policy_module(realmd, 1.0.0) ######################################## # # Declarations # type realmd_t; type realmd_exec_t; application_domain(realmd_t, realmd_exec_t) role system_r types realmd_t; ######################################## # # realmd local policy # allow realmd_t self:capability sys_nice; allow realmd_t self:process setsched; kernel_read_system_state(realmd_t) corecmd_exec_bin(realmd_t) corecmd_exec_shell(realmd_t) corenet_tcp_connect_http_port(realmd_t) domain_use_interactive_fds(realmd_t) dev_read_rand(realmd_t) dev_read_urand(realmd_t) fs_getattr_all_fs(realmd_t) auth_use_nsswitch(realmd_t) logging_send_syslog_msg(realmd_t) sysnet_dns_name_resolve(realmd_t) systemd_exec_systemctl(realmd_t) #userdom_admin_home_dir_filetrans(realmd_t, cache_home_t, dir, ".cache") #userdom_user_home_dir_filetrans(realmd_t, cache_home_t, dir, ".cache") optional_policy(` authconfig_domtrans(realmd_t) ') optional_policy(` dbus_system_domain(realmd_t, realmd_exec_t) optional_policy(` networkmanager_dbus_chat(realmd_t) ') optional_policy(` policykit_dbus_chat(realmd_t) ') ') optional_policy(` hostname_exec(realmd_t) ') optional_policy(` kerberos_use(realmd_t) kerberos_rw_keytab(realmd_t) ') optional_policy(` nis_exec_ypbind(realmd_t) nis_systemctl_ypbind(realmd_t) ') optional_policy(` gnome_read_config(realmd_t) gnome_read_generic_cache_files(realmd_t) gnome_write_generic_cache_files(realmd_t) gnome_manage_cache_home_dir(realmd_t) ') optional_policy(` samba_domtrans_net(realmd_t) samba_manage_config(realmd_t) samba_getattr_winbind(realmd_t) ') optional_policy(` sssd_getattr_exec(realmd_t) sssd_manage_config(realmd_t) sssd_manage_lib_files(realmd_t) sssd_manage_public_files(realmd_t) sssd_read_pid_files(realmd_t) sssd_systemctl(realmd_t) ') optional_policy(` xserver_read_state_xdm(realmd_t) ')