policy_module(mandb, 1.0.3) ######################################## # # Declarations # attribute_role mandb_roles; roleattribute system_r mandb_roles; type mandb_t; type mandb_exec_t; init_daemon_domain(mandb_t, mandb_exec_t) role mandb_roles types mandb_t; type mandb_cache_t; files_type(mandb_cache_t) type mandb_lock_t; files_lock_file(mandb_lock_t) ######################################## # # Local policy # allow mandb_t self:process { setsched signal }; allow mandb_t self:fifo_file rw_fifo_file_perms; allow mandb_t self:unix_stream_socket create_stream_socket_perms; manage_dirs_pattern(mandb_t, mandb_cache_t, mandb_cache_t) manage_files_pattern(mandb_t, mandb_cache_t, mandb_cache_t) manage_lnk_files_pattern(mandb_t, mandb_cache_t, mandb_cache_t) files_var_filetrans(mandb_t, mandb_cache_t, { dir file lnk_file }) can_exec(mandb_t, mandb_exec_t) allow mandb_t mandb_lock_t:file manage_file_perms; files_lock_filetrans(mandb_t, mandb_lock_t, file) kernel_read_system_state(mandb_t) corecmd_exec_bin(mandb_t) domain_use_interactive_fds(mandb_t) files_search_locks(mandb_t) miscfiles_manage_man_cache(mandb_t) optional_policy(` cron_system_entry(mandb_t, mandb_exec_t) ')