Chris PeBenito d9845a
Chris PeBenito 0251df
policy_module(iscsid,1.1.0)
Chris PeBenito d9845a
Chris PeBenito d9845a
########################################
Chris PeBenito d9845a
#
Chris PeBenito d9845a
# Declarations
Chris PeBenito d9845a
#
Chris PeBenito d9845a
Chris PeBenito d9845a
type iscsid_t;
Chris PeBenito d9845a
type iscsid_exec_t;
Chris PeBenito d9845a
domain_type(iscsid_t)
Chris PeBenito d9845a
init_daemon_domain(iscsid_t, iscsid_exec_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
type iscsi_lock_t;
Chris PeBenito d9845a
files_lock_file(iscsi_lock_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
type iscsi_tmp_t;
Chris PeBenito d9845a
files_tmp_file(iscsi_tmp_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
type iscsi_var_lib_t;
Chris PeBenito d9845a
files_type(iscsi_var_lib_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
type iscsi_var_run_t;
Chris PeBenito d9845a
files_pid_file(iscsi_var_run_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
########################################
Chris PeBenito d9845a
#
Chris PeBenito d9845a
# iscsid local policy
Chris PeBenito d9845a
#
Chris PeBenito d9845a
Chris PeBenito d9845a
allow iscsid_t self:capability { dac_override ipc_lock net_admin sys_nice sys_resource };
Chris PeBenito d9845a
allow iscsid_t self:process setsched;
Chris PeBenito d9845a
allow iscsid_t self:fifo_file { read write };
Chris PeBenito d9845a
allow iscsid_t self:unix_stream_socket { create_stream_socket_perms connectto };
Chris PeBenito d9845a
allow iscsid_t self:unix_dgram_socket create_socket_perms;
Chris PeBenito d9845a
allow iscsid_t self:sem create_sem_perms;
Chris PeBenito d9845a
allow iscsid_t self:shm create_shm_perms;
Chris PeBenito d9845a
allow iscsid_t self:netlink_socket create_socket_perms;
Chris PeBenito d9845a
allow iscsid_t self:netlink_route_socket rw_netlink_socket_perms;
Chris PeBenito d9845a
allow iscsid_t self:tcp_socket create_stream_socket_perms;
Chris PeBenito d9845a
Chris PeBenito d9845a
allow iscsid_t iscsi_lock_t:file manage_file_perms;
Chris PeBenito d9845a
files_lock_filetrans(iscsid_t,iscsi_lock_t,file)
Chris PeBenito d9845a
Chris PeBenito c0868a
allow iscsid_t iscsi_tmp_t:dir manage_dir_perms;
Chris PeBenito c0868a
allow iscsid_t iscsi_tmp_t:file manage_file_perms;
Chris PeBenito d9845a
fs_tmpfs_filetrans(iscsid_t, iscsi_tmp_t, file )
Chris PeBenito d9845a
Chris PeBenito d9845a
allow iscsid_t iscsi_var_lib_t:dir list_dir_perms;
Chris PeBenito c0868a
read_files_pattern(iscsid_t,iscsi_var_lib_t,iscsi_var_lib_t)
Chris PeBenito c0868a
read_lnk_files_pattern(iscsid_t,iscsi_var_lib_t,iscsi_var_lib_t)
Chris PeBenito d9845a
files_search_var_lib(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito c0868a
manage_files_pattern(iscsid_t,iscsi_var_run_t,iscsi_var_run_t)
Chris PeBenito d9845a
files_pid_filetrans(iscsid_t,iscsi_var_run_t,file)
Chris PeBenito d9845a
Chris PeBenito d9845a
corenet_non_ipsec_sendrecv(iscsid_t)
Chris PeBenito d9845a
corenet_tcp_sendrecv_all_if(iscsid_t)
Chris PeBenito d9845a
corenet_tcp_sendrecv_all_nodes(iscsid_t)
Chris PeBenito d9845a
corenet_tcp_sendrecv_all_ports(iscsid_t)
Chris PeBenito d9845a
corenet_tcp_connect_http_port(iscsid_t)
Chris PeBenito d9845a
corenet_tcp_connect_iscsi_port(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
dev_rw_sysfs(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
domain_use_interactive_fds(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
files_read_etc_files(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
libs_use_ld_so(iscsid_t)
Chris PeBenito d9845a
libs_use_shared_libs(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
logging_send_syslog_msg(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
miscfiles_read_localization(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
sysnet_dns_name_resolve(iscsid_t)
Chris PeBenito d9845a
Chris PeBenito d9845a
ifdef(`targeted_policy',`
Chris PeBenito d9845a
	term_use_generic_ptys(iscsid_t)
Chris PeBenito d9845a
')