12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455 |
- policy_module(signaling, 0.0.4)
- ########################################
- #
- # Declarations
- #
- type signaling_t;
- type signaling_exec_t;
- init_daemon_domain(signaling_t, signaling_exec_t)
- type signaling_etc_t;
- files_config_file(signaling_etc_t);
- allow signaling_t self:fifo_file { read write };
- allow signaling_t self:process { getsched signal };
- allow signaling_t self:tcp_socket { accept bind connect create getattr getopt listen read setopt write };
- allow signaling_t self:udp_socket { connect create getattr read setopt write };
- allow signaling_t self:unix_dgram_socket { connect create };
- allow signaling_t self:netlink_route_socket create;
- corenet_tcp_bind_http_cache_port(signaling_t)
- corenet_tcp_connect_http_port(signaling_t)
- corenet_tcp_bind_generic_node(signaling_t)
- corenet_tcp_connect_all_unreserved_ports(signaling_t)
- miscfiles_read_all_certs(signaling_t)
- miscfiles_read_localization(signaling_t)
- files_read_usr_files(signaling_t)
- read_files_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
- search_dirs_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
- sysnet_read_config(signaling_t)
- kernel_read_net_sysctls(signaling_t)
- dev_read_sysfs(signaling_t)
- files_read_etc_files(signaling_t)
- optional_policy(`
- gen_require(`
- type supervisor_t;
- ')
- supervisor_service_domain(signaling_t,signaling_exec_t)
- allow signaling_t supervisor_t:fifo_file lock;
- ')
- optional_policy(`
- gen_require(`
- type usr_t;
- ')
- read_files_pattern(usr_t, signaling_t, signaling_t)
- ')
|