add ktalk
This commit is contained in:
parent
9b06402eaf
commit
d17b4d2323
@ -1,3 +1,6 @@
|
|||||||
|
- Added policies:
|
||||||
|
ktalk
|
||||||
|
|
||||||
* Wed Sep 07 2005 Chris PeBenito <selinux@tresys.com> - 20050907
|
* Wed Sep 07 2005 Chris PeBenito <selinux@tresys.com> - 20050907
|
||||||
- Fix errors uncovered by sediff.
|
- Fix errors uncovered by sediff.
|
||||||
- Doc tool will explicitly say a module does not have interfaces
|
- Doc tool will explicitly say a module does not have interfaces
|
||||||
|
2
refpolicy/policy/modules/services/ktalk.fc
Normal file
2
refpolicy/policy/modules/services/ktalk.fc
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
|
||||||
|
/usr/bin/ktalkd -- context_template(system_u:object_r:ktalkd_exec_t,s0)
|
1
refpolicy/policy/modules/services/ktalk.if
Normal file
1
refpolicy/policy/modules/services/ktalk.if
Normal file
@ -0,0 +1 @@
|
|||||||
|
## <summary>KDE Talk daemon</summary>
|
78
refpolicy/policy/modules/services/ktalk.te
Normal file
78
refpolicy/policy/modules/services/ktalk.te
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
|
||||||
|
policy_module(ktalk,1.0)
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
# Declarations
|
||||||
|
#
|
||||||
|
|
||||||
|
type ktalkd_t;
|
||||||
|
type ktalkd_exec_t;
|
||||||
|
inetd_udp_service_domain(ktalkd_t,ktalkd_exec_t)
|
||||||
|
role system_r types ktalkd_t;
|
||||||
|
|
||||||
|
type ktalkd_tmp_t;
|
||||||
|
files_tmp_file(ktalkd_tmp_t)
|
||||||
|
|
||||||
|
type ktalkd_var_run_t;
|
||||||
|
files_pid_file(ktalkd_var_run_t)
|
||||||
|
|
||||||
|
########################################
|
||||||
|
#
|
||||||
|
# Local policy
|
||||||
|
#
|
||||||
|
|
||||||
|
allow ktalkd_t self:process signal_perms;
|
||||||
|
allow ktalkd_t self:fifo_file rw_file_perms;
|
||||||
|
allow ktalkd_t self:tcp_socket connected_stream_socket_perms;
|
||||||
|
# for identd
|
||||||
|
# cjp: this should probably only be inetd_child rules?
|
||||||
|
allow ktalkd_t self:netlink_tcpdiag_socket r_netlink_socket_perms;
|
||||||
|
allow ktalkd_t self:capability { setuid setgid };
|
||||||
|
allow ktalkd_t self:dir search;
|
||||||
|
allow ktalkd_t self:{ lnk_file file } { getattr read };
|
||||||
|
files_search_home(ktalkd_t)
|
||||||
|
optional_policy(`kerberos.te',`
|
||||||
|
kerberos_use(ktalkd_t)
|
||||||
|
')
|
||||||
|
#end for identd
|
||||||
|
|
||||||
|
allow ktalkd_t ktalkd_tmp_t:dir create_dir_perms;
|
||||||
|
allow ktalkd_t ktalkd_tmp_t:file create_file_perms;
|
||||||
|
files_create_tmp_files(ktalkd_t, ktalkd_tmp_t, { file dir })
|
||||||
|
|
||||||
|
allow ktalkd_t ktalkd_var_run_t:file create_file_perms;
|
||||||
|
files_create_pid(ktalkd_t,ktalkd_var_run_t)
|
||||||
|
|
||||||
|
kernel_read_kernel_sysctl(ktalkd_t)
|
||||||
|
kernel_read_system_state(ktalkd_t)
|
||||||
|
kernel_read_network_state(ktalkd_t)
|
||||||
|
|
||||||
|
corenet_tcp_sendrecv_all_if(ktalkd_t)
|
||||||
|
corenet_raw_sendrecv_all_if(ktalkd_t)
|
||||||
|
corenet_tcp_sendrecv_all_nodes(ktalkd_t)
|
||||||
|
corenet_raw_sendrecv_all_nodes(ktalkd_t)
|
||||||
|
corenet_tcp_bind_all_nodes(ktalkd_t)
|
||||||
|
corenet_tcp_sendrecv_all_ports(ktalkd_t)
|
||||||
|
|
||||||
|
dev_read_urand(ktalkd_t)
|
||||||
|
|
||||||
|
fs_getattr_xattr_fs(ktalkd_t)
|
||||||
|
|
||||||
|
files_read_etc_files(ktalkd_t)
|
||||||
|
|
||||||
|
libs_use_ld_so(ktalkd_t)
|
||||||
|
libs_use_shared_libs(ktalkd_t)
|
||||||
|
logging_send_syslog_msg(ktalkd_t)
|
||||||
|
|
||||||
|
miscfiles_read_localization(ktalkd_t)
|
||||||
|
|
||||||
|
sysnet_read_config(ktalkd_t)
|
||||||
|
|
||||||
|
optional_policy(`nis.te',`
|
||||||
|
nis_use_ypbind(ktalkd_t)
|
||||||
|
')
|
||||||
|
|
||||||
|
optional_policy(`nscd.te',`
|
||||||
|
nscd_use_socket(ktalkd_t)
|
||||||
|
')
|
Loading…
Reference in New Issue
Block a user