?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for system functions from init to multi-user login. Policy for user executable applications. Make the specified type usable as an application domain. Type to be used as a domain type. Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. Type to be used for files. Execute application executables in the caller domain. Domain allowed access. Execute all executable files. Domain allowed access. Create a domain for applications.

Create a domain for applications. Typically these are programs that are run interactively.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

Type to be used as an application domain. Type of the program to be used as an entry point to this domain.
Send signull to all application domains. Domain allowed access. Send signal to all application domains. Domain allowed access. Dontaudit signull sent to all application domains. Domain to not audit. Dontaudit signal sent to all application domains. Domain to not audit. Dontaudit kill signal sent to all application domains. Domain to not audit.
Common policy for authentication and user login. Role access for password authentication. Role allowed access. Domain allowed access. Use PAM for authentication. Domain allowed access. Make the specified domain used for a login program. Domain type used for a login program domain. Use the login program as an entry point program. The type of process using the login program as entry point. Execute a login_program in the target domain. Domain allowed access. The type of the login_program process. Execute a login_program in the target domain, with a range transition. Domain allowed access. The type of the login_program process. Range of the login program. Search authentication cache Domain allowed access. Read authentication cache Domain allowed access. Read/Write authentication cache Domain allowed access. Manage authentication cache Domain allowed access. Automatic transition from cache_t to cache. Domain allowed access. Run unix_chkpwd to check a password. Domain allowed access. Run unix_chkpwd to check a password. Stripped down version to be called within boolean Domain allowed access. Execute chkpwd programs in the chkpwd domain. Domain allowed access. The role to allow the chkpwd domain. Execute a domain transition to run unix_update. Domain allowed to transition. Execute updpwd programs in the updpwd domain. Domain allowed access. The role to allow the updpwd domain. Get the attributes of the shadow passwords file. Domain allowed access. Do not audit attempts to get the attributes of the shadow passwords file. Domain to not audit. Read the shadow passwords file (/etc/shadow) Domain allowed access. Pass shadow assertion for reading.

Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals.

Domain allowed access.
Pass shadow assertion for reading.

Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals.

Domain allowed access.
Read the shadow password file.

Read the shadow password file. This should only be used in a conditional; it does not pass the reading shadow assertion.

Domain allowed access.
Do not audit attempts to read the shadow password file (/etc/shadow). The type of the domain to not audit. Read and write the shadow password file (/etc/shadow). Domain allowed access. Create, read, write, and delete the shadow password file. Domain allowed access. Create, read, write, and delete the shadow password file. Domain allowed access. Automatic transition from etc to shadow. Domain allowed access. Relabel to the shadow password file type. Domain allowed access. Relabel from and to the shadow password file type. Domain allowed access. Append to the login failure log. Domain allowed access. Read and write the login failure log. Domain allowed access. Manage the login failure log. Domain allowed access. Read the last logins log. Domain allowed access. Append only to the last logins log. Domain allowed access. Read and write to the last logins log. Domain allowed access. Execute pam programs in the pam domain. Domain allowed access. Send generic signals to pam processes. Domain allowed access. Execute pam programs in the PAM domain. Domain allowed access. The role to allow the PAM domain. Execute the pam program. Domain allowed access. Manage var auth files. Used by various other applications and pam applets etc. Domain allowed access. Read PAM PID files. Domain allowed access. Do not audit attemps to read PAM PID files. Domain to not audit. Delete pam PID files. Domain allowed access. Manage pam PID files. Domain allowed access. Execute pam_console with a domain transition. Domain allowed access. Search the contents of the pam_console data directory. Domain allowed access. List the contents of the pam_console data directory. Domain allowed access. Read pam_console data files. Domain allowed access. Create, read, write, and delete pam_console data files. Domain allowed access. Delete pam_console data. Domain allowed access. Read all directories on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read all symbolic links on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Relabel all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read and write all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Manage all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Execute utempter programs in the utempter domain. Domain allowed access. Execute utempter programs in the utempter domain. Domain allowed access. The role to allow the utempter domain. Do not audit attemps to execute utempter executable. Domain to not audit. Set the attributes of login record files. Domain allowed access. Read login records files (/var/log/wtmp). Domain allowed access. Do not audit attempts to read login records files (/var/log/wtmp). Domain allowed access. Do not audit attempts to write to login records files. Domain to not audit. Append to login records (wtmp). Domain allowed access. Write to login records (wtmp). Domain allowed access. Read and write login records. Domain allowed access. Create a login records in the log directory using a type transition. Domain allowed access. Create, read, write, and delete login records files. Domain allowed access. Use nsswitch to look up user, password, group, or host information.

Allow the specified domain to look up user, password, group, or host information using the name service. The most common use of this interface is for services that do host name resolution (usually DNS resolution).

Domain allowed access.
Unconfined access to the authlogin module.

Unconfined access to the authlogin module.

Currently, this only allows assertions for the shadow passwords file (/etc/shadow) to be passed. No access is granted yet.

Domain allowed access.
Send generic signals to chkpwd processes. Domain allowed access.

Allow users to login using a radius server

Allow users login programs to access /etc/shadow.

Allow users to login using a yubikey OTP server or challenge response mode

Policy for reading and setting the hardware clock. Execute hwclock in the clock domain. The type of the process performing this action. Execute hwclock in the clock domain, and allow the specified role the hwclock domain. The type of the process performing this action. The role to be allowed the clock domain. Execute hwclock in the caller domain. The type of the process performing this action. Do not audit attempts to write clock drift adjustments. Domain to not audit. Read and write clock drift adjustments. Domain allowed access. Collection of tools for managing UNIX services

Policy for DJB's daemontools

An ipc channel between the supervised domain and svc_start_t Domain allowed access to svc_start_t. Define a specified domain as a supervised service. Domain allowed access. The type associated with the process program. Execute in the svc_start_t domain. Domain allowed access. Execute svc_start in the svc_start domain, and allow the specified role the svc_start domain. Domain allowed access. The role to be allowed the svc_start domain. Execute in the svc_run_t domain. Domain allowed access. Execute in the svc_multilog_t domain. Domain allowed access. Allow a domain to read svc_svc_t files. Domain allowed access. Search svc_svc_t directory. Domain allowed access. Allow a domain to create svc_svc_t files. Domain allowed access. Send a SIGCHLD signal to svc_run domain. Domain allowed access.
Tools for filesystem management, such as mkfs and fsck. Execute fs tools in the fstools domain. The type of the process performing this action. Execute fs tools in the fstools domain, and allow the specified role the fs tools domain. The type of the process performing this action. The role to be allowed the fs tools domain. Execute fsadm in the caller domain. The type of the process performing this action. Send signal to fsadm process Domain allowed access. Read fstools unnamed pipes. Domain allowed access. Relabel a file to the type used by the filesystem tools programs. The type of the process performing this action. Create, read, write, and delete a file used by the filesystem tools programs. The type of the process performing this action. Getattr swapfile The type of the process performing this action. Policy for getty. Execute gettys in the getty domain. Domain allowed access. Inherit and use getty file descriptors. Domain allowed access. Allow process to read getty log file. Domain allowed access. Allow process to read getty config file. Domain allowed access. Allow process to edit getty config file. Domain allowed access. Policy for changing the system host name. Execute hostname in the hostname domain. Domain allowed access. Execute hostname in the hostname domain, and allow the specified role the hostname domain. Domain allowed access. The role to be allowed the hostname domain. Execute hostname in the caller domain. Domain allowed access. Policy for hotplug system, for supporting the connection and disconnection of devices at runtime. Execute hotplug with a domain transition. Domain allowed access. Execute hotplug in the caller domain. Domain allowed access. Inherit and use hotplug file descriptors. Domain allowed access. Do not audit attempts to inherit hotplug file descriptors. Domain to not audit. Do not audit attempts to search the hotplug configuration directories. Domain to not audit. Get the attributes of the hotplug configuration directory. Domain allowed access. Search the hotplug configuration directory. Domain allowed access. Read the configuration files for hotplug. The type of the process performing this action. Search the hotplug PIDs. Domain allowed access. System initialization programs (init and init scripts). Create a file type used for init scripts.

Create a file type used for init scripts. It can not be used in conjunction with init_script_domain(). These script files are typically stored in the /etc/init.d directory.

Typically this is used to constrain what services an admin can start/stop. For example, a policy writer may want to constrain a web administrator to only being able to restart the web server, not other services. This special type will help address that goal.

This also makes the type usable for files; thus an explicit call to files_type() is redundant.

Type to be used for a script file.
Create a domain used for init scripts.

Create a domain used for init scripts. Can not be used in conjunction with init_script_file().

Type to be used as an init script domain. Type of the script file used as an entry point to this domain.
Create a domain which can be started by init. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Create a domain which can be started by init, with a range transition. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Range for the domain. Create a domain for long running processes (daemons/services) which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. Short running processes should use the init_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the process must also run in a specific MLS/MCS level, the init_ranged_daemon_domain() should be used instead.

Type to be used as a daemon domain. Type of the program to be used as an entry point to this domain.
Create initrc domain. Type to be used as a initrc daemon domain. Create initrc domain. Type to be used as a initrc daemon domain. Executable type. Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range.

Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range. Short running processes should use the init_ranged_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_daemon_domain().

Type to be used as a daemon domain. Type of the program to be used as an entry point to this domain. MLS/MCS range for the domain.
Create a domain for short running processes which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_daemon_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the process must also run in a specific MLS/MCS level, the init_ranged_system_domain() should be used instead.

Type to be used as a system domain. Type of the program to be used as an entry point to this domain.
Create a domain for short running processes which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_ranged_system_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_system_domain().

Type to be used as a system domain. Type of the program to be used as an entry point to this domain. Range for the domain.
Execute init (/sbin/init) with a domain transition. Domain allowed access. Execute the init program in the caller domain. Domain allowed access. Get the process group of init. Domain allowed access. Send init a null signal. Domain allowed access. Send init a SIGCHLD signal. Domain allowed access. Inherit and use file descriptors from init.

Allow the specified domain to inherit file descriptors from the init program (process ID 1). Typically the only file descriptors to be inherited from init are for the console. This does not allow the domain any access to the object to which the file descriptors references.

Related interfaces:

  • init_dontaudit_use_fds()
  • term_dontaudit_use_console()
  • term_use_console()

Example usage:

init_use_fds(mydomain_t) term_use_console(mydomain_t)

Normally, processes that can inherit these file descriptors (usually services) write messages to the system log instead of writing to the console. Therefore, in many cases, this access should dontaudited instead.

Example dontaudit usage:

init_dontaudit_use_fds(mydomain_t) term_dontaudit_use_console(mydomain_t)

Domain allowed access.
Do not audit attempts to inherit file descriptors from init. Domain allowed access. Send UDP network traffic to init. (Deprecated) Domain allowed access. Get the attributes of initctl. Domain allowed access. Do not audit attempts to get the attributes of initctl. Domain to not audit. Write to initctl. Domain allowed access. Use telinit (Read and write initctl). Domain allowed access. Read and write initctl. Domain allowed access. Do not audit attempts to read and write initctl. Domain allowed access. Make init scripts an entry point for the specified domain. The domain for which init scripts are an entrypoint. Execute init scripts with a specified domain transition. Domain allowed access. Execute init scripts with an automatic domain transition. Domain allowed access. Execute a file in a bin directory in the initrc_t domain Domain allowed access. Execute a init script in a specified domain.

Execute a init script in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Transition to the init script domain on a specified labeled init script. Domain allowed access. Labeled init script file. Transition to the init script domain for all labeled init script types Domain allowed access Start and stop daemon programs directly.

Start and stop daemon programs directly in the traditional "/etc/init.d/daemon start" style, and do not require run_init.

Domain allowed access. The role to be performing this action.
Read the process state (/proc/pid) of init. Domain allowed access. Ptrace init Domain allowed access. Write an init script unnamed pipe. Domain allowed access. Get the attribute of init script entrypoint files. Domain allowed access. Read init scripts. Domain allowed access. Execute init scripts in the caller domain. Domain allowed access. Get the attribute of all init script entrypoint files. Domain allowed access. Read all init script files. Domain allowed access. Dontaudit read all init script files. Domain allowed access. Execute all init scripts in the caller domain. Domain allowed access. Read the process state (/proc/pid) of the init scripts. Domain allowed access. Inherit and use init script file descriptors. Domain allowed access. Do not audit attempts to inherit init script file descriptors. Domain allowed access. Get the process group ID of init scripts. Domain allowed access. Send SIGCHLD signals to init scripts. Domain allowed access. Connect to init with a unix socket. Domain allowed access. Send generic signals to init scripts. Domain allowed access. Send null signals to init scripts. Domain allowed access. Read and write init script unnamed pipes. Domain allowed access. Send UDP network traffic to init scripts. (Deprecated) Domain allowed access. Allow the specified domain to connect to init scripts with a unix socket. Domain allowed access. Allow the specified domain to read/write to init scripts with a unix domain stream sockets. Domain allowed access. Dont audit the specified domain connecting to init scripts with a unix domain stream socket. Domain allowed access. Send messages to init scripts over dbus. Domain allowed access. Send and receive messages from init over dbus. Domain allowed access. Send and receive messages from init scripts over dbus. Domain allowed access. Read and write the init script pty.

Read and write the init script pty. This pty is generally opened by the open_init_pty portion of the run_init program so that the daemon does not require direct access to the administrator terminal.

Domain allowed access.
Do not audit attempts to read and write the init script pty. Domain to not audit. Get the attributes of init script status files. Domain allowed access. Do not audit attempts to read init script status files. Domain allowed access. Read init script temporary data. Domain allowed access. Read and write init script temporary data. Domain allowed access. Read and write init script inherited temporary data. Domain allowed access. Create files in a init script temporary data directory. Domain allowed access. The type of the object to be created The object class. Get the attributes of init script process id files. Domain allowed access. Read utmp. Domain allowed access. Do not audit attempts to read utmp. Domain to not audit. Do not audit attempts to write utmp. Domain allowed access. Write to utmp. Domain allowed access. Do not audit attempts to lock init script pid files. Domain allowed access. Read and write utmp. Domain allowed access. Do not audit attempts to read and write utmp. Domain allowed access. Create, read, write, and delete utmp. Domain access allowed. Create files in /var/run with the utmp file type. Domain access allowed. Allow the specified domain to connect to daemon with a tcp socket Domain allowed access. Allow the specified domain to connect to daemon with a udp socket Domain allowed access. Transition to system_r when execute an init script

Execute a init script in a specified role

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Role to transition from.
dontaudit read and write an leaked init scrip file descriptors The type of the process performing this action. dontaudit read and write an leaked file descriptors Domain to not audit. Manage init script status files. Domain allowed access. Send generic signals to init. Domain allowed access.

Enable support for upstart as the init program.

Allow all daemons to use tcp wrappers.

Allow all daemons the ability to read/write terminals

Allow all daemons to write corefiles to /

Enable cluster mode for daemons.

TCP/IP encryption Execute ipsec in the ipsec domain. The type of the process performing this action. Execute ipsec in the ipsec_mgmt domain. The type of the process performing this action. Connect to IPSEC using a unix domain stream socket. The type of the process performing this action. Connect to racoon using a unix domain stream socket. The type of the process performing this action. Get the attributes of an IPSEC key socket. The type of the process performing this action. Execute the IPSEC management program in the caller domain. The type of the process performing this action. Read the IPSEC configuration The type of the process performing this action. Match the default SPD entry. Domain allowed access. Set the context of a SPD entry to the default context. Domain allowed access. write the ipsec_var_run_t files. Domain allowed access. Allow read the IPSEC pid files. Domain allowed access. Create, read, write, and delete the IPSEC pid files. The type of the process performing this action. Execute racoon in the racoon domain. The type of the process performing this action. Execute racoon and allow the specified role the domain. Domain allowed access. Role allowed access. Execute setkey in the setkey domain. The type of the process performing this action. Execute setkey and allow the specified role the domains. Domain allowed access. The role to be allowed the racoon and setkey domains. Send the kill signal to ipsec-mgmt Domain allowed access. Send a generic signal to ipsec-mgmt Domain allowed access. Send a generic signull to ipsec-mgmt. Domain allowed access. Send and receive messages from ipsec-mgmt over dbus. Domain allowed access. Create, read, write, and delete ipsec-mgmt lock files. The type of the process performing this action.

Allow racoon to read shadow

Policy for iptables. Execute iptables in the iptables domain. Domain allowed access. Execute iptables in the iptables domain, and allow the specified role the iptables domain. Domain allowed access. The role to be allowed the iptables domain. Execute iptables in the caller domain. Domain allowed access. Execute iptables in the iptables domain. The type of the process performing this action. Set the attributes of iptables config files. Domain allowed access. Read iptables config files. Domain allowed access. Create files in /etc with the type used for the iptables config files. The type of the process performing this action. Manage iptables config files. Domain allowed access. Establish connections to iSCSI devices Execute a domain transition to run iscsid. Domain allowed to transition. Connect to ISCSI using a unix domain stream socket. The type of the process performing this action. Read iscsi lib files. Domain allowed access. Manage iscsid sempaphores. Domain allowed access. Kernel crash dumping mechanism Execute kdump in the kdump domain. The type of the process performing this action. Execute kdump in the kdump domain. The type of the process performing this action. Read kdump configuration file. Domain allowed access. Manage kdump configuration file. Domain allowed access. All of the rules required to administrate an kdump environment Domain allowed access. The role to be allowed to manage the kdump domain. Policy for system libraries. Execute ldconfig in the ldconfig domain. Domain allowed access. Execute ldconfig in the caller domain. Domain allowed access. Execute ldconfig in the ldconfig domain. Domain allowed access. The role to allow the ldconfig domain. Use the dynamic link/loader for automatic loading of shared libraries. Domain allowed access. Use the dynamic link/loader for automatic loading of shared libraries with legacy support. Domain allowed access. Execute the dynamic link/loader in the caller's domain. Domain allowed access. Create, read, write, and delete the dynamic link/loader. Domain allowed access. Relabel to and from the type used for the dynamic link/loader. Domain allowed access. Modify the dynamic link/loader's cached listing of shared libraries. Domain allowed access. Search library directories. Domain allowed access. Do not audit attempts to write to library directories.

Do not audit attempts to write to library directories. Typically this is used to quiet attempts to recompile python byte code.

Domain allowed access.
Create, read, write, and delete library directories. Domain allowed access. Read files in the library directories, such as static libraries. Domain allowed access. Execute library scripts in the caller domain. Domain allowed access. Load and execute functions from generic lib files as shared libraries. Domain allowed access. Create, read, write, and delete generic files in library directories. Domain allowed access. Relabel files to the type used in library directories. Domain allowed access. Relabel to and from the type used for generic lib files. Domain allowed access. Relabel to and from the type used for generic lib files. Domain allowed access. Delete generic symlinks in library directories. Domain allowed access. Delete generic symlinks in library directories. Domain allowed access. Create, read, write, and delete shared libraries. Domain allowed access. Load and execute functions from shared libraries. Domain allowed access. Load and execute functions from shared libraries, with legacy support. Domain allowed access. Relabel to and from the type used for shared libraries. Domain allowed access. Create an object in lib directories, with the shared libraries type using a type transition. Domain allowed access. The object class of the object being created. Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated)

Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated)

lib_filetrans_shared_lib() should be used instead.

Domain allowed access. The object class of the object being created.
Policy for local logins. Execute local logins in the local login domain. The type of the process performing this action. Allow processes to inherit local login file descriptors. The type of the process performing this action. Do not audit attempts to inherit local login file descriptors. Domain to not audit. Send a null signal to local login processes. Domain allowed access. Search for key. Domain allowed access. Allow link to the local_login key ring. Domain allowed access. Execute local logins in the local login domain. Domain allowed access. Allow domain to gettatr local login home content Domain allowed access. Policy for the kernel message logger and system logging daemon. Make the specified type usable for log files in a filesystem.

Make the specified type usable for log files in a filesystem. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a log file type may result in problems with log rotation, log analysis, and log monitoring programs.

Related interfaces:

  • logging_log_filetrans()

Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log):

type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file)

Type to be used for files.
Send audit messages. Domain allowed access. dontaudit attempts to send audit messages. Domain allowed access. Set login uid Domain allowed access. Set tty auditing Domain allowed access. Set up audit Domain allowed access. Read the audit log. Domain allowed access. dontaudit search of auditd log files. Domain to not audit. Execute auditctl in the auditctl domain. Domain allowed access. Execute auditctl in the auditctl domain, and allow the specified role the auditctl domain. Domain allowed access. The role to be allowed the auditctl domain. Execute auditd in the auditd domain. Domain allowed access. Execute auditd in the auditd domain, and allow the specified role the auditd domain. Domain allowed access. The role to be allowed the auditd domain. Connect to auditdstored over an unix stream socket. Domain allowed access. Execute a domain transition to run the audit dispatcher. Domain allowed to transition. Signal the audit dispatcher. Domain allowed to transition. Create a domain for processes which can be started by the system audit dispatcher Type to be used as a domain. Type of the program to be used as an entry point to this domain. Connect to the audit dispatcher over an unix stream socket. Domain allowed access. Manage the auditd configuration files. Domain allowed access. Manage the audit log. Domain allowed access. Execute klogd in the klog domain. Domain allowed access. Check if syslogd is executable. Domain allowed access. Execute syslogd in the syslog domain. Domain allowed access. Create an object in the log directory, with a private type.

Allow the specified domain to create an object in the general system log directories (e.g., /var/log) with a private type. Typically this is used for creating private log files in /var/log with the private type instead of the general system log type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.

Related interfaces:

  • logging_log_file()

Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log):

type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file)

Domain allowed access. The type of the object to be created. The object class of the object being created.
Send system log messages.

Allow the specified domain to connect to the system log service (syslog), to send messages be added to the system logs. Typically this is used by services that do not have their own log file in /var/log.

This does not allow messages to be sent to the auditing system.

Programs which use the libc function syslog() will require this access.

Related interfaces:

  • logging_send_audit_msgs()
Domain allowed access.
Connect to the syslog control unix stream socket. Domain allowed access. Read the auditd configuration files. Domain allowed access. dontaudit search of auditd configuration files. Domain allowed access. Read syslog configuration files. Domain allowed access. Allows the domain to open a file in the log directory, but does not allow the listing of the contents of the log directory. Domain allowed access. Do not audit attempts to search the var log directory. Domain not to audit. List the contents of the generic log directory (/var/log). Domain allowed access. Read and write the generic log directory (/var/log). Domain allowed access. Do not audit attempts to get the atttributes of any log files. Domain allowed access. Append to all log files. Domain allowed access. Append to all log files. Domain allowed access. Read all log files. Domain allowed access. dontaudit Read all log files. Domain allowed access. dontaudit Read all log files. Domain allowed access. Execute all log files in the caller domain. Domain allowed access. read/write to all log files. Domain allowed access. Create, read, write, and delete all log files. Domain allowed access. Read generic log files. Domain allowed access. Write generic log files. Domain allowed access. Dontaudit read/Write inherited generic log files. Domain to not audit. Dontaudit Write generic log files. Domain allowed access. Read and write generic log files. Domain allowed access. Create, read, write, and delete generic log files. Domain allowed access. All of the rules required to administrate the audit environment Domain allowed access. User role allowed access. All of the rules required to administrate the syslog environment Domain allowed access. User role allowed access. All of the rules required to administrate the logging environment Domain allowed access. User role allowed access.

Allow syslogd daemon to send mail

Allow syslogd daemon to read user tmp content

Allow syslogd the ability to read/write terminals

Allow syslogd the ability to call nagios plugins. It is turned on by omprog rsyslog plugin.

Policy for logical volume management programs. Execute lvm programs in the lvm domain. The type of the process performing this action. Execute lvm programs in the caller domain. The type of the process performing this action. Execute lvm programs in the lvm domain. The type of the process performing this action. The role to allow the LVM domain. Read LVM configuration files. The type of the process performing this action. Manage LVM configuration files. Domain allowed access. Connect to lvm using a unix domain stream socket. Domain allowed access. Execute a domain transition to run clvmd. Domain allowed to transition. Read and write to clvmd temporary file system. Domain allowed access. Delete lvm temporary file system. Domain allowed access. Send a message to lvm over the datagram socket. Domain allowed access. Miscelaneous files. Make the specified type usable as a cert file.

Make the specified type usable for cert files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with cert management tools.

Related interfaces:

  • files_type()

Example:

type mycertfile_t; cert_type(mycertfile_t) allow mydomain_t mycertfile_t:file read_file_perms; files_search_etc(mydomain_t)

Type to be used for files.
Read system SSL certificates. Domain allowed access. Dontaudit read/writei certificates. Domain allowed access. manange system SSL certificates. Domain allowed access. manange system SSL certificates. Domain allowed access. Read fonts. Domain allowed access. Set the attributes on a fonts directory. Domain allowed access. Do not audit attempts to set the attributes on a fonts directory. Domain allowed access. Do not audit attempts to write fonts. Domain allowed access. Create, read, write, and delete fonts. Domain allowed access. Set the attributes on a fonts cache directory. Domain allowed access. Do not audit attempts to set the attributes on a fonts cache directory. Domain allowed access. Create, read, write, and delete fonts cache. Domain allowed access. Read hardware identification data. Domain allowed access. Allow process to setattr localization info Domain allowed access. Allow process to read localization information.

Allow the specified domain to read the localization files. This is typically for time zone configuration files, such as /etc/localtime and files in /usr/share/zoneinfo. Typically, any domain which needs to know the GMT/UTC offset of the current timezone will need access to these files. Generally, it should be safe for any domain to read these files.

Domain allowed access.
Allow process to write localization info Domain allowed access. Allow process to relabel localization info Domain allowed access. Allow process to read legacy time localization info Domain allowed access. Search man pages. Domain to not audit. Do not audit attempts to search man pages. Domain to not audit. Read man pages Domain allowed access. Delete man pages Domain allowed access. Create, read, write, and delete man pages Domain allowed access. Read public files used for file transfer services. Domain allowed access. Create, read, write, and delete public files and directories used for file transfer services. Domain allowed access. Read TeX data Domain allowed access. Execute TeX data programs in the caller domain. Domain allowed access. Let test files be an entry point for a specified domain. Domain to be entered. Read test files and directories. Domain allowed access. Execute test files. Domain allowed access. Execute test files. Domain allowed access. Create, read, write, and delete localization Domain allowed access. Dontaudit attempts to write generic SSL certificates. Domain allowed access. Do not audit attempts to access check cert dirs/files. Domain to not audit.
Policy for kernel module utilities Getattr the dependencies of kernel modules. Domain allowed access. Read the dependencies of kernel modules. Domain allowed access. list the configuration options used when loading modules. Domain allowed access. Read the configuration options used when loading modules. Domain allowed access. Rename a file with the configuration options used when loading modules. Domain allowed access. Unlink a file with the configuration options used when loading modules. Domain allowed access. Manage files with the configuration options used when loading modules. Domain allowed access. Unconditionally execute insmod in the insmod domain. Domain allowed access. Execute insmod in the insmod domain. Domain allowed access. Execute insmod in the insmod domain, and allow the specified role the insmod domain, and use the caller's terminal. Has a sigchld backchannel. Domain allowed access. The role to be allowed the insmod domain. Execute insmod in the caller domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed access. The role to be allowed the depmod domain. Execute depmod in the caller domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed access. Execute update_modules in the update_modules domain. Domain allowed access. The role to be allowed the update_modules domain. Execute update_modules in the caller domain. Domain allowed access. Policy for mount. Execute mount in the mount domain. The type of the process performing this action. Execute mount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the mount domain. Execute fusermount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the mount domain. Execute mount in the caller domain. The type of the process performing this action. Send a generic signal to mount. Domain allowed access. Manage mount PID files. Domain allowed access. Use file descriptors for mount. The type of the process performing this action. Allow the mount domain to send nfs requests for mounting network drives

Allow the mount domain to send nfs requests for mounting network drives

This interface has been deprecated as these rules were a side effect of leaked mount file descriptors. This interface has no effect.

Domain allowed access.
Execute mount in the unconfined mount domain. Domain allowed access. Execute mount in the unconfined mount domain, and allow the specified role the unconfined mount domain, and use the caller's terminal. Domain allowed access. The role to be allowed the unconfined mount domain. Execute fusermount in the mount domain. The type of the process performing this action. Execute fusermount. The type of the process performing this action. dontaudit Execute fusermount. The type of the process performing this action. Execute a domain transition to run showmount. Domain allowed to transition. Execute showmount in the showmount domain, and allow the specified role the showmount domain. Domain allowed access The role to be allowed the showmount domain.

Allow the mount command to mount any directory or file.

NetLabel/CIPSO labeled networking management Execute netlabel_mgmt in the netlabel_mgmt domain. Domain allowed access. Execute netlabel_mgmt in the netlabel_mgmt domain, and allow the specified role the netlabel_mgmt domain. Domain allowed access. The role to be allowed the netlabel_mgmt domain. PCMCIA card management services PCMCIA stub interface. No access allowed. Domain allowed access. Execute cardmgr in the cardmgr domain. The type of the process performing this action. Inherit and use file descriptors from cardmgr. Domain allowed access. Execute cardctl in the cardmgr domain. The type of the process performing this action. Execute cardmgr in the cardctl domain, and allow the specified role the cardmgr domain. The type of the process performing this action. The role to be allowed the cardmgr domain. Read cardmgr pid files. Domain allowed access. Create, read, write, and delete cardmgr pid files. Domain allowed access. Create, read, write, and delete cardmgr runtime character nodes. Domain allowed access. RAID array management tools Execute software raid tools in the mdadm domain. The type of the process performing this action. Create, read, write, and delete the mdadm pid files.

Create, read, write, and delete the mdadm pid files.

Added for use in the init module.

The type of the process performing this action.
Read mdadm map file. The type of the process performing this action.
Policy for SELinux policy and userland applications. Execute checkpolicy in the checkpolicy domain. Domain allowed access. Execute checkpolicy in the checkpolicy domain, and allow the specified role the checkpolicy domain, and use the caller's terminal. Domain allowed access. The role to be allowed the checkpolicy domain. Execute checkpolicy in the caller domain. Domain allowed access. Execute load_policy in the load_policy domain. Domain allowed access. Execute load_policy in the load_policy domain, and allow the specified role the load_policy domain, and use the caller's terminal. Domain allowed access. The role to be allowed the load_policy domain. Execute load_policy in the caller domain. Domain allowed access. Read the load_policy program file. Domain allowed access. Execute newrole in the newole domain. Domain allowed access. Execute newrole in the newrole domain, and allow the specified role the newrole domain, and use the caller's terminal. Domain allowed access. The role to be allowed the newrole domain. Execute newrole in the caller domain. Domain allowed access. Do not audit the caller attempts to send a signal to newrole. Domain allowed access. Send a SIGCHLD signal to newrole.

Allow the specified domain to send a SIGCHLD signal to newrole. This signal is automatically sent from a process that is terminating to its parent. This may be needed by domains that are executed from newrole.

Domain allowed access.
Inherit and use newrole file descriptors. Domain allowed access. Do not audit attempts to inherit and use newrole file descriptors. Domain to not audit. Execute restorecon in the restorecon domain. (Deprecated) Domain allowed access. Execute restorecon in the restorecon domain, and allow the specified role the restorecon domain, and use the caller's terminal. (Deprecated) Domain allowed access. The role to be allowed the restorecon domain. Execute restorecon in the caller domain. (Deprecated) Domain allowed access. Execute restorecond in the caller domain. Domain allowed access. Execute run_init in the run_init domain. Domain allowed access. Execute init scripts in the run_init domain.

Execute init scripts in the run_init domain. This is used for the Gentoo integrated run_init.

Domain allowed access.
Execute run_init in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. Domain allowed access. The role to be allowed the run_init domain. Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal.

Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal.

This is used for the Gentoo integrated run_init.

Domain allowed access. The role to be allowed the run_init domain.
Inherit and use run_init file descriptors. Domain allowed access. Execute setfiles in the setfiles domain. Domain allowed access. Execute setfiles in the setfiles domain, and allow the specified role the setfiles domain, and use the caller's terminal. Domain allowed access. The role to be allowed the setfiles domain. Execute setfiles in the setfiles domain. Domain allowed access. Execute setfiles in the setfiles_mac domain, and allow the specified role the setfiles_mac domain, and use the caller's terminal. Domain allowed access. The role to be allowed the setfiles_mac domain. Execute setfiles in the caller domain. Domain allowed access. Do not audit attempts to search the SELinux configuration directory (/etc/selinux). Domain to not audit. Do not audit attempts to read the SELinux userland configuration (/etc/selinux). Domain to not audit. Read the general SELinux configuration files. Domain allowed access. Read and write the general SELinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. (Deprecated)

Create, read, write, and delete the general selinux configuration files.

This interface has been deprecated, please use the seutil_manage_config() interface instead.

Domain allowed access.
Create, read, write, and delete the general selinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. Do not audit attempts to search the SELinux login configuration directory. Domain to not audit. Do not audit attempts to read the SELinux login configuration. Domain to not audit. Read the SELinux login configuration files. Domain allowed access. Read and write the SELinux login configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. manage the login selinux configuration files. Domain allowed access. Search the policy directory with default_context files. Domain allowed access. Read the default_contexts files. Domain allowed access. Create, read, write, and delete the default_contexts files. Domain allowed access. Read the file_contexts files. Domain allowed access. Do not audit attempts to read the file_contexts files. Domain allowed access. Read and write the file_contexts files. Domain allowed access. Create, read, write, and delete the file_contexts files. Domain allowed access. Read the SELinux binary policy. Domain allowed access. Create the SELinux binary policy. Domain allowed access. Allow the caller to relabel a file to the binary policy type. Domain allowed access. Create, read, write, and delete the SELinux binary policy. Domain allowed access. Read SELinux policy source files. Domain allowed access. Create, read, write, and delete SELinux policy source files. Domain allowed access. Execute a domain transition to run semanage. Domain allowed to transition. Execute a domain transition to run setsebool. Domain allowed to transition. Execute semanage in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. Domain allowed access. The role to be allowed the semanage domain. Execute setsebool in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. Domain allowed access. The role to be allowed the setsebool domain. Full management of the semanage module store. Domain allowed access. Full management of the semanage module store. Domain allowed access. Get read lock on module store Domain allowed access. Get trans lock on module store Domain allowed access. SELinux-enabled program access for libselinux-linked programs.

SELinux-enabled programs are typically linked to the libselinux library. This interface will allow access required for the libselinux constructor to function.

Domain allowed access.
Do not audit SELinux-enabled program access for libselinux-linked programs.

SELinux-enabled programs are typically linked to the libselinux library. This interface will dontaudit access required for the libselinux constructor to function.

Generally this should not be used on anything but simple SELinux-enabled programs that do not rely on data initialized by the libselinux constructor.

Domain allowed access.
All rules necessary to run semanage command Domain allowed access. All rules necessary to run setfiles command Domain allowed access.
SELinux MLS/MCS label translation service. Execute setrans server in the setrans domain. The type of the process performing this action. Allow a domain to translate contexts. Domain allowed access. policy for sosreport Execute a domain transition to run sosreport. Domain allowed to transition. Execute sosreport in the sosreport domain, and allow the specified role the sosreport domain. Domain allowed access The role to be allowed the sosreport domain. Role access for sosreport Role allowed access User domain for the role Allow the specified domain to read sosreport tmp files. Domain allowed access. Delete sosreport tmp files. Domain allowed access. Append sosreport tmp files. Domain allowed access. Policy for network configuration: ifconfig and dhcp client. Execute dhcp client in dhcpc domain. The type of the process performing this action. Execute DHCP clients in the dhcpc domain, and allow the specified role the dhcpc domain. The type of the process performing this action. The role to be allowed the clock domain. Send a SIGCHLD signal to the dhcp client. The domain sending the SIGCHLD. Send a kill signal to the dhcp client. The domain sending the SIGKILL. Send a SIGSTOP signal to the dhcp client. The domain sending the SIGSTOP. Send a null signal to the dhcp client. The domain sending the null signal. Send a generic signal to the dhcp client. The domain sending the signal. Send and receive messages from dhcpc over dbus. Domain allowed access. Read and write dhcp configuration files. The domain allowed access. Read dhcp client state files. The domain allowed access. Delete the dhcp client state files. Domain allowed access. Allow caller to relabel dhcpc_state files Domain allowed access. Manage the dhcp client state files. Domain allowed access. Set the attributes of network config files. Domain allowed access. Allow caller to relabel net_conf files Domain allowed access. Allow caller to relabel net_conf files Domain allowed access. Read network config files.

Allow the specified domain to read the general network configuration files. A common example of this is the /etc/resolv.conf file, which has domain name system (DNS) server IP addresses. Typically, most networking processes will require the access provided by this interface.

Higher-level interfaces which involve networking will generally call this interface, for example:

  • sysnet_dns_name_resolve()
  • sysnet_use_ldap()
  • sysnet_use_portmap()
Domain allowed access.
Do not audit attempts to read network config files. Domain to not audit. Write network config files. Domain allowed access. Create network config files. Domain allowed access. Create files in /etc with the type used for the network config files. The type of the process performing this action. Create, read, write, and delete network config files. The type of the process performing this action. Read the dhcp client pid file. The type of the process performing this action. Delete the dhcp client pid file. The type of the process performing this action. Manage the dhcp client pid file. The type of the process performing this action. Execute ifconfig in the ifconfig domain. The type of the process performing this action. Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the ifconfig domain. Execute ifconfig in the caller domain. Domain allowed access. Send a generic signal to ifconfig. Domain allowed access. Read the DHCP configuration files. Domain allowed access. Search the DHCP state data directory. Domain allowed access. Create DHCP state data.

Create DHCP state data.

This is added for DHCP server, as the server and client put their state files in the same directory.

Domain allowed access. The type of the object to be created The object class.
Perform a DNS name resolution. Domain allowed access. Connect and use a LDAP server. Domain allowed access. Connect and use remote port mappers. Domain allowed access. Do not audit attempts to use the dhcp file descriptors. The domain sending the SIGCHLD. Transition to system_r when execute an dhclient script

Execute dhclient script in a specified role

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Role to transition from.

Allow dhcpc client applications to execute iptables commands

Policy for udev. Execute udev in the udev domain, and allow the specified role the udev domain. Domain allowed access. The role to be allowed the iptables domain. Send generic signals to udev. Domain allowed access. Execute udev in the udev domain. The type of the process performing this action. Execute udev in the caller domain. Domain allowed access. Execute a udev helper in the udev domain. The type of the process performing this action. Allow process to read udev process state. Domain allowed access. Do not audit attempts to inherit a udev file descriptor. Domain to not audit. Do not audit attempts to read or write to a udev unix datagram socket. Domain to not audit. Do not audit search of udev database directories. Domain to not audit. Read the udev device table.

Allow the specified domain to read the udev device table.

Domain allowed access.
Allow process to modify list of devices. The type of the process performing this action. Allow process to delete list of devices. The type of the process performing this action. Create, read, write, and delete udev pid files. Domain allowed access. Create, read, write, and delete udev pid files. Domain allowed access. Create a domain for processes which can be started by udev. Type to be used as a domain. Type of the program to be used as an entry point to this domain.
The unconfined domain. Make the specified domain unconfined. Domain to make unconfined. Make the specified domain unconfined and audit executable heap usage.

Make the specified domain unconfined and audit executable heap usage. With exception of memory protections, usage of this interface will result in the level of access the domain has is like SELinux was not being used.

Only completely trusted domains should use this interface.

Domain to make unconfined.
Add an alias type to the unconfined domain. (Deprecated)

Add an alias type to the unconfined domain. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

New alias of the unconfined domain.
Add an alias type to the unconfined execmem program file type. (Deprecated)

Add an alias type to the unconfined execmem program file type. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

New alias of the unconfined execmem program type.
Policy for user domains Allow a home directory for which the role has read-only access.

Allow a home directory for which the role has read-only access.

This does not allow execute access.

The user role The user domain
Allow a home directory for which the role has full access.

Allow a home directory for which the role has full access.

This does not allow execute access.

The user role The user domain
Manage user temporary files Role allowed access. Domain allowed access. Execute user bin files. Domain allowed access. The execute access user temporary files. Domain allowed access. Role access for the user tmpfs type that the user has full access.

Role access for the user tmpfs type that the user has full access.

This does not allow execute access.

Role allowed access. Domain allowed access.
The interface allowing the user basic network permissions The user domain Make the specified type usable as a user application domain. Type to be used as a user application domain. Type to be used as the domain entry point. Make the specified type usable in a user home directory. Type to be used as a file in the user home directory. Make the specified type usable in a generic temporary directory. Type to be used as a file in the generic temporary directory. Make the specified type usable in a generic tmpfs_t directory. Type to be used as a file in the generic temporary directory. Allow domain to attach to TUN devices created by administrative users. Domain allowed access. Set the attributes of a user pty. Domain allowed access. Create a user pty. Domain allowed access. Get the attributes of user home directories. Domain allowed access. Do not audit attempts to get the attributes of user home directories. Domain allowed access. Search user home directories. Domain allowed access. Do not audit attempts to search user home directories.

Do not audit attempts to search user home directories. This will supress SELinux denial messages when the specified domain is denied the permission to search these directories.

Domain to not audit.
List user home directories. Domain allowed access. Do not audit attempts to list user home subdirectories. Domain to not audit Create user home directories. Domain allowed access. Create user home directories. Domain allowed access. Relabel to user home directories. Domain allowed access. Relabel to user home files. Domain allowed access. Relabel user home files. Domain allowed access. Create directories in the home dir root with the user home directory type. Domain allowed access. Do a domain transition to the specified domain when executing a program in the user home directory.

Do a domain transition to the specified domain when executing a program in the user home directory.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. Domain to transition to.
Do not audit attempts to search user home content directories. Domain to not audit List contents of users home directory. Domain allowed access. Create, read, write, and delete directories in a user home subdirectory. Domain allowed access. Delete directories in a user home subdirectory. Domain allowed access. Set the attributes of user home files. Domain allowed access. Do not audit attempts to set the attributes of user home files. Domain allowed access. Mmap user home files. Domain allowed access. Read user home files. Domain allowed access. Do not audit attempts to getattr user home files. Domain to not audit. Do not audit attempts to read user home files. Domain to not audit. Do not audit attempts to append user home files. Domain to not audit. Do not audit attempts to write user home files. Domain to not audit. Delete files in a user home subdirectory. Domain allowed access. Do not audit attempts to write user home files. Domain to not audit. Read user home subdirectory symbolic links. Domain allowed access. Execute user home files. Domain allowed access. Do not audit attempts to execute user home files. Domain allowed access. Create, read, write, and delete files in a user home subdirectory. Domain allowed access. Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. Domain allowed access. Create, read, write, and delete symbolic links in a user home subdirectory. Domain allowed access. Delete symbolic links in a user home directory. Domain allowed access. Create, read, write, and delete named pipes in a user home subdirectory. Domain allowed access. Create, read, write, and delete named sockets in a user home subdirectory. Domain allowed access. Create objects in a user home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Create objects in a user home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Create objects in a user home directory with an automatic type transition to the user home file type. Domain allowed access. The class of the object to be created. Write to user temporary named sockets. Domain allowed access. List user temporary directories. Domain allowed access. Do not audit attempts to search user temporary directories. Domain to not audit. Do not audit attempts to list user temporary directories. Domain to not audit. Do not audit attempts to manage users temporary directories. Domain to not audit. Read user temporary files. Domain allowed access. Do not audit attempts to read users temporary files. Domain to not audit. Do not audit attempts to append users temporary files. Domain to not audit. Read and write user temporary files. Domain allowed access. Do not audit attempts to write users temporary files. Domain to not audit. Do not audit attempts to read/write users temporary fifo files. Domain to not audit. Do not audit attempts to use user ttys. Domain to not audit. Do not audit attempts to manage users temporary files. Domain to not audit. Read user temporary symbolic links. Domain allowed access. Create, read, write, and delete user temporary directories. Domain allowed access. Create, read, write, and delete user temporary files. Domain allowed access. Create, read, write, and delete user temporary symbolic links. Domain allowed access. Create, read, write, and delete user temporary named pipes. Domain allowed access. Create, read, write, and delete user temporary named sockets. Domain allowed access. Create objects in a user temporary directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Create objects in the temporary directory with an automatic type transition to the user temporary type. Domain allowed access. The class of the object to be created. Read user tmpfs files. Domain allowed access. Read/Write user tmpfs files. Domain allowed access. Read/Write inherited user tmpfs files. Domain allowed access. Execute user tmpfs files. Domain allowed access. Delete user tmpfs files. Domain allowed access. Get the attributes of a user domain tty. Domain allowed access. Do not audit attempts to get the attributes of a user domain tty. Domain allowed access. Set the attributes of a user domain tty. Domain allowed access. Do not audit attempts to set the attributes of a user domain tty. Domain allowed access. Read and write a user domain tty. Domain allowed access. Read and write inherited user domain tty. Domain allowed access. Read and write a user domain pty. Domain allowed access. Read and write inherited user domain pty. Domain allowed access. Read and write inherited user domain pty. Domain allowed access. Read and write a user TTYs and PTYs.

Allow the specified domain to read and write user TTYs and PTYs. This will allow the domain to interact with the user via the terminal. Typically all interactive applications will require this access.

However, this also allows the applications to spy on user sessions or inject information into the user session. Thus, this access should likely not be allowed for non-interactive domains.

Domain allowed access.
Do not audit attempts to read and write a user domain tty and pty. Domain allowed access. Execute a shell in all user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Allow domain dyntrans to unpriv userdomain. Domain allowed access. Allow domain dyntrans to admin userdomain. Domain allowed access. Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Manage unpriviledged user SysV sempaphores. Domain allowed access. Manage unpriviledged user SysV shared memory segments. Domain allowed access. Read/Write unpriviledged user SysV shared memory segments. Domain allowed access. Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Search users home directories. Domain allowed access. Send general signals to unprivileged user domains. Domain allowed access. Inherit the file descriptors from unprivileged user domains. Domain allowed access. Do not audit attempts to inherit the file descriptors from unprivileged user domains.

Do not audit attempts to inherit the file descriptors from unprivileged user domains. This will supress SELinux denial messages when the specified domain is denied the permission to inherit these file descriptors.

Domain to not audit.
Do not audit attempts to use user ptys. Domain to not audit. Relabel files to unprivileged user pty types. Domain allowed access. Do not audit attempts to relabel files from user pty types. Domain allowed access. Write all users files in /tmp Domain allowed access. Read the process state of all user domains. Domain allowed access. Get the attributes of all user domains. Domain allowed access. Inherit the file descriptors from all user domains Domain allowed access. Do not audit attempts to inherit the file descriptors from any user domains. Domain to not audit. Send general signals to all user domains. Domain allowed access. Send a SIGCHLD signal to all user domains. Domain allowed access. Create keys for all user domains. Domain allowed access. Send a dbus message to all user domains. Domain allowed access. Allow apps to set rlimits on userdomain Domain allowed access. Connect to users over an unix stream socket. Domain allowed access. Dontaudit connectto to users over an unix stream socket. Domain allowed access. Ptrace user domains. Domain allowed access. dontaudit Search /root Domain allowed access. dontaudit list /root Domain allowed access. dontaudit write /root Domain allowed access. Allow domain to list /root Domain allowed access. Allow Search /root Domain allowed access. RW unpriviledged user SysV sempaphores. Domain allowed access. Send a message to unpriv users over a unix domain datagram socket. Domain allowed access. Send a message to users over a unix domain datagram socket. Domain allowed access. Allow execmod on files in homedirectory Domain allowed access. Read admin home files. Domain allowed access. Read admin home files. Domain allowed access. Execute admin home files. Domain allowed access. Append files inherited in the /root directory. Domain allowed access. Manage all files/directories in the homedir The user domain Create objects in a user home directory with an automatic type transition to the user home file type. Domain allowed access. The class of the object to be created. Create objects in the /root directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Send signull to unprivileged user domains. Domain allowed access. Write all users files in /tmp Domain allowed access. Manage keys for all user domains. Domain allowed access. Do not audit attempts to read and write unserdomain stream. Domain to not audit. Append files in a user home subdirectory. Domain allowed access. Read files inherited in a user home subdirectory. Domain allowed access. Append files inherited in a user home subdirectory. Domain allowed access. Append files inherited in a user tmp files. Domain allowed access. Read system SSL certificates in the users homedir. Domain allowed access. Manage system SSL certificates in the users homedir. Domain allowed access. Dontaudit Write system SSL certificates in the users homedir. Domain to not audit. Read audio files in the users homedir. Domain allowed access. Do not audit attempts to write all user home content files. Domain to not audit. Do not audit attempts to write all user tmp content files. Domain to not audit. Manage all user temporary content. Domain allowed access. List all user temporary content. Domain allowed access. Manage all user tmpfs content. Domain allowed access. Delete all user temporary content. Domain allowed access. dontaudit Search getatrr /root files Domain allowed access. dontaudit read /root lnk files Domain allowed access. Create, read, write, and delete user temporary chr files. Domain allowed access. Create, read, write, and delete user temporary blk files. Domain allowed access. Dontaudit attempt to set attributes on user temporary directories. Domain to not audit. Read all inherited users files in /tmp Domain allowed access. Dontaudit search user temporary directories. Domain allowed access. Write all inherited users files in /tmp Domain allowed access. Delete all users files in /tmp Domain allowed access. Send kill signals to all user domains. Domain allowed access. Read/write all inherited users files in /tmp Domain allowed access. Read and write userdomain stream. Domain allowed access.

Allow users to connect to mysql

Allow users to connect to PostgreSQL

Allow regular users direct mouse access

Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)

Allow user processes to change their priority

Allow w to display everyone

Xen hypervisor Execute a domain transition to run xend. Domain allowed to transition. Inherit and use xen file descriptors. Domain to not audit. Do not audit attempts to inherit xen file descriptors. Domain to not audit. Read xend image files. Domain allowed access. Allow the specified domain to read/write xend image files. Domain allowed to transition. Allow the specified domain to append xend log files. Domain allowed to transition. Create, read, write, and delete the xend log files. Domain allowed access. Do not audit attempts to read and write Xen unix domain stream sockets. These are leaked file descriptors. Domain to not audit. Connect to xenstored over an unix stream socket. Domain allowed access. Connect to xend over an unix domain stream socket. Domain allowed access. Execute a domain transition to run xm. Domain allowed to transition. Connect to xm over an unix stream socket. Domain allowed access.

Allow xen to manage nfs files