From 9a2384303ee211148b6a85974028743d5a482317 Mon Sep 17 00:00:00 2001 From: Kenton Groombridge Date: Fri, 1 Mar 2024 12:06:53 -0500 Subject: Update generated policy and doc files Signed-off-by: Kenton Groombridge --- doc/policy.xml | 4504 ++++++++++++++++++++++++++++++-------------------- policy/booleans.conf | 14 + policy/modules.conf | 7 + 3 files changed, 2745 insertions(+), 1780 deletions(-) diff --git a/doc/policy.xml b/doc/policy.xml index 8ae22432..3966b118 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -942,7 +942,17 @@ Role allowed access. Init scripts for cloud VMs - + + +Read and write inherited cloud-init pipes. + + + +Domain allowed access. + + + + Create cloud-init runtime directory. @@ -952,7 +962,7 @@ Domain allowed access. - + Write cloud-init runtime files. @@ -962,7 +972,17 @@ Domain allowed access. - + + +Read and write cloud-init runtime files. + + + +Domain allowed access. + + + + Create cloud-init runtime files. @@ -972,7 +992,7 @@ Domain allowed access. - + Create files in /run with the type used for cloud-init runtime files. @@ -993,7 +1013,7 @@ The name of the object being created. - + Get the attribute of cloud-init state files. @@ -1003,6 +1023,43 @@ Domain allowed access. + + +Write inherited cloud-init temporary files. + + + +Domain allowed access. + + + + + +Read and write cloud-init temporary files. + + + +Domain allowed access. + + + + + +Create cloud-init temporary files. + + + +Domain allowed access. + + + + + +

+Enable support for cloud-init to manage all non-security files. +

+
+
@@ -3197,7 +3254,17 @@ Domain allowed access. - + + +Read rpm temporary files. + + + +Domain allowed access. + + + + Append rpm temporary files. @@ -3207,7 +3274,7 @@ Domain allowed access. - + Create, read, write, and delete rpm temporary files. @@ -3218,7 +3285,7 @@ Domain allowed access. - + Read rpm script temporary files. @@ -3228,7 +3295,7 @@ Domain allowed access. - + Read rpm cache content. @@ -3238,7 +3305,7 @@ Domain allowed access. - + Create, read, write, and delete rpm cache content. @@ -3249,7 +3316,7 @@ Domain allowed access. - + Read rpm lib content. @@ -3259,7 +3326,7 @@ Domain allowed access. - + Delete rpm lib files. @@ -3269,7 +3336,7 @@ Domain allowed access. - + Create, read, write, and delete rpm lib files. @@ -3280,7 +3347,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete rpm lib content. @@ -3291,7 +3358,7 @@ Domain to not audit. - + Create, read, write, and delete rpm runtime files. @@ -3302,7 +3369,7 @@ Domain allowed access. - + All of the rules required to administrate an rpm environment. @@ -3751,7 +3818,7 @@ The role associated with the user domain. - - + Send a SIGCHLD signal to the sudo domain. @@ -3843,6 +3910,16 @@ Domain allowed access. + + +Execute sudo in the caller domain. + + + +Domain allowed access. + + +

@@ -4661,7 +4738,7 @@ Domain allowed access - +

Execute chromium in the chromium domain and allow the specified role to access the chromium domain @@ -10451,7 +10528,18 @@ Domain allowed access.
- + + +Mmap read-only all executable files. + + + +Domain allowed access. + + + + + Execute all executable files. @@ -10462,7 +10550,7 @@ Domain allowed access. - + Do not audit attempts to execute all executables. @@ -10472,7 +10560,7 @@ Domain to not audit. - + Create, read, write, and all executable files. @@ -10483,7 +10571,7 @@ Domain allowed access. - + Relabel to and from the bin type. @@ -10494,7 +10582,7 @@ Domain allowed access. - + Mmap all executables as executable. @@ -10504,7 +10592,7 @@ Domain allowed access. - + Relabel to and from the bin type. @@ -10514,7 +10602,7 @@ Domain allowed access. - + Relabel to and from the bin type. @@ -56085,7 +56173,17 @@ Domain to not audit. - + + +Dontaudit attempts to execute device nodes. + + + +Domain to not audit. + + + + Add entries to directories in /dev. @@ -56095,7 +56193,7 @@ Domain allowed access. - + Remove entries from directories in /dev. @@ -56105,7 +56203,7 @@ Domain allowed access. - + Create a directory in the device directory. @@ -56115,7 +56213,7 @@ Domain allowed access. - + Delete a directory in the device directory. @@ -56125,7 +56223,7 @@ Domain allowed access. - + Manage of directories in /dev. @@ -56135,7 +56233,7 @@ Domain allowed access. - + Allow full relabeling (to and from) of directories in /dev. @@ -56145,7 +56243,7 @@ Domain allowed access. - + dontaudit getattr generic files in /dev. @@ -56155,7 +56253,7 @@ Domain to not audit. - + Read generic files in /dev. @@ -56165,7 +56263,7 @@ Domain to not audit. - + Read and write generic files in /dev. @@ -56175,7 +56273,7 @@ Domain allowed access. - + Delete generic files in /dev. @@ -56185,7 +56283,7 @@ Domain allowed access. - + Create a file in the device directory. @@ -56195,7 +56293,7 @@ Domain allowed access. - + Dontaudit getattr on generic pipes. @@ -56205,7 +56303,7 @@ Domain to not audit. - + Write generic socket files in /dev. @@ -56215,7 +56313,7 @@ Domain to not audit. - + Allow getattr on generic block devices. @@ -56225,7 +56323,7 @@ Domain allowed access. - + Dontaudit getattr on generic block devices. @@ -56235,7 +56333,7 @@ Domain to not audit. - + Set the attributes on generic block devices. @@ -56246,7 +56344,7 @@ Domain allowed access. - + Dontaudit setattr on generic block devices. @@ -56256,7 +56354,7 @@ Domain to not audit. - + Create generic block device files. @@ -56266,7 +56364,7 @@ Domain allowed access. - + Delete generic block device files. @@ -56276,7 +56374,18 @@ Domain allowed access. - + + +Dontaudit relabelto the generic device +type on block files. + + + +Domain to not audit. + + + + Allow getattr for generic character device files. @@ -56286,7 +56395,7 @@ Domain allowed access. - + Dontaudit getattr for generic character device files. @@ -56296,7 +56405,7 @@ Domain to not audit. - + Set the attributes for generic character device files. @@ -56307,7 +56416,7 @@ Domain allowed access. - + Dontaudit setattr for generic character device files. @@ -56317,7 +56426,7 @@ Domain to not audit. - + Read generic character device files. @@ -56327,7 +56436,7 @@ Domain allowed access. - + Read and write generic character device files. @@ -56337,7 +56446,7 @@ Domain allowed access. - + Read and write generic block device files. @@ -56347,7 +56456,7 @@ Domain allowed access. - + Dontaudit attempts to read/write generic character device files. @@ -56357,7 +56466,7 @@ Domain to dontaudit access. - + Create generic character device files. @@ -56367,7 +56476,7 @@ Domain allowed access. - + Delete generic character device files. @@ -56377,7 +56486,7 @@ Domain allowed access. - + Relabel from generic character device files. @@ -56387,7 +56496,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of symbolic links in device directories (/dev). @@ -56398,7 +56507,7 @@ Domain to not audit. - + Read symbolic links in device directories. @@ -56408,7 +56517,7 @@ Domain allowed access. - + Create symbolic links in device directories. @@ -56418,7 +56527,7 @@ Domain allowed access. - + Delete symbolic links in device directories. @@ -56428,7 +56537,7 @@ Domain allowed access. - + Create, delete, read, and write symbolic links in device directories. @@ -56438,7 +56547,7 @@ Domain allowed access. - + Relabel symbolic links in device directories. @@ -56448,7 +56557,7 @@ Domain allowed access. - + Write generic sock files in /dev. @@ -56458,7 +56567,7 @@ Domain allowed access. - + Create, delete, read, and write device nodes in device directories. @@ -56468,7 +56577,7 @@ Domain allowed access. - + Dontaudit getattr for generic device files. @@ -56478,7 +56587,7 @@ Domain to not audit. - + Create, delete, read, and write block device files. @@ -56488,7 +56597,7 @@ Domain allowed access. - + Create, delete, read, and write character device files. @@ -56498,7 +56607,7 @@ Domain allowed access. - + Create, read, and write device nodes. The node will be transitioned to the type provided. @@ -56525,7 +56634,7 @@ The name of the object being created. - + Create, read, and write device nodes. The node will be transitioned to the type provided. This is @@ -56549,7 +56658,7 @@ The name of the object being created. - + Getattr on all block file device nodes. @@ -56560,7 +56669,7 @@ Domain allowed access. - + Dontaudit getattr on all block file device nodes. @@ -56570,7 +56679,7 @@ Domain to not audit. - + Getattr on all character file device nodes. @@ -56581,7 +56690,7 @@ Domain allowed access. - + Dontaudit getattr on all character file device nodes. @@ -56591,7 +56700,7 @@ Domain to not audit. - + Setattr on all block file device nodes. @@ -56602,7 +56711,7 @@ Domain allowed access. - + Setattr on all character file device nodes. @@ -56613,7 +56722,7 @@ Domain allowed access. - + Dontaudit read on all block file device nodes. @@ -56623,7 +56732,7 @@ Domain to not audit. - + Dontaudit write on all block file device nodes. @@ -56633,7 +56742,7 @@ Domain to not audit. - + Dontaudit read on all character file device nodes. @@ -56643,7 +56752,7 @@ Domain to not audit. - + Dontaudit write on all character file device nodes. @@ -56653,7 +56762,7 @@ Domain to not audit. - + Create all block device files. @@ -56663,7 +56772,7 @@ Domain allowed access. - + Create all character device files. @@ -56673,7 +56782,7 @@ Domain allowed access. - + Delete all block device files. @@ -56683,7 +56792,7 @@ Domain allowed access. - + Delete all character device files. @@ -56693,7 +56802,7 @@ Domain allowed access. - + Rename all block device files. @@ -56703,7 +56812,7 @@ Domain allowed access. - + Rename all character device files. @@ -56713,7 +56822,7 @@ Domain allowed access. - + Read, write, create, and delete all block device files. @@ -56723,7 +56832,7 @@ Domain allowed access. - + Read, write, create, and delete all character device files. @@ -56733,7 +56842,7 @@ Domain allowed access. - + Get the attributes of the apm bios device node. @@ -56743,7 +56852,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the apm bios device node. @@ -56754,7 +56863,7 @@ Domain to not audit. - + Set the attributes of the apm bios device node. @@ -56764,7 +56873,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the apm bios device node. @@ -56775,7 +56884,7 @@ Domain to not audit. - + Read and write the apm bios. @@ -56785,7 +56894,7 @@ Domain allowed access. - + Getattr the agp devices. @@ -56795,7 +56904,7 @@ Domain allowed access. - + Read and write the agp devices. @@ -56805,7 +56914,7 @@ Domain allowed access. - + Get the attributes of the autofs device node. @@ -56815,7 +56924,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the autofs device node. @@ -56826,7 +56935,7 @@ Domain to not audit. - + Set the attributes of the autofs device node. @@ -56836,7 +56945,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the autofs device node. @@ -56847,7 +56956,7 @@ Domain to not audit. - + Read and write the autofs device. @@ -56857,7 +56966,7 @@ Domain allowed access. - + Relabel the autofs device node. @@ -56867,7 +56976,7 @@ Domain allowed access. - + Read and write cachefiles character device nodes. @@ -56878,7 +56987,7 @@ Domain allowed access. - + Read and write the PCMCIA card manager device. @@ -56888,7 +56997,7 @@ Domain allowed access. - + Do not audit attempts to read and write the PCMCIA card manager device. @@ -56899,7 +57008,7 @@ Domain to not audit. - + Create, read, write, and delete the PCMCIA card manager device @@ -56911,7 +57020,7 @@ Domain allowed access. - + Create, read, write, and delete the PCMCIA card manager device. @@ -56922,7 +57031,7 @@ Domain allowed access. - + Automatic type transition to the type for PCMCIA card manager device nodes when @@ -56939,7 +57048,7 @@ The name of the object being created. - + Get the attributes of the CPU microcode and id interfaces. @@ -56950,7 +57059,7 @@ Domain allowed access. - + Set the attributes of the CPU microcode and id interfaces. @@ -56961,7 +57070,7 @@ Domain allowed access. - + Read the CPU identity. @@ -56971,7 +57080,7 @@ Domain allowed access. - + Read and write the the CPU microcode device. This is required to load CPU microcode. @@ -56982,7 +57091,7 @@ Domain allowed access. - + Read the kernel crash device @@ -56992,7 +57101,7 @@ Domain allowed access. - + Read and write the the hardware SSL accelerator. @@ -57002,7 +57111,7 @@ Domain allowed access. - + Set the attributes of the dlm control devices. @@ -57012,7 +57121,7 @@ Domain allowed access. - + Read and write the the dlm control device @@ -57022,7 +57131,7 @@ Domain allowed access. - + getattr the dri devices. @@ -57032,7 +57141,7 @@ Domain allowed access. - + Setattr the dri devices. @@ -57042,7 +57151,7 @@ Domain allowed access. - + IOCTL the dri devices. @@ -57052,7 +57161,7 @@ Domain allowed access. - + Read and write the dri devices. @@ -57062,7 +57171,7 @@ Domain allowed access. - + Dontaudit read and write on the dri devices. @@ -57072,7 +57181,7 @@ Domain to not audit. - + Create, read, write, and delete the dri devices. @@ -57082,7 +57191,17 @@ Domain allowed access. - + + +Mount on the dri devices. + + + +Domain allowed access. + + + + Automatic type transition to the type for DRI device nodes when created in /dev. @@ -57098,7 +57217,7 @@ The name of the object being created. - + Automatic type transition to the type for event device nodes when created in /dev. @@ -57114,7 +57233,7 @@ The name of the object being created. - + Get the attributes of the event devices. @@ -57124,7 +57243,7 @@ Domain allowed access. - + Set the attributes of the event devices. @@ -57134,7 +57253,7 @@ Domain allowed access. - + Read input event devices (/dev/input). @@ -57144,7 +57263,7 @@ Domain allowed access. - + Read and write input event devices (/dev/input). @@ -57154,7 +57273,7 @@ Domain allowed access. - + Create, read, write, and delete input event devices (/dev/input). @@ -57164,7 +57283,7 @@ Domain allowed access. - + IOCTL the input event devices (/dev/input). @@ -57174,7 +57293,7 @@ Domain allowed access. - + Read and write ipmi devices (/dev/ipmi*). @@ -57184,7 +57303,7 @@ Domain allowed access. - + Get the attributes of the framebuffer device node. @@ -57194,7 +57313,7 @@ Domain allowed access. - + Set the attributes of the framebuffer device node. @@ -57204,7 +57323,7 @@ Domain allowed access. - + Dot not audit attempts to set the attributes of the framebuffer device node. @@ -57215,7 +57334,7 @@ Domain to not audit. - + Read the framebuffer. @@ -57225,7 +57344,7 @@ Domain allowed access. - + Do not audit attempts to read the framebuffer. @@ -57235,7 +57354,7 @@ Domain to not audit. - + Write the framebuffer. @@ -57245,7 +57364,7 @@ Domain allowed access. - + Read and write the framebuffer. @@ -57255,7 +57374,7 @@ Domain allowed access. - + Allow read/write the hypervkvp device @@ -57265,7 +57384,7 @@ Domain allowed access. - + Allow read/write the hypervvssd device @@ -57275,7 +57394,7 @@ Domain allowed access. - + Allow read/write access to InfiniBand devices. @@ -57285,7 +57404,7 @@ Domain allowed access. - + Allow read/write access to InfiniBand devices. @@ -57295,7 +57414,7 @@ Domain allowed access. - + Read the kernel messages @@ -57305,7 +57424,7 @@ Domain allowed access. - + Do not audit attempts to read the kernel messages @@ -57315,7 +57434,7 @@ Domain to not audit. - + Write to the kernel messages device @@ -57325,7 +57444,7 @@ Domain allowed access. - + Read and write to the kernel messages device @@ -57335,7 +57454,7 @@ Domain allowed access. - + Mount on the kernel messages device @@ -57345,7 +57464,7 @@ Domain allowed access. - + Get the attributes of the ksm devices. @@ -57355,7 +57474,7 @@ Domain allowed access. - + Set the attributes of the ksm devices. @@ -57365,7 +57484,7 @@ Domain allowed access. - + Read the ksm devices. @@ -57375,7 +57494,7 @@ Domain allowed access. - + Read and write to ksm devices. @@ -57385,7 +57504,7 @@ Domain allowed access. - + Get the attributes of the kvm devices. @@ -57395,7 +57514,7 @@ Domain allowed access. - + Set the attributes of the kvm devices. @@ -57405,7 +57524,7 @@ Domain allowed access. - + Read the kvm devices. @@ -57415,7 +57534,7 @@ Domain allowed access. - + Read and write to kvm devices. @@ -57425,7 +57544,7 @@ Domain allowed access. - + Read the lirc device. @@ -57435,7 +57554,7 @@ Domain allowed access. - + Read and write the lirc device. @@ -57445,7 +57564,7 @@ Domain allowed access. - + Automatic type transition to the type for lirc device nodes when created in /dev. @@ -57461,7 +57580,7 @@ The name of the object being created. - + Read and write the loop-control device. @@ -57471,7 +57590,7 @@ Domain allowed access. - + Get the attributes of the lvm comtrol device. @@ -57481,7 +57600,7 @@ Domain allowed access. - + Read the lvm comtrol device. @@ -57491,7 +57610,7 @@ Domain allowed access. - + Read and write the lvm control device. @@ -57501,7 +57620,7 @@ Domain allowed access. - + Do not audit attempts to read and write lvm control device. @@ -57511,7 +57630,7 @@ Domain to not audit. - + Delete the lvm control device. @@ -57521,7 +57640,7 @@ Domain allowed access. - + dontaudit getattr raw memory devices (e.g. /dev/mem). @@ -57531,7 +57650,7 @@ Domain to not audit. - + Read raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57544,7 +57663,7 @@ Domain allowed access. - + Read raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -57562,7 +57681,7 @@ Tunable to depend on - + Do not audit attempts to read raw memory devices (e.g. /dev/mem). @@ -57576,7 +57695,7 @@ Domain to not audit. - + Write raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57589,7 +57708,7 @@ Domain allowed access. - + Write raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -57607,7 +57726,7 @@ Tunable to depend on - + Read and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57620,7 +57739,7 @@ Domain allowed access. - + Write and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -57633,7 +57752,7 @@ Domain allowed access. - + Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -57651,7 +57770,7 @@ Tunable to depend on - + Get the attributes of miscellaneous devices. @@ -57661,7 +57780,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of miscellaneous devices. @@ -57672,7 +57791,7 @@ Domain to not audit. - + Set the attributes of miscellaneous devices. @@ -57682,7 +57801,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of miscellaneous devices. @@ -57693,7 +57812,7 @@ Domain to not audit. - + Read miscellaneous devices. @@ -57703,7 +57822,7 @@ Domain allowed access. - + Write miscellaneous devices. @@ -57713,7 +57832,7 @@ Domain allowed access. - + Do not audit attempts to read and write miscellaneous devices. @@ -57723,7 +57842,7 @@ Domain allowed access. - + Get the attributes of the modem devices. @@ -57733,7 +57852,7 @@ Domain allowed access. - + Set the attributes of the modem devices. @@ -57743,7 +57862,7 @@ Domain allowed access. - + Read the modem devices. @@ -57753,7 +57872,7 @@ Domain allowed access. - + Read and write to modem devices. @@ -57763,7 +57882,7 @@ Domain allowed access. - + Get the attributes of the mouse devices. @@ -57773,7 +57892,7 @@ Domain allowed access. - + Set the attributes of the mouse devices. @@ -57783,7 +57902,17 @@ Domain allowed access. - + + +Delete the mouse devices. + + + +Domain allowed access. + + + + Read the mouse devices. @@ -57793,7 +57922,7 @@ Domain allowed access. - + Read and write to mouse devices. @@ -57803,7 +57932,7 @@ Domain allowed access. - + Get the attributes of the memory type range registers (MTRR) device. @@ -57814,7 +57943,7 @@ Domain allowed access. - + Do not audit attempts to write the memory type range registers (MTRR). @@ -57825,7 +57954,7 @@ Domain to not audit. - + Read and write the memory type range registers (MTRR). @@ -57835,7 +57964,7 @@ Domain allowed access. - + Get the attributes of the null device nodes. @@ -57845,7 +57974,7 @@ Domain allowed access. - + Set the attributes of the null device nodes. @@ -57855,7 +57984,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the null device nodes. @@ -57866,7 +57995,7 @@ Domain to not audit. - + Delete the null device (/dev/null). @@ -57876,7 +58005,7 @@ Domain allowed access. - + Read and write to the null device (/dev/null). @@ -57886,7 +58015,7 @@ Domain allowed access. - + Create the null device (/dev/null). @@ -57896,7 +58025,7 @@ Domain allowed access. - + Manage services with script type null_device_t for when /lib/systemd/system/something.service is a link to /dev/null @@ -57907,7 +58036,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. @@ -57918,7 +58047,7 @@ Domain to not audit. - + Read and write BIOS non-volatile RAM. @@ -57928,7 +58057,7 @@ Domain allowed access. - + Get the attributes of the printer device nodes. @@ -57938,7 +58067,7 @@ Domain allowed access. - + Set the attributes of the printer device nodes. @@ -57948,7 +58077,7 @@ Domain allowed access. - + Append the printer device. @@ -57958,7 +58087,7 @@ Domain allowed access. - + Read and write the printer device. @@ -57968,7 +58097,7 @@ Domain allowed access. - + Get the attributes of PM QoS devices @@ -57978,7 +58107,7 @@ Domain allowed access. - + Read the PM QoS devices. @@ -57988,7 +58117,7 @@ Domain allowed access. - + Read and write the the PM QoS devices. @@ -57998,7 +58127,7 @@ Domain allowed access. - + Get the attributes of the QEMU microcode and id interfaces. @@ -58009,7 +58138,7 @@ Domain allowed access. - + Set the attributes of the QEMU microcode and id interfaces. @@ -58020,7 +58149,7 @@ Domain allowed access. - + Read the QEMU device @@ -58030,7 +58159,7 @@ Domain allowed access. - + Read and write the the QEMU device. @@ -58040,7 +58169,7 @@ Domain allowed access. - + Read from random number generator devices (e.g., /dev/random). @@ -58066,7 +58195,7 @@ Domain allowed access. - + Do not audit attempts to read from random number generator devices (e.g., /dev/random) @@ -58077,7 +58206,7 @@ Domain to not audit. - + Do not audit attempts to append to random number generator devices (e.g., /dev/random) @@ -58088,7 +58217,7 @@ Domain to not audit. - + Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the @@ -58100,7 +58229,7 @@ Domain allowed access. - + Create the random device (/dev/random). @@ -58110,7 +58239,7 @@ Domain allowed access. - + Read the realtime clock (/dev/rtc). @@ -58120,7 +58249,7 @@ Domain allowed access. - + Set the realtime clock (/dev/rtc). @@ -58130,7 +58259,7 @@ Domain allowed access. - + Read and set the realtime clock (/dev/rtc). @@ -58140,7 +58269,7 @@ Domain allowed access. - + Get the attributes of the scanner device. @@ -58150,7 +58279,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the scanner device. @@ -58161,7 +58290,7 @@ Domain to not audit. - + Set the attributes of the scanner device. @@ -58171,7 +58300,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the scanner device. @@ -58182,7 +58311,7 @@ Domain to not audit. - + Read and write the scanner device. @@ -58192,7 +58321,7 @@ Domain allowed access. - + Get the attributes of the sound devices. @@ -58202,7 +58331,7 @@ Domain allowed access. - + Set the attributes of the sound devices. @@ -58212,7 +58341,7 @@ Domain allowed access. - + Read the sound devices. @@ -58222,7 +58351,7 @@ Domain allowed access. - + Write the sound devices. @@ -58232,7 +58361,7 @@ Domain allowed access. - + Read the sound mixer devices. @@ -58242,7 +58371,7 @@ Domain allowed access. - + Write the sound mixer devices. @@ -58252,7 +58381,7 @@ Domain allowed access. - + Get the attributes of the the power management device. @@ -58262,7 +58391,7 @@ Domain allowed access. - + Set the attributes of the the power management device. @@ -58272,7 +58401,7 @@ Domain allowed access. - + Read and write the the power management device. @@ -58282,7 +58411,7 @@ Domain allowed access. - + Getattr on smartcard devices @@ -58292,7 +58421,7 @@ Domain allowed access. - + dontaudit getattr on smartcard devices @@ -58302,7 +58431,7 @@ Domain to not audit. - + Read and write smartcard devices. @@ -58312,7 +58441,7 @@ Domain allowed access. - + Create, read, write, and delete smartcard devices. @@ -58322,7 +58451,7 @@ Domain allowed access. - + Read, write and map the sysdig device. @@ -58332,7 +58461,7 @@ Domain allowed access. - + Mount a filesystem on sysfs. (Deprecated) @@ -58342,7 +58471,7 @@ Domain allow access. - + Associate a file to a sysfs filesystem. @@ -58352,7 +58481,7 @@ The type of the file to be associated to sysfs. - + Get the attributes of sysfs directories. @@ -58362,7 +58491,7 @@ Domain allowed access. - + Get the attributes of sysfs filesystem @@ -58372,7 +58501,7 @@ Domain allowed access. - + mount a sysfs filesystem @@ -58382,7 +58511,7 @@ Domain allowed access. - + Remount a sysfs filesystem. @@ -58392,7 +58521,7 @@ Domain allow access. - + unmount a sysfs filesystem @@ -58402,7 +58531,7 @@ Domain allowed access. - + Do not audit getting the attributes of sysfs filesystem @@ -58412,7 +58541,7 @@ Domain to dontaudit access from - + Dont audit attempts to read hardware state information @@ -58422,7 +58551,7 @@ Domain for which the attempts do not need to be audited - + Mount on sysfs directories. @@ -58432,7 +58561,7 @@ Domain allowed access. - + Search the sysfs directories. @@ -58442,7 +58571,7 @@ Domain allowed access. - + Do not audit attempts to search sysfs. @@ -58452,7 +58581,7 @@ Domain to not audit. - + List the contents of the sysfs directories. @@ -58462,7 +58591,7 @@ Domain allowed access. - + Write in a sysfs directories. @@ -58472,7 +58601,7 @@ Domain allowed access. - + Do not audit attempts to write in a sysfs directory. @@ -58482,7 +58611,7 @@ Domain to not audit. - + Do not audit attempts to write to a sysfs file. @@ -58492,7 +58621,7 @@ Domain to not audit. - + Create, read, write, and delete sysfs directories. @@ -58503,7 +58632,7 @@ Domain allowed access. - + Read hardware state information. @@ -58522,7 +58651,7 @@ Domain allowed access. - + Write to hardware state information. @@ -58539,7 +58668,7 @@ Domain allowed access. - + Allow caller to modify hardware state information. @@ -58549,7 +58678,7 @@ Domain allowed access. - + Add a sysfs file @@ -58559,7 +58688,7 @@ Domain allowed access. - + Relabel hardware state directories. @@ -58569,7 +58698,7 @@ Domain allowed access. - + Relabel from/to all sysfs types. @@ -58579,7 +58708,7 @@ Domain allowed access. - + Set the attributes of sysfs files, directories and symlinks. @@ -58589,7 +58718,7 @@ Domain allowed access. - + Read and write the TPM device. @@ -58599,7 +58728,7 @@ Domain allowed access. - + Read from pseudo random number generator devices (e.g., /dev/urandom). @@ -58632,7 +58761,7 @@ Domain allowed access. - + Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) @@ -58643,7 +58772,7 @@ Domain to not audit. - + Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. @@ -58654,7 +58783,7 @@ Domain allowed access. - + Create the urandom device (/dev/urandom). @@ -58664,7 +58793,7 @@ Domain allowed access. - + Set attributes on the urandom device (/dev/urandom). @@ -58674,7 +58803,7 @@ Domain allowed access. - + Getattr generic the USB devices. @@ -58684,7 +58813,7 @@ Domain allowed access. - + Setattr generic the USB devices. @@ -58694,7 +58823,7 @@ Domain allowed access. - + Read generic the USB devices. @@ -58704,7 +58833,7 @@ Domain allowed access. - + Read and write generic the USB devices. @@ -58714,7 +58843,17 @@ Domain allowed access. - + + +Delete the generic USB devices. + + + +Domain allowed access. + + + + Relabel generic the USB devices. @@ -58724,7 +58863,7 @@ Domain allowed access. - + Read USB monitor devices. @@ -58734,7 +58873,7 @@ Domain allowed access. - + Write USB monitor devices. @@ -58744,7 +58883,7 @@ Domain allowed access. - + Mount a usbfs filesystem. @@ -58754,7 +58893,7 @@ Domain allowed access. - + Associate a file to a usbfs filesystem. @@ -58764,7 +58903,7 @@ The type of the file to be associated to usbfs. - + Get the attributes of a directory in the usb filesystem. @@ -58774,7 +58913,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of a directory in the usb filesystem. @@ -58785,7 +58924,7 @@ Domain to not audit. - + Search the directory containing USB hardware information. @@ -58795,7 +58934,7 @@ Domain allowed access. - + Allow caller to get a list of usb hardware. @@ -58805,7 +58944,7 @@ Domain allowed access. - + Set the attributes of usbfs filesystem. @@ -58815,7 +58954,7 @@ Domain allowed access. - + Read USB hardware information using the usbfs filesystem interface. @@ -58826,7 +58965,7 @@ Domain allowed access. - + Allow caller to modify usb hardware configuration files. @@ -58836,7 +58975,7 @@ Domain allowed access. - + Get the attributes of video4linux devices. @@ -58846,7 +58985,7 @@ Domain allowed access. - + Read and write userio device. @@ -58856,7 +58995,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of video4linux device nodes. @@ -58867,7 +59006,7 @@ Domain to not audit. - + Set the attributes of video4linux device nodes. @@ -58877,7 +59016,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of video4linux device nodes. @@ -58888,7 +59027,7 @@ Domain to not audit. - + Read the video4linux devices. @@ -58898,7 +59037,7 @@ Domain allowed access. - + Write the video4linux devices. @@ -58908,7 +59047,7 @@ Domain allowed access. - + Read and write vfio devices. @@ -58918,7 +59057,7 @@ Domain allowed access. - + Relabel vfio devices. @@ -58928,7 +59067,7 @@ Domain allowed access. - + Allow read/write the vhost devices @@ -58938,7 +59077,7 @@ Domain allowed access. - + Read and write VMWare devices. @@ -58948,7 +59087,7 @@ Domain allowed access. - + Read, write, and mmap VMWare devices. @@ -58958,7 +59097,7 @@ Domain allowed access. - + Read from watchdog devices. @@ -58968,7 +59107,7 @@ Domain allowed access. - + Write to watchdog devices. @@ -58978,7 +59117,7 @@ Domain allowed access. - + Read the wireless device. @@ -58988,7 +59127,7 @@ Domain allowed access. - + Read and write the the wireless device. @@ -58998,7 +59137,7 @@ Domain allowed access. - + manage the wireless device. @@ -59008,7 +59147,7 @@ Domain allowed access. - + Read and write Xen devices. @@ -59018,7 +59157,7 @@ Domain allowed access. - + Create, read, write, and delete Xen devices. @@ -59028,7 +59167,7 @@ Domain allowed access. - + Automatic type transition to the type for xen device nodes when created in /dev. @@ -59044,7 +59183,7 @@ The name of the object being created. - + Get the attributes of X server miscellaneous devices. @@ -59054,7 +59193,7 @@ Domain allowed access. - + Set the attributes of X server miscellaneous devices. @@ -59064,7 +59203,7 @@ Domain allowed access. - + Read and write X server miscellaneous devices. @@ -59074,7 +59213,7 @@ Domain allowed access. - + Map X server miscellaneous devices. @@ -59084,7 +59223,7 @@ Domain allowed access. - + Read and write to the zero device (/dev/zero). @@ -59094,7 +59233,7 @@ Domain allowed access. - + Read, write, and execute the zero device (/dev/zero). @@ -59104,7 +59243,7 @@ Domain allowed access. - + Execmod the zero device (/dev/zero). @@ -59114,7 +59253,7 @@ Domain allowed access. - + Create the zero device (/dev/zero). @@ -59124,7 +59263,7 @@ Domain allowed access. - + Read cpu online hardware state information @@ -59139,7 +59278,7 @@ Domain allowed access. - + Read and write to the gpiochip device, /dev/gpiochip[0-9] @@ -59149,7 +59288,7 @@ Domain allowed access. - + Unconfined access to devices. @@ -59159,7 +59298,7 @@ Domain allowed access. - + Relabel cpu online hardware state information. @@ -59169,7 +59308,7 @@ Domain allowed access. - + Dont audit attempts to read usbmon devices @@ -61863,7 +62002,18 @@ Domain to not audit. - + + +Do not audit attempts to execute files +with the default file type. + + + +Domain to not audit. + + + + Create, read, write, and delete files with the default file type. @@ -61874,7 +62024,7 @@ Domain allowed access. - + Read symbolic links with the default file type. @@ -61884,7 +62034,7 @@ Domain allowed access. - + Read sockets with the default file type. @@ -61894,7 +62044,7 @@ Domain allowed access. - + Read named pipes with the default file type. @@ -61904,7 +62054,7 @@ Domain allowed access. - + Search the contents of /etc directories. @@ -61914,7 +62064,7 @@ Domain allowed access. - + Set the attributes of the /etc directories. @@ -61924,7 +62074,7 @@ Domain allowed access. - + List the contents of /etc directories. @@ -61934,7 +62084,7 @@ Domain allowed access. - + Do not audit attempts to write to /etc dirs. @@ -61944,7 +62094,7 @@ Domain to not audit. - + Add and remove entries from /etc directories. @@ -61954,7 +62104,7 @@ Domain allowed access. - + Manage generic directories in /etc @@ -61965,7 +62115,7 @@ Domain allowed access - + Relabel directories to etc_t. @@ -61975,7 +62125,7 @@ Domain allowed access. - + Mount a filesystem on the etc directories. @@ -61986,7 +62136,7 @@ Domain allowed access. - + Remount etc filesystems. @@ -61996,7 +62146,7 @@ Domain allowed access. - + Watch /etc directories @@ -62006,7 +62156,7 @@ Domain allowed access. - + Read generic files in /etc. @@ -62050,7 +62200,7 @@ Domain allowed access. - + Map generic files in /etc. @@ -62072,7 +62222,7 @@ Domain allowed access. - + Do not audit attempts to write generic files in /etc. @@ -62082,7 +62232,7 @@ Domain allowed access. - + Read and write generic files in /etc. @@ -62093,7 +62243,7 @@ Domain allowed access. - + Create, read, write, and delete generic files in /etc. @@ -62105,7 +62255,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete generic files in /etc. @@ -62117,7 +62267,7 @@ Domain to not audit. - + Delete system configuration files in /etc. @@ -62127,7 +62277,7 @@ Domain allowed access. - + Execute generic files in /etc. @@ -62137,7 +62287,7 @@ Domain allowed access. - + Watch /etc files. @@ -62147,7 +62297,7 @@ Domain allowed access. - + Get etc_t service status. @@ -62157,7 +62307,7 @@ Domain allowed access. - + start etc_t service @@ -62167,7 +62317,7 @@ Domain allowed access. - + stop etc_t service @@ -62177,7 +62327,7 @@ Domain allowed access. - + Relabel from and to generic files in /etc. @@ -62187,7 +62337,7 @@ Domain allowed access. - + Read symbolic links in /etc. @@ -62197,7 +62347,7 @@ Domain allowed access. - + Watch /etc symlinks @@ -62207,7 +62357,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /etc. @@ -62217,7 +62367,7 @@ Domain allowed access. - + Create objects in /etc with a private type using a type_transition. @@ -62243,7 +62393,7 @@ The name of the object being created. - + Create a boot flag. @@ -62265,7 +62415,7 @@ The name of the object being created. - + Delete a boot flag. @@ -62282,7 +62432,7 @@ Domain allowed access. - + Get the attributes of the etc_runtime directories. @@ -62293,7 +62443,7 @@ Domain allowed access. - + Mount a filesystem on the etc_runtime directories. @@ -62304,7 +62454,7 @@ Domain allowed access. - + Relabel to etc_runtime_t dirs. @@ -62314,7 +62464,7 @@ Domain allowed access. - + Do not audit attempts to set the attributes of the etc_runtime files @@ -62324,7 +62474,7 @@ Domain to not audit. - + Read files in /etc that are dynamically created on boot, such as mtab. @@ -62354,7 +62504,7 @@ Domain allowed access. - + Do not audit attempts to read files in /etc that are dynamically @@ -62366,7 +62516,19 @@ Domain to not audit. - + + +Do not audit attempts to execuite files +in /etc that are dynamically +created on boot, such as mtab. + + + +Domain to not audit. + + + + Do not audit attempts to read files in /etc @@ -62377,7 +62539,7 @@ Domain to not audit. - + Do not audit attempts to write etc runtime files. @@ -62388,7 +62550,7 @@ Domain to not audit. - + Read and write files in /etc that are dynamically created on boot, such as mtab. @@ -62400,7 +62562,7 @@ Domain allowed access. - + Create, read, write, and delete files in /etc that are dynamically created on boot, @@ -62413,7 +62575,7 @@ Domain allowed access. - + Relabel to etc_runtime_t files. @@ -62423,7 +62585,7 @@ Domain allowed access. - + Create, etc runtime objects with an automatic type transition. @@ -62444,7 +62606,7 @@ The name of the object being created. - + Get the attributes of the home directories root (/home). @@ -62455,7 +62617,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the home directories root @@ -62467,7 +62629,7 @@ Domain to not audit. - + Search home directories root (/home). @@ -62477,7 +62639,7 @@ Domain allowed access. - + Do not audit attempts to search home directories root (/home). @@ -62488,7 +62650,7 @@ Domain to not audit. - + Do not audit attempts to list home directories root (/home). @@ -62499,7 +62661,7 @@ Domain to not audit. - + Get listing of home directories. @@ -62509,7 +62671,7 @@ Domain allowed access. - + Relabel to user home root (/home). @@ -62519,7 +62681,7 @@ Domain allowed access. - + Relabel from user home root (/home). @@ -62529,7 +62691,7 @@ Domain allowed access. - + Watch the user home root (/home). @@ -62539,7 +62701,7 @@ Domain allowed access. - + Create objects in /home. @@ -62564,7 +62726,7 @@ The name of the object being created. - + Get the attributes of lost+found directories. @@ -62574,7 +62736,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of lost+found directories. @@ -62585,7 +62747,7 @@ Domain to not audit. - + List the contents of lost+found directories. @@ -62595,7 +62757,7 @@ Domain allowed access. - + Create, read, write, and delete objects in lost+found directories. @@ -62607,7 +62769,7 @@ Domain allowed access. - + Search the contents of /mnt. @@ -62617,7 +62779,7 @@ Domain allowed access. - + Do not audit attempts to search /mnt. @@ -62627,7 +62789,7 @@ Domain to not audit. - + List the contents of /mnt. @@ -62637,7 +62799,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of /mnt. @@ -62647,7 +62809,7 @@ Domain allowed access. - + Mount a filesystem on /mnt. @@ -62657,7 +62819,7 @@ Domain allowed access. - + Create, read, write, and delete directories in /mnt. @@ -62668,7 +62830,7 @@ Domain allowed access. - + Create, read, write, and delete files in /mnt. @@ -62678,7 +62840,7 @@ Domain allowed access. - + read files in /mnt. @@ -62688,7 +62850,7 @@ Domain allowed access. - + Read symbolic links in /mnt. @@ -62698,7 +62860,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /mnt. @@ -62708,7 +62870,7 @@ Domain allowed access. - + Search the contents of the kernel module directories. @@ -62718,7 +62880,7 @@ Domain allowed access. - + List the contents of the kernel module directories. @@ -62728,7 +62890,7 @@ Domain allowed access. - + Get the attributes of kernel module files. @@ -62738,7 +62900,7 @@ Domain allowed access. - + Read kernel module files. @@ -62748,7 +62910,7 @@ Domain allowed access. - + Read and mmap kernel module files. @@ -62758,7 +62920,7 @@ Domain allowed access. - + Write kernel module files. @@ -62768,7 +62930,7 @@ Domain allowed access. - + Delete kernel module files. @@ -62778,7 +62940,7 @@ Domain allowed access. - + Create, read, write, and delete kernel module files. @@ -62790,7 +62952,7 @@ Domain allowed access. - + Relabel from and to kernel module files. @@ -62800,7 +62962,7 @@ Domain allowed access. - + Mount on kernel module directories. @@ -62810,7 +62972,7 @@ Domain allowed access. - + Create objects in the kernel module directories with a private type via an automatic type transition. @@ -62836,7 +62998,7 @@ The name of the object being created. - + Load kernel module files. @@ -62846,7 +63008,7 @@ Domain allowed access. - + Load kernel module files. @@ -62856,7 +63018,7 @@ Domain allowed access. - + List world-readable directories. @@ -62867,7 +63029,7 @@ Domain allowed access. - + Read world-readable files. @@ -62878,7 +63040,7 @@ Domain allowed access. - + Read world-readable symbolic links. @@ -62889,7 +63051,7 @@ Domain allowed access. - + Read world-readable named pipes. @@ -62899,7 +63061,7 @@ Domain allowed access. - + Read world-readable sockets. @@ -62909,7 +63071,7 @@ Domain allowed access. - + Allow the specified type to associate to a filesystem with the type of the @@ -62921,7 +63083,7 @@ Type of the file to associate. - + Get the attributes of the tmp directory (/tmp). @@ -62931,7 +63093,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of the tmp directory (/tmp). @@ -62942,7 +63104,7 @@ Domain allowed access. - + Search the tmp directory (/tmp). @@ -62952,7 +63114,7 @@ Domain allowed access. - + Do not audit attempts to search the tmp directory (/tmp). @@ -62962,7 +63124,7 @@ Domain to not audit. - + Read the tmp directory (/tmp). @@ -62972,7 +63134,7 @@ Domain allowed access. - + Do not audit listing of the tmp directory (/tmp). @@ -62982,7 +63144,7 @@ Domain not to audit. - + Remove entries from the tmp directory. @@ -62992,7 +63154,7 @@ Domain allowed access. - + Read files in the tmp directory (/tmp). @@ -63002,7 +63164,7 @@ Domain allowed access. - + Manage temporary directories in /tmp. @@ -63012,7 +63174,7 @@ Domain allowed access. - + Relabel temporary directories in /tmp. @@ -63022,7 +63184,7 @@ Domain allowed access. - + Manage temporary files and directories in /tmp. @@ -63032,7 +63194,7 @@ Domain allowed access. - + Read symbolic links in the tmp directory (/tmp). @@ -63042,7 +63204,7 @@ Domain allowed access. - + Read and write generic named sockets in the tmp directory (/tmp). @@ -63052,7 +63214,7 @@ Domain allowed access. - + Mount filesystems in the tmp directory (/tmp) @@ -63062,7 +63224,7 @@ Domain allowed access. - + Set the attributes of all tmp directories. @@ -63072,7 +63234,7 @@ Domain allowed access. - + List all tmp directories. @@ -63082,7 +63244,7 @@ Domain allowed access. - + Relabel to and from all temporary directory types. @@ -63094,7 +63256,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all tmp files. @@ -63105,7 +63267,7 @@ Domain not to audit. - + Allow attempts to get the attributes of all tmp files. @@ -63116,7 +63278,7 @@ Domain allowed access. - + Relabel to and from all temporary file types. @@ -63128,7 +63290,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all tmp sock_file. @@ -63139,7 +63301,7 @@ Domain not to audit. - + Read all tmp files. @@ -63149,7 +63311,7 @@ Domain allowed access. - + Create an object in the tmp directories, with a private type using a type transition. @@ -63175,7 +63337,7 @@ The name of the object being created. - + Delete the contents of /tmp. @@ -63185,7 +63347,7 @@ Domain allowed access. - + Get the attributes of all tmpfs files. @@ -63195,7 +63357,7 @@ Domain allowed access. - + Set the attributes of the /usr directory. @@ -63205,7 +63367,7 @@ Domain allowed access. - + Search the content of /usr. @@ -63215,7 +63377,7 @@ Domain allowed access. - + List the contents of generic directories in /usr. @@ -63226,7 +63388,7 @@ Domain allowed access. - + Do not audit write of /usr dirs @@ -63236,7 +63398,7 @@ Domain to not audit. - + Add and remove entries from /usr directories. @@ -63246,7 +63408,7 @@ Domain allowed access. - + Do not audit attempts to add and remove entries from /usr directories. @@ -63257,7 +63419,7 @@ Domain to not audit. - + Delete generic directories in /usr in the caller domain. @@ -63267,7 +63429,7 @@ Domain allowed access. - + Watch generic directories in /usr. @@ -63277,7 +63439,7 @@ Domain allowed access. - + Delete generic files in /usr in the caller domain. @@ -63287,7 +63449,7 @@ Domain allowed access. - + Get the attributes of files in /usr. @@ -63297,7 +63459,7 @@ Domain allowed access. - + Map generic files in /usr. @@ -63308,7 +63470,7 @@ Domain allowed access. - + Read generic files in /usr. @@ -63336,7 +63498,7 @@ Domain allowed access. - + Execute generic programs in /usr in the caller domain. @@ -63346,7 +63508,7 @@ Domain allowed access. - + dontaudit write of /usr files @@ -63356,7 +63518,7 @@ Domain to not audit. - + Create, read, write, and delete files in the /usr directory. @@ -63366,7 +63528,7 @@ Domain allowed access. - + Relabel a file to the type used in /usr. @@ -63376,7 +63538,7 @@ Domain allowed access. - + Relabel a file from the type used in /usr. @@ -63386,7 +63548,7 @@ Domain allowed access. - + Read symbolic links in /usr. @@ -63396,7 +63558,7 @@ Domain allowed access. - + Create objects in the /usr directory @@ -63421,7 +63583,7 @@ The name of the object being created. - + Search directories in /usr/src. @@ -63431,7 +63593,7 @@ Domain allowed access. - + Do not audit attempts to search /usr/src. @@ -63441,7 +63603,7 @@ Domain to not audit. - + Get the attributes of files in /usr/src. @@ -63451,7 +63613,7 @@ Domain allowed access. - + Read files in /usr/src. @@ -63461,7 +63623,7 @@ Domain allowed access. - + Execute programs in /usr/src in the caller domain. @@ -63471,7 +63633,7 @@ Domain allowed access. - + Install a system.map into the /boot directory. @@ -63481,7 +63643,7 @@ Domain allowed access. - + Read system.map in the /boot directory. @@ -63491,7 +63653,7 @@ Domain allowed access. - + Delete a system.map in the /boot directory. @@ -63501,7 +63663,7 @@ Domain allowed access. - + Mount on a system.map in the /boot directory (for bind mounts). @@ -63511,7 +63673,7 @@ Domain allowed access. - + Search the contents of /var. @@ -63521,7 +63683,7 @@ Domain allowed access. - + Do not audit attempts to write to /var. @@ -63531,7 +63693,7 @@ Domain to not audit. - + Allow attempts to write to /var.dirs @@ -63541,7 +63703,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of /var. @@ -63552,7 +63714,7 @@ Domain to not audit. - + List the contents of /var. @@ -63562,7 +63724,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of /var. @@ -63573,7 +63735,7 @@ Domain to not audit. - + Create, read, write, and delete directories in the /var directory. @@ -63584,7 +63746,7 @@ Domain allowed access. - + relabelto/from var directories @@ -63594,7 +63756,7 @@ Domain allowed access. - + Read files in the /var directory. @@ -63604,7 +63766,7 @@ Domain allowed access. - + Append files in the /var directory. @@ -63614,7 +63776,7 @@ Domain allowed access. - + Read and write files in the /var directory. @@ -63624,7 +63786,7 @@ Domain allowed access. - + Do not audit attempts to read and write files in the /var directory. @@ -63635,7 +63797,7 @@ Domain to not audit. - + Create, read, write, and delete files in the /var directory. @@ -63645,7 +63807,7 @@ Domain allowed access. - + Read symbolic links in the /var directory. @@ -63655,7 +63817,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in the /var directory. @@ -63666,7 +63828,7 @@ Domain allowed access. - + Create objects in the /var directory @@ -63691,7 +63853,7 @@ The name of the object being created. - + Get the attributes of the /var/lib directory. @@ -63701,7 +63863,7 @@ Domain allowed access. - + Search the /var/lib directory. @@ -63725,7 +63887,7 @@ Domain allowed access. - + Do not audit attempts to search the contents of /var/lib. @@ -63737,7 +63899,7 @@ Domain to not audit. - + List the contents of the /var/lib directory. @@ -63747,7 +63909,7 @@ Domain allowed access. - + Read-write /var/lib directories @@ -63757,7 +63919,7 @@ Domain allowed access. - + manage var_lib_t dirs @@ -63767,7 +63929,7 @@ Domain allowed access. - + relabel var_lib_t dirs @@ -63777,7 +63939,7 @@ Domain allowed access. - + Create objects in the /var/lib directory @@ -63802,7 +63964,7 @@ The name of the object being created. - + Read generic files in /var/lib. @@ -63812,7 +63974,7 @@ Domain allowed access. - + Read generic symbolic links in /var/lib @@ -63822,7 +63984,7 @@ Domain allowed access. - + Create, read, write, and delete the pseudorandom number generator seed. @@ -63833,7 +63995,7 @@ Domain allowed access. - + Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -63844,7 +64006,7 @@ Domain allowed access. - + Set the attributes of the generic lock directories. @@ -63854,7 +64016,7 @@ Domain allowed access. - + Search the locks directory (/var/lock). @@ -63864,7 +64026,7 @@ Domain allowed access. - + Do not audit attempts to search the locks directory (/var/lock). @@ -63875,7 +64037,7 @@ Domain to not audit. - + List generic lock directories. @@ -63885,7 +64047,7 @@ Domain allowed access. - + Test write access on lock directories. @@ -63895,7 +64057,7 @@ Domain allowed access. - + Add entries in the /var/lock directories. @@ -63905,7 +64067,7 @@ Domain allowed access. - + Add and remove entries in the /var/lock directories. @@ -63916,7 +64078,7 @@ Domain allowed access. - + Create lock directories @@ -63926,7 +64088,7 @@ Domain allowed access - + Relabel to and from all lock directory types. @@ -63937,7 +64099,7 @@ Domain allowed access. - + Get the attributes of generic lock files. @@ -63947,7 +64109,7 @@ Domain allowed access. - + Delete generic lock files. @@ -63957,7 +64119,7 @@ Domain allowed access. - + Create, read, write, and delete generic lock files. @@ -63968,7 +64130,7 @@ Domain allowed access. - + Delete all lock files. @@ -63979,7 +64141,7 @@ Domain allowed access. - + Read all lock files. @@ -63989,7 +64151,7 @@ Domain allowed access. - + manage all lock files. @@ -63999,7 +64161,7 @@ Domain allowed access. - + Relabel from/to all lock files. @@ -64009,7 +64171,7 @@ Domain allowed access. - + Create an object in the locks directory, with a private type using a type transition. @@ -64035,7 +64197,7 @@ The name of the object being created. - + Do not audit attempts to get the attributes of the /var/run directory. @@ -64046,7 +64208,7 @@ Domain to not audit. - + mounton a /var/run directory. @@ -64056,7 +64218,7 @@ Domain allowed access. - + Set the attributes of the /var/run directory. @@ -64066,7 +64228,7 @@ Domain allowed access. - + Search the contents of runtime process ID directories (/var/run). @@ -64077,7 +64239,7 @@ Domain allowed access. - + Do not audit attempts to search the /var/run directory. @@ -64088,7 +64250,7 @@ Domain to not audit. - + List the contents of the runtime process ID directories (/var/run). @@ -64099,7 +64261,7 @@ Domain allowed access. - + Check write access on /var/run directories. @@ -64109,7 +64271,7 @@ Domain allowed access. - + Create a /var/run directory. @@ -64119,7 +64281,7 @@ Domain allowed access. - + Read and write a /var/run directory. @@ -64129,7 +64291,17 @@ Domain allowed access. - + + +Watch /var/lib directories. + + + +Domain allowed access. + + + + Watch /var/run directories. @@ -64139,7 +64311,17 @@ Domain allowed access. - + + +Watch /var directories. + + + +Domain allowed access. + + + + Read generic runtime files. @@ -64149,7 +64331,7 @@ Domain allowed access. - + Execute generic programs in /var/run in the caller domain. @@ -64159,7 +64341,17 @@ Domain allowed access. - + + +Dontaudit attempt to execute generic programs in /var/run in the caller domain. + + + +Domain allowed access. + + + + Read and write generic runtime files. @@ -64169,7 +64361,7 @@ Domain allowed access. - + Delete generic runtime symlinks. @@ -64179,7 +64371,7 @@ Domain allowed access. - + Write named generic runtime pipes. @@ -64189,7 +64381,7 @@ Domain allowed access. - + Delete all runtime dirs. @@ -64200,7 +64392,7 @@ Domain allowed access. - + Create, read, write, and delete all runtime directories. @@ -64210,7 +64402,7 @@ Domain allowed access. - + Relabel all runtime directories. @@ -64220,7 +64412,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all runtime data files. @@ -64231,7 +64423,7 @@ Domain to not audit. - + Read all runtime files. @@ -64242,7 +64434,7 @@ Domain allowed access. - + Do not audit attempts to ioctl all runtime files. @@ -64252,7 +64444,7 @@ Domain to not audit. - + Do not audit attempts to write to all runtime files. @@ -64262,7 +64454,7 @@ Domain to not audit. - + Delete all runtime files. @@ -64273,7 +64465,7 @@ Domain allowed access. - + Create, read, write and delete all var_run (pid) files @@ -64284,7 +64476,7 @@ Domain allowed access. - + Relabel all runtime files. @@ -64294,7 +64486,7 @@ Domain allowed access. - + Delete all runtime symlinks. @@ -64305,7 +64497,7 @@ Domain allowed access. - + Create, read, write and delete all var_run (pid) symbolic links. @@ -64316,7 +64508,7 @@ Domain allowed access. - + Relabel all runtime symbolic links. @@ -64326,7 +64518,7 @@ Domain allowed access. - + Create all runtime named pipes @@ -64336,7 +64528,7 @@ Domain allowed access. - + Delete all runtime named pipes @@ -64346,7 +64538,7 @@ Domain allowed access. - + Create all runtime sockets. @@ -64356,7 +64548,7 @@ Domain allowed access. - + Delete all runtime sockets. @@ -64366,7 +64558,7 @@ Domain allowed access. - + Relabel all runtime named sockets. @@ -64376,7 +64568,7 @@ Domain allowed access. - + Create an object in the /run directory, with a private type. @@ -64428,7 +64620,7 @@ The name of the object being created. - + Create a generic lock directory within the run directories. @@ -64443,7 +64635,7 @@ The name of the object being created. - + Create all spool sockets @@ -64453,7 +64645,7 @@ Domain allowed access. - + Delete all spool sockets @@ -64463,7 +64655,7 @@ Domain allowed access. - + Mount filesystems on all polyinstantiation member directories. @@ -64474,7 +64666,7 @@ Domain allowed access. - + Search the contents of generic spool directories (/var/spool). @@ -64485,7 +64677,7 @@ Domain allowed access. - + Do not audit attempts to search generic spool directories. @@ -64496,7 +64688,7 @@ Domain to not audit. - + List the contents of generic spool (/var/spool) directories. @@ -64507,7 +64699,7 @@ Domain allowed access. - + Create, read, write, and delete generic spool directories (/var/spool). @@ -64518,7 +64710,7 @@ Domain allowed access. - + Read generic spool files. @@ -64528,7 +64720,7 @@ Domain allowed access. - + Create, read, write, and delete generic spool files. @@ -64539,7 +64731,7 @@ Domain allowed access. - + Create objects in the spool directory with a private type with a type transition. @@ -64566,7 +64758,7 @@ The name of the object being created. - + Allow access to manage all polyinstantiated directories on the system. @@ -64577,7 +64769,7 @@ Domain allowed access. - + Unconfined access to files. @@ -64587,7 +64779,7 @@ Domain allowed access. - + Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -64599,7 +64791,7 @@ Domain allowed access. - + Do not audit attempts to read etc_runtime resources @@ -64609,7 +64801,7 @@ Domain allowed access. - + List usr/src files @@ -64619,7 +64811,7 @@ Domain allowed access - + Read usr/src files @@ -64629,7 +64821,7 @@ Domain allowed access - + Manage /usr/src files @@ -64639,7 +64831,7 @@ Domain allowed access - + Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -64661,7 +64853,7 @@ Optional name of the resource - + Read etc runtime resources @@ -64671,7 +64863,7 @@ Domain allowed access - + Allow relabel from and to non-security types @@ -64682,7 +64874,7 @@ Domain allowed access. - + Manage non-security-sensitive resource types @@ -64693,7 +64885,7 @@ Domain allowed access. - + Allow relabeling from and to any pidfile associated type @@ -65073,7 +65265,17 @@ Domain allowed access. - + + +Get the attributes of binfmt_misc filesystems. + + + +Domain allowed access. + + + + Get the attributes of directories on binfmt_misc filesystems. @@ -65084,7 +65286,18 @@ Domain allowed access. - + + +Check for permissions using access(2) of directories on +binfmt_misc filesystems. + + + +Domain allowed access. + + + + Register an interpreter for new binary file types, using the kernel binfmt_misc @@ -65111,7 +65324,7 @@ Domain allowed access. - + Mount a bpf filesystem. @@ -65121,7 +65334,7 @@ Domain allowed access. - + Create bpf directories. @@ -65131,7 +65344,7 @@ Domain allowed access. - + Manage bpf files. @@ -65141,7 +65354,17 @@ Domain allowed access. - + + +Manage bpf symlinks. + + + +Domain allowed access. + + + + Mount cgroup filesystems. @@ -65151,7 +65374,7 @@ Domain allowed access. - + Remount cgroup filesystems. @@ -65161,7 +65384,7 @@ Domain allowed access. - + Unmount cgroup filesystems. @@ -65171,7 +65394,7 @@ Domain allowed access. - + Get attributes of cgroup filesystems. @@ -65181,7 +65404,7 @@ Domain allowed access. - + Search cgroup directories. @@ -65191,7 +65414,7 @@ Domain allowed access. - + list cgroup directories. @@ -65201,7 +65424,7 @@ Domain allowed access. - + Ioctl cgroup directories. @@ -65211,7 +65434,7 @@ Domain allowed access. - + Create cgroup directories. @@ -65221,7 +65444,7 @@ Domain allowed access. - + Delete cgroup directories. @@ -65231,7 +65454,7 @@ Domain allowed access. - + Manage cgroup directories. @@ -65241,7 +65464,7 @@ Domain allowed access. - + Relabel cgroup directories. @@ -65251,7 +65474,7 @@ Domain allowed access. - + Get attributes of cgroup files. @@ -65261,7 +65484,7 @@ Domain allowed access. - + Read cgroup files. @@ -65271,7 +65494,7 @@ Domain allowed access. - + Create cgroup files. @@ -65281,7 +65504,7 @@ Domain allowed access. - + Watch cgroup files. @@ -65291,7 +65514,17 @@ Domain allowed access. - + + +Read cgroup symlnks. + + + +Domain allowed access. + + + + Create cgroup lnk_files. @@ -65301,7 +65534,7 @@ Domain allowed access. - + Write cgroup files. @@ -65311,7 +65544,7 @@ Domain allowed access. - + Read and write cgroup files. @@ -65321,7 +65554,7 @@ Domain allowed access. - + Do not audit attempts to open, get attributes, read and write @@ -65333,7 +65566,7 @@ Domain to not audit. - + Manage cgroup files. @@ -65343,7 +65576,7 @@ Domain allowed access. - + Relabel cgroup symbolic links. @@ -65353,7 +65586,7 @@ Domain allowed access. - + Watch cgroup directories. @@ -65363,7 +65596,7 @@ Domain allowed access. - + Mount on cgroup directories. @@ -65373,7 +65606,7 @@ Domain allowed access. - + Mount on cgroup files. @@ -65383,7 +65616,7 @@ Domain allowed access. - + Create an object in a cgroup tmpfs filesystem, with a private type using a type transition. @@ -65409,7 +65642,7 @@ The name of the object being created. - + Create an object in a cgroup tmpfs filesystem, with the memory_pressure_t type using a type transition. @@ -65430,7 +65663,17 @@ The name of the object being created. - + + +Get the attributes of cgroup's memory.pressure files. + + + +Domain allowed access. + + + + Allow managing a cgroup's memory.pressure file to get notifications @@ -65440,7 +65683,7 @@ Source domain - + Do not audit attempts to read dirs on a CIFS or SMB filesystem. @@ -65451,7 +65694,7 @@ Domain to not audit. - + Mount a CIFS or SMB network filesystem. @@ -65461,7 +65704,7 @@ Domain allowed access. - + Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. @@ -65472,7 +65715,7 @@ Domain allowed access. - + Unmount a CIFS or SMB network filesystem. @@ -65482,7 +65725,7 @@ Domain allowed access. - + Get the attributes of a CIFS or SMB network filesystem. @@ -65494,7 +65737,7 @@ Domain allowed access. - + Search directories on a CIFS or SMB filesystem. @@ -65504,7 +65747,7 @@ Domain allowed access. - + List the contents of directories on a CIFS or SMB filesystem. @@ -65515,7 +65758,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. @@ -65526,7 +65769,7 @@ Domain to not audit. - + Mounton a CIFS filesystem. @@ -65536,7 +65779,7 @@ Domain allowed access. - + Read files on a CIFS or SMB filesystem. @@ -65547,7 +65790,7 @@ Domain allowed access. - + Read all inherited filesystem image files. @@ -65558,7 +65801,7 @@ Domain allowed access. - + Read all filesystem image files. @@ -65569,7 +65812,7 @@ Domain allowed access. - + Mmap-read all filesystem image files. @@ -65580,7 +65823,7 @@ Domain allowed access. - + Read and write all filesystem image files. @@ -65591,7 +65834,7 @@ Domain allowed access. - + Mmap-Read-write all filesystem image files. @@ -65602,7 +65845,7 @@ Domain allowed access. - + Do not audit attempts to write all filesystem image files. @@ -65613,7 +65856,7 @@ Domain allowed access. - + Get the attributes of filesystems that do not have extended attribute support. @@ -65625,7 +65868,7 @@ Domain allowed access. - + Read all noxattrfs directories. @@ -65635,7 +65878,7 @@ Domain allowed access. - + Do not audit attempts to list all noxattrfs directories. @@ -65646,7 +65889,7 @@ Domain to not audit. - + Create, read, write, and delete all noxattrfs directories. @@ -65656,7 +65899,7 @@ Domain allowed access. - + Read all noxattrfs files. @@ -65666,7 +65909,7 @@ Domain allowed access. - + Do not audit attempts to read all noxattrfs files. @@ -65677,7 +65920,7 @@ Domain to not audit. - + Dont audit attempts to write to noxattrfs files. @@ -65687,7 +65930,7 @@ Domain to not audit. - + Create, read, write, and delete all noxattrfs files. @@ -65697,7 +65940,7 @@ Domain allowed access. - + Read all noxattrfs symbolic links. @@ -65707,7 +65950,7 @@ Domain allowed access. - + Manage all noxattrfs symbolic links. @@ -65717,7 +65960,7 @@ Domain allowed access. - + Relabel all objects from filesystems that do not support extended attributes. @@ -65728,7 +65971,7 @@ Domain allowed access. - + Do not audit attempts to read files on a CIFS or SMB filesystem. @@ -65739,7 +65982,7 @@ Domain to not audit. - + Append files on a CIFS filesystem. @@ -65751,7 +65994,7 @@ Domain allowed access. - + dontaudit Append files on a CIFS filesystem. @@ -65763,7 +66006,7 @@ Domain to not audit. - + Do not audit attempts to read or write files on a CIFS or SMB filesystem. @@ -65774,7 +66017,7 @@ Domain to not audit. - + Read symbolic links on a CIFS or SMB filesystem. @@ -65784,7 +66027,7 @@ Domain allowed access. - + Read named pipes on a CIFS or SMB network filesystem. @@ -65795,7 +66038,7 @@ Domain allowed access. - + Read named sockets on a CIFS or SMB network filesystem. @@ -65806,7 +66049,7 @@ Domain allowed access. - + Execute files on a CIFS or SMB network filesystem, in the caller @@ -65819,7 +66062,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a CIFS or SMB network filesystem. @@ -65831,7 +66074,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -65843,7 +66086,7 @@ Domain to not audit. - + Create, read, write, and delete files on a CIFS or SMB network filesystem. @@ -65855,7 +66098,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -65867,7 +66110,7 @@ Domain to not audit. - + Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. @@ -65878,7 +66121,7 @@ Domain allowed access. - + Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. @@ -65889,7 +66132,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. @@ -65900,7 +66143,7 @@ Domain allowed access. - + Execute a file on a CIFS or SMB filesystem in the specified domain. @@ -65935,7 +66178,7 @@ The type of the new process. - + Create, read, write, and delete dirs on a configfs filesystem. @@ -65946,7 +66189,7 @@ Domain allowed access. - + Create, read, write, and delete files on a configfs filesystem. @@ -65957,7 +66200,7 @@ Domain allowed access. - + Mount a DOS filesystem, such as FAT32 or NTFS. @@ -65968,7 +66211,7 @@ Domain allowed access. - + Remount a DOS filesystem, such as FAT32 or NTFS. This allows @@ -65980,7 +66223,7 @@ Domain allowed access. - + Unmount a DOS filesystem, such as FAT32 or NTFS. @@ -65991,7 +66234,7 @@ Domain allowed access. - + Get the attributes of a DOS filesystem, such as FAT32 or NTFS. @@ -66003,7 +66246,7 @@ Domain allowed access. - + Allow changing of the label of a DOS filesystem using the context= mount option. @@ -66014,7 +66257,7 @@ Domain allowed access. - + Get attributes of directories on a dosfs filesystem. @@ -66024,7 +66267,7 @@ Domain allowed access. - + Search dosfs filesystem. @@ -66034,7 +66277,7 @@ Domain allowed access. - + List dirs DOS filesystem. @@ -66044,7 +66287,7 @@ Domain allowed access. - + Create, read, write, and delete dirs on a DOS filesystem. @@ -66055,7 +66298,7 @@ Domain allowed access. - + Read files on a DOS filesystem. @@ -66065,7 +66308,7 @@ Domain allowed access. - + Read and map files on a DOS filesystem. @@ -66075,7 +66318,7 @@ Domain allowed access. - + Create, read, write, and delete files on a DOS filesystem. @@ -66086,7 +66329,7 @@ Domain allowed access. - + Read symbolic links on an eCryptfs filesystem. @@ -66096,7 +66339,7 @@ Domain allowed access. - + Create, read, write, and delete directories on an eCryptfs filesystem. @@ -66108,7 +66351,7 @@ Domain allowed access. - + Create, read, write, and delete files on an eCryptfs filesystem. @@ -66120,7 +66363,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on an eCryptfs filesystem. @@ -66131,7 +66374,7 @@ Domain allowed access. - + Get the attributes of efivarfs filesystems. @@ -66141,7 +66384,7 @@ Domain allowed access. - + List dirs in efivarfs filesystem. @@ -66151,7 +66394,7 @@ Domain allowed access. - + Read files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -66163,7 +66406,7 @@ Domain allowed access. - + Set the attributes of files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -66175,7 +66418,7 @@ Domain allowed access. - + Create, read, write, and delete files on a efivarfs filesystem. @@ -66187,7 +66430,7 @@ Domain allowed access. - + stat a FUSE filesystem @@ -66197,7 +66440,7 @@ Domain allowed access. - + Mount a FUSE filesystem. @@ -66207,7 +66450,7 @@ Domain allowed access. - + Unmount a FUSE filesystem. @@ -66217,7 +66460,7 @@ Domain allowed access. - + Remount a FUSE filesystem. @@ -66227,7 +66470,7 @@ Domain allowed access. - + Mounton a FUSEFS filesystem. @@ -66237,7 +66480,17 @@ Domain allowed access. - + + +Mount on files on a FUSEFS filesystem. + + + +Domain allowed access. + + + + Make FUSEFS files an entrypoint for the specified domain. @@ -66248,7 +66501,7 @@ The domain for which fusefs_t is an entrypoint. - + Execute FUSEFS files in a specified domain. @@ -66273,7 +66526,7 @@ Domain to transition to. - + Search directories on a FUSEFS filesystem. @@ -66285,7 +66538,7 @@ Domain allowed access. - + List the contents of directories on a FUSEFS filesystem. @@ -66297,7 +66550,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of directories on a FUSEFS filesystem. @@ -66308,7 +66561,7 @@ Domain to not audit. - + Set the attributes of directories on a FUSEFS filesystem. @@ -66320,7 +66573,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a FUSEFS filesystem. @@ -66332,7 +66585,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -66344,7 +66597,17 @@ Domain to not audit. - + + +Watch directories on a FUSEFS filesystem. + + + +Domain allowed access. + + + + Get the attributes of files on a FUSEFS filesystem. @@ -66356,7 +66619,7 @@ Domain allowed access. - + Read, a FUSEFS filesystem. @@ -66367,7 +66630,7 @@ Domain allowed access. - + Execute files on a FUSEFS filesystem. @@ -66378,7 +66641,7 @@ Domain allowed access. - + Set the attributes of files on a FUSEFS filesystem. @@ -66390,7 +66653,7 @@ Domain allowed access. - + Create, read, write, and delete files on a FUSEFS filesystem. @@ -66402,7 +66665,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -66414,7 +66677,17 @@ Domain to not audit. - + + +Watch files on a FUSEFS filesystem. + + + +Domain allowed access. + + + + Get the attributes of symlinks on a FUSEFS filesystem. @@ -66426,7 +66699,7 @@ Domain allowed access. - + Read symbolic links on a FUSEFS filesystem. @@ -66436,7 +66709,7 @@ Domain allowed access. - + Set the attributes of symlinks on a FUSEFS filesystem. @@ -66448,7 +66721,7 @@ Domain allowed access. - + Manage symlinks on a FUSEFS filesystem. @@ -66459,7 +66732,7 @@ Domain allowed access. - + Get the attributes of named pipes on a FUSEFS filesystem. @@ -66471,7 +66744,7 @@ Domain allowed access. - + Set the attributes of named pipes on a FUSEFS filesystem. @@ -66483,7 +66756,7 @@ Domain allowed access. - + Manage named pipes on a FUSEFS filesystem. @@ -66495,7 +66768,7 @@ Domain allowed access. - + Get the attributes of named sockets on a FUSEFS filesystem. @@ -66507,7 +66780,7 @@ Domain allowed access. - + Set the attributes of named sockets on a FUSEFS filesystem. @@ -66519,7 +66792,7 @@ Domain allowed access. - + Manage named sockets on a FUSEFS filesystem. @@ -66531,7 +66804,7 @@ Domain allowed access. - + Get the attributes of character files on a FUSEFS filesystem. @@ -66543,7 +66816,7 @@ Domain allowed access. - + Set the attributes of character files on a FUSEFS filesystem. @@ -66555,7 +66828,7 @@ Domain allowed access. - + Manage character files on a FUSEFS filesystem. @@ -66567,7 +66840,31 @@ Domain allowed access. - + + +Create block files on a FUSEFS +filesystem. + + + +Domain allowed access. + + + + + + +Set the attributes of block files on +a FUSEFS filesystem. + + + +Domain allowed access. + + + + + Get the attributes of an hugetlbfs filesystem. @@ -66578,7 +66875,7 @@ Domain allowed access. - + List hugetlbfs. @@ -66588,7 +66885,7 @@ Domain allowed access. - + Manage hugetlbfs dirs. @@ -66598,7 +66895,7 @@ Domain allowed access. - + Read and write inherited hugetlbfs files. @@ -66608,7 +66905,7 @@ Domain allowed access. - + Read and write hugetlbfs files. @@ -66618,7 +66915,7 @@ Domain allowed access. - + Read, map and write hugetlbfs files. @@ -66628,7 +66925,7 @@ Domain allowed access. - + Allow the type to associate to hugetlbfs filesystems. @@ -66638,7 +66935,7 @@ The type of the object to be associated. - + Search inotifyfs filesystem. @@ -66648,7 +66945,7 @@ Domain allowed access. - + List inotifyfs filesystem. @@ -66658,7 +66955,7 @@ Domain allowed access. - + Dontaudit List inotifyfs filesystem. @@ -66668,7 +66965,7 @@ Domain to not audit. - + Create an object in a hugetlbfs filesystem, with a private type using a type transition. @@ -66694,7 +66991,7 @@ The name of the object being created. - + Mount an iso9660 filesystem, which is usually used on CDs. @@ -66705,7 +67002,7 @@ Domain allowed access. - + Remount an iso9660 filesystem, which is usually used on CDs. This allows @@ -66717,7 +67014,7 @@ Domain allowed access. - + Allow changing of the label of a filesystem with iso9660 type @@ -66728,7 +67025,7 @@ Domain allowed access. - + Unmount an iso9660 filesystem, which is usually used on CDs. @@ -66739,7 +67036,7 @@ Domain allowed access. - + Get the attributes of an iso9660 filesystem, which is usually used on CDs. @@ -66751,7 +67048,7 @@ Domain allowed access. - + Get the attributes of files on an iso9660 filesystem, which is usually used on CDs. @@ -66762,7 +67059,7 @@ Domain allowed access. - + Read files on an iso9660 filesystem, which is usually used on CDs. @@ -66773,7 +67070,7 @@ Domain allowed access. - + Mount a NFS filesystem. @@ -66783,7 +67080,7 @@ Domain allowed access. - + Remount a NFS filesystem. This allows some mount options to be changed. @@ -66794,7 +67091,7 @@ Domain allowed access. - + Unmount a NFS filesystem. @@ -66804,7 +67101,7 @@ Domain allowed access. - + Get the attributes of a NFS filesystem. @@ -66815,7 +67112,7 @@ Domain allowed access. - + Search directories on a NFS filesystem. @@ -66825,7 +67122,7 @@ Domain allowed access. - + List NFS filesystem. @@ -66835,7 +67132,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of directories on a NFS filesystem. @@ -66846,7 +67143,7 @@ Domain to not audit. - + Add a watch on directories on an NFS filesystem. @@ -66857,7 +67154,7 @@ Domain allowed access. - + Mounton a NFS filesystem. @@ -66867,7 +67164,7 @@ Domain allowed access. - + Read files on a NFS filesystem. @@ -66878,7 +67175,7 @@ Domain allowed access. - + Do not audit attempts to read files on a NFS filesystem. @@ -66889,7 +67186,7 @@ Domain to not audit. - + Read files on a NFS filesystem. @@ -66899,7 +67196,7 @@ Domain allowed access. - + Execute files on a NFS filesystem. @@ -66910,7 +67207,7 @@ Domain allowed access. - + Append files on a NFS filesystem. @@ -66922,7 +67219,7 @@ Domain allowed access. - + dontaudit Append files on a NFS filesystem. @@ -66934,7 +67231,7 @@ Domain to not audit. - + Do not audit attempts to read or write files on a NFS filesystem. @@ -66945,7 +67242,7 @@ Domain to not audit. - + Add a watch on files on an NFS filesystem. @@ -66955,7 +67252,7 @@ Domain allowed access. - + Read symbolic links on a NFS filesystem. @@ -66965,7 +67262,7 @@ Domain allowed access. - + Dontaudit read symbolic links on a NFS filesystem. @@ -66975,7 +67272,7 @@ Domain to not audit. - + Read named sockets on a NFS filesystem. @@ -66985,7 +67282,7 @@ Domain allowed access. - + Read named pipes on a NFS network filesystem. @@ -66996,7 +67293,7 @@ Domain allowed access. - + Get the attributes of directories of RPC file system pipes. @@ -67007,7 +67304,7 @@ Domain allowed access. - + Search directories of RPC file system pipes. @@ -67017,7 +67314,7 @@ Domain allowed access. - + Search removable storage directories. @@ -67027,7 +67324,7 @@ Domain allowed access. - + Do not audit attempts to list removable storage directories. @@ -67037,7 +67334,7 @@ Domain not to audit. - + Read removable storage files. @@ -67047,7 +67344,7 @@ Domain allowed access. - + Do not audit attempts to read removable storage files. @@ -67057,7 +67354,7 @@ Domain not to audit. - + Do not audit attempts to write removable storage files. @@ -67067,7 +67364,7 @@ Domain not to audit. - + Read removable storage symbolic links. @@ -67077,7 +67374,7 @@ Domain allowed access. - + Read block nodes on removable filesystems. @@ -67087,7 +67384,7 @@ Domain allowed access. - + Read and write block nodes on removable filesystems. @@ -67097,7 +67394,7 @@ Domain allowed access. - + Read directories of RPC file system pipes. @@ -67107,7 +67404,7 @@ Domain allowed access. - + Read files of RPC file system pipes. @@ -67117,7 +67414,7 @@ Domain allowed access. - + Read symbolic links of RPC file system pipes. @@ -67127,7 +67424,7 @@ Domain allowed access. - + Read sockets of RPC file system pipes. @@ -67137,7 +67434,7 @@ Domain allowed access. - + Read and write sockets of RPC file system pipes. @@ -67147,7 +67444,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a NFS filesystem. @@ -67159,7 +67456,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -67171,7 +67468,7 @@ Domain to not audit. - + Create, read, write, and delete files on a NFS filesystem. @@ -67183,7 +67480,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -67195,7 +67492,7 @@ Domain to not audit. - + Create, read, write, and delete symbolic links on a NFS network filesystem. @@ -67207,7 +67504,7 @@ Domain allowed access. - + Create, read, write, and delete named pipes on a NFS filesystem. @@ -67218,7 +67515,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on a NFS filesystem. @@ -67229,7 +67526,7 @@ Domain allowed access. - + Execute a file on a NFS filesystem in the specified domain. @@ -67264,7 +67561,7 @@ The type of the new process. - + Mount a NFS server pseudo filesystem. @@ -67274,7 +67571,7 @@ Domain allowed access. - + Mount a NFS server pseudo filesystem. This allows some mount options to be changed. @@ -67285,7 +67582,7 @@ Domain allowed access. - + Unmount a NFS server pseudo filesystem. @@ -67295,7 +67592,7 @@ Domain allowed access. - + Get the attributes of a NFS server pseudo filesystem. @@ -67306,7 +67603,7 @@ Domain allowed access. - + Search NFS server directories. @@ -67316,7 +67613,7 @@ Domain allowed access. - + List NFS server directories. @@ -67326,7 +67623,7 @@ Domain allowed access. - + Watch NFS server directories. @@ -67336,7 +67633,7 @@ Domain allowed access. - + Getattr files on an nfsd filesystem @@ -67346,7 +67643,7 @@ Domain allowed access. - + Read and write NFS server files. @@ -67356,7 +67653,7 @@ Domain allowed access. - + Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts) @@ -67366,7 +67663,7 @@ Domain allowed access. - + Read nsfs inodes (e.g. /proc/pid/ns/uts) @@ -67376,7 +67673,7 @@ Domain allowed access. - + Watch NFS server files. @@ -67386,7 +67683,7 @@ Domain allowed access. - + Get the attributes of an nsfs filesystem. @@ -67396,7 +67693,7 @@ Domain allowed access. - + Unmount an nsfs filesystem. @@ -67406,7 +67703,7 @@ Domain allowed access. - + Get the attributes of a pstore filesystem. @@ -67416,7 +67713,7 @@ Domain allowed access. - + Get the attributes of directories of a pstore filesystem. @@ -67427,7 +67724,7 @@ Domain allowed access. - + Create pstore directories. @@ -67437,7 +67734,7 @@ Domain allowed access. - + Relabel to/from pstore_t directories. @@ -67447,7 +67744,7 @@ Domain allowed access. - + List the directories of a pstore filesystem. @@ -67458,7 +67755,7 @@ Domain allowed access. - + Read pstore_t files @@ -67468,7 +67765,7 @@ Domain allowed access. - + Delete the files of a pstore filesystem. @@ -67479,7 +67776,7 @@ Domain allowed access. - + Allow the type to associate to ramfs filesystems. @@ -67489,7 +67786,7 @@ The type of the object to be associated. - + Mount a RAM filesystem. @@ -67499,7 +67796,7 @@ Domain allowed access. - + Remount a RAM filesystem. This allows some mount options to be changed. @@ -67510,7 +67807,7 @@ Domain allowed access. - + Unmount a RAM filesystem. @@ -67520,7 +67817,7 @@ Domain allowed access. - + Get the attributes of a RAM filesystem. @@ -67530,7 +67827,7 @@ Domain allowed access. - + Search directories on a ramfs @@ -67540,7 +67837,7 @@ Domain allowed access. - + Dontaudit Search directories on a ramfs @@ -67550,7 +67847,7 @@ Domain to not audit. - + Set the attributes of directories on a ramfs. @@ -67561,7 +67858,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a ramfs. @@ -67572,7 +67869,7 @@ Domain allowed access. - + Dontaudit read on a ramfs files. @@ -67582,7 +67879,7 @@ Domain to not audit. - + Dontaudit read on a ramfs fifo_files. @@ -67592,7 +67889,7 @@ Domain to not audit. - + Create, read, write, and delete files on a ramfs filesystem. @@ -67603,7 +67900,7 @@ Domain allowed access. - + Write to named pipe on a ramfs filesystem. @@ -67613,7 +67910,7 @@ Domain allowed access. - + Do not audit attempts to write to named pipes on a ramfs filesystem. @@ -67624,7 +67921,7 @@ Domain to not audit. - + Read and write a named pipe on a ramfs filesystem. @@ -67634,7 +67931,7 @@ Domain allowed access. - + Create, read, write, and delete named pipes on a ramfs filesystem. @@ -67645,7 +67942,7 @@ Domain allowed access. - + Write to named socket on a ramfs filesystem. @@ -67655,7 +67952,7 @@ Domain allowed access. - + Create, read, write, and delete named sockets on a ramfs filesystem. @@ -67666,7 +67963,7 @@ Domain allowed access. - + Mount a ROM filesystem. @@ -67676,7 +67973,7 @@ Domain allowed access. - + Remount a ROM filesystem. This allows some mount options to be changed. @@ -67687,7 +67984,7 @@ Domain allowed access. - + Unmount a ROM filesystem. @@ -67697,7 +67994,7 @@ Domain allowed access. - + Get the attributes of a ROM filesystem. @@ -67708,7 +68005,7 @@ Domain allowed access. - + Mount a RPC pipe filesystem. @@ -67718,7 +68015,7 @@ Domain allowed access. - + Remount a RPC pipe filesystem. This allows some mount option to be changed. @@ -67729,7 +68026,7 @@ Domain allowed access. - + Unmount a RPC pipe filesystem. @@ -67739,7 +68036,7 @@ Domain allowed access. - + Get the attributes of a RPC pipe filesystem. @@ -67750,7 +68047,7 @@ Domain allowed access. - + Read and write RPC pipe filesystem named pipes. @@ -67760,7 +68057,7 @@ Domain allowed access. - + Watch RPC pipe filesystem directories. @@ -67770,7 +68067,7 @@ Domain allowed access. - + Mount a tmpfs filesystem. @@ -67780,7 +68077,7 @@ Domain allowed access. - + Remount a tmpfs filesystem. @@ -67790,7 +68087,7 @@ Domain allowed access. - + Unmount a tmpfs filesystem. @@ -67800,7 +68097,7 @@ Domain allowed access. - + Do not audit getting the attributes of a tmpfs filesystem @@ -67810,7 +68107,7 @@ Domain to not audit - + Get the attributes of a tmpfs filesystem. @@ -67822,7 +68119,7 @@ Domain allowed access. - + Allow the type to associate to tmpfs filesystems. @@ -67832,7 +68129,7 @@ The type of the object to be associated. - + Relabel from tmpfs filesystem. @@ -67842,7 +68139,7 @@ Domain allowed access. - + Get the attributes of tmpfs directories. @@ -67852,7 +68149,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of tmpfs directories. @@ -67863,7 +68160,7 @@ Domain to not audit. - + Mount on tmpfs directories. @@ -67873,7 +68170,7 @@ Domain allowed access. - + Mount on tmpfs files. @@ -67883,7 +68180,7 @@ Domain allowed access. - + Set the attributes of tmpfs directories. @@ -67893,7 +68190,7 @@ Domain allowed access. - + Search tmpfs directories. @@ -67903,7 +68200,7 @@ Domain allowed access. - + List the contents of generic tmpfs directories. @@ -67913,7 +68210,7 @@ Domain allowed access. - + Do not audit attempts to list the contents of generic tmpfs directories. @@ -67924,7 +68221,7 @@ Domain to not audit. - + Create, read, write, and delete tmpfs directories @@ -67935,7 +68232,7 @@ Domain allowed access. - + Do not audit attempts to write tmpfs directories @@ -67946,7 +68243,7 @@ Domain to not audit. - + Relabel from tmpfs_t dir @@ -67956,7 +68253,7 @@ Domain allowed access. - + Relabel directory on tmpfs filesystems. @@ -67966,7 +68263,7 @@ Domain allowed access. - + Watch directories on tmpfs filesystems. @@ -67976,7 +68273,7 @@ Domain allowed access. - + Create an object in a tmpfs filesystem, with a private type using a type transition. @@ -68002,7 +68299,7 @@ The name of the object being created. - + Do not audit attempts to getattr generic tmpfs files. @@ -68013,7 +68310,7 @@ Domain to not audit. - + Do not audit attempts to read or write generic tmpfs files. @@ -68024,7 +68321,7 @@ Domain to not audit. - + Delete tmpfs symbolic links. @@ -68034,7 +68331,7 @@ Domain allowed access. - + Create, read, write, and delete auto moutpoints. @@ -68045,7 +68342,7 @@ Domain allowed access. - + Read generic tmpfs files. @@ -68055,7 +68352,7 @@ Domain allowed access. - + Read and write generic tmpfs files. @@ -68065,7 +68362,7 @@ Domain allowed access. - + Relabel files on tmpfs filesystems. @@ -68075,7 +68372,7 @@ Domain allowed access. - + Read tmpfs link files. @@ -68085,7 +68382,7 @@ Domain allowed access. - + Relabelfrom socket files on tmpfs filesystems. @@ -68095,7 +68392,7 @@ Domain allowed access. - + Relabelfrom tmpfs link files. @@ -68105,7 +68402,7 @@ Domain allowed access. - + Read and write character nodes on tmpfs filesystems. @@ -68115,7 +68412,7 @@ Domain allowed access. - + dontaudit Read and write character nodes on tmpfs filesystems. @@ -68125,7 +68422,7 @@ Domain to not audit. - + Relabel character nodes on tmpfs filesystems. @@ -68135,7 +68432,7 @@ Domain allowed access. - + Read and write block nodes on tmpfs filesystems. @@ -68145,7 +68442,7 @@ Domain allowed access. - + Relabel block nodes on tmpfs filesystems. @@ -68155,7 +68452,7 @@ Domain allowed access. - + Relabel named pipes on tmpfs filesystems. @@ -68165,7 +68462,7 @@ Domain allowed access. - + Read and write, create and delete generic files on tmpfs filesystems. @@ -68176,7 +68473,7 @@ Domain allowed access. - + Read and write, create and delete symbolic links on tmpfs filesystems. @@ -68187,7 +68484,7 @@ Domain allowed access. - + Read and write, create and delete socket files on tmpfs filesystems. @@ -68198,7 +68495,7 @@ Domain allowed access. - + Read and write, create and delete character nodes on tmpfs filesystems. @@ -68209,7 +68506,7 @@ Domain allowed access. - + Read and write, create and delete block nodes on tmpfs filesystems. @@ -68220,7 +68517,7 @@ Domain allowed access. - + Get the attributes of a trace filesystem. @@ -68230,7 +68527,7 @@ Domain allowed access. - + Get attributes of dirs on tracefs filesystem. @@ -68240,7 +68537,7 @@ Domain allowed access. - + search directories on a tracefs filesystem @@ -68250,7 +68547,7 @@ Domain allowed access. - + Get the attributes of files on a trace filesystem. @@ -68261,7 +68558,7 @@ Domain allowed access. - + Read/write trace filesystem files @@ -68271,7 +68568,7 @@ Domain allowed access. - + create trace filesystem directories @@ -68281,7 +68578,7 @@ Domain allowed access. - + Mount a XENFS filesystem. @@ -68291,7 +68588,7 @@ Domain allowed access. - + Search the XENFS filesystem. @@ -68301,7 +68598,7 @@ Domain allowed access. - + Create, read, write, and delete directories on a XENFS filesystem. @@ -68313,7 +68610,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete directories @@ -68325,7 +68622,7 @@ Domain to not audit. - + Create, read, write, and delete files on a XENFS filesystem. @@ -68337,7 +68634,7 @@ Domain allowed access. - + Map files a XENFS filesystem. @@ -68347,7 +68644,7 @@ Domain allowed access. - + Do not audit attempts to create, read, write, and delete files @@ -68359,7 +68656,7 @@ Domain to not audit. - + Mount all filesystems. @@ -68369,7 +68666,7 @@ Domain allowed access. - + Remount all filesystems. This allows some mount options to be changed. @@ -68380,7 +68677,7 @@ Domain allowed access. - + Unmount all filesystems. @@ -68390,7 +68687,7 @@ Domain allowed access. - + Get the attributes of all filesystems. @@ -68414,7 +68711,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes all filesystems. @@ -68425,7 +68722,7 @@ Domain to not audit. - + Get the quotas of all filesystems. @@ -68436,7 +68733,7 @@ Domain allowed access. - + Set the quotas of all filesystems. @@ -68447,7 +68744,7 @@ Domain allowed access. - + Relabelfrom all filesystems. @@ -68457,7 +68754,7 @@ Domain allowed access. - + Get the attributes of all directories with a filesystem type. @@ -68468,7 +68765,7 @@ Domain allowed access. - + Search all directories with a filesystem type. @@ -68478,7 +68775,7 @@ Domain allowed access. - + List all directories with a filesystem type. @@ -68488,7 +68785,7 @@ Domain allowed access. - + Get the attributes of all files with a filesystem type. @@ -68499,7 +68796,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all files with a filesystem type. @@ -68510,7 +68807,7 @@ Domain to not audit. - + Get the attributes of all symbolic links with a filesystem type. @@ -68521,7 +68818,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all symbolic links with a filesystem type. @@ -68532,7 +68829,7 @@ Domain to not audit. - + Get the attributes of all named pipes with a filesystem type. @@ -68543,7 +68840,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all named pipes with a filesystem type. @@ -68554,7 +68851,7 @@ Domain to not audit. - + Get the attributes of all named sockets with a filesystem type. @@ -68565,7 +68862,7 @@ Domain allowed access. - + Do not audit attempts to get the attributes of all named sockets with a filesystem type. @@ -68576,7 +68873,7 @@ Domain to not audit. - + Get the attributes of all block device nodes with a filesystem type. @@ -68587,7 +68884,7 @@ Domain allowed access. - + Get the attributes of all character device nodes with a filesystem type. @@ -68598,7 +68895,7 @@ Domain allowed access. - + Unconfined access to filesystems @@ -69746,7 +70043,18 @@ Domain allowed access. - + + +Allow caller to mount on network sysctl directories. + + + +Domain allowed access. + + + + + Allow caller to read unix domain socket sysctls. @@ -69758,7 +70066,7 @@ Domain allowed access. - + Read and write unix domain socket sysctls. @@ -69770,7 +70078,7 @@ Domain allowed access. - + Read the hotplug sysctl. @@ -69781,7 +70089,7 @@ Domain allowed access. - + Read and write the hotplug sysctl. @@ -69792,7 +70100,7 @@ Domain allowed access. - + Read the modprobe sysctl. @@ -69803,7 +70111,7 @@ Domain allowed access. - + Read and write the modprobe sysctl. @@ -69814,7 +70122,7 @@ Domain allowed access. - + Do not audit attempts to search generic kernel sysctls. @@ -69824,7 +70132,7 @@ Domain to not audit. - + Do not audit attempted reading of kernel sysctls @@ -69834,7 +70142,18 @@ Domain to not audit accesses from - + + +Allow caller to mount on kernel sysctl directories. + + + +Domain allowed access. + + + + + Read generic crypto sysctls. @@ -69844,7 +70163,7 @@ Domain allowed access. - + Read general kernel sysctls. @@ -69876,7 +70195,7 @@ Domain allowed access. - + Do not audit attempts to write generic kernel sysctls. @@ -69886,7 +70205,7 @@ Domain to not audit. - + Read and write generic kernel sysctls. @@ -69897,7 +70216,7 @@ Domain allowed access. - + Mount on kernel sysctl files. @@ -69908,7 +70227,7 @@ Domain allowed access. - + Read kernel ns lastpid sysctls. @@ -69919,7 +70238,7 @@ Domain allowed access. - + Do not audit attempts to write kernel ns lastpid sysctls. @@ -69929,7 +70248,7 @@ Domain to not audit. - + Read and write kernel ns lastpid sysctls. @@ -69940,7 +70259,7 @@ Domain allowed access. - + Search filesystem sysctl directories. @@ -69951,7 +70270,7 @@ Domain allowed access. - + Read filesystem sysctls. @@ -69962,7 +70281,7 @@ Domain allowed access. - + Read and write filesystem sysctls. @@ -69973,7 +70292,7 @@ Domain allowed access. - + Read IRQ sysctls. @@ -69984,7 +70303,7 @@ Domain allowed access. - + Do not audit attempts to search filesystem sysctl directories. @@ -69996,7 +70315,7 @@ Domain to not audit. - + Read and write IRQ sysctls. @@ -70007,7 +70326,7 @@ Domain allowed access. - + Read RPC sysctls. @@ -70018,7 +70337,7 @@ Domain allowed access. - + Read and write RPC sysctls. @@ -70029,7 +70348,7 @@ Domain allowed access. - + Do not audit attempts to list all sysctl directories. @@ -70039,7 +70358,7 @@ Domain to not audit. - + Allow caller to read all sysctls. @@ -70050,7 +70369,7 @@ Domain allowed access. - + Read and write all sysctls. @@ -70061,7 +70380,7 @@ Domain allowed access. - + Associate a file to proc_t (/proc) @@ -70072,7 +70391,7 @@ Domain allowed access. - + Send a kill signal to unlabeled processes. @@ -70082,7 +70401,7 @@ Domain allowed access. - + Mount a kernel unlabeled filesystem. @@ -70092,7 +70411,7 @@ Domain allowed access. - + Unmount a kernel unlabeled filesystem. @@ -70102,7 +70421,7 @@ Domain allowed access. - + Send general signals to unlabeled processes. @@ -70112,7 +70431,7 @@ Domain allowed access. - + Send a null signal to unlabeled processes. @@ -70122,7 +70441,7 @@ Domain allowed access. - + Send a stop signal to unlabeled processes. @@ -70132,7 +70451,7 @@ Domain allowed access. - + Send a child terminated signal to unlabeled processes. @@ -70142,7 +70461,7 @@ Domain allowed access. - + Get the attributes of unlabeled directories. @@ -70152,7 +70471,7 @@ Domain allowed access. - + Do not audit attempts to search unlabeled directories. @@ -70162,7 +70481,7 @@ Domain to not audit. - + List unlabeled directories. @@ -70172,7 +70491,7 @@ Domain allowed access. - + Read the process state (/proc/pid) of all unlabeled_t. @@ -70182,7 +70501,7 @@ Domain allowed access. - + Do not audit attempts to list unlabeled directories. @@ -70192,7 +70511,7 @@ Domain allowed access. - + Read and write unlabeled directories. @@ -70202,7 +70521,7 @@ Domain allowed access. - + Delete unlabeled directories. @@ -70212,7 +70531,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled directories. @@ -70222,7 +70541,7 @@ Domain allowed access. - + Mount a filesystem on an unlabeled directory. @@ -70232,7 +70551,7 @@ Domain allowed access. - + Read unlabeled files. @@ -70242,7 +70561,7 @@ Domain allowed access. - + Read and write unlabeled files. @@ -70252,7 +70571,7 @@ Domain allowed access. - + Delete unlabeled files. @@ -70262,7 +70581,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled files. @@ -70272,7 +70591,7 @@ Domain allowed access. - + Do not audit attempts by caller to get the attributes of an unlabeled file. @@ -70283,7 +70602,7 @@ Domain to not audit. - + Do not audit attempts by caller to read an unlabeled file. @@ -70294,7 +70613,7 @@ Domain to not audit. - + Create an object in unlabeled directories with a private type. @@ -70320,7 +70639,7 @@ The name of the object being created. - + Delete unlabeled symbolic links. @@ -70330,7 +70649,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled symbolic links. @@ -70340,7 +70659,7 @@ Domain allowed access. - + Do not audit attempts by caller to get the attributes of unlabeled symbolic links. @@ -70351,7 +70670,7 @@ Domain to not audit. - + Do not audit attempts by caller to get the attributes of unlabeled named pipes. @@ -70362,7 +70681,7 @@ Domain to not audit. - + Do not audit attempts by caller to get the attributes of unlabeled named sockets. @@ -70373,7 +70692,7 @@ Domain to not audit. - + Do not audit attempts by caller to get attributes for unlabeled block devices. @@ -70384,7 +70703,7 @@ Domain to not audit. - + Read and write unlabeled block device nodes. @@ -70394,7 +70713,7 @@ Domain allowed access. - + Delete unlabeled block device nodes. @@ -70404,7 +70723,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled block device nodes. @@ -70414,7 +70733,7 @@ Domain allowed access. - + Do not audit attempts by caller to get attributes for unlabeled character devices. @@ -70425,7 +70744,7 @@ Domain to not audit. - + Do not audit attempts to write unlabeled character devices. @@ -70436,7 +70755,7 @@ Domain to not audit. - + Delete unlabeled character device nodes. @@ -70446,7 +70765,7 @@ Domain allowed access. - + Create, read, write, and delete unlabeled character device nodes. @@ -70456,7 +70775,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled directories. @@ -70466,7 +70785,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled files. @@ -70476,7 +70795,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled symbolic links. @@ -70486,7 +70805,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled named pipes. @@ -70496,7 +70815,7 @@ Domain allowed access. - + Delete unlabeled named pipes @@ -70506,7 +70825,7 @@ Domain allowed access. - + Allow caller to relabel unlabeled named sockets. @@ -70516,7 +70835,7 @@ Domain allowed access. - + Delete unlabeled named sockets. @@ -70526,7 +70845,7 @@ Domain allowed access. - + Allow caller to relabel from unlabeled block devices. @@ -70536,7 +70855,7 @@ Domain allowed access. - + Allow caller to relabel from unlabeled character devices. @@ -70546,7 +70865,18 @@ Domain allowed access. - + + +Allow caller set the attributes on all unlabeled +directory and file objects. + + + +Domain allowed access. + + + + Send and receive messages from an unlabeled IPSEC association. @@ -70571,7 +70901,7 @@ Domain allowed access. - + Do not audit attempts to send and receive messages from an unlabeled IPSEC association. @@ -70596,7 +70926,7 @@ Domain to not audit. - + Receive TCP packets from an unlabeled connection. @@ -70615,7 +70945,7 @@ Domain allowed access. - + Do not audit attempts to receive TCP packets from an unlabeled connection. @@ -70636,7 +70966,7 @@ Domain to not audit. - + Receive UDP packets from an unlabeled connection. @@ -70655,7 +70985,7 @@ Domain allowed access. - + Do not audit attempts to receive UDP packets from an unlabeled connection. @@ -70676,7 +71006,7 @@ Domain to not audit. - + Receive Raw IP packets from an unlabeled connection. @@ -70695,7 +71025,7 @@ Domain allowed access. - + Do not audit attempts to receive Raw IP packets from an unlabeled connection. @@ -70716,7 +71046,7 @@ Domain to not audit. - + Send and receive unlabeled packets. @@ -70738,7 +71068,7 @@ Domain allowed access. - + Receive packets from an unlabeled peer. @@ -70758,7 +71088,7 @@ Domain allowed access. - + Do not audit attempts to receive packets from an unlabeled peer. @@ -70778,7 +71108,7 @@ Domain to not audit. - + Relabel from unlabeled database objects. @@ -70788,7 +71118,7 @@ Domain allowed access. - + Unconfined access to kernel module resources. @@ -70798,7 +71128,7 @@ Domain allowed access. - + Read virtual memory overcommit sysctl. @@ -70809,7 +71139,7 @@ Domain allowed access. - + Read and write virtual memory overcommit sysctl. @@ -70820,7 +71150,7 @@ Domain allowed access. - + Access unlabeled infiniband pkeys. @@ -70830,7 +71160,7 @@ Domain allowed access. - + Manage subnet on unlabeled Infiniband endports. @@ -72269,7 +72599,18 @@ Domain allowed access. - + + +Allow the caller to delete the generic +SCSI interface device nodes. + + + +Domain allowed access. + + + + Set attributes of the device nodes for the SCSI generic interface. @@ -72280,7 +72621,7 @@ Domain allowed access. - + Do not audit attempts to read or write SCSI generic device interfaces. @@ -72291,7 +72632,7 @@ Domain to not audit. - + Allow the caller to get the attributes of removable devices device nodes. @@ -72302,7 +72643,7 @@ Domain allowed access. - + Do not audit attempts made by the caller to get the attributes of removable devices device nodes. @@ -72313,7 +72654,7 @@ Domain to not audit. - + Do not audit attempts made by the caller to read removable devices device nodes. @@ -72324,7 +72665,7 @@ Domain to not audit. - + Do not audit attempts made by the caller to write removable devices device nodes. @@ -72335,7 +72676,7 @@ Domain to not audit. - + Allow the caller to set the attributes of removable devices device nodes. @@ -72346,7 +72687,7 @@ Domain allowed access. - + Do not audit attempts made by the caller to set the attributes of removable devices device nodes. @@ -72357,7 +72698,7 @@ Domain to not audit. - + Allow the caller to directly read from a removable device. @@ -72371,7 +72712,7 @@ Domain allowed access. - + Do not audit attempts to directly read removable devices. @@ -72381,7 +72722,7 @@ Domain to not audit. - + Allow the caller to directly write to a removable device. @@ -72395,7 +72736,7 @@ Domain allowed access. - + Do not audit attempts to directly write removable devices. @@ -72405,7 +72746,7 @@ Domain to not audit. - + Allow the caller to directly read a tape device. @@ -72416,7 +72757,7 @@ Domain allowed access. - + Allow the caller to directly write a tape device. @@ -72427,7 +72768,7 @@ Domain allowed access. - + Allow the caller to get the attributes of device nodes of tape devices. @@ -72438,7 +72779,7 @@ Domain allowed access. - + Allow the caller to set the attributes of device nodes of tape devices. @@ -72449,7 +72790,7 @@ Domain allowed access. - + Unconfined access to storage devices. @@ -77067,7 +77408,7 @@ Domain allowed access. - + Allow specified domain to start and stop chronyd unit @@ -77077,7 +77418,7 @@ Domain allowed access. - + Allow specified domain to get status of chronyd unit @@ -77087,7 +77428,7 @@ Domain allowed access. - + Send to chronyd command line interface using a unix domain datagram socket. @@ -77098,7 +77439,7 @@ Domain allowed access. - + All of the rules required to administrate an chronyd environment. @@ -77515,6 +77856,194 @@ nfs file systems. + +Cockpit web management system for Linux + + +Cockpit is a web console that enables users to administer Linux servers +via a web browser. +see https://cockpit-project.org/ + +For linux logins that are allowed access they must be associated with a +SELinux user that uses ssh_role_template (sysadm, system). To be able +to alter system settings the must be allowed sudo access. + + + + +Transition to the cockpit session domain. + + + +Domain allowed to transition. + + + + + +Allow specified domain to get status of cockpit service + + + +Domain allowed access. + + + + + +Allow specified domain to enable cockpit units + + + +Domain allowed access. + + + + + +Allow specified domain to start cockpit units + + + +Domain allowed access. + + + + + +Create, read, write, and delete the cockpick runtime symlink files. + + + +Domain allowed access. + + + + + +Inherit and use cockpit session file descriptors. + + + +Domain allowed access. + + + + + +Read and write cockpit session unnamed pipes. + + + +Domain allowed access. + + + + + +Inherit and use cockpit web service file descriptors. + + + +Domain allowed access. + + + + + +Read and write cockpit web service stream socket + + + +Domain allowed access. + + + + + +Manage the cockpit certificate files. + + + +Domain allowed access. + + + + + +Read cockpit certificate files. + + + +Domain allowed access. + + + + + +Delete cockpit certificate files. + + + +Domain allowed access. + + + + + +Allow cockpit to send signals to another domain. + + + +Domain allowed to send to, + + + + + +All of the rules required to administrate +an cockpit environment + + + +Domain allowed access. + + + + + Statistics collection daemon for filling RRD files. @@ -78056,7 +78585,19 @@ Domain allowed to transition. - + + +Execute FUSEFS files with a type +transition to the super privileged +container type. + + + +Domain allowed access. + + + + Connect to a system container engine domain over a unix stream socket. @@ -78067,7 +78608,7 @@ Domain allowed access. - + Connect to a system container domain over a unix stream socket. @@ -78078,7 +78619,7 @@ Domain allowed access. - + Connect to a user container domain over a unix stream socket. @@ -78089,7 +78630,7 @@ Domain allowed access. - + Connect to super privileged containers over a unix stream socket. @@ -78100,7 +78641,7 @@ Domain allowed access. - + Read and write super privileged container TCP sockets. @@ -78111,7 +78652,7 @@ Domain allowed access. - + Connect to a container domain over a unix stream socket. @@ -78122,7 +78663,7 @@ Domain allowed access. - + Connect to the specified container domain over a unix stream socket. @@ -78133,7 +78674,7 @@ Domain allowed access. - + Allow the specified domain to send a kill signal to all containers. @@ -78144,7 +78685,7 @@ Domain allowed to transition. - + Allow the specified domain to send all signals to a container @@ -78156,7 +78697,7 @@ Domain allowed to transition. - + Create objects in /dev with an automatic transition to the container device type. @@ -78177,7 +78718,7 @@ The name of the object being created. - + Read and write container device files. @@ -78187,7 +78728,7 @@ Domain allowed access. - + Manage container device files. @@ -78197,7 +78738,28 @@ Domain allowed access. - + + +Get the attributes of container device +block files. + + + +Domain allowed access. + + + + + +Read container device block files. + + + +Domain allowed access. + + + + Mount on all container devices. @@ -78207,7 +78769,7 @@ Domain allowed access. - + Set the attributes of container ptys. @@ -78217,7 +78779,7 @@ Domain allowed access. - + Read and write container ptys. @@ -78227,7 +78789,7 @@ Domain allowed access. - + Make the specified type usable as a mountpoint for containers. @@ -78238,7 +78800,7 @@ Type to be used as a mountpoint. - + Allow the specified domain to list the contents of container @@ -78250,7 +78812,7 @@ Domain allowed access. - + Allow the specified domain to add a watch on container plugin @@ -78262,7 +78824,7 @@ Domain allowed access. - + Allow the specified domain to manage container plugin files. @@ -78273,7 +78835,7 @@ Domain allowed access. - + Allow the specified domain to execute container plugins. @@ -78284,7 +78846,7 @@ Domain allowed access. - + Allow the specified domain to search container config directories. @@ -78295,7 +78857,7 @@ Domain allowed access. - + Allow the specified domain to read container config files. @@ -78306,7 +78868,7 @@ Domain allowed access. - + Allow the specified domain to watch container config directories. @@ -78317,7 +78879,7 @@ Domain allowed access. - + Allow the specified domain to create container config files. @@ -78328,7 +78890,7 @@ Domain allowed access. - + Allow the specified domain to read and write container config files. @@ -78339,7 +78901,7 @@ Domain allowed access. - + Allow the specified domain to manage container config files. @@ -78350,7 +78912,7 @@ Domain allowed access. - + Allow the specified domain to create container files in the @@ -78363,7 +78925,7 @@ Domain allowed access. - + Allow the specified domain to manage container file directories. @@ -78374,7 +78936,7 @@ Domain allowed access. - + Allow the specified domain to watch container file directories. @@ -78385,7 +78947,7 @@ Domain allowed access. - + Allow the specified domain to manage container files. @@ -78396,7 +78958,7 @@ Domain allowed access. - + Do not audit attempts to relabel container file directories. @@ -78407,7 +78969,7 @@ Domain to not audit. - + Do not audit attempts to relabel container files. @@ -78418,7 +78980,7 @@ Domain to not audit. - + Allow the specified domain to manage container lnk files. @@ -78429,7 +78991,7 @@ Domain allowed access. - + Allow the specified domain to read and write container fifo files. @@ -78440,7 +79002,7 @@ Domain allowed access. - + Allow the specified domain to manage container fifo files. @@ -78451,7 +79013,7 @@ Domain allowed access. - + Allow the specified domain to manage container sock files. @@ -78462,7 +79024,7 @@ Domain allowed access. - + Allow the specified domain to read and write container chr files. @@ -78473,7 +79035,7 @@ Domain allowed access. - + Do not audit attempts to read and write container chr files. @@ -78484,7 +79046,7 @@ Domain allowed access. - + Allow the specified domain to manage container chr files. @@ -78495,7 +79057,7 @@ Domain allowed access. - + Allow the specified domain to create objects in specified directories with @@ -78523,7 +79085,19 @@ The name of the object being created. - + + +Allow the specified domain to get +the attributes of all container +file objects. + + + +Domain allowed access. + + + + Allow the specified domain to list the contents of read-only container @@ -78535,7 +79109,29 @@ Domain allowed access. - + + +Allow the specified domain to get +the attributes of all read-only +container file objects. + + + +Domain allowed access. + + + + + +Read container config home content. + + + +Domain allowed access. + + + + Allow the specified domain to manage container config home content. @@ -78546,7 +79142,7 @@ Domain allowed access. - + Allow the specified domain to create objects in an xdg_config directory @@ -78569,7 +79165,7 @@ The name of the object being created. - + Allow the specified domain to manage container data home files. @@ -78580,7 +79176,7 @@ Domain allowed access. - + Allow the specified domain to manage container data home named @@ -78592,7 +79188,7 @@ Domain allowed access. - + Allow the specified domain to manage container data home named @@ -78604,7 +79200,7 @@ Domain allowed access. - + Administrate all container files. @@ -78614,7 +79210,7 @@ Domain allowed access. - + Administrate all container read-only files. @@ -78624,7 +79220,7 @@ Domain allowed access. - + All of the rules necessary for a user to manage user container runtime data @@ -78636,7 +79232,7 @@ Domain allowed access. - + All of the rules necessary for a user to manage container data in their home @@ -78648,7 +79244,7 @@ Domain allowed access. - + Allow the specified domain to relabel container files and @@ -78660,7 +79256,7 @@ Domain allowed access. - + Allow the specified domain to remount container filesystems. @@ -78671,7 +79267,7 @@ Domain allowed access. - + Allow the specified domain to relabel container filesystems. @@ -78682,7 +79278,7 @@ Domain allowed access. - + Allow the specified domain to get the attributes of container @@ -78694,7 +79290,7 @@ Domain allowed access. - + Allow the specified domain to search runtime container directories. @@ -78705,7 +79301,7 @@ Domain allowed access. - + Allow the specified domain to read runtime container files. @@ -78716,7 +79312,7 @@ Domain allowed access. - + Allow the specified domain to get the attributes runtime container of @@ -78728,7 +79324,18 @@ Domain allowed access. - + + +Allow the specified domain to create +runtime container directories. + + + +Domain allowed access. + + + + Allow the specified domain to manage runtime container files. @@ -78739,7 +79346,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container named pipes. @@ -78750,7 +79357,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container symlinks. @@ -78761,7 +79368,7 @@ Domain allowed access. - + Allow the specified domain to manage runtime container named sockets. @@ -78772,7 +79379,7 @@ Domain allowed access. - + Allow the specified domain to manage user runtime container files. @@ -78783,7 +79390,7 @@ Domain allowed access. - + Allow the specified domain to read and write user runtime container named sockets. @@ -78794,7 +79401,7 @@ Domain allowed access. - + Allow the specified domain to search container directories in /var/lib. @@ -78805,7 +79412,7 @@ Domain allowed access. - + Allow the specified domain to list the contents of container directories @@ -78817,7 +79424,7 @@ Domain allowed access. - + Allow the specified domain to manage container file directories in /var/lib. @@ -78828,7 +79435,7 @@ Domain allowed access. - + Allow the specified domain to read container files in /var/lib. @@ -78839,7 +79446,7 @@ Domain allowed access. - + Allow the specified domain to manage container files in /var/lib. @@ -78850,7 +79457,7 @@ Domain allowed access. - + Allow the specified domain to memory map container files in /var/lib. @@ -78861,7 +79468,7 @@ Domain allowed access. - + Allow the specified domain to manage container named pipes in /var/lib. @@ -78872,7 +79479,7 @@ Domain allowed access. - + Allow the specified domain to manage container symlinks in /var/lib. @@ -78883,7 +79490,7 @@ Domain allowed access. - + Allow the specified domain to manage container named sockets in /var/lib. @@ -78894,7 +79501,7 @@ Domain allowed access. - + Allow the specified domain to create objects in /var/lib with an automatic @@ -78916,7 +79523,7 @@ The name of the object being created. - + Allow the specified domain to create objects in /var/lib with an automatic @@ -78938,7 +79545,7 @@ The name of the object being created. - + Allow the specified domain to create objects in container /var/lib directories @@ -78961,7 +79568,7 @@ The name of the object being created. - + Allow the specified domain to create objects in unlabeled directories with @@ -78984,7 +79591,19 @@ The name of the object being created. - + + +Allow the specified domain to get +the attributes of all container +var lib objects. + + + +Domain allowed access. + + + + Allow the specified domain to search container log file directories. @@ -78995,7 +79614,7 @@ Domain allowed access. - + Allow the specified domain to list the contents of container log directories. @@ -79006,7 +79625,7 @@ Domain allowed access. - + Allow the specified domain to create container log file directories. @@ -79017,7 +79636,7 @@ Domain allowed access. - + Allow the specified domain to manage container log file directories. @@ -79028,7 +79647,7 @@ Domain allowed access. - + Allow the specified domain to watch container log file directories. @@ -79039,7 +79658,7 @@ Domain allowed access. - + Allow the specified domain to create container log files. @@ -79050,7 +79669,7 @@ Domain allowed access. - + Allow the specified domain to append data to container log files. @@ -79061,7 +79680,7 @@ Domain allowed access. - + Allow the specified domain to manage container log files. @@ -79072,7 +79691,7 @@ Domain allowed access. - + Allow the specified domain to watch container log files. @@ -79083,7 +79702,7 @@ Domain allowed access. - + Allow the specified domain to create objects in log directories with an @@ -79106,7 +79725,7 @@ The name of the object being created. - + Allow the specified domain to manage container log symlinks. @@ -79117,7 +79736,7 @@ Domain allowed access. - + Allow the specified domain to start systemd units for containers. @@ -79128,7 +79747,7 @@ Domain allowed access. - + All of the rules required to administrate a container @@ -80574,7 +81193,7 @@ User domain for the role - + Template for creating connections to the system bus. @@ -80585,7 +81204,7 @@ Domain allowed access. - + Acquire service on all DBUS session busses. @@ -80596,7 +81215,7 @@ Domain allowed access. - -