--- nsaserefpolicy/policy/modules/services/radvd.fc 2008-08-07 11:15:11.000000000 -0400 +++ serefpolicy-3.5.5/policy/modules/services/radvd.fc 2008-08-14 13:53:54.000000000 -0400 @@ -5,3 +5,4 @@ /var/run/radvd\.pid -- gen_context(system_u:object_r:radvd_var_run_t,s0) /var/run/radvd(/.*)? gen_context(system_u:object_r:radvd_var_run_t,s0) +/etc/rc.d/init.d/radvd -- gen_context(system_u:object_r:radvd_script_exec_t,s0) --- nsaserefpolicy/policy/modules/services/radvd.if 2008-08-07 11:15:11.000000000 -0400 +++ serefpolicy-3.5.5/policy/modules/services/radvd.if 2008-08-14 13:53:54.000000000 -0400 @@ -2,6 +2,25 @@ ######################################## ## +## Execute radvd server in the radvd domain. +## +## +## +## The type of the process performing this action. +## +## +# +# +interface(`radvd_script_domtrans',` + gen_require(` + type radvd_script_exec_t; + ') + + init_script_domtrans_spec($1, radvd_script_exec_t) +') + +######################################## +## ## All of the rules required to administrate ## an radvd environment ## @@ -16,14 +35,21 @@ gen_require(` type radvd_t, radvd_etc_t; type radvd_var_run_t; + type radvd_script_exec_t; ') allow $1 radvd_t:process { ptrace signal_perms getattr }; ps_process_pattern($1, radvd_t) + # Allow radvd_t to restart the apache service + radvd_script_domtrans($1) + domain_system_change_exemption($1) + role_transition $2 radvd_script_exec_t system_r; + allow $2 system_r; + files_list_etc($1) - manage_files_pattern($1, radvd_etc_t, radvd_etc_t) + admin_pattern($1, radvd_etc_t) files_list_pids($1) - manage_files_pattern($1, radvd_var_run_t, radvd_var_run_t) + admin_pattern($1, radvd_var_run_t) ') --- nsaserefpolicy/policy/modules/services/radvd.te 2008-08-07 11:15:11.000000000 -0400 +++ serefpolicy-3.5.5/policy/modules/services/radvd.te 2008-08-14 13:53:54.000000000 -0400 @@ -15,6 +15,9 @@ type radvd_etc_t; files_config_file(radvd_etc_t) +type radvd_script_exec_t; +init_script_type(radvd_script_exec_t) + ######################################## # # Local policy @@ -27,6 +30,7 @@ allow radvd_t self:rawip_socket create_socket_perms; allow radvd_t self:tcp_socket create_stream_socket_perms; allow radvd_t self:udp_socket create_socket_perms; +allow radvd_t self:fifo_file rw_file_perms; allow radvd_t radvd_etc_t:file read_file_perms;