trunk: whitespace fixes in xml blocks.
This commit is contained in:
parent
6073ea1e13
commit
ff8f0a63f4
@ -5,12 +5,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read and write awstats unnamed pipes.
|
## Read and write awstats unnamed pipes.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`awstats_rw_pipes',`
|
interface(`awstats_rw_pipes',`
|
||||||
@ -23,12 +23,12 @@ interface(`awstats_rw_pipes',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute awstats cgi scripts in the caller domain.
|
## Execute awstats cgi scripts in the caller domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`awstats_cgi_exec',`
|
interface(`awstats_cgi_exec',`
|
||||||
|
@ -53,11 +53,11 @@ interface(`gpg_role',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Transition to a user gpg domain.
|
## Transition to a user gpg domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -71,11 +71,11 @@ interface(`gpg_domtrans',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Send generic signals to user gpg processes.
|
## Send generic signals to user gpg processes.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -176,7 +176,7 @@ template(`userhelper_role_template',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -195,7 +195,7 @@ interface(`userhelper_search_config',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain to not audit.
|
## Domain to not audit.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -213,7 +213,7 @@ interface(`userhelper_dontaudit_search_config',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -231,7 +231,7 @@ interface(`userhelper_use_fd',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -410,35 +410,35 @@ interface(`corecmd_bin_spec_domtrans',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute a file in a bin directory
|
## Execute a file in a bin directory
|
||||||
## in the specified domain.
|
## in the specified domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Execute a file in a bin directory
|
## Execute a file in a bin directory
|
||||||
## in the specified domain. This allows
|
## in the specified domain. This allows
|
||||||
## the specified domain to execute any file
|
## the specified domain to execute any file
|
||||||
## on these filesystems in the specified
|
## on these filesystems in the specified
|
||||||
## domain. This is not suggested.
|
## domain. This is not suggested.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## No interprocess communication (signals, pipes,
|
## No interprocess communication (signals, pipes,
|
||||||
## etc.) is provided by this interface since
|
## etc.) is provided by this interface since
|
||||||
## the domains are not owned by this module.
|
## the domains are not owned by this module.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## This interface was added to handle
|
## This interface was added to handle
|
||||||
## the ssh-agent policy.
|
## the ssh-agent policy.
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <param name="target_domain">
|
## <param name="target_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the new process.
|
## The type of the new process.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -1467,11 +1467,11 @@ interface(`corenet_udp_bind_all_unreserved_ports',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Connect TCP sockets to reserved ports.
|
## Connect TCP sockets to reserved ports.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -1504,11 +1504,11 @@ interface(`corenet_dontaudit_tcp_connect_all_reserved_ports',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Connect TCP sockets to rpc ports.
|
## Connect TCP sockets to rpc ports.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -1709,7 +1709,7 @@ interface(`corenet_dontaudit_non_ipsec_sendrecv',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive TCP packets from a NetLabel connection.
|
## Receive TCP packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1724,7 +1724,7 @@ interface(`corenet_tcp_recv_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive TCP packets from a NetLabel connection.
|
## Receive TCP packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1743,7 +1743,7 @@ interface(`corenet_tcp_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive TCP packets from an unlabled connection.
|
## Receive TCP packets from an unlabled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1763,8 +1763,8 @@ interface(`corenet_tcp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive TCP packets from a NetLabel
|
## Do not audit attempts to receive TCP packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1779,8 +1779,8 @@ interface(`corenet_dontaudit_tcp_recv_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive TCP packets from a NetLabel
|
## Do not audit attempts to receive TCP packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1799,8 +1799,8 @@ interface(`corenet_dontaudit_tcp_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive TCP packets from an unlabeled
|
## Do not audit attempts to receive TCP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1820,7 +1820,7 @@ interface(`corenet_dontaudit_tcp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive UDP packets from a NetLabel connection.
|
## Receive UDP packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1835,7 +1835,7 @@ interface(`corenet_udp_recv_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive UDP packets from a NetLabel connection.
|
## Receive UDP packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1854,7 +1854,7 @@ interface(`corenet_udp_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive UDP packets from an unlabeled connection.
|
## Receive UDP packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1874,8 +1874,8 @@ interface(`corenet_udp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive UDP packets from a NetLabel
|
## Do not audit attempts to receive UDP packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1890,8 +1890,8 @@ interface(`corenet_dontaudit_udp_recv_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive UDP packets from a NetLabel
|
## Do not audit attempts to receive UDP packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1910,8 +1910,8 @@ interface(`corenet_dontaudit_udp_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive UDP packets from an unlabeled
|
## Do not audit attempts to receive UDP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1931,7 +1931,7 @@ interface(`corenet_dontaudit_udp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive Raw IP packets from a NetLabel connection.
|
## Receive Raw IP packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1946,7 +1946,7 @@ interface(`corenet_raw_recv_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive Raw IP packets from a NetLabel connection.
|
## Receive Raw IP packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1965,7 +1965,7 @@ interface(`corenet_raw_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive Raw IP packets from an unlabeled connection.
|
## Receive Raw IP packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1985,8 +1985,8 @@ interface(`corenet_raw_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive Raw IP packets from a NetLabel
|
## Do not audit attempts to receive Raw IP packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -2001,8 +2001,8 @@ interface(`corenet_dontaudit_raw_recv_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive Raw IP packets from a NetLabel
|
## Do not audit attempts to receive Raw IP packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -2021,8 +2021,8 @@ interface(`corenet_dontaudit_raw_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive Raw IP packets from an unlabeled
|
## Do not audit attempts to receive Raw IP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -2042,7 +2042,7 @@ interface(`corenet_dontaudit_raw_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive packets from an unlabeled connection.
|
## Receive packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -2064,7 +2064,7 @@ interface(`corenet_all_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive packets from a NetLabel connection.
|
## Receive packets from a NetLabel connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -2083,7 +2083,7 @@ interface(`corenet_all_recvfrom_netlabel',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive packets from an unlabeled connection.
|
## Do not audit attempts to receive packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -2105,8 +2105,8 @@ interface(`corenet_dontaudit_all_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive packets from a NetLabel
|
## Do not audit attempts to receive packets from a NetLabel
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -1842,11 +1842,11 @@ interface(`dev_read_mouse',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read and write to mouse devices.
|
## Read and write to mouse devices.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -1221,7 +1221,7 @@ interface(`domain_mmap_all_entry_files',`
|
|||||||
## </param>
|
## </param>
|
||||||
## <param name="target_domain">
|
## <param name="target_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the new process.
|
## The type of the new process.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -1237,9 +1237,9 @@ interface(`domain_entry_file_spec_domtrans',`
|
|||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Ability to mmap a low area of the address space,
|
## Ability to mmap a low area of the address space,
|
||||||
## as configured by /proc/sys/kernel/mmap_min_addr.
|
## as configured by /proc/sys/kernel/mmap_min_addr.
|
||||||
## Preventing such mappings helps protect against
|
## Preventing such mappings helps protect against
|
||||||
## exploiting null deref bugs in the kernel.
|
## exploiting null deref bugs in the kernel.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -1544,12 +1544,12 @@ interface(`files_manage_boot_symlinks',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read kernel files in the /boot directory.
|
## Read kernel files in the /boot directory.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`files_read_kernel_img',`
|
interface(`files_read_kernel_img',`
|
||||||
|
@ -1250,12 +1250,12 @@ interface(`fs_read_eventpollfs',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Mount a FUSE filesystem.
|
## Mount a FUSE filesystem.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`fs_mount_fusefs',`
|
interface(`fs_mount_fusefs',`
|
||||||
@ -1268,12 +1268,12 @@ interface(`fs_mount_fusefs',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Unmount a FUSE filesystem.
|
## Unmount a FUSE filesystem.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`fs_unmount_fusefs',`
|
interface(`fs_unmount_fusefs',`
|
||||||
@ -1722,7 +1722,7 @@ interface(`fs_read_nfs_named_sockets',`
|
|||||||
|
|
||||||
#########################################
|
#########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read named pipes on a NFS network filesystem.
|
## Read named pipes on a NFS network filesystem.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -2297,12 +2297,12 @@ interface(`kernel_dontaudit_sendrecv_unlabeled_association',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive TCP packets from an unlabeled connection.
|
## Receive TCP packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Receive TCP packets from an unlabeled connection.
|
## Receive TCP packets from an unlabeled connection.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_tcp_recv_unlabeled() should
|
## The corenetwork interface corenet_tcp_recv_unlabeled() should
|
||||||
## be used instead of this one.
|
## be used instead of this one.
|
||||||
@ -2324,14 +2324,14 @@ interface(`kernel_tcp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive TCP packets from an unlabeled
|
## Do not audit attempts to receive TCP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Do not audit attempts to receive TCP packets from an unlabeled
|
## Do not audit attempts to receive TCP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
|
## The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
|
||||||
## should be used instead of this one.
|
## should be used instead of this one.
|
||||||
@ -2353,12 +2353,12 @@ interface(`kernel_dontaudit_tcp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive UDP packets from an unlabeled connection.
|
## Receive UDP packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Receive UDP packets from an unlabeled connection.
|
## Receive UDP packets from an unlabeled connection.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_udp_recv_unlabeled() should
|
## The corenetwork interface corenet_udp_recv_unlabeled() should
|
||||||
## be used instead of this one.
|
## be used instead of this one.
|
||||||
@ -2380,14 +2380,14 @@ interface(`kernel_udp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive UDP packets from an unlabeled
|
## Do not audit attempts to receive UDP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Do not audit attempts to receive UDP packets from an unlabeled
|
## Do not audit attempts to receive UDP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
|
## The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
|
||||||
## should be used instead of this one.
|
## should be used instead of this one.
|
||||||
@ -2409,12 +2409,12 @@ interface(`kernel_dontaudit_udp_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Receive Raw IP packets from an unlabeled connection.
|
## Receive Raw IP packets from an unlabeled connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Receive Raw IP packets from an unlabeled connection.
|
## Receive Raw IP packets from an unlabeled connection.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_raw_recv_unlabeled() should
|
## The corenetwork interface corenet_raw_recv_unlabeled() should
|
||||||
## be used instead of this one.
|
## be used instead of this one.
|
||||||
@ -2436,14 +2436,14 @@ interface(`kernel_raw_recvfrom_unlabeled',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to receive Raw IP packets from an unlabeled
|
## Do not audit attempts to receive Raw IP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Do not audit attempts to receive Raw IP packets from an unlabeled
|
## Do not audit attempts to receive Raw IP packets from an unlabeled
|
||||||
## connection.
|
## connection.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
|
## The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
|
||||||
## should be used instead of this one.
|
## should be used instead of this one.
|
||||||
@ -2500,7 +2500,7 @@ interface(`kernel_sendrecv_unlabeled_packets',`
|
|||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Receive packets from an unlabeled peer, these packets do not have any
|
## Receive packets from an unlabeled peer, these packets do not have any
|
||||||
## peer labeling information present.
|
## peer labeling information present.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_recvfrom_unlabeled_peer() should
|
## The corenetwork interface corenet_recvfrom_unlabeled_peer() should
|
||||||
@ -2528,7 +2528,7 @@ interface(`kernel_recvfrom_unlabeled_peer',`
|
|||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Do not audit attempts to receive packets from an unlabeled peer,
|
## Do not audit attempts to receive packets from an unlabeled peer,
|
||||||
## these packets do not have any peer labeling information present.
|
## these packets do not have any peer labeling information present.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
|
## The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
|
||||||
@ -2551,12 +2551,12 @@ interface(`kernel_dontaudit_recvfrom_unlabeled_peer',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Relabel from unlabeled database objects.
|
## Relabel from unlabeled database objects.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`kernel_relabelfrom_unlabeled_database',`
|
interface(`kernel_relabelfrom_unlabeled_database',`
|
||||||
|
@ -304,7 +304,7 @@ optional_policy(`
|
|||||||
')
|
')
|
||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
# nfs kernel server needs kernel UDP access. It is less risky and painful
|
# nfs kernel server needs kernel UDP access. It is less risky and painful
|
||||||
# to just give it everything.
|
# to just give it everything.
|
||||||
allow kernel_t self:tcp_socket create_stream_socket_perms;
|
allow kernel_t self:tcp_socket create_stream_socket_perms;
|
||||||
allow kernel_t self:udp_socket create_socket_perms;
|
allow kernel_t self:udp_socket create_socket_perms;
|
||||||
|
@ -822,13 +822,13 @@ interface(`mls_context_translate_all_levels',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make specified domain MLS trusted
|
## Make specified domain MLS trusted
|
||||||
## for reading from databases at any level.
|
## for reading from databases at any level.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
@ -842,13 +842,13 @@ interface(`mls_db_read_all_levels',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make specified domain MLS trusted
|
## Make specified domain MLS trusted
|
||||||
## for writing to databases at any level.
|
## for writing to databases at any level.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
@ -862,13 +862,13 @@ interface(`mls_db_write_all_levels',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make specified domain MLS trusted
|
## Make specified domain MLS trusted
|
||||||
## for raising the level of databases.
|
## for raising the level of databases.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
@ -882,13 +882,13 @@ interface(`mls_db_upgrade',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make specified domain MLS trusted
|
## Make specified domain MLS trusted
|
||||||
## for lowering the level of databases.
|
## for lowering the level of databases.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
@ -901,14 +901,14 @@ interface(`mls_db_downgrade',`
|
|||||||
')
|
')
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make specified domain MLS trusted
|
## Make specified domain MLS trusted
|
||||||
## for sending dbus messages to
|
## for sending dbus messages to
|
||||||
## all levels.
|
## all levels.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
@ -922,14 +922,14 @@ interface(`mls_dbus_send_all_levels',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Make specified domain MLS trusted
|
## Make specified domain MLS trusted
|
||||||
## for receiving dbus messages from
|
## for receiving dbus messages from
|
||||||
## all levels.
|
## all levels.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
#
|
#
|
||||||
|
@ -172,15 +172,15 @@ interface(`storage_dontaudit_write_fixed_disk',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly read and write to a fixed disk.
|
## Allow the caller to directly read and write to a fixed disk.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremly dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`storage_raw_rw_fixed_disk',`
|
interface(`storage_raw_rw_fixed_disk',`
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute aide in the aide domain
|
## Execute aide in the aide domain
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`aide_domtrans',`
|
interface(`aide_domtrans',`
|
||||||
|
@ -174,7 +174,7 @@ optional_policy(`
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
# this seems like fds that arent being
|
# this seems like fds that arent being
|
||||||
# closed. these should probably be
|
# closed. these should probably be
|
||||||
# dontaudits instead.
|
# dontaudits instead.
|
||||||
networkmanager_rw_udp_sockets(named_t)
|
networkmanager_rw_udp_sockets(named_t)
|
||||||
networkmanager_rw_packet_sockets(named_t)
|
networkmanager_rw_packet_sockets(named_t)
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read bitlbee configuration files
|
## Read bitlbee configuration files
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed accesss.
|
## Domain allowed accesss.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`bitlbee_read_config',`
|
interface(`bitlbee_read_config',`
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute clockspeed utilities in the clockspeed_cli domain.
|
## Execute clockspeed utilities in the clockspeed_cli domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`clockspeed_domtrans_cli',`
|
interface(`clockspeed_domtrans_cli',`
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Create a set of derived types for djbdns
|
## Create a set of derived types for djbdns
|
||||||
## components that are directly supervised by daemontools.
|
## components that are directly supervised by daemontools.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="prefix">
|
## <param name="prefix">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The prefix to be used for deriving type names.
|
## The prefix to be used for deriving type names.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -21,12 +21,12 @@ interface(`dovecot_manage_spool',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to delete dovecot lib files.
|
## Do not audit attempts to delete dovecot lib files.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain to not audit.
|
## Domain to not audit.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`dovecot_dontaudit_unlink_lib_files',`
|
interface(`dovecot_dontaudit_unlink_lib_files',`
|
||||||
|
@ -2,11 +2,11 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Use ftp by connecting over TCP. (Deprecated)
|
## Use ftp by connecting over TCP. (Deprecated)
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -16,11 +16,11 @@ interface(`ftp_tcp_connect',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read ftpd etc files
|
## Read ftpd etc files
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -35,11 +35,11 @@ interface(`ftp_read_config',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute FTP daemon entry point programs.
|
## Execute FTP daemon entry point programs.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -54,11 +54,11 @@ interface(`ftp_check_exec',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read FTP transfer logs
|
## Read FTP transfer logs
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -73,12 +73,12 @@ interface(`ftp_read_log',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute the ftpdctl program in the ftpdctl domain.
|
## Execute the ftpdctl program in the ftpdctl domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`ftp_domtrans_ftpdctl',`
|
interface(`ftp_domtrans_ftpdctl',`
|
||||||
|
@ -177,11 +177,11 @@ interface(`lpd_read_config',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Transition to a user lpr domain.
|
## Transition to a user lpr domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -374,14 +374,14 @@ interface(`mta_send_mail',`
|
|||||||
## Execute send mail in a specified domain.
|
## Execute send mail in a specified domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Execute send mail in a specified domain.
|
## Execute send mail in a specified domain.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## No interprocess communication (signals, pipes,
|
## No interprocess communication (signals, pipes,
|
||||||
## etc.) is provided by this interface since
|
## etc.) is provided by this interface since
|
||||||
## the domains are not owned by this module.
|
## the domains are not owned by this module.
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
## <param name="source_domain">
|
## <param name="source_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -108,7 +108,7 @@ interface(`nscd_shm_use',`
|
|||||||
allow $1 nscd_t:fd use;
|
allow $1 nscd_t:fd use;
|
||||||
|
|
||||||
# cjp: these were originally inherited from the
|
# cjp: these were originally inherited from the
|
||||||
# nscd_socket_domain macro. need to investigate
|
# nscd_socket_domain macro. need to investigate
|
||||||
# if they are all actually required
|
# if they are all actually required
|
||||||
allow $1 self:unix_stream_socket create_stream_socket_perms;
|
allow $1 self:unix_stream_socket create_stream_socket_perms;
|
||||||
allow $1 nscd_t:unix_stream_socket connectto;
|
allow $1 nscd_t:unix_stream_socket connectto;
|
||||||
|
@ -2,17 +2,17 @@
|
|||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Role access for SE-PostgreSQL.
|
## Role access for SE-PostgreSQL.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="user_role">
|
## <param name="user_role">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The role associated with the user domain.
|
## The role associated with the user domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <param name="user_domain">
|
## <param name="user_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the user domain.
|
## The type of the user domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_role',`
|
interface(`postgresql_role',`
|
||||||
@ -72,12 +72,12 @@ interface(`postgresql_role',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Marks as a SE-PostgreSQL loadable shared library module
|
## Marks as a SE-PostgreSQL loadable shared library module
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="type">
|
## <param name="type">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type marked as a database object type.
|
## Type marked as a database object type.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_loadable_module',`
|
interface(`postgresql_loadable_module',`
|
||||||
@ -90,12 +90,12 @@ interface(`postgresql_loadable_module',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Marks as a SE-PostgreSQL database object type
|
## Marks as a SE-PostgreSQL database object type
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="type">
|
## <param name="type">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type marked as a database object type.
|
## Type marked as a database object type.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_database_object',`
|
interface(`postgresql_database_object',`
|
||||||
@ -108,12 +108,12 @@ interface(`postgresql_database_object',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Marks as a SE-PostgreSQL table/column/tuple object type
|
## Marks as a SE-PostgreSQL table/column/tuple object type
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="type">
|
## <param name="type">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type marked as a table/column/tuple object type.
|
## Type marked as a table/column/tuple object type.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_table_object',`
|
interface(`postgresql_table_object',`
|
||||||
@ -126,12 +126,12 @@ interface(`postgresql_table_object',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Marks as a SE-PostgreSQL system table/column/tuple object type
|
## Marks as a SE-PostgreSQL system table/column/tuple object type
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="type">
|
## <param name="type">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type marked as a table/column/tuple object type.
|
## Type marked as a table/column/tuple object type.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_system_table_object',`
|
interface(`postgresql_system_table_object',`
|
||||||
@ -145,12 +145,12 @@ interface(`postgresql_system_table_object',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Marks as a SE-PostgreSQL procedure object type
|
## Marks as a SE-PostgreSQL procedure object type
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="type">
|
## <param name="type">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type marked as a database object type.
|
## Type marked as a database object type.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_procedure_object',`
|
interface(`postgresql_procedure_object',`
|
||||||
@ -163,12 +163,12 @@ interface(`postgresql_procedure_object',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Marks as a SE-PostgreSQL binary large object type
|
## Marks as a SE-PostgreSQL binary large object type
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="type">
|
## <param name="type">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Type marked as a database binary large object type.
|
## Type marked as a database binary large object type.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_blob_object',`
|
interface(`postgresql_blob_object',`
|
||||||
@ -302,13 +302,13 @@ interface(`postgresql_stream_connect',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the specified domain unprivileged accesses to unifined database objects
|
## Allow the specified domain unprivileged accesses to unifined database objects
|
||||||
## managed by SE-PostgreSQL,
|
## managed by SE-PostgreSQL,
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_unpriv_client',`
|
interface(`postgresql_unpriv_client',`
|
||||||
@ -335,13 +335,13 @@ interface(`postgresql_unpriv_client',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the specified domain unconfined accesses to any database objects
|
## Allow the specified domain unconfined accesses to any database objects
|
||||||
## managed by SE-PostgreSQL,
|
## managed by SE-PostgreSQL,
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgresql_unconfined',`
|
interface(`postgresql_unconfined',`
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Write to postgrey socket
|
## Write to postgrey socket
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed to talk to postgrey
|
## Domain allowed to talk to postgrey
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgrey_stream_connect',`
|
interface(`postgrey_stream_connect',`
|
||||||
@ -22,12 +22,12 @@ interface(`postgrey_stream_connect',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Search the spool directory
|
## Search the spool directory
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access
|
## Domain allowed access
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`postgrey_search_spool',`
|
interface(`postgrey_search_spool',`
|
||||||
|
@ -118,11 +118,11 @@ template(`rpc_domain_template', `
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated)
|
## Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated)
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -132,12 +132,12 @@ interface(`rpc_udp_send',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to get the attributes
|
## Do not audit attempts to get the attributes
|
||||||
## of the NFS export file.
|
## of the NFS export file.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -151,11 +151,11 @@ interface(`rpc_dontaudit_getattr_exports',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow read access to exports.
|
## Allow read access to exports.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -169,11 +169,11 @@ interface(`rpc_read_exports',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow write access to exports.
|
## Allow write access to exports.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -187,11 +187,11 @@ interface(`rpc_write_exports',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute domain in nfsd domain.
|
## Execute domain in nfsd domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -205,11 +205,11 @@ interface(`rpc_domtrans_nfsd',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read NFS exported content.
|
## Read NFS exported content.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
@ -226,11 +226,11 @@ interface(`rpc_read_nfs_content',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow domain to create read and write NFS directories.
|
## Allow domain to create read and write NFS directories.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
@ -247,11 +247,11 @@ interface(`rpc_manage_nfs_rw_content',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow domain to create read and write NFS directories.
|
## Allow domain to create read and write NFS directories.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
@ -268,11 +268,11 @@ interface(`rpc_manage_nfs_ro_content',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow domain to read and write to an NFS UDP socket.
|
## Allow domain to read and write to an NFS UDP socket.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -290,7 +290,7 @@ interface(`rpc_udp_rw_nfs_sockets',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -304,7 +304,7 @@ interface(`rpc_udp_send_nfs',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -323,7 +323,7 @@ interface(`rpc_search_nfs_state_data',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -24,14 +24,14 @@ interface(`rsync_entry_type',`
|
|||||||
## Execute a rsync in a specified domain.
|
## Execute a rsync in a specified domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Execute a rsync in a specified domain.
|
## Execute a rsync in a specified domain.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## No interprocess communication (signals, pipes,
|
## No interprocess communication (signals, pipes,
|
||||||
## etc.) is provided by this interface since
|
## etc.) is provided by this interface since
|
||||||
## the domains are not owned by this module.
|
## the domains are not owned by this module.
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
## <param name="source_domain">
|
## <param name="source_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -57,14 +57,14 @@ interface(`rsync_entry_spec_domtrans',`
|
|||||||
## Execute a rsync in a specified domain.
|
## Execute a rsync in a specified domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Execute a rsync in a specified domain.
|
## Execute a rsync in a specified domain.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## No interprocess communication (signals, pipes,
|
## No interprocess communication (signals, pipes,
|
||||||
## etc.) is provided by this interface since
|
## etc.) is provided by this interface since
|
||||||
## the domains are not owned by this module.
|
## the domains are not owned by this module.
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
## <param name="source_domain">
|
## <param name="source_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -63,9 +63,9 @@ interface(`spamassassin_exec',`
|
|||||||
## Singnal the spam assassin daemon
|
## Singnal the spam assassin daemon
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`spamassassin_signal_spamd',`
|
interface(`spamassassin_signal_spamd',`
|
||||||
@ -97,7 +97,7 @@ interface(`spamassassin_exec_spamd',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute spamassassin client in the spamassassin client domain.
|
## Execute spamassassin client in the spamassassin client domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -191,12 +191,12 @@ interface(`spamassassin_manage_lib_files',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read temporary spamd file.
|
## Read temporary spamd file.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`spamassassin_read_spamd_tmp_files',`
|
interface(`spamassassin_read_spamd_tmp_files',`
|
||||||
@ -213,9 +213,9 @@ interface(`spamassassin_read_spamd_tmp_files',`
|
|||||||
## spamd sockets/
|
## spamd sockets/
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain to not audit.
|
## Domain to not audit.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`spamassassin_dontaudit_getattr_spamd_tmp_sockets',`
|
interface(`spamassassin_dontaudit_getattr_spamd_tmp_sockets',`
|
||||||
|
@ -7,16 +7,16 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Define a specified domain as a ucspitcp service.
|
## Define a specified domain as a ucspitcp service.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <param name="entrypoint">
|
## <param name="entrypoint">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type associated with the process program.
|
## The type associated with the process program.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -761,12 +761,12 @@ interface(`xserver_read_xdm_pid',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Read XDM var lib files.
|
## Read XDM var lib files.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`xserver_read_xdm_lib_files',`
|
interface(`xserver_read_xdm_lib_files',`
|
||||||
|
@ -28,16 +28,16 @@ interface(`daemontools_ipc_domain',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Define a specified domain as a supervised service.
|
## Define a specified domain as a supervised service.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <param name="entrypoint">
|
## <param name="entrypoint">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type associated with the process program.
|
## The type associated with the process program.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -55,11 +55,11 @@ interface(`daemontools_service_domain',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute in the svc_start_t domain.
|
## Execute in the svc_start_t domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -73,11 +73,11 @@ interface(`daemontools_domtrans_start',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute in the svc_run_t domain.
|
## Execute in the svc_run_t domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -91,11 +91,11 @@ interface(`daemontools_domtrans_run',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute in the svc_multilog_t domain.
|
## Execute in the svc_multilog_t domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -109,11 +109,11 @@ interface(`daemontools_domtrans_multilog',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow a domain to read svc_svc_t files.
|
## Allow a domain to read svc_svc_t files.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
@ -129,11 +129,11 @@ interface(`daemontools_read_svc',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow a domain to create svc_svc_t files.
|
## Allow a domain to create svc_svc_t files.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <rolecap/>
|
## <rolecap/>
|
||||||
|
@ -666,14 +666,14 @@ interface(`init_domtrans_script',`
|
|||||||
## Execute a init script in a specified domain.
|
## Execute a init script in a specified domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Execute a init script in a specified domain.
|
## Execute a init script in a specified domain.
|
||||||
## </p>
|
## </p>
|
||||||
## <p>
|
## <p>
|
||||||
## No interprocess communication (signals, pipes,
|
## No interprocess communication (signals, pipes,
|
||||||
## etc.) is provided by this interface since
|
## etc.) is provided by this interface since
|
||||||
## the domains are not owned by this module.
|
## the domains are not owned by this module.
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
## <param name="source_domain">
|
## <param name="source_domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
@ -1133,7 +1133,7 @@ interface(`init_rw_script_stream_sockets',`
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -1451,11 +1451,11 @@ interface(`init_dontaudit_rw_utmp',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Create, read, write, and delete utmp.
|
## Create, read, write, and delete utmp.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain access allowed.
|
## Domain access allowed.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -113,7 +113,7 @@ optional_policy(`
|
|||||||
|
|
||||||
optional_policy(`
|
optional_policy(`
|
||||||
# When you install a kernel the postinstall builds a initrd image in tmp
|
# When you install a kernel the postinstall builds a initrd image in tmp
|
||||||
# and executes ldconfig on it. If you dont allow this kernel installs
|
# and executes ldconfig on it. If you dont allow this kernel installs
|
||||||
# blow up.
|
# blow up.
|
||||||
rpm_manage_script_tmp_files(ldconfig_t)
|
rpm_manage_script_tmp_files(ldconfig_t)
|
||||||
')
|
')
|
||||||
|
@ -533,12 +533,12 @@ interface(`logging_search_logs',`
|
|||||||
|
|
||||||
#######################################
|
#######################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Do not audit attempts to search the var log directory.
|
## Do not audit attempts to search the var log directory.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain not to audit.
|
## Domain not to audit.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`logging_dontaudit_search_logs',`
|
interface(`logging_dontaudit_search_logs',`
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute netlabel_mgmt in the netlabel_mgmt domain.
|
## Execute netlabel_mgmt in the netlabel_mgmt domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`netlabel_domtrans_mgmt',`
|
interface(`netlabel_domtrans_mgmt',`
|
||||||
@ -21,13 +21,13 @@ interface(`netlabel_domtrans_mgmt',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Execute netlabel_mgmt in the netlabel_mgmt domain, and
|
## Execute netlabel_mgmt in the netlabel_mgmt domain, and
|
||||||
## allow the specified role the netlabel_mgmt domain.
|
## allow the specified role the netlabel_mgmt domain.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
## <param name="role">
|
## <param name="role">
|
||||||
## <summary>
|
## <summary>
|
||||||
|
@ -6,7 +6,7 @@
|
|||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## The type of the process performing this action.
|
## The type of the process performing this action.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
@ -78,7 +78,7 @@ template(`userdom_base_user_template',`
|
|||||||
dev_dontaudit_getattr_all_chr_files($1_t)
|
dev_dontaudit_getattr_all_chr_files($1_t)
|
||||||
|
|
||||||
# When the user domain runs ps, there will be a number of access
|
# When the user domain runs ps, there will be a number of access
|
||||||
# denials when ps tries to search /proc. Do not audit these denials.
|
# denials when ps tries to search /proc. Do not audit these denials.
|
||||||
domain_dontaudit_read_all_domains_state($1_t)
|
domain_dontaudit_read_all_domains_state($1_t)
|
||||||
domain_dontaudit_getattr_all_domains($1_t)
|
domain_dontaudit_getattr_all_domains($1_t)
|
||||||
domain_dontaudit_getsession_all_domains($1_t)
|
domain_dontaudit_getsession_all_domains($1_t)
|
||||||
@ -1405,11 +1405,11 @@ interface(`userdom_dontaudit_search_user_home_dirs',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## List user home directories.
|
## List user home directories.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
@ -1979,11 +1979,11 @@ interface(`userdom_user_home_dir_filetrans_user_home_content',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Write to user temporary named sockets.
|
## Write to user temporary named sockets.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## <summary>
|
## <summary>
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
## </summary>
|
## </summary>
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
|
Loading…
Reference in New Issue
Block a user