php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /proc/self/root/usr/share/selinux/devel/include/ |
files >> //proc/self/root/usr/share/selinux/devel/include/system.xml |
<summary> Policy modules for system functions from init to multi-user login. </summary> <module name="application" filename="policy/modules/system/application.if"> <summary>Policy for user executable applications.</summary> <interface name="application_type" lineno="13"> <summary> Make the specified type usable as an application domain. </summary> <param name="type"> <summary> Type to be used as a domain type. </summary> </param> </interface> <interface name="application_executable_file" lineno="36"> <summary> Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. </summary> <param name="type"> <summary> Type to be used for files. </summary> </param> </interface> <interface name="application_exec" lineno="56"> <summary> Execute application executables in the caller domain. </summary> <param name="type"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="application_exec_all" lineno="75"> <summary> Execute all executable files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="application_domain" lineno="110"> <summary> Create a domain for applications. </summary> <desc> <p> Create a domain for applications. Typically these are programs that are run interactively. </p> <p> The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant. </p> </desc> <param name="domain"> <summary> Type to be used as an application domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> <infoflow type="none"/> </interface> <interface name="application_signull" lineno="126"> <summary> Send signull to all application domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="application_signal" lineno="144"> <summary> Send signal to all application domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="application_dontaudit_signull" lineno="162"> <summary> Dontaudit signull sent to all application domains. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="application_dontaudit_signal" lineno="180"> <summary> Dontaudit signal sent to all application domains. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="application_dontaudit_sigkill" lineno="198"> <summary> Dontaudit kill signal sent to all application domains. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> </module> <module name="authlogin" filename="policy/modules/system/authlogin.if"> <summary>Common policy for authentication and user login.</summary> <interface name="auth_role" lineno="18"> <summary> Role access for password authentication. </summary> <param name="role"> <summary> Role allowed access. </summary> </param> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_use_pam" lineno="49"> <summary> Use PAM for authentication. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_login_pgm_domain" lineno="105"> <summary> Make the specified domain used for a login program. </summary> <param name="domain"> <summary> Domain type used for a login program domain. </summary> </param> </interface> <interface name="auth_login_entry_type" lineno="235"> <summary> Use the login program as an entry point program. </summary> <param name="domain"> <summary> The type of process using the login program as entry point. </summary> </param> </interface> <interface name="auth_domtrans_login_program" lineno="258"> <summary> Execute a login_program in the target domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the login_program process. </summary> </param> </interface> <interface name="auth_ranged_domtrans_login_program" lineno="288"> <summary> Execute a login_program in the target domain, with a range transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the login_program process. </summary> </param> <param name="range"> <summary> Range of the login program. </summary> </param> </interface> <interface name="auth_search_cache" lineno="314"> <summary> Search authentication cache </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_read_cache" lineno="332"> <summary> Read authentication cache </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_rw_cache" lineno="350"> <summary> Read/Write authentication cache </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_cache" lineno="368"> <summary> Manage authentication cache </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_var_filetrans_cache" lineno="387"> <summary> Automatic transition from cache_t to cache. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_domtrans_chk_passwd" lineno="405"> <summary> Run unix_chkpwd to check a password. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_domtrans_chkpwd" lineno="463"> <summary> Run unix_chkpwd to check a password. Stripped down version to be called within boolean </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_run_chk_passwd" lineno="489"> <summary> Execute chkpwd programs in the chkpwd domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to allow the chkpwd domain. </summary> </param> </interface> <interface name="auth_domtrans_upd_passwd" lineno="509"> <summary> Execute a domain transition to run unix_update. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="auth_run_upd_passwd" lineno="534"> <summary> Execute updpwd programs in the updpwd domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to allow the updpwd domain. </summary> </param> </interface> <interface name="auth_getattr_shadow" lineno="553"> <summary> Get the attributes of the shadow passwords file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_dontaudit_getattr_shadow" lineno="573"> <summary> Do not audit attempts to get the attributes of the shadow passwords file. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="auth_read_shadow" lineno="595"> <summary> Read the shadow passwords file (/etc/shadow) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_can_read_shadow_passwords" lineno="619"> <summary> Pass shadow assertion for reading. </summary> <desc> <p> Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_can_write_shadow_passwords" lineno="646"> <summary> Pass shadow assertion for reading. </summary> <desc> <p> Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_tunable_read_shadow" lineno="672"> <summary> Read the shadow password file. </summary> <desc> <p> Read the shadow password file. This should only be used in a conditional; it does not pass the reading shadow assertion. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_dontaudit_read_shadow" lineno="692"> <summary> Do not audit attempts to read the shadow password file (/etc/shadow). </summary> <param name="domain"> <summary> The type of the domain to not audit. </summary> </param> </interface> <interface name="auth_rw_shadow" lineno="710"> <summary> Read and write the shadow password file (/etc/shadow). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_tunable_manage_shadow" lineno="731"> <summary> Create, read, write, and delete the shadow password file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_shadow" lineno="750"> <summary> Create, read, write, and delete the shadow password file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_etc_filetrans_shadow" lineno="770"> <summary> Automatic transition from etc to shadow. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_relabelto_shadow" lineno="789"> <summary> Relabel to the shadow password file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_relabel_shadow" lineno="811"> <summary> Relabel from and to the shadow password file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_append_faillog" lineno="832"> <summary> Append to the login failure log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_rw_faillog" lineno="851"> <summary> Read and write the login failure log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_faillog" lineno="870"> <summary> Manage the login failure log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_read_lastlog" lineno="892"> <summary> Read the last logins log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="auth_append_lastlog" lineno="911"> <summary> Append only to the last logins log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_rw_lastlog" lineno="930"> <summary> Read and write to the last logins log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_domtrans_pam" lineno="949"> <summary> Execute pam programs in the pam domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_signal_pam" lineno="967"> <summary> Send generic signals to pam processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_run_pam" lineno="990"> <summary> Execute pam programs in the PAM domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to allow the PAM domain. </summary> </param> </interface> <interface name="auth_exec_pam" lineno="1009"> <summary> Execute the pam program. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_var_auth" lineno="1028"> <summary> Manage var auth files. Used by various other applications and pam applets etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_read_pam_pid" lineno="1049"> <summary> Read PAM PID files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_dontaudit_read_pam_pid" lineno="1069"> <summary> Do not audit attemps to read PAM PID files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="auth_delete_pam_pid" lineno="1087"> <summary> Delete pam PID files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_pam_pid" lineno="1107"> <summary> Manage pam PID files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_domtrans_pam_console" lineno="1127"> <summary> Execute pam_console with a domain transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_search_pam_console_data" lineno="1146"> <summary> Search the contents of the pam_console data directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_list_pam_console_data" lineno="1166"> <summary> List the contents of the pam_console data directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_read_pam_console_data" lineno="1185"> <summary> Read pam_console data files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_pam_console_data" lineno="1206"> <summary> Create, read, write, and delete pam_console data files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_delete_pam_console_data" lineno="1226"> <summary> Delete pam_console data. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_read_all_dirs_except_shadow" lineno="1253"> <summary> Read all directories on the filesystem, except the shadow passwords and listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="auth_read_all_files_except_shadow" lineno="1279"> <summary> Read all files on the filesystem, except the shadow passwords and listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> <rolecap/> </interface> <interface name="auth_read_all_symlinks_except_shadow" lineno="1304"> <summary> Read all symbolic links on the filesystem, except the shadow passwords and listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="auth_relabel_all_files_except_shadow" lineno="1330"> <summary> Relabel all files on the filesystem, except the shadow passwords and listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="auth_rw_all_files_except_shadow" lineno="1356"> <summary> Read and write all files on the filesystem, except the shadow passwords and listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="auth_manage_all_files_except_shadow" lineno="1382"> <summary> Manage all files on the filesystem, except the shadow passwords and listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="auth_domtrans_utempter" lineno="1400"> <summary> Execute utempter programs in the utempter domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_run_utempter" lineno="1423"> <summary> Execute utempter programs in the utempter domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to allow the utempter domain. </summary> </param> </interface> <interface name="auth_dontaudit_exec_utempter" lineno="1442"> <summary> Do not audit attemps to execute utempter executable. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="auth_setattr_login_records" lineno="1460"> <summary> Set the attributes of login record files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_read_login_records" lineno="1480"> <summary> Read login records files (/var/log/wtmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="auth_dontaudit_read_login_records" lineno="1501"> <summary> Do not audit attempts to read login records files (/var/log/wtmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="auth_dontaudit_write_login_records" lineno="1520"> <summary> Do not audit attempts to write to login records files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="auth_append_login_records" lineno="1538"> <summary> Append to login records (wtmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_write_login_records" lineno="1557"> <summary> Write to login records (wtmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_rw_login_records" lineno="1575"> <summary> Read and write login records. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_log_filetrans_login_records" lineno="1595"> <summary> Create a login records in the log directory using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_manage_login_records" lineno="1614"> <summary> Create, read, write, and delete login records files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_use_nsswitch" lineno="1643"> <summary> Use nsswitch to look up user, password, group, or host information. </summary> <desc> <p> Allow the specified domain to look up user, password, group, or host information using the name service. The most common use of this interface is for services that do host name resolution (usually DNS resolution). </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="auth_unconfined" lineno="1722"> <summary> Unconfined access to the authlogin module. </summary> <desc> <p> Unconfined access to the authlogin module. </p> <p> Currently, this only allows assertions for the shadow passwords file (/etc/shadow) to be passed. No access is granted yet. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="auth_signal_chk_passwd" lineno="1744"> <summary> Send generic signals to chkpwd processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <tunable name="authlogin_radius" dftval="false"> <desc> <p> Allow users to login using a radius server </p> </desc> </tunable> <tunable name="authlogin_shadow" dftval="false"> <desc> <p> Allow users login programs to access /etc/shadow. </p> </desc> </tunable> </module> <module name="clock" filename="policy/modules/system/clock.if"> <summary>Policy for reading and setting the hardware clock.</summary> <interface name="clock_domtrans" lineno="13"> <summary> Execute hwclock in the clock domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="clock_run" lineno="38"> <summary> Execute hwclock in the clock domain, and allow the specified role the hwclock domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the clock domain. </summary> </param> <rolecap/> </interface> <interface name="clock_exec" lineno="57"> <summary> Execute hwclock in the caller domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="clock_dontaudit_write_adjtime" lineno="75"> <summary> Do not audit attempts to write clock drift adjustments. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="clock_rw_adjtime" lineno="93"> <summary> Read and write clock drift adjustments. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="daemontools" filename="policy/modules/system/daemontools.if"> <summary>Collection of tools for managing UNIX services</summary> <desc> <p> Policy for DJB's daemontools </p> </desc> <interface name="daemontools_ipc_domain" lineno="18"> <summary> An ipc channel between the supervised domain and svc_start_t </summary> <param name="domain"> <summary> Domain allowed access to svc_start_t. </summary> </param> </interface> <interface name="daemontools_service_domain" lineno="44"> <summary> Define a specified domain as a supervised service. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="entrypoint"> <summary> The type associated with the process program. </summary> </param> </interface> <interface name="daemontools_domtrans_start" lineno="66"> <summary> Execute in the svc_start_t domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="daemonstools_run_start" lineno="91"> <summary> Execute svc_start in the svc_start domain, and allow the specified role the svc_start domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the svc_start domain. </summary> </param> <rolecap/> </interface> <interface name="daemontools_domtrans_run" lineno="110"> <summary> Execute in the svc_run_t domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="daemontools_domtrans_multilog" lineno="128"> <summary> Execute in the svc_multilog_t domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="daemontools_read_svc" lineno="147"> <summary> Allow a domain to read svc_svc_t files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="daemontools_search_svc_dir" lineno="166"> <summary> Search svc_svc_t directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="daemontools_manage_svc" lineno="185"> <summary> Allow a domain to create svc_svc_t files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="daemontools_sigchld_run" lineno="206"> <summary> Send a SIGCHLD signal to svc_run domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="fstools" filename="policy/modules/system/fstools.if"> <summary>Tools for filesystem management, such as mkfs and fsck.</summary> <interface name="fstools_domtrans" lineno="13"> <summary> Execute fs tools in the fstools domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="fstools_run" lineno="39"> <summary> Execute fs tools in the fstools domain, and allow the specified role the fs tools domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the fs tools domain. </summary> </param> <rolecap/> </interface> <interface name="fstools_exec" lineno="58"> <summary> Execute fsadm in the caller domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="fstools_signal" lineno="76"> <summary> Send signal to fsadm process </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fstools_read_pipes" lineno="94"> <summary> Read fstools unnamed pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fstools_relabelto_entry_files" lineno="113"> <summary> Relabel a file to the type used by the filesystem tools programs. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="fstools_manage_entry_files" lineno="132"> <summary> Create, read, write, and delete a file used by the filesystem tools programs. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="fstools_getattr_swap_files" lineno="150"> <summary> Getattr swapfile </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> </module> <module name="getty" filename="policy/modules/system/getty.if"> <summary>Policy for getty.</summary> <interface name="getty_domtrans" lineno="13"> <summary> Execute gettys in the getty domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="getty_use_fds" lineno="32"> <summary> Inherit and use getty file descriptors. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="getty_read_log" lineno="51"> <summary> Allow process to read getty log file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="getty_read_config" lineno="71"> <summary> Allow process to read getty config file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="getty_rw_config" lineno="91"> <summary> Allow process to edit getty config file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> </module> <module name="hostname" filename="policy/modules/system/hostname.if"> <summary>Policy for changing the system host name.</summary> <interface name="hostname_domtrans" lineno="13"> <summary> Execute hostname in the hostname domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="hostname_run" lineno="38"> <summary> Execute hostname in the hostname domain, and allow the specified role the hostname domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the hostname domain. </summary> </param> </interface> <interface name="hostname_exec" lineno="58"> <summary> Execute hostname in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> </module> <module name="hotplug" filename="policy/modules/system/hotplug.if"> <summary> Policy for hotplug system, for supporting the connection and disconnection of devices at runtime. </summary> <interface name="hotplug_domtrans" lineno="16"> <summary> Execute hotplug with a domain transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="hotplug_exec" lineno="35"> <summary> Execute hotplug in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="hotplug_use_fds" lineno="54"> <summary> Inherit and use hotplug file descriptors. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="hotplug_dontaudit_use_fds" lineno="73"> <summary> Do not audit attempts to inherit hotplug file descriptors. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="hotplug_dontaudit_search_config" lineno="92"> <summary> Do not audit attempts to search the hotplug configuration directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="hotplug_getattr_config_dirs" lineno="110"> <summary> Get the attributes of the hotplug configuration directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="hotplug_search_config" lineno="128"> <summary> Search the hotplug configuration directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="hotplug_read_config" lineno="147"> <summary> Read the configuration files for hotplug. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <rolecap/> </interface> <interface name="hotplug_search_pids" lineno="168"> <summary> Search the hotplug PIDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="init" filename="policy/modules/system/init.if"> <summary>System initialization programs (init and init scripts).</summary> <interface name="init_script_file" lineno="32"> <summary> Create a file type used for init scripts. </summary> <desc> <p> Create a file type used for init scripts. It can not be used in conjunction with init_script_domain(). These script files are typically stored in the /etc/init.d directory. </p> <p> Typically this is used to constrain what services an admin can start/stop. For example, a policy writer may want to constrain a web administrator to only being able to restart the web server, not other services. This special type will help address that goal. </p> <p> This also makes the type usable for files; thus an explicit call to files_type() is redundant. </p> </desc> <param name="script_file"> <summary> Type to be used for a script file. </summary> </param> <infoflow type="none"/> </interface> <interface name="init_script_domain" lineno="67"> <summary> Create a domain used for init scripts. </summary> <desc> <p> Create a domain used for init scripts. Can not be used in conjunction with init_script_file(). </p> </desc> <param name="domain"> <summary> Type to be used as an init script domain. </summary> </param> <param name="script_file"> <summary> Type of the script file used as an entry point to this domain. </summary> </param> </interface> <interface name="init_domain" lineno="97"> <summary> Create a domain which can be started by init. </summary> <param name="domain"> <summary> Type to be used as a domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> </interface> <interface name="init_ranged_domain" lineno="140"> <summary> Create a domain which can be started by init, with a range transition. </summary> <param name="domain"> <summary> Type to be used as a domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> <param name="range"> <summary> Range for the domain. </summary> </param> </interface> <interface name="init_daemon_domain" lineno="192"> <summary> Create a domain for long running processes (daemons/services) which are started by init scripts. </summary> <desc> <p> Create a domain for long running processes (daemons/services) which are started by init scripts. Short running processes should use the init_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface. </p> <p> The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant. </p> <p> If the process must also run in a specific MLS/MCS level, the init_ranged_daemon_domain() should be used instead. </p> </desc> <param name="domain"> <summary> Type to be used as a daemon domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="init_initrc_domain" lineno="265"> <summary> Create initrc domain. </summary> <param name="domain"> <summary> Type to be used as a initrc daemon domain. </summary> </param> </interface> <interface name="init_initrc_domtrans_to" lineno="288"> <summary> Create initrc domain. </summary> <param name="domain"> <summary> Type to be used as a initrc daemon domain. </summary> </param> <param name="type"> <summary> Executable type. </summary> </param> </interface> <interface name="init_ranged_daemon_domain" lineno="339"> <summary> Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range. </summary> <desc> <p> Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range. Short running processes should use the init_ranged_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range. </p> <p> The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant. </p> <p> If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_daemon_domain(). </p> </desc> <param name="domain"> <summary> Type to be used as a daemon domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> <param name="range"> <summary> MLS/MCS range for the domain. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="init_system_domain" lineno="393"> <summary> Create a domain for short running processes which are started by init scripts. </summary> <desc> <p> Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_daemon_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface. </p> <p> The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant. </p> <p> If the process must also run in a specific MLS/MCS level, the init_ranged_system_domain() should be used instead. </p> </desc> <param name="domain"> <summary> Type to be used as a system domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="init_ranged_system_domain" lineno="504"> <summary> Create a domain for short running processes which are started by init scripts. </summary> <desc> <p> Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_ranged_system_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range. </p> <p> The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant. </p> <p> If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_system_domain(). </p> </desc> <param name="domain"> <summary> Type to be used as a system domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> <param name="range"> <summary> Range for the domain. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="init_domtrans" lineno="530"> <summary> Execute init (/sbin/init) with a domain transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_exec" lineno="549"> <summary> Execute the init program in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="init_getpgid" lineno="568"> <summary> Get the process group of init. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_signull" lineno="586"> <summary> Send init a null signal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_sigchld" lineno="604"> <summary> Send init a SIGCHLD signal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_use_fds" lineno="662"> <summary> Inherit and use file descriptors from init. </summary> <desc> <p> Allow the specified domain to inherit file descriptors from the init program (process ID 1). Typically the only file descriptors to be inherited from init are for the console. This does not allow the domain any access to the object to which the file descriptors references. </p> <p> Related interfaces: </p> <ul> <li>init_dontaudit_use_fds()</li> <li>term_dontaudit_use_console()</li> <li>term_use_console()</li> </ul> <p> Example usage: </p> <p> init_use_fds(mydomain_t) term_use_console(mydomain_t) </p> <p> Normally, processes that can inherit these file descriptors (usually services) write messages to the system log instead of writing to the console. Therefore, in many cases, this access should dontaudited instead. </p> <p> Example dontaudit usage: </p> <p> init_dontaudit_use_fds(mydomain_t) term_dontaudit_use_console(mydomain_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="1"/> </interface> <interface name="init_dontaudit_use_fds" lineno="681"> <summary> Do not audit attempts to inherit file descriptors from init. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_udp_send" lineno="699"> <summary> Send UDP network traffic to init. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_getattr_initctl" lineno="713"> <summary> Get the attributes of initctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_getattr_initctl" lineno="732"> <summary> Do not audit attempts to get the attributes of initctl. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="init_write_initctl" lineno="750"> <summary> Write to initctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_telinit" lineno="770"> <summary> Use telinit (Read and write initctl). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="init_rw_initctl" lineno="805"> <summary> Read and write initctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_rw_initctl" lineno="825"> <summary> Do not audit attempts to read and write initctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_script_file_entry_type" lineno="844"> <summary> Make init scripts an entry point for the specified domain. </summary> <param name="domain"> <summary> The domain for which init scripts are an entrypoint. </summary> </param> </interface> <interface name="init_spec_domtrans_script" lineno="862"> <summary> Execute init scripts with a specified domain transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_domtrans_script" lineno="890"> <summary> Execute init scripts with an automatic domain transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_bin_domtrans_spec" lineno="921"> <summary> Execute a file in a bin directory in the initrc_t domain </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_script_file_domtrans" lineno="954"> <summary> Execute a init script in a specified domain. </summary> <desc> <p> Execute a init script in a specified domain. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> </desc> <param name="source_domain"> <summary> Domain to transition from. </summary> </param> <param name="target_domain"> <summary> Domain to transition to. </summary> </param> </interface> <interface name="init_labeled_script_domtrans" lineno="979"> <summary> Transition to the init script domain on a specified labeled init script. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="init_script_file"> <summary> Labeled init script file. </summary> </param> </interface> <interface name="init_all_labeled_script_domtrans" lineno="1001"> <summary> Transition to the init script domain for all labeled init script types </summary> <param name="domain"> <summary> Domain allowed access </summary> </param> </interface> <interface name="init_run_daemon" lineno="1031"> <summary> Start and stop daemon programs directly. </summary> <desc> <p> Start and stop daemon programs directly in the traditional "/etc/init.d/daemon start" style, and do not require run_init. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be performing this action. </summary> </param> </interface> <interface name="init_read_state" lineno="1051"> <summary> Read the process state (/proc/pid) of init. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_ptrace" lineno="1072"> <summary> Ptrace init </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="init_write_script_pipes" lineno="1090"> <summary> Write an init script unnamed pipe. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_getattr_script_files" lineno="1108"> <summary> Get the attribute of init script entrypoint files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_read_script_files" lineno="1127"> <summary> Read init scripts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_exec_script_files" lineno="1146"> <summary> Execute init scripts in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_getattr_all_script_files" lineno="1165"> <summary> Get the attribute of all init script entrypoint files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_read_all_script_files" lineno="1184"> <summary> Read all init script files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_read_all_script_files" lineno="1203"> <summary> Dontaudit read all init script files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_exec_all_script_files" lineno="1221"> <summary> Execute all init scripts in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_read_script_state" lineno="1240"> <summary> Read the process state (/proc/pid) of the init scripts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_use_script_fds" lineno="1264"> <summary> Inherit and use init script file descriptors. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_use_script_fds" lineno="1283"> <summary> Do not audit attempts to inherit init script file descriptors. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_getpgid_script" lineno="1301"> <summary> Get the process group ID of init scripts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_sigchld_script" lineno="1319"> <summary> Send SIGCHLD signals to init scripts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_stream_connect" lineno="1337"> <summary> Connect to init with a unix socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_signal_script" lineno="1355"> <summary> Send generic signals to init scripts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_signull_script" lineno="1373"> <summary> Send null signals to init scripts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_rw_script_pipes" lineno="1391"> <summary> Read and write init script unnamed pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_udp_send_script" lineno="1409"> <summary> Send UDP network traffic to init scripts. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_stream_connect_script" lineno="1424"> <summary> Allow the specified domain to connect to init scripts with a unix socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_rw_script_stream_sockets" lineno="1443"> <summary> Allow the specified domain to read/write to init scripts with a unix domain stream sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_stream_connect_script" lineno="1462"> <summary> Dont audit the specified domain connecting to init scripts with a unix domain stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dbus_send_script" lineno="1479"> <summary> Send messages to init scripts over dbus. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dbus_chat" lineno="1499"> <summary> Send and receive messages from init over dbus. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dbus_chat_script" lineno="1520"> <summary> Send and receive messages from init scripts over dbus. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_use_script_ptys" lineno="1549"> <summary> Read and write the init script pty. </summary> <desc> <p> Read and write the init script pty. This pty is generally opened by the open_init_pty portion of the run_init program so that the daemon does not require direct access to the administrator terminal. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_use_script_ptys" lineno="1569"> <summary> Do not audit attempts to read and write the init script pty. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="init_getattr_script_status_files" lineno="1588"> <summary> Get the attributes of init script status files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_read_script_status_files" lineno="1607"> <summary> Do not audit attempts to read init script status files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_read_script_tmp_files" lineno="1626"> <summary> Read init script temporary data. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_rw_script_tmp_files" lineno="1645"> <summary> Read and write init script temporary data. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_rw_inherited_script_tmp_files" lineno="1664"> <summary> Read and write init script inherited temporary data. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_script_tmp_filetrans" lineno="1693"> <summary> Create files in a init script temporary data directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file_type"> <summary> The type of the object to be created </summary> </param> <param name="object_class"> <summary> The object class. </summary> </param> </interface> <interface name="init_getattr_utmp" lineno="1712"> <summary> Get the attributes of init script process id files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_read_utmp" lineno="1730"> <summary> Read utmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_read_utmp" lineno="1749"> <summary> Do not audit attempts to read utmp. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="init_dontaudit_write_utmp" lineno="1767"> <summary> Do not audit attempts to write utmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_write_utmp" lineno="1785"> <summary> Write to utmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_lock_utmp" lineno="1805"> <summary> Do not audit attempts to lock init script pid files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_rw_utmp" lineno="1823"> <summary> Read and write utmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_dontaudit_rw_utmp" lineno="1842"> <summary> Do not audit attempts to read and write utmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_manage_utmp" lineno="1860"> <summary> Create, read, write, and delete utmp. </summary> <param name="domain"> <summary> Domain access allowed. </summary> </param> </interface> <interface name="init_pid_filetrans_utmp" lineno="1880"> <summary> Create files in /var/run with the utmp file type. </summary> <param name="domain"> <summary> Domain access allowed. </summary> </param> </interface> <interface name="init_tcp_recvfrom_all_daemons" lineno="1898"> <summary> Allow the specified domain to connect to daemon with a tcp socket </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_udp_recvfrom_all_daemons" lineno="1916"> <summary> Allow the specified domain to connect to daemon with a udp socket </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_script_role_transition" lineno="1943"> <summary> Transition to system_r when execute an init script </summary> <desc> <p> Execute a init script in a specified role </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> </desc> <param name="source_role"> <summary> Role to transition from. </summary> </param> </interface> <interface name="init_dontaudit_script_leaks" lineno="1961"> <summary> dontaudit read and write an leaked init scrip file descriptors </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="init_dontaudit_leaks" lineno="1985"> <summary> dontaudit read and write an leaked file descriptors </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="init_manage_script_status_files" lineno="2004"> <summary> Manage init script status files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="init_signal" lineno="2022"> <summary> Send generic signals to init. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <tunable name="init_upstart" dftval="false"> <desc> <p> Enable support for upstart as the init program. </p> </desc> </tunable> <tunable name="allow_daemons_use_tcp_wrapper" dftval="false"> <desc> <p> Allow all daemons to use tcp wrappers. </p> </desc> </tunable> <tunable name="allow_daemons_use_tty" dftval="false"> <desc> <p> Allow all daemons the ability to read/write terminals </p> </desc> </tunable> <tunable name="allow_daemons_dump_core" dftval="false"> <desc> <p> Allow all daemons to write corefiles to / </p> </desc> </tunable> <tunable name="daemons_enable_cluster_mode" dftval="true"> <desc> <p> Enable cluster mode for daemons. </p> </desc> </tunable> </module> <module name="ipsec" filename="policy/modules/system/ipsec.if"> <summary>TCP/IP encryption</summary> <interface name="ipsec_domtrans" lineno="13"> <summary> Execute ipsec in the ipsec domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_domtrans_mgmt" lineno="31"> <summary> Execute ipsec in the ipsec_mgmt domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_stream_connect" lineno="49"> <summary> Connect to IPSEC using a unix domain stream socket. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_stream_connect_racoon" lineno="68"> <summary> Connect to racoon using a unix domain stream socket. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_getattr_key_sockets" lineno="87"> <summary> Get the attributes of an IPSEC key socket. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_exec_mgmt" lineno="105"> <summary> Execute the IPSEC management program in the caller domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_read_config" lineno="124"> <summary> Read the IPSEC configuration </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <rolecap/> </interface> <interface name="ipsec_match_default_spd" lineno="143"> <summary> Match the default SPD entry. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="ipsec_setcontext_default_spd" lineno="164"> <summary> Set the context of a SPD entry to the default context. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="ipsec_write_pid" lineno="182"> <summary> write the ipsec_var_run_t files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="ipsec_manage_pid" lineno="201"> <summary> Create, read, write, and delete the IPSEC pid files. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_domtrans_racoon" lineno="220"> <summary> Execute racoon in the racoon domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_run_racoon" lineno="244"> <summary> Execute racoon and allow the specified role the domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> Role allowed access. </summary> </param> <rolecap/> </interface> <interface name="ipsec_domtrans_setkey" lineno="263"> <summary> Execute setkey in the setkey domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="ipsec_run_setkey" lineno="287"> <summary> Execute setkey and allow the specified role the domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the racoon and setkey domains. </summary> </param> <rolecap/> </interface> <interface name="ipsec_mgmt_kill" lineno="306"> <summary> Send the kill signal to ipsec-mgmt </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="ipsec_mgmt_signal" lineno="324"> <summary> Send a generic signal to ipsec-mgmt </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="ipsec_mgmt_signull" lineno="342"> <summary> Send a generic signull to ipsec-mgmt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="ipsec_mgmt_dbus_chat" lineno="361"> <summary> Send and receive messages from ipsec-mgmt over dbus. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <tunable name="racoon_read_shadow" dftval="false"> <desc> <p> Allow racoon to read shadow </p> </desc> </tunable> </module> <module name="iptables" filename="policy/modules/system/iptables.if"> <summary>Policy for iptables.</summary> <interface name="iptables_domtrans" lineno="13"> <summary> Execute iptables in the iptables domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="iptables_run" lineno="43"> <summary> Execute iptables in the iptables domain, and allow the specified role the iptables domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the iptables domain. </summary> </param> <rolecap/> </interface> <interface name="iptables_exec" lineno="68"> <summary> Execute iptables in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="iptables_initrc_domtrans" lineno="87"> <summary> Execute iptables in the iptables domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="iptables_setattr_config" lineno="105"> <summary> Set the attributes of iptables config files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="iptables_read_config" lineno="124"> <summary> Read iptables config files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="iptables_etc_filetrans_config" lineno="145"> <summary> Create files in /etc with the type used for the iptables config files. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="iptables_manage_config" lineno="163"> <summary> Manage iptables config files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="iscsi" filename="policy/modules/system/iscsi.if"> <summary>Establish connections to iSCSI devices</summary> <interface name="iscsid_domtrans" lineno="13"> <summary> Execute a domain transition to run iscsid. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="iscsi_stream_connect" lineno="31"> <summary> Connect to ISCSI using a unix domain stream socket. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="iscsi_read_lib_files" lineno="50"> <summary> Read iscsi lib files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="iscsi_manage_semaphores" lineno="70"> <summary> Manage iscsid sempaphores. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="kdump" filename="policy/modules/system/kdump.if"> <summary>Kernel crash dumping mechanism</summary> <interface name="kdump_domtrans" lineno="13"> <summary> Execute kdump in the kdump domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="kdump_initrc_domtrans" lineno="32"> <summary> Execute kdump in the kdump domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="kdump_read_config" lineno="50"> <summary> Read kdump configuration file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kdump_manage_config" lineno="69"> <summary> Manage kdump configuration file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kdump_admin" lineno="95"> <summary> All of the rules required to administrate an kdump environment </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed to manage the kdump domain. </summary> </param> <rolecap/> </interface> </module> <module name="libraries" filename="policy/modules/system/libraries.if"> <summary>Policy for system libraries.</summary> <interface name="libs_domtrans_ldconfig" lineno="13"> <summary> Execute ldconfig in the ldconfig domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_exec_ldconfig" lineno="33"> <summary> Execute ldconfig in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="libs_run_ldconfig" lineno="58"> <summary> Execute ldconfig in the ldconfig domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to allow the ldconfig domain. </summary> </param> <rolecap/> </interface> <interface name="libs_use_ld_so" lineno="78"> <summary> Use the dynamic link/loader for automatic loading of shared libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_legacy_use_ld_so" lineno="103"> <summary> Use the dynamic link/loader for automatic loading of shared libraries with legacy support. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_exec_ld_so" lineno="123"> <summary> Execute the dynamic link/loader in the caller's domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_manage_ld_so" lineno="145"> <summary> Create, read, write, and delete the dynamic link/loader. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_relabel_ld_so" lineno="165"> <summary> Relabel to and from the type used for the dynamic link/loader. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_rw_ld_so_cache" lineno="184"> <summary> Modify the dynamic link/loader's cached listing of shared libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_search_lib" lineno="203"> <summary> Search library directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_dontaudit_write_lib_dirs" lineno="228"> <summary> Do not audit attempts to write to library directories. </summary> <desc> <p> Do not audit attempts to write to library directories. Typically this is used to quiet attempts to recompile python byte code. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_manage_lib_dirs" lineno="246"> <summary> Create, read, write, and delete library directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_read_lib_files" lineno="265"> <summary> Read files in the library directories, such as static libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_exec_lib_files" lineno="286"> <summary> Execute library scripts in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_use_lib_files" lineno="308"> <summary> Load and execute functions from generic lib files as shared libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_manage_lib_files" lineno="325"> <summary> Create, read, write, and delete generic files in library directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_relabelto_lib_files" lineno="343"> <summary> Relabel files to the type used in library directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_dontaudit_relabel_lib_files" lineno="363"> <summary> Relabel to and from the type used for generic lib files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_relabel_lib_files" lineno="383"> <summary> Relabel to and from the type used for generic lib files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_delete_lib_symlinks" lineno="402"> <summary> Delete generic symlinks in library directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_delete_lib_files" lineno="421"> <summary> Delete generic symlinks in library directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_manage_shared_libs" lineno="440"> <summary> Create, read, write, and delete shared libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_use_shared_libs" lineno="458"> <summary> Load and execute functions from shared libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_legacy_use_shared_libs" lineno="481"> <summary> Load and execute functions from shared libraries, with legacy support. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="libs_relabel_shared_libs" lineno="502"> <summary> Relabel to and from the type used for shared libraries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="lib_filetrans_shared_lib" lineno="526"> <summary> Create an object in lib directories, with the shared libraries type using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="files_lib_filetrans_shared_lib" lineno="555"> <summary> Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated) </summary> <desc> <p> Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated) </p> <p> lib_filetrans_shared_lib() should be used instead. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> </module> <module name="locallogin" filename="policy/modules/system/locallogin.if"> <summary>Policy for local logins.</summary> <interface name="locallogin_domtrans" lineno="13"> <summary> Execute local logins in the local login domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="locallogin_use_fds" lineno="35"> <summary> Allow processes to inherit local login file descriptors. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="locallogin_dontaudit_use_fds" lineno="53"> <summary> Do not audit attempts to inherit local login file descriptors. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="locallogin_signull" lineno="71"> <summary> Send a null signal to local login processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="locallogin_search_keys" lineno="89"> <summary> Search for key. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="locallogin_link_keys" lineno="107"> <summary> Allow link to the local_login key ring. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="locallogin_domtrans_sulogin" lineno="125"> <summary> Execute local logins in the local login domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="locallogin_getattr_home_content" lineno="143"> <summary> Allow domain to gettatr local login home content </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="logging" filename="policy/modules/system/logging.if"> <summary>Policy for the kernel message logger and system logging daemon.</summary> <interface name="logging_log_file" lineno="41"> <summary> Make the specified type usable for log files in a filesystem. </summary> <desc> <p> Make the specified type usable for log files in a filesystem. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a log file type may result in problems with log rotation, log analysis, and log monitoring programs. </p> <p> Related interfaces: </p> <ul> <li>logging_log_filetrans()</li> </ul> <p> Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log): </p> <p> type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file) </p> </desc> <param name="type"> <summary> Type to be used for files. </summary> </param> <infoflow type="none"/> </interface> <interface name="logging_send_audit_msgs" lineno="62"> <summary> Send audit messages. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_dontaudit_send_audit_msgs" lineno="77"> <summary> dontaudit attempts to send audit messages. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_set_loginuid" lineno="92"> <summary> Set login uid </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_set_tty_audit" lineno="107"> <summary> Set tty auditing </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_set_audit_parameters" lineno="121"> <summary> Set up audit </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_read_audit_log" lineno="137"> <summary> Read the audit log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_domtrans_auditctl" lineno="157"> <summary> Execute auditctl in the auditctl domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_run_auditctl" lineno="182"> <summary> Execute auditctl in the auditctl domain, and allow the specified role the auditctl domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the auditctl domain. </summary> </param> <rolecap/> </interface> <interface name="logging_domtrans_auditd" lineno="201"> <summary> Execute auditd in the auditd domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_run_auditd" lineno="225"> <summary> Execute auditd in the auditd domain, and allow the specified role the auditd domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the auditd domain. </summary> </param> </interface> <interface name="logging_stream_connect_auditd" lineno="244"> <summary> Connect to auditdstored over an unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_domtrans_dispatcher" lineno="259"> <summary> Execute a domain transition to run the audit dispatcher. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="logging_signal_dispatcher" lineno="277"> <summary> Signal the audit dispatcher. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="logging_dispatcher_domain" lineno="301"> <summary> Create a domain for processes which can be started by the system audit dispatcher </summary> <param name="domain"> <summary> Type to be used as a domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> </interface> <interface name="logging_stream_connect_dispatcher" lineno="329"> <summary> Connect to the audit dispatcher over an unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_manage_audit_config" lineno="349"> <summary> Manage the auditd configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_manage_audit_log" lineno="369"> <summary> Manage the audit log. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_domtrans_klog" lineno="389"> <summary> Execute klogd in the klog domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_check_exec_syslog" lineno="408"> <summary> Check if syslogd is executable. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_domtrans_syslog" lineno="428"> <summary> Execute syslogd in the syslog domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_log_filetrans" lineno="485"> <summary> Create an object in the log directory, with a private type. </summary> <desc> <p> Allow the specified domain to create an object in the general system log directories (e.g., /var/log) with a private type. Typically this is used for creating private log files in /var/log with the private type instead of the general system log type. To accomplish this goal, either the program must be SELinux-aware, or use this interface. </p> <p> Related interfaces: </p> <ul> <li>logging_log_file()</li> </ul> <p> Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log): </p> <p> type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="logging_send_syslog_msg" lineno="526"> <summary> Send system log messages. </summary> <desc> <p> Allow the specified domain to connect to the system log service (syslog), to send messages be added to the system logs. Typically this is used by services that do not have their own log file in /var/log. </p> <p> This does not allow messages to be sent to the auditing system. </p> <p> Programs which use the libc function syslog() will require this access. </p> <p> Related interfaces: </p> <ul> <li>logging_send_audit_msgs()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_stream_connect_syslog" lineno="556"> <summary> Connect to the syslog control unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_read_audit_config" lineno="576"> <summary> Read the auditd configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_dontaudit_search_audit_config" lineno="597"> <summary> dontaudit search of auditd configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_read_syslog_config" lineno="616"> <summary> Read syslog configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_search_logs" lineno="636"> <summary> Allows the domain to open a file in the log directory, but does not allow the listing of the contents of the log directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_dontaudit_search_logs" lineno="655"> <summary> Do not audit attempts to search the var log directory. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="logging_list_logs" lineno="673"> <summary> List the contents of the generic log directory (/var/log). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_rw_generic_log_dirs" lineno="692"> <summary> Read and write the generic log directory (/var/log). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_dontaudit_getattr_all_logs" lineno="712"> <summary> Do not audit attempts to get the atttributes of any log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_append_all_logs" lineno="730"> <summary> Append to all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_inherit_append_all_logs" lineno="750"> <summary> Append to all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_read_all_logs" lineno="769"> <summary> Read all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_dontaudit_read_all_logs" lineno="790"> <summary> dontaudit Read all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_dontaudit_rw_inherited_all_logs" lineno="809"> <summary> dontaudit Read all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_exec_all_logs" lineno="829"> <summary> Execute all log files in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_rw_all_logs" lineno="849"> <summary> read/write to all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_manage_all_logs" lineno="869"> <summary> Create, read, write, and delete all log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_read_generic_logs" lineno="890"> <summary> Read generic log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_write_generic_logs" lineno="910"> <summary> Write generic log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_dontaudit_rw_inherited_generic_logs" lineno="930"> <summary> Dontaudit read/Write inherited generic log files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="logging_dontaudit_write_generic_logs" lineno="948"> <summary> Dontaudit Write generic log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_rw_generic_logs" lineno="966"> <summary> Read and write generic log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="logging_manage_generic_logs" lineno="988"> <summary> Create, read, write, and delete generic log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_admin_audit" lineno="1014"> <summary> All of the rules required to administrate the audit environment </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> User role allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_admin_syslog" lineno="1058"> <summary> All of the rules required to administrate the syslog environment </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> User role allowed access. </summary> </param> <rolecap/> </interface> <interface name="logging_admin" lineno="1118"> <summary> All of the rules required to administrate the logging environment </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> User role allowed access. </summary> </param> <rolecap/> </interface> <tunable name="logging_syslogd_can_sendmail" dftval="false"> <desc> <p> Allow syslogd daemon to send mail </p> </desc> </tunable> <tunable name="logging_syslog_can_read_tmp" dftval="false"> <desc> <p> Allow syslogd daemon to read user tmp content </p> </desc> </tunable> <tunable name="logging_syslogd_use_tty" dftval="true"> <desc> <p> Allow syslogd the ability to read/write terminals </p> </desc> </tunable> </module> <module name="lvm" filename="policy/modules/system/lvm.if"> <summary>Policy for logical volume management programs.</summary> <interface name="lvm_domtrans" lineno="13"> <summary> Execute lvm programs in the lvm domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="lvm_exec" lineno="32"> <summary> Execute lvm programs in the caller domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="lvm_run" lineno="57"> <summary> Execute lvm programs in the lvm domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to allow the LVM domain. </summary> </param> <rolecap/> </interface> <interface name="lvm_read_config" lineno="77"> <summary> Read LVM configuration files. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <rolecap/> </interface> <interface name="lvm_manage_config" lineno="98"> <summary> Manage LVM configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="lvm_domtrans_clvmd" lineno="118"> <summary> Execute a domain transition to run clvmd. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="lvm_rw_clvmd_tmpfs_files" lineno="137"> <summary> Read and write to clvmd temporary file system. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="lvm_delete_clvmd_tmpfs_files" lineno="156"> <summary> Delete lvm temporary file system. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="lvm_dgram_send" lineno="175"> <summary> Send a message to lvm over the datagram socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="miscfiles" filename="policy/modules/system/miscfiles.if"> <summary>Miscelaneous files.</summary> <interface name="miscfiles_cert_type" lineno="38"> <summary> Make the specified type usable as a cert file. </summary> <desc> <p> Make the specified type usable for cert files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with cert management tools. </p> <p> Related interfaces: </p> <ul> <li>files_type()</li> </ul> <p> Example: </p> <p> type mycertfile_t; cert_type(mycertfile_t) allow mydomain_t mycertfile_t:file read_file_perms; files_search_etc(mydomain_t) </p> </desc> <param name="type"> <summary> Type to be used for files. </summary> </param> <infoflow type="none"/> </interface> <interface name="miscfiles_read_certs" lineno="58"> <summary> Read system SSL certificates. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_dontaudit_rw_certs" lineno="79"> <summary> Dontaudit read/writei certificates. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_manage_cert_dirs" lineno="98"> <summary> manange system SSL certificates. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_manage_cert_files" lineno="117"> <summary> manange system SSL certificates. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_read_fonts" lineno="137"> <summary> Read fonts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_setattr_fonts_dirs" lineno="166"> <summary> Set the attributes on a fonts directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="186"> <summary> Do not audit attempts to set the attributes on a fonts directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_dontaudit_write_fonts" lineno="205"> <summary> Do not audit attempts to write fonts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_manage_fonts" lineno="225"> <summary> Create, read, write, and delete fonts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_setattr_fonts_cache_dirs" lineno="249"> <summary> Set the attributes on a fonts cache directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="268"> <summary> Do not audit attempts to set the attributes on a fonts cache directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_manage_fonts_cache" lineno="287"> <summary> Create, read, write, and delete fonts cache. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_read_hwdata" lineno="309"> <summary> Read hardware identification data. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_setattr_localization" lineno="329"> <summary> Allow process to setattr localization info </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_read_localization" lineno="361"> <summary> Allow process to read localization information. </summary> <desc> <p> Allow the specified domain to read the localization files. This is typically for time zone configuration files, such as /etc/localtime and files in /usr/share/zoneinfo. Typically, any domain which needs to know the GMT/UTC offset of the current timezone will need access to these files. Generally, it should be safe for any domain to read these files. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="miscfiles_rw_localization" lineno="383"> <summary> Allow process to write localization info </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_relabel_localization" lineno="403"> <summary> Allow process to relabel localization info </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_legacy_read_localization" lineno="422"> <summary> Allow process to read legacy time localization info </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_search_man_pages" lineno="441"> <summary> Search man pages. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="miscfiles_dontaudit_search_man_pages" lineno="460"> <summary> Do not audit attempts to search man pages. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="miscfiles_read_man_pages" lineno="479"> <summary> Read man pages </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_delete_man_pages" lineno="501"> <summary> Delete man pages </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_manage_man_pages" lineno="526"> <summary> Create, read, write, and delete man pages </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_read_public_files" lineno="549"> <summary> Read public files used for file transfer services. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_manage_public_files" lineno="571"> <summary> Create, read, write, and delete public files and directories used for file transfer services. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="miscfiles_read_tetex_data" lineno="591"> <summary> Read TeX data </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_exec_tetex_data" lineno="615"> <summary> Execute TeX data programs in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_domain_entry_test_files" lineno="640"> <summary> Let test files be an entry point for a specified domain. </summary> <param name="domain"> <summary> Domain to be entered. </summary> </param> </interface> <interface name="miscfiles_read_test_files" lineno="658"> <summary> Read test files and directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_exec_test_files" lineno="677"> <summary> Execute test files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_etc_filetrans_localization" lineno="696"> <summary> Execute test files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="miscfiles_manage_localization" lineno="716"> <summary> Create, read, write, and delete localization </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> </module> <module name="modutils" filename="policy/modules/system/modutils.if"> <summary>Policy for kernel module utilities</summary> <interface name="modutils_getattr_module_deps" lineno="13"> <summary> Getattr the dependencies of kernel modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_read_module_deps" lineno="32"> <summary> Read the dependencies of kernel modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_list_module_config" lineno="53"> <summary> list the configuration options used when loading modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="modutils_read_module_config" lineno="73"> <summary> Read the configuration options used when loading modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="modutils_rename_module_config" lineno="98"> <summary> Rename a file with the configuration options used when loading modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_delete_module_config" lineno="117"> <summary> Unlink a file with the configuration options used when loading modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_manage_module_config" lineno="136"> <summary> Manage files with the configuration options used when loading modules. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_domtrans_insmod_uncond" lineno="156"> <summary> Unconditionally execute insmod in the insmod domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_domtrans_insmod" lineno="175"> <summary> Execute insmod in the insmod domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_run_insmod" lineno="204"> <summary> Execute insmod in the insmod domain, and allow the specified role the insmod domain, and use the caller's terminal. Has a sigchld backchannel. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the insmod domain. </summary> </param> <rolecap/> </interface> <interface name="modutils_exec_insmod" lineno="223"> <summary> Execute insmod in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_domtrans_depmod" lineno="242"> <summary> Execute depmod in the depmod domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_run_depmod" lineno="267"> <summary> Execute depmod in the depmod domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the depmod domain. </summary> </param> <rolecap/> </interface> <interface name="modutils_exec_depmod" lineno="286"> <summary> Execute depmod in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_domtrans_update_mods" lineno="305"> <summary> Execute depmod in the depmod domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="modutils_run_update_mods" lineno="330"> <summary> Execute update_modules in the update_modules domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the update_modules domain. </summary> </param> <rolecap/> </interface> <interface name="modutils_exec_update_mods" lineno="351"> <summary> Execute update_modules in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="mount" filename="policy/modules/system/mount.if"> <summary>Policy for mount.</summary> <interface name="mount_domtrans" lineno="13"> <summary> Execute mount in the mount domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="mount_run" lineno="47"> <summary> Execute mount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the mount domain. </summary> </param> <rolecap/> </interface> <interface name="mount_run_fusermount" lineno="95"> <summary> Execute fusermount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the mount domain. </summary> </param> <rolecap/> </interface> <interface name="mount_exec" lineno="116"> <summary> Execute mount in the caller domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="mount_signal" lineno="138"> <summary> Send a generic signal to mount. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mount_use_fds" lineno="158"> <summary> Use file descriptors for mount. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="mount_send_nfs_client_request" lineno="188"> <summary> Allow the mount domain to send nfs requests for mounting network drives </summary> <desc> <p> Allow the mount domain to send nfs requests for mounting network drives </p> <p> This interface has been deprecated as these rules were a side effect of leaked mount file descriptors. This interface has no effect. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mount_domtrans_unconfined" lineno="202"> <summary> Execute mount in the unconfined mount domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mount_run_unconfined" lineno="228"> <summary> Execute mount in the unconfined mount domain, and allow the specified role the unconfined mount domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the unconfined mount domain. </summary> </param> <rolecap/> </interface> <interface name="mount_domtrans_fusermount" lineno="255"> <summary> Execute fusermount in the mount domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="mount_exec_fusermount" lineno="273"> <summary> Execute fusermount. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="mount_dontaudit_exec_fusermount" lineno="291"> <summary> dontaudit Execute fusermount. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="mount_domtrans_showmount" lineno="309"> <summary> Execute a domain transition to run showmount. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="mount_run_showmount" lineno="333"> <summary> Execute showmount in the showmount domain, and allow the specified role the showmount domain. </summary> <param name="domain"> <summary> Domain allowed access </summary> </param> <param name="role"> <summary> The role to be allowed the showmount domain. </summary> </param> </interface> <tunable name="allow_mount_anyfile" dftval="false"> <desc> <p> Allow the mount command to mount any directory or file. </p> </desc> </tunable> </module> <module name="netlabel" filename="policy/modules/system/netlabel.if"> <summary>NetLabel/CIPSO labeled networking management</summary> <interface name="netlabel_domtrans_mgmt" lineno="13"> <summary> Execute netlabel_mgmt in the netlabel_mgmt domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="netlabel_run_mgmt" lineno="39"> <summary> Execute netlabel_mgmt in the netlabel_mgmt domain, and allow the specified role the netlabel_mgmt domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the netlabel_mgmt domain. </summary> </param> <rolecap/> </interface> </module> <module name="pcmcia" filename="policy/modules/system/pcmcia.if"> <summary>PCMCIA card management services</summary> <interface name="pcmcia_stub" lineno="13"> <summary> PCMCIA stub interface. No access allowed. </summary> <param name="domain" unused="true"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="pcmcia_domtrans_cardmgr" lineno="29"> <summary> Execute cardmgr in the cardmgr domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="pcmcia_use_cardmgr_fds" lineno="47"> <summary> Inherit and use file descriptors from cardmgr. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="pcmcia_domtrans_cardctl" lineno="65"> <summary> Execute cardctl in the cardmgr domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="pcmcia_run_cardctl" lineno="90"> <summary> Execute cardmgr in the cardctl domain, and allow the specified role the cardmgr domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the cardmgr domain. </summary> </param> <rolecap/> </interface> <interface name="pcmcia_read_pid" lineno="109"> <summary> Read cardmgr pid files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="pcmcia_manage_pid" lineno="129"> <summary> Create, read, write, and delete cardmgr pid files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="pcmcia_manage_pid_chr_files" lineno="149"> <summary> Create, read, write, and delete cardmgr runtime character nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="raid" filename="policy/modules/system/raid.if"> <summary>RAID array management tools</summary> <interface name="raid_domtrans_mdadm" lineno="13"> <summary> Execute software raid tools in the mdadm domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="raid_manage_mdadm_pid" lineno="40"> <summary> Create, read, write, and delete the mdadm pid files. </summary> <desc> <p> Create, read, write, and delete the mdadm pid files. </p> <p> Added for use in the init module. </p> </desc> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="raid_read_mdadm_map" lineno="61"> <summary> Read mdadm map file. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> </module> <module name="selinuxutil" filename="policy/modules/system/selinuxutil.if"> <summary>Policy for SELinux policy and userland applications.</summary> <interface name="seutil_domtrans_checkpolicy" lineno="13"> <summary> Execute checkpolicy in the checkpolicy domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_checkpolicy" lineno="41"> <summary> Execute checkpolicy in the checkpolicy domain, and allow the specified role the checkpolicy domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the checkpolicy domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_exec_checkpolicy" lineno="61"> <summary> Execute checkpolicy in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_domtrans_loadpolicy" lineno="81"> <summary> Execute load_policy in the load_policy domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_loadpolicy" lineno="108"> <summary> Execute load_policy in the load_policy domain, and allow the specified role the load_policy domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the load_policy domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_exec_loadpolicy" lineno="127"> <summary> Execute load_policy in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_read_loadpolicy" lineno="146"> <summary> Read the load_policy program file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_domtrans_newrole" lineno="165"> <summary> Execute newrole in the newole domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_newrole" lineno="193"> <summary> Execute newrole in the newrole domain, and allow the specified role the newrole domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the newrole domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_exec_newrole" lineno="218"> <summary> Execute newrole in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_dontaudit_signal_newrole" lineno="239"> <summary> Do not audit the caller attempts to send a signal to newrole. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_sigchld_newrole" lineno="267"> <summary> Send a SIGCHLD signal to newrole. </summary> <desc> <p> Allow the specified domain to send a SIGCHLD signal to newrole. This signal is automatically sent from a process that is terminating to its parent. This may be needed by domains that are executed from newrole. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="1"/> </interface> <interface name="seutil_use_newrole_fds" lineno="285"> <summary> Inherit and use newrole file descriptors. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_dontaudit_use_newrole_fds" lineno="304"> <summary> Do not audit attempts to inherit and use newrole file descriptors. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="seutil_domtrans_restorecon" lineno="322"> <summary> Execute restorecon in the restorecon domain. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_restorecon" lineno="345"> <summary> Execute restorecon in the restorecon domain, and allow the specified role the restorecon domain, and use the caller's terminal. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the restorecon domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_exec_restorecon" lineno="361"> <summary> Execute restorecon in the caller domain. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_exec_restorecond" lineno="377"> <summary> Execute restorecond in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_domtrans_runinit" lineno="397"> <summary> Execute run_init in the run_init domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_init_script_domtrans_runinit" lineno="423"> <summary> Execute init scripts in the run_init domain. </summary> <desc> <p> Execute init scripts in the run_init domain. This is used for the Gentoo integrated run_init. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_runinit" lineno="453"> <summary> Execute run_init in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the run_init domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_init_script_run_runinit" lineno="493"> <summary> Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. </summary> <desc> <p> Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. </p> <p> This is used for the Gentoo integrated run_init. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the run_init domain. </summary> </param> </interface> <interface name="seutil_use_runinit_fds" lineno="516"> <summary> Inherit and use run_init file descriptors. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_domtrans_setfiles" lineno="534"> <summary> Execute setfiles in the setfiles domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_setfiles" lineno="566"> <summary> Execute setfiles in the setfiles domain, and allow the specified role the setfiles domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the setfiles domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_domtrans_setfiles_mac" lineno="585"> <summary> Execute setfiles in the setfiles domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_run_setfiles_mac" lineno="613"> <summary> Execute setfiles in the setfiles_mac domain, and allow the specified role the setfiles_mac domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the setfiles_mac domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_exec_setfiles" lineno="632"> <summary> Execute setfiles in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_dontaudit_search_config" lineno="653"> <summary> Do not audit attempts to search the SELinux configuration directory (/etc/selinux). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="seutil_dontaudit_read_config" lineno="672"> <summary> Do not audit attempts to read the SELinux userland configuration (/etc/selinux). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="seutil_read_config" lineno="692"> <summary> Read the general SELinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_rw_config" lineno="714"> <summary> Read and write the general SELinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_manage_selinux_config" lineno="746"> <summary> Create, read, write, and delete the general selinux configuration files. (Deprecated) </summary> <desc> <p> Create, read, write, and delete the general selinux configuration files. </p> <p> This interface has been deprecated, please use the seutil_manage_config() interface instead. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_manage_config" lineno="763"> <summary> Create, read, write, and delete the general selinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_manage_config_dirs" lineno="786"> <summary> Create, read, write, and delete the general selinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_dontaudit_search_login_config" lineno="806"> <summary> Do not audit attempts to search the SELinux login configuration directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="seutil_dontaudit_read_login_config" lineno="825"> <summary> Do not audit attempts to read the SELinux login configuration. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="seutil_read_login_config" lineno="843"> <summary> Read the SELinux login configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_rw_login_config" lineno="866"> <summary> Read and write the SELinux login configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_rw_login_config_dirs" lineno="889"> <summary> Create, read, write, and delete the general selinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_manage_login_config" lineno="911"> <summary> Create, read, write, and delete the general selinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_manage_login_config_files" lineno="934"> <summary> manage the login selinux configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_search_default_contexts" lineno="956"> <summary> Search the policy directory with default_context files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_read_default_contexts" lineno="976"> <summary> Read the default_contexts files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_manage_default_contexts" lineno="997"> <summary> Create, read, write, and delete the default_contexts files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_read_file_contexts" lineno="1018"> <summary> Read the file_contexts files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_dontaudit_read_file_contexts" lineno="1039"> <summary> Do not audit attempts to read the file_contexts files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_rw_file_contexts" lineno="1058"> <summary> Read and write the file_contexts files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_manage_file_contexts" lineno="1079"> <summary> Create, read, write, and delete the file_contexts files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_read_bin_policy" lineno="1099"> <summary> Read the SELinux binary policy. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_create_bin_policy" lineno="1119"> <summary> Create the SELinux binary policy. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_relabelto_bin_policy" lineno="1142"> <summary> Allow the caller to relabel a file to the binary policy type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_manage_bin_policy" lineno="1163"> <summary> Create, read, write, and delete the SELinux binary policy. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_read_src_policy" lineno="1185"> <summary> Read SELinux policy source files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_manage_src_policy" lineno="1207"> <summary> Create, read, write, and delete SELinux policy source files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="seutil_domtrans_semanage" lineno="1228"> <summary> Execute a domain transition to run semanage. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="seutil_domtrans_setsebool" lineno="1248"> <summary> Execute a domain transition to run setsebool. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="seutil_run_semanage" lineno="1276"> <summary> Execute semanage in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the semanage domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_run_setsebool" lineno="1305"> <summary> Execute setsebool in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the setsebool domain. </summary> </param> <rolecap/> </interface> <interface name="seutil_read_module_store" lineno="1325"> <summary> Full management of the semanage module store. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_manage_module_store" lineno="1346"> <summary> Full management of the semanage module store. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_get_semanage_read_lock" lineno="1367"> <summary> Get read lock on module store </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_get_semanage_trans_lock" lineno="1386"> <summary> Get trans lock on module store </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_libselinux_linked" lineno="1414"> <summary> SELinux-enabled program access for libselinux-linked programs. </summary> <desc> <p> SELinux-enabled programs are typically linked to the libselinux library. This interface will allow access required for the libselinux constructor to function. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_dontaudit_libselinux_linked" lineno="1444"> <summary> Do not audit SELinux-enabled program access for libselinux-linked programs. </summary> <desc> <p> SELinux-enabled programs are typically linked to the libselinux library. This interface will dontaudit access required for the libselinux constructor to function. </p> <p> Generally this should not be used on anything but simple SELinux-enabled programs that do not rely on data initialized by the libselinux constructor. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_semanage_policy" lineno="1459"> <summary> All rules necessary to run semanage command </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="seutil_setfiles" lineno="1537"> <summary> All rules necessary to run setfiles command </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="setrans" filename="policy/modules/system/setrans.if"> <summary>SELinux MLS/MCS label translation service.</summary> <interface name="setrans_initrc_domtrans" lineno="14"> <summary> Execute setrans server in the setrans domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="setrans_translate_context" lineno="32"> <summary> Allow a domain to translate contexts. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="sosreport" filename="policy/modules/system/sosreport.if"> <summary>policy for sosreport</summary> <interface name="sosreport_domtrans" lineno="13"> <summary> Execute a domain transition to run sosreport. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="sosreport_run" lineno="38"> <summary> Execute sosreport in the sosreport domain, and allow the specified role the sosreport domain. </summary> <param name="domain"> <summary> Domain allowed access </summary> </param> <param name="role"> <summary> The role to be allowed the sosreport domain. </summary> </param> </interface> <interface name="sosreport_role" lineno="62"> <summary> Role access for sosreport </summary> <param name="role"> <summary> Role allowed access </summary> </param> <param name="domain"> <summary> User domain for the role </summary> </param> </interface> <interface name="sosreport_read_tmp_files" lineno="86"> <summary> Allow the specified domain to read sosreport tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sosreport_delete_tmp_files" lineno="105"> <summary> Delete sosreport tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sosreport_append_tmp_files" lineno="124"> <summary> Append sosreport tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="sysnetwork" filename="policy/modules/system/sysnetwork.if"> <summary>Policy for network configuration: ifconfig and dhcp client.</summary> <interface name="sysnet_domtrans_dhcpc" lineno="13"> <summary> Execute dhcp client in dhcpc domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="sysnet_run_dhcpc" lineno="39"> <summary> Execute DHCP clients in the dhcpc domain, and allow the specified role the dhcpc domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the clock domain. </summary> </param> <rolecap/> </interface> <interface name="sysnet_sigchld_dhcpc" lineno="93"> <summary> Send a SIGCHLD signal to the dhcp client. </summary> <param name="domain"> <summary> The domain sending the SIGCHLD. </summary> </param> </interface> <interface name="sysnet_kill_dhcpc" lineno="112"> <summary> Send a kill signal to the dhcp client. </summary> <param name="domain"> <summary> The domain sending the SIGKILL. </summary> </param> <rolecap/> </interface> <interface name="sysnet_sigstop_dhcpc" lineno="130"> <summary> Send a SIGSTOP signal to the dhcp client. </summary> <param name="domain"> <summary> The domain sending the SIGSTOP. </summary> </param> </interface> <interface name="sysnet_signull_dhcpc" lineno="148"> <summary> Send a null signal to the dhcp client. </summary> <param name="domain"> <summary> The domain sending the null signal. </summary> </param> </interface> <interface name="sysnet_signal_dhcpc" lineno="167"> <summary> Send a generic signal to the dhcp client. </summary> <param name="domain"> <summary> The domain sending the signal. </summary> </param> <rolecap/> </interface> <interface name="sysnet_dbus_chat_dhcpc" lineno="186"> <summary> Send and receive messages from dhcpc over dbus. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_rw_dhcp_config" lineno="206"> <summary> Read and write dhcp configuration files. </summary> <param name="domain"> <summary> The domain allowed access. </summary> </param> </interface> <interface name="sysnet_read_dhcpc_state" lineno="225"> <summary> Read dhcp client state files. </summary> <param name="domain"> <summary> The domain allowed access. </summary> </param> </interface> <interface name="sysnet_delete_dhcpc_state" lineno="243"> <summary> Delete the dhcp client state files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_relabelfrom_dhcpc_state" lineno="261"> <summary> Allow caller to relabel dhcpc_state files </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_manage_dhcpc_state" lineno="280"> <summary> Manage the dhcp client state files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_setattr_config" lineno="298"> <summary> Set the attributes of network config files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_relabelfrom_net_conf" lineno="317"> <summary> Allow caller to relabel net_conf files </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_relabelto_net_conf" lineno="336"> <summary> Allow caller to relabel net_conf files </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_read_config" lineno="376"> <summary> Read network config files. </summary> <desc> <p> Allow the specified domain to read the general network configuration files. A common example of this is the /etc/resolv.conf file, which has domain name system (DNS) server IP addresses. Typically, most networking processes will require the access provided by this interface. </p> <p> Higher-level interfaces which involve networking will generally call this interface, for example: </p> <ul> <li>sysnet_dns_name_resolve()</li> <li>sysnet_use_ldap()</li> <li>sysnet_use_portmap()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_dontaudit_read_config" lineno="400"> <summary> Do not audit attempts to read network config files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="sysnet_write_config" lineno="418"> <summary> Write network config files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_create_config" lineno="437"> <summary> Create network config files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_etc_filetrans_config" lineno="457"> <summary> Create files in /etc with the type used for the network config files. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="sysnet_manage_config" lineno="475"> <summary> Create, read, write, and delete network config files. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="sysnet_read_dhcpc_pid" lineno="494"> <summary> Read the dhcp client pid file. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="sysnet_delete_dhcpc_pid" lineno="513"> <summary> Delete the dhcp client pid file. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="sysnet_domtrans_ifconfig" lineno="532"> <summary> Execute ifconfig in the ifconfig domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="sysnet_run_ifconfig" lineno="563"> <summary> Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, and use the caller's terminal. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> <param name="role"> <summary> The role to be allowed the ifconfig domain. </summary> </param> <rolecap/> </interface> <interface name="sysnet_exec_ifconfig" lineno="583"> <summary> Execute ifconfig in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_signal_ifconfig" lineno="603"> <summary> Send a generic signal to ifconfig. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="sysnet_read_dhcp_config" lineno="621"> <summary> Read the DHCP configuration files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_search_dhcp_state" lineno="641"> <summary> Search the DHCP state data directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_dhcp_state_filetrans" lineno="680"> <summary> Create DHCP state data. </summary> <desc> <p> Create DHCP state data. </p> <p> This is added for DHCP server, as the server and client put their state files in the same directory. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file_type"> <summary> The type of the object to be created </summary> </param> <param name="object_class"> <summary> The object class. </summary> </param> </interface> <interface name="sysnet_dns_name_resolve" lineno="700"> <summary> Perform a DNS name resolution. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="sysnet_use_ldap" lineno="743"> <summary> Connect and use a LDAP server. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_use_portmap" lineno="774"> <summary> Connect and use remote port mappers. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="sysnet_dontaudit_dhcpc_use_fds" lineno="808"> <summary> Do not audit attempts to use the dhcp file descriptors. </summary> <param name="domain"> <summary> The domain sending the SIGCHLD. </summary> </param> </interface> <interface name="sysnet_role_transition_dhcpc" lineno="835"> <summary> Transition to system_r when execute an dhclient script </summary> <desc> <p> Execute dhclient script in a specified role </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> </desc> <param name="source_role"> <summary> Role to transition from. </summary> </param> </interface> <tunable name="dhcpc_exec_iptables" dftval="false"> <desc> <p> Allow dhcpc client applications to execute iptables commands </p> </desc> </tunable> </module> <module name="udev" filename="policy/modules/system/udev.if"> <summary>Policy for udev.</summary> <interface name="udev_run" lineno="20"> <summary> Execute udev in the udev domain, and allow the specified role the udev domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role to be allowed the iptables domain. </summary> </param> <rolecap/> </interface> <interface name="udev_signal" lineno="39"> <summary> Send generic signals to udev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="udev_domtrans" lineno="57"> <summary> Execute udev in the udev domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="udev_exec" lineno="75"> <summary> Execute udev in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="udev_helper_domtrans" lineno="93"> <summary> Execute a udev helper in the udev domain. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="udev_read_state" lineno="111"> <summary> Allow process to read udev process state. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="udev_dontaudit_use_fds" lineno="131"> <summary> Do not audit attempts to inherit a udev file descriptor. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="udev_dontaudit_rw_dgram_sockets" lineno="150"> <summary> Do not audit attempts to read or write to a udev unix datagram socket. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="udev_dontaudit_search_db" lineno="168"> <summary> Do not audit search of udev database directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="udev_read_db" lineno="192"> <summary> Read the udev device table. </summary> <desc> <p> Allow the specified domain to read the udev device table. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="udev_rw_db" lineno="213"> <summary> Allow process to modify list of devices. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="udev_delete_db" lineno="232"> <summary> Allow process to delete list of devices. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="udev_read_pid_files" lineno="252"> <summary> Create, read, write, and delete udev pid files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="udev_manage_pid_files" lineno="275"> <summary> Create, read, write, and delete udev pid files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="udev_system_domain" lineno="300"> <summary> Create a domain for processes which can be started by udev. </summary> <param name="domain"> <summary> Type to be used as a domain. </summary> </param> <param name="entry_point"> <summary> Type of the program to be used as an entry point to this domain. </summary> </param> </interface> </module> <module name="unconfined" filename="policy/modules/system/unconfined.if"> <summary>The unconfined domain.</summary> <interface name="unconfined_domain_noaudit" lineno="13"> <summary> Make the specified domain unconfined. </summary> <param name="domain"> <summary> Domain to make unconfined. </summary> </param> </interface> <interface name="unconfined_domain" lineno="136"> <summary> Make the specified domain unconfined and audit executable heap usage. </summary> <desc> <p> Make the specified domain unconfined and audit executable heap usage. With exception of memory protections, usage of this interface will result in the level of access the domain has is like SELinux was not being used. </p> <p> Only completely trusted domains should use this interface. </p> </desc> <param name="domain"> <summary> Domain to make unconfined. </summary> </param> </interface> <interface name="unconfined_alias_domain" lineno="168"> <summary> Add an alias type to the unconfined domain. (Deprecated) </summary> <desc> <p> Add an alias type to the unconfined domain. (Deprecated) </p> <p> This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy. </p> </desc> <param name="domain"> <summary> New alias of the unconfined domain. </summary> </param> </interface> <interface name="unconfined_execmem_alias_program" lineno="194"> <summary> Add an alias type to the unconfined execmem program file type. (Deprecated) </summary> <desc> <p> Add an alias type to the unconfined execmem program file type. (Deprecated) </p> <p> This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy. </p> </desc> <param name="domain"> <summary> New alias of the unconfined execmem program type. </summary> </param> </interface> </module> <module name="userdomain" filename="policy/modules/system/userdomain.if"> <summary>Policy for user domains</summary> <template name="userdom_base_user_template" lineno="24"> <summary> The template containing the most basic rules common to all users. </summary> <desc> <p> The template containing the most basic rules common to all users. </p> <p> This template creates a user domain, types, and rules for the user's tty and pty. </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> <rolebase/> </template> <interface name="userdom_ro_home_role" lineno="187"> <summary> Allow a home directory for which the role has read-only access. </summary> <desc> <p> Allow a home directory for which the role has read-only access. </p> <p> This does not allow execute access. </p> </desc> <param name="role"> <summary> The user role </summary> </param> <param name="userdomain"> <summary> The user domain </summary> </param> <rolebase/> </interface> <interface name="userdom_manage_home_role" lineno="241"> <summary> Allow a home directory for which the role has full access. </summary> <desc> <p> Allow a home directory for which the role has full access. </p> <p> This does not allow execute access. </p> </desc> <param name="role"> <summary> The user role </summary> </param> <param name="userdomain"> <summary> The user domain </summary> </param> <rolebase/> </interface> <interface name="userdom_manage_tmp_role" lineno="315"> <summary> Manage user temporary files </summary> <param name="role"> <summary> Role allowed access. </summary> </param> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolebase/> </interface> <interface name="userdom_exec_user_bin_files" lineno="343"> <summary> Execute user bin files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_exec_user_tmp_files" lineno="364"> <summary> The execute access user temporary files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolebase/> </interface> <interface name="userdom_manage_tmpfs_role" lineno="400"> <summary> Role access for the user tmpfs type that the user has full access. </summary> <desc> <p> Role access for the user tmpfs type that the user has full access. </p> <p> This does not allow execute access. </p> </desc> <param name="role"> <summary> Role allowed access. </summary> </param> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="userdom_basic_networking" lineno="427"> <summary> The interface allowing the user basic network permissions </summary> <param name="userdomain"> <summary> The user domain </summary> </param> <rolebase/> </interface> <template name="userdom_xwindows_client_template" lineno="466"> <summary> The template for creating a user xwindows client. (Deprecated) </summary> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> <rolebase/> </template> <template name="userdom_change_password_template" lineno="508"> <summary> The template for allowing the user to change passwords. </summary> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> <rolebase/> </template> <template name="userdom_common_user_template" lineno="538"> <summary> The template containing rules common to unprivileged users and administrative users. </summary> <desc> <p> This template creates a user domain, types, and rules for the user's tty, pty, tmp, and tmpfs files. </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> </template> <template name="userdom_login_user_template" lineno="812"> <summary> The template for creating a login user. </summary> <desc> <p> This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files. </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> </template> <template name="userdom_restricted_user_template" lineno="954"> <summary> The template for creating a unprivileged login user. </summary> <desc> <p> This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files. </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> </template> <template name="userdom_restricted_xwindows_user_template" lineno="1024"> <summary> The template for creating a unprivileged xwindows login user. </summary> <desc> <p> The template for creating a unprivileged xwindows login user. </p> <p> This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files. </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> </template> <template name="userdom_unpriv_user_template" lineno="1138"> <summary> The template for creating a unprivileged user roughly equivalent to a regular linux user. </summary> <desc> <p> The template for creating a unprivileged user roughly equivalent to a regular linux user. </p> <p> This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files. </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> </template> <template name="userdom_admin_user_template" lineno="1265"> <summary> The template for creating an administrative user. </summary> <desc> <p> This template creates a user domain, types, and rules for the user's tty, pty, home directories, tmp, and tmpfs files. </p> <p> The privileges given to administrative users are: <ul> <li>Raw disk access</li> <li>Set all sysctls</li> <li>All kernel ring buffer controls</li> <li>Create, read, write, and delete all files but shadow</li> <li>Manage source and binary format SELinux policy</li> <li>Run insmod</li> </ul> </p> </desc> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., sysadm is the prefix for sysadm_t). </summary> </param> </template> <template name="userdom_security_admin_template" lineno="1448"> <summary> Allow user to run as a secadm </summary> <desc> <p> Create objects in a user home directory with an automatic type transition to a specified private type. </p> <p> This is a templated interface, and should only be called from a per-userdomain template. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="role"> <summary> The role of the object to create. </summary> </param> </template> <interface name="userdom_user_application_domain" lineno="1535"> <summary> Make the specified type usable as a user application domain. </summary> <param name="type"> <summary> Type to be used as a user application domain. </summary> </param> <param name="type"> <summary> Type to be used as the domain entry point. </summary> </param> </interface> <interface name="userdom_user_home_content" lineno="1552"> <summary> Make the specified type usable in a user home directory. </summary> <param name="type"> <summary> Type to be used as a file in the user home directory. </summary> </param> </interface> <interface name="userdom_user_tmp_content" lineno="1578"> <summary> Make the specified type usable in a generic temporary directory. </summary> <param name="type"> <summary> Type to be used as a file in the generic temporary directory. </summary> </param> </interface> <interface name="userdom_user_tmpfs_content" lineno="1601"> <summary> Make the specified type usable in a generic tmpfs_t directory. </summary> <param name="type"> <summary> Type to be used as a file in the generic temporary directory. </summary> </param> </interface> <interface name="userdom_attach_admin_tun_iface" lineno="1622"> <summary> Allow domain to attach to TUN devices created by administrative users. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_setattr_user_ptys" lineno="1641"> <summary> Set the attributes of a user pty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_create_user_pty" lineno="1659"> <summary> Create a user pty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_getattr_user_home_dirs" lineno="1677"> <summary> Get the attributes of user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1696"> <summary> Do not audit attempts to get the attributes of user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_search_user_home_dirs" lineno="1714"> <summary> Search user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_search_user_home_dirs" lineno="1742"> <summary> Do not audit attempts to search user home directories. </summary> <desc> <p> Do not audit attempts to search user home directories. This will supress SELinux denial messages when the specified domain is denied the permission to search these directories. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="userdom_list_user_home_dirs" lineno="1760"> <summary> List user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_list_user_home_dirs" lineno="1787"> <summary> Do not audit attempts to list user home subdirectories. </summary> <param name="domain"> <summary> Domain to not audit </summary> </param> </interface> <interface name="userdom_create_user_home_dirs" lineno="1807"> <summary> Create user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_dirs" lineno="1825"> <summary> Create user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_relabelto_user_home_dirs" lineno="1843"> <summary> Relabel to user home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_relabelto_user_home_files" lineno="1862"> <summary> Relabel to user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_relabel_user_home_files" lineno="1879"> <summary> Relabel user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_home_filetrans_user_home_dir" lineno="1898"> <summary> Create directories in the home dir root with the user home directory type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_user_home_domtrans" lineno="1935"> <summary> Do a domain transition to the specified domain when executing a program in the user home directory. </summary> <desc> <p> Do a domain transition to the specified domain when executing a program in the user home directory. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> </desc> <param name="source_domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> Domain to transition to. </summary> </param> </interface> <interface name="userdom_dontaudit_search_user_home_content" lineno="1955"> <summary> Do not audit attempts to search user home content directories. </summary> <param name="domain"> <summary> Domain to not audit </summary> </param> </interface> <interface name="userdom_list_user_home_content" lineno="1975"> <summary> List contents of users home directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_content_dirs" lineno="1996"> <summary> Create, read, write, and delete directories in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_delete_user_home_content_dirs" lineno="2015"> <summary> Delete directories in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_setattr_user_home_content_files" lineno="2033"> <summary> Set the attributes of user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2052"> <summary> Do not audit attempts to set the attributes of user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_mmap_user_home_content_files" lineno="2070"> <summary> Mmap user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_read_user_home_content_files" lineno="2089"> <summary> Read user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_getattr_user_home_content" lineno="2109"> <summary> Do not audit attempts to getattr user home files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_read_user_home_content_files" lineno="2128"> <summary> Do not audit attempts to read user home files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_append_user_home_content_files" lineno="2150"> <summary> Do not audit attempts to append user home files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_write_user_home_content_files" lineno="2168"> <summary> Do not audit attempts to write user home files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_delete_user_home_content_files" lineno="2186"> <summary> Delete files in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2204"> <summary> Do not audit attempts to write user home files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_read_user_home_content_symlinks" lineno="2222"> <summary> Read user home subdirectory symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_exec_user_home_content_files" lineno="2240"> <summary> Execute user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2261"> <summary> Do not audit attempts to execute user home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_content_files" lineno="2280"> <summary> Create, read, write, and delete files in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2302"> <summary> Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_content_symlinks" lineno="2321"> <summary> Create, read, write, and delete symbolic links in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_delete_user_home_content_symlinks" lineno="2341"> <summary> Delete symbolic links in a user home directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_content_pipes" lineno="2360"> <summary> Create, read, write, and delete named pipes in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_content_sockets" lineno="2381"> <summary> Create, read, write, and delete named sockets in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_user_home_dir_filetrans" lineno="2413"> <summary> Create objects in a user home directory with an automatic type transition to a specified private type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private_type"> <summary> The type of the object to create. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_user_home_content_filetrans" lineno="2444"> <summary> Create objects in a user home directory with an automatic type transition to a specified private type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private_type"> <summary> The type of the object to create. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2471"> <summary> Create objects in a user home directory with an automatic type transition to the user home file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_write_user_tmp_sockets" lineno="2490"> <summary> Write to user temporary named sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_list_user_tmp" lineno="2509"> <summary> List user temporary directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_search_user_tmp" lineno="2529"> <summary> Do not audit attempts to search user temporary directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_list_user_tmp" lineno="2548"> <summary> Do not audit attempts to list user temporary directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2567"> <summary> Do not audit attempts to manage users temporary directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_read_user_tmp_files" lineno="2585"> <summary> Read user temporary files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_read_user_tmp_files" lineno="2606"> <summary> Do not audit attempts to read users temporary files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_append_user_tmp_files" lineno="2625"> <summary> Do not audit attempts to append users temporary files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_rw_user_tmp_files" lineno="2643"> <summary> Read and write user temporary files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_write_user_tmp_files" lineno="2664"> <summary> Do not audit attempts to write users temporary files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="2683"> <summary> Do not audit attempts to read/write users temporary fifo files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_use_user_ttys" lineno="2701"> <summary> Do not audit attempts to use user ttys. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2720"> <summary> Do not audit attempts to manage users temporary files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_read_user_tmp_symlinks" lineno="2738"> <summary> Read user temporary symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_dirs" lineno="2759"> <summary> Create, read, write, and delete user temporary directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_files" lineno="2779"> <summary> Create, read, write, and delete user temporary files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_symlinks" lineno="2799"> <summary> Create, read, write, and delete user temporary symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_pipes" lineno="2819"> <summary> Create, read, write, and delete user temporary named pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_sockets" lineno="2839"> <summary> Create, read, write, and delete user temporary named sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_user_tmp_filetrans" lineno="2870"> <summary> Create objects in a user temporary directory with an automatic type transition to a specified private type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private_type"> <summary> The type of the object to create. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_tmp_filetrans_user_tmp" lineno="2896"> <summary> Create objects in the temporary directory with an automatic type transition to the user temporary type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_read_user_tmpfs_files" lineno="2914"> <summary> Read user tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_rw_user_tmpfs_files" lineno="2935"> <summary> Read/Write user tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_rw_inherited_user_tmpfs_files" lineno="2956"> <summary> Read/Write inherited user tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_execute_user_tmpfs_files" lineno="2974"> <summary> Execute user tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_delete_user_tmpfs_files" lineno="2992"> <summary> Delete user tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_getattr_user_ttys" lineno="3010"> <summary> Get the attributes of a user domain tty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_getattr_user_ttys" lineno="3028"> <summary> Do not audit attempts to get the attributes of a user domain tty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_setattr_user_ttys" lineno="3046"> <summary> Set the attributes of a user domain tty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_setattr_user_ttys" lineno="3064"> <summary> Do not audit attempts to set the attributes of a user domain tty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_user_ttys" lineno="3082"> <summary> Read and write a user domain tty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_inherited_user_ttys" lineno="3100"> <summary> Read and write inherited user domain tty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_user_ptys" lineno="3118"> <summary> Read and write a user domain pty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_inherited_user_ptys" lineno="3136"> <summary> Read and write inherited user domain pty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_inherited_user_terminals" lineno="3155"> <summary> Read and write inherited user domain pty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_user_terminals" lineno="3190"> <summary> Read and write a user TTYs and PTYs. </summary> <desc> <p> Allow the specified domain to read and write user TTYs and PTYs. This will allow the domain to interact with the user via the terminal. Typically all interactive applications will require this access. </p> <p> However, this also allows the applications to spy on user sessions or inject information into the user session. Thus, this access should likely not be allowed for non-interactive domains. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="userdom_dontaudit_use_user_terminals" lineno="3211"> <summary> Do not audit attempts to read and write a user domain tty and pty. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_spec_domtrans_all_users" lineno="3232"> <summary> Execute a shell in all user domains. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_xsession_spec_domtrans_all_users" lineno="3255"> <summary> Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_spec_domtrans_unpriv_users" lineno="3278"> <summary> Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dyntransition_unpriv_users" lineno="3299"> <summary> Allow domain dyntrans to unpriv userdomain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dyntransition_admin_users" lineno="3317"> <summary> Allow domain dyntrans to admin userdomain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="3337"> <summary> Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_unpriv_user_semaphores" lineno="3358"> <summary> Manage unpriviledged user SysV sempaphores. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_unpriv_user_shared_mem" lineno="3377"> <summary> Manage unpriviledged user SysV shared memory segments. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_rw_unpriv_user_shared_mem" lineno="3396"> <summary> Read/Write unpriviledged user SysV shared memory segments. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="3416"> <summary> Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="3439"> <summary> Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_search_user_home_content" lineno="3460"> <summary> Search users home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_signal_unpriv_users" lineno="3481"> <summary> Send general signals to unprivileged user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_unpriv_users_fds" lineno="3499"> <summary> Inherit the file descriptors from unprivileged user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="3527"> <summary> Do not audit attempts to inherit the file descriptors from unprivileged user domains. </summary> <desc> <p> Do not audit attempts to inherit the file descriptors from unprivileged user domains. This will supress SELinux denial messages when the specified domain is denied the permission to inherit these file descriptors. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="userdom_dontaudit_use_user_ptys" lineno="3545"> <summary> Do not audit attempts to use user ptys. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_relabelto_user_ptys" lineno="3563"> <summary> Relabel files to unprivileged user pty types. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="3582"> <summary> Do not audit attempts to relabel files from user pty types. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_write_user_tmp_files" lineno="3600"> <summary> Write all users files in /tmp </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_read_all_users_state" lineno="3618"> <summary> Read the process state of all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_getattr_all_users" lineno="3638"> <summary> Get the attributes of all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_use_all_users_fds" lineno="3656"> <summary> Inherit the file descriptors from all user domains </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_use_all_users_fds" lineno="3675"> <summary> Do not audit attempts to inherit the file descriptors from any user domains. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_signal_all_users" lineno="3693"> <summary> Send general signals to all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_sigchld_all_users" lineno="3711"> <summary> Send a SIGCHLD signal to all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_create_all_users_keys" lineno="3729"> <summary> Create keys for all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dbus_send_all_users" lineno="3747"> <summary> Send a dbus message to all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_set_rlimitnh" lineno="3766"> <summary> Allow apps to set rlimits on userdomain </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <template name="userdom_unpriv_usertype" lineno="3790"> <summary> Define this type as a Allow apps to set rlimits on userdomain </summary> <param name="userdomain_prefix"> <summary> The prefix of the user domain (e.g., user is the prefix for user_t). </summary> </param> <param name="domain"> <summary> Domain allowed access. </summary> </param> </template> <interface name="userdom_stream_connect" lineno="3812"> <summary> Connect to users over an unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_stream_connectto" lineno="3831"> <summary> Dontaudit connectto to users over an unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_ptrace_all_users" lineno="3849"> <summary> Ptrace user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_search_admin_dir" lineno="3867"> <summary> dontaudit Search /root </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_list_admin_dir" lineno="3885"> <summary> dontaudit list /root </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_write_admin_dir" lineno="3903"> <summary> dontaudit write /root </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_list_admin_dir" lineno="3921"> <summary> Allow domain to list /root </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_search_admin_dir" lineno="3939"> <summary> Allow Search /root </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_rw_semaphores" lineno="3957"> <summary> RW unpriviledged user SysV sempaphores. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dgram_send" lineno="3976"> <summary> Send a message to unpriv users over a unix domain datagram socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_users_dgram_send" lineno="3995"> <summary> Send a message to users over a unix domain datagram socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_execmod_user_home_files" lineno="4014"> <summary> Allow execmod on files in homedirectory </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolebase/> </interface> <interface name="userdom_read_admin_home_files" lineno="4033"> <summary> Read admin home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="userdom_dontaudit_read_admin_home_files" lineno="4052"> <summary> Read admin home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="userdom_exec_admin_home_files" lineno="4072"> <summary> Execute admin home files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="userdom_inherit_append_admin_home_files" lineno="4091"> <summary> Append files inherited in the /root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_home_content" lineno="4111"> <summary> Manage all files/directories in the homedir </summary> <param name="userdomain"> <summary> The user domain </summary> </param> <rolebase/> </interface> <interface name="userdom_user_home_dir_filetrans_pattern" lineno="4145"> <summary> Create objects in a user home directory with an automatic type transition to the user home file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_admin_home_dir_filetrans" lineno="4175"> <summary> Create objects in the /root directory with an automatic type transition to a specified private type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private_type"> <summary> The type of the object to create. </summary> </param> <param name="object_class"> <summary> The class of the object to be created. </summary> </param> </interface> <interface name="userdom_signull_unpriv_users" lineno="4193"> <summary> Send signull to unprivileged user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_write_user_tmp_dirs" lineno="4211"> <summary> Write all users files in /tmp </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_all_users_keys" lineno="4229"> <summary> Manage keys for all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_rw_stream" lineno="4249"> <summary> Do not audit attempts to read and write unserdomain stream. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_append_user_home_content_files" lineno="4268"> <summary> Append files in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_read_inherited_user_home_content_files" lineno="4289"> <summary> Read files inherited in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_inherit_append_user_home_content_files" lineno="4308"> <summary> Append files inherited in a user home subdirectory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_inherit_append_user_tmp_files" lineno="4327"> <summary> Append files inherited in a user tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_read_home_certs" lineno="4346"> <summary> Read system SSL certificates in the users homedir. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="userdom_manage_home_certs" lineno="4368"> <summary> Manage system SSL certificates in the users homedir. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_write_home_certs" lineno="4389"> <summary> Dontaudit Write system SSL certificates in the users homedir. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_read_home_audio_files" lineno="4408"> <summary> Read audio files in the users homedir. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="userdom_dontaudit_write_all_user_home_content_files" lineno="4429"> <summary> Do not audit attempts to write all user home content files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_dontaudit_write_all_user_tmp_content_files" lineno="4447"> <summary> Do not audit attempts to write all user tmp content files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_manage_all_user_tmp_content" lineno="4465"> <summary> Manage all user temporary content. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_list_all_user_tmp_content" lineno="4488"> <summary> List all user temporary content. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_all_user_tmpfs_content" lineno="4512"> <summary> Manage all user tmpfs content. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_delete_all_user_tmp_content" lineno="4535"> <summary> Delete all user temporary content. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_getattr_admin_home_files" lineno="4560"> <summary> dontaudit Search getatrr /root files </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_read_admin_home_lnk_files" lineno="4578"> <summary> dontaudit read /root lnk files </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_chr_files" lineno="4597"> <summary> Create, read, write, and delete user temporary chr files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_manage_user_tmp_blk_files" lineno="4617"> <summary> Create, read, write, and delete user temporary blk files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaudit_setattr_user_tmp" lineno="4636"> <summary> Dontaudit attempt to set attributes on user temporary directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="userdom_read_inherited_user_tmp_files" lineno="4654"> <summary> Read all inherited users files in /tmp </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_dontaduit_search_user_tmp" lineno="4672"> <summary> Dontaudit search user temporary directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_write_inherited_user_tmp_files" lineno="4690"> <summary> Write all inherited users files in /tmp </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_delete_user_tmp_files" lineno="4708"> <summary> Delete all users files in /tmp </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_kill_all_users" lineno="4726"> <summary> Send kill signals to all user domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_rw_inherited_user_tmp_files" lineno="4744"> <summary> Read/write all inherited users files in /tmp </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="userdom_rw_stream" lineno="4762"> <summary> Read and write userdomain stream. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <tunable name="allow_user_mysql_connect" dftval="false"> <desc> <p> Allow users to connect to mysql </p> </desc> </tunable> <tunable name="allow_user_postgresql_connect" dftval="false"> <desc> <p> Allow users to connect to PostgreSQL </p> </desc> </tunable> <tunable name="user_direct_mouse" dftval="false"> <desc> <p> Allow regular users direct mouse access </p> </desc> </tunable> <tunable name="user_rw_noexattrfile" dftval="false"> <desc> <p> Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY) </p> </desc> </tunable> <tunable name="user_setrlimit" dftval="false"> <desc> <p> Allow user processes to change their priority </p> </desc> </tunable> <tunable name="user_ttyfile_stat" dftval="false"> <desc> <p> Allow w to display everyone </p> </desc> </tunable> </module> <module name="xen" filename="policy/modules/system/xen.if"> <summary>Xen hypervisor</summary> <interface name="xen_domtrans" lineno="13"> <summary> Execute a domain transition to run xend. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="xen_use_fds" lineno="31"> <summary> Inherit and use xen file descriptors. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="xen_dontaudit_use_fds" lineno="50"> <summary> Do not audit attempts to inherit xen file descriptors. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="xen_read_image_files" lineno="68"> <summary> Read xend image files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="xen_rw_image_files" lineno="90"> <summary> Allow the specified domain to read/write xend image files. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="xen_append_log" lineno="111"> <summary> Allow the specified domain to append xend log files. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="xen_manage_log" lineno="132"> <summary> Create, read, write, and delete the xend log files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="154"> <summary> Do not audit attempts to read and write Xen unix domain stream sockets. These are leaked file descriptors. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="xen_stream_connect_xenstore" lineno="172"> <summary> Connect to xenstored over an unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="xen_stream_connect" lineno="191"> <summary> Connect to xend over an unix domain stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="xen_domtrans_xm" lineno="213"> <summary> Execute a domain transition to run xm. </summary> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> </interface> <interface name="xen_stream_connect_xm" lineno="232"> <summary> Connect to xm over an unix stream socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <tunable name="xen_use_nfs" dftval="false"> <desc> <p> Allow xen to manage nfs files </p> </desc> </tunable> </module>y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`