update api docs

This commit is contained in:
Chris PeBenito 2006-03-07 14:35:03 +00:00
parent 0fc3e1b773
commit af3dd8da28
171 changed files with 27485 additions and 15073 deletions

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -159,6 +171,16 @@
anaconda</a></td>
<td><p>Policy for the Anaconda installer.</p></td>
<tr><td>
<a href='admin_bootloader.html'>
bootloader</a></td>
<td><p>Policy for the kernel modules, kernel image, and bootloader.</p></td>
<tr><td>
<a href='admin_certwatch.html'>
certwatch</a></td>
<td><p>Digital Certificate Tracking</p></td>
<tr><td>
<a href='admin_consoletype.html'>
consoletype</a></td>
@ -204,11 +226,24 @@ after installation of Red Hat/Fedora systems.
logwatch</a></td>
<td><p>System log analyzer and reporter</p></td>
<tr><td>
<a href='admin_mrtg.html'>
mrtg</a></td>
<td><p>Network traffic graphing</p></td>
<tr><td>
<a href='admin_netutils.html'>
netutils</a></td>
<td><p>Network analysis utilities</p></td>
<tr><td>
<a href='admin_portage.html'>
portage</a></td>
<td><p>
Portage Package Management System. The primary package management and
distribution system for Gentoo.
</p></td>
<tr><td>
<a href='admin_prelink.html'>
prelink</a></td>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Transition to the accounting management domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -213,9 +225,9 @@ Execute accounting management tools in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -255,9 +267,9 @@ Execute accounting management data in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -297,9 +309,9 @@ Create, read, write, and delete process accounting data.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Domain transition to alsa
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -213,9 +225,9 @@ Allow read and write access to alsa semaphores.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -255,9 +267,9 @@ Allow read and write access to alsa shared memory.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -140,6 +152,48 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_amanda_append_log_files"></a>
<div id="interface">
<div id="codeblock">
<b>amanda_append_log_files</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow read/writing amanda logs
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to allow
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_amanda_domtrans_recover"></a>
<div id="interface">
@ -171,9 +225,9 @@ Execute amrecover in the amanda_recover domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -213,9 +267,9 @@ Do not audit attempts to read /etc/dumpdates.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -272,9 +326,9 @@ allow the specified role the amanda_recover domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -282,9 +336,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the amanda_recover domain.
</p>
</td><td>
No
</td></tr>
@ -292,9 +346,51 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the amanda_recover domain to use.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_amanda_rw_dumpdates_files"></a>
<div id="interface">
<div id="codeblock">
<b>amanda_rw_dumpdates_files</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow read/writing /etc/dumpdates.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to allow
</p>
</td><td>
No
</td></tr>
@ -334,9 +430,9 @@ Search amanda library directories.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>

View File

@ -0,0 +1,455 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_acct.html'>
acct</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_alsa.html'>
alsa</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_amanda.html'>
amanda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_ddcprobe.html'>
ddcprobe</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmesg.html'>
dmesg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmidecode.html'>
dmidecode</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_firstboot.html'>
firstboot</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_kudzu.html'>
kudzu</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logrotate.html'>
logrotate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_quota.html'>
quota</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_readahead.html'>
readahead</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_rpm.html'>
rpm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_su.html'>
su</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_sudo.html'>
sudo</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_tmpreaper.html'>
tmpreaper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_updfstab.html'>
updfstab</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usbmodules.html'>
usbmodules</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usermanage.html'>
usermanage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vbetool.html'>
vbetool</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vpn.html'>
vpn</a><br/>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: admin</h1><p/>
<h2>Module: bootloader</h2><p/>
<h3>Description:</h3>
<p><p>Policy for the kernel modules, kernel image, and bootloader.</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_bootloader_create_runtime_file"></a>
<div id="interface">
<div id="codeblock">
<b>bootloader_create_runtime_file</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the bootloader
temporary data in /tmp.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_bootloader_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>bootloader_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute bootloader in the bootloader domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_bootloader_read_config"></a>
<div id="interface">
<div id="codeblock">
<b>bootloader_read_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the bootloader configuration file.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_bootloader_run"></a>
<div id="interface">
<div id="codeblock">
<b>bootloader_run</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute bootloader interactively and do
a domain transition to the bootloader domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to be allowed the bootloader domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the bootloader domain to use.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_bootloader_rw_config"></a>
<div id="interface">
<div id="codeblock">
<b>bootloader_rw_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the bootloader
configuration file.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_bootloader_rw_tmp_files"></a>
<div id="interface">
<div id="codeblock">
<b>bootloader_rw_tmp_files</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the bootloader
temporary data in /tmp.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -0,0 +1,286 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_acct.html'>
acct</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_alsa.html'>
alsa</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_amanda.html'>
amanda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_ddcprobe.html'>
ddcprobe</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmesg.html'>
dmesg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmidecode.html'>
dmidecode</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_firstboot.html'>
firstboot</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_kudzu.html'>
kudzu</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logrotate.html'>
logrotate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_quota.html'>
quota</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_readahead.html'>
readahead</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_rpm.html'>
rpm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_su.html'>
su</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_sudo.html'>
sudo</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_tmpreaper.html'>
tmpreaper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_updfstab.html'>
updfstab</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usbmodules.html'>
usbmodules</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usermanage.html'>
usermanage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vbetool.html'>
vbetool</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vpn.html'>
vpn</a><br/>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: admin</h1><p/>
<h2>Module: certwatch</h2><p/>
<h3>Description:</h3>
<p><p>Digital Certificate Tracking</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_certwatach_run"></a>
<div id="interface">
<div id="codeblock">
<b>certwatach_run</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute certwatch in the certwatch domain, and
allow the specified role the certwatch domain,
and use the caller's terminal. Has a sigchld
backchannel.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to be allowed the certwatch domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the certwatch domain to use.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_certwatch_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>certwatch_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Domain transition to certwatch.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -173,9 +185,9 @@ Execute consoletype in the consoletype domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -215,9 +227,88 @@ Execute consoletype in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_consoletype_run"></a>
<div id="interface">
<div id="codeblock">
<b>consoletype_run</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute consoletype in the consoletype domain, and
allow the specified role the consoletype domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to be allowed the consoletype domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the consoletype domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute ddcprobe in the ddcprobe domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -230,9 +242,9 @@ allow the specified role the ddcprobe domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -240,9 +252,9 @@ No
<tr><td>
role
</td><td>
<p>
Role to be authenticated for ddcprobe domain.
</p>
</td><td>
No
</td></tr>
@ -250,9 +262,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the clock domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute dmesg in the dmesg domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -213,9 +225,9 @@ Execute dmesg in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute dmidecode in the dmidecode domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -230,9 +242,9 @@ allow the specified role the dmidecode domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -240,9 +252,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the dmidecode domain.
</p>
</td><td>
No
</td></tr>
@ -250,9 +262,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the dmidecode domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -174,9 +186,9 @@ Execute firstboot in the firstboot domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -185,13 +197,13 @@ No
</div>
</div>
<a name="link_firstboot_dontaudit_use_fd"></a>
<a name="link_firstboot_dontaudit_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>firstboot_dontaudit_use_fd</b>(
<b>firstboot_dontaudit_use_fds</b>(
@ -217,9 +229,9 @@ file descriptor from firstboot.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -276,9 +288,9 @@ allow the specified role the firstboot domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -286,9 +298,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the firstboot domain.
</p>
</td><td>
No
</td></tr>
@ -296,9 +308,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the firstboot domain to use.
</p>
</td><td>
No
</td></tr>
@ -307,13 +319,13 @@ No
</div>
</div>
<a name="link_firstboot_use_fd"></a>
<a name="link_firstboot_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>firstboot_use_fd</b>(
<b>firstboot_use_fds</b>(
@ -338,9 +350,9 @@ Inherit and use a file descriptor from firstboot.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -349,13 +361,13 @@ No
</div>
</div>
<a name="link_firstboot_write_pipe"></a>
<a name="link_firstboot_write_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>firstboot_write_pipe</b>(
<b>firstboot_write_pipes</b>(
@ -380,9 +392,9 @@ Write to a firstboot unnamed pipe.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute kudzu in the kudzu domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -182,13 +194,13 @@ No
</div>
</div>
<a name="link_kudzu_getattr_exec_file"></a>
<a name="link_kudzu_getattr_exec_files"></a>
<div id="interface">
<div id="codeblock">
<b>kudzu_getattr_exec_file</b>(
<b>kudzu_getattr_exec_files</b>(
@ -213,9 +225,9 @@ Get attributes of kudzu executable.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -272,9 +284,9 @@ allow the specified role the kudzu domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -282,9 +294,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the kudzu domain.
</p>
</td><td>
No
</td></tr>
@ -292,9 +304,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the kudzu domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute logrotate in the logrotate domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -182,13 +194,13 @@ No
</div>
</div>
<a name="link_logrotate_dontaudit_use_fd"></a>
<a name="link_logrotate_dontaudit_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>logrotate_dontaudit_use_fd</b>(
<b>logrotate_dontaudit_use_fds</b>(
@ -213,9 +225,9 @@ Do not audit attempts to inherit logrotate file descriptors.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -255,9 +267,9 @@ Execute logrotate in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -297,9 +309,9 @@ Read a logrotate temporary files.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -356,9 +368,9 @@ allow the specified role the logrotate domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -366,9 +378,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the logrotate domain.
</p>
</td><td>
No
</td></tr>
@ -376,9 +388,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the logrotate domain to use.
</p>
</td><td>
No
</td></tr>
@ -387,13 +399,13 @@ No
</div>
</div>
<a name="link_logrotate_use_fd"></a>
<a name="link_logrotate_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>logrotate_use_fd</b>(
<b>logrotate_use_fds</b>(
@ -418,9 +430,9 @@ Inherit and use logrotate file descriptors.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Read logwatch temporary files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -0,0 +1,205 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_acct.html'>
acct</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_alsa.html'>
alsa</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_amanda.html'>
amanda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_ddcprobe.html'>
ddcprobe</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmesg.html'>
dmesg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmidecode.html'>
dmidecode</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_firstboot.html'>
firstboot</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_kudzu.html'>
kudzu</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logrotate.html'>
logrotate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_quota.html'>
quota</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_readahead.html'>
readahead</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_rpm.html'>
rpm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_su.html'>
su</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_sudo.html'>
sudo</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_tmpreaper.html'>
tmpreaper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_updfstab.html'>
updfstab</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usbmodules.html'>
usbmodules</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usermanage.html'>
usermanage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vbetool.html'>
vbetool</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vpn.html'>
vpn</a><br/>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: admin</h1><p/>
<h2>Module: mrtg</h2><p/>
<h3>Description:</h3>
<p><p>Network traffic graphing</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_mrtg_append_create_logs"></a>
<div id="interface">
<div id="codeblock">
<b>mrtg_append_create_logs</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create and append mrtg logs.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute network utilities in the netutils domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -213,9 +225,9 @@ Execute ping in the ping domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -255,9 +267,9 @@ Execute traceroute in the traceroute domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -297,9 +309,9 @@ Execute network utilities in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -339,9 +351,9 @@ Execute ping in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -381,9 +393,9 @@ Execute traceroute in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -440,9 +452,9 @@ allow the specified role the netutils domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -450,9 +462,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the netutils domain.
</p>
</td><td>
No
</td></tr>
@ -460,9 +472,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the netutils domain to use.
</p>
</td><td>
No
</td></tr>
@ -519,9 +531,9 @@ allow the specified role the ping domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -529,9 +541,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the ping domain.
</p>
</td><td>
No
</td></tr>
@ -539,9 +551,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the ping domain to use.
</p>
</td><td>
No
</td></tr>
@ -598,9 +610,9 @@ allow the specified role the ping domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -608,9 +620,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the ping domain.
</p>
</td><td>
No
</td></tr>
@ -618,9 +630,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the ping domain to use.
</p>
</td><td>
No
</td></tr>
@ -677,9 +689,9 @@ allow the specified role the traceroute domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -687,9 +699,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the traceroute domain.
</p>
</td><td>
No
</td></tr>
@ -697,9 +709,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the traceroute domain to use.
</p>
</td><td>
No
</td></tr>
@ -756,9 +768,9 @@ allow the specified role the traceroute domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -766,9 +778,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the traceroute domain.
</p>
</td><td>
No
</td></tr>
@ -776,9 +788,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the traceroute domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -0,0 +1,346 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_acct.html'>
acct</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_alsa.html'>
alsa</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_amanda.html'>
amanda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_ddcprobe.html'>
ddcprobe</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmesg.html'>
dmesg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_dmidecode.html'>
dmidecode</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_firstboot.html'>
firstboot</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_kudzu.html'>
kudzu</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logrotate.html'>
logrotate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_quota.html'>
quota</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_readahead.html'>
readahead</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_rpm.html'>
rpm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_su.html'>
su</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_sudo.html'>
sudo</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_tmpreaper.html'>
tmpreaper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_updfstab.html'>
updfstab</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usbmodules.html'>
usbmodules</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_usermanage.html'>
usermanage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vbetool.html'>
vbetool</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_vpn.html'>
vpn</a><br/>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: admin</h1><p/>
<h2>Module: portage</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>
Portage Package Management System. The primary package management and
distribution system for Gentoo.
</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_portage_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>portage_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute emerge in the portage domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_portage_run"></a>
<div id="interface">
<div id="codeblock">
<b>portage_run</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute emerge in the portage domain, and
allow the specified role the portage domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to allow the portage domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow for portage to use.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_portage_compile_domain_template"></a>
<div id="template">
<div id="codeblock">
<b>portage_compile_domain_template</b>(
prefix
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Template for portage sandbox.
</p>
<h5>Description</h5>
<p>
</p><p>
Template for portage sandbox. Portage
does all compiling in the sandbox.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
prefix
</td><td>
<p>
Name to be used to derive types.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Delete the prelink cache.
<tr><td>
file_type
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -213,9 +225,9 @@ Execute the prelink program in the prelink domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -256,9 +268,9 @@ prelink log files.
<tr><td>
file_type
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -298,9 +310,9 @@ Make the specified file type prelinkable.
<tr><td>
file_type
</td><td>
<p>
File type to be prelinked.
</p>
</td><td>
No
</td></tr>
@ -340,9 +352,9 @@ Read the prelink cache.
<tr><td>
file_type
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute quota management tools in the quota domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -214,9 +226,9 @@ of filesystem quota data files.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -256,9 +268,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -315,9 +327,9 @@ allow the specified role the quota domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -325,9 +337,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the quota domain.
</p>
</td><td>
No
</td></tr>
@ -335,9 +347,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the quota domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,51 @@ Execute rpm programs in the rpm domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_rpm_domtrans_script"></a>
<div id="interface">
<div id="codeblock">
<b>rpm_domtrans_script</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute rpm_script programs in the rpm_script domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -214,9 +268,9 @@ write, and delete the RPM package database.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -256,9 +310,9 @@ Create, read, write, and delete the RPM package database.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -298,9 +352,9 @@ Create, read, write, and delete the RPM log.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -340,9 +394,9 @@ Read the RPM package database.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -351,13 +405,13 @@ No
</div>
</div>
<a name="link_rpm_read_pipe"></a>
<a name="link_rpm_read_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>rpm_read_pipe</b>(
<b>rpm_read_pipes</b>(
@ -382,9 +436,9 @@ Read from an unnamed RPM pipe.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -440,9 +494,9 @@ Execute RPM programs in the RPM domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -450,9 +504,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to allow the RPM domain.
</p>
</td><td>
No
</td></tr>
@ -460,9 +514,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the RPM domain to use.
</p>
</td><td>
No
</td></tr>
@ -471,13 +525,13 @@ No
</div>
</div>
<a name="link_rpm_rw_pipe"></a>
<a name="link_rpm_rw_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>rpm_rw_pipe</b>(
<b>rpm_rw_pipes</b>(
@ -502,51 +556,9 @@ Read and write an unnamed RPM pipe.
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_rpm_script_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>rpm_script_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute rpm_script programs in the rpm_script domain.
The type of the process performing this action.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
@ -555,13 +567,13 @@ No
</div>
</div>
<a name="link_rpm_use_fd"></a>
<a name="link_rpm_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>rpm_use_fd</b>(
<b>rpm_use_fds</b>(
@ -586,9 +598,9 @@ Inherit and use file descriptors from RPM.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -597,13 +609,13 @@ No
</div>
</div>
<a name="link_rpm_use_script_fd"></a>
<a name="link_rpm_use_script_fds"></a>
<div id="interface">
<div id="codeblock">
<b>rpm_use_script_fd</b>(
<b>rpm_use_script_fds</b>(
@ -628,9 +640,9 @@ Inherit and use file descriptors from RPM scripts.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -174,9 +186,9 @@ Execute su in the caller domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -253,10 +265,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -264,9 +276,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -274,9 +286,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>
@ -316,9 +328,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -202,10 +214,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -213,9 +225,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -223,9 +235,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute tmpreaper in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute updfstab in the updfstab domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute usbmodules in the usbmodules domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -231,9 +243,9 @@ and use the caller's terminal.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -241,9 +253,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the usbmodules domain.
</p>
</td><td>
No
</td></tr>
@ -251,9 +263,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the usbmodules domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -172,9 +184,9 @@ the admin passwd domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -214,9 +226,9 @@ Execute chfn in the chfn domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -256,9 +268,9 @@ Execute groupadd in the groupadd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -298,9 +310,9 @@ Execute passwd in the passwd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -340,9 +352,9 @@ Execute useradd in the useradd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -382,9 +394,9 @@ Read the crack database.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -442,9 +454,9 @@ the admin passwd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -452,9 +464,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the admin passwd domain.
</p>
</td><td>
No
</td></tr>
@ -462,9 +474,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the admin passwd domain to use.
</p>
</td><td>
No
</td></tr>
@ -521,9 +533,9 @@ allow the specified role the chfn domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -531,9 +543,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the chfn domain.
</p>
</td><td>
No
</td></tr>
@ -541,9 +553,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the chfn domain to use.
</p>
</td><td>
No
</td></tr>
@ -600,9 +612,9 @@ allow the specified role the groupadd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -610,9 +622,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the groupadd domain.
</p>
</td><td>
No
</td></tr>
@ -620,9 +632,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the groupadd domain to use.
</p>
</td><td>
No
</td></tr>
@ -679,9 +691,9 @@ allow the specified role the passwd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -689,9 +701,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the passwd domain.
</p>
</td><td>
No
</td></tr>
@ -699,9 +711,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the passwd domain to use.
</p>
</td><td>
No
</td></tr>
@ -758,9 +770,9 @@ allow the specified role the useradd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -768,9 +780,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the useradd domain.
</p>
</td><td>
No
</td></tr>
@ -778,9 +790,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the useradd domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -151,12 +163,8 @@
[
domain
]
)<br>
</div>
@ -175,11 +183,11 @@ Execute vbetool application in the vbetool domain.
<tr><td>
domain
</td><td>
<p>
N/A
</p>
</td><td>
yes
Yes
</td></tr>
</table>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -171,9 +183,9 @@ Execute VPN clients in the vpnc domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -230,9 +242,9 @@ allow the specified role the vpnc domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -240,9 +252,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the vpnc domain.
</p>
</td><td>
No
</td></tr>
@ -250,9 +262,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the vpnc domain to use.
</p>
</td><td>
No
</td></tr>
@ -292,9 +304,9 @@ Send generic signals to VPN clients.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -122,6 +140,11 @@
lockdev</a></td>
<td><p>device locking policy for lockdev</p></td>
<tr><td>
<a href='apps_mono.html'>
mono</a></td>
<td><p>Run .NET server and client applications on Linux.</p></td>
<tr><td>
<a href='apps_screen.html'>
screen</a></td>
@ -132,11 +155,36 @@
slocate</a></td>
<td><p>Update database for mlocate</p></td>
<tr><td>
<a href='apps_tvtime.html'>
tvtime</a></td>
<td><p> tvtime - a high quality television application </p></td>
<tr><td>
<a href='apps_uml.html'>
uml</a></td>
<td><p>Policy for UML</p></td>
<tr><td>
<a href='apps_userhelper.html'>
userhelper</a></td>
<td><p>SELinux utility to run a shell with a new role</p></td>
<tr><td>
<a href='apps_usernetctl.html'>
usernetctl</a></td>
<td><p>User network interface configuration helper</p></td>
<tr><td>
<a href='apps_webalizer.html'>
webalizer</a></td>
<td><p>Web server log analysis</p></td>
<tr><td>
<a href='apps_wine.html'>
wine</a></td>
<td><p>Wine Is Not an Emulator. Run Windows programs in Linux.</p></td>
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -153,10 +171,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -164,9 +182,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -174,9 +192,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -112,7 +130,7 @@
userdomain_prefix
userdomain
@ -120,7 +138,7 @@
domain
role
)<br>
@ -155,31 +173,30 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
<tr><td>
userdomain_prefix
userdomain
</td><td>
The prefix of the user domain (e.g., user
is the prefix for user_t).
<p>
The user domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
domain
role
</td><td>
The type of the process performing this action.
<p>
The role associated with the user.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -153,10 +171,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -164,9 +182,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -174,9 +192,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -83,12 +101,63 @@
<h1>Layer: apps</h1><p/>
<h2>Module: java</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>Java virtual machine</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_java_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>java_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute the java program in the java domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
@ -153,10 +222,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -164,9 +233,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -174,9 +243,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -123,9 +141,9 @@ Execute the loadkeys program in the loadkeys domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -165,9 +183,9 @@ Execute the loadkeys program in the caller domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -223,9 +241,9 @@ Execute the loadkeys program in the loadkeys domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -233,9 +251,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to allow the loadkeys domain.
</p>
</td><td>
No
</td></tr>
@ -243,9 +261,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the loadkeys domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -154,10 +172,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -165,9 +183,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -175,9 +193,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

163
www/api-docs/apps_mono.html Normal file
View File

@ -0,0 +1,163 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_cdrecord.html'>
cdrecord</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_gpg.html'>
gpg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_irc.html'>
irc</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_java.html'>
java</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_loadkeys.html'>
loadkeys</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: apps</h1><p/>
<h2>Module: mono</h2><p/>
<h3>Description:</h3>
<p><p>Run .NET server and client applications on Linux.</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_mono_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>mono_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute the mono program in the mono domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -153,10 +171,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -164,9 +182,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -174,9 +192,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -123,9 +141,9 @@ Create the locate log with append mode.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -0,0 +1,213 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_cdrecord.html'>
cdrecord</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_gpg.html'>
gpg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_irc.html'>
irc</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_java.html'>
java</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_loadkeys.html'>
loadkeys</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: apps</h1><p/>
<h2>Module: tvtime</h2><p/>
<h3>Description:</h3>
<p><p> tvtime - a high quality television application </p></p>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_tvtime_per_userdomain_template"></a>
<div id="template">
<div id="codeblock">
<b>tvtime_per_userdomain_template</b>(
userdomain_prefix
,
user_domain
,
user_role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
The per user domain template for the tvtime module.
</p>
<h5>Description</h5>
<p>
</p><p>
This template creates a derived domains which are used
for tvtime.
</p><p>
</p><p>
This template is invoked automatically for each user, and
generally does not need to be invoked directly
by policy writers.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

306
www/api-docs/apps_uml.html Normal file
View File

@ -0,0 +1,306 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_cdrecord.html'>
cdrecord</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_gpg.html'>
gpg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_irc.html'>
irc</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_java.html'>
java</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_loadkeys.html'>
loadkeys</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: apps</h1><p/>
<h2>Module: uml</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>Policy for UML</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_uml_manage_util_files"></a>
<div id="interface">
<div id="codeblock">
<b>uml_manage_util_files</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Manage uml utility files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_uml_setattr_util_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>uml_setattr_util_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Set attributes on uml utility socket files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_uml_per_userdomain_template"></a>
<div id="template">
<div id="codeblock">
<b>uml_per_userdomain_template</b>(
userdomain_prefix
,
user_domain
,
user_role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
The per user domain template for the uml module.
</p>
<h5>Description</h5>
<p>
</p><p>
This template creates a derived domains which are used
for uml program.
</p><p>
</p><p>
This template is invoked automatically for each user, and
generally does not need to be invoked directly
by policy writers.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -0,0 +1,307 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_cdrecord.html'>
cdrecord</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_gpg.html'>
gpg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_irc.html'>
irc</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_java.html'>
java</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_loadkeys.html'>
loadkeys</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: apps</h1><p/>
<h2>Module: userhelper</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>SELinux utility to run a shell with a new role</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_userhelper_dontaudit_search_config"></a>
<div id="interface">
<div id="codeblock">
<b>userhelper_dontaudit_search_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to search
the userhelper configuration directory.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_userhelper_search_config"></a>
<div id="interface">
<div id="codeblock">
<b>userhelper_search_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Search the userhelper configuration directory.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_userhelper_per_userdomain_template"></a>
<div id="template">
<div id="codeblock">
<b>userhelper_per_userdomain_template</b>(
userdomain_prefix
,
user_domain
,
user_role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
The per user domain template for the userhelper module.
</p>
<h5>Description</h5>
<p>
</p><p>
This template creates a derived domains which are used
for userhelper.
</p><p>
</p><p>
This template is invoked automatically for each user, and
generally does not need to be invoked directly
by policy writers.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -0,0 +1,242 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_cdrecord.html'>
cdrecord</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_gpg.html'>
gpg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_irc.html'>
irc</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_java.html'>
java</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_loadkeys.html'>
loadkeys</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: apps</h1><p/>
<h2>Module: usernetctl</h2><p/>
<h3>Description:</h3>
<p><p>User network interface configuration helper</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_usernetctl_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>usernetctl_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute usernetctl in the usernetctl domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_usernetctl_run"></a>
<div id="interface">
<div id="codeblock">
<b>usernetctl_run</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute usernetctl in the usernetctl domain, and
allow the specified role the usernetctl domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to be allowed the usernetctl domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the usernetctl domain to use.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -37,15 +37,33 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
@ -123,9 +141,9 @@ Execute webalizer in the webalizer domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -182,9 +200,9 @@ allow the specified role the webalizer domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -192,9 +210,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the webalizer domain.
</p>
</td><td>
No
</td></tr>
@ -202,9 +220,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the webalizer domain to use.
</p>
</td><td>
No
</td></tr>

163
www/api-docs/apps_wine.html Normal file
View File

@ -0,0 +1,163 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_cdrecord.html'>
cdrecord</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_gpg.html'>
gpg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_irc.html'>
irc</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_java.html'>
java</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_loadkeys.html'>
loadkeys</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: apps</h1><p/>
<h2>Module: wine</h2><p/>
<h3>Description:</h3>
<p><p>Wine Is Not an Emulator. Run Windows programs in Linux.</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_wine_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>wine_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute the wine program in the wine domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -112,24 +124,39 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -151,6 +178,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -400,12 +430,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -512,8 +542,13 @@
<p>false</p>
<h5>Description</h5>
<p><p>
Enabling secure mode disallows programs, such asnewrole, from transitioning to administrativeuser domains.</p></p>
<p>
</p><p>
Enabling secure mode disallows programs, such as
newrole, from transitioning to administrative
user domains.
</p><p>
</p>
</div></div>
@ -524,8 +559,11 @@ Enabling secure mode disallows programs, such asnewrole, from transitioning to a
<p>false</p>
<h5>Description</h5>
<p><p>
Disable transitions to insmod.</p></p>
<p>
</p><p>
Disable transitions to insmod.
</p><p>
</p>
</div></div>
@ -536,8 +574,13 @@ Disable transitions to insmod.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
boolean to determine whether the system permits loading policy, settingenforcing mode, and changing boolean values. Set this to true and youhave to reboot to set it back</p></p>
<p>
</p><p>
boolean to determine whether the system permits loading policy, setting
enforcing mode, and changing boolean values. Set this to true and you
have to reboot to set it back
</p><p>
</p>
</div></div>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -112,24 +124,39 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -151,6 +178,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -400,12 +430,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -512,8 +542,26 @@
<p>false</p>
<h5>Description</h5>
<p><p>
Allow cvs daemon to read shadow</p></p>
<p>
</p><p>
Allow cvs daemon to read shadow
</p><p>
</p>
</div></div>
<div id="interface">
<div id="codeblock">allow_execheap</div>
<div id="description">
<h5>Default value</h5>
<p>false</p>
<h5>Description</h5>
<p>
</p><p>
Allow making the heap executable.
</p><p>
</p>
</div></div>
@ -524,8 +572,12 @@ Allow cvs daemon to read shadow</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.</p></p>
<p>
</p><p>
Allow making anonymous memory executable, e.g.
for runtime-code generation or executable stack.
</p><p>
</p>
</div></div>
@ -536,8 +588,12 @@ Allow making anonymous memory executable, e.g.for runtime-code generation or exe
<p>false</p>
<h5>Description</h5>
<p><p>
Allow making a modified private filemapping executable (text relocation).</p></p>
<p>
</p><p>
Allow making a modified private file
mapping executable (text relocation).
</p><p>
</p>
</div></div>
@ -548,8 +604,12 @@ Allow making a modified private filemapping executable (text relocation).</p></p
<p>false</p>
<h5>Description</h5>
<p><p>
Allow making the stack executable via mprotect.Also requires allow_execmem.</p></p>
<p>
</p><p>
Allow making the stack executable via mprotect.
Also requires allow_execmem.
</p><p>
</p>
</div></div>
@ -560,8 +620,12 @@ Allow making the stack executable via mprotect.Also requires allow_execmem.</p><
<p>false</p>
<h5>Description</h5>
<p><p>
Allow ftp servers to modify public filesused for public file transfer services.</p></p>
<p>
</p><p>
Allow ftp servers to modify public files
used for public file transfer services.
</p><p>
</p>
</div></div>
@ -572,8 +636,11 @@ Allow ftp servers to modify public filesused for public file transfer services.<
<p>false</p>
<h5>Description</h5>
<p><p>
Allow gpg executable stack</p></p>
<p>
</p><p>
Allow gpg executable stack
</p><p>
</p>
</div></div>
@ -584,8 +651,11 @@ Allow gpg executable stack</p></p>
<p>true</p>
<h5>Description</h5>
<p><p>
Allow gssd to read temp directory.</p></p>
<p>
</p><p>
Allow gssd to read temp directory.
</p><p>
</p>
</div></div>
@ -596,8 +666,12 @@ Allow gssd to read temp directory.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow Apache to modify public filesused for public file transfer services.</p></p>
<p>
</p><p>
Allow Apache to modify public files
used for public file transfer services.
</p><p>
</p>
</div></div>
@ -608,8 +682,11 @@ Allow Apache to modify public filesused for public file transfer services.</p></
<p>false</p>
<h5>Description</h5>
<p><p>
Allow java executable stack</p></p>
<p>
</p><p>
Allow java executable stack
</p><p>
</p>
</div></div>
@ -620,8 +697,11 @@ Allow java executable stack</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow system to run with kerberos</p></p>
<p>
</p><p>
Allow system to run with kerberos
</p><p>
</p>
</div></div>
@ -632,8 +712,11 @@ Allow system to run with kerberos</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow sysadm to ptrace all processes</p></p>
<p>
</p><p>
Allow sysadm to ptrace all processes
</p><p>
</p>
</div></div>
@ -644,8 +727,12 @@ Allow sysadm to ptrace all processes</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow rsync to modify public filesused for public file transfer services.</p></p>
<p>
</p><p>
Allow rsync to modify public files
used for public file transfer services.
</p><p>
</p>
</div></div>
@ -656,8 +743,11 @@ Allow rsync to modify public filesused for public file transfer services.</p></p
<p>false</p>
<h5>Description</h5>
<p><p>
Allow sasl to read shadow</p></p>
<p>
</p><p>
Allow sasl to read shadow
</p><p>
</p>
</div></div>
@ -668,8 +758,12 @@ Allow sasl to read shadow</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow samba to modify public filesused for public file transfer services.</p></p>
<p>
</p><p>
Allow samba to modify public files
used for public file transfer services.
</p><p>
</p>
</div></div>
@ -680,8 +774,11 @@ Allow samba to modify public filesused for public file transfer services.</p></p
<p>false</p>
<h5>Description</h5>
<p><p>
allow host key based authentication</p></p>
<p>
</p><p>
allow host key based authentication
</p><p>
</p>
</div></div>
@ -692,8 +789,27 @@ allow host key based authentication</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow users to connect to mysql</p></p>
<p>
</p><p>
Allow users to connect to mysql
</p><p>
</p>
</div></div>
<div id="interface">
<div id="codeblock">allow_write_xshm</div>
<div id="description">
<h5>Default value</h5>
<p>false</p>
<h5>Description</h5>
<p>
</p><p>
Allows clients to write to the X server shared
memory segments.
</p><p>
</p>
</div></div>
@ -704,8 +820,11 @@ Allow users to connect to mysql</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow system to run with NIS</p></p>
<p>
</p><p>
Allow system to run with NIS
</p><p>
</p>
</div></div>
@ -716,8 +835,13 @@ Allow system to run with NIS</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow cdrecord to read various content.nfs, samba, removable devices, user tempand untrusted content files</p></p>
<p>
</p><p>
Allow cdrecord to read various content.
nfs, samba, removable devices, user temp
and untrusted content files
</p><p>
</p>
</div></div>
@ -728,8 +852,12 @@ Allow cdrecord to read various content.nfs, samba, removable devices, user tempa
<p>false</p>
<h5>Description</h5>
<p><p>
Allow system cron jobs to relabel filesystemfor restoring file contexts.</p></p>
<p>
</p><p>
Allow system cron jobs to relabel filesystem
for restoring file contexts.
</p><p>
</p>
</div></div>
@ -740,8 +868,12 @@ Allow system cron jobs to relabel filesystemfor restoring file contexts.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Enable extra rules in the cron domainto support fcron.</p></p>
<p>
</p><p>
Enable extra rules in the cron domain
to support fcron.
</p><p>
</p>
</div></div>
@ -752,8 +884,11 @@ Enable extra rules in the cron domainto support fcron.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow ftp to read and write files in the user home directories</p></p>
<p>
</p><p>
Allow ftp to read and write files in the user home directories
</p><p>
</p>
</div></div>
@ -764,8 +899,11 @@ Allow ftp to read and write files in the user home directories</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow ftpd to run directly without inetd</p></p>
<p>
</p><p>
Allow ftpd to run directly without inetd
</p><p>
</p>
</div></div>
@ -776,8 +914,11 @@ Allow ftpd to run directly without inetd</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow httpd to use built in scripting (usually php)</p></p>
<p>
</p><p>
Allow httpd to use built in scripting (usually php)
</p><p>
</p>
</div></div>
@ -788,8 +929,11 @@ Allow httpd to use built in scripting (usually php)</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow http daemon to tcp connect</p></p>
<p>
</p><p>
Allow http daemon to tcp connect
</p><p>
</p>
</div></div>
@ -800,8 +944,11 @@ Allow http daemon to tcp connect</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
allow httpd to connect to mysql/posgresql</p></p>
<p>
</p><p>
Allow httpd to connect to mysql/posgresql
</p><p>
</p>
</div></div>
@ -812,8 +959,11 @@ allow httpd to connect to mysql/posgresql</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
allow httpd to act as a relay</p></p>
<p>
</p><p>
Allow httpd to act as a relay
</p><p>
</p>
</div></div>
@ -824,8 +974,11 @@ allow httpd to act as a relay</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow httpd cgi support</p></p>
<p>
</p><p>
Allow httpd cgi support
</p><p>
</p>
</div></div>
@ -836,8 +989,12 @@ Allow httpd cgi support</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow httpd to act as a FTP server bylistening on the ftp port.</p></p>
<p>
</p><p>
Allow httpd to act as a FTP server by
listening on the ftp port.
</p><p>
</p>
</div></div>
@ -848,8 +1005,11 @@ Allow httpd to act as a FTP server bylistening on the ftp port.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow httpd to read home directories</p></p>
<p>
</p><p>
Allow httpd to read home directories
</p><p>
</p>
</div></div>
@ -860,8 +1020,11 @@ Allow httpd to read home directories</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Run SSI execs in system CGI script domain.</p></p>
<p>
</p><p>
Run SSI execs in system CGI script domain.
</p><p>
</p>
</div></div>
@ -872,8 +1035,11 @@ Run SSI execs in system CGI script domain.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow http daemon to communicate with the TTY</p></p>
<p>
</p><p>
Allow http daemon to communicate with the TTY
</p><p>
</p>
</div></div>
@ -884,8 +1050,11 @@ Allow http daemon to communicate with the TTY</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Run CGI in the main httpd domain</p></p>
<p>
</p><p>
Run CGI in the main httpd domain
</p><p>
</p>
</div></div>
@ -896,8 +1065,12 @@ Run CGI in the main httpd domain</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow BIND to write the master zone files.Generally this is used for dynamic DNS.</p></p>
<p>
</p><p>
Allow BIND to write the master zone files.
Generally this is used for dynamic DNS.
</p><p>
</p>
</div></div>
@ -908,8 +1081,11 @@ Allow BIND to write the master zone files.Generally this is used for dynamic DNS
<p>false</p>
<h5>Description</h5>
<p><p>
Allow nfs to be exported read only</p></p>
<p>
</p><p>
Allow nfs to be exported read only
</p><p>
</p>
</div></div>
@ -920,8 +1096,11 @@ Allow nfs to be exported read only</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow nfs to be exported read/write.</p></p>
<p>
</p><p>
Allow nfs to be exported read/write.
</p><p>
</p>
</div></div>
@ -932,8 +1111,11 @@ Allow nfs to be exported read/write.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow pppd to load kernel modules for certain modems</p></p>
<p>
</p><p>
Allow pppd to load kernel modules for certain modems
</p><p>
</p>
</div></div>
@ -944,8 +1126,11 @@ Allow pppd to load kernel modules for certain modems</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow pppd to be run for a regular user</p></p>
<p>
</p><p>
Allow pppd to be run for a regular user
</p><p>
</p>
</div></div>
@ -956,8 +1141,11 @@ Allow pppd to be run for a regular user</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow reading of default_t files.</p></p>
<p>
</p><p>
Allow reading of default_t files.
</p><p>
</p>
</div></div>
@ -968,8 +1156,13 @@ Allow reading of default_t files.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow applications to read untrusted contentIf this is disallowed, Internet content hasto be manually relabeled for read access to be granted</p></p>
<p>
</p><p>
Allow applications to read untrusted content
If this is disallowed, Internet content has
to be manually relabeled for read access to be granted
</p><p>
</p>
</div></div>
@ -980,8 +1173,11 @@ Allow applications to read untrusted contentIf this is disallowed, Internet cont
<p>false</p>
<h5>Description</h5>
<p><p>
Allow ssh to run from inetd instead of as a daemon.</p></p>
<p>
</p><p>
Allow ssh to run from inetd instead of as a daemon.
</p><p>
</p>
</div></div>
@ -992,8 +1188,11 @@ Allow ssh to run from inetd instead of as a daemon.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow samba to export user home directories.</p></p>
<p>
</p><p>
Allow samba to export user home directories.
</p><p>
</p>
</div></div>
@ -1004,8 +1203,11 @@ Allow samba to export user home directories.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow spamassassin to do DNS lookups</p></p>
<p>
</p><p>
Allow spamassassin to do DNS lookups
</p><p>
</p>
</div></div>
@ -1016,8 +1218,26 @@ Allow spamassassin to do DNS lookups</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow user spamassassin clients to use the network.</p></p>
<p>
</p><p>
Allow user spamassassin clients to use the network.
</p><p>
</p>
</div></div>
<div id="interface">
<div id="codeblock">spamd_enable_home_dirs</div>
<div id="description">
<h5>Default value</h5>
<p>true</p>
<h5>Description</h5>
<p>
</p><p>
Allow spammd to read/write user home directories.
</p><p>
</p>
</div></div>
@ -1028,8 +1248,12 @@ Allow user spamassassin clients to use the network.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.</p></p>
<p>
</p><p>
Allow squid to connect to all ports, not just
HTTP, FTP, and Gopher ports.
</p><p>
</p>
</div></div>
@ -1040,8 +1264,11 @@ Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.</p></p
<p>false</p>
<h5>Description</h5>
<p><p>
Allow ssh logins as sysadm_r:sysadm_t</p></p>
<p>
</p><p>
Allow ssh logins as sysadm_r:sysadm_t
</p><p>
</p>
</div></div>
@ -1052,8 +1279,12 @@ Allow ssh logins as sysadm_r:sysadm_t</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashrc)</p></p>
<p>
</p><p>
Allow staff_r users to search the sysadm home
dir and read files (such as ~/.bashrc)
</p><p>
</p>
</div></div>
@ -1064,8 +1295,12 @@ Allow staff_r users to search the sysadm homedir and read files (such as ~/.bash
<p>false</p>
<h5>Description</h5>
<p><p>
Configure stunnel to be a standalone daemon orinetd service.</p></p>
<p>
</p><p>
Configure stunnel to be a standalone daemon or
inetd service.
</p><p>
</p>
</div></div>
@ -1076,8 +1311,11 @@ Configure stunnel to be a standalone daemon orinetd service.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Support NFS home directories</p></p>
<p>
</p><p>
Support NFS home directories
</p><p>
</p>
</div></div>
@ -1088,8 +1326,11 @@ Support NFS home directories</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Support SAMBA home directories</p></p>
<p>
</p><p>
Support SAMBA home directories
</p><p>
</p>
</div></div>
@ -1100,8 +1341,11 @@ Support SAMBA home directories</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow regular users direct mouse access</p></p>
<p>
</p><p>
Allow regular users direct mouse access
</p><p>
</p>
</div></div>
@ -1112,8 +1356,11 @@ Allow regular users direct mouse access</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow users to read system messages.</p></p>
<p>
</p><p>
Allow users to read system messages.
</p><p>
</p>
</div></div>
@ -1124,8 +1371,12 @@ Allow users to read system messages.</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow users to control network interfaces(also needs USERCTL=true)</p></p>
<p>
</p><p>
Allow users to control network interfaces
(also needs USERCTL=true)
</p><p>
</p>
</div></div>
@ -1136,8 +1387,11 @@ Allow users to control network interfaces(also needs USERCTL=true)</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Control users use of ping and traceroute</p></p>
<p>
</p><p>
Control users use of ping and traceroute
</p><p>
</p>
</div></div>
@ -1148,8 +1402,12 @@ Control users use of ping and traceroute</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow user to r/w files on filesystemsthat do not have extended attributes (FAT, CDROM, FLOPPY)</p></p>
<p>
</p><p>
Allow user to r/w files on filesystems
that do not have extended attributes (FAT, CDROM, FLOPPY)
</p><p>
</p>
</div></div>
@ -1160,8 +1418,11 @@ Allow user to r/w files on filesystemsthat do not have extended attributes (FAT,
<p>false</p>
<h5>Description</h5>
<p><p>
Allow users to rw usb devices</p></p>
<p>
</p><p>
Allow users to rw usb devices
</p><p>
</p>
</div></div>
@ -1172,8 +1433,13 @@ Allow users to rw usb devices</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols.</p></p>
<p>
</p><p>
Allow users to run TCP servers (bind to ports and accept connection from
the same domain and outside users) disabling this forces FTP passive mode
and may change other protocols.
</p><p>
</p>
</div></div>
@ -1184,8 +1450,11 @@ Allow users to run TCP servers (bind to ports and accept connection fromthe same
<p>false</p>
<h5>Description</h5>
<p><p>
Allow w to display everyone</p></p>
<p>
</p><p>
Allow w to display everyone
</p><p>
</p>
</div></div>
@ -1196,8 +1465,28 @@ Allow w to display everyone</p></p>
<p>false</p>
<h5>Description</h5>
<p><p>
Allow applications to write untrusted contentIf this is disallowed, no Internet contentwill be stored.</p></p>
<p>
</p><p>
Allow applications to write untrusted content
If this is disallowed, no Internet content
will be stored.
</p><p>
</p>
</div></div>
<div id="interface">
<div id="codeblock">xdm_sysadm_login</div>
<div id="description">
<h5>Default value</h5>
<p>false</p>
<h5>Description</h5>
<p>
</p><p>
Allow xdm logins as sysadm
</p><p>
</p>
</div></div>

View File

@ -25,6 +25,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_anaconda.html'>
anaconda</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_certwatch.html'>
certwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_consoletype.html'>
consoletype</a><br/>
@ -49,9 +55,15 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_logwatch.html'>
logwatch</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_mrtg.html'>
mrtg</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_netutils.html'>
netutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_portage.html'>
portage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='admin_prelink.html'>
prelink</a><br/>
@ -112,24 +124,39 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_lockdev.html'>
lockdev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_mono.html'>
mono</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_screen.html'>
screen</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_slocate.html'>
slocate</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_tvtime.html'>
tvtime</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_uml.html'>
uml</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_userhelper.html'>
userhelper</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_usernetctl.html'>
usernetctl</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_webalizer.html'>
webalizer</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='apps_wine.html'>
wine</a><br/>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -151,6 +178,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -400,12 +430,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -534,6 +564,16 @@
anaconda</a></td>
<td><p>Policy for the Anaconda installer.</p></td>
<tr><td>
<a href='admin_bootloader.html'>
bootloader</a></td>
<td><p>Policy for the kernel modules, kernel image, and bootloader.</p></td>
<tr><td>
<a href='admin_certwatch.html'>
certwatch</a></td>
<td><p>Digital Certificate Tracking</p></td>
<tr><td>
<a href='admin_consoletype.html'>
consoletype</a></td>
@ -579,11 +619,24 @@ after installation of Red Hat/Fedora systems.
logwatch</a></td>
<td><p>System log analyzer and reporter</p></td>
<tr><td>
<a href='admin_mrtg.html'>
mrtg</a></td>
<td><p>Network traffic graphing</p></td>
<tr><td>
<a href='admin_netutils.html'>
netutils</a></td>
<td><p>Network analysis utilities</p></td>
<tr><td>
<a href='admin_portage.html'>
portage</a></td>
<td><p>
Portage Package Management System. The primary package management and
distribution system for Gentoo.
</p></td>
<tr><td>
<a href='admin_prelink.html'>
prelink</a></td>
@ -679,11 +732,6 @@ and unlabeled processes and objects.
</td></tr>
<tr><td>
<a href='kernel_bootloader.html'>
bootloader</a></td>
<td><p>Policy for the kernel modules, kernel image, and bootloader.</p></td>
<tr><td>
<a href='kernel_corecommands.html'>
corecommands</a></td>
@ -729,6 +777,11 @@ Policy for kernel threads, proc filesystem,
and unlabeled processes and objects.
</p></td>
<tr><td>
<a href='kernel_mcs.html'>
mcs</a></td>
<td><p>Multicategory security policy</p></td>
<tr><td>
<a href='kernel_mls.html'>
mls</a></td>
@ -804,6 +857,11 @@ Policy for kernel security interface, in particular, selinuxfs.
lockdev</a></td>
<td><p>device locking policy for lockdev</p></td>
<tr><td>
<a href='apps_mono.html'>
mono</a></td>
<td><p>Run .NET server and client applications on Linux.</p></td>
<tr><td>
<a href='apps_screen.html'>
screen</a></td>
@ -814,11 +872,36 @@ Policy for kernel security interface, in particular, selinuxfs.
slocate</a></td>
<td><p>Update database for mlocate</p></td>
<tr><td>
<a href='apps_tvtime.html'>
tvtime</a></td>
<td><p> tvtime - a high quality television application </p></td>
<tr><td>
<a href='apps_uml.html'>
uml</a></td>
<td><p>Policy for UML</p></td>
<tr><td>
<a href='apps_userhelper.html'>
userhelper</a></td>
<td><p>SELinux utility to run a shell with a new role</p></td>
<tr><td>
<a href='apps_usernetctl.html'>
usernetctl</a></td>
<td><p>User network interface configuration helper</p></td>
<tr><td>
<a href='apps_webalizer.html'>
webalizer</a></td>
<td><p>Web server log analysis</p></td>
<tr><td>
<a href='apps_wine.html'>
wine</a></td>
<td><p>Wine Is Not an Emulator. Run Windows programs in Linux.</p></td>
</td></tr>
@ -1394,16 +1477,16 @@ from Windows NT servers.
uucp</a></td>
<td><p>Unix to Unix Copy</p></td>
<tr><td>
<a href='services_xdm.html'>
xdm</a></td>
<td><p>X windows login display manager</p></td>
<tr><td>
<a href='services_xfs.html'>
xfs</a></td>
<td><p>X Windows Font Server </p></td>
<tr><td>
<a href='services_xserver.html'>
xserver</a></td>
<td><p>X Windows Server</p></td>
<tr><td>
<a href='services_zebra.html'>
zebra</a></td>

File diff suppressed because it is too large Load Diff

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -107,11 +107,6 @@ and unlabeled processes and objects.
</td></tr>
<tr><td>
<a href='kernel_bootloader.html'>
bootloader</a></td>
<td><p>Policy for the kernel modules, kernel image, and bootloader.</p></td>
<tr><td>
<a href='kernel_corecommands.html'>
corecommands</a></td>
@ -157,6 +152,11 @@ Policy for kernel threads, proc filesystem,
and unlabeled processes and objects.
</p></td>
<tr><td>
<a href='kernel_mcs.html'>
mcs</a></td>
<td><p>Multicategory security policy</p></td>
<tr><td>
<a href='kernel_mls.html'>
mls</a></td>

File diff suppressed because it is too large Load Diff

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -149,9 +149,9 @@ on the strict policy.
<tr><td>
domain
</td><td>
<p>
Alias type for bin_t.
</p>
</td><td>
No
</td></tr>
@ -220,9 +220,9 @@ the ssh-agent policy.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -230,9 +230,92 @@ No
<tr><td>
target_domain
</td><td>
<p>
The type of the new process.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_corecmd_bin_spec_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_bin_spec_domtrans</b>(
domain
,
target_domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute a file in a bin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon().
</p>
<h5>Description</h5>
<p>
</p><p>
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p><p>
</p><p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p><p>
</p><p>
This interface was added to handle
the userhelper policy.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
<tr><td>
target_domain
</td><td>
<p>
The type of the new process.
</p>
</td><td>
No
</td></tr>
@ -272,9 +355,9 @@ Check if a shell is executable (DAC-wise).
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -283,13 +366,13 @@ No
</div>
</div>
<a name="link_corecmd_dontaudit_getattr_sbin_file"></a>
<a name="link_corecmd_dontaudit_getattr_sbin_files"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_dontaudit_getattr_sbin_file</b>(
<b>corecmd_dontaudit_getattr_sbin_files</b>(
@ -314,9 +397,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -357,9 +440,9 @@ sbin directories.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -399,9 +482,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -441,9 +524,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -483,9 +566,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -525,9 +608,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -567,9 +650,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -578,13 +661,13 @@ No
</div>
</div>
<a name="link_corecmd_getattr_bin_file"></a>
<a name="link_corecmd_getattr_bin_files"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_getattr_bin_file</b>(
<b>corecmd_getattr_bin_files</b>(
@ -609,9 +692,9 @@ Get the attributes of files in bin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -620,13 +703,13 @@ No
</div>
</div>
<a name="link_corecmd_getattr_sbin_file"></a>
<a name="link_corecmd_getattr_sbin_files"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_getattr_sbin_file</b>(
<b>corecmd_getattr_sbin_files</b>(
@ -651,9 +734,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -693,9 +776,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -735,9 +818,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -777,9 +860,9 @@ Create, read, write, and delete bin files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -819,9 +902,9 @@ Create, read, write, and delete sbin files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -861,9 +944,9 @@ Mmap a bin file as executable.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -903,9 +986,9 @@ Mmap a sbin file as executable.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -914,13 +997,13 @@ No
</div>
</div>
<a name="link_corecmd_read_bin_file"></a>
<a name="link_corecmd_read_bin_files"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_bin_file</b>(
<b>corecmd_read_bin_files</b>(
@ -945,9 +1028,9 @@ Read files in bin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -956,13 +1039,13 @@ No
</div>
</div>
<a name="link_corecmd_read_bin_pipe"></a>
<a name="link_corecmd_read_bin_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_bin_pipe</b>(
<b>corecmd_read_bin_pipes</b>(
@ -987,9 +1070,9 @@ Read pipes in bin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -998,13 +1081,13 @@ No
</div>
</div>
<a name="link_corecmd_read_bin_socket"></a>
<a name="link_corecmd_read_bin_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_bin_socket</b>(
<b>corecmd_read_bin_sockets</b>(
@ -1029,9 +1112,9 @@ Read named sockets in bin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1040,13 +1123,13 @@ No
</div>
</div>
<a name="link_corecmd_read_bin_symlink"></a>
<a name="link_corecmd_read_bin_symlinks"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_bin_symlink</b>(
<b>corecmd_read_bin_symlinks</b>(
@ -1071,9 +1154,9 @@ Read symbolic links in bin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1082,13 +1165,13 @@ No
</div>
</div>
<a name="link_corecmd_read_sbin_file"></a>
<a name="link_corecmd_read_sbin_files"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_sbin_file</b>(
<b>corecmd_read_sbin_files</b>(
@ -1113,9 +1196,9 @@ Read files in sbin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1124,13 +1207,13 @@ No
</div>
</div>
<a name="link_corecmd_read_sbin_pipe"></a>
<a name="link_corecmd_read_sbin_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_sbin_pipe</b>(
<b>corecmd_read_sbin_pipes</b>(
@ -1155,9 +1238,9 @@ Read named pipes in sbin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1166,13 +1249,13 @@ No
</div>
</div>
<a name="link_corecmd_read_sbin_socket"></a>
<a name="link_corecmd_read_sbin_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_sbin_socket</b>(
<b>corecmd_read_sbin_sockets</b>(
@ -1197,9 +1280,9 @@ Read named sockets in sbin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1208,13 +1291,13 @@ No
</div>
</div>
<a name="link_corecmd_read_sbin_symlink"></a>
<a name="link_corecmd_read_sbin_symlinks"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_read_sbin_symlink</b>(
<b>corecmd_read_sbin_symlinks</b>(
@ -1239,9 +1322,9 @@ Read symbolic links in sbin directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1281,9 +1364,9 @@ Relabel to and from the bin type.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1323,9 +1406,9 @@ Relabel to and from the sbin type.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1394,9 +1477,9 @@ the ssh-agent policy.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1404,9 +1487,92 @@ No
<tr><td>
target_domain
</td><td>
<p>
The type of the new process.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_corecmd_sbin_spec_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>corecmd_sbin_spec_domtrans</b>(
domain
,
target_domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute a file in a sbin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon().
</p>
<h5>Description</h5>
<p>
</p><p>
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p><p>
</p><p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p><p>
</p><p>
This interface was added to handle
the userhelper policy.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
<tr><td>
target_domain
</td><td>
<p>
The type of the new process.
</p>
</td><td>
No
</td></tr>
@ -1446,9 +1612,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1488,9 +1654,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1550,9 +1716,9 @@ the domains are not owned by this module.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1560,9 +1726,9 @@ No
<tr><td>
target_domain
</td><td>
<p>
The type of the shell process.
</p>
</td><td>
No
</td></tr>
@ -1602,9 +1768,9 @@ Make the shell an entrypoint for the specified domain.
<tr><td>
domain
</td><td>
<p>
The domain for which the shell is an entrypoint.
</p>
</td><td>
No
</td></tr>
@ -1668,9 +1834,9 @@ the domains are not owned by this module.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1678,9 +1844,9 @@ No
<tr><td>
target_domain
</td><td>
<p>
The type of the shell process.
</p>
</td><td>
No
</td></tr>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -149,9 +149,9 @@ more appropriate for userland processes.
<tr><td>
type
</td><td>
<p>
Type to be used as a basic domain type.
</p>
</td><td>
No
</td></tr>
@ -210,9 +210,9 @@ cron domains.
<tr><td>
domain
</td><td>
<p>
Domain target for user exemption.
</p>
</td><td>
No
</td></tr>
@ -271,9 +271,9 @@ user cron jobs.
<tr><td>
domain
</td><td>
<p>
Domain target for user exemption.
</p>
</td><td>
No
</td></tr>
@ -314,9 +314,9 @@ of all domains unix datagram sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -356,9 +356,9 @@ Get the attributes of all domains of all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -399,9 +399,9 @@ all domains IPSEC key management sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -442,9 +442,9 @@ all domains packet sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -485,9 +485,9 @@ of all domains unnamed pipes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -528,9 +528,9 @@ all domains raw sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -583,9 +583,9 @@ and is probably excessive.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -626,9 +626,9 @@ of all domains unix datagram sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -669,9 +669,9 @@ of all domains TCP sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -712,9 +712,9 @@ of all domains UDP sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -755,9 +755,9 @@ session ID of all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -766,13 +766,13 @@ No
</div>
</div>
<a name="link_domain_dontaudit_list_all_domains_proc"></a>
<a name="link_domain_dontaudit_list_all_domains_state"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_list_all_domains_proc</b>(
<b>domain_dontaudit_list_all_domains_state</b>(
@ -798,9 +798,9 @@ directories of all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -852,9 +852,9 @@ Generally this needs to be suppressed because procps tries to access
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -906,9 +906,9 @@ Generally this needs to be suppressed because procps tries to access
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -949,9 +949,9 @@ state (/proc/pid) of all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -992,9 +992,9 @@ all domains key sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1035,9 +1035,9 @@ all domains UDP sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1078,9 +1078,9 @@ state directory (/proc/pid) of all domains.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -1089,13 +1089,13 @@ No
</div>
</div>
<a name="link_domain_dontaudit_use_wide_inherit_fd"></a>
<a name="link_domain_dontaudit_use_interactive_fds"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_use_wide_inherit_fd</b>(
<b>domain_dontaudit_use_interactive_fds</b>(
@ -1120,9 +1120,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1162,9 +1162,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1213,9 +1213,9 @@ an entry point for the domain.
<tr><td>
domain
</td><td>
<p>
Domain to be entered.
</p>
</td><td>
No
</td></tr>
@ -1223,10 +1223,52 @@ No
<tr><td>
type
</td><td>
<p>
Type of program used for entering
the domain.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_entry_file_spec_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>domain_entry_file_spec_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute an entry_type in the specified domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1266,9 +1308,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1308,9 +1350,9 @@ Get the attributes of all domains of all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1351,9 +1393,9 @@ files for all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1406,9 +1448,9 @@ that can use lsof on all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1448,9 +1490,9 @@ Get the attributes of all confined domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1490,9 +1532,51 @@ Get the session ID of all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_interactive_fd"></a>
<div id="interface">
<div id="codeblock">
<b>domain_interactive_fd</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1532,9 +1616,9 @@ Send a kill signal to all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1575,9 +1659,9 @@ entrypoint files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1617,9 +1701,9 @@ Mmap all entry point files as executable.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1628,13 +1712,13 @@ No
</div>
</div>
<a name="link_domain_obj_id_change_exempt"></a>
<a name="link_domain_obj_id_change_exemption"></a>
<div id="interface">
<div id="codeblock">
<b>domain_obj_id_change_exempt</b>(
<b>domain_obj_id_change_exemption</b>(
@ -1660,9 +1744,9 @@ changing the user identity in object contexts.
<tr><td>
domain
</td><td>
<p>
The process type to make an exception to the constraint.
</p>
</td><td>
No
</td></tr>
@ -1702,9 +1786,9 @@ Ptrace all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1744,9 +1828,9 @@ Read the process state (/proc/pid) of all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1786,9 +1870,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -1828,9 +1912,9 @@ Read the process state (/proc/pid) of all confined domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1871,9 +1955,9 @@ file types.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1882,13 +1966,13 @@ No
</div>
</div>
<a name="link_domain_role_change_exempt"></a>
<a name="link_domain_role_change_exemption"></a>
<div id="interface">
<div id="codeblock">
<b>domain_role_change_exempt</b>(
<b>domain_role_change_exemption</b>(
@ -1914,9 +1998,9 @@ changing of role.
<tr><td>
domain
</td><td>
<p>
The process type to make an exception to the constraint.
</p>
</td><td>
No
</td></tr>
@ -1956,9 +2040,9 @@ Search the process state directory (/proc/pid) of all domains.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1998,9 +2082,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -2040,9 +2124,9 @@ Send a child terminated signal to all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -2051,13 +2135,13 @@ No
</div>
</div>
<a name="link_domain_sigchld_wide_inherit_fd"></a>
<a name="link_domain_sigchld_interactive_fds"></a>
<div id="interface">
<div id="codeblock">
<b>domain_sigchld_wide_inherit_fd</b>(
<b>domain_sigchld_interactive_fds</b>(
@ -2083,9 +2167,9 @@ discriptors are widely inheritable.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -2125,9 +2209,9 @@ Send general signals to all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -2167,9 +2251,9 @@ Send a null signal to all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -2209,9 +2293,9 @@ Send a stop signal to all domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -2220,13 +2304,13 @@ No
</div>
</div>
<a name="link_domain_subj_id_change_exempt"></a>
<a name="link_domain_subj_id_change_exemption"></a>
<div id="interface">
<div id="codeblock">
<b>domain_subj_id_change_exempt</b>(
<b>domain_subj_id_change_exemption</b>(
@ -2252,9 +2336,9 @@ changing of user identity.
<tr><td>
domain
</td><td>
<p>
The process type to make an exception to the constraint.
</p>
</td><td>
No
</td></tr>
@ -2263,13 +2347,13 @@ No
</div>
</div>
<a name="link_domain_system_change_exempt"></a>
<a name="link_domain_system_change_exemption"></a>
<div id="interface">
<div id="codeblock">
<b>domain_system_change_exempt</b>(
<b>domain_system_change_exemption</b>(
@ -2296,9 +2380,9 @@ identity and system role.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -2338,9 +2422,9 @@ Make the specified type usable as a domain.
<tr><td>
type
</td><td>
<p>
Type to be used as a domain type.
</p>
</td><td>
No
</td></tr>
@ -2380,9 +2464,9 @@ Unconfined access to domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -2391,13 +2475,13 @@ No
</div>
</div>
<a name="link_domain_use_wide_inherit_fd"></a>
<a name="link_domain_use_interactive_fds"></a>
<div id="interface">
<div id="codeblock">
<b>domain_use_wide_inherit_fd</b>(
<b>domain_use_interactive_fds</b>(
@ -2422,9 +2506,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -2483,51 +2567,9 @@ user domains.
<tr><td>
domain
</td><td>
Domain target for user exemption.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_wide_inherit_fd"></a>
<div id="interface">
<div id="codeblock">
<b>domain_wide_inherit_fd</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
Domain target for user exemption.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
@ -2574,9 +2616,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>
@ -2616,9 +2658,9 @@ Summary is missing!
<tr><td>
?
</td><td>
<p>
Parameter descriptions are missing!
</p>
</td><td>
No
</td></tr>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,157 @@
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corenetwork.html'>
corenetwork</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_devices.html'>
devices</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_domain.html'>
domain</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_files.html'>
files</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_filesystem.html'>
filesystem</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_selinux.html'>
selinux</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_storage.html'>
storage</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_terminal.html'>
terminal</a><br/>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: kernel</h1><p/>
<h2>Module: mcs</h2><p/>
<h3>Description:</h3>
<p><p>Multicategory security policy</p></p>
<p>This module is required to be included in all policies.</p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_mcs_killall"></a>
<div id="interface">
<div id="codeblock">
<b>mcs_killall</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
This domain is allowed to sigkill and sigstop
all domains regardless of their MCS level.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain target for user exemption.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -142,9 +142,9 @@ for lowering the level of files.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -185,9 +185,9 @@ for reading from files at higher levels.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -228,9 +228,9 @@ for raising the level of files.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -271,9 +271,9 @@ for writing to files at lower levels.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -314,9 +314,9 @@ for reading from processes at higher levels.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -358,9 +358,9 @@ it executes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -401,9 +401,9 @@ for writing to processes at lower levels.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -445,9 +445,9 @@ the current level.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -489,9 +489,9 @@ the current level.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -544,9 +544,9 @@ objects, for example, files and directories.
<tr><td>
domain
</td><td>
<p>
The type of the object.
</p>
</td><td>
No
</td></tr>

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -136,9 +136,9 @@ Allows caller to compute an access vector.
<tr><td>
domain
</td><td>
<p>
The process type allowed to compute an access vector.
</p>
</td><td>
No
</td></tr>
@ -178,9 +178,9 @@ Calculate the default type for object creation.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -221,9 +221,9 @@ directory members.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -274,9 +274,9 @@ a terminal when a user logs in.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -316,9 +316,9 @@ Allows caller to compute possible contexts for a user.
<tr><td>
domain
</td><td>
<p>
The process type allowed to compute user contexts.
</p>
</td><td>
No
</td></tr>
@ -359,9 +359,9 @@ attributes of the selinuxfs directory.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -402,9 +402,9 @@ generic selinuxfs entries
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -444,9 +444,9 @@ Do not audit attempts to search selinuxfs.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -487,9 +487,9 @@ Allows the caller to get the mode of policy enforcement
<tr><td>
domain
</td><td>
<p>
The process type to allow to get the enforcing mode.
</p>
</td><td>
No
</td></tr>
@ -529,9 +529,9 @@ Gets the caller the mountpoint of the selinuxfs filesystem.
<tr><td>
domain
</td><td>
<p>
The process type requesting the selinuxfs mountpoint.
</p>
</td><td>
No
</td></tr>
@ -571,9 +571,9 @@ Allow caller to load the policy into the kernel.
<tr><td>
domain
</td><td>
<p>
The process type that will load the policy.
</p>
</td><td>
No
</td></tr>
@ -613,9 +613,9 @@ Search selinuxfs.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -668,9 +668,9 @@ always audited.
<tr><td>
domain
</td><td>
<p>
The process type allowed to set the Boolean.
</p>
</td><td>
No
</td></tr>
@ -723,9 +723,9 @@ always audited.
<tr><td>
domain
</td><td>
<p>
The process type to allow to set the enforcement mode.
</p>
</td><td>
No
</td></tr>
@ -778,9 +778,9 @@ always audited.
<tr><td>
domain
</td><td>
<p>
The process type to allow to set security parameters.
</p>
</td><td>
No
</td></tr>
@ -820,9 +820,9 @@ Unconfined access to the SELinux kernel security server.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -862,9 +862,9 @@ Allows caller to validate security contexts.
<tr><td>
domain
</td><td>
<p>
The process type permitted to validate contexts.
</p>
</td><td>
No
</td></tr>

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -101,13 +101,13 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_storage_create_fixed_disk"></a>
<a name="link_storage_dev_filetrans_fixed_disk"></a>
<div id="interface">
<div id="codeblock">
<b>storage_create_fixed_disk</b>(
<b>storage_dev_filetrans_fixed_disk</b>(
@ -121,7 +121,8 @@
<h5>Summary</h5>
<p>
Create block devices in /dev with the fixed disk type.
Create block devices in /dev with the fixed disk type
via an automatic type transition.
</p>
@ -132,51 +133,9 @@ Create block devices in /dev with the fixed disk type.
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_create_fixed_disk_tmpfs"></a>
<div id="interface">
<div id="codeblock">
<b>storage_create_fixed_disk_tmpfs</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create fixed disk device nodes on a tmpfs filesystem.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -185,13 +144,13 @@ No
</div>
</div>
<a name="link_storage_dontaudit_getattr_fixed_disk"></a>
<a name="link_storage_dontaudit_getattr_fixed_disk_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_getattr_fixed_disk</b>(
<b>storage_dontaudit_getattr_fixed_disk_dev</b>(
@ -217,9 +176,9 @@ the attributes of fixed disk device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -228,13 +187,13 @@ No
</div>
</div>
<a name="link_storage_dontaudit_getattr_removable_device"></a>
<a name="link_storage_dontaudit_getattr_removable_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_getattr_removable_device</b>(
<b>storage_dontaudit_getattr_removable_dev</b>(
@ -260,9 +219,93 @@ the attributes of removable devices device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_dontaudit_raw_read_removable_device"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_raw_read_removable_device</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to directly read removable devices.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_dontaudit_raw_write_removable_device"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_raw_write_removable_device</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to directly write removable devices.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -303,9 +346,9 @@ fixed disk device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -346,9 +389,9 @@ removable devices device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -357,13 +400,56 @@ No
</div>
</div>
<a name="link_storage_dontaudit_setattr_fixed_disk"></a>
<a name="link_storage_dontaudit_rw_scsi_generic"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_setattr_fixed_disk</b>(
<b>storage_dontaudit_rw_scsi_generic</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read or write
SCSI generic device interfaces.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_dontaudit_setattr_fixed_disk_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_setattr_fixed_disk_dev</b>(
@ -389,9 +475,9 @@ the attributes of fixed disk device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -400,13 +486,13 @@ No
</div>
</div>
<a name="link_storage_dontaudit_setattr_removable_device"></a>
<a name="link_storage_dontaudit_setattr_removable_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_dontaudit_setattr_removable_device</b>(
<b>storage_dontaudit_setattr_removable_dev</b>(
@ -432,9 +518,9 @@ the attributes of removable devices device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -443,13 +529,56 @@ No
</div>
</div>
<a name="link_storage_getattr_fixed_disk"></a>
<a name="link_storage_dontaudit_write_fixed_disk"></a>
<div id="interface">
<div id="codeblock">
<b>storage_getattr_fixed_disk</b>(
<b>storage_dontaudit_write_fixed_disk</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts made by the caller to write
fixed disk device nodes.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_getattr_fixed_disk_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_getattr_fixed_disk_dev</b>(
@ -475,9 +604,9 @@ device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -486,13 +615,13 @@ No
</div>
</div>
<a name="link_storage_getattr_removable_device"></a>
<a name="link_storage_getattr_removable_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_getattr_removable_device</b>(
<b>storage_getattr_removable_dev</b>(
@ -518,9 +647,9 @@ devices device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -529,13 +658,13 @@ No
</div>
</div>
<a name="link_storage_getattr_scsi_generic"></a>
<a name="link_storage_getattr_scsi_generic_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_getattr_scsi_generic</b>(
<b>storage_getattr_scsi_generic_dev</b>(
@ -561,9 +690,9 @@ the generic SCSI interface device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -572,13 +701,13 @@ No
</div>
</div>
<a name="link_storage_getattr_tape_device"></a>
<a name="link_storage_getattr_tape_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_getattr_tape_device</b>(
<b>storage_getattr_tape_dev</b>(
@ -604,9 +733,9 @@ of device nodes of tape devices.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -646,9 +775,9 @@ Create, read, write, and delete fixed disk device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -691,54 +820,9 @@ should only be used by trusted domains.
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_raw_read_lvm_volume"></a>
<div id="interface">
<div id="codeblock">
<b>storage_raw_read_lvm_volume</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow the caller to directly read from a logical volume.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -782,9 +866,9 @@ should only be used by trusted domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -827,54 +911,9 @@ should only be used by trusted domains.
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_raw_write_lvm_volume"></a>
<div id="interface">
<div id="codeblock">
<b>storage_raw_write_lvm_volume</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow the caller to directly read from a logical volume.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -918,9 +957,9 @@ should only be used by trusted domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -964,9 +1003,9 @@ should only be used by trusted domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -975,13 +1014,13 @@ No
</div>
</div>
<a name="link_storage_read_tape_device"></a>
<a name="link_storage_read_tape"></a>
<div id="interface">
<div id="codeblock">
<b>storage_read_tape_device</b>(
<b>storage_read_tape</b>(
@ -1007,9 +1046,9 @@ a tape device.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1049,52 +1088,9 @@ Relabel fixed disk device nodes.
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_set_scsi_generic_attributes"></a>
<div id="interface">
<div id="codeblock">
<b>storage_set_scsi_generic_attributes</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Set attributes of the device nodes
for the SCSI generic inerface.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1103,13 +1099,13 @@ No
</div>
</div>
<a name="link_storage_setattr_fixed_disk"></a>
<a name="link_storage_setattr_fixed_disk_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_setattr_fixed_disk</b>(
<b>storage_setattr_fixed_disk_dev</b>(
@ -1135,9 +1131,9 @@ device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1146,13 +1142,13 @@ No
</div>
</div>
<a name="link_storage_setattr_removable_device"></a>
<a name="link_storage_setattr_removable_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_setattr_removable_device</b>(
<b>storage_setattr_removable_dev</b>(
@ -1178,9 +1174,9 @@ devices device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1189,13 +1185,13 @@ No
</div>
</div>
<a name="link_storage_setattr_scsi_generic"></a>
<a name="link_storage_setattr_scsi_generic_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_setattr_scsi_generic</b>(
<b>storage_setattr_scsi_generic_dev</b>(
@ -1221,9 +1217,9 @@ the generic SCSI interface device nodes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1232,13 +1228,56 @@ No
</div>
</div>
<a name="link_storage_setattr_tape_device"></a>
<a name="link_storage_setattr_scsi_generic_dev_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_setattr_tape_device</b>(
<b>storage_setattr_scsi_generic_dev_dev</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Set attributes of the device nodes
for the SCSI generic inerface.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_setattr_tape_dev"></a>
<div id="interface">
<div id="codeblock">
<b>storage_setattr_tape_dev</b>(
@ -1264,9 +1303,9 @@ of device nodes of tape devices.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1306,9 +1345,52 @@ Enable a fixed disk device as swap space
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_storage_tmpfs_filetrans_fixed_disk"></a>
<div id="interface">
<div id="codeblock">
<b>storage_tmpfs_filetrans_fixed_disk</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1348,9 +1430,9 @@ Unconfined access to storage devices.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1394,9 +1476,9 @@ should only be used by trusted domains.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -1405,13 +1487,13 @@ No
</div>
</div>
<a name="link_storage_write_tape_device"></a>
<a name="link_storage_write_tape"></a>
<div id="interface">
<div id="codeblock">
<b>storage_write_tape_device</b>(
<b>storage_write_tape</b>(
@ -1437,9 +1519,9 @@ a tape device.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -25,9 +25,6 @@
kernel</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_bootloader.html'>
bootloader</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
corecommands</a><br/>
@ -49,6 +46,9 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
kernel</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
mcs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
mls</a><br/>
@ -142,9 +142,9 @@ Create a pty in the /dev/pts directory.
<tr><td>
domain
</td><td>
<p>
The type of the process creating the pty.
</p>
</td><td>
No
</td></tr>
@ -152,9 +152,9 @@ No
<tr><td>
pty_type
</td><td>
<p>
The type of the pty.
</p>
</td><td>
No
</td></tr>
@ -196,9 +196,9 @@ device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -240,9 +240,9 @@ device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -251,13 +251,13 @@ No
</div>
</div>
<a name="link_term_dontaudit_getattr_pty_dir"></a>
<a name="link_term_dontaudit_getattr_pty_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>term_dontaudit_getattr_pty_dir</b>(
<b>term_dontaudit_getattr_pty_dirs</b>(
@ -283,9 +283,9 @@ attributes of the /dev/pts directory.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -326,9 +326,9 @@ of all unallocated tty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -369,9 +369,9 @@ unallocated tty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -412,9 +412,9 @@ Do not audit attempts to read the
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -423,13 +423,13 @@ No
</div>
</div>
<a name="link_term_dontaudit_manage_pty_dir"></a>
<a name="link_term_dontaudit_manage_pty_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>term_dontaudit_manage_pty_dir</b>(
<b>term_dontaudit_manage_pty_dirs</b>(
@ -455,9 +455,9 @@ write, or delete the /dev/pts directory.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -498,9 +498,9 @@ contents of the /dev/pts directory.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -541,9 +541,9 @@ user ptys.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -584,9 +584,9 @@ any user ttys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -627,9 +627,9 @@ or write to the console.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -638,13 +638,13 @@ No
</div>
</div>
<a name="link_term_dontaudit_use_generic_pty"></a>
<a name="link_term_dontaudit_use_generic_ptys"></a>
<div id="interface">
<div id="codeblock">
<b>term_dontaudit_use_generic_pty</b>(
<b>term_dontaudit_use_generic_ptys</b>(
@ -671,9 +671,9 @@ generally only used in the targeted policy.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -714,9 +714,9 @@ write the pty multiplexor (/dev/ptmx).
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -725,13 +725,13 @@ No
</div>
</div>
<a name="link_term_dontaudit_use_unallocated_tty"></a>
<a name="link_term_dontaudit_use_unallocated_ttys"></a>
<div id="interface">
<div id="codeblock">
<b>term_dontaudit_use_unallocated_tty</b>(
<b>term_dontaudit_use_unallocated_ttys</b>(
@ -757,9 +757,9 @@ write unallocated ttys.
<tr><td>
domain
</td><td>
<p>
The type of the process to not audit.
</p>
</td><td>
No
</td></tr>
@ -800,9 +800,9 @@ pty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -843,9 +843,9 @@ device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -886,9 +886,9 @@ tty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -897,13 +897,13 @@ No
</div>
</div>
<a name="link_term_ioctl_generic_pty"></a>
<a name="link_term_ioctl_generic_ptys"></a>
<div id="interface">
<div id="codeblock">
<b>term_ioctl_generic_pty</b>(
<b>term_ioctl_generic_ptys</b>(
@ -928,9 +928,9 @@ ioctl of generic pty types.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -971,9 +971,9 @@ list all ptys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1014,9 +1014,9 @@ used by login programs, such as sshd.
<tr><td>
pty_type
</td><td>
<p>
An object type that will applied to a pty.
</p>
</td><td>
No
</td></tr>
@ -1056,9 +1056,9 @@ Transform specified type into a pty type.
<tr><td>
pty_type
</td><td>
<p>
An object type that will applied to a pty.
</p>
</td><td>
No
</td></tr>
@ -1098,9 +1098,9 @@ Read from the console.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1141,9 +1141,9 @@ user pty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1184,9 +1184,9 @@ user tty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1227,9 +1227,9 @@ tty type.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1269,9 +1269,9 @@ Relabel to all user ptys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1312,9 +1312,9 @@ the unallocated tty type.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1354,9 +1354,9 @@ Search the contents of the /dev/pts directory.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1397,9 +1397,9 @@ pty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1440,9 +1440,9 @@ device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1483,9 +1483,9 @@ device node.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1526,9 +1526,9 @@ tty device nodes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1568,9 +1568,9 @@ Transform specified type into a tty type.
<tr><td>
tty_type
</td><td>
<p>
An object type that will applied to a tty.
</p>
</td><td>
No
</td></tr>
@ -1611,9 +1611,9 @@ ttys and all ptys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1653,9 +1653,9 @@ Read and write all user ptys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1695,9 +1695,9 @@ Read and write all user to all user ttys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1737,9 +1737,9 @@ Read from and write to the console.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1780,9 +1780,9 @@ terminal (/dev/tty).
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1791,13 +1791,13 @@ No
</div>
</div>
<a name="link_term_use_generic_pty"></a>
<a name="link_term_use_generic_ptys"></a>
<div id="interface">
<div id="codeblock">
<b>term_use_generic_pty</b>(
<b>term_use_generic_ptys</b>(
@ -1824,9 +1824,9 @@ the targeted policy.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1866,9 +1866,9 @@ Read and write the pty multiplexor (/dev/ptmx).
<tr><td>
domain
</td><td>
<p>
The type of the process to allow access.
</p>
</td><td>
No
</td></tr>
@ -1877,13 +1877,13 @@ No
</div>
</div>
<a name="link_term_use_unallocated_tty"></a>
<a name="link_term_use_unallocated_ttys"></a>
<div id="interface">
<div id="codeblock">
<b>term_use_unallocated_tty</b>(
<b>term_use_unallocated_ttys</b>(
@ -1908,9 +1908,9 @@ Read and write unallocated ttys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1960,10 +1960,10 @@ type change by login programs such as ssh.
<tr><td>
userdomain
</td><td>
<p>
The type of the user domain associated with
this pty.
</p>
</td><td>
No
</td></tr>
@ -1971,9 +1971,9 @@ No
<tr><td>
object_type
</td><td>
<p>
An object type that will applied to a pty.
</p>
</td><td>
No
</td></tr>
@ -2013,9 +2013,9 @@ Write to all user ttys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -2055,9 +2055,9 @@ Write to the console.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -2097,9 +2097,9 @@ Write to unallocated ttys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -703,16 +703,16 @@ from Windows NT servers.
uucp</a></td>
<td><p>Unix to Unix Copy</p></td>
<tr><td>
<a href='services_xdm.html'>
xdm</a></td>
<td><p>X windows login display manager</p></td>
<tr><td>
<a href='services_xfs.html'>
xfs</a></td>
<td><p>X Windows Font Server </p></td>
<tr><td>
<a href='services_xserver.html'>
xserver</a></td>
<td><p>X Windows Server</p></td>
<tr><td>
<a href='services_zebra.html'>
zebra</a></td>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -340,9 +340,9 @@ apache squirrelmail data.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -382,9 +382,9 @@ Transition to apache.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -425,9 +425,9 @@ script domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -468,9 +468,9 @@ a domain transition.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -511,9 +511,9 @@ script domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -554,9 +554,9 @@ Apache logs.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -565,13 +565,13 @@ No
</div>
</div>
<a name="link_apache_dontaudit_rw_stream_socket"></a>
<a name="link_apache_dontaudit_rw_stream_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>apache_dontaudit_rw_stream_socket</b>(
<b>apache_dontaudit_rw_stream_sockets</b>(
@ -597,9 +597,9 @@ unix domain stream sockets.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -608,13 +608,13 @@ No
</div>
</div>
<a name="link_apache_dontaudit_rw_sys_script_stream_socket"></a>
<a name="link_apache_dontaudit_rw_sys_script_stream_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>apache_dontaudit_rw_sys_script_stream_socket</b>(
<b>apache_dontaudit_rw_sys_script_stream_sockets</b>(
@ -640,9 +640,9 @@ system script unix domain stream sockets.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -651,13 +651,13 @@ No
</div>
</div>
<a name="link_apache_dontaudit_rw_tcp_socket"></a>
<a name="link_apache_dontaudit_rw_tcp_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>apache_dontaudit_rw_tcp_socket</b>(
<b>apache_dontaudit_rw_tcp_sockets</b>(
@ -683,9 +683,9 @@ TCP sockets.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -726,9 +726,52 @@ module directories.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_apache_exec_modules"></a>
<div id="interface">
<div id="codeblock">
<b>apache_exec_modules</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow the specified domain to execute
apache modules.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -770,9 +813,9 @@ directory.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -813,9 +856,9 @@ apache system content files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -856,9 +899,9 @@ apache configuration files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -899,9 +942,9 @@ apache log files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -942,9 +985,51 @@ apache squirrelmail data.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_apache_read_sys_content"></a>
<div id="interface">
<div id="codeblock">
<b>apache_read_sys_content</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read apache system content
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -994,9 +1079,9 @@ to the specified role.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1004,9 +1089,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the script domains.
</p>
</td><td>
No
</td></tr>
@ -1064,9 +1149,9 @@ specified role the dmidecode domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1074,9 +1159,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the dmidecode domain.
</p>
</td><td>
No
</td></tr>
@ -1084,9 +1169,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the dmidecode domain to use.
</p>
</td><td>
No
</td></tr>
@ -1126,9 +1211,9 @@ Search system script state directory.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -1168,9 +1253,9 @@ Send a SIGCHLD signal to apache.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1210,9 +1295,9 @@ Send a null signal to apache.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1221,13 +1306,13 @@ No
</div>
</div>
<a name="link_apache_use_fd"></a>
<a name="link_apache_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>apache_use_fd</b>(
<b>apache_use_fds</b>(
@ -1252,9 +1337,9 @@ Inherit and use file descriptors from Apache.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -1302,9 +1387,9 @@ web content.
<tr><td>
prefix
</td><td>
<p>
The prefix to be used for deriving type names.
</p>
</td><td>
No
</td></tr>
@ -1373,10 +1458,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -1384,9 +1469,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -1394,9 +1479,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Append to apm's log file.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -378,9 +378,9 @@ Execute APM in the apm domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -389,13 +389,13 @@ No
</div>
</div>
<a name="link_apm_rw_stream_socket"></a>
<a name="link_apm_rw_stream_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>apm_rw_stream_socket</b>(
<b>apm_rw_stream_sockets</b>(
@ -420,9 +420,9 @@ Read and write to an apm unix stream socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -462,9 +462,9 @@ Connect to apmd over an unix stream socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -473,13 +473,13 @@ No
</div>
</div>
<a name="link_apm_use_fd"></a>
<a name="link_apm_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>apm_use_fd</b>(
<b>apm_use_fds</b>(
@ -504,9 +504,9 @@ Use file descriptors for apmd.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -515,13 +515,13 @@ No
</div>
</div>
<a name="link_apm_write_pipe"></a>
<a name="link_apm_write_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>apm_write_pipe</b>(
<b>apm_write_pipes</b>(
@ -546,9 +546,9 @@ Write to apmd unnamed pipes.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -305,13 +305,13 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_arpwatch_dontaudit_rw_packet_socket"></a>
<a name="link_arpwatch_dontaudit_rw_packet_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>arpwatch_dontaudit_rw_packet_socket</b>(
<b>arpwatch_dontaudit_rw_packet_sockets</b>(
@ -337,9 +337,9 @@ arpwatch packet sockets.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -379,9 +379,9 @@ Create arpwatch data files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -421,9 +421,9 @@ Read and write arpwatch temporary files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -463,9 +463,9 @@ Read and write arpwatch temporary files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -505,9 +505,9 @@ Search arpwatch's data file directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,52 @@ Execute automount in the automount domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_automount_dontaudit_getattr_tmp_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>automount_dontaudit_getattr_tmp_dirs</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes
of automount temporary directories.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -378,9 +421,9 @@ Execute automount in the caller domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -337,9 +337,9 @@ avahi over dbus.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Execute bind in the named domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -378,9 +378,9 @@ Execute ndc in the ndc domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -421,9 +421,9 @@ BIND cache files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -432,13 +432,13 @@ No
</div>
</div>
<a name="link_bind_manage_config_dir"></a>
<a name="link_bind_manage_config_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>bind_manage_config_dir</b>(
<b>bind_manage_config_dirs</b>(
@ -464,9 +464,9 @@ BIND configuration directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -506,9 +506,9 @@ Read BIND named configuration files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -548,9 +548,9 @@ Read DNSSEC keys.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -590,9 +590,9 @@ Read BIND zone files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -649,9 +649,9 @@ allow the specified role the ndc domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -659,9 +659,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the bind domain.
</p>
</td><td>
No
</td></tr>
@ -669,9 +669,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the bind domain to use.
</p>
</td><td>
No
</td></tr>
@ -711,9 +711,9 @@ Search the BIND cache directory.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -722,13 +722,13 @@ No
</div>
</div>
<a name="link_bind_setattr_pid_dir"></a>
<a name="link_bind_setattr_pid_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>bind_setattr_pid_dir</b>(
<b>bind_setattr_pid_dirs</b>(
@ -754,9 +754,9 @@ of the BIND pid directory.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -796,9 +796,9 @@ Send generic signals to BIND.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -838,9 +838,9 @@ Write BIND named configuration files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -337,9 +337,9 @@ bluetooth over dbus.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -379,9 +379,9 @@ Execute bluetooth_helper in the bluetooth_helper domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -421,9 +421,9 @@ Read bluetooth helper files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -463,9 +463,9 @@ Read bluetooth daemon configuration.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -522,9 +522,9 @@ allow the specified role the bluetooth_helper domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -532,9 +532,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the bluetooth_helper domain.
</p>
</td><td>
No
</td></tr>
@ -542,9 +542,9 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the bluetooth_helper domain to use.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Connect to Canna using a unix domain stream socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -316,12 +316,8 @@
[
domain
]
)<br>
</div>
@ -340,11 +336,11 @@ CPUcontrol stub interface. No access allowed.
<tr><td>
domain
</td><td>
<p>
N/A
</p>
</td><td>
yes
Yes
</td></tr>
</table>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -308,55 +308,13 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_cron_crw_tcp_socket"></a>
<a name="link_cron_anacron_domtrans_system_job"></a>
<div id="interface">
<div id="codeblock">
<b>cron_crw_tcp_socket</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, and write a cron daemon TCP socket.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_cron_domtrans_anacron_system_job"></a>
<div id="interface">
<div id="codeblock">
<b>cron_domtrans_anacron_system_job</b>(
<b>cron_anacron_domtrans_system_job</b>(
@ -381,9 +339,9 @@ Execute APM in the apm domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -424,9 +382,9 @@ files from the system cron jobs.
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -435,13 +393,13 @@ No
</div>
</div>
<a name="link_cron_dontaudit_write_pipe"></a>
<a name="link_cron_dontaudit_write_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>cron_dontaudit_write_pipe</b>(
<b>cron_dontaudit_write_pipes</b>(
@ -466,9 +424,9 @@ Do not audit attempts to write cron daemon unnamed pipes.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -477,13 +435,13 @@ No
</div>
</div>
<a name="link_cron_read_pipe"></a>
<a name="link_cron_read_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>cron_read_pipe</b>(
<b>cron_read_pipes</b>(
@ -508,9 +466,9 @@ Read a cron daemon unnamed pipe.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -550,9 +508,9 @@ Read temporary files from the system cron jobs.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -561,13 +519,13 @@ No
</div>
</div>
<a name="link_cron_rw_pipe"></a>
<a name="link_cron_rw_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>cron_rw_pipe</b>(
<b>cron_rw_pipes</b>(
@ -592,9 +550,9 @@ Read and write a cron daemon unnamed pipe.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -603,13 +561,13 @@ No
</div>
</div>
<a name="link_cron_rw_system_job_pipe"></a>
<a name="link_cron_rw_system_job_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>cron_rw_system_job_pipe</b>(
<b>cron_rw_system_job_pipes</b>(
@ -634,9 +592,51 @@ Read and write a system cron job unnamed pipe.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_cron_rw_tcp_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>cron_rw_tcp_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read, and write cron daemon TCP sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -676,9 +676,9 @@ Search the directory containing user cron tables.
<tr><td>
domain
</td><td>
<p>
The type of the process to performing this action.
</p>
</td><td>
No
</td></tr>
@ -718,9 +718,9 @@ Send a SIGCHLD signal to the cron daemon.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -769,9 +769,9 @@ from the system cron jobs.
<tr><td>
domain
</td><td>
<p>
The type of the process to transition to.
</p>
</td><td>
No
</td></tr>
@ -779,9 +779,9 @@ No
<tr><td>
entrypoint
</td><td>
<p>
The type of the file used as an entrypoint to this domain.
</p>
</td><td>
No
</td></tr>
@ -790,13 +790,13 @@ No
</div>
</div>
<a name="link_cron_use_fd"></a>
<a name="link_cron_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>cron_use_fd</b>(
<b>cron_use_fds</b>(
@ -822,9 +822,9 @@ from the cron daemon.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -833,13 +833,13 @@ No
</div>
</div>
<a name="link_cron_use_system_job_fd"></a>
<a name="link_cron_use_system_job_fds"></a>
<div id="interface">
<div id="codeblock">
<b>cron_use_system_job_fd</b>(
<b>cron_use_system_job_fds</b>(
@ -865,9 +865,9 @@ from system cron jobs.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -876,13 +876,13 @@ No
</div>
</div>
<a name="link_cron_write_system_job_pipe"></a>
<a name="link_cron_write_system_job_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>cron_write_system_job_pipe</b>(
<b>cron_write_system_job_pipes</b>(
@ -907,9 +907,9 @@ Write a system cron job unnamed pipe.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -964,10 +964,10 @@ allowing the specified user to manage other user crontabs.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -1037,10 +1037,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -1048,9 +1048,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -1058,9 +1058,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -337,9 +337,9 @@ cups over dbus.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -380,9 +380,9 @@ cupsd_config over dbus.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -422,9 +422,9 @@ Execute cups in the cups domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -464,9 +464,51 @@ Execute cups_config in the cups_config domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_cups_read_config"></a>
<div id="interface">
<div id="codeblock">
<b>cups_read_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read cups configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -506,9 +548,9 @@ Read cups log files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -548,9 +590,9 @@ Read cups-writable configuration files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -591,9 +633,9 @@ configuration daemon.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -633,9 +675,93 @@ Connect to ptal over an unix domain stream socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_cups_tcp_connect"></a>
<div id="interface">
<div id="codeblock">
<b>cups_tcp_connect</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Connect to cups over TCP.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_cups_write_log"></a>
<div id="interface">
<div id="codeblock">
<b>cups_write_log</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Write cups log files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Read the CVS data and metadata.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -337,9 +337,9 @@ and delete cyrus data files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -340,9 +340,9 @@ for service (acquire_svc).
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -382,9 +382,9 @@ Read dbus configuration.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -393,13 +393,13 @@ No
</div>
</div>
<a name="link_dbus_send_system_bus_msg"></a>
<a name="link_dbus_send_system_bus"></a>
<div id="interface">
<div id="codeblock">
<b>dbus_send_system_bus_msg</b>(
<b>dbus_send_system_bus</b>(
@ -424,9 +424,9 @@ Send a message on the system DBUS.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -446,12 +446,8 @@ No
[
domain
]
)<br>
</div>
@ -470,11 +466,11 @@ DBUS stub interface. No access allowed.
<tr><td>
domain
</td><td>
<p>
N/A
</p>
</td><td>
yes
Yes
</td></tr>
</table>
@ -512,9 +508,9 @@ Allow unconfined access to the system DBUS.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -590,10 +586,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -601,9 +597,9 @@ No
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
@ -611,9 +607,9 @@ No
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>
@ -662,10 +658,10 @@ the system DBUS.
<tr><td>
domain_prefix
</td><td>
<p>
The prefix of the domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -673,9 +669,9 @@ No
<tr><td>
domain
</td><td>
<p>
The type of the domain.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -337,9 +337,9 @@ server state files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -305,13 +305,13 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_dictd_use"></a>
<a name="link_dictd_tcp_connect"></a>
<div id="interface">
<div id="codeblock">
<b>dictd_use</b>(
<b>dictd_tcp_connect</b>(
@ -337,9 +337,9 @@ over TCP.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -338,9 +338,9 @@ components that are directly supervised by daemontools.
<tr><td>
prefix
</td><td>
<p>
The prefix to be used for deriving type names.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Create, read, write, and delete the dovecot spool files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Execute fingerd in the fingerd domain.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -378,9 +378,9 @@ Allow the specified domain to connect to fingerd with a tcp socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -339,9 +339,9 @@ Execute FTP daemon entry point programs.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -381,9 +381,9 @@ Read ftpd etc files
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -423,9 +423,9 @@ Read FTP transfer logs
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -465,9 +465,9 @@ Use ftp by connecting over TCP.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -528,10 +528,10 @@ by policy writers.
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -338,9 +338,9 @@ named socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -381,9 +381,9 @@ control channel named socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -424,9 +424,52 @@ control channel named socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_gpm_stream_connect"></a>
<div id="interface">
<div id="codeblock">
<b>gpm_stream_connect</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Connect to GPM over a unix domain
stream socket.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -337,9 +337,9 @@ hal over dbus.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -379,9 +379,9 @@ Send a dbus message to hal.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -390,13 +390,13 @@ No
</div>
</div>
<a name="link_hal_dgram_sendto"></a>
<a name="link_hal_dgram_send"></a>
<div id="interface">
<div id="codeblock">
<b>hal_dgram_sendto</b>(
<b>hal_dgram_send</b>(
@ -422,9 +422,9 @@ datagram socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -464,9 +464,9 @@ Execute hal in the hal domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -507,9 +507,9 @@ stream socket.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Send generic signals to howl.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -336,9 +336,9 @@ Use i18n_input over a TCP connection.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -339,11 +339,13 @@ Define the specified domain as a inetd service.
<h5>Description</h5>
<p>
</p><p>
Define the specified domain as a inetd service. The
inetd_service_domain(), inetd_tcp_service_domain(),
or inetd_udp_service_domain() interfaces should be used
instead of this interface, as this interface only provides
the common rules to these three interfaces.
</p><p>
</p>
<h5>Parameters</h5>
@ -353,9 +355,9 @@ the common rules to these three interfaces.
<tr><td>
domain
</td><td>
<p>
The type associated with the inetd service process.
</p>
</td><td>
No
</td></tr>
@ -363,9 +365,9 @@ No
<tr><td>
entrypoint
</td><td>
<p>
The type associated with the process program.
</p>
</td><td>
No
</td></tr>
@ -405,9 +407,9 @@ Run inetd child process in the inet child domain
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -416,13 +418,13 @@ No
</div>
</div>
<a name="link_inetd_rw_tcp_socket"></a>
<a name="link_inetd_rw_tcp_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>inetd_rw_tcp_socket</b>(
<b>inetd_rw_tcp_sockets</b>(
@ -447,9 +449,9 @@ Read and write inetd TCP sockets.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -497,9 +499,9 @@ Define the specified domain as a TCP and UDP inetd service.
<tr><td>
domain
</td><td>
<p>
The type associated with the inetd service process.
</p>
</td><td>
No
</td></tr>
@ -507,9 +509,9 @@ No
<tr><td>
entrypoint
</td><td>
<p>
The type associated with the process program.
</p>
</td><td>
No
</td></tr>
@ -549,9 +551,9 @@ Connect to the inetd service using a TCP connection.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -599,9 +601,9 @@ Define the specified domain as a TCP inetd service.
<tr><td>
domain
</td><td>
<p>
The type associated with the inetd service process.
</p>
</td><td>
No
</td></tr>
@ -609,9 +611,9 @@ No
<tr><td>
entrypoint
</td><td>
<p>
The type associated with the process program.
</p>
</td><td>
No
</td></tr>
@ -620,13 +622,13 @@ No
</div>
</div>
<a name="link_inetd_udp_sendto"></a>
<a name="link_inetd_udp_send"></a>
<div id="interface">
<div id="codeblock">
<b>inetd_udp_sendto</b>(
<b>inetd_udp_send</b>(
@ -651,9 +653,9 @@ Send UDP network traffic to inetd.
<tr><td>
domain
</td><td>
<p>
The type of the process performing this action.
</p>
</td><td>
No
</td></tr>
@ -701,9 +703,9 @@ Define the specified domain as a UDP inetd service.
<tr><td>
domain
</td><td>
<p>
The type associated with the inetd service process.
</p>
</td><td>
No
</td></tr>
@ -711,9 +713,9 @@ No
<tr><td>
entrypoint
</td><td>
<p>
The type associated with the process program.
</p>
</td><td>
No
</td></tr>
@ -722,13 +724,13 @@ No
</div>
</div>
<a name="link_inetd_use_fd"></a>
<a name="link_inetd_use_fds"></a>
<div id="interface">
<div id="codeblock">
<b>inetd_use_fd</b>(
<b>inetd_use_fds</b>(
@ -753,9 +755,9 @@ Inherit and use file descriptors from inetd.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -305,6 +305,48 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_inn_dgram_send"></a>
<div id="interface">
<div id="codeblock">
<b>inn_dgram_send</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send to a innd unix dgram socket.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_inn_exec"></a>
<div id="interface">
@ -337,9 +379,9 @@ in the caller domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -380,9 +422,9 @@ inn configuration files in /etc.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -422,9 +464,9 @@ Create, read, write, and delete the innd log.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -464,9 +506,9 @@ Create, read, write, and delete the innd pid files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -506,9 +548,9 @@ Read innd configuration files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -548,9 +590,9 @@ Read innd news library files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -590,51 +632,9 @@ Read innd news library files.
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_inn_sendto_unix_dgram_socket"></a>
<div id="interface">
<div id="codeblock">
<b>inn_sendto_unix_dgram_socket</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send to a innd unix dgram socket.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -357,9 +357,9 @@ configuration file (/etc/krb5.conf).
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>
@ -399,9 +399,9 @@ Read the kerberos configuration file (/etc/krb5.conf).
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -441,9 +441,9 @@ Read the kerberos key table.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -483,9 +483,9 @@ Read and write the kerberos configuration file (/etc/krb5.conf).
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -525,9 +525,9 @@ Use kerberos services
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -305,13 +305,13 @@
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_ldap_list_db_dir"></a>
<a name="link_ldap_list_db"></a>
<div id="interface">
<div id="codeblock">
<b>ldap_list_db_dir</b>(
<b>ldap_list_db</b>(
@ -337,9 +337,9 @@ database directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -379,9 +379,9 @@ Read the OpenLDAP configuration files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -421,9 +421,9 @@ Use LDAP over TCP connection.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

View File

@ -262,12 +262,12 @@
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_uucp.html'>
uucp</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xdm.html'>
xdm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xfs.html'>
xfs</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_xserver.html'>
xserver</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='services_zebra.html'>
zebra</a><br/>
@ -296,6 +296,9 @@
<h1>Layer: services</h1><p/>
<h2>Module: lpd</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>Line printer daemon</p></p>
@ -336,9 +339,9 @@ Execute lpd in the lpd domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -378,9 +381,9 @@ List the contents of the printer spool directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -420,9 +423,9 @@ Create, read, write, and delete printer spool files.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -462,9 +465,9 @@ List the contents of the printer spool directories.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -521,9 +524,9 @@ allow the specified role the lpd domain.
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>
@ -531,9 +534,9 @@ No
<tr><td>
role
</td><td>
<p>
The role to be allowed the lpd domain.
</p>
</td><td>
No
</td></tr>
@ -541,9 +544,159 @@ No
<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the lpd domain to use.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_lpd_per_userdomain_template"></a>
<div id="template">
<div id="codeblock">
<b>lpd_per_userdomain_template</b>(
userdomain_prefix
,
user_domain
,
user_role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
The per user domain template for the lpd module.
</p>
<h5>Description</h5>
<p>
</p><p>
This template creates a derived domains which are used
for lpr printing client.
</p><p>
</p><p>
This template is invoked automatically for each user, and
generally does not need to be invoked directly
by policy writers.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
<tr><td>
user_domain
</td><td>
<p>
The type of the user domain.
</p>
</td><td>
No
</td></tr>
<tr><td>
user_role
</td><td>
<p>
The role associated with the user domain.
</p>
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_lpr_admin_template"></a>
<div id="template">
<div id="codeblock">
<b>lpr_admin_template</b>(
userdomain_prefix
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
The administrative functions template for the lpd module.
</p>
<h5>Description</h5>
<p>
</p><p>
This template creates rules for administrating the ldp service,
allowing the specified user to manage lpr files.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
userdomain_prefix
</td><td>
<p>
The prefix of the user domain (e.g., user
is the prefix for user_t).
</p>
</td><td>
No
</td></tr>
@ -557,7 +710,6 @@ No
</div>
</body>
</html>

Some files were not shown because too many files have changed in this diff Show More