]> git.ipfire.org Git - people/stevee/selinux-policy.git/blame - policy/modules/services/dnsmasq.te
trunk: pyzor and clamav updates from dan
[people/stevee/selinux-policy.git] / policy / modules / services / dnsmasq.te
CommitLineData
9e725d8a 1
0251df3e 2policy_module(dnsmasq,1.3.0)
9e725d8a
CP
3
4########################################
5#
6# Declarations
7#
8
9type dnsmasq_t;
10type dnsmasq_exec_t;
11init_daemon_domain(dnsmasq_t,dnsmasq_exec_t)
12
13type dnsmasq_lease_t;
14files_type(dnsmasq_lease_t)
15
16type dnsmasq_var_run_t;
17files_pid_file(dnsmasq_var_run_t)
18
19########################################
20#
21# Local policy
22#
23
ed38ca9f 24allow dnsmasq_t self:capability { net_admin setgid setuid net_bind_service net_raw };
9e725d8a 25dontaudit dnsmasq_t self:capability sys_tty_config;
ed38ca9f
CP
26allow dnsmasq_t self:process { setcap signal_perms };
27allow dnsmasq_t self:fifo_file { read write };
28allow dnsmasq_t self:netlink_route_socket { bind create nlmsg_read read write };
9e725d8a
CP
29allow dnsmasq_t self:tcp_socket create_stream_socket_perms;
30allow dnsmasq_t self:udp_socket create_socket_perms;
31allow dnsmasq_t self:packet_socket create_socket_perms;
32allow dnsmasq_t self:rawip_socket create_socket_perms;
33
34# dhcp leases
35allow dnsmasq_t dnsmasq_lease_t:file manage_file_perms;
36files_var_lib_filetrans(dnsmasq_t,dnsmasq_lease_t,file)
37
c0868a7a 38manage_files_pattern(dnsmasq_t,dnsmasq_var_run_t,dnsmasq_var_run_t)
9e725d8a
CP
39files_pid_filetrans(dnsmasq_t,dnsmasq_var_run_t,file)
40
41kernel_read_kernel_sysctls(dnsmasq_t)
42kernel_list_proc(dnsmasq_t)
43kernel_read_proc_symlinks(dnsmasq_t)
44
141cffdd 45corenet_non_ipsec_sendrecv(dnsmasq_t)
9e725d8a
CP
46corenet_tcp_sendrecv_generic_if(dnsmasq_t)
47corenet_udp_sendrecv_generic_if(dnsmasq_t)
48corenet_raw_sendrecv_generic_if(dnsmasq_t)
49corenet_tcp_sendrecv_all_nodes(dnsmasq_t)
50corenet_udp_sendrecv_all_nodes(dnsmasq_t)
51corenet_raw_sendrecv_all_nodes(dnsmasq_t)
52corenet_tcp_sendrecv_all_ports(dnsmasq_t)
53corenet_udp_sendrecv_all_ports(dnsmasq_t)
9e725d8a
CP
54corenet_tcp_bind_all_nodes(dnsmasq_t)
55corenet_udp_bind_all_nodes(dnsmasq_t)
56corenet_tcp_bind_dns_port(dnsmasq_t)
57corenet_udp_bind_dns_port(dnsmasq_t)
58corenet_udp_bind_dhcpd_port(dnsmasq_t)
141cffdd
CP
59corenet_sendrecv_dns_server_packets(dnsmasq_t)
60corenet_sendrecv_dhcpd_server_packets(dnsmasq_t)
9e725d8a
CP
61
62dev_read_sysfs(dnsmasq_t)
63dev_read_urand(dnsmasq_t)
64
65domain_use_interactive_fds(dnsmasq_t)
66
67# allow access to dnsmasq.conf
68files_read_etc_files(dnsmasq_t)
69
70fs_getattr_all_fs(dnsmasq_t)
71fs_search_auto_mountpoints(dnsmasq_t)
72
9e725d8a
CP
73libs_use_ld_so(dnsmasq_t)
74libs_use_shared_libs(dnsmasq_t)
75
76logging_send_syslog_msg(dnsmasq_t)
77
78miscfiles_read_localization(dnsmasq_t)
79
80sysnet_read_config(dnsmasq_t)
81
82userdom_dontaudit_use_unpriv_user_fds(dnsmasq_t)
83userdom_dontaudit_search_sysadm_home_dirs(dnsmasq_t)
84
85ifdef(`targeted_policy',`
86 term_dontaudit_use_unallocated_ttys(dnsmasq_t)
87 term_dontaudit_use_generic_ptys(dnsmasq_t)
88 files_dontaudit_read_root_files(dnsmasq_t)
89')
90
91optional_policy(`
92 nis_use_ypbind(dnsmasq_t)
93')
94
95optional_policy(`
96 seutil_sigchld_newrole(dnsmasq_t)
97')
98
99optional_policy(`
100 udev_read_db(dnsmasq_t)
101')