diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index 24737ee0e..e6524fa92 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -59,7 +59,7 @@ files_pid_file(ipsec_mgmt_var_run_t) type ipsec_supervisor_t; type ipsec_supervisor_exec_t; -init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t); +init_daemon_domain(ipsec_supervisor_t, ipsec_supervisor_exec_t) role system_r types ipsec_supervisor_t; type racoon_t; @@ -122,7 +122,7 @@ allow ipsec_mgmt_t ipsec_t:unix_stream_socket { read write }; allow ipsec_mgmt_t ipsec_t:process { rlimitinh sigchld }; kernel_read_kernel_sysctls(ipsec_t) -kernel_rw_net_sysctls(ipsec_t); +kernel_rw_net_sysctls(ipsec_t) kernel_list_proc(ipsec_t) kernel_read_proc_symlinks(ipsec_t) # allow pluto to access /proc/net/ipsec_eroute; @@ -245,7 +245,7 @@ stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t) can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t) allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read; -domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t); +domtrans_pattern(ipsec_mgmt_t, ipsec_supervisor_exec_t, ipsec_supervisor_t) allow ipsec_mgmt_t ipsec_supervisor_t:process { signal signull }; kernel_rw_net_sysctls(ipsec_mgmt_t) @@ -467,7 +467,7 @@ allow ipsec_supervisor_t self:netlink_route_socket rw_netlink_socket_perms; allow ipsec_supervisor_t self:netlink_xfrm_socket create_netlink_socket_perms; allow ipsec_supervisor_t ipsec_conf_file_t:dir list_dir_perms; -read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t); +read_files_pattern(ipsec_supervisor_t, ipsec_conf_file_t, ipsec_conf_file_t) manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t) @@ -479,23 +479,23 @@ manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file }) -domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t); +domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t) kernel_read_network_state(ipsec_supervisor_t) kernel_read_system_state(ipsec_supervisor_t) -kernel_rw_net_sysctls(ipsec_supervisor_t); +kernel_rw_net_sysctls(ipsec_supervisor_t) -corecmd_exec_bin(ipsec_supervisor_t); +corecmd_exec_bin(ipsec_supervisor_t) corecmd_exec_shell(ipsec_supervisor_t) -dev_read_rand(ipsec_supervisor_t); -dev_read_urand(ipsec_supervisor_t); +dev_read_rand(ipsec_supervisor_t) +dev_read_urand(ipsec_supervisor_t) -files_read_etc_files(ipsec_supervisor_t); +files_read_etc_files(ipsec_supervisor_t) -logging_send_syslog_msg(ipsec_supervisor_t); +logging_send_syslog_msg(ipsec_supervisor_t) -miscfiles_read_localization(ipsec_supervisor_t); +miscfiles_read_localization(ipsec_supervisor_t) optional_policy(` modutils_domtrans(ipsec_supervisor_t) diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te index c46f8ee8a..0d7d9f330 100644 --- a/policy/modules/system/logging.te +++ b/policy/modules/system/logging.te @@ -31,7 +31,7 @@ type auditd_initrc_exec_t; init_script_file(auditd_initrc_exec_t) type auditd_unit_t; -init_unit_file(auditd_unit_t); +init_unit_file(auditd_unit_t) type auditd_var_run_t; files_pid_file(auditd_var_run_t) diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index e55d01caa..e1a7bd54b 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -776,10 +776,10 @@ allow systemd_passwd_agent_t self:capability { chown sys_tty_config dac_override allow systemd_passwd_agent_t self:process { setfscreate setsockcreate signal }; allow systemd_passwd_agent_t self:unix_dgram_socket create_socket_perms; -manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t); -manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t); -manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t); -manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t); +manage_dirs_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t) +manage_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t) +manage_sock_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t) +manage_fifo_files_pattern(systemd_passwd_agent_t, systemd_passwd_var_run_t, systemd_passwd_var_run_t) init_pid_filetrans(systemd_passwd_agent_t, systemd_passwd_var_run_t, { dir fifo_file file }) kernel_read_system_state(systemd_passwd_agent_t)