diff options
author | Kenton Groombridge <concord@gentoo.org> | 2023-03-31 14:07:26 -0400 |
---|---|---|
committer | Kenton Groombridge <concord@gentoo.org> | 2023-03-31 14:08:02 -0400 |
commit | 062f39e5dcb952b95a2f1272960b2379f5a41069 (patch) | |
tree | 2b4586b9ac47967b9e6cd59efa1b217fc31c3553 | |
parent | Merge upstream (diff) | |
download | hardened-refpolicy-2.20221101-r4.tar.gz hardened-refpolicy-2.20221101-r4.tar.bz2 hardened-refpolicy-2.20221101-r4.zip |
Update generated policy and doc files2.20221101-r4
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
-rw-r--r-- | doc/policy.xml | 1750 |
1 files changed, 944 insertions, 806 deletions
diff --git a/doc/policy.xml b/doc/policy.xml index ed1c8ef5..ec78d338 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -2455,7 +2455,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="portage_dontaudit_search_tmp" lineno="338"> +<interface name="portage_dontaudit_use_inherited_ptys" lineno="337"> +<summary> +Do not audit attempts to read and write inherited portage ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="portage_dontaudit_search_tmp" lineno="356"> <summary> Do not audit attempts to search the portage temporary directories. @@ -2466,7 +2476,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="portage_dontaudit_rw_tmp_files" lineno="357"> +<interface name="portage_dontaudit_rw_tmp_files" lineno="375"> <summary> Do not audit attempts to read and write the portage temporary files. @@ -2477,7 +2487,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="portage_eselect_module" lineno="382"> +<interface name="portage_eselect_module" lineno="400"> <summary> Allow the domain to run within an eselect module script. </summary> @@ -2487,7 +2497,7 @@ Domain to allow within an eselect module </summary> </param> </interface> -<interface name="portage_ro_role" lineno="405"> +<interface name="portage_ro_role" lineno="423"> <summary> Read all portage files </summary> @@ -2502,7 +2512,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_db" lineno="425"> +<interface name="portage_read_db" lineno="443"> <summary> Read portage db files </summary> @@ -2512,7 +2522,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_cache" lineno="445"> +<interface name="portage_read_cache" lineno="463"> <summary> Read portage cache files </summary> @@ -2522,7 +2532,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_config" lineno="466"> +<interface name="portage_read_config" lineno="484"> <summary> Read portage configuration files </summary> @@ -2532,7 +2542,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_ebuild" lineno="488"> +<interface name="portage_read_ebuild" lineno="506"> <summary> Read portage ebuild files </summary> @@ -2542,7 +2552,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_log" lineno="510"> +<interface name="portage_read_log" lineno="528"> <summary> Read portage log files </summary> @@ -2552,7 +2562,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_read_srcrepo" lineno="529"> +<interface name="portage_read_srcrepo" lineno="547"> <summary> Read portage src repository files </summary> @@ -2562,7 +2572,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="portage_dontaudit_write_cache" lineno="551"> +<interface name="portage_dontaudit_write_cache" lineno="569"> <summary> Do not audit writing portage cache files </summary> @@ -61051,7 +61061,18 @@ Domain not to audit. </param> </interface> -<interface name="files_mounton_all_mountpoints" lineno="1726"> +<interface name="files_relabel_config_symlinks" lineno="1727"> +<summary> +Relabel configuration symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="files_mounton_all_mountpoints" lineno="1745"> <summary> Mount a filesystem on all mount points. </summary> @@ -61061,7 +61082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_mountpoints" lineno="1747"> +<interface name="files_getattr_all_mountpoints" lineno="1766"> <summary> Get the attributes of all mount points. </summary> @@ -61071,7 +61092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_mountpoints" lineno="1765"> +<interface name="files_setattr_all_mountpoints" lineno="1784"> <summary> Set the attributes of all mount points. </summary> @@ -61081,7 +61102,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1783"> +<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1802"> <summary> Do not audit attempts to set the attributes on all mount points. </summary> @@ -61091,7 +61112,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_all_mountpoints" lineno="1801"> +<interface name="files_search_all_mountpoints" lineno="1820"> <summary> Search all mount points. </summary> @@ -61101,7 +61122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_mountpoints" lineno="1819"> +<interface name="files_dontaudit_search_all_mountpoints" lineno="1838"> <summary> Do not audit searching of all mount points. </summary> @@ -61111,7 +61132,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_all_mountpoints" lineno="1837"> +<interface name="files_list_all_mountpoints" lineno="1856"> <summary> List all mount points. </summary> @@ -61121,7 +61142,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_all_mountpoints" lineno="1855"> +<interface name="files_dontaudit_list_all_mountpoints" lineno="1874"> <summary> Do not audit listing of all mount points. </summary> @@ -61131,7 +61152,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_watch_all_mountpoints" lineno="1873"> +<interface name="files_watch_all_mountpoints" lineno="1892"> <summary> Watch all mountpoints. </summary> @@ -61141,7 +61162,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_all_mount_perm" lineno="1891"> +<interface name="files_watch_all_mount_perm" lineno="1910"> <summary> Watch all mountpoints. </summary> @@ -61151,7 +61172,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_all_mountpoints" lineno="1909"> +<interface name="files_write_all_mountpoints" lineno="1928"> <summary> Check if all mountpoints are writable. </summary> @@ -61161,7 +61182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_mountpoints" lineno="1927"> +<interface name="files_dontaudit_write_all_mountpoints" lineno="1946"> <summary> Do not audit attempts to write to mount points. </summary> @@ -61171,7 +61192,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_root" lineno="1945"> +<interface name="files_list_root" lineno="1964"> <summary> List the contents of the root directory. </summary> @@ -61181,7 +61202,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_symlinks" lineno="1965"> +<interface name="files_delete_root_symlinks" lineno="1984"> <summary> Delete symbolic links in the root directory. @@ -61192,7 +61213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_root_dirs" lineno="1983"> +<interface name="files_dontaudit_write_root_dirs" lineno="2002"> <summary> Do not audit attempts to write to / dirs. </summary> @@ -61202,7 +61223,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_dir" lineno="2002"> +<interface name="files_dontaudit_rw_root_dir" lineno="2021"> <summary> Do not audit attempts to write files in the root directory. @@ -61213,7 +61234,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_watch_root_dirs" lineno="2020"> +<interface name="files_watch_root_dirs" lineno="2039"> <summary> Watch the root directory. </summary> @@ -61223,7 +61244,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_root_filetrans" lineno="2054"> +<interface name="files_root_filetrans" lineno="2073"> <summary> Create an object in the root directory, with a private type using a type transition. @@ -61249,7 +61270,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_read_root_files" lineno="2073"> +<interface name="files_dontaudit_read_root_files" lineno="2092"> <summary> Do not audit attempts to read files in the root directory. @@ -61260,7 +61281,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_files" lineno="2092"> +<interface name="files_dontaudit_rw_root_files" lineno="2111"> <summary> Do not audit attempts to read or write files in the root directory. @@ -61271,7 +61292,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_chr_files" lineno="2111"> +<interface name="files_dontaudit_rw_root_chr_files" lineno="2130"> <summary> Do not audit attempts to read or write character device nodes in the root directory. @@ -61282,7 +61303,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_root_chr_files" lineno="2130"> +<interface name="files_delete_root_chr_files" lineno="2149"> <summary> Delete character device nodes in the root directory. @@ -61293,7 +61314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_files" lineno="2148"> +<interface name="files_delete_root_files" lineno="2167"> <summary> Delete files in the root directory. </summary> @@ -61303,7 +61324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_root_files" lineno="2166"> +<interface name="files_exec_root_files" lineno="2185"> <summary> Execute files in the root directory. </summary> @@ -61313,7 +61334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_dir_entry" lineno="2184"> +<interface name="files_delete_root_dir_entry" lineno="2203"> <summary> Remove entries from the root directory. </summary> @@ -61323,7 +61344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_root_dir" lineno="2202"> +<interface name="files_manage_root_dir" lineno="2221"> <summary> Manage the root directory. </summary> @@ -61333,7 +61354,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_rootfs" lineno="2221"> +<interface name="files_getattr_rootfs" lineno="2240"> <summary> Get the attributes of a rootfs file system. @@ -61344,7 +61365,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_rootfs" lineno="2239"> +<interface name="files_associate_rootfs" lineno="2258"> <summary> Associate to root file system. </summary> @@ -61354,7 +61375,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_relabel_rootfs" lineno="2257"> +<interface name="files_relabel_rootfs" lineno="2276"> <summary> Relabel to and from rootfs file system. </summary> @@ -61364,7 +61385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_rootfs" lineno="2275"> +<interface name="files_unmount_rootfs" lineno="2294"> <summary> Unmount a rootfs filesystem. </summary> @@ -61374,7 +61395,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_root" lineno="2293"> +<interface name="files_mounton_root" lineno="2312"> <summary> Mount on the root directory (/) </summary> @@ -61384,7 +61405,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_boot_fs" lineno="2312"> +<interface name="files_getattr_boot_fs" lineno="2331"> <summary> Get the attributes of a filesystem mounted on /boot. @@ -61395,7 +61416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_remount_boot" lineno="2330"> +<interface name="files_remount_boot" lineno="2349"> <summary> Remount a filesystem mounted on /boot. </summary> @@ -61405,7 +61426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_boot_dirs" lineno="2348"> +<interface name="files_getattr_boot_dirs" lineno="2367"> <summary> Get attributes of the /boot directory. </summary> @@ -61415,7 +61436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_boot_dirs" lineno="2367"> +<interface name="files_dontaudit_getattr_boot_dirs" lineno="2386"> <summary> Do not audit attempts to get attributes of the /boot directory. @@ -61426,7 +61447,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_boot" lineno="2385"> +<interface name="files_search_boot" lineno="2404"> <summary> Search the /boot directory. </summary> @@ -61436,7 +61457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_boot" lineno="2403"> +<interface name="files_dontaudit_search_boot" lineno="2422"> <summary> Do not audit attempts to search the /boot directory. </summary> @@ -61446,7 +61467,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_boot" lineno="2421"> +<interface name="files_list_boot" lineno="2440"> <summary> List the /boot directory. </summary> @@ -61456,7 +61477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_boot" lineno="2439"> +<interface name="files_dontaudit_list_boot" lineno="2458"> <summary> Do not audit attempts to list the /boot directory. </summary> @@ -61466,7 +61487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_boot_dirs" lineno="2457"> +<interface name="files_create_boot_dirs" lineno="2476"> <summary> Create directories in /boot </summary> @@ -61476,7 +61497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_dirs" lineno="2476"> +<interface name="files_manage_boot_dirs" lineno="2495"> <summary> Create, read, write, and delete directories in /boot. @@ -61487,7 +61508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_boot_filetrans" lineno="2510"> +<interface name="files_boot_filetrans" lineno="2529"> <summary> Create a private type object in boot with an automatic type transition @@ -61513,7 +61534,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_boot_files" lineno="2529"> +<interface name="files_read_boot_files" lineno="2548"> <summary> read files in the /boot directory. </summary> @@ -61524,7 +61545,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_boot_files" lineno="2549"> +<interface name="files_manage_boot_files" lineno="2568"> <summary> Create, read, write, and delete files in the /boot directory. @@ -61536,7 +61557,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelfrom_boot_files" lineno="2567"> +<interface name="files_relabelfrom_boot_files" lineno="2586"> <summary> Relabel from files in the /boot directory. </summary> @@ -61546,7 +61567,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_boot_symlinks" lineno="2585"> +<interface name="files_read_boot_symlinks" lineno="2604"> <summary> Read symbolic links in the /boot directory. </summary> @@ -61556,7 +61577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_boot_symlinks" lineno="2604"> +<interface name="files_rw_boot_symlinks" lineno="2623"> <summary> Read and write symbolic links in the /boot directory. @@ -61567,7 +61588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_symlinks" lineno="2624"> +<interface name="files_manage_boot_symlinks" lineno="2643"> <summary> Create, read, write, and delete symbolic links in the /boot directory. @@ -61578,7 +61599,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_img" lineno="2642"> +<interface name="files_read_kernel_img" lineno="2661"> <summary> Read kernel files in the /boot directory. </summary> @@ -61588,7 +61609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_img" lineno="2663"> +<interface name="files_create_kernel_img" lineno="2682"> <summary> Install a kernel into the /boot directory. </summary> @@ -61599,7 +61620,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_delete_kernel" lineno="2683"> +<interface name="files_delete_kernel" lineno="2702"> <summary> Delete a kernel from /boot. </summary> @@ -61610,7 +61631,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_default_dirs" lineno="2701"> +<interface name="files_getattr_default_dirs" lineno="2720"> <summary> Getattr of directories with the default file type. </summary> @@ -61620,7 +61641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_dirs" lineno="2720"> +<interface name="files_dontaudit_getattr_default_dirs" lineno="2739"> <summary> Do not audit attempts to get the attributes of directories with the default file type. @@ -61631,7 +61652,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_default" lineno="2738"> +<interface name="files_search_default" lineno="2757"> <summary> Search the contents of directories with the default file type. </summary> @@ -61641,7 +61662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_default" lineno="2756"> +<interface name="files_list_default" lineno="2775"> <summary> List contents of directories with the default file type. </summary> @@ -61651,7 +61672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_default" lineno="2775"> +<interface name="files_dontaudit_list_default" lineno="2794"> <summary> Do not audit attempts to list contents of directories with the default file type. @@ -61662,7 +61683,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_dirs" lineno="2794"> +<interface name="files_manage_default_dirs" lineno="2813"> <summary> Create, read, write, and delete directories with the default file type. @@ -61673,7 +61694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_default" lineno="2812"> +<interface name="files_mounton_default" lineno="2831"> <summary> Mount a filesystem on a directory with the default file type. </summary> @@ -61683,7 +61704,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_files" lineno="2831"> +<interface name="files_dontaudit_getattr_default_files" lineno="2850"> <summary> Do not audit attempts to get the attributes of files with the default file type. @@ -61694,7 +61715,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_default_files" lineno="2849"> +<interface name="files_read_default_files" lineno="2868"> <summary> Read files with the default file type. </summary> @@ -61704,7 +61725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_read_default_files" lineno="2868"> +<interface name="files_dontaudit_read_default_files" lineno="2887"> <summary> Do not audit attempts to read files with the default file type. @@ -61715,7 +61736,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_files" lineno="2887"> +<interface name="files_manage_default_files" lineno="2906"> <summary> Create, read, write, and delete files with the default file type. @@ -61726,7 +61747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_symlinks" lineno="2905"> +<interface name="files_read_default_symlinks" lineno="2924"> <summary> Read symbolic links with the default file type. </summary> @@ -61736,7 +61757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_sockets" lineno="2923"> +<interface name="files_read_default_sockets" lineno="2942"> <summary> Read sockets with the default file type. </summary> @@ -61746,7 +61767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_pipes" lineno="2941"> +<interface name="files_read_default_pipes" lineno="2960"> <summary> Read named pipes with the default file type. </summary> @@ -61756,7 +61777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_etc" lineno="2959"> +<interface name="files_search_etc" lineno="2978"> <summary> Search the contents of /etc directories. </summary> @@ -61766,7 +61787,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_etc_dirs" lineno="2977"> +<interface name="files_setattr_etc_dirs" lineno="2996"> <summary> Set the attributes of the /etc directories. </summary> @@ -61776,7 +61797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_etc" lineno="2995"> +<interface name="files_list_etc" lineno="3014"> <summary> List the contents of /etc directories. </summary> @@ -61786,7 +61807,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_dirs" lineno="3013"> +<interface name="files_dontaudit_write_etc_dirs" lineno="3032"> <summary> Do not audit attempts to write to /etc dirs. </summary> @@ -61796,7 +61817,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_dirs" lineno="3031"> +<interface name="files_rw_etc_dirs" lineno="3050"> <summary> Add and remove entries from /etc directories. </summary> @@ -61806,7 +61827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_dirs" lineno="3050"> +<interface name="files_manage_etc_dirs" lineno="3069"> <summary> Manage generic directories in /etc </summary> @@ -61817,7 +61838,7 @@ Domain allowed access </param> </interface> -<interface name="files_relabelto_etc_dirs" lineno="3068"> +<interface name="files_relabelto_etc_dirs" lineno="3087"> <summary> Relabel directories to etc_t. </summary> @@ -61827,7 +61848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_dirs" lineno="3087"> +<interface name="files_mounton_etc_dirs" lineno="3106"> <summary> Mount a filesystem on the etc directories. @@ -61838,7 +61859,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_remount_etc" lineno="3105"> +<interface name="files_remount_etc" lineno="3124"> <summary> Remount etc filesystems. </summary> @@ -61848,7 +61869,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_dirs" lineno="3123"> +<interface name="files_watch_etc_dirs" lineno="3142"> <summary> Watch /etc directories </summary> @@ -61858,7 +61879,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_files" lineno="3175"> +<interface name="files_read_etc_files" lineno="3194"> <summary> Read generic files in /etc. </summary> @@ -61902,7 +61923,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_map_etc_files" lineno="3207"> +<interface name="files_map_etc_files" lineno="3226"> <summary> Map generic files in /etc. </summary> @@ -61924,7 +61945,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_dontaudit_write_etc_files" lineno="3225"> +<interface name="files_dontaudit_write_etc_files" lineno="3244"> <summary> Do not audit attempts to write generic files in /etc. </summary> @@ -61934,7 +61955,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_etc_files" lineno="3244"> +<interface name="files_rw_etc_files" lineno="3263"> <summary> Read and write generic files in /etc. </summary> @@ -61945,7 +61966,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_files" lineno="3266"> +<interface name="files_manage_etc_files" lineno="3285"> <summary> Create, read, write, and delete generic files in /etc. @@ -61957,7 +61978,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_manage_etc_files" lineno="3287"> +<interface name="files_dontaudit_manage_etc_files" lineno="3306"> <summary> Do not audit attempts to create, read, write, and delete generic files in /etc. @@ -61969,7 +61990,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="files_delete_etc_files" lineno="3305"> +<interface name="files_delete_etc_files" lineno="3324"> <summary> Delete system configuration files in /etc. </summary> @@ -61979,7 +62000,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_etc_files" lineno="3323"> +<interface name="files_exec_etc_files" lineno="3342"> <summary> Execute generic files in /etc. </summary> @@ -61989,7 +62010,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_files" lineno="3343"> +<interface name="files_watch_etc_files" lineno="3362"> <summary> Watch /etc files. </summary> @@ -61999,7 +62020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_get_etc_unit_status" lineno="3361"> +<interface name="files_get_etc_unit_status" lineno="3380"> <summary> Get etc_t service status. </summary> @@ -62009,7 +62030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_start_etc_service" lineno="3380"> +<interface name="files_start_etc_service" lineno="3399"> <summary> start etc_t service </summary> @@ -62019,7 +62040,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_stop_etc_service" lineno="3399"> +<interface name="files_stop_etc_service" lineno="3418"> <summary> stop etc_t service </summary> @@ -62029,7 +62050,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_etc_files" lineno="3418"> +<interface name="files_relabel_etc_files" lineno="3437"> <summary> Relabel from and to generic files in /etc. </summary> @@ -62039,7 +62060,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_symlinks" lineno="3437"> +<interface name="files_read_etc_symlinks" lineno="3456"> <summary> Read symbolic links in /etc. </summary> @@ -62049,7 +62070,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_symlinks" lineno="3455"> +<interface name="files_watch_etc_symlinks" lineno="3474"> <summary> Watch /etc symlinks </summary> @@ -62059,7 +62080,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_symlinks" lineno="3473"> +<interface name="files_manage_etc_symlinks" lineno="3492"> <summary> Create, read, write, and delete symbolic links in /etc. </summary> @@ -62069,7 +62090,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans" lineno="3507"> +<interface name="files_etc_filetrans" lineno="3526"> <summary> Create objects in /etc with a private type using a type_transition. @@ -62095,7 +62116,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_boot_flag" lineno="3537"> +<interface name="files_create_boot_flag" lineno="3556"> <summary> Create a boot flag. </summary> @@ -62117,7 +62138,7 @@ The name of the object being created. </param> <rolecap/> </interface> -<interface name="files_delete_boot_flag" lineno="3563"> +<interface name="files_delete_boot_flag" lineno="3582"> <summary> Delete a boot flag. </summary> @@ -62134,7 +62155,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_etc_runtime_dirs" lineno="3582"> +<interface name="files_getattr_etc_runtime_dirs" lineno="3601"> <summary> Get the attributes of the etc_runtime directories. @@ -62145,7 +62166,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_runtime_dirs" lineno="3601"> +<interface name="files_mounton_etc_runtime_dirs" lineno="3620"> <summary> Mount a filesystem on the etc_runtime directories. @@ -62156,7 +62177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_etc_runtime_dirs" lineno="3619"> +<interface name="files_relabelto_etc_runtime_dirs" lineno="3638"> <summary> Relabel to etc_runtime_t dirs. </summary> @@ -62166,7 +62187,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3637"> +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3656"> <summary> Do not audit attempts to set the attributes of the etc_runtime files </summary> @@ -62176,7 +62197,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_etc_runtime_files" lineno="3675"> +<interface name="files_read_etc_runtime_files" lineno="3694"> <summary> Read files in /etc that are dynamically created on boot, such as mtab. @@ -62206,7 +62227,7 @@ Domain allowed access. <infoflow type="read" weight="10" /> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime_files" lineno="3697"> +<interface name="files_dontaudit_read_etc_runtime_files" lineno="3716"> <summary> Do not audit attempts to read files in /etc that are dynamically @@ -62218,7 +62239,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_read_etc_files" lineno="3716"> +<interface name="files_dontaudit_read_etc_files" lineno="3735"> <summary> Do not audit attempts to read files in /etc @@ -62229,7 +62250,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_runtime_files" lineno="3735"> +<interface name="files_dontaudit_write_etc_runtime_files" lineno="3754"> <summary> Do not audit attempts to write etc runtime files. @@ -62240,7 +62261,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_runtime_files" lineno="3755"> +<interface name="files_rw_etc_runtime_files" lineno="3774"> <summary> Read and write files in /etc that are dynamically created on boot, such as mtab. @@ -62252,7 +62273,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_runtime_files" lineno="3777"> +<interface name="files_manage_etc_runtime_files" lineno="3796"> <summary> Create, read, write, and delete files in /etc that are dynamically created on boot, @@ -62265,7 +62286,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelto_etc_runtime_files" lineno="3795"> +<interface name="files_relabelto_etc_runtime_files" lineno="3814"> <summary> Relabel to etc_runtime_t files. </summary> @@ -62275,7 +62296,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans_etc_runtime" lineno="3824"> +<interface name="files_etc_filetrans_etc_runtime" lineno="3843"> <summary> Create, etc runtime objects with an automatic type transition. @@ -62296,7 +62317,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_home_dir" lineno="3843"> +<interface name="files_getattr_home_dir" lineno="3862"> <summary> Get the attributes of the home directories root (/home). @@ -62307,7 +62328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_home_dir" lineno="3864"> +<interface name="files_dontaudit_getattr_home_dir" lineno="3883"> <summary> Do not audit attempts to get the attributes of the home directories root @@ -62319,7 +62340,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_home" lineno="3883"> +<interface name="files_search_home" lineno="3902"> <summary> Search home directories root (/home). </summary> @@ -62329,7 +62350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_home" lineno="3903"> +<interface name="files_dontaudit_search_home" lineno="3922"> <summary> Do not audit attempts to search home directories root (/home). @@ -62340,7 +62361,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_list_home" lineno="3923"> +<interface name="files_dontaudit_list_home" lineno="3942"> <summary> Do not audit attempts to list home directories root (/home). @@ -62351,7 +62372,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_home" lineno="3942"> +<interface name="files_list_home" lineno="3961"> <summary> Get listing of home directories. </summary> @@ -62361,7 +62382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_home" lineno="3961"> +<interface name="files_relabelto_home" lineno="3980"> <summary> Relabel to user home root (/home). </summary> @@ -62371,7 +62392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_home" lineno="3979"> +<interface name="files_relabelfrom_home" lineno="3998"> <summary> Relabel from user home root (/home). </summary> @@ -62381,7 +62402,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_home" lineno="3997"> +<interface name="files_watch_home" lineno="4016"> <summary> Watch the user home root (/home). </summary> @@ -62391,7 +62412,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_home_filetrans" lineno="4030"> +<interface name="files_home_filetrans" lineno="4049"> <summary> Create objects in /home. </summary> @@ -62416,7 +62437,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_lost_found_dirs" lineno="4048"> +<interface name="files_getattr_lost_found_dirs" lineno="4067"> <summary> Get the attributes of lost+found directories. </summary> @@ -62426,7 +62447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4067"> +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4086"> <summary> Do not audit attempts to get the attributes of lost+found directories. @@ -62437,7 +62458,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_lost_found" lineno="4085"> +<interface name="files_list_lost_found" lineno="4104"> <summary> List the contents of lost+found directories. </summary> @@ -62447,7 +62468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_lost_found" lineno="4105"> +<interface name="files_manage_lost_found" lineno="4124"> <summary> Create, read, write, and delete objects in lost+found directories. @@ -62459,7 +62480,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_search_mnt" lineno="4127"> +<interface name="files_search_mnt" lineno="4146"> <summary> Search the contents of /mnt. </summary> @@ -62469,7 +62490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_mnt" lineno="4145"> +<interface name="files_dontaudit_search_mnt" lineno="4164"> <summary> Do not audit attempts to search /mnt. </summary> @@ -62479,7 +62500,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_mnt" lineno="4163"> +<interface name="files_list_mnt" lineno="4182"> <summary> List the contents of /mnt. </summary> @@ -62489,7 +62510,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_mnt" lineno="4181"> +<interface name="files_dontaudit_list_mnt" lineno="4200"> <summary> Do not audit attempts to list the contents of /mnt. </summary> @@ -62499,7 +62520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_mnt" lineno="4199"> +<interface name="files_mounton_mnt" lineno="4218"> <summary> Mount a filesystem on /mnt. </summary> @@ -62509,7 +62530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_dirs" lineno="4218"> +<interface name="files_manage_mnt_dirs" lineno="4237"> <summary> Create, read, write, and delete directories in /mnt. </summary> @@ -62520,7 +62541,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_mnt_files" lineno="4236"> +<interface name="files_manage_mnt_files" lineno="4255"> <summary> Create, read, write, and delete files in /mnt. </summary> @@ -62530,7 +62551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_files" lineno="4254"> +<interface name="files_read_mnt_files" lineno="4273"> <summary> read files in /mnt. </summary> @@ -62540,7 +62561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_symlinks" lineno="4272"> +<interface name="files_read_mnt_symlinks" lineno="4291"> <summary> Read symbolic links in /mnt. </summary> @@ -62550,7 +62571,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_symlinks" lineno="4290"> +<interface name="files_manage_mnt_symlinks" lineno="4309"> <summary> Create, read, write, and delete symbolic links in /mnt. </summary> @@ -62560,7 +62581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_kernel_modules" lineno="4308"> +<interface name="files_search_kernel_modules" lineno="4327"> <summary> Search the contents of the kernel module directories. </summary> @@ -62570,7 +62591,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_kernel_modules" lineno="4327"> +<interface name="files_list_kernel_modules" lineno="4346"> <summary> List the contents of the kernel module directories. </summary> @@ -62580,7 +62601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_kernel_modules" lineno="4346"> +<interface name="files_getattr_kernel_modules" lineno="4365"> <summary> Get the attributes of kernel module files. </summary> @@ -62590,7 +62611,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_modules" lineno="4364"> +<interface name="files_read_kernel_modules" lineno="4383"> <summary> Read kernel module files. </summary> @@ -62600,7 +62621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mmap_read_kernel_modules" lineno="4384"> +<interface name="files_mmap_read_kernel_modules" lineno="4403"> <summary> Read and mmap kernel module files. </summary> @@ -62610,7 +62631,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_kernel_modules" lineno="4405"> +<interface name="files_write_kernel_modules" lineno="4424"> <summary> Write kernel module files. </summary> @@ -62620,7 +62641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_modules" lineno="4424"> +<interface name="files_delete_kernel_modules" lineno="4443"> <summary> Delete kernel module files. </summary> @@ -62630,7 +62651,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_kernel_modules" lineno="4444"> +<interface name="files_manage_kernel_modules" lineno="4463"> <summary> Create, read, write, and delete kernel module files. @@ -62642,7 +62663,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_kernel_modules" lineno="4464"> +<interface name="files_relabel_kernel_modules" lineno="4483"> <summary> Relabel from and to kernel module files. </summary> @@ -62652,7 +62673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_kernel_modules_dirs" lineno="4483"> +<interface name="files_mounton_kernel_modules_dirs" lineno="4502"> <summary> Mount on kernel module directories. </summary> @@ -62662,7 +62683,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_kernel_modules_filetrans" lineno="4517"> +<interface name="files_kernel_modules_filetrans" lineno="4536"> <summary> Create objects in the kernel module directories with a private type via an automatic type transition. @@ -62688,7 +62709,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_load_kernel_modules" lineno="4535"> +<interface name="files_load_kernel_modules" lineno="4554"> <summary> Load kernel module files. </summary> @@ -62698,7 +62719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_load_kernel_modules" lineno="4554"> +<interface name="files_dontaudit_load_kernel_modules" lineno="4573"> <summary> Load kernel module files. </summary> @@ -62708,7 +62729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_world_readable" lineno="4574"> +<interface name="files_list_world_readable" lineno="4593"> <summary> List world-readable directories. </summary> @@ -62719,7 +62740,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_files" lineno="4593"> +<interface name="files_read_world_readable_files" lineno="4612"> <summary> Read world-readable files. </summary> @@ -62730,7 +62751,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_symlinks" lineno="4612"> +<interface name="files_read_world_readable_symlinks" lineno="4631"> <summary> Read world-readable symbolic links. </summary> @@ -62741,7 +62762,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_pipes" lineno="4630"> +<interface name="files_read_world_readable_pipes" lineno="4649"> <summary> Read world-readable named pipes. </summary> @@ -62751,7 +62772,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_world_readable_sockets" lineno="4648"> +<interface name="files_read_world_readable_sockets" lineno="4667"> <summary> Read world-readable sockets. </summary> @@ -62761,7 +62782,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_tmp" lineno="4668"> +<interface name="files_associate_tmp" lineno="4687"> <summary> Allow the specified type to associate to a filesystem with the type of the @@ -62773,7 +62794,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_getattr_tmp_dirs" lineno="4686"> +<interface name="files_getattr_tmp_dirs" lineno="4705"> <summary> Get the attributes of the tmp directory (/tmp). </summary> @@ -62783,7 +62804,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4705"> +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4724"> <summary> Do not audit attempts to get the attributes of the tmp directory (/tmp). @@ -62794,7 +62815,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_tmp" lineno="4723"> +<interface name="files_search_tmp" lineno="4742"> <summary> Search the tmp directory (/tmp). </summary> @@ -62804,7 +62825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_tmp" lineno="4741"> +<interface name="files_dontaudit_search_tmp" lineno="4760"> <summary> Do not audit attempts to search the tmp directory (/tmp). </summary> @@ -62814,7 +62835,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_tmp" lineno="4759"> +<interface name="files_list_tmp" lineno="4778"> <summary> Read the tmp directory (/tmp). </summary> @@ -62824,7 +62845,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_tmp" lineno="4777"> +<interface name="files_dontaudit_list_tmp" lineno="4796"> <summary> Do not audit listing of the tmp directory (/tmp). </summary> @@ -62834,7 +62855,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_delete_tmp_dir_entry" lineno="4795"> +<interface name="files_delete_tmp_dir_entry" lineno="4814"> <summary> Remove entries from the tmp directory. </summary> @@ -62844,7 +62865,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_files" lineno="4813"> +<interface name="files_read_generic_tmp_files" lineno="4832"> <summary> Read files in the tmp directory (/tmp). </summary> @@ -62854,7 +62875,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_dirs" lineno="4831"> +<interface name="files_manage_generic_tmp_dirs" lineno="4850"> <summary> Manage temporary directories in /tmp. </summary> @@ -62864,7 +62885,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_generic_tmp_dirs" lineno="4849"> +<interface name="files_relabel_generic_tmp_dirs" lineno="4868"> <summary> Relabel temporary directories in /tmp. </summary> @@ -62874,7 +62895,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_files" lineno="4867"> +<interface name="files_manage_generic_tmp_files" lineno="4886"> <summary> Manage temporary files and directories in /tmp. </summary> @@ -62884,7 +62905,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_symlinks" lineno="4885"> +<interface name="files_read_generic_tmp_symlinks" lineno="4904"> <summary> Read symbolic links in the tmp directory (/tmp). </summary> @@ -62894,7 +62915,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_generic_tmp_sockets" lineno="4903"> +<interface name="files_rw_generic_tmp_sockets" lineno="4922"> <summary> Read and write generic named sockets in the tmp directory (/tmp). </summary> @@ -62904,7 +62925,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_tmp" lineno="4921"> +<interface name="files_mounton_tmp" lineno="4940"> <summary> Mount filesystems in the tmp directory (/tmp) </summary> @@ -62914,7 +62935,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_tmp_dirs" lineno="4939"> +<interface name="files_setattr_all_tmp_dirs" lineno="4958"> <summary> Set the attributes of all tmp directories. </summary> @@ -62924,7 +62945,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all_tmp" lineno="4957"> +<interface name="files_list_all_tmp" lineno="4976"> <summary> List all tmp directories. </summary> @@ -62934,7 +62955,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_dirs" lineno="4977"> +<interface name="files_relabel_all_tmp_dirs" lineno="4996"> <summary> Relabel to and from all temporary directory types. @@ -62946,7 +62967,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4998"> +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="5017"> <summary> Do not audit attempts to get the attributes of all tmp files. @@ -62957,7 +62978,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_getattr_all_tmp_files" lineno="5017"> +<interface name="files_getattr_all_tmp_files" lineno="5036"> <summary> Allow attempts to get the attributes of all tmp files. @@ -62968,7 +62989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_files" lineno="5037"> +<interface name="files_relabel_all_tmp_files" lineno="5056"> <summary> Relabel to and from all temporary file types. @@ -62980,7 +63001,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5058"> +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5077"> <summary> Do not audit attempts to get the attributes of all tmp sock_file. @@ -62991,7 +63012,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_read_all_tmp_files" lineno="5076"> +<interface name="files_read_all_tmp_files" lineno="5095"> <summary> Read all tmp files. </summary> @@ -63001,7 +63022,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_tmp_filetrans" lineno="5110"> +<interface name="files_tmp_filetrans" lineno="5129"> <summary> Create an object in the tmp directories, with a private type using a type transition. @@ -63027,7 +63048,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_purge_tmp" lineno="5128"> +<interface name="files_purge_tmp" lineno="5147"> <summary> Delete the contents of /tmp. </summary> @@ -63037,7 +63058,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_tmpfs_files" lineno="5151"> +<interface name="files_getattr_all_tmpfs_files" lineno="5170"> <summary> Get the attributes of all tmpfs files. </summary> @@ -63047,7 +63068,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_usr_dirs" lineno="5170"> +<interface name="files_setattr_usr_dirs" lineno="5189"> <summary> Set the attributes of the /usr directory. </summary> @@ -63057,7 +63078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_usr" lineno="5188"> +<interface name="files_search_usr" lineno="5207"> <summary> Search the content of /usr. </summary> @@ -63067,7 +63088,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_usr" lineno="5207"> +<interface name="files_list_usr" lineno="5226"> <summary> List the contents of generic directories in /usr. @@ -63078,7 +63099,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_dirs" lineno="5225"> +<interface name="files_dontaudit_write_usr_dirs" lineno="5244"> <summary> Do not audit write of /usr dirs </summary> @@ -63088,7 +63109,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_usr_dirs" lineno="5243"> +<interface name="files_rw_usr_dirs" lineno="5262"> <summary> Add and remove entries from /usr directories. </summary> @@ -63098,7 +63119,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_usr_dirs" lineno="5262"> +<interface name="files_dontaudit_rw_usr_dirs" lineno="5281"> <summary> Do not audit attempts to add and remove entries from /usr directories. @@ -63109,7 +63130,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_usr_dirs" lineno="5280"> +<interface name="files_delete_usr_dirs" lineno="5299"> <summary> Delete generic directories in /usr in the caller domain. </summary> @@ -63119,7 +63140,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_usr_dirs" lineno="5298"> +<interface name="files_watch_usr_dirs" lineno="5317"> <summary> Watch generic directories in /usr. </summary> @@ -63129,7 +63150,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_usr_files" lineno="5316"> +<interface name="files_delete_usr_files" lineno="5335"> <summary> Delete generic files in /usr in the caller domain. </summary> @@ -63139,7 +63160,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_usr_files" lineno="5334"> +<interface name="files_getattr_usr_files" lineno="5353"> <summary> Get the attributes of files in /usr. </summary> @@ -63149,7 +63170,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_map_usr_files" lineno="5353"> +<interface name="files_map_usr_files" lineno="5372"> <summary> Map generic files in /usr. </summary> @@ -63160,7 +63181,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_read_usr_files" lineno="5389"> +<interface name="files_read_usr_files" lineno="5408"> <summary> Read generic files in /usr. </summary> @@ -63188,7 +63209,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_exec_usr_files" lineno="5409"> +<interface name="files_exec_usr_files" lineno="5428"> <summary> Execute generic programs in /usr in the caller domain. </summary> @@ -63198,7 +63219,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_files" lineno="5429"> +<interface name="files_dontaudit_write_usr_files" lineno="5448"> <summary> dontaudit write of /usr files </summary> @@ -63208,7 +63229,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_usr_files" lineno="5447"> +<interface name="files_manage_usr_files" lineno="5466"> <summary> Create, read, write, and delete files in the /usr directory. </summary> @@ -63218,7 +63239,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_usr_files" lineno="5465"> +<interface name="files_relabelto_usr_files" lineno="5484"> <summary> Relabel a file to the type used in /usr. </summary> @@ -63228,7 +63249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_usr_files" lineno="5483"> +<interface name="files_relabelfrom_usr_files" lineno="5502"> <summary> Relabel a file from the type used in /usr. </summary> @@ -63238,7 +63259,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_symlinks" lineno="5501"> +<interface name="files_read_usr_symlinks" lineno="5520"> <summary> Read symbolic links in /usr. </summary> @@ -63248,7 +63269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_usr_filetrans" lineno="5534"> +<interface name="files_usr_filetrans" lineno="5553"> <summary> Create objects in the /usr directory </summary> @@ -63273,7 +63294,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_search_src" lineno="5552"> +<interface name="files_search_src" lineno="5571"> <summary> Search directories in /usr/src. </summary> @@ -63283,7 +63304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_src" lineno="5570"> +<interface name="files_dontaudit_search_src" lineno="5589"> <summary> Do not audit attempts to search /usr/src. </summary> @@ -63293,7 +63314,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_usr_src_files" lineno="5588"> +<interface name="files_getattr_usr_src_files" lineno="5607"> <summary> Get the attributes of files in /usr/src. </summary> @@ -63303,7 +63324,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_src_files" lineno="5609"> +<interface name="files_read_usr_src_files" lineno="5628"> <summary> Read files in /usr/src. </summary> @@ -63313,7 +63334,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_usr_src_files" lineno="5630"> +<interface name="files_exec_usr_src_files" lineno="5649"> <summary> Execute programs in /usr/src in the caller domain. </summary> @@ -63323,7 +63344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_symbol_table" lineno="5650"> +<interface name="files_create_kernel_symbol_table" lineno="5669"> <summary> Install a system.map into the /boot directory. </summary> @@ -63333,7 +63354,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_symbol_table" lineno="5669"> +<interface name="files_read_kernel_symbol_table" lineno="5688"> <summary> Read system.map in the /boot directory. </summary> @@ -63343,7 +63364,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_symbol_table" lineno="5688"> +<interface name="files_delete_kernel_symbol_table" lineno="5707"> <summary> Delete a system.map in the /boot directory. </summary> @@ -63353,7 +63374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var" lineno="5707"> +<interface name="files_search_var" lineno="5726"> <summary> Search the contents of /var. </summary> @@ -63363,7 +63384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_var_dirs" lineno="5725"> +<interface name="files_dontaudit_write_var_dirs" lineno="5744"> <summary> Do not audit attempts to write to /var. </summary> @@ -63373,7 +63394,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_write_var_dirs" lineno="5743"> +<interface name="files_write_var_dirs" lineno="5762"> <summary> Allow attempts to write to /var.dirs </summary> @@ -63383,7 +63404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_var" lineno="5762"> +<interface name="files_dontaudit_search_var" lineno="5781"> <summary> Do not audit attempts to search the contents of /var. @@ -63394,7 +63415,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_var" lineno="5780"> +<interface name="files_list_var" lineno="5799"> <summary> List the contents of /var. </summary> @@ -63404,7 +63425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_var" lineno="5799"> +<interface name="files_dontaudit_list_var" lineno="5818"> <summary> Do not audit attempts to list the contents of /var. @@ -63415,7 +63436,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_dirs" lineno="5818"> +<interface name="files_manage_var_dirs" lineno="5837"> <summary> Create, read, write, and delete directories in the /var directory. @@ -63426,7 +63447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_dirs" lineno="5836"> +<interface name="files_relabel_var_dirs" lineno="5855"> <summary> relabelto/from var directories </summary> @@ -63436,7 +63457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_files" lineno="5854"> +<interface name="files_read_var_files" lineno="5873"> <summary> Read files in the /var directory. </summary> @@ -63446,7 +63467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_append_var_files" lineno="5872"> +<interface name="files_append_var_files" lineno="5891"> <summary> Append files in the /var directory. </summary> @@ -63456,7 +63477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_files" lineno="5890"> +<interface name="files_rw_var_files" lineno="5909"> <summary> Read and write files in the /var directory. </summary> @@ -63466,7 +63487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_var_files" lineno="5909"> +<interface name="files_dontaudit_rw_var_files" lineno="5928"> <summary> Do not audit attempts to read and write files in the /var directory. @@ -63477,7 +63498,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_files" lineno="5927"> +<interface name="files_manage_var_files" lineno="5946"> <summary> Create, read, write, and delete files in the /var directory. </summary> @@ -63487,7 +63508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_symlinks" lineno="5945"> +<interface name="files_read_var_symlinks" lineno="5964"> <summary> Read symbolic links in the /var directory. </summary> @@ -63497,7 +63518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_symlinks" lineno="5964"> +<interface name="files_manage_var_symlinks" lineno="5983"> <summary> Create, read, write, and delete symbolic links in the /var directory. @@ -63508,7 +63529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_filetrans" lineno="5997"> +<interface name="files_var_filetrans" lineno="6016"> <summary> Create objects in the /var directory </summary> @@ -63533,7 +63554,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_var_lib_dirs" lineno="6015"> +<interface name="files_getattr_var_lib_dirs" lineno="6034"> <summary> Get the attributes of the /var/lib directory. </summary> @@ -63543,7 +63564,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var_lib" lineno="6047"> +<interface name="files_search_var_lib" lineno="6066"> <summary> Search the /var/lib directory. </summary> @@ -63567,7 +63588,7 @@ Domain allowed access. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_dontaudit_search_var_lib" lineno="6067"> +<interface name="files_dontaudit_search_var_lib" lineno="6086"> <summary> Do not audit attempts to search the contents of /var/lib. @@ -63579,7 +63600,7 @@ Domain to not audit. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_list_var_lib" lineno="6085"> +<interface name="files_list_var_lib" lineno="6104"> <summary> List the contents of the /var/lib directory. </summary> @@ -63589,7 +63610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_lib_dirs" lineno="6103"> +<interface name="files_rw_var_lib_dirs" lineno="6122"> <summary> Read-write /var/lib directories </summary> @@ -63599,7 +63620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_lib_dirs" lineno="6121"> +<interface name="files_manage_var_lib_dirs" lineno="6140"> <summary> manage var_lib_t dirs </summary> @@ -63609,7 +63630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_lib_dirs" lineno="6140"> +<interface name="files_relabel_var_lib_dirs" lineno="6159"> <summary> relabel var_lib_t dirs </summary> @@ -63619,7 +63640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_lib_filetrans" lineno="6174"> +<interface name="files_var_lib_filetrans" lineno="6193"> <summary> Create objects in the /var/lib directory </summary> @@ -63644,7 +63665,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_var_lib_files" lineno="6193"> +<interface name="files_read_var_lib_files" lineno="6212"> <summary> Read generic files in /var/lib. </summary> @@ -63654,7 +63675,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_lib_symlinks" lineno="6212"> +<interface name="files_read_var_lib_symlinks" lineno="6231"> <summary> Read generic symbolic links in /var/lib </summary> @@ -63664,7 +63685,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_urandom_seed" lineno="6234"> +<interface name="files_manage_urandom_seed" lineno="6253"> <summary> Create, read, write, and delete the pseudorandom number generator seed. @@ -63675,7 +63696,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mounttab" lineno="6254"> +<interface name="files_manage_mounttab" lineno="6273"> <summary> Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -63686,7 +63707,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_lock_dirs" lineno="6273"> +<interface name="files_setattr_lock_dirs" lineno="6292"> <summary> Set the attributes of the generic lock directories. </summary> @@ -63696,7 +63717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_locks" lineno="6291"> +<interface name="files_search_locks" lineno="6310"> <summary> Search the locks directory (/var/lock). </summary> @@ -63706,7 +63727,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_locks" lineno="6311"> +<interface name="files_dontaudit_search_locks" lineno="6330"> <summary> Do not audit attempts to search the locks directory (/var/lock). @@ -63717,7 +63738,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_locks" lineno="6330"> +<interface name="files_list_locks" lineno="6349"> <summary> List generic lock directories. </summary> @@ -63727,7 +63748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_lock_dirs" lineno="6349"> +<interface name="files_check_write_lock_dirs" lineno="6368"> <summary> Test write access on lock directories. </summary> @@ -63737,7 +63758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_add_entry_lock_dirs" lineno="6368"> +<interface name="files_add_entry_lock_dirs" lineno="6387"> <summary> Add entries in the /var/lock directories. </summary> @@ -63747,7 +63768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_lock_dirs" lineno="6388"> +<interface name="files_rw_lock_dirs" lineno="6407"> <summary> Add and remove entries in the /var/lock directories. @@ -63758,7 +63779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_lock_dirs" lineno="6407"> +<interface name="files_create_lock_dirs" lineno="6426"> <summary> Create lock directories </summary> @@ -63768,7 +63789,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_lock_dirs" lineno="6428"> +<interface name="files_relabel_all_lock_dirs" lineno="6447"> <summary> Relabel to and from all lock directory types. </summary> @@ -63779,7 +63800,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_generic_locks" lineno="6449"> +<interface name="files_getattr_generic_locks" lineno="6468"> <summary> Get the attributes of generic lock files. </summary> @@ -63789,7 +63810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_generic_locks" lineno="6470"> +<interface name="files_delete_generic_locks" lineno="6489"> <summary> Delete generic lock files. </summary> @@ -63799,7 +63820,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_locks" lineno="6491"> +<interface name="files_manage_generic_locks" lineno="6510"> <summary> Create, read, write, and delete generic lock files. @@ -63810,7 +63831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_locks" lineno="6513"> +<interface name="files_delete_all_locks" lineno="6532"> <summary> Delete all lock files. </summary> @@ -63821,7 +63842,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_locks" lineno="6534"> +<interface name="files_read_all_locks" lineno="6553"> <summary> Read all lock files. </summary> @@ -63831,7 +63852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_all_locks" lineno="6557"> +<interface name="files_manage_all_locks" lineno="6576"> <summary> manage all lock files. </summary> @@ -63841,7 +63862,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_locks" lineno="6580"> +<interface name="files_relabel_all_locks" lineno="6599"> <summary> Relabel from/to all lock files. </summary> @@ -63851,7 +63872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_lock_filetrans" lineno="6619"> +<interface name="files_lock_filetrans" lineno="6638"> <summary> Create an object in the locks directory, with a private type using a type transition. @@ -63877,7 +63898,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6640"> +<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6659"> <summary> Do not audit attempts to get the attributes of the /var/run directory. @@ -63888,7 +63909,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_runtime_dirs" lineno="6659"> +<interface name="files_mounton_runtime_dirs" lineno="6678"> <summary> mounton a /var/run directory. </summary> @@ -63898,7 +63919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_runtime_dirs" lineno="6677"> +<interface name="files_setattr_runtime_dirs" lineno="6696"> <summary> Set the attributes of the /var/run directory. </summary> @@ -63908,7 +63929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_runtime" lineno="6697"> +<interface name="files_search_runtime" lineno="6716"> <summary> Search the contents of runtime process ID directories (/var/run). @@ -63919,7 +63940,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_runtime" lineno="6717"> +<interface name="files_dontaudit_search_runtime" lineno="6736"> <summary> Do not audit attempts to search the /var/run directory. @@ -63930,7 +63951,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_runtime" lineno="6737"> +<interface name="files_list_runtime" lineno="6756"> <summary> List the contents of the runtime process ID directories (/var/run). @@ -63941,7 +63962,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_runtime_dirs" lineno="6756"> +<interface name="files_check_write_runtime_dirs" lineno="6775"> <summary> Check write access on /var/run directories. </summary> @@ -63951,7 +63972,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_runtime_dirs" lineno="6774"> +<interface name="files_create_runtime_dirs" lineno="6793"> <summary> Create a /var/run directory. </summary> @@ -63961,7 +63982,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_runtime_dirs" lineno="6792"> +<interface name="files_watch_runtime_dirs" lineno="6811"> <summary> Watch /var/run directories. </summary> @@ -63971,7 +63992,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_runtime_files" lineno="6810"> +<interface name="files_read_runtime_files" lineno="6829"> <summary> Read generic runtime files. </summary> @@ -63981,7 +64002,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_runtime" lineno="6830"> +<interface name="files_exec_runtime" lineno="6849"> <summary> Execute generic programs in /var/run in the caller domain. </summary> @@ -63991,7 +64012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_runtime_files" lineno="6848"> +<interface name="files_rw_runtime_files" lineno="6867"> <summary> Read and write generic runtime files. </summary> @@ -64001,7 +64022,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_runtime_symlinks" lineno="6868"> +<interface name="files_delete_runtime_symlinks" lineno="6887"> <summary> Delete generic runtime symlinks. </summary> @@ -64011,7 +64032,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_runtime_pipes" lineno="6886"> +<interface name="files_write_runtime_pipes" lineno="6905"> <summary> Write named generic runtime pipes. </summary> @@ -64021,7 +64042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_dirs" lineno="6906"> +<interface name="files_delete_all_runtime_dirs" lineno="6925"> <summary> Delete all runtime dirs. </summary> @@ -64032,7 +64053,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_dirs" lineno="6924"> +<interface name="files_manage_all_runtime_dirs" lineno="6943"> <summary> Create, read, write, and delete all runtime directories. </summary> @@ -64042,7 +64063,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_dirs" lineno="6942"> +<interface name="files_relabel_all_runtime_dirs" lineno="6961"> <summary> Relabel all runtime directories. </summary> @@ -64052,7 +64073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_runtime_files" lineno="6961"> +<interface name="files_dontaudit_getattr_all_runtime_files" lineno="6980"> <summary> Do not audit attempts to get the attributes of all runtime data files. @@ -64063,7 +64084,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_runtime_files" lineno="6982"> +<interface name="files_read_all_runtime_files" lineno="7001"> <summary> Read all runtime files. </summary> @@ -64074,7 +64095,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7003"> +<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7022"> <summary> Do not audit attempts to ioctl all runtime files. </summary> @@ -64084,7 +64105,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_runtime_files" lineno="7023"> +<interface name="files_dontaudit_write_all_runtime_files" lineno="7042"> <summary> Do not audit attempts to write to all runtime files. </summary> @@ -64094,7 +64115,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_all_runtime_files" lineno="7044"> +<interface name="files_delete_all_runtime_files" lineno="7063"> <summary> Delete all runtime files. </summary> @@ -64105,7 +64126,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_files" lineno="7063"> +<interface name="files_manage_all_runtime_files" lineno="7082"> <summary> Create, read, write and delete all var_run (pid) files @@ -64116,7 +64137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_files" lineno="7081"> +<interface name="files_relabel_all_runtime_files" lineno="7100"> <summary> Relabel all runtime files. </summary> @@ -64126,7 +64147,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_symlinks" lineno="7100"> +<interface name="files_delete_all_runtime_symlinks" lineno="7119"> <summary> Delete all runtime symlinks. </summary> @@ -64137,7 +64158,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_symlinks" lineno="7119"> +<interface name="files_manage_all_runtime_symlinks" lineno="7138"> <summary> Create, read, write and delete all var_run (pid) symbolic links. @@ -64148,7 +64169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_symlinks" lineno="7137"> +<interface name="files_relabel_all_runtime_symlinks" lineno="7156"> <summary> Relabel all runtime symbolic links. </summary> @@ -64158,7 +64179,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_runtime_pipes" lineno="7155"> +<interface name="files_create_all_runtime_pipes" lineno="7174"> <summary> Create all runtime named pipes </summary> @@ -64168,7 +64189,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_pipes" lineno="7174"> +<interface name="files_delete_all_runtime_pipes" lineno="7193"> <summary> Delete all runtime named pipes </summary> @@ -64178,7 +64199,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_runtime_sockets" lineno="7193"> +<interface name="files_create_all_runtime_sockets" lineno="7212"> <summary> Create all runtime sockets. </summary> @@ -64188,7 +64209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_sockets" lineno="7211"> +<interface name="files_delete_all_runtime_sockets" lineno="7230"> <summary> Delete all runtime sockets. </summary> @@ -64198,7 +64219,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_sockets" lineno="7229"> +<interface name="files_relabel_all_runtime_sockets" lineno="7248"> <summary> Relabel all runtime named sockets. </summary> @@ -64208,7 +64229,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_runtime_filetrans" lineno="7289"> +<interface name="files_runtime_filetrans" lineno="7308"> <summary> Create an object in the /run directory, with a private type. </summary> @@ -64260,7 +64281,7 @@ The name of the object being created. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="files_runtime_filetrans_lock_dir" lineno="7314"> +<interface name="files_runtime_filetrans_lock_dir" lineno="7333"> <summary> Create a generic lock directory within the run directories. </summary> @@ -64275,7 +64296,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_all_spool_sockets" lineno="7332"> +<interface name="files_create_all_spool_sockets" lineno="7351"> <summary> Create all spool sockets </summary> @@ -64285,7 +64306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_spool_sockets" lineno="7350"> +<interface name="files_delete_all_spool_sockets" lineno="7369"> <summary> Delete all spool sockets </summary> @@ -64295,7 +64316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_all_poly_members" lineno="7369"> +<interface name="files_mounton_all_poly_members" lineno="7388"> <summary> Mount filesystems on all polyinstantiation member directories. @@ -64306,7 +64327,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_spool" lineno="7388"> +<interface name="files_search_spool" lineno="7407"> <summary> Search the contents of generic spool directories (/var/spool). @@ -64317,7 +64338,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_spool" lineno="7407"> +<interface name="files_dontaudit_search_spool" lineno="7426"> <summary> Do not audit attempts to search generic spool directories. @@ -64328,7 +64349,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_spool" lineno="7426"> +<interface name="files_list_spool" lineno="7445"> <summary> List the contents of generic spool (/var/spool) directories. @@ -64339,7 +64360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool_dirs" lineno="7445"> +<interface name="files_manage_generic_spool_dirs" lineno="7464"> <summary> Create, read, write, and delete generic spool directories (/var/spool). @@ -64350,7 +64371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_spool" lineno="7464"> +<interface name="files_read_generic_spool" lineno="7483"> <summary> Read generic spool files. </summary> @@ -64360,7 +64381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool" lineno="7484"> +<interface name="files_manage_generic_spool" lineno="7503"> <summary> Create, read, write, and delete generic spool files. @@ -64371,7 +64392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_spool_filetrans" lineno="7520"> +<interface name="files_spool_filetrans" lineno="7539"> <summary> Create objects in the spool directory with a private type with a type transition. @@ -64398,7 +64419,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_polyinstantiate_all" lineno="7540"> +<interface name="files_polyinstantiate_all" lineno="7559"> <summary> Allow access to manage all polyinstantiated directories on the system. @@ -64409,7 +64430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unconfined" lineno="7594"> +<interface name="files_unconfined" lineno="7613"> <summary> Unconfined access to files. </summary> @@ -64419,7 +64440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_runtime_lnk_files" lineno="7616"> +<interface name="files_manage_etc_runtime_lnk_files" lineno="7635"> <summary> Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -64431,7 +64452,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime" lineno="7634"> +<interface name="files_dontaudit_read_etc_runtime" lineno="7653"> <summary> Do not audit attempts to read etc_runtime resources </summary> @@ -64441,7 +64462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_src" lineno="7652"> +<interface name="files_list_src" lineno="7671"> <summary> List usr/src files </summary> @@ -64451,7 +64472,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_read_src_files" lineno="7670"> +<interface name="files_read_src_files" lineno="7689"> <summary> Read usr/src files </summary> @@ -64461,7 +64482,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_manage_src_files" lineno="7688"> +<interface name="files_manage_src_files" lineno="7707"> <summary> Manage /usr/src files </summary> @@ -64471,7 +64492,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_lib_filetrans_kernel_modules" lineno="7719"> +<interface name="files_lib_filetrans_kernel_modules" lineno="7738"> <summary> Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -64493,7 +64514,7 @@ Optional name of the resource </summary> </param> </interface> -<interface name="files_read_etc_runtime" lineno="7737"> +<interface name="files_read_etc_runtime" lineno="7756"> <summary> Read etc runtime resources </summary> @@ -64503,7 +64524,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_non_security_file_types" lineno="7759"> +<interface name="files_relabel_all_non_security_file_types" lineno="7778"> <summary> Allow relabel from and to non-security types </summary> @@ -64514,7 +64535,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_non_security_file_types" lineno="7789"> +<interface name="files_manage_all_non_security_file_types" lineno="7808"> <summary> Manage non-security-sensitive resource types </summary> @@ -64525,7 +64546,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_all_pidfiles" lineno="7811"> +<interface name="files_relabel_all_pidfiles" lineno="7830"> <summary> Allow relabeling from and to any pidfile associated type </summary> @@ -65023,7 +65044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_cgroup_dirs" lineno="818"> +<interface name="fs_list_cgroup_dirs" lineno="817"> <summary> list cgroup directories. </summary> @@ -65033,7 +65054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_ioctl_cgroup_dirs" lineno="837"> +<interface name="fs_ioctl_cgroup_dirs" lineno="836"> <summary> Ioctl cgroup directories. </summary> @@ -65043,7 +65064,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_delete_cgroup_dirs" lineno="856"> +<interface name="fs_create_cgroup_dirs" lineno="855"> +<summary> +Create cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_delete_cgroup_dirs" lineno="874"> <summary> Delete cgroup directories. </summary> @@ -65053,7 +65084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cgroup_dirs" lineno="875"> +<interface name="fs_manage_cgroup_dirs" lineno="893"> <summary> Manage cgroup directories. </summary> @@ -65063,7 +65094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_dirs" lineno="895"> +<interface name="fs_relabel_cgroup_dirs" lineno="913"> <summary> Relabel cgroup directories. </summary> @@ -65073,7 +65104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cgroup_files" lineno="913"> +<interface name="fs_getattr_cgroup_files" lineno="931"> <summary> Get attributes of cgroup files. </summary> @@ -65083,7 +65114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cgroup_files" lineno="933"> +<interface name="fs_read_cgroup_files" lineno="951"> <summary> Read cgroup files. </summary> @@ -65093,7 +65124,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_cgroup_files" lineno="954"> +<interface name="fs_create_cgroup_files" lineno="972"> +<summary> +Create cgroup files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_watch_cgroup_files" lineno="992"> <summary> Watch cgroup files. </summary> @@ -65103,7 +65144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_cgroup_links" lineno="973"> +<interface name="fs_create_cgroup_links" lineno="1011"> <summary> Create cgroup lnk_files. </summary> @@ -65113,7 +65154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_cgroup_files" lineno="993"> +<interface name="fs_write_cgroup_files" lineno="1031"> <summary> Write cgroup files. </summary> @@ -65123,7 +65164,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_cgroup_files" lineno="1012"> +<interface name="fs_rw_cgroup_files" lineno="1050"> <summary> Read and write cgroup files. </summary> @@ -65133,7 +65174,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_cgroup_files" lineno="1034"> +<interface name="fs_dontaudit_rw_cgroup_files" lineno="1072"> <summary> Do not audit attempts to open, get attributes, read and write @@ -65145,7 +65186,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cgroup_files" lineno="1052"> +<interface name="fs_manage_cgroup_files" lineno="1090"> <summary> Manage cgroup files. </summary> @@ -65155,7 +65196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_symlinks" lineno="1072"> +<interface name="fs_relabel_cgroup_symlinks" lineno="1110"> <summary> Relabel cgroup symbolic links. </summary> @@ -65165,7 +65206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_cgroup_dirs" lineno="1090"> +<interface name="fs_watch_cgroup_dirs" lineno="1128"> <summary> Watch cgroup directories. </summary> @@ -65175,7 +65216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_cgroup" lineno="1108"> +<interface name="fs_mounton_cgroup" lineno="1146"> <summary> Mount on cgroup directories. </summary> @@ -65185,7 +65226,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cgroup_filetrans" lineno="1142"> +<interface name="fs_cgroup_filetrans" lineno="1180"> <summary> Create an object in a cgroup tmpfs filesystem, with a private type using a type transition. @@ -65211,7 +65252,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs_dirs" lineno="1163"> +<interface name="fs_dontaudit_list_cifs_dirs" lineno="1201"> <summary> Do not audit attempts to read dirs on a CIFS or SMB filesystem. @@ -65222,7 +65263,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_cifs" lineno="1181"> +<interface name="fs_mount_cifs" lineno="1219"> <summary> Mount a CIFS or SMB network filesystem. </summary> @@ -65232,7 +65273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_cifs" lineno="1200"> +<interface name="fs_remount_cifs" lineno="1238"> <summary> Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. @@ -65243,7 +65284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_cifs" lineno="1218"> +<interface name="fs_unmount_cifs" lineno="1256"> <summary> Unmount a CIFS or SMB network filesystem. </summary> @@ -65253,7 +65294,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cifs" lineno="1238"> +<interface name="fs_getattr_cifs" lineno="1276"> <summary> Get the attributes of a CIFS or SMB network filesystem. @@ -65265,7 +65306,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_cifs" lineno="1256"> +<interface name="fs_search_cifs" lineno="1294"> <summary> Search directories on a CIFS or SMB filesystem. </summary> @@ -65275,7 +65316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_cifs" lineno="1275"> +<interface name="fs_list_cifs" lineno="1313"> <summary> List the contents of directories on a CIFS or SMB filesystem. @@ -65286,7 +65327,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs" lineno="1294"> +<interface name="fs_dontaudit_list_cifs" lineno="1332"> <summary> Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. @@ -65297,7 +65338,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_cifs" lineno="1312"> +<interface name="fs_mounton_cifs" lineno="1350"> <summary> Mounton a CIFS filesystem. </summary> @@ -65307,7 +65348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_files" lineno="1331"> +<interface name="fs_read_cifs_files" lineno="1369"> <summary> Read files on a CIFS or SMB filesystem. </summary> @@ -65318,7 +65359,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_all_inherited_image_files" lineno="1351"> +<interface name="fs_read_all_inherited_image_files" lineno="1389"> <summary> Read all inherited filesystem image files. </summary> @@ -65329,7 +65370,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_all_image_files" lineno="1370"> +<interface name="fs_read_all_image_files" lineno="1408"> <summary> Read all filesystem image files. </summary> @@ -65340,7 +65381,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_read_all_image_files" lineno="1389"> +<interface name="fs_mmap_read_all_image_files" lineno="1427"> <summary> Mmap-read all filesystem image files. </summary> @@ -65351,7 +65392,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_rw_all_image_files" lineno="1408"> +<interface name="fs_rw_all_image_files" lineno="1446"> <summary> Read and write all filesystem image files. </summary> @@ -65362,7 +65403,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_rw_all_image_files" lineno="1427"> +<interface name="fs_mmap_rw_all_image_files" lineno="1465"> <summary> Mmap-Read-write all filesystem image files. </summary> @@ -65373,7 +65414,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_write_all_image_files" lineno="1446"> +<interface name="fs_dontaudit_write_all_image_files" lineno="1484"> <summary> Do not audit attempts to write all filesystem image files. </summary> @@ -65384,7 +65425,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_noxattr_fs" lineno="1466"> +<interface name="fs_getattr_noxattr_fs" lineno="1504"> <summary> Get the attributes of filesystems that do not have extended attribute support. @@ -65396,7 +65437,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_list_noxattr_fs" lineno="1484"> +<interface name="fs_list_noxattr_fs" lineno="1522"> <summary> Read all noxattrfs directories. </summary> @@ -65406,7 +65447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_noxattr_fs" lineno="1503"> +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1541"> <summary> Do not audit attempts to list all noxattrfs directories. @@ -65417,7 +65458,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_dirs" lineno="1521"> +<interface name="fs_manage_noxattr_fs_dirs" lineno="1559"> <summary> Create, read, write, and delete all noxattrfs directories. </summary> @@ -65427,7 +65468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_files" lineno="1539"> +<interface name="fs_read_noxattr_fs_files" lineno="1577"> <summary> Read all noxattrfs files. </summary> @@ -65437,7 +65478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1559"> +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1597"> <summary> Do not audit attempts to read all noxattrfs files. @@ -65448,7 +65489,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1577"> +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1615"> <summary> Dont audit attempts to write to noxattrfs files. </summary> @@ -65458,7 +65499,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_files" lineno="1595"> +<interface name="fs_manage_noxattr_fs_files" lineno="1633"> <summary> Create, read, write, and delete all noxattrfs files. </summary> @@ -65468,7 +65509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_symlinks" lineno="1614"> +<interface name="fs_read_noxattr_fs_symlinks" lineno="1652"> <summary> Read all noxattrfs symbolic links. </summary> @@ -65478,7 +65519,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_symlinks" lineno="1633"> +<interface name="fs_manage_noxattr_fs_symlinks" lineno="1671"> <summary> Manage all noxattrfs symbolic links. </summary> @@ -65488,7 +65529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_noxattr_fs" lineno="1653"> +<interface name="fs_relabelfrom_noxattr_fs" lineno="1691"> <summary> Relabel all objects from filesystems that do not support extended attributes. @@ -65499,7 +65540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_cifs_files" lineno="1679"> +<interface name="fs_dontaudit_read_cifs_files" lineno="1717"> <summary> Do not audit attempts to read files on a CIFS or SMB filesystem. @@ -65510,7 +65551,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_append_cifs_files" lineno="1699"> +<interface name="fs_append_cifs_files" lineno="1737"> <summary> Append files on a CIFS filesystem. @@ -65522,7 +65563,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_cifs_files" lineno="1719"> +<interface name="fs_dontaudit_append_cifs_files" lineno="1757"> <summary> dontaudit Append files on a CIFS filesystem. @@ -65534,7 +65575,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_cifs_files" lineno="1738"> +<interface name="fs_dontaudit_rw_cifs_files" lineno="1776"> <summary> Do not audit attempts to read or write files on a CIFS or SMB filesystem. @@ -65545,7 +65586,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_cifs_symlinks" lineno="1756"> +<interface name="fs_read_cifs_symlinks" lineno="1794"> <summary> Read symbolic links on a CIFS or SMB filesystem. </summary> @@ -65555,7 +65596,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_pipes" lineno="1776"> +<interface name="fs_read_cifs_named_pipes" lineno="1814"> <summary> Read named pipes on a CIFS or SMB network filesystem. @@ -65566,7 +65607,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_sockets" lineno="1795"> +<interface name="fs_read_cifs_named_sockets" lineno="1833"> <summary> Read named sockets on a CIFS or SMB network filesystem. @@ -65577,7 +65618,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_cifs_files" lineno="1816"> +<interface name="fs_exec_cifs_files" lineno="1854"> <summary> Execute files on a CIFS or SMB network filesystem, in the caller @@ -65590,7 +65631,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_cifs_dirs" lineno="1837"> +<interface name="fs_manage_cifs_dirs" lineno="1875"> <summary> Create, read, write, and delete directories on a CIFS or SMB network filesystem. @@ -65602,7 +65643,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1857"> +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1895"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -65614,7 +65655,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_files" lineno="1877"> +<interface name="fs_manage_cifs_files" lineno="1915"> <summary> Create, read, write, and delete files on a CIFS or SMB network filesystem. @@ -65626,7 +65667,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_files" lineno="1897"> +<interface name="fs_dontaudit_manage_cifs_files" lineno="1935"> <summary> Do not audit attempts to create, read, write, and delete files @@ -65638,7 +65679,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_symlinks" lineno="1916"> +<interface name="fs_manage_cifs_symlinks" lineno="1954"> <summary> Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. @@ -65649,7 +65690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_pipes" lineno="1935"> +<interface name="fs_manage_cifs_named_pipes" lineno="1973"> <summary> Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. @@ -65660,7 +65701,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_sockets" lineno="1954"> +<interface name="fs_manage_cifs_named_sockets" lineno="1992"> <summary> Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. @@ -65671,7 +65712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cifs_domtrans" lineno="1997"> +<interface name="fs_cifs_domtrans" lineno="2035"> <summary> Execute a file on a CIFS or SMB filesystem in the specified domain. @@ -65706,7 +65747,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_manage_configfs_dirs" lineno="2017"> +<interface name="fs_manage_configfs_dirs" lineno="2055"> <summary> Create, read, write, and delete dirs on a configfs filesystem. @@ -65717,7 +65758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_configfs_files" lineno="2036"> +<interface name="fs_manage_configfs_files" lineno="2074"> <summary> Create, read, write, and delete files on a configfs filesystem. @@ -65728,7 +65769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_dos_fs" lineno="2055"> +<interface name="fs_mount_dos_fs" lineno="2093"> <summary> Mount a DOS filesystem, such as FAT32 or NTFS. @@ -65739,7 +65780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_dos_fs" lineno="2075"> +<interface name="fs_remount_dos_fs" lineno="2113"> <summary> Remount a DOS filesystem, such as FAT32 or NTFS. This allows @@ -65751,7 +65792,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_dos_fs" lineno="2094"> +<interface name="fs_unmount_dos_fs" lineno="2132"> <summary> Unmount a DOS filesystem, such as FAT32 or NTFS. @@ -65762,7 +65803,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_fs" lineno="2114"> +<interface name="fs_getattr_dos_fs" lineno="2152"> <summary> Get the attributes of a DOS filesystem, such as FAT32 or NTFS. @@ -65774,7 +65815,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_dos_fs" lineno="2133"> +<interface name="fs_relabelfrom_dos_fs" lineno="2171"> <summary> Allow changing of the label of a DOS filesystem using the context= mount option. @@ -65785,7 +65826,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_dirs" lineno="2151"> +<interface name="fs_getattr_dos_dirs" lineno="2189"> <summary> Get attributes of directories on a dosfs filesystem. </summary> @@ -65795,7 +65836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_dos" lineno="2169"> +<interface name="fs_search_dos" lineno="2207"> <summary> Search dosfs filesystem. </summary> @@ -65805,7 +65846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_dos" lineno="2187"> +<interface name="fs_list_dos" lineno="2225"> <summary> List dirs DOS filesystem. </summary> @@ -65815,7 +65856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_dirs" lineno="2206"> +<interface name="fs_manage_dos_dirs" lineno="2244"> <summary> Create, read, write, and delete dirs on a DOS filesystem. @@ -65826,7 +65867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_dos_files" lineno="2224"> +<interface name="fs_read_dos_files" lineno="2262"> <summary> Read files on a DOS filesystem. </summary> @@ -65836,7 +65877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_read_dos_files" lineno="2242"> +<interface name="fs_mmap_read_dos_files" lineno="2280"> <summary> Read and map files on a DOS filesystem. </summary> @@ -65846,7 +65887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_files" lineno="2262"> +<interface name="fs_manage_dos_files" lineno="2300"> <summary> Create, read, write, and delete files on a DOS filesystem. @@ -65857,7 +65898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_ecryptfs" lineno="2280"> +<interface name="fs_list_ecryptfs" lineno="2318"> <summary> Read symbolic links on an eCryptfs filesystem. </summary> @@ -65867,7 +65908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ecryptfs_dirs" lineno="2301"> +<interface name="fs_manage_ecryptfs_dirs" lineno="2339"> <summary> Create, read, write, and delete directories on an eCryptfs filesystem. @@ -65879,7 +65920,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_ecryptfs_files" lineno="2321"> +<interface name="fs_manage_ecryptfs_files" lineno="2359"> <summary> Create, read, write, and delete files on an eCryptfs filesystem. @@ -65891,7 +65932,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_ecryptfs_named_sockets" lineno="2340"> +<interface name="fs_manage_ecryptfs_named_sockets" lineno="2378"> <summary> Create, read, write, and delete named sockets on an eCryptfs filesystem. @@ -65902,7 +65943,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_efivarfs" lineno="2358"> +<interface name="fs_getattr_efivarfs" lineno="2396"> <summary> Get the attributes of efivarfs filesystems. </summary> @@ -65912,7 +65953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_efivars" lineno="2376"> +<interface name="fs_list_efivars" lineno="2414"> <summary> List dirs in efivarfs filesystem. </summary> @@ -65922,7 +65963,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_efivarfs_files" lineno="2396"> +<interface name="fs_read_efivarfs_files" lineno="2434"> <summary> Read files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -65934,7 +65975,19 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_efivarfs_files" lineno="2416"> +<interface name="fs_setattr_efivarfs_files" lineno="2454"> +<summary> +Set the attributes of files in efivarfs +- contains Linux Kernel configuration options for UEFI systems +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_efivarfs_files" lineno="2474"> <summary> Create, read, write, and delete files on a efivarfs filesystem. @@ -65946,7 +65999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_fusefs" lineno="2434"> +<interface name="fs_getattr_fusefs" lineno="2492"> <summary> stat a FUSE filesystem </summary> @@ -65956,7 +66009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_fusefs" lineno="2452"> +<interface name="fs_mount_fusefs" lineno="2510"> <summary> Mount a FUSE filesystem. </summary> @@ -65966,7 +66019,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_fusefs" lineno="2470"> +<interface name="fs_unmount_fusefs" lineno="2528"> <summary> Unmount a FUSE filesystem. </summary> @@ -65976,7 +66029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_fusefs" lineno="2488"> +<interface name="fs_remount_fusefs" lineno="2546"> <summary> Remount a FUSE filesystem. </summary> @@ -65986,7 +66039,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_fusefs" lineno="2506"> +<interface name="fs_mounton_fusefs" lineno="2564"> <summary> Mounton a FUSEFS filesystem. </summary> @@ -65996,7 +66049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_fusefs_entry_type" lineno="2525"> +<interface name="fs_fusefs_entry_type" lineno="2583"> <summary> Make FUSEFS files an entrypoint for the specified domain. @@ -66007,7 +66060,7 @@ The domain for which fusefs_t is an entrypoint. </summary> </param> </interface> -<interface name="fs_fusefs_domtrans" lineno="2558"> +<interface name="fs_fusefs_domtrans" lineno="2616"> <summary> Execute FUSEFS files in a specified domain. </summary> @@ -66032,7 +66085,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="fs_search_fusefs" lineno="2578"> +<interface name="fs_search_fusefs" lineno="2636"> <summary> Search directories on a FUSEFS filesystem. @@ -66044,7 +66097,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_list_fusefs" lineno="2598"> +<interface name="fs_list_fusefs" lineno="2656"> <summary> List the contents of directories on a FUSEFS filesystem. @@ -66056,7 +66109,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_list_fusefs" lineno="2617"> +<interface name="fs_dontaudit_list_fusefs" lineno="2675"> <summary> Do not audit attempts to list the contents of directories on a FUSEFS filesystem. @@ -66067,7 +66120,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_setattr_fusefs_dirs" lineno="2637"> +<interface name="fs_setattr_fusefs_dirs" lineno="2695"> <summary> Set the attributes of directories on a FUSEFS filesystem. @@ -66079,7 +66132,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_dirs" lineno="2657"> +<interface name="fs_manage_fusefs_dirs" lineno="2715"> <summary> Create, read, write, and delete directories on a FUSEFS filesystem. @@ -66091,7 +66144,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2677"> +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2735"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -66103,7 +66156,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_fusefs_files" lineno="2697"> +<interface name="fs_getattr_fusefs_files" lineno="2755"> <summary> Get the attributes of files on a FUSEFS filesystem. @@ -66115,7 +66168,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_fusefs_files" lineno="2716"> +<interface name="fs_read_fusefs_files" lineno="2774"> <summary> Read, a FUSEFS filesystem. </summary> @@ -66126,7 +66179,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_exec_fusefs_files" lineno="2735"> +<interface name="fs_exec_fusefs_files" lineno="2793"> <summary> Execute files on a FUSEFS filesystem. </summary> @@ -66137,7 +66190,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_setattr_fusefs_files" lineno="2755"> +<interface name="fs_setattr_fusefs_files" lineno="2813"> <summary> Set the attributes of files on a FUSEFS filesystem. @@ -66149,7 +66202,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_files" lineno="2775"> +<interface name="fs_manage_fusefs_files" lineno="2833"> <summary> Create, read, write, and delete files on a FUSEFS filesystem. @@ -66161,7 +66214,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2795"> +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2853"> <summary> Do not audit attempts to create, read, write, and delete files @@ -66173,7 +66226,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_fusefs_symlinks" lineno="2815"> +<interface name="fs_getattr_fusefs_symlinks" lineno="2873"> <summary> Get the attributes of symlinks on a FUSEFS filesystem. @@ -66185,7 +66238,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_fusefs_symlinks" lineno="2833"> +<interface name="fs_read_fusefs_symlinks" lineno="2891"> <summary> Read symbolic links on a FUSEFS filesystem. </summary> @@ -66195,7 +66248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_setattr_fusefs_symlinks" lineno="2854"> +<interface name="fs_setattr_fusefs_symlinks" lineno="2912"> <summary> Set the attributes of symlinks on a FUSEFS filesystem. @@ -66207,7 +66260,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_symlinks" lineno="2873"> +<interface name="fs_manage_fusefs_symlinks" lineno="2931"> <summary> Manage symlinks on a FUSEFS filesystem. </summary> @@ -66218,7 +66271,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_fusefs_fifo_files" lineno="2893"> +<interface name="fs_getattr_fusefs_fifo_files" lineno="2951"> <summary> Get the attributes of named pipes on a FUSEFS filesystem. @@ -66230,7 +66283,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_setattr_fusefs_fifo_files" lineno="2913"> +<interface name="fs_setattr_fusefs_fifo_files" lineno="2971"> <summary> Set the attributes of named pipes on a FUSEFS filesystem. @@ -66242,7 +66295,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_fifo_files" lineno="2933"> +<interface name="fs_manage_fusefs_fifo_files" lineno="2991"> <summary> Manage named pipes on a FUSEFS filesystem. @@ -66254,7 +66307,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_fusefs_sock_files" lineno="2953"> +<interface name="fs_getattr_fusefs_sock_files" lineno="3011"> <summary> Get the attributes of named sockets on a FUSEFS filesystem. @@ -66266,7 +66319,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_setattr_fusefs_sock_files" lineno="2973"> +<interface name="fs_setattr_fusefs_sock_files" lineno="3031"> <summary> Set the attributes of named sockets on a FUSEFS filesystem. @@ -66278,7 +66331,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_sock_files" lineno="2993"> +<interface name="fs_manage_fusefs_sock_files" lineno="3051"> <summary> Manage named sockets on a FUSEFS filesystem. @@ -66290,7 +66343,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_fusefs_chr_files" lineno="3013"> +<interface name="fs_getattr_fusefs_chr_files" lineno="3071"> <summary> Get the attributes of character files on a FUSEFS filesystem. @@ -66302,7 +66355,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_setattr_fusefs_chr_files" lineno="3033"> +<interface name="fs_setattr_fusefs_chr_files" lineno="3091"> <summary> Set the attributes of character files on a FUSEFS filesystem. @@ -66314,7 +66367,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_chr_files" lineno="3053"> +<interface name="fs_manage_fusefs_chr_files" lineno="3111"> <summary> Manage character files on a FUSEFS filesystem. @@ -66326,7 +66379,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_hugetlbfs" lineno="3072"> +<interface name="fs_getattr_hugetlbfs" lineno="3130"> <summary> Get the attributes of an hugetlbfs filesystem. @@ -66337,7 +66390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_hugetlbfs" lineno="3090"> +<interface name="fs_list_hugetlbfs" lineno="3148"> <summary> List hugetlbfs. </summary> @@ -66347,7 +66400,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_hugetlbfs_dirs" lineno="3108"> +<interface name="fs_manage_hugetlbfs_dirs" lineno="3166"> <summary> Manage hugetlbfs dirs. </summary> @@ -66357,7 +66410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3126"> +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3184"> <summary> Read and write inherited hugetlbfs files. </summary> @@ -66367,7 +66420,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_hugetlbfs_files" lineno="3144"> +<interface name="fs_rw_hugetlbfs_files" lineno="3202"> <summary> Read and write hugetlbfs files. </summary> @@ -66377,7 +66430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3162"> +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3220"> <summary> Read, map and write hugetlbfs files. </summary> @@ -66387,7 +66440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_hugetlbfs" lineno="3181"> +<interface name="fs_associate_hugetlbfs" lineno="3239"> <summary> Allow the type to associate to hugetlbfs filesystems. </summary> @@ -66397,7 +66450,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_search_inotifyfs" lineno="3199"> +<interface name="fs_search_inotifyfs" lineno="3257"> <summary> Search inotifyfs filesystem. </summary> @@ -66407,7 +66460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_inotifyfs" lineno="3217"> +<interface name="fs_list_inotifyfs" lineno="3275"> <summary> List inotifyfs filesystem. </summary> @@ -66417,7 +66470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_inotifyfs" lineno="3235"> +<interface name="fs_dontaudit_list_inotifyfs" lineno="3293"> <summary> Dontaudit List inotifyfs filesystem. </summary> @@ -66427,7 +66480,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_hugetlbfs_filetrans" lineno="3269"> +<interface name="fs_hugetlbfs_filetrans" lineno="3327"> <summary> Create an object in a hugetlbfs filesystem, with a private type using a type transition. @@ -66453,7 +66506,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_mount_iso9660_fs" lineno="3289"> +<interface name="fs_mount_iso9660_fs" lineno="3347"> <summary> Mount an iso9660 filesystem, which is usually used on CDs. @@ -66464,7 +66517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_iso9660_fs" lineno="3309"> +<interface name="fs_remount_iso9660_fs" lineno="3367"> <summary> Remount an iso9660 filesystem, which is usually used on CDs. This allows @@ -66476,7 +66529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_iso9660_fs" lineno="3328"> +<interface name="fs_relabelfrom_iso9660_fs" lineno="3386"> <summary> Allow changing of the label of a filesystem with iso9660 type @@ -66487,7 +66540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_iso9660_fs" lineno="3347"> +<interface name="fs_unmount_iso9660_fs" lineno="3405"> <summary> Unmount an iso9660 filesystem, which is usually used on CDs. @@ -66498,7 +66551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_iso9660_fs" lineno="3367"> +<interface name="fs_getattr_iso9660_fs" lineno="3425"> <summary> Get the attributes of an iso9660 filesystem, which is usually used on CDs. @@ -66510,7 +66563,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_iso9660_files" lineno="3386"> +<interface name="fs_getattr_iso9660_files" lineno="3444"> <summary> Get the attributes of files on an iso9660 filesystem, which is usually used on CDs. @@ -66521,7 +66574,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_iso9660_files" lineno="3406"> +<interface name="fs_read_iso9660_files" lineno="3464"> <summary> Read files on an iso9660 filesystem, which is usually used on CDs. @@ -66532,7 +66585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_nfs" lineno="3426"> +<interface name="fs_mount_nfs" lineno="3484"> <summary> Mount a NFS filesystem. </summary> @@ -66542,7 +66595,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfs" lineno="3445"> +<interface name="fs_remount_nfs" lineno="3503"> <summary> Remount a NFS filesystem. This allows some mount options to be changed. @@ -66553,7 +66606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfs" lineno="3463"> +<interface name="fs_unmount_nfs" lineno="3521"> <summary> Unmount a NFS filesystem. </summary> @@ -66563,7 +66616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfs" lineno="3482"> +<interface name="fs_getattr_nfs" lineno="3540"> <summary> Get the attributes of a NFS filesystem. </summary> @@ -66574,7 +66627,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_nfs" lineno="3500"> +<interface name="fs_search_nfs" lineno="3558"> <summary> Search directories on a NFS filesystem. </summary> @@ -66584,7 +66637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfs" lineno="3518"> +<interface name="fs_list_nfs" lineno="3576"> <summary> List NFS filesystem. </summary> @@ -66594,7 +66647,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_nfs" lineno="3537"> +<interface name="fs_dontaudit_list_nfs" lineno="3595"> <summary> Do not audit attempts to list the contents of directories on a NFS filesystem. @@ -66605,7 +66658,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_watch_nfs_dirs" lineno="3556"> +<interface name="fs_watch_nfs_dirs" lineno="3614"> <summary> Add a watch on directories on an NFS filesystem. @@ -66616,7 +66669,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_nfs" lineno="3574"> +<interface name="fs_mounton_nfs" lineno="3632"> <summary> Mounton a NFS filesystem. </summary> @@ -66626,7 +66679,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_files" lineno="3593"> +<interface name="fs_read_nfs_files" lineno="3651"> <summary> Read files on a NFS filesystem. </summary> @@ -66637,7 +66690,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_read_nfs_files" lineno="3613"> +<interface name="fs_dontaudit_read_nfs_files" lineno="3671"> <summary> Do not audit attempts to read files on a NFS filesystem. @@ -66648,7 +66701,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_write_nfs_files" lineno="3631"> +<interface name="fs_write_nfs_files" lineno="3689"> <summary> Read files on a NFS filesystem. </summary> @@ -66658,7 +66711,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_nfs_files" lineno="3651"> +<interface name="fs_exec_nfs_files" lineno="3709"> <summary> Execute files on a NFS filesystem. </summary> @@ -66669,7 +66722,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_append_nfs_files" lineno="3672"> +<interface name="fs_append_nfs_files" lineno="3730"> <summary> Append files on a NFS filesystem. @@ -66681,7 +66734,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_nfs_files" lineno="3692"> +<interface name="fs_dontaudit_append_nfs_files" lineno="3750"> <summary> dontaudit Append files on a NFS filesystem. @@ -66693,7 +66746,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_nfs_files" lineno="3711"> +<interface name="fs_dontaudit_rw_nfs_files" lineno="3769"> <summary> Do not audit attempts to read or write files on a NFS filesystem. @@ -66704,7 +66757,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_watch_nfs_files" lineno="3729"> +<interface name="fs_watch_nfs_files" lineno="3787"> <summary> Add a watch on files on an NFS filesystem. </summary> @@ -66714,7 +66767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_symlinks" lineno="3747"> +<interface name="fs_read_nfs_symlinks" lineno="3805"> <summary> Read symbolic links on a NFS filesystem. </summary> @@ -66724,7 +66777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3766"> +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3824"> <summary> Dontaudit read symbolic links on a NFS filesystem. </summary> @@ -66734,7 +66787,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_named_sockets" lineno="3784"> +<interface name="fs_read_nfs_named_sockets" lineno="3842"> <summary> Read named sockets on a NFS filesystem. </summary> @@ -66744,7 +66797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_named_pipes" lineno="3803"> +<interface name="fs_read_nfs_named_pipes" lineno="3861"> <summary> Read named pipes on a NFS network filesystem. </summary> @@ -66755,7 +66808,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_rpc_dirs" lineno="3822"> +<interface name="fs_getattr_rpc_dirs" lineno="3880"> <summary> Get the attributes of directories of RPC file system pipes. @@ -66766,7 +66819,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_rpc" lineno="3841"> +<interface name="fs_search_rpc" lineno="3899"> <summary> Search directories of RPC file system pipes. </summary> @@ -66776,7 +66829,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_removable" lineno="3859"> +<interface name="fs_search_removable" lineno="3917"> <summary> Search removable storage directories. </summary> @@ -66786,7 +66839,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_removable" lineno="3877"> +<interface name="fs_dontaudit_list_removable" lineno="3935"> <summary> Do not audit attempts to list removable storage directories. </summary> @@ -66796,7 +66849,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_files" lineno="3895"> +<interface name="fs_read_removable_files" lineno="3953"> <summary> Read removable storage files. </summary> @@ -66806,7 +66859,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_removable_files" lineno="3913"> +<interface name="fs_dontaudit_read_removable_files" lineno="3971"> <summary> Do not audit attempts to read removable storage files. </summary> @@ -66816,7 +66869,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_removable_files" lineno="3931"> +<interface name="fs_dontaudit_write_removable_files" lineno="3989"> <summary> Do not audit attempts to write removable storage files. </summary> @@ -66826,7 +66879,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_symlinks" lineno="3949"> +<interface name="fs_read_removable_symlinks" lineno="4007"> <summary> Read removable storage symbolic links. </summary> @@ -66836,7 +66889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_removable_blk_files" lineno="3967"> +<interface name="fs_read_removable_blk_files" lineno="4025"> <summary> Read block nodes on removable filesystems. </summary> @@ -66846,7 +66899,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_removable_blk_files" lineno="3986"> +<interface name="fs_rw_removable_blk_files" lineno="4044"> <summary> Read and write block nodes on removable filesystems. </summary> @@ -66856,7 +66909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_rpc" lineno="4005"> +<interface name="fs_list_rpc" lineno="4063"> <summary> Read directories of RPC file system pipes. </summary> @@ -66866,7 +66919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_files" lineno="4023"> +<interface name="fs_read_rpc_files" lineno="4081"> <summary> Read files of RPC file system pipes. </summary> @@ -66876,7 +66929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_symlinks" lineno="4041"> +<interface name="fs_read_rpc_symlinks" lineno="4099"> <summary> Read symbolic links of RPC file system pipes. </summary> @@ -66886,7 +66939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_sockets" lineno="4059"> +<interface name="fs_read_rpc_sockets" lineno="4117"> <summary> Read sockets of RPC file system pipes. </summary> @@ -66896,7 +66949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_sockets" lineno="4077"> +<interface name="fs_rw_rpc_sockets" lineno="4135"> <summary> Read and write sockets of RPC file system pipes. </summary> @@ -66906,7 +66959,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_dirs" lineno="4097"> +<interface name="fs_manage_nfs_dirs" lineno="4155"> <summary> Create, read, write, and delete directories on a NFS filesystem. @@ -66918,7 +66971,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4117"> +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4175"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -66930,7 +66983,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_files" lineno="4137"> +<interface name="fs_manage_nfs_files" lineno="4195"> <summary> Create, read, write, and delete files on a NFS filesystem. @@ -66942,7 +66995,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_files" lineno="4157"> +<interface name="fs_dontaudit_manage_nfs_files" lineno="4215"> <summary> Do not audit attempts to create, read, write, and delete files @@ -66954,7 +67007,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_symlinks" lineno="4177"> +<interface name="fs_manage_nfs_symlinks" lineno="4235"> <summary> Create, read, write, and delete symbolic links on a NFS network filesystem. @@ -66966,7 +67019,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_nfs_named_pipes" lineno="4196"> +<interface name="fs_manage_nfs_named_pipes" lineno="4254"> <summary> Create, read, write, and delete named pipes on a NFS filesystem. @@ -66977,7 +67030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_named_sockets" lineno="4215"> +<interface name="fs_manage_nfs_named_sockets" lineno="4273"> <summary> Create, read, write, and delete named sockets on a NFS filesystem. @@ -66988,7 +67041,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_nfs_domtrans" lineno="4258"> +<interface name="fs_nfs_domtrans" lineno="4316"> <summary> Execute a file on a NFS filesystem in the specified domain. @@ -67023,7 +67076,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_mount_nfsd_fs" lineno="4277"> +<interface name="fs_mount_nfsd_fs" lineno="4335"> <summary> Mount a NFS server pseudo filesystem. </summary> @@ -67033,7 +67086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfsd_fs" lineno="4296"> +<interface name="fs_remount_nfsd_fs" lineno="4354"> <summary> Mount a NFS server pseudo filesystem. This allows some mount options to be changed. @@ -67044,7 +67097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfsd_fs" lineno="4314"> +<interface name="fs_unmount_nfsd_fs" lineno="4372"> <summary> Unmount a NFS server pseudo filesystem. </summary> @@ -67054,7 +67107,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_fs" lineno="4333"> +<interface name="fs_getattr_nfsd_fs" lineno="4391"> <summary> Get the attributes of a NFS server pseudo filesystem. @@ -67065,7 +67118,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_nfsd_fs" lineno="4351"> +<interface name="fs_search_nfsd_fs" lineno="4409"> <summary> Search NFS server directories. </summary> @@ -67075,7 +67128,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfsd_fs" lineno="4369"> +<interface name="fs_list_nfsd_fs" lineno="4427"> <summary> List NFS server directories. </summary> @@ -67085,7 +67138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_nfsd_dirs" lineno="4387"> +<interface name="fs_watch_nfsd_dirs" lineno="4445"> <summary> Watch NFS server directories. </summary> @@ -67095,7 +67148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_files" lineno="4405"> +<interface name="fs_getattr_nfsd_files" lineno="4463"> <summary> Getattr files on an nfsd filesystem </summary> @@ -67105,7 +67158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_nfsd_fs" lineno="4423"> +<interface name="fs_rw_nfsd_fs" lineno="4481"> <summary> Read and write NFS server files. </summary> @@ -67115,7 +67168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nsfs_files" lineno="4441"> +<interface name="fs_getattr_nsfs_files" lineno="4499"> <summary> Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts) </summary> @@ -67125,7 +67178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nsfs_files" lineno="4459"> +<interface name="fs_read_nsfs_files" lineno="4517"> <summary> Read nsfs inodes (e.g. /proc/pid/ns/uts) </summary> @@ -67135,7 +67188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_nfsd_files" lineno="4477"> +<interface name="fs_watch_nfsd_files" lineno="4535"> <summary> Watch NFS server files. </summary> @@ -67145,7 +67198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nsfs" lineno="4495"> +<interface name="fs_getattr_nsfs" lineno="4553"> <summary> Get the attributes of an nsfs filesystem. </summary> @@ -67155,7 +67208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nsfs" lineno="4513"> +<interface name="fs_unmount_nsfs" lineno="4571"> <summary> Unmount an nsfs filesystem. </summary> @@ -67165,7 +67218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstorefs" lineno="4531"> +<interface name="fs_getattr_pstorefs" lineno="4589"> <summary> Get the attributes of a pstore filesystem. </summary> @@ -67175,7 +67228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstore_dirs" lineno="4550"> +<interface name="fs_getattr_pstore_dirs" lineno="4608"> <summary> Get the attributes of directories of a pstore filesystem. @@ -67186,7 +67239,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_pstore_dirs" lineno="4569"> +<interface name="fs_create_pstore_dirs" lineno="4627"> <summary> Create pstore directories. </summary> @@ -67196,7 +67249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_pstore_dirs" lineno="4588"> +<interface name="fs_relabel_pstore_dirs" lineno="4646"> <summary> Relabel to/from pstore_t directories. </summary> @@ -67206,7 +67259,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_pstore_dirs" lineno="4607"> +<interface name="fs_list_pstore_dirs" lineno="4665"> <summary> List the directories of a pstore filesystem. @@ -67217,7 +67270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_pstore_files" lineno="4626"> +<interface name="fs_read_pstore_files" lineno="4684"> <summary> Read pstore_t files </summary> @@ -67227,7 +67280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_delete_pstore_files" lineno="4645"> +<interface name="fs_delete_pstore_files" lineno="4703"> <summary> Delete the files of a pstore filesystem. @@ -67238,7 +67291,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_ramfs" lineno="4664"> +<interface name="fs_associate_ramfs" lineno="4722"> <summary> Allow the type to associate to ramfs filesystems. </summary> @@ -67248,7 +67301,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_mount_ramfs" lineno="4682"> +<interface name="fs_mount_ramfs" lineno="4740"> <summary> Mount a RAM filesystem. </summary> @@ -67258,7 +67311,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_ramfs" lineno="4701"> +<interface name="fs_remount_ramfs" lineno="4759"> <summary> Remount a RAM filesystem. This allows some mount options to be changed. @@ -67269,7 +67322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_ramfs" lineno="4719"> +<interface name="fs_unmount_ramfs" lineno="4777"> <summary> Unmount a RAM filesystem. </summary> @@ -67279,7 +67332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_ramfs" lineno="4737"> +<interface name="fs_getattr_ramfs" lineno="4795"> <summary> Get the attributes of a RAM filesystem. </summary> @@ -67289,7 +67342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_ramfs" lineno="4755"> +<interface name="fs_search_ramfs" lineno="4813"> <summary> Search directories on a ramfs </summary> @@ -67299,7 +67352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_search_ramfs" lineno="4773"> +<interface name="fs_dontaudit_search_ramfs" lineno="4831"> <summary> Dontaudit Search directories on a ramfs </summary> @@ -67309,7 +67362,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_setattr_ramfs_dirs" lineno="4792"> +<interface name="fs_setattr_ramfs_dirs" lineno="4850"> <summary> Set the attributes of directories on a ramfs. @@ -67320,7 +67373,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_dirs" lineno="4811"> +<interface name="fs_manage_ramfs_dirs" lineno="4869"> <summary> Create, read, write, and delete directories on a ramfs. @@ -67331,7 +67384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_files" lineno="4829"> +<interface name="fs_dontaudit_read_ramfs_files" lineno="4887"> <summary> Dontaudit read on a ramfs files. </summary> @@ -67341,7 +67394,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4847"> +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4905"> <summary> Dontaudit read on a ramfs fifo_files. </summary> @@ -67351,7 +67404,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_files" lineno="4866"> +<interface name="fs_manage_ramfs_files" lineno="4924"> <summary> Create, read, write, and delete files on a ramfs filesystem. @@ -67362,7 +67415,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_pipes" lineno="4884"> +<interface name="fs_write_ramfs_pipes" lineno="4942"> <summary> Write to named pipe on a ramfs filesystem. </summary> @@ -67372,7 +67425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4903"> +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4961"> <summary> Do not audit attempts to write to named pipes on a ramfs filesystem. @@ -67383,7 +67436,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_rw_ramfs_pipes" lineno="4921"> +<interface name="fs_rw_ramfs_pipes" lineno="4979"> <summary> Read and write a named pipe on a ramfs filesystem. </summary> @@ -67393,7 +67446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_pipes" lineno="4940"> +<interface name="fs_manage_ramfs_pipes" lineno="4998"> <summary> Create, read, write, and delete named pipes on a ramfs filesystem. @@ -67404,7 +67457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_sockets" lineno="4958"> +<interface name="fs_write_ramfs_sockets" lineno="5016"> <summary> Write to named socket on a ramfs filesystem. </summary> @@ -67414,7 +67467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_sockets" lineno="4977"> +<interface name="fs_manage_ramfs_sockets" lineno="5035"> <summary> Create, read, write, and delete named sockets on a ramfs filesystem. @@ -67425,7 +67478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_romfs" lineno="4995"> +<interface name="fs_mount_romfs" lineno="5053"> <summary> Mount a ROM filesystem. </summary> @@ -67435,7 +67488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_romfs" lineno="5014"> +<interface name="fs_remount_romfs" lineno="5072"> <summary> Remount a ROM filesystem. This allows some mount options to be changed. @@ -67446,7 +67499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_romfs" lineno="5032"> +<interface name="fs_unmount_romfs" lineno="5090"> <summary> Unmount a ROM filesystem. </summary> @@ -67456,7 +67509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_romfs" lineno="5051"> +<interface name="fs_getattr_romfs" lineno="5109"> <summary> Get the attributes of a ROM filesystem. @@ -67467,7 +67520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_rpc_pipefs" lineno="5069"> +<interface name="fs_mount_rpc_pipefs" lineno="5127"> <summary> Mount a RPC pipe filesystem. </summary> @@ -67477,7 +67530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_rpc_pipefs" lineno="5088"> +<interface name="fs_remount_rpc_pipefs" lineno="5146"> <summary> Remount a RPC pipe filesystem. This allows some mount option to be changed. @@ -67488,7 +67541,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_rpc_pipefs" lineno="5106"> +<interface name="fs_unmount_rpc_pipefs" lineno="5164"> <summary> Unmount a RPC pipe filesystem. </summary> @@ -67498,7 +67551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_rpc_pipefs" lineno="5125"> +<interface name="fs_getattr_rpc_pipefs" lineno="5183"> <summary> Get the attributes of a RPC pipe filesystem. @@ -67509,7 +67562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_named_pipes" lineno="5143"> +<interface name="fs_rw_rpc_named_pipes" lineno="5201"> <summary> Read and write RPC pipe filesystem named pipes. </summary> @@ -67519,7 +67572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_rpc_pipefs_dirs" lineno="5161"> +<interface name="fs_watch_rpc_pipefs_dirs" lineno="5219"> <summary> Watch RPC pipe filesystem directories. </summary> @@ -67529,7 +67582,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_tmpfs" lineno="5179"> +<interface name="fs_mount_tmpfs" lineno="5237"> <summary> Mount a tmpfs filesystem. </summary> @@ -67539,7 +67592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_tmpfs" lineno="5197"> +<interface name="fs_remount_tmpfs" lineno="5255"> <summary> Remount a tmpfs filesystem. </summary> @@ -67549,7 +67602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_tmpfs" lineno="5215"> +<interface name="fs_unmount_tmpfs" lineno="5273"> <summary> Unmount a tmpfs filesystem. </summary> @@ -67559,7 +67612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs" lineno="5233"> +<interface name="fs_dontaudit_getattr_tmpfs" lineno="5291"> <summary> Do not audit getting the attributes of a tmpfs filesystem </summary> @@ -67569,7 +67622,7 @@ Domain to not audit </summary> </param> </interface> -<interface name="fs_getattr_tmpfs" lineno="5253"> +<interface name="fs_getattr_tmpfs" lineno="5311"> <summary> Get the attributes of a tmpfs filesystem. @@ -67581,7 +67634,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_associate_tmpfs" lineno="5271"> +<interface name="fs_associate_tmpfs" lineno="5329"> <summary> Allow the type to associate to tmpfs filesystems. </summary> @@ -67591,7 +67644,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs" lineno="5289"> +<interface name="fs_relabelfrom_tmpfs" lineno="5347"> <summary> Relabel from tmpfs filesystem. </summary> @@ -67601,7 +67654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tmpfs_dirs" lineno="5307"> +<interface name="fs_getattr_tmpfs_dirs" lineno="5365"> <summary> Get the attributes of tmpfs directories. </summary> @@ -67611,7 +67664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5326"> +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5384"> <summary> Do not audit attempts to get the attributes of tmpfs directories. @@ -67622,7 +67675,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs" lineno="5344"> +<interface name="fs_mounton_tmpfs" lineno="5402"> <summary> Mount on tmpfs directories. </summary> @@ -67632,7 +67685,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs_files" lineno="5362"> +<interface name="fs_mounton_tmpfs_files" lineno="5420"> <summary> Mount on tmpfs files. </summary> @@ -67642,7 +67695,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_setattr_tmpfs_dirs" lineno="5380"> +<interface name="fs_setattr_tmpfs_dirs" lineno="5438"> <summary> Set the attributes of tmpfs directories. </summary> @@ -67652,7 +67705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tmpfs" lineno="5398"> +<interface name="fs_search_tmpfs" lineno="5456"> <summary> Search tmpfs directories. </summary> @@ -67662,7 +67715,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_tmpfs" lineno="5416"> +<interface name="fs_list_tmpfs" lineno="5474"> <summary> List the contents of generic tmpfs directories. </summary> @@ -67672,7 +67725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_tmpfs" lineno="5435"> +<interface name="fs_dontaudit_list_tmpfs" lineno="5493"> <summary> Do not audit attempts to list the contents of generic tmpfs directories. @@ -67683,7 +67736,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_dirs" lineno="5454"> +<interface name="fs_manage_tmpfs_dirs" lineno="5512"> <summary> Create, read, write, and delete tmpfs directories @@ -67694,7 +67747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5473"> +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5531"> <summary> Do not audit attempts to write tmpfs directories @@ -67705,7 +67758,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5491"> +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5549"> <summary> Relabel from tmpfs_t dir </summary> @@ -67715,7 +67768,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_dirs" lineno="5509"> +<interface name="fs_relabel_tmpfs_dirs" lineno="5567"> <summary> Relabel directory on tmpfs filesystems. </summary> @@ -67725,7 +67778,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_tmpfs_dirs" lineno="5526"> +<interface name="fs_watch_tmpfs_dirs" lineno="5584"> <summary> Watch directories on tmpfs filesystems. </summary> @@ -67735,7 +67788,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_tmpfs_filetrans" lineno="5560"> +<interface name="fs_tmpfs_filetrans" lineno="5618"> <summary> Create an object in a tmpfs filesystem, with a private type using a type transition. @@ -67761,7 +67814,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5580"> +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5638"> <summary> Do not audit attempts to getattr generic tmpfs files. @@ -67772,7 +67825,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5599"> +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5657"> <summary> Do not audit attempts to read or write generic tmpfs files. @@ -67783,7 +67836,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_delete_tmpfs_symlinks" lineno="5617"> +<interface name="fs_delete_tmpfs_symlinks" lineno="5675"> <summary> Delete tmpfs symbolic links. </summary> @@ -67793,7 +67846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_auto_mountpoints" lineno="5636"> +<interface name="fs_manage_auto_mountpoints" lineno="5694"> <summary> Create, read, write, and delete auto moutpoints. @@ -67804,7 +67857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_files" lineno="5654"> +<interface name="fs_read_tmpfs_files" lineno="5712"> <summary> Read generic tmpfs files. </summary> @@ -67814,7 +67867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_files" lineno="5672"> +<interface name="fs_rw_tmpfs_files" lineno="5730"> <summary> Read and write generic tmpfs files. </summary> @@ -67824,7 +67877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_files" lineno="5690"> +<interface name="fs_relabel_tmpfs_files" lineno="5748"> <summary> Relabel files on tmpfs filesystems. </summary> @@ -67834,7 +67887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_symlinks" lineno="5708"> +<interface name="fs_read_tmpfs_symlinks" lineno="5766"> <summary> Read tmpfs link files. </summary> @@ -67844,7 +67897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5726"> +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5784"> <summary> Relabelfrom socket files on tmpfs filesystems. </summary> @@ -67854,7 +67907,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5744"> +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5802"> <summary> Relabelfrom tmpfs link files. </summary> @@ -67864,7 +67917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_chr_files" lineno="5762"> +<interface name="fs_rw_tmpfs_chr_files" lineno="5820"> <summary> Read and write character nodes on tmpfs filesystems. </summary> @@ -67874,7 +67927,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5781"> +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5839"> <summary> dontaudit Read and write character nodes on tmpfs filesystems. </summary> @@ -67884,7 +67937,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_chr_files" lineno="5800"> +<interface name="fs_relabel_tmpfs_chr_files" lineno="5858"> <summary> Relabel character nodes on tmpfs filesystems. </summary> @@ -67894,7 +67947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_blk_files" lineno="5819"> +<interface name="fs_rw_tmpfs_blk_files" lineno="5877"> <summary> Read and write block nodes on tmpfs filesystems. </summary> @@ -67904,7 +67957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_blk_files" lineno="5838"> +<interface name="fs_relabel_tmpfs_blk_files" lineno="5896"> <summary> Relabel block nodes on tmpfs filesystems. </summary> @@ -67914,7 +67967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_fifo_files" lineno="5857"> +<interface name="fs_relabel_tmpfs_fifo_files" lineno="5915"> <summary> Relabel named pipes on tmpfs filesystems. </summary> @@ -67924,7 +67977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_files" lineno="5877"> +<interface name="fs_manage_tmpfs_files" lineno="5935"> <summary> Read and write, create and delete generic files on tmpfs filesystems. @@ -67935,7 +67988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_symlinks" lineno="5896"> +<interface name="fs_manage_tmpfs_symlinks" lineno="5954"> <summary> Read and write, create and delete symbolic links on tmpfs filesystems. @@ -67946,7 +67999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_sockets" lineno="5915"> +<interface name="fs_manage_tmpfs_sockets" lineno="5973"> <summary> Read and write, create and delete socket files on tmpfs filesystems. @@ -67957,7 +68010,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_chr_files" lineno="5934"> +<interface name="fs_manage_tmpfs_chr_files" lineno="5992"> <summary> Read and write, create and delete character nodes on tmpfs filesystems. @@ -67968,7 +68021,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_blk_files" lineno="5953"> +<interface name="fs_manage_tmpfs_blk_files" lineno="6011"> <summary> Read and write, create and delete block nodes on tmpfs filesystems. @@ -67979,7 +68032,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs" lineno="5971"> +<interface name="fs_getattr_tracefs" lineno="6029"> <summary> Get the attributes of a trace filesystem. </summary> @@ -67989,7 +68042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_dirs" lineno="5989"> +<interface name="fs_getattr_tracefs_dirs" lineno="6047"> <summary> Get attributes of dirs on tracefs filesystem. </summary> @@ -67999,7 +68052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tracefs" lineno="6007"> +<interface name="fs_search_tracefs" lineno="6065"> <summary> search directories on a tracefs filesystem </summary> @@ -68009,7 +68062,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_files" lineno="6026"> +<interface name="fs_getattr_tracefs_files" lineno="6084"> <summary> Get the attributes of files on a trace filesystem. @@ -68020,7 +68073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_xenfs" lineno="6044"> +<interface name="fs_mount_xenfs" lineno="6102"> <summary> Mount a XENFS filesystem. </summary> @@ -68030,7 +68083,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_xenfs" lineno="6062"> +<interface name="fs_search_xenfs" lineno="6120"> <summary> Search the XENFS filesystem. </summary> @@ -68040,7 +68093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_xenfs_dirs" lineno="6082"> +<interface name="fs_manage_xenfs_dirs" lineno="6140"> <summary> Create, read, write, and delete directories on a XENFS filesystem. @@ -68052,7 +68105,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6102"> +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6160"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -68064,7 +68117,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_xenfs_files" lineno="6122"> +<interface name="fs_manage_xenfs_files" lineno="6180"> <summary> Create, read, write, and delete files on a XENFS filesystem. @@ -68076,7 +68129,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_xenfs_files" lineno="6140"> +<interface name="fs_mmap_xenfs_files" lineno="6198"> <summary> Map files a XENFS filesystem. </summary> @@ -68086,7 +68139,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_manage_xenfs_files" lineno="6160"> +<interface name="fs_dontaudit_manage_xenfs_files" lineno="6218"> <summary> Do not audit attempts to create, read, write, and delete files @@ -68098,7 +68151,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_all_fs" lineno="6178"> +<interface name="fs_mount_all_fs" lineno="6236"> <summary> Mount all filesystems. </summary> @@ -68108,7 +68161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_all_fs" lineno="6197"> +<interface name="fs_remount_all_fs" lineno="6255"> <summary> Remount all filesystems. This allows some mount options to be changed. @@ -68119,7 +68172,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_all_fs" lineno="6215"> +<interface name="fs_unmount_all_fs" lineno="6273"> <summary> Unmount all filesystems. </summary> @@ -68129,7 +68182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_fs" lineno="6247"> +<interface name="fs_getattr_all_fs" lineno="6305"> <summary> Get the attributes of all filesystems. </summary> @@ -68153,7 +68206,7 @@ Domain allowed access. <infoflow type="read" weight="5"/> <rolecap/> </interface> -<interface name="fs_dontaudit_getattr_all_fs" lineno="6267"> +<interface name="fs_dontaudit_getattr_all_fs" lineno="6325"> <summary> Do not audit attempts to get the attributes all filesystems. @@ -68164,7 +68217,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_get_all_fs_quotas" lineno="6286"> +<interface name="fs_get_all_fs_quotas" lineno="6344"> <summary> Get the quotas of all filesystems. </summary> @@ -68175,7 +68228,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_set_all_quotas" lineno="6305"> +<interface name="fs_set_all_quotas" lineno="6363"> <summary> Set the quotas of all filesystems. </summary> @@ -68186,7 +68239,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_all_fs" lineno="6323"> +<interface name="fs_relabelfrom_all_fs" lineno="6381"> <summary> Relabelfrom all filesystems. </summary> @@ -68196,7 +68249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_dirs" lineno="6342"> +<interface name="fs_getattr_all_dirs" lineno="6400"> <summary> Get the attributes of all directories with a filesystem type. @@ -68207,7 +68260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_all" lineno="6360"> +<interface name="fs_search_all" lineno="6418"> <summary> Search all directories with a filesystem type. </summary> @@ -68217,7 +68270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_all" lineno="6378"> +<interface name="fs_list_all" lineno="6436"> <summary> List all directories with a filesystem type. </summary> @@ -68227,7 +68280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_files" lineno="6397"> +<interface name="fs_getattr_all_files" lineno="6455"> <summary> Get the attributes of all files with a filesystem type. @@ -68238,7 +68291,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_files" lineno="6416"> +<interface name="fs_dontaudit_getattr_all_files" lineno="6474"> <summary> Do not audit attempts to get the attributes of all files with a filesystem type. @@ -68249,7 +68302,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_symlinks" lineno="6435"> +<interface name="fs_getattr_all_symlinks" lineno="6493"> <summary> Get the attributes of all symbolic links with a filesystem type. @@ -68260,7 +68313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6454"> +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6512"> <summary> Do not audit attempts to get the attributes of all symbolic links with a filesystem type. @@ -68271,7 +68324,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_pipes" lineno="6473"> +<interface name="fs_getattr_all_pipes" lineno="6531"> <summary> Get the attributes of all named pipes with a filesystem type. @@ -68282,7 +68335,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_pipes" lineno="6492"> +<interface name="fs_dontaudit_getattr_all_pipes" lineno="6550"> <summary> Do not audit attempts to get the attributes of all named pipes with a filesystem type. @@ -68293,7 +68346,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_sockets" lineno="6511"> +<interface name="fs_getattr_all_sockets" lineno="6569"> <summary> Get the attributes of all named sockets with a filesystem type. @@ -68304,7 +68357,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_sockets" lineno="6530"> +<interface name="fs_dontaudit_getattr_all_sockets" lineno="6588"> <summary> Do not audit attempts to get the attributes of all named sockets with a filesystem type. @@ -68315,7 +68368,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_blk_files" lineno="6549"> +<interface name="fs_getattr_all_blk_files" lineno="6607"> <summary> Get the attributes of all block device nodes with a filesystem type. @@ -68326,7 +68379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_chr_files" lineno="6568"> +<interface name="fs_getattr_all_chr_files" lineno="6626"> <summary> Get the attributes of all character device nodes with a filesystem type. @@ -68337,7 +68390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unconfined" lineno="6586"> +<interface name="fs_unconfined" lineno="6644"> <summary> Unconfined access to filesystems </summary> @@ -71360,7 +71413,18 @@ Domain to not audit. </summary> </param> </interface> -<interface name="selinux_dontaudit_getattr_dir" lineno="214"> +<interface name="selinux_getattr_dirs" lineno="214"> +<summary> +Get the attributes of the selinuxfs +directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="selinux_dontaudit_getattr_dir" lineno="233"> <summary> Do not audit attempts to get the attributes of the selinuxfs directory. @@ -71371,7 +71435,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="selinux_search_fs" lineno="232"> +<interface name="selinux_search_fs" lineno="251"> <summary> Search selinuxfs. </summary> @@ -71381,7 +71445,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_dontaudit_search_fs" lineno="251"> +<interface name="selinux_dontaudit_search_fs" lineno="270"> <summary> Do not audit attempts to search selinuxfs. </summary> @@ -71391,7 +71455,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="selinux_dontaudit_read_fs" lineno="270"> +<interface name="selinux_dontaudit_read_fs" lineno="289"> <summary> Do not audit attempts to read generic selinuxfs entries @@ -71402,7 +71466,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="selinux_get_enforce_mode" lineno="291"> +<interface name="selinux_mounton_dirs" lineno="308"> +<summary> +Mount on the selinuxfs directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_get_enforce_mode" lineno="328"> <summary> Allows the caller to get the mode of policy enforcement (enforcing or permissive mode). @@ -71414,7 +71488,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_set_enforce_mode" lineno="323"> +<interface name="selinux_set_enforce_mode" lineno="360"> <summary> Allow caller to set the mode of policy enforcement (enforcing or permissive mode). @@ -71436,7 +71510,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_load_policy" lineno="341"> +<interface name="selinux_load_policy" lineno="378"> <summary> Allow caller to load the policy into the kernel. </summary> @@ -71446,7 +71520,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_read_policy" lineno="359"> +<interface name="selinux_read_policy" lineno="396"> <summary> Allow caller to read the policy from the kernel. </summary> @@ -71456,7 +71530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_set_generic_booleans" lineno="392"> +<interface name="selinux_set_generic_booleans" lineno="429"> <summary> Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy. @@ -71478,7 +71552,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_set_all_booleans" lineno="434"> +<interface name="selinux_set_all_booleans" lineno="471"> <summary> Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy. @@ -71500,7 +71574,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_get_all_booleans" lineno="476"> +<interface name="selinux_get_all_booleans" lineno="513"> <summary> Allow caller to get the state of all Booleans to view conditional portions of the policy. @@ -71512,7 +71586,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_set_parameters" lineno="510"> +<interface name="selinux_set_parameters" lineno="547"> <summary> Allow caller to set SELinux access vector cache parameters. </summary> @@ -71534,7 +71608,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_validate_context" lineno="529"> +<interface name="selinux_validate_context" lineno="566"> <summary> Allows caller to validate security contexts. </summary> @@ -71545,7 +71619,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_dontaudit_validate_context" lineno="551"> +<interface name="selinux_dontaudit_validate_context" lineno="588"> <summary> Do not audit attempts to validate security contexts. </summary> @@ -71556,7 +71630,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="selinux_compute_access_vector" lineno="572"> +<interface name="selinux_compute_access_vector" lineno="609"> <summary> Allows caller to compute an access vector. </summary> @@ -71567,7 +71641,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_compute_create_context" lineno="595"> +<interface name="selinux_compute_create_context" lineno="632"> <summary> Calculate the default type for object creation. </summary> @@ -71578,7 +71652,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_compute_member" lineno="617"> +<interface name="selinux_compute_member" lineno="654"> <summary> Allows caller to compute polyinstatntiated directory members. @@ -71589,7 +71663,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_compute_relabel_context" lineno="647"> +<interface name="selinux_compute_relabel_context" lineno="684"> <summary> Calculate the context for relabeling objects. </summary> @@ -71608,7 +71682,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_compute_user_contexts" lineno="668"> +<interface name="selinux_compute_user_contexts" lineno="705"> <summary> Allows caller to compute possible contexts for a user. </summary> @@ -71618,7 +71692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="selinux_use_status_page" lineno="690"> +<interface name="selinux_use_status_page" lineno="727"> <summary> Allows the caller to use the SELinux status page. </summary> @@ -71629,7 +71703,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_unconfined" lineno="710"> +<interface name="selinux_unconfined" lineno="747"> <summary> Unconfined access to the SELinux kernel security server. </summary> @@ -77965,7 +78039,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_read_config" lineno="1087"> +<interface name="container_search_config" lineno="1087"> +<summary> +Allow the specified domain to +search container config directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_read_config" lineno="1107"> <summary> Allow the specified domain to read container config files. @@ -77976,7 +78061,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_watch_config_dirs" lineno="1107"> +<interface name="container_watch_config_dirs" lineno="1127"> <summary> Allow the specified domain to watch container config directories. @@ -77987,7 +78072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_create_config_files" lineno="1126"> +<interface name="container_create_config_files" lineno="1146"> <summary> Allow the specified domain to create container config files. @@ -77998,7 +78083,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_config_files" lineno="1145"> +<interface name="container_rw_config_files" lineno="1165"> <summary> Allow the specified domain to read and write container config files. @@ -78009,7 +78094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_config_files" lineno="1164"> +<interface name="container_manage_config_files" lineno="1184"> <summary> Allow the specified domain to manage container config files. @@ -78020,7 +78105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_file_root_filetrans" lineno="1185"> +<interface name="container_file_root_filetrans" lineno="1205"> <summary> Allow the specified domain to create container files in the @@ -78033,7 +78118,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_dirs" lineno="1204"> +<interface name="container_manage_dirs" lineno="1224"> <summary> Allow the specified domain to manage container file directories. @@ -78044,7 +78129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_watch_dirs" lineno="1223"> +<interface name="container_watch_dirs" lineno="1243"> <summary> Allow the specified domain to watch container file directories. @@ -78055,7 +78140,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_files" lineno="1242"> +<interface name="container_manage_files" lineno="1262"> <summary> Allow the specified domain to manage container files. @@ -78066,7 +78151,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_dontaudit_relabel_dirs" lineno="1261"> +<interface name="container_dontaudit_relabel_dirs" lineno="1281"> <summary> Do not audit attempts to relabel container file directories. @@ -78077,7 +78162,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="container_dontaudit_relabel_files" lineno="1280"> +<interface name="container_dontaudit_relabel_files" lineno="1300"> <summary> Do not audit attempts to relabel container files. @@ -78088,7 +78173,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="container_manage_lnk_files" lineno="1299"> +<interface name="container_manage_lnk_files" lineno="1319"> <summary> Allow the specified domain to manage container lnk files. @@ -78099,7 +78184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_fifo_files" lineno="1318"> +<interface name="container_rw_fifo_files" lineno="1338"> <summary> Allow the specified domain to read and write container fifo files. @@ -78110,7 +78195,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_fifo_files" lineno="1337"> +<interface name="container_manage_fifo_files" lineno="1357"> <summary> Allow the specified domain to manage container fifo files. @@ -78121,7 +78206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_sock_files" lineno="1356"> +<interface name="container_manage_sock_files" lineno="1376"> <summary> Allow the specified domain to manage container sock files. @@ -78132,7 +78217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_chr_files" lineno="1375"> +<interface name="container_rw_chr_files" lineno="1395"> <summary> Allow the specified domain to read and write container chr files. @@ -78143,7 +78228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_dontaudit_rw_chr_files" lineno="1394"> +<interface name="container_dontaudit_rw_chr_files" lineno="1414"> <summary> Do not audit attempts to read and write container chr files. @@ -78154,7 +78239,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_chr_files" lineno="1413"> +<interface name="container_manage_chr_files" lineno="1433"> <summary> Allow the specified domain to manage container chr files. @@ -78165,7 +78250,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_spec_filetrans_file" lineno="1449"> +<interface name="container_spec_filetrans_file" lineno="1469"> <summary> Allow the specified domain to create objects in specified directories with @@ -78193,7 +78278,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_list_ro_dirs" lineno="1469"> +<interface name="container_list_ro_dirs" lineno="1489"> <summary> Allow the specified domain to list the contents of read-only container @@ -78205,7 +78290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_config" lineno="1488"> +<interface name="container_manage_home_config" lineno="1508"> <summary> Allow the specified domain to manage container config home content. @@ -78216,7 +78301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_config_home_filetrans" lineno="1520"> +<interface name="container_config_home_filetrans" lineno="1540"> <summary> Allow the specified domain to create objects in an xdg_config directory @@ -78239,7 +78324,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_manage_home_data_files" lineno="1540"> +<interface name="container_manage_home_data_files" lineno="1560"> <summary> Allow the specified domain to manage container data home files. @@ -78250,7 +78335,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_data_fifo_files" lineno="1560"> +<interface name="container_manage_home_data_fifo_files" lineno="1580"> <summary> Allow the specified domain to manage container data home named @@ -78262,7 +78347,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_data_sock_files" lineno="1580"> +<interface name="container_manage_home_data_sock_files" lineno="1600"> <summary> Allow the specified domain to manage container data home named @@ -78274,7 +78359,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin_all_files" lineno="1598"> +<interface name="container_admin_all_files" lineno="1618"> <summary> Administrate all container files. </summary> @@ -78284,7 +78369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin_all_ro_files" lineno="1618"> +<interface name="container_admin_all_ro_files" lineno="1638"> <summary> Administrate all container read-only files. </summary> @@ -78294,7 +78379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin_all_user_runtime_content" lineno="1640"> +<interface name="container_admin_all_user_runtime_content" lineno="1660"> <summary> All of the rules necessary for a user to manage user container runtime data @@ -78306,7 +78391,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_all_home_content" lineno="1660"> +<interface name="container_manage_all_home_content" lineno="1680"> <summary> All of the rules necessary for a user to manage container data in their home @@ -78318,7 +78403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_relabel_all_content" lineno="1704"> +<interface name="container_relabel_all_content" lineno="1724"> <summary> Allow the specified domain to relabel container files and @@ -78330,7 +78415,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_remount_fs" lineno="1723"> +<interface name="container_remount_fs" lineno="1743"> <summary> Allow the specified domain to remount container filesystems. @@ -78341,7 +78426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_relabel_fs" lineno="1742"> +<interface name="container_relabel_fs" lineno="1762"> <summary> Allow the specified domain to relabel container filesystems. @@ -78352,7 +78437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_getattr_fs" lineno="1762"> +<interface name="container_getattr_fs" lineno="1782"> <summary> Allow the specified domain to get the attributes of container @@ -78364,7 +78449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_search_runtime" lineno="1781"> +<interface name="container_search_runtime" lineno="1801"> <summary> Allow the specified domain to search runtime container directories. @@ -78375,7 +78460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_read_runtime_files" lineno="1801"> +<interface name="container_read_runtime_files" lineno="1821"> <summary> Allow the specified domain to read runtime container files. @@ -78386,7 +78471,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_getattr_runtime_sock_files" lineno="1822"> +<interface name="container_getattr_runtime_sock_files" lineno="1842"> <summary> Allow the specified domain to get the attributes runtime container of @@ -78398,7 +78483,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_files" lineno="1841"> +<interface name="container_manage_runtime_files" lineno="1861"> <summary> Allow the specified domain to manage runtime container files. @@ -78409,7 +78494,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_fifo_files" lineno="1860"> +<interface name="container_manage_runtime_fifo_files" lineno="1880"> <summary> Allow the specified domain to manage runtime container named pipes. @@ -78420,7 +78505,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_lnk_files" lineno="1879"> +<interface name="container_manage_runtime_lnk_files" lineno="1899"> <summary> Allow the specified domain to manage runtime container symlinks. @@ -78431,7 +78516,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_sock_files" lineno="1898"> +<interface name="container_manage_runtime_sock_files" lineno="1918"> <summary> Allow the specified domain to manage runtime container named sockets. @@ -78442,7 +78527,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_user_runtime_files" lineno="1917"> +<interface name="container_manage_user_runtime_files" lineno="1937"> <summary> Allow the specified domain to manage user runtime container files. @@ -78453,7 +78538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_user_runtime_sock_files" lineno="1936"> +<interface name="container_rw_user_runtime_sock_files" lineno="1956"> <summary> Allow the specified domain to read and write user runtime container named sockets. @@ -78464,7 +78549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_search_var_lib" lineno="1955"> +<interface name="container_search_var_lib" lineno="1975"> <summary> Allow the specified domain to search container directories in /var/lib. @@ -78475,7 +78560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_list_var_lib" lineno="1976"> +<interface name="container_list_var_lib" lineno="1996"> <summary> Allow the specified domain to list the contents of container directories @@ -78487,7 +78572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_dirs" lineno="1996"> +<interface name="container_manage_var_lib_dirs" lineno="2016"> <summary> Allow the specified domain to manage container file directories in /var/lib. @@ -78498,7 +78583,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_read_var_lib_files" lineno="2015"> +<interface name="container_read_var_lib_files" lineno="2035"> <summary> Allow the specified domain to read container files in /var/lib. @@ -78509,7 +78594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_files" lineno="2034"> +<interface name="container_manage_var_lib_files" lineno="2054"> <summary> Allow the specified domain to manage container files in /var/lib. @@ -78520,7 +78605,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_map_var_lib_files" lineno="2053"> +<interface name="container_map_var_lib_files" lineno="2073"> <summary> Allow the specified domain to memory map container files in /var/lib. @@ -78531,7 +78616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_fifo_files" lineno="2072"> +<interface name="container_manage_var_lib_fifo_files" lineno="2092"> <summary> Allow the specified domain to manage container named pipes in /var/lib. @@ -78542,7 +78627,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_lnk_files" lineno="2091"> +<interface name="container_manage_var_lib_lnk_files" lineno="2111"> <summary> Allow the specified domain to manage container symlinks in /var/lib. @@ -78553,7 +78638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_sock_files" lineno="2110"> +<interface name="container_manage_var_lib_sock_files" lineno="2130"> <summary> Allow the specified domain to manage container named sockets in /var/lib. @@ -78564,7 +78649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_var_lib_filetrans" lineno="2140"> +<interface name="container_var_lib_filetrans" lineno="2160"> <summary> Allow the specified domain to create objects in /var/lib with an automatic @@ -78586,7 +78671,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_var_lib_filetrans_file" lineno="2170"> +<interface name="container_var_lib_filetrans_file" lineno="2190"> <summary> Allow the specified domain to create objects in /var/lib with an automatic @@ -78608,7 +78693,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_filetrans_var_lib_file" lineno="2201"> +<interface name="container_filetrans_var_lib_file" lineno="2221"> <summary> Allow the specified domain to create objects in container /var/lib directories @@ -78631,7 +78716,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_unlabeled_var_lib_filetrans" lineno="2233"> +<interface name="container_unlabeled_var_lib_filetrans" lineno="2253"> <summary> Allow the specified domain to create objects in unlabeled directories with @@ -78654,7 +78739,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_search_logs" lineno="2254"> +<interface name="container_search_logs" lineno="2274"> <summary> Allow the specified domain to search container log file directories. @@ -78665,7 +78750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_list_log_dirs" lineno="2274"> +<interface name="container_list_log_dirs" lineno="2294"> <summary> Allow the specified domain to list the contents of container log directories. @@ -78676,7 +78761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_create_log_dirs" lineno="2293"> +<interface name="container_create_log_dirs" lineno="2313"> <summary> Allow the specified domain to create container log file directories. @@ -78687,7 +78772,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_log_dirs" lineno="2312"> +<interface name="container_manage_log_dirs" lineno="2332"> <summary> Allow the specified domain to manage container log file directories. @@ -78698,7 +78783,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_watch_log_dirs" lineno="2331"> +<interface name="container_watch_log_dirs" lineno="2351"> <summary> Allow the specified domain to watch container log file directories. @@ -78709,7 +78794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_create_log_files" lineno="2350"> +<interface name="container_create_log_files" lineno="2370"> <summary> Allow the specified domain to create container log files. @@ -78720,7 +78805,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_append_log_files" lineno="2369"> +<interface name="container_append_log_files" lineno="2389"> <summary> Allow the specified domain to append data to container log files. @@ -78731,7 +78816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_log_files" lineno="2388"> +<interface name="container_manage_log_files" lineno="2408"> <summary> Allow the specified domain to manage container log files. @@ -78742,7 +78827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_watch_log_files" lineno="2407"> +<interface name="container_watch_log_files" lineno="2427"> <summary> Allow the specified domain to watch container log files. @@ -78753,7 +78838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_log_filetrans" lineno="2438"> +<interface name="container_log_filetrans" lineno="2458"> <summary> Allow the specified domain to create objects in log directories with an @@ -78776,7 +78861,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_manage_log_symlinks" lineno="2458"> +<interface name="container_manage_log_symlinks" lineno="2478"> <summary> Allow the specified domain to manage container log symlinks. @@ -78787,7 +78872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_start_units" lineno="2477"> +<interface name="container_start_units" lineno="2497"> <summary> Allow the specified domain to start systemd units for containers. @@ -78798,7 +78883,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin" lineno="2504"> +<interface name="container_admin" lineno="2524"> <summary> All of the rules required to administrate a container @@ -86526,7 +86611,17 @@ Domain prefix to be used. </summary> </param> </template> -<interface name="munin_stream_connect" lineno="55"> +<interface name="munin_rw_tcp_sockets" lineno="54"> +<summary> +Permit to read/write Munin TCP sockets +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="munin_stream_connect" lineno="72"> <summary> Connect to munin over a unix domain stream socket. @@ -86537,7 +86632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="munin_read_config" lineno="75"> +<interface name="munin_read_config" lineno="92"> <summary> Read munin configuration content. </summary> @@ -86548,7 +86643,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="munin_append_log" lineno="97"> +<interface name="munin_append_log" lineno="114"> <summary> Append munin log files. </summary> @@ -86559,7 +86654,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="munin_search_lib" lineno="117"> +<interface name="munin_search_lib" lineno="134"> <summary> Search munin library directories. </summary> @@ -86569,7 +86664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="munin_dontaudit_search_lib" lineno="137"> +<interface name="munin_dontaudit_search_lib" lineno="154"> <summary> Do not audit attempts to search munin library directories. @@ -86580,7 +86675,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="munin_admin" lineno="162"> +<interface name="munin_admin" lineno="179"> <summary> All of the rules required to administrate an munin environment. @@ -98074,7 +98169,19 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zfs_rw_zpool_cache" lineno="117"> +<interface name="zfs_filetrans_zpool_cache" lineno="119"> +<summary> +Create the zpool cache with an +automatic transition to the zpool +cache type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zfs_rw_zpool_cache" lineno="137"> <summary> Read and write zpool cache files. </summary> @@ -98084,7 +98191,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zfs_admin" lineno="143"> +<interface name="zfs_admin" lineno="163"> <summary> All of the rules required to administrate a ZFS environment. @@ -105537,7 +105644,18 @@ Domain to not audit. </summary> </param> </interface> -<interface name="sysnet_dontaudit_rw_dhcpc_unix_stream_sockets" lineno="97"> +<interface name="sysnet_dontaudit_rw_dhcpc_dgram_sockets" lineno="97"> +<summary> +Do not audit attempts to read/write to the +dhcp unix datagram socket descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="sysnet_dontaudit_rw_dhcpc_unix_stream_sockets" lineno="116"> <summary> Do not audit attempts to read/write to the dhcp unix stream socket descriptors. @@ -105548,7 +105666,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="sysnet_sigchld_dhcpc" lineno="115"> +<interface name="sysnet_sigchld_dhcpc" lineno="134"> <summary> Send a SIGCHLD signal to the dhcp client. </summary> @@ -105558,7 +105676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_kill_dhcpc" lineno="134"> +<interface name="sysnet_kill_dhcpc" lineno="153"> <summary> Send a kill signal to the dhcp client. </summary> @@ -105569,7 +105687,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_sigstop_dhcpc" lineno="152"> +<interface name="sysnet_sigstop_dhcpc" lineno="171"> <summary> Send a SIGSTOP signal to the dhcp client. </summary> @@ -105579,7 +105697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_signull_dhcpc" lineno="170"> +<interface name="sysnet_signull_dhcpc" lineno="189"> <summary> Send a null signal to the dhcp client. </summary> @@ -105589,7 +105707,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_signal_dhcpc" lineno="189"> +<interface name="sysnet_signal_dhcpc" lineno="208"> <summary> Send a generic signal to the dhcp client. </summary> @@ -105600,7 +105718,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_dbus_chat_dhcpc" lineno="208"> +<interface name="sysnet_dbus_chat_dhcpc" lineno="227"> <summary> Send and receive messages from dhcpc over dbus. @@ -105611,7 +105729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_rw_dhcp_config" lineno="228"> +<interface name="sysnet_rw_dhcp_config" lineno="247"> <summary> Read and write dhcp configuration files. </summary> @@ -105621,7 +105739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_search_dhcpc_state" lineno="248"> +<interface name="sysnet_search_dhcpc_state" lineno="267"> <summary> Search the DHCP client state directories. @@ -105632,7 +105750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_read_dhcpc_state" lineno="267"> +<interface name="sysnet_read_dhcpc_state" lineno="286"> <summary> Read dhcp client state files. </summary> @@ -105642,7 +105760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_delete_dhcpc_state" lineno="285"> +<interface name="sysnet_delete_dhcpc_state" lineno="304"> <summary> Delete the dhcp client state files. </summary> @@ -105652,7 +105770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_setattr_config" lineno="303"> +<interface name="sysnet_setattr_config" lineno="322"> <summary> Set the attributes of network config files. </summary> @@ -105662,7 +105780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_read_config" lineno="343"> +<interface name="sysnet_read_config" lineno="362"> <summary> Read network config files. </summary> @@ -105693,7 +105811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_mmap_config_files" lineno="386"> +<interface name="sysnet_mmap_config_files" lineno="405"> <summary> Map network config files. </summary> @@ -105709,7 +105827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_mmap_read_config" lineno="411"> +<interface name="sysnet_mmap_read_config" lineno="430"> <summary> map network config files. </summary> @@ -105725,7 +105843,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dontaudit_read_config" lineno="430"> +<interface name="sysnet_dontaudit_read_config" lineno="449"> <summary> Do not audit attempts to read network config files. </summary> @@ -105735,7 +105853,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="sysnet_write_config" lineno="448"> +<interface name="sysnet_write_config" lineno="467"> <summary> Write network config files. </summary> @@ -105745,7 +105863,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_create_config" lineno="467"> +<interface name="sysnet_create_config" lineno="486"> <summary> Create network config files. </summary> @@ -105755,7 +105873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_relabel_config" lineno="486"> +<interface name="sysnet_relabel_config" lineno="505"> <summary> Relabel network config files. </summary> @@ -105765,7 +105883,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_etc_filetrans_config" lineno="511"> +<interface name="sysnet_etc_filetrans_config" lineno="530"> <summary> Create files in /etc with the type used for the network config files. @@ -105781,7 +105899,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_manage_config" lineno="529"> +<interface name="sysnet_manage_config" lineno="548"> <summary> Create, read, write, and delete network config files. </summary> @@ -105791,7 +105909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_read_dhcpc_runtime_files" lineno="561"> +<interface name="sysnet_read_dhcpc_runtime_files" lineno="580"> <summary> Read dhcp client runtime files. </summary> @@ -105801,7 +105919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_delete_dhcpc_runtime_files" lineno="580"> +<interface name="sysnet_delete_dhcpc_runtime_files" lineno="599"> <summary> Delete the dhcp client runtime files. </summary> @@ -105811,7 +105929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_manage_dhcpc_runtime_files" lineno="598"> +<interface name="sysnet_manage_dhcpc_runtime_files" lineno="617"> <summary> Create, read, write, and delete dhcp client runtime files. </summary> @@ -105821,7 +105939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_domtrans_ifconfig" lineno="616"> +<interface name="sysnet_domtrans_ifconfig" lineno="635"> <summary> Execute ifconfig in the ifconfig domain. </summary> @@ -105831,7 +105949,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="sysnet_run_ifconfig" lineno="643"> +<interface name="sysnet_run_ifconfig" lineno="662"> <summary> Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, @@ -105849,7 +105967,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_exec_ifconfig" lineno="663"> +<interface name="sysnet_exec_ifconfig" lineno="682"> <summary> Execute ifconfig in the caller domain. </summary> @@ -105859,7 +105977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_signal_ifconfig" lineno="683"> +<interface name="sysnet_signal_ifconfig" lineno="702"> <summary> Send a generic signal to ifconfig. </summary> @@ -105870,7 +105988,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_signull_ifconfig" lineno="702"> +<interface name="sysnet_signull_ifconfig" lineno="721"> <summary> Send null signals to ifconfig. </summary> @@ -105881,7 +105999,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_create_netns_dirs" lineno="721"> +<interface name="sysnet_create_netns_dirs" lineno="740"> <summary> Create the /run/netns directory with an automatic type transition. @@ -105892,7 +106010,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_netns_filetrans" lineno="755"> +<interface name="sysnet_netns_filetrans" lineno="774"> <summary> Create an object in the /run/netns directory with a private type. @@ -105918,7 +106036,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_read_dhcp_config" lineno="776"> +<interface name="sysnet_read_dhcp_config" lineno="795"> <summary> Read the DHCP configuration files. </summary> @@ -105928,7 +106046,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_search_dhcp_state" lineno="796"> +<interface name="sysnet_search_dhcp_state" lineno="815"> <summary> Search the DHCP state data directory. </summary> @@ -105938,7 +106056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcp_state_filetrans" lineno="840"> +<interface name="sysnet_dhcp_state_filetrans" lineno="859"> <summary> Create DHCP state data. </summary> @@ -105973,7 +106091,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_dns_name_resolve" lineno="860"> +<interface name="sysnet_dns_name_resolve" lineno="879"> <summary> Perform a DNS name resolution. </summary> @@ -105984,7 +106102,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_use_ldap" lineno="911"> +<interface name="sysnet_use_ldap" lineno="930"> <summary> Connect and use a LDAP server. </summary> @@ -105994,7 +106112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_use_portmap" lineno="938"> +<interface name="sysnet_use_portmap" lineno="957"> <summary> Connect and use remote port mappers. </summary> @@ -106004,7 +106122,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcpc_script_entry" lineno="972"> +<interface name="sysnet_dhcpc_script_entry" lineno="991"> <summary> Make the specified program domain accessable from the DHCP hooks/scripts. @@ -106728,7 +106846,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1415"> +<interface name="systemd_manage_userdb_runtime_symlinks" lineno="1415"> +<summary> +Manage symbolic links under /run/systemd/userdb. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1433"> <summary> Manage socket files under /run/systemd/userdb . </summary> @@ -106738,7 +106866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stream_connect_userdb" lineno="1433"> +<interface name="systemd_stream_connect_userdb" lineno="1451"> <summary> Connect to /run/systemd/userdb/io.systemd.DynamicUser . </summary> @@ -106748,7 +106876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_machines" lineno="1455"> +<interface name="systemd_read_machines" lineno="1473"> <summary> Allow reading /run/systemd/machines </summary> @@ -106758,7 +106886,7 @@ Domain that can access the machines files </summary> </param> </interface> -<interface name="systemd_watch_machines_dirs" lineno="1474"> +<interface name="systemd_watch_machines_dirs" lineno="1492"> <summary> Allow watching /run/systemd/machines </summary> @@ -106768,7 +106896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_connect_machined" lineno="1492"> +<interface name="systemd_connect_machined" lineno="1510"> <summary> Allow connecting to /run/systemd/userdb/io.systemd.Machine socket </summary> @@ -106778,7 +106906,7 @@ Domain that can access the socket </summary> </param> </interface> -<interface name="systemd_dbus_chat_machined" lineno="1511"> +<interface name="systemd_dbus_chat_machined" lineno="1529"> <summary> Send and receive messages from systemd machined over dbus. @@ -106789,7 +106917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_hostnamed" lineno="1532"> +<interface name="systemd_dbus_chat_hostnamed" lineno="1550"> <summary> Send and receive messages from systemd hostnamed over dbus. @@ -106800,7 +106928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_passwd_agent_fds" lineno="1552"> +<interface name="systemd_use_passwd_agent_fds" lineno="1570"> <summary> allow systemd_passwd_agent to inherit fds </summary> @@ -106810,7 +106938,7 @@ Domain that owns the fds </summary> </param> </interface> -<interface name="systemd_run_passwd_agent" lineno="1575"> +<interface name="systemd_run_passwd_agent" lineno="1593"> <summary> allow systemd_passwd_agent to be run by admin </summary> @@ -106825,7 +106953,7 @@ role that it runs in </summary> </param> </interface> -<interface name="systemd_use_passwd_agent" lineno="1596"> +<interface name="systemd_use_passwd_agent" lineno="1614"> <summary> Allow a systemd_passwd_agent_t process to interact with a daemon that needs a password from the sysadmin. @@ -106836,7 +106964,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1620"> +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1638"> <summary> Transition to systemd_passwd_runtime_t when creating dirs </summary> @@ -106846,7 +106974,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1641"> +<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1659"> <summary> Transition to systemd_userdbd_runtime_t when creating the userdb directory inside an init runtime @@ -106858,7 +106986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1659"> +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1677"> <summary> Allow to domain to create systemd-passwd symlink </summary> @@ -106868,7 +106996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_passwd_runtime_dirs" lineno="1677"> +<interface name="systemd_watch_passwd_runtime_dirs" lineno="1695"> <summary> Allow a domain to watch systemd-passwd runtime dirs. </summary> @@ -106878,7 +107006,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_journal_dirs" lineno="1695"> +<interface name="systemd_list_journal_dirs" lineno="1713"> <summary> Allow domain to list the contents of systemd_journal_t dirs </summary> @@ -106888,7 +107016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_journal_files" lineno="1713"> +<interface name="systemd_read_journal_files" lineno="1731"> <summary> Allow domain to read systemd_journal_t files </summary> @@ -106898,7 +107026,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_journal_files" lineno="1732"> +<interface name="systemd_manage_journal_files" lineno="1750"> <summary> Allow domain to create/manage systemd_journal_t files </summary> @@ -106908,7 +107036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_journal_dirs" lineno="1752"> +<interface name="systemd_watch_journal_dirs" lineno="1770"> <summary> Allow domain to add a watch on systemd_journal_t directories </summary> @@ -106918,7 +107046,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_dirs" lineno="1770"> +<interface name="systemd_relabelfrom_journal_files" lineno="1788"> +<summary> +Relabel from systemd-journald file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="systemd_relabelto_journal_dirs" lineno="1806"> <summary> Relabel to systemd-journald directory type. </summary> @@ -106928,7 +107066,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_files" lineno="1789"> +<interface name="systemd_relabelto_journal_files" lineno="1825"> <summary> Relabel to systemd-journald file type. </summary> @@ -106938,7 +107076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_networkd_units" lineno="1809"> +<interface name="systemd_read_networkd_units" lineno="1845"> <summary> Allow domain to read systemd_networkd_t unit files </summary> @@ -106948,7 +107086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_networkd_units" lineno="1829"> +<interface name="systemd_manage_networkd_units" lineno="1865"> <summary> Allow domain to create/manage systemd_networkd_t unit files </summary> @@ -106958,7 +107096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_enabledisable_networkd" lineno="1849"> +<interface name="systemd_enabledisable_networkd" lineno="1885"> <summary> Allow specified domain to enable systemd-networkd units </summary> @@ -106968,7 +107106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_startstop_networkd" lineno="1868"> +<interface name="systemd_startstop_networkd" lineno="1904"> <summary> Allow specified domain to start systemd-networkd units </summary> @@ -106978,7 +107116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_networkd" lineno="1888"> +<interface name="systemd_dbus_chat_networkd" lineno="1924"> <summary> Send and receive messages from systemd networkd over dbus. @@ -106989,7 +107127,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_networkd" lineno="1908"> +<interface name="systemd_status_networkd" lineno="1944"> <summary> Allow specified domain to get status of systemd-networkd </summary> @@ -106999,7 +107137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1927"> +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1963"> <summary> Relabel systemd_networkd tun socket. </summary> @@ -107009,7 +107147,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1945"> +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1981"> <summary> Read/Write from systemd_networkd netlink route socket. </summary> @@ -107019,7 +107157,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_networkd_runtime" lineno="1963"> +<interface name="systemd_list_networkd_runtime" lineno="1999"> <summary> Allow domain to list dirs under /run/systemd/netif </summary> @@ -107029,7 +107167,7 @@ domain permitted the access </summary> </param> </interface> -<interface name="systemd_watch_networkd_runtime_dirs" lineno="1982"> +<interface name="systemd_watch_networkd_runtime_dirs" lineno="2018"> <summary> Watch directories under /run/systemd/netif </summary> @@ -107039,7 +107177,7 @@ Domain permitted the access </summary> </param> </interface> -<interface name="systemd_read_networkd_runtime" lineno="2001"> +<interface name="systemd_read_networkd_runtime" lineno="2037"> <summary> Allow domain to read files generated by systemd_networkd </summary> @@ -107049,7 +107187,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_state" lineno="2020"> +<interface name="systemd_read_logind_state" lineno="2056"> <summary> Allow systemd_logind_t to read process state for cgroup file </summary> @@ -107059,7 +107197,7 @@ Domain systemd_logind_t may access. </summary> </param> </interface> -<interface name="systemd_create_logind_linger_dir" lineno="2041"> +<interface name="systemd_create_logind_linger_dir" lineno="2077"> <summary> Allow the specified domain to create the systemd-logind linger directory with @@ -107071,7 +107209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_user_manager_units" lineno="2061"> +<interface name="systemd_start_user_manager_units" lineno="2097"> <summary> Allow the specified domain to start systemd user manager units (systemd --user). @@ -107082,7 +107220,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stop_user_manager_units" lineno="2081"> +<interface name="systemd_stop_user_manager_units" lineno="2117"> <summary> Allow the specified domain to stop systemd user manager units (systemd --user). @@ -107093,7 +107231,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_reload_user_manager_units" lineno="2101"> +<interface name="systemd_reload_user_manager_units" lineno="2137"> <summary> Allow the specified domain to reload systemd user manager units (systemd --user). @@ -107104,7 +107242,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_get_user_manager_units_status" lineno="2121"> +<interface name="systemd_get_user_manager_units_status" lineno="2157"> <summary> Get the status of systemd user manager units (systemd --user). @@ -107115,7 +107253,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_power_units" lineno="2140"> +<interface name="systemd_start_power_units" lineno="2176"> <summary> Allow specified domain to start power units </summary> @@ -107125,7 +107263,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="systemd_status_power_units" lineno="2159"> +<interface name="systemd_status_power_units" lineno="2195"> <summary> Get the system status information about power units </summary> @@ -107135,7 +107273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stream_connect_socket_proxyd" lineno="2178"> +<interface name="systemd_stream_connect_socket_proxyd" lineno="2214"> <summary> Allows connections to the systemd-socket-proxyd's socket. </summary> @@ -107145,7 +107283,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_file" lineno="2197"> +<interface name="systemd_tmpfiles_conf_file" lineno="2233"> <summary> Make the specified type usable for systemd tmpfiles config files. @@ -107156,7 +107294,7 @@ Type to be used for systemd tmpfiles config files. </summary> </param> </interface> -<interface name="systemd_tmpfiles_creator" lineno="2218"> +<interface name="systemd_tmpfiles_creator" lineno="2254"> <summary> Allow the specified domain to create the tmpfiles config directory with @@ -107168,7 +107306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_filetrans" lineno="2254"> +<interface name="systemd_tmpfiles_conf_filetrans" lineno="2290"> <summary> Create an object in the systemd tmpfiles config directory, with a private type @@ -107195,7 +107333,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="systemd_list_tmpfiles_conf" lineno="2273"> +<interface name="systemd_list_tmpfiles_conf" lineno="2309"> <summary> Allow domain to list systemd tmpfiles config directory </summary> @@ -107205,7 +107343,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2291"> +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2327"> <summary> Allow domain to relabel to systemd tmpfiles config directory </summary> @@ -107215,7 +107353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2309"> +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2345"> <summary> Allow domain to relabel to systemd tmpfiles config files </summary> @@ -107225,7 +107363,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfilesd_managed" lineno="2327"> +<interface name="systemd_tmpfilesd_managed" lineno="2363"> <summary> Allow systemd_tmpfiles_t to manage filesystem objects </summary> @@ -107235,7 +107373,7 @@ Type of object to manage </summary> </param> </interface> -<interface name="systemd_stream_connect_resolved" lineno="2354"> +<interface name="systemd_stream_connect_resolved" lineno="2390"> <summary> Connect to systemd resolved over /run/systemd/resolve/io.systemd.Resolve . @@ -107246,7 +107384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_resolved" lineno="2375"> +<interface name="systemd_dbus_chat_resolved" lineno="2411"> <summary> Send and receive messages from systemd resolved over dbus. @@ -107257,7 +107395,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_resolved_runtime" lineno="2395"> +<interface name="systemd_read_resolved_runtime" lineno="2431"> <summary> Allow domain to read resolv.conf file generated by systemd_resolved </summary> @@ -107267,7 +107405,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_exec_systemctl" lineno="2417"> +<interface name="systemd_exec_systemctl" lineno="2453"> <summary> Execute the systemctl program. </summary> @@ -107277,7 +107415,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_getattr_updated_runtime" lineno="2448"> +<interface name="systemd_getattr_updated_runtime" lineno="2484"> <summary> Allow domain to getattr on .updated file (generated by systemd-update-done </summary> @@ -107287,7 +107425,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_search_all_user_keys" lineno="2466"> +<interface name="systemd_search_all_user_keys" lineno="2502"> <summary> Search keys for the all systemd --user domains. </summary> @@ -107297,7 +107435,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_create_all_user_keys" lineno="2484"> +<interface name="systemd_create_all_user_keys" lineno="2520"> <summary> Create keys for the all systemd --user domains. </summary> @@ -107307,7 +107445,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_all_user_keys" lineno="2502"> +<interface name="systemd_write_all_user_keys" lineno="2538"> <summary> Write keys for the all systemd --user domains. </summary> @@ -107317,7 +107455,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_domtrans_sysusers" lineno="2521"> +<interface name="systemd_domtrans_sysusers" lineno="2557"> <summary> Execute systemd-sysusers in the systemd sysusers domain. @@ -107328,7 +107466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_run_sysusers" lineno="2546"> +<interface name="systemd_run_sysusers" lineno="2582"> <summary> Run systemd-sysusers with a domain transition. </summary> @@ -107344,7 +107482,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="systemd_use_inherited_machined_ptys" lineno="2566"> +<interface name="systemd_use_inherited_machined_ptys" lineno="2602"> <summary> receive and use a systemd_machined_devpts_t file handle </summary> |