--- nsaserefpolicy/policy/modules/services/radvd.fc 2008-08-07 11:15:11.000000000 -0400
+++ serefpolicy-3.5.5/policy/modules/services/radvd.fc 2008-08-14 13:53:54.000000000 -0400
@@ -5,3 +5,4 @@
/var/run/radvd\.pid -- gen_context(system_u:object_r:radvd_var_run_t,s0)
/var/run/radvd(/.*)? gen_context(system_u:object_r:radvd_var_run_t,s0)
+/etc/rc.d/init.d/radvd -- gen_context(system_u:object_r:radvd_script_exec_t,s0)
--- nsaserefpolicy/policy/modules/services/radvd.if 2008-08-07 11:15:11.000000000 -0400
+++ serefpolicy-3.5.5/policy/modules/services/radvd.if 2008-08-14 13:53:54.000000000 -0400
@@ -2,6 +2,25 @@
########################################
##
+## Execute radvd server in the radvd domain.
+##
+##
+##
+## The type of the process performing this action.
+##
+##
+#
+#
+interface(`radvd_script_domtrans',`
+ gen_require(`
+ type radvd_script_exec_t;
+ ')
+
+ init_script_domtrans_spec($1, radvd_script_exec_t)
+')
+
+########################################
+##
## All of the rules required to administrate
## an radvd environment
##
@@ -16,14 +35,21 @@
gen_require(`
type radvd_t, radvd_etc_t;
type radvd_var_run_t;
+ type radvd_script_exec_t;
')
allow $1 radvd_t:process { ptrace signal_perms getattr };
ps_process_pattern($1, radvd_t)
+ # Allow radvd_t to restart the apache service
+ radvd_script_domtrans($1)
+ domain_system_change_exemption($1)
+ role_transition $2 radvd_script_exec_t system_r;
+ allow $2 system_r;
+
files_list_etc($1)
- manage_files_pattern($1, radvd_etc_t, radvd_etc_t)
+ admin_pattern($1, radvd_etc_t)
files_list_pids($1)
- manage_files_pattern($1, radvd_var_run_t, radvd_var_run_t)
+ admin_pattern($1, radvd_var_run_t)
')
--- nsaserefpolicy/policy/modules/services/radvd.te 2008-08-07 11:15:11.000000000 -0400
+++ serefpolicy-3.5.5/policy/modules/services/radvd.te 2008-08-14 13:53:54.000000000 -0400
@@ -15,6 +15,9 @@
type radvd_etc_t;
files_config_file(radvd_etc_t)
+type radvd_script_exec_t;
+init_script_type(radvd_script_exec_t)
+
########################################
#
# Local policy
@@ -27,6 +30,7 @@
allow radvd_t self:rawip_socket create_socket_perms;
allow radvd_t self:tcp_socket create_stream_socket_perms;
allow radvd_t self:udp_socket create_socket_perms;
+allow radvd_t self:fifo_file rw_file_perms;
allow radvd_t radvd_etc_t:file read_file_perms;