signaling.te 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. policy_module(signaling, 0.0.4)
  2. ########################################
  3. #
  4. # Declarations
  5. #
  6. type signaling_t;
  7. type signaling_exec_t;
  8. init_daemon_domain(signaling_t, signaling_exec_t)
  9. type signaling_etc_t;
  10. files_config_file(signaling_etc_t);
  11. allow signaling_t self:fifo_file { read write };
  12. allow signaling_t self:process { getsched signal };
  13. allow signaling_t self:tcp_socket { accept bind connect create getattr getopt listen read setopt write };
  14. allow signaling_t self:udp_socket { connect create getattr read setopt write };
  15. allow signaling_t self:unix_dgram_socket { connect create };
  16. allow signaling_t self:netlink_route_socket create;
  17. corenet_tcp_bind_http_cache_port(signaling_t)
  18. corenet_tcp_connect_http_port(signaling_t)
  19. corenet_tcp_bind_generic_node(signaling_t)
  20. corenet_tcp_connect_all_unreserved_ports(signaling_t)
  21. miscfiles_read_all_certs(signaling_t)
  22. miscfiles_read_localization(signaling_t)
  23. files_read_usr_files(signaling_t)
  24. read_files_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
  25. search_dirs_pattern(signaling_t, signaling_etc_t, signaling_etc_t)
  26. sysnet_read_config(signaling_t)
  27. kernel_read_net_sysctls(signaling_t)
  28. dev_read_sysfs(signaling_t)
  29. files_read_etc_files(signaling_t)
  30. optional_policy(`
  31. gen_require(`
  32. type supervisor_t;
  33. ')
  34. supervisor_service_domain(signaling_t,signaling_exec_t)
  35. allow signaling_t supervisor_t:fifo_file lock;
  36. ')
  37. optional_policy(`
  38. gen_require(`
  39. type usr_t;
  40. ')
  41. read_files_pattern(usr_t, signaling_t, signaling_t)
  42. ')