Blame refpolicy/policy/modules/apps/loadkeys.te
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
policy_module(loadkeys,1.0)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
########################################
|
|
Chris PeBenito |
21468a |
#
|
|
Chris PeBenito |
21468a |
# Declarations
|
|
Chris PeBenito |
21468a |
#
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
# cjp: this should probably be rewritten
|
|
Chris PeBenito |
21468a |
# per user domain, since it can rw
|
|
Chris PeBenito |
21468a |
# all user domain ttys
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
type loadkeys_t;
|
|
Chris PeBenito |
21468a |
domain_type(loadkeys_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
type loadkeys_exec_t;
|
|
Chris PeBenito |
21468a |
domain_entry_file(loadkeys_t,loadkeys_exec_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
########################################
|
|
Chris PeBenito |
21468a |
#
|
|
Chris PeBenito |
21468a |
# Local policy
|
|
Chris PeBenito |
21468a |
#
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
allow loadkeys_t self:capability { setuid sys_tty_config };
|
|
Chris PeBenito |
21468a |
allow loadkeys_t self:fifo_file rw_file_perms;
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
kernel_read_system_state(loadkeys_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
corecmd_exec_bin(loadkeys_t)
|
|
Chris PeBenito |
21468a |
corecmd_exec_shell(loadkeys_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
files_dontaudit_read_etc_runtime_files(loadkeys_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
libs_use_ld_so(loadkeys_t)
|
|
Chris PeBenito |
21468a |
libs_use_shared_libs(loadkeys_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
locallogin_use_fd(loadkeys_t)
|
|
Chris PeBenito |
21468a |
|
|
Chris PeBenito |
21468a |
miscfiles_read_localization(loadkeys_t)
|