signaling.te 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. policy_module(signaling, 0.0.3)
  2. ########################################
  3. #
  4. # Declarations
  5. #
  6. type signaling_t;
  7. type signaling_exec_t;
  8. init_daemon_domain(signaling_t, signaling_exec_t)
  9. type signaling_etc_t;
  10. files_config_file(signaling_etc_t);
  11. allow signaling_t self:fifo_file { read write };
  12. allow signaling_t self:process { getsched signal };
  13. allow signaling_t self:tcp_socket { accept bind connect create getattr getopt listen read setopt write };
  14. allow signaling_t self:udp_socket { connect create getattr read setopt write };
  15. allow signaling_t self:unix_dgram_socket { connect create };
  16. allow signaling_t self:netlink_route_socket create;
  17. corenet_tcp_bind_http_cache_port(signaling_t)
  18. corenet_tcp_connect_http_port(signaling_t)
  19. corenet_tcp_bind_generic_node(signaling_t)
  20. corenet_tcp_connect_all_unreserved_ports(signaling_t)
  21. miscfiles_read_all_certs(signaling_t)
  22. miscfiles_read_localization(signaling_t)
  23. read_files_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
  24. search_dirs_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
  25. sysnet_read_config(signaling_t)
  26. kernel_read_net_sysctls(signaling_t)
  27. dev_read_sysfs(signaling_t)
  28. files_read_etc_files(signaling_t)
  29. optional_policy(`
  30. gen_require(`
  31. type supervisor_t;
  32. ')
  33. supervisor_service_domain(signaling_t,signaling_exec_t)
  34. allow signaling_t supervisor_t:fifo_file lock;
  35. ')
  36. optional_policy(`
  37. gen_require(`
  38. type usr_t;
  39. ')
  40. read_files_pattern(usr_t, signaling_t, signaling_t)
  41. ')