2008-04-29 13:58:34 +00:00
|
|
|
## <summary>General system administration role</summary>
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
2008-11-05 16:10:46 +00:00
|
|
|
## Change to the system administrator role.
|
2008-04-29 13:58:34 +00:00
|
|
|
## </summary>
|
2008-11-05 16:10:46 +00:00
|
|
|
## <param name="role">
|
2008-04-29 13:58:34 +00:00
|
|
|
## <summary>
|
2008-11-05 16:10:46 +00:00
|
|
|
## Role allowed access.
|
2008-04-29 13:58:34 +00:00
|
|
|
## </summary>
|
|
|
|
## </param>
|
2020-02-15 19:11:43 +00:00
|
|
|
## <param name="domain">
|
2021-06-30 08:03:44 +00:00
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
2020-02-15 19:11:43 +00:00
|
|
|
## </param>
|
2008-04-29 13:58:34 +00:00
|
|
|
## <rolecap/>
|
|
|
|
#
|
2008-11-05 16:10:46 +00:00
|
|
|
interface(`sysadm_role_change',`
|
|
|
|
gen_require(`
|
2020-02-15 19:11:43 +00:00
|
|
|
type sysadm_t;
|
2008-11-05 16:10:46 +00:00
|
|
|
role sysadm_r;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 sysadm_r;
|
2020-02-15 19:11:43 +00:00
|
|
|
|
|
|
|
tunable_policy(`sysadm_allow_rw_inherited_fifo', `
|
|
|
|
allow sysadm_t $2:fifo_file rw_inherited_fifo_file_perms;
|
|
|
|
')
|
2008-04-29 13:58:34 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
2008-11-05 16:10:46 +00:00
|
|
|
## Change from the system administrator role.
|
2008-04-29 13:58:34 +00:00
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
2008-11-05 16:10:46 +00:00
|
|
|
## Change from the system administrator role to
|
2008-04-29 13:58:34 +00:00
|
|
|
## the specified role.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
2008-11-05 16:10:46 +00:00
|
|
|
## This is an interface to support third party modules
|
2008-04-29 13:58:34 +00:00
|
|
|
## and its use is not allowed in upstream reference
|
|
|
|
## policy.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
2008-11-05 16:10:46 +00:00
|
|
|
## <param name="role">
|
2008-04-29 13:58:34 +00:00
|
|
|
## <summary>
|
2008-11-05 16:10:46 +00:00
|
|
|
## Role allowed access.
|
2008-04-29 13:58:34 +00:00
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
## <rolecap/>
|
|
|
|
#
|
2008-11-05 16:10:46 +00:00
|
|
|
interface(`sysadm_role_change_to',`
|
|
|
|
gen_require(`
|
|
|
|
role sysadm_r;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow sysadm_r $1;
|
2008-04-29 13:58:34 +00:00
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a shell in the sysadm domain.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_shell_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
corecmd_shell_domtrans($1, sysadm_t)
|
|
|
|
allow sysadm_t $1:fd use;
|
2020-04-17 19:48:41 +00:00
|
|
|
allow sysadm_t $1:fifo_file rw_inherited_fifo_file_perms;
|
2008-04-29 13:58:34 +00:00
|
|
|
allow sysadm_t $1:process sigchld;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a generic bin program in the sysadm domain.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_bin_spec_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
corecmd_bin_spec_domtrans($1, sysadm_t)
|
|
|
|
allow sysadm_t $1:fd use;
|
2020-04-17 19:48:41 +00:00
|
|
|
allow sysadm_t $1:fifo_file rw_inherited_fifo_file_perms;
|
2008-04-29 13:58:34 +00:00
|
|
|
allow sysadm_t $1:process sigchld;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute all entrypoint files in the sysadm domain. This
|
|
|
|
## is an explicit transition, requiring the
|
|
|
|
## caller to use setexeccon().
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_entry_spec_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
domain_entry_file_spec_domtrans($1, sysadm_t)
|
|
|
|
allow sysadm_t $1:fd use;
|
2020-04-17 19:48:41 +00:00
|
|
|
allow sysadm_t $1:fifo_file rw_inherited_fifo_file_perms;
|
2008-04-29 13:58:34 +00:00
|
|
|
allow sysadm_t $1:process sigchld;
|
|
|
|
')
|
|
|
|
|
2009-01-15 15:07:37 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Allow sysadm to execute all entrypoint files in
|
|
|
|
## a specified domain. This is an explicit transition,
|
|
|
|
## requiring the caller to use setexeccon().
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## Allow sysadm to execute all entrypoint files in
|
|
|
|
## a specified domain. This is an explicit transition,
|
|
|
|
## requiring the caller to use setexeccon().
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## This is a interface to support third party modules
|
|
|
|
## and its use is not allowed in upstream reference
|
|
|
|
## policy.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_entry_spec_domtrans_to',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
domain_entry_file_spec_domtrans(sysadm_t, $1)
|
|
|
|
allow $1 sysadm_t:fd use;
|
2020-04-17 19:48:41 +00:00
|
|
|
allow $1 sysadm_t:fifo_file rw_inherited_fifo_file_perms;
|
2009-01-15 15:07:37 +00:00
|
|
|
allow $1 sysadm_t:process sigchld;
|
|
|
|
')
|
|
|
|
|
2008-04-29 13:58:34 +00:00
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Allow sysadm to execute a generic bin program in
|
|
|
|
## a specified domain. This is an explicit transition,
|
|
|
|
## requiring the caller to use setexeccon().
|
|
|
|
## </summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## Allow sysadm to execute a generic bin program in
|
|
|
|
## a specified domain.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## This is a interface to support third party modules
|
|
|
|
## and its use is not allowed in upstream reference
|
|
|
|
## policy.
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain to execute in.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_bin_spec_domtrans_to',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
corecmd_bin_spec_domtrans(sysadm_t, $1)
|
|
|
|
allow $1 sysadm_t:fd use;
|
2020-04-17 19:48:41 +00:00
|
|
|
allow $1 sysadm_t:fifo_file rw_inherited_fifo_file_perms;
|
2008-04-29 13:58:34 +00:00
|
|
|
allow $1 sysadm_t:process sigchld;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Send a SIGCHLD signal to sysadm users.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_sigchld',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 sysadm_t:process sigchld;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Inherit and use sysadm file descriptors
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_use_fds',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 sysadm_t:fd use;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Read and write sysadm user unnamed pipes.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed access.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`sysadm_rw_pipes',`
|
|
|
|
gen_require(`
|
|
|
|
type sysadm_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 sysadm_t:fifo_file rw_fifo_file_perms;
|
|
|
|
')
|