diff --git a/doc/policy.xml b/doc/policy.xml index 3966b1186..ecaf35ed9 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -1053,6 +1053,13 @@ Domain allowed access. + + +

+Enable support for the cloud-init-growpart module. +

+
+

@@ -3818,7 +3825,7 @@ The role associated with the user domain. - - +

Send a SIGCHLD signal to the sudo domain. @@ -3910,7 +3927,7 @@ Domain allowed access. - + Execute sudo in the caller domain. @@ -8452,7 +8469,17 @@ Domain allowed access. - + + +Execute vmware guest executables + + + +Domain allowed access. + + + + Read vmware system configuration files. @@ -8462,7 +8489,7 @@ Domain allowed access. - + Append vmware system configuration files. @@ -8472,7 +8499,7 @@ Domain allowed access. - + Append vmware log files. @@ -9881,7 +9908,7 @@ Role allowed access.

Allow rtorrent to use dht. -The correspondig port must be rtorrent_udp_port_t. +The corresponding port must be rtorrent_udp_port_t.

@@ -9928,14 +9955,14 @@ Role allowed access

-Determine wether the salt master can read NFS files +Determine whether the salt master can read NFS files

-Determine wether the salt minion can manage NFS files +Determine whether the salt minion can manage NFS files

@@ -11673,7 +11700,7 @@ Domain allowed access. -Do not audit attepts to bind TCP sockets to any ports. +Do not audit attempts to bind TCP sockets to any ports. @@ -11703,7 +11730,7 @@ Domain allowed access. -Do not audit attepts to bind UDP sockets to any ports. +Do not audit attempts to bind UDP sockets to any ports. @@ -12187,7 +12214,7 @@ Domain allowed access. -Receive TCP packets from an unlabled connection. +Receive TCP packets from an unlabeled connection. @@ -12683,7 +12710,7 @@ Domain allowed access. -Receive SCTP packets from an unlabled connection. +Receive SCTP packets from an unlabeled connection. @@ -56091,7 +56118,17 @@ Domain allowed access. - + + +Unmount device filesystems. + + + +Domain allowed access. + + + + Remount device filesystems. @@ -56101,7 +56138,7 @@ Domain allowed access. - + Watch the directories in /dev. @@ -56111,7 +56148,7 @@ Domain allowed access. - + Mount a filesystem on /dev @@ -56121,7 +56158,7 @@ Domain allow access. - + Allow full relabeling (to and from) of all device nodes. @@ -56132,7 +56169,7 @@ Domain allowed access. - + Allow full relabeling (to and from) of all device files. @@ -56143,7 +56180,7 @@ Domain allowed access. - + List all of the device nodes in a device directory. @@ -56153,7 +56190,7 @@ Domain allowed access. - + Set the attributes of /dev directories. @@ -56163,7 +56200,7 @@ Domain allowed access. - + Dontaudit attempts to list all device nodes. @@ -56173,7 +56210,7 @@ Domain to not audit. - + Dontaudit attempts to execute device nodes. @@ -56183,7 +56220,7 @@ Domain to not audit. - + Add entries to directories in /dev. @@ -56193,7 +56230,7 @@ Domain allowed access. - + Remove entries from directories in /dev. @@ -56203,7 +56240,7 @@ Domain allowed access. - + Create a directory in the device directory. @@ -56213,7 +56250,7 @@ Domain allowed access. - + Delete a directory in the device directory. @@ -56223,7 +56260,7 @@ Domain allowed access. - + Manage of directories in /dev. @@ -56233,7 +56270,7 @@ Domain allowed access. - + Allow full relabeling (to and from) of directories in /dev. @@ -56243,7 +56280,7 @@ Domain allowed access. - + dontaudit getattr generic files in /dev. @@ -56253,7 +56290,7 @@ Domain to not audit. - + Read generic files in /dev. @@ -56263,7 +56300,7 @@ Domain to not audit. - + Read and write generic files in /dev. @@ -56273,7 +56310,7 @@ Domain allowed access. - + Delete generic files in /dev. @@ -56283,7 +56320,7 @@ Domain allowed access. - + Create a file in the device directory. @@ -56293,7 +56330,7 @@ Domain allowed access. - + Dontaudit getattr on generic pipes. @@ -56303,7 +56340,7 @@ Domain to not audit. - + Write generic socket files in /dev. @@ -56313,7 +56350,7 @@ Domain to not audit. - + Allow getattr on generic block devices. @@ -56323,7 +56360,7 @@ Domain allowed access. - + Dontaudit getattr on generic block devices. @@ -56333,7 +56370,7 @@ Domain to not audit. - + Set the attributes on generic block devices. @@ -56344,7 +56381,7 @@ Domain allowed access. - + Dontaudit setattr on generic block devices. @@ -56354,7 +56391,7 @@ Domain to not audit. - + Create generic block device files. @@ -56364,7 +56401,7 @@ Domain allowed access. - + Delete generic block device files. @@ -56374,7 +56411,7 @@ Domain allowed access. - + Dontaudit relabelto the generic device type on block files. @@ -56385,7 +56422,7 @@ Domain to not audit. - + Allow getattr for generic character device files. @@ -56395,7 +56432,7 @@ Domain allowed access. - + Dontaudit getattr for generic character device files. @@ -56405,7 +56442,7 @@ Domain to not audit. - + Set the attributes for generic character device files. @@ -56416,7 +56453,7 @@ Domain allowed access. - + Dontaudit setattr for generic character device files. @@ -56426,7 +56463,7 @@ Domain to not audit. - + Read generic character device files. @@ -56436,7 +56473,7 @@ Domain allowed access. - + Read and write generic character device files. @@ -56446,7 +56483,7 @@ Domain allowed access. - + Read and write generic block device files. @@ -56456,7 +56493,7 @@ Domain allowed access. - + Dontaudit attempts to read/write generic character device files. @@ -56466,7 +56503,7 @@ Domain to dontaudit access. - + Create generic character device files. @@ -56476,7 +56513,7 @@ Domain allowed access. - + Delete generic character device files. @@ -56486,7 +56523,7 @@ Domain allowed access. - + Relabel from generic character device files. @@ -56496,7 +56533,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of symbolic links in device directories (/dev). @@ -56507,7 +56544,7 @@ Domain to not audit. - + Read symbolic links in device directories. @@ -56517,7 +56554,7 @@ Domain allowed access. - + Create symbolic links in device directories. @@ -56527,7 +56564,7 @@ Domain allowed access. - + Delete symbolic links in device directories. @@ -56537,7 +56574,7 @@ Domain allowed access. - + Create, delete, read, and write symbolic links in device directories. @@ -56547,7 +56584,7 @@ Domain allowed access. - + Relabel symbolic links in device directories. @@ -56557,7 +56594,7 @@ Domain allowed access. - + Write generic sock files in /dev. @@ -56567,7 +56604,7 @@ Domain allowed access. - + Create, delete, read, and write device nodes in device directories. @@ -56577,7 +56614,7 @@ Domain allowed access. - + Dontaudit getattr for generic device files. @@ -56587,7 +56624,7 @@ Domain to not audit. - + Create, delete, read, and write block device files. @@ -56597,7 +56634,7 @@ Domain allowed access. - + Create, delete, read, and write character device files. @@ -56607,7 +56644,7 @@ Domain allowed access. - + Create, read, and write device nodes. The node will be transitioned to the type provided. @@ -56634,7 +56671,7 @@ The name of the object being created. - + Create, read, and write device nodes. The node will be transitioned to the type provided. This is @@ -56658,7 +56695,7 @@ The name of the object being created. - + Getattr on all block file device nodes. @@ -56669,7 +56706,7 @@ Domain allowed access. - + Dontaudit getattr on all block file device nodes. @@ -56679,7 +56716,7 @@ Domain to not audit. - + Getattr on all character file device nodes. @@ -56690,7 +56727,7 @@ Domain allowed access. - + Dontaudit getattr on all character file device nodes. @@ -56700,7 +56737,7 @@ Domain to not audit. - + Setattr on all block file device nodes. @@ -56711,7 +56748,7 @@ Domain allowed access. - + Setattr on all character file device nodes. @@ -56722,7 +56759,7 @@ Domain allowed access. - + Dontaudit read on all block file device nodes. @@ -56732,7 +56769,7 @@ Domain to not audit. - + Dontaudit write on all block file device nodes. @@ -56742,7 +56779,7 @@ Domain to not audit. - + Dontaudit read on all character file device nodes. @@ -56752,7 +56789,7 @@ Domain to not audit. - + Dontaudit write on all character file device nodes. @@ -56762,7 +56799,7 @@ Domain to not audit. - + Create all block device files. @@ -56772,7 +56809,7 @@ Domain allowed access. - + Create all character device files. @@ -56782,7 +56819,7 @@ Domain allowed access. - + Delete all block device files. @@ -56792,7 +56829,7 @@ Domain allowed access. - + Delete all character device files. @@ -56802,7 +56839,7 @@ Domain allowed access. - + Rename all block device files. @@ -56812,7 +56849,7 @@ Domain allowed access. - + Rename all character device files. @@ -56822,7 +56859,7 @@ Domain allowed access. - + Read, write, create, and delete all block device files. @@ -56832,7 +56869,7 @@ Domain allowed access. - + Read, write, create, and delete all character device files. @@ -56842,7 +56879,7 @@ Domain allowed access. - + Get the attributes of the apm bios device node. @@ -56852,7 +56889,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the apm bios device node. @@ -56863,7 +56900,7 @@ Domain to not audit. - + Set the attributes of the apm bios device node. @@ -56873,7 +56910,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the apm bios device node. @@ -56884,7 +56921,7 @@ Domain to not audit. - + Read and write the apm bios. @@ -56894,7 +56931,7 @@ Domain allowed access. - + Getattr the agp devices. @@ -56904,7 +56941,7 @@ Domain allowed access. - + Read and write the agp devices. @@ -56914,7 +56951,7 @@ Domain allowed access. - + Get the attributes of the autofs device node. @@ -56924,7 +56961,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the autofs device node. @@ -56935,7 +56972,7 @@ Domain to not audit. - + Set the attributes of the autofs device node. @@ -56945,7 +56982,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the autofs device node. @@ -56956,7 +56993,7 @@ Domain to not audit. - + Read and write the autofs device. @@ -56966,7 +57003,7 @@ Domain allowed access. - + Relabel the autofs device node. @@ -56976,7 +57013,7 @@ Domain allowed access. - + Read and write cachefiles character device nodes. @@ -56987,7 +57024,7 @@ Domain allowed access. - + Read and write the PCMCIA card manager device. @@ -56997,7 +57034,7 @@ Domain allowed access. - + Do not audit attempts to read and write the PCMCIA card manager device. @@ -57008,7 +57045,7 @@ Domain to not audit. - + Create, read, write, and delete the PCMCIA card manager device @@ -57020,7 +57057,7 @@ Domain allowed access. - + Create, read, write, and delete the PCMCIA card manager device. @@ -57031,7 +57068,7 @@ Domain allowed access. - + Automatic type transition to the type for PCMCIA card manager device nodes when @@ -57048,7 +57085,7 @@ The name of the object being created. - + Get the attributes of the CPU microcode and id interfaces. @@ -57059,7 +57096,7 @@ Domain allowed access. - + Set the attributes of the CPU microcode and id interfaces. @@ -57070,7 +57107,7 @@ Domain allowed access. - + Read the CPU identity. @@ -57080,7 +57117,7 @@ Domain allowed access. - + Read and write the the CPU microcode device. This is required to load CPU microcode. @@ -57091,7 +57128,7 @@ Domain allowed access. - + Read the kernel crash device @@ -57101,7 +57138,7 @@ Domain allowed access. - + Read and write the the hardware SSL accelerator. @@ -57111,7 +57148,7 @@ Domain allowed access. - + Set the attributes of the dlm control devices. @@ -57121,7 +57158,7 @@ Domain allowed access. - + Read and write the the dlm control device @@ -57131,7 +57168,17 @@ Domain allowed access. - + + +Read and write the the dma device + + + +Domain allowed access. + + + + getattr the dri devices. @@ -57141,7 +57188,7 @@ Domain allowed access. - + Setattr the dri devices. @@ -57151,7 +57198,7 @@ Domain allowed access. - + IOCTL the dri devices. @@ -57161,7 +57208,7 @@ Domain allowed access. - + Read and write the dri devices. @@ -57171,7 +57218,7 @@ Domain allowed access. - + Dontaudit read and write on the dri devices. @@ -57181,7 +57228,7 @@ Domain to not audit. - + Create, read, write, and delete the dri devices. @@ -57191,7 +57238,7 @@ Domain allowed access. - + Mount on the dri devices. @@ -57201,7 +57248,7 @@ Domain allowed access. - + Automatic type transition to the type for DRI device nodes when created in /dev. @@ -57217,7 +57264,7 @@ The name of the object being created. - + Automatic type transition to the type for event device nodes when created in /dev. @@ -57233,7 +57280,7 @@ The name of the object being created. - + Get the attributes of the event devices. @@ -57243,7 +57290,7 @@ Domain allowed access. - + Set the attributes of the event devices. @@ -57253,7 +57300,7 @@ Domain allowed access. - + Read input event devices (/dev/input). @@ -57263,7 +57310,7 @@ Domain allowed access. - + Read and write input event devices (/dev/input). @@ -57273,7 +57320,7 @@ Domain allowed access. - + Create, read, write, and delete input event devices (/dev/input). @@ -57283,7 +57330,7 @@ Domain allowed access. - + IOCTL the input event devices (/dev/input). @@ -57293,7 +57340,7 @@ Domain allowed access. - + Read and write ipmi devices (/dev/ipmi*). @@ -57303,7 +57350,7 @@ Domain allowed access. - + Get the attributes of the framebuffer device node. @@ -57313,7 +57360,7 @@ Domain allowed access. - + Set the attributes of the framebuffer device node. @@ -57323,7 +57370,7 @@ Domain allowed access. - + Dot not audit attempts to set the attributes of the framebuffer device node. @@ -57334,7 +57381,7 @@ Domain to not audit. - + Read the framebuffer. @@ -57344,7 +57391,7 @@ Domain allowed access. - + Do not audit attempts to read the framebuffer. @@ -57354,7 +57401,7 @@ Domain to not audit. - + Write the framebuffer. @@ -57364,7 +57411,7 @@ Domain allowed access. - + Read and write the framebuffer. @@ -57374,7 +57421,7 @@ Domain allowed access. - + Allow read/write the hypervkvp device @@ -57384,7 +57431,7 @@ Domain allowed access. - + Allow read/write the hypervvssd device @@ -57394,7 +57441,7 @@ Domain allowed access. - + Allow read/write access to InfiniBand devices. @@ -57404,7 +57451,7 @@ Domain allowed access. - + Allow read/write access to InfiniBand devices. @@ -57414,7 +57461,7 @@ Domain allowed access. - + Read the kernel messages @@ -57424,7 +57471,7 @@ Domain allowed access. - + Do not audit attempts to read the kernel messages @@ -57434,7 +57481,7 @@ Domain to not audit. - + Write to the kernel messages device @@ -57444,7 +57491,7 @@ Domain allowed access. - + Read and write to the kernel messages device @@ -57454,7 +57501,7 @@ Domain allowed access. - + Mount on the kernel messages device @@ -57464,7 +57511,7 @@ Domain allowed access. - + Get the attributes of the ksm devices. @@ -57474,7 +57521,7 @@ Domain allowed access. - + Set the attributes of the ksm devices. @@ -57484,7 +57531,7 @@ Domain allowed access. - + Read the ksm devices. @@ -57494,7 +57541,7 @@ Domain allowed access. - + Read and write to ksm devices. @@ -57504,7 +57551,7 @@ Domain allowed access. - + Get the attributes of the kvm devices. @@ -57514,7 +57561,7 @@ Domain allowed access. - + Set the attributes of the kvm devices. @@ -57524,7 +57571,7 @@ Domain allowed access. - + Read the kvm devices. @@ -57534,7 +57581,7 @@ Domain allowed access. - + Read and write to kvm devices. @@ -57544,7 +57591,7 @@ Domain allowed access. - + Read the lirc device. @@ -57554,7 +57601,7 @@ Domain allowed access. - + Read and write the lirc device. @@ -57564,7 +57611,7 @@ Domain allowed access. - + Automatic type transition to the type for lirc device nodes when created in /dev. @@ -57580,7 +57627,7 @@ The name of the object being created. - + Read and write the loop-control device. @@ -57590,7 +57637,7 @@ Domain allowed access. - + Get the attributes of the lvm comtrol device. @@ -57600,7 +57647,7 @@ Domain allowed access. - + Read the lvm comtrol device. @@ -57610,7 +57657,7 @@ Domain allowed access. - + Read and write the lvm control device. @@ -57620,7 +57667,7 @@ Domain allowed access. - + Do not audit attempts to read and write lvm control device. @@ -57630,7 +57677,7 @@ Domain to not audit. - + Delete the lvm control device. @@ -57640,7 +57687,18 @@ Domain allowed access. - + + +Do not audit attempts to read and write the +Intel Management Engine Interface device. + + + +Domain allowed access. + + + + dontaudit getattr raw memory devices (e.g. /dev/mem). @@ -57650,7 +57708,7 @@ Domain to not audit. - + Read raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57663,7 +57721,7 @@ Domain allowed access. - + Read raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -57681,7 +57739,7 @@ Tunable to depend on - + Do not audit attempts to read raw memory devices (e.g. /dev/mem). @@ -57695,7 +57753,7 @@ Domain to not audit. - + Write raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57708,7 +57766,7 @@ Domain allowed access. - + Write raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -57726,7 +57784,7 @@ Tunable to depend on - + Read and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57739,7 +57797,7 @@ Domain allowed access. - + Write and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57752,7 +57810,7 @@ Domain allowed access. - + Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -57770,7 +57828,7 @@ Tunable to depend on - + Get the attributes of miscellaneous devices. @@ -57780,7 +57838,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of miscellaneous devices. @@ -57791,7 +57849,7 @@ Domain to not audit. - + Set the attributes of miscellaneous devices. @@ -57801,7 +57859,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of miscellaneous devices. @@ -57812,7 +57870,7 @@ Domain to not audit. - + Read miscellaneous devices. @@ -57822,7 +57880,7 @@ Domain allowed access. - + Write miscellaneous devices. @@ -57832,7 +57890,7 @@ Domain allowed access. - + Do not audit attempts to read and write miscellaneous devices. @@ -57842,7 +57900,7 @@ Domain allowed access. - + Get the attributes of the modem devices. @@ -57852,7 +57910,7 @@ Domain allowed access. - + Set the attributes of the modem devices. @@ -57862,7 +57920,7 @@ Domain allowed access. - + Read the modem devices. @@ -57872,7 +57930,7 @@ Domain allowed access. - + Read and write to modem devices. @@ -57882,7 +57940,7 @@ Domain allowed access. - + Get the attributes of the mouse devices. @@ -57892,7 +57950,7 @@ Domain allowed access. - + Set the attributes of the mouse devices. @@ -57902,7 +57960,7 @@ Domain allowed access. - + Delete the mouse devices. @@ -57912,7 +57970,7 @@ Domain allowed access. - + Read the mouse devices. @@ -57922,7 +57980,7 @@ Domain allowed access. - + Read and write to mouse devices. @@ -57932,7 +57990,7 @@ Domain allowed access. - + Get the attributes of the memory type range registers (MTRR) device. @@ -57943,7 +58001,7 @@ Domain allowed access. - + Do not audit attempts to write the memory type range registers (MTRR). @@ -57954,7 +58012,7 @@ Domain to not audit. - + Read and write the memory type range registers (MTRR). @@ -57964,7 +58022,7 @@ Domain allowed access. - + Get the attributes of the null device nodes. @@ -57974,7 +58032,7 @@ Domain allowed access. - + Set the attributes of the null device nodes. @@ -57984,7 +58042,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the null device nodes. @@ -57995,7 +58053,7 @@ Domain to not audit. - + Delete the null device (/dev/null). @@ -58005,7 +58063,7 @@ Domain allowed access. - + Read and write to the null device (/dev/null). @@ -58015,7 +58073,7 @@ Domain allowed access. - + Create the null device (/dev/null). @@ -58025,7 +58083,7 @@ Domain allowed access. - + Manage services with script type null_device_t for when /lib/systemd/system/something.service is a link to /dev/null @@ -58036,7 +58094,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. @@ -58047,7 +58105,7 @@ Domain to not audit. - + Read and write BIOS non-volatile RAM. @@ -58057,7 +58115,7 @@ Domain allowed access. - + Get the attributes of the printer device nodes. @@ -58067,7 +58125,7 @@ Domain allowed access. - + Set the attributes of the printer device nodes. @@ -58077,7 +58135,7 @@ Domain allowed access. - + Append the printer device. @@ -58087,7 +58145,7 @@ Domain allowed access. - + Read and write the printer device. @@ -58097,7 +58155,7 @@ Domain allowed access. - + Get the attributes of PM QoS devices @@ -58107,7 +58165,7 @@ Domain allowed access. - + Read the PM QoS devices. @@ -58117,7 +58175,7 @@ Domain allowed access. - + Read and write the the PM QoS devices. @@ -58127,7 +58185,7 @@ Domain allowed access. - + Get the attributes of the QEMU microcode and id interfaces. @@ -58138,7 +58196,7 @@ Domain allowed access. - + Set the attributes of the QEMU microcode and id interfaces. @@ -58149,7 +58207,7 @@ Domain allowed access. - + Read the QEMU device @@ -58159,7 +58217,7 @@ Domain allowed access. - + Read and write the the QEMU device. @@ -58169,7 +58227,7 @@ Domain allowed access. - + Read from random number generator devices (e.g., /dev/random). @@ -58195,7 +58253,7 @@ Domain allowed access. - + Do not audit attempts to read from random number generator devices (e.g., /dev/random) @@ -58206,7 +58264,7 @@ Domain to not audit. - + Do not audit attempts to append to random number generator devices (e.g., /dev/random) @@ -58217,7 +58275,7 @@ Domain to not audit. - + Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the @@ -58229,7 +58287,7 @@ Domain allowed access. - + Create the random device (/dev/random). @@ -58239,7 +58297,7 @@ Domain allowed access. - + Read the realtime clock (/dev/rtc). @@ -58249,7 +58307,7 @@ Domain allowed access. - + Set the realtime clock (/dev/rtc). @@ -58259,7 +58317,7 @@ Domain allowed access. - + Read and set the realtime clock (/dev/rtc). @@ -58269,7 +58327,7 @@ Domain allowed access. - + Get the attributes of the scanner device. @@ -58279,7 +58337,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the scanner device. @@ -58290,7 +58348,7 @@ Domain to not audit. - + Set the attributes of the scanner device. @@ -58300,7 +58358,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the scanner device. @@ -58311,7 +58369,7 @@ Domain to not audit. - + Read and write the scanner device. @@ -58321,7 +58379,7 @@ Domain allowed access. - + Get the attributes of the sound devices. @@ -58331,7 +58389,7 @@ Domain allowed access. - + Set the attributes of the sound devices. @@ -58341,7 +58399,7 @@ Domain allowed access. - + Read the sound devices. @@ -58351,7 +58409,7 @@ Domain allowed access. - + Write the sound devices. @@ -58361,7 +58419,7 @@ Domain allowed access. - + Read the sound mixer devices. @@ -58371,7 +58429,7 @@ Domain allowed access. - + Write the sound mixer devices. @@ -58381,7 +58439,7 @@ Domain allowed access. - + Get the attributes of the the power management device. @@ -58391,7 +58449,7 @@ Domain allowed access. - + Set the attributes of the the power management device. @@ -58401,7 +58459,7 @@ Domain allowed access. - + Read and write the the power management device. @@ -58411,7 +58469,7 @@ Domain allowed access. - + Getattr on smartcard devices @@ -58421,7 +58479,7 @@ Domain allowed access. - + dontaudit getattr on smartcard devices @@ -58431,7 +58489,7 @@ Domain to not audit. - + Read and write smartcard devices. @@ -58441,7 +58499,7 @@ Domain allowed access. - + Create, read, write, and delete smartcard devices. @@ -58451,7 +58509,7 @@ Domain allowed access. - + Read, write and map the sysdig device. @@ -58461,7 +58519,7 @@ Domain allowed access. - + Mount a filesystem on sysfs. (Deprecated) @@ -58471,7 +58529,7 @@ Domain allow access. - + Associate a file to a sysfs filesystem. @@ -58481,7 +58539,7 @@ The type of the file to be associated to sysfs. - + Get the attributes of sysfs directories. @@ -58491,7 +58549,7 @@ Domain allowed access. - + Get the attributes of sysfs filesystem @@ -58501,7 +58559,7 @@ Domain allowed access. - + mount a sysfs filesystem @@ -58511,7 +58569,7 @@ Domain allowed access. - + Remount a sysfs filesystem. @@ -58521,7 +58579,7 @@ Domain allow access. - + unmount a sysfs filesystem @@ -58531,7 +58589,7 @@ Domain allowed access. - + Do not audit getting the attributes of sysfs filesystem @@ -58541,7 +58599,7 @@ Domain to dontaudit access from - + Dont audit attempts to read hardware state information @@ -58551,7 +58609,7 @@ Domain for which the attempts do not need to be audited - + Mount on sysfs directories. @@ -58561,7 +58619,7 @@ Domain allowed access. - + Search the sysfs directories. @@ -58571,7 +58629,7 @@ Domain allowed access. - + Do not audit attempts to search sysfs. @@ -58581,7 +58639,7 @@ Domain to not audit. - + List the contents of the sysfs directories. @@ -58591,7 +58649,7 @@ Domain allowed access. - + Write in a sysfs directories. @@ -58601,7 +58659,7 @@ Domain allowed access. - + Do not audit attempts to write in a sysfs directory. @@ -58611,7 +58669,7 @@ Domain to not audit. - + Do not audit attempts to write to a sysfs file. @@ -58621,7 +58679,7 @@ Domain to not audit. - + Create, read, write, and delete sysfs directories. @@ -58632,7 +58690,7 @@ Domain allowed access. - + Read hardware state information. @@ -58651,7 +58709,7 @@ Domain allowed access. - + Write to hardware state information. @@ -58668,7 +58726,7 @@ Domain allowed access. - + Allow caller to modify hardware state information. @@ -58678,7 +58736,7 @@ Domain allowed access. - + Add a sysfs file @@ -58688,7 +58746,7 @@ Domain allowed access. - + Relabel hardware state directories. @@ -58698,7 +58756,7 @@ Domain allowed access. - + Relabel from/to all sysfs types. @@ -58708,7 +58766,7 @@ Domain allowed access. - + Set the attributes of sysfs files, directories and symlinks. @@ -58718,7 +58776,7 @@ Domain allowed access. - + Read and write the TPM device. @@ -58728,7 +58786,18 @@ Domain allowed access. - + + +Allow open/read/write uhid device + + + +Domain allowed rw to uhid device +to communicate with uhid input node + + + + Read from pseudo random number generator devices (e.g., /dev/urandom). @@ -58761,7 +58830,7 @@ Domain allowed access. - + Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) @@ -58772,7 +58841,7 @@ Domain to not audit. - + Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. @@ -58783,7 +58852,7 @@ Domain allowed access. - + Create the urandom device (/dev/urandom). @@ -58793,7 +58862,7 @@ Domain allowed access. - + Set attributes on the urandom device (/dev/urandom). @@ -58803,7 +58872,7 @@ Domain allowed access. - + Getattr generic the USB devices. @@ -58813,7 +58882,7 @@ Domain allowed access. - + Setattr generic the USB devices. @@ -58823,7 +58892,7 @@ Domain allowed access. - + Read generic the USB devices. @@ -58833,7 +58902,7 @@ Domain allowed access. - + Read and write generic the USB devices. @@ -58843,7 +58912,7 @@ Domain allowed access. - + Delete the generic USB devices. @@ -58853,7 +58922,7 @@ Domain allowed access. - + Relabel generic the USB devices. @@ -58863,7 +58932,7 @@ Domain allowed access. - + Read USB monitor devices. @@ -58873,7 +58942,7 @@ Domain allowed access. - + Write USB monitor devices. @@ -58883,7 +58952,7 @@ Domain allowed access. - + Mount a usbfs filesystem. @@ -58893,7 +58962,7 @@ Domain allowed access. - + Associate a file to a usbfs filesystem. @@ -58903,7 +58972,7 @@ The type of the file to be associated to usbfs. - + Get the attributes of a directory in the usb filesystem. @@ -58913,7 +58982,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of a directory in the usb filesystem. @@ -58924,7 +58993,7 @@ Domain to not audit. - + Search the directory containing USB hardware information. @@ -58934,7 +59003,7 @@ Domain allowed access. - + Allow caller to get a list of usb hardware. @@ -58944,7 +59013,7 @@ Domain allowed access. - + Set the attributes of usbfs filesystem. @@ -58954,7 +59023,7 @@ Domain allowed access. - + Read USB hardware information using the usbfs filesystem interface. @@ -58965,7 +59034,7 @@ Domain allowed access. - + Allow caller to modify usb hardware configuration files. @@ -58975,7 +59044,7 @@ Domain allowed access. - + Get the attributes of video4linux devices. @@ -58985,7 +59054,7 @@ Domain allowed access. - + Read and write userio device. @@ -58995,7 +59064,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of video4linux device nodes. @@ -59006,7 +59075,7 @@ Domain to not audit. - + Set the attributes of video4linux device nodes. @@ -59016,7 +59085,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of video4linux device nodes. @@ -59027,7 +59096,7 @@ Domain to not audit. - + Read the video4linux devices. @@ -59037,7 +59106,7 @@ Domain allowed access. - + Write the video4linux devices. @@ -59047,7 +59116,7 @@ Domain allowed access. - + Read and write vfio devices. @@ -59057,7 +59126,7 @@ Domain allowed access. - + Relabel vfio devices. @@ -59067,7 +59136,17 @@ Domain allowed access. - + + +Get the attributes of the vhost devices. + + + +Domain allowed access. + + + + Allow read/write the vhost devices @@ -59077,7 +59156,7 @@ Domain allowed access. - + Read and write VMWare devices. @@ -59087,7 +59166,7 @@ Domain allowed access. - + Read, write, and mmap VMWare devices. @@ -59097,7 +59176,48 @@ Domain allowed access. - + + +Read the vsock device. + + + +Domain allowed access. + + + + + +Write the vsock device. + + + +Domain allowed access. + + + + + +Read and write the vsock device. + + + +Domain allowed access. + + + + + +Automatic type transition to the type +for the vsock device nodes when created in /dev. + + + +Domain allowed access. + + + + Read from watchdog devices. @@ -59107,7 +59227,7 @@ Domain allowed access. - + Write to watchdog devices. @@ -59117,7 +59237,7 @@ Domain allowed access. - + Read the wireless device. @@ -59127,7 +59247,7 @@ Domain allowed access. - + Read and write the the wireless device. @@ -59137,7 +59257,7 @@ Domain allowed access. - + manage the wireless device. @@ -59147,7 +59267,7 @@ Domain allowed access. - + Read and write Xen devices. @@ -59157,7 +59277,7 @@ Domain allowed access. - + Create, read, write, and delete Xen devices. @@ -59167,7 +59287,7 @@ Domain allowed access. - + Automatic type transition to the type for xen device nodes when created in /dev. @@ -59183,7 +59303,7 @@ The name of the object being created. - + Get the attributes of X server miscellaneous devices. @@ -59193,7 +59313,7 @@ Domain allowed access. - + Set the attributes of X server miscellaneous devices. @@ -59203,7 +59323,7 @@ Domain allowed access. - + Read and write X server miscellaneous devices. @@ -59213,7 +59333,7 @@ Domain allowed access. - + Map X server miscellaneous devices. @@ -59223,7 +59343,7 @@ Domain allowed access. - + Read and write to the zero device (/dev/zero). @@ -59233,7 +59353,7 @@ Domain allowed access. - + Read, write, and execute the zero device (/dev/zero). @@ -59243,7 +59363,7 @@ Domain allowed access. - + Execmod the zero device (/dev/zero). @@ -59253,7 +59373,7 @@ Domain allowed access. - + Create the zero device (/dev/zero). @@ -59263,7 +59383,7 @@ Domain allowed access. - + Read cpu online hardware state information @@ -59278,7 +59398,7 @@ Domain allowed access. - + Read and write to the gpiochip device, /dev/gpiochip[0-9] @@ -59288,7 +59408,7 @@ Domain allowed access. - + Unconfined access to devices. @@ -59298,7 +59418,7 @@ Domain allowed access. - + Relabel cpu online hardware state information. @@ -59308,7 +59428,7 @@ Domain allowed access. - + Dont audit attempts to read usbmon devices @@ -59596,7 +59716,7 @@ Domain to not audit. Send a SIGCHLD signal to domains whose file -discriptors are widely inheritable. +descriptors are widely inheritable. @@ -60752,7 +60872,17 @@ Domain allowed access. - + + +Read and memory map all files. + + + +Domain allowed access. + + + + Allow shared library text relocations in all files. @@ -60770,7 +60900,7 @@ Domain allowed access. - + Read all non-security files. @@ -60781,7 +60911,7 @@ Domain allowed access. - + Write all non-security files. @@ -60792,7 +60922,7 @@ Domain allowed access. - + Create all non-security files. @@ -60803,7 +60933,7 @@ Domain allowed access. - + Read all directories on the filesystem, except the listed exceptions. @@ -60820,7 +60950,7 @@ must be negated by the caller. - + Read all files on the filesystem, except the listed exceptions. @@ -60837,7 +60967,7 @@ must be negated by the caller. - + Read all symbolic links on the filesystem, except the listed exceptions. @@ -60854,7 +60984,7 @@ must be negated by the caller. - + Get the attributes of all symbolic links. @@ -60864,7 +60994,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all symbolic links. @@ -60875,7 +61005,7 @@ Domain to not audit. - + Do not audit attempts to read all symbolic links. @@ -60885,7 +61015,7 @@ Domain to not audit. - + Do not audit attempts to get the attributes of non security symbolic links. @@ -60896,7 +61026,7 @@ Domain to not audit. - + Do not audit attempts to get the attributes of non security block devices. @@ -60907,7 +61037,7 @@ Domain to not audit. - + Do not audit attempts to get the attributes of non security character devices. @@ -60918,7 +61048,7 @@ Domain to not audit. - + Read all symbolic links. @@ -60929,7 +61059,7 @@ Domain allowed access. - + Get the attributes of all named pipes. @@ -60939,7 +61069,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all named pipes. @@ -60950,7 +61080,7 @@ Domain to not audit. - + Do not audit attempts to get the attributes of non security named pipes. @@ -60961,7 +61091,7 @@ Domain to not audit. - + Get the attributes of all named sockets. @@ -60971,7 +61101,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all named sockets. @@ -60982,7 +61112,7 @@ Domain to not audit. - + Do not audit attempts to get the attributes of non security named sockets. @@ -60993,7 +61123,7 @@ Domain to not audit. - + Read all block nodes with file types. @@ -61003,7 +61133,7 @@ Domain allowed access. - + Read all character nodes with file types. @@ -61013,7 +61143,7 @@ Domain allowed access. - + Relabel all files on the filesystem, except the listed exceptions. @@ -61031,7 +61161,7 @@ must be negated by the caller. - + rw all files on the filesystem, except the listed exceptions. @@ -61049,7 +61179,7 @@ must be negated by the caller. - + Manage all files on the filesystem, except the listed exceptions. @@ -61067,7 +61197,7 @@ must be negated by the caller. - + Search the contents of all directories on extended attribute filesystems. @@ -61078,7 +61208,7 @@ Domain allowed access. - + List the contents of all directories on extended attribute filesystems. @@ -61089,7 +61219,7 @@ Domain allowed access. - + Create all files as is. @@ -61099,7 +61229,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of any directories on extended @@ -61111,7 +61241,7 @@ Domain to not audit. - + Get the attributes of all filesystems with the type of a file. @@ -61122,7 +61252,7 @@ Domain allowed access. - + Relabel a filesystem to the type of a file. @@ -61132,7 +61262,7 @@ Domain allowed access. - + Relabel a filesystem to and from the type of a file. @@ -61142,7 +61272,7 @@ Domain allowed access. - + Mount all filesystems with the type of a file. @@ -61152,7 +61282,7 @@ Domain allowed access. - + Unmount all filesystems with the type of a file. @@ -61162,7 +61292,7 @@ Domain allowed access. - + watch all directories of file_type @@ -61172,7 +61302,7 @@ Domain allowed access. - + Read all non-authentication related directories. @@ -61183,7 +61313,7 @@ Domain allowed access. - + Read all non-authentication related files. @@ -61194,7 +61324,7 @@ Domain allowed access. - + Read all non-authentication related symbolic links. @@ -61205,7 +61335,7 @@ Domain allowed access. - + rw non-authentication related files. @@ -61215,7 +61345,7 @@ Domain allowed access. - + Manage non-authentication related files. @@ -61227,7 +61357,7 @@ Domain allowed access. - + Mmap non-authentication related files. @@ -61239,7 +61369,7 @@ Domain allowed access. - + Relabel all non-authentication related files. @@ -61251,7 +61381,7 @@ Domain allowed access. - + Manage all configuration directories on filesystem @@ -61262,7 +61392,7 @@ Domain allowed access. - + Relabel configuration directories @@ -61273,7 +61403,7 @@ Domain allowed access. - + Do not audit attempts to relabel configuration directories @@ -61284,7 +61414,7 @@ Domain not to audit. - + Read config files in /etc. @@ -61294,7 +61424,7 @@ Domain allowed access. - + Manage all configuration files on filesystem @@ -61305,7 +61435,7 @@ Domain allowed access. - + Relabel configuration files @@ -61316,7 +61446,7 @@ Domain allowed access. - + Do not audit attempts to relabel configuration files @@ -61327,7 +61457,7 @@ Domain not to audit. - + Relabel configuration symlinks. @@ -61338,7 +61468,7 @@ Domain allowed access. - + Mount a filesystem on all mount points. @@ -61348,7 +61478,7 @@ Domain allowed access. - + Get the attributes of all mount points. @@ -61358,7 +61488,7 @@ Domain allowed access. - + Set the attributes of all mount points. @@ -61368,7 +61498,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes on all mount points. @@ -61378,7 +61508,7 @@ Domain to not audit. - + Search all mount points. @@ -61388,7 +61518,7 @@ Domain allowed access. - + Do not audit searching of all mount points. @@ -61398,7 +61528,7 @@ Domain to not audit. - + List all mount points. @@ -61408,7 +61538,7 @@ Domain allowed access. - + Do not audit listing of all mount points. @@ -61418,7 +61548,7 @@ Domain to not audit. - + Watch all mountpoints. @@ -61428,7 +61558,7 @@ Domain allowed access. - + Watch all mountpoints. @@ -61438,7 +61568,17 @@ Domain allowed access. - + + +Watch all mount superblock changes + + + +Domain allowed access. + + + + Check if all mountpoints are writable. @@ -61448,7 +61588,7 @@ Domain allowed access. - + Do not audit attempts to write to mount points. @@ -61458,7 +61598,7 @@ Domain to not audit. - + List the contents of the root directory. @@ -61468,7 +61608,7 @@ Domain allowed access. - + Delete symbolic links in the root directory. @@ -61479,7 +61619,7 @@ Domain allowed access. - + Do not audit attempts to write to / dirs. @@ -61489,7 +61629,7 @@ Domain to not audit. - + Do not audit attempts to write files in the root directory. @@ -61500,7 +61640,7 @@ Domain to not audit. - + Watch the root directory. @@ -61510,7 +61650,7 @@ Domain allowed access. - + Create an object in the root directory, with a private type using a type transition. @@ -61536,7 +61676,7 @@ The name of the object being created. - + Do not audit attempts to read files in the root directory. @@ -61547,7 +61687,7 @@ Domain to not audit. - + Do not audit attempts to read or write files in the root directory. @@ -61558,7 +61698,7 @@ Domain to not audit. - + Do not audit attempts to read or write character device nodes in the root directory. @@ -61569,7 +61709,7 @@ Domain to not audit. - + Delete character device nodes in the root directory. @@ -61580,7 +61720,7 @@ Domain allowed access. - + Delete files in the root directory. @@ -61590,7 +61730,7 @@ Domain allowed access. - + Execute files in the root directory. @@ -61600,7 +61740,7 @@ Domain allowed access. - + Remove entries from the root directory. @@ -61610,7 +61750,7 @@ Domain allowed access. - + Manage the root directory. @@ -61620,7 +61760,7 @@ Domain allowed access. - + Get the attributes of a rootfs file system. @@ -61631,7 +61771,7 @@ Domain allowed access. - + Associate to root file system. @@ -61641,7 +61781,7 @@ Type of the file to associate. - + Relabel to and from rootfs file system. @@ -61651,7 +61791,7 @@ Domain allowed access. - + Unmount a rootfs filesystem. @@ -61661,7 +61801,7 @@ Domain allowed access. - + Mount on the root directory (/) @@ -61671,7 +61811,7 @@ Domain allowed access. - + Get the attributes of a filesystem mounted on /boot. @@ -61682,7 +61822,7 @@ Domain allowed access. - + Remount a filesystem mounted on /boot. @@ -61692,7 +61832,7 @@ Domain allowed access. - + Get attributes of the /boot directory. @@ -61702,7 +61842,7 @@ Domain allowed access. - + Do not audit attempts to get attributes of the /boot directory. @@ -61713,7 +61853,7 @@ Domain to not audit. - + Search the /boot directory. @@ -61723,7 +61863,7 @@ Domain allowed access. - + Do not audit attempts to search the /boot directory. @@ -61733,7 +61873,7 @@ Domain to not audit. - + List the /boot directory. @@ -61743,7 +61883,7 @@ Domain allowed access. - + Do not audit attempts to list the /boot directory. @@ -61753,7 +61893,7 @@ Domain allowed access. - + Create directories in /boot @@ -61763,7 +61903,7 @@ Domain allowed access. - + Create, read, write, and delete directories in /boot. @@ -61774,7 +61914,7 @@ Domain allowed access. - + Create a private type object in boot with an automatic type transition @@ -61800,7 +61940,7 @@ The name of the object being created. - + read files in the /boot directory. @@ -61811,7 +61951,18 @@ Domain allowed access. - + + +Read and memory map files in the /boot directory. + + + +Domain allowed access. + + + + + Create, read, write, and delete files in the /boot directory. @@ -61823,7 +61974,7 @@ Domain allowed access. - + Relabel from files in the /boot directory. @@ -61833,7 +61984,7 @@ Domain allowed access. - + Read symbolic links in the /boot directory. @@ -61843,7 +61994,7 @@ Domain allowed access. - + Read and write symbolic links in the /boot directory. @@ -61854,7 +62005,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in the /boot directory. @@ -61865,7 +62016,7 @@ Domain allowed access. - + Read kernel files in the /boot directory. @@ -61875,7 +62026,7 @@ Domain allowed access. - + Install a kernel into the /boot directory. @@ -61886,7 +62037,7 @@ Domain allowed access. - + Delete a kernel from /boot. @@ -61897,7 +62048,7 @@ Domain allowed access. - + Getattr of directories with the default file type. @@ -61907,7 +62058,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of directories with the default file type. @@ -61918,7 +62069,7 @@ Domain to not audit. - + Search the contents of directories with the default file type. @@ -61928,7 +62079,7 @@ Domain allowed access. - + List contents of directories with the default file type. @@ -61938,7 +62089,7 @@ Domain allowed access. - + Do not audit attempts to list contents of directories with the default file type. @@ -61949,7 +62100,7 @@ Domain to not audit. - + Create, read, write, and delete directories with the default file type. @@ -61960,7 +62111,7 @@ Domain allowed access. - + Mount a filesystem on a directory with the default file type. @@ -61970,7 +62121,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of files with the default file type. @@ -61981,7 +62132,7 @@ Domain to not audit. - + Read files with the default file type. @@ -61991,7 +62142,7 @@ Domain allowed access. - + Do not audit attempts to read files with the default file type. @@ -62002,7 +62153,7 @@ Domain to not audit. - + Do not audit attempts to execute files with the default file type. @@ -62013,7 +62164,7 @@ Domain to not audit. - + Create, read, write, and delete files with the default file type. @@ -62024,7 +62175,7 @@ Domain allowed access. - + Read symbolic links with the default file type. @@ -62034,7 +62185,7 @@ Domain allowed access. - + Read sockets with the default file type. @@ -62044,7 +62195,7 @@ Domain allowed access. - + Read named pipes with the default file type. @@ -62054,7 +62205,7 @@ Domain allowed access. - + Search the contents of /etc directories. @@ -62064,7 +62215,7 @@ Domain allowed access. - + Set the attributes of the /etc directories. @@ -62074,7 +62225,7 @@ Domain allowed access. - + List the contents of /etc directories. @@ -62084,7 +62235,7 @@ Domain allowed access. - + Do not audit attempts to write to /etc dirs. @@ -62094,7 +62245,7 @@ Domain to not audit. - + Add and remove entries from /etc directories. @@ -62104,7 +62255,7 @@ Domain allowed access. - + Manage generic directories in /etc @@ -62115,7 +62266,7 @@ Domain allowed access - + Relabel directories to etc_t. @@ -62125,7 +62276,7 @@ Domain allowed access. - + Mount a filesystem on the etc directories. @@ -62136,7 +62287,7 @@ Domain allowed access. - + Remount etc filesystems. @@ -62146,7 +62297,7 @@ Domain allowed access. - + Watch /etc directories @@ -62156,7 +62307,7 @@ Domain allowed access. - + Read generic files in /etc. @@ -62200,7 +62351,7 @@ Domain allowed access. - + Map generic files in /etc. @@ -62222,7 +62373,7 @@ Domain allowed access. - + Do not audit attempts to write generic files in /etc. @@ -62232,7 +62383,7 @@ Domain allowed access. - + Read and write generic files in /etc. @@ -62243,7 +62394,7 @@ Domain allowed access. - + Create, read, write, and delete generic files in /etc. @@ -62255,7 +62406,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete generic files in /etc. @@ -62267,7 +62418,7 @@ Domain to not audit. - + Delete system configuration files in /etc. @@ -62277,7 +62428,7 @@ Domain allowed access. - + Execute generic files in /etc. @@ -62287,7 +62438,7 @@ Domain allowed access. - + Watch /etc files. @@ -62297,7 +62448,7 @@ Domain allowed access. - + Get etc_t service status. @@ -62307,7 +62458,7 @@ Domain allowed access. - + start etc_t service @@ -62317,7 +62468,7 @@ Domain allowed access. - + stop etc_t service @@ -62327,7 +62478,7 @@ Domain allowed access. - + Relabel from and to generic files in /etc. @@ -62337,7 +62488,7 @@ Domain allowed access. - + Read symbolic links in /etc. @@ -62347,7 +62498,7 @@ Domain allowed access. - + Watch /etc symlinks @@ -62357,7 +62508,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /etc. @@ -62367,7 +62518,7 @@ Domain allowed access. - + Create objects in /etc with a private type using a type_transition. @@ -62393,7 +62544,7 @@ The name of the object being created. - + Create a boot flag. @@ -62415,7 +62566,7 @@ The name of the object being created. - + Delete a boot flag. @@ -62432,7 +62583,7 @@ Domain allowed access. - + Get the attributes of the etc_runtime directories. @@ -62443,7 +62594,7 @@ Domain allowed access. - + Mount a filesystem on the etc_runtime directories. @@ -62454,7 +62605,7 @@ Domain allowed access. - + Relabel to etc_runtime_t dirs. @@ -62464,7 +62615,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the etc_runtime files @@ -62474,7 +62625,7 @@ Domain to not audit. - + Read files in /etc that are dynamically created on boot, such as mtab. @@ -62504,7 +62655,7 @@ Domain allowed access. - + Do not audit attempts to read files in /etc that are dynamically @@ -62516,9 +62667,21 @@ Domain to not audit. - + + +Do not audit attempts to execute files +in /etc that are dynamically +created on boot, such as mtab. + + + +Domain to not audit. + + + + -Do not audit attempts to execuite files +Do not audit attempts to execute files in /etc that are dynamically created on boot, such as mtab. @@ -62528,7 +62691,7 @@ Domain to not audit. - + Do not audit attempts to read files in /etc @@ -62539,7 +62702,7 @@ Domain to not audit. - + Do not audit attempts to write etc runtime files. @@ -62550,7 +62713,7 @@ Domain to not audit. - + Read and write files in /etc that are dynamically created on boot, such as mtab. @@ -62562,7 +62725,7 @@ Domain allowed access. - + Create, read, write, and delete files in /etc that are dynamically created on boot, @@ -62575,7 +62738,7 @@ Domain allowed access. - + Relabel to etc_runtime_t files. @@ -62585,7 +62748,7 @@ Domain allowed access. - + Create, etc runtime objects with an automatic type transition. @@ -62606,7 +62769,7 @@ The name of the object being created. - + Get the attributes of the home directories root (/home). @@ -62617,7 +62780,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the home directories root @@ -62629,7 +62792,7 @@ Domain to not audit. - + Search home directories root (/home). @@ -62639,7 +62802,7 @@ Domain allowed access. - + Do not audit attempts to search home directories root (/home). @@ -62650,7 +62813,7 @@ Domain to not audit. - + Do not audit attempts to list home directories root (/home). @@ -62661,7 +62824,7 @@ Domain to not audit. - + Get listing of home directories. @@ -62671,7 +62834,7 @@ Domain allowed access. - + Relabel to user home root (/home). @@ -62681,7 +62844,7 @@ Domain allowed access. - + Relabel from user home root (/home). @@ -62691,7 +62854,7 @@ Domain allowed access. - + Watch the user home root (/home). @@ -62701,7 +62864,7 @@ Domain allowed access. - + Create objects in /home. @@ -62726,7 +62889,7 @@ The name of the object being created. - + Get the attributes of lost+found directories. @@ -62736,7 +62899,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of lost+found directories. @@ -62747,7 +62910,7 @@ Domain to not audit. - + List the contents of lost+found directories. @@ -62757,7 +62920,7 @@ Domain allowed access. - + Create, read, write, and delete objects in lost+found directories. @@ -62769,7 +62932,7 @@ Domain allowed access. - + Search the contents of /mnt. @@ -62779,7 +62942,7 @@ Domain allowed access. - + Do not audit attempts to search /mnt. @@ -62789,7 +62952,7 @@ Domain to not audit. - + List the contents of /mnt. @@ -62799,7 +62962,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of /mnt. @@ -62809,7 +62972,7 @@ Domain allowed access. - + Mount a filesystem on /mnt. @@ -62819,7 +62982,7 @@ Domain allowed access. - + Create, read, write, and delete directories in /mnt. @@ -62830,7 +62993,7 @@ Domain allowed access. - + Create, read, write, and delete files in /mnt. @@ -62840,7 +63003,7 @@ Domain allowed access. - + read files in /mnt. @@ -62850,7 +63013,7 @@ Domain allowed access. - + Read symbolic links in /mnt. @@ -62860,7 +63023,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /mnt. @@ -62870,7 +63033,7 @@ Domain allowed access. - + Search the contents of the kernel module directories. @@ -62880,7 +63043,7 @@ Domain allowed access. - + List the contents of the kernel module directories. @@ -62890,7 +63053,7 @@ Domain allowed access. - + Get the attributes of kernel module files. @@ -62900,7 +63063,7 @@ Domain allowed access. - + Read kernel module files. @@ -62910,7 +63073,7 @@ Domain allowed access. - + Read and mmap kernel module files. @@ -62920,7 +63083,7 @@ Domain allowed access. - + Write kernel module files. @@ -62930,7 +63093,7 @@ Domain allowed access. - + Delete kernel module files. @@ -62940,7 +63103,7 @@ Domain allowed access. - + Create, read, write, and delete kernel module files. @@ -62952,7 +63115,7 @@ Domain allowed access. - + Relabel from and to kernel module files. @@ -62962,7 +63125,7 @@ Domain allowed access. - + Mount on kernel module directories. @@ -62972,7 +63135,7 @@ Domain allowed access. - + Create objects in the kernel module directories with a private type via an automatic type transition. @@ -62998,7 +63161,7 @@ The name of the object being created. - + Load kernel module files. @@ -63008,7 +63171,7 @@ Domain allowed access. - + Load kernel module files. @@ -63018,7 +63181,7 @@ Domain allowed access. - + List world-readable directories. @@ -63029,7 +63192,7 @@ Domain allowed access. - + Read world-readable files. @@ -63040,7 +63203,7 @@ Domain allowed access. - + Read world-readable symbolic links. @@ -63051,7 +63214,7 @@ Domain allowed access. - + Read world-readable named pipes. @@ -63061,7 +63224,7 @@ Domain allowed access. - + Read world-readable sockets. @@ -63071,7 +63234,7 @@ Domain allowed access. - + Allow the specified type to associate to a filesystem with the type of the @@ -63083,7 +63246,7 @@ Type of the file to associate. - + Get the attributes of the tmp directory (/tmp). @@ -63093,7 +63256,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the tmp directory (/tmp). @@ -63104,7 +63267,7 @@ Domain allowed access. - + Search the tmp directory (/tmp). @@ -63114,7 +63277,7 @@ Domain allowed access. - + Do not audit attempts to search the tmp directory (/tmp). @@ -63124,7 +63287,7 @@ Domain to not audit. - + Read the tmp directory (/tmp). @@ -63134,7 +63297,7 @@ Domain allowed access. - + Do not audit listing of the tmp directory (/tmp). @@ -63144,7 +63307,7 @@ Domain not to audit. - + Remove entries from the tmp directory. @@ -63154,7 +63317,7 @@ Domain allowed access. - + Read files in the tmp directory (/tmp). @@ -63164,7 +63327,7 @@ Domain allowed access. - + Manage temporary directories in /tmp. @@ -63174,7 +63337,7 @@ Domain allowed access. - + Relabel temporary directories in /tmp. @@ -63184,7 +63347,7 @@ Domain allowed access. - + Manage temporary files and directories in /tmp. @@ -63194,7 +63357,7 @@ Domain allowed access. - + Read symbolic links in the tmp directory (/tmp). @@ -63204,7 +63367,7 @@ Domain allowed access. - + Read and write generic named sockets in the tmp directory (/tmp). @@ -63214,7 +63377,7 @@ Domain allowed access. - + Mount filesystems in the tmp directory (/tmp) @@ -63224,7 +63387,7 @@ Domain allowed access. - + Set the attributes of all tmp directories. @@ -63234,7 +63397,7 @@ Domain allowed access. - + List all tmp directories. @@ -63244,7 +63407,7 @@ Domain allowed access. - + Relabel to and from all temporary directory types. @@ -63256,7 +63419,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all tmp files. @@ -63267,7 +63430,7 @@ Domain not to audit. - + Allow attempts to get the attributes of all tmp files. @@ -63278,7 +63441,7 @@ Domain allowed access. - + Relabel to and from all temporary file types. @@ -63290,7 +63453,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all tmp sock_file. @@ -63301,7 +63464,7 @@ Domain not to audit. - + Read all tmp files. @@ -63311,7 +63474,7 @@ Domain allowed access. - + Create an object in the tmp directories, with a private type using a type transition. @@ -63337,7 +63500,7 @@ The name of the object being created. - + Delete the contents of /tmp. @@ -63347,7 +63510,7 @@ Domain allowed access. - + Get the attributes of all tmpfs files. @@ -63357,7 +63520,7 @@ Domain allowed access. - + Set the attributes of the /usr directory. @@ -63367,7 +63530,7 @@ Domain allowed access. - + Search the content of /usr. @@ -63377,7 +63540,7 @@ Domain allowed access. - + List the contents of generic directories in /usr. @@ -63388,7 +63551,7 @@ Domain allowed access. - + Do not audit write of /usr dirs @@ -63398,7 +63561,7 @@ Domain to not audit. - + Add and remove entries from /usr directories. @@ -63408,7 +63571,7 @@ Domain allowed access. - + Do not audit attempts to add and remove entries from /usr directories. @@ -63419,7 +63582,7 @@ Domain to not audit. - + Delete generic directories in /usr in the caller domain. @@ -63429,7 +63592,7 @@ Domain allowed access. - + Watch generic directories in /usr. @@ -63439,7 +63602,7 @@ Domain allowed access. - + Delete generic files in /usr in the caller domain. @@ -63449,7 +63612,7 @@ Domain allowed access. - + Get the attributes of files in /usr. @@ -63459,7 +63622,7 @@ Domain allowed access. - + Map generic files in /usr. @@ -63470,7 +63633,7 @@ Domain allowed access. - + Read generic files in /usr. @@ -63498,7 +63661,7 @@ Domain allowed access. - + Execute generic programs in /usr in the caller domain. @@ -63508,7 +63671,7 @@ Domain allowed access. - + dontaudit write of /usr files @@ -63518,7 +63681,7 @@ Domain to not audit. - + Create, read, write, and delete files in the /usr directory. @@ -63528,7 +63691,7 @@ Domain allowed access. - + Relabel a file to the type used in /usr. @@ -63538,7 +63701,7 @@ Domain allowed access. - + Relabel a file from the type used in /usr. @@ -63548,7 +63711,7 @@ Domain allowed access. - + Read symbolic links in /usr. @@ -63558,7 +63721,7 @@ Domain allowed access. - + Create objects in the /usr directory @@ -63583,7 +63746,7 @@ The name of the object being created. - + Search directories in /usr/src. @@ -63593,7 +63756,7 @@ Domain allowed access. - + Do not audit attempts to search /usr/src. @@ -63603,7 +63766,7 @@ Domain to not audit. - + Get the attributes of files in /usr/src. @@ -63613,7 +63776,7 @@ Domain allowed access. - + Read files in /usr/src. @@ -63623,7 +63786,7 @@ Domain allowed access. - + Execute programs in /usr/src in the caller domain. @@ -63633,7 +63796,7 @@ Domain allowed access. - + Install a system.map into the /boot directory. @@ -63643,7 +63806,7 @@ Domain allowed access. - + Read system.map in the /boot directory. @@ -63653,7 +63816,7 @@ Domain allowed access. - + Delete a system.map in the /boot directory. @@ -63663,7 +63826,7 @@ Domain allowed access. - + Mount on a system.map in the /boot directory (for bind mounts). @@ -63673,7 +63836,7 @@ Domain allowed access. - + Search the contents of /var. @@ -63683,7 +63846,7 @@ Domain allowed access. - + Do not audit attempts to write to /var. @@ -63693,7 +63856,7 @@ Domain to not audit. - + Allow attempts to write to /var.dirs @@ -63703,7 +63866,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of /var. @@ -63714,7 +63877,7 @@ Domain to not audit. - + List the contents of /var. @@ -63724,7 +63887,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of /var. @@ -63735,7 +63898,7 @@ Domain to not audit. - + Create, read, write, and delete directories in the /var directory. @@ -63746,7 +63909,7 @@ Domain allowed access. - + relabelto/from var directories @@ -63756,7 +63919,7 @@ Domain allowed access. - + Read files in the /var directory. @@ -63766,7 +63929,7 @@ Domain allowed access. - + Append files in the /var directory. @@ -63776,7 +63939,7 @@ Domain allowed access. - + Read and write files in the /var directory. @@ -63786,7 +63949,7 @@ Domain allowed access. - + Do not audit attempts to read and write files in the /var directory. @@ -63797,7 +63960,7 @@ Domain to not audit. - + Create, read, write, and delete files in the /var directory. @@ -63807,7 +63970,7 @@ Domain allowed access. - + Read symbolic links in the /var directory. @@ -63817,7 +63980,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in the /var directory. @@ -63828,7 +63991,7 @@ Domain allowed access. - + Create objects in the /var directory @@ -63853,7 +64016,7 @@ The name of the object being created. - + Get the attributes of the /var/lib directory. @@ -63863,7 +64026,7 @@ Domain allowed access. - + Search the /var/lib directory. @@ -63887,7 +64050,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of /var/lib. @@ -63899,7 +64062,7 @@ Domain to not audit. - + List the contents of the /var/lib directory. @@ -63909,7 +64072,7 @@ Domain allowed access. - + Read-write /var/lib directories @@ -63919,7 +64082,7 @@ Domain allowed access. - + manage var_lib_t dirs @@ -63929,7 +64092,7 @@ Domain allowed access. - + relabel var_lib_t dirs @@ -63939,7 +64102,7 @@ Domain allowed access. - + Create objects in the /var/lib directory @@ -63964,7 +64127,7 @@ The name of the object being created. - + Read generic files in /var/lib. @@ -63974,7 +64137,7 @@ Domain allowed access. - + Read generic symbolic links in /var/lib @@ -63984,7 +64147,7 @@ Domain allowed access. - + Create, read, write, and delete the pseudorandom number generator seed. @@ -63995,7 +64158,7 @@ Domain allowed access. - + Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -64006,7 +64169,7 @@ Domain allowed access. - + Set the attributes of the generic lock directories. @@ -64016,7 +64179,7 @@ Domain allowed access. - + Search the locks directory (/var/lock). @@ -64026,7 +64189,7 @@ Domain allowed access. - + Do not audit attempts to search the locks directory (/var/lock). @@ -64037,7 +64200,7 @@ Domain to not audit. - + List generic lock directories. @@ -64047,7 +64210,7 @@ Domain allowed access. - + Test write access on lock directories. @@ -64057,7 +64220,7 @@ Domain allowed access. - + Add entries in the /var/lock directories. @@ -64067,7 +64230,7 @@ Domain allowed access. - + Add and remove entries in the /var/lock directories. @@ -64078,7 +64241,7 @@ Domain allowed access. - + Create lock directories @@ -64088,7 +64251,7 @@ Domain allowed access - + Relabel to and from all lock directory types. @@ -64099,7 +64262,7 @@ Domain allowed access. - + Get the attributes of generic lock files. @@ -64109,7 +64272,7 @@ Domain allowed access. - + Delete generic lock files. @@ -64119,7 +64282,7 @@ Domain allowed access. - + Create, read, write, and delete generic lock files. @@ -64130,7 +64293,7 @@ Domain allowed access. - + Delete all lock files. @@ -64141,7 +64304,7 @@ Domain allowed access. - + Read all lock files. @@ -64151,7 +64314,7 @@ Domain allowed access. - + manage all lock files. @@ -64161,7 +64324,7 @@ Domain allowed access. - + Relabel from/to all lock files. @@ -64171,7 +64334,7 @@ Domain allowed access. - + Create an object in the locks directory, with a private type using a type transition. @@ -64197,7 +64360,7 @@ The name of the object being created. - + Do not audit attempts to get the attributes of the /var/run directory. @@ -64208,7 +64371,7 @@ Domain to not audit. - + mounton a /var/run directory. @@ -64218,7 +64381,7 @@ Domain allowed access. - + Set the attributes of the /var/run directory. @@ -64228,7 +64391,7 @@ Domain allowed access. - + Search the contents of runtime process ID directories (/var/run). @@ -64239,7 +64402,7 @@ Domain allowed access. - + Do not audit attempts to search the /var/run directory. @@ -64250,7 +64413,7 @@ Domain to not audit. - + List the contents of the runtime process ID directories (/var/run). @@ -64261,7 +64424,7 @@ Domain allowed access. - + Check write access on /var/run directories. @@ -64271,7 +64434,7 @@ Domain allowed access. - + Create a /var/run directory. @@ -64281,7 +64444,7 @@ Domain allowed access. - + Read and write a /var/run directory. @@ -64291,7 +64454,7 @@ Domain allowed access. - + Watch /var/lib directories. @@ -64301,7 +64464,7 @@ Domain allowed access. - + Watch /var/run directories. @@ -64311,7 +64474,7 @@ Domain allowed access. - + Watch /var directories. @@ -64321,7 +64484,7 @@ Domain allowed access. - + Read generic runtime files. @@ -64331,7 +64494,7 @@ Domain allowed access. - + Execute generic programs in /var/run in the caller domain. @@ -64341,7 +64504,7 @@ Domain allowed access. - + Dontaudit attempt to execute generic programs in /var/run in the caller domain. @@ -64351,7 +64514,7 @@ Domain allowed access. - + Read and write generic runtime files. @@ -64361,7 +64524,7 @@ Domain allowed access. - + Delete generic runtime symlinks. @@ -64371,7 +64534,7 @@ Domain allowed access. - + Write named generic runtime pipes. @@ -64381,7 +64544,7 @@ Domain allowed access. - + Delete all runtime dirs. @@ -64392,7 +64555,7 @@ Domain allowed access. - + Create, read, write, and delete all runtime directories. @@ -64402,7 +64565,7 @@ Domain allowed access. - + Relabel all runtime directories. @@ -64412,7 +64575,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all runtime data files. @@ -64423,7 +64586,7 @@ Domain to not audit. - + Read all runtime files. @@ -64434,7 +64597,7 @@ Domain allowed access. - + Do not audit attempts to ioctl all runtime files. @@ -64444,7 +64607,7 @@ Domain to not audit. - + Do not audit attempts to write to all runtime files. @@ -64454,7 +64617,7 @@ Domain to not audit. - + Delete all runtime files. @@ -64465,7 +64628,7 @@ Domain allowed access. - + Create, read, write and delete all var_run (pid) files @@ -64476,7 +64639,7 @@ Domain allowed access. - + Relabel all runtime files. @@ -64486,7 +64649,7 @@ Domain allowed access. - + Delete all runtime symlinks. @@ -64497,7 +64660,7 @@ Domain allowed access. - + Create, read, write and delete all var_run (pid) symbolic links. @@ -64508,7 +64671,7 @@ Domain allowed access. - + Relabel all runtime symbolic links. @@ -64518,7 +64681,7 @@ Domain allowed access. - + Create all runtime named pipes @@ -64528,7 +64691,7 @@ Domain allowed access. - + Delete all runtime named pipes @@ -64538,7 +64701,7 @@ Domain allowed access. - + Create all runtime sockets. @@ -64548,7 +64711,7 @@ Domain allowed access. - + Delete all runtime sockets. @@ -64558,7 +64721,7 @@ Domain allowed access. - + Relabel all runtime named sockets. @@ -64568,7 +64731,7 @@ Domain allowed access. - + Create an object in the /run directory, with a private type. @@ -64620,7 +64783,7 @@ The name of the object being created. - + Create a generic lock directory within the run directories. @@ -64635,7 +64798,7 @@ The name of the object being created. - + Create all spool sockets @@ -64645,7 +64808,7 @@ Domain allowed access. - + Delete all spool sockets @@ -64655,7 +64818,7 @@ Domain allowed access. - + Mount filesystems on all polyinstantiation member directories. @@ -64666,7 +64829,7 @@ Domain allowed access. - + Search the contents of generic spool directories (/var/spool). @@ -64677,7 +64840,7 @@ Domain allowed access. - + Do not audit attempts to search generic spool directories. @@ -64688,7 +64851,7 @@ Domain to not audit. - + List the contents of generic spool (/var/spool) directories. @@ -64699,7 +64862,7 @@ Domain allowed access. - + Create, read, write, and delete generic spool directories (/var/spool). @@ -64710,7 +64873,7 @@ Domain allowed access. - + Read generic spool files. @@ -64720,7 +64883,7 @@ Domain allowed access. - + Create, read, write, and delete generic spool files. @@ -64731,7 +64894,7 @@ Domain allowed access. - + Create objects in the spool directory with a private type with a type transition. @@ -64758,7 +64921,7 @@ The name of the object being created. - + Allow access to manage all polyinstantiated directories on the system. @@ -64769,7 +64932,7 @@ Domain allowed access. - + Unconfined access to files. @@ -64779,7 +64942,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -64791,7 +64954,7 @@ Domain allowed access. - + Do not audit attempts to read etc_runtime resources @@ -64801,7 +64964,7 @@ Domain allowed access. - + List usr/src files @@ -64811,7 +64974,7 @@ Domain allowed access - + Read usr/src files @@ -64821,7 +64984,7 @@ Domain allowed access - + Manage /usr/src files @@ -64831,7 +64994,7 @@ Domain allowed access - + Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -64853,7 +65016,7 @@ Optional name of the resource - + Read etc runtime resources @@ -64863,7 +65026,7 @@ Domain allowed access - + Allow relabel from and to non-security types @@ -64874,7 +65037,7 @@ Domain allowed access. - + Manage non-security-sensitive resource types @@ -64885,7 +65048,7 @@ Domain allowed access. - + Allow relabeling from and to any pidfile associated type @@ -65344,7 +65507,17 @@ Domain allowed access. - + + +Manage bpf directories. + + + +Domain allowed access. + + + + Manage bpf files. @@ -65354,7 +65527,7 @@ Domain allowed access. - + Manage bpf symlinks. @@ -65364,7 +65537,7 @@ Domain allowed access. - + Mount cgroup filesystems. @@ -65374,7 +65547,7 @@ Domain allowed access. - + Remount cgroup filesystems. @@ -65384,7 +65557,7 @@ Domain allowed access. - + Unmount cgroup filesystems. @@ -65394,7 +65567,7 @@ Domain allowed access. - + Get attributes of cgroup filesystems. @@ -65404,7 +65577,7 @@ Domain allowed access. - + Search cgroup directories. @@ -65414,7 +65587,7 @@ Domain allowed access. - + list cgroup directories. @@ -65424,7 +65597,7 @@ Domain allowed access. - + Ioctl cgroup directories. @@ -65434,7 +65607,7 @@ Domain allowed access. - + Create cgroup directories. @@ -65444,7 +65617,7 @@ Domain allowed access. - + Delete cgroup directories. @@ -65454,7 +65627,7 @@ Domain allowed access. - + Manage cgroup directories. @@ -65464,7 +65637,7 @@ Domain allowed access. - + Relabel cgroup directories. @@ -65474,7 +65647,7 @@ Domain allowed access. - + Get attributes of cgroup files. @@ -65484,7 +65657,7 @@ Domain allowed access. - + Read cgroup files. @@ -65494,7 +65667,7 @@ Domain allowed access. - + Create cgroup files. @@ -65504,7 +65677,7 @@ Domain allowed access. - + Watch cgroup files. @@ -65514,7 +65687,7 @@ Domain allowed access. - + Read cgroup symlnks. @@ -65524,7 +65697,7 @@ Domain allowed access. - + Create cgroup lnk_files. @@ -65534,7 +65707,7 @@ Domain allowed access. - + Write cgroup files. @@ -65544,7 +65717,7 @@ Domain allowed access. - + Read and write cgroup files. @@ -65554,7 +65727,7 @@ Domain allowed access. - + Do not audit attempts to open, get attributes, read and write @@ -65566,7 +65739,7 @@ Domain to not audit. - + Manage cgroup files. @@ -65576,7 +65749,7 @@ Domain allowed access. - + Relabel cgroup symbolic links. @@ -65586,7 +65759,7 @@ Domain allowed access. - + Watch cgroup directories. @@ -65596,7 +65769,7 @@ Domain allowed access. - + Mount on cgroup directories. @@ -65606,7 +65779,7 @@ Domain allowed access. - + Mount on cgroup files. @@ -65616,7 +65789,7 @@ Domain allowed access. - + Create an object in a cgroup tmpfs filesystem, with a private type using a type transition. @@ -65642,7 +65815,7 @@ The name of the object being created. - + Create an object in a cgroup tmpfs filesystem, with the memory_pressure_t type using a type transition. @@ -65663,7 +65836,7 @@ The name of the object being created. - + Get the attributes of cgroup's memory.pressure files. @@ -65673,7 +65846,7 @@ Domain allowed access. - + Allow managing a cgroup's memory.pressure file to get notifications @@ -65683,7 +65856,7 @@ Source domain - + Do not audit attempts to read dirs on a CIFS or SMB filesystem. @@ -65694,7 +65867,7 @@ Domain to not audit. - + Mount a CIFS or SMB network filesystem. @@ -65704,7 +65877,7 @@ Domain allowed access. - + Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. @@ -65715,7 +65888,7 @@ Domain allowed access. - + Unmount a CIFS or SMB network filesystem. @@ -65725,7 +65898,7 @@ Domain allowed access. - + Get the attributes of a CIFS or SMB network filesystem. @@ -65737,7 +65910,7 @@ Domain allowed access. - + Search directories on a CIFS or SMB filesystem. @@ -65747,7 +65920,7 @@ Domain allowed access. - + List the contents of directories on a CIFS or SMB filesystem. @@ -65758,7 +65931,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. @@ -65769,7 +65942,7 @@ Domain to not audit. - + Mounton a CIFS filesystem. @@ -65779,7 +65952,7 @@ Domain allowed access. - + Read files on a CIFS or SMB filesystem. @@ -65790,7 +65963,7 @@ Domain allowed access. - + Read all inherited filesystem image files. @@ -65801,7 +65974,7 @@ Domain allowed access. - + Read all filesystem image files. @@ -65812,7 +65985,7 @@ Domain allowed access. - + Mmap-read all filesystem image files. @@ -65823,7 +65996,7 @@ Domain allowed access. - + Read and write all filesystem image files. @@ -65834,7 +66007,7 @@ Domain allowed access. - + Mmap-Read-write all filesystem image files. @@ -65845,7 +66018,7 @@ Domain allowed access. - + Do not audit attempts to write all filesystem image files. @@ -65856,7 +66029,7 @@ Domain allowed access. - + Get the attributes of filesystems that do not have extended attribute support. @@ -65868,7 +66041,7 @@ Domain allowed access. - + Read all noxattrfs directories. @@ -65878,7 +66051,7 @@ Domain allowed access. - + Do not audit attempts to list all noxattrfs directories. @@ -65889,7 +66062,7 @@ Domain to not audit. - + Create, read, write, and delete all noxattrfs directories. @@ -65899,7 +66072,7 @@ Domain allowed access. - + Read all noxattrfs files. @@ -65909,7 +66082,7 @@ Domain allowed access. - + Do not audit attempts to read all noxattrfs files. @@ -65920,7 +66093,7 @@ Domain to not audit. - + Dont audit attempts to write to noxattrfs files. @@ -65930,7 +66103,7 @@ Domain to not audit. - + Create, read, write, and delete all noxattrfs files. @@ -65940,7 +66113,7 @@ Domain allowed access. - + Read all noxattrfs symbolic links. @@ -65950,7 +66123,7 @@ Domain allowed access. - + Manage all noxattrfs symbolic links. @@ -65960,7 +66133,7 @@ Domain allowed access. - + Relabel all objects from filesystems that do not support extended attributes. @@ -65971,7 +66144,7 @@ Domain allowed access. - + Do not audit attempts to read files on a CIFS or SMB filesystem. @@ -65982,7 +66155,7 @@ Domain to not audit. - + Append files on a CIFS filesystem. @@ -65994,7 +66167,7 @@ Domain allowed access. - + dontaudit Append files on a CIFS filesystem. @@ -66006,7 +66179,7 @@ Domain to not audit. - + Do not audit attempts to read or write files on a CIFS or SMB filesystem. @@ -66017,7 +66190,7 @@ Domain to not audit. - + Read symbolic links on a CIFS or SMB filesystem. @@ -66027,7 +66200,7 @@ Domain allowed access. - + Read named pipes on a CIFS or SMB network filesystem. @@ -66038,7 +66211,7 @@ Domain allowed access. - + Read named sockets on a CIFS or SMB network filesystem. @@ -66049,7 +66222,7 @@ Domain allowed access. - + Execute files on a CIFS or SMB network filesystem, in the caller @@ -66062,7 +66235,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a CIFS or SMB network filesystem. @@ -66074,7 +66247,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -66086,7 +66259,7 @@ Domain to not audit. - + Create, read, write, and delete files on a CIFS or SMB network filesystem. @@ -66098,7 +66271,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -66110,7 +66283,7 @@ Domain to not audit. - + Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. @@ -66121,7 +66294,7 @@ Domain allowed access. - + Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. @@ -66132,7 +66305,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. @@ -66143,7 +66316,7 @@ Domain allowed access. - + Execute a file on a CIFS or SMB filesystem in the specified domain. @@ -66178,7 +66351,7 @@ The type of the new process. - + Create, read, write, and delete dirs on a configfs filesystem. @@ -66189,7 +66362,7 @@ Domain allowed access. - + Create, read, write, and delete files on a configfs filesystem. @@ -66200,7 +66373,7 @@ Domain allowed access. - + Mount a DOS filesystem, such as FAT32 or NTFS. @@ -66211,7 +66384,7 @@ Domain allowed access. - + Remount a DOS filesystem, such as FAT32 or NTFS. This allows @@ -66223,7 +66396,7 @@ Domain allowed access. - + Unmount a DOS filesystem, such as FAT32 or NTFS. @@ -66234,7 +66407,7 @@ Domain allowed access. - + Get the attributes of a DOS filesystem, such as FAT32 or NTFS. @@ -66246,7 +66419,7 @@ Domain allowed access. - + Allow changing of the label of a DOS filesystem using the context= mount option. @@ -66257,7 +66430,7 @@ Domain allowed access. - + Get attributes of directories on a dosfs filesystem. @@ -66267,7 +66440,7 @@ Domain allowed access. - + Search dosfs filesystem. @@ -66277,7 +66450,7 @@ Domain allowed access. - + List dirs DOS filesystem. @@ -66287,7 +66460,7 @@ Domain allowed access. - + Create, read, write, and delete dirs on a DOS filesystem. @@ -66298,7 +66471,7 @@ Domain allowed access. - + Read files on a DOS filesystem. @@ -66308,7 +66481,7 @@ Domain allowed access. - + Read and map files on a DOS filesystem. @@ -66318,7 +66491,7 @@ Domain allowed access. - + Create, read, write, and delete files on a DOS filesystem. @@ -66329,7 +66502,7 @@ Domain allowed access. - + Read symbolic links on an eCryptfs filesystem. @@ -66339,7 +66512,7 @@ Domain allowed access. - + Create, read, write, and delete directories on an eCryptfs filesystem. @@ -66351,7 +66524,7 @@ Domain allowed access. - + Create, read, write, and delete files on an eCryptfs filesystem. @@ -66363,7 +66536,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on an eCryptfs filesystem. @@ -66374,7 +66547,7 @@ Domain allowed access. - + Get the attributes of efivarfs filesystems. @@ -66384,7 +66557,7 @@ Domain allowed access. - + List dirs in efivarfs filesystem. @@ -66394,7 +66567,7 @@ Domain allowed access. - + Read files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -66406,7 +66579,7 @@ Domain allowed access. - + Set the attributes of files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -66418,7 +66591,7 @@ Domain allowed access. - + Create, read, write, and delete files on a efivarfs filesystem. @@ -66430,7 +66603,7 @@ Domain allowed access. - + stat a FUSE filesystem @@ -66440,7 +66613,7 @@ Domain allowed access. - + Mount a FUSE filesystem. @@ -66450,7 +66623,7 @@ Domain allowed access. - + Unmount a FUSE filesystem. @@ -66460,7 +66633,7 @@ Domain allowed access. - + Remount a FUSE filesystem. @@ -66470,7 +66643,7 @@ Domain allowed access. - + Mounton a FUSEFS filesystem. @@ -66480,7 +66653,7 @@ Domain allowed access. - + Mount on files on a FUSEFS filesystem. @@ -66490,7 +66663,7 @@ Domain allowed access. - + Make FUSEFS files an entrypoint for the specified domain. @@ -66501,7 +66674,7 @@ The domain for which fusefs_t is an entrypoint. - + Execute FUSEFS files in a specified domain. @@ -66526,7 +66699,7 @@ Domain to transition to. - + Search directories on a FUSEFS filesystem. @@ -66538,7 +66711,7 @@ Domain allowed access. - + List the contents of directories on a FUSEFS filesystem. @@ -66550,7 +66723,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of directories on a FUSEFS filesystem. @@ -66561,7 +66734,7 @@ Domain to not audit. - + Set the attributes of directories on a FUSEFS filesystem. @@ -66573,7 +66746,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a FUSEFS filesystem. @@ -66585,7 +66758,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -66597,7 +66770,7 @@ Domain to not audit. - + Watch directories on a FUSEFS filesystem. @@ -66607,7 +66780,7 @@ Domain allowed access. - + Get the attributes of files on a FUSEFS filesystem. @@ -66619,7 +66792,7 @@ Domain allowed access. - + Read, a FUSEFS filesystem. @@ -66630,7 +66803,7 @@ Domain allowed access. - + Execute files on a FUSEFS filesystem. @@ -66641,7 +66814,7 @@ Domain allowed access. - + Set the attributes of files on a FUSEFS filesystem. @@ -66653,7 +66826,7 @@ Domain allowed access. - + Create, read, write, and delete files on a FUSEFS filesystem. @@ -66665,7 +66838,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -66677,7 +66850,7 @@ Domain to not audit. - + Watch files on a FUSEFS filesystem. @@ -66687,7 +66860,7 @@ Domain allowed access. - + Get the attributes of symlinks on a FUSEFS filesystem. @@ -66699,7 +66872,7 @@ Domain allowed access. - + Read symbolic links on a FUSEFS filesystem. @@ -66709,7 +66882,7 @@ Domain allowed access. - + Set the attributes of symlinks on a FUSEFS filesystem. @@ -66721,7 +66894,7 @@ Domain allowed access. - + Manage symlinks on a FUSEFS filesystem. @@ -66732,7 +66905,7 @@ Domain allowed access. - + Get the attributes of named pipes on a FUSEFS filesystem. @@ -66744,7 +66917,7 @@ Domain allowed access. - + Set the attributes of named pipes on a FUSEFS filesystem. @@ -66756,7 +66929,7 @@ Domain allowed access. - + Manage named pipes on a FUSEFS filesystem. @@ -66768,7 +66941,7 @@ Domain allowed access. - + Get the attributes of named sockets on a FUSEFS filesystem. @@ -66780,7 +66953,7 @@ Domain allowed access. - + Set the attributes of named sockets on a FUSEFS filesystem. @@ -66792,7 +66965,7 @@ Domain allowed access. - + Manage named sockets on a FUSEFS filesystem. @@ -66804,7 +66977,7 @@ Domain allowed access. - + Get the attributes of character files on a FUSEFS filesystem. @@ -66816,7 +66989,7 @@ Domain allowed access. - + Set the attributes of character files on a FUSEFS filesystem. @@ -66828,7 +67001,7 @@ Domain allowed access. - + Manage character files on a FUSEFS filesystem. @@ -66840,7 +67013,7 @@ Domain allowed access. - + Create block files on a FUSEFS filesystem. @@ -66852,7 +67025,7 @@ Domain allowed access. - + Set the attributes of block files on a FUSEFS filesystem. @@ -66864,7 +67037,7 @@ Domain allowed access. - + Get the attributes of an hugetlbfs filesystem. @@ -66875,7 +67048,7 @@ Domain allowed access. - + List hugetlbfs. @@ -66885,7 +67058,7 @@ Domain allowed access. - + Manage hugetlbfs dirs. @@ -66895,7 +67068,7 @@ Domain allowed access. - + Read and write inherited hugetlbfs files. @@ -66905,7 +67078,7 @@ Domain allowed access. - + Read and write hugetlbfs files. @@ -66915,7 +67088,7 @@ Domain allowed access. - + Read, map and write hugetlbfs files. @@ -66925,7 +67098,7 @@ Domain allowed access. - + Allow the type to associate to hugetlbfs filesystems. @@ -66935,7 +67108,7 @@ The type of the object to be associated. - + Search inotifyfs filesystem. @@ -66945,7 +67118,7 @@ Domain allowed access. - + List inotifyfs filesystem. @@ -66955,7 +67128,7 @@ Domain allowed access. - + Dontaudit List inotifyfs filesystem. @@ -66965,7 +67138,7 @@ Domain to not audit. - + Create an object in a hugetlbfs filesystem, with a private type using a type transition. @@ -66991,7 +67164,7 @@ The name of the object being created. - + Mount an iso9660 filesystem, which is usually used on CDs. @@ -67002,7 +67175,7 @@ Domain allowed access. - + Remount an iso9660 filesystem, which is usually used on CDs. This allows @@ -67014,7 +67187,7 @@ Domain allowed access. - + Allow changing of the label of a filesystem with iso9660 type @@ -67025,7 +67198,7 @@ Domain allowed access. - + Unmount an iso9660 filesystem, which is usually used on CDs. @@ -67036,7 +67209,7 @@ Domain allowed access. - + Get the attributes of an iso9660 filesystem, which is usually used on CDs. @@ -67048,7 +67221,7 @@ Domain allowed access. - + Get the attributes of files on an iso9660 filesystem, which is usually used on CDs. @@ -67059,7 +67232,7 @@ Domain allowed access. - + Read files on an iso9660 filesystem, which is usually used on CDs. @@ -67070,7 +67243,7 @@ Domain allowed access. - + Mount a NFS filesystem. @@ -67080,7 +67253,7 @@ Domain allowed access. - + Remount a NFS filesystem. This allows some mount options to be changed. @@ -67091,7 +67264,7 @@ Domain allowed access. - + Unmount a NFS filesystem. @@ -67101,7 +67274,7 @@ Domain allowed access. - + Get the attributes of a NFS filesystem. @@ -67112,7 +67285,7 @@ Domain allowed access. - + Search directories on a NFS filesystem. @@ -67122,7 +67295,7 @@ Domain allowed access. - + List NFS filesystem. @@ -67132,7 +67305,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of directories on a NFS filesystem. @@ -67143,7 +67316,7 @@ Domain to not audit. - + Add a watch on directories on an NFS filesystem. @@ -67154,7 +67327,7 @@ Domain allowed access. - + Mounton a NFS filesystem. @@ -67164,7 +67337,7 @@ Domain allowed access. - + Read files on a NFS filesystem. @@ -67175,7 +67348,7 @@ Domain allowed access. - + Do not audit attempts to read files on a NFS filesystem. @@ -67186,7 +67359,7 @@ Domain to not audit. - + Read files on a NFS filesystem. @@ -67196,7 +67369,7 @@ Domain allowed access. - + Execute files on a NFS filesystem. @@ -67207,7 +67380,7 @@ Domain allowed access. - + Append files on a NFS filesystem. @@ -67219,7 +67392,7 @@ Domain allowed access. - + dontaudit Append files on a NFS filesystem. @@ -67231,7 +67404,7 @@ Domain to not audit. - + Do not audit attempts to read or write files on a NFS filesystem. @@ -67242,7 +67415,7 @@ Domain to not audit. - + Add a watch on files on an NFS filesystem. @@ -67252,7 +67425,7 @@ Domain allowed access. - + Read symbolic links on a NFS filesystem. @@ -67262,7 +67435,7 @@ Domain allowed access. - + Dontaudit read symbolic links on a NFS filesystem. @@ -67272,7 +67445,7 @@ Domain to not audit. - + Read named sockets on a NFS filesystem. @@ -67282,7 +67455,7 @@ Domain allowed access. - + Read named pipes on a NFS network filesystem. @@ -67293,7 +67466,7 @@ Domain allowed access. - + Get the attributes of directories of RPC file system pipes. @@ -67304,7 +67477,7 @@ Domain allowed access. - + Search directories of RPC file system pipes. @@ -67314,7 +67487,7 @@ Domain allowed access. - + Search removable storage directories. @@ -67324,7 +67497,7 @@ Domain allowed access. - + Do not audit attempts to list removable storage directories. @@ -67334,7 +67507,7 @@ Domain not to audit. - + Read removable storage files. @@ -67344,7 +67517,7 @@ Domain allowed access. - + Do not audit attempts to read removable storage files. @@ -67354,7 +67527,7 @@ Domain not to audit. - + Do not audit attempts to write removable storage files. @@ -67364,7 +67537,7 @@ Domain not to audit. - + Read removable storage symbolic links. @@ -67374,7 +67547,7 @@ Domain allowed access. - + Read block nodes on removable filesystems. @@ -67384,7 +67557,7 @@ Domain allowed access. - + Read and write block nodes on removable filesystems. @@ -67394,7 +67567,7 @@ Domain allowed access. - + Read directories of RPC file system pipes. @@ -67404,7 +67577,7 @@ Domain allowed access. - + Read files of RPC file system pipes. @@ -67414,7 +67587,7 @@ Domain allowed access. - + Read symbolic links of RPC file system pipes. @@ -67424,7 +67597,7 @@ Domain allowed access. - + Read sockets of RPC file system pipes. @@ -67434,7 +67607,7 @@ Domain allowed access. - + Read and write sockets of RPC file system pipes. @@ -67444,7 +67617,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a NFS filesystem. @@ -67456,7 +67629,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -67468,7 +67641,7 @@ Domain to not audit. - + Create, read, write, and delete files on a NFS filesystem. @@ -67480,7 +67653,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -67492,7 +67665,7 @@ Domain to not audit. - + Create, read, write, and delete symbolic links on a NFS network filesystem. @@ -67504,7 +67677,7 @@ Domain allowed access. - + Create, read, write, and delete named pipes on a NFS filesystem. @@ -67515,7 +67688,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on a NFS filesystem. @@ -67526,7 +67699,7 @@ Domain allowed access. - + Execute a file on a NFS filesystem in the specified domain. @@ -67561,7 +67734,7 @@ The type of the new process. - + Mount a NFS server pseudo filesystem. @@ -67571,7 +67744,7 @@ Domain allowed access. - + Mount a NFS server pseudo filesystem. This allows some mount options to be changed. @@ -67582,7 +67755,7 @@ Domain allowed access. - + Unmount a NFS server pseudo filesystem. @@ -67592,7 +67765,7 @@ Domain allowed access. - + Get the attributes of a NFS server pseudo filesystem. @@ -67603,7 +67776,7 @@ Domain allowed access. - + Search NFS server directories. @@ -67613,7 +67786,7 @@ Domain allowed access. - + List NFS server directories. @@ -67623,7 +67796,7 @@ Domain allowed access. - + Watch NFS server directories. @@ -67633,7 +67806,7 @@ Domain allowed access. - + Getattr files on an nfsd filesystem @@ -67643,7 +67816,7 @@ Domain allowed access. - + Read and write NFS server files. @@ -67653,7 +67826,7 @@ Domain allowed access. - + Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts) @@ -67663,7 +67836,7 @@ Domain allowed access. - + Read nsfs inodes (e.g. /proc/pid/ns/uts) @@ -67673,7 +67846,7 @@ Domain allowed access. - + Watch NFS server files. @@ -67683,7 +67856,7 @@ Domain allowed access. - + Get the attributes of an nsfs filesystem. @@ -67693,7 +67866,7 @@ Domain allowed access. - + Unmount an nsfs filesystem. @@ -67703,7 +67876,7 @@ Domain allowed access. - + Get the attributes of a pstore filesystem. @@ -67713,7 +67886,7 @@ Domain allowed access. - + Get the attributes of directories of a pstore filesystem. @@ -67724,7 +67897,7 @@ Domain allowed access. - + Create pstore directories. @@ -67734,7 +67907,7 @@ Domain allowed access. - + Relabel to/from pstore_t directories. @@ -67744,7 +67917,7 @@ Domain allowed access. - + List the directories of a pstore filesystem. @@ -67755,7 +67928,7 @@ Domain allowed access. - + Read pstore_t files @@ -67765,7 +67938,7 @@ Domain allowed access. - + Delete the files of a pstore filesystem. @@ -67776,7 +67949,7 @@ Domain allowed access. - + Allow the type to associate to ramfs filesystems. @@ -67786,7 +67959,7 @@ The type of the object to be associated. - + Mount a RAM filesystem. @@ -67796,7 +67969,7 @@ Domain allowed access. - + Remount a RAM filesystem. This allows some mount options to be changed. @@ -67807,7 +67980,7 @@ Domain allowed access. - + Unmount a RAM filesystem. @@ -67817,7 +67990,7 @@ Domain allowed access. - + Get the attributes of a RAM filesystem. @@ -67827,7 +68000,7 @@ Domain allowed access. - + Search directories on a ramfs @@ -67837,7 +68010,7 @@ Domain allowed access. - + Dontaudit Search directories on a ramfs @@ -67847,7 +68020,7 @@ Domain to not audit. - + Set the attributes of directories on a ramfs. @@ -67858,7 +68031,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a ramfs. @@ -67869,7 +68042,7 @@ Domain allowed access. - + Dontaudit read on a ramfs files. @@ -67879,7 +68052,7 @@ Domain to not audit. - + Dontaudit read on a ramfs fifo_files. @@ -67889,7 +68062,7 @@ Domain to not audit. - + Create, read, write, and delete files on a ramfs filesystem. @@ -67900,7 +68073,7 @@ Domain allowed access. - + Write to named pipe on a ramfs filesystem. @@ -67910,7 +68083,7 @@ Domain allowed access. - + Do not audit attempts to write to named pipes on a ramfs filesystem. @@ -67921,7 +68094,7 @@ Domain to not audit. - + Read and write a named pipe on a ramfs filesystem. @@ -67931,7 +68104,7 @@ Domain allowed access. - + Create, read, write, and delete named pipes on a ramfs filesystem. @@ -67942,7 +68115,7 @@ Domain allowed access. - + Write to named socket on a ramfs filesystem. @@ -67952,7 +68125,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on a ramfs filesystem. @@ -67963,7 +68136,7 @@ Domain allowed access. - + Mount a ROM filesystem. @@ -67973,7 +68146,7 @@ Domain allowed access. - + Remount a ROM filesystem. This allows some mount options to be changed. @@ -67984,7 +68157,7 @@ Domain allowed access. - + Unmount a ROM filesystem. @@ -67994,7 +68167,7 @@ Domain allowed access. - + Get the attributes of a ROM filesystem. @@ -68005,7 +68178,7 @@ Domain allowed access. - + Mount a RPC pipe filesystem. @@ -68015,7 +68188,7 @@ Domain allowed access. - + Remount a RPC pipe filesystem. This allows some mount option to be changed. @@ -68026,7 +68199,7 @@ Domain allowed access. - + Unmount a RPC pipe filesystem. @@ -68036,7 +68209,7 @@ Domain allowed access. - + Get the attributes of a RPC pipe filesystem. @@ -68047,7 +68220,7 @@ Domain allowed access. - + Read and write RPC pipe filesystem named pipes. @@ -68057,7 +68230,7 @@ Domain allowed access. - + Watch RPC pipe filesystem directories. @@ -68067,7 +68240,7 @@ Domain allowed access. - + Mount a tmpfs filesystem. @@ -68077,7 +68250,7 @@ Domain allowed access. - + Remount a tmpfs filesystem. @@ -68087,7 +68260,7 @@ Domain allowed access. - + Unmount a tmpfs filesystem. @@ -68097,7 +68270,7 @@ Domain allowed access. - + Do not audit getting the attributes of a tmpfs filesystem @@ -68107,7 +68280,7 @@ Domain to not audit - + Get the attributes of a tmpfs filesystem. @@ -68119,7 +68292,7 @@ Domain allowed access. - + Allow the type to associate to tmpfs filesystems. @@ -68129,7 +68302,7 @@ The type of the object to be associated. - + Relabel from tmpfs filesystem. @@ -68139,7 +68312,7 @@ Domain allowed access. - + Get the attributes of tmpfs directories. @@ -68149,7 +68322,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of tmpfs directories. @@ -68160,7 +68333,7 @@ Domain to not audit. - + Mount on tmpfs directories. @@ -68170,7 +68343,7 @@ Domain allowed access. - + Mount on tmpfs files. @@ -68180,7 +68353,7 @@ Domain allowed access. - + Set the attributes of tmpfs directories. @@ -68190,7 +68363,7 @@ Domain allowed access. - + Search tmpfs directories. @@ -68200,7 +68373,7 @@ Domain allowed access. - + List the contents of generic tmpfs directories. @@ -68210,7 +68383,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of generic tmpfs directories. @@ -68221,7 +68394,7 @@ Domain to not audit. - + Create, read, write, and delete tmpfs directories @@ -68232,7 +68405,7 @@ Domain allowed access. - + Do not audit attempts to write tmpfs directories @@ -68243,7 +68416,7 @@ Domain to not audit. - + Relabel from tmpfs_t dir @@ -68253,7 +68426,7 @@ Domain allowed access. - + Relabel directory on tmpfs filesystems. @@ -68263,7 +68436,7 @@ Domain allowed access. - + Watch directories on tmpfs filesystems. @@ -68273,7 +68446,7 @@ Domain allowed access. - + Create an object in a tmpfs filesystem, with a private type using a type transition. @@ -68299,7 +68472,7 @@ The name of the object being created. - + Do not audit attempts to getattr generic tmpfs files. @@ -68310,7 +68483,7 @@ Domain to not audit. - + Do not audit attempts to read or write generic tmpfs files. @@ -68321,7 +68494,7 @@ Domain to not audit. - + Delete tmpfs symbolic links. @@ -68331,7 +68504,7 @@ Domain allowed access. - + Create, read, write, and delete auto moutpoints. @@ -68342,7 +68515,7 @@ Domain allowed access. - + Read generic tmpfs files. @@ -68352,7 +68525,7 @@ Domain allowed access. - + Read and write generic tmpfs files. @@ -68362,7 +68535,7 @@ Domain allowed access. - + Relabel files on tmpfs filesystems. @@ -68372,7 +68545,7 @@ Domain allowed access. - + Read tmpfs link files. @@ -68382,7 +68555,7 @@ Domain allowed access. - + Relabelfrom socket files on tmpfs filesystems. @@ -68392,7 +68565,7 @@ Domain allowed access. - + Relabelfrom tmpfs link files. @@ -68402,7 +68575,7 @@ Domain allowed access. - + Read and write character nodes on tmpfs filesystems. @@ -68412,7 +68585,7 @@ Domain allowed access. - + dontaudit Read and write character nodes on tmpfs filesystems. @@ -68422,7 +68595,7 @@ Domain to not audit. - + Relabel character nodes on tmpfs filesystems. @@ -68432,7 +68605,7 @@ Domain allowed access. - + Read and write block nodes on tmpfs filesystems. @@ -68442,7 +68615,7 @@ Domain allowed access. - + Relabel block nodes on tmpfs filesystems. @@ -68452,7 +68625,7 @@ Domain allowed access. - + Relabel named pipes on tmpfs filesystems. @@ -68462,7 +68635,7 @@ Domain allowed access. - + Read and write, create and delete generic files on tmpfs filesystems. @@ -68473,7 +68646,7 @@ Domain allowed access. - + Read and write, create and delete symbolic links on tmpfs filesystems. @@ -68484,7 +68657,7 @@ Domain allowed access. - + Read and write, create and delete socket files on tmpfs filesystems. @@ -68495,7 +68668,7 @@ Domain allowed access. - + Read and write, create and delete character nodes on tmpfs filesystems. @@ -68506,7 +68679,7 @@ Domain allowed access. - + Read and write, create and delete block nodes on tmpfs filesystems. @@ -68517,7 +68690,7 @@ Domain allowed access. - + Get the attributes of a trace filesystem. @@ -68527,7 +68700,7 @@ Domain allowed access. - + Get attributes of dirs on tracefs filesystem. @@ -68537,7 +68710,7 @@ Domain allowed access. - + search directories on a tracefs filesystem @@ -68547,7 +68720,7 @@ Domain allowed access. - + Get the attributes of files on a trace filesystem. @@ -68558,7 +68731,7 @@ Domain allowed access. - + Read/write trace filesystem files @@ -68568,7 +68741,7 @@ Domain allowed access. - + create trace filesystem directories @@ -68578,7 +68751,7 @@ Domain allowed access. - + Mount a XENFS filesystem. @@ -68588,7 +68761,7 @@ Domain allowed access. - + Search the XENFS filesystem. @@ -68598,7 +68771,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a XENFS filesystem. @@ -68610,7 +68783,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -68622,7 +68795,7 @@ Domain to not audit. - + Create, read, write, and delete files on a XENFS filesystem. @@ -68634,7 +68807,7 @@ Domain allowed access. - + Map files a XENFS filesystem. @@ -68644,7 +68817,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -68656,7 +68829,7 @@ Domain to not audit. - + Mount all filesystems. @@ -68666,7 +68839,7 @@ Domain allowed access. - + Remount all filesystems. This allows some mount options to be changed. @@ -68677,7 +68850,7 @@ Domain allowed access. - + Unmount all filesystems. @@ -68687,7 +68860,7 @@ Domain allowed access. - + Get the attributes of all filesystems. @@ -68711,7 +68884,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes all filesystems. @@ -68722,7 +68895,7 @@ Domain to not audit. - + Get the quotas of all filesystems. @@ -68733,7 +68906,7 @@ Domain allowed access. - + Set the quotas of all filesystems. @@ -68744,7 +68917,7 @@ Domain allowed access. - + Relabelfrom all filesystems. @@ -68754,7 +68927,18 @@ Domain allowed access. - + + +Watch all filesystems. + + + +Domain allowed access. + + + + + Get the attributes of all directories with a filesystem type. @@ -68765,7 +68949,7 @@ Domain allowed access. - + Search all directories with a filesystem type. @@ -68775,7 +68959,7 @@ Domain allowed access. - + List all directories with a filesystem type. @@ -68785,7 +68969,7 @@ Domain allowed access. - + Get the attributes of all files with a filesystem type. @@ -68796,7 +68980,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all files with a filesystem type. @@ -68807,7 +68991,7 @@ Domain to not audit. - + Get the attributes of all symbolic links with a filesystem type. @@ -68818,7 +69002,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all symbolic links with a filesystem type. @@ -68829,7 +69013,7 @@ Domain to not audit. - + Get the attributes of all named pipes with a filesystem type. @@ -68840,7 +69024,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all named pipes with a filesystem type. @@ -68851,7 +69035,7 @@ Domain to not audit. - + Get the attributes of all named sockets with a filesystem type. @@ -68862,7 +69046,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all named sockets with a filesystem type. @@ -68873,7 +69057,7 @@ Domain to not audit. - + Get the attributes of all block device nodes with a filesystem type. @@ -68884,7 +69068,7 @@ Domain allowed access. - + Get the attributes of all character device nodes with a filesystem type. @@ -68895,7 +69079,7 @@ Domain allowed access. - + Unconfined access to filesystems @@ -70521,7 +70705,17 @@ Domain allowed access. - + + +Create unlabeled directories. + + + +Domain allowed access. + + + + Delete unlabeled directories. @@ -70531,7 +70725,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled directories. @@ -70541,7 +70735,7 @@ Domain allowed access. - + Mount a filesystem on an unlabeled directory. @@ -70551,7 +70745,7 @@ Domain allowed access. - + Read unlabeled files. @@ -70561,7 +70755,7 @@ Domain allowed access. - + Read and write unlabeled files. @@ -70571,7 +70765,7 @@ Domain allowed access. - + Delete unlabeled files. @@ -70581,7 +70775,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled files. @@ -70591,7 +70785,7 @@ Domain allowed access. - + Do not audit attempts by caller to get the attributes of an unlabeled file. @@ -70602,7 +70796,7 @@ Domain to not audit. - + Do not audit attempts by caller to read an unlabeled file. @@ -70613,7 +70807,7 @@ Domain to not audit. - + Create an object in unlabeled directories with a private type. @@ -70639,7 +70833,7 @@ The name of the object being created. - + Delete unlabeled symbolic links. @@ -70649,7 +70843,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled symbolic links. @@ -70659,7 +70853,7 @@ Domain allowed access. - + Do not audit attempts by caller to get the attributes of unlabeled symbolic links. @@ -70670,7 +70864,7 @@ Domain to not audit. - + Do not audit attempts by caller to get the attributes of unlabeled named pipes. @@ -70681,7 +70875,7 @@ Domain to not audit. - + Do not audit attempts by caller to get the attributes of unlabeled named sockets. @@ -70692,7 +70886,7 @@ Domain to not audit. - + Do not audit attempts by caller to get attributes for unlabeled block devices. @@ -70703,7 +70897,7 @@ Domain to not audit. - + Read and write unlabeled block device nodes. @@ -70713,7 +70907,7 @@ Domain allowed access. - + Delete unlabeled block device nodes. @@ -70723,7 +70917,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled block device nodes. @@ -70733,7 +70927,7 @@ Domain allowed access. - + Do not audit attempts by caller to get attributes for unlabeled character devices. @@ -70744,7 +70938,7 @@ Domain to not audit. - + Do not audit attempts to write unlabeled character devices. @@ -70755,7 +70949,7 @@ Domain to not audit. - + Delete unlabeled character device nodes. @@ -70765,7 +70959,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled character device nodes. @@ -70775,7 +70969,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled directories. @@ -70785,7 +70979,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled files. @@ -70795,7 +70989,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled symbolic links. @@ -70805,7 +70999,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled named pipes. @@ -70815,7 +71009,7 @@ Domain allowed access. - + Delete unlabeled named pipes @@ -70825,7 +71019,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled named sockets. @@ -70835,7 +71029,7 @@ Domain allowed access. - + Delete unlabeled named sockets. @@ -70845,7 +71039,7 @@ Domain allowed access. - + Allow caller to relabel from unlabeled block devices. @@ -70855,7 +71049,7 @@ Domain allowed access. - + Allow caller to relabel from unlabeled character devices. @@ -70865,7 +71059,7 @@ Domain allowed access. - + Allow caller set the attributes on all unlabeled directory and file objects. @@ -70876,7 +71070,7 @@ Domain allowed access. - + Send and receive messages from an unlabeled IPSEC association. @@ -70901,7 +71095,7 @@ Domain allowed access. - + Do not audit attempts to send and receive messages from an unlabeled IPSEC association. @@ -70926,7 +71120,7 @@ Domain to not audit. - + Receive TCP packets from an unlabeled connection. @@ -70945,7 +71139,7 @@ Domain allowed access. - + Do not audit attempts to receive TCP packets from an unlabeled connection. @@ -70966,7 +71160,7 @@ Domain to not audit. - + Receive UDP packets from an unlabeled connection. @@ -70985,7 +71179,7 @@ Domain allowed access. - + Do not audit attempts to receive UDP packets from an unlabeled connection. @@ -71006,7 +71200,7 @@ Domain to not audit. - + Receive Raw IP packets from an unlabeled connection. @@ -71025,7 +71219,7 @@ Domain allowed access. - + Do not audit attempts to receive Raw IP packets from an unlabeled connection. @@ -71046,7 +71240,7 @@ Domain to not audit. - + Send and receive unlabeled packets. @@ -71068,7 +71262,7 @@ Domain allowed access. - + Receive packets from an unlabeled peer. @@ -71088,7 +71282,7 @@ Domain allowed access. - + Do not audit attempts to receive packets from an unlabeled peer. @@ -71108,7 +71302,7 @@ Domain to not audit. - + Relabel from unlabeled database objects. @@ -71118,7 +71312,7 @@ Domain allowed access. - + Unconfined access to kernel module resources. @@ -71128,7 +71322,7 @@ Domain allowed access. - + Read virtual memory overcommit sysctl. @@ -71139,7 +71333,7 @@ Domain allowed access. - + Read and write virtual memory overcommit sysctl. @@ -71150,7 +71344,7 @@ Domain allowed access. - + Access unlabeled infiniband pkeys. @@ -71160,7 +71354,7 @@ Domain allowed access. - + Manage subnet on unlabeled Infiniband endports. @@ -72294,7 +72488,7 @@ enforcing mode. Set this to true and you have to reboot to set it back.

-Boolean to determine whether the system permits setting Booelan values. +Boolean to determine whether the system permits setting Boolean values.

@@ -76751,7 +76945,19 @@ Domain allowed access.
- + + +Connect to bluetooth over a unix domain +stream socket. The socket can be used +for read and write. + + + +Domain allowed access. + + + + Execute bluetooth in the bluetooth domain. @@ -76761,7 +76967,7 @@ Domain allowed to transition. - + Read bluetooth configuration files. @@ -76771,7 +76977,7 @@ Domain allowed access. - + Send and receive messages from bluetooth over dbus. @@ -76782,7 +76988,7 @@ Domain allowed access. - + Do not audit attempts to read bluetooth process state files. @@ -76793,7 +76999,19 @@ Domain to not audit. - + + +Connect to bluetooth over a unix domain +stream socket. The socket can be used +for read and write. This is required for + + + +Domain allowed access. + + + + All of the rules required to administrate an bluetooth environment. @@ -78472,7 +78690,18 @@ Domain allowed access. - + + +Allow the specified domain to read +container engine temporary files. + + + +Domain allowed access. + + + + Allow the specified domain to manage container engine temporary files. @@ -78483,7 +78712,7 @@ Domain allowed access. - + Allow the specified domain to manage container engine temporary named sockets. @@ -78494,7 +78723,7 @@ Domain allowed access. - + Allow the specified domain to create objects in generic temporary directories @@ -78517,7 +78746,7 @@ The name of the object being created. - + Read the process state (/proc/pid) of all containers. @@ -78528,7 +78757,7 @@ Domain allowed access. - + Read the process state (/proc/pid) of all system containers. @@ -78539,7 +78768,7 @@ Domain allowed access. - + Read the process state (/proc/pid) of all user containers. @@ -78550,7 +78779,7 @@ Domain allowed access. - + Read the process state (/proc/pid) of all container engines. @@ -78561,7 +78790,7 @@ Domain allowed access. - + All of the permissions necessary for a container engine to manage @@ -78573,7 +78802,7 @@ Domain allowed access. - + Allow the specified domain to perform a type transition to @@ -78585,7 +78814,7 @@ Domain allowed to transition. - + Execute FUSEFS files with a type transition to the super privileged @@ -78597,7 +78826,7 @@ Domain allowed access. - + Connect to a system container engine domain over a unix stream socket. @@ -78608,7 +78837,7 @@ Domain allowed access. - + Connect to a system container domain over a unix stream socket. @@ -78619,7 +78848,7 @@ Domain allowed access. - + Connect to a user container domain over a unix stream socket. @@ -78630,7 +78859,7 @@ Domain allowed access. - + Connect to super privileged containers over a unix stream socket. @@ -78641,7 +78870,7 @@ Domain allowed access. - + Read and write super privileged container TCP sockets. @@ -78652,7 +78881,7 @@ Domain allowed access. - + Connect to a container domain over a unix stream socket. @@ -78663,7 +78892,7 @@ Domain allowed access. - + Connect to the specified container domain over a unix stream socket. @@ -78674,7 +78903,7 @@ Domain allowed access. - + Allow the specified domain to send a kill signal to all containers. @@ -78685,7 +78914,7 @@ Domain allowed to transition. - + Allow the specified domain to send all signals to a container @@ -78697,7 +78926,17 @@ Domain allowed to transition. - + + +Send signals to a system container. + + + +Domain allowed access. + + + + Create objects in /dev with an automatic transition to the container device type. @@ -78718,7 +78957,7 @@ The name of the object being created. - + Read and write container device files. @@ -78728,7 +78967,7 @@ Domain allowed access. - + Manage container device files. @@ -78738,7 +78977,7 @@ Domain allowed access. - + Get the attributes of container device block files. @@ -78749,7 +78988,7 @@ Domain allowed access. - + Read container device block files. @@ -78759,7 +78998,7 @@ Domain allowed access. - + Mount on all container devices. @@ -78769,7 +79008,7 @@ Domain allowed access. - + Set the attributes of container ptys. @@ -78779,7 +79018,7 @@ Domain allowed access. - + Read and write container ptys. @@ -78789,7 +79028,7 @@ Domain allowed access. - + Make the specified type usable as a mountpoint for containers. @@ -78800,7 +79039,7 @@ Type to be used as a mountpoint. - + Allow the specified domain to list the contents of container @@ -78812,7 +79051,7 @@ Domain allowed access. - + Allow the specified domain to add a watch on container plugin @@ -78824,7 +79063,7 @@ Domain allowed access. - + Allow the specified domain to manage container plugin files. @@ -78835,7 +79074,7 @@ Domain allowed access. - + Allow the specified domain to execute container plugins. @@ -78846,7 +79085,7 @@ Domain allowed access. - + Allow the specified domain to search container config directories. @@ -78857,7 +79096,7 @@ Domain allowed access. - + Allow the specified domain to read container config files. @@ -78868,7 +79107,7 @@ Domain allowed access. - + Allow the specified domain to watch container config directories. @@ -78879,7 +79118,18 @@ Domain allowed access. - + + +Allow the specified domain to +create container config directories. + + + +Domain allowed access. + + + + Allow the specified domain to create container config files. @@ -78890,7 +79140,7 @@ Domain allowed access. - + Allow the specified domain to read and write container config files. @@ -78901,7 +79151,7 @@ Domain allowed access. - + Allow the specified domain to manage container config files. @@ -78912,7 +79162,7 @@ Domain allowed access. - + Allow the specified domain to create container files in the @@ -78925,7 +79175,7 @@ Domain allowed access. - + Allow the specified domain to manage container file directories. @@ -78936,7 +79186,7 @@ Domain allowed access. - + Allow the specified domain to watch container file directories. @@ -78947,7 +79197,7 @@ Domain allowed access. - + Allow the specified domain to manage container files. @@ -78958,7 +79208,17 @@ Domain allowed access. - + + +IOCTL container files. + + + +Domain allowed access. + + + + Do not audit attempts to relabel container file directories. @@ -78969,7 +79229,7 @@ Domain to not audit. - + Do not audit attempts to relabel container files. @@ -78980,7 +79240,7 @@ Domain to not audit. - + Allow the specified domain to manage container lnk files. @@ -78991,7 +79251,7 @@ Domain allowed access. - + Allow the specified domain to read and write container fifo files. @@ -79002,7 +79262,7 @@ Domain allowed access. - + Allow the specified domain to manage container fifo files. @@ -79013,7 +79273,7 @@ Domain allowed access. - + Allow the specified domain to manage container sock files. @@ -79024,7 +79284,7 @@ Domain allowed access. - + Allow the specified domain to read and write container chr files. @@ -79035,7 +79295,7 @@ Domain allowed access. - + Do not audit attempts to read and write container chr files. @@ -79046,7 +79306,7 @@ Domain allowed access. - + Allow the specified domain to manage container chr files. @@ -79057,7 +79317,7 @@ Domain allowed access. - + Allow the specified domain to create objects in specified directories with @@ -79085,7 +79345,7 @@ The name of the object being created. - + Allow the specified domain to get the attributes of all container @@ -79097,7 +79357,7 @@ Domain allowed access. - + Allow the specified domain to list the contents of read-only container @@ -79109,7 +79369,19 @@ Domain allowed access. - + + +Allow the specified domain to get +the attributes of all read-only +container file character devices. + + + +Domain allowed access. + + + + Allow the specified domain to get the attributes of all read-only @@ -79121,7 +79393,7 @@ Domain allowed access. - + Read container config home content. @@ -79131,7 +79403,7 @@ Domain allowed access. - + Allow the specified domain to manage container config home content. @@ -79142,7 +79414,7 @@ Domain allowed access. - + Allow the specified domain to create objects in an xdg_config directory @@ -79165,7 +79437,7 @@ The name of the object being created. - + Allow the specified domain to manage container data home files. @@ -79176,7 +79448,7 @@ Domain allowed access. - + Allow the specified domain to manage container data home named @@ -79188,7 +79460,7 @@ Domain allowed access. - + Allow the specified domain to manage container data home named @@ -79200,7 +79472,7 @@ Domain allowed access. - + Administrate all container files. @@ -79210,7 +79482,7 @@ Domain allowed access. - + Administrate all container read-only files. @@ -79220,7 +79492,7 @@ Domain allowed access. - + All of the rules necessary for a user to manage user container runtime data @@ -79232,7 +79504,7 @@ Domain allowed access. - + All of the rules necessary for a user to manage container data in their home @@ -79244,7 +79516,7 @@ Domain allowed access. - + Allow the specified domain to relabel container files and @@ -79256,7 +79528,7 @@ Domain allowed access. - + Allow the specified domain to remount container filesystems. @@ -79267,7 +79539,7 @@ Domain allowed access. - + Allow the specified domain to relabel container filesystems. @@ -79278,7 +79550,7 @@ Domain allowed access. - + Allow the specified domain to get the attributes of container @@ -79290,7 +79562,7 @@ Domain allowed access. - + Allow the specified domain to search runtime container directories. @@ -79301,7 +79573,7 @@ Domain allowed access. - + Allow the specified domain to read runtime container files. @@ -79312,7 +79584,7 @@ Domain allowed access. - + Allow the specified domain to get the attributes runtime container of @@ -79324,7 +79596,7 @@ Domain allowed access. - + Allow the specified domain to create runtime container directories. @@ -79335,7 +79607,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container files. @@ -79346,7 +79618,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container named pipes. @@ -79357,7 +79629,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container symlinks. @@ -79368,7 +79640,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container named sockets. @@ -79379,7 +79651,7 @@ Domain allowed access. - + Allow the specified domain to manage user runtime container files. @@ -79390,7 +79662,7 @@ Domain allowed access. - + Allow the specified domain to read and write user runtime container named sockets. @@ -79401,7 +79673,7 @@ Domain allowed access. - + Allow the specified domain to search container directories in /var/lib. @@ -79412,7 +79684,7 @@ Domain allowed access. - + Allow the specified domain to list the contents of container directories @@ -79424,7 +79696,7 @@ Domain allowed access. - + Allow the specified domain to manage container file directories in /var/lib. @@ -79435,7 +79707,7 @@ Domain allowed access. - + Allow the specified domain to read container files in /var/lib. @@ -79446,7 +79718,7 @@ Domain allowed access. - + Allow the specified domain to manage container files in /var/lib. @@ -79457,7 +79729,7 @@ Domain allowed access. - + Allow the specified domain to memory map container files in /var/lib. @@ -79468,7 +79740,7 @@ Domain allowed access. - + Allow the specified domain to manage container named pipes in /var/lib. @@ -79479,7 +79751,7 @@ Domain allowed access. - + Allow the specified domain to manage container symlinks in /var/lib. @@ -79490,7 +79762,7 @@ Domain allowed access. - + Allow the specified domain to manage container named sockets in /var/lib. @@ -79501,7 +79773,7 @@ Domain allowed access. - + Allow the specified domain to create objects in /var/lib with an automatic @@ -79523,7 +79795,7 @@ The name of the object being created. - + Allow the specified domain to create objects in /var/lib with an automatic @@ -79545,7 +79817,7 @@ The name of the object being created. - + Allow the specified domain to create objects in container /var/lib directories @@ -79568,7 +79840,7 @@ The name of the object being created. - + Allow the specified domain to create objects in unlabeled directories with @@ -79591,7 +79863,7 @@ The name of the object being created. - + Allow the specified domain to get the attributes of all container @@ -79603,7 +79875,7 @@ Domain allowed access. - + Allow the specified domain to search container log file directories. @@ -79614,7 +79886,7 @@ Domain allowed access. - + Allow the specified domain to list the contents of container log directories. @@ -79625,7 +79897,7 @@ Domain allowed access. - + Allow the specified domain to create container log file directories. @@ -79636,7 +79908,7 @@ Domain allowed access. - + Allow the specified domain to manage container log file directories. @@ -79647,7 +79919,7 @@ Domain allowed access. - + Allow the specified domain to watch container log file directories. @@ -79658,7 +79930,7 @@ Domain allowed access. - + Allow the specified domain to create container log files. @@ -79669,7 +79941,7 @@ Domain allowed access. - + Allow the specified domain to append data to container log files. @@ -79680,7 +79952,7 @@ Domain allowed access. - + Allow the specified domain to manage container log files. @@ -79691,7 +79963,7 @@ Domain allowed access. - + Allow the specified domain to watch container log files. @@ -79702,7 +79974,7 @@ Domain allowed access. - + Allow the specified domain to create objects in log directories with an @@ -79725,7 +79997,7 @@ The name of the object being created. - + Allow the specified domain to manage container log symlinks. @@ -79736,7 +80008,7 @@ Domain allowed access. - + Allow the specified domain to start systemd units for containers. @@ -79747,7 +80019,7 @@ Domain allowed access. - + All of the rules required to administrate a container @@ -80946,18 +81218,7 @@ Domain allowed access. - - -Connect to ptal over an unix -domain stream socket. - - - -Domain allowed access. - - - - + Read the process state (/proc/pid) of cupsd. @@ -80967,7 +81228,7 @@ Domain allowed access. - + Execute HP Linux Imaging and Printing applications in their @@ -80979,7 +81240,7 @@ Domain allowed to transition. - + All of the rules required to administrate an cups environment. @@ -81448,7 +81709,18 @@ Domain allowed access. - + + +Use PIDFD file descriptors from the +DBUS system bus. + + + +Domain allowed access. + + + + Do not audit attempts to read and write DBUS system bus TCP sockets. @@ -81459,7 +81731,7 @@ Domain to not audit. - + Watch system bus runtime directories. @@ -81469,7 +81741,7 @@ Domain allowed access. - + Read system bus runtime files. @@ -81479,7 +81751,7 @@ Domain allowed access. - + List system bus runtime directories. @@ -81489,7 +81761,7 @@ Domain allowed access. - + Watch system bus runtime named sockets. @@ -81499,7 +81771,7 @@ Domain allowed access. - + Read system bus runtime named sockets. @@ -81509,7 +81781,7 @@ Domain allowed access. - + Do not audit attempts to write to system bus runtime named sockets. @@ -81520,7 +81792,7 @@ Domain to not audit. - + Read and write session named sockets in the tmp directory (/tmp). @@ -81530,7 +81802,7 @@ Domain allowed access. - + Unconfined access to DBUS. @@ -81540,7 +81812,7 @@ Domain allowed access. - + Create resources in /run or /var/run with the system_dbusd_runtime_t label. This method is deprecated in favor of the init_daemon_run_dir @@ -81562,7 +81834,7 @@ Optional file name used for the resource - + Create directories with the system_dbusd_runtime_t label @@ -83814,7 +84086,7 @@ Role allowed access. policy for gssproxy - daemon to proxy GSSAPI context establishment and channel handling -Execute gssproxy in the gssproxy domin. +Execute gssproxy in the gssproxy domain. @@ -84097,6 +84369,85 @@ Role allowed access. + +A TCP/HTTP reverse proxy for high availability environments. + + +Execute haproxy in the haproxy domain. + + + +Domain allowed to transition. + + + + + +Execute haproxy in the haproxy domain, and +allow the specified role the haproxy domain. + + + +Domain allowed to transition. + + + + +Role allowed access. + + + + + + +All of the rules required to +administrate an haproxy environment. + + + +Domain allowed access. + + + + +Role allowed access. + + + + + + +

+Determine whether haproxy can bind to +all TCP ports. +

+
+
+ + +

+Determine whether haproxy can bind to +kubernetes ports (typically 6443/tcp). +

+
+
+ + +

+Determine whether haproxy can connect to +all TCP ports. +

+
+
+ + +

+Determine whether haproxy can connect to +kubernetes ports (typically 6443/tcp). +

+
+
+
Hard disk temperature tool running as a daemon. @@ -84371,7 +84722,7 @@ Role allowed access. Industrial I/O subsystem is intended to provide support for devices -that in some sense are analog to digital or digital to analog convertors +that in some sense are analog to digital or digital to analog converters . Devices that fall into this category are: * ADCs @@ -85400,7 +85751,18 @@ Domain allowed access.
- + + +Read and write FIFO files from +kubernetes container engines. + + + +Domain allowed access. + + + + Search kubernetes config directories. @@ -85410,7 +85772,7 @@ Domain allowed access. - + Read kubernetes config files and symlinks. @@ -85420,7 +85782,7 @@ Domain allowed access. - + Mount on kubernetes config directories. @@ -85430,7 +85792,7 @@ Domain allowed access. - + Allow the specified domain to watch kubernetes config directories. @@ -85441,7 +85803,7 @@ Domain allowed access. - + Manage kubernetes config files. @@ -85451,7 +85813,7 @@ Domain allowed access. - + Mount on kubernetes config files. @@ -85461,7 +85823,7 @@ Domain allowed access. - + Allow the specified domain to watch kubernetes config files. @@ -85472,7 +85834,7 @@ Domain allowed access. - + Allow the specified domain to search through the contents of kubernetes plugin @@ -85484,7 +85846,7 @@ Domain allowed access. - + Allow the specified domain to list the contents of kubernetes plugin @@ -85496,7 +85858,7 @@ Domain allowed access. - + Allow the specified domain to watch kubernetes plugin directories. @@ -85507,7 +85869,7 @@ Domain allowed access. - + Allow the specified domain to manage kubernetes plugin files. @@ -85518,7 +85880,7 @@ Domain allowed access. - + Manage kubernetes runtime directories. @@ -85528,7 +85890,7 @@ Domain allowed access. - + Mount on kubernetes runtime directories. @@ -85538,7 +85900,7 @@ Domain allowed access. - + Manage kubernetes runtime files. @@ -85548,7 +85910,7 @@ Domain allowed access. - + Memory map kubernetes runtime files. @@ -85558,7 +85920,7 @@ Domain allowed access. - + Watch kubernetes runtime files. @@ -85568,7 +85930,7 @@ Domain allowed access. - + Manage kubernetes runtime symlinks. @@ -85578,7 +85940,7 @@ Domain allowed access. - + Manage kubernetes runtime sock files. @@ -85588,7 +85950,7 @@ Domain allowed access. - + List the contents of kubernetes tmpfs directories. @@ -85599,7 +85961,7 @@ Domain allowed access. - + Manage kubernetes tmpfs directories. @@ -85609,7 +85971,7 @@ Domain allowed access. - + Watch kubernetes tmpfs directories. @@ -85619,7 +85981,7 @@ Domain allowed access. - + Read kubernetes tmpfs files. @@ -85629,7 +85991,7 @@ Domain allowed access. - + Manage kubernetes tmpfs files. @@ -85639,7 +86001,7 @@ Domain allowed access. - + Watch kubernetes tmpfs files. @@ -85649,7 +86011,7 @@ Domain allowed access. - + Read kubernetes tmpfs symlinks. @@ -85659,7 +86021,7 @@ Domain allowed access. - + Manage kubernetes tmpfs symlinks. @@ -85669,7 +86031,7 @@ Domain allowed access. - + Relabel directories from the kubernetes tmpfs type. @@ -85680,7 +86042,7 @@ Domain allowed access. - + Relabel files from the kubernetes tmpfs type. @@ -85690,7 +86052,7 @@ Domain allowed access. - + Relabel symlinks from the kubernetes tmpfs type. @@ -85700,7 +86062,7 @@ Domain allowed access. - + Get the status of kubernetes systemd units. @@ -85710,7 +86072,7 @@ Domain allowed access. - + Start kubernetes systemd units. @@ -85720,7 +86082,7 @@ Domain allowed access. - + Stop kubernetes systemd units. @@ -85730,7 +86092,7 @@ Domain allowed access. - + Reload kubernetes systemd units. @@ -85740,7 +86102,7 @@ Domain allowed access. - + All of the rules required to administrate a kubernetes environment. @@ -85930,7 +86292,7 @@ Role allowed access. -Linux infared remote control daemon. +Linux infrared remote control daemon. Execute a domain transition to run lircd. @@ -86437,6 +86799,16 @@ Determine whether Matrixd can connect to the Postgres database.

+ + +

+Determine whether Matrixd is allowed to bind all +TCP ports. This is intended for more complex Matrix +server configurations (e.g. Synapse workers) and may +be used in lieu of manually labeling each port. +

+
+
Open source wiki package written in PHP. @@ -91389,6 +91761,13 @@ The role to be allowed to manage the postgresql domain. + + +

+Allow postgresql to map memory regions as both executable and writable (e.g. for JIT). +

+
+

@@ -91515,7 +91894,7 @@ The name of the object being created.

-Inherit and use ppp file discriptors. +Inherit and use ppp file descriptors. @@ -91526,7 +91905,7 @@ Domain allowed access. Do not audit attempts to inherit -and use ppp file discriptors. +and use ppp file descriptors. @@ -94328,7 +94707,17 @@ Domain allowed access. - + + +Memory map and read SASL keytab files. + + + +Domain allowed access. + + + + All of the rules required to administrate an sasl environment. @@ -95615,7 +96004,18 @@ Domain allowed access. - + + +Use PIDFD file descriptors from the +ssh server. + + + +Domain allowed access. + + + + Read a ssh server unnamed pipe. @@ -95625,7 +96025,7 @@ Domain allowed access. - + Read and write a ssh server unnamed pipe. @@ -95635,7 +96035,7 @@ Domain allowed access.
- + Read and write ssh server unix domain stream sockets. @@ -95645,7 +96045,7 @@ Domain allowed access.
- + Read and write ssh server TCP sockets. @@ -95655,7 +96055,7 @@ Domain allowed access. - + Do not audit attempts to read and write ssh server TCP sockets. @@ -95666,7 +96066,7 @@ Domain to not audit. - + Execute the ssh daemon in the caller domain. @@ -95676,7 +96076,7 @@ Domain allowed access. - + Execute the ssh daemon sshd domain. @@ -95686,7 +96086,7 @@ Domain allowed to transition. - + Execute the ssh client in the ssh client domain. @@ -95696,7 +96096,7 @@ Domain allowed to transition. - + Execute the ssh client in the caller domain. @@ -95706,7 +96106,7 @@ Domain allowed access. - + Set the attributes of sshd key files. @@ -95716,7 +96116,7 @@ Domain allowed access. - + Execute the ssh agent client in the caller domain. @@ -95726,7 +96126,7 @@ Domain allowed access. - + Set the attributes of ssh home directory (~/.ssh) @@ -95736,7 +96136,7 @@ Domain allowed access. - + Create ssh home directory (~/.ssh) @@ -95746,7 +96146,7 @@ Domain allowed access. - + Read ssh home directory content @@ -95756,7 +96156,7 @@ Domain allowed access. - + Execute the ssh key generator in the ssh keygen domain. @@ -95766,7 +96166,7 @@ Domain allowed to transition. - + Execute the ssh key generator in the ssh keygen domain, and allow the specified role the ssh keygen domain. @@ -95782,7 +96182,7 @@ Role allowed access. - + Read ssh server keys @@ -95792,7 +96192,7 @@ Domain allowed access. - + Do not audit denials on reading ssh server keys @@ -95802,7 +96202,7 @@ Domain to not audit. - + Manage ssh home directory content @@ -95812,7 +96212,7 @@ Domain allowed access. - + Delete from the ssh temp files. @@ -95822,7 +96222,7 @@ Domain allowed access. - + dontaudit access to ssh agent tmp dirs @@ -95853,6 +96253,13 @@ Allow ssh to use gpg-agent

+ + +

+Allow sshd to use remote port forwarding (bind to any TCP port) +

+
+
System Security Services Daemon. @@ -96515,7 +96922,7 @@ Domain allowed access. Create, read, write, and delete -tgtd sempaphores. +tgtd semaphores. @@ -97408,7 +97815,7 @@ Domain prefix to be used. - + Make the specified type virt image type. @@ -97418,7 +97825,7 @@ Type to be used as a virtual image. - + Execute a domain transition to run virtd. @@ -97428,7 +97835,7 @@ Domain allowed to transition. - + Execute a domain transition to run virt qmf. @@ -97438,7 +97845,7 @@ Domain allowed to transition. - + Execute a domain transition to run virt bridgehelper. @@ -97449,7 +97856,7 @@ Domain allowed to transition. - + Execute a domain transition to run virt leaseshelper. @@ -97460,7 +97867,7 @@ Domain allowed to transition. - + Execute bridgehelper in the bridgehelper domain, and allow the specified role @@ -97477,7 +97884,7 @@ Role allowed access. - + Execute virt domain in the their domain, and allow the specified @@ -97494,7 +97901,7 @@ Role allowed access. - + Send generic signals to all virt domains. @@ -97504,7 +97911,7 @@ Domain allowed access. - + Send kill signals to all virt domains. @@ -97514,7 +97921,7 @@ Domain allowed access. - + Get attributes of virtd executable files. @@ -97524,7 +97931,7 @@ Domain allowed access. - + Connect to virt with a unix domain stream socket. @@ -97535,7 +97942,7 @@ Domain allowed access. - + Attach to virt tun devices. @@ -97545,7 +97952,7 @@ Domain allowed access. - + Read virt configuration content. @@ -97555,7 +97962,7 @@ Domain allowed access. - + Create, read, write, and delete virt configuration content. @@ -97566,7 +97973,7 @@ Domain allowed access. - + Read virt content. @@ -97576,7 +97983,7 @@ Domain allowed access. - + Create, read, write, and delete virt content. @@ -97587,7 +97994,7 @@ Domain allowed access. - + Relabel virt content. @@ -97597,7 +98004,7 @@ Domain allowed access. - + Create specified objects in user home directories with the virt content type. @@ -97618,7 +98025,7 @@ The name of the object being created. - + Create, read, write, and delete svirt home content. @@ -97629,7 +98036,7 @@ Domain allowed access. - + Relabel svirt home content. @@ -97639,7 +98046,7 @@ Domain allowed access. - + Create specified objects in user home directories with the svirt home type. @@ -97660,7 +98067,7 @@ The name of the object being created. - + Create specified objects in generic virt home directories with private @@ -97687,7 +98094,7 @@ The name of the object being created. - + Create, read, write, and delete virt home files. @@ -97698,7 +98105,7 @@ Domain allowed access. - + Create, read, write, and delete virt home content. @@ -97709,7 +98116,7 @@ Domain allowed access. - + Relabel virt home content. @@ -97719,7 +98126,7 @@ Domain allowed access. - + Create specified objects in user home directories with the generic virt @@ -97741,7 +98148,7 @@ The name of the object being created. - + Read virt runtime files. @@ -97751,7 +98158,7 @@ Domain allowed access. - + Create an object in the libvirt runtime directory, with a private type. @@ -97777,7 +98184,7 @@ The name of the object being created. - + Search virt lib directories. @@ -97787,7 +98194,7 @@ Domain allowed access. - + Read virt lib files. @@ -97797,7 +98204,7 @@ Domain allowed access. - + Create, read, write, and delete virt lib files. @@ -97808,7 +98215,7 @@ Domain allowed access. - + Read virt log files. @@ -97819,7 +98226,7 @@ Domain allowed access. - + Append virt log files. @@ -97829,7 +98236,7 @@ Domain allowed access. - + Create, read, write, and delete virt log files. @@ -97840,7 +98247,7 @@ Domain allowed access. - + Search virt image directories. @@ -97850,7 +98257,7 @@ Domain allowed access. - + Read virt image files. @@ -97860,7 +98267,7 @@ Domain allowed access. - + Read and write all virt image character files. @@ -97871,7 +98278,7 @@ Domain allowed access. - + Create, read, write, and delete virt cache content. @@ -97882,7 +98289,7 @@ Domain allowed access. - + Create, read, write, and delete virt image files. @@ -97893,7 +98300,7 @@ Domain allowed access. - + Inherit and use virtd lxc file descriptors. @@ -97904,7 +98311,7 @@ Domain allowed access. - + Send a SIGCHLD to virtd lxc. @@ -97914,9 +98321,9 @@ Domain allowed access. - + -Read and write virtd lxc unamed pipes. +Read and write virtd lxc unnamed pipes. @@ -97924,7 +98331,7 @@ Domain allowed access. - + Connect to virtd lxc over a unix stream socket. @@ -97935,7 +98342,7 @@ Domain allowed access. - + List the contents of virtd lxc directories. @@ -97946,7 +98353,7 @@ Domain allowed access. - + Read virtd lxc runtime files. @@ -97956,7 +98363,7 @@ Domain allowed access. - + Inherit and use virsh file descriptors. @@ -97967,7 +98374,7 @@ Domain allowed access. - + Send a SIGCHLD to virsh. @@ -97977,9 +98384,9 @@ Domain allowed access. - + -Read and write virsh unamed pipes. +Read and write virsh unnamed pipes. @@ -97987,7 +98394,7 @@ Domain allowed access. - + All of the rules required to administrate an virt environment. @@ -99704,7 +100111,7 @@ Domain allowed access. - + Use the pam module motd with dynamic support during authentication. This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071) @@ -99716,7 +100123,7 @@ Domain allowed access. - + Read the pam module motd with dynamic support during authentication. @@ -99726,7 +100133,7 @@ Domain allowed access. - + Make the specified domain used for a login program. @@ -99736,7 +100143,7 @@ Domain type used for a login program domain. - + Use the login program as an entry point program. @@ -99746,7 +100153,7 @@ Domain allowed access. - + Execute a login_program in the target domain. @@ -99761,7 +100168,7 @@ The type of the login_program process. - + Execute a login_program in the target domain, with a range transition. @@ -99782,7 +100189,7 @@ Range of the login program. - + Search authentication cache @@ -99792,7 +100199,7 @@ Domain allowed access. - + Read authentication cache @@ -99802,7 +100209,7 @@ Domain allowed access. - + Read/Write authentication cache @@ -99812,7 +100219,7 @@ Domain allowed access. - + Manage authentication cache @@ -99822,7 +100229,7 @@ Domain allowed access. - + Automatic transition from cache_t to cache. @@ -99832,7 +100239,7 @@ Domain allowed access. - + Run unix_chkpwd to check a password. @@ -99842,7 +100249,7 @@ Domain allowed to transition. - + Run unix_chkpwd to check a password. Stripped down version to be called within boolean @@ -99853,7 +100260,7 @@ Domain allowed to transition. - + Execute chkpwd programs in the chkpwd domain. @@ -99868,7 +100275,7 @@ The role to allow the chkpwd domain. - + Execute a domain transition to run unix_update. @@ -99878,7 +100285,7 @@ Domain allowed to transition. - + Execute updpwd programs in the updpwd domain. @@ -99893,7 +100300,7 @@ The role to allow the updpwd domain. - + Get the attributes of the shadow passwords file. @@ -99903,7 +100310,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the shadow passwords file. @@ -99914,7 +100321,7 @@ Domain to not audit. - + Read the shadow passwords file (/etc/shadow) @@ -99924,7 +100331,7 @@ Domain allowed access. - + Map the shadow passwords file (/etc/shadow) @@ -99934,7 +100341,7 @@ Domain allowed access. - + Pass shadow assertion for reading. @@ -99953,7 +100360,7 @@ Domain allowed access. - + Read the shadow password file. @@ -99971,7 +100378,7 @@ Domain allowed access. - + Do not audit attempts to read the shadow password file (/etc/shadow). @@ -99982,7 +100389,7 @@ Domain to not audit. - + Read and write the shadow password file (/etc/shadow). @@ -99992,7 +100399,7 @@ Domain allowed access. - + Create, read, write, and delete the shadow password file. @@ -100003,7 +100410,7 @@ Domain allowed access. - + Automatic transition from etc to shadow. @@ -100018,7 +100425,17 @@ The name of the object being created. - + + +Get the attributes of the shadow history file. + + + +Domain allowed access. + + + + Read the shadow history file. @@ -100028,7 +100445,7 @@ Domain allowed access. - + Manage the shadow history file. @@ -100038,7 +100455,7 @@ Domain allowed access. - + Relabel to the shadow password file type. @@ -100049,7 +100466,7 @@ Domain allowed access. - + Relabel from and to the shadow password file type. @@ -100060,7 +100477,7 @@ Domain allowed access. - + Read/Write shadow lock files. @@ -100070,7 +100487,17 @@ Domain allowed access. - + + +Search faillock directory (/run/faillock). + + + +Domain allowed access. + + + + Append to the login failure log. @@ -100080,7 +100507,7 @@ Domain allowed access. - + Create fail log lock (in /run/faillock). @@ -100090,7 +100517,7 @@ Domain allowed access. - + Read and write the login failure log. @@ -100100,7 +100527,7 @@ Domain allowed access. - + Manage the login failure logs. @@ -100110,7 +100537,7 @@ Domain allowed access. - + Setattr the login failure logs. @@ -100120,7 +100547,7 @@ Domain allowed access. - + Read the last logins log. @@ -100131,7 +100558,7 @@ Domain allowed access. - + Append only to the last logins log. @@ -100141,7 +100568,7 @@ Domain allowed access. - + relabel the last logins log. @@ -100151,7 +100578,7 @@ Domain allowed access. - + Read and write to the last logins log. @@ -100161,7 +100588,7 @@ Domain allowed access. - + Manage the last logins log. @@ -100171,7 +100598,7 @@ Domain allowed access. - + Execute pam programs in the pam domain. @@ -100181,7 +100608,7 @@ Domain allowed to transition. - + Send generic signals to pam processes. @@ -100191,7 +100618,7 @@ Domain allowed access. - + Execute pam programs in the PAM domain. @@ -100206,7 +100633,7 @@ The role to allow the PAM domain. - + Execute the pam program. @@ -100216,7 +100643,7 @@ Domain allowed access. - + Read var auth files. Used by various other applications and pam applets etc. @@ -100227,7 +100654,7 @@ Domain allowed access. - + Read and write var auth files. Used by various other applications and pam applets etc. @@ -100238,7 +100665,7 @@ Domain allowed access. - + Manage var auth files. Used by various other applications and pam applets etc. @@ -100249,7 +100676,7 @@ Domain allowed access. - + Manage pam runtime dirs. @@ -100259,7 +100686,7 @@ Domain allowed access. - + Create specified objects in pid directories with the pam runtime @@ -100281,7 +100708,7 @@ The name of the object being created. - + Read PAM runtime files. @@ -100291,7 +100718,7 @@ Domain allowed access. - + Do not audit attempts to read PAM runtime files. @@ -100301,7 +100728,7 @@ Domain to not audit. - + Delete pam runtime files. @@ -100311,7 +100738,7 @@ Domain allowed access. - + Create, read, write, and delete pam runtime files. @@ -100321,7 +100748,7 @@ Domain allowed access. - + Execute pam_console with a domain transition. @@ -100331,7 +100758,7 @@ Domain allowed to transition. - + Search the contents of the pam_console data directory. @@ -100342,7 +100769,7 @@ Domain allowed access. - + List the contents of the pam_console data directory. @@ -100353,7 +100780,7 @@ Domain allowed access. - + Create pam var console pid directories. @@ -100363,7 +100790,7 @@ Domain allowed access. - + Relabel pam_console data directories. @@ -100373,7 +100800,7 @@ Domain allowed access. - + Read pam_console data files. @@ -100383,7 +100810,7 @@ Domain allowed access. - + Create, read, write, and delete pam_console data files. @@ -100394,7 +100821,7 @@ Domain allowed access. - + Delete pam_console data. @@ -100404,7 +100831,7 @@ Domain allowed access. - + Create specified objects in generic runtime directories with the pam var @@ -100427,7 +100854,7 @@ The name of the object being created. - + Execute utempter programs in the utempter domain. @@ -100437,7 +100864,7 @@ Domain allowed to transition. - + Execute utempter programs in the utempter domain. @@ -100452,7 +100879,7 @@ The role to allow the utempter domain. - + Do not audit attempts to execute utempter executable. @@ -100462,7 +100889,7 @@ Domain to not audit. - + Set the attributes of login record files. @@ -100472,7 +100899,7 @@ Domain allowed access. - + Read login records files (/var/log/wtmp). @@ -100483,7 +100910,7 @@ Domain allowed access. - + Do not audit attempts to read login records files (/var/log/wtmp). @@ -100495,7 +100922,7 @@ Domain to not audit. - + Do not audit attempts to write to login records files. @@ -100506,7 +100933,7 @@ Domain to not audit. - + Append to login records (wtmp). @@ -100516,7 +100943,7 @@ Domain allowed access. - + Write to login records (wtmp). @@ -100526,7 +100953,7 @@ Domain allowed access. - + Read and write login records. @@ -100536,7 +100963,7 @@ Domain allowed access. - + Create a login records in the log directory using a type transition. @@ -100547,7 +100974,7 @@ Domain allowed access. - + Create, read, write, and delete login records files. @@ -100558,7 +100985,7 @@ Domain allowed access. - + Relabel login record files. @@ -100568,7 +100995,7 @@ Domain allowed access. - + Use nsswitch to look up user, password, group, or host information. @@ -100588,7 +101015,7 @@ Domain allowed access. - + Unconfined access to the authlogin module. @@ -101214,7 +101641,7 @@ Type of the script file used as an entry point to this domain. - + Create a domain which can be started by init. @@ -101229,7 +101656,7 @@ Type of the program to be used as an entry point to this domain. - + Create a domain which can be started by init, with a range transition. @@ -101250,7 +101677,7 @@ Range for the domain. - + Setup a domain which can be manually transitioned to from init. @@ -101274,7 +101701,7 @@ Type of the program being executed when starting this domain. - + Create a domain for long running processes (daemons/services) which are started by init scripts. @@ -101309,7 +101736,7 @@ Type of the program to be used as an entry point to this domain. - + Create a domain for long running processes (daemons/services) which are started by init scripts, @@ -101351,7 +101778,7 @@ MLS/MCS range for the domain. - + Abstract socket service activation (systemd). @@ -101361,7 +101788,7 @@ The domain to be started by systemd socket activation. - + Named socket service activation (systemd). @@ -101376,7 +101803,7 @@ The domain socket file type. - + Create a domain for short running processes which are started by init scripts. @@ -101413,7 +101840,7 @@ Type of the program to be used as an entry point to this domain. - + Create a domain for short running processes which are started by init scripts. @@ -101456,7 +101883,7 @@ Range for the domain. - + Allow domain dyntransition to init_t domain. @@ -101466,7 +101893,7 @@ Domain allowed to transition. - + Mark the file type as a daemon runtime file, allowing initrc_t to create it @@ -101487,7 +101914,7 @@ Filename of the file that the init script creates - + Mark the file type as a daemon lock file, allowing initrc_t to create it @@ -101508,7 +101935,7 @@ Filename of the file that the init script creates - + Execute init (/sbin/init) with a domain transition. @@ -101518,7 +101945,7 @@ Domain allowed to transition. - + Execute init (/sbin/init) with a domain transition to the provided domain. @@ -101534,7 +101961,7 @@ The type to be used as a systemd --user domain. - + Execute the init program in the caller domain. @@ -101545,7 +101972,7 @@ Domain allowed access. - + Allow the init program to be an entrypoint for the specified domain. @@ -101557,7 +101984,7 @@ Domain allowed access. - + Execute the rc application in the caller domain. @@ -101578,7 +102005,7 @@ Domain allowed access. - + Get the process group of init. @@ -101588,7 +102015,7 @@ Domain allowed access. - + Send init a generic signal. @@ -101598,7 +102025,7 @@ Domain allowed access. - + Send init a null signal. @@ -101608,7 +102035,7 @@ Domain allowed access. - + Send init a SIGCHLD signal. @@ -101618,7 +102045,7 @@ Domain allowed access. - + Set the nice level of init. @@ -101628,7 +102055,7 @@ Domain allowed access. - + Write systemd mountpoint files. @@ -101644,7 +102071,7 @@ must be negated by the caller. - + Create systemd mountpoint files. @@ -101660,7 +102087,7 @@ must be negated by the caller. - + Connect to init with a unix socket. @@ -101670,7 +102097,7 @@ Domain allowed access. - + Connect to init with a unix socket. Without any additional permissions. @@ -101681,7 +102108,7 @@ Domain allowed access. - + Send to init with a unix socket. Without any additional permissions. @@ -101692,7 +102119,7 @@ Domain allowed access. - + Inherit and use file descriptors from init. @@ -101742,7 +102169,7 @@ Domain allowed access. - + Do not audit attempts to inherit file descriptors from init. @@ -101753,7 +102180,7 @@ Domain to not audit. - + Send messages to init unix datagram sockets. @@ -101764,7 +102191,7 @@ Domain allowed access. - + Read and write to inherited init unix streams. @@ -101774,7 +102201,7 @@ Domain allowed access. - + Allow the specified domain to read/write to init with unix domain stream sockets. @@ -101785,7 +102212,19 @@ Domain allowed access. - + + +Allow the specified domain to set the +attributes of init's unix domain stream +sockets. + + + +Domain allowed access. + + + + Do not audit attempts to search init keys. @@ -101795,7 +102234,7 @@ Domain allowed access. - + start service (systemd). @@ -101805,7 +102244,7 @@ Domain allowed access. - + stop service (systemd). @@ -101815,7 +102254,7 @@ Domain allowed access. - + Get all service status (systemd). @@ -101825,7 +102264,7 @@ Domain allowed access. - + Enable all systemd services (systemd). @@ -101835,7 +102274,7 @@ Domain allowed access. - + Disable all services (systemd). @@ -101845,7 +102284,7 @@ Domain allowed access. - + Reload all services (systemd). @@ -101855,7 +102294,7 @@ Domain allowed access. - + Reboot the system (systemd). @@ -101865,7 +102304,7 @@ Domain allowed access. - + Shutdown (halt) the system (systemd). @@ -101875,7 +102314,7 @@ Domain allowed access. - + Allow specified domain to get init status @@ -101885,7 +102324,7 @@ Domain to allow access. - + Allow specified domain to get init start @@ -101895,7 +102334,7 @@ Domain to allow access. - + Send and receive messages from systemd over dbus. @@ -101906,7 +102345,7 @@ Domain allowed access. - + Run init BPF programs. @@ -101916,7 +102355,7 @@ Domain allowed access. - + read/follow symlinks under /var/lib/systemd/ @@ -101926,7 +102365,7 @@ Domain allowed access. - + Search /var/lib/systemd/ dirs @@ -101936,7 +102375,7 @@ Domain allowed access. - + List /var/lib/systemd/ dir @@ -101946,7 +102385,7 @@ Domain allowed access. - + Relabel dirs in /var/lib/systemd/. @@ -101956,7 +102395,7 @@ Domain allowed access. - + Create, read, write, and delete the pseudorandom number generator seed @@ -101969,7 +102408,7 @@ Domain allowed access. - + Manage files in /var/lib/systemd/. @@ -101979,7 +102418,7 @@ Domain allowed access. - + Create files in /var/lib/systemd with an automatic type transition. @@ -102005,7 +102444,7 @@ The name of the object being created. - + Search init runtime directories, e.g. /run/systemd. @@ -102015,7 +102454,7 @@ Domain allowed access. - + List init runtime directories, e.g. /run/systemd. @@ -102025,7 +102464,7 @@ Domain allowed access. - + Create, read, write, and delete directories in the /run/systemd directory. @@ -102036,7 +102475,7 @@ Domain allowed access. - + Create, read, write, and delete files in the /run/systemd directory. @@ -102047,7 +102486,7 @@ Domain allowed access. - + Create files in an init runtime directory with a private type. @@ -102072,7 +102511,7 @@ The name of the object being created. - + Write init runtime files, e.g. in /run/systemd. @@ -102082,7 +102521,7 @@ Domain allowed access. - + Create init runtime files, e.g. in /run/systemd. @@ -102092,7 +102531,7 @@ Domain allowed access. - + Create init runtime symbolic links, e.g. in /run/systemd. @@ -102102,7 +102541,7 @@ Domain allowed access. - + Get the attributes of initctl. @@ -102112,7 +102551,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of initctl. @@ -102123,7 +102562,7 @@ Domain to not audit. - + Write to initctl. @@ -102133,7 +102572,7 @@ Domain allowed access. - + Use telinit (Read and write initctl). @@ -102144,7 +102583,7 @@ Domain allowed access. - + Read and write initctl. @@ -102154,7 +102593,7 @@ Domain allowed access. - + Do not audit attempts to read and write initctl. @@ -102165,7 +102604,7 @@ Domain to not audit. - + Make init scripts an entry point for the specified domain. @@ -102176,7 +102615,7 @@ Domain allowed access. - + Execute init scripts with a specified domain transition. @@ -102186,7 +102625,7 @@ Domain allowed to transition. - + Execute init scripts with an automatic domain transition. @@ -102196,7 +102635,7 @@ Domain allowed to transition. - + Execute labelled init scripts with an automatic domain transition. @@ -102206,7 +102645,7 @@ Domain allowed to transition. - + Execute a init script in a specified domain. @@ -102231,7 +102670,7 @@ Domain to transition to. - + Send a kill signal to init scripts. @@ -102241,7 +102680,7 @@ Domain allowed access. - + Allow manage service for initrc_exec_t scripts @@ -102251,7 +102690,7 @@ Target domain - + Transition to the init script domain on a specified labeled init script. @@ -102267,7 +102706,7 @@ Labeled init script file. - + Transition to the init script domain for all labeled init script types @@ -102278,7 +102717,7 @@ Domain allowed to transition. - + Allow getting service status of initrc_exec_t scripts @@ -102288,7 +102727,7 @@ Target domain - + Allow the role to start and stop labeled services. @@ -102319,7 +102758,7 @@ Systemd unit file type. - + Start and stop daemon programs directly. @@ -102341,7 +102780,7 @@ The role to be performing this action. - + Start and stop init_script_file_type services @@ -102351,7 +102790,7 @@ domain that can start and stop the services - + Read the process state (/proc/pid) of init. @@ -102361,7 +102800,7 @@ Domain allowed access. - + Dontaudit read the process state (/proc/pid) of init. @@ -102371,7 +102810,7 @@ Domain to not audit. - + Ptrace init @@ -102382,7 +102821,7 @@ Domain allowed access. - + get init process stats @@ -102393,7 +102832,7 @@ Domain allowed access. - + Read an init script unnamed pipe. @@ -102403,7 +102842,7 @@ Domain allowed access. - + Write an init script unnamed pipe. @@ -102413,7 +102852,7 @@ Domain allowed access. - + Get the attribute of init script entrypoint files. @@ -102423,7 +102862,7 @@ Domain allowed access. - + Read init scripts. @@ -102433,7 +102872,7 @@ Domain allowed access. - + Execute init scripts in the caller domain. @@ -102443,7 +102882,7 @@ Domain allowed access. - + Get the attribute of all init script entrypoint files. @@ -102453,7 +102892,7 @@ Domain allowed access. - + Read all init script files. @@ -102463,7 +102902,7 @@ Domain allowed access. - + Dontaudit read all init script files. @@ -102473,7 +102912,7 @@ Domain to not audit. - + Execute all init scripts in the caller domain. @@ -102483,7 +102922,7 @@ Domain allowed access. - + Read the process state (/proc/pid) of the init scripts. @@ -102493,7 +102932,7 @@ Domain allowed access. - + Inherit and use init script file descriptors. @@ -102503,7 +102942,7 @@ Domain allowed access. - + Do not audit attempts to inherit init script file descriptors. @@ -102514,7 +102953,7 @@ Domain to not audit. - + Search init script keys. @@ -102524,7 +102963,7 @@ Domain allowed access. - + Get the process group ID of init scripts. @@ -102534,7 +102973,7 @@ Domain allowed access. - + Send SIGCHLD signals to init scripts. @@ -102544,7 +102983,7 @@ Domain allowed access. - + Send generic signals to init scripts. @@ -102554,7 +102993,7 @@ Domain allowed access. - + Send null signals to init scripts. @@ -102564,7 +103003,7 @@ Domain allowed access. - + Read and write init script unnamed pipes. @@ -102574,7 +103013,7 @@ Domain allowed access. - + Allow the specified domain to connect to init scripts with a unix socket. @@ -102585,7 +103024,7 @@ Domain allowed access. - + Allow the specified domain to read/write to init scripts with a unix domain stream sockets. @@ -102596,7 +103035,7 @@ Domain allowed access. - + Dont audit the specified domain connecting to init scripts with a unix domain stream socket. @@ -102607,7 +103046,7 @@ Domain to not audit. - + Send messages to init scripts over dbus. @@ -102617,7 +103056,7 @@ Domain allowed access. - + Send and receive messages from init scripts over dbus. @@ -102628,7 +103067,7 @@ Domain allowed access. - + Read and write the init script pty. @@ -102647,7 +103086,7 @@ Domain allowed access. - + Read and write inherited init script ptys. @@ -102657,7 +103096,7 @@ Domain allowed access. - + Do not audit attempts to read and write the init script pty. @@ -102668,7 +103107,7 @@ Domain to not audit. - + Get the attributes of init script status files. @@ -102679,7 +103118,7 @@ Domain allowed access. - + Do not audit attempts to read init script status files. @@ -102690,7 +103129,7 @@ Domain to not audit. - + Search the /run/systemd directory. @@ -102700,7 +103139,7 @@ Domain allowed access. - + Read init script temporary data. @@ -102710,7 +103149,7 @@ Domain allowed access. - + Read and write init script inherited temporary data. @@ -102720,7 +103159,7 @@ Domain allowed access. - + Read and write init script temporary data. @@ -102730,7 +103169,7 @@ Domain allowed access. - + Create files in a init script temporary data directory. @@ -102756,7 +103195,7 @@ The name of the object being created. - + Get the attributes of init script process id files. @@ -102766,7 +103205,7 @@ Domain allowed access. - + Read utmp. @@ -102776,7 +103215,7 @@ Domain allowed access. - + Do not audit attempts to write utmp. @@ -102786,7 +103225,7 @@ Domain to not audit. - + Write to utmp. @@ -102796,7 +103235,7 @@ Domain allowed access. - + Do not audit attempts to lock init script pid files. @@ -102807,7 +103246,7 @@ Domain to not audit. - + Read and write utmp. @@ -102817,7 +103256,7 @@ Domain allowed access. - + Do not audit attempts to read and write utmp. @@ -102827,7 +103266,7 @@ Domain to not audit. - + Create, read, write, and delete utmp. @@ -102837,7 +103276,7 @@ Domain allowed access. - + Add a watch on init runtime @@ -102847,7 +103286,7 @@ Domain allowed access. - + Add a watch on utmp. @@ -102857,7 +103296,7 @@ Domain allowed access. - + Relabel utmp. @@ -102867,7 +103306,7 @@ Domain allowed access. - + Create files in /var/run with the utmp file type. @@ -102878,7 +103317,7 @@ Domain allowed access. - + Create a directory in the /run/systemd directory. @@ -102888,7 +103327,7 @@ Domain allowed access. - + Read init_runtime_t files @@ -102898,7 +103337,7 @@ domain - + Rename init_runtime_t files @@ -102908,7 +103347,7 @@ domain - + Setattr init_runtime_t files @@ -102918,7 +103357,7 @@ domain - + Delete init_runtime_t files @@ -102928,7 +103367,7 @@ domain - + Allow the specified domain to write to init sock file. @@ -102939,7 +103378,7 @@ Domain allowed access. - + Do not audit attempts to write to init sock files. @@ -102950,7 +103389,7 @@ Domain to not audit. - + Read init unnamed pipes. @@ -102960,7 +103399,7 @@ Domain allowed access. - + read systemd unit symlinks (usually under /run/systemd/units/) @@ -102970,7 +103409,7 @@ Domain allowed access. - + Allow the specified domain to connect to daemon with a tcp socket @@ -102980,7 +103419,7 @@ Domain allowed access. - + Allow the specified domain to connect to daemon with a udp socket @@ -102990,7 +103429,7 @@ Domain allowed access. - + Allow reading the init script state files @@ -103000,7 +103439,7 @@ Domain allowed access - + Label to init script status files @@ -103010,7 +103449,7 @@ Domain allowed access - + Mark as a readable type for the initrc_t domain @@ -103020,7 +103459,7 @@ Type that initrc_t needs read access to - + Search systemd unit dirs. @@ -103030,7 +103469,7 @@ Domain allowed access. - + List systemd unit dirs. @@ -103040,7 +103479,7 @@ Domain allowed access. - + Get the attributes of systemd unit files @@ -103050,7 +103489,7 @@ Domain allowed access. - + Read systemd unit files @@ -103060,7 +103499,7 @@ Domain allowed access. - + Read systemd unit links @@ -103070,7 +103509,7 @@ Domain allowed access. - + Get status of generic systemd units. @@ -103080,7 +103519,7 @@ Domain allowed access. - + Start generic systemd units. @@ -103090,7 +103529,7 @@ Domain allowed access. - + Stop generic systemd units. @@ -103100,7 +103539,7 @@ Domain to not audit. - + Reload generic systemd units. @@ -103110,7 +103549,7 @@ Domain allowed access. - + Get the status of runtime systemd units. @@ -103120,7 +103559,7 @@ Domain allowed access. - + Start runtime systemd units. @@ -103130,7 +103569,7 @@ Domain allowed access. - + Stop runtime systemd units. @@ -103140,7 +103579,7 @@ Domain allowed access. - + Get status of transient systemd units. @@ -103150,7 +103589,7 @@ Domain allowed access. - + Start transient systemd units. @@ -103160,7 +103599,7 @@ Domain allowed access. - + Stop transient systemd units. @@ -103170,7 +103609,7 @@ Domain to not audit. - + Reload transient systemd units. @@ -103180,7 +103619,7 @@ Domain allowed access. - + Get status of all systemd units. @@ -103190,7 +103629,7 @@ Domain allowed access. - + All perms on all systemd units. @@ -103200,7 +103639,7 @@ Domain allowed access. - + Start all systemd units. @@ -103210,7 +103649,7 @@ Domain allowed access. - + Stop all systemd units. @@ -103220,7 +103659,7 @@ Domain to not audit. - + Reload all systemd units. @@ -103230,7 +103669,7 @@ Domain allowed access. - + List systemd unit dirs and the files in them @@ -103240,7 +103679,7 @@ Domain allowed access. - + Get the attributes of systemd unit directories and the files in them. @@ -103250,7 +103689,7 @@ Domain allowed access. - + Manage systemd unit dirs and the files in them @@ -103260,7 +103699,7 @@ Domain allowed access. - + Relabel from and to systemd unit types. @@ -103270,7 +103709,7 @@ Domain allowed access. - + Associate the specified domain to be a domain whose keyring init should be allowed to link. @@ -103281,7 +103720,7 @@ Domain whose keyring init should be allowed to link. - + Allow unconfined access to send instructions to init @@ -103291,7 +103730,7 @@ Target domain - + Allow getting init_t rlimit @@ -103301,7 +103740,7 @@ Source domain - + Allow searching init_t keys @@ -103768,7 +104207,7 @@ Domain allowed to transition. Create, read, write, and delete -iscsid sempaphores. +iscsid semaphores. @@ -104222,7 +104661,17 @@ Domain allowed access. - + + +Use PIDFDs from local login. + + + +Domain allowed access. + + + + Do not audit attempts to inherit local login file descriptors. @@ -104232,7 +104681,7 @@ Domain to not audit. - + Send a null signal to local login processes. @@ -104242,7 +104691,7 @@ Domain allowed access. - + Search for key. @@ -104252,7 +104701,7 @@ Domain allowed access. - + Allow link to the local_login key ring. @@ -104262,7 +104711,7 @@ Domain allowed access. - + Execute single-user logins in the single-user login domain. @@ -105285,7 +105734,18 @@ Domain allowed access. - + + +Manage LVM runtime dirs. + + + +Domain allowed access. + + + + + All of the rules required to administrate an lvm environment. @@ -105327,9 +105787,9 @@ Example:

type mycertfile_t; -cert_type(mycertfile_t) +miscfiles_cert_type(mycertfile_t) allow mydomain_t mycertfile_t:file read_file_perms; -files_search_etc(mydomain_t) +miscfiles_search_generic_cert_dirs(mydomain_t)

@@ -105363,9 +105823,9 @@ Example:

type mytlsprivkeyfile_t; -tls_privkey_type(mytlsprivkeyfile_t) +miscfiles_tls_privkey_type(mytlsprivkeyfile_t) allow mydomain_t mytlsprivkeyfile_t:file read_file_perms; -files_search_etc(mydomain_t) +miscfiles_search_tls_privkey_dirs(mydomain_t)

@@ -105386,7 +105846,18 @@ Domain allowed access. - + + +Search generic SSL/TLS directories. + + + +Domain allowed access. + + + + + Read generic SSL/TLS certificates. @@ -105397,7 +105868,7 @@ Domain allowed access. - + Manage user-managed SSL certificates @@ -105407,7 +105878,7 @@ Domain allowed access
- + Do not audit attempts to read generic SSL/TLS certificates. @@ -105418,7 +105889,7 @@ Domain to not audit. - + Relabel from/to user_cert_t (user-managed SSL certificates) @@ -105428,7 +105899,7 @@ Domain allowed access - + Manage generic SSL/TLS certificates. @@ -105438,7 +105909,7 @@ Domain allowed access. - + Manage generic SSL/TLS certificates. @@ -105449,7 +105920,7 @@ Domain allowed access. - + Mount on generic SSL/TLS certificate directories. @@ -105460,7 +105931,18 @@ Domain allowed access. - + + +Search SSL/TLS private key directories. + + + +Domain allowed access. + + + + + Read generic SSL/TLS private keys. @@ -105472,7 +105954,7 @@ Domain allowed access. - + Manage generic SSL/TLS private keys. @@ -105483,7 +105965,7 @@ Domain allowed access. - + Manage generic SSL/TLS private keys. @@ -105495,7 +105977,7 @@ Domain allowed access. - + Manage generic SSL/TLS private keys. @@ -105507,7 +105989,7 @@ Domain allowed access. - + Read fonts. @@ -105518,7 +106000,7 @@ Domain allowed access. - + Set the attributes on a fonts directory. @@ -105529,7 +106011,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes on a fonts directory. @@ -105541,7 +106023,7 @@ Domain to not audit. - + Do not audit attempts to write fonts. @@ -105552,7 +106034,7 @@ Domain to not audit. - + Create, read, write, and delete fonts. @@ -105563,7 +106045,7 @@ Domain allowed access. - + Watch fonts directories. @@ -105574,7 +106056,7 @@ Domain allowed access. - + Set the attributes on a fonts cache directory. @@ -105584,7 +106066,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes on a fonts cache directory. @@ -105595,7 +106077,7 @@ Domain to not audit. - + Create, read, write, and delete fonts cache. @@ -105606,7 +106088,7 @@ Domain allowed access. - + Read hardware identification data. @@ -105616,7 +106098,7 @@ Domain allowed access. - + Allow process to get the attributes of localization info @@ -105626,7 +106108,7 @@ Domain allowed access. - + Allow process to setattr localization info @@ -105636,7 +106118,7 @@ Domain allowed access. - + Allow process to read localization information. @@ -105658,7 +106140,7 @@ Domain allowed access. - + Allow process to write localization info @@ -105668,7 +106150,7 @@ Domain allowed access. - + Allow process to relabel localization info @@ -105678,7 +106160,7 @@ Domain allowed access. - + Allow process to read legacy time localization info @@ -105688,7 +106170,7 @@ Domain allowed access. - + Watch time localization info @@ -105698,7 +106180,7 @@ Domain allowed access. - + Search man pages. @@ -105708,7 +106190,7 @@ Domain allowed access. - + Do not audit attempts to search man pages. @@ -105718,7 +106200,7 @@ Domain to not audit. - + Read man pages @@ -105729,7 +106211,7 @@ Domain allowed access. - + Delete man pages @@ -105739,7 +106221,7 @@ Domain allowed access. - + Create, read, write, and delete man pages @@ -105749,7 +106231,7 @@ Domain allowed access. - + Read man cache content. @@ -105759,7 +106241,7 @@ Domain allowed access. - + Map man cache content. @@ -105769,7 +106251,7 @@ Domain allowed access. - + Create, read, write, and delete man cache content. @@ -105780,7 +106262,7 @@ Domain allowed access. - + Relabel from and to man cache. @@ -105790,7 +106272,7 @@ Domain allowed access. - + Search public directories. @@ -105800,7 +106282,7 @@ Domain allowed access. - + Read public files used for file transfer services. @@ -105812,7 +106294,7 @@ Domain allowed access. - + Create, read, write, and delete public files and directories used for file transfer services. @@ -105824,7 +106306,7 @@ Domain allowed access. - + Watch public files @@ -105834,7 +106316,7 @@ Domain allowed access. - + Mount on all public content directories. @@ -105844,7 +106326,7 @@ Domain allowed access. - + Mount on all public content files. @@ -105854,7 +106336,7 @@ Domain allowed access. - + Transition to the specified sensitivity when creating all public content objects. @@ -105865,7 +106347,7 @@ Domain allowed access. - + Read TeX data @@ -105875,7 +106357,7 @@ Domain allowed access. - + Execute TeX data programs in the caller domain. @@ -105885,7 +106367,7 @@ Domain allowed access. - + Let test files be an entry point for a specified domain. @@ -105896,7 +106378,7 @@ Domain allowed access. - + Read test files and directories. @@ -105906,7 +106388,7 @@ Domain allowed access. - + Execute test files. @@ -105916,7 +106398,7 @@ Domain allowed access. - + Create files in etc directories with localization file type. @@ -105927,7 +106409,7 @@ Domain allowed access. - + Create, read, write, and delete localization @@ -106368,7 +106850,18 @@ Role allowed access.
Policy for SELinux policy and userland applications. - + + +Send and receive messages from +selinux semanage dbus interface. + + + +Domain allowed access. + + + + Execute checkpolicy in the checkpolicy domain. @@ -106378,7 +106871,7 @@ Domain allowed to transition. - + Execute checkpolicy in the checkpolicy domain, and allow the specified role the checkpolicy domain, @@ -106396,7 +106889,7 @@ Role allowed access. - + Execute checkpolicy in the caller domain. @@ -106407,7 +106900,7 @@ Domain allowed access. - + Execute load_policy in the load_policy domain. @@ -106417,7 +106910,7 @@ Domain allowed to transition. - + Execute load_policy in the load_policy domain, and allow the specified role the load_policy domain, @@ -106435,7 +106928,7 @@ Role allowed access. - + Execute load_policy in the caller domain. @@ -106445,7 +106938,7 @@ Domain allowed access. - + Read the load_policy program file. @@ -106455,7 +106948,7 @@ Domain allowed access. - + Execute newrole in the newole domain. @@ -106465,7 +106958,7 @@ Domain allowed to transition. - + Execute newrole in the newrole domain, and allow the specified role the newrole domain, @@ -106483,7 +106976,7 @@ Role allowed access. - + Execute newrole in the caller domain. @@ -106493,7 +106986,7 @@ Domain allowed access. - + Do not audit the caller attempts to send a signal to newrole. @@ -106504,7 +106997,7 @@ Domain to not audit. - + Send a SIGCHLD signal to newrole. @@ -106524,7 +107017,7 @@ Domain allowed access. - + Inherit and use newrole file descriptors. @@ -106534,7 +107027,7 @@ Domain allowed access. - + Do not audit attempts to inherit and use newrole file descriptors. @@ -106545,7 +107038,7 @@ Domain to not audit. - + Execute run_init in the run_init domain. @@ -106555,7 +107048,7 @@ Domain allowed to transition. - + Execute file in the run_init domain. @@ -106576,7 +107069,7 @@ Type of entry file. - + Execute init scripts in the run_init domain. @@ -106592,7 +107085,7 @@ Domain allowed to transition. - + Execute run_init in the run_init domain, and allow the specified role the run_init domain, @@ -106610,7 +107103,7 @@ Role allowed access. - + Execute init scripts in the run_init domain, and allow the specified role the run_init domain, @@ -106637,7 +107130,7 @@ Role allowed access. - + Execute specified file in the run_init domain, and allow the specified role the run_init domain, @@ -106669,7 +107162,7 @@ Type of init script. - + Inherit and use run_init file descriptors. @@ -106679,7 +107172,7 @@ Domain allowed access. - + Execute setfiles in the setfiles domain. @@ -106689,7 +107182,7 @@ Domain allowed to transition. - + Execute setfiles in the setfiles domain, and allow the specified role the setfiles domain, @@ -106707,7 +107200,7 @@ Role allowed access. - + Execute setfiles in the caller domain. @@ -106717,7 +107210,7 @@ Domain allowed access. - + Do not audit attempts to execute setfiles. @@ -106727,7 +107220,7 @@ Domain to not audit. - + Do not audit attempts to search the SELinux configuration directory (/etc/selinux). @@ -106738,7 +107231,7 @@ Domain to not audit. - + Do not audit attempts to read the SELinux userland configuration (/etc/selinux). @@ -106749,7 +107242,7 @@ Domain to not audit. - + Read the general SELinux configuration files. @@ -106760,7 +107253,7 @@ Domain allowed access. - + Read and write the general SELinux configuration files. @@ -106771,7 +107264,7 @@ Domain allowed access. - + Create, read, write, and delete the general selinux configuration files. @@ -106783,7 +107276,7 @@ Domain allowed access. - + Create, read, write, and delete the general selinux configuration directories. @@ -106795,7 +107288,7 @@ Domain allowed access. - + Search the policy directory with default_context files. @@ -106805,7 +107298,7 @@ Domain allowed access. - + Read the default_contexts files. @@ -106816,7 +107309,7 @@ Domain allowed access. - + Create, read, write, and delete the default_contexts files. @@ -106826,7 +107319,7 @@ Domain allowed access. - + Read the file_contexts files. @@ -106837,7 +107330,7 @@ Domain allowed access. - + Do not audit attempts to read the file_contexts files. @@ -106848,7 +107341,7 @@ Domain to not audit. - + Read and write the file_contexts files. @@ -106858,7 +107351,7 @@ Domain allowed access. - + Create, read, write, and delete the file_contexts files. @@ -106869,7 +107362,7 @@ Domain allowed access. - + Read the SELinux binary policy. @@ -106879,7 +107372,7 @@ Domain allowed access. - + Create the SELinux binary policy. @@ -106889,7 +107382,7 @@ Domain allowed access. - + Allow the caller to relabel a file to the binary policy type. @@ -106899,7 +107392,7 @@ Domain allowed access. - + Create, read, write, and delete the SELinux binary policy. @@ -106910,7 +107403,7 @@ Domain allowed access. - + Read SELinux policy source files. @@ -106920,7 +107413,7 @@ Domain allowed access. - + Create, read, write, and delete SELinux policy source files. @@ -106932,7 +107425,7 @@ Domain allowed access. - + Execute a domain transition to run semanage. @@ -106942,7 +107435,7 @@ Domain allowed to transition. - + Execute semanage in the semanage domain, and allow the specified role the semanage domain, @@ -106960,7 +107453,7 @@ Role allowed access. - + Do not audit attempts to execute semanage. @@ -106970,7 +107463,7 @@ Domain to not audit. - + Read the semanage module store. @@ -106980,7 +107473,7 @@ Domain allowed access. - + Full management of the semanage module store. @@ -106991,7 +107484,7 @@ Domain allowed access. - + Get read lock on module store @@ -107001,7 +107494,7 @@ Domain allowed access. - + Get trans lock on module store @@ -107011,7 +107504,7 @@ Domain allowed access. - + SELinux-enabled program access for libselinux-linked programs. @@ -107030,7 +107523,7 @@ Domain allowed access. - + Do not audit SELinux-enabled program access for libselinux-linked programs. @@ -107658,7 +108151,7 @@ Domain allowed access. Make the specified program domain -accessable from the DHCP hooks/scripts. +accessible from the DHCP hooks/scripts. @@ -107702,7 +108195,7 @@ The user domain for the role. -