diff --git a/doc/policy.xml b/doc/policy.xml
index 8ae22432d..3966b1186 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -942,7 +942,17 @@ Role allowed access.
Init scripts for cloud VMs
-
+
+
+Read and write inherited cloud-init pipes.
+
+
+
+Domain allowed access.
+
+
+
+
Create cloud-init runtime directory.
@@ -952,7 +962,7 @@ Domain allowed access.
-
+
Write cloud-init runtime files.
@@ -962,7 +972,17 @@ Domain allowed access.
-
+
+
+Read and write cloud-init runtime files.
+
+
+
+Domain allowed access.
+
+
+
+
Create cloud-init runtime files.
@@ -972,7 +992,7 @@ Domain allowed access.
-
+
Create files in /run with the type used for
cloud-init runtime files.
@@ -993,7 +1013,7 @@ The name of the object being created.
-
+
Get the attribute of cloud-init state files.
@@ -1003,6 +1023,43 @@ Domain allowed access.
+
+
+Write inherited cloud-init temporary files.
+
+
+
+Domain allowed access.
+
+
+
+
+
+Read and write cloud-init temporary files.
+
+
+
+Domain allowed access.
+
+
+
+
+
+Create cloud-init temporary files.
+
+
+
+Domain allowed access.
+
+
+
+
+
+
+Enable support for cloud-init to manage all non-security files.
+
+
+
@@ -3197,7 +3254,17 @@ Domain allowed access.
-
+
+
+Read rpm temporary files.
+
+
+
+Domain allowed access.
+
+
+
+
Append rpm temporary files.
@@ -3207,7 +3274,7 @@ Domain allowed access.
-
+
Create, read, write, and delete
rpm temporary files.
@@ -3218,7 +3285,7 @@ Domain allowed access.
-
+
Read rpm script temporary files.
@@ -3228,7 +3295,7 @@ Domain allowed access.
-
+
Read rpm cache content.
@@ -3238,7 +3305,7 @@ Domain allowed access.
-
+
Create, read, write, and delete
rpm cache content.
@@ -3249,7 +3316,7 @@ Domain allowed access.
-
+
Read rpm lib content.
@@ -3259,7 +3326,7 @@ Domain allowed access.
-
+
Delete rpm lib files.
@@ -3269,7 +3336,7 @@ Domain allowed access.
-
+
Create, read, write, and delete
rpm lib files.
@@ -3280,7 +3347,7 @@ Domain allowed access.
-
+
Do not audit attempts to create, read,
write, and delete rpm lib content.
@@ -3291,7 +3358,7 @@ Domain to not audit.
-
+
Create, read, write, and delete
rpm runtime files.
@@ -3302,7 +3369,7 @@ Domain allowed access.
-
+
All of the rules required to
administrate an rpm environment.
@@ -3751,7 +3818,7 @@ The role associated with the user domain.
-
+
The role template for the su module.
@@ -3777,7 +3844,7 @@ Role allowed access
-
+
Execute su in the caller domain.
@@ -3833,7 +3900,7 @@ Role allowed access
-
+
Send a SIGCHLD signal to the sudo domain.
@@ -3843,6 +3910,16 @@ Domain allowed access.
+
+
+Execute sudo in the caller domain.
+
+
+
+Domain allowed access.
+
+
+
@@ -4661,7 +4738,7 @@ Domain allowed access
-
+
Execute chromium in the chromium domain and allow the specified role to access the chromium domain
@@ -10451,7 +10528,18 @@ Domain allowed access.
-
+
+
+Mmap read-only all executable files.
+
+
+
+Domain allowed access.
+
+
+
+
+
Execute all executable files.
@@ -10462,7 +10550,7 @@ Domain allowed access.
-
+
Do not audit attempts to execute all executables.
@@ -10472,7 +10560,7 @@ Domain to not audit.
-
+
Create, read, write, and all executable files.
@@ -10483,7 +10571,7 @@ Domain allowed access.
-
+
Relabel to and from the bin type.
@@ -10494,7 +10582,7 @@ Domain allowed access.
-
+
Mmap all executables as executable.
@@ -10504,7 +10592,7 @@ Domain allowed access.
-
+
Relabel to and from the bin type.
@@ -10514,7 +10602,7 @@ Domain allowed access.
-
+
Relabel to and from the bin type.
@@ -56085,7 +56173,17 @@ Domain to not audit.
-
+
+
+Dontaudit attempts to execute device nodes.
+
+
+
+Domain to not audit.
+
+
+
+
Add entries to directories in /dev.
@@ -56095,7 +56193,7 @@ Domain allowed access.
-
+
Remove entries from directories in /dev.
@@ -56105,7 +56203,7 @@ Domain allowed access.
-
+
Create a directory in the device directory.
@@ -56115,7 +56213,7 @@ Domain allowed access.
-
+
Delete a directory in the device directory.
@@ -56125,7 +56223,7 @@ Domain allowed access.
-
+
Manage of directories in /dev.
@@ -56135,7 +56233,7 @@ Domain allowed access.
-
+
Allow full relabeling (to and from) of directories in /dev.
@@ -56145,7 +56243,7 @@ Domain allowed access.
-
+
dontaudit getattr generic files in /dev.
@@ -56155,7 +56253,7 @@ Domain to not audit.
-
+
Read generic files in /dev.
@@ -56165,7 +56263,7 @@ Domain to not audit.
-
+
Read and write generic files in /dev.
@@ -56175,7 +56273,7 @@ Domain allowed access.
-
+
Delete generic files in /dev.
@@ -56185,7 +56283,7 @@ Domain allowed access.
-
+
Create a file in the device directory.
@@ -56195,7 +56293,7 @@ Domain allowed access.
-
+
Dontaudit getattr on generic pipes.
@@ -56205,7 +56303,7 @@ Domain to not audit.
-
+
Write generic socket files in /dev.
@@ -56215,7 +56313,7 @@ Domain to not audit.
-
+
Allow getattr on generic block devices.
@@ -56225,7 +56323,7 @@ Domain allowed access.
-
+
Dontaudit getattr on generic block devices.
@@ -56235,7 +56333,7 @@ Domain to not audit.
-
+
Set the attributes on generic
block devices.
@@ -56246,7 +56344,7 @@ Domain allowed access.
-
+
Dontaudit setattr on generic block devices.
@@ -56256,7 +56354,7 @@ Domain to not audit.
-
+
Create generic block device files.
@@ -56266,7 +56364,7 @@ Domain allowed access.
-
+
Delete generic block device files.
@@ -56276,7 +56374,18 @@ Domain allowed access.
-
+
+
+Dontaudit relabelto the generic device
+type on block files.
+
+
+
+Domain to not audit.
+
+
+
+
Allow getattr for generic character device files.
@@ -56286,7 +56395,7 @@ Domain allowed access.
-
+
Dontaudit getattr for generic character device files.
@@ -56296,7 +56405,7 @@ Domain to not audit.
-
+
Set the attributes for generic
character device files.
@@ -56307,7 +56416,7 @@ Domain allowed access.
-
+
Dontaudit setattr for generic character device files.
@@ -56317,7 +56426,7 @@ Domain to not audit.
-
+
Read generic character device files.
@@ -56327,7 +56436,7 @@ Domain allowed access.
-
+
Read and write generic character device files.
@@ -56337,7 +56446,7 @@ Domain allowed access.
-
+
Read and write generic block device files.
@@ -56347,7 +56456,7 @@ Domain allowed access.
-
+
Dontaudit attempts to read/write generic character device files.
@@ -56357,7 +56466,7 @@ Domain to dontaudit access.
-
+
Create generic character device files.
@@ -56367,7 +56476,7 @@ Domain allowed access.
-
+
Delete generic character device files.
@@ -56377,7 +56486,7 @@ Domain allowed access.
-
+
Relabel from generic character device files.
@@ -56387,7 +56496,7 @@ Domain allowed access.
-
+
Do not audit attempts to set the attributes
of symbolic links in device directories (/dev).
@@ -56398,7 +56507,7 @@ Domain to not audit.
-
+
Read symbolic links in device directories.
@@ -56408,7 +56517,7 @@ Domain allowed access.
-
+
Create symbolic links in device directories.
@@ -56418,7 +56527,7 @@ Domain allowed access.
-
+
Delete symbolic links in device directories.
@@ -56428,7 +56537,7 @@ Domain allowed access.
-
+
Create, delete, read, and write symbolic links in device directories.
@@ -56438,7 +56547,7 @@ Domain allowed access.
-
+
Relabel symbolic links in device directories.
@@ -56448,7 +56557,7 @@ Domain allowed access.
-
+
Write generic sock files in /dev.
@@ -56458,7 +56567,7 @@ Domain allowed access.
-
+
Create, delete, read, and write device nodes in device directories.
@@ -56468,7 +56577,7 @@ Domain allowed access.
-
+
Dontaudit getattr for generic device files.
@@ -56478,7 +56587,7 @@ Domain to not audit.
-
+
Create, delete, read, and write block device files.
@@ -56488,7 +56597,7 @@ Domain allowed access.
-
+
Create, delete, read, and write character device files.
@@ -56498,7 +56607,7 @@ Domain allowed access.
-
+
Create, read, and write device nodes. The node
will be transitioned to the type provided.
@@ -56525,7 +56634,7 @@ The name of the object being created.
-
+
Create, read, and write device nodes. The node
will be transitioned to the type provided. This is
@@ -56549,7 +56658,7 @@ The name of the object being created.
-
+
Getattr on all block file device nodes.
@@ -56560,7 +56669,7 @@ Domain allowed access.
-
+
Dontaudit getattr on all block file device nodes.
@@ -56570,7 +56679,7 @@ Domain to not audit.
-
+
Getattr on all character file device nodes.
@@ -56581,7 +56690,7 @@ Domain allowed access.
-
+
Dontaudit getattr on all character file device nodes.
@@ -56591,7 +56700,7 @@ Domain to not audit.
-
+
Setattr on all block file device nodes.
@@ -56602,7 +56711,7 @@ Domain allowed access.
-
+
Setattr on all character file device nodes.
@@ -56613,7 +56722,7 @@ Domain allowed access.
-
+
Dontaudit read on all block file device nodes.
@@ -56623,7 +56732,7 @@ Domain to not audit.
-
+
Dontaudit write on all block file device nodes.
@@ -56633,7 +56742,7 @@ Domain to not audit.
-
+
Dontaudit read on all character file device nodes.
@@ -56643,7 +56752,7 @@ Domain to not audit.
-
+
Dontaudit write on all character file device nodes.
@@ -56653,7 +56762,7 @@ Domain to not audit.
-
+
Create all block device files.
@@ -56663,7 +56772,7 @@ Domain allowed access.
-
+
Create all character device files.
@@ -56673,7 +56782,7 @@ Domain allowed access.
-
+
Delete all block device files.
@@ -56683,7 +56792,7 @@ Domain allowed access.
-
+
Delete all character device files.
@@ -56693,7 +56802,7 @@ Domain allowed access.
-
+
Rename all block device files.
@@ -56703,7 +56812,7 @@ Domain allowed access.
-
+
Rename all character device files.
@@ -56713,7 +56822,7 @@ Domain allowed access.
-
+
Read, write, create, and delete all block device files.
@@ -56723,7 +56832,7 @@ Domain allowed access.
-
+
Read, write, create, and delete all character device files.
@@ -56733,7 +56842,7 @@ Domain allowed access.
-
+
Get the attributes of the apm bios device node.
@@ -56743,7 +56852,7 @@ Domain allowed access.
-
+
Do not audit attempts to get the attributes of
the apm bios device node.
@@ -56754,7 +56863,7 @@ Domain to not audit.
-
+
Set the attributes of the apm bios device node.
@@ -56764,7 +56873,7 @@ Domain allowed access.
-
+
Do not audit attempts to set the attributes of
the apm bios device node.
@@ -56775,7 +56884,7 @@ Domain to not audit.
-
+
Read and write the apm bios.
@@ -56785,7 +56894,7 @@ Domain allowed access.
-
+
Getattr the agp devices.
@@ -56795,7 +56904,7 @@ Domain allowed access.
-
+
Read and write the agp devices.
@@ -56805,7 +56914,7 @@ Domain allowed access.
-
+
Get the attributes of the autofs device node.
@@ -56815,7 +56924,7 @@ Domain allowed access.
-
+
Do not audit attempts to get the attributes of
the autofs device node.
@@ -56826,7 +56935,7 @@ Domain to not audit.
-
+
Set the attributes of the autofs device node.
@@ -56836,7 +56945,7 @@ Domain allowed access.
-
+
Do not audit attempts to set the attributes of
the autofs device node.
@@ -56847,7 +56956,7 @@ Domain to not audit.
-
+
Read and write the autofs device.
@@ -56857,7 +56966,7 @@ Domain allowed access.
-
+
Relabel the autofs device node.
@@ -56867,7 +56976,7 @@ Domain allowed access.
-
+
Read and write cachefiles character
device nodes.
@@ -56878,7 +56987,7 @@ Domain allowed access.
-
+
Read and write the PCMCIA card manager device.
@@ -56888,7 +56997,7 @@ Domain allowed access.
-
+
Do not audit attempts to read and
write the PCMCIA card manager device.
@@ -56899,7 +57008,7 @@ Domain to not audit.
-
+
Create, read, write, and delete
the PCMCIA card manager device
@@ -56911,7 +57020,7 @@ Domain allowed access.
-
+
Create, read, write, and delete
the PCMCIA card manager device.
@@ -56922,7 +57031,7 @@ Domain allowed access.
-
+
Automatic type transition to the type
for PCMCIA card manager device nodes when
@@ -56939,7 +57048,7 @@ The name of the object being created.
-
+
Get the attributes of the CPU
microcode and id interfaces.
@@ -56950,7 +57059,7 @@ Domain allowed access.
-
+
Set the attributes of the CPU
microcode and id interfaces.
@@ -56961,7 +57070,7 @@ Domain allowed access.
-
+
Read the CPU identity.
@@ -56971,7 +57080,7 @@ Domain allowed access.
-
+
Read and write the the CPU microcode device. This
is required to load CPU microcode.
@@ -56982,7 +57091,7 @@ Domain allowed access.
-
+
Read the kernel crash device
@@ -56992,7 +57101,7 @@ Domain allowed access.
-
+
Read and write the the hardware SSL accelerator.
@@ -57002,7 +57111,7 @@ Domain allowed access.
-
+
Set the attributes of the dlm control devices.
@@ -57012,7 +57121,7 @@ Domain allowed access.
-
+
Read and write the the dlm control device
@@ -57022,7 +57131,7 @@ Domain allowed access.
-
+
getattr the dri devices.
@@ -57032,7 +57141,7 @@ Domain allowed access.
-
+
Setattr the dri devices.
@@ -57042,7 +57151,7 @@ Domain allowed access.
-
+
IOCTL the dri devices.
@@ -57052,7 +57161,7 @@ Domain allowed access.
-
+
Read and write the dri devices.
@@ -57062,7 +57171,7 @@ Domain allowed access.
-
+
Dontaudit read and write on the dri devices.
@@ -57072,7 +57181,7 @@ Domain to not audit.
-
+
Create, read, write, and delete the dri devices.
@@ -57082,7 +57191,17 @@ Domain allowed access.
-
+
+
+Mount on the dri devices.
+
+
+
+Domain allowed access.
+
+
+
+
Automatic type transition to the type
for DRI device nodes when created in /dev.
@@ -57098,7 +57217,7 @@ The name of the object being created.
-
+
Automatic type transition to the type
for event device nodes when created in /dev.
@@ -57114,7 +57233,7 @@ The name of the object being created.
-
+
Get the attributes of the event devices.
@@ -57124,7 +57243,7 @@ Domain allowed access.
-
+
Set the attributes of the event devices.
@@ -57134,7 +57253,7 @@ Domain allowed access.
-
+
Read input event devices (/dev/input).
@@ -57144,7 +57263,7 @@ Domain allowed access.
-
+
Read and write input event devices (/dev/input).
@@ -57154,7 +57273,7 @@ Domain allowed access.
-
+
Create, read, write, and delete input event devices (/dev/input).
@@ -57164,7 +57283,7 @@ Domain allowed access.
-
+
IOCTL the input event devices (/dev/input).
@@ -57174,7 +57293,7 @@ Domain allowed access.
-
+
Read and write ipmi devices (/dev/ipmi*).
@@ -57184,7 +57303,7 @@ Domain allowed access.
-
+
Get the attributes of the framebuffer device node.
@@ -57194,7 +57313,7 @@ Domain allowed access.
-
+
Set the attributes of the framebuffer device node.
@@ -57204,7 +57323,7 @@ Domain allowed access.
-
+
Dot not audit attempts to set the attributes
of the framebuffer device node.
@@ -57215,7 +57334,7 @@ Domain to not audit.
-
+
Read the framebuffer.
@@ -57225,7 +57344,7 @@ Domain allowed access.
-
+
Do not audit attempts to read the framebuffer.
@@ -57235,7 +57354,7 @@ Domain to not audit.
-
+
Write the framebuffer.
@@ -57245,7 +57364,7 @@ Domain allowed access.
-
+
Read and write the framebuffer.
@@ -57255,7 +57374,7 @@ Domain allowed access.
-
+
Allow read/write the hypervkvp device
@@ -57265,7 +57384,7 @@ Domain allowed access.
-
+
Allow read/write the hypervvssd device
@@ -57275,7 +57394,7 @@ Domain allowed access.
-
+
Allow read/write access to InfiniBand devices.
@@ -57285,7 +57404,7 @@ Domain allowed access.
-
+
Allow read/write access to InfiniBand devices.
@@ -57295,7 +57414,7 @@ Domain allowed access.
-
+
Read the kernel messages
@@ -57305,7 +57424,7 @@ Domain allowed access.
-
+
Do not audit attempts to read the kernel messages
@@ -57315,7 +57434,7 @@ Domain to not audit.
-
+
Write to the kernel messages device
@@ -57325,7 +57444,7 @@ Domain allowed access.
-
+
Read and write to the kernel messages device
@@ -57335,7 +57454,7 @@ Domain allowed access.
-
+
Mount on the kernel messages device
@@ -57345,7 +57464,7 @@ Domain allowed access.
-
+
Get the attributes of the ksm devices.
@@ -57355,7 +57474,7 @@ Domain allowed access.
-
+
Set the attributes of the ksm devices.
@@ -57365,7 +57484,7 @@ Domain allowed access.
-
+
Read the ksm devices.
@@ -57375,7 +57494,7 @@ Domain allowed access.
-
+
Read and write to ksm devices.
@@ -57385,7 +57504,7 @@ Domain allowed access.
-
+
Get the attributes of the kvm devices.
@@ -57395,7 +57514,7 @@ Domain allowed access.
-
+
Set the attributes of the kvm devices.
@@ -57405,7 +57524,7 @@ Domain allowed access.
-
+
Read the kvm devices.
@@ -57415,7 +57534,7 @@ Domain allowed access.
-
+
Read and write to kvm devices.
@@ -57425,7 +57544,7 @@ Domain allowed access.
-
+
Read the lirc device.
@@ -57435,7 +57554,7 @@ Domain allowed access.
-
+
Read and write the lirc device.
@@ -57445,7 +57564,7 @@ Domain allowed access.
-
+
Automatic type transition to the type
for lirc device nodes when created in /dev.
@@ -57461,7 +57580,7 @@ The name of the object being created.
-
+
Read and write the loop-control device.
@@ -57471,7 +57590,7 @@ Domain allowed access.
-
+
Get the attributes of the lvm comtrol device.
@@ -57481,7 +57600,7 @@ Domain allowed access.
-
+
Read the lvm comtrol device.
@@ -57491,7 +57610,7 @@ Domain allowed access.
-
+
Read and write the lvm control device.
@@ -57501,7 +57620,7 @@ Domain allowed access.
-
+
Do not audit attempts to read and write lvm control device.
@@ -57511,7 +57630,7 @@ Domain to not audit.
-
+
Delete the lvm control device.
@@ -57521,7 +57640,7 @@ Domain allowed access.
-
+
dontaudit getattr raw memory devices (e.g. /dev/mem).
@@ -57531,7 +57650,7 @@ Domain to not audit.
-
+
Read raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57544,7 +57663,7 @@ Domain allowed access.
-
+
Read raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -57562,7 +57681,7 @@ Tunable to depend on
-
+
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
@@ -57576,7 +57695,7 @@ Domain to not audit.
-
+
Write raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57589,7 +57708,7 @@ Domain allowed access.
-
+
Write raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -57607,7 +57726,7 @@ Tunable to depend on
-
+
Read and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57620,7 +57739,7 @@ Domain allowed access.
-
+
Write and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57633,7 +57752,7 @@ Domain allowed access.
-
+
Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -57651,7 +57770,7 @@ Tunable to depend on
-
+
Get the attributes of miscellaneous devices.
@@ -57661,7 +57780,7 @@ Domain allowed access.
-
+
Do not audit attempts to get the attributes
of miscellaneous devices.
@@ -57672,7 +57791,7 @@ Domain to not audit.
-
+
Set the attributes of miscellaneous devices.
@@ -57682,7 +57801,7 @@ Domain allowed access.
-
+
Do not audit attempts to set the attributes
of miscellaneous devices.
@@ -57693,7 +57812,7 @@ Domain to not audit.
-
+
Read miscellaneous devices.
@@ -57703,7 +57822,7 @@ Domain allowed access.
-
+
Write miscellaneous devices.
@@ -57713,7 +57832,7 @@ Domain allowed access.
-
+
Do not audit attempts to read and write miscellaneous devices.
@@ -57723,7 +57842,7 @@ Domain allowed access.
-
+
Get the attributes of the modem devices.
@@ -57733,7 +57852,7 @@ Domain allowed access.
-
+
Set the attributes of the modem devices.
@@ -57743,7 +57862,7 @@ Domain allowed access.
-
+
Read the modem devices.
@@ -57753,7 +57872,7 @@ Domain allowed access.
-
+
Read and write to modem devices.
@@ -57763,7 +57882,7 @@ Domain allowed access.
-
+
Get the attributes of the mouse devices.
@@ -57773,7 +57892,7 @@ Domain allowed access.
-
+
Set the attributes of the mouse devices.
@@ -57783,7 +57902,17 @@ Domain allowed access.
-
+
+
+Delete the mouse devices.
+
+
+
+Domain allowed access.
+
+
+
+
Read the mouse devices.
@@ -57793,7 +57922,7 @@ Domain allowed access.
-
+
Read and write to mouse devices.
@@ -57803,7 +57932,7 @@ Domain allowed access.
-
+
Get the attributes of the memory type range
registers (MTRR) device.
@@ -57814,7 +57943,7 @@ Domain allowed access.
-
+
Do not audit attempts to write the memory type
range registers (MTRR).
@@ -57825,7 +57954,7 @@ Domain to not audit.
-
+
Read and write the memory type range registers (MTRR).
@@ -57835,7 +57964,7 @@ Domain allowed access.
-
+
Get the attributes of the null device nodes.
@@ -57845,7 +57974,7 @@ Domain allowed access.
-
+
Set the attributes of the null device nodes.
@@ -57855,7 +57984,7 @@ Domain allowed access.
-
+
Do not audit attempts to set the attributes of
the null device nodes.
@@ -57866,7 +57995,7 @@ Domain to not audit.
-
+
Delete the null device (/dev/null).
@@ -57876,7 +58005,7 @@ Domain allowed access.
-
+
Read and write to the null device (/dev/null).
@@ -57886,7 +58015,7 @@ Domain allowed access.
-
+
Create the null device (/dev/null).
@@ -57896,7 +58025,7 @@ Domain allowed access.
-
+
Manage services with script type null_device_t for when
/lib/systemd/system/something.service is a link to /dev/null
@@ -57907,7 +58036,7 @@ Domain allowed access.
-
+
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
@@ -57918,7 +58047,7 @@ Domain to not audit.
-
+
Read and write BIOS non-volatile RAM.
@@ -57928,7 +58057,7 @@ Domain allowed access.
-
+
Get the attributes of the printer device nodes.
@@ -57938,7 +58067,7 @@ Domain allowed access.
-
+
Set the attributes of the printer device nodes.
@@ -57948,7 +58077,7 @@ Domain allowed access.
-
+
Append the printer device.
@@ -57958,7 +58087,7 @@ Domain allowed access.
-
+
Read and write the printer device.
@@ -57968,7 +58097,7 @@ Domain allowed access.
-
+
Get the attributes of PM QoS devices
@@ -57978,7 +58107,7 @@ Domain allowed access.
-
+
Read the PM QoS devices.
@@ -57988,7 +58117,7 @@ Domain allowed access.
-
+
Read and write the the PM QoS devices.
@@ -57998,7 +58127,7 @@ Domain allowed access.
-
+
Get the attributes of the QEMU
microcode and id interfaces.
@@ -58009,7 +58138,7 @@ Domain allowed access.
-
+
Set the attributes of the QEMU
microcode and id interfaces.
@@ -58020,7 +58149,7 @@ Domain allowed access.
-
+
Read the QEMU device
@@ -58030,7 +58159,7 @@ Domain allowed access.
-
+
Read and write the the QEMU device.
@@ -58040,7 +58169,7 @@ Domain allowed access.
-
+
Read from random number generator
devices (e.g., /dev/random).
@@ -58066,7 +58195,7 @@ Domain allowed access.
-
+
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
@@ -58077,7 +58206,7 @@ Domain to not audit.
-
+
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
@@ -58088,7 +58217,7 @@ Domain to not audit.
-
+
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
@@ -58100,7 +58229,7 @@ Domain allowed access.
-
+
Create the random device (/dev/random).
@@ -58110,7 +58239,7 @@ Domain allowed access.
-
+
Read the realtime clock (/dev/rtc).
@@ -58120,7 +58249,7 @@ Domain allowed access.
-
+
Set the realtime clock (/dev/rtc).
@@ -58130,7 +58259,7 @@ Domain allowed access.
-
+
Read and set the realtime clock (/dev/rtc).
@@ -58140,7 +58269,7 @@ Domain allowed access.
-
+
Get the attributes of the scanner device.
@@ -58150,7 +58279,7 @@ Domain allowed access.
-
+
Do not audit attempts to get the attributes of
the scanner device.
@@ -58161,7 +58290,7 @@ Domain to not audit.
-
+
Set the attributes of the scanner device.
@@ -58171,7 +58300,7 @@ Domain allowed access.
-
+
Do not audit attempts to set the attributes of
the scanner device.
@@ -58182,7 +58311,7 @@ Domain to not audit.
-
+
Read and write the scanner device.
@@ -58192,7 +58321,7 @@ Domain allowed access.
-
+
Get the attributes of the sound devices.
@@ -58202,7 +58331,7 @@ Domain allowed access.
-
+
Set the attributes of the sound devices.
@@ -58212,7 +58341,7 @@ Domain allowed access.
-
+
Read the sound devices.
@@ -58222,7 +58351,7 @@ Domain allowed access.
-
+
Write the sound devices.
@@ -58232,7 +58361,7 @@ Domain allowed access.
-
+
Read the sound mixer devices.
@@ -58242,7 +58371,7 @@ Domain allowed access.
-
+
Write the sound mixer devices.
@@ -58252,7 +58381,7 @@ Domain allowed access.
-
+
Get the attributes of the the power management device.
@@ -58262,7 +58391,7 @@ Domain allowed access.
-
+
Set the attributes of the the power management device.
@@ -58272,7 +58401,7 @@ Domain allowed access.
-
+
Read and write the the power management device.
@@ -58282,7 +58411,7 @@ Domain allowed access.
-
+
Getattr on smartcard devices
@@ -58292,7 +58421,7 @@ Domain allowed access.
-
+
dontaudit getattr on smartcard devices
@@ -58302,7 +58431,7 @@ Domain to not audit.
-
+
Read and write smartcard devices.
@@ -58312,7 +58441,7 @@ Domain allowed access.
-
+
Create, read, write, and delete smartcard devices.
@@ -58322,7 +58451,7 @@ Domain allowed access.
-
+
Read, write and map the sysdig device.
@@ -58332,7 +58461,7 @@ Domain allowed access.
-
+
Mount a filesystem on sysfs. (Deprecated)
@@ -58342,7 +58471,7 @@ Domain allow access.
-
+
Associate a file to a sysfs filesystem.
@@ -58352,7 +58481,7 @@ The type of the file to be associated to sysfs.
-
+
Get the attributes of sysfs directories.
@@ -58362,7 +58491,7 @@ Domain allowed access.
-
+
Get the attributes of sysfs filesystem
@@ -58372,7 +58501,7 @@ Domain allowed access.
-
+
mount a sysfs filesystem
@@ -58382,7 +58511,7 @@ Domain allowed access.
-
+
Remount a sysfs filesystem.
@@ -58392,7 +58521,7 @@ Domain allow access.
-
+
unmount a sysfs filesystem
@@ -58402,7 +58531,7 @@ Domain allowed access.
-
+
Do not audit getting the attributes of sysfs filesystem
@@ -58412,7 +58541,7 @@ Domain to dontaudit access from
-
+
Dont audit attempts to read hardware state information
@@ -58422,7 +58551,7 @@ Domain for which the attempts do not need to be audited
-
+
Mount on sysfs directories.
@@ -58432,7 +58561,7 @@ Domain allowed access.
-
+
Search the sysfs directories.
@@ -58442,7 +58571,7 @@ Domain allowed access.
-
+
Do not audit attempts to search sysfs.
@@ -58452,7 +58581,7 @@ Domain to not audit.
-
+
List the contents of the sysfs directories.
@@ -58462,7 +58591,7 @@ Domain allowed access.
-
+
Write in a sysfs directories.
@@ -58472,7 +58601,7 @@ Domain allowed access.
-
+
Do not audit attempts to write in a sysfs directory.
@@ -58482,7 +58611,7 @@ Domain to not audit.
-
+
Do not audit attempts to write to a sysfs file.
@@ -58492,7 +58621,7 @@ Domain to not audit.
-
+
Create, read, write, and delete sysfs
directories.
@@ -58503,7 +58632,7 @@ Domain allowed access.
-
+
Read hardware state information.
@@ -58522,7 +58651,7 @@ Domain allowed access.
-
+
Write to hardware state information.
@@ -58539,7 +58668,7 @@ Domain allowed access.
-
+
Allow caller to modify hardware state information.
@@ -58549,7 +58678,7 @@ Domain allowed access.
-
+
Add a sysfs file
@@ -58559,7 +58688,7 @@ Domain allowed access.
-
+