## Tools for filesystem management, such as mkfs and fsck. ######################################## ## ## Execute fs tools in the fstools domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`fstools_domtrans',` gen_require(` type fsadm_t, fsadm_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, fsadm_exec_t, fsadm_t) ') ######################################## ## ## Execute fs tools in the fstools domain, and ## allow the specified role the fs tools domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## ## # interface(`fstools_run',` gen_require(` type fsadm_t; ') fstools_domtrans($1) role $2 types fsadm_t; ') ######################################## ## ## Execute fsadm in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_exec',` gen_require(` type fsadm_exec_t; ') can_exec($1, fsadm_exec_t) ') ######################################## ## ## Send signal to fsadm process ## ## ## ## Domain allowed access. ## ## # interface(`fstools_signal',` gen_require(` type fsadm_t; ') allow $1 fsadm_t:process signal; ') ######################################## ## ## Inherit fstools file descriptors. ## ## ## ## The type of the process performing this action. ## ## # interface(`fstools_use_fds',` gen_require(` type fsadm_t; ') allow $1 fsadm_t:fd use; ') ######################################## ## ## Read fstools unnamed pipes. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_read_pipes',` gen_require(` type fsadm_t; ') allow $1 fsadm_t:fifo_file read_fifo_file_perms; ') ######################################## ## ## Relabel a file to the type used by the ## filesystem tools programs. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_relabelto_entry_files',` gen_require(` type fsadm_exec_t; ') allow $1 fsadm_exec_t:file relabelto; ') ######################################## ## ## Create, read, write, and delete a file used by the ## filesystem tools programs. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_manage_entry_files',` gen_require(` type fsadm_exec_t; ') allow $1 fsadm_exec_t:file manage_file_perms; ') ######################################## ## ## Write to fsadm_log_t ## ## ## ## Domain allowed access. ## ## # interface(`fstools_write_log',` gen_require(` type fsadm_log_t; ') allow $1 fsadm_log_t:file write_file_perms; ') ######################################## ## ## Create, read, write, and delete filesystem tools ## runtime files. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_manage_runtime_files',` gen_require(` type fsadm_run_t; ') manage_files_pattern($1, fsadm_run_t, fsadm_run_t) ') ######################################## ## ## Getattr swapfile ## ## ## ## Domain allowed access. ## ## # interface(`fstools_getattr_swap_files',` gen_require(` type swapfile_t; ') allow $1 swapfile_t:file getattr; ') ######################################## ## ## Ignore access to a swapfile. ## ## ## ## Domain to not audit. ## ## # interface(`fstools_dontaudit_getattr_swap_files',` gen_require(` type swapfile_t; ') dontaudit $1 swapfile_t:file getattr; ') ######################################## ## ## Relabel to swapfile. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_relabelto_swap_files',` gen_require(` type swapfile_t; ') allow $1 swapfile_t:file relabelto; ') ######################################## ## ## Manage swapfile. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_manage_swap_files',` gen_require(` type swapfile_t; ') allow $1 swapfile_t:file manage_file_perms; ')