From a0546c9d1cdff75ce79043bdb7a5c631454fc2f9 Mon Sep 17 00:00:00 2001 From: Dominick Grift Date: Thu, 5 Aug 2010 15:10:15 +0200 Subject: [PATCH] System layer xml fixes. Signed-off-by: Dominick Grift --- policy/modules/system/authlogin.if | 40 ++++++++++++++-------------- policy/modules/system/clock.if | 6 ++--- policy/modules/system/daemontools.if | 8 +++--- policy/modules/system/fstools.if | 12 ++++----- policy/modules/system/getty.if | 2 +- policy/modules/system/hostname.if | 4 +-- policy/modules/system/hotplug.if | 4 +-- policy/modules/system/init.if | 34 +++++++++++------------ policy/modules/system/ipsec.if | 22 +++++++-------- policy/modules/system/iptables.if | 8 +++--- policy/modules/system/iscsi.if | 2 +- policy/modules/system/kdump.if | 4 +-- policy/modules/system/libraries.if | 6 ++--- policy/modules/system/locallogin.if | 6 ++--- policy/modules/system/logging.if | 22 +++++++-------- policy/modules/system/lvm.if | 8 +++--- policy/modules/system/miscfiles.if | 10 +++---- policy/modules/system/modutils.if | 14 +++++----- policy/modules/system/mount.if | 10 +++---- policy/modules/system/netlabel.if | 4 +-- policy/modules/system/pcmcia.if | 6 ++--- policy/modules/system/raid.if | 4 +-- policy/modules/system/selinuxutil.if | 36 ++++++++++++------------- policy/modules/system/setrans.if | 2 +- policy/modules/system/sysnetwork.if | 32 +++++++++++----------- policy/modules/system/udev.if | 6 ++--- policy/modules/system/unconfined.if | 8 +++--- policy/modules/system/userdomain.if | 30 ++++++++++----------- policy/modules/system/xen.if | 6 ++--- 29 files changed, 178 insertions(+), 178 deletions(-) diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if index 54b98266..7fddc246 100644 --- a/policy/modules/system/authlogin.if +++ b/policy/modules/system/authlogin.if @@ -162,7 +162,7 @@ interface(`auth_login_pgm_domain',` ## ## ## -## The type of process using the login program as entry point. +## Domain allowed access. ## ## # @@ -180,7 +180,7 @@ interface(`auth_login_entry_type',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -205,7 +205,7 @@ interface(`auth_domtrans_login_program',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -332,7 +332,7 @@ interface(`auth_var_filetrans_cache',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -381,7 +381,7 @@ interface(`auth_domtrans_chk_passwd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -402,7 +402,7 @@ interface(`auth_domtrans_chkpwd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -446,7 +446,7 @@ interface(`auth_domtrans_upd_passwd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -582,7 +582,7 @@ interface(`auth_tunable_read_shadow',` ## ## ## -## The type of the domain to not audit. +## Domain to not audit. ## ## # @@ -800,7 +800,7 @@ interface(`auth_rw_lastlog',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -836,7 +836,7 @@ interface(`auth_signal_pam',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -978,7 +978,7 @@ interface(`auth_manage_pam_pid',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -1098,7 +1098,7 @@ interface(`auth_delete_pam_console_data',` ## ## ## -## The type of the domain perfoming this action. +## Domain allowed access. ## ## ## @@ -1123,7 +1123,7 @@ interface(`auth_read_all_dirs_except_shadow',` ## ## ## -## The type of the domain perfoming this action. +## Domain allowed access. ## ## ## @@ -1149,7 +1149,7 @@ interface(`auth_read_all_files_except_shadow',` ## ## ## -## The type of the domain perfoming this action. +## Domain allowed access. ## ## ## @@ -1174,7 +1174,7 @@ interface(`auth_read_all_symlinks_except_shadow',` ## ## ## -## The type of the domain perfoming this action. +## Domain allowed access. ## ## ## @@ -1200,7 +1200,7 @@ interface(`auth_relabel_all_files_except_shadow',` ## ## ## -## The type of the domain perfoming this action. +## Domain allowed access. ## ## ## @@ -1226,7 +1226,7 @@ interface(`auth_rw_all_files_except_shadow',` ## ## ## -## The type of the domain perfoming this action. +## Domain allowed access. ## ## ## @@ -1251,7 +1251,7 @@ interface(`auth_manage_all_files_except_shadow',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -1269,7 +1269,7 @@ interface(`auth_domtrans_utempter',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -1351,7 +1351,7 @@ interface(`auth_read_login_records',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## ## diff --git a/policy/modules/system/clock.if b/policy/modules/system/clock.if index 7bef6002..e2f6d932 100644 --- a/policy/modules/system/clock.if +++ b/policy/modules/system/clock.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`clock_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## @@ -50,7 +50,7 @@ interface(`clock_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/daemontools.if b/policy/modules/system/daemontools.if index feef778d..89cc088d 100644 --- a/policy/modules/system/daemontools.if +++ b/policy/modules/system/daemontools.if @@ -11,7 +11,7 @@ ## ## ## -## Domain allowed access to svc_start_t. +## Domain allowed access. ## ## # @@ -59,7 +59,7 @@ interface(`daemontools_service_domain',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -77,7 +77,7 @@ interface(`daemontools_domtrans_start',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -95,7 +95,7 @@ interface(`daemontools_domtrans_run',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if index 7f2eb65a..016a770b 100644 --- a/policy/modules/system/fstools.if +++ b/policy/modules/system/fstools.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`fstools_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## @@ -51,7 +51,7 @@ interface(`fstools_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -106,7 +106,7 @@ interface(`fstools_read_pipes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -125,7 +125,7 @@ interface(`fstools_relabelto_entry_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -143,7 +143,7 @@ interface(`fstools_manage_entry_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/getty.if b/policy/modules/system/getty.if index b2b003df..e4376aa9 100644 --- a/policy/modules/system/getty.if +++ b/policy/modules/system/getty.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/system/hostname.if b/policy/modules/system/hostname.if index 748af7db..187f04f8 100644 --- a/policy/modules/system/hostname.if +++ b/policy/modules/system/hostname.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`hostname_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/hotplug.if b/policy/modules/system/hotplug.if index 321d2e6b..40eb10c6 100644 --- a/policy/modules/system/hotplug.if +++ b/policy/modules/system/hotplug.if @@ -9,7 +9,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -139,7 +139,7 @@ interface(`hotplug_search_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if index 59f9068b..f6aafe72 100644 --- a/policy/modules/system/init.if +++ b/policy/modules/system/init.if @@ -420,7 +420,7 @@ interface(`init_ranged_system_domain',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -571,7 +571,7 @@ interface(`init_use_fds',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -730,7 +730,7 @@ interface(`init_dontaudit_rw_initctl',` ## ## ## -## The domain for which init scripts are an entrypoint. +## Domain allowed access. ## ## # cjp: added for gentoo integrated run_init @@ -748,7 +748,7 @@ interface(`init_script_file_entry_type',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -775,7 +775,7 @@ interface(`init_spec_domtrans_script',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -812,7 +812,7 @@ interface(`init_domtrans_script',` ## ## ## -## Domain to transition from. +## Domain allowed to transition. ## ## ## @@ -837,7 +837,7 @@ interface(`init_script_file_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -862,7 +862,7 @@ interface(`init_labeled_script_domtrans',` ## ## ## -## Domain allowed access +## Domain allowed to transition. ## ## # @@ -1064,7 +1064,7 @@ interface(`init_read_all_script_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1144,7 +1144,7 @@ interface(`init_use_script_fds',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1305,7 +1305,7 @@ interface(`init_rw_script_stream_sockets',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1429,7 +1429,7 @@ interface(`init_getattr_script_status_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1553,7 +1553,7 @@ interface(`init_read_utmp',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1591,7 +1591,7 @@ interface(`init_write_utmp',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1628,7 +1628,7 @@ interface(`init_rw_utmp',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1646,7 +1646,7 @@ interface(`init_dontaudit_rw_utmp',` ## ## ## -## Domain access allowed. +## Domain allowed access. ## ## # @@ -1666,7 +1666,7 @@ interface(`init_manage_utmp',` ## ## ## -## Domain access allowed. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if index dbaf373d..8232f911 100644 --- a/policy/modules/system/ipsec.if +++ b/policy/modules/system/ipsec.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -24,7 +24,7 @@ interface(`ipsec_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -43,7 +43,7 @@ interface(`ipsec_stream_connect',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -62,7 +62,7 @@ interface(`ipsec_stream_connect_racoon',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -80,7 +80,7 @@ interface(`ipsec_getattr_key_sockets',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -98,7 +98,7 @@ interface(`ipsec_exec_mgmt',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -175,7 +175,7 @@ interface(`ipsec_write_pid',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -194,7 +194,7 @@ interface(`ipsec_manage_pid',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -212,7 +212,7 @@ interface(`ipsec_domtrans_racoon',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -237,7 +237,7 @@ interface(`ipsec_run_racoon',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -255,7 +255,7 @@ interface(`ipsec_domtrans_setkey',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if index b8acdd63..5c94dfee 100644 --- a/policy/modules/system/iptables.if +++ b/policy/modules/system/iptables.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`iptables_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -76,7 +76,7 @@ interface(`iptables_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -134,7 +134,7 @@ interface(`iptables_read_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/iscsi.if b/policy/modules/system/iscsi.if index 88e3b32c..663a47b0 100644 --- a/policy/modules/system/iscsi.if +++ b/policy/modules/system/iscsi.if @@ -24,7 +24,7 @@ interface(`iscsid_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/kdump.if b/policy/modules/system/kdump.if index 19e65b83..4198ff5f 100644 --- a/policy/modules/system/kdump.if +++ b/policy/modules/system/kdump.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`kdump_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/system/libraries.if b/policy/modules/system/libraries.if index 33ffdb6c..d97d16da 100644 --- a/policy/modules/system/libraries.if +++ b/policy/modules/system/libraries.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`libs_domtrans_ldconfig',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -201,7 +201,7 @@ interface(`libs_search_lib',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/system/locallogin.if b/policy/modules/system/locallogin.if index 37292fd7..0e3c2a97 100644 --- a/policy/modules/system/locallogin.if +++ b/policy/modules/system/locallogin.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -28,7 +28,7 @@ interface(`locallogin_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -118,7 +118,7 @@ interface(`locallogin_link_keys',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if index a1d50587..c7cfb623 100644 --- a/policy/modules/system/logging.if +++ b/policy/modules/system/logging.if @@ -70,7 +70,7 @@ interface(`logging_send_audit_msgs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -150,7 +150,7 @@ interface(`logging_read_audit_log',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -169,7 +169,7 @@ interface(`logging_domtrans_auditctl',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -194,7 +194,7 @@ interface(`logging_run_auditctl',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -213,7 +213,7 @@ interface(`logging_domtrans_auditd',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -270,7 +270,7 @@ interface(`logging_domtrans_dispatcher',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # @@ -382,7 +382,7 @@ interface(`logging_manage_audit_log',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -421,7 +421,7 @@ interface(`logging_check_exec_syslog',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -570,7 +570,7 @@ interface(`logging_read_audit_config',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## ## @@ -686,7 +686,7 @@ interface(`logging_rw_generic_log_dirs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -848,7 +848,7 @@ interface(`logging_write_generic_logs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/system/lvm.if b/policy/modules/system/lvm.if index 779cc297..58bc27f2 100644 --- a/policy/modules/system/lvm.if +++ b/policy/modules/system/lvm.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -25,7 +25,7 @@ interface(`lvm_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -44,7 +44,7 @@ interface(`lvm_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## @@ -69,7 +69,7 @@ interface(`lvm_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if index a70ed725..17de2836 100644 --- a/policy/modules/system/miscfiles.if +++ b/policy/modules/system/miscfiles.if @@ -115,7 +115,7 @@ interface(`miscfiles_setattr_fonts_dirs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## ## @@ -134,7 +134,7 @@ interface(`miscfiles_dontaudit_setattr_fonts_dirs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## ## @@ -198,7 +198,7 @@ interface(`miscfiles_setattr_fonts_cache_dirs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -374,7 +374,7 @@ interface(`miscfiles_legacy_read_localization',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -573,7 +573,7 @@ interface(`miscfiles_exec_tetex_data',` ## ## ## -## Domain to be entered. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if index 5e3e8b9b..9c0faab1 100644 --- a/policy/modules/system/modutils.if +++ b/policy/modules/system/modutils.if @@ -126,7 +126,7 @@ interface(`modutils_manage_module_config',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -147,7 +147,7 @@ interface(`modutils_domtrans_insmod_uncond',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -170,7 +170,7 @@ interface(`modutils_domtrans_insmod',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -214,7 +214,7 @@ interface(`modutils_exec_insmod',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -233,7 +233,7 @@ interface(`modutils_domtrans_depmod',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -277,7 +277,7 @@ interface(`modutils_exec_depmod',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -296,7 +296,7 @@ interface(`modutils_domtrans_update_mods',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if index 2dda55de..8b5c1962 100644 --- a/policy/modules/system/mount.if +++ b/policy/modules/system/mount.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`mount_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## @@ -55,7 +55,7 @@ interface(`mount_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -139,7 +139,7 @@ interface(`mount_send_nfs_client_request',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -159,7 +159,7 @@ interface(`mount_domtrans_unconfined',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/netlabel.if b/policy/modules/system/netlabel.if index c0668b6c..8cfaa756 100644 --- a/policy/modules/system/netlabel.if +++ b/policy/modules/system/netlabel.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`netlabel_domtrans_mgmt',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/pcmcia.if b/policy/modules/system/pcmcia.if index fffe97b7..aef445d3 100644 --- a/policy/modules/system/pcmcia.if +++ b/policy/modules/system/pcmcia.if @@ -22,7 +22,7 @@ interface(`pcmcia_stub',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -58,7 +58,7 @@ interface(`pcmcia_use_cardmgr_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -77,7 +77,7 @@ interface(`pcmcia_domtrans_cardctl',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/raid.if b/policy/modules/system/raid.if index b3c7bfbc..c817fda7 100644 --- a/policy/modules/system/raid.if +++ b/policy/modules/system/raid.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -33,7 +33,7 @@ interface(`raid_domtrans_mdadm',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if index 95772b03..170e2c72 100644 --- a/policy/modules/system/selinuxutil.if +++ b/policy/modules/system/selinuxutil.if @@ -6,7 +6,7 @@ ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -28,7 +28,7 @@ interface(`seutil_domtrans_checkpolicy',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -74,7 +74,7 @@ interface(`seutil_exec_checkpolicy',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -95,7 +95,7 @@ interface(`seutil_domtrans_loadpolicy',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -158,7 +158,7 @@ interface(`seutil_read_loadpolicy',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -180,7 +180,7 @@ interface(`seutil_domtrans_newrole',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -228,7 +228,7 @@ interface(`seutil_exec_newrole',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -311,7 +311,7 @@ interface(`seutil_dontaudit_use_newrole_fds',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -328,7 +328,7 @@ interface(`seutil_domtrans_restorecon',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -365,7 +365,7 @@ interface(`seutil_exec_restorecon',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -391,7 +391,7 @@ interface(`seutil_domtrans_runinit',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -415,7 +415,7 @@ interface(`seutil_init_script_domtrans_runinit',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -456,7 +456,7 @@ interface(`seutil_run_runinit',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -502,7 +502,7 @@ interface(`seutil_use_runinit_fds',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -524,7 +524,7 @@ interface(`seutil_domtrans_setfiles',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -803,7 +803,7 @@ interface(`seutil_read_file_contexts',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## ## @@ -1015,7 +1015,7 @@ interface(`seutil_domtrans_semanage',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -1141,7 +1141,7 @@ interface(`seutil_libselinux_linked',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/system/setrans.if b/policy/modules/system/setrans.if index 8de660e3..efa9c27f 100644 --- a/policy/modules/system/setrans.if +++ b/policy/modules/system/setrans.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if index 3c2e4459..8e71fb7a 100644 --- a/policy/modules/system/sysnetwork.if +++ b/policy/modules/system/sysnetwork.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -26,7 +26,7 @@ interface(`sysnet_domtrans_dhcpc',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## @@ -69,7 +69,7 @@ interface(`sysnet_run_dhcpc',` ## ## ## -## The domain sending the SIGCHLD. +## Domain to not audit. ## ## # @@ -87,7 +87,7 @@ interface(`sysnet_dontaudit_use_dhcpc_fds',` ## ## ## -## The domain sending the SIGCHLD. +## Domain allowed access. ## ## # @@ -105,7 +105,7 @@ interface(`sysnet_sigchld_dhcpc',` ## ## ## -## The domain sending the SIGKILL. +## Domain allowed access. ## ## ## @@ -124,7 +124,7 @@ interface(`sysnet_kill_dhcpc',` ## ## ## -## The domain sending the SIGSTOP. +## Domain allowed access. ## ## # @@ -142,7 +142,7 @@ interface(`sysnet_sigstop_dhcpc',` ## ## ## -## The domain sending the null signal. +## Domain allowed access. ## ## # @@ -160,7 +160,7 @@ interface(`sysnet_signull_dhcpc',` ## ## ## -## The domain sending the signal. +## Domain allowed access. ## ## ## @@ -200,7 +200,7 @@ interface(`sysnet_dbus_chat_dhcpc',` ## ## ## -## The domain allowed access. +## Domain allowed access. ## ## # @@ -219,7 +219,7 @@ interface(`sysnet_rw_dhcp_config',` ## ## ## -## The domain allowed access. +## Domain allowed access. ## ## # @@ -376,7 +376,7 @@ interface(`sysnet_create_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -394,7 +394,7 @@ interface(`sysnet_etc_filetrans_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -416,7 +416,7 @@ interface(`sysnet_manage_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -435,7 +435,7 @@ interface(`sysnet_read_dhcpc_pid',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -453,7 +453,7 @@ interface(`sysnet_delete_dhcpc_pid',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -474,7 +474,7 @@ interface(`sysnet_domtrans_ifconfig',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## diff --git a/policy/modules/system/udev.if b/policy/modules/system/udev.if index bfc4c75e..025348a4 100644 --- a/policy/modules/system/udev.if +++ b/policy/modules/system/udev.if @@ -24,7 +24,7 @@ interface(`udev_signal',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -60,7 +60,7 @@ interface(`udev_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # @@ -199,7 +199,7 @@ interface(`udev_read_db',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if index c11cb30e..416e6685 100644 --- a/policy/modules/system/unconfined.if +++ b/policy/modules/system/unconfined.if @@ -185,7 +185,7 @@ interface(`unconfined_execmem_alias_program',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -203,7 +203,7 @@ interface(`unconfined_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## ## @@ -227,7 +227,7 @@ interface(`unconfined_run',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -413,7 +413,7 @@ interface(`unconfined_read_pipes',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 4a503570..8b4f6d83 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1356,7 +1356,7 @@ interface(`userdom_getattr_user_home_dirs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1543,7 +1543,7 @@ interface(`userdom_home_filetrans_user_home_dir',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## ## @@ -1643,7 +1643,7 @@ interface(`userdom_delete_user_home_content_dirs',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1837,7 +1837,7 @@ interface(`userdom_exec_user_home_content_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1877,7 +1877,7 @@ interface(`userdom_manage_user_home_content_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -2493,7 +2493,7 @@ interface(`userdom_getattr_user_ttys',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -2529,7 +2529,7 @@ interface(`userdom_setattr_user_ttys',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -2620,7 +2620,7 @@ interface(`userdom_use_user_terminals',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -2641,7 +2641,7 @@ interface(`userdom_dontaudit_use_user_terminals',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -2664,7 +2664,7 @@ interface(`userdom_spec_domtrans_all_users',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -2687,7 +2687,7 @@ interface(`userdom_xsession_spec_domtrans_all_users',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -2710,7 +2710,7 @@ interface(`userdom_spec_domtrans_unpriv_users',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -2770,7 +2770,7 @@ interface(`userdom_manage_unpriv_user_shared_mem',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # @@ -2934,7 +2934,7 @@ interface(`userdom_relabelto_user_ptys',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -2970,7 +2970,7 @@ interface(`userdom_write_user_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/system/xen.if b/policy/modules/system/xen.if index 086e8c63..77d41b64 100644 --- a/policy/modules/system/xen.if +++ b/policy/modules/system/xen.if @@ -24,7 +24,7 @@ interface(`xen_domtrans',` ## ## ## -## Domain to not audit. +## Domain allowed access. ## ## # @@ -83,7 +83,7 @@ interface(`xen_read_image_files',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # @@ -104,7 +104,7 @@ interface(`xen_rw_image_files',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## #