policy_module(secadm, 1.0.0)
########################################
#
# Declarations
#
role secadm_r;
userdom_unpriv_user_template(secadm)
userdom_security_admin_template(secadm_t, secadm_r, { secadm_tty_device_t secadm_devpts_t })
########################################
#
# Local policy
#
allow secadm_t self:capability { dac_read_search dac_override };
corecmd_exec_shell(secadm_t)
dev_relabel_all_dev_nodes(secadm_t)
domain_obj_id_change_exemption(secadm_t)
mls_process_read_up(secadm_t)
mls_file_read_all_levels(secadm_t)
mls_file_write_all_levels(secadm_t)
mls_file_upgrade(secadm_t)
mls_file_downgrade(secadm_t)
auth_relabel_all_files_except_shadow(secadm_t)
auth_relabel_shadow(secadm_t)
init_exec(secadm_t)
logging_read_audit_log(secadm_t)
logging_read_generic_logs(secadm_t)
logging_read_audit_config(secadm_t)
optional_policy(`
aide_run(secadm_t, secadm_r, { secadm_tty_device_t secadm_devpts_t })
')
optional_policy(`
auditadm_role_change_template(secadm)
')
optional_policy(`
netlabel_run_mgmt(secadm_t, secadm_r, { secadm_tty_device_t secadm_devpts_t })
')
optional_policy(`
staff_dontaudit_append_home_content_files(secadm_t)
')
optional_policy(`
sysadm_role_change_template(secadm)
sysadm_dontaudit_read_home_content_files(secadm_t)
')