On 07/02/2014 01:07 AM, dE wrote: > There seem to exist additional non-transition restrictions on roles > which define when will a process be able to execute as a certain role. > > For e.g. a process which runs from a login shell cannot have system_r > role. How do I list such rules? > > Looking at role transition rules, a transition to system_r should be > allowed -- > > sesearch --role_allow | grep system_r\; > ... > allow unconfined_r system_r; > ... > > And the sudo process runs as unconfined_r -- > > ps auxZ | grep sudo > system_u:unconfined_r:unconfined_t:s0 root 669 0.0 0.4 206860 3356 > pts/1 S+ 10:28 0:00 sudo -r unconfined_r nano > > But sudo -r system_r nano fails. > _______________________________________________ > Selinux mailing list > Selinux@xxxxxxxxxxxxx > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. > To get help, send an email containing "help" to > Selinux-request@xxxxxxxxxxxxx. The type has to be available to the role. In the case of sudo -r system_r nano, if the type to be run is unconfined_t, then SELinux would end up with a label like sytem_u:system_r:unconfined_t:s0 But I don't believe unconfined_t can run in the system_r role. seinfo -rsystem_r -x | grep unconfined_t To make your sudo command run, you would also need to select the type. sudo -r sysadm_r -t nano_t nano ... Or something like that where nano_t is available to the system_r role. _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.