Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/contrib/tuned.te

162 lines
3.9 KiB
Text

policy_module(tuned, 1.2.0)
########################################
#
# Declarations
#
type tuned_t;
type tuned_exec_t;
init_daemon_domain(tuned_t, tuned_exec_t)
type tuned_initrc_exec_t;
init_script_file(tuned_initrc_exec_t)
type tuned_etc_t;
files_config_file(tuned_etc_t)
type tuned_rw_etc_t;
files_config_file(tuned_rw_etc_t)
type tuned_log_t;
logging_log_file(tuned_log_t)
type tuned_tmp_t;
files_tmp_file(tuned_tmp_t)
type tuned_var_run_t;
files_pid_file(tuned_var_run_t)
########################################
#
# Local policy
#
allow tuned_t self:capability { net_admin sys_admin sys_nice sys_ptrace sys_rawio };
dontaudit tuned_t self:capability { dac_read_search sys_tty_config };
allow tuned_t self:process { setsched signal };
allow tuned_t self:fifo_file rw_fifo_file_perms;
allow tuned_t self:netlink_kobject_uevent_socket create_socket_perms;
allow tuned_t self:netlink_socket create_socket_perms;
allow tuned_t self:udp_socket create_socket_perms;
allow tuned_t self:socket create_socket_perms;
read_files_pattern(tuned_t, tuned_etc_t, tuned_etc_t)
exec_files_pattern(tuned_t, tuned_etc_t, tuned_etc_t)
manage_files_pattern(tuned_t, tuned_etc_t, tuned_rw_etc_t)
filetrans_pattern(tuned_t, tuned_etc_t, tuned_rw_etc_t, file, "active_profile")
filetrans_pattern(tuned_t, tuned_etc_t, tuned_rw_etc_t, file, "bootcmdline")
filetrans_pattern(tuned_t, tuned_etc_t, tuned_rw_etc_t, file, "post_loaded_profile")
filetrans_pattern(tuned_t, tuned_etc_t, tuned_rw_etc_t, file, "profile_mode")
manage_dirs_pattern(tuned_t, tuned_log_t, tuned_log_t)
manage_files_pattern(tuned_t, tuned_log_t, tuned_log_t)
logging_log_filetrans(tuned_t, tuned_log_t, file, "tuned.log")
manage_dirs_pattern(tuned_t, tuned_tmp_t, tuned_tmp_t)
manage_files_pattern(tuned_t, tuned_tmp_t, tuned_tmp_t)
files_tmp_filetrans(tuned_t, tuned_tmp_t, { file dir })
can_exec(tuned_t, tuned_tmp_t)
manage_files_pattern(tuned_t, tuned_var_run_t, tuned_var_run_t)
manage_dirs_pattern(tuned_t, tuned_var_run_t, tuned_var_run_t)
files_pid_filetrans(tuned_t, tuned_var_run_t, { dir file })
allow tuned_t tuned_var_run_t:file relabel_file_perms;
can_exec(tuned_t, tuned_var_run_t)
kernel_read_system_state(tuned_t)
kernel_read_network_state(tuned_t)
kernel_request_load_module(tuned_t)
kernel_rw_all_sysctls(tuned_t)
kernel_rw_security_state(tuned_t)
kernel_rw_usermodehelper_state(tuned_t)
kernel_setsched(tuned_t)
kernel_manage_perf_event(tuned_t)
corecmd_exec_bin(tuned_t)
corecmd_exec_shell(tuned_t)
dev_getattr_all_blk_files(tuned_t)
dev_getattr_all_chr_files(tuned_t)
dev_read_urand(tuned_t)
dev_read_raw_memory(tuned_t)
dev_rw_cpu_microcode(tuned_t)
dev_rw_sysfs(tuned_t)
dev_rw_netcontrol(tuned_t)
domain_read_all_domains_state(tuned_t)
files_dontaudit_all_access_check(tuned_t)
files_dontaudit_search_home(tuned_t)
files_list_tmp(tuned_t)
fs_getattr_all_fs(tuned_t)
fs_search_all(tuned_t)
fs_rw_hugetlbfs_files(tuned_t)
mls_file_read_to_clearance(tuned_t)
auth_use_nsswitch(tuned_t)
logging_send_syslog_msg(tuned_t)
#bug in tuned
logging_manage_syslog_config(tuned_t)
logging_filetrans_named_conf(tuned_t)
systemd_exec_systemctl(tuned_t)
mount_read_pid_files(tuned_t)
modutils_domtrans_kmod(tuned_t)
udev_read_pid_files(tuned_t)
userdom_dontaudit_search_user_home_dirs(tuned_t)
optional_policy(`
dbus_system_bus_client(tuned_t)
dbus_connect_system_bus(tuned_t)
')
optional_policy(`
dmidecode_domtrans(tuned_t)
')
# to allow disk tuning
optional_policy(`
fstools_domtrans(tuned_t)
')
optional_policy(`
gnome_dontaudit_search_config(tuned_t)
')
optional_policy(`
libs_exec_ldconfig(tuned_t)
')
optional_policy(`
mount_domtrans(tuned_t)
')
optional_policy(`
policykit_dbus_chat(tuned_t)
')
optional_policy(`
rhsmcertd_read_config_files(tuned_t)
')
# to allow network interface tuning
optional_policy(`
sysnet_domtrans_ifconfig(tuned_t)
')
optional_policy(`
unconfined_dbus_send(tuned_t)
')
optional_policy(`
unconfined_domain(tuned_t)
')