]> git.ipfire.org Git - people/stevee/selinux-policy.git/blob - refpolicy/policy/modules/services/smartmon.te
add ddclient, bug 1523
[people/stevee/selinux-policy.git] / refpolicy / policy / modules / services / smartmon.te
1
2 policy_module(smartmon,1.0.1)
3
4 ########################################
5 #
6 # Declarations
7 #
8
9 type fsdaemon_t;
10 type fsdaemon_exec_t;
11 init_daemon_domain(fsdaemon_t,fsdaemon_exec_t)
12
13 type fsdaemon_var_run_t;
14 files_pid_file(fsdaemon_var_run_t)
15
16 type fsdaemon_tmp_t;
17 files_tmp_file(fsdaemon_tmp_t)
18
19 ########################################
20 #
21 # Local policy
22 #
23
24 allow fsdaemon_t self:capability { setgid sys_rawio sys_admin };
25 dontaudit fsdaemon_t self:capability sys_tty_config;
26 allow fsdaemon_t self:process signal_perms;
27 allow fsdaemon_t self:fifo_file rw_file_perms;
28 allow fsdaemon_t self:unix_dgram_socket create_socket_perms;
29 allow fsdaemon_t self:unix_stream_socket create_stream_socket_perms;
30 allow fsdaemon_t self:udp_socket create_socket_perms;
31
32 allow fsdaemon_t fsdaemon_tmp_t:dir create_dir_perms;
33 allow fsdaemon_t fsdaemon_tmp_t:file create_file_perms;
34 files_tmp_filetrans(fsdaemon_t, fsdaemon_tmp_t, { file dir })
35
36 allow fsdaemon_t fsdaemon_var_run_t:file create_file_perms;
37 allow fsdaemon_t fsdaemon_var_run_t:dir rw_dir_perms;
38 files_pid_filetrans(fsdaemon_t,fsdaemon_var_run_t,file)
39
40 kernel_read_kernel_sysctls(fsdaemon_t)
41 kernel_read_software_raid_state(fsdaemon_t)
42 kernel_read_system_state(fsdaemon_t)
43
44 corecmd_exec_all_executables(fsdaemon_t)
45
46 corenet_non_ipsec_sendrecv(fsdaemon_t)
47 corenet_udp_sendrecv_generic_if(fsdaemon_t)
48 corenet_raw_sendrecv_generic_if(fsdaemon_t)
49 corenet_udp_sendrecv_all_nodes(fsdaemon_t)
50 corenet_raw_sendrecv_all_nodes(fsdaemon_t)
51 corenet_udp_sendrecv_all_ports(fsdaemon_t)
52 corenet_udp_bind_all_nodes(fsdaemon_t)
53
54 dev_read_sysfs(fsdaemon_t)
55
56 domain_use_interactive_fds(fsdaemon_t)
57
58 files_exec_etc_files(fsdaemon_t)
59 files_read_etc_runtime_files(fsdaemon_t)
60 # for config
61 files_read_etc_files(fsdaemon_t)
62
63 fs_getattr_all_fs(fsdaemon_t)
64 fs_search_auto_mountpoints(fsdaemon_t)
65
66 storage_raw_read_fixed_disk(fsdaemon_t)
67 storage_raw_write_fixed_disk(fsdaemon_t)
68
69 term_dontaudit_use_console(fsdaemon_t)
70 term_dontaudit_search_ptys(fsdaemon_t)
71
72 init_use_fds(fsdaemon_t)
73 init_use_script_ptys(fsdaemon_t)
74
75 libs_use_ld_so(fsdaemon_t)
76 libs_use_shared_libs(fsdaemon_t)
77 libs_exec_ld_so(fsdaemon_t)
78 libs_exec_lib_files(fsdaemon_t)
79
80 logging_send_syslog_msg(fsdaemon_t)
81
82 miscfiles_read_localization(fsdaemon_t)
83
84 sysnet_read_config(fsdaemon_t)
85
86 userdom_dontaudit_use_unpriv_user_fds(fsdaemon_t)
87 userdom_dontaudit_search_sysadm_home_dirs(fsdaemon_t)
88
89 ifdef(`targeted_policy',`
90 term_dontaudit_use_unallocated_ttys(fsdaemon_t)
91 term_dontaudit_use_generic_ptys(fsdaemon_t)
92 files_dontaudit_read_root_files(fsdaemon_t)
93 ')
94
95 optional_policy(`
96 mta_send_mail(fsdaemon_t)
97 ')
98
99 optional_policy(`
100 seutil_sigchld_newrole(fsdaemon_t)
101 ')
102
103 optional_policy(`
104 udev_read_db(fsdaemon_t)
105 ')