Policy controlling access to storage devices
Create block devices in /dev with the fixed disk type.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Create fixed disk device nodes on a tmpfs filesystem.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Do not audit attempts made by the caller to get the attributes of fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process to not audit. | No |
Do not audit attempts made by the caller to get the attributes of removable devices device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process to not audit. | No |
Do not audit attempts made by the caller to read fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process to not audit. | No |
Do not audit attempts made by the caller to read removable devices device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process to not audit. | No |
Do not audit attempts made by the caller to set the attributes of fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process to not audit. | No |
Do not audit attempts made by the caller to set the attributes of removable devices device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process to not audit. | No |
Allow the caller to get the attributes of fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to get the attributes of removable devices device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to get the attributes of the generic SCSI interface device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to get the attributes of device nodes of tape devices.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Create, read, write, and delete fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read from a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read from a logical volume. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read from a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read from a logical volume. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly write to a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read a tape device.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Relabel fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Set attributes of the device nodes for the SCSI generic inerface.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to set the attributes of fixed disk device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to set the attributes of removable devices device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to set the attributes of the generic SCSI interface device nodes.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to set the attributes of device nodes of tape devices.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Enable a fixed disk device as swap space
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Unconfined access to storage devices.
Parameter: | Description: | Optional: |
---|---|---|
domain | Domain allowed access. | No |
Allow the caller to directly write, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |
Allow the caller to directly read a tape device.
Parameter: | Description: | Optional: |
---|---|---|
domain | The type of the process performing this action. | No |