summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/policy.xml4320
-rw-r--r--policy/booleans.conf103
-rw-r--r--policy/modules.conf49
3 files changed, 2651 insertions, 1821 deletions
diff --git a/doc/policy.xml b/doc/policy.xml
index ec78d338..e96f1ea2 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -5634,7 +5634,28 @@ The domain for which gpg_exec_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="gpg_signal" lineno="208">
+<interface name="gpg_agent_exec" lineno="208">
+<summary>
+Execute the gpg_agent in the caller domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="gpg_agent_entry_type" lineno="228">
+<summary>
+Make gpg_agent executable files an
+entrypoint for the specified domain.
+</summary>
+<param name="domain">
+<summary>
+The domain for which gpg_agent_exec_t is an entrypoint.
+</summary>
+</param>
+</interface>
+<interface name="gpg_signal" lineno="246">
<summary>
Send generic signals to gpg.
</summary>
@@ -5644,7 +5665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gpg_rw_agent_pipes" lineno="226">
+<interface name="gpg_rw_agent_pipes" lineno="264">
<summary>
Read and write gpg agent pipes.
</summary>
@@ -5654,7 +5675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gpg_stream_connect_agent" lineno="244">
+<interface name="gpg_stream_connect_agent" lineno="282">
<summary>
Connect to gpg agent socket
</summary>
@@ -5664,7 +5685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gpg_search_agent_tmp_dirs" lineno="266">
+<interface name="gpg_search_agent_tmp_dirs" lineno="304">
<summary>
Search gpg agent dirs.
</summary>
@@ -5674,7 +5695,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gpg_agent_tmp_filetrans" lineno="300">
+<interface name="gpg_agent_tmp_filetrans" lineno="338">
<summary>
filetrans in gpg_agent_tmp_t dirs
</summary>
@@ -5700,7 +5721,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="gpg_runtime_filetrans" lineno="335">
+<interface name="gpg_runtime_filetrans" lineno="373">
<summary>
filetrans in gpg_runtime_t dirs
</summary>
@@ -5726,7 +5747,17 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="gpg_secret_filetrans" lineno="370">
+<interface name="gpg_dontaudit_getattr_gpg_runtime_dirs" lineno="392">
+<summary>
+Do not audit attempt to getattr gpg runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="gpg_secret_filetrans" lineno="428">
<summary>
filetrans in gpg_secret_t dirs
</summary>
@@ -5752,7 +5783,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="gpg_pinentry_dbus_chat" lineno="391">
+<interface name="gpg_pinentry_dbus_chat" lineno="449">
<summary>
Send messages to and from gpg
pinentry over DBUS.
@@ -5763,7 +5794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gpg_dontaudit_search_user_secrets" lineno="412">
+<interface name="gpg_dontaudit_search_user_secrets" lineno="470">
<summary>
Do not audit attempts to search gpg
user secrets.
@@ -5774,7 +5805,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="gpg_list_user_secrets" lineno="430">
+<interface name="gpg_list_user_secrets" lineno="490">
<summary>
List gpg user secrets.
</summary>
@@ -5784,6 +5815,16 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="gpg_dontaudit_search_user_secrets_dirs" lineno="509">
+<summary>
+Do not audit attempt to search gpg user secrets dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
<tunable name="gpg_agent_env_file" dftval="false">
<desc>
<p>
@@ -7384,6 +7425,14 @@ writable memory
</p>
</desc>
</tunable>
+<tunable name="pulseaudio_can_network" dftval="false">
+<desc>
+<p>
+Determine whether pulseaudio
+can use the network.
+</p>
+</desc>
+</tunable>
</module>
<module name="qemu" filename="policy/modules/apps/qemu.if">
<summary>QEMU machine emulator and virtualizer.</summary>
@@ -8618,7 +8667,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="wm_exec" lineno="126">
+<interface name="wm_exec" lineno="132">
<summary>
Execute wm in the caller domain.
</summary>
@@ -8628,7 +8677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="wm_dbus_chat" lineno="152">
+<template name="wm_dbus_chat" lineno="158">
<summary>
Send and receive messages from
specified wm over dbus.
@@ -8645,7 +8694,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="wm_dontaudit_exec_tmp_files" lineno="173">
+<interface name="wm_dontaudit_exec_tmp_files" lineno="179">
<summary>
Do not audit attempts to execute
files in temporary directories.
@@ -8656,7 +8705,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="wm_dontaudit_exec_tmpfs_files" lineno="192">
+<interface name="wm_dontaudit_exec_tmpfs_files" lineno="198">
<summary>
Do not audit attempts to execute
files in temporary filesystems.
@@ -8667,7 +8716,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="wm_application_domain" lineno="235">
+<interface name="wm_application_domain" lineno="241">
<summary>
Create a domain for applications
that are launched by the window
@@ -8702,7 +8751,7 @@ Type to be used as the source window manager domain.
</param>
<infoflow type="none"/>
</interface>
-<template name="wm_write_pipes" lineno="260">
+<template name="wm_write_pipes" lineno="266">
<summary>
Write wm unnamed pipes.
</summary>
@@ -8747,6 +8796,34 @@ Role allowed access
</summary>
</param>
</template>
+<interface name="xscreensaver_domtrans" lineno="69">
+<summary>
+Make a domain transition to the
+xscreensaver target domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xscreensaver_run" lineno="95">
+<summary>
+Execute xscreensaver in the xscreensaver
+domain, and allow the specified role
+the xscreensaver domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
<tunable name="xscreensaver_read_generic_user_content" dftval="true">
<desc>
<p>
@@ -57198,7 +57275,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_infiniband" lineno="2417">
+<interface name="dev_read_iio" lineno="2417">
+<summary>
+Allow read/write access to InfiniBand devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_infiniband" lineno="2435">
<summary>
Allow read/write access to InfiniBand devices.
</summary>
@@ -57208,7 +57295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kmsg" lineno="2435">
+<interface name="dev_read_kmsg" lineno="2453">
<summary>
Read the kernel messages
</summary>
@@ -57218,7 +57305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2453">
+<interface name="dev_dontaudit_read_kmsg" lineno="2471">
<summary>
Do not audit attempts to read the kernel messages
</summary>
@@ -57228,7 +57315,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_kmsg" lineno="2471">
+<interface name="dev_write_kmsg" lineno="2489">
<summary>
Write to the kernel messages device
</summary>
@@ -57238,7 +57325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kmsg" lineno="2489">
+<interface name="dev_rw_kmsg" lineno="2507">
<summary>
Read and write to the kernel messages device
</summary>
@@ -57248,7 +57335,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_kmsg" lineno="2507">
+<interface name="dev_mounton_kmsg" lineno="2525">
<summary>
Mount on the kernel messages device
</summary>
@@ -57258,7 +57345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_ksm_dev" lineno="2525">
+<interface name="dev_getattr_ksm_dev" lineno="2543">
<summary>
Get the attributes of the ksm devices.
</summary>
@@ -57268,7 +57355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_ksm_dev" lineno="2543">
+<interface name="dev_setattr_ksm_dev" lineno="2561">
<summary>
Set the attributes of the ksm devices.
</summary>
@@ -57278,7 +57365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_ksm" lineno="2561">
+<interface name="dev_read_ksm" lineno="2579">
<summary>
Read the ksm devices.
</summary>
@@ -57288,7 +57375,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_ksm" lineno="2579">
+<interface name="dev_rw_ksm" lineno="2597">
<summary>
Read and write to ksm devices.
</summary>
@@ -57298,7 +57385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_kvm_dev" lineno="2597">
+<interface name="dev_getattr_kvm_dev" lineno="2615">
<summary>
Get the attributes of the kvm devices.
</summary>
@@ -57308,7 +57395,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_kvm_dev" lineno="2615">
+<interface name="dev_setattr_kvm_dev" lineno="2633">
<summary>
Set the attributes of the kvm devices.
</summary>
@@ -57318,7 +57405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kvm" lineno="2633">
+<interface name="dev_read_kvm" lineno="2651">
<summary>
Read the kvm devices.
</summary>
@@ -57328,7 +57415,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kvm" lineno="2651">
+<interface name="dev_rw_kvm" lineno="2669">
<summary>
Read and write to kvm devices.
</summary>
@@ -57338,7 +57425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lirc" lineno="2669">
+<interface name="dev_read_lirc" lineno="2687">
<summary>
Read the lirc device.
</summary>
@@ -57348,7 +57435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lirc" lineno="2687">
+<interface name="dev_rw_lirc" lineno="2705">
<summary>
Read and write the lirc device.
</summary>
@@ -57358,7 +57445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_lirc" lineno="2711">
+<interface name="dev_filetrans_lirc" lineno="2729">
<summary>
Automatic type transition to the type
for lirc device nodes when created in /dev.
@@ -57374,7 +57461,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_rw_loop_control" lineno="2729">
+<interface name="dev_rw_loop_control" lineno="2747">
<summary>
Read and write the loop-control device.
</summary>
@@ -57384,7 +57471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_lvm_control" lineno="2747">
+<interface name="dev_getattr_lvm_control" lineno="2765">
<summary>
Get the attributes of the lvm comtrol device.
</summary>
@@ -57394,7 +57481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lvm_control" lineno="2765">
+<interface name="dev_read_lvm_control" lineno="2783">
<summary>
Read the lvm comtrol device.
</summary>
@@ -57404,7 +57491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lvm_control" lineno="2783">
+<interface name="dev_rw_lvm_control" lineno="2801">
<summary>
Read and write the lvm control device.
</summary>
@@ -57414,7 +57501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2801">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2819">
<summary>
Do not audit attempts to read and write lvm control device.
</summary>
@@ -57424,7 +57511,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2819">
+<interface name="dev_delete_lvm_control_dev" lineno="2837">
<summary>
Delete the lvm control device.
</summary>
@@ -57434,7 +57521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2837">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2855">
<summary>
dontaudit getattr raw memory devices (e.g. /dev/mem).
</summary>
@@ -57444,7 +57531,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory" lineno="2858">
+<interface name="dev_read_raw_memory" lineno="2876">
<summary>
Read raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57457,7 +57544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory_cond" lineno="2888">
+<interface name="dev_read_raw_memory_cond" lineno="2906">
<summary>
Read raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -57475,7 +57562,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2915">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2933">
<summary>
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
@@ -57489,7 +57576,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory" lineno="2936">
+<interface name="dev_write_raw_memory" lineno="2954">
<summary>
Write raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57502,7 +57589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory_cond" lineno="2966">
+<interface name="dev_write_raw_memory_cond" lineno="2984">
<summary>
Write raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -57520,7 +57607,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_rx_raw_memory" lineno="2992">
+<interface name="dev_rx_raw_memory" lineno="3010">
<summary>
Read and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57533,7 +57620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory" lineno="3014">
+<interface name="dev_wx_raw_memory" lineno="3032">
<summary>
Write and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -57546,7 +57633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory_cond" lineno="3041">
+<interface name="dev_wx_raw_memory_cond" lineno="3059">
<summary>
Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -57564,7 +57651,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_getattr_misc_dev" lineno="3064">
+<interface name="dev_getattr_misc_dev" lineno="3082">
<summary>
Get the attributes of miscellaneous devices.
</summary>
@@ -57574,7 +57661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="3083">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3101">
<summary>
Do not audit attempts to get the attributes
of miscellaneous devices.
@@ -57585,7 +57672,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_misc_dev" lineno="3101">
+<interface name="dev_setattr_misc_dev" lineno="3119">
<summary>
Set the attributes of miscellaneous devices.
</summary>
@@ -57595,7 +57682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="3120">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3138">
<summary>
Do not audit attempts to set the attributes
of miscellaneous devices.
@@ -57606,7 +57693,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_misc" lineno="3138">
+<interface name="dev_read_misc" lineno="3156">
<summary>
Read miscellaneous devices.
</summary>
@@ -57616,7 +57703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_misc" lineno="3156">
+<interface name="dev_write_misc" lineno="3174">
<summary>
Write miscellaneous devices.
</summary>
@@ -57626,7 +57713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_misc" lineno="3174">
+<interface name="dev_dontaudit_rw_misc" lineno="3192">
<summary>
Do not audit attempts to read and write miscellaneous devices.
</summary>
@@ -57636,7 +57723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_modem_dev" lineno="3192">
+<interface name="dev_getattr_modem_dev" lineno="3210">
<summary>
Get the attributes of the modem devices.
</summary>
@@ -57646,7 +57733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_modem_dev" lineno="3210">
+<interface name="dev_setattr_modem_dev" lineno="3228">
<summary>
Set the attributes of the modem devices.
</summary>
@@ -57656,7 +57743,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_modem" lineno="3228">
+<interface name="dev_read_modem" lineno="3246">
<summary>
Read the modem devices.
</summary>
@@ -57666,7 +57753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_modem" lineno="3246">
+<interface name="dev_rw_modem" lineno="3264">
<summary>
Read and write to modem devices.
</summary>
@@ -57676,7 +57763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mouse_dev" lineno="3264">
+<interface name="dev_getattr_mouse_dev" lineno="3282">
<summary>
Get the attributes of the mouse devices.
</summary>
@@ -57686,7 +57773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_mouse_dev" lineno="3282">
+<interface name="dev_setattr_mouse_dev" lineno="3300">
<summary>
Set the attributes of the mouse devices.
</summary>
@@ -57696,7 +57783,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_mouse" lineno="3300">
+<interface name="dev_read_mouse" lineno="3318">
<summary>
Read the mouse devices.
</summary>
@@ -57706,7 +57793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_mouse" lineno="3318">
+<interface name="dev_rw_mouse" lineno="3336">
<summary>
Read and write to mouse devices.
</summary>
@@ -57716,7 +57803,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3337">
+<interface name="dev_getattr_mtrr_dev" lineno="3355">
<summary>
Get the attributes of the memory type range
registers (MTRR) device.
@@ -57727,7 +57814,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3357">
+<interface name="dev_dontaudit_write_mtrr" lineno="3375">
<summary>
Do not audit attempts to write the memory type
range registers (MTRR).
@@ -57738,7 +57825,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_mtrr" lineno="3376">
+<interface name="dev_rw_mtrr" lineno="3394">
<summary>
Read and write the memory type range registers (MTRR).
</summary>
@@ -57748,7 +57835,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_null_dev" lineno="3395">
+<interface name="dev_getattr_null_dev" lineno="3413">
<summary>
Get the attributes of the null device nodes.
</summary>
@@ -57758,7 +57845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_null_dev" lineno="3413">
+<interface name="dev_setattr_null_dev" lineno="3431">
<summary>
Set the attributes of the null device nodes.
</summary>
@@ -57768,7 +57855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_null_dev" lineno="3432">
+<interface name="dev_dontaudit_setattr_null_dev" lineno="3450">
<summary>
Do not audit attempts to set the attributes of
the null device nodes.
@@ -57779,7 +57866,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_null" lineno="3450">
+<interface name="dev_delete_null" lineno="3468">
<summary>
Delete the null device (/dev/null).
</summary>
@@ -57789,7 +57876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_null" lineno="3468">
+<interface name="dev_rw_null" lineno="3486">
<summary>
Read and write to the null device (/dev/null).
</summary>
@@ -57799,7 +57886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_null_dev" lineno="3486">
+<interface name="dev_create_null_dev" lineno="3504">
<summary>
Create the null device (/dev/null).
</summary>
@@ -57809,7 +57896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_null_service" lineno="3505">
+<interface name="dev_manage_null_service" lineno="3523">
<summary>
Manage services with script type null_device_t for when
/lib/systemd/system/something.service is a link to /dev/null
@@ -57820,7 +57907,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3525">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3543">
<summary>
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
@@ -57831,7 +57918,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_nvram" lineno="3543">
+<interface name="dev_rw_nvram" lineno="3561">
<summary>
Read and write BIOS non-volatile RAM.
</summary>
@@ -57841,7 +57928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_printer_dev" lineno="3561">
+<interface name="dev_getattr_printer_dev" lineno="3579">
<summary>
Get the attributes of the printer device nodes.
</summary>
@@ -57851,7 +57938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_printer_dev" lineno="3579">
+<interface name="dev_setattr_printer_dev" lineno="3597">
<summary>
Set the attributes of the printer device nodes.
</summary>
@@ -57861,7 +57948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_append_printer" lineno="3598">
+<interface name="dev_append_printer" lineno="3616">
<summary>
Append the printer device.
</summary>
@@ -57871,7 +57958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_printer" lineno="3616">
+<interface name="dev_rw_printer" lineno="3634">
<summary>
Read and write the printer device.
</summary>
@@ -57881,7 +57968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3634">
+<interface name="dev_getattr_pmqos_dev" lineno="3652">
<summary>
Get the attributes of PM QoS devices
</summary>
@@ -57891,7 +57978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_pmqos" lineno="3652">
+<interface name="dev_read_pmqos" lineno="3670">
<summary>
Read the PM QoS devices.
</summary>
@@ -57901,7 +57988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_pmqos" lineno="3670">
+<interface name="dev_rw_pmqos" lineno="3688">
<summary>
Read and write the the PM QoS devices.
</summary>
@@ -57911,7 +57998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_qemu_dev" lineno="3689">
+<interface name="dev_getattr_qemu_dev" lineno="3707">
<summary>
Get the attributes of the QEMU
microcode and id interfaces.
@@ -57922,7 +58009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_qemu_dev" lineno="3708">
+<interface name="dev_setattr_qemu_dev" lineno="3726">
<summary>
Set the attributes of the QEMU
microcode and id interfaces.
@@ -57933,7 +58020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_qemu" lineno="3726">
+<interface name="dev_read_qemu" lineno="3744">
<summary>
Read the QEMU device
</summary>
@@ -57943,7 +58030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_qemu" lineno="3744">
+<interface name="dev_rw_qemu" lineno="3762">
<summary>
Read and write the the QEMU device.
</summary>
@@ -57953,7 +58040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_rand" lineno="3778">
+<interface name="dev_read_rand" lineno="3796">
<summary>
Read from random number generator
devices (e.g., /dev/random).
@@ -57979,7 +58066,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_rand" lineno="3797">
+<interface name="dev_dontaudit_read_rand" lineno="3815">
<summary>
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
@@ -57990,7 +58077,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_append_rand" lineno="3816">
+<interface name="dev_dontaudit_append_rand" lineno="3834">
<summary>
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
@@ -58001,7 +58088,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_rand" lineno="3836">
+<interface name="dev_write_rand" lineno="3854">
<summary>
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
@@ -58013,7 +58100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_rand_dev" lineno="3854">
+<interface name="dev_create_rand_dev" lineno="3872">
<summary>
Create the random device (/dev/random).
</summary>
@@ -58023,7 +58110,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_realtime_clock" lineno="3872">
+<interface name="dev_read_realtime_clock" lineno="3890">
<summary>
Read the realtime clock (/dev/rtc).
</summary>
@@ -58033,7 +58120,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_realtime_clock" lineno="3890">
+<interface name="dev_write_realtime_clock" lineno="3908">
<summary>
Set the realtime clock (/dev/rtc).
</summary>
@@ -58043,7 +58130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_realtime_clock" lineno="3910">
+<interface name="dev_rw_realtime_clock" lineno="3928">
<summary>
Read and set the realtime clock (/dev/rtc).
</summary>
@@ -58053,7 +58140,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_scanner_dev" lineno="3925">
+<interface name="dev_getattr_scanner_dev" lineno="3943">
<summary>
Get the attributes of the scanner device.
</summary>
@@ -58063,7 +58150,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3944">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3962">
<summary>
Do not audit attempts to get the attributes of
the scanner device.
@@ -58074,7 +58161,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_scanner_dev" lineno="3962">
+<interface name="dev_setattr_scanner_dev" lineno="3980">
<summary>
Set the attributes of the scanner device.
</summary>
@@ -58084,7 +58171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3981">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3999">
<summary>
Do not audit attempts to set the attributes of
the scanner device.
@@ -58095,7 +58182,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_scanner" lineno="3999">
+<interface name="dev_rw_scanner" lineno="4017">
<summary>
Read and write the scanner device.
</summary>
@@ -58105,7 +58192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sound_dev" lineno="4017">
+<interface name="dev_getattr_sound_dev" lineno="4035">
<summary>
Get the attributes of the sound devices.
</summary>
@@ -58115,7 +58202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_sound_dev" lineno="4035">
+<interface name="dev_setattr_sound_dev" lineno="4053">
<summary>
Set the attributes of the sound devices.
</summary>
@@ -58125,7 +58212,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound" lineno="4053">
+<interface name="dev_read_sound" lineno="4071">
<summary>
Read the sound devices.
</summary>
@@ -58135,7 +58222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound" lineno="4072">
+<interface name="dev_write_sound" lineno="4090">
<summary>
Write the sound devices.
</summary>
@@ -58145,7 +58232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound_mixer" lineno="4091">
+<interface name="dev_read_sound_mixer" lineno="4109">
<summary>
Read the sound mixer devices.
</summary>
@@ -58155,7 +58242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound_mixer" lineno="4110">
+<interface name="dev_write_sound_mixer" lineno="4128">
<summary>
Write the sound mixer devices.
</summary>
@@ -58165,7 +58252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="4129">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4147">
<summary>
Get the attributes of the the power management device.
</summary>
@@ -58175,7 +58262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="4147">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4165">
<summary>
Set the attributes of the the power management device.
</summary>
@@ -58185,7 +58272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_power_management" lineno="4165">
+<interface name="dev_rw_power_management" lineno="4183">
<summary>
Read and write the the power management device.
</summary>
@@ -58195,7 +58282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_smartcard_dev" lineno="4183">
+<interface name="dev_getattr_smartcard_dev" lineno="4201">
<summary>
Getattr on smartcard devices
</summary>
@@ -58205,7 +58292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4202">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4220">
<summary>
dontaudit getattr on smartcard devices
</summary>
@@ -58215,7 +58302,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_smartcard" lineno="4221">
+<interface name="dev_rw_smartcard" lineno="4239">
<summary>
Read and write smartcard devices.
</summary>
@@ -58225,7 +58312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_smartcard" lineno="4239">
+<interface name="dev_manage_smartcard" lineno="4257">
<summary>
Create, read, write, and delete smartcard devices.
</summary>
@@ -58235,7 +58322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_sysdig" lineno="4257">
+<interface name="dev_rw_sysdig" lineno="4275">
<summary>
Read, write and map the sysdig device.
</summary>
@@ -58245,7 +58332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs" lineno="4276">
+<interface name="dev_mounton_sysfs" lineno="4294">
<summary>
Mount a filesystem on sysfs. (Deprecated)
</summary>
@@ -58255,7 +58342,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_associate_sysfs" lineno="4291">
+<interface name="dev_associate_sysfs" lineno="4309">
<summary>
Associate a file to a sysfs filesystem.
</summary>
@@ -58265,7 +58352,7 @@ The type of the file to be associated to sysfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4309">
+<interface name="dev_getattr_sysfs_dirs" lineno="4327">
<summary>
Get the attributes of sysfs directories.
</summary>
@@ -58275,7 +58362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs" lineno="4327">
+<interface name="dev_getattr_sysfs" lineno="4345">
<summary>
Get the attributes of sysfs filesystem
</summary>
@@ -58285,7 +58372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_sysfs" lineno="4345">
+<interface name="dev_mount_sysfs" lineno="4363">
<summary>
mount a sysfs filesystem
</summary>
@@ -58295,7 +58382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_remount_sysfs" lineno="4363">
+<interface name="dev_remount_sysfs" lineno="4381">
<summary>
Remount a sysfs filesystem.
</summary>
@@ -58305,7 +58392,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4381">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4399">
<summary>
Do not audit getting the attributes of sysfs filesystem
</summary>
@@ -58315,7 +58402,7 @@ Domain to dontaudit access from
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4399">
+<interface name="dev_dontaudit_read_sysfs" lineno="4417">
<summary>
Dont audit attempts to read hardware state information
</summary>
@@ -58325,7 +58412,7 @@ Domain for which the attempts do not need to be audited
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4419">
+<interface name="dev_mounton_sysfs_dirs" lineno="4437">
<summary>
Mount on sysfs directories.
</summary>
@@ -58335,7 +58422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_search_sysfs" lineno="4437">
+<interface name="dev_search_sysfs" lineno="4455">
<summary>
Search the sysfs directories.
</summary>
@@ -58345,7 +58432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4455">
+<interface name="dev_dontaudit_search_sysfs" lineno="4473">
<summary>
Do not audit attempts to search sysfs.
</summary>
@@ -58355,7 +58442,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_list_sysfs" lineno="4473">
+<interface name="dev_list_sysfs" lineno="4491">
<summary>
List the contents of the sysfs directories.
</summary>
@@ -58365,7 +58452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sysfs_dirs" lineno="4492">
+<interface name="dev_write_sysfs_dirs" lineno="4510">
<summary>
Write in a sysfs directories.
</summary>
@@ -58375,7 +58462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4510">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4528">
<summary>
Do not audit attempts to write in a sysfs directory.
</summary>
@@ -58385,7 +58472,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_files" lineno="4528">
+<interface name="dev_dontaudit_write_sysfs_files" lineno="4546">
<summary>
Do not audit attempts to write to a sysfs file.
</summary>
@@ -58395,7 +58482,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4547">
+<interface name="dev_manage_sysfs_dirs" lineno="4565">
<summary>
Create, read, write, and delete sysfs
directories.
@@ -58406,7 +58493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sysfs" lineno="4574">
+<interface name="dev_read_sysfs" lineno="4592">
<summary>
Read hardware state information.
</summary>
@@ -58425,7 +58512,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_write_sysfs" lineno="4602">
+<interface name="dev_write_sysfs" lineno="4620">
<summary>
Write to hardware state information.
</summary>
@@ -58442,7 +58529,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_rw_sysfs" lineno="4621">
+<interface name="dev_rw_sysfs" lineno="4639">
<summary>
Allow caller to modify hardware state information.
</summary>
@@ -58452,7 +58539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_sysfs_files" lineno="4642">
+<interface name="dev_create_sysfs_files" lineno="4660">
<summary>
Add a sysfs file
</summary>
@@ -58462,7 +58549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4660">
+<interface name="dev_relabel_sysfs_dirs" lineno="4678">
<summary>
Relabel hardware state directories.
</summary>
@@ -58472,7 +58559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_all_sysfs" lineno="4678">
+<interface name="dev_relabel_all_sysfs" lineno="4696">
<summary>
Relabel from/to all sysfs types.
</summary>
@@ -58482,7 +58569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_all_sysfs" lineno="4698">
+<interface name="dev_setattr_all_sysfs" lineno="4716">
<summary>
Set the attributes of sysfs files, directories and symlinks.
</summary>
@@ -58492,7 +58579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_tpm" lineno="4718">
+<interface name="dev_rw_tpm" lineno="4736">
<summary>
Read and write the TPM device.
</summary>
@@ -58502,7 +58589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_urand" lineno="4759">
+<interface name="dev_read_urand" lineno="4777">
<summary>
Read from pseudo random number generator devices (e.g., /dev/urandom).
</summary>
@@ -58535,7 +58622,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_urand" lineno="4778">
+<interface name="dev_dontaudit_read_urand" lineno="4796">
<summary>
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
@@ -58546,7 +58633,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_urand" lineno="4797">
+<interface name="dev_write_urand" lineno="4815">
<summary>
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
@@ -58557,7 +58644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_urand_dev" lineno="4815">
+<interface name="dev_create_urand_dev" lineno="4833">
<summary>
Create the urandom device (/dev/urandom).
</summary>
@@ -58567,7 +58654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_urand_dev" lineno="4833">
+<interface name="dev_setattr_urand_dev" lineno="4851">
<summary>
Set attributes on the urandom device (/dev/urandom).
</summary>
@@ -58577,7 +58664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4851">
+<interface name="dev_getattr_generic_usb_dev" lineno="4869">
<summary>
Getattr generic the USB devices.
</summary>
@@ -58587,7 +58674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4869">
+<interface name="dev_setattr_generic_usb_dev" lineno="4887">
<summary>
Setattr generic the USB devices.
</summary>
@@ -58597,7 +58684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_usb_dev" lineno="4887">
+<interface name="dev_read_generic_usb_dev" lineno="4905">
<summary>
Read generic the USB devices.
</summary>
@@ -58607,7 +58694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4905">
+<interface name="dev_rw_generic_usb_dev" lineno="4923">
<summary>
Read and write generic the USB devices.
</summary>
@@ -58617,7 +58704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4923">
+<interface name="dev_relabel_generic_usb_dev" lineno="4941">
<summary>
Relabel generic the USB devices.
</summary>
@@ -58627,7 +58714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbmon_dev" lineno="4941">
+<interface name="dev_read_usbmon_dev" lineno="4959">
<summary>
Read USB monitor devices.
</summary>
@@ -58637,7 +58724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_usbmon_dev" lineno="4959">
+<interface name="dev_write_usbmon_dev" lineno="4977">
<summary>
Write USB monitor devices.
</summary>
@@ -58647,7 +58734,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_usbfs" lineno="4977">
+<interface name="dev_mount_usbfs" lineno="4995">
<summary>
Mount a usbfs filesystem.
</summary>
@@ -58657,7 +58744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_associate_usbfs" lineno="4995">
+<interface name="dev_associate_usbfs" lineno="5013">
<summary>
Associate a file to a usbfs filesystem.
</summary>
@@ -58667,7 +58754,7 @@ The type of the file to be associated to usbfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="5013">
+<interface name="dev_getattr_usbfs_dirs" lineno="5031">
<summary>
Get the attributes of a directory in the usb filesystem.
</summary>
@@ -58677,7 +58764,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5032">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5050">
<summary>
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
@@ -58688,7 +58775,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_search_usbfs" lineno="5050">
+<interface name="dev_search_usbfs" lineno="5068">
<summary>
Search the directory containing USB hardware information.
</summary>
@@ -58698,7 +58785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_list_usbfs" lineno="5068">
+<interface name="dev_list_usbfs" lineno="5086">
<summary>
Allow caller to get a list of usb hardware.
</summary>
@@ -58708,7 +58795,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_usbfs_files" lineno="5089">
+<interface name="dev_setattr_usbfs_files" lineno="5107">
<summary>
Set the attributes of usbfs filesystem.
</summary>
@@ -58718,7 +58805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbfs" lineno="5109">
+<interface name="dev_read_usbfs" lineno="5127">
<summary>
Read USB hardware information using
the usbfs filesystem interface.
@@ -58729,7 +58816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_usbfs" lineno="5129">
+<interface name="dev_rw_usbfs" lineno="5147">
<summary>
Allow caller to modify usb hardware configuration files.
</summary>
@@ -58739,7 +58826,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_video_dev" lineno="5149">
+<interface name="dev_getattr_video_dev" lineno="5167">
<summary>
Get the attributes of video4linux devices.
</summary>
@@ -58749,7 +58836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_userio_dev" lineno="5167">
+<interface name="dev_rw_userio_dev" lineno="5185">
<summary>
Read and write userio device.
</summary>
@@ -58759,7 +58846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="5186">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5204">
<summary>
Do not audit attempts to get the attributes
of video4linux device nodes.
@@ -58770,7 +58857,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_video_dev" lineno="5204">
+<interface name="dev_setattr_video_dev" lineno="5222">
<summary>
Set the attributes of video4linux device nodes.
</summary>
@@ -58780,7 +58867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="5223">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5241">
<summary>
Do not audit attempts to set the attributes
of video4linux device nodes.
@@ -58791,7 +58878,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_video_dev" lineno="5241">
+<interface name="dev_read_video_dev" lineno="5259">
<summary>
Read the video4linux devices.
</summary>
@@ -58801,7 +58888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_video_dev" lineno="5259">
+<interface name="dev_write_video_dev" lineno="5277">
<summary>
Write the video4linux devices.
</summary>
@@ -58811,7 +58898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vfio_dev" lineno="5277">
+<interface name="dev_rw_vfio_dev" lineno="5295">
<summary>
Read and write vfio devices.
</summary>
@@ -58821,7 +58908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="5295">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5313">
<summary>
Relabel vfio devices.
</summary>
@@ -58831,7 +58918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vhost" lineno="5313">
+<interface name="dev_rw_vhost" lineno="5331">
<summary>
Allow read/write the vhost devices
</summary>
@@ -58841,7 +58928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vmware" lineno="5331">
+<interface name="dev_rw_vmware" lineno="5349">
<summary>
Read and write VMWare devices.
</summary>
@@ -58851,7 +58938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_vmware" lineno="5349">
+<interface name="dev_rwx_vmware" lineno="5367">
<summary>
Read, write, and mmap VMWare devices.
</summary>
@@ -58861,7 +58948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_watchdog" lineno="5368">
+<interface name="dev_read_watchdog" lineno="5386">
<summary>
Read from watchdog devices.
</summary>
@@ -58871,7 +58958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_watchdog" lineno="5386">
+<interface name="dev_write_watchdog" lineno="5404">
<summary>
Write to watchdog devices.
</summary>
@@ -58881,7 +58968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_wireless" lineno="5404">
+<interface name="dev_read_wireless" lineno="5422">
<summary>
Read the wireless device.
</summary>
@@ -58891,7 +58978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_wireless" lineno="5422">
+<interface name="dev_rw_wireless" lineno="5440">
<summary>
Read and write the the wireless device.
</summary>
@@ -58901,7 +58988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_wireless" lineno="5440">
+<interface name="dev_manage_wireless" lineno="5458">
<summary>
manage the wireless device.
</summary>
@@ -58911,7 +58998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xen" lineno="5458">
+<interface name="dev_rw_xen" lineno="5476">
<summary>
Read and write Xen devices.
</summary>
@@ -58921,7 +59008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_xen" lineno="5477">
+<interface name="dev_manage_xen" lineno="5495">
<summary>
Create, read, write, and delete Xen devices.
</summary>
@@ -58931,7 +59018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_xen" lineno="5501">
+<interface name="dev_filetrans_xen" lineno="5519">
<summary>
Automatic type transition to the type
for xen device nodes when created in /dev.
@@ -58947,7 +59034,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5519">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5537">
<summary>
Get the attributes of X server miscellaneous devices.
</summary>
@@ -58957,7 +59044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5537">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5555">
<summary>
Set the attributes of X server miscellaneous devices.
</summary>
@@ -58967,7 +59054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xserver_misc" lineno="5555">
+<interface name="dev_rw_xserver_misc" lineno="5573">
<summary>
Read and write X server miscellaneous devices.
</summary>
@@ -58977,7 +59064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_map_xserver_misc" lineno="5573">
+<interface name="dev_map_xserver_misc" lineno="5591">
<summary>
Map X server miscellaneous devices.
</summary>
@@ -58987,7 +59074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_zero" lineno="5591">
+<interface name="dev_rw_zero" lineno="5609">
<summary>
Read and write to the zero device (/dev/zero).
</summary>
@@ -58997,7 +59084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_zero" lineno="5609">
+<interface name="dev_rwx_zero" lineno="5627">
<summary>
Read, write, and execute the zero device (/dev/zero).
</summary>
@@ -59007,7 +59094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_execmod_zero" lineno="5628">
+<interface name="dev_execmod_zero" lineno="5646">
<summary>
Execmod the zero device (/dev/zero).
</summary>
@@ -59017,7 +59104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_zero_dev" lineno="5647">
+<interface name="dev_create_zero_dev" lineno="5665">
<summary>
Create the zero device (/dev/zero).
</summary>
@@ -59027,7 +59114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_cpu_online" lineno="5670">
+<interface name="dev_read_cpu_online" lineno="5688">
<summary>
Read cpu online hardware state information
</summary>
@@ -59042,7 +59129,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_unconfined" lineno="5690">
+<interface name="dev_rw_gpiochip" lineno="5708">
+<summary>
+Read and write to the gpiochip device, /dev/gpiochip[0-9]
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_unconfined" lineno="5726">
<summary>
Unconfined access to devices.
</summary>
@@ -59052,7 +59149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_cpu_online" lineno="5710">
+<interface name="dev_relabel_cpu_online" lineno="5746">
<summary>
Relabel cpu online hardware state information.
</summary>
@@ -59062,7 +59159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5729">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5765">
<summary>
Dont audit attempts to read usbmon devices
</summary>
@@ -60339,7 +60436,17 @@ The type to be transformed.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_dirs" lineno="447">
+<interface name="files_dontaudit_getattr_all_tmpfs_files" lineno="447">
+<summary>
+dontaudit getattr on tmpfs files
+</summary>
+<param name="domain">
+<summary>
+Domain to not have stat on tmpfs files audited
+</summary>
+</param>
+</interface>
+<interface name="files_getattr_all_dirs" lineno="465">
<summary>
Get the attributes of all directories.
</summary>
@@ -60349,7 +60456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
+<interface name="files_dontaudit_getattr_all_dirs" lineno="484">
<summary>
Do not audit attempts to get the attributes
of all directories.
@@ -60360,7 +60467,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_non_security" lineno="484">
+<interface name="files_list_non_security" lineno="502">
<summary>
List all non-security directories.
</summary>
@@ -60370,7 +60477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_non_security" lineno="503">
+<interface name="files_dontaudit_list_non_security" lineno="521">
<summary>
Do not audit attempts to list all
non-security directories.
@@ -60381,7 +60488,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_non_security" lineno="522">
+<interface name="files_mounton_non_security" lineno="540">
<summary>
Mount a filesystem on all non-security
directories and files.
@@ -60392,7 +60499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_non_security_dirs" lineno="541">
+<interface name="files_write_non_security_dirs" lineno="559">
<summary>
Allow attempts to modify any directory
</summary>
@@ -60402,7 +60509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_dirs" lineno="559">
+<interface name="files_manage_non_security_dirs" lineno="577">
<summary>
Allow attempts to manage non-security directories
</summary>
@@ -60412,7 +60519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_non_security_dirs" lineno="577">
+<interface name="files_create_non_security_dirs" lineno="595">
<summary>
Create non-security directories.
</summary>
@@ -60422,7 +60529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_non_security_dirs" lineno="595">
+<interface name="files_relabel_non_security_dirs" lineno="613">
<summary>
Relabel from/to non-security directories.
</summary>
@@ -60432,7 +60539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_files" lineno="613">
+<interface name="files_getattr_all_files" lineno="631">
<summary>
Get the attributes of all files.
</summary>
@@ -60442,7 +60549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_files" lineno="633">
+<interface name="files_dontaudit_getattr_all_files" lineno="651">
<summary>
Do not audit attempts to get the attributes
of all files.
@@ -60453,7 +60560,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_files" lineno="652">
+<interface name="files_dontaudit_getattr_non_security_files" lineno="670">
<summary>
Do not audit attempts to get the attributes
of non security files.
@@ -60464,7 +60571,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_files" lineno="671">
+<interface name="files_manage_non_security_files" lineno="689">
<summary>
Create, read, write, and delete all non-security files.
</summary>
@@ -60475,7 +60582,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_security_files" lineno="690">
+<interface name="files_relabel_non_security_files" lineno="708">
<summary>
Relabel from/to all non-security files.
</summary>
@@ -60486,7 +60593,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_files" lineno="708">
+<interface name="files_read_all_files" lineno="726">
<summary>
Read all files.
</summary>
@@ -60496,7 +60603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_execmod_all_files" lineno="739">
+<interface name="files_execmod_all_files" lineno="757">
<summary>
Allow shared library text relocations in all files.
</summary>
@@ -60514,7 +60621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_security_files" lineno="758">
+<interface name="files_read_non_security_files" lineno="776">
<summary>
Read all non-security files.
</summary>
@@ -60525,7 +60632,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_write_non_security_files" lineno="778">
+<interface name="files_write_non_security_files" lineno="796">
<summary>
Write all non-security files.
</summary>
@@ -60536,7 +60643,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_create_non_security_files" lineno="798">
+<interface name="files_create_non_security_files" lineno="816">
<summary>
Create all non-security files.
</summary>
@@ -60547,7 +60654,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_dirs_except" lineno="824">
+<interface name="files_read_all_dirs_except" lineno="842">
<summary>
Read all directories on the filesystem, except
the listed exceptions.
@@ -60564,7 +60671,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_files_except" lineno="849">
+<interface name="files_read_all_files_except" lineno="867">
<summary>
Read all files on the filesystem, except
the listed exceptions.
@@ -60581,7 +60688,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks_except" lineno="874">
+<interface name="files_read_all_symlinks_except" lineno="892">
<summary>
Read all symbolic links on the filesystem, except
the listed exceptions.
@@ -60598,7 +60705,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_symlinks" lineno="892">
+<interface name="files_getattr_all_symlinks" lineno="910">
<summary>
Get the attributes of all symbolic links.
</summary>
@@ -60608,7 +60715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_symlinks" lineno="911">
+<interface name="files_dontaudit_getattr_all_symlinks" lineno="929">
<summary>
Do not audit attempts to get the attributes
of all symbolic links.
@@ -60619,7 +60726,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_all_symlinks" lineno="929">
+<interface name="files_dontaudit_read_all_symlinks" lineno="947">
<summary>
Do not audit attempts to read all symbolic links.
</summary>
@@ -60629,7 +60736,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="948">
+<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="966">
<summary>
Do not audit attempts to get the attributes
of non security symbolic links.
@@ -60640,7 +60747,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="967">
+<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="985">
<summary>
Do not audit attempts to get the attributes
of non security block devices.
@@ -60651,7 +60758,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="986">
+<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="1004">
<summary>
Do not audit attempts to get the attributes
of non security character devices.
@@ -60662,7 +60769,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks" lineno="1005">
+<interface name="files_read_all_symlinks" lineno="1023">
<summary>
Read all symbolic links.
</summary>
@@ -60673,7 +60780,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_all_pipes" lineno="1024">
+<interface name="files_getattr_all_pipes" lineno="1042">
<summary>
Get the attributes of all named pipes.
</summary>
@@ -60683,7 +60790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pipes" lineno="1044">
+<interface name="files_dontaudit_getattr_all_pipes" lineno="1062">
<summary>
Do not audit attempts to get the attributes
of all named pipes.
@@ -60694,7 +60801,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1063">
+<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1081">
<summary>
Do not audit attempts to get the attributes
of non security named pipes.
@@ -60705,7 +60812,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_sockets" lineno="1081">
+<interface name="files_getattr_all_sockets" lineno="1099">
<summary>
Get the attributes of all named sockets.
</summary>
@@ -60715,7 +60822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_sockets" lineno="1101">
+<interface name="files_dontaudit_getattr_all_sockets" lineno="1119">
<summary>
Do not audit attempts to get the attributes
of all named sockets.
@@ -60726,7 +60833,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1120">
+<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1138">
<summary>
Do not audit attempts to get the attributes
of non security named sockets.
@@ -60737,7 +60844,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_blk_files" lineno="1138">
+<interface name="files_read_all_blk_files" lineno="1156">
<summary>
Read all block nodes with file types.
</summary>
@@ -60747,7 +60854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_chr_files" lineno="1156">
+<interface name="files_read_all_chr_files" lineno="1174">
<summary>
Read all character nodes with file types.
</summary>
@@ -60757,7 +60864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_files" lineno="1182">
+<interface name="files_relabel_all_files" lineno="1200">
<summary>
Relabel all files on the filesystem, except
the listed exceptions.
@@ -60775,7 +60882,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_rw_all_files" lineno="1220">
+<interface name="files_rw_all_files" lineno="1238">
<summary>
rw all files on the filesystem, except
the listed exceptions.
@@ -60793,7 +60900,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_files" lineno="1246">
+<interface name="files_manage_all_files" lineno="1264">
<summary>
Manage all files on the filesystem, except
the listed exceptions.
@@ -60811,7 +60918,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_search_all" lineno="1269">
+<interface name="files_search_all" lineno="1287">
<summary>
Search the contents of all directories on
extended attribute filesystems.
@@ -60822,7 +60929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all" lineno="1288">
+<interface name="files_list_all" lineno="1306">
<summary>
List the contents of all directories on
extended attribute filesystems.
@@ -60833,7 +60940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_files_as" lineno="1306">
+<interface name="files_create_all_files_as" lineno="1324">
<summary>
Create all files as is.
</summary>
@@ -60843,7 +60950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1326">
+<interface name="files_dontaudit_search_all_dirs" lineno="1344">
<summary>
Do not audit attempts to search the
contents of any directories on extended
@@ -60855,7 +60962,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1349">
+<interface name="files_getattr_all_file_type_fs" lineno="1367">
<summary>
Get the attributes of all filesystems
with the type of a file.
@@ -60866,7 +60973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1367">
+<interface name="files_relabelto_all_file_type_fs" lineno="1385">
<summary>
Relabel a filesystem to the type of a file.
</summary>
@@ -60876,7 +60983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1385">
+<interface name="files_relabel_all_file_type_fs" lineno="1403">
<summary>
Relabel a filesystem to and from the type of a file.
</summary>
@@ -60886,7 +60993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mount_all_file_type_fs" lineno="1403">
+<interface name="files_mount_all_file_type_fs" lineno="1421">
<summary>
Mount all filesystems with the type of a file.
</summary>
@@ -60896,7 +61003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1421">
+<interface name="files_unmount_all_file_type_fs" lineno="1439">
<summary>
Unmount all filesystems with the type of a file.
</summary>
@@ -60906,7 +61013,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_non_auth_dirs" lineno="1440">
+<interface name="files_watch_all_dirs" lineno="1457">
+<summary>
+watch all directories of file_type
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_list_non_auth_dirs" lineno="1477">
<summary>
Read all non-authentication related
directories.
@@ -60917,7 +61034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_files" lineno="1459">
+<interface name="files_read_non_auth_files" lineno="1496">
<summary>
Read all non-authentication related
files.
@@ -60928,7 +61045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_symlinks" lineno="1478">
+<interface name="files_read_non_auth_symlinks" lineno="1515">
<summary>
Read all non-authentication related
symbolic links.
@@ -60939,7 +61056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_non_auth_files" lineno="1496">
+<interface name="files_rw_non_auth_files" lineno="1533">
<summary>
rw non-authentication related files.
</summary>
@@ -60949,7 +61066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_auth_files" lineno="1516">
+<interface name="files_manage_non_auth_files" lineno="1553">
<summary>
Manage non-authentication related
files.
@@ -60961,7 +61078,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_map_non_auth_files" lineno="1540">
+<interface name="files_map_non_auth_files" lineno="1577">
<summary>
Mmap non-authentication related
files.
@@ -60973,7 +61090,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_auth_files" lineno="1560">
+<interface name="files_relabel_non_auth_files" lineno="1597">
<summary>
Relabel all non-authentication related
files.
@@ -60985,7 +61102,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_config_dirs" lineno="1593">
+<interface name="files_manage_config_dirs" lineno="1630">
<summary>
Manage all configuration directories on filesystem
</summary>
@@ -60996,7 +61113,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_dirs" lineno="1612">
+<interface name="files_relabel_config_dirs" lineno="1649">
<summary>
Relabel configuration directories
</summary>
@@ -61007,7 +61124,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_dontaudit_relabel_config_dirs" lineno="1631">
+<interface name="files_dontaudit_relabel_config_dirs" lineno="1668">
<summary>
Do not audit attempts to relabel configuration directories
</summary>
@@ -61018,7 +61135,7 @@ Domain not to audit.
</param>
</interface>
-<interface name="files_read_config_files" lineno="1649">
+<interface name="files_read_config_files" lineno="1686">
<summary>
Read config files in /etc.
</summary>
@@ -61028,7 +61145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_config_files" lineno="1670">
+<interface name="files_manage_config_files" lineno="1707">
<summary>
Manage all configuration files on filesystem
</summary>
@@ -61039,7 +61156,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_files" lineno="1689">
+<interface name="files_relabel_config_files" lineno="1726">
<summary>
Relabel configuration files
</summary>
@@ -61050,7 +61167,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_dontaudit_relabel_config_files" lineno="1708">
+<interface name="files_dontaudit_relabel_config_files" lineno="1745">
<summary>
Do not audit attempts to relabel configuration files
</summary>
@@ -61061,7 +61178,7 @@ Domain not to audit.
</param>
</interface>
-<interface name="files_relabel_config_symlinks" lineno="1727">
+<interface name="files_relabel_config_symlinks" lineno="1764">
<summary>
Relabel configuration symlinks.
</summary>
@@ -61072,7 +61189,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_mounton_all_mountpoints" lineno="1745">
+<interface name="files_mounton_all_mountpoints" lineno="1782">
<summary>
Mount a filesystem on all mount points.
</summary>
@@ -61082,7 +61199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_mountpoints" lineno="1766">
+<interface name="files_getattr_all_mountpoints" lineno="1803">
<summary>
Get the attributes of all mount points.
</summary>
@@ -61092,7 +61209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_mountpoints" lineno="1784">
+<interface name="files_setattr_all_mountpoints" lineno="1821">
<summary>
Set the attributes of all mount points.
</summary>
@@ -61102,7 +61219,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1802">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1839">
<summary>
Do not audit attempts to set the attributes on all mount points.
</summary>
@@ -61112,7 +61229,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_all_mountpoints" lineno="1820">
+<interface name="files_search_all_mountpoints" lineno="1857">
<summary>
Search all mount points.
</summary>
@@ -61122,7 +61239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1838">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1875">
<summary>
Do not audit searching of all mount points.
</summary>
@@ -61132,7 +61249,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_all_mountpoints" lineno="1856">
+<interface name="files_list_all_mountpoints" lineno="1893">
<summary>
List all mount points.
</summary>
@@ -61142,7 +61259,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1874">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1911">
<summary>
Do not audit listing of all mount points.
</summary>
@@ -61152,7 +61269,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_watch_all_mountpoints" lineno="1892">
+<interface name="files_watch_all_mountpoints" lineno="1929">
<summary>
Watch all mountpoints.
</summary>
@@ -61162,7 +61279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_all_mount_perm" lineno="1910">
+<interface name="files_watch_all_mount_perm" lineno="1947">
<summary>
Watch all mountpoints.
</summary>
@@ -61172,7 +61289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_all_mountpoints" lineno="1928">
+<interface name="files_write_all_mountpoints" lineno="1965">
<summary>
Check if all mountpoints are writable.
</summary>
@@ -61182,7 +61299,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1946">
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1983">
<summary>
Do not audit attempts to write to mount points.
</summary>
@@ -61192,7 +61309,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_root" lineno="1964">
+<interface name="files_list_root" lineno="2001">
<summary>
List the contents of the root directory.
</summary>
@@ -61202,7 +61319,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_symlinks" lineno="1984">
+<interface name="files_delete_root_symlinks" lineno="2021">
<summary>
Delete symbolic links in the
root directory.
@@ -61213,7 +61330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="2002">
+<interface name="files_dontaudit_write_root_dirs" lineno="2039">
<summary>
Do not audit attempts to write to / dirs.
</summary>
@@ -61223,7 +61340,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="2021">
+<interface name="files_dontaudit_rw_root_dir" lineno="2058">
<summary>
Do not audit attempts to write
files in the root directory.
@@ -61234,7 +61351,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_watch_root_dirs" lineno="2039">
+<interface name="files_watch_root_dirs" lineno="2076">
<summary>
Watch the root directory.
</summary>
@@ -61244,7 +61361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_root_filetrans" lineno="2073">
+<interface name="files_root_filetrans" lineno="2110">
<summary>
Create an object in the root directory, with a private
type using a type transition.
@@ -61270,7 +61387,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_root_files" lineno="2092">
+<interface name="files_dontaudit_read_root_files" lineno="2129">
<summary>
Do not audit attempts to read files in
the root directory.
@@ -61281,7 +61398,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_files" lineno="2111">
+<interface name="files_dontaudit_rw_root_files" lineno="2148">
<summary>
Do not audit attempts to read or write
files in the root directory.
@@ -61292,7 +61409,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="2130">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2167">
<summary>
Do not audit attempts to read or write
character device nodes in the root directory.
@@ -61303,7 +61420,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_root_chr_files" lineno="2149">
+<interface name="files_delete_root_chr_files" lineno="2186">
<summary>
Delete character device nodes in
the root directory.
@@ -61314,7 +61431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_files" lineno="2167">
+<interface name="files_delete_root_files" lineno="2204">
<summary>
Delete files in the root directory.
</summary>
@@ -61324,7 +61441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_root_files" lineno="2185">
+<interface name="files_exec_root_files" lineno="2222">
<summary>
Execute files in the root directory.
</summary>
@@ -61334,7 +61451,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_dir_entry" lineno="2203">
+<interface name="files_delete_root_dir_entry" lineno="2240">
<summary>
Remove entries from the root directory.
</summary>
@@ -61344,7 +61461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_root_dir" lineno="2221">
+<interface name="files_manage_root_dir" lineno="2258">
<summary>
Manage the root directory.
</summary>
@@ -61354,7 +61471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_rootfs" lineno="2240">
+<interface name="files_getattr_rootfs" lineno="2277">
<summary>
Get the attributes of a rootfs
file system.
@@ -61365,7 +61482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_rootfs" lineno="2258">
+<interface name="files_associate_rootfs" lineno="2295">
<summary>
Associate to root file system.
</summary>
@@ -61375,7 +61492,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_relabel_rootfs" lineno="2276">
+<interface name="files_relabel_rootfs" lineno="2313">
<summary>
Relabel to and from rootfs file system.
</summary>
@@ -61385,7 +61502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_rootfs" lineno="2294">
+<interface name="files_unmount_rootfs" lineno="2331">
<summary>
Unmount a rootfs filesystem.
</summary>
@@ -61395,7 +61512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_root" lineno="2312">
+<interface name="files_mounton_root" lineno="2349">
<summary>
Mount on the root directory (/)
</summary>
@@ -61405,7 +61522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_fs" lineno="2331">
+<interface name="files_getattr_boot_fs" lineno="2368">
<summary>
Get the attributes of a filesystem
mounted on /boot.
@@ -61416,7 +61533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_remount_boot" lineno="2349">
+<interface name="files_remount_boot" lineno="2386">
<summary>
Remount a filesystem mounted on /boot.
</summary>
@@ -61426,7 +61543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_dirs" lineno="2367">
+<interface name="files_getattr_boot_dirs" lineno="2404">
<summary>
Get attributes of the /boot directory.
</summary>
@@ -61436,7 +61553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2386">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2423">
<summary>
Do not audit attempts to get attributes
of the /boot directory.
@@ -61447,7 +61564,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_boot" lineno="2404">
+<interface name="files_search_boot" lineno="2441">
<summary>
Search the /boot directory.
</summary>
@@ -61457,7 +61574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_boot" lineno="2422">
+<interface name="files_dontaudit_search_boot" lineno="2459">
<summary>
Do not audit attempts to search the /boot directory.
</summary>
@@ -61467,7 +61584,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_boot" lineno="2440">
+<interface name="files_list_boot" lineno="2477">
<summary>
List the /boot directory.
</summary>
@@ -61477,7 +61594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_boot" lineno="2458">
+<interface name="files_dontaudit_list_boot" lineno="2495">
<summary>
Do not audit attempts to list the /boot directory.
</summary>
@@ -61487,7 +61604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_boot_dirs" lineno="2476">
+<interface name="files_create_boot_dirs" lineno="2513">
<summary>
Create directories in /boot
</summary>
@@ -61497,7 +61614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_dirs" lineno="2495">
+<interface name="files_manage_boot_dirs" lineno="2532">
<summary>
Create, read, write, and delete
directories in /boot.
@@ -61508,7 +61625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_boot_filetrans" lineno="2529">
+<interface name="files_boot_filetrans" lineno="2566">
<summary>
Create a private type object in boot
with an automatic type transition
@@ -61534,7 +61651,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_boot_files" lineno="2548">
+<interface name="files_read_boot_files" lineno="2585">
<summary>
read files in the /boot directory.
</summary>
@@ -61545,7 +61662,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_boot_files" lineno="2568">
+<interface name="files_manage_boot_files" lineno="2605">
<summary>
Create, read, write, and delete files
in the /boot directory.
@@ -61557,7 +61674,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelfrom_boot_files" lineno="2586">
+<interface name="files_relabelfrom_boot_files" lineno="2623">
<summary>
Relabel from files in the /boot directory.
</summary>
@@ -61567,7 +61684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_boot_symlinks" lineno="2604">
+<interface name="files_read_boot_symlinks" lineno="2641">
<summary>
Read symbolic links in the /boot directory.
</summary>
@@ -61577,7 +61694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_boot_symlinks" lineno="2623">
+<interface name="files_rw_boot_symlinks" lineno="2660">
<summary>
Read and write symbolic links
in the /boot directory.
@@ -61588,7 +61705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_symlinks" lineno="2643">
+<interface name="files_manage_boot_symlinks" lineno="2680">
<summary>
Create, read, write, and delete symbolic links
in the /boot directory.
@@ -61599,7 +61716,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_img" lineno="2661">
+<interface name="files_read_kernel_img" lineno="2698">
<summary>
Read kernel files in the /boot directory.
</summary>
@@ -61609,7 +61726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_img" lineno="2682">
+<interface name="files_create_kernel_img" lineno="2719">
<summary>
Install a kernel into the /boot directory.
</summary>
@@ -61620,7 +61737,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_kernel" lineno="2702">
+<interface name="files_delete_kernel" lineno="2739">
<summary>
Delete a kernel from /boot.
</summary>
@@ -61631,7 +61748,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_default_dirs" lineno="2720">
+<interface name="files_getattr_default_dirs" lineno="2757">
<summary>
Getattr of directories with the default file type.
</summary>
@@ -61641,7 +61758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2739">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2776">
<summary>
Do not audit attempts to get the attributes of
directories with the default file type.
@@ -61652,7 +61769,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_default" lineno="2757">
+<interface name="files_search_default" lineno="2794">
<summary>
Search the contents of directories with the default file type.
</summary>
@@ -61662,7 +61779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_default" lineno="2775">
+<interface name="files_list_default" lineno="2812">
<summary>
List contents of directories with the default file type.
</summary>
@@ -61672,7 +61789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_default" lineno="2794">
+<interface name="files_dontaudit_list_default" lineno="2831">
<summary>
Do not audit attempts to list contents of
directories with the default file type.
@@ -61683,7 +61800,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_dirs" lineno="2813">
+<interface name="files_manage_default_dirs" lineno="2850">
<summary>
Create, read, write, and delete directories with
the default file type.
@@ -61694,7 +61811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_default" lineno="2831">
+<interface name="files_mounton_default" lineno="2868">
<summary>
Mount a filesystem on a directory with the default file type.
</summary>
@@ -61704,7 +61821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2850">
+<interface name="files_dontaudit_getattr_default_files" lineno="2887">
<summary>
Do not audit attempts to get the attributes of
files with the default file type.
@@ -61715,7 +61832,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_default_files" lineno="2868">
+<interface name="files_read_default_files" lineno="2905">
<summary>
Read files with the default file type.
</summary>
@@ -61725,7 +61842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_default_files" lineno="2887">
+<interface name="files_dontaudit_read_default_files" lineno="2924">
<summary>
Do not audit attempts to read files
with the default file type.
@@ -61736,7 +61853,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_files" lineno="2906">
+<interface name="files_manage_default_files" lineno="2943">
<summary>
Create, read, write, and delete files with
the default file type.
@@ -61747,7 +61864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_symlinks" lineno="2924">
+<interface name="files_read_default_symlinks" lineno="2961">
<summary>
Read symbolic links with the default file type.
</summary>
@@ -61757,7 +61874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_sockets" lineno="2942">
+<interface name="files_read_default_sockets" lineno="2979">
<summary>
Read sockets with the default file type.
</summary>
@@ -61767,7 +61884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_pipes" lineno="2960">
+<interface name="files_read_default_pipes" lineno="2997">
<summary>
Read named pipes with the default file type.
</summary>
@@ -61777,7 +61894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_etc" lineno="2978">
+<interface name="files_search_etc" lineno="3015">
<summary>
Search the contents of /etc directories.
</summary>
@@ -61787,7 +61904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_etc_dirs" lineno="2996">
+<interface name="files_setattr_etc_dirs" lineno="3033">
<summary>
Set the attributes of the /etc directories.
</summary>
@@ -61797,7 +61914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_etc" lineno="3014">
+<interface name="files_list_etc" lineno="3051">
<summary>
List the contents of /etc directories.
</summary>
@@ -61807,7 +61924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="3032">
+<interface name="files_dontaudit_write_etc_dirs" lineno="3069">
<summary>
Do not audit attempts to write to /etc dirs.
</summary>
@@ -61817,7 +61934,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_dirs" lineno="3050">
+<interface name="files_rw_etc_dirs" lineno="3087">
<summary>
Add and remove entries from /etc directories.
</summary>
@@ -61827,7 +61944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_dirs" lineno="3069">
+<interface name="files_manage_etc_dirs" lineno="3106">
<summary>
Manage generic directories in /etc
</summary>
@@ -61838,7 +61955,7 @@ Domain allowed access
</param>
</interface>
-<interface name="files_relabelto_etc_dirs" lineno="3087">
+<interface name="files_relabelto_etc_dirs" lineno="3124">
<summary>
Relabel directories to etc_t.
</summary>
@@ -61848,7 +61965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_dirs" lineno="3106">
+<interface name="files_mounton_etc_dirs" lineno="3143">
<summary>
Mount a filesystem on the
etc directories.
@@ -61859,7 +61976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_remount_etc" lineno="3124">
+<interface name="files_remount_etc" lineno="3161">
<summary>
Remount etc filesystems.
</summary>
@@ -61869,7 +61986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_dirs" lineno="3142">
+<interface name="files_watch_etc_dirs" lineno="3179">
<summary>
Watch /etc directories
</summary>
@@ -61879,7 +61996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_files" lineno="3194">
+<interface name="files_read_etc_files" lineno="3231">
<summary>
Read generic files in /etc.
</summary>
@@ -61923,7 +62040,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_map_etc_files" lineno="3226">
+<interface name="files_map_etc_files" lineno="3263">
<summary>
Map generic files in /etc.
</summary>
@@ -61945,7 +62062,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3244">
+<interface name="files_dontaudit_write_etc_files" lineno="3281">
<summary>
Do not audit attempts to write generic files in /etc.
</summary>
@@ -61955,7 +62072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_files" lineno="3263">
+<interface name="files_rw_etc_files" lineno="3300">
<summary>
Read and write generic files in /etc.
</summary>
@@ -61966,7 +62083,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_files" lineno="3285">
+<interface name="files_manage_etc_files" lineno="3322">
<summary>
Create, read, write, and delete generic
files in /etc.
@@ -61978,7 +62095,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_manage_etc_files" lineno="3306">
+<interface name="files_dontaudit_manage_etc_files" lineno="3343">
<summary>
Do not audit attempts to create, read, write,
and delete generic files in /etc.
@@ -61990,7 +62107,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_etc_files" lineno="3324">
+<interface name="files_delete_etc_files" lineno="3361">
<summary>
Delete system configuration files in /etc.
</summary>
@@ -62000,7 +62117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_etc_files" lineno="3342">
+<interface name="files_exec_etc_files" lineno="3379">
<summary>
Execute generic files in /etc.
</summary>
@@ -62010,7 +62127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_files" lineno="3362">
+<interface name="files_watch_etc_files" lineno="3399">
<summary>
Watch /etc files.
</summary>
@@ -62020,7 +62137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_get_etc_unit_status" lineno="3380">
+<interface name="files_get_etc_unit_status" lineno="3417">
<summary>
Get etc_t service status.
</summary>
@@ -62030,7 +62147,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_start_etc_service" lineno="3399">
+<interface name="files_start_etc_service" lineno="3436">
<summary>
start etc_t service
</summary>
@@ -62040,7 +62157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_stop_etc_service" lineno="3418">
+<interface name="files_stop_etc_service" lineno="3455">
<summary>
stop etc_t service
</summary>
@@ -62050,7 +62167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_etc_files" lineno="3437">
+<interface name="files_relabel_etc_files" lineno="3474">
<summary>
Relabel from and to generic files in /etc.
</summary>
@@ -62060,7 +62177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_symlinks" lineno="3456">
+<interface name="files_read_etc_symlinks" lineno="3493">
<summary>
Read symbolic links in /etc.
</summary>
@@ -62070,7 +62187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_symlinks" lineno="3474">
+<interface name="files_watch_etc_symlinks" lineno="3511">
<summary>
Watch /etc symlinks
</summary>
@@ -62080,7 +62197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_symlinks" lineno="3492">
+<interface name="files_manage_etc_symlinks" lineno="3529">
<summary>
Create, read, write, and delete symbolic links in /etc.
</summary>
@@ -62090,7 +62207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans" lineno="3526">
+<interface name="files_etc_filetrans" lineno="3563">
<summary>
Create objects in /etc with a private
type using a type_transition.
@@ -62116,7 +62233,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_boot_flag" lineno="3556">
+<interface name="files_create_boot_flag" lineno="3593">
<summary>
Create a boot flag.
</summary>
@@ -62138,7 +62255,7 @@ The name of the object being created.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_boot_flag" lineno="3582">
+<interface name="files_delete_boot_flag" lineno="3619">
<summary>
Delete a boot flag.
</summary>
@@ -62155,7 +62272,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3601">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3638">
<summary>
Get the attributes of the
etc_runtime directories.
@@ -62166,7 +62283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3620">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3657">
<summary>
Mount a filesystem on the
etc_runtime directories.
@@ -62177,7 +62294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3638">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3675">
<summary>
Relabel to etc_runtime_t dirs.
</summary>
@@ -62187,7 +62304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3656">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3693">
<summary>
Do not audit attempts to set the attributes of the etc_runtime files
</summary>
@@ -62197,7 +62314,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime_files" lineno="3694">
+<interface name="files_read_etc_runtime_files" lineno="3731">
<summary>
Read files in /etc that are dynamically
created on boot, such as mtab.
@@ -62227,7 +62344,7 @@ Domain allowed access.
<infoflow type="read" weight="10" />
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3716">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3753">
<summary>
Do not audit attempts to read files
in /etc that are dynamically
@@ -62239,7 +62356,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3735">
+<interface name="files_dontaudit_read_etc_files" lineno="3772">
<summary>
Do not audit attempts to read files
in /etc
@@ -62250,7 +62367,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3754">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3791">
<summary>
Do not audit attempts to write
etc runtime files.
@@ -62261,7 +62378,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_runtime_files" lineno="3774">
+<interface name="files_rw_etc_runtime_files" lineno="3811">
<summary>
Read and write files in /etc that are dynamically
created on boot, such as mtab.
@@ -62273,7 +62390,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_runtime_files" lineno="3796">
+<interface name="files_manage_etc_runtime_files" lineno="3833">
<summary>
Create, read, write, and delete files in
/etc that are dynamically created on boot,
@@ -62286,7 +62403,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3814">
+<interface name="files_relabelto_etc_runtime_files" lineno="3851">
<summary>
Relabel to etc_runtime_t files.
</summary>
@@ -62296,7 +62413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3843">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3880">
<summary>
Create, etc runtime objects with an automatic
type transition.
@@ -62317,7 +62434,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_home_dir" lineno="3862">
+<interface name="files_getattr_home_dir" lineno="3899">
<summary>
Get the attributes of the home directories root
(/home).
@@ -62328,7 +62445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3883">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3920">
<summary>
Do not audit attempts to get the
attributes of the home directories root
@@ -62340,7 +62457,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_home" lineno="3902">
+<interface name="files_search_home" lineno="3939">
<summary>
Search home directories root (/home).
</summary>
@@ -62350,7 +62467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_home" lineno="3922">
+<interface name="files_dontaudit_search_home" lineno="3959">
<summary>
Do not audit attempts to search
home directories root (/home).
@@ -62361,7 +62478,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_home" lineno="3942">
+<interface name="files_dontaudit_list_home" lineno="3979">
<summary>
Do not audit attempts to list
home directories root (/home).
@@ -62372,7 +62489,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_home" lineno="3961">
+<interface name="files_list_home" lineno="3998">
<summary>
Get listing of home directories.
</summary>
@@ -62382,7 +62499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_home" lineno="3980">
+<interface name="files_relabelto_home" lineno="4017">
<summary>
Relabel to user home root (/home).
</summary>
@@ -62392,7 +62509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_home" lineno="3998">
+<interface name="files_relabelfrom_home" lineno="4035">
<summary>
Relabel from user home root (/home).
</summary>
@@ -62402,7 +62519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_home" lineno="4016">
+<interface name="files_watch_home" lineno="4053">
<summary>
Watch the user home root (/home).
</summary>
@@ -62412,7 +62529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_home_filetrans" lineno="4049">
+<interface name="files_home_filetrans" lineno="4086">
<summary>
Create objects in /home.
</summary>
@@ -62437,7 +62554,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_lost_found_dirs" lineno="4067">
+<interface name="files_getattr_lost_found_dirs" lineno="4104">
<summary>
Get the attributes of lost+found directories.
</summary>
@@ -62447,7 +62564,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4086">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4123">
<summary>
Do not audit attempts to get the attributes of
lost+found directories.
@@ -62458,7 +62575,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_lost_found" lineno="4104">
+<interface name="files_list_lost_found" lineno="4141">
<summary>
List the contents of lost+found directories.
</summary>
@@ -62468,7 +62585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_lost_found" lineno="4124">
+<interface name="files_manage_lost_found" lineno="4161">
<summary>
Create, read, write, and delete objects in
lost+found directories.
@@ -62480,7 +62597,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_search_mnt" lineno="4146">
+<interface name="files_search_mnt" lineno="4183">
<summary>
Search the contents of /mnt.
</summary>
@@ -62490,7 +62607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_mnt" lineno="4164">
+<interface name="files_dontaudit_search_mnt" lineno="4201">
<summary>
Do not audit attempts to search /mnt.
</summary>
@@ -62500,7 +62617,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_mnt" lineno="4182">
+<interface name="files_list_mnt" lineno="4219">
<summary>
List the contents of /mnt.
</summary>
@@ -62510,7 +62627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_mnt" lineno="4200">
+<interface name="files_dontaudit_list_mnt" lineno="4237">
<summary>
Do not audit attempts to list the contents of /mnt.
</summary>
@@ -62520,7 +62637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_mnt" lineno="4218">
+<interface name="files_mounton_mnt" lineno="4255">
<summary>
Mount a filesystem on /mnt.
</summary>
@@ -62530,7 +62647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_dirs" lineno="4237">
+<interface name="files_manage_mnt_dirs" lineno="4274">
<summary>
Create, read, write, and delete directories in /mnt.
</summary>
@@ -62541,7 +62658,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_mnt_files" lineno="4255">
+<interface name="files_manage_mnt_files" lineno="4292">
<summary>
Create, read, write, and delete files in /mnt.
</summary>
@@ -62551,7 +62668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_files" lineno="4273">
+<interface name="files_read_mnt_files" lineno="4310">
<summary>
read files in /mnt.
</summary>
@@ -62561,7 +62678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_symlinks" lineno="4291">
+<interface name="files_read_mnt_symlinks" lineno="4328">
<summary>
Read symbolic links in /mnt.
</summary>
@@ -62571,7 +62688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_symlinks" lineno="4309">
+<interface name="files_manage_mnt_symlinks" lineno="4346">
<summary>
Create, read, write, and delete symbolic links in /mnt.
</summary>
@@ -62581,7 +62698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_kernel_modules" lineno="4327">
+<interface name="files_search_kernel_modules" lineno="4364">
<summary>
Search the contents of the kernel module directories.
</summary>
@@ -62591,7 +62708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_kernel_modules" lineno="4346">
+<interface name="files_list_kernel_modules" lineno="4383">
<summary>
List the contents of the kernel module directories.
</summary>
@@ -62601,7 +62718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_kernel_modules" lineno="4365">
+<interface name="files_getattr_kernel_modules" lineno="4402">
<summary>
Get the attributes of kernel module files.
</summary>
@@ -62611,7 +62728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_modules" lineno="4383">
+<interface name="files_read_kernel_modules" lineno="4420">
<summary>
Read kernel module files.
</summary>
@@ -62621,7 +62738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mmap_read_kernel_modules" lineno="4403">
+<interface name="files_mmap_read_kernel_modules" lineno="4440">
<summary>
Read and mmap kernel module files.
</summary>
@@ -62631,7 +62748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_kernel_modules" lineno="4424">
+<interface name="files_write_kernel_modules" lineno="4461">
<summary>
Write kernel module files.
</summary>
@@ -62641,7 +62758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_modules" lineno="4443">
+<interface name="files_delete_kernel_modules" lineno="4480">
<summary>
Delete kernel module files.
</summary>
@@ -62651,7 +62768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_kernel_modules" lineno="4463">
+<interface name="files_manage_kernel_modules" lineno="4500">
<summary>
Create, read, write, and delete
kernel module files.
@@ -62663,7 +62780,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_kernel_modules" lineno="4483">
+<interface name="files_relabel_kernel_modules" lineno="4520">
<summary>
Relabel from and to kernel module files.
</summary>
@@ -62673,7 +62790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_kernel_modules_dirs" lineno="4502">
+<interface name="files_mounton_kernel_modules_dirs" lineno="4539">
<summary>
Mount on kernel module directories.
</summary>
@@ -62683,7 +62800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_kernel_modules_filetrans" lineno="4536">
+<interface name="files_kernel_modules_filetrans" lineno="4573">
<summary>
Create objects in the kernel module directories
with a private type via an automatic type transition.
@@ -62709,7 +62826,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_load_kernel_modules" lineno="4554">
+<interface name="files_load_kernel_modules" lineno="4591">
<summary>
Load kernel module files.
</summary>
@@ -62719,7 +62836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_load_kernel_modules" lineno="4573">
+<interface name="files_dontaudit_load_kernel_modules" lineno="4610">
<summary>
Load kernel module files.
</summary>
@@ -62729,7 +62846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_world_readable" lineno="4593">
+<interface name="files_list_world_readable" lineno="4630">
<summary>
List world-readable directories.
</summary>
@@ -62740,7 +62857,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_files" lineno="4612">
+<interface name="files_read_world_readable_files" lineno="4649">
<summary>
Read world-readable files.
</summary>
@@ -62751,7 +62868,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_symlinks" lineno="4631">
+<interface name="files_read_world_readable_symlinks" lineno="4668">
<summary>
Read world-readable symbolic links.
</summary>
@@ -62762,7 +62879,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_pipes" lineno="4649">
+<interface name="files_read_world_readable_pipes" lineno="4686">
<summary>
Read world-readable named pipes.
</summary>
@@ -62772,7 +62889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_world_readable_sockets" lineno="4667">
+<interface name="files_read_world_readable_sockets" lineno="4704">
<summary>
Read world-readable sockets.
</summary>
@@ -62782,7 +62899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_tmp" lineno="4687">
+<interface name="files_associate_tmp" lineno="4724">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
@@ -62794,7 +62911,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_getattr_tmp_dirs" lineno="4705">
+<interface name="files_getattr_tmp_dirs" lineno="4742">
<summary>
Get the attributes of the tmp directory (/tmp).
</summary>
@@ -62804,7 +62921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4724">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4761">
<summary>
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
@@ -62815,7 +62932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_tmp" lineno="4742">
+<interface name="files_search_tmp" lineno="4779">
<summary>
Search the tmp directory (/tmp).
</summary>
@@ -62825,7 +62942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_tmp" lineno="4760">
+<interface name="files_dontaudit_search_tmp" lineno="4797">
<summary>
Do not audit attempts to search the tmp directory (/tmp).
</summary>
@@ -62835,7 +62952,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_tmp" lineno="4778">
+<interface name="files_list_tmp" lineno="4815">
<summary>
Read the tmp directory (/tmp).
</summary>
@@ -62845,7 +62962,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_tmp" lineno="4796">
+<interface name="files_dontaudit_list_tmp" lineno="4833">
<summary>
Do not audit listing of the tmp directory (/tmp).
</summary>
@@ -62855,7 +62972,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4814">
+<interface name="files_delete_tmp_dir_entry" lineno="4851">
<summary>
Remove entries from the tmp directory.
</summary>
@@ -62865,7 +62982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_files" lineno="4832">
+<interface name="files_read_generic_tmp_files" lineno="4869">
<summary>
Read files in the tmp directory (/tmp).
</summary>
@@ -62875,7 +62992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4850">
+<interface name="files_manage_generic_tmp_dirs" lineno="4887">
<summary>
Manage temporary directories in /tmp.
</summary>
@@ -62885,7 +63002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_generic_tmp_dirs" lineno="4868">
+<interface name="files_relabel_generic_tmp_dirs" lineno="4905">
<summary>
Relabel temporary directories in /tmp.
</summary>
@@ -62895,7 +63012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_files" lineno="4886">
+<interface name="files_manage_generic_tmp_files" lineno="4923">
<summary>
Manage temporary files and directories in /tmp.
</summary>
@@ -62905,7 +63022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4904">
+<interface name="files_read_generic_tmp_symlinks" lineno="4941">
<summary>
Read symbolic links in the tmp directory (/tmp).
</summary>
@@ -62915,7 +63032,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4922">
+<interface name="files_rw_generic_tmp_sockets" lineno="4959">
<summary>
Read and write generic named sockets in the tmp directory (/tmp).
</summary>
@@ -62925,7 +63042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_tmp" lineno="4940">
+<interface name="files_mounton_tmp" lineno="4977">
<summary>
Mount filesystems in the tmp directory (/tmp)
</summary>
@@ -62935,7 +63052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4958">
+<interface name="files_setattr_all_tmp_dirs" lineno="4995">
<summary>
Set the attributes of all tmp directories.
</summary>
@@ -62945,7 +63062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all_tmp" lineno="4976">
+<interface name="files_list_all_tmp" lineno="5013">
<summary>
List all tmp directories.
</summary>
@@ -62955,7 +63072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4996">
+<interface name="files_relabel_all_tmp_dirs" lineno="5033">
<summary>
Relabel to and from all temporary
directory types.
@@ -62967,7 +63084,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="5017">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="5054">
<summary>
Do not audit attempts to get the attributes
of all tmp files.
@@ -62978,7 +63095,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmp_files" lineno="5036">
+<interface name="files_getattr_all_tmp_files" lineno="5073">
<summary>
Allow attempts to get the attributes
of all tmp files.
@@ -62989,7 +63106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_files" lineno="5056">
+<interface name="files_relabel_all_tmp_files" lineno="5093">
<summary>
Relabel to and from all temporary
file types.
@@ -63001,7 +63118,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5077">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5114">
<summary>
Do not audit attempts to get the attributes
of all tmp sock_file.
@@ -63012,7 +63129,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_tmp_files" lineno="5095">
+<interface name="files_read_all_tmp_files" lineno="5132">
<summary>
Read all tmp files.
</summary>
@@ -63022,7 +63139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_tmp_filetrans" lineno="5129">
+<interface name="files_tmp_filetrans" lineno="5166">
<summary>
Create an object in the tmp directories, with a private
type using a type transition.
@@ -63048,7 +63165,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_purge_tmp" lineno="5147">
+<interface name="files_purge_tmp" lineno="5184">
<summary>
Delete the contents of /tmp.
</summary>
@@ -63058,7 +63175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmpfs_files" lineno="5170">
+<interface name="files_getattr_all_tmpfs_files" lineno="5207">
<summary>
Get the attributes of all tmpfs files.
</summary>
@@ -63068,7 +63185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_usr_dirs" lineno="5189">
+<interface name="files_setattr_usr_dirs" lineno="5226">
<summary>
Set the attributes of the /usr directory.
</summary>
@@ -63078,7 +63195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_usr" lineno="5207">
+<interface name="files_search_usr" lineno="5244">
<summary>
Search the content of /usr.
</summary>
@@ -63088,7 +63205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_usr" lineno="5226">
+<interface name="files_list_usr" lineno="5263">
<summary>
List the contents of generic
directories in /usr.
@@ -63099,7 +63216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="5244">
+<interface name="files_dontaudit_write_usr_dirs" lineno="5281">
<summary>
Do not audit write of /usr dirs
</summary>
@@ -63109,7 +63226,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_usr_dirs" lineno="5262">
+<interface name="files_rw_usr_dirs" lineno="5299">
<summary>
Add and remove entries from /usr directories.
</summary>
@@ -63119,7 +63236,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="5281">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="5318">
<summary>
Do not audit attempts to add and remove
entries from /usr directories.
@@ -63130,7 +63247,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_dirs" lineno="5299">
+<interface name="files_delete_usr_dirs" lineno="5336">
<summary>
Delete generic directories in /usr in the caller domain.
</summary>
@@ -63140,7 +63257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_usr_dirs" lineno="5317">
+<interface name="files_watch_usr_dirs" lineno="5354">
<summary>
Watch generic directories in /usr.
</summary>
@@ -63150,7 +63267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_files" lineno="5335">
+<interface name="files_delete_usr_files" lineno="5372">
<summary>
Delete generic files in /usr in the caller domain.
</summary>
@@ -63160,7 +63277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_files" lineno="5353">
+<interface name="files_getattr_usr_files" lineno="5390">
<summary>
Get the attributes of files in /usr.
</summary>
@@ -63170,7 +63287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_map_usr_files" lineno="5372">
+<interface name="files_map_usr_files" lineno="5409">
<summary>
Map generic files in /usr.
</summary>
@@ -63181,7 +63298,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_read_usr_files" lineno="5408">
+<interface name="files_read_usr_files" lineno="5445">
<summary>
Read generic files in /usr.
</summary>
@@ -63209,7 +63326,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_exec_usr_files" lineno="5428">
+<interface name="files_exec_usr_files" lineno="5465">
<summary>
Execute generic programs in /usr in the caller domain.
</summary>
@@ -63219,7 +63336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5448">
+<interface name="files_dontaudit_write_usr_files" lineno="5485">
<summary>
dontaudit write of /usr files
</summary>
@@ -63229,7 +63346,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_usr_files" lineno="5466">
+<interface name="files_manage_usr_files" lineno="5503">
<summary>
Create, read, write, and delete files in the /usr directory.
</summary>
@@ -63239,7 +63356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_usr_files" lineno="5484">
+<interface name="files_relabelto_usr_files" lineno="5521">
<summary>
Relabel a file to the type used in /usr.
</summary>
@@ -63249,7 +63366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_usr_files" lineno="5502">
+<interface name="files_relabelfrom_usr_files" lineno="5539">
<summary>
Relabel a file from the type used in /usr.
</summary>
@@ -63259,7 +63376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_symlinks" lineno="5520">
+<interface name="files_read_usr_symlinks" lineno="5557">
<summary>
Read symbolic links in /usr.
</summary>
@@ -63269,7 +63386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_usr_filetrans" lineno="5553">
+<interface name="files_usr_filetrans" lineno="5590">
<summary>
Create objects in the /usr directory
</summary>
@@ -63294,7 +63411,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_search_src" lineno="5571">
+<interface name="files_search_src" lineno="5608">
<summary>
Search directories in /usr/src.
</summary>
@@ -63304,7 +63421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_src" lineno="5589">
+<interface name="files_dontaudit_search_src" lineno="5626">
<summary>
Do not audit attempts to search /usr/src.
</summary>
@@ -63314,7 +63431,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_src_files" lineno="5607">
+<interface name="files_getattr_usr_src_files" lineno="5644">
<summary>
Get the attributes of files in /usr/src.
</summary>
@@ -63324,7 +63441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_src_files" lineno="5628">
+<interface name="files_read_usr_src_files" lineno="5665">
<summary>
Read files in /usr/src.
</summary>
@@ -63334,7 +63451,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_usr_src_files" lineno="5649">
+<interface name="files_exec_usr_src_files" lineno="5686">
<summary>
Execute programs in /usr/src in the caller domain.
</summary>
@@ -63344,7 +63461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_symbol_table" lineno="5669">
+<interface name="files_create_kernel_symbol_table" lineno="5706">
<summary>
Install a system.map into the /boot directory.
</summary>
@@ -63354,7 +63471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_symbol_table" lineno="5688">
+<interface name="files_read_kernel_symbol_table" lineno="5725">
<summary>
Read system.map in the /boot directory.
</summary>
@@ -63364,7 +63481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5707">
+<interface name="files_delete_kernel_symbol_table" lineno="5744">
<summary>
Delete a system.map in the /boot directory.
</summary>
@@ -63374,7 +63491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var" lineno="5726">
+<interface name="files_search_var" lineno="5763">
<summary>
Search the contents of /var.
</summary>
@@ -63384,7 +63501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5744">
+<interface name="files_dontaudit_write_var_dirs" lineno="5781">
<summary>
Do not audit attempts to write to /var.
</summary>
@@ -63394,7 +63511,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_write_var_dirs" lineno="5762">
+<interface name="files_write_var_dirs" lineno="5799">
<summary>
Allow attempts to write to /var.dirs
</summary>
@@ -63404,7 +63521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_var" lineno="5781">
+<interface name="files_dontaudit_search_var" lineno="5818">
<summary>
Do not audit attempts to search
the contents of /var.
@@ -63415,7 +63532,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_var" lineno="5799">
+<interface name="files_list_var" lineno="5836">
<summary>
List the contents of /var.
</summary>
@@ -63425,7 +63542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_var" lineno="5818">
+<interface name="files_dontaudit_list_var" lineno="5855">
<summary>
Do not audit attempts to list
the contents of /var.
@@ -63436,7 +63553,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_dirs" lineno="5837">
+<interface name="files_manage_var_dirs" lineno="5874">
<summary>
Create, read, write, and delete directories
in the /var directory.
@@ -63447,7 +63564,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_dirs" lineno="5855">
+<interface name="files_relabel_var_dirs" lineno="5892">
<summary>
relabelto/from var directories
</summary>
@@ -63457,7 +63574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_files" lineno="5873">
+<interface name="files_read_var_files" lineno="5910">
<summary>
Read files in the /var directory.
</summary>
@@ -63467,7 +63584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_append_var_files" lineno="5891">
+<interface name="files_append_var_files" lineno="5928">
<summary>
Append files in the /var directory.
</summary>
@@ -63477,7 +63594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_files" lineno="5909">
+<interface name="files_rw_var_files" lineno="5946">
<summary>
Read and write files in the /var directory.
</summary>
@@ -63487,7 +63604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5928">
+<interface name="files_dontaudit_rw_var_files" lineno="5965">
<summary>
Do not audit attempts to read and write
files in the /var directory.
@@ -63498,7 +63615,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_files" lineno="5946">
+<interface name="files_manage_var_files" lineno="5983">
<summary>
Create, read, write, and delete files in the /var directory.
</summary>
@@ -63508,7 +63625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_symlinks" lineno="5964">
+<interface name="files_read_var_symlinks" lineno="6001">
<summary>
Read symbolic links in the /var directory.
</summary>
@@ -63518,7 +63635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_symlinks" lineno="5983">
+<interface name="files_manage_var_symlinks" lineno="6020">
<summary>
Create, read, write, and delete symbolic
links in the /var directory.
@@ -63529,7 +63646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_filetrans" lineno="6016">
+<interface name="files_var_filetrans" lineno="6053">
<summary>
Create objects in the /var directory
</summary>
@@ -63554,7 +63671,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_var_lib_dirs" lineno="6034">
+<interface name="files_getattr_var_lib_dirs" lineno="6071">
<summary>
Get the attributes of the /var/lib directory.
</summary>
@@ -63564,7 +63681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var_lib" lineno="6066">
+<interface name="files_search_var_lib" lineno="6103">
<summary>
Search the /var/lib directory.
</summary>
@@ -63588,7 +63705,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_dontaudit_search_var_lib" lineno="6086">
+<interface name="files_dontaudit_search_var_lib" lineno="6123">
<summary>
Do not audit attempts to search the
contents of /var/lib.
@@ -63600,7 +63717,7 @@ Domain to not audit.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_list_var_lib" lineno="6104">
+<interface name="files_list_var_lib" lineno="6141">
<summary>
List the contents of the /var/lib directory.
</summary>
@@ -63610,7 +63727,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_lib_dirs" lineno="6122">
+<interface name="files_rw_var_lib_dirs" lineno="6159">
<summary>
Read-write /var/lib directories
</summary>
@@ -63620,7 +63737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_lib_dirs" lineno="6140">
+<interface name="files_manage_var_lib_dirs" lineno="6177">
<summary>
manage var_lib_t dirs
</summary>
@@ -63630,7 +63747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_lib_dirs" lineno="6159">
+<interface name="files_relabel_var_lib_dirs" lineno="6196">
<summary>
relabel var_lib_t dirs
</summary>
@@ -63640,7 +63757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_lib_filetrans" lineno="6193">
+<interface name="files_var_lib_filetrans" lineno="6230">
<summary>
Create objects in the /var/lib directory
</summary>
@@ -63665,7 +63782,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_files" lineno="6212">
+<interface name="files_read_var_lib_files" lineno="6249">
<summary>
Read generic files in /var/lib.
</summary>
@@ -63675,7 +63792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_symlinks" lineno="6231">
+<interface name="files_read_var_lib_symlinks" lineno="6268">
<summary>
Read generic symbolic links in /var/lib
</summary>
@@ -63685,7 +63802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_urandom_seed" lineno="6253">
+<interface name="files_manage_urandom_seed" lineno="6290">
<summary>
Create, read, write, and delete the
pseudorandom number generator seed.
@@ -63696,7 +63813,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mounttab" lineno="6273">
+<interface name="files_manage_mounttab" lineno="6309">
<summary>
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
@@ -63707,7 +63824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_lock_dirs" lineno="6292">
+<interface name="files_setattr_lock_dirs" lineno="6328">
<summary>
Set the attributes of the generic lock directories.
</summary>
@@ -63717,7 +63834,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_locks" lineno="6310">
+<interface name="files_search_locks" lineno="6346">
<summary>
Search the locks directory (/var/lock).
</summary>
@@ -63727,7 +63844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_locks" lineno="6330">
+<interface name="files_dontaudit_search_locks" lineno="6366">
<summary>
Do not audit attempts to search the
locks directory (/var/lock).
@@ -63738,7 +63855,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_locks" lineno="6349">
+<interface name="files_list_locks" lineno="6385">
<summary>
List generic lock directories.
</summary>
@@ -63748,7 +63865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_lock_dirs" lineno="6368">
+<interface name="files_check_write_lock_dirs" lineno="6404">
<summary>
Test write access on lock directories.
</summary>
@@ -63758,7 +63875,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_add_entry_lock_dirs" lineno="6387">
+<interface name="files_add_entry_lock_dirs" lineno="6423">
<summary>
Add entries in the /var/lock directories.
</summary>
@@ -63768,7 +63885,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_lock_dirs" lineno="6407">
+<interface name="files_rw_lock_dirs" lineno="6443">
<summary>
Add and remove entries in the /var/lock
directories.
@@ -63779,7 +63896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_lock_dirs" lineno="6426">
+<interface name="files_create_lock_dirs" lineno="6462">
<summary>
Create lock directories
</summary>
@@ -63789,7 +63906,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6447">
+<interface name="files_relabel_all_lock_dirs" lineno="6483">
<summary>
Relabel to and from all lock directory types.
</summary>
@@ -63800,7 +63917,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_generic_locks" lineno="6468">
+<interface name="files_getattr_generic_locks" lineno="6504">
<summary>
Get the attributes of generic lock files.
</summary>
@@ -63810,7 +63927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_generic_locks" lineno="6489">
+<interface name="files_delete_generic_locks" lineno="6525">
<summary>
Delete generic lock files.
</summary>
@@ -63820,7 +63937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_locks" lineno="6510">
+<interface name="files_manage_generic_locks" lineno="6546">
<summary>
Create, read, write, and delete generic
lock files.
@@ -63831,7 +63948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_locks" lineno="6532">
+<interface name="files_delete_all_locks" lineno="6568">
<summary>
Delete all lock files.
</summary>
@@ -63842,7 +63959,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_locks" lineno="6553">
+<interface name="files_read_all_locks" lineno="6589">
<summary>
Read all lock files.
</summary>
@@ -63852,7 +63969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_locks" lineno="6576">
+<interface name="files_manage_all_locks" lineno="6612">
<summary>
manage all lock files.
</summary>
@@ -63862,7 +63979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_locks" lineno="6599">
+<interface name="files_relabel_all_locks" lineno="6635">
<summary>
Relabel from/to all lock files.
</summary>
@@ -63872,7 +63989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_lock_filetrans" lineno="6638">
+<interface name="files_lock_filetrans" lineno="6674">
<summary>
Create an object in the locks directory, with a private
type using a type transition.
@@ -63898,7 +64015,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6659">
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6695">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory.
@@ -63909,7 +64026,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_runtime_dirs" lineno="6678">
+<interface name="files_mounton_runtime_dirs" lineno="6714">
<summary>
mounton a /var/run directory.
</summary>
@@ -63919,7 +64036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_runtime_dirs" lineno="6696">
+<interface name="files_setattr_runtime_dirs" lineno="6732">
<summary>
Set the attributes of the /var/run directory.
</summary>
@@ -63929,7 +64046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_runtime" lineno="6716">
+<interface name="files_search_runtime" lineno="6752">
<summary>
Search the contents of runtime process
ID directories (/var/run).
@@ -63940,7 +64057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_runtime" lineno="6736">
+<interface name="files_dontaudit_search_runtime" lineno="6772">
<summary>
Do not audit attempts to search
the /var/run directory.
@@ -63951,7 +64068,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_runtime" lineno="6756">
+<interface name="files_list_runtime" lineno="6792">
<summary>
List the contents of the runtime process
ID directories (/var/run).
@@ -63962,7 +64079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_runtime_dirs" lineno="6775">
+<interface name="files_check_write_runtime_dirs" lineno="6811">
<summary>
Check write access on /var/run directories.
</summary>
@@ -63972,7 +64089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_runtime_dirs" lineno="6793">
+<interface name="files_create_runtime_dirs" lineno="6829">
<summary>
Create a /var/run directory.
</summary>
@@ -63982,7 +64099,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_runtime_dirs" lineno="6811">
+<interface name="files_rw_runtime_dirs" lineno="6847">
+<summary>
+Read and write a /var/run directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_watch_runtime_dirs" lineno="6865">
<summary>
Watch /var/run directories.
</summary>
@@ -63992,7 +64119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_runtime_files" lineno="6829">
+<interface name="files_read_runtime_files" lineno="6883">
<summary>
Read generic runtime files.
</summary>
@@ -64002,7 +64129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_runtime" lineno="6849">
+<interface name="files_exec_runtime" lineno="6903">
<summary>
Execute generic programs in /var/run in the caller domain.
</summary>
@@ -64012,7 +64139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_runtime_files" lineno="6867">
+<interface name="files_rw_runtime_files" lineno="6921">
<summary>
Read and write generic runtime files.
</summary>
@@ -64022,7 +64149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_runtime_symlinks" lineno="6887">
+<interface name="files_delete_runtime_symlinks" lineno="6941">
<summary>
Delete generic runtime symlinks.
</summary>
@@ -64032,7 +64159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_runtime_pipes" lineno="6905">
+<interface name="files_write_runtime_pipes" lineno="6959">
<summary>
Write named generic runtime pipes.
</summary>
@@ -64042,7 +64169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_dirs" lineno="6925">
+<interface name="files_delete_all_runtime_dirs" lineno="6979">
<summary>
Delete all runtime dirs.
</summary>
@@ -64053,7 +64180,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_dirs" lineno="6943">
+<interface name="files_manage_all_runtime_dirs" lineno="6997">
<summary>
Create, read, write, and delete all runtime directories.
</summary>
@@ -64063,7 +64190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_dirs" lineno="6961">
+<interface name="files_relabel_all_runtime_dirs" lineno="7015">
<summary>
Relabel all runtime directories.
</summary>
@@ -64073,7 +64200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_runtime_files" lineno="6980">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7034">
<summary>
Do not audit attempts to get the attributes of
all runtime data files.
@@ -64084,7 +64211,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_runtime_files" lineno="7001">
+<interface name="files_read_all_runtime_files" lineno="7055">
<summary>
Read all runtime files.
</summary>
@@ -64095,7 +64222,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7022">
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7076">
<summary>
Do not audit attempts to ioctl all runtime files.
</summary>
@@ -64105,7 +64232,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_runtime_files" lineno="7042">
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7096">
<summary>
Do not audit attempts to write to all runtime files.
</summary>
@@ -64115,7 +64242,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_files" lineno="7063">
+<interface name="files_delete_all_runtime_files" lineno="7117">
<summary>
Delete all runtime files.
</summary>
@@ -64126,7 +64253,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_files" lineno="7082">
+<interface name="files_manage_all_runtime_files" lineno="7136">
<summary>
Create, read, write and delete all
var_run (pid) files
@@ -64137,7 +64264,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_files" lineno="7100">
+<interface name="files_relabel_all_runtime_files" lineno="7154">
<summary>
Relabel all runtime files.
</summary>
@@ -64147,7 +64274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_symlinks" lineno="7119">
+<interface name="files_delete_all_runtime_symlinks" lineno="7173">
<summary>
Delete all runtime symlinks.
</summary>
@@ -64158,7 +64285,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_symlinks" lineno="7138">
+<interface name="files_manage_all_runtime_symlinks" lineno="7192">
<summary>
Create, read, write and delete all
var_run (pid) symbolic links.
@@ -64169,7 +64296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_symlinks" lineno="7156">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7210">
<summary>
Relabel all runtime symbolic links.
</summary>
@@ -64179,7 +64306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_runtime_pipes" lineno="7174">
+<interface name="files_create_all_runtime_pipes" lineno="7228">
<summary>
Create all runtime named pipes
</summary>
@@ -64189,7 +64316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_pipes" lineno="7193">
+<interface name="files_delete_all_runtime_pipes" lineno="7247">
<summary>
Delete all runtime named pipes
</summary>
@@ -64199,7 +64326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_runtime_sockets" lineno="7212">
+<interface name="files_create_all_runtime_sockets" lineno="7266">
<summary>
Create all runtime sockets.
</summary>
@@ -64209,7 +64336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_sockets" lineno="7230">
+<interface name="files_delete_all_runtime_sockets" lineno="7284">
<summary>
Delete all runtime sockets.
</summary>
@@ -64219,7 +64346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_sockets" lineno="7248">
+<interface name="files_relabel_all_runtime_sockets" lineno="7302">
<summary>
Relabel all runtime named sockets.
</summary>
@@ -64229,7 +64356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_runtime_filetrans" lineno="7308">
+<interface name="files_runtime_filetrans" lineno="7362">
<summary>
Create an object in the /run directory, with a private type.
</summary>
@@ -64281,7 +64408,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="files_runtime_filetrans_lock_dir" lineno="7333">
+<interface name="files_runtime_filetrans_lock_dir" lineno="7387">
<summary>
Create a generic lock directory within the run directories.
</summary>
@@ -64296,7 +64423,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_all_spool_sockets" lineno="7351">
+<interface name="files_create_all_spool_sockets" lineno="7405">
<summary>
Create all spool sockets
</summary>
@@ -64306,7 +64433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_spool_sockets" lineno="7369">
+<interface name="files_delete_all_spool_sockets" lineno="7423">
<summary>
Delete all spool sockets
</summary>
@@ -64316,7 +64443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_all_poly_members" lineno="7388">
+<interface name="files_mounton_all_poly_members" lineno="7442">
<summary>
Mount filesystems on all polyinstantiation
member directories.
@@ -64327,7 +64454,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_spool" lineno="7407">
+<interface name="files_search_spool" lineno="7461">
<summary>
Search the contents of generic spool
directories (/var/spool).
@@ -64338,7 +64465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_spool" lineno="7426">
+<interface name="files_dontaudit_search_spool" lineno="7480">
<summary>
Do not audit attempts to search generic
spool directories.
@@ -64349,7 +64476,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_spool" lineno="7445">
+<interface name="files_list_spool" lineno="7499">
<summary>
List the contents of generic spool
(/var/spool) directories.
@@ -64360,7 +64487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool_dirs" lineno="7464">
+<interface name="files_manage_generic_spool_dirs" lineno="7518">
<summary>
Create, read, write, and delete generic
spool directories (/var/spool).
@@ -64371,7 +64498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_spool" lineno="7483">
+<interface name="files_read_generic_spool" lineno="7537">
<summary>
Read generic spool files.
</summary>
@@ -64381,7 +64508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool" lineno="7503">
+<interface name="files_manage_generic_spool" lineno="7557">
<summary>
Create, read, write, and delete generic
spool files.
@@ -64392,7 +64519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_spool_filetrans" lineno="7539">
+<interface name="files_spool_filetrans" lineno="7593">
<summary>
Create objects in the spool directory
with a private type with a type transition.
@@ -64419,7 +64546,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_polyinstantiate_all" lineno="7559">
+<interface name="files_polyinstantiate_all" lineno="7613">
<summary>
Allow access to manage all polyinstantiated
directories on the system.
@@ -64430,7 +64557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unconfined" lineno="7613">
+<interface name="files_unconfined" lineno="7667">
<summary>
Unconfined access to files.
</summary>
@@ -64440,7 +64567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7635">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7689">
<summary>
Create, read, write, and delete symbolic links in
/etc that are dynamically created on boot.
@@ -64452,7 +64579,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7653">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7707">
<summary>
Do not audit attempts to read etc_runtime resources
</summary>
@@ -64462,7 +64589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_src" lineno="7671">
+<interface name="files_list_src" lineno="7725">
<summary>
List usr/src files
</summary>
@@ -64472,7 +64599,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_read_src_files" lineno="7689">
+<interface name="files_read_src_files" lineno="7743">
<summary>
Read usr/src files
</summary>
@@ -64482,7 +64609,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_manage_src_files" lineno="7707">
+<interface name="files_manage_src_files" lineno="7761">
<summary>
Manage /usr/src files
</summary>
@@ -64492,7 +64619,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="7738">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7792">
<summary>
Create a resource in the generic lib location
with an automatic type transition towards the kernel modules
@@ -64514,7 +64641,7 @@ Optional name of the resource
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime" lineno="7756">
+<interface name="files_read_etc_runtime" lineno="7810">
<summary>
Read etc runtime resources
</summary>
@@ -64524,7 +64651,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="7778">
+<interface name="files_relabel_all_non_security_file_types" lineno="7832">
<summary>
Allow relabel from and to non-security types
</summary>
@@ -64535,7 +64662,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_non_security_file_types" lineno="7808">
+<interface name="files_manage_all_non_security_file_types" lineno="7862">
<summary>
Manage non-security-sensitive resource types
</summary>
@@ -64546,7 +64673,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_all_pidfiles" lineno="7830">
+<interface name="files_relabel_all_pidfiles" lineno="7884">
<summary>
Allow relabeling from and to any pidfile associated type
</summary>
@@ -65226,7 +65353,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cgroup_filetrans" lineno="1180">
+<interface name="fs_mounton_cgroup_files" lineno="1164">
+<summary>
+Mount on cgroup files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_cgroup_filetrans" lineno="1198">
<summary>
Create an object in a cgroup tmpfs filesystem, with a private
type using a type transition.
@@ -65252,7 +65389,38 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1201">
+<interface name="fs_cgroup_filetrans_memory_pressure" lineno="1229">
+<summary>
+Create an object in a cgroup tmpfs filesystem, with the memory_pressure_t
+type using a type transition.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="fs_watch_memory_pressure" lineno="1247">
+<summary>
+Allow managing a cgroup's memory.pressure file to get notifications
+</summary>
+<param name="domain">
+<summary>
+Source domain
+</summary>
+</param>
+</interface>
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1266">
<summary>
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
@@ -65263,7 +65431,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_cifs" lineno="1219">
+<interface name="fs_mount_cifs" lineno="1284">
<summary>
Mount a CIFS or SMB network filesystem.
</summary>
@@ -65273,7 +65441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cifs" lineno="1238">
+<interface name="fs_remount_cifs" lineno="1303">
<summary>
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
@@ -65284,7 +65452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cifs" lineno="1256">
+<interface name="fs_unmount_cifs" lineno="1321">
<summary>
Unmount a CIFS or SMB network filesystem.
</summary>
@@ -65294,7 +65462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cifs" lineno="1276">
+<interface name="fs_getattr_cifs" lineno="1341">
<summary>
Get the attributes of a CIFS or
SMB network filesystem.
@@ -65306,7 +65474,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_cifs" lineno="1294">
+<interface name="fs_search_cifs" lineno="1359">
<summary>
Search directories on a CIFS or SMB filesystem.
</summary>
@@ -65316,7 +65484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cifs" lineno="1313">
+<interface name="fs_list_cifs" lineno="1378">
<summary>
List the contents of directories on a
CIFS or SMB filesystem.
@@ -65327,7 +65495,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1332">
+<interface name="fs_dontaudit_list_cifs" lineno="1397">
<summary>
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
@@ -65338,7 +65506,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cifs" lineno="1350">
+<interface name="fs_mounton_cifs" lineno="1415">
<summary>
Mounton a CIFS filesystem.
</summary>
@@ -65348,7 +65516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_files" lineno="1369">
+<interface name="fs_read_cifs_files" lineno="1434">
<summary>
Read files on a CIFS or SMB filesystem.
</summary>
@@ -65359,7 +65527,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_all_inherited_image_files" lineno="1389">
+<interface name="fs_read_all_inherited_image_files" lineno="1454">
<summary>
Read all inherited filesystem image files.
</summary>
@@ -65370,7 +65538,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_all_image_files" lineno="1408">
+<interface name="fs_read_all_image_files" lineno="1473">
<summary>
Read all filesystem image files.
</summary>
@@ -65381,7 +65549,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_read_all_image_files" lineno="1427">
+<interface name="fs_mmap_read_all_image_files" lineno="1492">
<summary>
Mmap-read all filesystem image files.
</summary>
@@ -65392,7 +65560,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_rw_all_image_files" lineno="1446">
+<interface name="fs_rw_all_image_files" lineno="1511">
<summary>
Read and write all filesystem image files.
</summary>
@@ -65403,7 +65571,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_rw_all_image_files" lineno="1465">
+<interface name="fs_mmap_rw_all_image_files" lineno="1530">
<summary>
Mmap-Read-write all filesystem image files.
</summary>
@@ -65414,7 +65582,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_write_all_image_files" lineno="1484">
+<interface name="fs_dontaudit_write_all_image_files" lineno="1549">
<summary>
Do not audit attempts to write all filesystem image files.
</summary>
@@ -65425,7 +65593,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1504">
+<interface name="fs_getattr_noxattr_fs" lineno="1569">
<summary>
Get the attributes of filesystems that
do not have extended attribute support.
@@ -65437,7 +65605,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_list_noxattr_fs" lineno="1522">
+<interface name="fs_list_noxattr_fs" lineno="1587">
<summary>
Read all noxattrfs directories.
</summary>
@@ -65447,7 +65615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1541">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1606">
<summary>
Do not audit attempts to list all
noxattrfs directories.
@@ -65458,7 +65626,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1559">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1624">
<summary>
Create, read, write, and delete all noxattrfs directories.
</summary>
@@ -65468,7 +65636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1577">
+<interface name="fs_read_noxattr_fs_files" lineno="1642">
<summary>
Read all noxattrfs files.
</summary>
@@ -65478,7 +65646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1597">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1662">
<summary>
Do not audit attempts to read all
noxattrfs files.
@@ -65489,7 +65657,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1615">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1680">
<summary>
Dont audit attempts to write to noxattrfs files.
</summary>
@@ -65499,7 +65667,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1633">
+<interface name="fs_manage_noxattr_fs_files" lineno="1698">
<summary>
Create, read, write, and delete all noxattrfs files.
</summary>
@@ -65509,7 +65677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1652">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1717">
<summary>
Read all noxattrfs symbolic links.
</summary>
@@ -65519,7 +65687,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1671">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1736">
<summary>
Manage all noxattrfs symbolic links.
</summary>
@@ -65529,7 +65697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1691">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1756">
<summary>
Relabel all objects from filesystems that
do not support extended attributes.
@@ -65540,7 +65708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1717">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1782">
<summary>
Do not audit attempts to read
files on a CIFS or SMB filesystem.
@@ -65551,7 +65719,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_append_cifs_files" lineno="1737">
+<interface name="fs_append_cifs_files" lineno="1802">
<summary>
Append files
on a CIFS filesystem.
@@ -65563,7 +65731,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1757">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1822">
<summary>
dontaudit Append files
on a CIFS filesystem.
@@ -65575,7 +65743,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1776">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1841">
<summary>
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
@@ -65586,7 +65754,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_symlinks" lineno="1794">
+<interface name="fs_read_cifs_symlinks" lineno="1859">
<summary>
Read symbolic links on a CIFS or SMB filesystem.
</summary>
@@ -65596,7 +65764,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1814">
+<interface name="fs_read_cifs_named_pipes" lineno="1879">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
@@ -65607,7 +65775,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1833">
+<interface name="fs_read_cifs_named_sockets" lineno="1898">
<summary>
Read named sockets
on a CIFS or SMB network filesystem.
@@ -65618,7 +65786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_cifs_files" lineno="1854">
+<interface name="fs_exec_cifs_files" lineno="1919">
<summary>
Execute files on a CIFS or SMB
network filesystem, in the caller
@@ -65631,7 +65799,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_cifs_dirs" lineno="1875">
+<interface name="fs_manage_cifs_dirs" lineno="1940">
<summary>
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
@@ -65643,7 +65811,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1895">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1960">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -65655,7 +65823,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_files" lineno="1915">
+<interface name="fs_manage_cifs_files" lineno="1980">
<summary>
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
@@ -65667,7 +65835,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1935">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="2000">
<summary>
Do not audit attempts to create, read,
write, and delete files
@@ -65679,7 +65847,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1954">
+<interface name="fs_manage_cifs_symlinks" lineno="2019">
<summary>
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
@@ -65690,7 +65858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1973">
+<interface name="fs_manage_cifs_named_pipes" lineno="2038">
<summary>
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
@@ -65701,7 +65869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1992">
+<interface name="fs_manage_cifs_named_sockets" lineno="2057">
<summary>
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
@@ -65712,7 +65880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cifs_domtrans" lineno="2035">
+<interface name="fs_cifs_domtrans" lineno="2100">
<summary>
Execute a file on a CIFS or SMB filesystem
in the specified domain.
@@ -65747,7 +65915,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_dirs" lineno="2055">
+<interface name="fs_manage_configfs_dirs" lineno="2120">
<summary>
Create, read, write, and delete dirs
on a configfs filesystem.
@@ -65758,7 +65926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_files" lineno="2074">
+<interface name="fs_manage_configfs_files" lineno="2139">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
@@ -65769,7 +65937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_dos_fs" lineno="2093">
+<interface name="fs_mount_dos_fs" lineno="2158">
<summary>
Mount a DOS filesystem, such as
FAT32 or NTFS.
@@ -65780,7 +65948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_dos_fs" lineno="2113">
+<interface name="fs_remount_dos_fs" lineno="2178">
<summary>
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
@@ -65792,7 +65960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_dos_fs" lineno="2132">
+<interface name="fs_unmount_dos_fs" lineno="2197">
<summary>
Unmount a DOS filesystem, such as
FAT32 or NTFS.
@@ -65803,7 +65971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_fs" lineno="2152">
+<interface name="fs_getattr_dos_fs" lineno="2217">
<summary>
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
@@ -65815,7 +65983,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="2171">
+<interface name="fs_relabelfrom_dos_fs" lineno="2236">
<summary>
Allow changing of the label of a
DOS filesystem using the context= mount option.
@@ -65826,7 +65994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_dirs" lineno="2189">
+<interface name="fs_getattr_dos_dirs" lineno="2254">
<summary>
Get attributes of directories on a dosfs filesystem.
</summary>
@@ -65836,7 +66004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_dos" lineno="2207">
+<interface name="fs_search_dos" lineno="2272">
<summary>
Search dosfs filesystem.
</summary>
@@ -65846,7 +66014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_dos" lineno="2225">
+<interface name="fs_list_dos" lineno="2290">
<summary>
List dirs DOS filesystem.
</summary>
@@ -65856,7 +66024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_dirs" lineno="2244">
+<interface name="fs_manage_dos_dirs" lineno="2309">
<summary>
Create, read, write, and delete dirs
on a DOS filesystem.
@@ -65867,7 +66035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_dos_files" lineno="2262">
+<interface name="fs_read_dos_files" lineno="2327">
<summary>
Read files on a DOS filesystem.
</summary>
@@ -65877,7 +66045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_read_dos_files" lineno="2280">
+<interface name="fs_mmap_read_dos_files" lineno="2345">
<summary>
Read and map files on a DOS filesystem.
</summary>
@@ -65887,7 +66055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_files" lineno="2300">
+<interface name="fs_manage_dos_files" lineno="2365">
<summary>
Create, read, write, and delete files
on a DOS filesystem.
@@ -65898,7 +66066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_ecryptfs" lineno="2318">
+<interface name="fs_list_ecryptfs" lineno="2383">
<summary>
Read symbolic links on an eCryptfs filesystem.
</summary>
@@ -65908,7 +66076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ecryptfs_dirs" lineno="2339">
+<interface name="fs_manage_ecryptfs_dirs" lineno="2404">
<summary>
Create, read, write, and delete directories
on an eCryptfs filesystem.
@@ -65920,7 +66088,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_ecryptfs_files" lineno="2359">
+<interface name="fs_manage_ecryptfs_files" lineno="2424">
<summary>
Create, read, write, and delete files
on an eCryptfs filesystem.
@@ -65932,7 +66100,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_ecryptfs_named_sockets" lineno="2378">
+<interface name="fs_manage_ecryptfs_named_sockets" lineno="2443">
<summary>
Create, read, write, and delete named sockets
on an eCryptfs filesystem.
@@ -65943,7 +66111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_efivarfs" lineno="2396">
+<interface name="fs_getattr_efivarfs" lineno="2461">
<summary>
Get the attributes of efivarfs filesystems.
</summary>
@@ -65953,7 +66121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_efivars" lineno="2414">
+<interface name="fs_list_efivars" lineno="2479">
<summary>
List dirs in efivarfs filesystem.
</summary>
@@ -65963,7 +66131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_efivarfs_files" lineno="2434">
+<interface name="fs_read_efivarfs_files" lineno="2499">
<summary>
Read files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
@@ -65975,7 +66143,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_setattr_efivarfs_files" lineno="2454">
+<interface name="fs_setattr_efivarfs_files" lineno="2519">
<summary>
Set the attributes of files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
@@ -65987,7 +66155,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_efivarfs_files" lineno="2474">
+<interface name="fs_manage_efivarfs_files" lineno="2539">
<summary>
Create, read, write, and delete files
on a efivarfs filesystem.
@@ -65999,7 +66167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_fusefs" lineno="2492">
+<interface name="fs_getattr_fusefs" lineno="2557">
<summary>
stat a FUSE filesystem
</summary>
@@ -66009,7 +66177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_fusefs" lineno="2510">
+<interface name="fs_mount_fusefs" lineno="2575">
<summary>
Mount a FUSE filesystem.
</summary>
@@ -66019,7 +66187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_fusefs" lineno="2528">
+<interface name="fs_unmount_fusefs" lineno="2593">
<summary>
Unmount a FUSE filesystem.
</summary>
@@ -66029,7 +66197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_fusefs" lineno="2546">
+<interface name="fs_remount_fusefs" lineno="2611">
<summary>
Remount a FUSE filesystem.
</summary>
@@ -66039,7 +66207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_fusefs" lineno="2564">
+<interface name="fs_mounton_fusefs" lineno="2629">
<summary>
Mounton a FUSEFS filesystem.
</summary>
@@ -66049,7 +66217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_fusefs_entry_type" lineno="2583">
+<interface name="fs_fusefs_entry_type" lineno="2648">
<summary>
Make FUSEFS files an entrypoint for the
specified domain.
@@ -66060,7 +66228,7 @@ The domain for which fusefs_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="fs_fusefs_domtrans" lineno="2616">
+<interface name="fs_fusefs_domtrans" lineno="2681">
<summary>
Execute FUSEFS files in a specified domain.
</summary>
@@ -66085,7 +66253,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="fs_search_fusefs" lineno="2636">
+<interface name="fs_search_fusefs" lineno="2701">
<summary>
Search directories
on a FUSEFS filesystem.
@@ -66097,7 +66265,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_list_fusefs" lineno="2656">
+<interface name="fs_list_fusefs" lineno="2721">
<summary>
List the contents of directories
on a FUSEFS filesystem.
@@ -66109,7 +66277,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2675">
+<interface name="fs_dontaudit_list_fusefs" lineno="2740">
<summary>
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
@@ -66120,7 +66288,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_setattr_fusefs_dirs" lineno="2695">
+<interface name="fs_setattr_fusefs_dirs" lineno="2760">
<summary>
Set the attributes of directories
on a FUSEFS filesystem.
@@ -66132,7 +66300,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2715">
+<interface name="fs_manage_fusefs_dirs" lineno="2780">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
@@ -66144,7 +66312,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2735">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2800">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -66156,7 +66324,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_fusefs_files" lineno="2755">
+<interface name="fs_getattr_fusefs_files" lineno="2820">
<summary>
Get the attributes of files on a
FUSEFS filesystem.
@@ -66168,7 +66336,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_fusefs_files" lineno="2774">
+<interface name="fs_read_fusefs_files" lineno="2839">
<summary>
Read, a FUSEFS filesystem.
</summary>
@@ -66179,7 +66347,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_exec_fusefs_files" lineno="2793">
+<interface name="fs_exec_fusefs_files" lineno="2858">
<summary>
Execute files on a FUSEFS filesystem.
</summary>
@@ -66190,7 +66358,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_setattr_fusefs_files" lineno="2813">
+<interface name="fs_setattr_fusefs_files" lineno="2878">
<summary>
Set the attributes of files on a
FUSEFS filesystem.
@@ -66202,7 +66370,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_files" lineno="2833">
+<interface name="fs_manage_fusefs_files" lineno="2898">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
@@ -66214,7 +66382,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2853">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2918">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -66226,7 +66394,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_fusefs_symlinks" lineno="2873">
+<interface name="fs_getattr_fusefs_symlinks" lineno="2938">
<summary>
Get the attributes of symlinks
on a FUSEFS filesystem.
@@ -66238,7 +66406,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2891">
+<interface name="fs_read_fusefs_symlinks" lineno="2956">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
@@ -66248,7 +66416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_setattr_fusefs_symlinks" lineno="2912">
+<interface name="fs_setattr_fusefs_symlinks" lineno="2977">
<summary>
Set the attributes of symlinks
on a FUSEFS filesystem.
@@ -66260,7 +66428,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_symlinks" lineno="2931">
+<interface name="fs_manage_fusefs_symlinks" lineno="2996">
<summary>
Manage symlinks on a FUSEFS filesystem.
</summary>
@@ -66271,7 +66439,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_fusefs_fifo_files" lineno="2951">
+<interface name="fs_getattr_fusefs_fifo_files" lineno="3016">
<summary>
Get the attributes of named pipes
on a FUSEFS filesystem.
@@ -66283,7 +66451,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_setattr_fusefs_fifo_files" lineno="2971">
+<interface name="fs_setattr_fusefs_fifo_files" lineno="3036">
<summary>
Set the attributes of named pipes
on a FUSEFS filesystem.
@@ -66295,7 +66463,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_fifo_files" lineno="2991">
+<interface name="fs_manage_fusefs_fifo_files" lineno="3056">
<summary>
Manage named pipes on a FUSEFS
filesystem.
@@ -66307,7 +66475,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_fusefs_sock_files" lineno="3011">
+<interface name="fs_getattr_fusefs_sock_files" lineno="3076">
<summary>
Get the attributes of named sockets
on a FUSEFS filesystem.
@@ -66319,7 +66487,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_setattr_fusefs_sock_files" lineno="3031">
+<interface name="fs_setattr_fusefs_sock_files" lineno="3096">
<summary>
Set the attributes of named sockets
on a FUSEFS filesystem.
@@ -66331,7 +66499,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_sock_files" lineno="3051">
+<interface name="fs_manage_fusefs_sock_files" lineno="3116">
<summary>
Manage named sockets on a FUSEFS
filesystem.
@@ -66343,7 +66511,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_fusefs_chr_files" lineno="3071">
+<interface name="fs_getattr_fusefs_chr_files" lineno="3136">
<summary>
Get the attributes of character files
on a FUSEFS filesystem.
@@ -66355,7 +66523,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_setattr_fusefs_chr_files" lineno="3091">
+<interface name="fs_setattr_fusefs_chr_files" lineno="3156">
<summary>
Set the attributes of character files
on a FUSEFS filesystem.
@@ -66367,7 +66535,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_chr_files" lineno="3111">
+<interface name="fs_manage_fusefs_chr_files" lineno="3176">
<summary>
Manage character files on a FUSEFS
filesystem.
@@ -66379,7 +66547,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_hugetlbfs" lineno="3130">
+<interface name="fs_getattr_hugetlbfs" lineno="3195">
<summary>
Get the attributes of an hugetlbfs
filesystem.
@@ -66390,7 +66558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_hugetlbfs" lineno="3148">
+<interface name="fs_list_hugetlbfs" lineno="3213">
<summary>
List hugetlbfs.
</summary>
@@ -66400,7 +66568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="3166">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="3231">
<summary>
Manage hugetlbfs dirs.
</summary>
@@ -66410,7 +66578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3184">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3249">
<summary>
Read and write inherited hugetlbfs files.
</summary>
@@ -66420,7 +66588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="3202">
+<interface name="fs_rw_hugetlbfs_files" lineno="3267">
<summary>
Read and write hugetlbfs files.
</summary>
@@ -66430,7 +66598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3220">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3285">
<summary>
Read, map and write hugetlbfs files.
</summary>
@@ -66440,7 +66608,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_hugetlbfs" lineno="3239">
+<interface name="fs_associate_hugetlbfs" lineno="3304">
<summary>
Allow the type to associate to hugetlbfs filesystems.
</summary>
@@ -66450,7 +66618,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_search_inotifyfs" lineno="3257">
+<interface name="fs_search_inotifyfs" lineno="3322">
<summary>
Search inotifyfs filesystem.
</summary>
@@ -66460,7 +66628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_inotifyfs" lineno="3275">
+<interface name="fs_list_inotifyfs" lineno="3340">
<summary>
List inotifyfs filesystem.
</summary>
@@ -66470,7 +66638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="3293">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="3358">
<summary>
Dontaudit List inotifyfs filesystem.
</summary>
@@ -66480,7 +66648,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="3327">
+<interface name="fs_hugetlbfs_filetrans" lineno="3392">
<summary>
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
@@ -66506,7 +66674,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_mount_iso9660_fs" lineno="3347">
+<interface name="fs_mount_iso9660_fs" lineno="3412">
<summary>
Mount an iso9660 filesystem, which
is usually used on CDs.
@@ -66517,7 +66685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_iso9660_fs" lineno="3367">
+<interface name="fs_remount_iso9660_fs" lineno="3432">
<summary>
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
@@ -66529,7 +66697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="3386">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="3451">
<summary>
Allow changing of the label of a
filesystem with iso9660 type
@@ -66540,7 +66708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_iso9660_fs" lineno="3405">
+<interface name="fs_unmount_iso9660_fs" lineno="3470">
<summary>
Unmount an iso9660 filesystem, which
is usually used on CDs.
@@ -66551,7 +66719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_iso9660_fs" lineno="3425">
+<interface name="fs_getattr_iso9660_fs" lineno="3490">
<summary>
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
@@ -66563,7 +66731,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_iso9660_files" lineno="3444">
+<interface name="fs_getattr_iso9660_files" lineno="3509">
<summary>
Get the attributes of files on an iso9660
filesystem, which is usually used on CDs.
@@ -66574,7 +66742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_iso9660_files" lineno="3464">
+<interface name="fs_read_iso9660_files" lineno="3529">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
@@ -66585,7 +66753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfs" lineno="3484">
+<interface name="fs_mount_nfs" lineno="3549">
<summary>
Mount a NFS filesystem.
</summary>
@@ -66595,7 +66763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfs" lineno="3503">
+<interface name="fs_remount_nfs" lineno="3568">
<summary>
Remount a NFS filesystem. This allows
some mount options to be changed.
@@ -66606,7 +66774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfs" lineno="3521">
+<interface name="fs_unmount_nfs" lineno="3586">
<summary>
Unmount a NFS filesystem.
</summary>
@@ -66616,7 +66784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfs" lineno="3540">
+<interface name="fs_getattr_nfs" lineno="3605">
<summary>
Get the attributes of a NFS filesystem.
</summary>
@@ -66627,7 +66795,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_nfs" lineno="3558">
+<interface name="fs_search_nfs" lineno="3623">
<summary>
Search directories on a NFS filesystem.
</summary>
@@ -66637,7 +66805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfs" lineno="3576">
+<interface name="fs_list_nfs" lineno="3641">
<summary>
List NFS filesystem.
</summary>
@@ -66647,7 +66815,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_nfs" lineno="3595">
+<interface name="fs_dontaudit_list_nfs" lineno="3660">
<summary>
Do not audit attempts to list the contents
of directories on a NFS filesystem.
@@ -66658,7 +66826,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_watch_nfs_dirs" lineno="3614">
+<interface name="fs_watch_nfs_dirs" lineno="3679">
<summary>
Add a watch on directories on an NFS
filesystem.
@@ -66669,7 +66837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_nfs" lineno="3632">
+<interface name="fs_mounton_nfs" lineno="3697">
<summary>
Mounton a NFS filesystem.
</summary>
@@ -66679,7 +66847,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_files" lineno="3651">
+<interface name="fs_read_nfs_files" lineno="3716">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -66690,7 +66858,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="3671">
+<interface name="fs_dontaudit_read_nfs_files" lineno="3736">
<summary>
Do not audit attempts to read
files on a NFS filesystem.
@@ -66701,7 +66869,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_write_nfs_files" lineno="3689">
+<interface name="fs_write_nfs_files" lineno="3754">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -66711,7 +66879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_nfs_files" lineno="3709">
+<interface name="fs_exec_nfs_files" lineno="3774">
<summary>
Execute files on a NFS filesystem.
</summary>
@@ -66722,7 +66890,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_append_nfs_files" lineno="3730">
+<interface name="fs_append_nfs_files" lineno="3795">
<summary>
Append files
on a NFS filesystem.
@@ -66734,7 +66902,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="3750">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3815">
<summary>
dontaudit Append files
on a NFS filesystem.
@@ -66746,7 +66914,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="3769">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3834">
<summary>
Do not audit attempts to read or
write files on a NFS filesystem.
@@ -66757,7 +66925,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_watch_nfs_files" lineno="3787">
+<interface name="fs_watch_nfs_files" lineno="3852">
<summary>
Add a watch on files on an NFS filesystem.
</summary>
@@ -66767,7 +66935,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_symlinks" lineno="3805">
+<interface name="fs_read_nfs_symlinks" lineno="3870">
<summary>
Read symbolic links on a NFS filesystem.
</summary>
@@ -66777,7 +66945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3824">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3889">
<summary>
Dontaudit read symbolic links on a NFS filesystem.
</summary>
@@ -66787,7 +66955,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_sockets" lineno="3842">
+<interface name="fs_read_nfs_named_sockets" lineno="3907">
<summary>
Read named sockets on a NFS filesystem.
</summary>
@@ -66797,7 +66965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_pipes" lineno="3861">
+<interface name="fs_read_nfs_named_pipes" lineno="3926">
<summary>
Read named pipes on a NFS network filesystem.
</summary>
@@ -66808,7 +66976,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3880">
+<interface name="fs_getattr_rpc_dirs" lineno="3945">
<summary>
Get the attributes of directories of RPC
file system pipes.
@@ -66819,7 +66987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_rpc" lineno="3899">
+<interface name="fs_search_rpc" lineno="3964">
<summary>
Search directories of RPC file system pipes.
</summary>
@@ -66829,7 +66997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_removable" lineno="3917">
+<interface name="fs_search_removable" lineno="3982">
<summary>
Search removable storage directories.
</summary>
@@ -66839,7 +67007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_removable" lineno="3935">
+<interface name="fs_dontaudit_list_removable" lineno="4000">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
@@ -66849,7 +67017,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_files" lineno="3953">
+<interface name="fs_read_removable_files" lineno="4018">
<summary>
Read removable storage files.
</summary>
@@ -66859,7 +67027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3971">
+<interface name="fs_dontaudit_read_removable_files" lineno="4036">
<summary>
Do not audit attempts to read removable storage files.
</summary>
@@ -66869,7 +67037,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3989">
+<interface name="fs_dontaudit_write_removable_files" lineno="4054">
<summary>
Do not audit attempts to write removable storage files.
</summary>
@@ -66879,7 +67047,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_symlinks" lineno="4007">
+<interface name="fs_read_removable_symlinks" lineno="4072">
<summary>
Read removable storage symbolic links.
</summary>
@@ -66889,7 +67057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_blk_files" lineno="4025">
+<interface name="fs_read_removable_blk_files" lineno="4090">
<summary>
Read block nodes on removable filesystems.
</summary>
@@ -66899,7 +67067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_removable_blk_files" lineno="4044">
+<interface name="fs_rw_removable_blk_files" lineno="4109">
<summary>
Read and write block nodes on removable filesystems.
</summary>
@@ -66909,7 +67077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_rpc" lineno="4063">
+<interface name="fs_list_rpc" lineno="4128">
<summary>
Read directories of RPC file system pipes.
</summary>
@@ -66919,7 +67087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_files" lineno="4081">
+<interface name="fs_read_rpc_files" lineno="4146">
<summary>
Read files of RPC file system pipes.
</summary>
@@ -66929,7 +67097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_symlinks" lineno="4099">
+<interface name="fs_read_rpc_symlinks" lineno="4164">
<summary>
Read symbolic links of RPC file system pipes.
</summary>
@@ -66939,7 +67107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_sockets" lineno="4117">
+<interface name="fs_read_rpc_sockets" lineno="4182">
<summary>
Read sockets of RPC file system pipes.
</summary>
@@ -66949,7 +67117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_sockets" lineno="4135">
+<interface name="fs_rw_rpc_sockets" lineno="4200">
<summary>
Read and write sockets of RPC file system pipes.
</summary>
@@ -66959,7 +67127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_dirs" lineno="4155">
+<interface name="fs_manage_nfs_dirs" lineno="4220">
<summary>
Create, read, write, and delete directories
on a NFS filesystem.
@@ -66971,7 +67139,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4175">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4240">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -66983,7 +67151,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_files" lineno="4195">
+<interface name="fs_manage_nfs_files" lineno="4260">
<summary>
Create, read, write, and delete files
on a NFS filesystem.
@@ -66995,7 +67163,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="4215">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="4280">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -67007,7 +67175,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_symlinks" lineno="4235">
+<interface name="fs_manage_nfs_symlinks" lineno="4300">
<summary>
Create, read, write, and delete symbolic links
on a NFS network filesystem.
@@ -67019,7 +67187,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="4254">
+<interface name="fs_manage_nfs_named_pipes" lineno="4319">
<summary>
Create, read, write, and delete named pipes
on a NFS filesystem.
@@ -67030,7 +67198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="4273">
+<interface name="fs_manage_nfs_named_sockets" lineno="4338">
<summary>
Create, read, write, and delete named sockets
on a NFS filesystem.
@@ -67041,7 +67209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_nfs_domtrans" lineno="4316">
+<interface name="fs_nfs_domtrans" lineno="4381">
<summary>
Execute a file on a NFS filesystem
in the specified domain.
@@ -67076,7 +67244,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfsd_fs" lineno="4335">
+<interface name="fs_mount_nfsd_fs" lineno="4400">
<summary>
Mount a NFS server pseudo filesystem.
</summary>
@@ -67086,7 +67254,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfsd_fs" lineno="4354">
+<interface name="fs_remount_nfsd_fs" lineno="4419">
<summary>
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
@@ -67097,7 +67265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfsd_fs" lineno="4372">
+<interface name="fs_unmount_nfsd_fs" lineno="4437">
<summary>
Unmount a NFS server pseudo filesystem.
</summary>
@@ -67107,7 +67275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_fs" lineno="4391">
+<interface name="fs_getattr_nfsd_fs" lineno="4456">
<summary>
Get the attributes of a NFS server
pseudo filesystem.
@@ -67118,7 +67286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_nfsd_fs" lineno="4409">
+<interface name="fs_search_nfsd_fs" lineno="4474">
<summary>
Search NFS server directories.
</summary>
@@ -67128,7 +67296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfsd_fs" lineno="4427">
+<interface name="fs_list_nfsd_fs" lineno="4492">
<summary>
List NFS server directories.
</summary>
@@ -67138,7 +67306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_nfsd_dirs" lineno="4445">
+<interface name="fs_watch_nfsd_dirs" lineno="4510">
<summary>
Watch NFS server directories.
</summary>
@@ -67148,7 +67316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_files" lineno="4463">
+<interface name="fs_getattr_nfsd_files" lineno="4528">
<summary>
Getattr files on an nfsd filesystem
</summary>
@@ -67158,7 +67326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_nfsd_fs" lineno="4481">
+<interface name="fs_rw_nfsd_fs" lineno="4546">
<summary>
Read and write NFS server files.
</summary>
@@ -67168,7 +67336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nsfs_files" lineno="4499">
+<interface name="fs_getattr_nsfs_files" lineno="4564">
<summary>
Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -67178,7 +67346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nsfs_files" lineno="4517">
+<interface name="fs_read_nsfs_files" lineno="4582">
<summary>
Read nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -67188,7 +67356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_nfsd_files" lineno="4535">
+<interface name="fs_watch_nfsd_files" lineno="4600">
<summary>
Watch NFS server files.
</summary>
@@ -67198,7 +67366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nsfs" lineno="4553">
+<interface name="fs_getattr_nsfs" lineno="4618">
<summary>
Get the attributes of an nsfs filesystem.
</summary>
@@ -67208,7 +67376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nsfs" lineno="4571">
+<interface name="fs_unmount_nsfs" lineno="4636">
<summary>
Unmount an nsfs filesystem.
</summary>
@@ -67218,7 +67386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstorefs" lineno="4589">
+<interface name="fs_getattr_pstorefs" lineno="4654">
<summary>
Get the attributes of a pstore filesystem.
</summary>
@@ -67228,7 +67396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstore_dirs" lineno="4608">
+<interface name="fs_getattr_pstore_dirs" lineno="4673">
<summary>
Get the attributes of directories
of a pstore filesystem.
@@ -67239,7 +67407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_pstore_dirs" lineno="4627">
+<interface name="fs_create_pstore_dirs" lineno="4692">
<summary>
Create pstore directories.
</summary>
@@ -67249,7 +67417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_pstore_dirs" lineno="4646">
+<interface name="fs_relabel_pstore_dirs" lineno="4711">
<summary>
Relabel to/from pstore_t directories.
</summary>
@@ -67259,7 +67427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_pstore_dirs" lineno="4665">
+<interface name="fs_list_pstore_dirs" lineno="4730">
<summary>
List the directories
of a pstore filesystem.
@@ -67270,7 +67438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_pstore_files" lineno="4684">
+<interface name="fs_read_pstore_files" lineno="4749">
<summary>
Read pstore_t files
</summary>
@@ -67280,7 +67448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_delete_pstore_files" lineno="4703">
+<interface name="fs_delete_pstore_files" lineno="4768">
<summary>
Delete the files
of a pstore filesystem.
@@ -67291,7 +67459,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_ramfs" lineno="4722">
+<interface name="fs_associate_ramfs" lineno="4787">
<summary>
Allow the type to associate to ramfs filesystems.
</summary>
@@ -67301,7 +67469,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_mount_ramfs" lineno="4740">
+<interface name="fs_mount_ramfs" lineno="4805">
<summary>
Mount a RAM filesystem.
</summary>
@@ -67311,7 +67479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_ramfs" lineno="4759">
+<interface name="fs_remount_ramfs" lineno="4824">
<summary>
Remount a RAM filesystem. This allows
some mount options to be changed.
@@ -67322,7 +67490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_ramfs" lineno="4777">
+<interface name="fs_unmount_ramfs" lineno="4842">
<summary>
Unmount a RAM filesystem.
</summary>
@@ -67332,7 +67500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_ramfs" lineno="4795">
+<interface name="fs_getattr_ramfs" lineno="4860">
<summary>
Get the attributes of a RAM filesystem.
</summary>
@@ -67342,7 +67510,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_ramfs" lineno="4813">
+<interface name="fs_search_ramfs" lineno="4878">
<summary>
Search directories on a ramfs
</summary>
@@ -67352,7 +67520,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="4831">
+<interface name="fs_dontaudit_search_ramfs" lineno="4896">
<summary>
Dontaudit Search directories on a ramfs
</summary>
@@ -67362,7 +67530,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_setattr_ramfs_dirs" lineno="4850">
+<interface name="fs_setattr_ramfs_dirs" lineno="4915">
<summary>
Set the attributes of directories on
a ramfs.
@@ -67373,7 +67541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_dirs" lineno="4869">
+<interface name="fs_manage_ramfs_dirs" lineno="4934">
<summary>
Create, read, write, and delete
directories on a ramfs.
@@ -67384,7 +67552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="4887">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4952">
<summary>
Dontaudit read on a ramfs files.
</summary>
@@ -67394,7 +67562,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4905">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4970">
<summary>
Dontaudit read on a ramfs fifo_files.
</summary>
@@ -67404,7 +67572,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_files" lineno="4924">
+<interface name="fs_manage_ramfs_files" lineno="4989">
<summary>
Create, read, write, and delete
files on a ramfs filesystem.
@@ -67415,7 +67583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_pipes" lineno="4942">
+<interface name="fs_write_ramfs_pipes" lineno="5007">
<summary>
Write to named pipe on a ramfs filesystem.
</summary>
@@ -67425,7 +67593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4961">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="5026">
<summary>
Do not audit attempts to write to named
pipes on a ramfs filesystem.
@@ -67436,7 +67604,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_rw_ramfs_pipes" lineno="4979">
+<interface name="fs_rw_ramfs_pipes" lineno="5044">
<summary>
Read and write a named pipe on a ramfs filesystem.
</summary>
@@ -67446,7 +67614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_pipes" lineno="4998">
+<interface name="fs_manage_ramfs_pipes" lineno="5063">
<summary>
Create, read, write, and delete
named pipes on a ramfs filesystem.
@@ -67457,7 +67625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_sockets" lineno="5016">
+<interface name="fs_write_ramfs_sockets" lineno="5081">
<summary>
Write to named socket on a ramfs filesystem.
</summary>
@@ -67467,7 +67635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_sockets" lineno="5035">
+<interface name="fs_manage_ramfs_sockets" lineno="5100">
<summary>
Create, read, write, and delete
named sockets on a ramfs filesystem.
@@ -67478,7 +67646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_romfs" lineno="5053">
+<interface name="fs_mount_romfs" lineno="5118">
<summary>
Mount a ROM filesystem.
</summary>
@@ -67488,7 +67656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_romfs" lineno="5072">
+<interface name="fs_remount_romfs" lineno="5137">
<summary>
Remount a ROM filesystem. This allows
some mount options to be changed.
@@ -67499,7 +67667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_romfs" lineno="5090">
+<interface name="fs_unmount_romfs" lineno="5155">
<summary>
Unmount a ROM filesystem.
</summary>
@@ -67509,7 +67677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_romfs" lineno="5109">
+<interface name="fs_getattr_romfs" lineno="5174">
<summary>
Get the attributes of a ROM
filesystem.
@@ -67520,7 +67688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_rpc_pipefs" lineno="5127">
+<interface name="fs_mount_rpc_pipefs" lineno="5192">
<summary>
Mount a RPC pipe filesystem.
</summary>
@@ -67530,7 +67698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_rpc_pipefs" lineno="5146">
+<interface name="fs_remount_rpc_pipefs" lineno="5211">
<summary>
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
@@ -67541,7 +67709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="5164">
+<interface name="fs_unmount_rpc_pipefs" lineno="5229">
<summary>
Unmount a RPC pipe filesystem.
</summary>
@@ -67551,7 +67719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="5183">
+<interface name="fs_getattr_rpc_pipefs" lineno="5248">
<summary>
Get the attributes of a RPC pipe
filesystem.
@@ -67562,7 +67730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="5201">
+<interface name="fs_rw_rpc_named_pipes" lineno="5266">
<summary>
Read and write RPC pipe filesystem named pipes.
</summary>
@@ -67572,7 +67740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_rpc_pipefs_dirs" lineno="5219">
+<interface name="fs_watch_rpc_pipefs_dirs" lineno="5284">
<summary>
Watch RPC pipe filesystem directories.
</summary>
@@ -67582,7 +67750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_tmpfs" lineno="5237">
+<interface name="fs_mount_tmpfs" lineno="5302">
<summary>
Mount a tmpfs filesystem.
</summary>
@@ -67592,7 +67760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_tmpfs" lineno="5255">
+<interface name="fs_remount_tmpfs" lineno="5320">
<summary>
Remount a tmpfs filesystem.
</summary>
@@ -67602,7 +67770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_tmpfs" lineno="5273">
+<interface name="fs_unmount_tmpfs" lineno="5338">
<summary>
Unmount a tmpfs filesystem.
</summary>
@@ -67612,7 +67780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="5291">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="5356">
<summary>
Do not audit getting the attributes of a tmpfs filesystem
</summary>
@@ -67622,7 +67790,7 @@ Domain to not audit
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs" lineno="5311">
+<interface name="fs_getattr_tmpfs" lineno="5376">
<summary>
Get the attributes of a tmpfs
filesystem.
@@ -67634,7 +67802,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_associate_tmpfs" lineno="5329">
+<interface name="fs_associate_tmpfs" lineno="5394">
<summary>
Allow the type to associate to tmpfs filesystems.
</summary>
@@ -67644,7 +67812,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="5347">
+<interface name="fs_relabelfrom_tmpfs" lineno="5412">
<summary>
Relabel from tmpfs filesystem.
</summary>
@@ -67654,7 +67822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="5365">
+<interface name="fs_getattr_tmpfs_dirs" lineno="5430">
<summary>
Get the attributes of tmpfs directories.
</summary>
@@ -67664,7 +67832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5384">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5449">
<summary>
Do not audit attempts to get the attributes
of tmpfs directories.
@@ -67675,7 +67843,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs" lineno="5402">
+<interface name="fs_mounton_tmpfs" lineno="5467">
<summary>
Mount on tmpfs directories.
</summary>
@@ -67685,7 +67853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs_files" lineno="5420">
+<interface name="fs_mounton_tmpfs_files" lineno="5485">
<summary>
Mount on tmpfs files.
</summary>
@@ -67695,7 +67863,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="5438">
+<interface name="fs_setattr_tmpfs_dirs" lineno="5503">
<summary>
Set the attributes of tmpfs directories.
</summary>
@@ -67705,7 +67873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tmpfs" lineno="5456">
+<interface name="fs_search_tmpfs" lineno="5521">
<summary>
Search tmpfs directories.
</summary>
@@ -67715,7 +67883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_tmpfs" lineno="5474">
+<interface name="fs_list_tmpfs" lineno="5539">
<summary>
List the contents of generic tmpfs directories.
</summary>
@@ -67725,7 +67893,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="5493">
+<interface name="fs_dontaudit_list_tmpfs" lineno="5558">
<summary>
Do not audit attempts to list the
contents of generic tmpfs directories.
@@ -67736,7 +67904,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="5512">
+<interface name="fs_manage_tmpfs_dirs" lineno="5577">
<summary>
Create, read, write, and delete
tmpfs directories
@@ -67747,7 +67915,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5531">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5596">
<summary>
Do not audit attempts to write
tmpfs directories
@@ -67758,7 +67926,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5549">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5614">
<summary>
Relabel from tmpfs_t dir
</summary>
@@ -67768,7 +67936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="5567">
+<interface name="fs_relabel_tmpfs_dirs" lineno="5632">
<summary>
Relabel directory on tmpfs filesystems.
</summary>
@@ -67778,7 +67946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_tmpfs_dirs" lineno="5584">
+<interface name="fs_watch_tmpfs_dirs" lineno="5649">
<summary>
Watch directories on tmpfs filesystems.
</summary>
@@ -67788,7 +67956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_tmpfs_filetrans" lineno="5618">
+<interface name="fs_tmpfs_filetrans" lineno="5683">
<summary>
Create an object in a tmpfs filesystem, with a private
type using a type transition.
@@ -67814,7 +67982,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5638">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5703">
<summary>
Do not audit attempts to getattr
generic tmpfs files.
@@ -67825,7 +67993,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5657">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5722">
<summary>
Do not audit attempts to read or write
generic tmpfs files.
@@ -67836,7 +68004,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="5675">
+<interface name="fs_delete_tmpfs_symlinks" lineno="5740">
<summary>
Delete tmpfs symbolic links.
</summary>
@@ -67846,7 +68014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_auto_mountpoints" lineno="5694">
+<interface name="fs_manage_auto_mountpoints" lineno="5759">
<summary>
Create, read, write, and delete
auto moutpoints.
@@ -67857,7 +68025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_files" lineno="5712">
+<interface name="fs_read_tmpfs_files" lineno="5777">
<summary>
Read generic tmpfs files.
</summary>
@@ -67867,7 +68035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_files" lineno="5730">
+<interface name="fs_rw_tmpfs_files" lineno="5795">
<summary>
Read and write generic tmpfs files.
</summary>
@@ -67877,7 +68045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_files" lineno="5748">
+<interface name="fs_relabel_tmpfs_files" lineno="5813">
<summary>
Relabel files on tmpfs filesystems.
</summary>
@@ -67887,7 +68055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="5766">
+<interface name="fs_read_tmpfs_symlinks" lineno="5831">
<summary>
Read tmpfs link files.
</summary>
@@ -67897,7 +68065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5784">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5849">
<summary>
Relabelfrom socket files on tmpfs filesystems.
</summary>
@@ -67907,7 +68075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5802">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5867">
<summary>
Relabelfrom tmpfs link files.
</summary>
@@ -67917,7 +68085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="5820">
+<interface name="fs_rw_tmpfs_chr_files" lineno="5885">
<summary>
Read and write character nodes on tmpfs filesystems.
</summary>
@@ -67927,7 +68095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5839">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5904">
<summary>
dontaudit Read and write character nodes on tmpfs filesystems.
</summary>
@@ -67937,7 +68105,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_chr_files" lineno="5858">
+<interface name="fs_relabel_tmpfs_chr_files" lineno="5923">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
@@ -67947,7 +68115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="5877">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5942">
<summary>
Read and write block nodes on tmpfs filesystems.
</summary>
@@ -67957,7 +68125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_blk_files" lineno="5896">
+<interface name="fs_relabel_tmpfs_blk_files" lineno="5961">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
@@ -67967,7 +68135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_fifo_files" lineno="5915">
+<interface name="fs_relabel_tmpfs_fifo_files" lineno="5980">
<summary>
Relabel named pipes on tmpfs filesystems.
</summary>
@@ -67977,7 +68145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_files" lineno="5935">
+<interface name="fs_manage_tmpfs_files" lineno="6000">
<summary>
Read and write, create and delete generic
files on tmpfs filesystems.
@@ -67988,7 +68156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="5954">
+<interface name="fs_manage_tmpfs_symlinks" lineno="6019">
<summary>
Read and write, create and delete symbolic
links on tmpfs filesystems.
@@ -67999,7 +68167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="5973">
+<interface name="fs_manage_tmpfs_sockets" lineno="6038">
<summary>
Read and write, create and delete socket
files on tmpfs filesystems.
@@ -68010,7 +68178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="5992">
+<interface name="fs_manage_tmpfs_chr_files" lineno="6057">
<summary>
Read and write, create and delete character
nodes on tmpfs filesystems.
@@ -68021,7 +68189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="6011">
+<interface name="fs_manage_tmpfs_blk_files" lineno="6076">
<summary>
Read and write, create and delete block nodes
on tmpfs filesystems.
@@ -68032,7 +68200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs" lineno="6029">
+<interface name="fs_getattr_tracefs" lineno="6094">
<summary>
Get the attributes of a trace filesystem.
</summary>
@@ -68042,7 +68210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="6047">
+<interface name="fs_getattr_tracefs_dirs" lineno="6112">
<summary>
Get attributes of dirs on tracefs filesystem.
</summary>
@@ -68052,7 +68220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tracefs" lineno="6065">
+<interface name="fs_search_tracefs" lineno="6130">
<summary>
search directories on a tracefs filesystem
</summary>
@@ -68062,7 +68230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_files" lineno="6084">
+<interface name="fs_getattr_tracefs_files" lineno="6149">
<summary>
Get the attributes of files
on a trace filesystem.
@@ -68073,7 +68241,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_xenfs" lineno="6102">
+<interface name="fs_rw_tracefs_files" lineno="6167">
+<summary>
+Read/write trace filesystem files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_create_tracefs_dirs" lineno="6186">
+<summary>
+create trace filesystem directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mount_xenfs" lineno="6204">
<summary>
Mount a XENFS filesystem.
</summary>
@@ -68083,7 +68271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_xenfs" lineno="6120">
+<interface name="fs_search_xenfs" lineno="6222">
<summary>
Search the XENFS filesystem.
</summary>
@@ -68093,7 +68281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_dirs" lineno="6140">
+<interface name="fs_manage_xenfs_dirs" lineno="6242">
<summary>
Create, read, write, and delete directories
on a XENFS filesystem.
@@ -68105,7 +68293,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6160">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6262">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -68117,7 +68305,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_files" lineno="6180">
+<interface name="fs_manage_xenfs_files" lineno="6282">
<summary>
Create, read, write, and delete files
on a XENFS filesystem.
@@ -68129,7 +68317,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_xenfs_files" lineno="6198">
+<interface name="fs_mmap_xenfs_files" lineno="6300">
<summary>
Map files a XENFS filesystem.
</summary>
@@ -68139,7 +68327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="6218">
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="6320">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -68151,7 +68339,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_all_fs" lineno="6236">
+<interface name="fs_mount_all_fs" lineno="6338">
<summary>
Mount all filesystems.
</summary>
@@ -68161,7 +68349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_all_fs" lineno="6255">
+<interface name="fs_remount_all_fs" lineno="6357">
<summary>
Remount all filesystems. This
allows some mount options to be changed.
@@ -68172,7 +68360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_all_fs" lineno="6273">
+<interface name="fs_unmount_all_fs" lineno="6375">
<summary>
Unmount all filesystems.
</summary>
@@ -68182,7 +68370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_fs" lineno="6305">
+<interface name="fs_getattr_all_fs" lineno="6407">
<summary>
Get the attributes of all filesystems.
</summary>
@@ -68206,7 +68394,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="6325">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="6427">
<summary>
Do not audit attempts to get the attributes
all filesystems.
@@ -68217,7 +68405,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_get_all_fs_quotas" lineno="6344">
+<interface name="fs_get_all_fs_quotas" lineno="6446">
<summary>
Get the quotas of all filesystems.
</summary>
@@ -68228,7 +68416,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_set_all_quotas" lineno="6363">
+<interface name="fs_set_all_quotas" lineno="6465">
<summary>
Set the quotas of all filesystems.
</summary>
@@ -68239,7 +68427,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_all_fs" lineno="6381">
+<interface name="fs_relabelfrom_all_fs" lineno="6483">
<summary>
Relabelfrom all filesystems.
</summary>
@@ -68249,7 +68437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_dirs" lineno="6400">
+<interface name="fs_getattr_all_dirs" lineno="6502">
<summary>
Get the attributes of all directories
with a filesystem type.
@@ -68260,7 +68448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_all" lineno="6418">
+<interface name="fs_search_all" lineno="6520">
<summary>
Search all directories with a filesystem type.
</summary>
@@ -68270,7 +68458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_all" lineno="6436">
+<interface name="fs_list_all" lineno="6538">
<summary>
List all directories with a filesystem type.
</summary>
@@ -68280,7 +68468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_files" lineno="6455">
+<interface name="fs_getattr_all_files" lineno="6557">
<summary>
Get the attributes of all files with
a filesystem type.
@@ -68291,7 +68479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="6474">
+<interface name="fs_dontaudit_getattr_all_files" lineno="6576">
<summary>
Do not audit attempts to get the attributes
of all files with a filesystem type.
@@ -68302,7 +68490,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_symlinks" lineno="6493">
+<interface name="fs_getattr_all_symlinks" lineno="6595">
<summary>
Get the attributes of all symbolic links with
a filesystem type.
@@ -68313,7 +68501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6512">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6614">
<summary>
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
@@ -68324,7 +68512,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_pipes" lineno="6531">
+<interface name="fs_getattr_all_pipes" lineno="6633">
<summary>
Get the attributes of all named pipes with
a filesystem type.
@@ -68335,7 +68523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="6550">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="6652">
<summary>
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
@@ -68346,7 +68534,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_sockets" lineno="6569">
+<interface name="fs_getattr_all_sockets" lineno="6671">
<summary>
Get the attributes of all named sockets with
a filesystem type.
@@ -68357,7 +68545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="6588">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="6690">
<summary>
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
@@ -68368,7 +68556,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_blk_files" lineno="6607">
+<interface name="fs_getattr_all_blk_files" lineno="6709">
<summary>
Get the attributes of all block device nodes with
a filesystem type.
@@ -68379,7 +68567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_chr_files" lineno="6626">
+<interface name="fs_getattr_all_chr_files" lineno="6728">
<summary>
Get the attributes of all character device nodes with
a filesystem type.
@@ -68390,7 +68578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unconfined" lineno="6644">
+<interface name="fs_unconfined" lineno="6746">
<summary>
Unconfined access to filesystems
</summary>
@@ -69279,7 +69467,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_search_xen_state" lineno="1549">
+<interface name="kernel_read_psi" lineno="1549">
+<summary>
+Allow caller to receive pressure stall information (PSI).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="kernel_rw_psi" lineno="1570">
+<summary>
+Allow caller to set up pressure stall information (PSI).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="kernel_search_xen_state" lineno="1594">
<summary>
Allow searching of xen state directory.
</summary>
@@ -69290,7 +69500,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_dontaudit_search_xen_state" lineno="1569">
+<interface name="kernel_dontaudit_search_xen_state" lineno="1614">
<summary>
Do not audit attempts to search the xen
state directory.
@@ -69302,7 +69512,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_read_xen_state" lineno="1588">
+<interface name="kernel_read_xen_state" lineno="1633">
<summary>
Allow caller to read the xen state information.
</summary>
@@ -69313,7 +69523,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_read_xen_state_symlinks" lineno="1610">
+<interface name="kernel_read_xen_state_symlinks" lineno="1655">
<summary>
Allow caller to read the xen state symbolic links.
</summary>
@@ -69324,7 +69534,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_write_xen_state" lineno="1631">
+<interface name="kernel_write_xen_state" lineno="1676">
<summary>
Allow caller to write xen state information.
</summary>
@@ -69335,7 +69545,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_list_all_proc" lineno="1649">
+<interface name="kernel_list_all_proc" lineno="1694">
<summary>
Allow attempts to list all proc directories.
</summary>
@@ -69345,7 +69555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_all_proc" lineno="1668">
+<interface name="kernel_dontaudit_list_all_proc" lineno="1713">
<summary>
Do not audit attempts to list all proc directories.
</summary>
@@ -69355,7 +69565,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_write_non_proc_init_mountpoint_files" lineno="1687">
+<interface name="kernel_write_non_proc_init_mountpoint_files" lineno="1732">
<summary>
Write systemd mountpoint files except proc entries.
</summary>
@@ -69365,7 +69575,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_create_non_proc_init_mountpoint_files" lineno="1705">
+<interface name="kernel_create_non_proc_init_mountpoint_files" lineno="1750">
<summary>
Create systemd mountpoint files except proc entries.
</summary>
@@ -69375,7 +69585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_sysctl" lineno="1725">
+<interface name="kernel_dontaudit_search_sysctl" lineno="1770">
<summary>
Do not audit attempts by caller to search
the base directory of sysctls.
@@ -69387,7 +69597,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_mounton_sysctl_dirs" lineno="1744">
+<interface name="kernel_mounton_sysctl_dirs" lineno="1789">
<summary>
Mount on sysctl_t dirs.
</summary>
@@ -69398,7 +69608,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_sysctl" lineno="1764">
+<interface name="kernel_read_sysctl" lineno="1809">
<summary>
Allow access to read sysctl directories.
</summary>
@@ -69409,7 +69619,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_mounton_sysctl_files" lineno="1784">
+<interface name="kernel_mounton_sysctl_files" lineno="1829">
<summary>
Mount on sysctl files.
</summary>
@@ -69420,7 +69630,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_device_sysctls" lineno="1804">
+<interface name="kernel_read_device_sysctls" lineno="1849">
<summary>
Allow caller to read the device sysctls.
</summary>
@@ -69431,7 +69641,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_device_sysctls" lineno="1825">
+<interface name="kernel_rw_device_sysctls" lineno="1870">
<summary>
Read and write device sysctls.
</summary>
@@ -69442,7 +69652,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_vm_sysctl" lineno="1845">
+<interface name="kernel_search_vm_sysctl" lineno="1890">
<summary>
Allow caller to search virtual memory sysctls.
</summary>
@@ -69452,7 +69662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_sysctls" lineno="1864">
+<interface name="kernel_read_vm_sysctls" lineno="1909">
<summary>
Allow caller to read virtual memory sysctls.
</summary>
@@ -69463,7 +69673,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_sysctls" lineno="1885">
+<interface name="kernel_rw_vm_sysctls" lineno="1930">
<summary>
Read and write virtual memory sysctls.
</summary>
@@ -69474,7 +69684,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_network_sysctl" lineno="1907">
+<interface name="kernel_search_network_sysctl" lineno="1952">
<summary>
Search network sysctl directories.
</summary>
@@ -69484,7 +69694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_network_sysctl" lineno="1925">
+<interface name="kernel_dontaudit_search_network_sysctl" lineno="1970">
<summary>
Do not audit attempts by caller to search network sysctl directories.
</summary>
@@ -69494,7 +69704,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_net_sysctls" lineno="1944">
+<interface name="kernel_read_net_sysctls" lineno="1989">
<summary>
Allow caller to read network sysctls.
</summary>
@@ -69505,7 +69715,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_net_sysctls" lineno="1965">
+<interface name="kernel_rw_net_sysctls" lineno="2010">
<summary>
Allow caller to modiry contents of sysctl network files.
</summary>
@@ -69516,7 +69726,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_unix_sysctls" lineno="1987">
+<interface name="kernel_read_unix_sysctls" lineno="2032">
<summary>
Allow caller to read unix domain
socket sysctls.
@@ -69528,7 +69738,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_unix_sysctls" lineno="2009">
+<interface name="kernel_rw_unix_sysctls" lineno="2054">
<summary>
Read and write unix domain
socket sysctls.
@@ -69540,7 +69750,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_hotplug_sysctls" lineno="2030">
+<interface name="kernel_read_hotplug_sysctls" lineno="2075">
<summary>
Read the hotplug sysctl.
</summary>
@@ -69551,7 +69761,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_hotplug_sysctls" lineno="2051">
+<interface name="kernel_rw_hotplug_sysctls" lineno="2096">
<summary>
Read and write the hotplug sysctl.
</summary>
@@ -69562,7 +69772,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_modprobe_sysctls" lineno="2072">
+<interface name="kernel_read_modprobe_sysctls" lineno="2117">
<summary>
Read the modprobe sysctl.
</summary>
@@ -69573,7 +69783,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_modprobe_sysctls" lineno="2093">
+<interface name="kernel_rw_modprobe_sysctls" lineno="2138">
<summary>
Read and write the modprobe sysctl.
</summary>
@@ -69584,7 +69794,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2113">
+<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2158">
<summary>
Do not audit attempts to search generic kernel sysctls.
</summary>
@@ -69594,7 +69804,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2131">
+<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2176">
<summary>
Do not audit attempted reading of kernel sysctls
</summary>
@@ -69604,7 +69814,7 @@ Domain to not audit accesses from
</summary>
</param>
</interface>
-<interface name="kernel_read_crypto_sysctls" lineno="2149">
+<interface name="kernel_read_crypto_sysctls" lineno="2194">
<summary>
Read generic crypto sysctls.
</summary>
@@ -69614,7 +69824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_kernel_sysctls" lineno="2190">
+<interface name="kernel_read_kernel_sysctls" lineno="2235">
<summary>
Read general kernel sysctls.
</summary>
@@ -69646,7 +69856,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2210">
+<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2255">
<summary>
Do not audit attempts to write generic kernel sysctls.
</summary>
@@ -69656,7 +69866,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_kernel_sysctl" lineno="2229">
+<interface name="kernel_rw_kernel_sysctl" lineno="2274">
<summary>
Read and write generic kernel sysctls.
</summary>
@@ -69667,7 +69877,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_mounton_kernel_sysctl_files" lineno="2250">
+<interface name="kernel_mounton_kernel_sysctl_files" lineno="2295">
<summary>
Mount on kernel sysctl files.
</summary>
@@ -69678,7 +69888,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2270">
+<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2315">
<summary>
Read kernel ns lastpid sysctls.
</summary>
@@ -69689,7 +69899,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2290">
+<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2335">
<summary>
Do not audit attempts to write kernel ns lastpid sysctls.
</summary>
@@ -69699,7 +69909,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2309">
+<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2354">
<summary>
Read and write kernel ns lastpid sysctls.
</summary>
@@ -69710,7 +69920,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_fs_sysctls" lineno="2330">
+<interface name="kernel_search_fs_sysctls" lineno="2375">
<summary>
Search filesystem sysctl directories.
</summary>
@@ -69721,7 +69931,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_fs_sysctls" lineno="2349">
+<interface name="kernel_read_fs_sysctls" lineno="2394">
<summary>
Read filesystem sysctls.
</summary>
@@ -69732,7 +69942,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_fs_sysctls" lineno="2370">
+<interface name="kernel_rw_fs_sysctls" lineno="2415">
<summary>
Read and write filesystem sysctls.
</summary>
@@ -69743,7 +69953,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_irq_sysctls" lineno="2391">
+<interface name="kernel_read_irq_sysctls" lineno="2436">
<summary>
Read IRQ sysctls.
</summary>
@@ -69754,7 +69964,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2413">
+<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2458">
<summary>
Do not audit attempts to search
filesystem sysctl directories.
@@ -69766,7 +69976,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_irq_sysctls" lineno="2432">
+<interface name="kernel_rw_irq_sysctls" lineno="2477">
<summary>
Read and write IRQ sysctls.
</summary>
@@ -69777,7 +69987,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_rpc_sysctls" lineno="2453">
+<interface name="kernel_read_rpc_sysctls" lineno="2498">
<summary>
Read RPC sysctls.
</summary>
@@ -69788,7 +69998,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_rpc_sysctls" lineno="2474">
+<interface name="kernel_rw_rpc_sysctls" lineno="2519">
<summary>
Read and write RPC sysctls.
</summary>
@@ -69799,7 +70009,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_list_all_sysctls" lineno="2494">
+<interface name="kernel_dontaudit_list_all_sysctls" lineno="2539">
<summary>
Do not audit attempts to list all sysctl directories.
</summary>
@@ -69809,7 +70019,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_all_sysctls" lineno="2514">
+<interface name="kernel_read_all_sysctls" lineno="2559">
<summary>
Allow caller to read all sysctls.
</summary>
@@ -69820,7 +70030,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_all_sysctls" lineno="2537">
+<interface name="kernel_rw_all_sysctls" lineno="2582">
<summary>
Read and write all sysctls.
</summary>
@@ -69831,7 +70041,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_associate_proc" lineno="2562">
+<interface name="kernel_associate_proc" lineno="2607">
<summary>
Associate a file to proc_t (/proc)
</summary>
@@ -69842,7 +70052,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_kill_unlabeled" lineno="2579">
+<interface name="kernel_kill_unlabeled" lineno="2624">
<summary>
Send a kill signal to unlabeled processes.
</summary>
@@ -69852,7 +70062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_unlabeled" lineno="2597">
+<interface name="kernel_mount_unlabeled" lineno="2642">
<summary>
Mount a kernel unlabeled filesystem.
</summary>
@@ -69862,7 +70072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_unlabeled" lineno="2615">
+<interface name="kernel_unmount_unlabeled" lineno="2660">
<summary>
Unmount a kernel unlabeled filesystem.
</summary>
@@ -69872,7 +70082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signal_unlabeled" lineno="2633">
+<interface name="kernel_signal_unlabeled" lineno="2678">
<summary>
Send general signals to unlabeled processes.
</summary>
@@ -69882,7 +70092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signull_unlabeled" lineno="2651">
+<interface name="kernel_signull_unlabeled" lineno="2696">
<summary>
Send a null signal to unlabeled processes.
</summary>
@@ -69892,7 +70102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigstop_unlabeled" lineno="2669">
+<interface name="kernel_sigstop_unlabeled" lineno="2714">
<summary>
Send a stop signal to unlabeled processes.
</summary>
@@ -69902,7 +70112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigchld_unlabeled" lineno="2687">
+<interface name="kernel_sigchld_unlabeled" lineno="2732">
<summary>
Send a child terminated signal to unlabeled processes.
</summary>
@@ -69912,7 +70122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_unlabeled_dirs" lineno="2705">
+<interface name="kernel_getattr_unlabeled_dirs" lineno="2750">
<summary>
Get the attributes of unlabeled directories.
</summary>
@@ -69922,7 +70132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_unlabeled" lineno="2723">
+<interface name="kernel_dontaudit_search_unlabeled" lineno="2768">
<summary>
Do not audit attempts to search unlabeled directories.
</summary>
@@ -69932,7 +70142,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_list_unlabeled" lineno="2741">
+<interface name="kernel_list_unlabeled" lineno="2786">
<summary>
List unlabeled directories.
</summary>
@@ -69942,7 +70152,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_state" lineno="2759">
+<interface name="kernel_read_unlabeled_state" lineno="2804">
<summary>
Read the process state (/proc/pid) of all unlabeled_t.
</summary>
@@ -69952,7 +70162,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_unlabeled" lineno="2779">
+<interface name="kernel_dontaudit_list_unlabeled" lineno="2824">
<summary>
Do not audit attempts to list unlabeled directories.
</summary>
@@ -69962,7 +70172,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_dirs" lineno="2797">
+<interface name="kernel_rw_unlabeled_dirs" lineno="2842">
<summary>
Read and write unlabeled directories.
</summary>
@@ -69972,7 +70182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_dirs" lineno="2815">
+<interface name="kernel_delete_unlabeled_dirs" lineno="2860">
<summary>
Delete unlabeled directories.
</summary>
@@ -69982,7 +70192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_dirs" lineno="2833">
+<interface name="kernel_manage_unlabeled_dirs" lineno="2878">
<summary>
Create, read, write, and delete unlabeled directories.
</summary>
@@ -69992,7 +70202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_unlabeled_dirs" lineno="2851">
+<interface name="kernel_mounton_unlabeled_dirs" lineno="2896">
<summary>
Mount a filesystem on an unlabeled directory.
</summary>
@@ -70002,7 +70212,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_files" lineno="2869">
+<interface name="kernel_read_unlabeled_files" lineno="2914">
<summary>
Read unlabeled files.
</summary>
@@ -70012,7 +70222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_files" lineno="2887">
+<interface name="kernel_rw_unlabeled_files" lineno="2932">
<summary>
Read and write unlabeled files.
</summary>
@@ -70022,7 +70232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_files" lineno="2905">
+<interface name="kernel_delete_unlabeled_files" lineno="2950">
<summary>
Delete unlabeled files.
</summary>
@@ -70032,7 +70242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_files" lineno="2923">
+<interface name="kernel_manage_unlabeled_files" lineno="2968">
<summary>
Create, read, write, and delete unlabeled files.
</summary>
@@ -70042,7 +70252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2942">
+<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2987">
<summary>
Do not audit attempts by caller to get the
attributes of an unlabeled file.
@@ -70053,7 +70263,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2961">
+<interface name="kernel_dontaudit_read_unlabeled_files" lineno="3006">
<summary>
Do not audit attempts by caller to
read an unlabeled file.
@@ -70064,7 +70274,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_unlabeled_filetrans" lineno="2995">
+<interface name="kernel_unlabeled_filetrans" lineno="3040">
<summary>
Create an object in unlabeled directories
with a private type.
@@ -70090,7 +70300,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_symlinks" lineno="3013">
+<interface name="kernel_delete_unlabeled_symlinks" lineno="3058">
<summary>
Delete unlabeled symbolic links.
</summary>
@@ -70100,7 +70310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_symlinks" lineno="3031">
+<interface name="kernel_manage_unlabeled_symlinks" lineno="3076">
<summary>
Create, read, write, and delete unlabeled symbolic links.
</summary>
@@ -70110,7 +70320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="3050">
+<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="3095">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
@@ -70121,7 +70331,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3069">
+<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3114">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
@@ -70132,7 +70342,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3088">
+<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3133">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
@@ -70143,7 +70353,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3107">
+<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3152">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled block devices.
@@ -70154,7 +70364,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_blk_files" lineno="3125">
+<interface name="kernel_rw_unlabeled_blk_files" lineno="3170">
<summary>
Read and write unlabeled block device nodes.
</summary>
@@ -70164,7 +70374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_blk_files" lineno="3143">
+<interface name="kernel_delete_unlabeled_blk_files" lineno="3188">
<summary>
Delete unlabeled block device nodes.
</summary>
@@ -70174,7 +70384,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_blk_files" lineno="3161">
+<interface name="kernel_manage_unlabeled_blk_files" lineno="3206">
<summary>
Create, read, write, and delete unlabeled block device nodes.
</summary>
@@ -70184,7 +70394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3180">
+<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3225">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled character devices.
@@ -70195,7 +70405,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3199">
+<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3244">
<summary>
Do not audit attempts to
write unlabeled character devices.
@@ -70206,7 +70416,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_chr_files" lineno="3217">
+<interface name="kernel_delete_unlabeled_chr_files" lineno="3262">
<summary>
Delete unlabeled character device nodes.
</summary>
@@ -70216,7 +70426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_chr_files" lineno="3236">
+<interface name="kernel_manage_unlabeled_chr_files" lineno="3281">
<summary>
Create, read, write, and delete unlabeled character device nodes.
</summary>
@@ -70226,7 +70436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3254">
+<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3299">
<summary>
Allow caller to relabel unlabeled directories.
</summary>
@@ -70236,7 +70446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_files" lineno="3272">
+<interface name="kernel_relabelfrom_unlabeled_files" lineno="3317">
<summary>
Allow caller to relabel unlabeled files.
</summary>
@@ -70246,7 +70456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3291">
+<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3336">
<summary>
Allow caller to relabel unlabeled symbolic links.
</summary>
@@ -70256,7 +70466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3310">
+<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3355">
<summary>
Allow caller to relabel unlabeled named pipes.
</summary>
@@ -70266,7 +70476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_pipes" lineno="3329">
+<interface name="kernel_delete_unlabeled_pipes" lineno="3374">
<summary>
Delete unlabeled named pipes
</summary>
@@ -70276,7 +70486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3347">
+<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3392">
<summary>
Allow caller to relabel unlabeled named sockets.
</summary>
@@ -70286,7 +70496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_sockets" lineno="3366">
+<interface name="kernel_delete_unlabeled_sockets" lineno="3411">
<summary>
Delete unlabeled named sockets.
</summary>
@@ -70296,7 +70506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3384">
+<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3429">
<summary>
Allow caller to relabel from unlabeled block devices.
</summary>
@@ -70306,7 +70516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3402">
+<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3447">
<summary>
Allow caller to relabel from unlabeled character devices.
</summary>
@@ -70316,7 +70526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_association" lineno="3435">
+<interface name="kernel_sendrecv_unlabeled_association" lineno="3480">
<summary>
Send and receive messages from an
unlabeled IPSEC association.
@@ -70341,7 +70551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3468">
+<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3513">
<summary>
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
@@ -70366,7 +70576,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3495">
+<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3540">
<summary>
Receive TCP packets from an unlabeled connection.
</summary>
@@ -70385,7 +70595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3524">
+<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3569">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
@@ -70406,7 +70616,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_udp_recvfrom_unlabeled" lineno="3551">
+<interface name="kernel_udp_recvfrom_unlabeled" lineno="3596">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
@@ -70425,7 +70635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3580">
+<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3625">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
@@ -70446,7 +70656,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_raw_recvfrom_unlabeled" lineno="3607">
+<interface name="kernel_raw_recvfrom_unlabeled" lineno="3652">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
@@ -70465,7 +70675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3636">
+<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3681">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
@@ -70486,7 +70696,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_packets" lineno="3666">
+<interface name="kernel_sendrecv_unlabeled_packets" lineno="3711">
<summary>
Send and receive unlabeled packets.
</summary>
@@ -70508,7 +70718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_recvfrom_unlabeled_peer" lineno="3694">
+<interface name="kernel_recvfrom_unlabeled_peer" lineno="3739">
<summary>
Receive packets from an unlabeled peer.
</summary>
@@ -70528,7 +70738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3722">
+<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3767">
<summary>
Do not audit attempts to receive packets from an unlabeled peer.
</summary>
@@ -70548,7 +70758,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_database" lineno="3740">
+<interface name="kernel_relabelfrom_unlabeled_database" lineno="3785">
<summary>
Relabel from unlabeled database objects.
</summary>
@@ -70558,7 +70768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unconfined" lineno="3777">
+<interface name="kernel_unconfined" lineno="3822">
<summary>
Unconfined access to kernel module resources.
</summary>
@@ -70568,7 +70778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_overcommit_sysctl" lineno="3797">
+<interface name="kernel_read_vm_overcommit_sysctl" lineno="3842">
<summary>
Read virtual memory overcommit sysctl.
</summary>
@@ -70579,7 +70789,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3817">
+<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3862">
<summary>
Read and write virtual memory overcommit sysctl.
</summary>
@@ -70590,7 +70800,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3836">
+<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3881">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -70600,7 +70810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3854">
+<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3899">
<summary>
Manage subnet on unlabeled Infiniband endports.
</summary>
@@ -71885,7 +72095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dev_filetrans_fixed_disk" lineno="305">
+<interface name="storage_dev_filetrans_fixed_disk" lineno="310">
<summary>
Create block devices in /dev with the fixed disk type
via an automatic type transition.
@@ -71895,13 +72105,18 @@ via an automatic type transition.
Domain allowed access.
</summary>
</param>
+<param name="object_class">
+<summary>
+The class of the object to be created.
+</summary>
+</param>
<param name="filename" optional="true">
<summary>
Optional filename of the block device to be created
</summary>
</param>
</interface>
-<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="324">
+<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="329">
<summary>
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
@@ -71912,7 +72127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_relabel_fixed_disk" lineno="342">
+<interface name="storage_relabel_fixed_disk" lineno="347">
<summary>
Relabel fixed disk device nodes.
</summary>
@@ -71922,7 +72137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_swapon_fixed_disk" lineno="361">
+<interface name="storage_swapon_fixed_disk" lineno="366">
<summary>
Enable a fixed disk device as swap space
</summary>
@@ -71932,7 +72147,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_watch_fixed_disk" lineno="380">
+<interface name="storage_watch_fixed_disk" lineno="385">
<summary>
Watch fixed disk device nodes.
</summary>
@@ -71942,7 +72157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_fuse_dev" lineno="401">
+<interface name="storage_getattr_fuse_dev" lineno="406">
<summary>
Allow the caller to get the attributes
of device nodes of fuse devices.
@@ -71953,7 +72168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_rw_fuse" lineno="420">
+<interface name="storage_rw_fuse" lineno="425">
<summary>
read or write fuse device interfaces.
</summary>
@@ -71963,7 +72178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_fuse" lineno="439">
+<interface name="storage_dontaudit_rw_fuse" lineno="444">
<summary>
Do not audit attempts to read or write
fuse device interfaces.
@@ -71974,7 +72189,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_scsi_generic_dev" lineno="458">
+<interface name="storage_getattr_scsi_generic_dev" lineno="463">
<summary>
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
@@ -71985,7 +72200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev" lineno="478">
+<interface name="storage_setattr_scsi_generic_dev" lineno="483">
<summary>
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
@@ -71996,7 +72211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_read_scsi_generic" lineno="501">
+<interface name="storage_read_scsi_generic" lineno="506">
<summary>
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
@@ -72010,7 +72225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_scsi_generic" lineno="526">
+<interface name="storage_write_scsi_generic" lineno="531">
<summary>
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
@@ -72024,7 +72239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev_dev" lineno="548">
+<interface name="storage_setattr_scsi_generic_dev_dev" lineno="553">
<summary>
Set attributes of the device nodes
for the SCSI generic interface.
@@ -72035,7 +72250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_scsi_generic" lineno="568">
+<interface name="storage_dontaudit_rw_scsi_generic" lineno="573">
<summary>
Do not audit attempts to read or write
SCSI generic device interfaces.
@@ -72046,7 +72261,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_removable_dev" lineno="587">
+<interface name="storage_getattr_removable_dev" lineno="592">
<summary>
Allow the caller to get the attributes of removable
devices device nodes.
@@ -72057,7 +72272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_getattr_removable_dev" lineno="607">
+<interface name="storage_dontaudit_getattr_removable_dev" lineno="612">
<summary>
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
@@ -72068,7 +72283,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_read_removable_device" lineno="626">
+<interface name="storage_dontaudit_read_removable_device" lineno="631">
<summary>
Do not audit attempts made by the caller to read
removable devices device nodes.
@@ -72079,7 +72294,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_write_removable_device" lineno="646">
+<interface name="storage_dontaudit_write_removable_device" lineno="651">
<summary>
Do not audit attempts made by the caller to write
removable devices device nodes.
@@ -72090,7 +72305,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_setattr_removable_dev" lineno="665">
+<interface name="storage_setattr_removable_dev" lineno="670">
<summary>
Allow the caller to set the attributes of removable
devices device nodes.
@@ -72101,7 +72316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_setattr_removable_dev" lineno="685">
+<interface name="storage_dontaudit_setattr_removable_dev" lineno="690">
<summary>
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
@@ -72112,7 +72327,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_read_removable_device" lineno="707">
+<interface name="storage_raw_read_removable_device" lineno="712">
<summary>
Allow the caller to directly read from
a removable device.
@@ -72126,7 +72341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_read_removable_device" lineno="726">
+<interface name="storage_dontaudit_raw_read_removable_device" lineno="731">
<summary>
Do not audit attempts to directly read removable devices.
</summary>
@@ -72136,7 +72351,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_write_removable_device" lineno="748">
+<interface name="storage_raw_write_removable_device" lineno="753">
<summary>
Allow the caller to directly write to
a removable device.
@@ -72150,7 +72365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_write_removable_device" lineno="767">
+<interface name="storage_dontaudit_raw_write_removable_device" lineno="772">
<summary>
Do not audit attempts to directly write removable devices.
</summary>
@@ -72160,7 +72375,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_read_tape" lineno="786">
+<interface name="storage_read_tape" lineno="791">
<summary>
Allow the caller to directly read
a tape device.
@@ -72171,7 +72386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_tape" lineno="806">
+<interface name="storage_write_tape" lineno="811">
<summary>
Allow the caller to directly write
a tape device.
@@ -72182,7 +72397,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_tape_dev" lineno="826">
+<interface name="storage_getattr_tape_dev" lineno="831">
<summary>
Allow the caller to get the attributes
of device nodes of tape devices.
@@ -72193,7 +72408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_tape_dev" lineno="846">
+<interface name="storage_setattr_tape_dev" lineno="851">
<summary>
Allow the caller to set the attributes
of device nodes of tape devices.
@@ -72204,7 +72419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_unconfined" lineno="865">
+<interface name="storage_unconfined" lineno="870">
<summary>
Unconfined access to storage devices.
</summary>
@@ -78959,6 +79174,15 @@ Allow containers to use eCryptfs filesystems.
</p>
</desc>
</tunable>
+<tunable name="container_use_host_all_caps" dftval="false">
+<desc>
+<p>
+Allow containers to use all capabilities in a
+non-namespaced context for various privileged operations
+directly on the host.
+</p>
+</desc>
+</tunable>
<tunable name="container_use_hugetlbfs" dftval="false">
<desc>
<p>
@@ -78966,6 +79190,14 @@ Allow containers to use huge pages.
</p>
</desc>
</tunable>
+<tunable name="container_use_mknod" dftval="false">
+<desc>
+<p>
+Allow containers to use the mknod syscall, e.g. for
+creating special device files.
+</p>
+</desc>
+</tunable>
<tunable name="container_use_nfs" dftval="false">
<desc>
<p>
@@ -78980,6 +79212,41 @@ Allow containers to use CIFS filesystems.
</p>
</desc>
</tunable>
+<tunable name="container_use_sysadmin" dftval="false">
+<desc>
+<p>
+Allow containers to use the sysadmin capability, e.g.
+for mounting filesystems.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_userns_all_caps" dftval="false">
+<desc>
+<p>
+Allow containers to use all capabilities in a
+namespaced context for various privileged operations
+within the container itself.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_userns_mknod" dftval="false">
+<desc>
+<p>
+Allow containers to use the mknod syscall in a
+namespaced context, e.g. for creating special device
+files within the container itself.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_userns_sysadmin" dftval="false">
+<desc>
+<p>
+Allow containers to use the sysadmin capability in a
+namespaced context, e.g. for mounting filesystems
+within the container itself.
+</p>
+</desc>
+</tunable>
</module>
<module name="corosync" filename="policy/modules/services/corosync.if">
<summary>Corosync Cluster Engine.</summary>
@@ -79644,7 +79911,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_job_lib_files" lineno="768">
+<interface name="cron_rw_inherited_tmp_files" lineno="768">
+<summary>
+Read and write inherited crond temporary files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cron_read_system_job_lib_files" lineno="786">
<summary>
Read system cron job lib files.
</summary>
@@ -79654,7 +79931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_manage_system_job_lib_files" lineno="788">
+<interface name="cron_manage_system_job_lib_files" lineno="806">
<summary>
Create, read, write, and delete
system cron job lib files.
@@ -79665,7 +79942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_write_system_job_pipes" lineno="807">
+<interface name="cron_write_system_job_pipes" lineno="825">
<summary>
Write system cron job unnamed pipes.
</summary>
@@ -79675,7 +79952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_system_job_pipes" lineno="826">
+<interface name="cron_rw_system_job_pipes" lineno="844">
<summary>
Read and write system cron job
unnamed pipes.
@@ -79686,7 +79963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_system_job_stream_sockets" lineno="845">
+<interface name="cron_rw_system_job_stream_sockets" lineno="863">
<summary>
Read and write inherited system cron
job unix domain stream sockets.
@@ -79697,7 +79974,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_job_tmp_files" lineno="863">
+<interface name="cron_read_system_job_tmp_files" lineno="881">
<summary>
Read system cron job temporary files.
</summary>
@@ -79707,7 +79984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="883">
+<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="901">
<summary>
Do not audit attempts to append temporary
system cron job files.
@@ -79718,7 +79995,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cron_rw_inherited_system_job_tmp_files" lineno="901">
+<interface name="cron_append_system_job_tmp_files" lineno="919">
+<summary>
+allow appending temporary system cron job files.
+</summary>
+<param name="domain">
+<summary>
+Domain to allow.
+</summary>
+</param>
+</interface>
+<interface name="cron_rw_inherited_system_job_tmp_files" lineno="937">
<summary>
Read and write to inherited system cron job temporary files.
</summary>
@@ -79728,7 +80015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="920">
+<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="956">
<summary>
Do not audit attempts to write temporary
system cron job files.
@@ -79739,7 +80026,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cron_exec_crontab" lineno="939">
+<interface name="cron_exec_crontab" lineno="975">
<summary>
Execute crontab in the caller domain.
</summary>
@@ -79750,7 +80037,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cron_admin" lineno="965">
+<interface name="cron_admin" lineno="1001">
<summary>
All of the rules required to
administrate a cron environment.
@@ -80257,7 +80544,7 @@ User domain for the role
</summary>
</param>
</template>
-<interface name="dbus_system_bus_client" lineno="137">
+<interface name="dbus_system_bus_client" lineno="140">
<summary>
Template for creating connections to
the system bus.
@@ -80268,7 +80555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_connect_all_session_bus" lineno="176">
+<interface name="dbus_connect_all_session_bus" lineno="181">
<summary>
Acquire service on all DBUS
session busses.
@@ -80279,7 +80566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="dbus_connect_spec_session_bus" lineno="202">
+<template name="dbus_connect_spec_session_bus" lineno="207">
<summary>
Acquire service on specified
DBUS session bus.
@@ -80296,7 +80583,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="dbus_all_session_bus_client" lineno="222">
+<interface name="dbus_all_session_bus_client" lineno="227">
<summary>
Creating connections to all
DBUS session busses.
@@ -80307,7 +80594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="dbus_spec_session_bus_client" lineno="254">
+<template name="dbus_spec_session_bus_client" lineno="261">
<summary>
Creating connections to specified
DBUS session bus.
@@ -80324,7 +80611,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="dbus_send_all_session_bus" lineno="281">
+<interface name="dbus_send_all_session_bus" lineno="288">
<summary>
Send messages to all DBUS
session busses.
@@ -80335,7 +80622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="dbus_send_spec_session_bus" lineno="307">
+<template name="dbus_send_spec_session_bus" lineno="314">
<summary>
Send messages to specified
DBUS session busses.
@@ -80352,7 +80639,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="dbus_getattr_session_runtime_socket" lineno="327">
+<interface name="dbus_getattr_session_runtime_socket" lineno="334">
<summary>
Allow the specified domain to get the
attributes of the session dbus sock file.
@@ -80363,7 +80650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_write_session_runtime_socket" lineno="346">
+<interface name="dbus_write_session_runtime_socket" lineno="353">
<summary>
Allow the specified domain to write to
the session dbus sock file.
@@ -80374,7 +80661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_config" lineno="364">
+<interface name="dbus_read_config" lineno="371">
<summary>
Read dbus configuration content.
</summary>
@@ -80384,7 +80671,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_lib_files" lineno="383">
+<interface name="dbus_read_lib_files" lineno="390">
<summary>
Read system dbus lib files.
</summary>
@@ -80394,7 +80681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_relabel_lib_dirs" lineno="403">
+<interface name="dbus_relabel_lib_dirs" lineno="410">
<summary>
Relabel system dbus lib directory.
</summary>
@@ -80404,7 +80691,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_manage_lib_files" lineno="423">
+<interface name="dbus_manage_lib_files" lineno="430">
<summary>
Create, read, write, and delete
system dbus lib files.
@@ -80415,7 +80702,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_all_session_domain" lineno="449">
+<interface name="dbus_all_session_domain" lineno="456">
<summary>
Allow a application domain to be
started by the specified session bus.
@@ -80432,7 +80719,7 @@ entry point to this domain.
</summary>
</param>
</interface>
-<template name="dbus_spec_session_domain" lineno="483">
+<template name="dbus_spec_session_domain" lineno="490">
<summary>
Allow a application domain to be
started by the specified session bus.
@@ -80455,7 +80742,7 @@ entry point to this domain.
</summary>
</param>
</template>
-<interface name="dbus_connect_system_bus" lineno="504">
+<interface name="dbus_connect_system_bus" lineno="511">
<summary>
Acquire service on the DBUS system bus.
</summary>
@@ -80465,7 +80752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_send_system_bus" lineno="523">
+<interface name="dbus_send_system_bus" lineno="530">
<summary>
Send messages to the DBUS system bus.
</summary>
@@ -80475,7 +80762,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_system_bus_unconfined" lineno="542">
+<interface name="dbus_system_bus_unconfined" lineno="549">
<summary>
Unconfined access to DBUS system bus.
</summary>
@@ -80485,7 +80772,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_system_domain" lineno="567">
+<interface name="dbus_system_domain" lineno="574">
<summary>
Create a domain for processes which
can be started by the DBUS system bus.
@@ -80501,7 +80788,7 @@ Type of the program to be used as an entry point to this domain.
</summary>
</param>
</interface>
-<interface name="dbus_use_system_bus_fds" lineno="605">
+<interface name="dbus_use_system_bus_fds" lineno="612">
<summary>
Use and inherit DBUS system bus
file descriptors.
@@ -80512,7 +80799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="624">
+<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="631">
<summary>
Do not audit attempts to read and
write DBUS system bus TCP sockets.
@@ -80523,7 +80810,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dbus_watch_system_bus_runtime_dirs" lineno="642">
+<interface name="dbus_watch_system_bus_runtime_dirs" lineno="649">
<summary>
Watch system bus runtime directories.
</summary>
@@ -80533,7 +80820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_system_bus_runtime_files" lineno="660">
+<interface name="dbus_read_system_bus_runtime_files" lineno="667">
<summary>
Read system bus runtime files.
</summary>
@@ -80543,7 +80830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_list_system_bus_runtime" lineno="679">
+<interface name="dbus_list_system_bus_runtime" lineno="686">
<summary>
List system bus runtime directories.
</summary>
@@ -80553,7 +80840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="697">
+<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="704">
<summary>
Watch system bus runtime named sockets.
</summary>
@@ -80563,7 +80850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="715">
+<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="722">
<summary>
Read system bus runtime named sockets.
</summary>
@@ -80573,7 +80860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_dontaudit_write_system_bus_runtime_named_sockets" lineno="734">
+<interface name="dbus_dontaudit_write_system_bus_runtime_named_sockets" lineno="741">
<summary>
Do not audit attempts to write to
system bus runtime named sockets.
@@ -80584,7 +80871,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dbus_unconfined" lineno="752">
+<interface name="dbus_rw_session_tmp_sockets" lineno="759">
+<summary>
+Read and write session named sockets in the tmp directory (/tmp).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_unconfined" lineno="777">
<summary>
Unconfined access to DBUS.
</summary>
@@ -80594,7 +80891,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="782">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="807">
<summary>
Create resources in /run or /var/run with the system_dbusd_runtime_t
label. This method is deprecated in favor of the init_daemon_run_dir
@@ -80616,7 +80913,7 @@ Optional file name used for the resource
</summary>
</param>
</interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="796">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="821">
<summary>
Create directories with the system_dbusd_runtime_t label
</summary>
@@ -80626,6 +80923,16 @@ Domain allowed access
</summary>
</param>
</interface>
+<tunable name="dbus_can_network" dftval="false">
+<desc>
+<p>
+Determine whether the dbus server
+can use the network (insecure
+except than in the case of the
+loopback interface).
+</p>
+</desc>
+</tunable>
<tunable name="dbus_pass_tuntap_fd" dftval="false">
<desc>
<p>
@@ -81517,6 +81824,21 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="eg25manager" filename="policy/modules/services/eg25manager.if">
+<summary>Manager daemon for the Quectel EG25 modem</summary>
+
+<desc>
+eg25-manager (Debian package eg25-manager) is a daemon aimed at configuring
+and monitoring the Quectel EG25 modem on a running system. It is used on the
+PinePhone (Pro) and performs the
+following functions:
+* power on/off
+* startup configuration using AT commands
+* AGPS data upload
+* status monitoring (and restart if it becomes unavailable)
+Homepage: https://gitlab.com/mobian1/eg25-manager
+</desc>
+</module>
<module name="entropyd" filename="policy/modules/services/entropyd.if">
<summary>Generate entropy from audio input.</summary>
<interface name="entropyd_admin" lineno="20">
@@ -83384,6 +83706,29 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="iiosensorproxy" filename="policy/modules/services/iiosensorproxy.if">
+<summary>IIO sensors to D-Bus proxy</summary>
+
+<desc>
+Industrial I/O subsystem is intended to provide support for devices
+that in some sense are analog to digital or digital to analog convertors
+.
+Devices that fall into this category are:
+* ADCs
+* Accelerometers
+* Gyros
+* IMUs
+* Capacitance to Digital Converters (CDCs)
+* Pressure Sensors
+* Color, Light and Proximity Sensors
+* Temperature Sensors
+* Magnetometers
+* DACs
+* DDS (Direct Digital Synthesis)
+* PLLs (Phase Locked Loops)
+* Variable/Programmable Gain Amplifiers (VGA, PGA)
+</desc>
+</module>
<module name="inetd" filename="policy/modules/services/inetd.if">
<summary>Internet services daemon.</summary>
<interface name="inetd_core_service_domain" lineno="27">
@@ -84913,6 +85258,28 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="lowmemorymonitor" filename="policy/modules/services/lowmemorymonitor.if">
+<summary>low memory monitor daemon</summary>
+
+<desc>
+The Low Memory Monitor is an early boot daemon that will monitor memory
+pressure information coming from the kernel, and, first, send a signal
+to user-space applications when memory is running low, and then optionally
+activate the kernel's OOM killer when memory is running really low.
+https://gitlab.freedesktop.org/hadess/low-memory-monitor
+</desc>
+<interface name="low_mem_mon_dbus_chat" lineno="22">
+<summary>
+Send and receive messages from
+low_mem_mon_t over dbus.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+</module>
<module name="lpd" filename="policy/modules/services/lpd.if">
<summary>Line printer daemon.</summary>
<template name="lpd_role" lineno="29">
@@ -86046,7 +86413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_home_filetrans_mail_home_rw" lineno="295">
+<interface name="mta_home_filetrans_mail_home_rw" lineno="296">
<summary>
Create specified objects in user home
directories with the generic mail
@@ -86068,7 +86435,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_system_content" lineno="313">
+<interface name="mta_system_content" lineno="314">
<summary>
Make the specified type by a system MTA.
</summary>
@@ -86078,7 +86445,7 @@ Type to be used as a mail client.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_mailserver" lineno="346">
+<interface name="mta_sendmail_mailserver" lineno="347">
<summary>
Modified mailserver interface for
sendmail daemon use.
@@ -86103,7 +86470,7 @@ The type to be used for the mail server.
</summary>
</param>
</interface>
-<interface name="mta_use_mailserver_fds" lineno="367">
+<interface name="mta_use_mailserver_fds" lineno="368">
<summary>
Inherit FDs from mailserver_domain domains
</summary>
@@ -86113,7 +86480,7 @@ Type for a list server or delivery agent that inherits fds
</summary>
</param>
</interface>
-<interface name="mta_mailserver_sender" lineno="386">
+<interface name="mta_mailserver_sender" lineno="387">
<summary>
Make a type a mailserver type used
for sending mail.
@@ -86124,7 +86491,7 @@ Mail server domain type used for sending mail.
</summary>
</param>
</interface>
-<interface name="mta_mailserver_delivery" lineno="405">
+<interface name="mta_mailserver_delivery" lineno="406">
<summary>
Make a type a mailserver type used
for delivering mail to local users.
@@ -86135,7 +86502,7 @@ Mail server domain type used for delivering mail.
</summary>
</param>
</interface>
-<interface name="mta_mailserver_user_agent" lineno="425">
+<interface name="mta_mailserver_user_agent" lineno="426">
<summary>
Make a type a mailserver type used
for sending mail on behalf of local
@@ -86147,7 +86514,7 @@ Mail server domain type used for sending local mail.
</summary>
</param>
</interface>
-<interface name="mta_send_mail" lineno="443">
+<interface name="mta_send_mail" lineno="444">
<summary>
Send mail from the system.
</summary>
@@ -86157,7 +86524,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_domtrans" lineno="488">
+<interface name="mta_sendmail_domtrans" lineno="489">
<summary>
Execute send mail in a specified domain.
</summary>
@@ -86182,7 +86549,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="mta_signal_system_mail" lineno="510">
+<interface name="mta_signal_system_mail" lineno="511">
<summary>
Send signals to system mail.
</summary>
@@ -86192,7 +86559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_kill_system_mail" lineno="528">
+<interface name="mta_kill_system_mail" lineno="529">
<summary>
Send kill signals to system mail.
</summary>
@@ -86202,7 +86569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_exec" lineno="546">
+<interface name="mta_sendmail_exec" lineno="547">
<summary>
Execute sendmail in the caller domain.
</summary>
@@ -86212,7 +86579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_entry_point" lineno="566">
+<interface name="mta_sendmail_entry_point" lineno="567">
<summary>
Make sendmail usable as an entry
point for the domain.
@@ -86223,7 +86590,7 @@ Domain to be entered.
</summary>
</param>
</interface>
-<interface name="mta_read_config" lineno="585">
+<interface name="mta_read_config" lineno="586">
<summary>
Read mail server configuration content.
</summary>
@@ -86234,7 +86601,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mta_write_config" lineno="607">
+<interface name="mta_write_config" lineno="608">
<summary>
Write mail server configuration files.
</summary>
@@ -86245,7 +86612,18 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mta_read_aliases" lineno="626">
+<interface name="mta_manage_config" lineno="628">
+<summary>
+Create, read, write, and delete
+mail server configuration content.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mta_read_aliases" lineno="648">
<summary>
Read mail address alias files.
</summary>
@@ -86255,7 +86633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_map_aliases" lineno="654">
+<interface name="mta_map_aliases" lineno="676">
<summary>
Read mail address alias files.
</summary>
@@ -86265,7 +86643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_manage_aliases" lineno="673">
+<interface name="mta_manage_aliases" lineno="695">
<summary>
Create, read, write, and delete
mail address alias content.
@@ -86276,7 +86654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_etc_filetrans_aliases" lineno="715">
+<interface name="mta_etc_filetrans_aliases" lineno="737">
<summary>
Create specified object in generic
etc directories with the mail address
@@ -86298,7 +86676,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_spec_filetrans_aliases" lineno="750">
+<interface name="mta_spec_filetrans_aliases" lineno="772">
<summary>
Create specified objects in specified
directories with a type transition to
@@ -86325,7 +86703,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_rw_aliases" lineno="769">
+<interface name="mta_rw_aliases" lineno="791">
<summary>
Read and write mail alias files.
</summary>
@@ -86336,7 +86714,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="799">
+<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="821">
<summary>
Do not audit attempts to read
and write TCP sockets of mail
@@ -86348,7 +86726,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_list_spool" lineno="817">
+<interface name="mta_list_spool" lineno="839">
<summary>
Allow listing the mail spool.
</summary>
@@ -86358,7 +86736,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_read_spool_symlinks" lineno="836">
+<interface name="mta_read_spool_symlinks" lineno="858">
<summary>
Allow reading mail spool symlinks.
</summary>
@@ -86368,7 +86746,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_rw_inherited_delivery_pipes" lineno="854">
+<interface name="mta_rw_inherited_delivery_pipes" lineno="876">
<summary>
read and write fifo files inherited from delivery domains
</summary>
@@ -86378,7 +86756,7 @@ Domain to use fifo files
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="875">
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="897">
<summary>
Do not audit attempts to read
mail spool symlinks.
@@ -86389,7 +86767,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_getattr_spool" lineno="893">
+<interface name="mta_getattr_spool" lineno="915">
<summary>
Get attributes of mail spool content.
</summary>
@@ -86399,7 +86777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="915">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="937">
<summary>
Do not audit attempts to get
attributes of mail spool files.
@@ -86410,7 +86788,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_spool_filetrans" lineno="953">
+<interface name="mta_spool_filetrans" lineno="975">
<summary>
Create specified objects in the
mail spool directory with a
@@ -86437,7 +86815,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_read_spool_files" lineno="972">
+<interface name="mta_read_spool_files" lineno="994">
<summary>
Read mail spool files.
</summary>
@@ -86447,7 +86825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_spool" lineno="992">
+<interface name="mta_rw_spool" lineno="1014">
<summary>
Read and write mail spool files.
</summary>
@@ -86457,7 +86835,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_append_spool" lineno="1013">
+<interface name="mta_append_spool" lineno="1035">
<summary>
Create, read, and write mail spool files.
</summary>
@@ -86467,7 +86845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_delete_spool" lineno="1034">
+<interface name="mta_delete_spool" lineno="1056">
<summary>
Delete mail spool files.
</summary>
@@ -86477,7 +86855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_manage_spool" lineno="1054">
+<interface name="mta_manage_spool" lineno="1076">
<summary>
Create, read, write, and delete
mail spool content.
@@ -86488,7 +86866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_watch_spool" lineno="1076">
+<interface name="mta_watch_spool" lineno="1098">
<summary>
Watch mail spool content.
</summary>
@@ -86498,7 +86876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_queue_filetrans" lineno="1111">
+<interface name="mta_queue_filetrans" lineno="1133">
<summary>
Create specified objects in the
mail queue spool directory with a
@@ -86525,7 +86903,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_search_queue" lineno="1130">
+<interface name="mta_search_queue" lineno="1152">
<summary>
Search mail queue directories.
</summary>
@@ -86535,7 +86913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_list_queue" lineno="1149">
+<interface name="mta_list_queue" lineno="1171">
<summary>
List mail queue directories.
</summary>
@@ -86545,7 +86923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_queue" lineno="1168">
+<interface name="mta_read_queue" lineno="1190">
<summary>
Read mail queue files.
</summary>
@@ -86555,7 +86933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1188">
+<interface name="mta_dontaudit_rw_queue" lineno="1210">
<summary>
Do not audit attempts to read and
write mail queue content.
@@ -86566,7 +86944,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_manage_queue" lineno="1208">
+<interface name="mta_manage_queue" lineno="1230">
<summary>
Create, read, write, and delete
mail queue content.
@@ -86577,7 +86955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_sendmail_bin" lineno="1228">
+<interface name="mta_read_sendmail_bin" lineno="1250">
<summary>
Read sendmail binary.
</summary>
@@ -86587,7 +86965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1247">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1269">
<summary>
Read and write unix domain stream
sockets of all base mail domains.
@@ -87933,7 +88311,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ntp_rw_shm" lineno="189">
+<interface name="ntp_filetrans_drift" lineno="189">
+<summary>
+specified domain creates /var/lib/ntpsec/ with the correct type
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ntp_rw_shm" lineno="208">
<summary>
Read and write ntpd shared memory.
</summary>
@@ -87943,7 +88331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ntp_enabledisable" lineno="211">
+<interface name="ntp_enabledisable" lineno="230">
<summary>
Allow specified domain to enable/disable ntpd unit
</summary>
@@ -87953,7 +88341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ntp_startstop" lineno="232">
+<interface name="ntp_startstop" lineno="251">
<summary>
Allow specified domain to start/stop ntpd unit
</summary>
@@ -87963,7 +88351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ntp_status" lineno="253">
+<interface name="ntp_status" lineno="272">
<summary>
Allow specified domain to get status of ntpd unit
</summary>
@@ -87973,7 +88361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ntp_admin" lineno="281">
+<interface name="ntp_admin" lineno="300">
<summary>
All of the rules required to
administrate an ntp environment.
@@ -87990,7 +88378,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="ntp_manage_config" lineno="333">
+<interface name="ntp_manage_config" lineno="352">
<summary>
Manage ntp(d) configuration.
</summary>
@@ -89596,7 +89984,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<template name="postfix_server_domain_template" lineno="65">
+<template name="postfix_server_domain_template" lineno="68">
<summary>
The template to define a postfix server domain.
</summary>
@@ -89606,7 +89994,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<template name="postfix_user_domain_template" lineno="105">
+<template name="postfix_user_domain_template" lineno="108">
<summary>
The template to define a postfix user domain.
</summary>
@@ -89616,7 +90004,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<interface name="postfix_read_config" lineno="142">
+<interface name="postfix_read_config" lineno="145">
<summary>
Read postfix configuration content.
</summary>
@@ -89627,7 +90015,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postfix_config_filetrans" lineno="179">
+<interface name="postfix_config_filetrans" lineno="182">
<summary>
Create specified object in postfix
etc directories with a type transition.
@@ -89653,7 +90041,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="199">
+<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="202">
<summary>
Do not audit attempts to read and
write postfix local delivery
@@ -89665,7 +90053,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="postfix_rw_local_pipes" lineno="217">
+<interface name="postfix_rw_local_pipes" lineno="220">
<summary>
Read and write postfix local pipes.
</summary>
@@ -89675,7 +90063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_read_local_state" lineno="235">
+<interface name="postfix_read_local_state" lineno="238">
<summary>
Read postfix local process state files.
</summary>
@@ -89685,7 +90073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_rw_inherited_master_pipes" lineno="256">
+<interface name="postfix_rw_inherited_master_pipes" lineno="259">
<summary>
Read and write inherited postfix master pipes.
</summary>
@@ -89695,7 +90083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_read_master_state" lineno="275">
+<interface name="postfix_read_master_state" lineno="278">
<summary>
Read postfix master process state files.
</summary>
@@ -89705,7 +90093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_use_fds_master" lineno="296">
+<interface name="postfix_use_fds_master" lineno="299">
<summary>
Use postfix master file descriptors.
</summary>
@@ -89715,7 +90103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_dontaudit_use_fds" lineno="316">
+<interface name="postfix_dontaudit_use_fds" lineno="319">
<summary>
Do not audit attempts to use
postfix master process file
@@ -89727,7 +90115,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_map" lineno="334">
+<interface name="postfix_domtrans_map" lineno="337">
<summary>
Execute postfix_map in the postfix_map domain.
</summary>
@@ -89737,7 +90125,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_run_map" lineno="361">
+<interface name="postfix_run_map" lineno="364">
<summary>
Execute postfix map in the postfix
map domain, and allow the specified
@@ -89755,7 +90143,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postfix_domtrans_master" lineno="381">
+<interface name="postfix_domtrans_master" lineno="384">
<summary>
Execute the master postfix program
in the postfix_master domain.
@@ -89766,7 +90154,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_exec_master" lineno="401">
+<interface name="postfix_exec_master" lineno="404">
<summary>
Execute the master postfix program
in the caller domain.
@@ -89777,7 +90165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_stream_connect_master" lineno="422">
+<interface name="postfix_stream_connect_master" lineno="425">
<summary>
Connect to postfix master process
using a unix domain stream socket.
@@ -89789,7 +90177,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postfix_domtrans_postdrop" lineno="441">
+<interface name="postfix_domtrans_postdrop" lineno="444">
<summary>
Execute the master postdrop in the
postfix postdrop domain.
@@ -89800,7 +90188,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_postqueue" lineno="461">
+<interface name="postfix_domtrans_postqueue" lineno="464">
<summary>
Execute the master postqueue in the
postfix postqueue domain.
@@ -89811,7 +90199,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_exec_postqueue" lineno="481">
+<interface name="postfix_exec_postqueue" lineno="484">
<summary>
Execute postfix postqueue in
the caller domain.
@@ -89822,7 +90210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_create_private_sockets" lineno="500">
+<interface name="postfix_create_private_sockets" lineno="503">
<summary>
Create postfix private sock files.
</summary>
@@ -89832,7 +90220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_manage_private_sockets" lineno="519">
+<interface name="postfix_manage_private_sockets" lineno="522">
<summary>
Create, read, write, and delete
postfix private sock files.
@@ -89843,7 +90231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_smtp" lineno="538">
+<interface name="postfix_domtrans_smtp" lineno="541">
<summary>
Execute the smtp postfix program
in the postfix smtp domain.
@@ -89854,7 +90242,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_getattr_all_spool_files" lineno="558">
+<interface name="postfix_getattr_all_spool_files" lineno="561">
<summary>
Get attributes of all postfix mail
spool files.
@@ -89865,7 +90253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_search_spool" lineno="577">
+<interface name="postfix_search_spool" lineno="580">
<summary>
Search postfix mail spool directories.
</summary>
@@ -89875,7 +90263,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_list_spool" lineno="596">
+<interface name="postfix_list_spool" lineno="599">
<summary>
List postfix mail spool directories.
</summary>
@@ -89885,7 +90273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_read_spool_files" lineno="615">
+<interface name="postfix_read_spool_files" lineno="618">
<summary>
Read postfix mail spool files.
</summary>
@@ -89895,7 +90283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_manage_spool_files" lineno="635">
+<interface name="postfix_manage_spool_files" lineno="638">
<summary>
Create, read, write, and delete
postfix mail spool files.
@@ -89906,7 +90294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_user_mail_handler" lineno="655">
+<interface name="postfix_domtrans_user_mail_handler" lineno="658">
<summary>
Execute postfix user mail programs
in their respective domains.
@@ -89917,7 +90305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_admin" lineno="680">
+<interface name="postfix_admin" lineno="683">
<summary>
All of the rules required to
administrate an postfix environment.
@@ -90312,6 +90700,13 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="powerprofiles" filename="policy/modules/services/powerprofiles.if">
+<summary>power profiles daemon</summary>
+
+<desc>
+Daemon to control power profiles for laptop
+</desc>
+</module>
<module name="ppp" filename="policy/modules/services/ppp.if">
<summary>Point to Point Protocol daemon creates links in ppp networks.</summary>
<interface name="ppp_manage_home_files" lineno="14">
@@ -91307,6 +91702,18 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="rasdaemon" filename="policy/modules/services/rasdaemon.if">
+<summary>RAS (Reliability, Availability and Serviceability) logging tool</summary>
+
+<desc>
+rasdaemon is a RAS (Reliability, Availability and Serviceability) logging
+tool. It currently records memory errors, using the EDAC tracing events.
+EDAC are drivers in the Linux kernel that handle detection of ECC errors
+from memory controllers for most chipsets on x86 and ARM architectures.
+
+https://git.infradead.org/users/mchehab/rasdaemon.git
+</desc>
+</module>
<module name="razor" filename="policy/modules/services/razor.if">
<summary>A distributed, collaborative, spam detection and filtering network.</summary>
<template name="razor_common_domain_template" lineno="13">
@@ -93583,6 +93990,17 @@ Role allowed access.
</param>
<rolecap/>
</interface>
+<interface name="fsdaemon_read_lib" lineno="71">
+<summary>
+Read fsdaemon /var/lib files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
<tunable name="smartmon_3ware" dftval="false">
<desc>
<p>
@@ -93877,7 +94295,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="spamassassin_run_update" lineno="73">
+<interface name="spamassassin_run_update" lineno="75">
<summary>
Execute sa-update in the spamd-update domain,
and allow the specified role
@@ -93895,7 +94313,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_exec" lineno="93">
+<interface name="spamassassin_exec" lineno="95">
<summary>
Execute the standalone spamassassin
program in the caller directory.
@@ -93906,7 +94324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_signal_spamd" lineno="112">
+<interface name="spamassassin_signal_spamd" lineno="114">
<summary>
Send generic signals to spamd.
</summary>
@@ -93916,7 +94334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_reload" lineno="131">
+<interface name="spamassassin_reload" lineno="133">
<summary>
reload SA service
</summary>
@@ -93927,7 +94345,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="spamassassin_status" lineno="151">
+<interface name="spamassassin_status" lineno="153">
<summary>
Get SA service status
</summary>
@@ -93938,7 +94356,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="spamassassin_exec_spamd" lineno="170">
+<interface name="spamassassin_exec_spamd" lineno="172">
<summary>
Execute spamd in the caller domain.
</summary>
@@ -93948,7 +94366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_domtrans_client" lineno="189">
+<interface name="spamassassin_domtrans_client" lineno="191">
<summary>
Execute spamc in the spamc domain.
</summary>
@@ -93958,7 +94376,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="spamassassin_exec_client" lineno="208">
+<interface name="spamassassin_exec_client" lineno="210">
<summary>
Execute spamc in the caller domain.
</summary>
@@ -93968,7 +94386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_kill_client" lineno="227">
+<interface name="spamassassin_kill_client" lineno="229">
<summary>
Send kill signals to spamc.
</summary>
@@ -93978,7 +94396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_domtrans_local_client" lineno="246">
+<interface name="spamassassin_domtrans_local_client" lineno="248">
<summary>
Execute spamassassin standalone client
in the user spamassassin domain.
@@ -93989,7 +94407,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="spamassassin_manage_spamd_home_content" lineno="266">
+<interface name="spamassassin_manage_spamd_home_content" lineno="268">
<summary>
Create, read, write, and delete
spamd home content.
@@ -94000,7 +94418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_relabel_spamd_home_content" lineno="287">
+<interface name="spamassassin_relabel_spamd_home_content" lineno="289">
<summary>
Relabel spamd home content.
</summary>
@@ -94010,7 +94428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_home_filetrans_spamd_home" lineno="319">
+<interface name="spamassassin_home_filetrans_spamd_home" lineno="321">
<summary>
Create objects in user home
directories with the spamd home type.
@@ -94031,7 +94449,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_lib_files" lineno="337">
+<interface name="spamassassin_read_lib_files" lineno="339">
<summary>
Read spamd lib files.
</summary>
@@ -94041,7 +94459,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_manage_lib_files" lineno="357">
+<interface name="spamassassin_manage_lib_files" lineno="359">
<summary>
Create, read, write, and delete
spamd lib files.
@@ -94052,7 +94470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_spamd_runtime_files" lineno="376">
+<interface name="spamassassin_read_spamd_runtime_files" lineno="378">
<summary>
Read spamd runtime files.
</summary>
@@ -94062,7 +94480,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_spamd_tmp_files" lineno="395">
+<interface name="spamassassin_read_spamd_tmp_files" lineno="397">
<summary>
Read temporary spamd files.
</summary>
@@ -94072,7 +94490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="414">
+<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="416">
<summary>
Do not audit attempts to get
attributes of temporary spamd sockets.
@@ -94083,7 +94501,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="spamassassin_stream_connect_spamd" lineno="433">
+<interface name="spamassassin_stream_connect_spamd" lineno="435">
<summary>
Connect to spamd with a unix
domain stream socket.
@@ -94094,7 +94512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_admin" lineno="459">
+<interface name="spamassassin_admin" lineno="461">
<summary>
All of the rules required to
administrate an spamassassin environment.
@@ -94115,7 +94533,8 @@ Role allowed access.
<desc>
<p>
Determine whether spamassassin
-clients can use the network.
+daemon or clients can use the
+network.
</p>
</desc>
</tunable>
@@ -94127,6 +94546,15 @@ generic user home content.
</p>
</desc>
</tunable>
+<tunable name="spamassassin_network_update" dftval="true">
+<desc>
+<p>
+Determine whether spamassassin
+can update the rules using the
+network.
+</p>
+</desc>
+</tunable>
<tunable name="rspamd_spamd" dftval="false">
<desc>
<p>
@@ -94135,6 +94563,14 @@ be enabled to support rspamd.
</p>
</desc>
</tunable>
+<tunable name="spamd_execmem" dftval="false">
+<desc>
+<p>
+Determine whether execmem should be allowed
+Needed if LUA JIT is enabled for rspamd
+</p>
+</desc>
+</tunable>
</module>
<module name="squid" filename="policy/modules/services/squid.if">
<summary>Squid caching http proxy server.</summary>
@@ -94377,7 +94813,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="ssh_sigchld" lineno="486">
+<interface name="ssh_sigchld" lineno="488">
<summary>
Send a SIGCHLD signal to the ssh server.
</summary>
@@ -94387,7 +94823,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signal" lineno="504">
+<interface name="ssh_signal" lineno="506">
<summary>
Send a generic signal to the ssh server.
</summary>
@@ -94397,7 +94833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signull" lineno="522">
+<interface name="ssh_signull" lineno="524">
<summary>
Send a null signal to sshd processes.
</summary>
@@ -94407,7 +94843,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_pipes" lineno="540">
+<interface name="ssh_read_pipes" lineno="542">
<summary>
Read a ssh server unnamed pipe.
</summary>
@@ -94417,7 +94853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_pipes" lineno="557">
+<interface name="ssh_rw_pipes" lineno="559">
<summary>
Read and write a ssh server unnamed pipe.
</summary>
@@ -94427,7 +94863,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_stream_sockets" lineno="575">
+<interface name="ssh_rw_stream_sockets" lineno="577">
<summary>
Read and write ssh server unix domain stream sockets.
</summary>
@@ -94437,7 +94873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_tcp_sockets" lineno="593">
+<interface name="ssh_rw_tcp_sockets" lineno="595">
<summary>
Read and write ssh server TCP sockets.
</summary>
@@ -94447,7 +94883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="612">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="614">
<summary>
Do not audit attempts to read and write
ssh server TCP sockets.
@@ -94458,7 +94894,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_exec_sshd" lineno="630">
+<interface name="ssh_exec_sshd" lineno="632">
<summary>
Execute the ssh daemon in the caller domain.
</summary>
@@ -94468,7 +94904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans" lineno="649">
+<interface name="ssh_domtrans" lineno="651">
<summary>
Execute the ssh daemon sshd domain.
</summary>
@@ -94478,7 +94914,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_client_domtrans" lineno="667">
+<interface name="ssh_client_domtrans" lineno="669">
<summary>
Execute the ssh client in the ssh client domain.
</summary>
@@ -94488,7 +94924,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_exec" lineno="685">
+<interface name="ssh_exec" lineno="687">
<summary>
Execute the ssh client in the caller domain.
</summary>
@@ -94498,7 +94934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_key_files" lineno="704">
+<interface name="ssh_setattr_key_files" lineno="706">
<summary>
Set the attributes of sshd key files.
</summary>
@@ -94508,7 +94944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_agent_exec" lineno="723">
+<interface name="ssh_agent_exec" lineno="725">
<summary>
Execute the ssh agent client in the caller domain.
</summary>
@@ -94518,7 +94954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_home_dirs" lineno="742">
+<interface name="ssh_setattr_home_dirs" lineno="744">
<summary>
Set the attributes of ssh home directory (~/.ssh)
</summary>
@@ -94528,7 +94964,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_create_home_dirs" lineno="760">
+<interface name="ssh_create_home_dirs" lineno="762">
<summary>
Create ssh home directory (~/.ssh)
</summary>
@@ -94538,7 +94974,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_user_home_files" lineno="779">
+<interface name="ssh_read_user_home_files" lineno="781">
<summary>
Read ssh home directory content
</summary>
@@ -94548,7 +94984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans_keygen" lineno="800">
+<interface name="ssh_domtrans_keygen" lineno="802">
<summary>
Execute the ssh key generator in the ssh keygen domain.
</summary>
@@ -94558,7 +94994,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_read_server_keys" lineno="818">
+<interface name="ssh_read_server_keys" lineno="820">
<summary>
Read ssh server keys
</summary>
@@ -94568,7 +95004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="836">
+<interface name="ssh_dontaudit_read_server_keys" lineno="838">
<summary>
Do not audit denials on reading ssh server keys
</summary>
@@ -94578,7 +95014,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_manage_home_files" lineno="854">
+<interface name="ssh_manage_home_files" lineno="856">
<summary>
Manage ssh home directory content
</summary>
@@ -94588,7 +95024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_delete_tmp" lineno="873">
+<interface name="ssh_delete_tmp" lineno="875">
<summary>
Delete from the ssh temp files.
</summary>
@@ -94598,7 +95034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_agent_tmp" lineno="892">
+<interface name="ssh_dontaudit_agent_tmp" lineno="894">
<summary>
dontaudit access to ssh agent tmp dirs
</summary>
@@ -94858,6 +95294,13 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="switcheroo" filename="policy/modules/services/switcheroo.if">
+<summary>switcheroo daemon</summary>
+
+<desc>
+Daemon to control which apps use a integrated GPU and which use discrete
+</desc>
+</module>
<module name="sympa" filename="policy/modules/services/sympa.if">
<summary>Sympa mailing list manager</summary>
<desc>
@@ -95321,6 +95764,13 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="thunderbolt" filename="policy/modules/services/thunderbolt.if">
+<summary>thunderbolt daemon</summary>
+
+<desc>
+Daemon to control authentication for Thunderbolt.
+</desc>
+</module>
<module name="timidity" filename="policy/modules/services/timidity.if">
<summary>MIDI to WAV converter and player configured as a service.</summary>
</module>
@@ -97084,7 +97534,7 @@ Role allowed access
</summary>
</param>
</template>
-<template name="xserver_role" lineno="168">
+<template name="xserver_role" lineno="171">
<summary>
Rules required for using the X Windows server
and environment.
@@ -97111,7 +97561,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="xserver_ro_session" lineno="241">
+<interface name="xserver_ro_session" lineno="252">
<summary>
Create sessions on the X server, with read-only
access to the X server shared
@@ -97128,11 +97578,11 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</interface>
-<interface name="xserver_rw_session" lineno="283">
+<interface name="xserver_rw_session" lineno="294">
<summary>
Create sessions on the X server, with read and write
-access to the X server shared
-memory segments.
+access to the X server shared memory segments, but
+do not bypass existing tunable policy logic.
</summary>
<param name="domain">
<summary>
@@ -97145,7 +97595,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</interface>
-<interface name="xserver_non_drawing_client" lineno="303">
+<interface name="xserver_non_drawing_client" lineno="320">
<summary>
Create non-drawing client sessions on an X server.
</summary>
@@ -97155,7 +97605,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="xserver_common_x_domain_template" lineno="342">
+<template name="xserver_common_x_domain_template" lineno="359">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
@@ -97173,7 +97623,7 @@ Client domain allowed access.
</summary>
</param>
</template>
-<template name="xserver_object_types_template" lineno="401">
+<template name="xserver_object_types_template" lineno="418">
<summary>
Template for creating the set of types used
in an X windows domain.
@@ -97185,7 +97635,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="xserver_user_x_domain_template" lineno="443">
+<template name="xserver_user_x_domain_template" lineno="460">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
@@ -97208,7 +97658,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</template>
-<interface name="xserver_use_user_fonts" lineno="510">
+<interface name="xserver_use_user_fonts" lineno="530">
<summary>
Read user fonts, user font configuration,
and manage the user font cache.
@@ -97229,7 +97679,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_domtrans_xauth" lineno="542">
+<interface name="xserver_domtrans_xauth" lineno="562">
<summary>
Transition to the Xauthority domain.
</summary>
@@ -97239,7 +97689,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="565">
+<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="585">
<summary>
Create a Xauthority file in the user home directory.
</summary>
@@ -97254,7 +97704,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="589">
+<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="609">
<summary>
Create a ICEauthority file in
the user home directory.
@@ -97270,7 +97720,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="608">
+<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="628">
<summary>
Create a .xsession-errors log
file in the user home directory.
@@ -97281,7 +97731,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_xauth" lineno="626">
+<interface name="xserver_read_user_xauth" lineno="646">
<summary>
Read all users .Xauthority.
</summary>
@@ -97291,7 +97741,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_dmrc" lineno="645">
+<interface name="xserver_read_user_dmrc" lineno="665">
<summary>
Read all users .dmrc.
</summary>
@@ -97301,7 +97751,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_iceauth" lineno="664">
+<interface name="xserver_read_user_iceauth" lineno="684">
<summary>
Read all users .ICEauthority.
</summary>
@@ -97311,7 +97761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setattr_console_pipes" lineno="683">
+<interface name="xserver_setattr_console_pipes" lineno="703">
<summary>
Set the attributes of the X windows console named pipes.
</summary>
@@ -97321,7 +97771,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_console" lineno="701">
+<interface name="xserver_rw_console" lineno="721">
<summary>
Read and write the X windows console named pipe.
</summary>
@@ -97331,7 +97781,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_console_pipes" lineno="719">
+<interface name="xserver_create_console_pipes" lineno="739">
<summary>
Create the X windows console named pipes.
</summary>
@@ -97341,7 +97791,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_relabel_console_pipes" lineno="737">
+<interface name="xserver_relabel_console_pipes" lineno="757">
<summary>
relabel the X windows console named pipes.
</summary>
@@ -97351,7 +97801,32 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_use_xdm_fds" lineno="755">
+<interface name="xserver_xdm_auth_filetrans" lineno="790">
+<summary>
+Create xdm authorization files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="file_type">
+<summary>
+The type of the object to be created
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The object class.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="xserver_use_xdm_fds" lineno="808">
<summary>
Use file descriptors for xdm.
</summary>
@@ -97361,7 +97836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_use_xdm_fds" lineno="774">
+<interface name="xserver_dontaudit_use_xdm_fds" lineno="827">
<summary>
Do not audit attempts to inherit
XDM file descriptors.
@@ -97372,7 +97847,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_sigchld_xdm" lineno="792">
+<interface name="xserver_sigchld_xdm" lineno="845">
<summary>
Allow domain to send sigchld to xdm_t
</summary>
@@ -97382,7 +97857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_pipes" lineno="810">
+<interface name="xserver_rw_xdm_pipes" lineno="863">
<summary>
Read and write XDM unnamed pipes.
</summary>
@@ -97392,7 +97867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="829">
+<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="882">
<summary>
Do not audit attempts to read and write
XDM unnamed pipes.
@@ -97403,7 +97878,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat_xdm" lineno="849">
+<interface name="xserver_dbus_chat_xdm" lineno="902">
<summary>
Send and receive messages from
xdm over dbus.
@@ -97414,7 +97889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_state" lineno="869">
+<interface name="xserver_read_xdm_state" lineno="922">
<summary>
Read xdm process state files.
</summary>
@@ -97424,7 +97899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setsched_xdm" lineno="891">
+<interface name="xserver_setsched_xdm" lineno="944">
<summary>
Set the priority of the X Display
Manager (XDM).
@@ -97435,7 +97910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_stream_connect_xdm" lineno="910">
+<interface name="xserver_stream_connect_xdm" lineno="963">
<summary>
Connect to XDM over a unix domain
stream socket.
@@ -97446,7 +97921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_rw_config" lineno="929">
+<interface name="xserver_read_xdm_rw_config" lineno="982">
<summary>
Read xdm-writable configuration files.
</summary>
@@ -97456,7 +97931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setattr_xdm_tmp_dirs" lineno="948">
+<interface name="xserver_setattr_xdm_tmp_dirs" lineno="1001">
<summary>
Set the attributes of XDM temporary directories.
</summary>
@@ -97466,7 +97941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_sockets" lineno="967">
+<interface name="xserver_create_xdm_tmp_sockets" lineno="1020">
<summary>
Create a named socket in a XDM
temporary directory.
@@ -97477,7 +97952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_delete_xdm_tmp_sockets" lineno="988">
+<interface name="xserver_delete_xdm_tmp_sockets" lineno="1041">
<summary>
Delete a named socket in a XDM
temporary directory.
@@ -97488,7 +97963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_runtime_files" lineno="1007">
+<interface name="xserver_read_xdm_runtime_files" lineno="1060">
<summary>
Read XDM runtime files.
</summary>
@@ -97498,7 +97973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_lib_files" lineno="1026">
+<interface name="xserver_read_xdm_lib_files" lineno="1079">
<summary>
Read XDM var lib files.
</summary>
@@ -97508,7 +97983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_entry_type" lineno="1044">
+<interface name="xserver_xsession_entry_type" lineno="1097">
<summary>
Make an X session script an entrypoint for the specified domain.
</summary>
@@ -97518,7 +97993,7 @@ The domain for which the shell is an entrypoint.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_spec_domtrans" lineno="1081">
+<interface name="xserver_xsession_spec_domtrans" lineno="1134">
<summary>
Execute an X session in the target domain. This
is an explicit transition, requiring the
@@ -97547,7 +98022,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_xsession_log" lineno="1100">
+<interface name="xserver_write_inherited_xsession_log" lineno="1153">
<summary>
Write to inherited xsession log
files such as .xsession-errors.
@@ -97558,7 +98033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xsession_log" lineno="1120">
+<interface name="xserver_rw_xsession_log" lineno="1173">
<summary>
Read and write xsession log
files such as .xsession-errors.
@@ -97569,7 +98044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xsession_log" lineno="1139">
+<interface name="xserver_manage_xsession_log" lineno="1192">
<summary>
Manage xsession log files such
as .xsession-errors.
@@ -97580,7 +98055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_log" lineno="1158">
+<interface name="xserver_write_inherited_log" lineno="1211">
<summary>
Write to inherited X server log
files like /var/log/lightdm/lightdm.log
@@ -97591,7 +98066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_getattr_log" lineno="1176">
+<interface name="xserver_getattr_log" lineno="1229">
<summary>
Get the attributes of X server logs.
</summary>
@@ -97601,7 +98076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_write_log" lineno="1196">
+<interface name="xserver_dontaudit_write_log" lineno="1249">
<summary>
Do not audit attempts to write the X server
log files.
@@ -97612,7 +98087,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_delete_log" lineno="1214">
+<interface name="xserver_delete_log" lineno="1267">
<summary>
Delete X server log files.
</summary>
@@ -97622,7 +98097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xkb_libs" lineno="1235">
+<interface name="xserver_read_xkb_libs" lineno="1288">
<summary>
Read X keyboard extension libraries.
</summary>
@@ -97632,7 +98107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_dirs" lineno="1256">
+<interface name="xserver_create_xdm_tmp_dirs" lineno="1310">
<summary>
Create xdm temporary directories.
</summary>
@@ -97642,7 +98117,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_tmp_files" lineno="1274">
+<interface name="xserver_read_xdm_tmp_files" lineno="1328">
<summary>
Read xdm temporary files.
</summary>
@@ -97652,7 +98127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1293">
+<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1347">
<summary>
Do not audit attempts to read xdm temporary files.
</summary>
@@ -97662,7 +98137,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_tmp_files" lineno="1312">
+<interface name="xserver_rw_xdm_tmp_files" lineno="1366">
<summary>
Read write xdm temporary files.
</summary>
@@ -97672,7 +98147,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xdm_tmp_files" lineno="1331">
+<interface name="xserver_manage_xdm_tmp_files" lineno="1385">
<summary>
Create, read, write, and delete xdm temporary files.
</summary>
@@ -97682,7 +98157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1350">
+<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1404">
<summary>
Do not audit attempts to get the attributes of
xdm temporary named sockets.
@@ -97693,7 +98168,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_list_xdm_tmp" lineno="1368">
+<interface name="xserver_list_xdm_tmp" lineno="1422">
<summary>
list xdm_tmp_t directories
</summary>
@@ -97703,7 +98178,7 @@ Domain to allow
</summary>
</param>
</interface>
-<interface name="xserver_domtrans" lineno="1386">
+<interface name="xserver_domtrans" lineno="1440">
<summary>
Execute the X server in the X server domain.
</summary>
@@ -97713,7 +98188,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_signal" lineno="1405">
+<interface name="xserver_signal" lineno="1459">
<summary>
Signal X servers
</summary>
@@ -97723,7 +98198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_kill" lineno="1423">
+<interface name="xserver_kill" lineno="1477">
<summary>
Kill X servers
</summary>
@@ -97733,7 +98208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_state" lineno="1441">
+<interface name="xserver_read_state" lineno="1495">
<summary>
Allow reading xserver_t files to get cgroup and sessionid
</summary>
@@ -97743,7 +98218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_shm" lineno="1461">
+<interface name="xserver_rw_shm" lineno="1515">
<summary>
Read and write X server Sys V Shared
memory segments.
@@ -97754,7 +98229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1480">
+<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1536">
<summary>
Do not audit attempts to read and write to
X server sockets.
@@ -97765,7 +98240,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1499">
+<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1555">
<summary>
Do not audit attempts to read and write X server
unix domain stream sockets.
@@ -97776,7 +98251,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_stream_connect" lineno="1518">
+<interface name="xserver_stream_connect" lineno="1574">
<summary>
Connect to the X server over a unix domain
stream socket.
@@ -97787,7 +98262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_tmp_files" lineno="1537">
+<interface name="xserver_read_tmp_files" lineno="1593">
<summary>
Read X server temporary files.
</summary>
@@ -97797,7 +98272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat" lineno="1556">
+<interface name="xserver_dbus_chat" lineno="1612">
<summary>
talk to xserver_t by dbus
</summary>
@@ -97807,7 +98282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_core_devices" lineno="1578">
+<interface name="xserver_manage_core_devices" lineno="1634">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain permission to read the
@@ -97819,7 +98294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_unconfined" lineno="1601">
+<interface name="xserver_unconfined" lineno="1657">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain complete control over the
@@ -97831,7 +98306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_keys" lineno="1621">
+<interface name="xserver_rw_xdm_keys" lineno="1677">
<summary>
Manage keys for xdm.
</summary>
@@ -97841,7 +98316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_link_xdm_keys" lineno="1639">
+<interface name="xserver_link_xdm_keys" lineno="1695">
<summary>
Manage keys for xdm.
</summary>
@@ -97851,7 +98326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_mesa_shader_cache" lineno="1657">
+<interface name="xserver_rw_mesa_shader_cache" lineno="1713">
<summary>
Read and write the mesa shader cache.
</summary>
@@ -97861,7 +98336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_mesa_shader_cache" lineno="1678">
+<interface name="xserver_manage_mesa_shader_cache" lineno="1734">
<summary>
Manage the mesa shader cache.
</summary>
@@ -97871,6 +98346,29 @@ Domain allowed access.
</summary>
</param>
</interface>
+<tunable name="xserver_can_network" dftval="false">
+<desc>
+<p>
+Allows the X server to use TCP/IP
+networking functionality (insecure).
+</p>
+</desc>
+</tunable>
+<tunable name="xserver_xdm_can_network" dftval="false">
+<desc>
+<p>
+Allows the X display manager to use
+TCP/IP networking functionality (insecure).
+</p>
+</desc>
+</tunable>
+<tunable name="xdm_sysadm_login" dftval="false">
+<desc>
+<p>
+Allow xdm logins as sysadm
+</p>
+</desc>
+</tunable>
<tunable name="allow_write_xshm" dftval="false">
<desc>
<p>
@@ -97879,10 +98377,11 @@ memory segments.
</p>
</desc>
</tunable>
-<tunable name="xdm_sysadm_login" dftval="false">
+<tunable name="xserver_client_writes_xserver_tmpfs" dftval="false">
<desc>
<p>
-Allow xdm logins as sysadm
+Allows clients to write to the X server tmpfs
+files.
</p>
</desc>
</tunable>
@@ -98429,7 +98928,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_login_pgm_domain" lineno="145">
+<interface name="auth_read_pam_motd_dynamic" lineno="146">
+<summary>
+Read the pam module motd with dynamic support during authentication.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_login_pgm_domain" lineno="165">
<summary>
Make the specified domain used for a login program.
</summary>
@@ -98439,7 +98948,7 @@ Domain type used for a login program domain.
</summary>
</param>
</interface>
-<interface name="auth_login_entry_type" lineno="232">
+<interface name="auth_login_entry_type" lineno="252">
<summary>
Use the login program as an entry point program.
</summary>
@@ -98449,7 +98958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_login_program" lineno="255">
+<interface name="auth_domtrans_login_program" lineno="275">
<summary>
Execute a login_program in the target domain.
</summary>
@@ -98464,7 +98973,7 @@ The type of the login_program process.
</summary>
</param>
</interface>
-<interface name="auth_ranged_domtrans_login_program" lineno="285">
+<interface name="auth_ranged_domtrans_login_program" lineno="305">
<summary>
Execute a login_program in the target domain,
with a range transition.
@@ -98485,7 +98994,7 @@ Range of the login program.
</summary>
</param>
</interface>
-<interface name="auth_search_cache" lineno="311">
+<interface name="auth_search_cache" lineno="331">
<summary>
Search authentication cache
</summary>
@@ -98495,7 +99004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_cache" lineno="329">
+<interface name="auth_read_cache" lineno="349">
<summary>
Read authentication cache
</summary>
@@ -98505,7 +99014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_cache" lineno="347">
+<interface name="auth_rw_cache" lineno="367">
<summary>
Read/Write authentication cache
</summary>
@@ -98515,7 +99024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_cache" lineno="365">
+<interface name="auth_manage_cache" lineno="385">
<summary>
Manage authentication cache
</summary>
@@ -98525,7 +99034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_var_filetrans_cache" lineno="384">
+<interface name="auth_var_filetrans_cache" lineno="404">
<summary>
Automatic transition from cache_t to cache.
</summary>
@@ -98535,7 +99044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_chk_passwd" lineno="402">
+<interface name="auth_domtrans_chk_passwd" lineno="422">
<summary>
Run unix_chkpwd to check a password.
</summary>
@@ -98545,7 +99054,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_chkpwd" lineno="446">
+<interface name="auth_domtrans_chkpwd" lineno="466">
<summary>
Run unix_chkpwd to check a password.
Stripped down version to be called within boolean
@@ -98556,7 +99065,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_chk_passwd" lineno="468">
+<interface name="auth_run_chk_passwd" lineno="488">
<summary>
Execute chkpwd programs in the chkpwd domain.
</summary>
@@ -98571,7 +99080,7 @@ The role to allow the chkpwd domain.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_upd_passwd" lineno="487">
+<interface name="auth_domtrans_upd_passwd" lineno="507">
<summary>
Execute a domain transition to run unix_update.
</summary>
@@ -98581,7 +99090,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_upd_passwd" lineno="512">
+<interface name="auth_run_upd_passwd" lineno="532">
<summary>
Execute updpwd programs in the updpwd domain.
</summary>
@@ -98596,7 +99105,7 @@ The role to allow the updpwd domain.
</summary>
</param>
</interface>
-<interface name="auth_getattr_shadow" lineno="531">
+<interface name="auth_getattr_shadow" lineno="551">
<summary>
Get the attributes of the shadow passwords file.
</summary>
@@ -98606,7 +99115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_getattr_shadow" lineno="551">
+<interface name="auth_dontaudit_getattr_shadow" lineno="571">
<summary>
Do not audit attempts to get the attributes
of the shadow passwords file.
@@ -98617,7 +99126,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_read_shadow" lineno="573">
+<interface name="auth_read_shadow" lineno="593">
<summary>
Read the shadow passwords file (/etc/shadow)
</summary>
@@ -98627,7 +99136,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_map_shadow" lineno="588">
+<interface name="auth_map_shadow" lineno="609">
<summary>
Map the shadow passwords file (/etc/shadow)
</summary>
@@ -98637,7 +99146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_can_read_shadow_passwords" lineno="614">
+<interface name="auth_can_read_shadow_passwords" lineno="635">
<summary>
Pass shadow assertion for reading.
</summary>
@@ -98656,7 +99165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_tunable_read_shadow" lineno="640">
+<interface name="auth_tunable_read_shadow" lineno="661">
<summary>
Read the shadow password file.
</summary>
@@ -98674,7 +99183,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_shadow" lineno="660">
+<interface name="auth_dontaudit_read_shadow" lineno="681">
<summary>
Do not audit attempts to read the shadow
password file (/etc/shadow).
@@ -98685,7 +99194,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_rw_shadow" lineno="678">
+<interface name="auth_rw_shadow" lineno="699">
<summary>
Read and write the shadow password file (/etc/shadow).
</summary>
@@ -98695,7 +99204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_shadow" lineno="701">
+<interface name="auth_manage_shadow" lineno="722">
<summary>
Create, read, write, and delete the shadow
password file.
@@ -98706,7 +99215,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_etc_filetrans_shadow" lineno="727">
+<interface name="auth_etc_filetrans_shadow" lineno="749">
<summary>
Automatic transition from etc to shadow.
</summary>
@@ -98721,7 +99230,27 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_relabelto_shadow" lineno="746">
+<interface name="auth_read_shadow_history" lineno="767">
+<summary>
+Read the shadow history file.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_manage_shadow_history" lineno="786">
+<summary>
+Manage the shadow history file.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_relabelto_shadow" lineno="806">
<summary>
Relabel to the shadow
password file type.
@@ -98732,7 +99261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_shadow" lineno="768">
+<interface name="auth_relabel_shadow" lineno="828">
<summary>
Relabel from and to the shadow
password file type.
@@ -98743,7 +99272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_shadow_lock" lineno="789">
+<interface name="auth_rw_shadow_lock" lineno="849">
<summary>
Read/Write shadow lock files.
</summary>
@@ -98753,7 +99282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_append_faillog" lineno="807">
+<interface name="auth_append_faillog" lineno="867">
<summary>
Append to the login failure log.
</summary>
@@ -98763,7 +99292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_faillog_files" lineno="826">
+<interface name="auth_create_faillog_files" lineno="886">
<summary>
Create fail log lock (in /run/faillock).
</summary>
@@ -98773,7 +99302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_faillog" lineno="844">
+<interface name="auth_rw_faillog" lineno="904">
<summary>
Read and write the login failure log.
</summary>
@@ -98783,7 +99312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_faillog" lineno="863">
+<interface name="auth_manage_faillog" lineno="923">
<summary>
Manage the login failure logs.
</summary>
@@ -98793,7 +99322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_setattr_faillog_files" lineno="882">
+<interface name="auth_setattr_faillog_files" lineno="942">
<summary>
Setattr the login failure logs.
</summary>
@@ -98803,7 +99332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_lastlog" lineno="901">
+<interface name="auth_read_lastlog" lineno="961">
<summary>
Read the last logins log.
</summary>
@@ -98814,7 +99343,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_append_lastlog" lineno="920">
+<interface name="auth_append_lastlog" lineno="980">
<summary>
Append only to the last logins log.
</summary>
@@ -98824,7 +99353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_lastlog" lineno="939">
+<interface name="auth_relabel_lastlog" lineno="999">
<summary>
relabel the last logins log.
</summary>
@@ -98834,7 +99363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_lastlog" lineno="958">
+<interface name="auth_rw_lastlog" lineno="1018">
<summary>
Read and write to the last logins log.
</summary>
@@ -98844,7 +99373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_lastlog" lineno="977">
+<interface name="auth_manage_lastlog" lineno="1037">
<summary>
Manage the last logins log.
</summary>
@@ -98854,7 +99383,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam" lineno="996">
+<interface name="auth_domtrans_pam" lineno="1056">
<summary>
Execute pam programs in the pam domain.
</summary>
@@ -98864,7 +99393,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_signal_pam" lineno="1014">
+<interface name="auth_signal_pam" lineno="1074">
<summary>
Send generic signals to pam processes.
</summary>
@@ -98874,7 +99403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_run_pam" lineno="1037">
+<interface name="auth_run_pam" lineno="1097">
<summary>
Execute pam programs in the PAM domain.
</summary>
@@ -98889,7 +99418,7 @@ The role to allow the PAM domain.
</summary>
</param>
</interface>
-<interface name="auth_exec_pam" lineno="1056">
+<interface name="auth_exec_pam" lineno="1116">
<summary>
Execute the pam program.
</summary>
@@ -98899,7 +99428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_var_auth" lineno="1075">
+<interface name="auth_read_var_auth" lineno="1135">
<summary>
Read var auth files. Used by various other applications
and pam applets etc.
@@ -98910,7 +99439,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_var_auth" lineno="1095">
+<interface name="auth_rw_var_auth" lineno="1155">
<summary>
Read and write var auth files. Used by various other applications
and pam applets etc.
@@ -98921,7 +99450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_var_auth" lineno="1115">
+<interface name="auth_manage_var_auth" lineno="1175">
<summary>
Manage var auth files. Used by various other applications
and pam applets etc.
@@ -98932,7 +99461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_runtime_dirs" lineno="1136">
+<interface name="auth_manage_pam_runtime_dirs" lineno="1196">
<summary>
Manage pam runtime dirs.
</summary>
@@ -98942,7 +99471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_runtime_filetrans_pam_runtime" lineno="1167">
+<interface name="auth_runtime_filetrans_pam_runtime" lineno="1227">
<summary>
Create specified objects in
pid directories with the pam runtime
@@ -98964,7 +99493,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_runtime_files" lineno="1185">
+<interface name="auth_read_pam_runtime_files" lineno="1245">
<summary>
Read PAM runtime files.
</summary>
@@ -98974,7 +99503,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1205">
+<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1265">
<summary>
Do not audit attempts to read PAM runtime files.
</summary>
@@ -98984,7 +99513,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_runtime_files" lineno="1223">
+<interface name="auth_delete_pam_runtime_files" lineno="1283">
<summary>
Delete pam runtime files.
</summary>
@@ -98994,7 +99523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_runtime_files" lineno="1242">
+<interface name="auth_manage_pam_runtime_files" lineno="1302">
<summary>
Create, read, write, and delete pam runtime files.
</summary>
@@ -99004,7 +99533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam_console" lineno="1261">
+<interface name="auth_domtrans_pam_console" lineno="1321">
<summary>
Execute pam_console with a domain transition.
</summary>
@@ -99014,7 +99543,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_search_pam_console_data" lineno="1280">
+<interface name="auth_search_pam_console_data" lineno="1340">
<summary>
Search the contents of the
pam_console data directory.
@@ -99025,7 +99554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_list_pam_console_data" lineno="1300">
+<interface name="auth_list_pam_console_data" lineno="1360">
<summary>
List the contents of the pam_console
data directory.
@@ -99036,7 +99565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_pam_console_data_dirs" lineno="1319">
+<interface name="auth_create_pam_console_data_dirs" lineno="1379">
<summary>
Create pam var console pid directories.
</summary>
@@ -99046,7 +99575,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_pam_console_data_dirs" lineno="1338">
+<interface name="auth_relabel_pam_console_data_dirs" lineno="1398">
<summary>
Relabel pam_console data directories.
</summary>
@@ -99056,7 +99585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_console_data" lineno="1356">
+<interface name="auth_read_pam_console_data" lineno="1416">
<summary>
Read pam_console data files.
</summary>
@@ -99066,7 +99595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_console_data" lineno="1377">
+<interface name="auth_manage_pam_console_data" lineno="1437">
<summary>
Create, read, write, and delete
pam_console data files.
@@ -99077,7 +99606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_console_data" lineno="1397">
+<interface name="auth_delete_pam_console_data" lineno="1457">
<summary>
Delete pam_console data.
</summary>
@@ -99087,7 +99616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_runtime_filetrans_pam_var_console" lineno="1430">
+<interface name="auth_runtime_filetrans_pam_var_console" lineno="1490">
<summary>
Create specified objects in generic
runtime directories with the pam var
@@ -99110,7 +99639,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_utempter" lineno="1448">
+<interface name="auth_domtrans_utempter" lineno="1508">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -99120,7 +99649,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_utempter" lineno="1471">
+<interface name="auth_run_utempter" lineno="1531">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -99135,7 +99664,7 @@ The role to allow the utempter domain.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_exec_utempter" lineno="1490">
+<interface name="auth_dontaudit_exec_utempter" lineno="1550">
<summary>
Do not audit attempts to execute utempter executable.
</summary>
@@ -99145,7 +99674,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_setattr_login_records" lineno="1508">
+<interface name="auth_setattr_login_records" lineno="1568">
<summary>
Set the attributes of login record files.
</summary>
@@ -99155,7 +99684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_login_records" lineno="1528">
+<interface name="auth_read_login_records" lineno="1588">
<summary>
Read login records files (/var/log/wtmp).
</summary>
@@ -99166,7 +99695,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_read_login_records" lineno="1549">
+<interface name="auth_dontaudit_read_login_records" lineno="1609">
<summary>
Do not audit attempts to read login records
files (/var/log/wtmp).
@@ -99178,7 +99707,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_write_login_records" lineno="1568">
+<interface name="auth_dontaudit_write_login_records" lineno="1628">
<summary>
Do not audit attempts to write to
login records files.
@@ -99189,7 +99718,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_append_login_records" lineno="1586">
+<interface name="auth_append_login_records" lineno="1646">
<summary>
Append to login records (wtmp).
</summary>
@@ -99199,7 +99728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_write_login_records" lineno="1605">
+<interface name="auth_write_login_records" lineno="1665">
<summary>
Write to login records (wtmp).
</summary>
@@ -99209,7 +99738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_login_records" lineno="1623">
+<interface name="auth_rw_login_records" lineno="1683">
<summary>
Read and write login records.
</summary>
@@ -99219,7 +99748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_log_filetrans_login_records" lineno="1643">
+<interface name="auth_log_filetrans_login_records" lineno="1703">
<summary>
Create a login records in the log directory
using a type transition.
@@ -99230,7 +99759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_login_records" lineno="1662">
+<interface name="auth_manage_login_records" lineno="1722">
<summary>
Create, read, write, and delete login
records files.
@@ -99241,7 +99770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_login_records" lineno="1681">
+<interface name="auth_relabel_login_records" lineno="1741">
<summary>
Relabel login record files.
</summary>
@@ -99251,7 +99780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_use_nsswitch" lineno="1709">
+<interface name="auth_use_nsswitch" lineno="1769">
<summary>
Use nsswitch to look up user, password, group, or
host information.
@@ -99271,7 +99800,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="auth_unconfined" lineno="1737">
+<interface name="auth_unconfined" lineno="1797">
<summary>
Unconfined access to the authlogin module.
</summary>
@@ -99569,7 +100098,37 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_relabelto_entry_files" lineno="132">
+<interface name="fstools_read_fsadm_db_files" lineno="131">
+<summary>
+Read fsadm_db_t files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fstools_manage_fsadm_db_files" lineno="149">
+<summary>
+Manage all fsadm_db_t files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fstools_watch_fsadm_db_dirs" lineno="169">
+<summary>
+Watch fsadm_db_t directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fstools_relabelto_entry_files" lineno="188">
<summary>
Relabel a file to the type used by the
filesystem tools programs.
@@ -99580,7 +100139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_manage_entry_files" lineno="151">
+<interface name="fstools_manage_entry_files" lineno="207">
<summary>
Create, read, write, and delete a file used by the
filesystem tools programs.
@@ -99591,7 +100150,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_write_log" lineno="169">
+<interface name="fstools_write_log" lineno="225">
<summary>
Write to fsadm_log_t
</summary>
@@ -99601,7 +100160,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_manage_runtime_files" lineno="188">
+<interface name="fstools_manage_runtime_files" lineno="244">
<summary>
Create, read, write, and delete filesystem tools
runtime files.
@@ -99612,7 +100171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_getattr_swap_files" lineno="206">
+<interface name="fstools_getattr_swap_files" lineno="262">
<summary>
Getattr swapfile
</summary>
@@ -99622,7 +100181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_dontaudit_getattr_swap_files" lineno="224">
+<interface name="fstools_dontaudit_getattr_swap_files" lineno="280">
<summary>
Ignore access to a swapfile.
</summary>
@@ -99632,7 +100191,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fstools_relabelto_swap_files" lineno="242">
+<interface name="fstools_relabelto_swap_files" lineno="298">
<summary>
Relabel to swapfile.
</summary>
@@ -99642,7 +100201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_manage_swap_files" lineno="260">
+<interface name="fstools_manage_swap_files" lineno="316">
<summary>
Manage swapfile.
</summary>
@@ -99652,6 +100211,26 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="fstools_runtime_filetrans" lineno="344">
+<summary>
+Create objects in the runtime directory with an automatic type transition to the fsadm runtime type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
</module>
<module name="getty" filename="policy/modules/system/getty.if">
<summary>Manages physical or virtual terminals.</summary>
@@ -100314,7 +100893,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_fds" lineno="1055">
+<interface name="init_unix_stream_socket_sendto" lineno="1016">
+<summary>
+Send to init with a unix socket.
+Without any additional permissions.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_use_fds" lineno="1074">
<summary>
Inherit and use file descriptors from init.
</summary>
@@ -100364,7 +100954,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="init_dontaudit_use_fds" lineno="1074">
+<interface name="init_dontaudit_use_fds" lineno="1093">
<summary>
Do not audit attempts to inherit file
descriptors from init.
@@ -100375,7 +100965,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dgram_send" lineno="1093">
+<interface name="init_dgram_send" lineno="1112">
<summary>
Send messages to init unix datagram sockets.
</summary>
@@ -100386,7 +100976,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1113">
+<interface name="init_rw_inherited_stream_socket" lineno="1132">
<summary>
Read and write to inherited init unix streams.
</summary>
@@ -100396,7 +100986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_stream_sockets" lineno="1132">
+<interface name="init_rw_stream_sockets" lineno="1151">
<summary>
Allow the specified domain to read/write to
init with unix domain stream sockets.
@@ -100407,7 +100997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_search_keys" lineno="1150">
+<interface name="init_dontaudit_search_keys" lineno="1169">
<summary>
Do not audit attempts to search init keys.
</summary>
@@ -100417,7 +101007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_system" lineno="1168">
+<interface name="init_start_system" lineno="1187">
<summary>
start service (systemd).
</summary>
@@ -100427,7 +101017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_system" lineno="1186">
+<interface name="init_stop_system" lineno="1205">
<summary>
stop service (systemd).
</summary>
@@ -100437,7 +101027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_system_status" lineno="1204">
+<interface name="init_get_system_status" lineno="1223">
<summary>
Get all service status (systemd).
</summary>
@@ -100447,7 +101037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_enable" lineno="1222">
+<interface name="init_enable" lineno="1241">
<summary>
Enable all systemd services (systemd).
</summary>
@@ -100457,7 +101047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_disable" lineno="1240">
+<interface name="init_disable" lineno="1259">
<summary>
Disable all services (systemd).
</summary>
@@ -100467,7 +101057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reload" lineno="1258">
+<interface name="init_reload" lineno="1277">
<summary>
Reload all services (systemd).
</summary>
@@ -100477,7 +101067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reboot_system" lineno="1276">
+<interface name="init_reboot_system" lineno="1295">
<summary>
Reboot the system (systemd).
</summary>
@@ -100487,7 +101077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_shutdown_system" lineno="1294">
+<interface name="init_shutdown_system" lineno="1313">
<summary>
Shutdown (halt) the system (systemd).
</summary>
@@ -100497,7 +101087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_service_status" lineno="1312">
+<interface name="init_service_status" lineno="1331">
<summary>
Allow specified domain to get init status
</summary>
@@ -100507,7 +101097,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_service_start" lineno="1331">
+<interface name="init_service_start" lineno="1350">
<summary>
Allow specified domain to get init start
</summary>
@@ -100517,7 +101107,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat" lineno="1351">
+<interface name="init_dbus_chat" lineno="1370">
<summary>
Send and receive messages from
systemd over dbus.
@@ -100528,7 +101118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_run_bpf" lineno="1371">
+<interface name="init_run_bpf" lineno="1390">
<summary>
Run init BPF programs.
</summary>
@@ -100538,7 +101128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_var_lib_links" lineno="1390">
+<interface name="init_read_var_lib_links" lineno="1409">
<summary>
read/follow symlinks under /var/lib/systemd/
</summary>
@@ -100548,7 +101138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_search_var_lib_dirs" lineno="1409">
+<interface name="init_search_var_lib_dirs" lineno="1428">
<summary>
Search /var/lib/systemd/ dirs
</summary>
@@ -100558,7 +101148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_var_lib_dirs" lineno="1428">
+<interface name="init_list_var_lib_dirs" lineno="1447">
<summary>
List /var/lib/systemd/ dir
</summary>
@@ -100568,7 +101158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1446">
+<interface name="init_relabel_var_lib_dirs" lineno="1465">
<summary>
Relabel dirs in /var/lib/systemd/.
</summary>
@@ -100578,7 +101168,20 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_var_lib_files" lineno="1464">
+<interface name="init_manage_random_seed" lineno="1486">
+<summary>
+Create, read, write, and delete the
+pseudorandom number generator seed
+file in /var/lib or /var/run
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_var_lib_files" lineno="1507">
<summary>
Manage files in /var/lib/systemd/.
</summary>
@@ -100588,7 +101191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_var_lib_filetrans" lineno="1499">
+<interface name="init_var_lib_filetrans" lineno="1542">
<summary>
Create files in /var/lib/systemd
with an automatic type transition.
@@ -100614,7 +101217,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_search_runtime" lineno="1518">
+<interface name="init_search_runtime" lineno="1561">
<summary>
Search init runtime directories, e.g. /run/systemd.
</summary>
@@ -100624,7 +101227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_runtime" lineno="1536">
+<interface name="init_list_runtime" lineno="1579">
<summary>
List init runtime directories, e.g. /run/systemd.
</summary>
@@ -100634,7 +101237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_runtime_dirs" lineno="1556">
+<interface name="init_manage_runtime_dirs" lineno="1599">
<summary>
Create, read, write, and delete
directories in the /run/systemd directory.
@@ -100645,7 +101248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans" lineno="1589">
+<interface name="init_runtime_filetrans" lineno="1632">
<summary>
Create files in an init runtime directory with a private type.
</summary>
@@ -100670,7 +101273,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_write_runtime_files" lineno="1608">
+<interface name="init_write_runtime_files" lineno="1651">
<summary>
Write init runtime files, e.g. in /run/systemd.
</summary>
@@ -100680,7 +101283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_files" lineno="1626">
+<interface name="init_create_runtime_files" lineno="1669">
<summary>
Create init runtime files, e.g. in /run/systemd.
</summary>
@@ -100690,7 +101293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_runtime_symlinks" lineno="1644">
+<interface name="init_manage_runtime_symlinks" lineno="1687">
<summary>
Create init runtime symbolic links, e.g. in /run/systemd.
</summary>
@@ -100700,7 +101303,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_initctl" lineno="1662">
+<interface name="init_getattr_initctl" lineno="1705">
<summary>
Get the attributes of initctl.
</summary>
@@ -100710,7 +101313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1683">
+<interface name="init_dontaudit_getattr_initctl" lineno="1726">
<summary>
Do not audit attempts to get the
attributes of initctl.
@@ -100721,7 +101324,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_initctl" lineno="1701">
+<interface name="init_write_initctl" lineno="1744">
<summary>
Write to initctl.
</summary>
@@ -100731,7 +101334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_telinit" lineno="1722">
+<interface name="init_telinit" lineno="1765">
<summary>
Use telinit (Read and write initctl).
</summary>
@@ -100742,7 +101345,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_initctl" lineno="1755">
+<interface name="init_rw_initctl" lineno="1798">
<summary>
Read and write initctl.
</summary>
@@ -100752,7 +101355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1776">
+<interface name="init_dontaudit_rw_initctl" lineno="1819">
<summary>
Do not audit attempts to read and
write initctl.
@@ -100763,7 +101366,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_script_file_entry_type" lineno="1795">
+<interface name="init_script_file_entry_type" lineno="1838">
<summary>
Make init scripts an entry point for
the specified domain.
@@ -100774,7 +101377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_spec_domtrans_script" lineno="1818">
+<interface name="init_spec_domtrans_script" lineno="1861">
<summary>
Execute init scripts with a specified domain transition.
</summary>
@@ -100784,7 +101387,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_script" lineno="1845">
+<interface name="init_domtrans_script" lineno="1888">
<summary>
Execute init scripts with an automatic domain transition.
</summary>
@@ -100794,7 +101397,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_labeled_script" lineno="1880">
+<interface name="init_domtrans_labeled_script" lineno="1923">
<summary>
Execute labelled init scripts with an automatic domain transition.
</summary>
@@ -100804,7 +101407,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_script_file_domtrans" lineno="1926">
+<interface name="init_script_file_domtrans" lineno="1969">
<summary>
Execute a init script in a specified domain.
</summary>
@@ -100829,7 +101432,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="init_kill_scripts" lineno="1945">
+<interface name="init_kill_scripts" lineno="1988">
<summary>
Send a kill signal to init scripts.
</summary>
@@ -100839,7 +101442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_script_service" lineno="1963">
+<interface name="init_manage_script_service" lineno="2006">
<summary>
Allow manage service for initrc_exec_t scripts
</summary>
@@ -100849,7 +101452,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_labeled_script_domtrans" lineno="1988">
+<interface name="init_labeled_script_domtrans" lineno="2031">
<summary>
Transition to the init script domain
on a specified labeled init script.
@@ -100865,7 +101468,7 @@ Labeled init script file.
</summary>
</param>
</interface>
-<interface name="init_all_labeled_script_domtrans" lineno="2010">
+<interface name="init_all_labeled_script_domtrans" lineno="2053">
<summary>
Transition to the init script domain
for all labeled init script types
@@ -100876,7 +101479,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_get_script_status" lineno="2028">
+<interface name="init_get_script_status" lineno="2071">
<summary>
Allow getting service status of initrc_exec_t scripts
</summary>
@@ -100886,7 +101489,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_startstop_service" lineno="2068">
+<interface name="init_startstop_service" lineno="2111">
<summary>
Allow the role to start and stop
labeled services.
@@ -100917,7 +101520,7 @@ Systemd unit file type.
</summary>
</param>
</interface>
-<interface name="init_run_daemon" lineno="2124">
+<interface name="init_run_daemon" lineno="2167">
<summary>
Start and stop daemon programs directly.
</summary>
@@ -100939,7 +101542,7 @@ The role to be performing this action.
</summary>
</param>
</interface>
-<interface name="init_startstop_all_script_services" lineno="2146">
+<interface name="init_startstop_all_script_services" lineno="2189">
<summary>
Start and stop init_script_file_type services
</summary>
@@ -100949,7 +101552,7 @@ domain that can start and stop the services
</summary>
</param>
</interface>
-<interface name="init_read_state" lineno="2165">
+<interface name="init_read_state" lineno="2208">
<summary>
Read the process state (/proc/pid) of init.
</summary>
@@ -100959,7 +101562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_state" lineno="2185">
+<interface name="init_dontaudit_read_state" lineno="2228">
<summary>
Dontaudit read the process state (/proc/pid) of init.
</summary>
@@ -100969,7 +101572,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_ptrace" lineno="2206">
+<interface name="init_ptrace" lineno="2249">
<summary>
Ptrace init
</summary>
@@ -100980,7 +101583,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_getattr" lineno="2225">
+<interface name="init_getattr" lineno="2268">
<summary>
get init process stats
</summary>
@@ -100991,7 +101594,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_read_script_pipes" lineno="2243">
+<interface name="init_read_script_pipes" lineno="2286">
<summary>
Read an init script unnamed pipe.
</summary>
@@ -101001,7 +101604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_script_pipes" lineno="2261">
+<interface name="init_write_script_pipes" lineno="2304">
<summary>
Write an init script unnamed pipe.
</summary>
@@ -101011,7 +101614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_files" lineno="2279">
+<interface name="init_getattr_script_files" lineno="2322">
<summary>
Get the attribute of init script entrypoint files.
</summary>
@@ -101021,7 +101624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_files" lineno="2298">
+<interface name="init_read_script_files" lineno="2341">
<summary>
Read init scripts.
</summary>
@@ -101031,7 +101634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_exec_script_files" lineno="2317">
+<interface name="init_exec_script_files" lineno="2360">
<summary>
Execute init scripts in the caller domain.
</summary>
@@ -101041,7 +101644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_all_script_files" lineno="2336">
+<interface name="init_getattr_all_script_files" lineno="2379">
<summary>
Get the attribute of all init script entrypoint files.
</summary>
@@ -101051,7 +101654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_all_script_files" lineno="2355">
+<interface name="init_read_all_script_files" lineno="2398">
<summary>
Read all init script files.
</summary>
@@ -101061,7 +101664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2379">
+<interface name="init_dontaudit_read_all_script_files" lineno="2422">
<summary>
Dontaudit read all init script files.
</summary>
@@ -101071,7 +101674,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_exec_all_script_files" lineno="2397">
+<interface name="init_exec_all_script_files" lineno="2440">
<summary>
Execute all init scripts in the caller domain.
</summary>
@@ -101081,7 +101684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_state" lineno="2416">
+<interface name="init_read_script_state" lineno="2459">
<summary>
Read the process state (/proc/pid) of the init scripts.
</summary>
@@ -101091,7 +101694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_fds" lineno="2435">
+<interface name="init_use_script_fds" lineno="2478">
<summary>
Inherit and use init script file descriptors.
</summary>
@@ -101101,7 +101704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2454">
+<interface name="init_dontaudit_use_script_fds" lineno="2497">
<summary>
Do not audit attempts to inherit
init script file descriptors.
@@ -101112,7 +101715,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_script_keys" lineno="2472">
+<interface name="init_search_script_keys" lineno="2515">
<summary>
Search init script keys.
</summary>
@@ -101122,7 +101725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid_script" lineno="2490">
+<interface name="init_getpgid_script" lineno="2533">
<summary>
Get the process group ID of init scripts.
</summary>
@@ -101132,7 +101735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld_script" lineno="2508">
+<interface name="init_sigchld_script" lineno="2551">
<summary>
Send SIGCHLD signals to init scripts.
</summary>
@@ -101142,7 +101745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal_script" lineno="2526">
+<interface name="init_signal_script" lineno="2569">
<summary>
Send generic signals to init scripts.
</summary>
@@ -101152,7 +101755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull_script" lineno="2544">
+<interface name="init_signull_script" lineno="2587">
<summary>
Send null signals to init scripts.
</summary>
@@ -101162,7 +101765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_pipes" lineno="2562">
+<interface name="init_rw_script_pipes" lineno="2605">
<summary>
Read and write init script unnamed pipes.
</summary>
@@ -101172,7 +101775,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect_script" lineno="2581">
+<interface name="init_stream_connect_script" lineno="2624">
<summary>
Allow the specified domain to connect to
init scripts with a unix socket.
@@ -101183,7 +101786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_stream_sockets" lineno="2600">
+<interface name="init_rw_script_stream_sockets" lineno="2643">
<summary>
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
@@ -101194,7 +101797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2619">
+<interface name="init_dontaudit_stream_connect_script" lineno="2662">
<summary>
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
@@ -101205,7 +101808,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dbus_send_script" lineno="2636">
+<interface name="init_dbus_send_script" lineno="2679">
<summary>
Send messages to init scripts over dbus.
</summary>
@@ -101215,7 +101818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat_script" lineno="2656">
+<interface name="init_dbus_chat_script" lineno="2699">
<summary>
Send and receive messages from
init scripts over dbus.
@@ -101226,7 +101829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_ptys" lineno="2685">
+<interface name="init_use_script_ptys" lineno="2728">
<summary>
Read and write the init script pty.
</summary>
@@ -101245,7 +101848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_inherited_script_ptys" lineno="2704">
+<interface name="init_use_inherited_script_ptys" lineno="2747">
<summary>
Read and write inherited init script ptys.
</summary>
@@ -101255,7 +101858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2726">
+<interface name="init_dontaudit_use_script_ptys" lineno="2769">
<summary>
Do not audit attempts to read and
write the init script pty.
@@ -101266,7 +101869,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_status_files" lineno="2745">
+<interface name="init_getattr_script_status_files" lineno="2788">
<summary>
Get the attributes of init script
status files.
@@ -101277,7 +101880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2764">
+<interface name="init_dontaudit_read_script_status_files" lineno="2807">
<summary>
Do not audit attempts to read init script
status files.
@@ -101288,7 +101891,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_run" lineno="2783">
+<interface name="init_search_run" lineno="2826">
<summary>
Search the /run/systemd directory.
</summary>
@@ -101298,7 +101901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_tmp_files" lineno="2802">
+<interface name="init_read_script_tmp_files" lineno="2845">
<summary>
Read init script temporary data.
</summary>
@@ -101308,7 +101911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2821">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2864">
<summary>
Read and write init script inherited temporary data.
</summary>
@@ -101318,7 +101921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_tmp_files" lineno="2839">
+<interface name="init_rw_script_tmp_files" lineno="2882">
<summary>
Read and write init script temporary data.
</summary>
@@ -101328,7 +101931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_script_tmp_filetrans" lineno="2874">
+<interface name="init_script_tmp_filetrans" lineno="2917">
<summary>
Create files in a init script
temporary data directory.
@@ -101354,7 +101957,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_utmp" lineno="2893">
+<interface name="init_getattr_utmp" lineno="2936">
<summary>
Get the attributes of init script process id files.
</summary>
@@ -101364,7 +101967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_utmp" lineno="2911">
+<interface name="init_read_utmp" lineno="2954">
<summary>
Read utmp.
</summary>
@@ -101374,7 +101977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_write_utmp" lineno="2930">
+<interface name="init_dontaudit_write_utmp" lineno="2973">
<summary>
Do not audit attempts to write utmp.
</summary>
@@ -101384,7 +101987,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_utmp" lineno="2948">
+<interface name="init_write_utmp" lineno="2991">
<summary>
Write to utmp.
</summary>
@@ -101394,7 +101997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_lock_utmp" lineno="2968">
+<interface name="init_dontaudit_lock_utmp" lineno="3011">
<summary>
Do not audit attempts to lock
init script pid files.
@@ -101405,7 +102008,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_rw_utmp" lineno="2986">
+<interface name="init_rw_utmp" lineno="3029">
<summary>
Read and write utmp.
</summary>
@@ -101415,7 +102018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_utmp" lineno="3005">
+<interface name="init_dontaudit_rw_utmp" lineno="3048">
<summary>
Do not audit attempts to read and write utmp.
</summary>
@@ -101425,7 +102028,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_manage_utmp" lineno="3023">
+<interface name="init_manage_utmp" lineno="3066">
<summary>
Create, read, write, and delete utmp.
</summary>
@@ -101435,7 +102038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_watch_utmp" lineno="3042">
+<interface name="init_watch_utmp" lineno="3085">
<summary>
Add a watch on utmp.
</summary>
@@ -101445,7 +102048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_utmp" lineno="3060">
+<interface name="init_relabel_utmp" lineno="3103">
<summary>
Relabel utmp.
</summary>
@@ -101455,7 +102058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans_utmp" lineno="3079">
+<interface name="init_runtime_filetrans_utmp" lineno="3122">
<summary>
Create files in /var/run with the
utmp file type.
@@ -101466,7 +102069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_dirs" lineno="3097">
+<interface name="init_create_runtime_dirs" lineno="3140">
<summary>
Create a directory in the /run/systemd directory.
</summary>
@@ -101476,7 +102079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_files" lineno="3116">
+<interface name="init_read_runtime_files" lineno="3159">
<summary>
Read init_runtime_t files
</summary>
@@ -101486,7 +102089,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_rename_runtime_files" lineno="3134">
+<interface name="init_rename_runtime_files" lineno="3177">
<summary>
Rename init_runtime_t files
</summary>
@@ -101496,7 +102099,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_setattr_runtime_files" lineno="3152">
+<interface name="init_setattr_runtime_files" lineno="3195">
<summary>
Setattr init_runtime_t files
</summary>
@@ -101506,7 +102109,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_runtime_files" lineno="3170">
+<interface name="init_delete_runtime_files" lineno="3213">
<summary>
Delete init_runtime_t files
</summary>
@@ -101516,7 +102119,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_write_runtime_socket" lineno="3189">
+<interface name="init_write_runtime_socket" lineno="3232">
<summary>
Allow the specified domain to write to
init sock file.
@@ -101527,7 +102130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_write_runtime_socket" lineno="3208">
+<interface name="init_dontaudit_write_runtime_socket" lineno="3251">
<summary>
Do not audit attempts to write to
init sock files.
@@ -101538,7 +102141,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_pipes" lineno="3226">
+<interface name="init_read_runtime_pipes" lineno="3269">
<summary>
Read init unnamed pipes.
</summary>
@@ -101548,7 +102151,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_symlinks" lineno="3244">
+<interface name="init_read_runtime_symlinks" lineno="3287">
<summary>
read systemd unit symlinks (usually under /run/systemd/units/)
</summary>
@@ -101558,7 +102161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3262">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3305">
<summary>
Allow the specified domain to connect to daemon with a tcp socket
</summary>
@@ -101568,7 +102171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3280">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3323">
<summary>
Allow the specified domain to connect to daemon with a udp socket
</summary>
@@ -101578,7 +102181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_status_files" lineno="3299">
+<interface name="init_read_script_status_files" lineno="3342">
<summary>
Allow reading the init script state files
</summary>
@@ -101588,7 +102191,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_relabelto_script_state" lineno="3317">
+<interface name="init_relabelto_script_state" lineno="3360">
<summary>
Label to init script status files
</summary>
@@ -101598,7 +102201,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_script_readable_type" lineno="3336">
+<interface name="init_script_readable_type" lineno="3379">
<summary>
Mark as a readable type for the initrc_t domain
</summary>
@@ -101608,7 +102211,7 @@ Type that initrc_t needs read access to
</summary>
</param>
</interface>
-<interface name="init_search_units" lineno="3354">
+<interface name="init_search_units" lineno="3397">
<summary>
Search systemd unit dirs.
</summary>
@@ -101618,7 +102221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_unit_dirs" lineno="3379">
+<interface name="init_list_unit_dirs" lineno="3422">
<summary>
List systemd unit dirs.
</summary>
@@ -101628,7 +102231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_generic_units_files" lineno="3399">
+<interface name="init_getattr_generic_units_files" lineno="3442">
<summary>
Get the attributes of systemd unit files
</summary>
@@ -101638,7 +102241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_files" lineno="3417">
+<interface name="init_read_generic_units_files" lineno="3460">
<summary>
Read systemd unit files
</summary>
@@ -101648,7 +102251,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_symlinks" lineno="3435">
+<interface name="init_read_generic_units_symlinks" lineno="3478">
<summary>
Read systemd unit links
</summary>
@@ -101658,7 +102261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_generic_units_status" lineno="3453">
+<interface name="init_get_generic_units_status" lineno="3496">
<summary>
Get status of generic systemd units.
</summary>
@@ -101668,7 +102271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_generic_units" lineno="3472">
+<interface name="init_start_generic_units" lineno="3515">
<summary>
Start generic systemd units.
</summary>
@@ -101678,7 +102281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_generic_units" lineno="3491">
+<interface name="init_stop_generic_units" lineno="3534">
<summary>
Stop generic systemd units.
</summary>
@@ -101688,7 +102291,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_generic_units" lineno="3510">
+<interface name="init_reload_generic_units" lineno="3553">
<summary>
Reload generic systemd units.
</summary>
@@ -101698,7 +102301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_runtime_units_status" lineno="3529">
+<interface name="init_get_runtime_units_status" lineno="3572">
<summary>
Get the status of runtime systemd units.
</summary>
@@ -101708,7 +102311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_runtime_units" lineno="3548">
+<interface name="init_start_runtime_units" lineno="3591">
<summary>
Start runtime systemd units.
</summary>
@@ -101718,7 +102321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_runtime_units" lineno="3567">
+<interface name="init_stop_runtime_units" lineno="3610">
<summary>
Stop runtime systemd units.
</summary>
@@ -101728,7 +102331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_transient_units_status" lineno="3586">
+<interface name="init_get_transient_units_status" lineno="3629">
<summary>
Get status of transient systemd units.
</summary>
@@ -101738,7 +102341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_transient_units" lineno="3605">
+<interface name="init_start_transient_units" lineno="3648">
<summary>
Start transient systemd units.
</summary>
@@ -101748,7 +102351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_transient_units" lineno="3624">
+<interface name="init_stop_transient_units" lineno="3667">
<summary>
Stop transient systemd units.
</summary>
@@ -101758,7 +102361,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_transient_units" lineno="3643">
+<interface name="init_reload_transient_units" lineno="3686">
<summary>
Reload transient systemd units.
</summary>
@@ -101768,7 +102371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_all_units_status" lineno="3663">
+<interface name="init_get_all_units_status" lineno="3706">
<summary>
Get status of all systemd units.
</summary>
@@ -101778,7 +102381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_units" lineno="3682">
+<interface name="init_manage_all_units" lineno="3725">
<summary>
All perms on all systemd units.
</summary>
@@ -101788,7 +102391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_all_units" lineno="3702">
+<interface name="init_start_all_units" lineno="3745">
<summary>
Start all systemd units.
</summary>
@@ -101798,7 +102401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_all_units" lineno="3721">
+<interface name="init_stop_all_units" lineno="3764">
<summary>
Stop all systemd units.
</summary>
@@ -101808,7 +102411,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_all_units" lineno="3740">
+<interface name="init_reload_all_units" lineno="3783">
<summary>
Reload all systemd units.
</summary>
@@ -101818,7 +102421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_unit_files" lineno="3759">
+<interface name="init_manage_all_unit_files" lineno="3802">
<summary>
Manage systemd unit dirs and the files in them
</summary>
@@ -101828,7 +102431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_linkable_keyring" lineno="3780">
+<interface name="init_linkable_keyring" lineno="3823">
<summary>
Associate the specified domain to be a domain whose
keyring init should be allowed to link.
@@ -101839,7 +102442,7 @@ Domain whose keyring init should be allowed to link.
</summary>
</param>
</interface>
-<interface name="init_admin" lineno="3798">
+<interface name="init_admin" lineno="3841">
<summary>
Allow unconfined access to send instructions to init
</summary>
@@ -101849,7 +102452,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_getrlimit" lineno="3830">
+<interface name="init_getrlimit" lineno="3873">
<summary>
Allow getting init_t rlimit
</summary>
@@ -101859,6 +102462,16 @@ Source domain
</summary>
</param>
</interface>
+<interface name="init_search_keys" lineno="3891">
+<summary>
+Allow searching init_t keys
+</summary>
+<param name="domain">
+<summary>
+Source domain
+</summary>
+</param>
+</interface>
<tunable name="init_upstart" dftval="false">
<desc>
<p>
@@ -102656,7 +103269,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_relabel_shared_libs" lineno="545">
+<interface name="libs_watch_shared_libs_dirs" lineno="543">
+<summary>
+watch lib dirs
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="libs_relabel_shared_libs" lineno="563">
<summary>
Relabel to and from the type used for
shared libraries.
@@ -102667,7 +103290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="578">
+<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="596">
<summary>
Create an object in etc with a type transition to
the ld_so_cache_t type
@@ -102690,7 +103313,7 @@ Name of the resource created for which a type transition occurs
</summary>
</param>
</interface>
-<interface name="libs_lib_filetrans" lineno="612">
+<interface name="libs_lib_filetrans" lineno="630">
<summary>
Create an object in the generic lib location with a type transition
to the provided type
@@ -102716,7 +103339,7 @@ Name of the resource created for which a type transition should occur
</summary>
</param>
</interface>
-<interface name="libs_relabel_lib_dirs" lineno="633">
+<interface name="libs_relabel_lib_dirs" lineno="651">
<summary>
Relabel to and from the type used
for generic lib directories.
@@ -103309,7 +103932,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_delete_devlog_socket" lineno="859">
+<interface name="logging_stream_connect_journald_varlink" lineno="858">
+<summary>
+Connect syslog varlink socket files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_delete_devlog_socket" lineno="878">
<summary>
Delete the syslog socket files
</summary>
@@ -103320,7 +103953,7 @@ Domain allowed access
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_runtime_sockets" lineno="877">
+<interface name="logging_manage_runtime_sockets" lineno="896">
<summary>
Create, read, write, and delete syslog PID sockets.
</summary>
@@ -103330,7 +103963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_logs" lineno="898">
+<interface name="logging_search_logs" lineno="917">
<summary>
Allows the domain to open a file in the
log directory, but does not allow the listing
@@ -103342,7 +103975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_search_logs" lineno="918">
+<interface name="logging_dontaudit_search_logs" lineno="937">
<summary>
Do not audit attempts to search the var log directory.
</summary>
@@ -103352,7 +103985,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="logging_list_logs" lineno="936">
+<interface name="logging_list_logs" lineno="955">
<summary>
List the contents of the generic log directory (/var/log).
</summary>
@@ -103362,7 +103995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_log_dirs" lineno="956">
+<interface name="logging_rw_generic_log_dirs" lineno="975">
<summary>
Read and write the generic log directory (/var/log).
</summary>
@@ -103372,7 +104005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_all_logs" lineno="977">
+<interface name="logging_search_all_logs" lineno="996">
<summary>
Search through all log dirs.
</summary>
@@ -103383,7 +104016,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_setattr_all_log_dirs" lineno="996">
+<interface name="logging_setattr_all_log_dirs" lineno="1015">
<summary>
Set attributes on all log dirs.
</summary>
@@ -103394,7 +104027,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_getattr_all_logs" lineno="1015">
+<interface name="logging_dontaudit_getattr_all_logs" lineno="1034">
<summary>
Do not audit attempts to get the attributes
of any log files.
@@ -103405,7 +104038,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_getattr_all_logs" lineno="1033">
+<interface name="logging_getattr_all_logs" lineno="1052">
<summary>
Read the attributes of any log file
</summary>
@@ -103415,7 +104048,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="logging_append_all_logs" lineno="1051">
+<interface name="logging_append_all_logs" lineno="1070">
<summary>
Append to all log files.
</summary>
@@ -103425,7 +104058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_append_all_inherited_logs" lineno="1072">
+<interface name="logging_append_all_inherited_logs" lineno="1091">
<summary>
Append to all log files.
</summary>
@@ -103435,7 +104068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_all_logs" lineno="1091">
+<interface name="logging_read_all_logs" lineno="1110">
<summary>
Read all log files.
</summary>
@@ -103446,7 +104079,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_watch_all_logs" lineno="1112">
+<interface name="logging_watch_all_logs" lineno="1131">
<summary>
Watch all log files.
</summary>
@@ -103457,17 +104090,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_exec_all_logs" lineno="1132">
-<summary>
-Execute all log files in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="logging_rw_all_logs" lineno="1152">
+<interface name="logging_rw_all_logs" lineno="1149">
<summary>
read/write to all log files.
</summary>
@@ -103477,7 +104100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_all_logs" lineno="1172">
+<interface name="logging_manage_all_logs" lineno="1169">
<summary>
Create, read, write, and delete all log files.
</summary>
@@ -103488,7 +104111,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_generic_log_dirs" lineno="1193">
+<interface name="logging_manage_generic_log_dirs" lineno="1190">
<summary>
Create, read, write, and delete generic log directories.
</summary>
@@ -103499,7 +104122,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_relabel_generic_log_dirs" lineno="1213">
+<interface name="logging_relabel_generic_log_dirs" lineno="1210">
<summary>
Relabel from and to generic log directory type.
</summary>
@@ -103510,7 +104133,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_generic_logs" lineno="1233">
+<interface name="logging_read_generic_logs" lineno="1230">
<summary>
Read generic log files.
</summary>
@@ -103521,7 +104144,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_mmap_generic_logs" lineno="1254">
+<interface name="logging_mmap_generic_logs" lineno="1251">
<summary>
Map generic log files.
</summary>
@@ -103532,7 +104155,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_write_generic_logs" lineno="1272">
+<interface name="logging_write_generic_logs" lineno="1269">
<summary>
Write generic log files.
</summary>
@@ -103542,7 +104165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_write_generic_logs" lineno="1293">
+<interface name="logging_dontaudit_write_generic_logs" lineno="1290">
<summary>
Dontaudit Write generic log files.
</summary>
@@ -103552,7 +104175,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_logs" lineno="1311">
+<interface name="logging_rw_generic_logs" lineno="1308">
<summary>
Read and write generic log files.
</summary>
@@ -103562,7 +104185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_generic_logs" lineno="1334">
+<interface name="logging_manage_generic_logs" lineno="1331">
<summary>
Create, read, write, and delete
generic log files.
@@ -103574,7 +104197,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_watch_generic_logs_dir" lineno="1353">
+<interface name="logging_watch_generic_logs_dir" lineno="1350">
<summary>
Watch generic log dirs.
</summary>
@@ -103584,7 +104207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_admin_audit" lineno="1378">
+<interface name="logging_admin_audit" lineno="1375">
<summary>
All of the rules required to administrate
the audit environment
@@ -103601,7 +104224,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin_syslog" lineno="1422">
+<interface name="logging_admin_syslog" lineno="1419">
<summary>
All of the rules required to administrate
the syslog environment
@@ -103618,7 +104241,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin" lineno="1478">
+<interface name="logging_admin" lineno="1475">
<summary>
All of the rules required to administrate
the logging environment
@@ -103635,7 +104258,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_syslog_managed_log_file" lineno="1501">
+<interface name="logging_syslog_managed_log_file" lineno="1498">
<summary>
Mark the type as a syslog managed log file
and introduce the proper file transition when
@@ -103653,7 +104276,7 @@ Name to use for the file
</summary>
</param>
</interface>
-<interface name="logging_syslog_managed_log_dir" lineno="1540">
+<interface name="logging_syslog_managed_log_dir" lineno="1537">
<summary>
Mark the type as a syslog managed log dir
and introduce the proper file transition when
@@ -103680,7 +104303,7 @@ Name to use for the directory
</summary>
</param>
</interface>
-<interface name="logging_mmap_journal" lineno="1562">
+<interface name="logging_mmap_journal" lineno="1559">
<summary>
Map files in /run/log/journal/ directory.
</summary>
@@ -103690,6 +104313,14 @@ Domain allowed access.
</summary>
</param>
</interface>
+<tunable name="logging_syslog_can_network" dftval="false">
+<desc>
+<p>
+Allows syslogd internet domain sockets
+functionality (dangerous).
+</p>
+</desc>
+</tunable>
</module>
<module name="lvm" filename="policy/modules/system/lvm.if">
<summary>Policy for logical volume management programs.</summary>
@@ -104599,7 +105230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_read_state" lineno="82">
+<interface name="mount_read_state" lineno="79">
<summary>
Read the process state (/proc/pid) of mount.
</summary>
@@ -104609,7 +105240,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_signal" lineno="100">
+<interface name="mount_signal" lineno="97">
<summary>
Send a generic signal to mount.
</summary>
@@ -104619,7 +105250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_use_fds" lineno="118">
+<interface name="mount_use_fds" lineno="115">
<summary>
Use file descriptors for mount.
</summary>
@@ -104629,7 +105260,7 @@ The type of the process performing this action.
</summary>
</param>
</interface>
-<interface name="mount_domtrans_unconfined" lineno="136">
+<interface name="mount_domtrans_unconfined" lineno="133">
<summary>
Execute mount in the unconfined mount domain.
</summary>
@@ -104639,7 +105270,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mount_run_unconfined" lineno="162">
+<interface name="mount_run_unconfined" lineno="159">
<summary>
Execute mount in the unconfined mount domain, and
allow the specified role the unconfined mount domain,
@@ -104657,7 +105288,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mount_read_loopback_files" lineno="181">
+<interface name="mount_read_loopback_files" lineno="178">
<summary>
Read loopback filesystem image files.
</summary>
@@ -104667,7 +105298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_loopback_files" lineno="199">
+<interface name="mount_rw_loopback_files" lineno="196">
<summary>
Read and write loopback filesystem image files.
</summary>
@@ -104677,7 +105308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_list_runtime" lineno="217">
+<interface name="mount_list_runtime" lineno="214">
<summary>
List mount runtime files.
</summary>
@@ -104687,7 +105318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_watch_runtime_dirs" lineno="235">
+<interface name="mount_watch_runtime_dirs" lineno="232">
<summary>
Watch mount runtime dirs.
</summary>
@@ -104697,7 +105328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_watch_runtime_files" lineno="253">
+<interface name="mount_watch_runtime_files" lineno="250">
<summary>
Watch mount runtime files.
</summary>
@@ -104707,7 +105338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_watch_reads_runtime_files" lineno="271">
+<interface name="mount_watch_reads_runtime_files" lineno="268">
<summary>
Watch reads on mount runtime files.
</summary>
@@ -104717,7 +105348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_getattr_runtime_files" lineno="289">
+<interface name="mount_getattr_runtime_files" lineno="286">
<summary>
Getattr on mount_runtime_t files
</summary>
@@ -104727,7 +105358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_read_runtime_files" lineno="307">
+<interface name="mount_read_runtime_files" lineno="304">
<summary>
Read mount runtime files.
</summary>
@@ -104737,7 +105368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_runtime_files" lineno="325">
+<interface name="mount_rw_runtime_files" lineno="322">
<summary>
Read and write mount runtime files.
</summary>
@@ -104747,7 +105378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_pipes" lineno="345">
+<interface name="mount_rw_pipes" lineno="342">
<summary>
Read and write mount unnamed pipes
</summary>
@@ -105909,7 +106540,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_read_dhcpc_runtime_files" lineno="580">
+<interface name="sysnet_watch_config_dirs" lineno="580">
+<summary>
+Watch a network config dir
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_read_dhcpc_runtime_files" lineno="598">
<summary>
Read dhcp client runtime files.
</summary>
@@ -105919,7 +106560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_delete_dhcpc_runtime_files" lineno="599">
+<interface name="sysnet_delete_dhcpc_runtime_files" lineno="617">
<summary>
Delete the dhcp client runtime files.
</summary>
@@ -105929,7 +106570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_manage_dhcpc_runtime_files" lineno="617">
+<interface name="sysnet_manage_dhcpc_runtime_files" lineno="635">
<summary>
Create, read, write, and delete dhcp client runtime files.
</summary>
@@ -105939,7 +106580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="635">
+<interface name="sysnet_domtrans_ifconfig" lineno="653">
<summary>
Execute ifconfig in the ifconfig domain.
</summary>
@@ -105949,7 +106590,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="sysnet_run_ifconfig" lineno="662">
+<interface name="sysnet_run_ifconfig" lineno="680">
<summary>
Execute ifconfig in the ifconfig domain, and
allow the specified role the ifconfig domain,
@@ -105967,7 +106608,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_exec_ifconfig" lineno="682">
+<interface name="sysnet_exec_ifconfig" lineno="700">
<summary>
Execute ifconfig in the caller domain.
</summary>
@@ -105977,7 +106618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_signal_ifconfig" lineno="702">
+<interface name="sysnet_signal_ifconfig" lineno="720">
<summary>
Send a generic signal to ifconfig.
</summary>
@@ -105988,7 +106629,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_signull_ifconfig" lineno="721">
+<interface name="sysnet_signull_ifconfig" lineno="739">
<summary>
Send null signals to ifconfig.
</summary>
@@ -105999,7 +106640,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_create_netns_dirs" lineno="740">
+<interface name="sysnet_create_netns_dirs" lineno="758">
<summary>
Create the /run/netns directory with
an automatic type transition.
@@ -106010,7 +106651,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_netns_filetrans" lineno="774">
+<interface name="sysnet_netns_filetrans" lineno="792">
<summary>
Create an object in the /run/netns
directory with a private type.
@@ -106036,7 +106677,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_read_dhcp_config" lineno="795">
+<interface name="sysnet_read_dhcp_config" lineno="813">
<summary>
Read the DHCP configuration files.
</summary>
@@ -106046,7 +106687,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_search_dhcp_state" lineno="815">
+<interface name="sysnet_search_dhcp_state" lineno="833">
<summary>
Search the DHCP state data directory.
</summary>
@@ -106056,7 +106697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="859">
+<interface name="sysnet_dhcp_state_filetrans" lineno="877">
<summary>
Create DHCP state data.
</summary>
@@ -106091,7 +106732,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_dns_name_resolve" lineno="879">
+<interface name="sysnet_dns_name_resolve" lineno="897">
<summary>
Perform a DNS name resolution.
</summary>
@@ -106102,7 +106743,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_use_ldap" lineno="930">
+<interface name="sysnet_use_ldap" lineno="948">
<summary>
Connect and use a LDAP server.
</summary>
@@ -106112,7 +106753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_use_portmap" lineno="957">
+<interface name="sysnet_use_portmap" lineno="975">
<summary>
Connect and use remote port mappers.
</summary>
@@ -106122,7 +106763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="991">
+<interface name="sysnet_dhcpc_script_entry" lineno="1009">
<summary>
Make the specified program domain
accessable from the DHCP hooks/scripts.
@@ -106149,7 +106790,7 @@ can manage samba
</module>
<module name="systemd" filename="policy/modules/system/systemd.if">
<summary>Systemd components (not PID 1)</summary>
-<template name="systemd_role_template" lineno="28">
+<template name="systemd_role_template" lineno="23">
<summary>
Template for systemd --user per-role domains.
</summary>
@@ -106168,13 +106809,8 @@ The user role.
The user domain for the role.
</summary>
</param>
-<param name="pty_type">
-<summary>
-The type for the user pty
-</summary>
-</param>
</template>
-<template name="systemd_user_daemon_domain" lineno="222">
+<template name="systemd_user_daemon_domain" lineno="225">
<summary>
Allow the specified domain to be started as a daemon by the
specified systemd user instance.
@@ -106195,7 +106831,7 @@ Domain to allow the systemd user domain to run.
</summary>
</param>
</template>
-<interface name="systemd_user_activated_sock_file" lineno="243">
+<interface name="systemd_user_activated_sock_file" lineno="246">
<summary>
Associate the specified file type to be a type whose sock files
can be managed by systemd user instances for socket activation.
@@ -106206,7 +106842,7 @@ File type to be associated.
</summary>
</param>
</interface>
-<interface name="systemd_user_unix_stream_activated_socket" lineno="268">
+<interface name="systemd_user_unix_stream_activated_socket" lineno="271">
<summary>
Associate the specified domain to be a domain whose unix stream
sockets and sock files can be managed by systemd user instances
@@ -106223,7 +106859,18 @@ File type of the domain's sock files to be associated.
</summary>
</param>
</interface>
-<template name="systemd_user_send_systemd_notify" lineno="294">
+<interface name="systemd_write_notify_socket" lineno="291">
+<summary>
+Allow the specified domain to write to
+systemd-notify socket
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<template name="systemd_user_send_systemd_notify" lineno="318">
<summary>
Allow the target domain the permissions necessary
to use systemd notify when started by the specified
@@ -106240,7 +106887,7 @@ Domain to be allowed systemd notify permissions.
</summary>
</param>
</template>
-<template name="systemd_user_app_status" lineno="322">
+<template name="systemd_user_app_status" lineno="346">
<summary>
Allow the target domain to be monitored and have its output
captured by the specified systemd user instance domain.
@@ -106256,7 +106903,7 @@ Domain to allow the systemd user instance to monitor.
</summary>
</param>
</template>
-<template name="systemd_read_user_manager_state" lineno="362">
+<template name="systemd_read_user_manager_state" lineno="386">
<summary>
Read the process state (/proc/pid) of
the specified systemd user instance.
@@ -106272,7 +106919,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_start" lineno="386">
+<template name="systemd_user_manager_system_start" lineno="410">
<summary>
Send a start request to the specified
systemd user instance system object.
@@ -106288,7 +106935,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_stop" lineno="410">
+<template name="systemd_user_manager_system_stop" lineno="434">
<summary>
Send a stop request to the specified
systemd user instance system object.
@@ -106304,7 +106951,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_status" lineno="434">
+<template name="systemd_user_manager_system_status" lineno="458">
<summary>
Get the status of the specified
systemd user instance system object.
@@ -106320,7 +106967,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_dbus_chat" lineno="458">
+<template name="systemd_user_manager_dbus_chat" lineno="482">
<summary>
Send and receive messages from the
specified systemd user instance over dbus.
@@ -106336,7 +106983,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="systemd_search_conf_home_content" lineno="479">
+<interface name="systemd_search_conf_home_content" lineno="503">
<summary>
Allow the specified domain to search systemd config home
content.
@@ -106347,7 +106994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_conf_home_content" lineno="498">
+<interface name="systemd_manage_conf_home_content" lineno="522">
<summary>
Allow the specified domain to manage systemd config home
content.
@@ -106358,7 +107005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabel_conf_home_content" lineno="519">
+<interface name="systemd_relabel_conf_home_content" lineno="543">
<summary>
Allow the specified domain to relabel systemd config home
content.
@@ -106369,7 +107016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_data_home_content" lineno="540">
+<interface name="systemd_search_data_home_content" lineno="564">
<summary>
Allow the specified domain to search systemd data home
content.
@@ -106380,7 +107027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_data_home_content" lineno="559">
+<interface name="systemd_manage_data_home_content" lineno="583">
<summary>
Allow the specified domain to manage systemd data home
content.
@@ -106391,7 +107038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabel_data_home_content" lineno="580">
+<interface name="systemd_relabel_data_home_content" lineno="604">
<summary>
Allow the specified domain to relabel systemd data home
content.
@@ -106402,7 +107049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_runtime" lineno="601">
+<interface name="systemd_search_user_runtime" lineno="625">
<summary>
Allow the specified domain to search systemd user runtime
content.
@@ -106413,7 +107060,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_files" lineno="619">
+<interface name="systemd_read_user_runtime_files" lineno="643">
<summary>
Allow the specified domain to read systemd user runtime files.
</summary>
@@ -106423,7 +107070,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_lnk_files" lineno="637">
+<interface name="systemd_read_user_runtime_lnk_files" lineno="661">
<summary>
Allow the specified domain to read systemd user runtime lnk files.
</summary>
@@ -106433,7 +107080,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_user_runtime_socket" lineno="656">
+<interface name="systemd_write_user_runtime_socket" lineno="680">
<summary>
Allow the specified domain to write to
the systemd user runtime named socket.
@@ -106444,7 +107091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_unit_files" lineno="675">
+<interface name="systemd_read_user_unit_files" lineno="699">
<summary>
Allow the specified domain to read system-wide systemd
user unit files. (Deprecated)
@@ -106455,7 +107102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_units_files" lineno="691">
+<interface name="systemd_read_user_units_files" lineno="715">
<summary>
Allow the specified domain to read system-wide systemd
user unit files.
@@ -106466,7 +107113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_units" lineno="711">
+<interface name="systemd_read_user_runtime_units" lineno="735">
<summary>
Allow the specified domain to read systemd user runtime unit files. (Deprecated)
</summary>
@@ -106476,7 +107123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_units_files" lineno="726">
+<interface name="systemd_read_user_runtime_units_files" lineno="750">
<summary>
Allow the specified domain to read systemd user runtime unit files.
</summary>
@@ -106486,7 +107133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_runtime_unit_dirs" lineno="746">
+<interface name="systemd_search_user_runtime_unit_dirs" lineno="770">
<summary>
Allow the specified domain to search systemd user runtime unit
directories.
@@ -106497,7 +107144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_user_runtime_unit_dirs" lineno="765">
+<interface name="systemd_list_user_runtime_unit_dirs" lineno="789">
<summary>
Allow the specified domain to list the contents of systemd
user runtime unit directories.
@@ -106508,7 +107155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_user_runtime_units" lineno="783">
+<interface name="systemd_status_user_runtime_units" lineno="807">
<summary>
Allow the specified domain to get the status of systemd user runtime units. (Deprecated)
</summary>
@@ -106518,7 +107165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_get_user_runtime_units_status" lineno="798">
+<interface name="systemd_get_user_runtime_units_status" lineno="822">
<summary>
Allow the specified domain to get the status of systemd user runtime units.
</summary>
@@ -106528,7 +107175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_runtime_units" lineno="817">
+<interface name="systemd_start_user_runtime_units" lineno="841">
<summary>
Allow the specified domain to start systemd user runtime units.
</summary>
@@ -106538,7 +107185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_runtime_units" lineno="836">
+<interface name="systemd_stop_user_runtime_units" lineno="860">
<summary>
Allow the specified domain to stop systemd user runtime units.
</summary>
@@ -106548,7 +107195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_runtime_units" lineno="855">
+<interface name="systemd_reload_user_runtime_units" lineno="879">
<summary>
Allow the specified domain to reload systemd user runtime units.
</summary>
@@ -106558,7 +107205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_transient_units_files" lineno="874">
+<interface name="systemd_read_user_transient_units_files" lineno="898">
<summary>
Allow the specified domain to read systemd user transient unit files.
</summary>
@@ -106568,7 +107215,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_transient_unit_dirs" lineno="894">
+<interface name="systemd_search_user_transient_unit_dirs" lineno="918">
<summary>
Allow the specified domain to search systemd user transient unit
directories.
@@ -106579,7 +107226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_user_transient_unit_dirs" lineno="913">
+<interface name="systemd_list_user_transient_unit_dirs" lineno="937">
<summary>
Allow the specified domain to list the contents of systemd
user transient unit directories.
@@ -106590,7 +107237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_get_user_transient_units_status" lineno="931">
+<interface name="systemd_get_user_transient_units_status" lineno="955">
<summary>
Allow the specified domain to get the status of systemd user transient units.
</summary>
@@ -106600,7 +107247,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_transient_units" lineno="950">
+<interface name="systemd_start_user_transient_units" lineno="974">
<summary>
Allow the specified domain to start systemd user transient units.
</summary>
@@ -106610,7 +107257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_transient_units" lineno="969">
+<interface name="systemd_stop_user_transient_units" lineno="993">
<summary>
Allow the specified domain to stop systemd user transient units.
</summary>
@@ -106620,7 +107267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_transient_units" lineno="988">
+<interface name="systemd_reload_user_transient_units" lineno="1012">
<summary>
Allow the specified domain to reload systemd user transient units.
</summary>
@@ -106630,7 +107277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_log_parse_environment" lineno="1008">
+<interface name="systemd_log_parse_environment" lineno="1032">
<summary>
Make the specified type usable as an
log parse environment type.
@@ -106641,7 +107288,7 @@ Type to be used as a log parse environment type.
</summary>
</param>
</interface>
-<interface name="systemd_use_nss" lineno="1028">
+<interface name="systemd_use_nss" lineno="1052">
<summary>
Allow domain to use systemd's Name Service Switch (NSS) module.
This module provides UNIX user and group name resolution for dynamic users
@@ -106653,7 +107300,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_PrivateDevices" lineno="1055">
+<interface name="systemd_PrivateDevices" lineno="1079">
<summary>
Allow domain to be used as a systemd service with a unit
that uses PrivateDevices=yes in section [Service].
@@ -106664,7 +107311,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_rw_homework_semaphores" lineno="1072">
+<interface name="systemd_rw_homework_semaphores" lineno="1096">
<summary>
Read and write systemd-homework semaphores.
</summary>
@@ -106674,7 +107321,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_hwdb" lineno="1090">
+<interface name="systemd_read_hwdb" lineno="1114">
<summary>
Allow domain to read udev hwdb file
</summary>
@@ -106684,7 +107331,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_map_hwdb" lineno="1108">
+<interface name="systemd_map_hwdb" lineno="1132">
<summary>
Allow domain to map udev hwdb file
</summary>
@@ -106694,7 +107341,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_watch_logind_runtime_dirs" lineno="1126">
+<interface name="systemd_watch_logind_runtime_dirs" lineno="1150">
<summary>
Watch systemd-logind runtime dirs.
</summary>
@@ -106704,7 +107351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_runtime_files" lineno="1145">
+<interface name="systemd_read_logind_runtime_files" lineno="1169">
<summary>
Read systemd-logind runtime files.
</summary>
@@ -106714,7 +107361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_runtime_pipes" lineno="1165">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="1189">
<summary>
Manage systemd-logind runtime pipes.
</summary>
@@ -106724,7 +107371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_runtime_pipes" lineno="1184">
+<interface name="systemd_write_logind_runtime_pipes" lineno="1208">
<summary>
Write systemd-logind runtime named pipe.
</summary>
@@ -106734,7 +107381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_logind_fds" lineno="1205">
+<interface name="systemd_use_logind_fds" lineno="1229">
<summary>
Use inherited systemd
logind file descriptors.
@@ -106745,7 +107392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_logind_sessions_dirs" lineno="1223">
+<interface name="systemd_watch_logind_sessions_dirs" lineno="1247">
<summary>
Watch logind sessions dirs.
</summary>
@@ -106755,7 +107402,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_sessions_files" lineno="1242">
+<interface name="systemd_read_logind_sessions_files" lineno="1266">
<summary>
Read logind sessions files.
</summary>
@@ -106765,7 +107412,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1263">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1287">
<summary>
Write inherited logind sessions pipes.
</summary>
@@ -106775,7 +107422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1283">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1307">
<summary>
Write inherited logind inhibit pipes.
</summary>
@@ -106785,7 +107432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_logind" lineno="1304">
+<interface name="systemd_dbus_chat_logind" lineno="1328">
<summary>
Send and receive messages from
systemd logind over dbus.
@@ -106796,7 +107443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_logind" lineno="1324">
+<interface name="systemd_status_logind" lineno="1348">
<summary>
Get the system status information from systemd_login
</summary>
@@ -106806,7 +107453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_signull_logind" lineno="1343">
+<interface name="systemd_signull_logind" lineno="1367">
<summary>
Send systemd_login a null signal.
</summary>
@@ -106816,7 +107463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_userdb_runtime_dirs" lineno="1361">
+<interface name="systemd_list_userdb_runtime_dirs" lineno="1385">
<summary>
List the contents of systemd userdb runtime directories.
</summary>
@@ -106826,7 +107473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_dirs" lineno="1379">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="1403">
<summary>
Manage systemd userdb runtime directories.
</summary>
@@ -106836,7 +107483,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_userdb_runtime_files" lineno="1397">
+<interface name="systemd_read_userdb_runtime_files" lineno="1421">
<summary>
Read systemd userdb runtime files.
</summary>
@@ -106846,7 +107493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_symlinks" lineno="1415">
+<interface name="systemd_manage_userdb_runtime_symlinks" lineno="1439">
<summary>
Manage symbolic links under /run/systemd/userdb.
</summary>
@@ -106856,7 +107503,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1433">
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1457">
<summary>
Manage socket files under /run/systemd/userdb .
</summary>
@@ -106866,7 +107513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_userdb" lineno="1451">
+<interface name="systemd_stream_connect_userdb" lineno="1475">
<summary>
Connect to /run/systemd/userdb/io.systemd.DynamicUser .
</summary>
@@ -106876,7 +107523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_machines" lineno="1473">
+<interface name="systemd_read_machines" lineno="1497">
<summary>
Allow reading /run/systemd/machines
</summary>
@@ -106886,7 +107533,7 @@ Domain that can access the machines files
</summary>
</param>
</interface>
-<interface name="systemd_watch_machines_dirs" lineno="1492">
+<interface name="systemd_watch_machines_dirs" lineno="1516">
<summary>
Allow watching /run/systemd/machines
</summary>
@@ -106896,7 +107543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_connect_machined" lineno="1510">
+<interface name="systemd_connect_machined" lineno="1534">
<summary>
Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
</summary>
@@ -106906,7 +107553,17 @@ Domain that can access the socket
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_machined" lineno="1529">
+<interface name="systemd_dontaudit_connect_machined" lineno="1552">
+<summary>
+dontaudit connecting to /run/systemd/userdb/io.systemd.Machine socket
+</summary>
+<param name="domain">
+<summary>
+Domain that can access the socket
+</summary>
+</param>
+</interface>
+<interface name="systemd_dbus_chat_machined" lineno="1571">
<summary>
Send and receive messages from
systemd machined over dbus.
@@ -106917,7 +107574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="1550">
+<interface name="systemd_dbus_chat_hostnamed" lineno="1592">
<summary>
Send and receive messages from
systemd hostnamed over dbus.
@@ -106928,7 +107585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="1570">
+<interface name="systemd_use_passwd_agent_fds" lineno="1612">
<summary>
allow systemd_passwd_agent to inherit fds
</summary>
@@ -106938,7 +107595,7 @@ Domain that owns the fds
</summary>
</param>
</interface>
-<interface name="systemd_run_passwd_agent" lineno="1593">
+<interface name="systemd_run_passwd_agent" lineno="1635">
<summary>
allow systemd_passwd_agent to be run by admin
</summary>
@@ -106953,7 +107610,7 @@ role that it runs in
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent" lineno="1614">
+<interface name="systemd_use_passwd_agent" lineno="1656">
<summary>
Allow a systemd_passwd_agent_t process to interact with a daemon
that needs a password from the sysadmin.
@@ -106964,7 +107621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1638">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1680">
<summary>
Transition to systemd_passwd_runtime_t when creating dirs
</summary>
@@ -106974,7 +107631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1659">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1701">
<summary>
Transition to systemd_userdbd_runtime_t when
creating the userdb directory inside an init runtime
@@ -106986,7 +107643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1677">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1719">
<summary>
Allow to domain to create systemd-passwd symlink
</summary>
@@ -106996,7 +107653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_passwd_runtime_dirs" lineno="1695">
+<interface name="systemd_watch_passwd_runtime_dirs" lineno="1737">
<summary>
Allow a domain to watch systemd-passwd runtime dirs.
</summary>
@@ -107006,7 +107663,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_journal_dirs" lineno="1713">
+<interface name="systemd_list_journal_dirs" lineno="1755">
<summary>
Allow domain to list the contents of systemd_journal_t dirs
</summary>
@@ -107016,7 +107673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_journal_files" lineno="1731">
+<interface name="systemd_read_journal_files" lineno="1773">
<summary>
Allow domain to read systemd_journal_t files
</summary>
@@ -107026,7 +107683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_journal_files" lineno="1750">
+<interface name="systemd_manage_journal_files" lineno="1792">
<summary>
Allow domain to create/manage systemd_journal_t files
</summary>
@@ -107036,7 +107693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_journal_dirs" lineno="1770">
+<interface name="systemd_watch_journal_dirs" lineno="1812">
<summary>
Allow domain to add a watch on systemd_journal_t directories
</summary>
@@ -107046,7 +107703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelfrom_journal_files" lineno="1788">
+<interface name="systemd_relabelfrom_journal_files" lineno="1830">
<summary>
Relabel from systemd-journald file type.
</summary>
@@ -107056,7 +107713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="1806">
+<interface name="systemd_relabelto_journal_dirs" lineno="1848">
<summary>
Relabel to systemd-journald directory type.
</summary>
@@ -107066,7 +107723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_files" lineno="1825">
+<interface name="systemd_relabelto_journal_files" lineno="1867">
<summary>
Relabel to systemd-journald file type.
</summary>
@@ -107076,7 +107733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_units" lineno="1845">
+<interface name="systemd_read_networkd_units" lineno="1887">
<summary>
Allow domain to read systemd_networkd_t unit files
</summary>
@@ -107086,7 +107743,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_networkd_units" lineno="1865">
+<interface name="systemd_manage_networkd_units" lineno="1907">
<summary>
Allow domain to create/manage systemd_networkd_t unit files
</summary>
@@ -107096,7 +107753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_enabledisable_networkd" lineno="1885">
+<interface name="systemd_enabledisable_networkd" lineno="1927">
<summary>
Allow specified domain to enable systemd-networkd units
</summary>
@@ -107106,7 +107763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_startstop_networkd" lineno="1904">
+<interface name="systemd_startstop_networkd" lineno="1946">
<summary>
Allow specified domain to start systemd-networkd units
</summary>
@@ -107116,7 +107773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_networkd" lineno="1924">
+<interface name="systemd_dbus_chat_networkd" lineno="1966">
<summary>
Send and receive messages from
systemd networkd over dbus.
@@ -107127,7 +107784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_networkd" lineno="1944">
+<interface name="systemd_status_networkd" lineno="1986">
<summary>
Allow specified domain to get status of systemd-networkd
</summary>
@@ -107137,7 +107794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1963">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="2005">
<summary>
Relabel systemd_networkd tun socket.
</summary>
@@ -107147,7 +107804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1981">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="2023">
<summary>
Read/Write from systemd_networkd netlink route socket.
</summary>
@@ -107157,7 +107814,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_networkd_runtime" lineno="1999">
+<interface name="systemd_list_networkd_runtime" lineno="2041">
<summary>
Allow domain to list dirs under /run/systemd/netif
</summary>
@@ -107167,7 +107824,7 @@ domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="2018">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="2060">
<summary>
Watch directories under /run/systemd/netif
</summary>
@@ -107177,7 +107834,7 @@ Domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_runtime" lineno="2037">
+<interface name="systemd_read_networkd_runtime" lineno="2079">
<summary>
Allow domain to read files generated by systemd_networkd
</summary>
@@ -107187,7 +107844,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_state" lineno="2056">
+<interface name="systemd_read_logind_state" lineno="2098">
<summary>
Allow systemd_logind_t to read process state for cgroup file
</summary>
@@ -107197,7 +107854,7 @@ Domain systemd_logind_t may access.
</summary>
</param>
</interface>
-<interface name="systemd_create_logind_linger_dir" lineno="2077">
+<interface name="systemd_create_logind_linger_dir" lineno="2119">
<summary>
Allow the specified domain to create
the systemd-logind linger directory with
@@ -107209,7 +107866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_manager_units" lineno="2097">
+<interface name="systemd_start_user_manager_units" lineno="2139">
<summary>
Allow the specified domain to start systemd
user manager units (systemd --user).
@@ -107220,7 +107877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_manager_units" lineno="2117">
+<interface name="systemd_stop_user_manager_units" lineno="2159">
<summary>
Allow the specified domain to stop systemd
user manager units (systemd --user).
@@ -107231,7 +107888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_manager_units" lineno="2137">
+<interface name="systemd_reload_user_manager_units" lineno="2179">
<summary>
Allow the specified domain to reload systemd
user manager units (systemd --user).
@@ -107242,7 +107899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_get_user_manager_units_status" lineno="2157">
+<interface name="systemd_get_user_manager_units_status" lineno="2199">
<summary>
Get the status of systemd user manager
units (systemd --user).
@@ -107253,7 +107910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_power_units" lineno="2176">
+<interface name="systemd_start_power_units" lineno="2218">
<summary>
Allow specified domain to start power units
</summary>
@@ -107263,7 +107920,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="systemd_status_power_units" lineno="2195">
+<interface name="systemd_status_power_units" lineno="2237">
<summary>
Get the system status information about power units
</summary>
@@ -107273,7 +107930,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_socket_proxyd" lineno="2214">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="2256">
<summary>
Allows connections to the systemd-socket-proxyd's socket.
</summary>
@@ -107283,7 +107940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="2233">
+<interface name="systemd_tmpfiles_conf_file" lineno="2275">
<summary>
Make the specified type usable for
systemd tmpfiles config files.
@@ -107294,7 +107951,7 @@ Type to be used for systemd tmpfiles config files.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_creator" lineno="2254">
+<interface name="systemd_tmpfiles_creator" lineno="2296">
<summary>
Allow the specified domain to create
the tmpfiles config directory with
@@ -107306,7 +107963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="2290">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="2332">
<summary>
Create an object in the systemd tmpfiles config
directory, with a private type
@@ -107333,7 +107990,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="2309">
+<interface name="systemd_list_tmpfiles_conf" lineno="2351">
<summary>
Allow domain to list systemd tmpfiles config directory
</summary>
@@ -107343,7 +108000,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2327">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2369">
<summary>
Allow domain to relabel to systemd tmpfiles config directory
</summary>
@@ -107353,7 +108010,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2345">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2387">
<summary>
Allow domain to relabel to systemd tmpfiles config files
</summary>
@@ -107363,7 +108020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfilesd_managed" lineno="2363">
+<interface name="systemd_tmpfilesd_managed" lineno="2405">
<summary>
Allow systemd_tmpfiles_t to manage filesystem objects
</summary>
@@ -107373,7 +108030,7 @@ Type of object to manage
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_resolved" lineno="2390">
+<interface name="systemd_stream_connect_resolved" lineno="2432">
<summary>
Connect to systemd resolved over
/run/systemd/resolve/io.systemd.Resolve .
@@ -107384,7 +108041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_resolved" lineno="2411">
+<interface name="systemd_dbus_chat_resolved" lineno="2453">
<summary>
Send and receive messages from
systemd resolved over dbus.
@@ -107395,7 +108052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_resolved_runtime" lineno="2431">
+<interface name="systemd_read_resolved_runtime" lineno="2473">
<summary>
Allow domain to read resolv.conf file generated by systemd_resolved
</summary>
@@ -107405,7 +108062,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_exec_systemctl" lineno="2453">
+<interface name="systemd_exec_systemctl" lineno="2495">
<summary>
Execute the systemctl program.
</summary>
@@ -107415,7 +108072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_getattr_updated_runtime" lineno="2484">
+<interface name="systemd_getattr_updated_runtime" lineno="2526">
<summary>
Allow domain to getattr on .updated file (generated by systemd-update-done
</summary>
@@ -107425,7 +108082,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_search_all_user_keys" lineno="2502">
+<interface name="systemd_search_all_user_keys" lineno="2544">
<summary>
Search keys for the all systemd --user domains.
</summary>
@@ -107435,7 +108092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_create_all_user_keys" lineno="2520">
+<interface name="systemd_create_all_user_keys" lineno="2562">
<summary>
Create keys for the all systemd --user domains.
</summary>
@@ -107445,7 +108102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_all_user_keys" lineno="2538">
+<interface name="systemd_write_all_user_keys" lineno="2580">
<summary>
Write keys for the all systemd --user domains.
</summary>
@@ -107455,7 +108112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_domtrans_sysusers" lineno="2557">
+<interface name="systemd_domtrans_sysusers" lineno="2599">
<summary>
Execute systemd-sysusers in the
systemd sysusers domain.
@@ -107466,7 +108123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_run_sysusers" lineno="2582">
+<interface name="systemd_run_sysusers" lineno="2624">
<summary>
Run systemd-sysusers with a domain transition.
</summary>
@@ -107482,7 +108139,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="systemd_use_inherited_machined_ptys" lineno="2602">
+<interface name="systemd_use_inherited_machined_ptys" lineno="2644">
<summary>
receive and use a systemd_machined_devpts_t file handle
</summary>
@@ -108462,7 +109119,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_user_content_access_template" lineno="181">
+<template name="userdom_user_content_access_template" lineno="188">
<summary>
Template for handling user content through standard tunables
</summary>
@@ -108491,7 +109148,7 @@ The application domain which is granted the necessary privileges
</param>
<rolebase/>
</template>
-<interface name="userdom_application_exec_domain" lineno="266">
+<interface name="userdom_application_exec_domain" lineno="273">
<summary>
Associate the specified domain to be
a domain capable of executing other
@@ -108511,7 +109168,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</interface>
-<interface name="userdom_ro_home_role" lineno="300">
+<interface name="userdom_ro_home_role" lineno="307">
<summary>
Allow a home directory for which the
role has read-only access.
@@ -108537,7 +109194,7 @@ The user domain
</param>
<rolebase/>
</interface>
-<interface name="userdom_manage_home_role" lineno="377">
+<interface name="userdom_manage_home_role" lineno="384">
<summary>
Allow a home directory for which the
role has full access.
@@ -108563,7 +109220,7 @@ The user domain
</param>
<rolebase/>
</interface>
-<interface name="userdom_manage_tmp_role" lineno="472">
+<interface name="userdom_manage_tmp_role" lineno="479">
<summary>
Manage user temporary files
</summary>
@@ -108579,7 +109236,7 @@ Domain allowed access.
</param>
<rolebase/>
</interface>
-<interface name="userdom_exec_user_tmp_files" lineno="499">
+<interface name="userdom_exec_user_tmp_files" lineno="506">
<summary>
The execute access user temporary files.
</summary>
@@ -108590,7 +109247,7 @@ Domain allowed access.
</param>
<rolebase/>
</interface>
-<interface name="userdom_manage_tmpfs_role" lineno="535">
+<interface name="userdom_manage_tmpfs_role" lineno="542">
<summary>
Role access for the user tmpfs type
that the user has full access.
@@ -108616,7 +109273,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<template name="userdom_basic_networking_template" lineno="561">
+<template name="userdom_basic_networking_template" lineno="568">
<summary>
The template allowing the user basic
network permissions
@@ -108629,7 +109286,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_change_password_template" lineno="601">
+<template name="userdom_change_password_template" lineno="608">
<summary>
The template for allowing the user to change passwords.
</summary>
@@ -108641,7 +109298,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_common_user_template" lineno="631">
+<template name="userdom_common_user_template" lineno="638">
<summary>
The template containing rules common to unprivileged
users and administrative users.
@@ -108659,7 +109316,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_login_user_template" lineno="958">
+<template name="userdom_login_user_template" lineno="965">
<summary>
The template for creating a login user.
</summary>
@@ -108677,7 +109334,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_user_template" lineno="1081">
+<template name="userdom_restricted_user_template" lineno="1089">
<summary>
The template for creating a unprivileged login user.
</summary>
@@ -108695,7 +109352,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_xwindows_user_template" lineno="1122">
+<template name="userdom_restricted_xwindows_user_template" lineno="1130">
<summary>
The template for creating a unprivileged xwindows login user.
</summary>
@@ -108716,7 +109373,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_unpriv_user_template" lineno="1205">
+<template name="userdom_unpriv_user_template" lineno="1211">
<summary>
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
@@ -108739,7 +109396,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_admin_user_template" lineno="1325">
+<template name="userdom_admin_user_template" lineno="1331">
<summary>
The template for creating an administrative user.
</summary>
@@ -108768,7 +109425,7 @@ is the prefix for sysadm_t).
</summary>
</param>
</template>
-<interface name="userdom_security_admin_template" lineno="1506">
+<interface name="userdom_security_admin_template" lineno="1512">
<summary>
Allow user to run as a secadm
</summary>
@@ -108794,7 +109451,7 @@ The role of the object to create.
</summary>
</param>
</interface>
-<template name="userdom_xdg_user_template" lineno="1609">
+<template name="userdom_xdg_user_template" lineno="1615">
<summary>
Allow user to interact with xdg content types
</summary>
@@ -108815,7 +109472,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="userdom_user_application_type" lineno="1658">
+<interface name="userdom_user_application_type" lineno="1664">
<summary>
Make the specified type usable as
a user application domain type.
@@ -108826,7 +109483,7 @@ Type to be used as a user application domain.
</summary>
</param>
</interface>
-<interface name="userdom_user_application_domain" lineno="1679">
+<interface name="userdom_user_application_domain" lineno="1685">
<summary>
Make the specified type usable as
a user application domain.
@@ -108842,7 +109499,7 @@ Type to be used as the domain entry point.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content" lineno="1696">
+<interface name="userdom_user_home_content" lineno="1702">
<summary>
Make the specified type usable in a
user home directory.
@@ -108854,7 +109511,7 @@ user home directory.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_file" lineno="1722">
+<interface name="userdom_user_tmp_file" lineno="1728">
<summary>
Make the specified type usable as a
user temporary file.
@@ -108866,7 +109523,7 @@ temporary directories.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmpfs_file" lineno="1739">
+<interface name="userdom_user_tmpfs_file" lineno="1745">
<summary>
Make the specified type usable as a
user tmpfs file.
@@ -108878,7 +109535,7 @@ tmpfs directories.
</summary>
</param>
</interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1754">
+<interface name="userdom_attach_admin_tun_iface" lineno="1760">
<summary>
Allow domain to attach to TUN devices created by administrative users.
</summary>
@@ -108888,7 +109545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ptys" lineno="1773">
+<interface name="userdom_setattr_user_ptys" lineno="1779">
<summary>
Set the attributes of a user pty.
</summary>
@@ -108898,7 +109555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_pty" lineno="1791">
+<interface name="userdom_create_user_pty" lineno="1797">
<summary>
Create a user pty.
</summary>
@@ -108908,7 +109565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1809">
+<interface name="userdom_getattr_user_home_dirs" lineno="1815">
<summary>
Get the attributes of user home directories.
</summary>
@@ -108918,7 +109575,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1828">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1834">
<summary>
Do not audit attempts to get the attributes of user home directories.
</summary>
@@ -108928,7 +109585,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_dirs" lineno="1846">
+<interface name="userdom_search_user_home_dirs" lineno="1852">
<summary>
Search user home directories.
</summary>
@@ -108938,7 +109595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1873">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1879">
<summary>
Do not audit attempts to search user home directories.
</summary>
@@ -108956,7 +109613,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_list_user_home_dirs" lineno="1891">
+<interface name="userdom_list_user_home_dirs" lineno="1897">
<summary>
List user home directories.
</summary>
@@ -108966,7 +109623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1910">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1916">
<summary>
Do not audit attempts to list user home subdirectories.
</summary>
@@ -108976,7 +109633,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_home_dirs" lineno="1928">
+<interface name="userdom_create_user_home_dirs" lineno="1934">
<summary>
Create user home directories.
</summary>
@@ -108986,7 +109643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1946">
+<interface name="userdom_manage_user_home_dirs" lineno="1952">
<summary>
Manage user home directories.
</summary>
@@ -108996,7 +109653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_home_dirs" lineno="1965">
+<interface name="userdom_dontaudit_manage_user_home_dirs" lineno="1971">
<summary>
Do not audit attempts to manage user
home directories.
@@ -109007,7 +109664,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1983">
+<interface name="userdom_relabelto_user_home_dirs" lineno="1989">
<summary>
Relabel to user home directories.
</summary>
@@ -109017,7 +109674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="2007">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="2013">
<summary>
Create directories in the home dir root with
the user home directory type.
@@ -109033,7 +109690,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_domtrans" lineno="2044">
+<interface name="userdom_user_home_domtrans" lineno="2050">
<summary>
Do a domain transition to the specified
domain when executing a program in the
@@ -109062,7 +109719,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="2064">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="2070">
<summary>
Do not audit attempts to search user home content directories.
</summary>
@@ -109072,7 +109729,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_home_content" lineno="2082">
+<interface name="userdom_list_all_user_home_content" lineno="2088">
<summary>
List all users home content directories.
</summary>
@@ -109082,7 +109739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_home_content" lineno="2101">
+<interface name="userdom_list_user_home_content" lineno="2107">
<summary>
List contents of users home directory.
</summary>
@@ -109092,7 +109749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="2120">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2126">
<summary>
Create, read, write, and delete directories
in a user home subdirectory.
@@ -109103,7 +109760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="2139">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2145">
<summary>
Delete all user home content directories.
</summary>
@@ -109113,7 +109770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="2159">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2165">
<summary>
Delete directories in a user home subdirectory.
</summary>
@@ -109123,7 +109780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2177">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2183">
<summary>
Set attributes of all user home content directories.
</summary>
@@ -109133,7 +109790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2197">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2203">
<summary>
Do not audit attempts to set the
attributes of user home files.
@@ -109144,7 +109801,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_home_content_files" lineno="2215">
+<interface name="userdom_map_user_home_content_files" lineno="2221">
<summary>
Map user home files.
</summary>
@@ -109154,7 +109811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2233">
+<interface name="userdom_mmap_user_home_content_files" lineno="2239">
<summary>
Mmap user home files.
</summary>
@@ -109164,7 +109821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_files" lineno="2252">
+<interface name="userdom_read_user_home_content_files" lineno="2258">
<summary>
Read user home files.
</summary>
@@ -109174,7 +109831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2271">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2277">
<summary>
Do not audit attempts to read user home files.
</summary>
@@ -109184,7 +109841,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_user_home_content" lineno="2290">
+<interface name="userdom_read_all_user_home_content" lineno="2296">
<summary>
Read all user home content, including application-specific resources.
</summary>
@@ -109194,7 +109851,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2312">
+<interface name="userdom_manage_all_user_home_content" lineno="2318">
<summary>
Manage all user home content, including application-specific resources.
</summary>
@@ -109204,7 +109861,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_map_all_user_home_content_files" lineno="2334">
+<interface name="userdom_map_all_user_home_content_files" lineno="2340">
<summary>
Map all user home content, including application-specific resources.
</summary>
@@ -109214,7 +109871,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2352">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2358">
<summary>
Do not audit attempts to append user home files.
</summary>
@@ -109224,7 +109881,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2370">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2376">
<summary>
Do not audit attempts to write user home files.
</summary>
@@ -109234,7 +109891,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2388">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2394">
<summary>
Delete all user home content files.
</summary>
@@ -109244,7 +109901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2408">
+<interface name="userdom_delete_user_home_content_files" lineno="2414">
<summary>
Delete files in a user home subdirectory.
</summary>
@@ -109254,7 +109911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_generic_user_home_dirs" lineno="2426">
+<interface name="userdom_relabel_generic_user_home_dirs" lineno="2432">
<summary>
Relabel generic user home dirs.
</summary>
@@ -109264,7 +109921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_generic_user_home_files" lineno="2444">
+<interface name="userdom_relabel_generic_user_home_files" lineno="2450">
<summary>
Relabel generic user home files.
</summary>
@@ -109274,7 +109931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2462">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2468">
<summary>
Do not audit attempts to relabel user home files.
</summary>
@@ -109284,7 +109941,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2480">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2486">
<summary>
Read user home subdirectory symbolic links.
</summary>
@@ -109294,7 +109951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2500">
+<interface name="userdom_exec_user_home_content_files" lineno="2506">
<summary>
Execute user home files.
</summary>
@@ -109305,7 +109962,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2527">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2533">
<summary>
Do not audit attempts to execute user home files.
</summary>
@@ -109315,7 +109972,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2546">
+<interface name="userdom_manage_user_home_content_files" lineno="2552">
<summary>
Create, read, write, and delete files
in a user home subdirectory.
@@ -109326,7 +109983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2567">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2573">
<summary>
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
@@ -109337,7 +109994,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2586">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2592">
<summary>
Create, read, write, and delete symbolic links
in a user home subdirectory.
@@ -109348,7 +110005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2606">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2612">
<summary>
Delete all user home content symbolic links.
</summary>
@@ -109358,7 +110015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2626">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2632">
<summary>
Delete symbolic links in a user home directory.
</summary>
@@ -109368,7 +110025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2645">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2651">
<summary>
Create, read, write, and delete named pipes
in a user home subdirectory.
@@ -109379,7 +110036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2666">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2672">
<summary>
Create, read, write, and delete named sockets
in a user home subdirectory.
@@ -109390,7 +110047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2703">
+<interface name="userdom_user_home_dir_filetrans" lineno="2709">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -109417,7 +110074,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2740">
+<interface name="userdom_user_home_content_filetrans" lineno="2746">
<summary>
Create objects in a directory located
in a user home directory with an
@@ -109445,7 +110102,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2771">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2777">
<summary>
Automatically use the user_cert_t label for selected resources
created in a users home directory
@@ -109466,7 +110123,7 @@ Name of the resource that is being created
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2801">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2807">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -109488,7 +110145,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_bin_files" lineno="2820">
+<interface name="userdom_exec_user_bin_files" lineno="2826">
<summary>
Execute user executable files.
</summary>
@@ -109498,7 +110155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_bin" lineno="2840">
+<interface name="userdom_manage_user_bin" lineno="2846">
<summary>
Manage user executable files.
</summary>
@@ -109508,7 +110165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_certs" lineno="2862">
+<interface name="userdom_read_user_certs" lineno="2868">
<summary>
Read user SSL certificates.
</summary>
@@ -109519,7 +110176,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2885">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2891">
<summary>
Do not audit attempts to manage
the user SSL certificates.
@@ -109531,7 +110188,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_manage_user_certs" lineno="2905">
+<interface name="userdom_manage_user_certs" lineno="2911">
<summary>
Manage user SSL certificates.
</summary>
@@ -109541,7 +110198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2926">
+<interface name="userdom_write_user_tmp_sockets" lineno="2932">
<summary>
Write to user temporary named sockets.
</summary>
@@ -109551,7 +110208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_tmp" lineno="2946">
+<interface name="userdom_list_user_tmp" lineno="2952">
<summary>
List user temporary directories.
</summary>
@@ -109561,7 +110218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2968">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2974">
<summary>
Do not audit attempts to list user
temporary directories.
@@ -109572,7 +110229,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2986">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2992">
<summary>
Delete users temporary directories.
</summary>
@@ -109582,7 +110239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="3005">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="3011">
<summary>
Do not audit attempts to manage users
temporary directories.
@@ -109593,7 +110250,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_files" lineno="3023">
+<interface name="userdom_read_user_tmp_files" lineno="3029">
<summary>
Read user temporary files.
</summary>
@@ -109603,7 +110260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmp_files" lineno="3044">
+<interface name="userdom_map_user_tmp_files" lineno="3050">
<summary>
Map user temporary files.
</summary>
@@ -109613,7 +110270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3063">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3069">
<summary>
Do not audit attempts to read users
temporary files.
@@ -109624,7 +110281,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3082">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3088">
<summary>
Do not audit attempts to append users
temporary files.
@@ -109635,7 +110292,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmp_files" lineno="3100">
+<interface name="userdom_rw_user_tmp_files" lineno="3106">
<summary>
Read and write user temporary files.
</summary>
@@ -109645,7 +110302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_files" lineno="3121">
+<interface name="userdom_delete_user_tmp_files" lineno="3127">
<summary>
Delete users temporary files.
</summary>
@@ -109655,7 +110312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3140">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3146">
<summary>
Do not audit attempts to manage users
temporary files.
@@ -109666,7 +110323,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="3158">
+<interface name="userdom_read_user_tmp_symlinks" lineno="3164">
<summary>
Read user temporary symbolic links.
</summary>
@@ -109676,7 +110333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="3179">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3185">
<summary>
Delete users temporary symbolic links.
</summary>
@@ -109686,7 +110343,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="3198">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3204">
<summary>
Create, read, write, and delete user
temporary directories.
@@ -109697,7 +110354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="3218">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3224">
<summary>
Delete users temporary named pipes.
</summary>
@@ -109707,7 +110364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_files" lineno="3237">
+<interface name="userdom_manage_user_tmp_files" lineno="3243">
<summary>
Create, read, write, and delete user
temporary files.
@@ -109718,7 +110375,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="3257">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3263">
<summary>
Delete users temporary named sockets.
</summary>
@@ -109728,7 +110385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3276">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3282">
<summary>
Create, read, write, and delete user
temporary symbolic links.
@@ -109739,7 +110396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3297">
+<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3303">
<summary>
Do not audit attempts to read and write
temporary pipes.
@@ -109750,7 +110407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3316">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3322">
<summary>
Create, read, write, and delete user
temporary named pipes.
@@ -109761,7 +110418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3337">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3343">
<summary>
Create, read, write, and delete user
temporary named sockets.
@@ -109772,7 +110429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3374">
+<interface name="userdom_user_tmp_filetrans" lineno="3380">
<summary>
Create objects in a user temporary directory
with an automatic type transition to
@@ -109799,7 +110456,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3406">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3412">
<summary>
Create objects in the temporary directory
with an automatic type transition to
@@ -109821,7 +110478,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3424">
+<interface name="userdom_map_user_tmpfs_files" lineno="3430">
<summary>
Map user tmpfs files.
</summary>
@@ -109831,7 +110488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3442">
+<interface name="userdom_read_user_tmpfs_files" lineno="3448">
<summary>
Read user tmpfs files.
</summary>
@@ -109841,7 +110498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3462">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3468">
<summary>
dontaudit Read attempts of user tmpfs files.
</summary>
@@ -109851,7 +110508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3481">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3487">
<summary>
relabel to/from user tmpfs dirs
</summary>
@@ -109861,7 +110518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3500">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3506">
<summary>
relabel to/from user tmpfs files
</summary>
@@ -109871,7 +110528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_content" lineno="3522">
+<interface name="userdom_user_runtime_content" lineno="3528">
<summary>
Make the specified type usable in
the directory /run/user/%{USERID}/.
@@ -109883,7 +110540,7 @@ user_runtime_content_dir_t.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime" lineno="3542">
+<interface name="userdom_search_user_runtime" lineno="3548">
<summary>
Search users runtime directories.
</summary>
@@ -109893,7 +110550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime_root" lineno="3561">
+<interface name="userdom_search_user_runtime_root" lineno="3567">
<summary>
Search user runtime root directories.
</summary>
@@ -109903,7 +110560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3581">
+<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3587">
<summary>
Do not audit attempts to search
user runtime root directories.
@@ -109914,7 +110571,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3600">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3606">
<summary>
Create, read, write, and delete user
runtime root dirs.
@@ -109925,7 +110582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3619">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3625">
<summary>
Relabel to and from user runtime root dirs.
</summary>
@@ -109935,7 +110592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3638">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3644">
<summary>
Create, read, write, and delete user
runtime dirs.
@@ -109946,7 +110603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3658">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3664">
<summary>
Mount a filesystem on user runtime dir
directories.
@@ -109957,7 +110614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3676">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3682">
<summary>
Relabel to user runtime directories.
</summary>
@@ -109967,7 +110624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3694">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3700">
<summary>
Relabel from user runtime directories.
</summary>
@@ -109977,7 +110634,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3712">
+<interface name="userdom_write_all_user_runtime_named_sockets" lineno="3718">
+<summary>
+write user runtime socket files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_delete_user_runtime_files" lineno="3737">
<summary>
delete user runtime files
</summary>
@@ -109987,7 +110654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_all_user_runtime" lineno="3731">
+<interface name="userdom_search_all_user_runtime" lineno="3756">
<summary>
Search users runtime directories.
</summary>
@@ -109997,7 +110664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_runtime" lineno="3750">
+<interface name="userdom_list_all_user_runtime" lineno="3775">
<summary>
List user runtime directories.
</summary>
@@ -110007,7 +110674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3769">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3794">
<summary>
delete user runtime directories
</summary>
@@ -110017,7 +110684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3787">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3812">
<summary>
delete user runtime files
</summary>
@@ -110027,7 +110694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3805">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3830">
<summary>
delete user runtime symlink files
</summary>
@@ -110037,7 +110704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3823">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3848">
<summary>
delete user runtime fifo files
</summary>
@@ -110047,7 +110714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3841">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3866">
<summary>
delete user runtime socket files
</summary>
@@ -110057,7 +110724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3859">
+<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3884">
<summary>
delete user runtime blk files
</summary>
@@ -110067,7 +110734,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3877">
+<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3902">
<summary>
delete user runtime chr files
</summary>
@@ -110077,7 +110744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3907">
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3932">
<summary>
Create objects in the runtime directory
with an automatic type transition to
@@ -110099,7 +110766,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3943">
+<interface name="userdom_user_runtime_filetrans" lineno="3968">
<summary>
Create objects in a user runtime
directory with an automatic type
@@ -110127,7 +110794,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3974">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3999">
<summary>
Create objects in the user runtime directory
with an automatic type transition to
@@ -110149,7 +110816,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4004">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4029">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -110171,7 +110838,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="4035">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="4060">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -110193,7 +110860,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="4053">
+<interface name="userdom_rw_user_tmpfs_files" lineno="4078">
<summary>
Read and write user tmpfs files.
</summary>
@@ -110203,7 +110870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="4074">
+<interface name="userdom_delete_user_tmpfs_files" lineno="4099">
<summary>
Delete user tmpfs files.
</summary>
@@ -110213,7 +110880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="4093">
+<interface name="userdom_manage_user_tmpfs_files" lineno="4118">
<summary>
Create, read, write, and delete user tmpfs files.
</summary>
@@ -110223,7 +110890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_ttys" lineno="4113">
+<interface name="userdom_getattr_user_ttys" lineno="4138">
<summary>
Get the attributes of a user domain tty.
</summary>
@@ -110233,7 +110900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4131">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4156">
<summary>
Do not audit attempts to get the attributes of a user domain tty.
</summary>
@@ -110243,7 +110910,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ttys" lineno="4149">
+<interface name="userdom_setattr_user_ttys" lineno="4174">
<summary>
Set the attributes of a user domain tty.
</summary>
@@ -110253,7 +110920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4167">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4192">
<summary>
Do not audit attempts to set the attributes of a user domain tty.
</summary>
@@ -110263,7 +110930,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ttys" lineno="4185">
+<interface name="userdom_use_user_ttys" lineno="4210">
<summary>
Read and write a user domain tty.
</summary>
@@ -110273,7 +110940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ptys" lineno="4203">
+<interface name="userdom_use_user_ptys" lineno="4228">
<summary>
Read and write a user domain pty.
</summary>
@@ -110283,7 +110950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="4238">
+<interface name="userdom_use_inherited_user_terminals" lineno="4263">
<summary>
Read and write a user TTYs and PTYs.
</summary>
@@ -110309,7 +110976,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_use_user_terminals" lineno="4279">
+<interface name="userdom_use_user_terminals" lineno="4304">
<summary>
Read, write and open a user TTYs and PTYs.
</summary>
@@ -110341,7 +111008,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="4295">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4320">
<summary>
Do not audit attempts to read and write
a user domain tty and pty.
@@ -110352,7 +111019,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_lock_user_terminals" lineno="4314">
+<interface name="userdom_lock_user_terminals" lineno="4339">
<summary>
Lock user TTYs and PTYs.
</summary>
@@ -110362,7 +111029,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="4335">
+<interface name="userdom_spec_domtrans_all_users" lineno="4360">
<summary>
Execute a shell in all user domains. This
is an explicit transition, requiring the
@@ -110374,7 +111041,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4358">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4383">
<summary>
Execute an Xserver session in all user domains. This
is an explicit transition, requiring the
@@ -110386,7 +111053,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4381">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4406">
<summary>
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -110398,7 +111065,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4404">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4429">
<summary>
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -110410,7 +111077,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4425">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4450">
<summary>
Read and write unpriviledged user SysV sempaphores.
</summary>
@@ -110420,7 +111087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4443">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4468">
<summary>
Manage unpriviledged user SysV sempaphores.
</summary>
@@ -110430,7 +111097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4462">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4487">
<summary>
Read and write unpriviledged user SysV shared
memory segments.
@@ -110441,7 +111108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4481">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4506">
<summary>
Manage unpriviledged user SysV shared
memory segments.
@@ -110452,7 +111119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4501">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4526">
<summary>
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
@@ -110464,7 +111131,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4524">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4549">
<summary>
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
@@ -110476,7 +111143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_content" lineno="4545">
+<interface name="userdom_search_user_home_content" lineno="4570">
<summary>
Search users home directories.
</summary>
@@ -110486,7 +111153,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signull_unpriv_users" lineno="4564">
+<interface name="userdom_watch_user_home_dirs" lineno="4589">
+<summary>
+watch users home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_signull_unpriv_users" lineno="4607">
<summary>
Send signull to unprivileged user domains.
</summary>
@@ -110496,7 +111173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signal_unpriv_users" lineno="4582">
+<interface name="userdom_signal_unpriv_users" lineno="4625">
<summary>
Send general signals to unprivileged user domains.
</summary>
@@ -110506,7 +111183,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4600">
+<interface name="userdom_use_unpriv_users_fds" lineno="4643">
<summary>
Inherit the file descriptors from unprivileged user domains.
</summary>
@@ -110516,7 +111193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4628">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4671">
<summary>
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
@@ -110536,7 +111213,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4646">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4689">
<summary>
Do not audit attempts to use user ptys.
</summary>
@@ -110546,7 +111223,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4664">
+<interface name="userdom_relabelto_user_ptys" lineno="4707">
<summary>
Relabel files to unprivileged user pty types.
</summary>
@@ -110556,7 +111233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4683">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4726">
<summary>
Do not audit attempts to relabel files from
user pty types.
@@ -110567,7 +111244,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_files" lineno="4701">
+<interface name="userdom_write_user_tmp_files" lineno="4744">
<summary>
Write all users files in /tmp
</summary>
@@ -110577,7 +111254,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4720">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4763">
<summary>
Do not audit attempts to write users
temporary files.
@@ -110588,7 +111265,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4738">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4781">
<summary>
Do not audit attempts to use user ttys.
</summary>
@@ -110598,7 +111275,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_state" lineno="4756">
+<interface name="userdom_read_all_users_state" lineno="4799">
<summary>
Read the process state of all user domains.
</summary>
@@ -110608,7 +111285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_all_users" lineno="4776">
+<interface name="userdom_getattr_all_users" lineno="4819">
<summary>
Get the attributes of all user domains.
</summary>
@@ -110618,7 +111295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_all_users_fds" lineno="4794">
+<interface name="userdom_use_all_users_fds" lineno="4837">
<summary>
Inherit the file descriptors from all user domains
</summary>
@@ -110628,7 +111305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4813">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4856">
<summary>
Do not audit attempts to inherit the file
descriptors from any user domains.
@@ -110639,7 +111316,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_signal_all_users" lineno="4831">
+<interface name="userdom_signal_all_users" lineno="4874">
<summary>
Send general signals to all user domains.
</summary>
@@ -110649,7 +111326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_sigchld_all_users" lineno="4849">
+<interface name="userdom_sigchld_all_users" lineno="4892">
<summary>
Send a SIGCHLD signal to all user domains.
</summary>
@@ -110659,7 +111336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_keys" lineno="4867">
+<interface name="userdom_read_all_users_keys" lineno="4910">
<summary>
Read keys for all user domains.
</summary>
@@ -110669,7 +111346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_all_users_keys" lineno="4885">
+<interface name="userdom_write_all_users_keys" lineno="4928">
<summary>
Write keys for all user domains.
</summary>
@@ -110679,7 +111356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_all_users_keys" lineno="4903">
+<interface name="userdom_rw_all_users_keys" lineno="4946">
<summary>
Read and write keys for all user domains.
</summary>
@@ -110689,7 +111366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_all_users_keys" lineno="4921">
+<interface name="userdom_create_all_users_keys" lineno="4964">
<summary>
Create keys for all user domains.
</summary>
@@ -110699,7 +111376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_users_keys" lineno="4939">
+<interface name="userdom_manage_all_users_keys" lineno="4982">
<summary>
Manage keys for all user domains.
</summary>
@@ -110709,7 +111386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dbus_send_all_users" lineno="4957">
+<interface name="userdom_dbus_send_all_users" lineno="5000">
<summary>
Send a dbus message to all user domains.
</summary>
@@ -110719,7 +111396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4979">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="5022">
<summary>
Create, read, write, and delete user
temporary character files.
@@ -110730,7 +111407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_certs" lineno="5000">
+<interface name="userdom_relabel_user_certs" lineno="5043">
<summary>
Allow relabeling resources to user_cert_t
</summary>
@@ -110740,7 +111417,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5023">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5066">
<summary>
Do not audit attempts to read and write
unserdomain stream.
@@ -110765,6 +111442,13 @@ Allow users to connect to PostgreSQL
</p>
</desc>
</tunable>
+<tunable name="user_all_users_send_syslog" dftval="true">
+<desc>
+<p>
+Allow all users to send syslog messages
+</p>
+</desc>
+</tunable>
<tunable name="user_direct_mouse" dftval="false">
<desc>
<p>
diff --git a/policy/booleans.conf b/policy/booleans.conf
index 7ef0cb2d..f244d9c5 100644
--- a/policy/booleans.conf
+++ b/policy/booleans.conf
@@ -552,6 +552,12 @@ openoffice_manage_all_user_content = false
pulseaudio_execmem = false
#
+# Determine whether pulseaudio
+# can use the network.
+#
+pulseaudio_can_network = false
+
+#
# Determine whether qemu has full
# access to the network.
#
@@ -1261,11 +1267,24 @@ container_use_dri = false
container_use_ecryptfs = false
#
+# Allow containers to use all capabilities in a
+# non-namespaced context for various privileged operations
+# directly on the host.
+#
+container_use_host_all_caps = false
+
+#
# Allow containers to use huge pages.
#
container_use_hugetlbfs = false
#
+# Allow containers to use the mknod syscall, e.g. for
+# creating special device files.
+#
+container_use_mknod = false
+
+#
# Allow containers to use NFS filesystems.
#
container_use_nfs = false
@@ -1276,6 +1295,33 @@ container_use_nfs = false
container_use_samba = false
#
+# Allow containers to use the sysadmin capability, e.g.
+# for mounting filesystems.
+#
+container_use_sysadmin = false
+
+#
+# Allow containers to use all capabilities in a
+# namespaced context for various privileged operations
+# within the container itself.
+#
+container_use_userns_all_caps = false
+
+#
+# Allow containers to use the mknod syscall in a
+# namespaced context, e.g. for creating special device
+# files within the container itself.
+#
+container_use_userns_mknod = false
+
+#
+# Allow containers to use the sysadmin capability in a
+# namespaced context, e.g. for mounting filesystems
+# within the container itself.
+#
+container_use_userns_sysadmin = false
+
+#
# Determine whether system cron jobs
# can relabel filesystem for
# restoring file contexts.
@@ -1330,6 +1376,14 @@ allow_cvs_read_shadow = false
allow_httpd_cvs_script_anon_write = false
#
+# Determine whether the dbus server
+# can use the network (insecure
+# except than in the case of the
+# loopback interface).
+#
+dbus_can_network = false
+
+#
# Allow dbus-daemon system bus to access /dev/net/tun
# which is needed to pass tun/tap device file descriptors
# over D-Bus. This is needed by openvpn3-linux.
@@ -1913,7 +1967,8 @@ allow_httpd_smokeping_cgi_script_anon_write = false
#
# Determine whether spamassassin
-# clients can use the network.
+# daemon or clients can use the
+# network.
#
spamassassin_can_network = false
@@ -1924,12 +1979,25 @@ spamassassin_can_network = false
spamd_enable_home_dirs = false
#
+# Determine whether spamassassin
+# can update the rules using the
+# network.
+#
+spamassassin_network_update = true
+
+#
# Determine whether extra rules should
# be enabled to support rspamd.
#
rspamd_spamd = false
#
+# Determine whether execmem should be allowed
+# Needed if LUA JIT is enabled for rspamd
+#
+spamd_execmem = false
+
+#
# Determine whether squid can
# connect to all TCP ports.
#
@@ -2058,15 +2126,33 @@ virt_use_vfio = false
virt_use_evdev = false
#
+# Allows the X server to use TCP/IP
+# networking functionality (insecure).
+#
+xserver_can_network = false
+
+#
+# Allows the X display manager to use
+# TCP/IP networking functionality (insecure).
+#
+xserver_xdm_can_network = false
+
+#
+# Allow xdm logins as sysadm
+#
+xdm_sysadm_login = false
+
+#
# Allows clients to write to the X server shared
# memory segments.
#
allow_write_xshm = false
#
-# Allow xdm logins as sysadm
+# Allows clients to write to the X server tmpfs
+# files.
#
-xdm_sysadm_login = false
+xserver_client_writes_xserver_tmpfs = false
#
# Use gnome-shell in gdm mode as the
@@ -2132,6 +2218,12 @@ init_mounton_non_security = false
racoon_read_shadow = false
#
+# Allows syslogd internet domain sockets
+# functionality (dangerous).
+#
+logging_syslog_can_network = false
+
+#
# Allow the mount command to mount any directory or file.
#
allow_mount_anyfile = false
@@ -2196,6 +2288,11 @@ allow_user_mysql_connect = false
allow_user_postgresql_connect = false
#
+# Allow all users to send syslog messages
+#
+user_all_users_send_syslog = true
+
+#
# Allow regular users direct mouse access
#
user_direct_mouse = false
diff --git a/policy/modules.conf b/policy/modules.conf
index 055d20fa..8741c1eb 100644
--- a/policy/modules.conf
+++ b/policy/modules.conf
@@ -1513,6 +1513,13 @@ dovecot = module
drbd = module
# Layer: services
+# Module: eg25manager
+#
+# Manager daemon for the Quectel EG25 modem
+#
+eg25manager = module
+
+# Layer: services
# Module: entropyd
#
# Generate entropy from audio input.
@@ -1695,6 +1702,13 @@ icecast = module
ifplugd = module
# Layer: services
+# Module: iiosensorproxy
+#
+# IIO sensors to D-Bus proxy
+#
+iiosensorproxy = module
+
+# Layer: services
# Module: inetd
#
# Internet services daemon.
@@ -1821,6 +1835,13 @@ lircd = module
lldpad = module
# Layer: services
+# Module: lowmemorymonitor
+#
+# low memory monitor daemon
+#
+lowmemorymonitor = module
+
+# Layer: services
# Module: lpd
#
# Line printer daemon.
@@ -2241,6 +2262,13 @@ postgresql = module
postgrey = module
# Layer: services
+# Module: powerprofiles
+#
+# power profiles daemon
+#
+powerprofiles = module
+
+# Layer: services
# Module: ppp
#
# Point to Point Protocol daemon creates links in ppp networks.
@@ -2346,6 +2374,13 @@ radius = module
radvd = module
# Layer: services
+# Module: rasdaemon
+#
+# RAS (Reliability, Availability and Serviceability) logging tool
+#
+rasdaemon = module
+
+# Layer: services
# Module: razor
#
# A distributed, collaborative, spam detection and filtering network.
@@ -2612,6 +2647,13 @@ stunnel = module
svnserve = module
# Layer: services
+# Module: switcheroo
+#
+# switcheroo daemon
+#
+switcheroo = module
+
+# Layer: services
# Module: sympa
#
# Sympa mailing list manager
@@ -2668,6 +2710,13 @@ tftp = module
tgtd = module
# Layer: services
+# Module: thunderbolt
+#
+# thunderbolt daemon
+#
+thunderbolt = module
+
+# Layer: services
# Module: timidity
#
# MIDI to WAV converter and player configured as a service.