/* allow the children to access UNIX domain */ /* sockets created by the parent compartment */
grant uxsock server_children
Access | Specifies whether the rule is |
| options are: |
| • grant: Specifies an |
| in the compartment compartment_name to access the specified |
| IPC mechanism in the current compartment. |
| • access: Specifies a |
| in the current compartment to access the specified IPC mechanism |
| in the compartment compartment_name. |
Method | Specifies the method of communication this rule applies to. The options |
| are: |
| • pty: Specifies that the rule applies to pty used in interprocess |
| communication. |
| • fifo: Specifies that the rule applies to FIFOs. |
| • uxsock: Specifies that the rule applies to UNIX domain sockets. |
| • ipc: Specifies that the rule applies to SYSV and POSIX IPC objects, |
| such as shared memory, semaphores, and message queues. |
compartment_name | The name of the other compartment where processes in this |
| compartment can communicate with. |
The second type of IPC rule governs process access. The syntax for this type of rule is as follows:
(sendreceive) signal <compartment_name>
For example:
/* allow the parent to send signals to children */ send signal server_children
Direction | Specifies whether processes in the current compartment have access |
| to view and alter process behavior from another specified compartment. |
| The options are: |
| • send: Specifies a |
| current compartment to send signals view process data in the |
| compartment compartment_name. |
| • receive: Specifies an |
| compartment compartment_name to send signals and view |
| process data in the current compartment. |
signal | Specifies that this rule applies to signals and process visibility. |
compartment_name | The name of the other compartment where processes in the current |
| compartment can have access to view process information or to be |
| viewed from. |
Network Rules
Network rules govern access to network interfaces. Network rules also govern communication between processes that use INET domain communication (TCP/IP sockets and streams). The default behavior is to deny access to the network.
Network endpoints are treated as objects labeled with the compartment of the process that creates them. However, a network endpoint can be created by one process, then passed to another
Compartment Rules and Syntax 65