patch from dan to remove rhgb and gph:fd use
This commit is contained in:
parent
1328802a41
commit
2629c6595a
@ -99,8 +99,3 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(acct_t)
|
udev_read_db(acct_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(acct_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -70,9 +70,4 @@ ifdef(`targeted_policy',`
|
|||||||
udev_read_db(dmesg_t)
|
udev_read_db(dmesg_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(dmesg_t)
|
|
||||||
')
|
|
||||||
') dnl endif TODO
|
|
||||||
')
|
')
|
||||||
|
@ -152,9 +152,6 @@ optional_policy(`udev',`
|
|||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
allow kudzu_t modules_conf_t:file unlink;
|
allow kudzu_t modules_conf_t:file unlink;
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(kudzu_t)
|
|
||||||
')
|
|
||||||
optional_policy(`lpd',`
|
optional_policy(`lpd',`
|
||||||
allow kudzu_t printconf_t:file { getattr read };
|
allow kudzu_t printconf_t:file { getattr read };
|
||||||
')
|
')
|
||||||
|
@ -82,7 +82,4 @@ file_type_auto_trans(quota_t, { root_t home_root_t var_t usr_t src_t var_spool_t
|
|||||||
allow quota_t file_t:file quotaon;
|
allow quota_t file_t:file quotaon;
|
||||||
|
|
||||||
allow quota_t proc_t:file getattr;
|
allow quota_t proc_t:file getattr;
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(quota_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
') dnl end TODO
|
||||||
|
@ -98,7 +98,7 @@ optional_policy(`dbus',`
|
|||||||
dbus_send_system_bus_msg(updfstab_t)
|
dbus_send_system_bus_msg(updfstab_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`hald',`
|
optional_policy(`hal',`
|
||||||
hal_stream_connect(updfstab_t)
|
hal_stream_connect(updfstab_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
@ -121,9 +121,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(updfstab_t)
|
|
||||||
')
|
|
||||||
allow updfstab_t tmpfs_t:dir getattr;
|
allow updfstab_t tmpfs_t:dir getattr;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
@ -180,6 +180,32 @@ interface(`usermanage_domtrans_admin_passwd',`
|
|||||||
allow sysadm_passwd_t $1:process sigchld;
|
allow sysadm_passwd_t $1:process sigchld;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Execute passwd admin functions in the admin
|
||||||
|
## passwd domain, and allow the specified role
|
||||||
|
## the admin passwd domain.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## The type of the process performing this action.
|
||||||
|
## </param>
|
||||||
|
## <param name="role">
|
||||||
|
## The role to be allowed the admin passwd domain.
|
||||||
|
## </param>
|
||||||
|
## <param name="terminal">
|
||||||
|
## The type of the terminal allow the admin passwd domain to use.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`usermanage_run_admin_passwd',`
|
||||||
|
gen_require(`
|
||||||
|
type sysadm_passwd_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
usermanage_domtrans_admin_passwd($1)
|
||||||
|
role $2 types sysadm_passwd_t;
|
||||||
|
allow sysadm_passwd_t $3:chr_file rw_term_perms;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute useradd in the useradd domain.
|
## Execute useradd in the useradd domain.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(usermanage,1.0)
|
policy_module(usermanage,1.0.1)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -136,10 +136,6 @@ optional_policy(`nis',`
|
|||||||
nis_use_ypbind(chfn_t)
|
nis_use_ypbind(chfn_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
ifdef(`gnome-pty-helper.te', `allow chfn_t gphdomain:fd use;')
|
|
||||||
') dnl endif TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Crack local policy
|
# Crack local policy
|
||||||
@ -224,6 +220,7 @@ init_dontaudit_write_script_pid(groupadd_t)
|
|||||||
domain_use_wide_inherit_fd(groupadd_t)
|
domain_use_wide_inherit_fd(groupadd_t)
|
||||||
|
|
||||||
files_manage_etc_files(groupadd_t)
|
files_manage_etc_files(groupadd_t)
|
||||||
|
files_relabel_etc_files(groupadd_t)
|
||||||
|
|
||||||
libs_use_ld_so(groupadd_t)
|
libs_use_ld_so(groupadd_t)
|
||||||
libs_use_shared_libs(groupadd_t)
|
libs_use_shared_libs(groupadd_t)
|
||||||
@ -237,6 +234,7 @@ logging_send_syslog_msg(groupadd_t)
|
|||||||
miscfiles_read_localization(groupadd_t)
|
miscfiles_read_localization(groupadd_t)
|
||||||
|
|
||||||
auth_manage_shadow(groupadd_t)
|
auth_manage_shadow(groupadd_t)
|
||||||
|
auth_relabel_shadow(groupadd_t)
|
||||||
auth_rw_lastlog(groupadd_t)
|
auth_rw_lastlog(groupadd_t)
|
||||||
auth_use_nsswitch(groupadd_t)
|
auth_use_nsswitch(groupadd_t)
|
||||||
|
|
||||||
@ -259,14 +257,6 @@ optional_policy(`rpm',`
|
|||||||
rpm_rw_pipe(groupadd_t)
|
rpm_rw_pipe(groupadd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
# Update /etc/shadow and /etc/passwd
|
|
||||||
allow groupadd_t { etc_t shadow_t }:file { relabelfrom relabelto };
|
|
||||||
|
|
||||||
# Access terminals.
|
|
||||||
ifdef(`gnome-pty-helper.te', `allow groupadd_t gphdomain:fd use;')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Passwd local policy
|
# Passwd local policy
|
||||||
@ -310,6 +300,7 @@ term_use_all_user_ttys(passwd_t)
|
|||||||
term_use_all_user_ptys(passwd_t)
|
term_use_all_user_ptys(passwd_t)
|
||||||
|
|
||||||
auth_manage_shadow(passwd_t)
|
auth_manage_shadow(passwd_t)
|
||||||
|
auth_relabel_shadow(passwd_t)
|
||||||
|
|
||||||
# allow checking if a shell is executable
|
# allow checking if a shell is executable
|
||||||
corecmd_check_exec_shell(passwd_t)
|
corecmd_check_exec_shell(passwd_t)
|
||||||
@ -320,6 +311,7 @@ files_read_etc_runtime_files(passwd_t)
|
|||||||
files_manage_etc_files(passwd_t)
|
files_manage_etc_files(passwd_t)
|
||||||
files_search_var(passwd_t)
|
files_search_var(passwd_t)
|
||||||
files_dontaudit_search_pids(passwd_t)
|
files_dontaudit_search_pids(passwd_t)
|
||||||
|
files_relabel_etc_files(passwd_t)
|
||||||
|
|
||||||
# /usr/bin/passwd asks for w access to utmp, but it will operate
|
# /usr/bin/passwd asks for w access to utmp, but it will operate
|
||||||
# correctly without it. Do not audit write denials to utmp.
|
# correctly without it. Do not audit write denials to utmp.
|
||||||
@ -335,6 +327,9 @@ miscfiles_read_localization(passwd_t)
|
|||||||
seutil_dontaudit_search_config(passwd_t)
|
seutil_dontaudit_search_config(passwd_t)
|
||||||
|
|
||||||
userdom_use_unpriv_users_fd(passwd_t)
|
userdom_use_unpriv_users_fd(passwd_t)
|
||||||
|
# make sure that getcon succeeds
|
||||||
|
userdom_getattr_all_userdomains(passwd_t)
|
||||||
|
userdom_read_all_userdomains_state(passwd_t)
|
||||||
# user generally runs this from their home directory, so do not audit a search
|
# user generally runs this from their home directory, so do not audit a search
|
||||||
# on user home dir
|
# on user home dir
|
||||||
userdom_dontaudit_search_all_users_home(passwd_t)
|
userdom_dontaudit_search_all_users_home(passwd_t)
|
||||||
@ -343,19 +338,6 @@ optional_policy(`nis',`
|
|||||||
nis_use_ypbind(passwd_t)
|
nis_use_ypbind(passwd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
# Update /etc/shadow and /etc/passwd
|
|
||||||
allow passwd_t { etc_t shadow_t }:file { relabelfrom relabelto };
|
|
||||||
|
|
||||||
# Inherit and use descriptors from login.
|
|
||||||
ifdef(`gnome-pty-helper.te', `allow passwd_t gphdomain:fd use;')
|
|
||||||
|
|
||||||
# make sure that getcon succeeds
|
|
||||||
allow passwd_t userdomain:dir search;
|
|
||||||
allow passwd_t userdomain:file read;
|
|
||||||
allow passwd_t userdomain:process getattr;
|
|
||||||
') dnl endif TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Password admin local policy
|
# Password admin local policy
|
||||||
@ -403,7 +385,10 @@ term_use_all_user_ttys(sysadm_passwd_t)
|
|||||||
term_use_all_user_ptys(sysadm_passwd_t)
|
term_use_all_user_ptys(sysadm_passwd_t)
|
||||||
|
|
||||||
auth_manage_shadow(sysadm_passwd_t)
|
auth_manage_shadow(sysadm_passwd_t)
|
||||||
|
auth_relabel_shadow(sysadm_passwd_t)
|
||||||
|
|
||||||
|
# allow checking if a shell is executable
|
||||||
|
corecmd_check_exec_shell(sysadm_passwd_t)
|
||||||
# allow vipw to exec the editor
|
# allow vipw to exec the editor
|
||||||
corecmd_search_sbin(sysadm_passwd_t)
|
corecmd_search_sbin(sysadm_passwd_t)
|
||||||
corecmd_exec_bin(sysadm_passwd_t)
|
corecmd_exec_bin(sysadm_passwd_t)
|
||||||
@ -413,6 +398,7 @@ files_read_usr_files(sysadm_passwd_t)
|
|||||||
domain_use_wide_inherit_fd(sysadm_passwd_t)
|
domain_use_wide_inherit_fd(sysadm_passwd_t)
|
||||||
|
|
||||||
files_manage_etc_files(sysadm_passwd_t)
|
files_manage_etc_files(sysadm_passwd_t)
|
||||||
|
files_relabel_etc_files(sysadm_passwd_t)
|
||||||
files_read_etc_runtime_files(sysadm_passwd_t)
|
files_read_etc_runtime_files(sysadm_passwd_t)
|
||||||
# for nscd lookups
|
# for nscd lookups
|
||||||
files_dontaudit_search_pids(sysadm_passwd_t)
|
files_dontaudit_search_pids(sysadm_passwd_t)
|
||||||
@ -439,24 +425,6 @@ optional_policy(`nis',`
|
|||||||
nis_use_ypbind(sysadm_passwd_t)
|
nis_use_ypbind(sysadm_passwd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
role sysadm_r types sysadm_passwd_t;
|
|
||||||
domain_auto_trans(sysadm_t, admin_passwd_exec_t, sysadm_passwd_t)
|
|
||||||
|
|
||||||
# Inherit and use descriptors from login.
|
|
||||||
ifdef(`gnome-pty-helper.te', `allow sysadm_passwd_t gphdomain:fd use;')
|
|
||||||
|
|
||||||
# allow checking if a shell is executable
|
|
||||||
allow sysadm_passwd_t shell_exec_t:file execute;
|
|
||||||
|
|
||||||
# Update /etc/shadow and /etc/passwd
|
|
||||||
allow sysadm_passwd_t { etc_t shadow_t }:file { relabelfrom relabelto };
|
|
||||||
|
|
||||||
ifdef(`targeted_policy', `
|
|
||||||
role system_r types sysadm_passwd_t;
|
|
||||||
')
|
|
||||||
') dnl endif TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Useradd local policy
|
# Useradd local policy
|
||||||
@ -494,6 +462,7 @@ term_use_all_user_ttys(useradd_t)
|
|||||||
term_use_all_user_ptys(useradd_t)
|
term_use_all_user_ptys(useradd_t)
|
||||||
|
|
||||||
auth_manage_shadow(useradd_t)
|
auth_manage_shadow(useradd_t)
|
||||||
|
auth_relabel_shadow(useradd_t)
|
||||||
auth_rw_lastlog(useradd_t)
|
auth_rw_lastlog(useradd_t)
|
||||||
auth_use_nsswitch(useradd_t)
|
auth_use_nsswitch(useradd_t)
|
||||||
|
|
||||||
@ -506,6 +475,7 @@ domain_use_wide_inherit_fd(useradd_t)
|
|||||||
|
|
||||||
files_manage_etc_files(useradd_t)
|
files_manage_etc_files(useradd_t)
|
||||||
files_search_var_lib(useradd_t)
|
files_search_var_lib(useradd_t)
|
||||||
|
files_relabel_etc_files(useradd_t)
|
||||||
|
|
||||||
init_use_fd(useradd_t)
|
init_use_fd(useradd_t)
|
||||||
init_rw_script_pid(useradd_t)
|
init_rw_script_pid(useradd_t)
|
||||||
@ -542,14 +512,3 @@ optional_policy(`rpm',`
|
|||||||
rpm_use_fd(useradd_t)
|
rpm_use_fd(useradd_t)
|
||||||
rpm_rw_pipe(useradd_t)
|
rpm_rw_pipe(useradd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
# Update /etc/shadow and /etc/passwd
|
|
||||||
allow useradd_t { etc_t shadow_t }:file { relabelfrom relabelto };
|
|
||||||
|
|
||||||
# Access terminals.
|
|
||||||
ifdef(`gnome-pty-helper.te', `allow useradd_t gphdomain:fd use;')
|
|
||||||
|
|
||||||
# /var/mail is a link to /var/spool/mail
|
|
||||||
allow useradd_t mail_spool_t:lnk_file read;
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -418,10 +418,6 @@ optional_policy(`udev', `
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(httpd_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
can_tcp_connect(web_client_domain, httpd_t)
|
can_tcp_connect(web_client_domain, httpd_t)
|
||||||
|
|
||||||
') dnl end TODO
|
') dnl end TODO
|
||||||
|
@ -230,7 +230,4 @@ optional_policy(`cron',`
|
|||||||
|
|
||||||
r_dir_file(apmd_t, hwdata_t)
|
r_dir_file(apmd_t, hwdata_t)
|
||||||
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(apmd_t)
|
|
||||||
')
|
|
||||||
')
|
')
|
||||||
|
@ -114,9 +114,3 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(arpwatch_t)
|
udev_read_db(arpwatch_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
# TODO from daemon_domain
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(arpwatch_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -108,8 +108,3 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(avahi_t)
|
udev_read_db(avahi_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(avahi_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -181,9 +181,6 @@ ifdef(`TODO',`
|
|||||||
can_udp_send(domain, named_t)
|
can_udp_send(domain, named_t)
|
||||||
can_udp_send(named_t, domain)
|
can_udp_send(named_t, domain)
|
||||||
can_tcp_connect(domain, named_t)
|
can_tcp_connect(domain, named_t)
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(named_t)
|
|
||||||
')
|
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -158,12 +158,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(bluetooth_t)
|
udev_read_db(bluetooth_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(bluetooth_t)
|
|
||||||
')
|
|
||||||
') dnl end TOOD
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Bluetooth helper local policy
|
# Bluetooth helper local policy
|
||||||
|
@ -107,10 +107,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(canna_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`canna',`
|
optional_policy(`canna',`
|
||||||
canna_stream_connect(i18n_input_t)
|
canna_stream_connect(i18n_input_t)
|
||||||
')
|
')
|
||||||
|
@ -73,12 +73,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(cpucontrol_t)
|
udev_read_db(cpucontrol_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(cpucontrol_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# CPU frequency scaling daemons
|
# CPU frequency scaling daemons
|
||||||
@ -132,9 +126,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(cpuspeed_t)
|
udev_read_db(cpuspeed_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(cpuspeed_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -200,10 +200,6 @@ ifdef(`TODO',`
|
|||||||
# NB The constraints file has some entries for crond_t, this makes it
|
# NB The constraints file has some entries for crond_t, this makes it
|
||||||
# different from all other domains...
|
# different from all other domains...
|
||||||
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(crond_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
# crond tries to search /root. Not sure why.
|
# crond tries to search /root. Not sure why.
|
||||||
allow crond_t sysadm_home_dir_t:dir r_dir_perms;
|
allow crond_t sysadm_home_dir_t:dir r_dir_perms;
|
||||||
|
|
||||||
|
@ -226,9 +226,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(cupsd_t)
|
|
||||||
')
|
|
||||||
allow web_client_domain cupsd_t:tcp_socket { connectto recvfrom };
|
allow web_client_domain cupsd_t:tcp_socket { connectto recvfrom };
|
||||||
allow cupsd_t web_client_domain:tcp_socket { acceptfrom recvfrom };
|
allow cupsd_t web_client_domain:tcp_socket { acceptfrom recvfrom };
|
||||||
allow cupsd_t kernel_t:tcp_socket recvfrom;
|
allow cupsd_t kernel_t:tcp_socket recvfrom;
|
||||||
@ -377,13 +374,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(ptal_t)
|
udev_read_db(ptal_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ptal_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
|
|
||||||
allow userdomain ptal_t:unix_stream_socket connectto;
|
allow userdomain ptal_t:unix_stream_socket connectto;
|
||||||
allow userdomain ptal_var_run_t:sock_file write;
|
allow userdomain ptal_var_run_t:sock_file write;
|
||||||
allow userdomain ptal_var_run_t:dir search;
|
allow userdomain ptal_var_run_t:dir search;
|
||||||
@ -491,12 +481,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(hplip_t)
|
udev_read_db(hplip_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(hplip_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
allow hplip_t devpts_t:dir search;
|
allow hplip_t devpts_t:dir search;
|
||||||
allow hplip_t devpts_t:chr_file { getattr ioctl };
|
allow hplip_t devpts_t:chr_file { getattr ioctl };
|
||||||
|
|
||||||
@ -627,12 +611,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(cupsd_config_t)
|
udev_read_db(cupsd_config_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(cupsd_config_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
allow cupsd_config_t devpts_t:dir search;
|
allow cupsd_config_t devpts_t:dir search;
|
||||||
allow cupsd_config_t devpts_t:chr_file { getattr ioctl };
|
allow cupsd_config_t devpts_t:chr_file { getattr ioctl };
|
||||||
|
|
||||||
|
@ -140,9 +140,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(cyrus_t)
|
udev_read_db(cyrus_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(cyrus_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -139,9 +139,3 @@ optional_policy(`sysnetwork',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(system_dbusd_t)
|
udev_read_db(system_dbusd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(system_dbusd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -138,9 +138,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(dhcpd_t)
|
udev_read_db(dhcpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(dhcpd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -101,9 +101,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(dictd_t)
|
udev_read_db(dictd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(dictd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -107,9 +107,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(distccd_t)
|
udev_read_db(distccd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(distccd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -185,9 +185,3 @@ optional_policy(`nis',`
|
|||||||
optional_policy(`nscd',`
|
optional_policy(`nscd',`
|
||||||
nscd_use_socket(dovecot_auth_t)
|
nscd_use_socket(dovecot_auth_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(dovecot_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -131,12 +131,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(fingerd_t)
|
udev_read_db(fingerd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(fingerd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
|
||||||
# stop it accessing sub-directories, prevents checking a Maildir for new mail,
|
# stop it accessing sub-directories, prevents checking a Maildir for new mail,
|
||||||
# have to change this when we create a type for Maildir
|
# have to change this when we create a type for Maildir
|
||||||
dontaudit fingerd_t user_home_t:dir search;
|
dontaudit fingerd_t user_home_t:dir search;
|
||||||
|
@ -220,9 +220,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev', `
|
optional_policy(`udev', `
|
||||||
udev_read_db(ftpd_t)
|
udev_read_db(ftpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ftpd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -95,7 +95,4 @@ ifdef(`TODO',`
|
|||||||
# Access the mouse.
|
# Access the mouse.
|
||||||
# cjp: why write?
|
# cjp: why write?
|
||||||
allow gpm_t { event_device_t mouse_device_t }:chr_file rw_file_perms;
|
allow gpm_t { event_device_t mouse_device_t }:chr_file rw_file_perms;
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(gpm_t)
|
|
||||||
')
|
|
||||||
')
|
')
|
||||||
|
@ -183,10 +183,6 @@ optional_policy(`updfstab',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(hald_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
allow hald_t device_t:dir create_dir_perms;
|
allow hald_t device_t:dir create_dir_perms;
|
||||||
|
|
||||||
optional_policy(`hald',`
|
optional_policy(`hald',`
|
||||||
|
@ -92,9 +92,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(howl_t)
|
udev_read_db(howl_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(howl_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -155,12 +155,6 @@ ifdef(`targeted_policy',`
|
|||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(inetd_t)
|
|
||||||
')
|
|
||||||
') dnl TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# inetd child local_policy
|
# inetd child local_policy
|
||||||
|
@ -144,10 +144,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(innd_t)
|
udev_read_db(innd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(innd_t)
|
|
||||||
')
|
|
||||||
allow innd_t sysadm_t:unix_dgram_socket sendto;
|
|
||||||
')
|
|
||||||
|
@ -148,12 +148,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(kadmind_t)
|
udev_read_db(kadmind_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(kadmind_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Krb5kdc local policy
|
# Krb5kdc local policy
|
||||||
@ -254,10 +248,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(krb5kdc_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
# Allow user programs to talk to KDC
|
# Allow user programs to talk to KDC
|
||||||
allow krb5kdc_t userdomain:udp_socket recvfrom;
|
allow krb5kdc_t userdomain:udp_socket recvfrom;
|
||||||
allow userdomain krb5kdc_t:udp_socket recvfrom;
|
allow userdomain krb5kdc_t:udp_socket recvfrom;
|
||||||
|
@ -148,9 +148,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(slapd_t)
|
udev_read_db(slapd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(slapd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -233,10 +233,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(lpd_t)
|
udev_read_db(lpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(lpd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
|
@ -141,9 +141,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(mysqld_t)
|
|
||||||
')
|
|
||||||
optional_policy(`daemontools',`
|
optional_policy(`daemontools',`
|
||||||
domain_auto_trans( svc_run_t, mysqld_exec_t, mysqld_t)
|
domain_auto_trans( svc_run_t, mysqld_exec_t, mysqld_t)
|
||||||
mysqld_signal(svc_start_t)
|
mysqld_signal(svc_start_t)
|
||||||
|
@ -143,12 +143,6 @@ optional_policy(`vpn',`
|
|||||||
vpn_domtrans(NetworkManager_t)
|
vpn_domtrans(NetworkManager_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(NetworkManager_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
###########################################################
|
###########################################################
|
||||||
#
|
#
|
||||||
# Partially converted rules. THESE ARE ONLY TEMPORARY
|
# Partially converted rules. THESE ARE ONLY TEMPORARY
|
||||||
|
@ -130,12 +130,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(ypbind_t)
|
udev_read_db(ypbind_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ypbind_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# ypserv local policy
|
# ypserv local policy
|
||||||
@ -228,10 +222,6 @@ optional_policy(`udev', `
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb', `
|
|
||||||
rhgb_domain(ypserv_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
# Read and write /var/yp.
|
# Read and write /var/yp.
|
||||||
ifdef(`rpcd.te', `
|
ifdef(`rpcd.te', `
|
||||||
allow rpcd_t ypserv_conf_t:file { getattr read };
|
allow rpcd_t ypserv_conf_t:file { getattr read };
|
||||||
|
@ -133,9 +133,3 @@ optional_policy(`samba',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(nscd_t)
|
udev_read_db(nscd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(nscd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -161,9 +161,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ntpd_t)
|
|
||||||
')
|
|
||||||
allow ntpd_t sysadm_t:udp_socket sendto;
|
allow ntpd_t sysadm_t:udp_socket sendto;
|
||||||
allow sysadm_t ntpd_t:udp_socket recvfrom;
|
allow sysadm_t ntpd_t:udp_socket recvfrom;
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(pegasus,1.0.1)
|
policy_module(pegasus,1.0.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -13,6 +13,9 @@ init_daemon_domain(pegasus_t,pegasus_exec_t)
|
|||||||
type pegasus_data_t;
|
type pegasus_data_t;
|
||||||
files_type(pegasus_data_t)
|
files_type(pegasus_data_t)
|
||||||
|
|
||||||
|
type pegasus_tmp_t;
|
||||||
|
files_tmp_file(pegasus_tmp_t)
|
||||||
|
|
||||||
type pegasus_conf_t;
|
type pegasus_conf_t;
|
||||||
files_type(pegasus_conf_t)
|
files_type(pegasus_conf_t)
|
||||||
|
|
||||||
@ -29,30 +32,37 @@ files_pid_file(pegasus_var_run_t)
|
|||||||
|
|
||||||
allow pegasus_t self:capability { dac_override net_bind_service audit_write };
|
allow pegasus_t self:capability { dac_override net_bind_service audit_write };
|
||||||
dontaudit pegasus_t self:capability sys_tty_config;
|
dontaudit pegasus_t self:capability sys_tty_config;
|
||||||
|
allow pegasus_t self:process signal;
|
||||||
allow pegasus_t self:fifo_file rw_file_perms;
|
allow pegasus_t self:fifo_file rw_file_perms;
|
||||||
allow pegasus_t self:unix_dgram_socket create_socket_perms;
|
allow pegasus_t self:unix_dgram_socket create_socket_perms;
|
||||||
allow pegasus_t self:unix_stream_socket create_stream_socket_perms;
|
allow pegasus_t self:unix_stream_socket create_stream_socket_perms;
|
||||||
allow pegasus_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
|
allow pegasus_t self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay };
|
||||||
allow pegasus_t self:tcp_socket create_stream_socket_perms;
|
allow pegasus_t self:tcp_socket create_stream_socket_perms;
|
||||||
|
|
||||||
allow pegasus_t pegasus_conf_t:dir r_dir_perms;
|
allow pegasus_t pegasus_conf_t:dir rw_dir_perms;
|
||||||
allow pegasus_t pegasus_conf_t:file { r_file_perms link unlink };
|
allow pegasus_t pegasus_conf_t:file { r_file_perms link unlink };
|
||||||
allow pegasus_t pegasus_conf_t:lnk_file r_file_perms;
|
allow pegasus_t pegasus_conf_t:lnk_file r_file_perms;
|
||||||
|
|
||||||
allow pegasus_t pegasus_data_t:dir rw_dir_perms;
|
allow pegasus_t pegasus_data_t:dir rw_dir_perms;
|
||||||
allow pegasus_t pegasus_data_t:file create_file_perms;
|
allow pegasus_t pegasus_data_t:file create_file_perms;
|
||||||
allow pegasus_t pegasus_data_t:lnk_file create_lnk_perms;
|
allow pegasus_t pegasus_data_t:lnk_file create_lnk_perms;
|
||||||
|
type_transition pegasus_t pegasus_conf_t:{ file dir } pegasus_data_t;
|
||||||
|
|
||||||
allow pegasus_t pegasus_mof_t:dir r_dir_perms;
|
allow pegasus_t pegasus_mof_t:dir r_dir_perms;
|
||||||
allow pegasus_t pegasus_mof_t:file r_file_perms;
|
allow pegasus_t pegasus_mof_t:file r_file_perms;
|
||||||
allow pegasus_t pegasus_mof_t:lnk_file { getattr read };
|
allow pegasus_t pegasus_mof_t:lnk_file { getattr read };
|
||||||
|
|
||||||
|
allow pegasus_t pegasus_tmp_t:dir create_dir_perms;
|
||||||
|
allow pegasus_t pegasus_tmp_t:file create_file_perms;
|
||||||
|
files_create_tmp_files(pegasus_t, pegasus_tmp_t, { file dir })
|
||||||
|
|
||||||
allow pegasus_t pegasus_var_run_t:file create_file_perms;
|
allow pegasus_t pegasus_var_run_t:file create_file_perms;
|
||||||
allow pegasus_t pegasus_var_run_t:sock_file { create setattr };
|
allow pegasus_t pegasus_var_run_t:sock_file { create setattr unlink };
|
||||||
allow pegasus_t pegasus_var_run_t:dir rw_dir_perms;
|
allow pegasus_t pegasus_var_run_t:dir rw_dir_perms;
|
||||||
files_create_pid(pegasus_t,pegasus_var_run_t)
|
files_create_pid(pegasus_t,pegasus_var_run_t)
|
||||||
|
|
||||||
kernel_read_kernel_sysctl(pegasus_t)
|
kernel_read_kernel_sysctl(pegasus_t)
|
||||||
|
kernel_read_fs_sysctl(pegasus_t)
|
||||||
kernel_read_system_state(pegasus_t)
|
kernel_read_system_state(pegasus_t)
|
||||||
kernel_search_vm_sysctl(pegasus_t)
|
kernel_search_vm_sysctl(pegasus_t)
|
||||||
|
|
||||||
@ -76,7 +86,7 @@ fs_search_auto_mountpoints(pegasus_t)
|
|||||||
term_dontaudit_use_console(pegasus_t)
|
term_dontaudit_use_console(pegasus_t)
|
||||||
|
|
||||||
auth_use_nsswitch(pegasus_t)
|
auth_use_nsswitch(pegasus_t)
|
||||||
auth_read_shadow(pegasus_t)
|
auth_domtrans_chk_passwd(pegasus_t)
|
||||||
|
|
||||||
domain_use_wide_inherit_fd(pegasus_t)
|
domain_use_wide_inherit_fd(pegasus_t)
|
||||||
domain_read_all_domains_state(pegasus_t)
|
domain_read_all_domains_state(pegasus_t)
|
||||||
@ -122,16 +132,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(pegasus_t)
|
udev_read_db(pegasus_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(pegasus_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
# bad rules
|
|
||||||
type pegasus_conf_exec_t, entry_type;
|
|
||||||
files_type(pegasus_conf_exec_t)
|
|
||||||
allow pegasus_conf_exec_t pegasus_conf_t:dir rw_dir_perms;
|
|
||||||
allow pegasus_conf_exec_t pegasus_conf_t:file create_file_perms;
|
|
||||||
allow pegasus_conf_exec_t pegasus_conf_t:lnk_file create_lnk_perms;
|
|
||||||
|
@ -133,10 +133,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(portmap_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
ifdef(`rpcd.te',`can_udp_send(portmap_t, rpcd_t)')
|
ifdef(`rpcd.te',`can_udp_send(portmap_t, rpcd_t)')
|
||||||
allow portmap_t rpcd_t:udp_socket sendto;
|
allow portmap_t rpcd_t:udp_socket sendto;
|
||||||
allow rpcd_t portmap_t:udp_socket recvfrom;
|
allow rpcd_t portmap_t:udp_socket recvfrom;
|
||||||
|
@ -185,9 +185,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(postgresql_t)
|
|
||||||
')
|
|
||||||
ifdef(`targeted_policy', `', `
|
ifdef(`targeted_policy', `', `
|
||||||
bool allow_user_postgresql_connect false;
|
bool allow_user_postgresql_connect false;
|
||||||
|
|
||||||
|
@ -316,15 +316,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(pptp_t)
|
udev_read_db(pptp_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(pppd_t)
|
|
||||||
')
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(pptp_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
|
||||||
ifdef(`postfix.te', `
|
ifdef(`postfix.te', `
|
||||||
allow pppd_t postfix_etc_t:dir search;
|
allow pppd_t postfix_etc_t:dir search;
|
||||||
allow pppd_t postfix_etc_t:file r_file_perms;
|
allow pppd_t postfix_etc_t:file r_file_perms;
|
||||||
|
@ -95,9 +95,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(privoxy_t)
|
udev_read_db(privoxy_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(privoxy_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -130,9 +130,3 @@ optional_policy(`snmp',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(radiusd_t)
|
udev_read_db(radiusd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(radiusd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -94,9 +94,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(radvd_t)
|
udev_read_db(radvd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(radvd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -113,12 +113,6 @@ template(`rpc_domain_template', `
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db($1_t)
|
udev_read_db($1_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain($1_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
|
@ -308,12 +308,6 @@ optional_policy(`udev', `
|
|||||||
udev_read_db(smbd_t)
|
udev_read_db(smbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(smbd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
ifdef(`hide_broken_symptoms', `
|
ifdef(`hide_broken_symptoms', `
|
||||||
gen_require(`
|
gen_require(`
|
||||||
type boot_t, default_t, tmpfs_t;
|
type boot_t, default_t, tmpfs_t;
|
||||||
@ -428,12 +422,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(nmbd_t)
|
udev_read_db(nmbd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(nmbd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# smbmount Local policy
|
# smbmount Local policy
|
||||||
@ -640,12 +628,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(winbind_t)
|
udev_read_db(winbind_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(winbind_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Winbind helper local policy
|
# Winbind helper local policy
|
||||||
|
@ -99,10 +99,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(saslauthd_t)
|
udev_read_db(saslauthd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(saslauthd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -136,10 +136,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(sendmail_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
allow sendmail_t etc_mail_t:dir rw_dir_perms;
|
allow sendmail_t etc_mail_t:dir rw_dir_perms;
|
||||||
allow sendmail_t etc_mail_t:file create_file_perms;
|
allow sendmail_t etc_mail_t:file create_file_perms;
|
||||||
# for the start script to run make -C /etc/mail
|
# for the start script to run make -C /etc/mail
|
||||||
|
@ -149,10 +149,6 @@ can_udp_send(snmpd_t, sysadm_t)
|
|||||||
optional_policy(`cupsd',`
|
optional_policy(`cupsd',`
|
||||||
allow snmpd_t cupsd_rw_etc_t:file { getattr read };
|
allow snmpd_t cupsd_rw_etc_t:file { getattr read };
|
||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(snmpd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
') dnl end TODO
|
||||||
|
|
||||||
ifdef(`distro_redhat', `
|
ifdef(`distro_redhat', `
|
||||||
|
@ -146,10 +146,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(spamd_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`amavis', `
|
optional_policy(`amavis', `
|
||||||
# for bayes tokens
|
# for bayes tokens
|
||||||
allow spamd_t var_lib_t:dir { getattr search };
|
allow spamd_t var_lib_t:dir { getattr search };
|
||||||
|
@ -177,9 +177,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(squid_t)
|
|
||||||
')
|
|
||||||
ifdef(`apache.te',`
|
ifdef(`apache.te',`
|
||||||
can_tcp_connect(squid_t, httpd_t)
|
can_tcp_connect(squid_t, httpd_t)
|
||||||
')
|
')
|
||||||
|
@ -255,10 +255,4 @@ ifdef(`targeted_policy',`',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(ssh_keygen_t)
|
udev_read_db(ssh_keygen_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ssh_keygen_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
')
|
')
|
||||||
|
@ -113,13 +113,7 @@ ifdef(`distro_gentoo', `
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(stunnel_t)
|
udev_read_db(stunnel_t)
|
||||||
')
|
')
|
||||||
|
',`
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(stunnel_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
', `
|
|
||||||
allow stunnel_t self:netlink_tcpdiag_socket r_netlink_socket_perms;
|
allow stunnel_t self:netlink_tcpdiag_socket r_netlink_socket_perms;
|
||||||
|
|
||||||
dev_read_urand(stunnel_t)
|
dev_read_urand(stunnel_t)
|
||||||
|
@ -104,9 +104,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev', `
|
optional_policy(`udev', `
|
||||||
udev_read_db(tftpd_t)
|
udev_read_db(tftpd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(tftpd_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
@ -131,9 +131,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(zebra_t)
|
udev_read_db(zebra_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(zebra_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -368,14 +368,18 @@ interface(`auth_manage_shadow',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
#
|
## <summary>
|
||||||
# auth_relabelto_shadow(domain)
|
## Relabel to the shadow
|
||||||
|
## password file type.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`auth_relabelto_shadow',`
|
interface(`auth_relabelto_shadow',`
|
||||||
gen_require(`
|
gen_require(`
|
||||||
attribute can_relabelto_shadow_passwords;
|
attribute can_relabelto_shadow_passwords;
|
||||||
type shadow_t;
|
type shadow_t;
|
||||||
class file relabelto;
|
|
||||||
')
|
')
|
||||||
|
|
||||||
files_search_etc($1)
|
files_search_etc($1)
|
||||||
@ -383,6 +387,26 @@ interface(`auth_relabelto_shadow',`
|
|||||||
typeattribute $1 can_relabelto_shadow_passwords;
|
typeattribute $1 can_relabelto_shadow_passwords;
|
||||||
')
|
')
|
||||||
|
|
||||||
|
#######################################
|
||||||
|
## <summary>
|
||||||
|
## Relabel from and to the shadow
|
||||||
|
## password file type.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`auth_relabel_shadow',`
|
||||||
|
gen_require(`
|
||||||
|
attribute can_relabelto_shadow_passwords;
|
||||||
|
type shadow_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
files_search_etc($1)
|
||||||
|
allow $1 shadow_t:file { relabelfrom relabelto };
|
||||||
|
typeattribute $1 can_relabelto_shadow_passwords;
|
||||||
|
')
|
||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Append to the login failure log.
|
## Append to the login failure log.
|
||||||
|
@ -253,10 +253,6 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(pam_console_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
ifdef(`xdm.te', `
|
ifdef(`xdm.te', `
|
||||||
allow pam_console_t xdm_var_run_t:file { getattr read };
|
allow pam_console_t xdm_var_run_t:file { getattr read };
|
||||||
')
|
')
|
||||||
|
@ -87,11 +87,3 @@ optional_policy(`udev',`
|
|||||||
optional_policy(`userdomain',`
|
optional_policy(`userdomain',`
|
||||||
userdom_dontaudit_use_unpriv_user_fd(hwclock_t)
|
userdom_dontaudit_use_unpriv_user_fd(hwclock_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(hwclock_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`gnome-pty-helper', `allow hwclock_t sysadm_gph_t:fd use;')
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -894,9 +894,11 @@ interface(`files_mounton_all_mountpoints',`
|
|||||||
gen_require(`
|
gen_require(`
|
||||||
attribute mountpoint;
|
attribute mountpoint;
|
||||||
class dir { getattr search mounton };
|
class dir { getattr search mounton };
|
||||||
|
class file { getattr mounton };
|
||||||
')
|
')
|
||||||
|
|
||||||
allow $1 mountpoint:dir { getattr search mounton };
|
allow $1 mountpoint:dir { getattr search mounton };
|
||||||
|
allow $1 mountpoint:file { getattr mounton };
|
||||||
')
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
@ -1333,6 +1335,23 @@ interface(`files_exec_etc_files',`
|
|||||||
|
|
||||||
')
|
')
|
||||||
|
|
||||||
|
#######################################
|
||||||
|
## <summary>
|
||||||
|
## Relabel from and to generic files in /etc.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`files_relabel_etc_files',`
|
||||||
|
gen_require(`
|
||||||
|
type etc_t;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 etc_t:dir list_dir_perms;
|
||||||
|
allow $1 etc_t:file { relabelfrom relabelto };
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# files_create_boot_flag(domain)
|
# files_create_boot_flag(domain)
|
||||||
|
@ -203,12 +203,3 @@ optional_policy(`udev',`
|
|||||||
optional_policy(`updfstab',`
|
optional_policy(`updfstab',`
|
||||||
updfstab_domtrans(hotplug_t)
|
updfstab_domtrans(hotplug_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(hotplug_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
dontaudit hotplug_t { init_t kernel_t }:file read;
|
|
||||||
|
|
||||||
') dnl end TODO
|
|
||||||
|
@ -141,12 +141,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(ipsec_t)
|
udev_read_db(ipsec_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ipsec_t)
|
|
||||||
')
|
|
||||||
')
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# ipsec_mgmt Local policy
|
# ipsec_mgmt Local policy
|
||||||
|
@ -102,13 +102,3 @@ optional_policy(`selinuxutil',`
|
|||||||
optional_policy(`udev',`
|
optional_policy(`udev',`
|
||||||
udev_read_db(iptables_t)
|
udev_read_db(iptables_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(iptables_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`gnome-pty-helper',`
|
|
||||||
allow iptables_t sysadm_gph_t:fd use;
|
|
||||||
')
|
|
||||||
') dnl ifdef TODO
|
|
||||||
|
@ -175,12 +175,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(auditd_t)
|
udev_read_db(auditd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(auditd_t)
|
|
||||||
')
|
|
||||||
') dnl endif TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# klogd local policy
|
# klogd local policy
|
||||||
@ -380,12 +374,7 @@ optional_policy(`udev',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
ifdef(`TODO',`
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(syslogd_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
allow syslogd_t tmpfs_t:dir search;
|
allow syslogd_t tmpfs_t:dir search;
|
||||||
dontaudit syslogd_t unlabeled_t:file { getattr read };
|
|
||||||
dontaudit syslogd_t { userpty_type devpts_t }:chr_file getattr;
|
dontaudit syslogd_t { userpty_type devpts_t }:chr_file getattr;
|
||||||
|
|
||||||
# log to the xconsole
|
# log to the xconsole
|
||||||
|
@ -117,12 +117,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(clvmd_t)
|
udev_read_db(clvmd_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(clvmd_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# LVM Local policy
|
# LVM Local policy
|
||||||
@ -270,11 +264,5 @@ ifdef(`TODO',`
|
|||||||
allow lvm_t var_t:dir { search getattr };
|
allow lvm_t var_t:dir { search getattr };
|
||||||
allow lvm_t ramfs_t:filesystem unmount;
|
allow lvm_t ramfs_t:filesystem unmount;
|
||||||
|
|
||||||
optional_policy(`gnome-pty-helper',`
|
|
||||||
allow lvm_t sysadm_gph_t:fd use;
|
|
||||||
')
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(lvm_t)
|
|
||||||
')
|
|
||||||
dontaudit lvm_t xconsole_device_t:fifo_file getattr;
|
dontaudit lvm_t xconsole_device_t:fifo_file getattr;
|
||||||
') dnl end TODO
|
') dnl end TODO
|
||||||
|
@ -141,13 +141,4 @@ ifdef(`TODO',`
|
|||||||
|
|
||||||
# for when /etc/mtab loses its type
|
# for when /etc/mtab loses its type
|
||||||
allow mount_t file_t:file unlink;
|
allow mount_t file_t:file unlink;
|
||||||
|
|
||||||
ifdef(`gnome-pty-helper.te', `
|
|
||||||
allow mount_t sysadm_gph_t:fd use;
|
|
||||||
')
|
|
||||||
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(mount_t)
|
|
||||||
')
|
|
||||||
|
|
||||||
') dnl endif TODO
|
') dnl endif TODO
|
||||||
|
@ -147,12 +147,6 @@ optional_policy(`udev',`
|
|||||||
udev_read_db(cardmgr_t)
|
udev_read_db(cardmgr_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(cardmgr_t)
|
|
||||||
')
|
|
||||||
') dnl end TODO
|
|
||||||
|
|
||||||
# Create device files in /tmp.
|
# Create device files in /tmp.
|
||||||
# cjp: why is this created all over the place?
|
# cjp: why is this created all over the place?
|
||||||
allow cardmgr_t cardmgr_dev_t:{ chr_file blk_file } manage_file_perms;
|
allow cardmgr_t cardmgr_dev_t:{ chr_file blk_file } manage_file_perms;
|
||||||
|
@ -88,7 +88,4 @@ ifdef(`TODO',`
|
|||||||
dontaudit mdadm_t device_t:{ fifo_file file chr_file blk_file } { read getattr };
|
dontaudit mdadm_t device_t:{ fifo_file file chr_file blk_file } { read getattr };
|
||||||
|
|
||||||
allow mdadm_t var_t:dir getattr;
|
allow mdadm_t var_t:dir getattr;
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(mdadm_t)
|
|
||||||
')
|
|
||||||
') dnl TODO
|
') dnl TODO
|
||||||
|
@ -244,12 +244,6 @@ optional_policy(`userdomain',`
|
|||||||
userdom_use_all_user_fd(dhcpc_t)
|
userdom_use_all_user_fd(dhcpc_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(dhcpc_t)
|
|
||||||
')
|
|
||||||
') dnl endif TODO
|
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
# Ifconfig local policy
|
# Ifconfig local policy
|
||||||
@ -343,10 +337,3 @@ optional_policy(`nis',`
|
|||||||
optional_policy(`ppp',`
|
optional_policy(`ppp',`
|
||||||
ppp_use_fd(ifconfig_t)
|
ppp_use_fd(ifconfig_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
ifdef(`TODO',`
|
|
||||||
ifdef(`gnome-pty-helper.te', `allow ifconfig_t sysadm_gph_t:fd use;')
|
|
||||||
optional_policy(`rhgb',`
|
|
||||||
rhgb_domain(ifconfig_t)
|
|
||||||
')
|
|
||||||
') dnl endif TODO
|
|
||||||
|
@ -2476,6 +2476,40 @@ interface(`userdom_dontaudit_use_unpriv_user_tty',`
|
|||||||
')
|
')
|
||||||
')
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Read the process state of all user domains.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`userdom_read_all_userdomains_state',`
|
||||||
|
gen_require(`
|
||||||
|
attribute userdomain;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 userdomain:dir search_dir_perms;
|
||||||
|
allow $1 userdomain:file r_file_perms;
|
||||||
|
kernel_search_proc($1)
|
||||||
|
')
|
||||||
|
|
||||||
|
########################################
|
||||||
|
## <summary>
|
||||||
|
## Get the attributes of all user domains.
|
||||||
|
## </summary>
|
||||||
|
## <param name="domain">
|
||||||
|
## Domain allowed access.
|
||||||
|
## </param>
|
||||||
|
#
|
||||||
|
interface(`userdom_getattr_all_userdomains',`
|
||||||
|
gen_require(`
|
||||||
|
attribute userdomain;
|
||||||
|
')
|
||||||
|
|
||||||
|
allow $1 userdomain:process getattr;
|
||||||
|
')
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Inherit the file descriptors from all user domains
|
## Inherit the file descriptors from all user domains
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
policy_module(userdomain,1.0.1)
|
policy_module(userdomain,1.0.2)
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
#
|
#
|
||||||
@ -295,6 +295,7 @@ ifdef(`targeted_policy',`
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`usermanage',`
|
optional_policy(`usermanage',`
|
||||||
|
usermanage_run_admin_passwd(sysadm_t,sysadm_r,admin_terminal)
|
||||||
usermanage_run_groupadd(sysadm_t,sysadm_r,admin_terminal)
|
usermanage_run_groupadd(sysadm_t,sysadm_r,admin_terminal)
|
||||||
usermanage_run_useradd(sysadm_t,sysadm_r,admin_terminal)
|
usermanage_run_useradd(sysadm_t,sysadm_r,admin_terminal)
|
||||||
')
|
')
|
||||||
|
Loading…
Reference in New Issue
Block a user