Blob Blame History Raw
## <summary>PCMCIA card management services</summary>

########################################
## <summary>
##	PCMCIA stub interface.  No access allowed.
## </summary>
## <param name="domain" optional="true">
##	N/A
## </param>
#
interface(`pcmcia_stub',`
	gen_require(`
		type cardmgr_t;
	')
')

########################################
## <summary>
##	Execute cardmgr in the cardmgr domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`pcmcia_domtrans_cardmgr',`
	gen_require(`
		type cardmgr_t, cardmgr_exec_t;
	')

	domain_auto_trans($1,cardmgr_exec_t,cardmgr_t)

	allow $1 cardmgr_t:fd use;
	allow cardmgr_t $1:fd use;
	allow cardmgr_t $1:fifo_file rw_file_perms;
	allow cardmgr_t $1:process sigchld;
')

########################################
## <summary>
##	Inherit and use file descriptors from cardmgr.
## </summary>
## <param name="domain">
##	Domain allowed access.
## </param>
#
interface(`pcmcia_use_cardmgr_fd',`
	gen_require(`
		type cardmgr_t;
	')

	allow $1 cardmgr_t:fd use;
')

########################################
## <summary>
##	Execute cardctl in the cardmgr domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
#
interface(`pcmcia_domtrans_cardctl',`
	gen_require(`
		type cardmgr_t, cardctl_exec_t;
	')

	domain_auto_trans($1,cardctl_exec_t,cardmgr_t)

	allow $1 cardmgr_t:fd use;
	allow cardmgr_t $1:fd use;
	allow cardmgr_t $1:fifo_file rw_file_perms;
	allow cardmgr_t $1:process sigchld;
')

########################################
## <summary>
##	Execute cardmgr in the cardctl domain, and
##	allow the specified role the cardmgr domain.
## </summary>
## <param name="domain">
##	The type of the process performing this action.
## </param>
## <param name="role">
##	The role to be allowed the cardmgr domain.
## </param>
## <param name="terminal">
##	The type of the terminal allow the cardmgr domain to use.
## </param>
#
interface(`pcmcia_run_cardctl',`
	gen_require(`
		type cardmgr_t;
	')

	pcmcia_domtrans_cardctl($1)
	role $2 types cardmgr_t;
	allow cardmgr_t $3:chr_file rw_term_perms;
')

########################################
## <summary>
##	Read cardmgr pid files.
## </summary>
## <param name="domain">
##	Domain allowed access.
## </param>
#
interface(`pcmcia_read_pid',`
	gen_require(`
		type cardmgr_var_run_t;
	')

	files_search_pids($1)
	allow $1 cardmgr_var_run_t:dir r_dir_perms;
	allow $1 cardmgr_var_run_t:file r_file_perms;
	allow $1 cardmgr_var_run_t:lnk_file { getattr read };
')

########################################
## <summary>
##	Create, read, write, and delete
##	cardmgr pid files.
## </summary>
## <param name="domain">
##	Domain allowed access.
## </param>
#
interface(`pcmcia_manage_pid',`
	gen_require(`
		type cardmgr_var_run_t;
	')

	files_search_pids($1)
	allow $1 cardmgr_var_run_t:dir rw_dir_perms;
	allow $1 cardmgr_var_run_t:file create_file_perms;
')

########################################
## <summary>
##	Create, read, write, and delete
##	cardmgr runtime character nodes.
## </summary>
## <param name="domain">
##	Domain allowed access.
## </param>
#
interface(`pcmcia_manage_runtime_chr',`
	gen_require(`
		type cardmgr_var_run_t;
	')

	files_search_pids($1)
	allow $1 cardmgr_var_run_t:dir rw_dir_perms;
	allow $1 cardmgr_var_run_t:chr_file create_file_perms;
')