From af3dd8da28a6650cfb84a2bf2b5f0c89a59da4bd Mon Sep 17 00:00:00 2001
From: Chris PeBenito Policy for the Anaconda installer. Policy for the kernel modules, kernel image, and bootloader. Digital Certificate Tracking
@@ -205,11 +227,24 @@ after installation of Red Hat/Fedora systems.
System log analyzer and reporter Network traffic graphing Network analysis utilities
+Portage Package Management System. The primary package management and
+distribution system for Gentoo.
+ Prelink ELF shared library mappings.
Domain allowed access.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
Domain allowed access.
-
+
Domain allowed access.
-
+
Domain allowed access.
-
+
+Allow read/writing amanda logs
+
+Domain to allow
+
The type of the process performing this action.
-
+
Domain to not audit.
-
+
The type of the process performing this action.
-
+
The role to be allowed the amanda_recover domain.
-
+
The type of the terminal allow the amanda_recover domain to use.
+
+Allow read/writing /etc/dumpdates.
+
+Domain to allow
+
The type of the process performing this action.
-
+ Policy for the kernel modules, kernel image, and bootloader.
+Read and write the bootloader
+temporary data in /tmp.
+
+The type of the process performing this action.
+
+Execute bootloader in the bootloader domain.
+
+The type of the process performing this action.
+
+Read the bootloader configuration file.
+
+The type of the process performing this action.
+
+Execute bootloader interactively and do
+a domain transition to the bootloader domain.
+
+The type of the process performing this action.
+
+The role to be allowed the bootloader domain.
+
+The type of the terminal allow the bootloader domain to use.
+
+Read and write the bootloader
+configuration file.
+
+The type of the process performing this action.
+
+Read and write the bootloader
+temporary data in /tmp.
+
+The type of the process performing this action.
+ Digital Certificate Tracking
+Execute certwatch in the certwatch domain, and
+allow the specified role the certwatch domain,
+and use the caller's terminal. Has a sigchld
+backchannel.
+
+The type of the process performing this action.
+
+The role to be allowed the certwatch domain.
+
+The type of the terminal allow the certwatch domain to use.
+
+Domain transition to certwatch.
+
+Domain allowed access.
+
The type of the process performing this action.
-
+
+The type of the process performing this action.
+
+Execute consoletype in the consoletype domain, and
+allow the specified role the consoletype domain.
+
The type of the process performing this action.
+
+The role to be allowed the consoletype domain.
+
+The type of the terminal allow the consoletype domain to use.
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
Role to be authenticated for ddcprobe domain.
-
+
The type of the terminal allow the clock domain to use.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
Domain allowed access.
-
+
The type of the process performing this action.
-
+
The role to be allowed the dmidecode domain.
-
+
The type of the terminal allow the dmidecode domain to use.
-
+
The type of the process performing this action.
-
+
Domain to not audit.
-
+
The type of the process performing this action.
-
+
The role to be allowed the firstboot domain.
-
+
The type of the terminal allow the firstboot domain to use.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The role to be allowed the kudzu domain.
-
+
The type of the terminal allow the kudzu domain to use.
-
+
The type of the process performing this action.
-
+
The type of the process to not audit.
-
+
The type of the process performing this action.
-
+
The type of the process to not audit.
-
+
The type of the process performing this action.
-
+
The role to be allowed the logrotate domain.
-
+
The type of the terminal allow the logrotate domain to use.
-
+
Domain allowed access.
-
+
Domain allowed access.
-
+ Network traffic graphing
+Create and append mrtg logs.
+
+Domain allowed access.
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The role to be allowed the netutils domain.
-
+
The type of the terminal allow the netutils domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the ping domain.
-
+
The type of the terminal allow the ping domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the ping domain.
-
+
The type of the terminal allow the ping domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the traceroute domain.
-
+
The type of the terminal allow the traceroute domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the traceroute domain.
-
+
The type of the terminal allow the traceroute domain to use.
-
+
+Portage Package Management System. The primary package management and
+distribution system for Gentoo.
+
+Execute emerge in the portage domain.
+
+Domain allowed access.
+
+Execute emerge in the portage domain, and
+allow the specified role the portage domain.
+
+Domain allowed access.
+
+The role to allow the portage domain.
+
+The type of the terminal allow for portage to use.
+
+Template for portage sandbox.
+
+
+Template for portage sandbox. Portage
+does all compiling in the sandbox.
+
+
+Name to be used to derive types.
+
Domain allowed access.
-
+
Domain allowed access.
-
+
Domain allowed access.
-
+
File type to be prelinked.
-
+
Domain allowed access.
-
+
The type of the process performing this action.
-
+
Domain to not audit.
-
+
Parameter descriptions are missing!
-
+
The type of the process performing this action.
-
+
The role to be allowed the quota domain.
-
+
The type of the terminal allow the quota domain to use.
-
+
The type of the process performing this action.
+
+Execute rpm_script programs in the rpm_script domain.
+
-Execute rpm_script programs in the rpm_script domain.
+The type of the process performing this action.
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
Domain allowed access.
-
+
The prefix of the user domain (e.g., user
is the prefix for user_t).
-
+
The type of the user domain.
-
+
The role associated with the user domain.
-
+
Parameter descriptions are missing!
-
+
The prefix of the user domain (e.g., user
is the prefix for user_t).
-
+
The type of the user domain.
-
+
The role associated with the user domain.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
Domain allowed access.
-
+
The type of the process performing this action.
-
+
The role to be allowed the usbmodules domain.
-
+
The type of the terminal allow the usbmodules domain to use.
-
+
Domain allowed access.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The type of the process performing this action.
-
+
The role to be allowed the admin passwd domain.
-
+
The type of the terminal allow the admin passwd domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the chfn domain.
-
+
The type of the terminal allow the chfn domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the groupadd domain.
-
+
The type of the terminal allow the groupadd domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the passwd domain.
-
+
The type of the terminal allow the passwd domain to use.
-
+
The type of the process performing this action.
-
+
The role to be allowed the useradd domain.
-
+
The type of the terminal allow the useradd domain to use.
-
+
N/A
-
+
Domain allowed access.
-
+
Domain allowed access.
-
+
The role to be allowed the vpnc domain.
-
+
The type of the terminal allow the vpnc domain to use.
-
+
Domain allowed access.
-
+ device locking policy for lockdev Run .NET server and client applications on Linux. GNU terminal multiplexer Update database for mlocate tvtime - a high quality television application Policy for UML SELinux utility to run a shell with a new role User network interface configuration helper Web server log analysis Wine Is Not an Emulator. Run Windows programs in Linux.
The prefix of the user domain (e.g., user
is the prefix for user_t).
-
+
The type of the user domain.
-
+
The role associated with the user domain.
-
+
The prefix of the user domain (e.g., user
is the prefix for user_t).
-
+
+The user domain.
+
+The role associated with the user.
+
The prefix of the user domain (e.g., user
is the prefix for user_t).
-
+
The type of the user domain.
-
+
The role associated with the user domain.
-
+ Java virtual machine
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -160,6 +172,16 @@
+
+ bootloader
+
+
+
+
+ certwatch
+
+
+
consoletype
+
+ mrtg
+
+
+
netutils
+
+ portage
+
+
+
prelink
diff --git a/www/api-docs/admin_acct.html b/www/api-docs/admin_acct.html
index f24e86d..fb672e8 100644
--- a/www/api-docs/admin_acct.html
+++ b/www/api-docs/admin_acct.html
@@ -25,6 +25,12 @@
-
anaconda
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Transition to the accounting management domain.
@@ -213,9 +225,9 @@ Execute accounting management tools in the caller domain.
domain
-
+
No
@@ -255,9 +267,9 @@ Execute accounting management data in the caller domain.
domain
-
+
No
@@ -297,9 +309,9 @@ Create, read, write, and delete process accounting data.
domain
-
+
No
diff --git a/www/api-docs/admin_alsa.html b/www/api-docs/admin_alsa.html
index adc1e6f..5186dd9 100644
--- a/www/api-docs/admin_alsa.html
+++ b/www/api-docs/admin_alsa.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Domain transition to alsa
@@ -213,9 +225,9 @@ Allow read and write access to alsa semaphores.
domain
-
+
No
@@ -255,9 +267,9 @@ Allow read and write access to alsa shared memory.
domain
-
+
No
diff --git a/www/api-docs/admin_amanda.html b/www/api-docs/admin_amanda.html
index a5add6d..f34c1ac 100644
--- a/www/api-docs/admin_amanda.html
+++ b/www/api-docs/admin_amanda.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -140,6 +152,48 @@
Interfaces:
+
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
@@ -213,9 +267,9 @@ Do not audit attempts to read /etc/dumpdates.
domain
-
+
No
@@ -272,9 +326,9 @@ allow the specified role the amanda_recover domain.
domain
-
+
No
@@ -282,9 +336,9 @@ No
domain
-
+
No
@@ -292,9 +346,51 @@ No
role
-
+
No
+
+
terminal
-
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
@@ -334,9 +430,9 @@ Search amanda library directories.
+domain
+
+
No
diff --git a/www/api-docs/admin_anaconda.html b/www/api-docs/admin_anaconda.html
index 202a711..b4b09ac 100644
--- a/www/api-docs/admin_anaconda.html
+++ b/www/api-docs/admin_anaconda.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
diff --git a/www/api-docs/admin_bootloader.html b/www/api-docs/admin_bootloader.html
new file mode 100644
index 0000000..71e6d53
--- /dev/null
+++ b/www/api-docs/admin_bootloader.html
@@ -0,0 +1,455 @@
+
+
+
+
+ -
+ alsa
+
+ -
+ amanda
+
+ -
+ anaconda
+
+ -
+ bootloader
+
+ -
+ certwatch
+
+ -
+ consoletype
+
+ -
+ ddcprobe
+
+ -
+ dmesg
+
+ -
+ dmidecode
+
+ -
+ firstboot
+
+ -
+ kudzu
+
+ -
+ logrotate
+
+ -
+ logwatch
+
+ -
+ mrtg
+
+ -
+ netutils
+
+ -
+ portage
+
+ -
+ prelink
+
+ -
+ quota
+
+ -
+ readahead
+
+ -
+ rpm
+
+ -
+ su
+
+ -
+ sudo
+
+ -
+ tmpreaper
+
+ -
+ updfstab
+
+ -
+ usbmodules
+
+ -
+ usermanage
+
+ -
+ vbetool
+
+ -
+ vpn
+
+
+ * Global Booleans
+
+ * Global Tunables
+
+ * Layer Index
+
+ * Interface Index
+
+ * Template Index
+Layer: admin
+Module: bootloader
+
+Description:
+
+Interfaces:
+
+
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+
+
+role
+
+
+No
+
+
+
+terminal
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+
+ -
+ alsa
+
+ -
+ amanda
+
+ -
+ anaconda
+
+ -
+ bootloader
+
+ -
+ certwatch
+
+ -
+ consoletype
+
+ -
+ ddcprobe
+
+ -
+ dmesg
+
+ -
+ dmidecode
+
+ -
+ firstboot
+
+ -
+ kudzu
+
+ -
+ logrotate
+
+ -
+ logwatch
+
+ -
+ mrtg
+
+ -
+ netutils
+
+ -
+ portage
+
+ -
+ prelink
+
+ -
+ quota
+
+ -
+ readahead
+
+ -
+ rpm
+
+ -
+ su
+
+ -
+ sudo
+
+ -
+ tmpreaper
+
+ -
+ updfstab
+
+ -
+ usbmodules
+
+ -
+ usermanage
+
+ -
+ vbetool
+
+ -
+ vpn
+
+
+ * Global Booleans
+
+ * Global Tunables
+
+ * Layer Index
+
+ * Interface Index
+
+ * Template Index
+Layer: admin
+Module: certwatch
+
+Description:
+
+Interfaces:
+
+
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+
+
+role
+
+
+No
+
+
+
+terminal
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -173,9 +185,9 @@ Execute consoletype in the consoletype domain.
@@ -215,9 +227,88 @@ Execute consoletype in the caller domain.
domain
-
+
No
+
+
domain
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+
+role
+
+
+No
+
diff --git a/www/api-docs/admin_ddcprobe.html b/www/api-docs/admin_ddcprobe.html
index 4ba8ed2..e840957 100644
--- a/www/api-docs/admin_ddcprobe.html
+++ b/www/api-docs/admin_ddcprobe.html
@@ -25,6 +25,12 @@
-
anaconda
+terminal
+
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute ddcprobe in the ddcprobe domain.
@@ -230,9 +242,9 @@ allow the specified role the ddcprobe domain.
domain
-
+
No
@@ -240,9 +252,9 @@ No
domain
-
+
No
@@ -250,9 +262,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_dmesg.html b/www/api-docs/admin_dmesg.html
index 2c4daf2..0a75d29 100644
--- a/www/api-docs/admin_dmesg.html
+++ b/www/api-docs/admin_dmesg.html
@@ -25,6 +25,12 @@
-
anaconda
terminal
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute dmesg in the dmesg domain.
@@ -213,9 +225,9 @@ Execute dmesg in the caller domain.
domain
-
+
No
diff --git a/www/api-docs/admin_dmidecode.html b/www/api-docs/admin_dmidecode.html
index c4f0eb2..3fde90e 100644
--- a/www/api-docs/admin_dmidecode.html
+++ b/www/api-docs/admin_dmidecode.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute dmidecode in the dmidecode domain.
@@ -230,9 +242,9 @@ allow the specified role the dmidecode domain.
domain
-
+
No
@@ -240,9 +252,9 @@ No
domain
-
+
No
@@ -250,9 +262,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_firstboot.html b/www/api-docs/admin_firstboot.html
index 1d82ab9..4325fc0 100644
--- a/www/api-docs/admin_firstboot.html
+++ b/www/api-docs/admin_firstboot.html
@@ -25,6 +25,12 @@
-
anaconda
terminal
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -174,9 +186,9 @@ Execute firstboot in the firstboot domain.
@@ -185,13 +197,13 @@ No
-
+
domain
-
+
No
@@ -276,9 +288,9 @@ allow the specified role the firstboot domain.
domain
-
+
No
@@ -286,9 +298,9 @@ No
domain
-
+
No
@@ -296,9 +308,9 @@ No
role
-
+
No
@@ -307,13 +319,13 @@ No
terminal
-
+
No
@@ -349,13 +361,13 @@ No
domain
-
+
No
diff --git a/www/api-docs/admin_kudzu.html b/www/api-docs/admin_kudzu.html
index c0196a0..87e965f 100644
--- a/www/api-docs/admin_kudzu.html
+++ b/www/api-docs/admin_kudzu.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute kudzu in the kudzu domain.
@@ -182,13 +194,13 @@ No
domain
-
+
No
@@ -272,9 +284,9 @@ allow the specified role the kudzu domain.
domain
-
+
No
@@ -282,9 +294,9 @@ No
domain
-
+
No
@@ -292,9 +304,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_logrotate.html b/www/api-docs/admin_logrotate.html
index 15e7fb4..594e028 100644
--- a/www/api-docs/admin_logrotate.html
+++ b/www/api-docs/admin_logrotate.html
@@ -25,6 +25,12 @@
-
anaconda
terminal
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute logrotate in the logrotate domain.
@@ -182,13 +194,13 @@ No
domain
-
+
No
@@ -255,9 +267,9 @@ Execute logrotate in the caller domain.
domain
-
+
No
@@ -297,9 +309,9 @@ Read a logrotate temporary files.
domain
-
+
No
@@ -356,9 +368,9 @@ allow the specified role the logrotate domain.
domain
-
+
No
@@ -366,9 +378,9 @@ No
domain
-
+
No
@@ -376,9 +388,9 @@ No
role
-
+
No
@@ -387,13 +399,13 @@ No
terminal
-
+
No
diff --git a/www/api-docs/admin_logwatch.html b/www/api-docs/admin_logwatch.html
index 5ea9a2a..6653d84 100644
--- a/www/api-docs/admin_logwatch.html
+++ b/www/api-docs/admin_logwatch.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Read logwatch temporary files.
diff --git a/www/api-docs/admin_mrtg.html b/www/api-docs/admin_mrtg.html
new file mode 100644
index 0000000..5b6e4df
--- /dev/null
+++ b/www/api-docs/admin_mrtg.html
@@ -0,0 +1,205 @@
+
+
+
domain
-
+
No
+
+ -
+ alsa
+
+ -
+ amanda
+
+ -
+ anaconda
+
+ -
+ bootloader
+
+ -
+ certwatch
+
+ -
+ consoletype
+
+ -
+ ddcprobe
+
+ -
+ dmesg
+
+ -
+ dmidecode
+
+ -
+ firstboot
+
+ -
+ kudzu
+
+ -
+ logrotate
+
+ -
+ logwatch
+
+ -
+ mrtg
+
+ -
+ netutils
+
+ -
+ portage
+
+ -
+ prelink
+
+ -
+ quota
+
+ -
+ readahead
+
+ -
+ rpm
+
+ -
+ su
+
+ -
+ sudo
+
+ -
+ tmpreaper
+
+ -
+ updfstab
+
+ -
+ usbmodules
+
+ -
+ usermanage
+
+ -
+ vbetool
+
+ -
+ vpn
+
+
+ * Global Booleans
+
+ * Global Tunables
+
+ * Layer Index
+
+ * Interface Index
+
+ * Template Index
+Layer: admin
+Module: mrtg
+
+Description:
+
+Interfaces:
+
+
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute network utilities in the netutils domain.
@@ -213,9 +225,9 @@ Execute ping in the ping domain.
domain
-
+
No
@@ -255,9 +267,9 @@ Execute traceroute in the traceroute domain.
domain
-
+
No
@@ -297,9 +309,9 @@ Execute network utilities in the caller domain.
domain
-
+
No
@@ -339,9 +351,9 @@ Execute ping in the caller domain.
domain
-
+
No
@@ -381,9 +393,9 @@ Execute traceroute in the caller domain.
domain
-
+
No
@@ -440,9 +452,9 @@ allow the specified role the netutils domain.
domain
-
+
No
@@ -450,9 +462,9 @@ No
domain
-
+
No
@@ -460,9 +472,9 @@ No
role
-
+
No
@@ -519,9 +531,9 @@ allow the specified role the ping domain.
terminal
-
+
No
@@ -529,9 +541,9 @@ No
domain
-
+
No
@@ -539,9 +551,9 @@ No
role
-
+
No
@@ -598,9 +610,9 @@ allow the specified role the ping domain.
terminal
-
+
No
@@ -608,9 +620,9 @@ No
domain
-
+
No
@@ -618,9 +630,9 @@ No
role
-
+
No
@@ -677,9 +689,9 @@ allow the specified role the traceroute domain.
terminal
-
+
No
@@ -687,9 +699,9 @@ No
domain
-
+
No
@@ -697,9 +709,9 @@ No
role
-
+
No
@@ -756,9 +768,9 @@ allow the specified role the traceroute domain.
terminal
-
+
No
@@ -766,9 +778,9 @@ No
domain
-
+
No
@@ -776,9 +788,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_portage.html b/www/api-docs/admin_portage.html
new file mode 100644
index 0000000..f2be3fc
--- /dev/null
+++ b/www/api-docs/admin_portage.html
@@ -0,0 +1,346 @@
+
+
+
terminal
-
+
No
+
+ -
+ alsa
+
+ -
+ amanda
+
+ -
+ anaconda
+
+ -
+ bootloader
+
+ -
+ certwatch
+
+ -
+ consoletype
+
+ -
+ ddcprobe
+
+ -
+ dmesg
+
+ -
+ dmidecode
+
+ -
+ firstboot
+
+ -
+ kudzu
+
+ -
+ logrotate
+
+ -
+ logwatch
+
+ -
+ mrtg
+
+ -
+ netutils
+
+ -
+ portage
+
+ -
+ prelink
+
+ -
+ quota
+
+ -
+ readahead
+
+ -
+ rpm
+
+ -
+ su
+
+ -
+ sudo
+
+ -
+ tmpreaper
+
+ -
+ updfstab
+
+ -
+ usbmodules
+
+ -
+ usermanage
+
+ -
+ vbetool
+
+ -
+ vpn
+
+
+ * Global Booleans
+
+ * Global Tunables
+
+ * Layer Index
+
+ * Interface Index
+
+ * Template Index
+Layer: admin
+Module: portage
+
+Interfaces
+Templates
+
+Description:
+
+Interfaces:
+
+
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+Summary
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+domain
+
+
+No
+
+
+
+role
+
+
+No
+
+
+
+terminal
+
+
+No
+ Templates:
+
+
+
+Summary
+Description
+Parameters
+
+
+
+
+Parameter: Description: Optional:
+
+
+prefix
+
+
+No
+
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Delete the prelink cache.
@@ -213,9 +225,9 @@ Execute the prelink program in the prelink domain.
file_type
-
+
No
@@ -256,9 +268,9 @@ prelink log files.
domain
-
+
No
@@ -298,9 +310,9 @@ Make the specified file type prelinkable.
file_type
-
+
No
@@ -340,9 +352,9 @@ Read the prelink cache.
file_type
-
+
No
diff --git a/www/api-docs/admin_quota.html b/www/api-docs/admin_quota.html
index 9f24f67..bca2147 100644
--- a/www/api-docs/admin_quota.html
+++ b/www/api-docs/admin_quota.html
@@ -25,6 +25,12 @@
-
anaconda
file_type
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute quota management tools in the quota domain.
@@ -214,9 +226,9 @@ of filesystem quota data files.
domain
-
+
No
@@ -256,9 +268,9 @@ Summary is missing!
domain
-
+
No
@@ -315,9 +327,9 @@ allow the specified role the quota domain.
?
-
+
No
@@ -325,9 +337,9 @@ No
domain
-
+
No
@@ -335,9 +347,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_readahead.html b/www/api-docs/admin_readahead.html
index e0e751f..1a64d7e 100644
--- a/www/api-docs/admin_readahead.html
+++ b/www/api-docs/admin_readahead.html
@@ -25,6 +25,12 @@
-
anaconda
terminal
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
diff --git a/www/api-docs/admin_rpm.html b/www/api-docs/admin_rpm.html
index 0901580..dc6aef0 100644
--- a/www/api-docs/admin_rpm.html
+++ b/www/api-docs/admin_rpm.html
@@ -25,6 +25,12 @@
-
anaconda
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,51 @@ Execute rpm programs in the rpm domain.
+
+
domain
-
+
+No
+
+Summary
+Parameters
+
-Summary
Parameters
-
-
diff --git a/www/api-docs/admin_vpn.html b/www/api-docs/admin_vpn.html
index 0083db7..2f36b57 100644
--- a/www/api-docs/admin_vpn.html
+++ b/www/api-docs/admin_vpn.html
@@ -25,6 +25,12 @@
-
anaconda
-
-Parameter: Description: Optional:
@@ -555,13 +567,13 @@ No
-
+
-domain
-
-
-Domain allowed access.
-
No
@@ -597,13 +609,13 @@ No
domain
-
+
No
diff --git a/www/api-docs/admin_su.html b/www/api-docs/admin_su.html
index 93c3a61..df68f53 100644
--- a/www/api-docs/admin_su.html
+++ b/www/api-docs/admin_su.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -174,9 +186,9 @@ Execute su in the caller domain.
@@ -253,10 +265,10 @@ by policy writers.
domain
-
+
No
@@ -264,9 +276,9 @@ No
userdomain_prefix
-
+
No
@@ -274,9 +286,9 @@ No
user_domain
-
+
No
@@ -316,9 +328,9 @@ Summary is missing!
user_role
-
+
No
diff --git a/www/api-docs/admin_sudo.html b/www/api-docs/admin_sudo.html
index 1aebe36..83cc6a0 100644
--- a/www/api-docs/admin_sudo.html
+++ b/www/api-docs/admin_sudo.html
@@ -25,6 +25,12 @@
-
anaconda
?
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -202,10 +214,10 @@ by policy writers.
@@ -213,9 +225,9 @@ No
userdomain_prefix
-
+
No
@@ -223,9 +235,9 @@ No
user_domain
-
+
No
diff --git a/www/api-docs/admin_tmpreaper.html b/www/api-docs/admin_tmpreaper.html
index f54460a..7e1e14a 100644
--- a/www/api-docs/admin_tmpreaper.html
+++ b/www/api-docs/admin_tmpreaper.html
@@ -25,6 +25,12 @@
-
anaconda
user_role
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute tmpreaper in the caller domain.
diff --git a/www/api-docs/admin_updfstab.html b/www/api-docs/admin_updfstab.html
index 51c67f4..f145cae 100644
--- a/www/api-docs/admin_updfstab.html
+++ b/www/api-docs/admin_updfstab.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute updfstab in the updfstab domain.
diff --git a/www/api-docs/admin_usbmodules.html b/www/api-docs/admin_usbmodules.html
index bc12979..aa50e58 100644
--- a/www/api-docs/admin_usbmodules.html
+++ b/www/api-docs/admin_usbmodules.html
@@ -25,6 +25,12 @@
-
anaconda
domain
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute usbmodules in the usbmodules domain.
@@ -231,9 +243,9 @@ and use the caller's terminal.
domain
-
+
No
@@ -241,9 +253,9 @@ No
domain
-
+
No
@@ -251,9 +263,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_usermanage.html b/www/api-docs/admin_usermanage.html
index 35249de..3a51f04 100644
--- a/www/api-docs/admin_usermanage.html
+++ b/www/api-docs/admin_usermanage.html
@@ -25,6 +25,12 @@
-
anaconda
terminal
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -172,9 +184,9 @@ the admin passwd domain.
@@ -214,9 +226,9 @@ Execute chfn in the chfn domain.
domain
-
+
No
@@ -256,9 +268,9 @@ Execute groupadd in the groupadd domain.
domain
-
+
No
@@ -298,9 +310,9 @@ Execute passwd in the passwd domain.
domain
-
+
No
@@ -340,9 +352,9 @@ Execute useradd in the useradd domain.
domain
-
+
No
@@ -382,9 +394,9 @@ Read the crack database.
domain
-
+
No
@@ -442,9 +454,9 @@ the admin passwd domain.
domain
-
+
No
@@ -452,9 +464,9 @@ No
domain
-
+
No
@@ -462,9 +474,9 @@ No
role
-
+
No
@@ -521,9 +533,9 @@ allow the specified role the chfn domain.
terminal
-
+
No
@@ -531,9 +543,9 @@ No
domain
-
+
No
@@ -541,9 +553,9 @@ No
role
-
+
No
@@ -600,9 +612,9 @@ allow the specified role the groupadd domain.
terminal
-
+
No
@@ -610,9 +622,9 @@ No
domain
-
+
No
@@ -620,9 +632,9 @@ No
role
-
+
No
@@ -679,9 +691,9 @@ allow the specified role the passwd domain.
terminal
-
+
No
@@ -689,9 +701,9 @@ No
domain
-
+
No
@@ -699,9 +711,9 @@ No
role
-
+
No
@@ -758,9 +770,9 @@ allow the specified role the useradd domain.
terminal
-
+
No
@@ -768,9 +780,9 @@ No
domain
-
+
No
@@ -778,9 +790,9 @@ No
role
-
+
No
diff --git a/www/api-docs/admin_vbetool.html b/www/api-docs/admin_vbetool.html
index a17a807..9b2d2a0 100644
--- a/www/api-docs/admin_vbetool.html
+++ b/www/api-docs/admin_vbetool.html
@@ -25,6 +25,12 @@
-
anaconda
terminal
-
+
No
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -151,12 +163,8 @@
- [
-
domain
- ]
-
)
domain
-
+
-yes
+Yes
+ -
+ bootloader
+
+ -
+ certwatch
+
-
consoletype
@@ -49,9 +55,15 @@
-
logwatch
+ -
+ mrtg
+
-
netutils
+ -
+ portage
+
-
prelink
@@ -171,9 +183,9 @@ Execute VPN clients in the vpnc domain.
@@ -230,9 +242,9 @@ allow the specified role the vpnc domain.
domain
-
+
No
@@ -240,9 +252,9 @@ No
domain
-
+
No
@@ -250,9 +262,9 @@ No
role
-
+
No
@@ -292,9 +304,9 @@ Send generic signals to VPN clients.
terminal
-
+
No
diff --git a/www/api-docs/apps.html b/www/api-docs/apps.html
index 161195b..c32f33b 100644
--- a/www/api-docs/apps.html
+++ b/www/api-docs/apps.html
@@ -37,15 +37,33 @@
-
lockdev
domain
-
+
No
+ -
+ mono
+
-
screen
-
slocate
+ -
+ tvtime
+
+ -
+ uml
+
+ -
+ userhelper
+
+ -
+ usernetctl
+
-
webalizer
+ -
+ wine
+
+
+ mono
+
+
+
screen
@@ -133,10 +156,35 @@
+
+ tvtime
+
+
+
+
+ uml
+
+
+
+
+ userhelper
+
+
+
+
+ usernetctl
+
+
+
webalizer
+
diff --git a/www/api-docs/apps_cdrecord.html b/www/api-docs/apps_cdrecord.html
index de446cb..47dc647 100644
--- a/www/api-docs/apps_cdrecord.html
+++ b/www/api-docs/apps_cdrecord.html
@@ -37,15 +37,33 @@
-
lockdev
+
+ wine
+
+
+ -
+ mono
+
-
screen
-
slocate
+ -
+ tvtime
+
+ -
+ uml
+
+ -
+ userhelper
+
+ -
+ usernetctl
+
-
webalizer
+ -
+ wine
+
@@ -164,9 +182,9 @@ No
userdomain_prefix
-
+
No
@@ -174,9 +192,9 @@ No
user_domain
-
+
No
diff --git a/www/api-docs/apps_gpg.html b/www/api-docs/apps_gpg.html
index 2f17bce..41451b3 100644
--- a/www/api-docs/apps_gpg.html
+++ b/www/api-docs/apps_gpg.html
@@ -37,15 +37,33 @@
-
lockdev
user_role
-
+
No
+ -
+ mono
+
-
screen
-
slocate
+ -
+ tvtime
+
+ -
+ uml
+
+ -
+ userhelper
+
+ -
+ usernetctl
+
-
webalizer
+ -
+ wine
+
+
@@ -112,7 +130,7 @@
- userdomain_prefix
+ userdomain
@@ -120,7 +138,7 @@
- domain
+ role
)
@@ -155,31 +173,30 @@ by policy writers.
userdomain_prefix
-
+
No
-userdomain_prefix
+userdomain
-
-The prefix of the user domain (e.g., user
-is the prefix for user_t).
-
+
No
diff --git a/www/api-docs/apps_irc.html b/www/api-docs/apps_irc.html
index a3f5cbf..ef61848 100644
--- a/www/api-docs/apps_irc.html
+++ b/www/api-docs/apps_irc.html
@@ -37,15 +37,33 @@
-
lockdev
-domain
+role
-
-The type of the process performing this action.
-
+
No
+ -
+ mono
+
-
screen
-
slocate
+ -
+ tvtime
+
+ -
+ uml
+
+ -
+ userhelper
+
+ -
+ usernetctl
+
-
webalizer
+ -
+ wine
+
+
@@ -153,10 +171,10 @@ by policy writers.
@@ -164,9 +182,9 @@ No
userdomain_prefix
-
+
No
@@ -174,9 +192,9 @@ No
user_domain
-
+
No
diff --git a/www/api-docs/apps_java.html b/www/api-docs/apps_java.html
index b9a8e77..812977d 100644
--- a/www/api-docs/apps_java.html
+++ b/www/api-docs/apps_java.html
@@ -37,15 +37,33 @@
-
lockdev
user_role
-
+
No
+ -
+ mono
+
-
screen
-
slocate
+ -
+ tvtime
+
+ -
+ uml
+
+ -
+ userhelper
+
+ -
+ usernetctl
+
-
webalizer
+ -
+ wine
+
+
@@ -83,12 +101,63 @@
Layer: apps
Module: java
+Interfaces
+Templates
+
Description:
+Execute the java program in the java domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
The prefix of the user domain (e.g., user is the prefix for user_t). - +
The type of the user domain. - +
The role associated with the user domain. - +
The type of the process performing this action. - +
The type of the process performing this action. - +
The type of the process performing this action. - +
The role to allow the loadkeys domain. - +
The type of the terminal allow the loadkeys domain to use. - +
The prefix of the user domain (e.g., user is the prefix for user_t). - +
The type of the user domain. - +
The role associated with the user domain. - +
Run .NET server and client applications on Linux.
+ + + + ++Execute the mono program in the mono domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
The prefix of the user domain (e.g., user is the prefix for user_t). - +
The type of the user domain. - +
The role associated with the user domain. - +
Domain allowed access. - +
tvtime - a high quality television application
+ + + + + ++The per user domain template for the tvtime module. +
+ + ++
+This template creates a derived domains which are used +for tvtime. +
+
+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +
+
+ +Parameter: | Description: | Optional: |
---|---|---|
+userdomain_prefix + |
+ +The prefix of the user domain (e.g., user +is the prefix for user_t). + + | +No + |
+user_domain + |
+ +The type of the user domain. + + | +No + |
+user_role + |
+ +The role associated with the user domain. + + | +No + |
Policy for UML
+ + + + ++Manage uml utility files. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
+Set attributes on uml utility socket files. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
+The per user domain template for the uml module. +
+ + ++
+This template creates a derived domains which are used +for uml program. +
+
+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +
+
+ +Parameter: | Description: | Optional: |
---|---|---|
+userdomain_prefix + |
+ +The prefix of the user domain (e.g., user +is the prefix for user_t). + + | +No + |
+user_domain + |
+ +The type of the user domain. + + | +No + |
+user_role + |
+ +The role associated with the user domain. + + | +No + |
SELinux utility to run a shell with a new role
+ + + + ++Do not audit attempts to search +the userhelper configuration directory. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain to not audit. + + | +No + |
+Search the userhelper configuration directory. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
+The per user domain template for the userhelper module. +
+ + ++
+This template creates a derived domains which are used +for userhelper. +
+
+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +
+
+ +Parameter: | Description: | Optional: |
---|---|---|
+userdomain_prefix + |
+ +The prefix of the user domain (e.g., user +is the prefix for user_t). + + | +No + |
+user_domain + |
+ +The type of the user domain. + + | +No + |
+user_role + |
+ +The role associated with the user domain. + + | +No + |
User network interface configuration helper
+ + + + ++Execute usernetctl in the usernetctl domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
+Execute usernetctl in the usernetctl domain, and +allow the specified role the usernetctl domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
+role + |
+ +The role to be allowed the usernetctl domain. + + | +No + |
+terminal + |
+ +The type of the terminal allow the usernetctl domain to use. + + | +No + |
The type of the process performing this action. - +
The type of the process performing this action. - +
The role to be allowed the webalizer domain. - +
The type of the terminal allow the webalizer domain to use. - +
Wine Is Not an Emulator. Run Windows programs in Linux.
+ + + + ++Execute the wine program in the wine domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + |
+ +Domain allowed access. + + | +No + |
false
-Enabling secure mode disallows programs, such asnewrole, from transitioning to administrativeuser domains.
++
+Enabling secure mode disallows programs, such as +newrole, from transitioning to administrative +user domains. +
+
false
-Disable transitions to insmod.
++
+Disable transitions to insmod. +
+
@@ -536,8 +574,13 @@ Disable transitions to insmod.false
-boolean to determine whether the system permits loading policy, settingenforcing mode, and changing boolean values. Set this to true and youhave to reboot to set it back
++
+boolean to determine whether the system permits loading policy, setting +enforcing mode, and changing boolean values. Set this to true and you +have to reboot to set it back +
+
diff --git a/www/api-docs/global_tunables.html b/www/api-docs/global_tunables.html index c22677c..1bde781 100644 --- a/www/api-docs/global_tunables.html +++ b/www/api-docs/global_tunables.html @@ -25,6 +25,12 @@ - anacondafalse
-Allow cvs daemon to read shadow
++
+Allow cvs daemon to read shadow +
+
+ +false
+ ++
+Allow making the heap executable. +
+
false
-Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.
++
+Allow making anonymous memory executable, e.g. +for runtime-code generation or executable stack. +
+
@@ -536,8 +588,12 @@ Allow making anonymous memory executable, e.g.for runtime-code generation or exefalse
-Allow making a modified private filemapping executable (text relocation).
++
+Allow making a modified private file +mapping executable (text relocation). +
+
@@ -548,8 +604,12 @@ Allow making a modified private filemapping executable (text relocation).false-Allow making the stack executable via mprotect.Also requires allow_execmem.
++
+Allow making the stack executable via mprotect. +Also requires allow_execmem. +
+
@@ -560,8 +620,12 @@ Allow making the stack executable via mprotect.Also requires allow_execmem.<false
-Allow ftp servers to modify public filesused for public file transfer services.
++
+Allow ftp servers to modify public files +used for public file transfer services. +
+
@@ -572,8 +636,11 @@ Allow ftp servers to modify public filesused for public file transfer services.<false
-Allow gpg executable stack
++
+Allow gpg executable stack +
+
@@ -584,8 +651,11 @@ Allow gpg executable stacktrue
-Allow gssd to read temp directory.
++
+Allow gssd to read temp directory. +
+
@@ -596,8 +666,12 @@ Allow gssd to read temp directory.false
-Allow Apache to modify public filesused for public file transfer services.
++
+Allow Apache to modify public files +used for public file transfer services. +
+
@@ -608,8 +682,11 @@ Allow Apache to modify public filesused for public file transfer services.false
-Allow java executable stack
++
+Allow java executable stack +
+
@@ -620,8 +697,11 @@ Allow java executable stackfalse
-Allow system to run with kerberos
++
+Allow system to run with kerberos +
+
@@ -632,8 +712,11 @@ Allow system to run with kerberosfalse
-Allow sysadm to ptrace all processes
++
+Allow sysadm to ptrace all processes +
+
@@ -644,8 +727,12 @@ Allow sysadm to ptrace all processesfalse
-Allow rsync to modify public filesused for public file transfer services.
++
+Allow rsync to modify public files +used for public file transfer services. +
+
@@ -656,8 +743,11 @@ Allow rsync to modify public filesused for public file transfer services.false-Allow sasl to read shadow
++
+Allow sasl to read shadow +
+
@@ -668,8 +758,12 @@ Allow sasl to read shadowfalse
-Allow samba to modify public filesused for public file transfer services.
++
+Allow samba to modify public files +used for public file transfer services. +
+
@@ -680,8 +774,11 @@ Allow samba to modify public filesused for public file transfer services.false-allow host key based authentication
++
+allow host key based authentication +
+
@@ -692,8 +789,27 @@ allow host key based authenticationfalse
-Allow users to connect to mysql
++
+Allow users to connect to mysql +
+
+ + + +false
+ ++
+Allows clients to write to the X server shared +memory segments. +
+
false
-Allow system to run with NIS
++
+Allow system to run with NIS +
+
@@ -716,8 +835,13 @@ Allow system to run with NISfalse
-Allow cdrecord to read various content.nfs, samba, removable devices, user tempand untrusted content files
++
+Allow cdrecord to read various content. +nfs, samba, removable devices, user temp +and untrusted content files +
+
@@ -728,8 +852,12 @@ Allow cdrecord to read various content.nfs, samba, removable devices, user tempafalse
-Allow system cron jobs to relabel filesystemfor restoring file contexts.
++
+Allow system cron jobs to relabel filesystem +for restoring file contexts. +
+
@@ -740,8 +868,12 @@ Allow system cron jobs to relabel filesystemfor restoring file contexts.false
-Enable extra rules in the cron domainto support fcron.
++
+Enable extra rules in the cron domain +to support fcron. +
+
@@ -752,8 +884,11 @@ Enable extra rules in the cron domainto support fcron.false
-Allow ftp to read and write files in the user home directories
++
+Allow ftp to read and write files in the user home directories +
+
@@ -764,8 +899,11 @@ Allow ftp to read and write files in the user home directoriesfalse
-Allow ftpd to run directly without inetd
++
+Allow ftpd to run directly without inetd +
+
@@ -776,8 +914,11 @@ Allow ftpd to run directly without inetdfalse
-Allow httpd to use built in scripting (usually php)
++
+Allow httpd to use built in scripting (usually php) +
+
@@ -788,8 +929,11 @@ Allow httpd to use built in scripting (usually php)false
-Allow http daemon to tcp connect
++
+Allow http daemon to tcp connect +
+
@@ -800,8 +944,11 @@ Allow http daemon to tcp connectfalse
-allow httpd to connect to mysql/posgresql
++
+Allow httpd to connect to mysql/posgresql +
+
@@ -812,8 +959,11 @@ allow httpd to connect to mysql/posgresqlfalse
-allow httpd to act as a relay
++
+Allow httpd to act as a relay +
+
@@ -824,8 +974,11 @@ allow httpd to act as a relayfalse
-Allow httpd cgi support
++
+Allow httpd cgi support +
+
@@ -836,8 +989,12 @@ Allow httpd cgi supportfalse
-Allow httpd to act as a FTP server bylistening on the ftp port.
++
+Allow httpd to act as a FTP server by +listening on the ftp port. +
+
@@ -848,8 +1005,11 @@ Allow httpd to act as a FTP server bylistening on the ftp port.false
-Allow httpd to read home directories
++
+Allow httpd to read home directories +
+
@@ -860,8 +1020,11 @@ Allow httpd to read home directoriesfalse
-Run SSI execs in system CGI script domain.
++
+Run SSI execs in system CGI script domain. +
+
@@ -872,8 +1035,11 @@ Run SSI execs in system CGI script domain.false
-Allow http daemon to communicate with the TTY
++
+Allow http daemon to communicate with the TTY +
+
@@ -884,8 +1050,11 @@ Allow http daemon to communicate with the TTYfalse
-Run CGI in the main httpd domain
++
+Run CGI in the main httpd domain +
+
@@ -896,8 +1065,12 @@ Run CGI in the main httpd domainfalse
-Allow BIND to write the master zone files.Generally this is used for dynamic DNS.
++
+Allow BIND to write the master zone files. +Generally this is used for dynamic DNS. +
+
@@ -908,8 +1081,11 @@ Allow BIND to write the master zone files.Generally this is used for dynamic DNSfalse
-Allow nfs to be exported read only
++
+Allow nfs to be exported read only +
+
@@ -920,8 +1096,11 @@ Allow nfs to be exported read onlyfalse
-Allow nfs to be exported read/write.
++
+Allow nfs to be exported read/write. +
+
@@ -932,8 +1111,11 @@ Allow nfs to be exported read/write.false
-Allow pppd to load kernel modules for certain modems
++
+Allow pppd to load kernel modules for certain modems +
+
@@ -944,8 +1126,11 @@ Allow pppd to load kernel modules for certain modemsfalse
-Allow pppd to be run for a regular user
++
+Allow pppd to be run for a regular user +
+
@@ -956,8 +1141,11 @@ Allow pppd to be run for a regular userfalse
-Allow reading of default_t files.
++
+Allow reading of default_t files. +
+
@@ -968,8 +1156,13 @@ Allow reading of default_t files.false
-Allow applications to read untrusted contentIf this is disallowed, Internet content hasto be manually relabeled for read access to be granted
++
+Allow applications to read untrusted content +If this is disallowed, Internet content has +to be manually relabeled for read access to be granted +
+
@@ -980,8 +1173,11 @@ Allow applications to read untrusted contentIf this is disallowed, Internet contfalse
-Allow ssh to run from inetd instead of as a daemon.
++
+Allow ssh to run from inetd instead of as a daemon. +
+
@@ -992,8 +1188,11 @@ Allow ssh to run from inetd instead of as a daemon.false
-Allow samba to export user home directories.
++
+Allow samba to export user home directories. +
+
@@ -1004,8 +1203,11 @@ Allow samba to export user home directories.false
-Allow spamassassin to do DNS lookups
++
+Allow spamassassin to do DNS lookups +
+
@@ -1016,8 +1218,26 @@ Allow spamassassin to do DNS lookupsfalse
-Allow user spamassassin clients to use the network.
++
+Allow user spamassassin clients to use the network. +
+
+ + + +true
+ ++
+Allow spammd to read/write user home directories. +
+
false
-Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.
++
+Allow squid to connect to all ports, not just +HTTP, FTP, and Gopher ports. +
+
@@ -1040,8 +1264,11 @@ Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.false-Allow ssh logins as sysadm_r:sysadm_t
++
+Allow ssh logins as sysadm_r:sysadm_t +
+
@@ -1052,8 +1279,12 @@ Allow ssh logins as sysadm_r:sysadm_tfalse
-Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashrc)
++
+Allow staff_r users to search the sysadm home +dir and read files (such as ~/.bashrc) +
+
@@ -1064,8 +1295,12 @@ Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashfalse
-Configure stunnel to be a standalone daemon orinetd service.
++
+Configure stunnel to be a standalone daemon or +inetd service. +
+
@@ -1076,8 +1311,11 @@ Configure stunnel to be a standalone daemon orinetd service.false
-Support NFS home directories
++
+Support NFS home directories +
+
@@ -1088,8 +1326,11 @@ Support NFS home directoriesfalse
-Support SAMBA home directories
++
+Support SAMBA home directories +
+
@@ -1100,8 +1341,11 @@ Support SAMBA home directoriesfalse
-Allow regular users direct mouse access
++
+Allow regular users direct mouse access +
+
@@ -1112,8 +1356,11 @@ Allow regular users direct mouse accessfalse
-Allow users to read system messages.
++
+Allow users to read system messages. +
+
@@ -1124,8 +1371,12 @@ Allow users to read system messages.false
-Allow users to control network interfaces(also needs USERCTL=true)
++
+Allow users to control network interfaces +(also needs USERCTL=true) +
+
@@ -1136,8 +1387,11 @@ Allow users to control network interfaces(also needs USERCTL=true)false
-Control users use of ping and traceroute
++
+Control users use of ping and traceroute +
+
@@ -1148,8 +1402,12 @@ Control users use of ping and traceroutefalse
-Allow user to r/w files on filesystemsthat do not have extended attributes (FAT, CDROM, FLOPPY)
++
+Allow user to r/w files on filesystems +that do not have extended attributes (FAT, CDROM, FLOPPY) +
+
@@ -1160,8 +1418,11 @@ Allow user to r/w files on filesystemsthat do not have extended attributes (FAT,false
-Allow users to rw usb devices
++
+Allow users to rw usb devices +
+
@@ -1172,8 +1433,13 @@ Allow users to rw usb devicesfalse
-Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols.
++
+Allow users to run TCP servers (bind to ports and accept connection from +the same domain and outside users) disabling this forces FTP passive mode +and may change other protocols. +
+
@@ -1184,8 +1450,11 @@ Allow users to run TCP servers (bind to ports and accept connection fromthe samefalse
-Allow w to display everyone
++
+Allow w to display everyone +
+
@@ -1196,8 +1465,28 @@ Allow w to display everyonefalse
-Allow applications to write untrusted contentIf this is disallowed, no Internet contentwill be stored.
++
+Allow applications to write untrusted content +If this is disallowed, no Internet content +will be stored. +
+
+ + + +false
+ ++
+Allow xdm logins as sysadm +
+
Policy for the Anaconda installer.
Policy for the kernel modules, kernel image, and bootloader.
Digital Certificate Tracking
@@ -580,11 +620,24 @@ after installation of Red Hat/Fedora systems.
System log analyzer and reporter
Network traffic graphing
Network analysis utilities
+Portage Package Management System. The primary package management and +distribution system for Gentoo. +
Prelink ELF shared library mappings.
Policy for the kernel modules, kernel image, and bootloader.
@@ -730,6 +778,11 @@ and unlabeled processes and objects.
Multicategory security policy
Multilevel security policy
device locking policy for lockdev
Run .NET server and client applications on Linux.
GNU terminal multiplexer
Update database for mlocate
tvtime - a high quality television application
Policy for UML
SELinux utility to run a shell with a new role
User network interface configuration helper
Web server log analysis
Wine Is Not an Emulator. Run Windows programs in Linux.
Unix to Unix Copy
X windows login display manager
X Windows Font Server
X Windows Server
Zebra border gateway protocol network routing service
+Allow read/writing amanda logs +
++Allow read/writing /etc/dumpdates. +
++Allow the specified domain to execute +apache modules. +
++Read apache system content +
+-Summary is missing! +Get the attributes of the shadow passwords file.
-Get the attributes of the shadow passwords file. +Summary is missing!
+Manage pam PID files. +
++Manage var auth files. Used by various other applications +and pam applets etc. +
++Do not audit attempts to get the attributes +of automount temporary directories. +
+-Install a kernel into the /boot directory. -
--Install a system.map into the /boot directory. -
--Delete a kernel from /boot. +Execute bootloader in the bootloader domain.
-Delete a system.map in the /boot directory. +Read the bootloader configuration file.
-Execute bootloader in the bootloader domain. -
--Do not audit attempts to get attributes -of the /boot directory. -
--Do not audit attempts to search the /boot directory. +Execute bootloader interactively and do +a domain transition to the bootloader domain.
-Summary is missing! +Read and write the bootloader +configuration file.
-Get attributes of the /boot directory. +Read and write the bootloader +temporary data in /tmp.
-Get the attributes of kernel module files. +Connect to Canna using a unix domain stream socket.
-List the contents of the kernel module directories. -
--Create, read, write, and delete -kernel module files. +Execute certwatch in the certwatch domain, and +allow the specified role the certwatch domain, +and use the caller's terminal. Has a sigchld +backchannel.
-Read the bootloader configuration file. +Domain transition to certwatch.
-Read kernel module files. +Execute hwclock in the clock domain.
-Read system.map in the /boot directory. +Execute hwclock in the caller domain.
-Execute bootloader interactively and do -a domain transition to the bootloader domain. +Execute hwclock in the clock domain, and +allow the specified role the hwclock domain.
-Read and write symbolic links -in the /boot directory. +Allow executing domain to modify clock drift
-Read and write the bootloader -configuration file. +Execute consoletype in the consoletype domain.
-Read and write the bootloader -temporary data in /tmp. +Execute consoletype in the caller domain.
-Search the /boot directory. +Execute consoletype in the consoletype domain, and +allow the specified role the consoletype domain.
-Search the contents of the kernel module directories. +Create a aliased type to generic bin files.
-Write kernel module files. +Execute a file in a bin directory +in the specified domain.
-Connect to Canna using a unix domain stream socket. +Execute a file in a bin directory +in the specified domain but do not +do it automatically. This is an explicit +transition, requiring the caller to use setexeccon().
-Execute hwclock in the clock domain. +Check if a shell is executable (DAC-wise).
-Execute hwclock in the caller domain. +Summary is missing!
-Execute hwclock in the clock domain, and -allow the specified role the hwclock domain. +Do not audit attempts to search +sbin directories.
-Allow executing domain to modify clock drift +Summary is missing!
-Execute consoletype in the consoletype domain. +Summary is missing!
-Execute consoletype in the caller domain. +Summary is missing!
-Create a aliased type to generic bin files. +Summary is missing!
-Execute a file in a bin directory -in the specified domain. +Summary is missing!
-Check if a shell is executable (DAC-wise). +Get the attributes of files in bin directories.
-Summary is missing! -
--Do not audit attempts to search -sbin directories. -
--Summary is missing! -
--Summary is missing! -
--Summary is missing! -
--Summary is missing! -
--Summary is missing! -
--Get the attributes of files in bin directories. -
-+Execute a file in a sbin directory +in the specified domain but do not +do it automatically. This is an explicit +transition, requiring the caller to use setexeccon(). +
++Do not audit attepts to bind TCP sockets to any ports. +
++Read and write the point-to-point device. +
++Read and write the TUN/TAP virtual network device. +
++Bind TCP sockets to the bgp port. +
++Bind TCP sockets to the router port. +
++Make a TCP connection to the bgp port. +
++Make a TCP connection to the router port. +
++Send and receive TCP traffic on the bgp port. +
++Send and receive TCP traffic on the router port. +
++Bind UDP sockets to the bgp port. +
++Bind UDP sockets to the router port. +
++Receive UDP traffic on the bgp port. +
++Receive UDP traffic on the router port. +
++Send UDP traffic on the bgp port. +
++Send UDP traffic on the router port. +
++Send and receive UDP traffic on the bgp port. +
++Send and receive UDP traffic on the router port. +
+-Read and write the point-to-point device. -
--Read and write the TUN/TAP virtual network device. -
--Create, read, and write a cron daemon TCP socket. +Execute APM in the apm domain.
-Execute APM in the apm domain. +Do not audit attempts to append temporary +files from the system cron jobs.
-Do not audit attempts to append temporary -files from the system cron jobs. +Do not audit attempts to write cron daemon unnamed pipes.
-Do not audit attempts to write cron daemon unnamed pipes. +Read a cron daemon unnamed pipe.
-Read a cron daemon unnamed pipe. +Read temporary files from the system cron jobs.
-Read temporary files from the system cron jobs. +Read and write a cron daemon unnamed pipe.
-Read and write a cron daemon unnamed pipe. +Read and write a system cron job unnamed pipe.
-Read and write a system cron job unnamed pipe. +Read, and write cron daemon TCP sockets.
+Read cups configuration files. +
++Connect to cups over TCP. +
++Write cups log files. +
+-Mount a usbfs filesystem. +Associate a file to a usbfs filesystem.
-Create a directory in the device directory. -
--Delete symbolic links in device directories. +Create a directory in the device directory.
+Delete symbolic links in device directories. +
++Do not audit attempts to read from random +number generator devices (e.g., /dev/random) +
++Do not audit attempts to read and write miscellaneous devices. +
++getattr the dri devices. +
++Create, delete, read, and write device nodes in device directories. +
+-Create, delete, read, and write device nodes in device directories. +Create, read, write, and delete the dri devices.
+Create a file in the device directory. +
+-Read from random devices (e.g., /dev/random) +Read from random number generator +devices (e.g., /dev/random)
+Read and write the framebuffer. +
+-Read and write the lvm control device. +Read and write generic the USB devices.
-Read and write to mouse devices. +Read input event devices (/dev/input).
-Read and write to the null device (/dev/null). +Read and write the lvm control device.
-Read and write the the power management device. +Read and write to mouse devices.
-Read and write the printer device. +Read and write the mtrr device.
-Read and set the realtime clock (/dev/rtc). +Read and write to the null device (/dev/null).
-Read and write the scanner device. +Read and write the the power management device.
-Allow caller to modify hardware state information. +Read and write the printer device.
-Allow caller to modify usb hardware configuration files. +Read and set the realtime clock (/dev/rtc).
-Read and write to the zero device (/dev/zero). +Read and write the scanner device.
-Read, write, and execute the zero device (/dev/zero). +Allow caller to modify hardware state information.
-Read and execute raw memory devices (e.g. /dev/mem). +Allow caller to modify usb hardware configuration files.
-Search the sysfs directories. +Read and write X server miscellaneous devices.
-Search the directory containing USB hardware information. +Read and write to the zero device (/dev/zero).
-Setattr on all block file device nodes. +Read, write, and execute the zero device (/dev/zero).
-Setattr on all character file device nodes. +Read and execute raw memory devices (e.g. /dev/mem).
-Set the attributes of the apm bios device node. +Search the sysfs directories.
-Set the attributes of /dev directories. +Search the directory containing USB hardware information.
-Set the attributes of the framebuffer device node. +Setattr on all block file device nodes.
-Set the attributes of miscellaneous devices. +Setattr on all character file device nodes.
-Set the attributes of the mouse devices. +Set the attributes of the apm bios device node.
+Setattr the dri devices. +
++Set the attributes of the framebuffer device node. +
++Set the attributes of /dev directories. +
++Set the attributes of miscellaneous devices. +
++Set the attributes of the mouse devices. +
++Execute an entry_type in the specified domain. +
++Summary is missing! +
+-Summary is missing! -
--Make the specified type a -configuration file. +Create a private type object in boot +with an automatic type transition
-Summary is missing! +Make the specified type a +configuration file.
-Summary is missing! +Create directories in /boot
-Summary is missing! +Install a kernel into the /boot directory.
-Delete system configuration files in /etc. +Install a system.map into the /boot directory.
-Do not audit attempts to get the attributes -of all directories. +Summary is missing!
-Do not audit attempts to get the attributes -of all files. +Summary is missing!
-Do not audit attempts to get the attributes -of all named pipes. +Delete system configuration files in /etc.
-Do not audit attempts to get the attributes -of all named sockets. +Delete a kernel from /boot.
-Do not audit attempts to get the attributes -of all symbolic links. +Delete kernel module files.
+Delete a system.map in the /boot directory. +
++Summary is missing! +
++Do not audit attempts to get the attributes +of all directories. +
++Do not audit attempts to get the attributes +of all files. +
++Do not audit attempts to get the attributes +of all named pipes. +
++Do not audit attempts to get the attributes +of all named sockets. +
++Do not audit attempts to get the attributes +of all symbolic links. +
++Do not audit attempts to get attributes +of the /boot directory. +
++Do not audit attempts to search the /boot directory. +
++Do not audit attempts to search generic +spool directories. +
++Summary is missing! +
+-Summary is missing! +Get the attributes of all directories.
+Get the attributes of all files. +
+-Create objects in /home. +Get the attributes of all named pipes.
-Summary is missing! +Get the attributes of all named sockets.
-Summary is missing! +Get the attributes of all symbolic links.
+Get attributes of the /boot directory. +
+-Create an object in the root directory, with a private -type. +Getattr of directories with the default file type.
-Create objects in the /usr directory +Get the attributes of the home directories root +(/home).
-Create objects in the /var directory +Getattr of directories on new filesystems +that have not yet been labeled.
+Get the attributes of kernel module files. +
+-Create objects in the /var/lib directory +Get the attributes of the tmp directory (/tmp).
-Get the attributes of all directories. +Get the attributes of files in /usr.
-Get the attributes of all sockets -with the type of a file. +Get the attributes of the /var/lib directory.
-Get the attributes of all files. +Create objects in /home.
-Get the attributes of all named pipes. +Create objects in the kernel module directories +with a private type via an automatic type transition.
-Get the attributes of all named sockets. +Summary is missing!
-Get the attributes of all symbolic links. +List contents of directories with the default file type.
-Getattr of directories with the default file type. +Summary is missing!
-Summary is missing! +Get listing of home directories.
-Get the attributes of the home directories root -(/home). +List the contents of directories on new filesystems +that have not yet been labeled.
-Getattr of directories on new filesystems -that have not yet been labeled. -
--Get the attributes of the tmp directory (/tmp). -
--Get the attributes of files in /usr. +List the contents of the kernel module directories.
-Get the attributes of the /var/lib directory. +Summary is missing!
-List the contents of all directories. +List all non-security directories.
-List contents of directories with the default file type. +Summary is missing!
-Get listing of home directories. +Read the tmp directory (/tmp).
-List the contents of directories on new filesystems -that have not yet been labeled. +List the contents of generic +directories in /usr.
-Summary is missing! +List the contents of /var.
-List all non-security directories. +List the contents of the /var/lib directory.
-Summary is missing! +List world-readable directories.
-Read the tmp directory (/tmp). -
--List the contents of generic -directories in /usr. -
--List the contents of /var. +Manage all files on the filesystem, except +the listed exceptions.
-List the contents of the /var/lib directory. +Create, read, write, and delete files +in the /boot directory.
-List world-readable directories. +Create, read, write, and delete symbolic links +in the /boot directory.
-Manage all files on the filesystem, except -the listed exceptions. +Create, read, write, and delete files in +/etc that are dynamically created on boot, +such as mtab.
-Create, read, write, and delete files in -/etc that are dynamically created on boot, -such as mtab. -
--Summary is missing! +Create, read, write, and delete block device nodes +on new filesystems that have not yet been labeled.
-Create, read, write, and delete block device nodes +Create, read, write, and delete character device nodes on new filesystems that have not yet been labeled.
-Create, read, write, and delete character device nodes +Create, read, write, and delete directories on new filesystems that have not yet been labeled.
-Create, read, write, and delete directories +Create, read, write, and delete files on new filesystems that have not yet been labeled.
-Create, read, write, and delete files +Create, read, write, and delete symbolic links on new filesystems that have not yet been labeled.
-Create, read, write, and delete symbolic links -on new filesystems that have not yet been labeled. +Create, read, write, and delete +kernel module files.
+Summary is missing! +
++Read kernel module files. +
++Read system.map in the /boot directory. +
++Relabel from and to kernel module files. +
++Relabel from files in the /boot directory. +
++Create an object in the root directory, with a private +type. +
++Read and write symbolic links +in the /boot directory. +
+-Search all directories. +Summary is missing!
-Summary is missing! +Search the /boot directory.
+Search the contents of the kernel module directories. +
+-Summary is missing! +Search the locks directory (/var/lock).
-Search directories in /var/lib. +Make the specified type a file that +should not be dontaudited from +browsing from user domains.
-Make the specified type a file that -should not be dontaudited from -browsing from user domains. +Set the attributes of all tmp directories.
-Set the attributes of all tmp directories. +Set the attributes of the /etc directories.
-Set the attributes of the /etc directories. +Make the specified type a file +used for temporary files.
-Make the specified type a file -used for temporary files. +Summary is missing!
+Create objects in the /usr directory +
++Create objects in the /var directory +
++Create objects in the /var/lib directory +
++Write kernel module files. +
+-Do not audit attempts to read or -write files on a CIFS or SMB filesystem. +Dontaudit read on a ramfs files.
+Dontaudit read on a ramfs fifo_files. +
+Do not audit attempts to read or -write files on a NFS filesystem. +write files on a CIFS or SMB filesystem.
-Do not audit attempts to read or write -generic tmpfs files. +Do not audit attempts to read or +write files on a NFS filesystem.
-dontaudit Read and write character nodes on tmpfs filesystems. +Do not audit attempts to read or write +generic tmpfs files.
-Execute files on a filesystem that does -not support extended attributes. +Dontaudit Search directories on a ramfs
-Execute files on a CIFS or SMB -network filesystem, in the caller -domain. +dontaudit Read and write character nodes on tmpfs filesystems.
-Execute files on a NFS filesystem. +Execute files on a CIFS or SMB +network filesystem, in the caller +domain.
-Summary is missing! +Execute files on a NFS filesystem.
-Get the quotas of all filesystems. +Execute files on a filesystem that does +not support extended attributes.
-Get the filesystem quotas of a filesystem -with extended attributes. +Get the quotas of all filesystems.
-Get the quotas of a persistent -filesystem which has extended -attributes, such as ext3, JFS, or XFS. +Get the filesystem quotas of a filesystem +with extended attributes.
+List inotifyfs filesystem. +
+-List the contents of generic tmpfs directories. +Read directories of RPC file system pipes.
-Transform specified type into a filesystem -type which does not have extended attribute -support. +List the contents of generic tmpfs directories.
+Transform specified type into a filesystem +type which does not have extended attribute +support. +
+-Read directories of RPC file system pipes. +Read files of RPC file system pipes.
-Read files of RPC file system pipes. +Read sockets of RPC file system pipes.
-Read sockets of RPC file system pipes. +Read symbolic links of RPC file system pipes.
-Read symbolic links of RPC file system pipes. +Read tmpfs link files.
+Read and write block nodes on tmpfs filesystems. +
++Read and write character nodes on tmpfs filesystems. +
++Search inotifyfs filesystem. +
++Summary is missing! +
+-Read and write block nodes on tmpfs filesystems. -
--Read and write character nodes on tmpfs filesystems. -
--Allow process to edit getty config file. +Allow process to read getty config file.
-Allow process to read getty config file. +Allow process to read getty log file.
-Allow process to read getty log file. +Allow process to edit getty config file. +
++Inherit and use getty file descriptors.
+Connect to GPM over a unix domain +stream socket. +
+