|
Karl MacMillan |
870049 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Device nodes and interfaces for many basic system devices.
|
|
Karl MacMillan |
870049 |
## </summary>
|
|
Chris PeBenito |
261e0e |
## <desc>
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
## This module creates the device node concept and provides
|
|
Chris PeBenito |
414e41 |
## the policy for many of the device files. Notable exceptions are
|
|
Chris PeBenito |
414e41 |
## the mass storage and terminal devices that are covered by other
|
|
Chris PeBenito |
414e41 |
## modules.
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
## This module creates the concept of a device node. That is a
|
|
Chris PeBenito |
414e41 |
## char or block device file, usually in /dev. All types that
|
|
Chris PeBenito |
414e41 |
## are used to label device nodes should use the dev_node macro.
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
## Additionally, this module controls access to three things:
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
## the device directories containing device nodes
|
|
Chris PeBenito |
414e41 |
## device nodes as a group
|
|
Chris PeBenito |
414e41 |
## individual access to specific device nodes covered by
|
|
Chris PeBenito |
414e41 |
## this module.
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
414e41 |
##
|
|
Chris PeBenito |
261e0e |
## </desc>
|
|
Karl MacMillan |
f0c985 |
|
|
Karl MacMillan |
f0c985 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Make the passed in type a type appropriate for
|
|
Chris PeBenito |
414e41 |
## use on device nodes (usually files in /dev).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="object_type">
|
|
Chris PeBenito |
414e41 |
## The object type that will be used on device nodes.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_node',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
attribute device_node;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
typeattribute $1 device_node;
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
763c44 |
fs_associate($1)
|
|
Chris PeBenito |
f0b1ef |
fs_associate_tmpfs($1)
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow full relabeling (to and from) of all device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed to relabel.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_relabel_all_dev_nodes',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
attribute device_node;
|
|
Chris PeBenito |
7a2f20 |
type device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir { getattr relabelfrom };
|
|
Chris PeBenito |
7a2f20 |
class file { getattr relabelfrom };
|
|
Chris PeBenito |
7a2f20 |
class lnk_file { getattr relabelfrom };
|
|
Chris PeBenito |
7a2f20 |
class fifo_file { getattr relabelfrom };
|
|
Chris PeBenito |
7a2f20 |
class sock_file { getattr relabelfrom };
|
|
Chris PeBenito |
7a2f20 |
class blk_file { getattr relabelfrom relabelto };
|
|
Chris PeBenito |
7a2f20 |
class chr_file { getattr relabelfrom relabelto };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 device_node:dir { getattr relabelfrom };
|
|
Chris PeBenito |
419699 |
allow $1 device_node:file { getattr relabelfrom };
|
|
Chris PeBenito |
419699 |
allow $1 device_node:lnk_file { getattr relabelfrom };
|
|
Chris PeBenito |
419699 |
allow $1 device_node:fifo_file { getattr relabelfrom };
|
|
Chris PeBenito |
419699 |
allow $1 device_node:sock_file { getattr relabelfrom };
|
|
Chris PeBenito |
419699 |
allow $1 { device_t device_node }:blk_file { getattr relabelfrom relabelto };
|
|
Chris PeBenito |
419699 |
allow $1 { device_t device_node }:chr_file { getattr relabelfrom relabelto };
|
|
Chris PeBenito |
ee5772 |
')
|
|
Chris PeBenito |
ee5772 |
|
|
Chris PeBenito |
ee5772 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## List all of the device nodes in a device directory.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed to list device nodes.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
ee5772 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_list_all_dev_nodes',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class lnk_file { getattr read };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 device_t:dir r_dir_perms;
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:lnk_file { getattr read };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
a42ca7 |
## Set the attributes of /dev directories.
|
|
Chris PeBenito |
a42ca7 |
## </summary>
|
|
Chris PeBenito |
a42ca7 |
## <param name="domain">
|
|
Chris PeBenito |
a42ca7 |
## Domain allowed access.
|
|
Chris PeBenito |
a42ca7 |
## </param>
|
|
Chris PeBenito |
a42ca7 |
#
|
|
Chris PeBenito |
a42ca7 |
interface(`dev_setattr_dev_dir',`
|
|
Chris PeBenito |
a42ca7 |
gen_require(`
|
|
Chris PeBenito |
a42ca7 |
type device_t;
|
|
Chris PeBenito |
a42ca7 |
class dir setattr;
|
|
Chris PeBenito |
a42ca7 |
')
|
|
Chris PeBenito |
a42ca7 |
|
|
Chris PeBenito |
a42ca7 |
allow $1 device_t:dir setattr;
|
|
Chris PeBenito |
a42ca7 |
')
|
|
Chris PeBenito |
a42ca7 |
|
|
Chris PeBenito |
a42ca7 |
########################################
|
|
Chris PeBenito |
a42ca7 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit attempts to list all device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit listing of device nodes.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_list_all_dev_nodes',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
dontaudit $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
c3dff2 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Create a directory in the device directory.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed to create the directory.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
c3dff2 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_create_dir',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir { ra_dir_perms create };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 device_t:dir { ra_dir_perms create };
|
|
Chris PeBenito |
129318 |
')
|
|
Chris PeBenito |
129318 |
|
|
Chris PeBenito |
129318 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow full relabeling (to and from) of directories in /dev.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed to relabel.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
c9428d |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_relabel_dev_dirs',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir { r_dir_perms relabelfrom relabelto };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
c9428d |
|
|
Chris PeBenito |
c9428d |
allow $1 device_t:dir { r_dir_perms relabelfrom relabelto };
|
|
Chris PeBenito |
c9428d |
')
|
|
Chris PeBenito |
c9428d |
|
|
Chris PeBenito |
c9428d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
ae9e27 |
## Read and write generic files in /dev.
|
|
Chris PeBenito |
ae9e27 |
## </summary>
|
|
Chris PeBenito |
ae9e27 |
## <param name="domain">
|
|
Chris PeBenito |
ae9e27 |
## Domain allowed access.
|
|
Chris PeBenito |
ae9e27 |
## </param>
|
|
Chris PeBenito |
ae9e27 |
#
|
|
Chris PeBenito |
ae9e27 |
interface(`dev_rw_generic_file',`
|
|
Chris PeBenito |
ae9e27 |
gen_require(`
|
|
Chris PeBenito |
ae9e27 |
type device_t;
|
|
Chris PeBenito |
ae9e27 |
class dir search;
|
|
Chris PeBenito |
ae9e27 |
class file rw_file_perms;
|
|
Chris PeBenito |
ae9e27 |
')
|
|
Chris PeBenito |
ae9e27 |
|
|
Chris PeBenito |
ae9e27 |
allow $1 device_t:dir search;
|
|
Chris PeBenito |
ae9e27 |
allow $1 device_t:file rw_file_perms;
|
|
Chris PeBenito |
ae9e27 |
')
|
|
Chris PeBenito |
ae9e27 |
|
|
Chris PeBenito |
ae9e27 |
########################################
|
|
Chris PeBenito |
ae9e27 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit getattr on generic pipes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
129318 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_getattr_generic_pipe',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class fifo_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
dontaudit $1 device_t:fifo_file getattr;
|
|
Chris PeBenito |
f5c42b |
')
|
|
Chris PeBenito |
f5c42b |
|
|
Chris PeBenito |
f5c42b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow getattr on generic block devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
f5c42b |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_generic_blk_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
419699 |
allow $1 device_t:blk_file getattr;
|
|
Chris PeBenito |
c3dff2 |
')
|
|
Chris PeBenito |
c3dff2 |
|
|
Chris PeBenito |
7bba9d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit getattr on generic block devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7bba9d |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_getattr_generic_blk_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
dontaudit $1 device_t:blk_file getattr;
|
|
Chris PeBenito |
7bba9d |
')
|
|
Chris PeBenito |
7bba9d |
|
|
Chris PeBenito |
7bba9d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit setattr on generic block devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_setattr_generic_blk_file',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t;
|
|
Chris PeBenito |
7a2f20 |
class blk_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
dontaudit $1 device_t:blk_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow read, write, create, and delete for generic
|
|
Chris PeBenito |
414e41 |
## block files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7bba9d |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_generic_blk_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file create_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 device_t:dir rw_dir_perms;
|
|
Chris PeBenito |
419699 |
allow $1 device_t:blk_file create_file_perms;
|
|
Chris PeBenito |
d115b2 |
')
|
|
Chris PeBenito |
d115b2 |
|
|
Chris PeBenito |
d115b2 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow read, write, and create for generic character device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
d115b2 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_create_generic_chr_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir ra_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file create;
|
|
Chris PeBenito |
cbc9d6 |
class capability mknod;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
c9428d |
allow $1 device_t:dir ra_dir_perms;
|
|
Chris PeBenito |
419699 |
allow $1 device_t:chr_file create;
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 self:capability mknod;
|
|
Chris PeBenito |
f5c42b |
')
|
|
Chris PeBenito |
f5c42b |
|
|
Chris PeBenito |
f5c42b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow getattr for generic character device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
f5c42b |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_generic_chr_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
419699 |
allow $1 device_t:chr_file getattr;
|
|
Chris PeBenito |
c3dff2 |
')
|
|
Chris PeBenito |
c3dff2 |
|
|
Chris PeBenito |
c3dff2 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit getattr for generic character device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
c3dff2 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_getattr_generic_chr_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
419699 |
|
|
Chris PeBenito |
419699 |
dontaudit $1 device_t:chr_file getattr;
|
|
Chris PeBenito |
7bba9d |
')
|
|
Chris PeBenito |
7bba9d |
|
|
Chris PeBenito |
7bba9d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit setattr for generic character device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_setattr_generic_chr_file',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t;
|
|
Chris PeBenito |
7a2f20 |
class chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
dontaudit $1 device_t:chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
ae9e27 |
## Do not audit attempts to set the attributes
|
|
Chris PeBenito |
ae9e27 |
## of symbolic links in device directories (/dev).
|
|
Chris PeBenito |
ae9e27 |
## </summary>
|
|
Chris PeBenito |
ae9e27 |
## <param name="domain">
|
|
Chris PeBenito |
ae9e27 |
## Domain to not audit.
|
|
Chris PeBenito |
ae9e27 |
## </param>
|
|
Chris PeBenito |
ae9e27 |
#
|
|
Chris PeBenito |
ae9e27 |
interface(`dev_dontaudit_setattr_generic_symlink',`
|
|
Chris PeBenito |
ae9e27 |
gen_require(`
|
|
Chris PeBenito |
ae9e27 |
type device_t;
|
|
Chris PeBenito |
ae9e27 |
class lnk_file setattr;
|
|
Chris PeBenito |
ae9e27 |
')
|
|
Chris PeBenito |
ae9e27 |
|
|
Chris PeBenito |
ae9e27 |
dontaudit $1 device_t:lnk_file setattr;
|
|
Chris PeBenito |
ae9e27 |
')
|
|
Chris PeBenito |
ae9e27 |
|
|
Chris PeBenito |
ae9e27 |
########################################
|
|
Chris PeBenito |
ae9e27 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Delete symbolic links in device directories.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
dc771f |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_del_generic_symlinks',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir { getattr read write remove_name };
|
|
Chris PeBenito |
7a2f20 |
class lnk_file unlink;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
419699 |
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:dir { getattr read write remove_name };
|
|
Chris PeBenito |
419699 |
allow $1 device_t:lnk_file unlink;
|
|
Chris PeBenito |
dc771f |
')
|
|
Chris PeBenito |
dc771f |
|
|
Chris PeBenito |
dc771f |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Create, delete, read, and write symbolic links in device directories.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7bba9d |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_generic_symlinks',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir { create read getattr lock setattr ioctl link unlink rename search add_name remove_name reparent write rmdir relabelfrom relabelto };
|
|
Chris PeBenito |
7a2f20 |
class lnk_file { create read getattr setattr link unlink rename };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
419699 |
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:dir { create read getattr lock setattr ioctl link unlink rename search add_name remove_name reparent write rmdir relabelfrom relabelto };
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:lnk_file { create read getattr setattr link unlink rename };
|
|
Chris PeBenito |
7bba9d |
')
|
|
Chris PeBenito |
7bba9d |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
783b38 |
## Relabel symbolic links in device directories.
|
|
Chris PeBenito |
783b38 |
## </summary>
|
|
Chris PeBenito |
783b38 |
## <param name="domain">
|
|
Chris PeBenito |
783b38 |
## Domain allowed access.
|
|
Chris PeBenito |
783b38 |
## </param>
|
|
Chris PeBenito |
783b38 |
#
|
|
Chris PeBenito |
783b38 |
interface(`dev_relabel_generic_symlinks',`
|
|
Chris PeBenito |
783b38 |
gen_require(`
|
|
Chris PeBenito |
783b38 |
type device_t;
|
|
Chris PeBenito |
783b38 |
class dir r_dir_perms;
|
|
Chris PeBenito |
783b38 |
class lnk_file { relabelfrom relabelto };
|
|
Chris PeBenito |
783b38 |
')
|
|
Chris PeBenito |
783b38 |
|
|
Chris PeBenito |
783b38 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
783b38 |
allow $1 device_t:lnk_file { relabelfrom relabelto };
|
|
Chris PeBenito |
783b38 |
')
|
|
Chris PeBenito |
783b38 |
|
|
Chris PeBenito |
783b38 |
########################################
|
|
Chris PeBenito |
783b38 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Create, delete, read, and write device nodes in device directories.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_dev_nodes',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node, memory_raw_read, memory_raw_write;
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir { create read getattr lock setattr ioctl link unlink rename search add_name remove_name reparent write rmdir relabelfrom relabelto };
|
|
Chris PeBenito |
cbc9d6 |
class sock_file { create ioctl read getattr lock write setattr append link unlink rename };
|
|
Chris PeBenito |
cbc9d6 |
class lnk_file { create read getattr setattr link unlink rename };
|
|
Chris PeBenito |
cbc9d6 |
class chr_file { create ioctl read getattr lock write setattr append link unlink rename relabelfrom relabelto };
|
|
Chris PeBenito |
cbc9d6 |
class blk_file { create ioctl read getattr lock write setattr append link unlink rename relabelfrom relabelto };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:dir { create read getattr lock setattr ioctl link unlink rename search add_name remove_name reparent write rmdir relabelfrom relabelto };
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:sock_file { create ioctl read getattr lock write setattr append link unlink rename };
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:lnk_file { create read getattr setattr link unlink rename };
|
|
Karl MacMillan |
f0c985 |
allow $1 device_t:{ chr_file blk_file } { create ioctl read getattr lock write setattr append link unlink rename relabelfrom relabelto };
|
|
Karl MacMillan |
f0c985 |
allow $1 device_node:{ chr_file blk_file } { create ioctl read getattr lock write setattr append link unlink rename relabelfrom relabelto };
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
# these next rules are to satisfy assertions broken by the above lines.
|
|
Chris PeBenito |
0c73cd |
# the permissions hopefully can be cut back a lot
|
|
Chris PeBenito |
0c73cd |
storage_raw_read_fixed_disk($1)
|
|
Chris PeBenito |
0c73cd |
storage_raw_write_fixed_disk($1)
|
|
Chris PeBenito |
0c73cd |
storage_read_scsi_generic($1)
|
|
Chris PeBenito |
0c73cd |
storage_write_scsi_generic($1)
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
typeattribute $1 memory_raw_read;
|
|
Chris PeBenito |
0c73cd |
typeattribute $1 memory_raw_write;
|
|
Chris PeBenito |
07d6e3 |
')
|
|
Chris PeBenito |
07d6e3 |
|
|
Chris PeBenito |
07d6e3 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit getattr for generic device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
07d6e3 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_rw_generic_dev_nodes',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file { getattr read write ioctl };
|
|
Chris PeBenito |
cbc9d6 |
class blk_file { getattr read write ioctl };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
dontaudit $1 device_t:{ chr_file blk_file } { getattr read write ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Create, delete, read, and write block device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_generic_blk_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir rw_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file create_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:blk_file create_file_perms;
|
|
Chris PeBenito |
32e53a |
')
|
|
Chris PeBenito |
32e53a |
|
|
Chris PeBenito |
32e53a |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Create, delete, read, and write character device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
32e53a |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_generic_chr_file',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir rw_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file create_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:chr_file create_file_perms;
|
|
Chris PeBenito |
32e53a |
')
|
|
Chris PeBenito |
32e53a |
|
|
Chris PeBenito |
32e53a |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Create, read, and write device nodes. The node
|
|
Chris PeBenito |
414e41 |
## will be transitioned to the type provided.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
414e41 |
## <param name="file">
|
|
Chris PeBenito |
414e41 |
## Type to which the created node will be transitioned.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
414e41 |
## <param name="objectclass(es)">
|
|
Chris PeBenito |
414e41 |
## Object class(es) (single or set including {}) for which this
|
|
Chris PeBenito |
414e41 |
## the transition will occur.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
32e53a |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_create_dev_node',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
type device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir rw_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0c73cd |
type_transition $1 device_t:$3 $2;
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
optional_policy(`distro_redhat',`
|
|
Chris PeBenito |
b57dd1 |
fs_associate_tmpfs($2)
|
|
Chris PeBenito |
0c73cd |
')
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Getattr on all block file device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_all_blk_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:blk_file getattr;
|
|
Chris PeBenito |
8a0da1 |
')
|
|
Chris PeBenito |
8a0da1 |
|
|
Chris PeBenito |
7bba9d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit getattr on all block file device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7bba9d |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_getattr_all_blk_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:blk_file getattr;
|
|
Chris PeBenito |
7bba9d |
')
|
|
Chris PeBenito |
7bba9d |
|
|
Chris PeBenito |
8a0da1 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Getattr on all character file device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8a0da1 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_all_chr_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:chr_file getattr;
|
|
Chris PeBenito |
8a0da1 |
')
|
|
Chris PeBenito |
8a0da1 |
|
|
Chris PeBenito |
7bba9d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Dontaudit getattr on all character file device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7bba9d |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_dontaudit_getattr_all_chr_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
dontaudit $1 device_node:chr_file getattr;
|
|
Chris PeBenito |
7bba9d |
')
|
|
Chris PeBenito |
7bba9d |
|
|
Chris PeBenito |
8a0da1 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Setattr on all block file device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8a0da1 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_setattr_all_blk_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file setattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:blk_file setattr;
|
|
Chris PeBenito |
8a0da1 |
')
|
|
Chris PeBenito |
8a0da1 |
|
|
Chris PeBenito |
8a0da1 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Setattr on all character file device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8a0da1 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_setattr_all_chr_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file setattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:chr_file setattr;
|
|
Chris PeBenito |
8a0da1 |
')
|
|
Chris PeBenito |
8a0da1 |
|
|
Chris PeBenito |
8a0da1 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Read, write, create, and delete all block device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8a0da1 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_all_blk_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node;
|
|
Chris PeBenito |
cbc9d6 |
class dir rw_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class blk_file create_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:blk_file create_file_perms;
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
# these next rules are to satisfy assertions broken by the above lines.
|
|
Chris PeBenito |
0c73cd |
storage_raw_read_fixed_disk($1)
|
|
Chris PeBenito |
0c73cd |
storage_raw_write_fixed_disk($1)
|
|
Chris PeBenito |
0c73cd |
storage_read_scsi_generic($1)
|
|
Chris PeBenito |
0c73cd |
storage_write_scsi_generic($1)
|
|
Chris PeBenito |
32e53a |
')
|
|
Chris PeBenito |
32e53a |
|
|
Chris PeBenito |
32e53a |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Read, write, create, and delete all character device files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
32e53a |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_manage_all_chr_files',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
cbc9d6 |
attribute device_node, memory_raw_read, memory_raw_write;
|
|
Chris PeBenito |
cbc9d6 |
class dir rw_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file create_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 device_node:chr_file create_file_perms;
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
typeattribute $1 memory_raw_read, memory_raw_write;
|
|
Chris PeBenito |
32e53a |
')
|
|
Chris PeBenito |
32e53a |
|
|
Chris PeBenito |
32e53a |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write the agp devices.
|
|
Chris PeBenito |
f136a9 |
## </summary>
|
|
Chris PeBenito |
f136a9 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
f136a9 |
## </param>
|
|
Chris PeBenito |
f136a9 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_agp_dev',`
|
|
Chris PeBenito |
f136a9 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, agp_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 agp_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
########################################
|
|
Chris PeBenito |
f136a9 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Get the attributes of the apm bios device node.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain allowed access.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_getattr_apm_bios',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type device_t, apm_bios_t;
|
|
Chris PeBenito |
fd89e1 |
class dir r_dir_perms;
|
|
Chris PeBenito |
fd89e1 |
class chr_file getattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
fd89e1 |
allow $1 apm_bios_t:chr_file getattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Do not audit attempts to get the attributes of
|
|
Chris PeBenito |
fd89e1 |
## the apm bios device node.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain to not audit.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_dontaudit_getattr_apm_bios',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type apm_bios_t;
|
|
Chris PeBenito |
fd89e1 |
class chr_file getattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
dontaudit $1 apm_bios_t:chr_file getattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Set the attributes of the apm bios device node.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain allowed access.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_setattr_apm_bios',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type device_t, apm_bios_t;
|
|
Chris PeBenito |
fd89e1 |
class dir r_dir_perms;
|
|
Chris PeBenito |
fd89e1 |
class chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
fd89e1 |
allow $1 apm_bios_t:chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Do not audit attempts to set the attributes of
|
|
Chris PeBenito |
fd89e1 |
## the apm bios device node.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain to not audit.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_dontaudit_setattr_apm_bios',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type apm_bios_t;
|
|
Chris PeBenito |
fd89e1 |
class chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
dontaudit $1 apm_bios_t:chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
ebdc3b |
## Read and write the apm bios.
|
|
Chris PeBenito |
ebdc3b |
## </summary>
|
|
Chris PeBenito |
ebdc3b |
## <param name="domain">
|
|
Chris PeBenito |
ebdc3b |
## Domain allowed access.
|
|
Chris PeBenito |
ebdc3b |
## </param>
|
|
Chris PeBenito |
ebdc3b |
#
|
|
Chris PeBenito |
ebdc3b |
interface(`dev_rw_apm_bios',`
|
|
Chris PeBenito |
ebdc3b |
gen_require(`
|
|
Chris PeBenito |
ebdc3b |
type device_t, apm_bios_t;
|
|
Chris PeBenito |
ebdc3b |
class dir r_dir_perms;
|
|
Chris PeBenito |
ebdc3b |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
ebdc3b |
')
|
|
Chris PeBenito |
ebdc3b |
|
|
Chris PeBenito |
ebdc3b |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
ebdc3b |
allow $1 apm_bios_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
ebdc3b |
')
|
|
Chris PeBenito |
ebdc3b |
|
|
Chris PeBenito |
ebdc3b |
########################################
|
|
Chris PeBenito |
ebdc3b |
## <summary>
|
|
Chris PeBenito |
50f650 |
## Do not audit attempts to read and
|
|
Chris PeBenito |
50f650 |
## write the PCMCIA card manager device.
|
|
Chris PeBenito |
50f650 |
## </summary>
|
|
Chris PeBenito |
50f650 |
## <param name="domain">
|
|
Chris PeBenito |
50f650 |
## Domain to not audit.
|
|
Chris PeBenito |
50f650 |
## </param>
|
|
Chris PeBenito |
50f650 |
#
|
|
Chris PeBenito |
50f650 |
interface(`dev_dontaudit_rw_cardmgr',`
|
|
Chris PeBenito |
50f650 |
gen_require(`
|
|
Chris PeBenito |
50f650 |
type cardmgr_dev_t;
|
|
Chris PeBenito |
50f650 |
class chr_file { read write };
|
|
Chris PeBenito |
50f650 |
')
|
|
Chris PeBenito |
50f650 |
|
|
Chris PeBenito |
50f650 |
dontaudit $1 cardmgr_dev_t:chr_file { read write };
|
|
Chris PeBenito |
50f650 |
')
|
|
Chris PeBenito |
50f650 |
|
|
Chris PeBenito |
50f650 |
########################################
|
|
Chris PeBenito |
50f650 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the CPU identity.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
32e53a |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_cpuid',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, cpu_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 cpu_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write the the CPU microcode device. This
|
|
Chris PeBenito |
f136a9 |
## is required to load CPU microcode.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_cpu_microcode',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, cpu_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 cpu_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Getattr the agp devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_getattr_agp_dev',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, dri_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 dri_device_t:chr_file getattr;
|
|
Chris PeBenito |
f5c42b |
')
|
|
Chris PeBenito |
f5c42b |
|
|
Chris PeBenito |
f5c42b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write the dri devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
f5c42b |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_dri_dev',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, dri_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 dri_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
f5c42b |
')
|
|
Chris PeBenito |
f5c42b |
|
|
Chris PeBenito |
f5c42b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Dontaudit read and write on the dri devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain to dontaudit access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
f5c42b |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_rw_dri_dev',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type dri_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr read write ioctl };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 dri_device_t:chr_file { getattr read write ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read input event devices (/dev/input).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_input',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, event_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 event_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Get the attributes of the framebuffer device node.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_getattr_framebuffer',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, framebuf_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 framebuf_device_t:chr_file getattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the attributes of the framebuffer device node.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_setattr_framebuffer',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, framebuf_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file setattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 framebuf_device_t:chr_file setattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Dot not audit attempts to set the attributes
|
|
Chris PeBenito |
f136a9 |
## of the framebuffer device node.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain to not audit.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_setattr_framebuffer',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type framebuf_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file setattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 framebuf_device_t:chr_file setattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the framebuffer.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_framebuffer',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type framebuf_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 framebuf_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
a9a20d |
')
|
|
Chris PeBenito |
a9a20d |
|
|
Chris PeBenito |
a9a20d |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Do not audit attempts to read the framebuffer.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
a9a20d |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_read_framebuffer',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type framebuf_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 framebuf_device_t:chr_file { getattr read };
|
|
Chris PeBenito |
f5c42b |
')
|
|
Chris PeBenito |
f5c42b |
|
|
Chris PeBenito |
f5c42b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write the framebuffer.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
f5c42b |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_framebuffer',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, framebuf_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 framebuf_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the lvm comtrol device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_lvm_control',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, lvm_control_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 lvm_control_t:chr_file r_file_perms;
|
|
Chris PeBenito |
44a43b |
')
|
|
Chris PeBenito |
44a43b |
|
|
Chris PeBenito |
44a43b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write the lvm control device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_lvm_control',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, lvm_control_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 lvm_control_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Delete the lvm control device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_delete_lvm_control',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, lvm_control_t;
|
|
Chris PeBenito |
f136a9 |
class dir { getattr search read write remove_name };
|
|
Chris PeBenito |
f136a9 |
class chr_file unlink;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir { getattr search read write remove_name };
|
|
Chris PeBenito |
f136a9 |
allow $1 lvm_control_t:chr_file unlink;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read raw memory devices (e.g. /dev/mem).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
44a43b |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_raw_memory',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, memory_device_t;
|
|
Chris PeBenito |
f136a9 |
attribute memory_raw_read;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
f136a9 |
class capability sys_rawio;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 memory_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
allow $1 self:capability sys_rawio;
|
|
Chris PeBenito |
f136a9 |
typeattribute $1 memory_raw_read;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write raw memory devices (e.g. /dev/mem).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_raw_memory',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, memory_device_t;
|
|
Chris PeBenito |
f136a9 |
attribute memory_raw_write;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file write;
|
|
Chris PeBenito |
f136a9 |
class capability sys_rawio;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 memory_device_t:chr_file write;
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
allow $1 self:capability sys_rawio;
|
|
Chris PeBenito |
f136a9 |
typeattribute $1 memory_raw_write;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and execute raw memory devices (e.g. /dev/mem).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rx_raw_memory',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, memory_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file execute;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dev_read_raw_memory($1)
|
|
Chris PeBenito |
f136a9 |
allow $1 memory_device_t:chr_file execute;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write and execute raw memory devices (e.g. /dev/mem).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_wx_raw_memory',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, memory_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file execute;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dev_write_raw_memory($1)
|
|
Chris PeBenito |
f136a9 |
allow $1 memory_device_t:chr_file execute;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Get the attributes of miscellaneous devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_getattr_misc',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, misc_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 misc_device_t:chr_file getattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Do not audit attempts to get the attributes
|
|
Chris PeBenito |
f136a9 |
## of miscellaneous devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_getattr_misc',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type misc_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 misc_device_t:chr_file getattr;
|
|
Chris PeBenito |
b16c6b |
')
|
|
Chris PeBenito |
b16c6b |
|
|
Chris PeBenito |
b16c6b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the attributes of miscellaneous devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b16c6b |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_setattr_misc',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, misc_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file setattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 misc_device_t:chr_file setattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Do not audit attempts to set the attributes
|
|
Chris PeBenito |
f136a9 |
## of miscellaneous devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_setattr_misc',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type misc_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file setattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 misc_device_t:chr_file setattr;
|
|
Chris PeBenito |
b16c6b |
')
|
|
Chris PeBenito |
b16c6b |
|
|
Chris PeBenito |
b16c6b |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read miscellaneous devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b16c6b |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_misc',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, misc_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 misc_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write miscellaneous devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_misc',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, misc_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 misc_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Get the attributes of the mouse devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_getattr_mouse',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, mouse_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 mouse_device_t:chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the attributes of the mouse devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_setattr_mouse',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, mouse_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
fd89e1 |
class chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 mouse_device_t:chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the mouse devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_mouse',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, mouse_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 mouse_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the mtrr device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_mtrr',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, mtrr_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
cbc9d6 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 mtrr_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
d490eb |
')
|
|
Chris PeBenito |
d490eb |
|
|
Chris PeBenito |
d490eb |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write the mtrr device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
d490eb |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_mtrr',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, mtrr_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 mtrr_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
d490eb |
')
|
|
Chris PeBenito |
d490eb |
|
|
Chris PeBenito |
d490eb |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write to the null device (/dev/null).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_null_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, null_device_t;
|
|
Chris PeBenito |
f136a9 |
class device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 null_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the attributes of the printer device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_setattr_printer',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, printer_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir search;
|
|
Chris PeBenito |
f136a9 |
class chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir search;
|
|
Chris PeBenito |
f136a9 |
allow $1 printer_device_t:chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read from random devices (e.g., /dev/random)
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_rand',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, random_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 random_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write to the random device (e.g., /dev/random). This adds
|
|
Chris PeBenito |
f136a9 |
## entropy used to generate the random data read from the
|
|
Chris PeBenito |
f136a9 |
## random device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_rand',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, random_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 random_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the realtime clock (/dev/rtc).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
d490eb |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_realtime_clock',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, clock_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 clock_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the realtime clock (/dev/rtc).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_realtime_clock',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, clock_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { setattr lock write append ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 clock_device_t:chr_file { setattr lock write append ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and set the realtime clock (/dev/rtc).
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_realtime_clock',`
|
|
Chris PeBenito |
f136a9 |
dev_read_realtime_clock($1)
|
|
Chris PeBenito |
f136a9 |
dev_write_realtime_clock($1)
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Get the attributes of the scanner device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_getattr_scanner',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, scanner_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 scanner_device_t:chr_file getattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Do not audit attempts to get the attributes of
|
|
Chris PeBenito |
f136a9 |
## the scanner device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain to not audit.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_getattr_scanner',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type scanner_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 scanner_device_t:chr_file getattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the attributes of the scanner device.
|
|
Chris PeBenito |
a42ca7 |
## </summary>
|
|
Chris PeBenito |
a42ca7 |
## <param name="domain">
|
|
Chris PeBenito |
a42ca7 |
## Domain allowed access.
|
|
Chris PeBenito |
a42ca7 |
## </param>
|
|
Chris PeBenito |
a42ca7 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_setattr_scanner',`
|
|
Chris PeBenito |
a42ca7 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, scanner_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
a42ca7 |
')
|
|
Chris PeBenito |
a42ca7 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 scanner_device_t:chr_file setattr;
|
|
Chris PeBenito |
a42ca7 |
')
|
|
Chris PeBenito |
a42ca7 |
|
|
Chris PeBenito |
a42ca7 |
########################################
|
|
Chris PeBenito |
a42ca7 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Do not audit attempts to set the attributes of
|
|
Chris PeBenito |
f136a9 |
## the scanner device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain to not audit.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_dontaudit_setattr_scanner',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type scanner_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
f136a9 |
dontaudit $1 scanner_device_t:chr_file setattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write the scanner device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_scanner',`
|
|
Chris PeBenito |
cbc9d6 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, scanner_device_t;
|
|
Chris PeBenito |
cbc9d6 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
cbc9d6 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 scanner_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Get the attributes of the sound devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_getattr_snd_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, sound_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 sound_device_t:chr_file getattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Set the attributes of the sound devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_setattr_snd_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, sound_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 sound_device_t:chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the sound devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_snd_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, sound_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 sound_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write the sound devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_snd_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, sound_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 sound_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read the sound mixer devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_snd_mixer_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, sound_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr read ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 sound_device_t:chr_file { getattr read ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write the sound mixer devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_snd_mixer_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, sound_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 sound_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Get the attributes of the the power management device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_power_management',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t, power_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
allow $1 power_device_t:chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Set the attributes of the the power management device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_setattr_power_management',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t, power_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
allow $1 power_device_t:chr_file setattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
b4cd15 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Read and write the the power management device.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
b4cd15 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_rw_power_management',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t, power_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
0c73cd |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
0c73cd |
allow $1 power_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
b4cd15 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Get the attributes of sysfs directories.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The type of the process performing this action.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_sysfs_dir',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type sysfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
0c73cd |
|
|
Chris PeBenito |
7a2f20 |
allow $1 sysfs_t:dir getattr;
|
|
Chris PeBenito |
b4cd15 |
')
|
|
Chris PeBenito |
3b857e |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
b24f35 |
## Search the sysfs directories.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The type of the process performing this action.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_search_sysfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type sysfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir search;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 sysfs_t:dir search;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
ebdc3b |
## Do not audit attempts to search sysfs.
|
|
Chris PeBenito |
ebdc3b |
## </summary>
|
|
Chris PeBenito |
ebdc3b |
## <param name="domain">
|
|
Chris PeBenito |
ebdc3b |
## The type of the process performing this action.
|
|
Chris PeBenito |
ebdc3b |
## </param>
|
|
Chris PeBenito |
ebdc3b |
#
|
|
Chris PeBenito |
ebdc3b |
interface(`dev_dontaudit_search_sysfs',`
|
|
Chris PeBenito |
ebdc3b |
gen_require(`
|
|
Chris PeBenito |
ebdc3b |
type sysfs_t;
|
|
Chris PeBenito |
ebdc3b |
class dir search;
|
|
Chris PeBenito |
ebdc3b |
')
|
|
Chris PeBenito |
ebdc3b |
|
|
Chris PeBenito |
ebdc3b |
dontaudit $1 sysfs_t:dir search;
|
|
Chris PeBenito |
ebdc3b |
')
|
|
Chris PeBenito |
ebdc3b |
|
|
Chris PeBenito |
ebdc3b |
########################################
|
|
Chris PeBenito |
ebdc3b |
## <summary>
|
|
Chris PeBenito |
b24f35 |
## List the contents of the sysfs directories.
|
|
Chris PeBenito |
b24f35 |
## </summary>
|
|
Chris PeBenito |
b24f35 |
## <param name="domain">
|
|
Chris PeBenito |
b24f35 |
## The type of the process performing this action.
|
|
Chris PeBenito |
b24f35 |
## </param>
|
|
Chris PeBenito |
b24f35 |
#
|
|
Chris PeBenito |
b24f35 |
interface(`dev_list_sysfs',`
|
|
Chris PeBenito |
b24f35 |
gen_require(`
|
|
Chris PeBenito |
b24f35 |
type sysfs_t;
|
|
Chris PeBenito |
b24f35 |
class dir r_dir_perms;
|
|
Chris PeBenito |
b24f35 |
')
|
|
Chris PeBenito |
b24f35 |
|
|
Chris PeBenito |
b24f35 |
allow $1 sysfs_t:dir r_dir_perms;
|
|
Chris PeBenito |
b24f35 |
')
|
|
Chris PeBenito |
b24f35 |
|
|
Chris PeBenito |
b24f35 |
########################################
|
|
Chris PeBenito |
b24f35 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow caller to read hardware state information.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The process type reading hardware state information.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_read_sysfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type sysfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
class lnk_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 sysfs_t:dir r_dir_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 sysfs_t:{ file lnk_file } r_file_perms;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow caller to modify hardware state information.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The process type modifying hardware state information.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_rw_sysfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type sysfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
class lnk_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 sysfs_t:dir r_dir_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 sysfs_t:lnk_file r_file_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 sysfs_t:file rw_file_perms;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read from pseudo random devices (e.g., /dev/urandom)
|
|
Chris PeBenito |
f136a9 |
## </summary>
|
|
Chris PeBenito |
f136a9 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
f136a9 |
## </param>
|
|
Chris PeBenito |
f136a9 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_read_urand',`
|
|
Chris PeBenito |
f136a9 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, urandom_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 urandom_device_t:chr_file r_file_perms;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
########################################
|
|
Chris PeBenito |
f136a9 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Write to the pseudo random device (e.g., /dev/urandom). This
|
|
Chris PeBenito |
f136a9 |
## sets the random number generator seed.
|
|
Chris PeBenito |
f136a9 |
## </summary>
|
|
Chris PeBenito |
f136a9 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
f136a9 |
## </param>
|
|
Chris PeBenito |
f136a9 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_write_urand',`
|
|
Chris PeBenito |
f136a9 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, urandom_device_t;
|
|
Chris PeBenito |
f136a9 |
class dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file { getattr write ioctl };
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 urandom_device_t:chr_file { getattr write ioctl };
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
########################################
|
|
Chris PeBenito |
f136a9 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Mount a usbfs filesystem.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## The type of the process performing this action.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_mount_usbfs',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type usbfs_t;
|
|
Chris PeBenito |
fd89e1 |
class filesystem mount;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
allow $1 usbfs_t:filesystem mount;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
a42ca7 |
## Get the attributes of a directory in the usb filesystem.
|
|
Chris PeBenito |
a42ca7 |
## </summary>
|
|
Chris PeBenito |
a42ca7 |
## <param name="domain">
|
|
Chris PeBenito |
a42ca7 |
## Domain allowed access.
|
|
Chris PeBenito |
a42ca7 |
## </param>
|
|
Chris PeBenito |
a42ca7 |
#
|
|
Chris PeBenito |
a42ca7 |
interface(`dev_getattr_usbfs_dir',`
|
|
Chris PeBenito |
a42ca7 |
gen_require(`
|
|
Chris PeBenito |
a42ca7 |
type usbfs_t;
|
|
Chris PeBenito |
a42ca7 |
class dir getattr;
|
|
Chris PeBenito |
a42ca7 |
')
|
|
Chris PeBenito |
a42ca7 |
|
|
Chris PeBenito |
a42ca7 |
allow $1 usbfs_t:dir getattr;
|
|
Chris PeBenito |
a42ca7 |
')
|
|
Chris PeBenito |
a42ca7 |
|
|
Chris PeBenito |
a42ca7 |
########################################
|
|
Chris PeBenito |
a42ca7 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Search the directory containing USB hardware information.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The type of the process performing this action.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_search_usbfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type usbfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir search;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:dir search;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow caller to get a list of usb hardware.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The process type getting the list.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_list_usbfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type usbfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class file getattr;
|
|
Chris PeBenito |
7a2f20 |
class lnk_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:dir r_dir_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:lnk_file r_file_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:file getattr;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Read USB hardware information using
|
|
Chris PeBenito |
414e41 |
## the usbfs filesystem interface.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The type of the process performing this action.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_read_usbfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type usbfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
class lnk_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:dir r_dir_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:{ file lnk_file } r_file_perms;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Allow caller to modify usb hardware configuration files.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
414e41 |
## The process type modifying the options.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
8bd678 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_rw_usbfs',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type usbfs_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class file rw_file_perms;
|
|
Chris PeBenito |
7a2f20 |
class lnk_file r_file_perms;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:dir r_dir_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:lnk_file r_file_perms;
|
|
Chris PeBenito |
8bd678 |
allow $1 usbfs_t:file rw_file_perms;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
414e41 |
## Get the attributes of video4linux devices.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_getattr_video_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t, v4l_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
allow $1 v4l_device_t:chr_file getattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
########################################
|
|
Chris PeBenito |
414e41 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Do not audit attempts to get the attributes
|
|
Chris PeBenito |
fd89e1 |
## of video4linux device nodes.
|
|
Chris PeBenito |
414e41 |
## </summary>
|
|
Chris PeBenito |
414e41 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain to not audit.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_dontaudit_getattr_video_dev',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type v4l_device_t;
|
|
Chris PeBenito |
fd89e1 |
class chr_file getattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
dontaudit $1 v4l_device_t:chr_file getattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Set the attributes of video4linux device nodes.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain allowed access.
|
|
Chris PeBenito |
414e41 |
## </param>
|
|
Chris PeBenito |
7a2f20 |
#
|
|
Chris PeBenito |
199895 |
interface(`dev_setattr_video_dev',`
|
|
Chris PeBenito |
7a2f20 |
gen_require(`
|
|
Chris PeBenito |
7a2f20 |
type device_t, v4l_device_t;
|
|
Chris PeBenito |
7a2f20 |
class dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
class chr_file setattr;
|
|
Chris PeBenito |
7a2f20 |
')
|
|
Chris PeBenito |
7a2f20 |
|
|
Chris PeBenito |
7a2f20 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
7a2f20 |
allow $1 v4l_device_t:chr_file setattr;
|
|
Chris PeBenito |
8bd678 |
')
|
|
Chris PeBenito |
8bd678 |
|
|
Chris PeBenito |
fd89e1 |
########################################
|
|
Chris PeBenito |
fd89e1 |
## <summary>
|
|
Chris PeBenito |
fd89e1 |
## Do not audit attempts to set the attributes
|
|
Chris PeBenito |
fd89e1 |
## of video4linux device nodes.
|
|
Chris PeBenito |
fd89e1 |
## </summary>
|
|
Chris PeBenito |
fd89e1 |
## <param name="domain">
|
|
Chris PeBenito |
fd89e1 |
## Domain to not audit.
|
|
Chris PeBenito |
fd89e1 |
## </param>
|
|
Chris PeBenito |
fd89e1 |
#
|
|
Chris PeBenito |
fd89e1 |
interface(`dev_dontaudit_setattr_video_dev',`
|
|
Chris PeBenito |
fd89e1 |
gen_require(`
|
|
Chris PeBenito |
fd89e1 |
type v4l_device_t;
|
|
Chris PeBenito |
fd89e1 |
class chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
fd89e1 |
|
|
Chris PeBenito |
fd89e1 |
dontaudit $1 v4l_device_t:chr_file setattr;
|
|
Chris PeBenito |
fd89e1 |
')
|
|
Chris PeBenito |
9726b3 |
|
|
Chris PeBenito |
9726b3 |
########################################
|
|
Chris PeBenito |
9726b3 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read and write to the zero device (/dev/zero).
|
|
Chris PeBenito |
f136a9 |
## </summary>
|
|
Chris PeBenito |
f136a9 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
f136a9 |
## </param>
|
|
Chris PeBenito |
f136a9 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rw_zero_dev',`
|
|
Chris PeBenito |
f136a9 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type device_t, zero_device_t;
|
|
Chris PeBenito |
f136a9 |
class device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
class chr_file r_file_perms;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
allow $1 device_t:dir r_dir_perms;
|
|
Chris PeBenito |
f136a9 |
allow $1 zero_device_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
########################################
|
|
Chris PeBenito |
f136a9 |
## <summary>
|
|
Chris PeBenito |
f136a9 |
## Read, write, and execute the zero device (/dev/zero).
|
|
Chris PeBenito |
f136a9 |
## </summary>
|
|
Chris PeBenito |
f136a9 |
## <param name="domain">
|
|
Chris PeBenito |
f136a9 |
## Domain allowed access.
|
|
Chris PeBenito |
f136a9 |
## </param>
|
|
Chris PeBenito |
f136a9 |
#
|
|
Chris PeBenito |
f136a9 |
interface(`dev_rwx_zero_dev',`
|
|
Chris PeBenito |
f136a9 |
gen_require(`
|
|
Chris PeBenito |
f136a9 |
type zero_device_t;
|
|
Chris PeBenito |
f136a9 |
class chr_file execute;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
dev_rw_zero_dev($1)
|
|
Chris PeBenito |
f136a9 |
allow $1 zero_device_t:chr_file execute;
|
|
Chris PeBenito |
f136a9 |
')
|
|
Chris PeBenito |
f136a9 |
|
|
Chris PeBenito |
f136a9 |
########################################
|
|
Chris PeBenito |
f136a9 |
## <summary>
|
|
Chris PeBenito |
9726b3 |
## Unconfined access to devices.
|
|
Chris PeBenito |
9726b3 |
## </summary>
|
|
Chris PeBenito |
9726b3 |
## <param name="domain">
|
|
Chris PeBenito |
9726b3 |
## Domain allowed access.
|
|
Chris PeBenito |
9726b3 |
## </param>
|
|
Chris PeBenito |
9726b3 |
#
|
|
Chris PeBenito |
9726b3 |
interface(`dev_unconfined',`
|
|
Chris PeBenito |
9726b3 |
gen_require(`
|
|
Chris PeBenito |
9726b3 |
attribute device_node, memory_raw_write, memory_raw_read;
|
|
Chris PeBenito |
9726b3 |
type mtrr_device_t;
|
|
Chris PeBenito |
9726b3 |
')
|
|
Chris PeBenito |
9726b3 |
|
|
Chris PeBenito |
9726b3 |
allow $1 device_node:devfile_class_set *;
|
|
Chris PeBenito |
9726b3 |
allow $1 mtrr_device_t:file *;
|
|
Chris PeBenito |
9726b3 |
|
|
Chris PeBenito |
9726b3 |
allow $1 self:capability sys_rawio;
|
|
Chris PeBenito |
9726b3 |
typeattribute $1 memory_raw_write, memory_raw_read;
|
|
Chris PeBenito |
9726b3 |
')
|
|
Chris PeBenito |
9726b3 |
|