]> git.ipfire.org Git - people/stevee/selinux-policy.git/blame - policy/modules/services/dnsmasq.te
trunk: bump versions for release.
[people/stevee/selinux-policy.git] / policy / modules / services / dnsmasq.te
CommitLineData
9e725d8a 1
cfcf5004 2policy_module(dnsmasq, 1.6.0)
9e725d8a
CP
3
4########################################
5#
6# Declarations
7#
8
9type dnsmasq_t;
10type dnsmasq_exec_t;
11init_daemon_domain(dnsmasq_t,dnsmasq_exec_t)
12
13type dnsmasq_lease_t;
14files_type(dnsmasq_lease_t)
15
16type dnsmasq_var_run_t;
17files_pid_file(dnsmasq_var_run_t)
18
19########################################
20#
21# Local policy
22#
23
ed38ca9f 24allow dnsmasq_t self:capability { net_admin setgid setuid net_bind_service net_raw };
9e725d8a 25dontaudit dnsmasq_t self:capability sys_tty_config;
ed38ca9f
CP
26allow dnsmasq_t self:process { setcap signal_perms };
27allow dnsmasq_t self:fifo_file { read write };
28allow dnsmasq_t self:netlink_route_socket { bind create nlmsg_read read write };
9e725d8a
CP
29allow dnsmasq_t self:tcp_socket create_stream_socket_perms;
30allow dnsmasq_t self:udp_socket create_socket_perms;
31allow dnsmasq_t self:packet_socket create_socket_perms;
32allow dnsmasq_t self:rawip_socket create_socket_perms;
33
34# dhcp leases
35allow dnsmasq_t dnsmasq_lease_t:file manage_file_perms;
36files_var_lib_filetrans(dnsmasq_t,dnsmasq_lease_t,file)
37
c0868a7a 38manage_files_pattern(dnsmasq_t,dnsmasq_var_run_t,dnsmasq_var_run_t)
9e725d8a
CP
39files_pid_filetrans(dnsmasq_t,dnsmasq_var_run_t,file)
40
41kernel_read_kernel_sysctls(dnsmasq_t)
42kernel_list_proc(dnsmasq_t)
43kernel_read_proc_symlinks(dnsmasq_t)
44
19006686
CP
45corenet_all_recvfrom_unlabeled(dnsmasq_t)
46corenet_all_recvfrom_netlabel(dnsmasq_t)
9e725d8a
CP
47corenet_tcp_sendrecv_generic_if(dnsmasq_t)
48corenet_udp_sendrecv_generic_if(dnsmasq_t)
49corenet_raw_sendrecv_generic_if(dnsmasq_t)
50corenet_tcp_sendrecv_all_nodes(dnsmasq_t)
51corenet_udp_sendrecv_all_nodes(dnsmasq_t)
52corenet_raw_sendrecv_all_nodes(dnsmasq_t)
53corenet_tcp_sendrecv_all_ports(dnsmasq_t)
54corenet_udp_sendrecv_all_ports(dnsmasq_t)
9e725d8a
CP
55corenet_tcp_bind_all_nodes(dnsmasq_t)
56corenet_udp_bind_all_nodes(dnsmasq_t)
57corenet_tcp_bind_dns_port(dnsmasq_t)
58corenet_udp_bind_dns_port(dnsmasq_t)
59corenet_udp_bind_dhcpd_port(dnsmasq_t)
141cffdd
CP
60corenet_sendrecv_dns_server_packets(dnsmasq_t)
61corenet_sendrecv_dhcpd_server_packets(dnsmasq_t)
9e725d8a
CP
62
63dev_read_sysfs(dnsmasq_t)
64dev_read_urand(dnsmasq_t)
65
66domain_use_interactive_fds(dnsmasq_t)
67
68# allow access to dnsmasq.conf
69files_read_etc_files(dnsmasq_t)
70
71fs_getattr_all_fs(dnsmasq_t)
72fs_search_auto_mountpoints(dnsmasq_t)
73
9e725d8a
CP
74libs_use_ld_so(dnsmasq_t)
75libs_use_shared_libs(dnsmasq_t)
76
77logging_send_syslog_msg(dnsmasq_t)
78
79miscfiles_read_localization(dnsmasq_t)
80
81sysnet_read_config(dnsmasq_t)
82
83userdom_dontaudit_use_unpriv_user_fds(dnsmasq_t)
e9c6cda7
CP
84
85sysadm_dontaudit_search_home_dirs(dnsmasq_t)
9e725d8a 86
9e725d8a
CP
87optional_policy(`
88 nis_use_ypbind(dnsmasq_t)
89')
90
91optional_policy(`
92 seutil_sigchld_newrole(dnsmasq_t)
93')
94
95optional_policy(`
96 udev_read_db(dnsmasq_t)
97')