Blob Blame History Raw
policy_module(systemd_hs,0.0.1)

# systemd overrides for 247
gen_require(`
	type init_t;
	type init_var_run_t;
	type kmsg_device_t;
	type proc_kmsg_t;
	type proc_security_t;
	type systemd_hostnamed_t;
	type systemd_localed_t;
	type systemd_logind_t;
	type systemd_resolved_t;
	type systemd_tmpfiles_t;
	type systemd_hwdb_t;
	type systemd_sysctl_t;
	type security_t;
	type tpm_device_t;
	type ramfs_t;
	type shadow_t;
	type syslogd_t;
	type user_tmp_t;
	type systemd_machined_t;
	type system_dbusd_var_run_t;
	type systemd_networkd_t;
')

#============= init_t ==============
allow init_t kmsg_device_t:chr_file mounton;
allow init_t proc_kmsg_t:file { getattr mounton };
allow init_t ramfs_t:file manage_file_perms;
allow init_t tpm_device_t:chr_file { read write open };
allow init_t shadow_t:file { read open };

#============= systemd_hwdb_t ==============
allow systemd_hwdb_t security_t:file { read open };
allow systemd_hwdb_t self:netlink_selinux_socket { create bind };

#============= systemd_sysctl_t ==============
allow systemd_sysctl_t proc_security_t:file read;

#============= syslogd_t ==============
allow syslogd_t user_tmp_t:dir search;

#============= systemd_machined_t ==============
allow systemd_machined_t init_var_run_t:sock_file manage_sock_file_perms;

#============= systemd_networkd_t ==============
allow systemd_networkd_t system_dbusd_var_run_t:sock_file watch;

selinux_use_status_page(init_t)
selinux_use_status_page(systemd_hostnamed_t)
selinux_use_status_page(systemd_localed_t)
selinux_use_status_page(systemd_logind_t)
selinux_use_status_page(systemd_resolved_t)
selinux_use_status_page(systemd_tmpfiles_t)
selinux_use_status_page(systemd_hwdb_t)