diff --git a/doc/policy.xml b/doc/policy.xml index e96f1ea28..8ae22432d 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -58392,7 +58392,17 @@ Domain allow access. - + + +unmount a sysfs filesystem + + + +Domain allowed access. + + + + Do not audit getting the attributes of sysfs filesystem @@ -58402,7 +58412,7 @@ Domain to dontaudit access from - + Dont audit attempts to read hardware state information @@ -58412,7 +58422,7 @@ Domain for which the attempts do not need to be audited - + Mount on sysfs directories. @@ -58422,7 +58432,7 @@ Domain allowed access. - + Search the sysfs directories. @@ -58432,7 +58442,7 @@ Domain allowed access. - + Do not audit attempts to search sysfs. @@ -58442,7 +58452,7 @@ Domain to not audit. - + List the contents of the sysfs directories. @@ -58452,7 +58462,7 @@ Domain allowed access. - + Write in a sysfs directories. @@ -58462,7 +58472,7 @@ Domain allowed access. - + Do not audit attempts to write in a sysfs directory. @@ -58472,7 +58482,7 @@ Domain to not audit. - + Do not audit attempts to write to a sysfs file. @@ -58482,7 +58492,7 @@ Domain to not audit. - + Create, read, write, and delete sysfs directories. @@ -58493,7 +58503,7 @@ Domain allowed access. - + Read hardware state information. @@ -58512,7 +58522,7 @@ Domain allowed access. - + Write to hardware state information. @@ -58529,7 +58539,7 @@ Domain allowed access. - + Allow caller to modify hardware state information. @@ -58539,7 +58549,7 @@ Domain allowed access. - + Add a sysfs file @@ -58549,7 +58559,7 @@ Domain allowed access. - + Relabel hardware state directories. @@ -58559,7 +58569,7 @@ Domain allowed access. - + Relabel from/to all sysfs types. @@ -58569,7 +58579,7 @@ Domain allowed access. - + Set the attributes of sysfs files, directories and symlinks. @@ -58579,7 +58589,7 @@ Domain allowed access. - + Read and write the TPM device. @@ -58589,7 +58599,7 @@ Domain allowed access. - + Read from pseudo random number generator devices (e.g., /dev/urandom). @@ -58622,7 +58632,7 @@ Domain allowed access. - + Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) @@ -58633,7 +58643,7 @@ Domain to not audit. - + Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. @@ -58644,7 +58654,7 @@ Domain allowed access. - + Create the urandom device (/dev/urandom). @@ -58654,7 +58664,7 @@ Domain allowed access. - + Set attributes on the urandom device (/dev/urandom). @@ -58664,7 +58674,7 @@ Domain allowed access. - + Getattr generic the USB devices. @@ -58674,7 +58684,7 @@ Domain allowed access. - + Setattr generic the USB devices. @@ -58684,7 +58694,7 @@ Domain allowed access. - + Read generic the USB devices. @@ -58694,7 +58704,7 @@ Domain allowed access. - + Read and write generic the USB devices. @@ -58704,7 +58714,7 @@ Domain allowed access. - + Relabel generic the USB devices. @@ -58714,7 +58724,7 @@ Domain allowed access. - + Read USB monitor devices. @@ -58724,7 +58734,7 @@ Domain allowed access. - + Write USB monitor devices. @@ -58734,7 +58744,7 @@ Domain allowed access. - + Mount a usbfs filesystem. @@ -58744,7 +58754,7 @@ Domain allowed access. - + Associate a file to a usbfs filesystem. @@ -58754,7 +58764,7 @@ The type of the file to be associated to usbfs. - + Get the attributes of a directory in the usb filesystem. @@ -58764,7 +58774,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of a directory in the usb filesystem. @@ -58775,7 +58785,7 @@ Domain to not audit. - + Search the directory containing USB hardware information. @@ -58785,7 +58795,7 @@ Domain allowed access. - + Allow caller to get a list of usb hardware. @@ -58795,7 +58805,7 @@ Domain allowed access. - + Set the attributes of usbfs filesystem. @@ -58805,7 +58815,7 @@ Domain allowed access. - + Read USB hardware information using the usbfs filesystem interface. @@ -58816,7 +58826,7 @@ Domain allowed access. - + Allow caller to modify usb hardware configuration files. @@ -58826,7 +58836,7 @@ Domain allowed access. - + Get the attributes of video4linux devices. @@ -58836,7 +58846,7 @@ Domain allowed access. - + Read and write userio device. @@ -58846,7 +58856,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of video4linux device nodes. @@ -58857,7 +58867,7 @@ Domain to not audit. - + Set the attributes of video4linux device nodes. @@ -58867,7 +58877,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of video4linux device nodes. @@ -58878,7 +58888,7 @@ Domain to not audit. - + Read the video4linux devices. @@ -58888,7 +58898,7 @@ Domain allowed access. - + Write the video4linux devices. @@ -58898,7 +58908,7 @@ Domain allowed access. - + Read and write vfio devices. @@ -58908,7 +58918,7 @@ Domain allowed access. - + Relabel vfio devices. @@ -58918,7 +58928,7 @@ Domain allowed access. - + Allow read/write the vhost devices @@ -58928,7 +58938,7 @@ Domain allowed access. - + Read and write VMWare devices. @@ -58938,7 +58948,7 @@ Domain allowed access. - + Read, write, and mmap VMWare devices. @@ -58948,7 +58958,7 @@ Domain allowed access. - + Read from watchdog devices. @@ -58958,7 +58968,7 @@ Domain allowed access. - + Write to watchdog devices. @@ -58968,7 +58978,7 @@ Domain allowed access. - + Read the wireless device. @@ -58978,7 +58988,7 @@ Domain allowed access. - + Read and write the the wireless device. @@ -58988,7 +58998,7 @@ Domain allowed access. - + manage the wireless device. @@ -58998,7 +59008,7 @@ Domain allowed access. - + Read and write Xen devices. @@ -59008,7 +59018,7 @@ Domain allowed access. - + Create, read, write, and delete Xen devices. @@ -59018,7 +59028,7 @@ Domain allowed access. - + Automatic type transition to the type for xen device nodes when created in /dev. @@ -59034,7 +59044,7 @@ The name of the object being created. - + Get the attributes of X server miscellaneous devices. @@ -59044,7 +59054,7 @@ Domain allowed access. - + Set the attributes of X server miscellaneous devices. @@ -59054,7 +59064,7 @@ Domain allowed access. - + Read and write X server miscellaneous devices. @@ -59064,7 +59074,7 @@ Domain allowed access. - + Map X server miscellaneous devices. @@ -59074,7 +59084,7 @@ Domain allowed access. - + Read and write to the zero device (/dev/zero). @@ -59084,7 +59094,7 @@ Domain allowed access. - + Read, write, and execute the zero device (/dev/zero). @@ -59094,7 +59104,7 @@ Domain allowed access. - + Execmod the zero device (/dev/zero). @@ -59104,7 +59114,7 @@ Domain allowed access. - + Create the zero device (/dev/zero). @@ -59114,7 +59124,7 @@ Domain allowed access. - + Read cpu online hardware state information @@ -59129,7 +59139,7 @@ Domain allowed access. - + Read and write to the gpiochip device, /dev/gpiochip[0-9] @@ -59139,7 +59149,7 @@ Domain allowed access. - + Unconfined access to devices. @@ -59149,7 +59159,7 @@ Domain allowed access. - + Relabel cpu online hardware state information. @@ -59159,7 +59169,7 @@ Domain allowed access. - + Dont audit attempts to read usbmon devices @@ -63491,7 +63501,17 @@ Domain allowed access. - + + +Mount on a system.map in the /boot directory (for bind mounts). + + + +Domain allowed access. + + + + Search the contents of /var. @@ -63501,7 +63521,7 @@ Domain allowed access. - + Do not audit attempts to write to /var. @@ -63511,7 +63531,7 @@ Domain to not audit. - + Allow attempts to write to /var.dirs @@ -63521,7 +63541,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of /var. @@ -63532,7 +63552,7 @@ Domain to not audit. - + List the contents of /var. @@ -63542,7 +63562,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of /var. @@ -63553,7 +63573,7 @@ Domain to not audit. - + Create, read, write, and delete directories in the /var directory. @@ -63564,7 +63584,7 @@ Domain allowed access. - + relabelto/from var directories @@ -63574,7 +63594,7 @@ Domain allowed access. - + Read files in the /var directory. @@ -63584,7 +63604,7 @@ Domain allowed access. - + Append files in the /var directory. @@ -63594,7 +63614,7 @@ Domain allowed access. - + Read and write files in the /var directory. @@ -63604,7 +63624,7 @@ Domain allowed access. - + Do not audit attempts to read and write files in the /var directory. @@ -63615,7 +63635,7 @@ Domain to not audit. - + Create, read, write, and delete files in the /var directory. @@ -63625,7 +63645,7 @@ Domain allowed access. - + Read symbolic links in the /var directory. @@ -63635,7 +63655,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in the /var directory. @@ -63646,7 +63666,7 @@ Domain allowed access. - + Create objects in the /var directory @@ -63671,7 +63691,7 @@ The name of the object being created. - + Get the attributes of the /var/lib directory. @@ -63681,7 +63701,7 @@ Domain allowed access. - + Search the /var/lib directory. @@ -63705,7 +63725,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of /var/lib. @@ -63717,7 +63737,7 @@ Domain to not audit. - + List the contents of the /var/lib directory. @@ -63727,7 +63747,7 @@ Domain allowed access. - + Read-write /var/lib directories @@ -63737,7 +63757,7 @@ Domain allowed access. - + manage var_lib_t dirs @@ -63747,7 +63767,7 @@ Domain allowed access. - + relabel var_lib_t dirs @@ -63757,7 +63777,7 @@ Domain allowed access. - + Create objects in the /var/lib directory @@ -63782,7 +63802,7 @@ The name of the object being created. - + Read generic files in /var/lib. @@ -63792,7 +63812,7 @@ Domain allowed access. - + Read generic symbolic links in /var/lib @@ -63802,7 +63822,7 @@ Domain allowed access. - + Create, read, write, and delete the pseudorandom number generator seed. @@ -63813,7 +63833,7 @@ Domain allowed access. - + Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -63824,7 +63844,7 @@ Domain allowed access. - + Set the attributes of the generic lock directories. @@ -63834,7 +63854,7 @@ Domain allowed access. - + Search the locks directory (/var/lock). @@ -63844,7 +63864,7 @@ Domain allowed access. - + Do not audit attempts to search the locks directory (/var/lock). @@ -63855,7 +63875,7 @@ Domain to not audit. - + List generic lock directories. @@ -63865,7 +63885,7 @@ Domain allowed access. - + Test write access on lock directories. @@ -63875,7 +63895,7 @@ Domain allowed access. - + Add entries in the /var/lock directories. @@ -63885,7 +63905,7 @@ Domain allowed access. - + Add and remove entries in the /var/lock directories. @@ -63896,7 +63916,7 @@ Domain allowed access. - + Create lock directories @@ -63906,7 +63926,7 @@ Domain allowed access - + Relabel to and from all lock directory types. @@ -63917,7 +63937,7 @@ Domain allowed access. - + Get the attributes of generic lock files. @@ -63927,7 +63947,7 @@ Domain allowed access. - + Delete generic lock files. @@ -63937,7 +63957,7 @@ Domain allowed access. - + Create, read, write, and delete generic lock files. @@ -63948,7 +63968,7 @@ Domain allowed access. - + Delete all lock files. @@ -63959,7 +63979,7 @@ Domain allowed access. - + Read all lock files. @@ -63969,7 +63989,7 @@ Domain allowed access. - + manage all lock files. @@ -63979,7 +63999,7 @@ Domain allowed access. - + Relabel from/to all lock files. @@ -63989,7 +64009,7 @@ Domain allowed access. - + Create an object in the locks directory, with a private type using a type transition. @@ -64015,7 +64035,7 @@ The name of the object being created. - + Do not audit attempts to get the attributes of the /var/run directory. @@ -64026,7 +64046,7 @@ Domain to not audit. - + mounton a /var/run directory. @@ -64036,7 +64056,7 @@ Domain allowed access. - + Set the attributes of the /var/run directory. @@ -64046,7 +64066,7 @@ Domain allowed access. - + Search the contents of runtime process ID directories (/var/run). @@ -64057,7 +64077,7 @@ Domain allowed access. - + Do not audit attempts to search the /var/run directory. @@ -64068,7 +64088,7 @@ Domain to not audit. - + List the contents of the runtime process ID directories (/var/run). @@ -64079,7 +64099,7 @@ Domain allowed access. - + Check write access on /var/run directories. @@ -64089,7 +64109,7 @@ Domain allowed access. - + Create a /var/run directory. @@ -64099,7 +64119,7 @@ Domain allowed access. - + Read and write a /var/run directory. @@ -64109,7 +64129,7 @@ Domain allowed access. - + Watch /var/run directories. @@ -64119,7 +64139,7 @@ Domain allowed access. - + Read generic runtime files. @@ -64129,7 +64149,7 @@ Domain allowed access. - + Execute generic programs in /var/run in the caller domain. @@ -64139,7 +64159,7 @@ Domain allowed access. - + Read and write generic runtime files. @@ -64149,7 +64169,7 @@ Domain allowed access. - + Delete generic runtime symlinks. @@ -64159,7 +64179,7 @@ Domain allowed access. - + Write named generic runtime pipes. @@ -64169,7 +64189,7 @@ Domain allowed access. - + Delete all runtime dirs. @@ -64180,7 +64200,7 @@ Domain allowed access. - + Create, read, write, and delete all runtime directories. @@ -64190,7 +64210,7 @@ Domain allowed access. - + Relabel all runtime directories. @@ -64200,7 +64220,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all runtime data files. @@ -64211,7 +64231,7 @@ Domain to not audit. - + Read all runtime files. @@ -64222,7 +64242,7 @@ Domain allowed access. - + Do not audit attempts to ioctl all runtime files. @@ -64232,7 +64252,7 @@ Domain to not audit. - + Do not audit attempts to write to all runtime files. @@ -64242,7 +64262,7 @@ Domain to not audit. - + Delete all runtime files. @@ -64253,7 +64273,7 @@ Domain allowed access. - + Create, read, write and delete all var_run (pid) files @@ -64264,7 +64284,7 @@ Domain allowed access. - + Relabel all runtime files. @@ -64274,7 +64294,7 @@ Domain allowed access. - + Delete all runtime symlinks. @@ -64285,7 +64305,7 @@ Domain allowed access. - + Create, read, write and delete all var_run (pid) symbolic links. @@ -64296,7 +64316,7 @@ Domain allowed access. - + Relabel all runtime symbolic links. @@ -64306,7 +64326,7 @@ Domain allowed access. - + Create all runtime named pipes @@ -64316,7 +64336,7 @@ Domain allowed access. - + Delete all runtime named pipes @@ -64326,7 +64346,7 @@ Domain allowed access. - + Create all runtime sockets. @@ -64336,7 +64356,7 @@ Domain allowed access. - + Delete all runtime sockets. @@ -64346,7 +64366,7 @@ Domain allowed access. - + Relabel all runtime named sockets. @@ -64356,7 +64376,7 @@ Domain allowed access. - + Create an object in the /run directory, with a private type. @@ -64408,7 +64428,7 @@ The name of the object being created. - + Create a generic lock directory within the run directories. @@ -64423,7 +64443,7 @@ The name of the object being created. - + Create all spool sockets @@ -64433,7 +64453,7 @@ Domain allowed access. - + Delete all spool sockets @@ -64443,7 +64463,7 @@ Domain allowed access. - + Mount filesystems on all polyinstantiation member directories. @@ -64454,7 +64474,7 @@ Domain allowed access. - + Search the contents of generic spool directories (/var/spool). @@ -64465,7 +64485,7 @@ Domain allowed access. - + Do not audit attempts to search generic spool directories. @@ -64476,7 +64496,7 @@ Domain to not audit. - + List the contents of generic spool (/var/spool) directories. @@ -64487,7 +64507,7 @@ Domain allowed access. - + Create, read, write, and delete generic spool directories (/var/spool). @@ -64498,7 +64518,7 @@ Domain allowed access. - + Read generic spool files. @@ -64508,7 +64528,7 @@ Domain allowed access. - + Create, read, write, and delete generic spool files. @@ -64519,7 +64539,7 @@ Domain allowed access. - + Create objects in the spool directory with a private type with a type transition. @@ -64546,7 +64566,7 @@ The name of the object being created. - + Allow access to manage all polyinstantiated directories on the system. @@ -64557,7 +64577,7 @@ Domain allowed access. - + Unconfined access to files. @@ -64567,7 +64587,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -64579,7 +64599,7 @@ Domain allowed access. - + Do not audit attempts to read etc_runtime resources @@ -64589,7 +64609,7 @@ Domain allowed access. - + List usr/src files @@ -64599,7 +64619,7 @@ Domain allowed access - + Read usr/src files @@ -64609,7 +64629,7 @@ Domain allowed access - + Manage /usr/src files @@ -64619,7 +64639,7 @@ Domain allowed access - + Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -64641,7 +64661,7 @@ Optional name of the resource - + Read etc runtime resources @@ -64651,7 +64671,7 @@ Domain allowed access - + Allow relabel from and to non-security types @@ -64662,7 +64682,7 @@ Domain allowed access. - + Manage non-security-sensitive resource types @@ -64673,7 +64693,7 @@ Domain allowed access. - + Allow relabeling from and to any pidfile associated type @@ -71602,7 +71622,17 @@ Domain allowed access. - + + +Mount on the selinuxfs filesystem. + + + +Domain allowed access. + + + + Get the attributes of the selinuxfs filesystem @@ -71612,7 +71642,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the selinuxfs filesystem @@ -71623,7 +71653,7 @@ Domain to not audit. - + Get the attributes of the selinuxfs directory. @@ -71634,7 +71664,7 @@ Domain to not audit. - + Do not audit attempts to get the attributes of the selinuxfs directory. @@ -71645,7 +71675,7 @@ Domain to not audit. - + Search selinuxfs. @@ -71655,7 +71685,7 @@ Domain allowed access. - + Do not audit attempts to search selinuxfs. @@ -71665,7 +71695,7 @@ Domain to not audit. - + Do not audit attempts to read generic selinuxfs entries @@ -71676,7 +71706,7 @@ Domain to not audit. - + Mount on the selinuxfs directory. @@ -71686,7 +71716,7 @@ Domain allowed access. - + Allows the caller to get the mode of policy enforcement (enforcing or permissive mode). @@ -71698,7 +71728,7 @@ Domain allowed access. - + Allow caller to set the mode of policy enforcement (enforcing or permissive mode). @@ -71720,7 +71750,7 @@ Domain allowed access. - + Allow caller to load the policy into the kernel. @@ -71730,7 +71760,7 @@ Domain allowed access. - + Allow caller to read the policy from the kernel. @@ -71740,7 +71770,7 @@ Domain allowed access. - + Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy. @@ -71762,7 +71792,7 @@ Domain allowed access. - + Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy. @@ -71784,7 +71814,7 @@ Domain allowed access. - + Allow caller to get the state of all Booleans to view conditional portions of the policy. @@ -71796,7 +71826,7 @@ Domain allowed access. - + Allow caller to set SELinux access vector cache parameters. @@ -71818,7 +71848,7 @@ Domain allowed access. - + Allows caller to validate security contexts. @@ -71829,7 +71859,7 @@ Domain allowed access. - + Do not audit attempts to validate security contexts. @@ -71840,7 +71870,7 @@ Domain to not audit. - + Allows caller to compute an access vector. @@ -71851,7 +71881,7 @@ Domain allowed access. - + Calculate the default type for object creation. @@ -71862,7 +71892,7 @@ Domain allowed access. - + Allows caller to compute polyinstatntiated directory members. @@ -71873,7 +71903,7 @@ Domain allowed access. - + Calculate the context for relabeling objects. @@ -71892,7 +71922,7 @@ Domain allowed access. - + Allows caller to compute possible contexts for a user. @@ -71902,7 +71932,7 @@ Domain allowed access. - + Allows the caller to use the SELinux status page. @@ -71913,7 +71943,7 @@ Domain allowed access. - + Unconfined access to the SELinux kernel security server. @@ -106810,7 +106840,7 @@ The user domain for the role. -