+++ /dev/null
-## <summary>Policy for Mozilla and related web browsers</summary>
-
-########################################
-## <summary>
-## Role access for mozilla
-## </summary>
-## <param name="role">
-## <summary>
-## Role allowed access
-## </summary>
-## </param>
-## <param name="domain">
-## <summary>
-## User domain for the role
-## </summary>
-## </param>
-#
-interface(`mozilla_role',`
- gen_require(`
- type mozilla_t, mozilla_exec_t, mozilla_home_t;
- ')
-
- role $1 types mozilla_t;
-
- domain_auto_trans($2, mozilla_exec_t, mozilla_t)
- # Unrestricted inheritance from the caller.
- allow $2 mozilla_t:process { noatsecure siginh rlimitinh };
- allow mozilla_t $2:fd use;
- allow mozilla_t $2:process { sigchld signull };
- allow mozilla_t $2:unix_stream_socket connectto;
-
- mozilla_run_plugin(mozilla_t, $1)
-
- # Allow the user domain to signal/ps.
- ps_process_pattern($2, mozilla_t)
- allow $2 mozilla_t:process signal_perms;
-
- allow $2 mozilla_t:fd use;
- allow $2 mozilla_t:shm { associate getattr };
- allow $2 mozilla_t:shm { unix_read unix_write };
- allow $2 mozilla_t:unix_stream_socket connectto;
-
- # X access, Home files
- manage_dirs_pattern($2, mozilla_home_t, mozilla_home_t)
- manage_files_pattern($2, mozilla_home_t, mozilla_home_t)
- manage_lnk_files_pattern($2, mozilla_home_t, mozilla_home_t)
- relabel_dirs_pattern($2, mozilla_home_t, mozilla_home_t)
- relabel_files_pattern($2, mozilla_home_t, mozilla_home_t)
- relabel_lnk_files_pattern($2, mozilla_home_t, mozilla_home_t)
-
- mozilla_run_plugin(mozilla_t, $1)
- mozilla_dbus_chat($2)
-
- userdom_manage_tmp_role($1, mozilla_t)
-
- optional_policy(`
- pulseaudio_role($1, mozilla_t)
- pulseaudio_filetrans_admin_home_content(mozilla_t)
- pulseaudio_filetrans_home_content(mozilla_t)
- ')
-
- mozilla_filetrans_home_content($2)
-')
-
-########################################
-## <summary>
-## Read mozilla home directory content
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_read_user_home_files',`
- gen_require(`
- type mozilla_home_t;
- ')
-
- allow $1 mozilla_home_t:dir list_dir_perms;
- allow $1 mozilla_home_t:file read_file_perms;
- allow $1 mozilla_home_t:lnk_file read_lnk_file_perms;
- userdom_search_user_home_dirs($1)
-')
-
-########################################
-## <summary>
-## Write mozilla home directory content
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_write_user_home_files',`
- gen_require(`
- type mozilla_home_t;
- ')
-
- write_files_pattern($1, mozilla_home_t, mozilla_home_t)
- userdom_search_user_home_dirs($1)
-')
-
-########################################
-## <summary>
-## Dontaudit attempts to read/write mozilla home directory content
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain to not audit.
-## </summary>
-## </param>
-#
-interface(`mozilla_dontaudit_rw_user_home_files',`
- gen_require(`
- type mozilla_home_t;
- ')
-
- dontaudit $1 mozilla_home_t:file rw_inherited_file_perms;
-')
-
-########################################
-## <summary>
-## Dontaudit attempts to write mozilla home directory content
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain to not audit.
-## </summary>
-## </param>
-#
-interface(`mozilla_dontaudit_manage_user_home_files',`
- gen_require(`
- type mozilla_home_t;
- ')
-
- dontaudit $1 mozilla_home_t:dir manage_dir_perms;
- dontaudit $1 mozilla_home_t:file manage_file_perms;
-')
-
-########################################
-## <summary>
-## Execute mozilla home directory content.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_exec_user_home_files',`
- gen_require(`
- type mozilla_home_t;
- ')
-
- can_exec($1, mozilla_home_t)
-')
-
-########################################
-## <summary>
-## Execmod mozilla home directory content.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_execmod_user_home_files',`
- gen_require(`
- type mozilla_home_t;
- ')
-
- allow $1 mozilla_home_t:file execmod;
-')
-
-########################################
-## <summary>
-## Run mozilla in the mozilla domain.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed to transition.
-## </summary>
-## </param>
-#
-interface(`mozilla_domtrans',`
- gen_require(`
- type mozilla_t, mozilla_exec_t;
- ')
-
- domtrans_pattern($1, mozilla_exec_t, mozilla_t)
-')
-
-########################################
-## <summary>
-## Execute a domain transition to run mozilla_plugin.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_domtrans_plugin',`
- gen_require(`
- type mozilla_plugin_t, mozilla_plugin_exec_t;
- type mozilla_plugin_config_t, mozilla_plugin_config_exec_t;
- type mozilla_plugin_rw_t;
- class dbus send_msg;
- ')
-
- domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t)
- domtrans_pattern($1, mozilla_plugin_config_exec_t, mozilla_plugin_config_t)
- allow mozilla_plugin_t $1:process signull;
- allow $1 mozilla_plugin_t:unix_stream_socket { connectto rw_socket_perms };
- allow $1 mozilla_plugin_t:fd use;
-
- allow mozilla_plugin_t $1:unix_stream_socket rw_socket_perms;
- allow mozilla_plugin_t $1:shm { rw_shm_perms destroy };
- allow mozilla_plugin_t $1:sem create_sem_perms;
-
- ps_process_pattern($1, mozilla_plugin_t)
- allow $1 mozilla_plugin_t:process signal_perms;
-
- list_dirs_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
- read_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
- read_lnk_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
- can_exec($1, mozilla_plugin_rw_t)
-
- #mozilla_filetrans_home_content($1)
-')
-
-########################################
-## <summary>
-## Execute mozilla_plugin in the mozilla_plugin domain, and
-## allow the specified role the mozilla_plugin domain.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access
-## </summary>
-## </param>
-## <param name="role">
-## <summary>
-## The role to be allowed the mozilla_plugin domain.
-## </summary>
-## </param>
-#
-interface(`mozilla_run_plugin',`
- gen_require(`
- type mozilla_plugin_t;
- ')
-
- mozilla_domtrans_plugin($1)
- role $2 types mozilla_plugin_t;
- role $2 types mozilla_plugin_config_t;
-')
-
-#######################################
-## <summary>
-## Execute qemu unconfined programs in the role.
-## </summary>
-## <param name="role">
-## <summary>
-## The role to allow the mozilla_plugin domain.
-## </summary>
-## </param>
-## <rolecap/>
-#
-interface(`mozilla_role_plugin',`
- gen_require(`
- type mozilla_plugin_t;
- ')
-
- role $1 types mozilla_plugin_t;
- role $1 types mozilla_plugin_config_t;
-')
-
-########################################
-## <summary>
-## Send and receive messages from
-## mozilla over dbus.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_dbus_chat',`
- gen_require(`
- type mozilla_t;
- class dbus send_msg;
- ')
-
- allow $1 mozilla_t:dbus send_msg;
- allow mozilla_t $1:dbus send_msg;
-')
-
-########################################
-## <summary>
-## read/write mozilla per user tcp_socket
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_rw_tcp_sockets',`
- gen_require(`
- type mozilla_t;
- ')
-
- allow $1 mozilla_t:tcp_socket rw_socket_perms;
-')
-
-#######################################
-## <summary>
-## Read mozilla_plugin tmpfs files
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access
-## </summary>
-## </param>
-#
-interface(`mozilla_plugin_read_tmpfs_files',`
- gen_require(`
- type mozilla_plugin_tmpfs_t;
- ')
-
- allow $1 mozilla_plugin_tmpfs_t:file read_file_perms;
-')
-
-########################################
-## <summary>
-## Delete mozilla_plugin tmpfs files
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access
-## </summary>
-## </param>
-#
-interface(`mozilla_plugin_delete_tmpfs_files',`
- gen_require(`
- type mozilla_plugin_tmpfs_t;
- ')
-
- allow $1 mozilla_plugin_tmpfs_t:file delete_file_perms;
-')
-
-########################################
-## <summary>
-## Dontaudit read/write to a mozilla_plugin leaks
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain to not audit.
-## </summary>
-## </param>
-#
-interface(`mozilla_plugin_dontaudit_leaks',`
- gen_require(`
- type mozilla_plugin_t;
- ')
-
- dontaudit $1 mozilla_plugin_t:unix_stream_socket { read write };
-')
-
-########################################
-## <summary>
-## Create, read, write, and delete
-## mozilla_plugin rw files.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_plugin_manage_rw_files',`
- gen_require(`
- type mozilla_plugin_rw_t;
- ')
-
- allow $1 mozilla_plugin_rw_t:file manage_file_perms;
- allow $1 mozilla_plugin_rw_t:dir rw_dir_perms;
-')
-
-########################################
-## <summary>
-## Create mozilla content in the user home directory
-## with an correct label.
-## </summary>
-## <param name="domain">
-## <summary>
-## Domain allowed access.
-## </summary>
-## </param>
-#
-interface(`mozilla_filetrans_home_content',`
-
- gen_require(`
- type mozilla_home_t;
- ')
-
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".galeon")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".java")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".mozilla")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".thunderbird")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".netscape")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".phoenix")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".adobe")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".macromedia")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".gnash")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".gcjwebplugin")
- userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".icedteaplugin")
-')
-
+++ /dev/null
-policy_module(mozilla, 2.3.3)
-
-########################################
-#
-# Declarations
-#
-
-## <desc>
-## <p>
-## Allow confined web browsers to read home directory content
-## </p>
-## </desc>
-gen_tunable(mozilla_read_content, false)
-
-type mozilla_t;
-type mozilla_exec_t;
-typealias mozilla_t alias { user_mozilla_t staff_mozilla_t sysadm_mozilla_t };
-typealias mozilla_t alias { auditadm_mozilla_t secadm_mozilla_t };
-application_domain(mozilla_t, mozilla_exec_t)
-ubac_constrained(mozilla_t)
-
-type mozilla_conf_t;
-files_config_file(mozilla_conf_t)
-
-type mozilla_home_t;
-typealias mozilla_home_t alias { user_mozilla_home_t staff_mozilla_home_t sysadm_mozilla_home_t };
-typealias mozilla_home_t alias { auditadm_mozilla_home_t secadm_mozilla_home_t };
-files_poly_member(mozilla_home_t)
-userdom_user_home_content(mozilla_home_t)
-
-type mozilla_plugin_t;
-type mozilla_plugin_exec_t;
-application_domain(mozilla_plugin_t, mozilla_plugin_exec_t)
-role system_r types mozilla_plugin_t;
-
-type mozilla_plugin_tmp_t;
-userdom_user_tmp_content(mozilla_plugin_tmp_t)
-files_tmp_file(mozilla_plugin_tmp_t)
-ubac_constrained(mozilla_plugin_tmp_t)
-
-type mozilla_plugin_tmpfs_t;
-userdom_user_tmpfs_content(mozilla_plugin_tmpfs_t)
-files_tmpfs_file(mozilla_plugin_tmpfs_t)
-ubac_constrained(mozilla_plugin_tmpfs_t)
-
-type mozilla_plugin_rw_t;
-files_type(mozilla_plugin_rw_t)
-
-type mozilla_plugin_config_t;
-type mozilla_plugin_config_exec_t;
-application_domain(mozilla_plugin_config_t, mozilla_plugin_config_exec_t)
-
-type mozilla_tmp_t;
-files_tmp_file(mozilla_tmp_t)
-ubac_constrained(mozilla_tmp_t)
-
-type mozilla_tmpfs_t;
-typealias mozilla_tmpfs_t alias { user_mozilla_tmpfs_t staff_mozilla_tmpfs_t sysadm_mozilla_tmpfs_t };
-typealias mozilla_tmpfs_t alias { auditadm_mozilla_tmpfs_t secadm_mozilla_tmpfs_t };
-files_tmpfs_file(mozilla_tmpfs_t)
-ubac_constrained(mozilla_tmpfs_t)
-
-########################################
-#
-# Local policy
-#
-
-allow mozilla_t self:capability { sys_nice setgid setuid };
-allow mozilla_t self:process { sigkill signal setsched getsched setrlimit };
-allow mozilla_t self:fifo_file rw_fifo_file_perms;
-allow mozilla_t self:shm { unix_read unix_write read write destroy create };
-allow mozilla_t self:sem create_sem_perms;
-allow mozilla_t self:socket create_socket_perms;
-allow mozilla_t self:unix_stream_socket { listen accept };
-# Browse the web, connect to printer
-allow mozilla_t self:tcp_socket create_socket_perms;
-allow mozilla_t self:netlink_route_socket r_netlink_socket_perms;
-
-# for bash - old mozilla binary
-can_exec(mozilla_t, mozilla_exec_t)
-
-# X access, Home files
-manage_dirs_pattern(mozilla_t, mozilla_home_t, mozilla_home_t)
-manage_files_pattern(mozilla_t, mozilla_home_t, mozilla_home_t)
-manage_lnk_files_pattern(mozilla_t, mozilla_home_t, mozilla_home_t)
-userdom_search_user_home_dirs(mozilla_t)
-userdom_user_home_dir_filetrans(mozilla_t, mozilla_home_t, dir)
-
-# Mozpluggerrc
-allow mozilla_t mozilla_conf_t:file read_file_perms;
-
-manage_files_pattern(mozilla_t, mozilla_tmp_t, mozilla_tmp_t)
-manage_dirs_pattern(mozilla_t, mozilla_tmp_t, mozilla_tmp_t)
-files_tmp_filetrans(mozilla_t, mozilla_tmp_t, { file dir })
-
-manage_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
-manage_lnk_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
-manage_fifo_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
-manage_sock_files_pattern(mozilla_t, mozilla_tmpfs_t, mozilla_tmpfs_t)
-fs_tmpfs_filetrans(mozilla_t, mozilla_tmpfs_t, { file lnk_file sock_file fifo_file })
-
-kernel_read_kernel_sysctls(mozilla_t)
-kernel_read_network_state(mozilla_t)
-# Access /proc, sysctl
-kernel_read_system_state(mozilla_t)
-kernel_read_net_sysctls(mozilla_t)
-
-# Look for plugins
-corecmd_list_bin(mozilla_t)
-# for bash - old mozilla binary
-corecmd_exec_shell(mozilla_t)
-corecmd_exec_bin(mozilla_t)
-
-# Browse the web, connect to printer
-corenet_all_recvfrom_unlabeled(mozilla_t)
-corenet_all_recvfrom_netlabel(mozilla_t)
-corenet_tcp_sendrecv_generic_if(mozilla_t)
-corenet_raw_sendrecv_generic_if(mozilla_t)
-corenet_tcp_sendrecv_generic_node(mozilla_t)
-corenet_raw_sendrecv_generic_node(mozilla_t)
-corenet_tcp_sendrecv_http_port(mozilla_t)
-corenet_tcp_sendrecv_http_cache_port(mozilla_t)
-corenet_tcp_sendrecv_squid_port(mozilla_t)
-corenet_tcp_connect_flash_port(mozilla_t)
-corenet_tcp_sendrecv_ftp_port(mozilla_t)
-corenet_tcp_connect_all_ephemeral_ports(mozilla_t)
-corenet_tcp_sendrecv_ipp_port(mozilla_t)
-corenet_tcp_connect_http_port(mozilla_t)
-corenet_tcp_connect_http_cache_port(mozilla_t)
-corenet_tcp_connect_squid_port(mozilla_t)
-corenet_tcp_connect_ftp_port(mozilla_t)
-corenet_tcp_connect_ipp_port(mozilla_t)
-corenet_tcp_connect_generic_port(mozilla_t)
-corenet_tcp_connect_soundd_port(mozilla_t)
-corenet_sendrecv_http_client_packets(mozilla_t)
-corenet_sendrecv_http_cache_client_packets(mozilla_t)
-corenet_sendrecv_squid_client_packets(mozilla_t)
-corenet_sendrecv_ftp_client_packets(mozilla_t)
-corenet_sendrecv_ipp_client_packets(mozilla_t)
-corenet_sendrecv_generic_client_packets(mozilla_t)
-# Should not need other ports
-corenet_dontaudit_tcp_sendrecv_generic_port(mozilla_t)
-corenet_dontaudit_tcp_bind_generic_port(mozilla_t)
-corenet_tcp_connect_speech_port(mozilla_t)
-
-dev_read_urand(mozilla_t)
-dev_read_rand(mozilla_t)
-dev_write_sound(mozilla_t)
-dev_read_sound(mozilla_t)
-dev_dontaudit_rw_dri(mozilla_t)
-dev_getattr_sysfs_dirs(mozilla_t)
-
-domain_dontaudit_read_all_domains_state(mozilla_t)
-
-files_read_etc_runtime_files(mozilla_t)
-files_read_usr_files(mozilla_t)
-files_read_etc_files(mozilla_t)
-# /var/lib
-files_read_var_lib_files(mozilla_t)
-# interacting with gstreamer
-files_read_var_files(mozilla_t)
-files_read_var_symlinks(mozilla_t)
-files_dontaudit_getattr_boot_dirs(mozilla_t)
-
-fs_search_auto_mountpoints(mozilla_t)
-fs_list_inotifyfs(mozilla_t)
-fs_rw_tmpfs_files(mozilla_t)
-
-term_dontaudit_getattr_pty_dirs(mozilla_t)
-
-auth_use_nsswitch(mozilla_t)
-
-logging_send_syslog_msg(mozilla_t)
-
-miscfiles_read_fonts(mozilla_t)
-miscfiles_read_localization(mozilla_t)
-miscfiles_dontaudit_setattr_fonts_dirs(mozilla_t)
-
-# Browse the web, connect to printer
-sysnet_dns_name_resolve(mozilla_t)
-
-userdom_use_inherited_user_ptys(mozilla_t)
-
-xserver_user_x_domain_template(mozilla, mozilla_t, mozilla_tmpfs_t)
-xserver_dontaudit_read_xdm_tmp_files(mozilla_t)
-xserver_dontaudit_getattr_xdm_tmp_sockets(mozilla_t)
-
-tunable_policy(`allow_execstack',`
- allow mozilla_t self:process execstack;
-')
-
-tunable_policy(`deny_execmem',`',`
- allow mozilla_t self:process execmem;
-')
-
-userdom_home_manager(mozilla_t)
-
-# Uploads, local html
-tunable_policy(`mozilla_read_content && use_nfs_home_dirs',`
- fs_list_auto_mountpoints(mozilla_t)
- files_list_home(mozilla_t)
- fs_read_nfs_files(mozilla_t)
- fs_read_nfs_symlinks(mozilla_t)
-
-',`
- files_dontaudit_list_home(mozilla_t)
- fs_dontaudit_list_auto_mountpoints(mozilla_t)
- fs_dontaudit_read_nfs_files(mozilla_t)
- fs_dontaudit_list_nfs(mozilla_t)
-')
-
-tunable_policy(`mozilla_read_content && use_samba_home_dirs',`
- fs_list_auto_mountpoints(mozilla_t)
- files_list_home(mozilla_t)
- fs_read_cifs_files(mozilla_t)
- fs_read_cifs_symlinks(mozilla_t)
-',`
- files_dontaudit_list_home(mozilla_t)
- fs_dontaudit_list_auto_mountpoints(mozilla_t)
- fs_dontaudit_read_cifs_files(mozilla_t)
- fs_dontaudit_list_cifs(mozilla_t)
-')
-
-tunable_policy(`mozilla_read_content',`
- userdom_list_user_tmp(mozilla_t)
- userdom_read_user_tmp_files(mozilla_t)
- userdom_read_user_tmp_symlinks(mozilla_t)
- userdom_read_user_home_content_files(mozilla_t)
- userdom_read_user_home_content_symlinks(mozilla_t)
-
- ifndef(`enable_mls',`
- fs_search_removable(mozilla_t)
- fs_read_removable_files(mozilla_t)
- fs_read_removable_symlinks(mozilla_t)
- ')
-',`
- files_dontaudit_list_tmp(mozilla_t)
- files_dontaudit_list_home(mozilla_t)
- fs_dontaudit_list_removable(mozilla_t)
- fs_dontaudit_read_removable_files(mozilla_t)
- userdom_dontaudit_list_user_tmp(mozilla_t)
- userdom_dontaudit_read_user_tmp_files(mozilla_t)
- userdom_dontaudit_list_user_home_dirs(mozilla_t)
- userdom_dontaudit_read_user_home_content_files(mozilla_t)
-')
-
-optional_policy(`
- apache_read_user_scripts(mozilla_t)
- apache_read_user_content(mozilla_t)
-')
-
-optional_policy(`
- automount_dontaudit_getattr_tmp_dirs(mozilla_t)
-')
-
-optional_policy(`
- cups_read_rw_config(mozilla_t)
- cups_dbus_chat(mozilla_t)
-')
-
-optional_policy(`
- dbus_system_bus_client(mozilla_t)
- dbus_session_bus_client(mozilla_t)
-
- optional_policy(`
- networkmanager_dbus_chat(mozilla_t)
- ')
-')
-
-optional_policy(`
- gnome_stream_connect_gconf(mozilla_t)
- gnome_manage_config(mozilla_t)
- gnome_manage_gconf_home_files(mozilla_t)
-')
-
-optional_policy(`
- java_domtrans(mozilla_t)
-')
-
-optional_policy(`
- lpd_domtrans_lpr(mozilla_t)
-')
-
-optional_policy(`
- mplayer_domtrans(mozilla_t)
- mplayer_read_user_home_files(mozilla_t)
-')
-
-optional_policy(`
- pulseaudio_exec(mozilla_t)
- pulseaudio_stream_connect(mozilla_t)
- pulseaudio_manage_home_files(mozilla_t)
-')
-
-optional_policy(`
- thunderbird_domtrans(mozilla_t)
-')
-
-########################################
-#
-# mozilla_plugin local policy
-#
-
-dontaudit mozilla_plugin_t self:capability sys_nice;
-
-allow mozilla_plugin_t self:process { setsched signal_perms execmem };
-allow mozilla_plugin_t self:netlink_route_socket r_netlink_socket_perms;
-allow mozilla_plugin_t self:tcp_socket create_stream_socket_perms;
-allow mozilla_plugin_t self:udp_socket create_socket_perms;
-allow mozilla_plugin_t self:netlink_kobject_uevent_socket create_socket_perms;
-
-allow mozilla_plugin_t self:sem create_sem_perms;
-allow mozilla_plugin_t self:shm create_shm_perms;
-allow mozilla_plugin_t self:fifo_file manage_fifo_file_perms;
-allow mozilla_plugin_t self:unix_dgram_socket sendto;
-allow mozilla_plugin_t self:unix_stream_socket { connectto create_stream_socket_perms };
-
-can_exec(mozilla_plugin_t, mozilla_home_t)
-manage_dirs_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_home_t)
-manage_files_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_home_t)
-manage_lnk_files_pattern(mozilla_plugin_t, mozilla_home_t, mozilla_home_t)
-
-manage_dirs_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
-manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
-manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
-manage_sock_files_pattern(mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmp_t)
-files_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file sock_file })
-userdom_user_tmp_filetrans(mozilla_plugin_t, mozilla_plugin_tmp_t, { dir file fifo_file sock_file })
-can_exec(mozilla_plugin_t, mozilla_plugin_tmp_t)
-
-manage_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
-manage_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
-manage_fifo_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
-manage_sock_files_pattern(mozilla_plugin_t, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t)
-fs_tmpfs_filetrans(mozilla_plugin_t, mozilla_plugin_tmpfs_t, { file lnk_file sock_file fifo_file })
-
-allow mozilla_plugin_t mozilla_plugin_rw_t:dir list_dir_perms;
-read_lnk_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-read_files_pattern(mozilla_plugin_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-
-can_exec(mozilla_plugin_t, mozilla_exec_t)
-
-kernel_read_kernel_sysctls(mozilla_plugin_t)
-kernel_read_system_state(mozilla_plugin_t)
-kernel_read_network_state(mozilla_plugin_t)
-kernel_request_load_module(mozilla_plugin_t)
-
-corecmd_exec_bin(mozilla_plugin_t)
-corecmd_exec_shell(mozilla_plugin_t)
-
-corenet_tcp_connect_generic_port(mozilla_plugin_t)
-corenet_tcp_connect_flash_port(mozilla_plugin_t)
-corenet_tcp_connect_streaming_port(mozilla_plugin_t)
-corenet_tcp_connect_pulseaudio_port(mozilla_plugin_t)
-corenet_tcp_connect_http_port(mozilla_plugin_t)
-corenet_tcp_connect_http_cache_port(mozilla_plugin_t)
-corenet_tcp_connect_squid_port(mozilla_plugin_t)
-corenet_tcp_connect_ipp_port(mozilla_plugin_t)
-corenet_tcp_connect_mmcc_port(mozilla_plugin_t)
-corenet_tcp_connect_speech_port(mozilla_plugin_t)
-corenet_tcp_connect_streaming_port(mozilla_plugin_t)
-corenet_tcp_connect_ftp_port(mozilla_plugin_t)
-corenet_tcp_connect_all_ephemeral_ports(mozilla_plugin_t)
-corenet_tcp_bind_generic_node(mozilla_plugin_t)
-corenet_udp_bind_generic_node(mozilla_plugin_t)
-
-dev_read_rand(mozilla_plugin_t)
-dev_read_urand(mozilla_plugin_t)
-dev_read_video_dev(mozilla_plugin_t)
-dev_write_video_dev(mozilla_plugin_t)
-dev_read_sysfs(mozilla_plugin_t)
-dev_read_sound(mozilla_plugin_t)
-dev_write_sound(mozilla_plugin_t)
-# for nvidia driver
-dev_rw_xserver_misc(mozilla_plugin_t)
-dev_dontaudit_rw_dri(mozilla_plugin_t)
-
-domain_use_interactive_fds(mozilla_plugin_t)
-domain_dontaudit_read_all_domains_state(mozilla_plugin_t)
-
-files_read_config_files(mozilla_plugin_t)
-files_read_usr_files(mozilla_plugin_t)
-files_list_mnt(mozilla_plugin_t)
-
-fs_getattr_all_fs(mozilla_plugin_t)
-fs_list_dos(mozilla_plugin_t)
-fs_read_dos_files(mozilla_plugin_t)
-
-application_dontaudit_signull(mozilla_plugin_t)
-
-auth_use_nsswitch(mozilla_plugin_t)
-
-logging_send_syslog_msg(mozilla_plugin_t)
-
-miscfiles_read_localization(mozilla_plugin_t)
-miscfiles_read_fonts(mozilla_plugin_t)
-miscfiles_read_generic_certs(mozilla_plugin_t)
-miscfiles_dontaudit_setattr_fonts_dirs(mozilla_plugin_t)
-miscfiles_dontaudit_setattr_fonts_cache_dirs(mozilla_plugin_t)
-
-sysnet_dns_name_resolve(mozilla_plugin_t)
-
-term_getattr_all_ttys(mozilla_plugin_t)
-term_getattr_all_ptys(mozilla_plugin_t)
-
-userdom_rw_user_tmpfs_files(mozilla_plugin_t)
-userdom_delete_user_tmpfs_files(mozilla_plugin_t)
-userdom_dontaudit_use_user_terminals(mozilla_plugin_t)
-userdom_manage_user_tmp_sockets(mozilla_plugin_t)
-userdom_manage_user_tmp_dirs(mozilla_plugin_t)
-userdom_read_user_tmp_files(mozilla_plugin_t)
-userdom_read_user_tmp_symlinks(mozilla_plugin_t)
-userdom_stream_connect(mozilla_plugin_t)
-userdom_dontaudit_rw_user_tmp_pipes(mozilla_plugin_t)
-
-userdom_read_user_home_content_files(mozilla_plugin_t)
-userdom_read_user_home_content_symlinks(mozilla_plugin_t)
-userdom_read_home_certs(mozilla_plugin_t)
-userdom_dontaudit_write_home_certs(mozilla_plugin_t)
-userdom_read_home_audio_files(mozilla_plugin_t)
-
-tunable_policy(`deny_execmem',`', `
- allow mozilla_plugin_t self:process execmem;
-')
-
-tunable_policy(`allow_execstack',`
- allow mozilla_plugin_t self:process execstack;
-')
-
-userdom_home_manager(mozilla_plugin_t)
-
-optional_policy(`
- alsa_read_rw_config(mozilla_plugin_t)
- alsa_read_home_files(mozilla_plugin_t)
-')
-
-optional_policy(`
- dbus_system_bus_client(mozilla_plugin_t)
- dbus_session_bus_client(mozilla_plugin_t)
- dbus_read_lib_files(mozilla_plugin_t)
-')
-
-optional_policy(`
- git_dontaudit_read_session_content_files(mozilla_plugin_t)
-')
-
-
-optional_policy(`
- gnome_manage_config(mozilla_plugin_t)
- gnome_read_usr_config(mozilla_plugin_t)
-')
-
-optional_policy(`
- java_exec(mozilla_plugin_t)
-')
-
-optional_policy(`
- mplayer_exec(mozilla_plugin_t)
- mplayer_read_user_home_files(mozilla_plugin_t)
-')
-
-optional_policy(`
- pulseaudio_exec(mozilla_plugin_t)
- pulseaudio_stream_connect(mozilla_plugin_t)
- pulseaudio_setattr_home_dir(mozilla_plugin_t)
- pulseaudio_manage_home_files(mozilla_plugin_t)
- pulseaudio_manage_home_symlinks(mozilla_plugin_t)
-')
-
-optional_policy(`
- pcscd_stream_connect(mozilla_plugin_t)
-')
-
-optional_policy(`
- rtkit_scheduled(mozilla_plugin_t)
-')
-
-optional_policy(`
- udev_read_db(mozilla_plugin_t)
-')
-
-optional_policy(`
- xserver_read_xdm_pid(mozilla_plugin_t)
- xserver_stream_connect(mozilla_plugin_t)
- xserver_use_user_fonts(mozilla_plugin_t)
- xserver_read_user_iceauth(mozilla_plugin_t)
- xserver_read_user_xauth(mozilla_plugin_t)
- xserver_append_xdm_home_files(mozilla_plugin_t);
-')
-
-########################################
-#
-# mozilla_plugin_config local policy
-#
-
-allow mozilla_plugin_config_t self:capability { dac_override dac_read_search sys_nice setuid setgid };
-allow mozilla_plugin_config_t self:process { setsched signal_perms getsched execmem };
-
-allow mozilla_plugin_config_t self:fifo_file rw_file_perms;
-allow mozilla_plugin_config_t self:unix_stream_socket create_stream_socket_perms;
-
-dev_search_sysfs(mozilla_plugin_config_t)
-dev_read_urand(mozilla_plugin_config_t)
-dev_dontaudit_read_rand(mozilla_plugin_config_t)
-dev_dontaudit_rw_dri(mozilla_plugin_config_t)
-
-fs_search_auto_mountpoints(mozilla_plugin_config_t)
-fs_list_inotifyfs(mozilla_plugin_config_t)
-
-can_exec(mozilla_plugin_config_t, mozilla_plugin_rw_t)
-manage_dirs_pattern(mozilla_plugin_config_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-manage_files_pattern(mozilla_plugin_config_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-manage_lnk_files_pattern(mozilla_plugin_config_t, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
-
-manage_dirs_pattern(mozilla_plugin_config_t, mozilla_home_t, mozilla_home_t)
-manage_files_pattern(mozilla_plugin_config_t, mozilla_home_t, mozilla_home_t)
-manage_lnk_files_pattern(mozilla_plugin_config_t, mozilla_home_t, mozilla_home_t)
-
-corecmd_exec_bin(mozilla_plugin_config_t)
-corecmd_exec_shell(mozilla_plugin_config_t)
-
-kernel_read_system_state(mozilla_plugin_config_t)
-kernel_request_load_module(mozilla_plugin_config_t)
-
-domain_use_interactive_fds(mozilla_plugin_config_t)
-
-files_read_etc_files(mozilla_plugin_config_t)
-files_read_usr_files(mozilla_plugin_config_t)
-files_dontaudit_search_home(mozilla_plugin_config_t)
-files_list_tmp(mozilla_plugin_config_t)
-
-auth_use_nsswitch(mozilla_plugin_config_t)
-
-miscfiles_read_localization(mozilla_plugin_config_t)
-miscfiles_read_fonts(mozilla_plugin_config_t)
-
-userdom_search_user_home_content(mozilla_plugin_config_t)
-userdom_read_user_home_content_symlinks(mozilla_plugin_config_t)
-userdom_read_user_home_content_files(mozilla_plugin_config_t)
-userdom_dontaudit_search_admin_dir(mozilla_plugin_config_t)
-userdom_use_inherited_user_ptys(mozilla_plugin_config_t)
-
-domtrans_pattern(mozilla_plugin_config_t, mozilla_plugin_exec_t, mozilla_plugin_t)
-
-optional_policy(`
- xserver_use_user_fonts(mozilla_plugin_config_t)
-')