policy_module(systemd_hs,0.0.1) # systemd overrides for 247 gen_require(` type init_t; type init_var_run_t; type kmsg_device_t; type proc_kmsg_t; type proc_security_t; type systemd_hostnamed_t; type systemd_localed_t; type systemd_logind_t; type systemd_resolved_t; type systemd_tmpfiles_t; type systemd_hwdb_t; type systemd_sysctl_t; type security_t; type tpm_device_t; type ramfs_t; type shadow_t; type syslogd_t; type user_tmp_t; type systemd_machined_t; type system_dbusd_var_run_t; type systemd_networkd_t; ') #============= init_t ============== allow init_t kmsg_device_t:chr_file mounton; allow init_t proc_kmsg_t:file { getattr mounton }; allow init_t ramfs_t:file manage_file_perms; allow init_t tpm_device_t:chr_file { read write open }; allow init_t shadow_t:file { read open }; #============= systemd_hwdb_t ============== allow systemd_hwdb_t security_t:file { read open }; allow systemd_hwdb_t self:netlink_selinux_socket { create bind }; #============= systemd_sysctl_t ============== allow systemd_sysctl_t proc_security_t:file read; #============= syslogd_t ============== allow syslogd_t user_tmp_t:dir search; #============= systemd_machined_t ============== allow systemd_machined_t init_var_run_t:sock_file manage_sock_file_perms; #============= systemd_networkd_t ============== allow systemd_networkd_t system_dbusd_var_run_t:sock_file *; selinux_use_status_page(init_t) selinux_use_status_page(systemd_hostnamed_t) selinux_use_status_page(systemd_localed_t) selinux_use_status_page(systemd_logind_t) selinux_use_status_page(systemd_resolved_t) selinux_use_status_page(systemd_tmpfiles_t) selinux_use_status_page(systemd_hwdb_t)