd_tmp_t) ') optional_policy(` systemd_dbus_chat_logind($1_gkeyringd_t) ') ') optional_policy(` ssh_agent_exec($1_gkeyringd_t) ') ') ####################################### ## ## Allow domain to run gkeyring in the $1_gkeyringd_t domain. ## ## ## ## The user prefix. ## ## ## ## ## The user role. ## ## ## ## ## Domain allowed access. ## ## # interface(`gnome_run_gkeyringd',` gen_require(` type $1_gkeyringd_t; type gkeyringd_exec_t; ') role $2 types $1_gkeyringd_t; domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t) ') ######################################## ## ## gconf connection template. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_stream_connect_gconf',` gen_require(` type gconfd_t, gconf_tmp_t; ') read_files_pattern($1, gconf_tmp_t, gconf_tmp_t) allow $1 gconfd_t:unix_stream_socket connectto; ') ######################################## ## ## Connect to gkeyringd with a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_stream_connect_gkeyringd',` gen_require(` attribute gkeyringd_domain; type gkeyringd_tmp_t; type gconf_tmp_t; type cache_home_t; ') allow $1 gconf_tmp_t:dir search_dir_perms; userdom_search_user_tmp_dirs($1) stream_connect_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t, gkeyringd_domain) stream_connect_pattern($1, cache_home_t, cache_home_t, gkeyringd_domain) ') ######################################## ## ## Run gconfd in gconfd domain. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_domtrans_gconfd',` gen_require(` type gconfd_t, gconfd_exec_t; ') domtrans_pattern($1, gconfd_exec_t, gconfd_t) ') ######################################## ## ## Dontaudit read gnome homedir content (.config) ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_read_config',` gen_require(` attribute gnome_home_type; ') dontaudit $1 gnome_home_type:dir list_dir_perms; dontaudit $1 gnome_home_type:file read_file_perms; ') ######################################## ## ## Dontaudit search gnome homedir content (.config) ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_search_config',` gen_require(` attribute gnome_home_type; ') dontaudit $1 gnome_home_type:dir search_dir_perms; ') ######################################## ## ## Dontaudit write gnome homedir content (.config) ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_append_config_files',` gen_require(` attribute gnome_home_type; ') dontaudit $1 gnome_home_type:file append; ') ######################################## ## ## Dontaudit write gnome homedir content (.config) ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_write_config_files',` gen_require(` attribute gnome_home_type; ') dontaudit $1 gnome_home_type:file write; ') ######################################## ## ## manage gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_config',` gen_require(` attribute gnome_home_type; ') allow $1 gnome_home_type:dir manage_dir_perms; allow $1 gnome_home_type:file { manage_file_perms map }; allow $1 gnome_home_type:lnk_file manage_lnk_file_perms; allow $1 gnome_home_type:sock_file manage_sock_file_perms; userdom_search_user_home_dirs($1) ') ######################################## ## ## Send general signals to all gconf domains. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_signal_all',` gen_require(` attribute gnomedomain; ') allow $1 gnomedomain:process signal; ') ######################################## ## ## Create objects in a Gnome cache home directory ## with an automatic type transition to ## a specified private type. ## ## ## ## Domain allowed access. ## ## ## ## ## The type of the object to create. ## ## ## ## ## The class of the object to be created. ## ## ## ## ## The name of the object being created. ## ## # interface(`gnome_cache_filetrans',` gen_require(` type cache_home_t; ') filetrans_pattern($1, cache_home_t, $2, $3, $4) userdom_search_user_home_dirs($1) ') ######################################## ## ## Create objects in a Gnome cache home directory ## with an automatic type transition to ## a specified private type. ## ## ## ## Domain allowed access. ## ## ## ## ## The type of the object to create. ## ## ## ## ## The class of the object to be created. ## ## ## ## ## The name of the object being created. ## ## # interface(`gnome_config_filetrans',` gen_require(` type config_home_t; ') filetrans_pattern($1, config_home_t, $2, $3, $4) userdom_search_user_home_dirs($1) ') ######################################## ## ## Read generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_generic_cache_files',` gen_require(` type cache_home_t; ') read_files_pattern($1, cache_home_t, cache_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## Create generic cache home dir (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_create_generic_cache_dir',` gen_require(` type cache_home_t; ') allow $1 cache_home_t:dir create_dir_perms; userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".cache") ') ######################################## ## ## Set attributes of cache home dir (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_setattr_cache_home_dir',` gen_require(` type cache_home_t; ') setattr_dirs_pattern($1, cache_home_t, cache_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## Manage cache home dir (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_cache_home_dir',` gen_require(` type cache_home_t; ') manage_dirs_pattern($1, cache_home_t, cache_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## Dontaudit Manage cache home dir (.cache) ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_manage_cache_home_dir',` gen_require(` type cache_home_t; ') dontaudit $1 cache_home_t:dir manage_dir_perms; ') ######################################## ## ## append to generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_append_generic_cache_files',` gen_require(` type cache_home_t; ') append_files_pattern($1, cache_home_t, cache_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## write to generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_write_generic_cache_files',` gen_require(` type cache_home_t; ') write_files_pattern($1, cache_home_t, cache_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## write to generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_generic_cache_files',` gen_require(` type cache_home_t; ') manage_files_pattern($1, cache_home_t, cache_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## Map generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_map_generic_cache_files',` gen_require(` type cache_home_t; ') allow $1 cache_home_t:file mmap_file_perms; ') ######################################## ## ## Delete to generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_delete_generic_cache_files',` gen_require(` type cache_home_t; ') files_search_tmp($1) allow $1 cache_home_t:file unlink; ') ######################################## ## ## Manage a sock_file in the generic cache home files (.cache) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_generic_cache_sockets',` gen_require(` type cache_home_t; ') userdom_search_user_home_dirs($1) manage_sock_files_pattern($1, cache_home_t, cache_home_t) ') ######################################## ## ## Dontaudit read/write to generic cache home files (.cache) ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_rw_generic_cache_files',` gen_require(` type cache_home_t; ') dontaudit $1 cache_home_t:file rw_inherited_file_perms; ') ######################################## ## ## read gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_config',` gen_require(` attribute gnome_home_type; ') list_dirs_pattern($1, gnome_home_type, gnome_home_type) read_files_pattern($1, gnome_home_type, gnome_home_type) read_lnk_files_pattern($1, gnome_home_type, gnome_home_type) gnome_read_usr_config($1) ') ######################################## ## ## Create objects in a Gnome gconf home directory ## with an automatic type transition to ## a specified private type. ## ## ## ## Domain allowed access. ## ## ## ## ## The type of the object to create. ## ## ## ## ## The class of the object to be created. ## ## ## ## ## The name of the object being created. ## ## # interface(`gnome_data_filetrans',` gen_require(` type data_home_t; ') filetrans_pattern($1, data_home_t, $2, $3, $4) gnome_search_gconf($1) ') ####################################### ## ## Read generic data home files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_generic_data_home_files',` gen_require(` type data_home_t, gconf_home_t; ') read_files_pattern($1, { gconf_home_t data_home_t }, data_home_t) read_lnk_files_pattern($1, { gconf_home_t data_home_t }, data_home_t) ') ######################################## ## ## Read generic data home files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_map_generic_data_home_files',` gen_require(` type data_home_t, gconf_home_t; ') allow $1 data_home_t:file map; allow $1 gconf_home_t:file map; ') ###################################### ## ## Read generic data home dirs. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_generic_data_home_dirs',` gen_require(` type data_home_t, gconf_home_t; ') list_dirs_pattern($1, { gconf_home_t data_home_t }, data_home_t) ') ###################################### ## ## Watch generic data home dirs. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_watch_generic_data_home_dirs',` gen_require(` type data_home_t; ') watch_dirs_pattern($1, data_home_t, data_home_t) ') ####################################### ## ## Manage gconf data home files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_data',` gen_require(` type data_home_t; type gconf_home_t; ') allow $1 gconf_home_t:dir search_dir_perms; manage_dirs_pattern($1, data_home_t, data_home_t) manage_files_pattern($1, data_home_t, data_home_t) manage_lnk_files_pattern($1, data_home_t, data_home_t) ') ######################################## ## ## Read icc data home content. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_home_icc_data_content',` gen_require(` type icc_data_home_t, gconf_home_t, data_home_t; ') userdom_search_user_home_dirs($1) allow $1 { gconf_home_t data_home_t }:dir search_dir_perms; allow $1 icc_data_home_t:file map; list_dirs_pattern($1, icc_data_home_t, icc_data_home_t) read_files_pattern($1, icc_data_home_t, icc_data_home_t) read_lnk_files_pattern($1, icc_data_home_t, icc_data_home_t) ') ######################################## ## ## Read inherited icc data home files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_inherited_home_icc_data_files',` gen_require(` type icc_data_home_t; ') allow $1 icc_data_home_t:file read_inherited_file_perms; ') ######################################## ## ## Create gconf_home_t objects in the /root directory ## ## ## ## Domain allowed access. ## ## ## ## ## The class of the object to be created. ## ## ## ## ## The name of the object being created. ## ## # interface(`gnome_admin_home_gconf_filetrans',` gen_require(` type gconf_home_t; ') userdom_admin_home_dir_filetrans($1, gconf_home_t, $2, $3) ') ######################################## ## ## Do not audit attempts to read ## inherited gconf config files. ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_read_inherited_gconf_config_files',` gen_require(` type gconf_etc_t; ') dontaudit $1 gconf_etc_t:file read_inherited_file_perms; ') ######################################## ## ## read gconf config files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_gconf_config',` gen_require(` type gconf_etc_t; ') allow $1 gconf_etc_t:dir list_dir_perms; read_files_pattern($1, gconf_etc_t, gconf_etc_t) files_search_etc($1) ') ####################################### ## ## Manage gconf config files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_gconf_config',` gen_require(` type gconf_etc_t; ') allow $1 gconf_etc_t:dir list_dir_perms; manage_files_pattern($1, gconf_etc_t, gconf_etc_t) ') ######################################## ## ## Execute gconf programs in ## in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_exec_gconf',` gen_require(` type gconfd_exec_t; ') can_exec($1, gconfd_exec_t) ') ######################################## ## ## Execute gnome keyringd in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_exec_keyringd',` gen_require(` type gkeyringd_exec_t; ') can_exec($1, gkeyringd_exec_t) corecmd_search_bin($1) ') ######################################## ## ## Search gconf home data dirs ## ## ## ## Domain allowed access. ## ## # interface(`gnome_search_gconf_data_dir',` gen_require(` type gconf_home_t; type data_home_t; ') userdom_search_user_home_dirs($1) allow $1 gconf_home_t:dir list_dir_perms; allow $1 data_home_t:dir search_dir_perms; ') ######################################## ## ## Read gconf home files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_gconf_home_files',` gen_require(` type gconf_home_t; type data_home_t; ') userdom_search_user_home_dirs($1) allow $1 gconf_home_t:dir list_dir_perms; allow $1 data_home_t:dir list_dir_perms; read_files_pattern($1, gconf_home_t, gconf_home_t) read_files_pattern($1, data_home_t, data_home_t) read_lnk_files_pattern($1, gconf_home_t, gconf_home_t) read_lnk_files_pattern($1, data_home_t, data_home_t) ') ######################################## ## ## Search gkeyringd temporary directories. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_search_gkeyringd_tmp_dirs',` gen_require(` type gkeyringd_tmp_t; ') files_search_tmp($1) allow $1 gkeyringd_tmp_t:dir search_dir_perms; ') ######################################## ## ## List gkeyringd temporary directories. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_list_gkeyringd_tmp_dirs',` gen_require(` type gkeyringd_tmp_t; ') files_search_tmp($1) allow $1 gkeyringd_tmp_t:dir list_dir_perms; ') ####################################### ## ## Delete gkeyringd temporary ## ## ## ## Domain allowed access. ## ## # interface(`gnome_delete_gkeyringd_tmp_content',` gen_require(` type gkeyringd_tmp_t; ') files_search_tmp($1) delete_dirs_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t) delete_files_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t) delete_sock_files_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t) ') ####################################### ## ## Manage gkeyringd temporary directories. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_gkeyringd_tmp_dirs',` gen_require(` type gkeyringd_tmp_t; ') files_search_tmp($1) manage_dirs_pattern($1, gkeyringd_tmp_t, gkeyringd_tmp_t) ') ######################################## ## ## search gconf homedir (.local) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_search_gconf',` gen_require(` type gconf_home_t; ') allow $1 gconf_home_t:dir search_dir_perms; userdom_search_user_home_dirs($1) ') ######################################## ## ## Set attributes of Gnome config dirs. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_setattr_config_dirs',` gen_require(` type gnome_home_t; ') setattr_dirs_pattern($1, gnome_home_t, gnome_home_t) files_search_home($1) ') ######################################## ## ## Manage generic gnome home files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_generic_home_files',` gen_require(` type gnome_home_t; ') userdom_search_user_home_dirs($1) manage_files_pattern($1, gnome_home_t, gnome_home_t) ') ######################################## ## ## Manage generic gnome home directories. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_generic_home_dirs',` gen_require(` type gnome_home_t; ') userdom_search_user_home_dirs($1) allow $1 gnome_home_t:dir manage_dir_perms; ') ######################################## ## ## Append gconf home files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_append_gconf_home_files',` gen_require(` type gconf_home_t; ') append_files_pattern($1, gconf_home_t, gconf_home_t) ') ######################################## ## ## manage gconf home files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_gconf_home_files',` gen_require(` type gconf_home_t; ') allow $1 gconf_home_t:dir list_dir_perms; manage_files_pattern($1, gconf_home_t, gconf_home_t) ') ######################################## ## ## Connect to gnome over a unix stream socket. ## ## ## ## Domain allowed access. ## ## ## ## ## The type of the user domain. ## ## # interface(`gnome_stream_connect',` gen_require(` attribute gnome_home_type; ') # Connect to pulseaudit server stream_connect_pattern($1, gnome_home_type, gnome_home_type, $2) ') ######################################## ## ## list gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_list_home_config',` gen_require(` type config_home_t; ') allow $1 config_home_t:dir list_dir_perms; ') ######################################## ## ## Set attributes of gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_setattr_home_config',` gen_require(` type config_home_t; ') setattr_dirs_pattern($1, config_home_t, config_home_t) userdom_search_user_home_dirs($1) ') ######################################## ## ## read gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_home_config',` gen_require(` type config_home_t; ') list_dirs_pattern($1, config_home_t, config_home_t) read_files_pattern($1, config_home_t, config_home_t) read_lnk_files_pattern($1, config_home_t, config_home_t) ') ####################################### ## ## append gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_append_home_config',` gen_require(` type config_home_t; ') append_files_pattern($1, config_home_t, config_home_t) ') ####################################### ## ## delete gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_delete_home_config',` gen_require(` type config_home_t; ') delete_files_pattern($1, config_home_t, config_home_t) delete_lnk_files_pattern($1, config_home_t, config_home_t) ') ######################################## ## ## Create gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_create_home_config_dirs',` gen_require(` type config_home_t; ') allow $1 config_home_t:dir create_dir_perms; ') ####################################### ## ## setattr gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_setattr_home_config_dirs',` gen_require(` type config_home_t; ') setattr_dirs_pattern($1, config_home_t, config_home_t) ') ######################################## ## ## manage gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_home_config',` gen_require(` type config_home_t; ') manage_files_pattern($1, config_home_t, config_home_t) manage_lnk_files_pattern($1, config_home_t, config_home_t) allow $1 config_home_t:file map; ') ####################################### ## ## delete gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_delete_home_config_dirs',` gen_require(` type config_home_t; ') delete_dirs_pattern($1, config_home_t, config_home_t) ') ######################################## ## ## manage gnome homedir content (.config) ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_home_config_dirs',` gen_require(` type config_home_t; ') manage_dirs_pattern($1, config_home_t, config_home_t) ') ######################################## ## ## Watch gnome homedir content directories. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_watch_home_config_dirs',` gen_require(` type config_home_t; ') watch_dirs_pattern($1, config_home_t, config_home_t) ') ######################################## ## ## Watch gnome homedir content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_watch_home_config_files',` gen_require(` type config_home_t; ') watch_files_pattern($1, config_home_t, config_home_t) ') ######################################## ## ## manage gstreamer home content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_gstreamer_home_files',` gen_require(` type gstreamer_home_t; ') manage_dirs_pattern($1, gstreamer_home_t, gstreamer_home_t) manage_files_pattern($1, gstreamer_home_t, gstreamer_home_t) gnome_filetrans_gstreamer_home_content($1) ') ###################################### ## ## Allow to execute gstreamer home content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_exec_gstreamer_home_files',` gen_require(` type gstreamer_home_t; ') can_exec($1, gstreamer_home_t) ') ###################################### ## ## Allow to execute config home content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_exec_config_home_files',` gen_require(` type config_home_t; ') can_exec($1, config_home_t) ') ####################################### ## ## file name transition gstreamer home content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_filetrans_gstreamer_home_content',` gen_require(` type gstreamer_home_t; ') userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-bookmarks") userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-metadata-store") userdom_user_home_dir_filetrans($1, gstreamer_home_t, file, ".grl-podcasts") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-0.12") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-0.10") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-1.0") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-1.2") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-10") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".gstreamer-12") userdom_user_home_dir_filetrans($1, gstreamer_home_t, dir, ".orc") userdom_user_tmp_filetrans($1, gstreamer_home_t, dir, ".orc") gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-0.12") gnome_cache_filetrans($1, gstreamer_home_t, dir, "GLCache") gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-0.10") gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-1.0") gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-1.2") gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-10") gnome_cache_filetrans($1, gstreamer_home_t, dir, "gstreamer-12") ') ####################################### ## ## manage gstreamer home content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_gstreamer_home_dirs',` gen_require(` type gstreamer_home_t; ') manage_dirs_pattern($1, gstreamer_home_t, gstreamer_home_t) ') ######################################## ## ## Read/Write all inherited gnome home config ## ## ## ## Domain allowed access. ## ## # interface(`gnome_rw_inherited_config',` gen_require(` attribute gnome_home_type; ') allow $1 gnome_home_type:file rw_inherited_file_perms; ') ######################################## ## ## Dontaudit Read/Write all inherited gnome home config ## ## ## ## Domain to not audit. ## ## # interface(`gnome_dontaudit_rw_inherited_config',` gen_require(` attribute gnome_home_type; ') dontaudit $1 gnome_home_type:file rw_inherited_file_perms; ') ######################################## ## ## Send and receive messages from ## gconf system service over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_dbus_chat_gconfdefault',` gen_require(` type gconfdefaultsm_t; class dbus send_msg; ') allow $1 gconfdefaultsm_t:dbus send_msg; allow gconfdefaultsm_t $1:dbus send_msg; ') ######################################## ## ## Send and receive messages from ## gkeyringd over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_dbus_chat_gkeyringd',` gen_require(` attribute gkeyringd_domain; class dbus send_msg; ') allow $1 gkeyringd_domain:dbus send_msg; allow gkeyringd_domain $1:dbus send_msg; ') ######################################## ## ## Send signull signal to gkeyringd processes. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_signull_gkeyringd',` gen_require(` attribute gkeyringd_domain; ') allow $1 gkeyringd_domain:process signull; ') ######################################## ## ## Allow the domain to read gkeyringd state files in /proc. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_gkeyringd_state',` gen_require(` attribute gkeyringd_domain; ') ps_process_pattern($1, gkeyringd_domain) ') ######################################## ## ## Create directories in user home directories ## with the gnome home file type. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_home_dir_filetrans',` gen_require(` type gnome_home_t; ') userdom_user_home_dir_filetrans($1, gnome_home_t, dir) userdom_search_user_home_dirs($1) ') ######################################## ## ## Check whether sendmail executable ## files are executable. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_access_check_usr_config',` gen_require(` type config_usr_t; ') allow $1 config_usr_t:dir_file_class_set audit_access;; ') ###################################### ## ## Allow read kde config content ## ## ## ## Domain allowed access. ## ## # interface(`gnome_read_usr_config',` gen_require(` type config_usr_t; ') files_search_usr($1) list_dirs_pattern($1, config_usr_t, config_usr_t) read_files_pattern($1, config_usr_t, config_usr_t) read_lnk_files_pattern($1, config_usr_t, config_usr_t) ') ####################################### ## ## Allow manage kde config content ## ## ## ## Domain allowed access. ## ## # interface(`gnome_manage_usr_config',` gen_require(` type config_usr_t; ') files_search_usr($1) manage_dirs_pattern($1, config_usr_t, config_usr_t) manage_files_pattern($1, config_usr_t, config_usr_t) manage_lnk_files_pattern($1, config_usr_t, config_usr_t) ') ######################################## ## ## Execute gnome-keyring in the user gkeyring domain ## ## ## ## Domain allowed access ## ## # interface(`gnome_transition_gkeyringd',` gen_require(` attribute gkeyringd_domain; ') allow $1 gkeyringd_domain:process transition; dontaudit $1 gkeyringd_domain:process { noatsecure siginh rlimitinh }; allow gkeyringd_domain $1:process { sigchld signull }; allow gkeyringd_domain $1:fifo_file rw_inherited_fifo_file_perms; ') ######################################## ## ## Create gnome content in the user home directory ## with an correct label. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_filetrans_home_content',` gen_require(` type config_home_t; type cache_home_t; type dbus_home_t; type gconf_home_t; type gnome_home_t; type data_home_t, icc_data_home_t; type gkeyringd_gnome_home_t; ') userdom_user_home_dir_filetrans($1, config_home_t, dir, ".config") userdom_user_home_dir_filetrans($1, config_home_t, file, ".Xdefaults") userdom_user_home_dir_filetrans($1, config_home_t, dir, ".xine") userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".cache") userdom_user_home_dir_filetrans($1, dbus_home_t, dir, ".dbus") userdom_user_home_dir_filetrans($1, cache_home_t, dir, ".nv") userdom_user_home_dir_filetrans($1, config_home_t, dir, ".kde") userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".gconf") userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".gconfd") userdom_user_home_dir_filetrans($1, gconf_home_t, dir, ".local") userdom_user_home_dir_filetrans($1, gnome_home_t, dir, ".gnome2") # ~/.color/icc: legacy userdom_user_home_content_filetrans($1, icc_data_home_t, dir, "icc") filetrans_pattern($1, gnome_home_t, gkeyringd_gnome_home_t, dir, "keyrings") filetrans_pattern($1, data_home_t, gkeyringd_gnome_home_t, dir, "keyrings") filetrans_pattern($1, gconf_home_t, data_home_t, dir, "share") filetrans_pattern($1, data_home_t, icc_data_home_t, dir, "icc") userdom_user_tmp_filetrans($1, config_home_t, dir, "dconf") gnome_cache_filetrans($1, config_home_t, dir, "dconf") gnome_filetrans_gstreamer_home_content($1) ') ######################################## ## ## Create gnome dconf dir in the user home directory ## with an correct label. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_filetrans_config_home_content',` gen_require(` type config_home_t; ') gnome_cache_filetrans($1, config_home_t, dir, "dconf") ') ###################################### ## ## File name transition for generic home content files. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_filetrans_cert_home_content',` gen_require(` type home_cert_t; ') gnome_data_filetrans($1, home_cert_t, dir, "certificates") ') ###################################### ## ## Create fontconfig directories in the .config and .cache subdirectories ## of the user home directory with correct label. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_filetrans_fontconfig_home_content',` gen_require(` type user_fonts_config_t, user_fonts_cache_t; ') gnome_config_filetrans($1, user_fonts_config_t, dir, "fontconfig") gnome_cache_filetrans($1, user_fonts_cache_t, dir, "fontconfig") ') ######################################## ## ## Create gnome directory in the /root directory ## with an correct label. ## ## ## ## Domain allowed access. ## ## # interface(`gnome_filetrans_admin_home_content',` gen_require(` type config_home_t; type cache_home_t; type dbus_home_t; type gstreamer_home_t; type gconf_home_t; type gnome_home_t; type icc_data_home_t; ') userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".config") userdom_admin_home_dir_filetrans($1, config_home_t, file, ".Xdefaults") userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".xine") userdom_admin_home_dir_filetrans($1, cache_home_t, dir, ".cache") userdom_admin_home_dir_filetrans($1, dbus_home_t, dir, ".dbus") userdom_admin_home_dir_filetrans($1, config_home_t, dir, ".kde") userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".gconf") userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".gconfd") userdom_admin_home_dir_filetrans($1, gconf_home_t, dir, ".local") userdom_admin_home_dir_filetrans($1, gnome_home_t, dir, ".gnome2") gnome_filetrans_gstreamer_home_content($1) # /root/.color/icc: legacy userdom_admin_home_dir_filetrans($1, icc_data_home_t, dir, "icc") ') ##################################### ## ## Execute gnome-keyring executable ## in the specified domain. ## ## ##

## Execute a gnome-keyring executable ## in the specified domain. This allows ## the specified domain to execute any file ## on these filesystems in the specified ## domain. ##

##

## No interprocess communication (signals, pipes, ## etc.) is provided by this interface since ## the domains are not owned by this module. ##

##

## This interface was added to handle ## the ssh-agent policy. ##

##
## ## ## Domain allowed to transition. ## ## ## ## ## The type of the new process. ## ## # interface(`gnome_command_domtrans_gkeyringd', ` gen_require(` type gkeyringd_exec_t; ') allow $2 gkeyringd_exec_t:file entrypoint; domain_transition_pattern($1, gkeyringd_exec_t, $2) type_transition $1 gkeyringd_exec_t:process $2; ') ######################################## ## ## Execute gnome-atspi services in the caller domain ## ## ## ## Domain allowed to transition. ## ## # interface(`gnome_exec_atspi',` gen_require(` type gnome_atspi_exec_t; ') can_exec($1, gnome_atspi_exec_t) ') ######################################## ## ## Execute gnome-atspi services in the gnome-atspi domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`gnome_atspi_domtrans',` gen_require(` type gnome_atspi_t, gnome_atspi_exec_t; ') domtrans_pattern($1, gnome_atspi_exec_t, gnome_atspi_t) ') ######################################## ## ## Execute gnome-initial-setup programs in its domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`gnome_initial_setup_domtrans',` gen_require(` type gnome_initial_setup_t, gnome_initial_setup_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, gnome_initial_setup_exec_t, gnome_initial_setup_t) ') ######################################## ## ## Allow gnome-initial-setup noatsecure ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_noatsecure',` gen_require(` type gnome_initial_setup_t; ') allow $1 gnome_initial_setup_t:process noatsecure; ') ######################################## ## ## Allow create gnome-initial-setup variable state directories ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_create_var_lib_dirs',` gen_require(` type gnome_initial_setup_var_lib_t; ') create_dirs_pattern($1, gnome_initial_setup_var_lib_t, gnome_initial_setup_var_lib_t) ') ######################################## ## ## Allow watch gnome-initial-setup variable state directories ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_watch_var_lib_dirs',` gen_require(` type gnome_initial_setup_var_lib_t; ') watch_dirs_pattern($1, gnome_initial_setup_var_lib_t, gnome_initial_setup_var_lib_t) ') ######################################## ## ## Allow read gnome-initial-setup variable state files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_read_var_lib_files',` gen_require(` type gnome_initial_setup_var_lib_t; ') read_files_pattern($1, gnome_initial_setup_var_lib_t, gnome_initial_setup_var_lib_t) allow $1 gnome_initial_setup_var_lib_t:file map; ') ######################################## ## ## Allow manage gnome-initial-setup variable state files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_manage_var_lib_files',` gen_require(` type gnome_initial_setup_var_lib_t; ') manage_files_pattern($1, gnome_initial_setup_var_lib_t, gnome_initial_setup_var_lib_t) allow $1 gnome_initial_setup_var_lib_t:file map; ') ######################################## ## ## Allow manage gnome-initial-setup variable state socket files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_manage_var_lib_sock_files',` gen_require(` type gnome_initial_setup_var_lib_t; ') manage_sock_files_pattern($1, gnome_initial_setup_var_lib_t, gnome_initial_setup_var_lib_t) ') ######################################## ## ## Allow read gnome-initial-setup runtime files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_read_var_run_files',` gen_require(` type gnome_initial_setup_var_run_t; ') read_files_pattern($1, gnome_initial_setup_var_run_t, gnome_initial_setup_var_run_t) allow $1 gnome_initial_setup_var_run_t:file map; ') ######################################## ## ## Allow manage gnome-initial-setup all runtime files ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_manage_var_run',` gen_require(` type gnome_initial_setup_var_run_t; ') manage_dirs_pattern($1, gnome_initial_setup_var_run_t, gnome_initial_setup_var_run_t) manage_files_pattern($1, gnome_initial_setup_var_run_t, gnome_initial_setup_var_run_t) manage_sock_files_pattern($1, gnome_initial_setup_var_run_t, gnome_initial_setup_var_run_t) allow $1 gnome_initial_setup_var_run_t:file map; ') ######################################## ## ## Read the process state of gnome-initial-setup ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_read_state',` gen_require(` type gnome_initial_setup_t; ') ps_process_pattern($1, gnome_initial_setup_t) ') ######################################## ## ## Transition to gnome-initial-setup named content ## ## ## ## Domain allowed access. ## ## # interface(`gnome_initial_setup_filetrans_named_content',` gen_require(` type gnome_initial_setup_var_run_t; ') files_pid_filetrans($1, gnome_initial_setup_var_run_t, dir, "gnome-initial-setup") ')