123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143 |
- ## <summary>Policy for the kernel modules, kernel image, and bootloader.</summary>
- ########################################
- ## <summary>
- ## Execute bootloader in the bootloader domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`bootloader_domtrans',`
- gen_require(`
- type bootloader_t, bootloader_exec_t;
- ')
- corecmd_search_bin($1)
- domtrans_pattern($1, bootloader_exec_t, bootloader_t)
- ')
- ########################################
- ## <summary>
- ## Execute bootloader interactively and do
- ## a domain transition to the bootloader domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`bootloader_run',`
- gen_require(`
- attribute_role bootloader_roles;
- ')
- bootloader_domtrans($1)
- roleattribute $2 bootloader_roles;
- ')
- ########################################
- ## <summary>
- ## Execute bootloader in the caller domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bootloader_exec',`
- gen_require(`
- type bootloader_exec_t;
- ')
- corecmd_search_bin($1)
- can_exec($1, bootloader_exec_t)
- ')
- ########################################
- ## <summary>
- ## Read the bootloader configuration file.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bootloader_read_config',`
- gen_require(`
- type bootloader_etc_t;
- ')
- allow $1 bootloader_etc_t:file read_file_perms;
- ')
- ########################################
- ## <summary>
- ## Read and write the bootloader
- ## configuration file.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`bootloader_rw_config',`
- gen_require(`
- type bootloader_etc_t;
- ')
- allow $1 bootloader_etc_t:file rw_file_perms;
- ')
- ########################################
- ## <summary>
- ## Read and write the bootloader
- ## temporary data in /tmp.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bootloader_rw_tmp_files',`
- gen_require(`
- type bootloader_tmp_t;
- ')
- files_search_tmp($1)
- allow $1 bootloader_tmp_t:file rw_file_perms;
- ')
- ########################################
- ## <summary>
- ## Read and write the bootloader
- ## temporary data in /tmp.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bootloader_create_runtime_file',`
- gen_require(`
- type boot_runtime_t;
- ')
- allow $1 boot_runtime_t:file { create_file_perms rw_file_perms };
- files_boot_filetrans($1, boot_runtime_t, file)
- ')
|