## Tools for filesystem management, such as mkfs and fsck. ######################################## ## ## Execute fs tools in the fstools domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`fstools_domtrans',` gen_require(` type fsadm_t, fsadm_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, fsadm_exec_t, fsadm_t) ') ######################################## ## ## Execute fs tools in the fstools domain, and ## allow the specified role the fs tools domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## ## # interface(`fstools_run',` gen_require(` type fsadm_t; ') fstools_domtrans($1) role $2 types fsadm_t; ') ######################################## ## ## Execute fsadm in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_exec',` gen_require(` type fsadm_exec_t; ') can_exec($1, fsadm_exec_t) ') ######################################## ## ## Send signal to fsadm process ## ## ## ## Domain allowed access. ## ## # interface(`fstools_signal',` gen_require(` type fsadm_t; ') allow $1 fsadm_t:process signal; ') ######################################## ## ## Read fstools unnamed pipes. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_read_pipes',` gen_require(` type fsadm_t; ') allow $1 fsadm_t:fifo_file read_fifo_file_perms; ') ######################################## ## ## Relabel a file to the type used by the ## filesystem tools programs. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_relabelto_entry_files',` gen_require(` type fsadm_exec_t; ') allow $1 fsadm_exec_t:file relabelto; ') ######################################## ## ## Create, read, write, and delete a file used by the ## filesystem tools programs. ## ## ## ## Domain allowed access. ## ## # interface(`fstools_manage_entry_files',` gen_require(` type fsadm_exec_t; ') allow $1 fsadm_exec_t:file manage_file_perms; ') ######################################## ## ## Getattr swapfile ## ## ## ## Domain allowed access. ## ## # interface(`fstools_getattr_swap_files',` gen_require(` type swapfile_t; ') allow $1 swapfile_t:file getattr; ') ######################################## ## ## Read swapfile ## ## ## ## Domain allowed access. ## ## # interface(`fstools_read_swap_files',` gen_require(` type swapfile_t; ') allow $1 swapfile_t:file read_file_perms; ') ######################################## ## ## Read/Write swapfile ## ## ## ## Domain allowed access. ## ## # interface(`fstools_rw_swap_files',` gen_require(` type swapfile_t; ') allow $1 swapfile_t:file rw_file_perms; ') ######################################## ## ## Create, read, write, and delete the FSADM pid files. ## ## ## ## Domain allowed access. ## ## # interface(`fsadm_manage_pid',` gen_require(` type fsadm_var_run_t; ') files_search_pids($1) manage_dirs_pattern($1, fsadm_var_run_t, fsadm_var_run_t) manage_files_pattern($1, fsadm_var_run_t, fsadm_var_run_t) fstools_filetrans_named_content_fsadm($1) ') ######################################## ## ## Transition to systemd content ## ## ## ## Domain allowed access. ## ## # interface(`fstools_filetrans_named_content_fsadm',` gen_require(` type fsadm_var_run_t; ') files_pid_filetrans($1, fsadm_var_run_t, dir, "blkid") files_pid_filetrans($1, fsadm_var_run_t, dir, "fsck") ')