Dominick Grift 1464a9a
policy_module(ktalk, 1.8.1)
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# Declarations
1ec3d1a
#
1ec3d1a
1ec3d1a
type ktalkd_t;
1ec3d1a
type ktalkd_exec_t;
1ec3d1a
inetd_udp_service_domain(ktalkd_t, ktalkd_exec_t)
1ec3d1a
1ec3d1a
type ktalkd_log_t;
1ec3d1a
logging_log_file(ktalkd_log_t)
1ec3d1a
1ec3d1a
type ktalkd_tmp_t;
1ec3d1a
files_tmp_file(ktalkd_tmp_t)
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# Local policy
1ec3d1a
#
1ec3d1a
1ec3d1a
allow ktalkd_t self:process signal_perms;
1ec3d1a
allow ktalkd_t self:fifo_file rw_fifo_file_perms;
Dominick Grift 1464a9a
allow ktalkd_t self:tcp_socket { accept listen };
Dominick Grift 1464a9a
Dominick Grift 1464a9a
allow ktalkd_t ktalkd_log_t:file { append_file_perms create_file_perms setattr_file_perms };
1ec3d1a
logging_log_filetrans(ktalkd_t, ktalkd_log_t, file)
1ec3d1a
1ec3d1a
manage_dirs_pattern(ktalkd_t, ktalkd_tmp_t, ktalkd_tmp_t)
1ec3d1a
manage_files_pattern(ktalkd_t, ktalkd_tmp_t, ktalkd_tmp_t)
1ec3d1a
files_tmp_filetrans(ktalkd_t, ktalkd_tmp_t, { file dir })
1ec3d1a
1ec3d1a
kernel_read_kernel_sysctls(ktalkd_t)
1ec3d1a
kernel_read_system_state(ktalkd_t)
1ec3d1a
kernel_read_network_state(ktalkd_t)
1ec3d1a
1ec3d1a
corenet_all_recvfrom_netlabel(ktalkd_t)
1ec3d1a
corenet_tcp_sendrecv_generic_if(ktalkd_t)
1ec3d1a
corenet_udp_sendrecv_generic_if(ktalkd_t)
1ec3d1a
corenet_tcp_sendrecv_generic_node(ktalkd_t)
1ec3d1a
corenet_udp_sendrecv_generic_node(ktalkd_t)
1ec3d1a
corenet_tcp_sendrecv_all_ports(ktalkd_t)
1ec3d1a
corenet_udp_sendrecv_all_ports(ktalkd_t)
1ec3d1a
1ec3d1a
dev_read_urand(ktalkd_t)
1ec3d1a
1ec3d1a
fs_getattr_xattr_fs(ktalkd_t)
1ec3d1a
1ec3d1a
term_search_ptys(ktalkd_t)
1ec3d1a
term_use_all_inherited_terms(ktalkd_t)
1ec3d1a
1ec3d1a
auth_use_nsswitch(ktalkd_t)
1ec3d1a
1ec3d1a
init_read_utmp(ktalkd_t)
1ec3d1a
1ec3d1a
logging_send_syslog_msg(ktalkd_t)