## policy for stalld ######################################## ## ## Execute stalld_exec_t in the stalld domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`stalld_domtrans',` gen_require(` type stalld_t, stalld_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, stalld_exec_t, stalld_t) ') ###################################### ## ## Execute stalld in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`stalld_exec',` gen_require(` type stalld_exec_t; ') corecmd_search_bin($1) can_exec($1, stalld_exec_t) ') ######################################## ## ## Read stalld PID files. ## ## ## ## Domain allowed access. ## ## # interface(`stalld_read_pid_files',` gen_require(` type stalld_var_run_t; ') files_search_pids($1) read_files_pattern($1, stalld_var_run_t, stalld_var_run_t) ') ######################################## ## ## All of the rules required to administrate ## an stalld environment ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`stalld_admin',` gen_require(` type stalld_t; type stalld_var_run_t; ') allow $1 stalld_t:process { signal_perms }; ps_process_pattern($1, stalld_t) tunable_policy(`deny_ptrace',`',` allow $1 stalld_t:process ptrace; ') files_search_pids($1) admin_pattern($1, stalld_var_run_t) optional_policy(` systemd_passwd_agent_exec($1) systemd_read_fifo_file_passwd_run($1) ') ')