Blame strict/domains/program/unused/ciped.te
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
daemon_base_domain(ciped)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# for SSP
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t urandom_device_t:chr_file read;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
type cipe_port_t, port_type;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
can_network_udp(ciped_t)
|
|
Chris PeBenito |
0fbfa5 |
can_ypbind(ciped_t)
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t cipe_port_t:udp_socket name_bind;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t devpts_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t devtty_t:chr_file { read write };
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t etc_runtime_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t etc_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t proc_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t { bin_t sbin_t }:dir { getattr search read };
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t bin_t:lnk_file read;
|
|
Chris PeBenito |
0fbfa5 |
can_exec(ciped_t, { bin_t ciped_exec_t shell_exec_t })
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t self:fifo_file rw_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
read_locale(ciped_t)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t self:capability { net_admin ipc_lock sys_tty_config };
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t self:unix_dgram_socket create_socket_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t self:unix_stream_socket create_socket_perms;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow ciped_t random_device_t:chr_file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
dontaudit ciped_t var_t:dir search;
|