## UUID generation daemon. ######################################## ## ## Execute uuidd in the uuidd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`uuidd_domtrans',` gen_require(` type uuidd_t, uuidd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, uuidd_exec_t, uuidd_t) ') ######################################## ## ## Execute uuidd init scripts in ## the initrc domain. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_initrc_domtrans',` gen_require(` type uuidd_initrc_exec_t; ') init_labeled_script_domtrans($1, uuidd_initrc_exec_t) ') ######################################## ## ## Search uuidd lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_search_lib',` gen_require(` type uuidd_var_lib_t; ') files_search_var_lib($1) allow $1 uuidd_var_lib_t:dir search_dir_perms; ') ######################################## ## ## Read uuidd lib files. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_read_lib_files',` gen_require(` type uuidd_var_lib_t; ') files_search_var_lib($1) read_files_pattern($1, uuidd_var_lib_t, uuidd_var_lib_t) ') ######################################## ## ## Create, read, write, and delete ## uuidd lib files. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_manage_lib_files',` gen_require(` type uuidd_var_lib_t; ') files_search_var_lib($1) manage_files_pattern($1, uuidd_var_lib_t, uuidd_var_lib_t) ') ######################################## ## ## Create, read, write, and delete ## uuidd lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_manage_lib_dirs',` gen_require(` type uuidd_var_lib_t; ') files_search_var_lib($1) manage_dirs_pattern($1, uuidd_var_lib_t, uuidd_var_lib_t) ') ######################################## ## ## Read uuidd pid files. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_read_pid_files',` gen_require(` type uuidd_var_run_t; ') files_search_pids($1) allow $1 uuidd_var_run_t:file read_file_perms; ') ######################################## ## ## Connect to uuidd with an unix ## domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`uuidd_stream_connect_manager',` gen_require(` type uuidd_t, uuidd_var_run_t, uuidd_var_lib_t; ') files_search_pids($1) stream_connect_pattern($1, uuidd_var_run_t, uuidd_var_run_t, uuidd_t) stream_connect_pattern($1, uuidd_var_lib_t, uuidd_var_lib_t, uuidd_t) ') ######################################## ## ## All of the rules required to ## administrate an uuidd environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`uuidd_admin',` gen_require(` type uuidd_t, uuidd_initrc_exec_t; type uuidd_var_run_t, uuidd_var_lib_t; ') allow $1 uuidd_t:process signal_perms; ps_process_pattern($1, uuidd_t) tunable_policy(`deny_ptrace',`',` allow $1 uuidd_t:process ptrace; ') uuidd_initrc_domtrans($1) domain_system_change_exemption($1) role_transition $2 uuidd_initrc_exec_t system_r; allow $2 system_r; files_search_var_lib($1) admin_pattern($1, uuidd_var_lib_t) files_search_pids($1) admin_pattern($1, uuidd_var_run_t) ')