Chris PeBenito d9845ae
Chris PeBenito 1900668
policy_module(iscsid,1.1.1)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
########################################
Chris PeBenito d9845ae
#
Chris PeBenito d9845ae
# Declarations
Chris PeBenito d9845ae
#
Chris PeBenito d9845ae
Chris PeBenito d9845ae
type iscsid_t;
Chris PeBenito d9845ae
type iscsid_exec_t;
Chris PeBenito d9845ae
domain_type(iscsid_t)
Chris PeBenito d9845ae
init_daemon_domain(iscsid_t, iscsid_exec_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
type iscsi_lock_t;
Chris PeBenito d9845ae
files_lock_file(iscsi_lock_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
type iscsi_tmp_t;
Chris PeBenito d9845ae
files_tmp_file(iscsi_tmp_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
type iscsi_var_lib_t;
Chris PeBenito d9845ae
files_type(iscsi_var_lib_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
type iscsi_var_run_t;
Chris PeBenito d9845ae
files_pid_file(iscsi_var_run_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
########################################
Chris PeBenito d9845ae
#
Chris PeBenito d9845ae
# iscsid local policy
Chris PeBenito d9845ae
#
Chris PeBenito d9845ae
Chris PeBenito d9845ae
allow iscsid_t self:capability { dac_override ipc_lock net_admin sys_nice sys_resource };
Chris PeBenito d9845ae
allow iscsid_t self:process setsched;
Chris PeBenito d9845ae
allow iscsid_t self:fifo_file { read write };
Chris PeBenito d9845ae
allow iscsid_t self:unix_stream_socket { create_stream_socket_perms connectto };
Chris PeBenito d9845ae
allow iscsid_t self:unix_dgram_socket create_socket_perms;
Chris PeBenito d9845ae
allow iscsid_t self:sem create_sem_perms;
Chris PeBenito d9845ae
allow iscsid_t self:shm create_shm_perms;
Chris PeBenito d9845ae
allow iscsid_t self:netlink_socket create_socket_perms;
Chris PeBenito d9845ae
allow iscsid_t self:netlink_route_socket rw_netlink_socket_perms;
Chris PeBenito d9845ae
allow iscsid_t self:tcp_socket create_stream_socket_perms;
Chris PeBenito d9845ae
Chris PeBenito d9845ae
allow iscsid_t iscsi_lock_t:file manage_file_perms;
Chris PeBenito d9845ae
files_lock_filetrans(iscsid_t,iscsi_lock_t,file)
Chris PeBenito d9845ae
Chris PeBenito c0868a7
allow iscsid_t iscsi_tmp_t:dir manage_dir_perms;
Chris PeBenito c0868a7
allow iscsid_t iscsi_tmp_t:file manage_file_perms;
Chris PeBenito d9845ae
fs_tmpfs_filetrans(iscsid_t, iscsi_tmp_t, file )
Chris PeBenito d9845ae
Chris PeBenito d9845ae
allow iscsid_t iscsi_var_lib_t:dir list_dir_perms;
Chris PeBenito c0868a7
read_files_pattern(iscsid_t,iscsi_var_lib_t,iscsi_var_lib_t)
Chris PeBenito c0868a7
read_lnk_files_pattern(iscsid_t,iscsi_var_lib_t,iscsi_var_lib_t)
Chris PeBenito d9845ae
files_search_var_lib(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito c0868a7
manage_files_pattern(iscsid_t,iscsi_var_run_t,iscsi_var_run_t)
Chris PeBenito d9845ae
files_pid_filetrans(iscsid_t,iscsi_var_run_t,file)
Chris PeBenito d9845ae
Chris PeBenito 1900668
corenet_all_recvfrom_unlabeled(iscsid_t)
Chris PeBenito 1900668
corenet_all_recvfrom_netlabel(iscsid_t)
Chris PeBenito d9845ae
corenet_tcp_sendrecv_all_if(iscsid_t)
Chris PeBenito d9845ae
corenet_tcp_sendrecv_all_nodes(iscsid_t)
Chris PeBenito d9845ae
corenet_tcp_sendrecv_all_ports(iscsid_t)
Chris PeBenito d9845ae
corenet_tcp_connect_http_port(iscsid_t)
Chris PeBenito d9845ae
corenet_tcp_connect_iscsi_port(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
dev_rw_sysfs(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
domain_use_interactive_fds(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
files_read_etc_files(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
libs_use_ld_so(iscsid_t)
Chris PeBenito d9845ae
libs_use_shared_libs(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
logging_send_syslog_msg(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
miscfiles_read_localization(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
sysnet_dns_name_resolve(iscsid_t)
Chris PeBenito d9845ae
Chris PeBenito d9845ae
ifdef(`targeted_policy',`
Chris PeBenito d9845ae
	term_use_generic_ptys(iscsid_t)
Chris PeBenito d9845ae
')