7172f2
policy_module(systemd_hs,0.0.1)
7172f2
7172f2
gen_require(`
813ede
	type cgroup_t;
813ede
	type default_t;
813ede
	type init_exec_t;
7172f2
	type init_t;
7172f2
	type init_var_run_t;
813ede
	type kernel_t;
813ede
	type loadkeys_t;
7172f2
	type syslogd_t;
813ede
	type syslogd_var_run_t;
10eaf0
	type system_dbusd_var_run_t;
813ede
	type systemd_gpt_generator_t;
813ede
	type systemd_network_generator_t;
10eaf0
	type systemd_networkd_t;
813ede
	type systemd_userdbd_t;
813ede
	type tmpfs_t;
7172f2
')
7172f2
10eaf0
#============= init_t ==============
813ede
allow init_t self:netlink_netfilter_socket { bind create getattr getopt setopt };
813ede
allow init_t self:vsock_socket { bind connect create getopt setopt };
813ede
allow init_t syslogd_var_run_t:file { setattr write };
10eaf0
813ede
#============= loadkeys_t ==============
813ede
allow loadkeys_t default_t:lnk_file read;
813ede
allow loadkeys_t init_exec_t:file getattr;
10eaf0
10eaf0
#============= syslogd_t ==============
10eaf0
813ede
#!!!! This avc can be allowed using the boolean 'logging_syslogd_list_non_security_dirs'
813ede
allow syslogd_t cgroup_t:dir read;
813ede
813ede
#============= systemd_gpt_generator_t ==============
813ede
allow systemd_gpt_generator_t tmpfs_t:filesystem mount;
813ede
813ede
#============= systemd_network_generator_t ==============
813ede
allow systemd_network_generator_t init_var_run_t:file { create getattr open read rename setattr write };
813ede
allow systemd_network_generator_t kernel_t:unix_dgram_socket sendto;
10eaf0
10eaf0
#============= systemd_networkd_t ==============
813ede
allow systemd_networkd_t system_dbusd_var_run_t:sock_file watch;
813ede
813ede
#============= systemd_userdbd_t ==============
813ede
allow systemd_userdbd_t self:capability sys_resource;