]> git.ipfire.org Git - people/stevee/selinux-policy.git/blob - policy/modules/services/arpwatch.te
bump versions to release numbers
[people/stevee/selinux-policy.git] / policy / modules / services / arpwatch.te
1
2 policy_module(arpwatch,1.2.0)
3
4 ########################################
5 #
6 # Declarations
7 #
8
9 type arpwatch_t;
10 type arpwatch_exec_t;
11 init_daemon_domain(arpwatch_t,arpwatch_exec_t)
12
13 type arpwatch_data_t;
14 files_type(arpwatch_data_t)
15
16 type arpwatch_tmp_t;
17 files_tmp_file(arpwatch_tmp_t)
18
19 type arpwatch_var_run_t;
20 files_pid_file(arpwatch_var_run_t)
21
22 ########################################
23 #
24 # Local policy
25 #
26 allow arpwatch_t self:capability { net_admin net_raw setgid setuid };
27 dontaudit arpwatch_t self:capability sys_tty_config;
28 allow arpwatch_t self:process signal_perms;
29 allow arpwatch_t self:unix_dgram_socket create_socket_perms;
30 allow arpwatch_t self:unix_stream_socket create_stream_socket_perms;
31 allow arpwatch_t self:netlink_route_socket r_netlink_socket_perms;
32 allow arpwatch_t self:tcp_socket { connect create_stream_socket_perms };
33 allow arpwatch_t self:udp_socket create_socket_perms;
34 allow arpwatch_t self:packet_socket create_socket_perms;
35
36 allow arpwatch_t arpwatch_data_t:dir create_dir_perms;
37 allow arpwatch_t arpwatch_data_t:file create_file_perms;
38 allow arpwatch_t arpwatch_data_t:lnk_file create_lnk_perms;
39
40 allow arpwatch_t arpwatch_tmp_t:dir create_dir_perms;
41 allow arpwatch_t arpwatch_tmp_t:file create_file_perms;
42 files_tmp_filetrans(arpwatch_t, arpwatch_tmp_t, { file dir })
43
44 allow arpwatch_t arpwatch_var_run_t:file create_file_perms;
45 allow arpwatch_t arpwatch_var_run_t:dir rw_dir_perms;
46 files_pid_filetrans(arpwatch_t,arpwatch_var_run_t,file)
47
48 kernel_read_kernel_sysctls(arpwatch_t)
49 kernel_list_proc(arpwatch_t)
50 kernel_read_proc_symlinks(arpwatch_t)
51
52 corenet_non_ipsec_sendrecv(arpwatch_t)
53 corenet_tcp_sendrecv_all_if(arpwatch_t)
54 corenet_udp_sendrecv_all_if(arpwatch_t)
55 corenet_raw_sendrecv_all_if(arpwatch_t)
56 corenet_tcp_sendrecv_all_nodes(arpwatch_t)
57 corenet_udp_sendrecv_all_nodes(arpwatch_t)
58 corenet_raw_sendrecv_all_nodes(arpwatch_t)
59 corenet_tcp_sendrecv_all_ports(arpwatch_t)
60 corenet_udp_sendrecv_all_ports(arpwatch_t)
61
62 dev_read_sysfs(arpwatch_t)
63
64 fs_getattr_all_fs(arpwatch_t)
65 fs_search_auto_mountpoints(arpwatch_t)
66
67 term_dontaudit_use_console(arpwatch_t)
68
69 corecmd_read_sbin_symlinks(arpwatch_t)
70
71 domain_use_interactive_fds(arpwatch_t)
72
73 files_read_etc_files(arpwatch_t)
74 files_read_usr_files(arpwatch_t)
75 files_search_var_lib(arpwatch_t)
76
77 init_use_fds(arpwatch_t)
78 init_use_script_ptys(arpwatch_t)
79
80 libs_use_ld_so(arpwatch_t)
81 libs_use_shared_libs(arpwatch_t)
82
83 logging_send_syslog_msg(arpwatch_t)
84
85 miscfiles_read_localization(arpwatch_t)
86
87 sysnet_read_config(arpwatch_t)
88
89 userdom_dontaudit_use_unpriv_user_fds(arpwatch_t)
90 userdom_dontaudit_search_sysadm_home_dirs(arpwatch_t)
91
92 mta_send_mail(arpwatch_t)
93
94 ifdef(`targeted_policy',`
95 term_dontaudit_use_unallocated_ttys(arpwatch_t)
96 term_dontaudit_use_generic_ptys(arpwatch_t)
97 files_dontaudit_read_root_files(arpwatch_t)
98 ')
99
100 optional_policy(`
101 nis_use_ypbind(arpwatch_t)
102 ')
103
104 optional_policy(`
105 corecmd_search_bin(arpwatch_t)
106 ')
107
108 optional_policy(`
109 seutil_sigchld_newrole(arpwatch_t)
110 ')
111
112 optional_policy(`
113 udev_read_db(arpwatch_t)
114 ')
115