124720a697
New property_contexts file for property selabel backend. New property.te file with property type declarations. New property_service security class and set permission. Allow rules for setting properties.
24 lines
1.2 KiB
Text
24 lines
1.2 KiB
Text
allow unconfineddomain self:capability_class_set *;
|
|
allow unconfineddomain kernel:security *;
|
|
allow unconfineddomain kernel:system *;
|
|
allow unconfineddomain self:memprotect *;
|
|
allow unconfineddomain domain:process *;
|
|
allow unconfineddomain domain:fd *;
|
|
allow unconfineddomain domain:dir r_dir_perms;
|
|
allow unconfineddomain domain:lnk_file r_file_perms;
|
|
allow unconfineddomain domain:{ fifo_file file } rw_file_perms;
|
|
allow unconfineddomain domain:socket_class_set *;
|
|
allow unconfineddomain domain:ipc_class_set *;
|
|
allow unconfineddomain domain:key *;
|
|
allow unconfineddomain fs_type:filesystem *;
|
|
allow unconfineddomain fs_type:dir_file_class_set *;
|
|
allow unconfineddomain dev_type:dir_file_class_set *;
|
|
allow unconfineddomain file_type:dir_file_class_set *;
|
|
allow unconfineddomain node_type:node *;
|
|
allow unconfineddomain node_type:{ tcp_socket udp_socket } node_bind;
|
|
allow unconfineddomain netif_type:netif *;
|
|
allow unconfineddomain port_type:socket_class_set name_bind;
|
|
allow unconfineddomain port_type:{ tcp_socket dccp_socket } name_connect;
|
|
allow unconfineddomain domain:peer recv;
|
|
allow unconfineddomain domain:binder { call transfer receive };
|
|
allow unconfineddomain property_type:property_service set;
|