From 247a84c9548016481d6408150aa436ed12e47eeb Mon Sep 17 00:00:00 2001
From: Lukas Vrabec
+@@ -3021,9 +3708,7 @@ interface(`files_read_etc_runtime_files',`
########################################
##
--## Create an object in the process ID directory (e.g., /var/run)
--## with a private type. Typically this is used for creating
++##
+## Create an object in the process ID directory (e.g., /var/run)
+## with a private type. Typically this is used for creating
- ## private PID files in /var/run with the private type instead
- ## of the general PID file type. To accomplish this goal,
- ## either the program must be SELinux-aware, or use this interface.
-@@ -6098,18 +7595,781 @@ interface(`files_write_generic_pid_pipes',`
- ## Related interfaces:
- ## U8N}@X6hO4wV`{w$5xlq7i
z6*1@(?^+1@Cp%vv)RAQ!gM6NrtZ~|-a-JsLI4U@0U#bVn@)zEb5@nXIf&@kxv$9SJ
zogu}=kQAdhCX}NsW{6M90LC;b#Ji|Qx>k<7=ir;`9>E8gULcX-Ygmywr@*yNGeT9D
zlA4SDn40>e#LLy^%Lvz{y_)Gj5&w%si78*ckY87_H4KT*jgMu%e7(B3;K-ucVP-YZ
zqY9aBqnbP!G4s((6ttk7Am%Kk3>DZZWr{9$lRgzO1-?0Pplw?XBtG_*0BKC#^`F
zu2Yi8%@cP$(zRT?!$hn)G9S3-K9)H
(QWsUZ=j&>nW)ZBp|k)-s-B;rX7
zd@c)0cPWdvMx(4;v1bUrN>c7j5c!UbDg`i_cnjWaIzwv
--##
++## Related interfaces: ++##
++##@@ -16693,11 +16723,9 @@ index f962f76..41b68a6 100644 +##
+##- ## Example usage with a domain that can create and --## write its PID file with a private PID file type in the --## /var/run directory: ++## ++##
++## Example usage with a domain that can create and +## write its spool file in the system spool file +## directories (/var/spool): +##
@@ -16706,7 +16734,7 @@ index f962f76..41b68a6 100644 +## files_spool_file(myfile_spool_t) +## allow mydomain_t myfile_spool_t:file { create_file_perms write_file_perms }; +## files_spool_filetrans(mydomain_t, myfile_spool_t, file) - ## ++## +## +## +##+-## Create an object in the process ID directory (e.g., /var/run) +-## with a private type. Typically this is used for creating +-## private PID files in /var/run with the private type instead +-## of the general PID file type. To accomplish this goal, +-## either the program must be SELinux-aware, or use this interface. +-##
+-##+-## Related interfaces: +-##
+-##+-## Example usage with a domain that can create and +-## write its PID file with a private PID file type in the +-## /var/run directory: +-##
+-##-## type mypidfile_t; -## files_pid_file(mypidfile_t) -## allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; @@ -17021,7 +17073,7 @@ index f962f76..41b68a6 100644 ##
##