selinux-refpolicy/policy/modules/system/setrans.te
2006-07-12 20:32:27 +00:00

71 lines
1.8 KiB
Plaintext

policy_module(setrans,1.0.1)
########################################
#
# Declarations
#
type setrans_t;
# real declaration moved to mls until
# range_transition works in loadable modules
gen_require(`
type setrans_exec_t;
')
init_daemon_domain(setrans_t, setrans_exec_t)
type setrans_var_run_t;
files_pid_file(setrans_var_run_t)
mls_trusted_object(setrans_var_run_t)
########################################
#
# setrans local policy
#
allow setrans_t self:capability sys_resource;
allow setrans_t self:process { setrlimit setcap signal_perms };
allow setrans_t self:unix_stream_socket create_stream_socket_perms;
allow setrans_t self:unix_dgram_socket create_socket_perms;
allow setrans_t self:netlink_selinux_socket create_socket_perms;
can_exec(setrans_t, setrans_exec_t)
corecmd_search_sbin(setrans_t)
# create unix domain socket in /var
allow setrans_t setrans_var_run_t:sock_file manage_file_perms;
allow setrans_t setrans_var_run_t:file manage_file_perms;
allow setrans_t setrans_var_run_t:dir rw_dir_perms;
files_pid_filetrans(setrans_t,setrans_var_run_t,file)
kernel_read_kernel_sysctls(setrans_t)
kernel_read_proc_symlinks(setrans_t)
# allow performing getpidcon() on all processes
domain_read_all_domains_state(setrans_t)
domain_getattr_all_domains(setrans_t)
domain_getsession_all_domains(setrans_t)
files_read_etc_runtime_files(setrans_t)
mls_file_read_up(setrans_t)
mls_file_write_down(setrans_t)
mls_net_receive_all_levels(setrans_t)
mls_rangetrans_target(setrans_t)
selinux_compute_access_vector(setrans_t)
term_dontaudit_use_generic_ptys(setrans_t)
init_use_fds(setrans_t)
init_dontaudit_use_script_ptys(setrans_t)
libs_use_ld_so(setrans_t)
libs_use_shared_libs(setrans_t)
logging_send_syslog_msg(setrans_t)
miscfiles_read_localization(setrans_t)
seutil_read_config(setrans_t)