add content
This commit is contained in:
6
sec-policy/selinux-hostapd/files/hostapd.fc
Normal file
6
sec-policy/selinux-hostapd/files/hostapd.fc
Normal file
@@ -0,0 +1,6 @@
|
||||
/usr/sbin/hostapd -- gen_context(system_u:object_r:hostapd_exec_t,s0)
|
||||
|
||||
/var/run/hostapd(/.*)? gen_context(system_u:object_r:hostapd_var_run_t,s0)
|
||||
/etc/hostapd(/.*)? gen_context(system_u:object_r:hostapd_conf_t,s0)
|
||||
|
||||
/run/hostapd.pid -- gen_context(system_u:object_r:hostapd_var_run_t,s0)
|
||||
56
sec-policy/selinux-hostapd/files/hostapd.te
Normal file
56
sec-policy/selinux-hostapd/files/hostapd.te
Normal file
@@ -0,0 +1,56 @@
|
||||
policy_module(hostapd, 1.0.0)
|
||||
|
||||
########################################
|
||||
#
|
||||
# Declarations
|
||||
#
|
||||
|
||||
type hostapd_t;
|
||||
type hostapd_exec_t;
|
||||
init_daemon_domain(hostapd_t, hostapd_exec_t)
|
||||
|
||||
type hostapd_var_run_t;
|
||||
files_pid_file(hostapd_var_run_t)
|
||||
|
||||
type hostapd_conf_t;
|
||||
files_type(hostapd_conf_t)
|
||||
########################################
|
||||
#
|
||||
# hostapd local policy
|
||||
#
|
||||
allow hostapd_t self:capability { fsetid chown net_admin net_raw dac_read_search dac_override };
|
||||
allow hostapd_t self:fifo_file rw_fifo_file_perms;
|
||||
allow hostapd_t self:unix_stream_socket create_stream_socket_perms;
|
||||
allow hostapd_t self:netlink_socket create_socket_perms;
|
||||
allow hostapd_t self:netlink_generic_socket create_socket_perms;
|
||||
allow hostapd_t self:netlink_route_socket create_netlink_socket_perms;
|
||||
allow hostapd_t self:packet_socket create_socket_perms;
|
||||
|
||||
manage_dirs_pattern(hostapd_t, hostapd_var_run_t, hostapd_var_run_t)
|
||||
manage_files_pattern(hostapd_t, hostapd_var_run_t, hostapd_var_run_t)
|
||||
manage_lnk_files_pattern(hostapd_t, hostapd_var_run_t, hostapd_var_run_t)
|
||||
manage_sock_files_pattern(hostapd_t, hostapd_var_run_t, hostapd_var_run_t)
|
||||
files_pid_filetrans(hostapd_t, hostapd_var_run_t, { dir file lnk_file sock_file })
|
||||
|
||||
read_files_pattern(hostapd_t, hostapd_conf_t, hostapd_conf_t)
|
||||
|
||||
kernel_read_system_state(hostapd_t)
|
||||
kernel_read_network_state(hostapd_t)
|
||||
kernel_request_load_module(hostapd_t)
|
||||
kernel_rw_net_sysctls(hostapd_t)
|
||||
dev_rw_sysfs(hostapd_t)
|
||||
|
||||
#allow initrc_t hostapd_conf_t:file read;
|
||||
|
||||
dev_read_rand(hostapd_t)
|
||||
dev_read_urand(hostapd_t)
|
||||
dev_read_sysfs(hostapd_t)
|
||||
dev_rw_wireless(hostapd_t)
|
||||
|
||||
domain_use_interactive_fds(hostapd_t)
|
||||
|
||||
auth_use_nsswitch(hostapd_t)
|
||||
|
||||
logging_send_syslog_msg(hostapd_t)
|
||||
|
||||
miscfiles_read_localization(hostapd_t)
|
||||
Reference in New Issue
Block a user