]> git.ipfire.org Git - people/stevee/selinux-policy.git/blob - policy/modules/services/inn.te
Module version bump for c17ad38 5271920 2a2b6a7 01c4413 c4fbfae a831710
[people/stevee/selinux-policy.git] / policy / modules / services / inn.te
1 policy_module(inn, 1.9.0)
2
3 ########################################
4 #
5 # Declarations
6 #
7 type innd_t;
8 type innd_exec_t;
9 init_daemon_domain(innd_t, innd_exec_t)
10
11 type innd_etc_t;
12 files_config_file(innd_etc_t)
13
14 type innd_initrc_exec_t;
15 init_script_file(innd_initrc_exec_t)
16
17 type innd_log_t;
18 logging_log_file(innd_log_t)
19
20 type innd_var_lib_t;
21 files_type(innd_var_lib_t)
22
23 type innd_var_run_t;
24 files_pid_file(innd_var_run_t)
25
26 type news_spool_t;
27 files_mountpoint(news_spool_t)
28
29 ########################################
30 #
31 # Local policy
32 #
33 allow innd_t self:capability { dac_override kill setgid setuid };
34 dontaudit innd_t self:capability sys_tty_config;
35 allow innd_t self:process { setsched signal_perms };
36 allow innd_t self:fifo_file rw_fifo_file_perms;
37 allow innd_t self:unix_dgram_socket { sendto create_socket_perms };
38 allow innd_t self:unix_stream_socket { connectto create_stream_socket_perms };
39 allow innd_t self:tcp_socket create_stream_socket_perms;
40 allow innd_t self:udp_socket create_socket_perms;
41 allow innd_t self:netlink_route_socket r_netlink_socket_perms;
42
43 read_files_pattern(innd_t, innd_etc_t, innd_etc_t)
44 read_lnk_files_pattern(innd_t, innd_etc_t, innd_etc_t)
45
46 can_exec(innd_t, innd_exec_t)
47
48 manage_files_pattern(innd_t, innd_log_t, innd_log_t)
49 allow innd_t innd_log_t:dir setattr;
50 logging_log_filetrans(innd_t, innd_log_t, file)
51
52 manage_dirs_pattern(innd_t, innd_var_lib_t, innd_var_lib_t)
53 manage_files_pattern(innd_t, innd_var_lib_t, innd_var_lib_t)
54 files_var_lib_filetrans(innd_t, innd_var_lib_t, file)
55
56 manage_dirs_pattern(innd_t, innd_var_run_t, innd_var_run_t)
57 manage_files_pattern(innd_t, innd_var_run_t, innd_var_run_t)
58 manage_sock_files_pattern(innd_t, innd_var_run_t, innd_var_run_t)
59 files_pid_filetrans(innd_t, innd_var_run_t, file)
60
61 manage_dirs_pattern(innd_t, news_spool_t, news_spool_t)
62 manage_files_pattern(innd_t, news_spool_t, news_spool_t)
63 manage_lnk_files_pattern(innd_t, news_spool_t, news_spool_t)
64
65 kernel_read_kernel_sysctls(innd_t)
66 kernel_read_system_state(innd_t)
67
68 corenet_all_recvfrom_unlabeled(innd_t)
69 corenet_all_recvfrom_netlabel(innd_t)
70 corenet_tcp_sendrecv_generic_if(innd_t)
71 corenet_udp_sendrecv_generic_if(innd_t)
72 corenet_tcp_sendrecv_generic_node(innd_t)
73 corenet_udp_sendrecv_generic_node(innd_t)
74 corenet_tcp_sendrecv_all_ports(innd_t)
75 corenet_udp_sendrecv_all_ports(innd_t)
76 corenet_tcp_bind_generic_node(innd_t)
77 corenet_tcp_bind_innd_port(innd_t)
78 corenet_tcp_connect_all_ports(innd_t)
79 corenet_sendrecv_innd_server_packets(innd_t)
80 corenet_sendrecv_all_client_packets(innd_t)
81
82 dev_read_sysfs(innd_t)
83 dev_read_urand(innd_t)
84
85 fs_getattr_all_fs(innd_t)
86 fs_search_auto_mountpoints(innd_t)
87
88 corecmd_exec_bin(innd_t)
89 corecmd_exec_shell(innd_t)
90
91 domain_use_interactive_fds(innd_t)
92
93 files_list_spool(innd_t)
94 files_read_etc_files(innd_t)
95 files_read_etc_runtime_files(innd_t)
96 files_read_usr_files(innd_t)
97
98 logging_send_syslog_msg(innd_t)
99
100 miscfiles_read_localization(innd_t)
101
102 seutil_dontaudit_search_config(innd_t)
103
104 sysnet_read_config(innd_t)
105
106 userdom_dontaudit_use_unpriv_user_fds(innd_t)
107 userdom_dontaudit_search_user_home_dirs(innd_t)
108
109 mta_send_mail(innd_t)
110
111 optional_policy(`
112 cron_system_entry(innd_t, innd_exec_t)
113 ')
114
115 optional_policy(`
116 hostname_exec(innd_t)
117 ')
118
119 optional_policy(`
120 nis_use_ypbind(innd_t)
121 ')
122
123 optional_policy(`
124 seutil_sigchld_newrole(innd_t)
125 ')
126
127 optional_policy(`
128 udev_read_db(innd_t)
129 ')