?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for system functions from init to multi-user login.
Policy for user executable applications.
Make the specified type usable as an application domain.
Type to be used as a domain type.
Make the specified type usable for files
that are exectuables, such as binary programs.
This does not include shared libraries.
Type to be used for files.
Execute application executables in the caller domain.
Domain allowed access.
Execute all executable files.
Domain allowed access.
Create a domain for applications.
Create a domain for applications. Typically these are
programs that are run interactively.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
Type to be used as an application domain.
Type of the program to be used as an entry point to this domain.
Send signull to all application domains.
Domain allowed access.
Send signal to all application domains.
Domain allowed access.
Dontaudit signull sent to all application domains.
Domain to not audit.
Dontaudit signal sent to all application domains.
Domain to not audit.
Dontaudit kill signal sent to all application domains.
Domain to not audit.
Common policy for authentication and user login.
Role access for password authentication.
Role allowed access.
Domain allowed access.
Use PAM for authentication.
Domain allowed access.
Make the specified domain used for a login program.
Domain type used for a login program domain.
Use the login program as an entry point program.
The type of process using the login program as entry point.
Execute a login_program in the target domain.
Domain allowed access.
The type of the login_program process.
Execute a login_program in the target domain,
with a range transition.
Domain allowed access.
The type of the login_program process.
Range of the login program.
Search authentication cache
Domain allowed access.
Read authentication cache
Domain allowed access.
Read/Write authentication cache
Domain allowed access.
Manage authentication cache
Domain allowed access.
Automatic transition from cache_t to cache.
Domain allowed access.
Run unix_chkpwd to check a password.
Domain allowed access.
Run unix_chkpwd to check a password.
Stripped down version to be called within boolean
Domain allowed access.
Execute chkpwd programs in the chkpwd domain.
Domain allowed access.
The role to allow the chkpwd domain.
Execute a domain transition to run unix_update.
Domain allowed to transition.
Execute updpwd programs in the updpwd domain.
Domain allowed access.
The role to allow the updpwd domain.
Get the attributes of the shadow passwords file.
Domain allowed access.
Do not audit attempts to get the attributes
of the shadow passwords file.
Domain to not audit.
Read the shadow passwords file (/etc/shadow)
Domain allowed access.
Pass shadow assertion for reading.
Pass shadow assertion for reading.
This should only be used with
auth_tunable_read_shadow(), and
only exists because typeattribute
does not work in conditionals.
Domain allowed access.
Pass shadow assertion for reading.
Pass shadow assertion for reading.
This should only be used with
auth_tunable_read_shadow(), and
only exists because typeattribute
does not work in conditionals.
Domain allowed access.
Read the shadow password file.
Read the shadow password file. This
should only be used in a conditional;
it does not pass the reading shadow
assertion.
Domain allowed access.
Do not audit attempts to read the shadow
password file (/etc/shadow).
The type of the domain to not audit.
Read and write the shadow password file (/etc/shadow).
Domain allowed access.
Create, read, write, and delete the shadow
password file.
Domain allowed access.
Create, read, write, and delete the shadow
password file.
Domain allowed access.
Automatic transition from etc to shadow.
Domain allowed access.
Relabel to the shadow
password file type.
Domain allowed access.
Relabel from and to the shadow
password file type.
Domain allowed access.
Append to the login failure log.
Domain allowed access.
Read and write the login failure log.
Domain allowed access.
Manage the login failure log.
Domain allowed access.
Read the last logins log.
Domain allowed access.
Append only to the last logins log.
Domain allowed access.
Read and write to the last logins log.
Domain allowed access.
Execute pam programs in the pam domain.
Domain allowed access.
Send generic signals to pam processes.
Domain allowed access.
Execute pam programs in the PAM domain.
Domain allowed access.
The role to allow the PAM domain.
Execute the pam program.
Domain allowed access.
Manage var auth files. Used by various other applications
and pam applets etc.
Domain allowed access.
Read PAM PID files.
Domain allowed access.
Do not audit attemps to read PAM PID files.
Domain to not audit.
Delete pam PID files.
Domain allowed access.
Manage pam PID files.
Domain allowed access.
Execute pam_console with a domain transition.
Domain allowed access.
Search the contents of the
pam_console data directory.
Domain allowed access.
List the contents of the pam_console
data directory.
Domain allowed access.
Read pam_console data files.
Domain allowed access.
Create, read, write, and delete
pam_console data files.
Domain allowed access.
Delete pam_console data.
Domain allowed access.
Read all directories on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all symbolic links on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Relabel all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read and write all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Manage all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Execute utempter programs in the utempter domain.
Domain allowed access.
Execute utempter programs in the utempter domain.
Domain allowed access.
The role to allow the utempter domain.
Do not audit attemps to execute utempter executable.
Domain to not audit.
Set the attributes of login record files.
Domain allowed access.
Read login records files (/var/log/wtmp).
Domain allowed access.
Do not audit attempts to read login records
files (/var/log/wtmp).
Domain allowed access.
Do not audit attempts to write to
login records files.
Domain to not audit.
Append to login records (wtmp).
Domain allowed access.
Write to login records (wtmp).
Domain allowed access.
Read and write login records.
Domain allowed access.
Create a login records in the log directory
using a type transition.
Domain allowed access.
Create, read, write, and delete login
records files.
Domain allowed access.
Use nsswitch to look up user, password, group, or
host information.
Allow the specified domain to look up user, password,
group, or host information using the name service.
The most common use of this interface is for services
that do host name resolution (usually DNS resolution).
Domain allowed access.
Unconfined access to the authlogin module.
Unconfined access to the authlogin module.
Currently, this only allows assertions for
the shadow passwords file (/etc/shadow) to
be passed. No access is granted yet.
Domain allowed access.
Send generic signals to chkpwd processes.
Domain allowed access.
Allow users to login using a radius server
Allow users login programs to access /etc/shadow.
Allow users to login using a yubikey OTP server or challenge response mode
Policy for reading and setting the hardware clock.
Execute hwclock in the clock domain.
The type of the process performing this action.
Execute hwclock in the clock domain, and
allow the specified role the hwclock domain.
The type of the process performing this action.
The role to be allowed the clock domain.
Execute hwclock in the caller domain.
The type of the process performing this action.
Do not audit attempts to write clock drift adjustments.
Domain to not audit.
Read and write clock drift adjustments.
Domain allowed access.
Collection of tools for managing UNIX services
Policy for DJB's daemontools
An ipc channel between the supervised domain and svc_start_t
Domain allowed access to svc_start_t.
Define a specified domain as a supervised service.
Domain allowed access.
The type associated with the process program.
Execute in the svc_start_t domain.
Domain allowed access.
Execute svc_start in the svc_start domain, and
allow the specified role the svc_start domain.
Domain allowed access.
The role to be allowed the svc_start domain.
Execute in the svc_run_t domain.
Domain allowed access.
Execute in the svc_multilog_t domain.
Domain allowed access.
Allow a domain to read svc_svc_t files.
Domain allowed access.
Search svc_svc_t directory.
Domain allowed access.
Allow a domain to create svc_svc_t files.
Domain allowed access.
Send a SIGCHLD signal to svc_run domain.
Domain allowed access.
Tools for filesystem management, such as mkfs and fsck.
Execute fs tools in the fstools domain.
The type of the process performing this action.
Execute fs tools in the fstools domain, and
allow the specified role the fs tools domain.
The type of the process performing this action.
The role to be allowed the fs tools domain.
Execute fsadm in the caller domain.
The type of the process performing this action.
Send signal to fsadm process
Domain allowed access.
Read fstools unnamed pipes.
Domain allowed access.
Relabel a file to the type used by the
filesystem tools programs.
The type of the process performing this action.
Create, read, write, and delete a file used by the
filesystem tools programs.
The type of the process performing this action.
Getattr swapfile
The type of the process performing this action.
Policy for getty.
Execute gettys in the getty domain.
Domain allowed access.
Inherit and use getty file descriptors.
Domain allowed access.
Allow process to read getty log file.
Domain allowed access.
Allow process to read getty config file.
Domain allowed access.
Allow process to edit getty config file.
Domain allowed access.
Policy for changing the system host name.
Execute hostname in the hostname domain.
Domain allowed access.
Execute hostname in the hostname domain, and
allow the specified role the hostname domain.
Domain allowed access.
The role to be allowed the hostname domain.
Execute hostname in the caller domain.
Domain allowed access.
Policy for hotplug system, for supporting the
connection and disconnection of devices at runtime.
Execute hotplug with a domain transition.
Domain allowed access.
Execute hotplug in the caller domain.
Domain allowed access.
Inherit and use hotplug file descriptors.
Domain allowed access.
Do not audit attempts to inherit
hotplug file descriptors.
Domain to not audit.
Do not audit attempts to search the
hotplug configuration directories.
Domain to not audit.
Get the attributes of the hotplug configuration directory.
Domain allowed access.
Search the hotplug configuration directory.
Domain allowed access.
Read the configuration files for hotplug.
The type of the process performing this action.
Search the hotplug PIDs.
Domain allowed access.
System initialization programs (init and init scripts).
Create a file type used for init scripts.
Create a file type used for init scripts. It can not be
used in conjunction with init_script_domain(). These
script files are typically stored in the /etc/init.d directory.
Typically this is used to constrain what services an
admin can start/stop. For example, a policy writer may want
to constrain a web administrator to only being able to
restart the web server, not other services. This special type
will help address that goal.
This also makes the type usable for files; thus an
explicit call to files_type() is redundant.
Type to be used for a script file.
Create a domain used for init scripts.
Create a domain used for init scripts.
Can not be used in conjunction with
init_script_file().
Type to be used as an init script domain.
Type of the script file used as an entry point to this domain.
Create a domain which can be started by init.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Create a domain which can be started by init,
with a range transition.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Range for the domain.
Create a domain for long running processes
(daemons/services) which are started by init scripts.
Create a domain for long running processes (daemons/services)
which are started by init scripts. Short running processes
should use the init_system_domain() interface instead.
Typically all long running processes started by an init
script (usually in /etc/init.d) will need to use this
interface.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the process must also run in a specific MLS/MCS level,
the init_ranged_daemon_domain() should be used instead.
Type to be used as a daemon domain.
Type of the program to be used as an entry point to this domain.
Create initrc domain.
Type to be used as a initrc daemon domain.
Create initrc domain.
Type to be used as a initrc daemon domain.
Executable type.
Create a domain for long running processes
(daemons/services) which are started by init scripts,
running at a specified MLS/MCS range.
Create a domain for long running processes (daemons/services)
which are started by init scripts, running at a specified
MLS/MCS range. Short running processes
should use the init_ranged_system_domain() interface instead.
Typically all long running processes started by an init
script (usually in /etc/init.d) will need to use this
interface if they need to run in a specific MLS/MCS range.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the policy build option TYPE is standard (MLS and MCS disabled),
this interface has the same behavior as init_daemon_domain().
Type to be used as a daemon domain.
Type of the program to be used as an entry point to this domain.
MLS/MCS range for the domain.
Create a domain for short running processes
which are started by init scripts.
Create a domain for long running processes (daemons/services)
which are started by init scripts. These are generally applications that
are used to initialize the system during boot.
Long running processes
should use the init_daemon_domain() interface instead.
Typically all short running processes started by an init
script (usually in /etc/init.d) will need to use this
interface.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the process must also run in a specific MLS/MCS level,
the init_ranged_system_domain() should be used instead.
Type to be used as a system domain.
Type of the program to be used as an entry point to this domain.
Create a domain for short running processes
which are started by init scripts.
Create a domain for long running processes (daemons/services)
which are started by init scripts.
These are generally applications that
are used to initialize the system during boot.
Long running processes
should use the init_ranged_system_domain() interface instead.
Typically all short running processes started by an init
script (usually in /etc/init.d) will need to use this
interface if they need to run in a specific MLS/MCS range.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the policy build option TYPE is standard (MLS and MCS disabled),
this interface has the same behavior as init_system_domain().
Type to be used as a system domain.
Type of the program to be used as an entry point to this domain.
Range for the domain.
Execute init (/sbin/init) with a domain transition.
Domain allowed access.
Execute the init program in the caller domain.
Domain allowed access.
Get the process group of init.
Domain allowed access.
Send init a null signal.
Domain allowed access.
Send init a SIGCHLD signal.
Domain allowed access.
Inherit and use file descriptors from init.
Allow the specified domain to inherit file
descriptors from the init program (process ID 1).
Typically the only file descriptors to be
inherited from init are for the console.
This does not allow the domain any access to
the object to which the file descriptors references.
Related interfaces:
- init_dontaudit_use_fds()
- term_dontaudit_use_console()
- term_use_console()
Example usage:
init_use_fds(mydomain_t)
term_use_console(mydomain_t)
Normally, processes that can inherit these file
descriptors (usually services) write messages to the
system log instead of writing to the console.
Therefore, in many cases, this access should
dontaudited instead.
Example dontaudit usage:
init_dontaudit_use_fds(mydomain_t)
term_dontaudit_use_console(mydomain_t)
Domain allowed access.
Do not audit attempts to inherit file
descriptors from init.
Domain allowed access.
Send UDP network traffic to init. (Deprecated)
Domain allowed access.
Get the attributes of initctl.
Domain allowed access.
Do not audit attempts to get the
attributes of initctl.
Domain to not audit.
Write to initctl.
Domain allowed access.
Use telinit (Read and write initctl).
Domain allowed access.
Read and write initctl.
Domain allowed access.
Do not audit attempts to read and
write initctl.
Domain allowed access.
Make init scripts an entry point for
the specified domain.
The domain for which init scripts are an entrypoint.
Execute init scripts with a specified domain transition.
Domain allowed access.
Execute init scripts with an automatic domain transition.
Domain allowed access.
Execute a file in a bin directory
in the initrc_t domain
Domain allowed access.
Execute a init script in a specified domain.
Execute a init script in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Transition to the init script domain
on a specified labeled init script.
Domain allowed access.
Labeled init script file.
Transition to the init script domain
for all labeled init script types
Domain allowed access
Start and stop daemon programs directly.
Start and stop daemon programs directly
in the traditional "/etc/init.d/daemon start"
style, and do not require run_init.
Domain allowed access.
The role to be performing this action.
Read the process state (/proc/pid) of init.
Domain allowed access.
Ptrace init
Domain allowed access.
Write an init script unnamed pipe.
Domain allowed access.
Get the attribute of init script entrypoint files.
Domain allowed access.
Read init scripts.
Domain allowed access.
Execute init scripts in the caller domain.
Domain allowed access.
Get the attribute of all init script entrypoint files.
Domain allowed access.
Read all init script files.
Domain allowed access.
Dontaudit read all init script files.
Domain allowed access.
Execute all init scripts in the caller domain.
Domain allowed access.
Read the process state (/proc/pid) of the init scripts.
Domain allowed access.
Inherit and use init script file descriptors.
Domain allowed access.
Do not audit attempts to inherit
init script file descriptors.
Domain allowed access.
Get the process group ID of init scripts.
Domain allowed access.
Send SIGCHLD signals to init scripts.
Domain allowed access.
Connect to init with a unix socket.
Domain allowed access.
Send generic signals to init scripts.
Domain allowed access.
Send null signals to init scripts.
Domain allowed access.
Read and write init script unnamed pipes.
Domain allowed access.
Send UDP network traffic to init scripts. (Deprecated)
Domain allowed access.
Allow the specified domain to connect to
init scripts with a unix socket.
Domain allowed access.
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
Domain allowed access.
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
Domain allowed access.
Send messages to init scripts over dbus.
Domain allowed access.
Send and receive messages from
init over dbus.
Domain allowed access.
Send and receive messages from
init scripts over dbus.
Domain allowed access.
Read and write the init script pty.
Read and write the init script pty. This
pty is generally opened by the open_init_pty
portion of the run_init program so that the
daemon does not require direct access to
the administrator terminal.
Domain allowed access.
Do not audit attempts to read and
write the init script pty.
Domain to not audit.
Get the attributes of init script
status files.
Domain allowed access.
Do not audit attempts to read init script
status files.
Domain allowed access.
Read init script temporary data.
Domain allowed access.
Read and write init script temporary data.
Domain allowed access.
Read and write init script inherited temporary data.
Domain allowed access.
Create files in a init script
temporary data directory.
Domain allowed access.
The type of the object to be created
The object class.
Get the attributes of init script process id files.
Domain allowed access.
Read utmp.
Domain allowed access.
Do not audit attempts to read utmp.
Domain to not audit.
Do not audit attempts to write utmp.
Domain allowed access.
Write to utmp.
Domain allowed access.
Do not audit attempts to lock
init script pid files.
Domain allowed access.
Read and write utmp.
Domain allowed access.
Do not audit attempts to read and write utmp.
Domain allowed access.
Create, read, write, and delete utmp.
Domain access allowed.
Create files in /var/run with the
utmp file type.
Domain access allowed.
Allow the specified domain to connect to daemon with a tcp socket
Domain allowed access.
Allow the specified domain to connect to daemon with a udp socket
Domain allowed access.
Transition to system_r when execute an init script
Execute a init script in a specified role
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Role to transition from.
dontaudit read and write an leaked init scrip file descriptors
The type of the process performing this action.
dontaudit read and write an leaked file descriptors
Domain to not audit.
Manage init script
status files.
Domain allowed access.
Send generic signals to init.
Domain allowed access.
Enable support for upstart as the init program.
Allow all daemons to use tcp wrappers.
Allow all daemons the ability to read/write terminals
Allow all daemons to write corefiles to /
Enable cluster mode for daemons.
TCP/IP encryption
Execute ipsec in the ipsec domain.
The type of the process performing this action.
Execute ipsec in the ipsec_mgmt domain.
The type of the process performing this action.
Connect to IPSEC using a unix domain stream socket.
The type of the process performing this action.
Connect to racoon using a unix domain stream socket.
The type of the process performing this action.
Get the attributes of an IPSEC key socket.
The type of the process performing this action.
Execute the IPSEC management program in the caller domain.
The type of the process performing this action.
Read the IPSEC configuration
The type of the process performing this action.
Match the default SPD entry.
Domain allowed access.
Set the context of a SPD entry to
the default context.
Domain allowed access.
write the ipsec_var_run_t files.
Domain allowed access.
Allow read the IPSEC pid files.
Domain allowed access.
Create, read, write, and delete the IPSEC pid files.
The type of the process performing this action.
Execute racoon in the racoon domain.
The type of the process performing this action.
Execute racoon and allow the specified role the domain.
Domain allowed access.
Role allowed access.
Execute setkey in the setkey domain.
The type of the process performing this action.
Execute setkey and allow the specified role the domains.
Domain allowed access.
The role to be allowed the racoon and setkey domains.
Send the kill signal to ipsec-mgmt
Domain allowed access.
Send a generic signal to ipsec-mgmt
Domain allowed access.
Send a generic signull to ipsec-mgmt.
Domain allowed access.
Send and receive messages from
ipsec-mgmt over dbus.
Domain allowed access.
Create, read, write, and delete ipsec-mgmt lock files.
The type of the process performing this action.
Allow racoon to read shadow
Policy for iptables.
Execute iptables in the iptables domain.
Domain allowed access.
Execute iptables in the iptables domain, and
allow the specified role the iptables domain.
Domain allowed access.
The role to be allowed the iptables domain.
Execute iptables in the caller domain.
Domain allowed access.
Execute iptables in the iptables domain.
The type of the process performing this action.
Set the attributes of iptables config files.
Domain allowed access.
Read iptables config files.
Domain allowed access.
Create files in /etc with the type used for
the iptables config files.
The type of the process performing this action.
Manage iptables config files.
Domain allowed access.
Establish connections to iSCSI devices
Execute a domain transition to run iscsid.
Domain allowed to transition.
Connect to ISCSI using a unix domain stream socket.
The type of the process performing this action.
Read iscsi lib files.
Domain allowed access.
Manage iscsid sempaphores.
Domain allowed access.
Kernel crash dumping mechanism
Execute kdump in the kdump domain.
The type of the process performing this action.
Execute kdump in the kdump domain.
The type of the process performing this action.
Read kdump configuration file.
Domain allowed access.
Manage kdump configuration file.
Domain allowed access.
All of the rules required to administrate
an kdump environment
Domain allowed access.
The role to be allowed to manage the kdump domain.
Policy for system libraries.
Execute ldconfig in the ldconfig domain.
Domain allowed access.
Execute ldconfig in the caller domain.
Domain allowed access.
Execute ldconfig in the ldconfig domain.
Domain allowed access.
The role to allow the ldconfig domain.
Use the dynamic link/loader for automatic loading
of shared libraries.
Domain allowed access.
Use the dynamic link/loader for automatic loading
of shared libraries with legacy support.
Domain allowed access.
Execute the dynamic link/loader in the caller's domain.
Domain allowed access.
Create, read, write, and delete the
dynamic link/loader.
Domain allowed access.
Relabel to and from the type used for
the dynamic link/loader.
Domain allowed access.
Modify the dynamic link/loader's cached listing
of shared libraries.
Domain allowed access.
Search library directories.
Domain allowed access.
Do not audit attempts to write to library directories.
Do not audit attempts to write to library directories.
Typically this is used to quiet attempts to recompile
python byte code.
Domain allowed access.
Create, read, write, and delete library directories.
Domain allowed access.
Read files in the library directories, such
as static libraries.
Domain allowed access.
Execute library scripts in the caller domain.
Domain allowed access.
Load and execute functions from generic
lib files as shared libraries.
Domain allowed access.
Create, read, write, and delete generic
files in library directories.
Domain allowed access.
Relabel files to the type used in library directories.
Domain allowed access.
Relabel to and from the type used
for generic lib files.
Domain allowed access.
Relabel to and from the type used
for generic lib files.
Domain allowed access.
Delete generic symlinks in library directories.
Domain allowed access.
Delete generic symlinks in library directories.
Domain allowed access.
Create, read, write, and delete shared libraries.
Domain allowed access.
Load and execute functions from shared libraries.
Domain allowed access.
Load and execute functions from shared libraries,
with legacy support.
Domain allowed access.
Relabel to and from the type used for
shared libraries.
Domain allowed access.
Create an object in lib directories, with
the shared libraries type using a type transition.
Domain allowed access.
The object class of the object being created.
Create an object in lib directories, with
the shared libraries type using a type transition. (Deprecated)
Create an object in lib directories, with
the shared libraries type using a type transition. (Deprecated)
lib_filetrans_shared_lib() should be used instead.
Domain allowed access.
The object class of the object being created.
Policy for local logins.
Execute local logins in the local login domain.
The type of the process performing this action.
Allow processes to inherit local login file descriptors.
The type of the process performing this action.
Do not audit attempts to inherit local login file descriptors.
Domain to not audit.
Send a null signal to local login processes.
Domain allowed access.
Search for key.
Domain allowed access.
Allow link to the local_login key ring.
Domain allowed access.
Execute local logins in the local login domain.
Domain allowed access.
Allow domain to gettatr local login home content
Domain allowed access.
Policy for the kernel message logger and system logging daemon.
Make the specified type usable for log files
in a filesystem.
Make the specified type usable for log files in a filesystem.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a log file type may result in problems with log
rotation, log analysis, and log monitoring programs.
Related interfaces:
Example usage with a domain that can create
and append to a private log file stored in the
general directories (e.g., /var/log):
type mylogfile_t;
logging_log_file(mylogfile_t)
allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms };
logging_log_filetrans(mydomain_t, mylogfile_t, file)
Type to be used for files.
Send audit messages.
Domain allowed access.
dontaudit attempts to send audit messages.
Domain allowed access.
Set login uid
Domain allowed access.
Set tty auditing
Domain allowed access.
Set up audit
Domain allowed access.
Read the audit log.
Domain allowed access.
dontaudit search of auditd log files.
Domain to not audit.
Execute auditctl in the auditctl domain.
Domain allowed access.
Execute auditctl in the auditctl domain, and
allow the specified role the auditctl domain.
Domain allowed access.
The role to be allowed the auditctl domain.
Execute auditd in the auditd domain.
Domain allowed access.
Execute auditd in the auditd domain, and
allow the specified role the auditd domain.
Domain allowed access.
The role to be allowed the auditd domain.
Connect to auditdstored over an unix stream socket.
Domain allowed access.
Execute a domain transition to run the audit dispatcher.
Domain allowed to transition.
Signal the audit dispatcher.
Domain allowed to transition.
Create a domain for processes
which can be started by the system audit dispatcher
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Connect to the audit dispatcher over an unix stream socket.
Domain allowed access.
Manage the auditd configuration files.
Domain allowed access.
Manage the audit log.
Domain allowed access.
Execute klogd in the klog domain.
Domain allowed access.
Check if syslogd is executable.
Domain allowed access.
Execute syslogd in the syslog domain.
Domain allowed access.
Create an object in the log directory, with a private type.
Allow the specified domain to create an object
in the general system log directories (e.g., /var/log)
with a private type. Typically this is used for creating
private log files in /var/log with the private type instead
of the general system log type. To accomplish this goal,
either the program must be SELinux-aware, or use this interface.
Related interfaces:
Example usage with a domain that can create
and append to a private log file stored in the
general directories (e.g., /var/log):
type mylogfile_t;
logging_log_file(mylogfile_t)
allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms };
logging_log_filetrans(mydomain_t, mylogfile_t, file)
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Send system log messages.
Allow the specified domain to connect to the
system log service (syslog), to send messages be added to
the system logs. Typically this is used by services
that do not have their own log file in /var/log.
This does not allow messages to be sent to
the auditing system.
Programs which use the libc function syslog() will
require this access.
Related interfaces:
- logging_send_audit_msgs()
Domain allowed access.
Connect to the syslog control unix stream socket.
Domain allowed access.
Read the auditd configuration files.
Domain allowed access.
dontaudit search of auditd configuration files.
Domain allowed access.
Read syslog configuration files.
Domain allowed access.
Allows the domain to open a file in the
log directory, but does not allow the listing
of the contents of the log directory.
Domain allowed access.
Do not audit attempts to search the var log directory.
Domain not to audit.
List the contents of the generic log directory (/var/log).
Domain allowed access.
Read and write the generic log directory (/var/log).
Domain allowed access.
Do not audit attempts to get the atttributes
of any log files.
Domain allowed access.
Append to all log files.
Domain allowed access.
Append to all log files.
Domain allowed access.
Read all log files.
Domain allowed access.
dontaudit Read all log files.
Domain allowed access.
dontaudit Read all log files.
Domain allowed access.
Execute all log files in the caller domain.
Domain allowed access.
read/write to all log files.
Domain allowed access.
Create, read, write, and delete all log files.
Domain allowed access.
Read generic log files.
Domain allowed access.
Write generic log files.
Domain allowed access.
Dontaudit read/Write inherited generic log files.
Domain to not audit.
Dontaudit Write generic log files.
Domain allowed access.
Read and write generic log files.
Domain allowed access.
Create, read, write, and delete
generic log files.
Domain allowed access.
All of the rules required to administrate
the audit environment
Domain allowed access.
User role allowed access.
All of the rules required to administrate
the syslog environment
Domain allowed access.
User role allowed access.
All of the rules required to administrate
the logging environment
Domain allowed access.
User role allowed access.
Allow syslogd daemon to send mail
Allow syslogd daemon to read user tmp content
Allow syslogd the ability to read/write terminals
Allow syslogd the ability to call nagios plugins. It is
turned on by omprog rsyslog plugin.
Policy for logical volume management programs.
Execute lvm programs in the lvm domain.
The type of the process performing this action.
Execute lvm programs in the caller domain.
The type of the process performing this action.
Execute lvm programs in the lvm domain.
The type of the process performing this action.
The role to allow the LVM domain.
Read LVM configuration files.
The type of the process performing this action.
Manage LVM configuration files.
Domain allowed access.
Connect to lvm using a unix domain stream socket.
Domain allowed access.
Execute a domain transition to run clvmd.
Domain allowed to transition.
Read and write to clvmd temporary file system.
Domain allowed access.
Delete lvm temporary file system.
Domain allowed access.
Send a message to lvm over the
datagram socket.
Domain allowed access.
Miscelaneous files.
Make the specified type usable as a cert file.
Make the specified type usable for cert files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
cert management tools.
Related interfaces:
Example:
type mycertfile_t;
cert_type(mycertfile_t)
allow mydomain_t mycertfile_t:file read_file_perms;
files_search_etc(mydomain_t)
Type to be used for files.
Read system SSL certificates.
Domain allowed access.
Dontaudit read/writei certificates.
Domain allowed access.
manange system SSL certificates.
Domain allowed access.
manange system SSL certificates.
Domain allowed access.
Read fonts.
Domain allowed access.
Set the attributes on a fonts directory.
Domain allowed access.
Do not audit attempts to set the attributes
on a fonts directory.
Domain allowed access.
Do not audit attempts to write fonts.
Domain allowed access.
Create, read, write, and delete fonts.
Domain allowed access.
Set the attributes on a fonts cache directory.
Domain allowed access.
Do not audit attempts to set the attributes
on a fonts cache directory.
Domain allowed access.
Create, read, write, and delete fonts cache.
Domain allowed access.
Read hardware identification data.
Domain allowed access.
Allow process to setattr localization info
Domain allowed access.
Allow process to read localization information.
Allow the specified domain to read the localization files.
This is typically for time zone configuration files, such as
/etc/localtime and files in /usr/share/zoneinfo.
Typically, any domain which needs to know the GMT/UTC
offset of the current timezone will need access
to these files. Generally, it should be safe for any
domain to read these files.
Domain allowed access.
Allow process to write localization info
Domain allowed access.
Allow process to relabel localization info
Domain allowed access.
Allow process to read legacy time localization info
Domain allowed access.
Search man pages.
Domain to not audit.
Do not audit attempts to search man pages.
Domain to not audit.
Read man pages
Domain allowed access.
Delete man pages
Domain allowed access.
Create, read, write, and delete man pages
Domain allowed access.
Read public files used for file
transfer services.
Domain allowed access.
Create, read, write, and delete public files
and directories used for file transfer services.
Domain allowed access.
Read TeX data
Domain allowed access.
Execute TeX data programs in the caller domain.
Domain allowed access.
Let test files be an entry point for
a specified domain.
Domain to be entered.
Read test files and directories.
Domain allowed access.
Execute test files.
Domain allowed access.
Execute test files.
Domain allowed access.
Create, read, write, and delete localization
Domain allowed access.
Dontaudit attempts to write generic SSL certificates.
Domain allowed access.
Do not audit attempts to access check cert dirs/files.
Domain to not audit.
Policy for kernel module utilities
Getattr the dependencies of kernel modules.
Domain allowed access.
Read the dependencies of kernel modules.
Domain allowed access.
list the configuration options used when
loading modules.
Domain allowed access.
Read the configuration options used when
loading modules.
Domain allowed access.
Rename a file with the configuration options used when
loading modules.
Domain allowed access.
Unlink a file with the configuration options used when
loading modules.
Domain allowed access.
Manage files with the configuration options used when
loading modules.
Domain allowed access.
Unconditionally execute insmod in the insmod domain.
Domain allowed access.
Execute insmod in the insmod domain.
Domain allowed access.
Execute insmod in the insmod domain, and
allow the specified role the insmod domain,
and use the caller's terminal. Has a sigchld
backchannel.
Domain allowed access.
The role to be allowed the insmod domain.
Execute insmod in the caller domain.
Domain allowed access.
Execute depmod in the depmod domain.
Domain allowed access.
Execute depmod in the depmod domain.
Domain allowed access.
The role to be allowed the depmod domain.
Execute depmod in the caller domain.
Domain allowed access.
Execute depmod in the depmod domain.
Domain allowed access.
Execute update_modules in the update_modules domain.
Domain allowed access.
The role to be allowed the update_modules domain.
Execute update_modules in the caller domain.
Domain allowed access.
Policy for mount.
Execute mount in the mount domain.
The type of the process performing this action.
Execute mount in the mount domain, and
allow the specified role the mount domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the mount domain.
Execute fusermount in the mount domain, and
allow the specified role the mount domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the mount domain.
Execute mount in the caller domain.
The type of the process performing this action.
Send a generic signal to mount.
Domain allowed access.
Manage mount PID files.
Domain allowed access.
Use file descriptors for mount.
The type of the process performing this action.
Allow the mount domain to send nfs requests for mounting
network drives
Allow the mount domain to send nfs requests for mounting
network drives
This interface has been deprecated as these rules were
a side effect of leaked mount file descriptors. This
interface has no effect.
Domain allowed access.
Execute mount in the unconfined mount domain.
Domain allowed access.
Execute mount in the unconfined mount domain, and
allow the specified role the unconfined mount domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the unconfined mount domain.
Execute fusermount in the mount domain.
The type of the process performing this action.
Execute fusermount.
The type of the process performing this action.
dontaudit Execute fusermount.
The type of the process performing this action.
Execute a domain transition to run showmount.
Domain allowed to transition.
Execute showmount in the showmount domain, and
allow the specified role the showmount domain.
Domain allowed access
The role to be allowed the showmount domain.
Allow the mount command to mount any directory or file.
NetLabel/CIPSO labeled networking management
Execute netlabel_mgmt in the netlabel_mgmt domain.
Domain allowed access.
Execute netlabel_mgmt in the netlabel_mgmt domain, and
allow the specified role the netlabel_mgmt domain.
Domain allowed access.
The role to be allowed the netlabel_mgmt domain.
PCMCIA card management services
PCMCIA stub interface. No access allowed.
Domain allowed access.
Execute cardmgr in the cardmgr domain.
The type of the process performing this action.
Inherit and use file descriptors from cardmgr.
Domain allowed access.
Execute cardctl in the cardmgr domain.
The type of the process performing this action.
Execute cardmgr in the cardctl domain, and
allow the specified role the cardmgr domain.
The type of the process performing this action.
The role to be allowed the cardmgr domain.
Read cardmgr pid files.
Domain allowed access.
Create, read, write, and delete
cardmgr pid files.
Domain allowed access.
Create, read, write, and delete
cardmgr runtime character nodes.
Domain allowed access.
RAID array management tools
Execute software raid tools in the mdadm domain.
The type of the process performing this action.
Create, read, write, and delete the mdadm pid files.
Create, read, write, and delete the mdadm pid files.
Added for use in the init module.
The type of the process performing this action.
Read mdadm map file.
The type of the process performing this action.
Policy for SELinux policy and userland applications.
Execute checkpolicy in the checkpolicy domain.
Domain allowed access.
Execute checkpolicy in the checkpolicy domain, and
allow the specified role the checkpolicy domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the checkpolicy domain.
Execute checkpolicy in the caller domain.
Domain allowed access.
Execute load_policy in the load_policy domain.
Domain allowed access.
Execute load_policy in the load_policy domain, and
allow the specified role the load_policy domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the load_policy domain.
Execute load_policy in the caller domain.
Domain allowed access.
Read the load_policy program file.
Domain allowed access.
Execute newrole in the newole domain.
Domain allowed access.
Execute newrole in the newrole domain, and
allow the specified role the newrole domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the newrole domain.
Execute newrole in the caller domain.
Domain allowed access.
Do not audit the caller attempts to send
a signal to newrole.
Domain allowed access.
Send a SIGCHLD signal to newrole.
Allow the specified domain to send a SIGCHLD
signal to newrole. This signal is automatically
sent from a process that is terminating to
its parent. This may be needed by domains
that are executed from newrole.
Domain allowed access.
Inherit and use newrole file descriptors.
Domain allowed access.
Do not audit attempts to inherit and use
newrole file descriptors.
Domain to not audit.
Execute restorecon in the restorecon domain. (Deprecated)
Domain allowed access.
Execute restorecon in the restorecon domain, and
allow the specified role the restorecon domain,
and use the caller's terminal. (Deprecated)
Domain allowed access.
The role to be allowed the restorecon domain.
Execute restorecon in the caller domain. (Deprecated)
Domain allowed access.
Execute restorecond in the caller domain.
Domain allowed access.
Execute run_init in the run_init domain.
Domain allowed access.
Execute init scripts in the run_init domain.
Execute init scripts in the run_init domain.
This is used for the Gentoo integrated run_init.
Domain allowed access.
Execute run_init in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the run_init domain.
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
This is used for the Gentoo integrated run_init.
Domain allowed access.
The role to be allowed the run_init domain.
Inherit and use run_init file descriptors.
Domain allowed access.
Execute setfiles in the setfiles domain.
Domain allowed access.
Execute setfiles in the setfiles domain, and
allow the specified role the setfiles domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the setfiles domain.
Execute setfiles in the setfiles domain.
Domain allowed access.
Execute setfiles in the setfiles_mac domain, and
allow the specified role the setfiles_mac domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the setfiles_mac domain.
Execute setfiles in the caller domain.
Domain allowed access.
Do not audit attempts to search the SELinux
configuration directory (/etc/selinux).
Domain to not audit.
Do not audit attempts to read the SELinux
userland configuration (/etc/selinux).
Domain to not audit.
Read the general SELinux configuration files.
Domain allowed access.
Read and write the general SELinux configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files. (Deprecated)
Create, read, write, and delete
the general selinux configuration files.
This interface has been deprecated, please
use the seutil_manage_config() interface instead.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
Do not audit attempts to search the SELinux
login configuration directory.
Domain to not audit.
Do not audit attempts to read the SELinux
login configuration.
Domain to not audit.
Read the SELinux login configuration files.
Domain allowed access.
Read and write the SELinux login configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
manage the login selinux configuration files.
Domain allowed access.
Search the policy directory with default_context files.
Domain allowed access.
Read the default_contexts files.
Domain allowed access.
Create, read, write, and delete the default_contexts files.
Domain allowed access.
Read the file_contexts files.
Domain allowed access.
Do not audit attempts to read the file_contexts files.
Domain allowed access.
Read and write the file_contexts files.
Domain allowed access.
Create, read, write, and delete the file_contexts files.
Domain allowed access.
Read the SELinux binary policy.
Domain allowed access.
Create the SELinux binary policy.
Domain allowed access.
Allow the caller to relabel a file to the binary policy type.
Domain allowed access.
Create, read, write, and delete the SELinux
binary policy.
Domain allowed access.
Read SELinux policy source files.
Domain allowed access.
Create, read, write, and delete SELinux
policy source files.
Domain allowed access.
Execute a domain transition to run semanage.
Domain allowed to transition.
Execute a domain transition to run setsebool.
Domain allowed to transition.
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the semanage domain.
Execute setsebool in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the setsebool domain.
Full management of the semanage
module store.
Domain allowed access.
Full management of the semanage
module store.
Domain allowed access.
Get read lock on module store
Domain allowed access.
Get trans lock on module store
Domain allowed access.
SELinux-enabled program access for
libselinux-linked programs.
SELinux-enabled programs are typically
linked to the libselinux library. This
interface will allow access required for
the libselinux constructor to function.
Domain allowed access.
Do not audit SELinux-enabled program access for
libselinux-linked programs.
SELinux-enabled programs are typically
linked to the libselinux library. This
interface will dontaudit access required for
the libselinux constructor to function.
Generally this should not be used on anything
but simple SELinux-enabled programs that do not
rely on data initialized by the libselinux
constructor.
Domain allowed access.
All rules necessary to run semanage command
Domain allowed access.
All rules necessary to run setfiles command
Domain allowed access.
SELinux MLS/MCS label translation service.
Execute setrans server in the setrans domain.
The type of the process performing this action.
Allow a domain to translate contexts.
Domain allowed access.
policy for sosreport
Execute a domain transition to run sosreport.
Domain allowed to transition.
Execute sosreport in the sosreport domain, and
allow the specified role the sosreport domain.
Domain allowed access
The role to be allowed the sosreport domain.
Role access for sosreport
Role allowed access
User domain for the role
Allow the specified domain to read
sosreport tmp files.
Domain allowed access.
Delete sosreport tmp files.
Domain allowed access.
Append sosreport tmp files.
Domain allowed access.
Policy for network configuration: ifconfig and dhcp client.
Execute dhcp client in dhcpc domain.
The type of the process performing this action.
Execute DHCP clients in the dhcpc domain, and
allow the specified role the dhcpc domain.
The type of the process performing this action.
The role to be allowed the clock domain.
Send a SIGCHLD signal to the dhcp client.
The domain sending the SIGCHLD.
Send a kill signal to the dhcp client.
The domain sending the SIGKILL.
Send a SIGSTOP signal to the dhcp client.
The domain sending the SIGSTOP.
Send a null signal to the dhcp client.
The domain sending the null signal.
Send a generic signal to the dhcp client.
The domain sending the signal.
Send and receive messages from
dhcpc over dbus.
Domain allowed access.
Read and write dhcp configuration files.
The domain allowed access.
Read dhcp client state files.
The domain allowed access.
Delete the dhcp client state files.
Domain allowed access.
Allow caller to relabel dhcpc_state files
Domain allowed access.
Manage the dhcp client state files.
Domain allowed access.
Set the attributes of network config files.
Domain allowed access.
Allow caller to relabel net_conf files
Domain allowed access.
Allow caller to relabel net_conf files
Domain allowed access.
Read network config files.
Allow the specified domain to read the
general network configuration files. A
common example of this is the
/etc/resolv.conf file, which has domain
name system (DNS) server IP addresses.
Typically, most networking processes will
require the access provided by this interface.
Higher-level interfaces which involve
networking will generally call this interface,
for example:
- sysnet_dns_name_resolve()
- sysnet_use_ldap()
- sysnet_use_portmap()
Domain allowed access.
Do not audit attempts to read network config files.
Domain to not audit.
Write network config files.
Domain allowed access.
Create network config files.
Domain allowed access.
Create files in /etc with the type used for
the network config files.
The type of the process performing this action.
Create, read, write, and delete network config files.
The type of the process performing this action.
Read the dhcp client pid file.
The type of the process performing this action.
Delete the dhcp client pid file.
The type of the process performing this action.
Manage the dhcp client pid file.
The type of the process performing this action.
Execute ifconfig in the ifconfig domain.
The type of the process performing this action.
Execute ifconfig in the ifconfig domain, and
allow the specified role the ifconfig domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the ifconfig domain.
Execute ifconfig in the caller domain.
Domain allowed access.
Send a generic signal to ifconfig.
Domain allowed access.
Read the DHCP configuration files.
Domain allowed access.
Search the DHCP state data directory.
Domain allowed access.
Create DHCP state data.
Create DHCP state data.
This is added for DHCP server, as
the server and client put their state
files in the same directory.
Domain allowed access.
The type of the object to be created
The object class.
Perform a DNS name resolution.
Domain allowed access.
Connect and use a LDAP server.
Domain allowed access.
Connect and use remote port mappers.
Domain allowed access.
Do not audit attempts to use
the dhcp file descriptors.
The domain sending the SIGCHLD.
Transition to system_r when execute an dhclient script
Execute dhclient script in a specified role
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Role to transition from.
Allow dhcpc client applications to execute iptables commands
Policy for udev.
Execute udev in the udev domain, and
allow the specified role the udev domain.
Domain allowed access.
The role to be allowed the iptables domain.
Send generic signals to udev.
Domain allowed access.
Execute udev in the udev domain.
The type of the process performing this action.
Execute udev in the caller domain.
Domain allowed access.
Execute a udev helper in the udev domain.
The type of the process performing this action.
Allow process to read udev process state.
Domain allowed access.
Do not audit attempts to inherit a
udev file descriptor.
Domain to not audit.
Do not audit attempts to read or write
to a udev unix datagram socket.
Domain to not audit.
Do not audit search of udev database directories.
Domain to not audit.
Read the udev device table.
Allow the specified domain to read the udev device table.
Domain allowed access.
Allow process to modify list of devices.
The type of the process performing this action.
Allow process to delete list of devices.
The type of the process performing this action.
Create, read, write, and delete
udev pid files.
Domain allowed access.
Create, read, write, and delete
udev pid files.
Domain allowed access.
Create a domain for processes
which can be started by udev.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
The unconfined domain.
Make the specified domain unconfined.
Domain to make unconfined.
Make the specified domain unconfined and
audit executable heap usage.
Make the specified domain unconfined and
audit executable heap usage. With exception
of memory protections, usage of this interface
will result in the level of access the domain has
is like SELinux was not being used.
Only completely trusted domains should use this interface.
Domain to make unconfined.
Add an alias type to the unconfined domain. (Deprecated)
Add an alias type to the unconfined domain. (Deprecated)
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
New alias of the unconfined domain.
Add an alias type to the unconfined execmem
program file type. (Deprecated)
Add an alias type to the unconfined execmem
program file type. (Deprecated)
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
New alias of the unconfined execmem program type.
Policy for user domains
The template containing the most basic rules common to all users.
The template containing the most basic rules common to all users.
This template creates a user domain, types, and
rules for the user's tty and pty.
The prefix of the user domain (e.g., user
is the prefix for user_t).
Allow a home directory for which the
role has read-only access.
Allow a home directory for which the
role has read-only access.
This does not allow execute access.
The user role
The user domain
Allow a home directory for which the
role has full access.
Allow a home directory for which the
role has full access.
This does not allow execute access.
The user role
The user domain
Manage user temporary files
Role allowed access.
Domain allowed access.
Execute user bin files.
Domain allowed access.
The execute access user temporary files.
Domain allowed access.
Role access for the user tmpfs type
that the user has full access.
Role access for the user tmpfs type
that the user has full access.
This does not allow execute access.
Role allowed access.
Domain allowed access.
The interface allowing the user basic
network permissions
The user domain
The template for creating a user xwindows client. (Deprecated)
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for allowing the user to change passwords.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template containing rules common to unprivileged
users and administrative users.
This template creates a user domain, types, and
rules for the user's tty, pty, tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a login user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a unprivileged login user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a unprivileged xwindows login user.
The template for creating a unprivileged xwindows login user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating an administrative user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The privileges given to administrative users are:
- Raw disk access
- Set all sysctls
- All kernel ring buffer controls
- Create, read, write, and delete all files but shadow
- Manage source and binary format SELinux policy
- Run insmod
The prefix of the user domain (e.g., sysadm
is the prefix for sysadm_t).
Allow user to run as a secadm
Create objects in a user home directory
with an automatic type transition to
a specified private type.
This is a templated interface, and should only
be called from a per-userdomain template.
Domain allowed access.
The role of the object to create.
Make the specified type usable as
a user application domain.
Type to be used as a user application domain.
Type to be used as the domain entry point.
Make the specified type usable in a
user home directory.
Type to be used as a file in the
user home directory.
Make the specified type usable in a
generic temporary directory.
Type to be used as a file in the
generic temporary directory.
Make the specified type usable in a
generic tmpfs_t directory.
Type to be used as a file in the
generic temporary directory.
Allow domain to attach to TUN devices created by administrative users.
Domain allowed access.
Set the attributes of a user pty.
Domain allowed access.
Create a user pty.
Domain allowed access.
Get the attributes of user home directories.
Domain allowed access.
Do not audit attempts to get the attributes of user home directories.
Domain allowed access.
Search user home directories.
Domain allowed access.
Do not audit attempts to search user home directories.
Do not audit attempts to search user home directories.
This will supress SELinux denial messages when the specified
domain is denied the permission to search these directories.
Domain to not audit.
List user home directories.
Domain allowed access.
Do not audit attempts to list user home subdirectories.
Domain to not audit
Create user home directories.
Domain allowed access.
Create user home directories.
Domain allowed access.
Relabel to user home directories.
Domain allowed access.
Relabel to user home files.
Domain allowed access.
Relabel user home files.
Domain allowed access.
Create directories in the home dir root with
the user home directory type.
Domain allowed access.
Do a domain transition to the specified
domain when executing a program in the
user home directory.
Do a domain transition to the specified
domain when executing a program in the
user home directory.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
Domain to transition to.
Do not audit attempts to search user home content directories.
Domain to not audit
List contents of users home directory.
Domain allowed access.
Create, read, write, and delete directories
in a user home subdirectory.
Domain allowed access.
Delete directories in a user home subdirectory.
Domain allowed access.
Set the attributes of user home files.
Domain allowed access.
Do not audit attempts to set the
attributes of user home files.
Domain allowed access.
Mmap user home files.
Domain allowed access.
Read user home files.
Domain allowed access.
Do not audit attempts to getattr user home files.
Domain to not audit.
Do not audit attempts to read user home files.
Domain to not audit.
Do not audit attempts to append user home files.
Domain to not audit.
Do not audit attempts to write user home files.
Domain to not audit.
Delete files in a user home subdirectory.
Domain allowed access.
Do not audit attempts to write user home files.
Domain to not audit.
Read user home subdirectory symbolic links.
Domain allowed access.
Execute user home files.
Domain allowed access.
Do not audit attempts to execute user home files.
Domain allowed access.
Create, read, write, and delete files
in a user home subdirectory.
Domain allowed access.
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
Domain allowed access.
Create, read, write, and delete symbolic links
in a user home subdirectory.
Domain allowed access.
Delete symbolic links in a user home directory.
Domain allowed access.
Create, read, write, and delete named pipes
in a user home subdirectory.
Domain allowed access.
Create, read, write, and delete named sockets
in a user home subdirectory.
Domain allowed access.
Create objects in a user home directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Create objects in a user home directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Create objects in a user home directory
with an automatic type transition to
the user home file type.
Domain allowed access.
The class of the object to be created.
Write to user temporary named sockets.
Domain allowed access.
List user temporary directories.
Domain allowed access.
Do not audit attempts to search user
temporary directories.
Domain to not audit.
Do not audit attempts to list user
temporary directories.
Domain to not audit.
Do not audit attempts to manage users
temporary directories.
Domain to not audit.
Read user temporary files.
Domain allowed access.
Do not audit attempts to read users
temporary files.
Domain to not audit.
Do not audit attempts to append users
temporary files.
Domain to not audit.
Read and write user temporary files.
Domain allowed access.
Do not audit attempts to write users
temporary files.
Domain to not audit.
Do not audit attempts to read/write users
temporary fifo files.
Domain to not audit.
Do not audit attempts to use user ttys.
Domain to not audit.
Do not audit attempts to manage users
temporary files.
Domain to not audit.
Read user temporary symbolic links.
Domain allowed access.
Create, read, write, and delete user
temporary directories.
Domain allowed access.
Create, read, write, and delete user
temporary files.
Domain allowed access.
Create, read, write, and delete user
temporary symbolic links.
Domain allowed access.
Create, read, write, and delete user
temporary named pipes.
Domain allowed access.
Create, read, write, and delete user
temporary named sockets.
Domain allowed access.
Create objects in a user temporary directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Create objects in the temporary directory
with an automatic type transition to
the user temporary type.
Domain allowed access.
The class of the object to be created.
Read user tmpfs files.
Domain allowed access.
Read/Write user tmpfs files.
Domain allowed access.
Read/Write inherited user tmpfs files.
Domain allowed access.
Execute user tmpfs files.
Domain allowed access.
Delete user tmpfs files.
Domain allowed access.
Get the attributes of a user domain tty.
Domain allowed access.
Do not audit attempts to get the attributes of a user domain tty.
Domain allowed access.
Set the attributes of a user domain tty.
Domain allowed access.
Do not audit attempts to set the attributes of a user domain tty.
Domain allowed access.
Read and write a user domain tty.
Domain allowed access.
Read and write inherited user domain tty.
Domain allowed access.
Read and write a user domain pty.
Domain allowed access.
Read and write inherited user domain pty.
Domain allowed access.
Read and write inherited user domain pty.
Domain allowed access.
Read and write a user TTYs and PTYs.
Allow the specified domain to read and write user
TTYs and PTYs. This will allow the domain to
interact with the user via the terminal. Typically
all interactive applications will require this
access.
However, this also allows the applications to spy
on user sessions or inject information into the
user session. Thus, this access should likely
not be allowed for non-interactive domains.
Domain allowed access.
Do not audit attempts to read and write
a user domain tty and pty.
Domain allowed access.
Execute a shell in all user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Allow domain dyntrans to unpriv userdomain.
Domain allowed access.
Allow domain dyntrans to admin userdomain.
Domain allowed access.
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Manage unpriviledged user SysV sempaphores.
Domain allowed access.
Manage unpriviledged user SysV shared
memory segments.
Domain allowed access.
Read/Write unpriviledged user SysV shared
memory segments.
Domain allowed access.
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Search users home directories.
Domain allowed access.
Send general signals to unprivileged user domains.
Domain allowed access.
Inherit the file descriptors from unprivileged user domains.
Domain allowed access.
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
Do not audit attempts to inherit the file descriptors
from unprivileged user domains. This will supress
SELinux denial messages when the specified domain is denied
the permission to inherit these file descriptors.
Domain to not audit.
Do not audit attempts to use user ptys.
Domain to not audit.
Relabel files to unprivileged user pty types.
Domain allowed access.
Do not audit attempts to relabel files from
user pty types.
Domain allowed access.
Write all users files in /tmp
Domain allowed access.
Read the process state of all user domains.
Domain allowed access.
Get the attributes of all user domains.
Domain allowed access.
Inherit the file descriptors from all user domains
Domain allowed access.
Do not audit attempts to inherit the file
descriptors from any user domains.
Domain to not audit.
Send general signals to all user domains.
Domain allowed access.
Send a SIGCHLD signal to all user domains.
Domain allowed access.
Create keys for all user domains.
Domain allowed access.
Send a dbus message to all user domains.
Domain allowed access.
Allow apps to set rlimits on userdomain
Domain allowed access.
Define this type as a Allow apps to set rlimits on userdomain
The prefix of the user domain (e.g., user
is the prefix for user_t).
Domain allowed access.
Connect to users over an unix stream socket.
Domain allowed access.
Dontaudit connectto to users over an unix stream socket.
Domain allowed access.
Ptrace user domains.
Domain allowed access.
dontaudit Search /root
Domain allowed access.
dontaudit list /root
Domain allowed access.
dontaudit write /root
Domain allowed access.
Allow domain to list /root
Domain allowed access.
Allow Search /root
Domain allowed access.
RW unpriviledged user SysV sempaphores.
Domain allowed access.
Send a message to unpriv users over a unix domain
datagram socket.
Domain allowed access.
Send a message to users over a unix domain
datagram socket.
Domain allowed access.
Allow execmod on files in homedirectory
Domain allowed access.
Read admin home files.
Domain allowed access.
Read admin home files.
Domain allowed access.
Execute admin home files.
Domain allowed access.
Append files inherited
in the /root directory.
Domain allowed access.
Manage all files/directories in the homedir
The user domain
Create objects in a user home directory
with an automatic type transition to
the user home file type.
Domain allowed access.
The class of the object to be created.
Create objects in the /root directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Send signull to unprivileged user domains.
Domain allowed access.
Write all users files in /tmp
Domain allowed access.
Manage keys for all user domains.
Domain allowed access.
Do not audit attempts to read and write
unserdomain stream.
Domain to not audit.
Append files
in a user home subdirectory.
Domain allowed access.
Read files inherited
in a user home subdirectory.
Domain allowed access.
Append files inherited
in a user home subdirectory.
Domain allowed access.
Append files inherited
in a user tmp files.
Domain allowed access.
Read system SSL certificates in the users homedir.
Domain allowed access.
Manage system SSL certificates in the users homedir.
Domain allowed access.
Dontaudit Write system SSL certificates in the users homedir.
Domain to not audit.
Read audio files in the users homedir.
Domain allowed access.
Do not audit attempts to write all user home content files.
Domain to not audit.
Do not audit attempts to write all user tmp content files.
Domain to not audit.
Manage all user temporary content.
Domain allowed access.
List all user temporary content.
Domain allowed access.
Manage all user tmpfs content.
Domain allowed access.
Delete all user temporary content.
Domain allowed access.
dontaudit Search getatrr /root files
Domain allowed access.
dontaudit read /root lnk files
Domain allowed access.
Create, read, write, and delete user
temporary chr files.
Domain allowed access.
Create, read, write, and delete user
temporary blk files.
Domain allowed access.
Dontaudit attempt to set attributes on user temporary directories.
Domain to not audit.
Read all inherited users files in /tmp
Domain allowed access.
Dontaudit search user temporary directories.
Domain allowed access.
Write all inherited users files in /tmp
Domain allowed access.
Delete all users files in /tmp
Domain allowed access.
Send kill signals to all user domains.
Domain allowed access.
Read/write all inherited users files in /tmp
Domain allowed access.
Read and write userdomain stream.
Domain allowed access.
Allow users to connect to mysql
Allow users to connect to PostgreSQL
Allow regular users direct mouse access
Allow user to r/w files on filesystems
that do not have extended attributes (FAT, CDROM, FLOPPY)
Allow user processes to change their priority
Allow w to display everyone
Xen hypervisor
Execute a domain transition to run xend.
Domain allowed to transition.
Inherit and use xen file descriptors.
Domain to not audit.
Do not audit attempts to inherit
xen file descriptors.
Domain to not audit.
Read xend image files.
Domain allowed access.
Allow the specified domain to read/write
xend image files.
Domain allowed to transition.
Allow the specified domain to append
xend log files.
Domain allowed to transition.
Create, read, write, and delete the
xend log files.
Domain allowed access.
Do not audit attempts to read and write
Xen unix domain stream sockets. These
are leaked file descriptors.
Domain to not audit.
Connect to xenstored over an unix stream socket.
Domain allowed access.
Connect to xend over an unix domain stream socket.
Domain allowed access.
Execute a domain transition to run xm.
Domain allowed to transition.
Connect to xm over an unix stream socket.
Domain allowed access.
Allow xen to manage nfs files