diff --git a/www/api-docs/admin.html b/www/api-docs/admin.html index 32da35d..6c9412c 100644 --- a/www/api-docs/admin.html +++ b/www/api-docs/admin.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -124,6 +145,11 @@

Berkeley process accounting

+ + alsa +

Ainit ALSA configuration tool

+ + amanda

Automated backup program.

@@ -141,6 +167,11 @@ Determine of the console connected to the controlling terminal.

+ + ddcprobe +

ddcprobe retrieves monitor and graphics card information

+ + dmesg

Policy for dmesg.

@@ -169,16 +200,31 @@ after installation of Red Hat/Fedora systems.

Rotate and archive system logs

+ + logwatch +

System log analyzer and reporter

+ + netutils

Network analysis utilities

+ + prelink +

Prelink ELF shared library mappings.

+ + quota

File system quota management

+ + readahead +

Readahead, read files into page cache for improved performance

+ + rpm

Policy for the RPM package manager.

@@ -204,11 +250,21 @@ after installation of Red Hat/Fedora systems.

Red Hat utility to change /etc/fstab.

+ + usbmodules +

List kernel modules of USB devices

+ + usermanage

Policy for managing user accounts.

+ + vbetool +

run real-mode video BIOS code to alter hardware state

+ + vpn

Virtual Private Networking client

diff --git a/www/api-docs/admin_acct.html b/www/api-docs/admin_acct.html index 8f2a542..f24e86d 100644 --- a/www/api-docs/admin_acct.html +++ b/www/api-docs/admin_acct.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_alsa.html b/www/api-docs/admin_alsa.html new file mode 100644 index 0000000..adc1e6f --- /dev/null +++ b/www/api-docs/admin_alsa.html @@ -0,0 +1,277 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: alsa

+ +

Description:

+ +

Ainit ALSA configuration tool

+ + + + +

Interfaces:

+ + +
+ + +
+ +alsa_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Domain transition to alsa +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +alsa_rw_semaphores( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow read and write access to alsa semaphores. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +alsa_rw_shared_mem( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow read and write access to alsa shared memory. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_amanda.html b/www/api-docs/admin_amanda.html index cf9d616..a5add6d 100644 --- a/www/api-docs/admin_amanda.html +++ b/www/api-docs/admin_amanda.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_anaconda.html b/www/api-docs/admin_anaconda.html index 9c55296..202a711 100644 --- a/www/api-docs/admin_anaconda.html +++ b/www/api-docs/admin_anaconda.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_consoletype.html b/www/api-docs/admin_consoletype.html index bad02cd..748c4d9 100644 --- a/www/api-docs/admin_consoletype.html +++ b/www/api-docs/admin_consoletype.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_ddcprobe.html b/www/api-docs/admin_ddcprobe.html new file mode 100644 index 0000000..4ba8ed2 --- /dev/null +++ b/www/api-docs/admin_ddcprobe.html @@ -0,0 +1,272 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: ddcprobe

+ +

Description:

+ +

ddcprobe retrieves monitor and graphics card information

+ + + + +

Interfaces:

+ + +
+ + +
+ +ddcprobe_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute ddcprobe in the ddcprobe domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+ + +
+ + +
+ +ddcprobe_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute ddcprobe in the ddcprobe domain, and +allow the specified role the ddcprobe domain. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +Role to be authenticated for ddcprobe domain. + + +No +
+terminal + + +The type of the terminal allow the clock domain to use. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_dmesg.html b/www/api-docs/admin_dmesg.html index 40926f3..2c4daf2 100644 --- a/www/api-docs/admin_dmesg.html +++ b/www/api-docs/admin_dmesg.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_dmidecode.html b/www/api-docs/admin_dmidecode.html index 898c5ad..c4f0eb2 100644 --- a/www/api-docs/admin_dmidecode.html +++ b/www/api-docs/admin_dmidecode.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_firstboot.html b/www/api-docs/admin_firstboot.html index a7b0372..1d82ab9 100644 --- a/www/api-docs/admin_firstboot.html +++ b/www/api-docs/admin_firstboot.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_kudzu.html b/www/api-docs/admin_kudzu.html index 846d2c4..c0196a0 100644 --- a/www/api-docs/admin_kudzu.html +++ b/www/api-docs/admin_kudzu.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -161,6 +182,48 @@ No + +
+ + +
+ +kudzu_getattr_exec_file( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get attributes of kudzu executable. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
diff --git a/www/api-docs/admin_logrotate.html b/www/api-docs/admin_logrotate.html index 04574b2..15e7fb4 100644 --- a/www/api-docs/admin_logrotate.html +++ b/www/api-docs/admin_logrotate.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_logwatch.html b/www/api-docs/admin_logwatch.html new file mode 100644 index 0000000..5ea9a2a --- /dev/null +++ b/www/api-docs/admin_logwatch.html @@ -0,0 +1,193 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: logwatch

+ +

Description:

+ +

System log analyzer and reporter

+ + + + +

Interfaces:

+ + +
+ + +
+ +logwatch_read_tmp_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read logwatch temporary files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_netutils.html b/www/api-docs/admin_netutils.html index 09d1d90..23f7ef1 100644 --- a/www/api-docs/admin_netutils.html +++ b/www/api-docs/admin_netutils.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_prelink.html b/www/api-docs/admin_prelink.html new file mode 100644 index 0000000..9369b7b --- /dev/null +++ b/www/api-docs/admin_prelink.html @@ -0,0 +1,362 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: prelink

+ +

Description:

+ +

Prelink ELF shared library mappings.

+ + + + +

Interfaces:

+ + +
+ + +
+ +prelink_delete_cache( + + + + + file_type + + + )
+
+
+ +
Summary
+

+Delete the prelink cache. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+file_type + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +prelink_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute the prelink program in the prelink domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +prelink_manage_log( + + + + + file_type + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete +prelink log files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+file_type + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +prelink_object_file( + + + + + file_type + + + )
+
+
+ +
Summary
+

+Make the specified file type prelinkable. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+file_type + + +File type to be prelinked. + + +No +
+
+
+ + +
+ + +
+ +prelink_read_cache( + + + + + file_type + + + )
+
+
+ +
Summary
+

+Read the prelink cache. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+file_type + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_quota.html b/www/api-docs/admin_quota.html index 70d4e6c..9f24f67 100644 --- a/www/api-docs/admin_quota.html +++ b/www/api-docs/admin_quota.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_readahead.html b/www/api-docs/admin_readahead.html new file mode 100644 index 0000000..e0e751f --- /dev/null +++ b/www/api-docs/admin_readahead.html @@ -0,0 +1,147 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: readahead

+ +

Description:

+ +

Readahead, read files into page cache for improved performance

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/admin_rpm.html b/www/api-docs/admin_rpm.html index c2695b3..0901580 100644 --- a/www/api-docs/admin_rpm.html +++ b/www/api-docs/admin_rpm.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -492,6 +513,48 @@ No
+ +
+ + +
+ +rpm_script_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute rpm_script programs in the rpm_script domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/admin_su.html b/www/api-docs/admin_su.html index 3028881..93c3a61 100644 --- a/www/api-docs/admin_su.html +++ b/www/api-docs/admin_su.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_sudo.html b/www/api-docs/admin_sudo.html index 83b6769..1aebe36 100644 --- a/www/api-docs/admin_sudo.html +++ b/www/api-docs/admin_sudo.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_tmpreaper.html b/www/api-docs/admin_tmpreaper.html index 27645cf..f54460a 100644 --- a/www/api-docs/admin_tmpreaper.html +++ b/www/api-docs/admin_tmpreaper.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_updfstab.html b/www/api-docs/admin_updfstab.html index aa1bd3b..51c67f4 100644 --- a/www/api-docs/admin_updfstab.html +++ b/www/api-docs/admin_updfstab.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_usbmodules.html b/www/api-docs/admin_usbmodules.html new file mode 100644 index 0000000..bc12979 --- /dev/null +++ b/www/api-docs/admin_usbmodules.html @@ -0,0 +1,273 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: usbmodules

+ +

Description:

+ +

List kernel modules of USB devices

+ + + + +

Interfaces:

+ + +
+ + +
+ +usbmodules_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute usbmodules in the usbmodules domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +usbmodules_run( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+
+ +
Summary
+

+Execute usbmodules in the usbmodules domain, and +allow the specified role the usbmodules domain, +and use the caller's terminal. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+role + + +The role to be allowed the usbmodules domain. + + +No +
+terminal + + +The type of the terminal allow the usbmodules domain to use. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_usermanage.html b/www/api-docs/admin_usermanage.html index c613425..35249de 100644 --- a/www/api-docs/admin_usermanage.html +++ b/www/api-docs/admin_usermanage.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
diff --git a/www/api-docs/admin_vbetool.html b/www/api-docs/admin_vbetool.html new file mode 100644 index 0000000..a17a807 --- /dev/null +++ b/www/api-docs/admin_vbetool.html @@ -0,0 +1,197 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: admin

+

Module: vbetool

+ +

Description:

+ +

run real-mode video BIOS code to alter hardware state

+ + + + +

Interfaces:

+ + +
+ + +
+ +vbetool_domtrans( + + + + + [ + + domain + + ] + + + )
+
+
+ +
Summary
+

+Execute vbetool application in the vbetool domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +N/A + + +yes +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/admin_vpn.html b/www/api-docs/admin_vpn.html index 67af56e..0083db7 100644 --- a/www/api-docs/admin_vpn.html +++ b/www/api-docs/admin_vpn.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -151,7 +172,7 @@ Execute VPN clients in the vpnc domain. domain -The type of the process performing this action. +Domain allowed access. No @@ -210,7 +231,7 @@ allow the specified role the vpnc domain. domain -The type of the process performing this action. +Domain allowed access. No @@ -240,6 +261,48 @@ No
+ +
+ + +
+ +vpn_signal( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send generic signals to VPN clients. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ Return diff --git a/www/api-docs/apps.html b/www/api-docs/apps.html index b9616d6..161195b 100644 --- a/www/api-docs/apps.html +++ b/www/api-docs/apps.html @@ -19,12 +19,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
@@ -75,16 +93,46 @@ + + cdrecord +

Policy for cdrecord

+ + gpg

Policy for GNU Privacy Guard and related programs.

+ + irc +

IRC client policy

+ + + + java +

Java virtual machine

+ + loadkeys

Load keyboard mappings.

+ + lockdev +

device locking policy for lockdev

+ + + + screen +

GNU terminal multiplexer

+ + + + slocate +

Update database for mlocate

+ + webalizer

Web server log analysis

diff --git a/www/api-docs/apps_cdrecord.html b/www/api-docs/apps_cdrecord.html new file mode 100644 index 0000000..de446cb --- /dev/null +++ b/www/api-docs/apps_cdrecord.html @@ -0,0 +1,195 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: cdrecord

+ +

Description:

+ +

Policy for cdrecord

+ + + + + +

Templates:

+ + +
+ + +
+ +cdrecord_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+
+ +
Summary
+

+The per user domain template for the cdrecord module. +

+ + +
Description
+

+

+This template creates derived domains which are used +for cdrecord. +

+

+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+user_domain + + +The type of the user domain. + + +No +
+user_role + + +The role associated with the user domain. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/apps_gpg.html b/www/api-docs/apps_gpg.html index a60e44b..2f17bce 100644 --- a/www/api-docs/apps_gpg.html +++ b/www/api-docs/apps_gpg.html @@ -19,12 +19,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
diff --git a/www/api-docs/apps_irc.html b/www/api-docs/apps_irc.html new file mode 100644 index 0000000..a3f5cbf --- /dev/null +++ b/www/api-docs/apps_irc.html @@ -0,0 +1,195 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: irc

+ +

Description:

+ +

IRC client policy

+ + + + + +

Templates:

+ + +
+ + +
+ +irc_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+
+ +
Summary
+

+The per user domain template for the irc module. +

+ + +
Description
+

+

+This template creates a derived domains which are used +for an irc client sessions. +

+

+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+user_domain + + +The type of the user domain. + + +No +
+user_role + + +The role associated with the user domain. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/apps_java.html b/www/api-docs/apps_java.html new file mode 100644 index 0000000..b9a8e77 --- /dev/null +++ b/www/api-docs/apps_java.html @@ -0,0 +1,195 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: java

+ +

Description:

+ +

Java virtual machine

+ + + + + +

Templates:

+ + +
+ + +
+ +java_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+
+ +
Summary
+

+The per user domain template for the java module. +

+ + +
Description
+

+

+This template creates a derived domains which are used +for java plugins that are executed by a browser. +

+

+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+user_domain + + +The type of the user domain. + + +No +
+user_role + + +The role associated with the user domain. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/apps_loadkeys.html b/www/api-docs/apps_loadkeys.html index 44b768c..5dbab61 100644 --- a/www/api-docs/apps_loadkeys.html +++ b/www/api-docs/apps_loadkeys.html @@ -19,12 +19,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
diff --git a/www/api-docs/apps_lockdev.html b/www/api-docs/apps_lockdev.html new file mode 100644 index 0000000..4b9dd81 --- /dev/null +++ b/www/api-docs/apps_lockdev.html @@ -0,0 +1,196 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: lockdev

+ +

Description:

+ +

device locking policy for lockdev

+ + + + + +

Templates:

+ + +
+ + +
+ +lockdev_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+
+ +
Summary
+

+The per user domain template for the lockdev module. +

+ + +
Description
+

+

+This template creates derived domains which are used +for lockdev. A derived type is also created to protect +the user's device locks. +

+

+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+user_domain + + +The type of the user domain. + + +No +
+user_role + + +The role associated with the user domain. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/apps_screen.html b/www/api-docs/apps_screen.html new file mode 100644 index 0000000..c7ab2d6 --- /dev/null +++ b/www/api-docs/apps_screen.html @@ -0,0 +1,195 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: screen

+ +

Description:

+ +

GNU terminal multiplexer

+ + + + + +

Templates:

+ + +
+ + +
+ +screen_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+
+ +
Summary
+

+The per user domain template for the screen module. +

+ + +
Description
+

+

+This template creates a derived domains which are used +for screen sessions. +

+

+This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+user_domain + + +The type of the user domain. + + +No +
+user_role + + +The role associated with the user domain. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/apps_slocate.html b/www/api-docs/apps_slocate.html new file mode 100644 index 0000000..0dcf640 --- /dev/null +++ b/www/api-docs/apps_slocate.html @@ -0,0 +1,145 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: apps

+

Module: slocate

+ +

Description:

+ +

Update database for mlocate

+ + + + +

Interfaces:

+ + +
+ + +
+ +slocate_create_append_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create the locate log with append mode. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/apps_webalizer.html b/www/api-docs/apps_webalizer.html index c97a25b..af33a67 100644 --- a/www/api-docs/apps_webalizer.html +++ b/www/api-docs/apps_webalizer.html @@ -19,12 +19,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
diff --git a/www/api-docs/global_booleans.html b/www/api-docs/global_booleans.html index 78bfbdc..8aa51d2 100644 --- a/www/api-docs/global_booleans.html +++ b/www/api-docs/global_booleans.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -73,12 +94,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
@@ -139,6 +178,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -184,9 +226,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -247,6 +295,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -268,6 +319,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -283,6 +337,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -301,6 +358,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -316,6 +379,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -328,6 +394,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -352,6 +421,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/global_tunables.html b/www/api-docs/global_tunables.html index a418493..c22677c 100644 --- a/www/api-docs/global_tunables.html +++ b/www/api-docs/global_tunables.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -73,12 +94,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
@@ -139,6 +178,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -184,9 +226,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -247,6 +295,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -268,6 +319,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -283,6 +337,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -301,6 +358,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -316,6 +379,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -328,6 +394,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -352,6 +421,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -434,6 +506,18 @@
+
allow_cvs_read_shadow
+
+
Default value
+

false

+ +
Description
+

+Allow cvs daemon to read shadow

+ +
+ +
allow_execmem
Default value
@@ -518,6 +602,18 @@ Allow Apache to modify public filesused for public file transfer services.

+
allow_java_execstack
+
+
Default value
+

false

+ +
Description
+

+Allow java executable stack

+ +
+ +
allow_kerberos
Default value
@@ -614,6 +710,18 @@ Allow system to run with NIS

+
cdrecord_read_content
+
+
Default value
+

false

+ +
Description
+

+Allow cdrecord to read various content.nfs, samba, removable devices, user tempand untrusted content files

+ +
+ +
cron_can_relabel
Default value
@@ -686,6 +794,30 @@ Allow http daemon to tcp connect

+
httpd_can_network_connect_db
+
+
Default value
+

false

+ +
Description
+

+allow httpd to connect to mysql/posgresql

+ +
+ +
+
httpd_can_network_relay
+
+
Default value
+

false

+ +
Description
+

+allow httpd to act as a relay

+ +
+ +
httpd_enable_cgi
Default value
diff --git a/www/api-docs/index.html b/www/api-docs/index.html index f88b88a..bb55645 100644 --- a/www/api-docs/index.html +++ b/www/api-docs/index.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -73,12 +94,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
@@ -139,6 +178,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -184,9 +226,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -247,6 +295,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -268,6 +319,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -283,6 +337,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -301,6 +358,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -316,6 +379,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -328,6 +394,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -352,6 +421,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -448,6 +520,11 @@

Berkeley process accounting

+ + alsa +

Ainit ALSA configuration tool

+ + amanda

Automated backup program.

@@ -465,6 +542,11 @@ Determine of the console connected to the controlling terminal.

+ + ddcprobe +

ddcprobe retrieves monitor and graphics card information

+ + dmesg

Policy for dmesg.

@@ -493,16 +575,31 @@ after installation of Red Hat/Fedora systems.

Rotate and archive system logs

+ + logwatch +

System log analyzer and reporter

+ + netutils

Network analysis utilities

+ + prelink +

Prelink ELF shared library mappings.

+ + quota

File system quota management

+ + readahead +

Readahead, read files into page cache for improved performance

+ + rpm

Policy for the RPM package manager.

@@ -528,11 +625,21 @@ after installation of Red Hat/Fedora systems.

Red Hat utility to change /etc/fstab.

+ + usbmodules +

List kernel modules of USB devices

+ + usermanage

Policy for managing user accounts.

+ + vbetool +

run real-mode video BIOS code to alter hardware state

+ + vpn

Virtual Private Networking client

@@ -557,7 +664,8 @@ after installation of Red Hat/Fedora systems.

Layer: kernel

-Policy for kernel threads, proc filesystem,and unlabeled processes and objects. +Policy for kernel threads, proc filesystem, +and unlabeled processes and objects.


@@ -617,7 +725,8 @@ Basic filesystem types and interfaces. kernel

-Policy for kernel threads, proc filesystem,and unlabeled processes and objects. +Policy for kernel threads, proc filesystem, +and unlabeled processes and objects.

@@ -666,16 +775,46 @@ Policy for kernel security interface, in particular, selinuxfs. + + cdrecord +

Policy for cdrecord

+ + gpg

Policy for GNU Privacy Guard and related programs.

+ + irc +

IRC client policy

+ + + + java +

Java virtual machine

+ + loadkeys

Load keyboard mappings.

+ + lockdev +

device locking policy for lockdev

+ + + + screen +

GNU terminal multiplexer

+ + + + slocate +

Update database for mlocate

+ + webalizer

Web server log analysis

@@ -728,6 +867,11 @@ Policy for kernel security interface, in particular, selinuxfs.

Policy for reading and setting the hardware clock.

+ + daemontools +

Collection of tools for managing UNIX services

+ + fstools

Tools for filesystem management, such as mkfs and fsck.

@@ -877,6 +1021,11 @@ connection and disconnection of devices at runtime.

Ethernet activity monitor.

+ + automount +

Filesystem automounter service.

+ + avahi

mDNS/DNS-SD daemon implementing Apple ZeroConf architecture

@@ -952,11 +1101,21 @@ connection and disconnection of devices at runtime.

Distributed compiler daemon

+ + djbdns +

small and secure DNS daemon

+ + dovecot

Dovecot POP and IMAP mail server

+ + fetchmail +

Remote-mail retrieval and forwarding utility

+ + finger

Finger user information service.

@@ -1057,6 +1216,11 @@ connection and disconnection of devices at runtime.

Network time protocol daemon

+ + openct +

Service for handling smart card readers.

+ + pegasus

The Open Group Pegasus CIM/WBEM Server.

@@ -1092,6 +1256,11 @@ connection and disconnection of devices at runtime.

Procmail mail delivery agent

+ + publicfile +

publicfile supplies files to the public through HTTP and FTP

+ + radius

RADIUS authentication and accounting server.

@@ -1117,6 +1286,11 @@ connection and disconnection of devices at runtime.

Remote login daemon

+ + roundup +

Roundup Issue Tracking System policy

+ + rpc

Remote Procedure Call Daemon for managment of network based process communication

@@ -1151,6 +1325,16 @@ from Windows NT servers.

Policy for sendmail.

+ + slrnpull +

Service for downloading news feeds the slrn newsreader.

+ + + + smartmon +

Smart disk monitoring daemon policy

+ + snmp

Simple network management protocol services

@@ -1176,6 +1360,11 @@ from Windows NT servers.

SSL Tunneling Proxy

+ + sysstat +

Policy for sysstat. Reports on various system states

+ + tcpd

Policy for TCP daemon.

@@ -1196,6 +1385,11 @@ from Windows NT servers.

MIDI to WAV converter and player configured as a service

+ + ucspitcp +

ucspitcp policy

+ + uucp

Unix to Unix Copy

diff --git a/www/api-docs/interfaces.html b/www/api-docs/interfaces.html index 05bc884..adfe364 100644 --- a/www/api-docs/interfaces.html +++ b/www/api-docs/interfaces.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -73,12 +94,30 @@ apps
+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
@@ -139,6 +178,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -184,9 +226,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -247,6 +295,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -268,6 +319,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -283,6 +337,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -301,6 +358,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -316,6 +379,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -328,6 +394,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -352,6 +421,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -538,6 +610,84 @@ Create, read, write, and delete process accounting data.
+Module: +alsa

+Layer: +admin

+

+ +alsa_domtrans( + + + + + domain + + + )
+
+ +
+

+Domain transition to alsa +

+
+ +
+ +
+Module: +alsa

+Layer: +admin

+

+ +alsa_rw_semaphores( + + + + + domain + + + )
+
+ +
+

+Allow read and write access to alsa semaphores. +

+
+ +
+ +
+Module: +alsa

+Layer: +admin

+

+ +alsa_rw_shared_mem( + + + + + domain + + + )
+
+ +
+

+Allow read and write access to alsa shared memory. +

+
+ +
+ +
-Module: +Module: authlogin

Layer: system

-auth_create_login_records( +auth_can_read_shadow_passwords( @@ -1829,6 +1979,32 @@ Execute utempter programs in the utempter domain.
+Module: +authlogin

+Layer: +system

+

+ +auth_dontaudit_exec_utempter( + + + + + domain + + + )
+
+ +
+

+Do not audit attemps to execute utempter executable. +

+
+ +
+ +
+Module: +authlogin

+Layer: +system

+

+ +auth_filetrans_login_records( + + + + + ? + + + )
+
+ +
+

+Summary is missing! +

+
+ +
+ +
+Module: +authlogin

+Layer: +system

+

+ +auth_setattr_login_records( + + + + + ? + + + )
+
+ +
+

+Summary is missing! +

+
+ +
+ +
+Module: +authlogin

+Layer: +system

+

+ +auth_tunable_read_shadow( + + + + + ? + + + )
+
+ +
+

+Summary is missing! +

+
+ +
+ +
+Module: +automount

+Layer: +services

+

+ +automount_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute automount in the automount domain. +

+
+ +
+ +
+Module: +automount

+Layer: +services

+

+ +automount_exec_config( + + + + + domain + + + )
+
+ +
+

+Execute automount in the caller domain. +

+
+ +
+ +
+Module: +bind

+Layer: +services

+

+ +bind_read_zone( + + + + + domain + + + )
+
+ +
+

+Read BIND zone files. +

+
+ +
+ +
+Module: +bind

+Layer: +services

+

+ +bind_search_cache( + + + + + domain + + + )
+
+ +
+

+Search the BIND cache directory. +

+
+ +
+ +
+Module: +bluetooth

+Layer: +services

+

+ +bluetooth_read_config( + + + + + domain + + + )
+
+ +
+

+Read bluetooth daemon configuration. +

+
+ +
+ +
-Module: +Module: bootloader

Layer: kernel

-bootloader_create_kernel( +bootloader_create_kernel_img( @@ -3270,18 +3654,18 @@ Install a system.map into the /boot directory.
-Module: +Module: bootloader

Layer: kernel

-bootloader_create_modules( +bootloader_create_runtime_file( - ? + domain )
@@ -3289,20 +3673,21 @@ kernel

-Summary is missing! +Read and write the bootloader +temporary data in /tmp.

-Module: +Module: bootloader

Layer: kernel

-bootloader_create_runtime_file( +bootloader_delete_kernel( @@ -3315,21 +3700,20 @@ kernel

-Read and write the bootloader -temporary data in /tmp. +Delete a kernel from /boot.

-Module: +Module: bootloader

Layer: kernel

-bootloader_delete_kernel( +bootloader_delete_kernel_symbol_table( @@ -3342,20 +3726,20 @@ kernel

-Delete a kernel from /boot. +Delete a system.map in the /boot directory.

-Module: +Module: bootloader

Layer: kernel

-bootloader_delete_kernel_symbol_table( +bootloader_domtrans( @@ -3368,20 +3752,20 @@ kernel

-Delete a system.map in the /boot directory. +Execute bootloader in the bootloader domain.

-Module: +Module: bootloader

Layer: kernel

-bootloader_domtrans( +bootloader_dontaudit_getattr_boot_dir( @@ -3394,20 +3778,21 @@ kernel

-Execute bootloader in the bootloader domain. +Do not audit attempts to get attributes +of the /boot directory.

-Module: +Module: bootloader

Layer: kernel

-bootloader_dontaudit_getattr_boot_dir( +bootloader_dontaudit_search_boot( @@ -3420,21 +3805,46 @@ kernel

-Do not audit attempts to get attributes -of the /boot directory. +Do not audit attempts to search the /boot directory.

-Module: +Module: bootloader

Layer: kernel

-bootloader_dontaudit_search_boot( +bootloader_filetrans_modules( + + + + + ? + + + )
+
+ +
+

+Summary is missing! +

+
+ +
+ +
+Module: +bootloader

+Layer: +kernel

+

+ +bootloader_getattr_boot_dir( @@ -3447,7 +3857,7 @@ kernel

-Do not audit attempts to search the /boot directory. +Get attributes of the /boot directory.

@@ -4386,6 +4796,110 @@ Summary is missing!
+Module: +corecommands

+Layer: +kernel

+

+ +corecmd_manage_bin_files( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete bin files. +

+
+ +
+ +
+Module: +corecommands

+Layer: +kernel

+

+ +corecmd_manage_sbin_files( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete sbin files. +

+
+ +
+ +
+Module: +corecommands

+Layer: +kernel

+

+ +corecmd_mmap_bin_files( + + + + + domain + + + )
+
+ +
+

+Mmap a bin file as executable. +

+
+ +
+ +
+Module: +corecommands

+Layer: +kernel

+

+ +corecmd_mmap_sbin_files( + + + + + domain + + + )
+
+ +
+

+Mmap a sbin file as executable. +

+
+ +
+ +
+Module: +corecommands

+Layer: +kernel

+

+ +corecmd_relabel_bin_files( + + + + + domain + + + )
+
+ +
+

+Relabel to and from the bin type. +

+
+ +
+ +
+Module: +corecommands

+Layer: +kernel

+

+ +corecmd_relabel_sbin_files( + + + + + domain + + + )
+
+ +
+

+Relabel to and from the sbin type. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_raw_receive_lo_if( + + + + + domain + + + )
+
+ +
+

+Receive raw IP packets on the lo interface. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_raw_send_lo_if( + + + + + domain + + + )
+
+ +
+

+Send raw IP packets on the lo interface. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_raw_sendrecv_lo_if( + + + + + domain + + + )
+
+ +
+

+Send and receive raw IP packets on the lo interface. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_tcp_sendrecv_lo_if( + + + + + domain + + + )
+
+ +
+

+Send and receive TCP network traffic on the lo interface. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_receive_lo_if( + + + + + domain + + + )
+
+ +
+

+Receive UDP network traffic on the lo interface. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_send_lo_if( + + + + + domain + + + )
+
+ +
+

+Send UDP network traffic on the lo interface. +

+
+ +
+ +
+Module: +corenetwork

+Layer: +kernel

+

+ +corenet_udp_sendrecv_lo_if( + + + + + domain + + + )
+
+ +
+

+Send and receive UDP network traffic on the lo interface. +

+
+ +
+ +
+Module: +cron

+Layer: +services

+

+ +cron_dontaudit_write_pipe( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to write cron daemon unnamed pipes. +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_domtrans_multilog( + + + + + domain + + + )
+
+ +
+

+Execute in the svc_multilog_t domain. +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_domtrans_run( + + + + + domain + + + )
+
+ +
+

+Execute in the svc_run_t domain. +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_domtrans_start( + + + + + domain + + + )
+
+ +
+

+Execute in the svc_start_t domain. +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_ipc_domain( + + + + + domain + + + )
+
+ +
+

+An ipc channel between the supervised domain and svc_start_t +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_manage_svc( + + + + + domain + + + )
+
+ +
+

+Allow a domain to create svc_svc_t files. +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_read_svc( + + + + + domain + + + )
+
+ +
+

+Allow a domain to read svc_svc_t files. +

+
+ +
+ +
+Module: +daemontools

+Layer: +system

+

+ +daemontools_service_domain( + + + + + domain + + + + , + + + + entrypoint + + + )
+
+ +
+

+Define a specified domain as a supervised service. +

+
+ +
+ +
+Module: +dbus

+Layer: +services

+

+ +dbus_read_config( + + + + + domain + + + )
+
+ +
+

+Read dbus configuration. +

+
+ +
+ +
-Module: -devices

-Layer: -kernel

+Module: +ddcprobe

+Layer: +admin

-dev_append_printer( +ddcprobe_domtrans( @@ -24662,20 +25652,20 @@ kernel

-Append the printer device. +Execute ddcprobe in the ddcprobe domain.

-Module: -devices

-Layer: -kernel

+Module: +ddcprobe

+Layer: +admin

-dev_associate_usbfs( +ddcprobe_run( @@ -24683,25 +25673,42 @@ kernel

domain + + , + + + + role + + + + , + + + + terminal + + )

-Mount a usbfs filesystem. +Execute ddcprobe in the ddcprobe domain, and +allow the specified role the ddcprobe domain.

-Module: +Module: devices

Layer: kernel

-dev_create_cardmgr( +dev_append_printer( @@ -24714,22 +25721,20 @@ kernel

-Create, read, write, and delete -the PCMCIA card manager device -with the correct type. +Append the printer device.

-Module: +Module: devices

Layer: kernel

-dev_create_dev_node( +dev_associate_usbfs( @@ -24737,20 +25742,30 @@ kernel

domain - - , - - - - file - + )
+

+ +
+

+Mount a usbfs filesystem. +

+
+ +
+ +
+Module: +devices

+Layer: +kernel

+

+ +dev_create_cardmgr( - , - - objectclass(es) + domain )
@@ -24758,8 +25773,9 @@ kernel

-Create, read, and write device nodes. The node -will be transitioned to the type provided. +Create, read, write, and delete +the PCMCIA card manager device +with the correct type.

@@ -25053,6 +26069,32 @@ Dontaudit getattr on generic pipes.
+Module: +devices

+Layer: +kernel

+

+ +dev_dontaudit_getattr_memory_dev( + + + + + domain + + + )
+
+ +
+

+dontaudit getattr raw memory devices (e.g. /dev/mem). +

+
+ +
+ +
+Module: +devices

+Layer: +kernel

+

+ +dev_filetrans_dev_node( + + + + + domain + + + + , + + + + file + + + + , + + + + objectclass(es) + + + )
+
+ +
+

+Create, read, and write device nodes. The node +will be transitioned to the type provided. +

+
+ +
+ +
+Module: +domain

+Layer: +kernel

+

+ +domain_manage_all_entry_files( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete all +entrypoint files. +

+
+ +
+ +
+Module: +domain

+Layer: +kernel

+

+ +domain_mmap_all_entry_files( + + + + + domain + + + )
+
+ +
+

+Mmap all entry point files as executable. +

+
+ +
+ +
+Module: +domain

+Layer: +kernel

+

+ +domain_relabel_all_entry_files( + + + + + domain + + + )
+
+ +
+

+Relabel to and from all entry point +file types. +

+
+ +
+ +
-Module: +Module: files

Layer: kernel

-files_create_etc_config( +files_delete_all_locks( @@ -29685,26 +30850,18 @@ Summary is missing!
-Module: +Module: files

Layer: kernel

-files_create_home_dirs( - - - - - domain - +files_delete_all_pid_dirs( - , - - home_type + ? )
@@ -29712,20 +30869,20 @@ kernel

-Create home directories +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_create_lock( +files_delete_all_pids( @@ -29745,18 +30902,18 @@ Summary is missing!
-Module: +Module: files

Layer: kernel

-files_create_pid( +files_delete_etc_files( - ? + domain )
@@ -29764,49 +30921,25 @@ kernel

-Summary is missing! +Delete system configuration files in /etc.

-Module: +Module: files

Layer: kernel

-files_create_root( - - - - - domain - - - - , - - - - [ - - private type - - ] - +files_delete_root_dir_entry( - , - - [ - - object - - ] + ? )
@@ -29814,27 +30947,25 @@ kernel

-Create an object in the root directory, with a private -type. If no object class is specified, the -default is file. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_create_tmp_files( +files_dontaudit_getattr_all_dirs( - ? + domain )
@@ -29842,20 +30973,21 @@ kernel

-Summary is missing! +Do not audit attempts to get the attributes +of all directories.

-Module: +Module: files

Layer: kernel

-files_create_usr( +files_dontaudit_getattr_all_files( @@ -29863,24 +30995,31 @@ kernel

domain - - , - - - - file_type - + )
+

+ +
+

+Do not audit attempts to get the attributes +of all files. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_dontaudit_getattr_all_pipes( - , - - [ - - object_class - - ] + domain )
@@ -29888,20 +31027,21 @@ kernel

-Create objects in the /usr directory +Do not audit attempts to get the attributes +of all named pipes.

-Module: +Module: files

Layer: kernel

-files_create_var( +files_dontaudit_getattr_all_sockets( @@ -29909,24 +31049,31 @@ kernel

domain - - , - - - - file_type - + )
+

+ +
+

+Do not audit attempts to get the attributes +of all named sockets. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_dontaudit_getattr_all_symlinks( - , - - [ - - object_class - - ] + domain )
@@ -29934,20 +31081,21 @@ kernel

-Create objects in the /var directory +Do not audit attempts to get the attributes +of all symbolic links.

-Module: +Module: files

Layer: kernel

-files_create_var_lib( +files_dontaudit_getattr_default_dir( @@ -29955,24 +31103,31 @@ kernel

domain - - , - - - - file_type - + )
+

+ +
+

+Do not audit attempts to get the attributes of +directories with the default file type. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_dontaudit_getattr_default_files( - , - - [ - - object_class - - ] + domain )
@@ -29980,25 +31135,26 @@ kernel

-Create objects in the /var/lib directory +Do not audit attempts to get the attributes of +files with the default file type.

-Module: +Module: files

Layer: kernel

-files_delete_all_locks( +files_dontaudit_getattr_home_dir( - ? + domain )
@@ -30006,25 +31162,27 @@ kernel

-Summary is missing! +Do not audit attempts to get the +attributes of the home directories root +(/home).

-Module: +Module: files

Layer: kernel

-files_delete_all_pid_dirs( +files_dontaudit_getattr_non_security_blk_dev( - ? + domain )
@@ -30032,25 +31190,26 @@ kernel

-Summary is missing! +Do not audit attempts to get the attributes +of non security block devices.

-Module: +Module: files

Layer: kernel

-files_delete_all_pids( +files_dontaudit_getattr_non_security_chr_dev( - ? + domain )
@@ -30058,20 +31217,21 @@ kernel

-Summary is missing! +Do not audit attempts to get the attributes +of non security character devices.

-Module: +Module: files

Layer: kernel

-files_delete_etc_files( +files_dontaudit_getattr_non_security_files( @@ -30084,25 +31244,26 @@ kernel

-Delete system configuration files in /etc. +Do not audit attempts to get the attributes +of non security files.

-Module: +Module: files

Layer: kernel

-files_delete_root_dir_entry( +files_dontaudit_getattr_non_security_pipes( - ? + domain )
@@ -30110,20 +31271,21 @@ kernel

-Summary is missing! +Do not audit attempts to get the attributes +of non security named pipes.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_all_dirs( +files_dontaudit_getattr_non_security_sockets( @@ -30137,20 +31299,20 @@ kernel

Do not audit attempts to get the attributes -of all directories. +of non security named sockets.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_all_files( +files_dontaudit_getattr_non_security_symlinks( @@ -30164,20 +31326,20 @@ kernel

Do not audit attempts to get the attributes -of all files. +of non security symbolic links.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_all_pipes( +files_dontaudit_getattr_pid_dir( @@ -30191,20 +31353,20 @@ kernel

Do not audit attempts to get the attributes -of all named pipes. +of the /var/run directory.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_all_sockets( +files_dontaudit_getattr_tmp_dir( @@ -30217,21 +31379,21 @@ kernel

-Do not audit attempts to get the attributes -of all named sockets. +Do not audit attempts to get the +attributes of the tmp directory (/tmp).

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_all_symlinks( +files_dontaudit_ioctl_all_pids( @@ -30244,21 +31406,20 @@ kernel

-Do not audit attempts to get the attributes -of all symbolic links. +Do not audit attempts to ioctl daemon runtime data files.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_default_dir( +files_dontaudit_list_default( @@ -30271,7 +31432,7 @@ kernel

-Do not audit attempts to get the attributes of +Do not audit attempts to list contents of directories with the default file type.

@@ -30279,13 +31440,13 @@ directories with the default file type.
-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_default_files( +files_dontaudit_list_home( @@ -30298,21 +31459,21 @@ kernel

-Do not audit attempts to get the attributes of -files with the default file type. +Do not audit attempts to list +home directories root (/home).

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_home_dir( +files_dontaudit_list_non_security( @@ -30325,22 +31486,21 @@ kernel

-Do not audit attempts to get the -attributes of the home directories root -(/home). +Do not audit attempts to list all +non-security directories.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_non_security_blk_dev( +files_dontaudit_list_tmp( @@ -30353,21 +31513,20 @@ kernel

-Do not audit attempts to get the attributes -of non security block devices. +Do not audit listing of the tmp directory (/tmp).

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_non_security_chr_dev( +files_dontaudit_read_default_files( @@ -30380,21 +31539,21 @@ kernel

-Do not audit attempts to get the attributes -of non security character devices. +Do not audit attempts to read files +with the default file type.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_non_security_files( +files_dontaudit_read_etc_runtime_files( @@ -30407,26 +31566,27 @@ kernel

-Do not audit attempts to get the attributes -of non security files. +Do not audit attempts to read files +in /etc that are dynamically +created on boot, such as mtab.

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_non_security_pipes( +files_dontaudit_read_root_file( - domain + ? )
@@ -30434,26 +31594,25 @@ kernel

-Do not audit attempts to get the attributes -of non security named pipes. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_non_security_sockets( +files_dontaudit_rw_root_chr_dev( - domain + ? )
@@ -30461,26 +31620,25 @@ kernel

-Do not audit attempts to get the attributes -of non security named sockets. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_non_security_symlinks( +files_dontaudit_rw_root_file( - domain + ? )
@@ -30488,26 +31646,25 @@ kernel

-Do not audit attempts to get the attributes -of non security symbolic links. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_pid_dir( +files_dontaudit_search_all_dirs( - domain + ? )
@@ -30515,21 +31672,20 @@ kernel

-Do not audit attempts to get the attributes -of the /var/run directory. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_getattr_tmp_dir( +files_dontaudit_search_home( @@ -30542,21 +31698,21 @@ kernel

-Do not audit attempts to get the -attributes of the tmp directory (/tmp). +Do not audit attempts to search +home directories root (/home).

-Module: +Module: files

Layer: kernel

-files_dontaudit_ioctl_all_pids( +files_dontaudit_search_isid_type_dir( @@ -30569,20 +31725,21 @@ kernel

-Do not audit attempts to ioctl daemon runtime data files. +Do not audit attempts to search directories on new filesystems +that have not yet been labeled.

-Module: +Module: files

Layer: kernel

-files_dontaudit_list_default( +files_dontaudit_search_locks( @@ -30595,21 +31752,21 @@ kernel

-Do not audit attempts to list contents of -directories with the default file type. +Do not audit attempts to search the +locks directory (/var/lock).

-Module: +Module: files

Layer: kernel

-files_dontaudit_list_non_security( +files_dontaudit_search_pids( @@ -30622,26 +31779,26 @@ kernel

-Do not audit attempts to list all -non security directories. +Do not audit attempts to search +the /var/run directory.

-Module: +Module: files

Layer: kernel

-files_dontaudit_read_default_files( +files_dontaudit_search_src( - domain + ? )
@@ -30649,21 +31806,20 @@ kernel

-Do not audit attempts to read files -with the default file type. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_read_etc_runtime_files( +files_dontaudit_search_var( @@ -30676,27 +31832,26 @@ kernel

-Do not audit attempts to read files -in /etc that are dynamically -created on boot, such as mtab. +Do not audit attempts to search +the contents of /var.

-Module: +Module: files

Layer: kernel

-files_dontaudit_read_root_file( +files_dontaudit_write_all_pids( - ? + domain )
@@ -30704,25 +31859,25 @@ kernel

-Summary is missing! +Do not audit attempts to write to daemon runtime data files.

-Module: +Module: files

Layer: kernel

-files_dontaudit_rw_root_chr_dev( +files_dontaudit_write_var( - ? + domain )
@@ -30730,20 +31885,20 @@ kernel

-Summary is missing! +Do not audit attempts to write to /var.

-Module: +Module: files

Layer: kernel

-files_dontaudit_rw_root_file( +files_exec_etc_files( @@ -30763,18 +31918,18 @@ Summary is missing!
-Module: +Module: files

Layer: kernel

-files_dontaudit_search_all_dirs( +files_exec_usr_files( - ? + domain )
@@ -30782,20 +31937,20 @@ kernel

-Summary is missing! +Execute generic programs in /usr in the caller domain.

-Module: +Module: files

Layer: kernel

-files_dontaudit_search_home( +files_exec_usr_src_files( @@ -30808,26 +31963,25 @@ kernel

-Do not audit attempts to search -home directories root (/home). +Execute programs in /usr/src in the caller domain.

-Module: +Module: files

Layer: kernel

-files_dontaudit_search_isid_type_dir( +files_filetrans_etc( - domain + ? )
@@ -30835,21 +31989,20 @@ kernel

-Do not audit attempts to search directories on new filesystems -that have not yet been labeled. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_search_locks( +files_filetrans_home( @@ -30857,31 +32010,50 @@ kernel

domain + + , + + + + home_type + + + + , + + + + [ + + object + + ] + + )

-Do not audit attempts to search the -locks directory (/var/lock). +Create objects in /home.

-Module: +Module: files

Layer: kernel

-files_dontaudit_search_pids( +files_filetrans_lock( - domain + ? )
@@ -30889,21 +32061,20 @@ kernel

-Do not audit attempts to search -the /var/run directory. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_dontaudit_search_src( +files_filetrans_pid( @@ -30923,13 +32094,13 @@ Summary is missing!
-Module: +Module: files

Layer: kernel

-files_dontaudit_search_var( +files_filetrans_root( @@ -30937,31 +32108,51 @@ kernel

domain + + , + + + + private type + + + + , + + + + [ + + object + + ] + + )

-Do not audit attempts to search -the contents of /var. +Create an object in the root directory, with a private +type.

-Module: +Module: files

Layer: kernel

-files_dontaudit_write_all_pids( +files_filetrans_tmp( - domain + ? )
@@ -30969,25 +32160,45 @@ kernel

-Do not audit attempts to write to daemon runtime data files. +Summary is missing!

-Module: +Module: files

Layer: kernel

-files_exec_etc_files( +files_filetrans_usr( - ? + domain + + + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] )
@@ -30995,20 +32206,20 @@ kernel

-Summary is missing! +Create objects in the /usr directory

-Module: +Module: files

Layer: kernel

-files_exec_usr_files( +files_filetrans_var( @@ -31016,25 +32227,45 @@ kernel

domain + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + )

-Execute generic programs in /usr in the caller domain. +Create objects in the /var directory

-Module: +Module: files

Layer: kernel

-files_exec_usr_src_files( +files_filetrans_var_lib( @@ -31042,12 +32273,32 @@ kernel

domain + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + )

-Execute programs in /usr/src in the caller domain. +Create objects in the /var/lib directory

@@ -31211,6 +32462,32 @@ Get the attributes of all symbolic links.
+Module: +files

+Layer: +kernel

+

+ +files_getattr_default_dir( + + + + + domain + + + )
+
+ +
+

+Getattr of directories with the default file type. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_getattr_isid_type_dir( + + + + + domain + + + )
+
+ +
+

+Getattr of directories on new filesystems +that have not yet been labeled. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_list_non_security( + + + + + domain + + + )
+
+ +
+

+List all non-security directories. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_mounton_all_poly_members( + + + + + domain + + + )
+
+ +
+

+Mount filesystems on all polyinstantiation +member directories. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_polyinstantiate_all( + + + + + domain + + + )
+
+ +
+

+Allow access to manage all polyinstantiated +directories on the system. +

+
+ +
+ +
Module: files

Layer: @@ -32712,7 +34096,72 @@ kernel

-Read all directories on the filesystem, except +Read all directories on the filesystem, except +the listed exceptions. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_read_all_files( + + + + + domain + + + )
+
+ +
+

+Read all files. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_read_all_files_except( + + + + + domain + + + + , + + + + [ + + exception_types + + ] + + + )
+
+ +
+

+Read all files on the filesystem, except the listed exceptions.

@@ -32720,13 +34169,13 @@ the listed exceptions.
-Module: +Module: files

Layer: kernel

-files_read_all_files( +files_read_all_locks( @@ -32739,46 +34188,7 @@ kernel

-Read all files. -

-
- -
- -
-Module: -files

-Layer: -kernel

-

- -files_read_all_files_except( - - - - - domain - - - - , - - - - [ - - exception_types - - ] - - - )
-
- -
-

-Read all files on the filesystem, except -the listed exceptions. +Read all lock files.

@@ -32868,7 +34278,7 @@ kernel

-Read all symbloic links on the filesystem, except +Read all symbolic links on the filesystem, except the listed exceptions.

@@ -33138,6 +34548,32 @@ that have not yet been labeled.
+Module: +files

+Layer: +kernel

+

+ +files_read_non_security_files( + + + + + domain + + + )
+
+ +
+

+Read all non-security files. +

+
+ +
+ +
+Module: +files

+Layer: +kernel

+

+ +files_write_non_security_dir( + + + + + domain + + + )
+
+ +
+

+Allow attempts to modify any directory +

+
+ +
+ +
-Module: +Module: filesystem

Layer: kernel

-fs_create_tmpfs_data( +fs_donaudit_read_removable_files( - ? + domain )
@@ -34669,7 +36131,7 @@ kernel

-Summary is missing! +Do not audit attempts to read removable storage files.

@@ -34840,6 +36302,33 @@ attributes, such as ext3, JFS, or XFS.
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_list_auto_mountpoints( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to list directories of automatically +mounted filesystems. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_list_removable_dirs( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to list removable storage directories. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_rw_tmpfs_files( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to read or write +generic tmpfs files. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_dontaudit_use_tmpfs_chr_dev( + + + + + domain + + + )
+
+ +
+

+dontaudit Read and write character nodes on tmpfs filesystems. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_filetrans_tmpfs( + + + + + ? + + + )
+
+ +
+

+Summary is missing! +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_list_auto_mountpoints( + + + + + domain + + + )
+
+ +
+

+Read directories of automatically +mounted filesystems. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_list_nfs( + + + + + domain + + + )
+
+ +
+

+List NFS filesystem. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_manage_auto_mountpoints( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete +auto moutpoints. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_read_eventpollfs( + + + + + domain + + + )
+
+ +
+

+Read eventpollfs files +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_read_removable_files( + + + + + domain + + + )
+
+ +
+

+Read removable storage files. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_read_removable_symlinks( + + + + + domain + + + )
+
+ +
+

+Read removable storage symbolic links. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_search_removable_dirs( + + + + + domain + + + )
+
+ +
+

+Search removable storage directories. +

+
+ +
+ +
+Module: +filesystem

+Layer: +kernel

+

+ +fs_search_rpc_dirs( + + + + + domain + + + )
+
+ +
+

+Search directories of RPC file system pipes. +

+
+ +
+ +
-Module: -init

-Layer: -system

-

- -init_create_script_tmp( - - - - - domain - - - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - - )
-
- -
-

-Create files in a init script -temporary data directory. -

-
- -
- -
+Module: +init

+Layer: +system

+

+ +init_dontaudit_lock_pid( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to lock +init script pid files. +

+
+ +
+ +
+Module: +init

+Layer: +system

+

+ +init_filetrans_script_tmp( + + + + + domain + + + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + + )
+
+ +
+

+Create files in a init script +temporary data directory. +

+
+ +
+ +
Module: init

Layer: @@ -43870,7 +45701,7 @@ kernel

-Unconfined access to the kernel. +Unconfined access to kernel module resources.

@@ -44122,6 +45953,32 @@ Execute kudzu in the kudzu domain.
+Module: +kudzu

+Layer: +admin

+

+ +kudzu_getattr_exec_file( + + + + + domain + + + )
+
+ +
+

+Get attributes of kudzu executable. +

+
+ +
+ +
+Module: +libraries

+Layer: +system

+

+ +libs_manage_ld_so( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete the +dynamic link/loader. +

+
+ +
+ +
+Module: +libraries

+Layer: +system

+

+ +libs_manage_lib_files( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete generic +files in library directories. +

+
+ +
+ +
+Module: +libraries

+Layer: +system

+

+ +libs_manage_shared_libs( + + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete shared libraries. +

+
+ +
+ +
+Module: +libraries

+Layer: +system

+

+ +libs_relabel_ld_so( + + + + + domain + + + )
+
+ +
+

+Relabel to and from the type used for +the dynamic link/loader. +

+
+ +
+ +
+Module: +libraries

+Layer: +system

+

+ +libs_relabel_lib_files( + + + + + domain + + + )
+
+ +
+

+Relabel to and from the type used +for generic lib files. +

+
+ +
+ +
+Module: +libraries

+Layer: +system

+

+ +libs_relabel_shared_libs( + + + + + domain + + + )
+
+ +
+

+Relabel to and from the type used for +shared libraries. +

+
+ +
+ +
-Module: +Module: logging

Layer: system

-logging_create_log( +logging_domtrans_auditctl( - ? + domain )
@@ -44847,20 +46865,20 @@ system

-Summary is missing! +Execute auditctl in the auditctl domain.

-Module: +Module: logging

Layer: system

-logging_domtrans_auditctl( +logging_domtrans_syslog( @@ -44873,25 +46891,25 @@ system

-Execute auditctl in the auditctl domain. +Execute syslogd in the syslog domain.

-Module: +Module: logging

Layer: system

-logging_domtrans_syslog( +logging_dontaudit_getattr_all_logs( - domain + ? )
@@ -44899,25 +46917,25 @@ system

-Execute syslogd in the syslog domain. +Summary is missing!

-Module: +Module: logging

Layer: system

-logging_dontaudit_getattr_all_logs( +logging_exec_all_logs( - ? + domain )
@@ -44925,25 +46943,25 @@ system

-Summary is missing! +Execute all log files in the caller domain.

-Module: +Module: logging

Layer: system

-logging_exec_all_logs( +logging_filetrans_log( - domain + ? )
@@ -44951,7 +46969,7 @@ system

-Execute all log files in the caller domain. +Summary is missing!

@@ -45090,6 +47108,32 @@ Summary is missing!
+Module: +logging

+Layer: +system

+

+ +logging_read_audit_log( + + + + + domain + + + )
+
+ +
+

+Read the audit log. +

+
+ +
+ +
+Module: +logwatch

+Layer: +admin

+

+ +logwatch_read_tmp_files( + + + + + domain + + + )
+
+ +
+

+Read logwatch temporary files. +

+
+ +
+ +
+Module: +mount

+Layer: +system

+

+ +mount_exec( + + + + + domain + + + )
+
+ +
+

+Execute mount in the caller domain. +

+
+ +
+ +
+Module: +mta

+Layer: +services

+

+ +mta_filetrans_etc_aliases( + + + + + domain + + + )
+
+ +
+

+Type transition files created in /etc +to the mail address aliases type. +

+
+ +
+ +
+Module: +mta

+Layer: +services

+

+ +mta_filetrans_spool( + + + + + domain + + + + , + + + + private type + + + + , + + + + [ + + object + + ] + + + )
+
+ +
+

+Create private objects in the +mail spool directory. +

+
+ +
+ +
-Module: -postfix

-Layer: -services

-

- -postfix_create_config( - - - - - domain - - - - , - - - - private type - - - - , - - - - [ - - object - - ] - - - )
-
- -
-

-Create files with the specified type in -the postfix configuration directories. -

-
- -
- -
+Module: +postfix

+Layer: +services

+

+ +postfix_filetrans_config( + + + + + domain + + + + , + + + + private type + + + + , + + + + [ + + object + + ] + + + )
+
+ +
+

+Create files with the specified type in +the postfix configuration directories. +

+
+ +
+ +
+Module: +prelink

+Layer: +admin

+

+ +prelink_delete_cache( + + + + + file_type + + + )
+
+ +
+

+Delete the prelink cache. +

+
+ +
+ +
+Module: +prelink

+Layer: +admin

+

+ +prelink_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute the prelink program in the prelink domain. +

+
+ +
+ +
+Module: +prelink

+Layer: +admin

+

+ +prelink_manage_log( + + + + + file_type + + + )
+
+ +
+

+Create, read, write, and delete +prelink log files. +

+
+ +
+ +
+Module: +prelink

+Layer: +admin

+

+ +prelink_object_file( + + + + + file_type + + + )
+
+ +
+

+Make the specified file type prelinkable. +

+
+ +
+ +
+Module: +prelink

+Layer: +admin

+

+ +prelink_read_cache( + + + + + file_type + + + )
+
+ +
+

+Read the prelink cache. +

+
+ +
+ +
+Module: +rpm

+Layer: +admin

+

+ +rpm_script_domtrans( + + + + + domain + + + )
+
+ +
+

+Execute rpm_script programs in the rpm_script domain. +

+
+ +
+ +
Module: rpm

Layer: @@ -52662,8 +54989,52 @@ system

-Execute restorecon in the restorecon domain, and -allow the specified role the restorecon domain, +Execute restorecon in the restorecon domain, and +allow the specified role the restorecon domain, +and use the caller's terminal. +

+
+ +
+ +
+Module: +selinuxutil

+Layer: +system

+

+ +seutil_run_runinit( + + + + + domain + + + + , + + + + role + + + + , + + + + terminal + + + )
+
+ +
+

+Execute run_init in the run_init domain, and +allow the specified role the run_init domain, and use the caller's terminal.

@@ -52671,13 +55042,13 @@ and use the caller's terminal.
-Module: +Module: selinuxutil

Layer: system

-seutil_run_runinit( +seutil_run_setfiles( @@ -52706,8 +55077,8 @@ system

-Execute run_init in the run_init domain, and -allow the specified role the run_init domain, +Execute setfiles in the setfiles domain, and +allow the specified role the setfiles domain, and use the caller's terminal.

@@ -52715,13 +55086,13 @@ and use the caller's terminal.
-Module: +Module: selinuxutil

Layer: system

-seutil_run_setfiles( +seutil_search_default_contexts( @@ -52729,20 +55100,30 @@ system

domain - - , - - - - role - + )
+

+ +
+

+Search the policy directory with default_context files. +

+
+ +
+ +
+Module: +selinuxutil

+Layer: +system

+

+ +seutil_sigchld_newrole( - , - - terminal + ? )
@@ -52750,27 +55131,25 @@ system

-Execute setfiles in the setfiles domain, and -allow the specified role the setfiles domain, -and use the caller's terminal. +Summary is missing!

-Module: +Module: selinuxutil

Layer: system

-seutil_search_default_contexts( +seutil_use_newrole_fd( - domain + ? )
@@ -52778,20 +55157,20 @@ system

-Search the policy directory with default_context files. +Summary is missing!

-Module: +Module: selinuxutil

Layer: system

-seutil_sigchld_newrole( +seutil_use_runinit_fd( @@ -52811,18 +55190,18 @@ Summary is missing!
-Module: -selinuxutil

-Layer: -system

+Module: +slocate

+Layer: +apps

-seutil_use_newrole_fd( +slocate_create_append_log( - ? + domain )
@@ -52830,25 +55209,25 @@ system

-Summary is missing! +Create the locate log with append mode.

-Module: -selinuxutil

-Layer: -system

+Module: +slrnpull

+Layer: +services

-seutil_use_runinit_fd( +slrnpull_manage_spool( - ? + pty_type )
@@ -52856,7 +55235,60 @@ system

-Summary is missing! +Allow the domain to create, read, +write, and delete slrnpull spools. +

+
+ +
+ +
+Module: +slrnpull

+Layer: +services

+

+ +slrnpull_search_spool( + + + + + pty_type + + + )
+
+ +
+

+Allow the domain to search slrnpull spools. +

+
+ +
+ +
+Module: +smartmon

+Layer: +services

+

+ +smartmon_read_tmp( + + + + + domain + + + )
+
+ +
+

+Allow caller to read smartmon temporary files.

@@ -54001,13 +56433,13 @@ Execute su in the caller domain.
-Module: +Module: sysnetwork

Layer: system

-sysnet_create_config( +sysnet_dbus_chat_dhcpc( @@ -54020,21 +56452,21 @@ system

-Create files in /etc with the type used for -the network config files. +Send and receive messages from +dhcpc over dbus.

-Module: +Module: sysnetwork

Layer: system

-sysnet_create_dhcp_state( +sysnet_delete_dhcpc_pid( @@ -54042,45 +56474,25 @@ system

domain - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - )

-Create DHCP state data. +Delete the dhcp client pid file.

-Module: +Module: sysnetwork

Layer: system

-sysnet_dbus_chat_dhcpc( +sysnet_dns_name_resolve( @@ -54093,21 +56505,20 @@ system

-Send and receive messages from -dhcpc over dbus. +Perform a DNS name resolution.

-Module: +Module: sysnetwork

Layer: system

-sysnet_delete_dhcpc_pid( +sysnet_domtrans_dhcpc( @@ -54120,20 +56531,20 @@ system

-Delete the dhcp client pid file. +Execute dhcp client in dhcpc domain.

-Module: +Module: sysnetwork

Layer: system

-sysnet_dns_name_resolve( +sysnet_domtrans_ifconfig( @@ -54146,20 +56557,20 @@ system

-Perform a DNS name resolution. +Execute ifconfig in the ifconfig domain.

-Module: +Module: sysnetwork

Layer: system

-sysnet_domtrans_dhcpc( +sysnet_dontaudit_read_config( @@ -54172,20 +56583,20 @@ system

-Execute dhcp client in dhcpc domain. +Do not audit attempts to read network config files.

-Module: +Module: sysnetwork

Layer: system

-sysnet_domtrans_ifconfig( +sysnet_exec_ifconfig( @@ -54198,20 +56609,20 @@ system

-Execute ifconfig in the ifconfig domain. +Execute ifconfig in the caller domain.

-Module: +Module: sysnetwork

Layer: system

-sysnet_dontaudit_read_config( +sysnet_filetrans_config( @@ -54224,20 +56635,21 @@ system

-Do not audit attempts to read network config files. +Create files in /etc with the type used for +the network config files.

-Module: +Module: sysnetwork

Layer: system

-sysnet_exec_ifconfig( +sysnet_filetrans_dhcp_state( @@ -54245,12 +56657,32 @@ system

domain + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + )

-Execute ifconfig in the caller domain. +Create DHCP state data.

@@ -54708,6 +57140,32 @@ Connect and use remote port mappers.
+Module: +sysstat

+Layer: +services

+

+ +sysstat_manage_log( + + + + + domain + + + )
+
+ +
+

+Manage sysstat logs. +

+
+ +
+ +
+Module: +terminal

+Layer: +kernel

+

+ +term_dontaudit_ioctl_unallocated_ttys( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to ioctl +unallocated tty device nodes. +

+
+ +
+ +
+Module: +terminal

+Layer: +kernel

+

+ +term_dontaudit_search_ptys( + + + + + domain + + + )
+
+ +
+

+Do not audit attempts to search the +contents of the /dev/pts directory. +

+
+ +
+ +
+Module: +terminal

+Layer: +kernel

+

+ +term_read_console( + + + + + domain + + + )
+
+ +
+

+Read from the console. +

+
+ +
+ +
+Module: +ucspitcp

+Layer: +services

+

+ +ucspitcp_service_domain( + + + + + domain + + + + , + + + + entrypoint + + + )
+
+ +
+

+Define a specified domain as a ucspitcp service. +

+
+ +
+ +
-Module: -userdomain

-Layer: -system

+Module: +usbmodules

+Layer: +admin

-userdom_create_generic_user_home( +usbmodules_domtrans( @@ -56481,38 +59053,25 @@ system

domain - - , - - - - [ - - object_class - - ] - - )

-Create objects in generic user home directories -with automatic file type transition. +Execute usbmodules in the usbmodules domain.

-Module: -userdomain

-Layer: -system

+Module: +usbmodules

+Layer: +admin

-userdom_create_generic_user_home_dir( +usbmodules_run( @@ -56520,13 +59079,30 @@ system

domain + + , + + + + role + + + + , + + + + terminal + + )

-Create generic user home directories -with automatic file type transition. +Execute usbmodules in the usbmodules domain, and +allow the specified role the usbmodules domain, +and use the caller's terminal.

@@ -56972,6 +59548,72 @@ user ttys.
+Module: +userdomain

+Layer: +system

+

+ +userdom_filetrans_generic_user_home( + + + + + domain + + + + , + + + + [ + + object_class + + ] + + + )
+
+ +
+

+Create objects in generic user home directories +with automatic file type transition. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_filetrans_generic_user_home_dir( + + + + + domain + + + )
+
+ +
+

+Create generic user home directories +with automatic file type transition. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_unpriv_user_semaphores( + + + + + domain + + + )
+
+ +
+

+Manage unpriviledged user SysV sempaphores. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_unpriv_user_shared_mem( + + + + + domain + + + )
+
+ +
+

+Manage unpriviledged user SysV shared +memory segments. +

+
+ +
+ +
+Module: +vbetool

+Layer: +admin

+

+ +vbetool_domtrans( + + + + + [ + + domain + + ] + + + )
+
+ +
+

+Execute vbetool application in the vbetool domain. +

+
+ +
+ +
+Module: +vpn

+Layer: +admin

+

+ +vpn_signal( + + + + + domain + + + )
+
+ +
+

+Send generic signals to VPN clients. +

+
+ +
+ +
Module: webalizer

Layer: diff --git a/www/api-docs/kernel.html b/www/api-docs/kernel.html index 5667144..ac3a835 100644 --- a/www/api-docs/kernel.html +++ b/www/api-docs/kernel.html @@ -92,7 +92,8 @@

Layer: kernel

-Policy for kernel threads, proc filesystem,and unlabeled processes and objects. +Policy for kernel threads, proc filesystem, +and unlabeled processes and objects.


@@ -152,7 +153,8 @@ Basic filesystem types and interfaces.
kernel

-Policy for kernel threads, proc filesystem,and unlabeled processes and objects. +Policy for kernel threads, proc filesystem, +and unlabeled processes and objects.

diff --git a/www/api-docs/kernel_bootloader.html b/www/api-docs/kernel_bootloader.html index 5ec0660..a5dd10e 100644 --- a/www/api-docs/kernel_bootloader.html +++ b/www/api-docs/kernel_bootloader.html @@ -101,13 +101,13 @@

Interfaces:

- +
-bootloader_create_kernel( +bootloader_create_kernel_img( @@ -185,18 +185,18 @@ No
- +
-bootloader_create_modules( +bootloader_create_runtime_file( - ? + domain )
@@ -205,7 +205,8 @@ No
Summary

-Summary is missing! +Read and write the bootloader +temporary data in /tmp.

@@ -214,10 +215,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +The type of the process performing this action. No @@ -227,13 +228,13 @@ No
- +
-bootloader_create_runtime_file( +bootloader_delete_kernel( @@ -247,8 +248,7 @@ No
Summary

-Read and write the bootloader -temporary data in /tmp. +Delete a kernel from /boot.

@@ -270,13 +270,13 @@ No
- +
-bootloader_delete_kernel( +bootloader_delete_kernel_symbol_table( @@ -290,7 +290,7 @@ No
Summary

-Delete a kernel from /boot. +Delete a system.map in the /boot directory.

@@ -312,13 +312,13 @@ No
- +
-bootloader_delete_kernel_symbol_table( +bootloader_domtrans( @@ -332,7 +332,7 @@ No
Summary

-Delete a system.map in the /boot directory. +Execute bootloader in the bootloader domain.

@@ -354,13 +354,13 @@ No
- +
-bootloader_domtrans( +bootloader_dontaudit_getattr_boot_dir( @@ -374,7 +374,8 @@ No
Summary

-Execute bootloader in the bootloader domain. +Do not audit attempts to get attributes +of the /boot directory.

@@ -386,7 +387,7 @@ Execute bootloader in the bootloader domain. domain -The type of the process performing this action. +Domain to not audit. No @@ -396,13 +397,13 @@ No
- +
-bootloader_dontaudit_getattr_boot_dir( +bootloader_dontaudit_search_boot( @@ -416,8 +417,7 @@ No
Summary

-Do not audit attempts to get attributes -of the /boot directory. +Do not audit attempts to search the /boot directory.

@@ -429,7 +429,7 @@ of the /boot directory. domain -Domain to not audit. +The type of the process performing this action. No @@ -439,13 +439,55 @@ No
- +
-bootloader_dontaudit_search_boot( +bootloader_filetrans_modules( + + + + + ? + + + )
+
+
+ +
Summary
+

+Summary is missing! +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+? + + +Parameter descriptions are missing! + + +No +
+
+
+ + +
+ + +
+ +bootloader_getattr_boot_dir( @@ -459,7 +501,7 @@ No
Summary

-Do not audit attempts to search the /boot directory. +Get attributes of the /boot directory.

@@ -471,7 +513,7 @@ Do not audit attempts to search the /boot directory. domain -The type of the process performing this action. +Domain to not audit. No diff --git a/www/api-docs/kernel_corecommands.html b/www/api-docs/kernel_corecommands.html index 9068d76..c44acb3 100644 --- a/www/api-docs/kernel_corecommands.html +++ b/www/api-docs/kernel_corecommands.html @@ -746,6 +746,174 @@ No
+ +
+ + +
+ +corecmd_manage_bin_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete bin files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +corecmd_manage_sbin_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete sbin files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +corecmd_mmap_bin_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Mmap a bin file as executable. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +corecmd_mmap_sbin_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Mmap a sbin file as executable. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1082,6 +1250,90 @@ No
+ +
+ + +
+ +corecmd_relabel_bin_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Relabel to and from the bin type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +corecmd_relabel_sbin_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Relabel to and from the sbin type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/kernel_corenetwork.html b/www/api-docs/kernel_corenetwork.html index 11e61b8..6697c54 100644 --- a/www/api-docs/kernel_corenetwork.html +++ b/www/api-docs/kernel_corenetwork.html @@ -610,6 +610,48 @@ No
+ +
+ + +
+ +corenet_raw_receive_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Receive raw IP packets on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -1114,6 +1156,48 @@ No
+ +
+ + +
+ +corenet_raw_send_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send raw IP packets on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -1618,6 +1702,48 @@ No
+ +
+ + +
+ +corenet_raw_sendrecv_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive raw IP packets on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -12034,6 +12160,48 @@ No
+ +
+ + +
+ +corenet_tcp_sendrecv_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive TCP network traffic on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -20434,6 +20602,48 @@ No
+ +
+ + +
+ +corenet_udp_receive_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Receive UDP network traffic on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -24676,6 +24886,48 @@ No
+ +
+ + +
+ +corenet_udp_send_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send UDP network traffic on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -28918,6 +29170,48 @@ No
+ +
+ + +
+ +corenet_udp_sendrecv_lo_if( + + + + + domain + + + )
+
+
+ +
Summary
+

+Send and receive UDP network traffic on the lo interface. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
diff --git a/www/api-docs/kernel_devices.html b/www/api-docs/kernel_devices.html index 02f9001..28977b7 100644 --- a/www/api-docs/kernel_devices.html +++ b/www/api-docs/kernel_devices.html @@ -252,86 +252,6 @@ No
- -
- - -
- -dev_create_dev_node( - - - - - domain - - - - , - - - - file - - - - , - - - - objectclass(es) - - - )
-
-
- -
Summary
-

-Create, read, and write device nodes. The node -will be transitioned to the type provided. -

- - -
Parameters
- - - - - - - - - -
Parameter:Description:Optional:
-domain - - -Domain allowed access. - - -No -
-file - - -Type to which the created node will be transitioned. - - -No -
-objectclass(es) - - -Object class(es) (single or set including {}) for which this -the transition will occur. - - -No -
-
-
-
@@ -795,6 +715,48 @@ No
+ +
+ + +
+ +dev_dontaudit_getattr_memory_dev( + + + + + domain + + + )
+
+
+ +
Summary
+

+dontaudit getattr raw memory devices (e.g. /dev/mem). +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1646,6 +1608,86 @@ No
+ +
+ + +
+ +dev_filetrans_dev_node( + + + + + domain + + + + , + + + + file + + + + , + + + + objectclass(es) + + + )
+
+
+ +
Summary
+

+Create, read, and write device nodes. The node +will be transitioned to the type provided. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+file + + +Type to which the created node will be transitioned. + + +No +
+objectclass(es) + + +Object class(es) (single or set including {}) for which this +the transition will occur. + + +No +
+
+
+
diff --git a/www/api-docs/kernel_domain.html b/www/api-docs/kernel_domain.html index c72992b..81fe238 100644 --- a/www/api-docs/kernel_domain.html +++ b/www/api-docs/kernel_domain.html @@ -1543,6 +1543,91 @@ No
+ +
+ + +
+ +domain_manage_all_entry_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete all +entrypoint files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +domain_mmap_all_entry_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Mmap all entry point files as executable. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -1754,6 +1839,49 @@ No
+ +
+ + +
+ +domain_relabel_all_entry_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Relabel to and from all entry point +file types. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/kernel_files.html b/www/api-docs/kernel_files.html index 4db3242..b7ed449 100644 --- a/www/api-docs/kernel_files.html +++ b/www/api-docs/kernel_files.html @@ -244,13 +244,13 @@ No
- +
-files_create_etc_config( +files_delete_all_locks( @@ -286,26 +286,18 @@ No
- +
-files_create_home_dirs( - - - - - domain - +files_delete_all_pid_dirs( - , - - home_type + ? )
@@ -314,7 +306,7 @@ No
Summary

-Create home directories +Summary is missing!

@@ -323,20 +315,52 @@ Create home directories Parameter:Description:Optional: -domain +? -The type of the process performing this action. +Parameter descriptions are missing! No + +
+
+ + +
+ + +
+ +files_delete_all_pids( + + + + + ? + + + )
+
+
+ +
Summary
+

+Summary is missing! +

+ + +
Parameters
+ + + -
Parameter:Description:Optional:
-home_type +? -The type of the home directory +Parameter descriptions are missing! No @@ -346,18 +370,18 @@ No - +
-files_create_lock( +files_delete_etc_files( - ? + domain )
@@ -366,7 +390,7 @@ No
Summary

-Summary is missing! +Delete system configuration files in /etc.

@@ -375,10 +399,10 @@ Summary is missing!
Parameter:Description:Optional:
-? +domain -Parameter descriptions are missing! +The type of the process performing this action. No @@ -388,13 +412,13 @@ No - +
-files_create_pid( +files_delete_root_dir_entry( @@ -430,13 +454,13 @@ No
- +
-files_create_root( +files_dontaudit_getattr_all_dirs( @@ -444,39 +468,14 @@ No domain - - , - - - - [ - - private type - - ] - - - - , - - - - [ - - object - - ] - - )
Summary

-Create an object in the root directory, with a private -type. If no object class is specified, the -default is file. +Do not audit attempts to get the attributes +of all directories.

@@ -488,51 +487,71 @@ default is file. domain
-The type of the process performing this action. +Domain to not audit. No
-private type - +
+
+
-The type of the object to be created. If no type -is specified, the type of the root directory will -be used. + +
- -yes - + +
+ +files_dontaudit_getattr_all_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of all files. +

+ + +
Parameters
+ +
Parameter:Description:Optional:
-object +domain -The object class of the object being created. If -no class is specified, file will be used. +Domain to not audit. -yes +No
- +
-files_create_tmp_files( +files_dontaudit_getattr_all_pipes( - ? + domain )
@@ -541,7 +560,8 @@ yes
Summary

-Summary is missing! +Do not audit attempts to get the attributes +of all named pipes.

@@ -550,10 +570,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain to not audit. No @@ -563,13 +583,13 @@ No
- +
-files_create_usr( +files_dontaudit_getattr_all_sockets( @@ -577,33 +597,14 @@ No domain - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - )
Summary

-Create objects in the /usr directory +Do not audit attempts to get the attributes +of all named sockets.

@@ -615,43 +616,66 @@ Create objects in the /usr directory domain -Domain allowed access. +Domain to not audit. No - -file_type - + +
+
-The type of the object to be created + +
- -No - + +
+ +files_dontaudit_getattr_all_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of all symbolic links. +

+ + +
Parameters
+ +
Parameter:Description:Optional:
-object_class +domain -The object class. If not specified, file is used. +Domain to not audit. -yes +No
- +
-files_create_var( +files_dontaudit_getattr_default_dir( @@ -659,33 +683,14 @@ yes domain - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - )
Summary

-Create objects in the /var directory +Do not audit attempts to get the attributes of +directories with the default file type.

@@ -697,43 +702,66 @@ Create objects in the /var directory domain -Domain allowed access. +Domain to not audit. No - -file_type - + +
+
-The type of the object to be created + +
- -No - + +
+ +files_dontaudit_getattr_default_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes of +files with the default file type. +

+ + +
Parameters
+ +
Parameter:Description:Optional:
-object_class +domain -The object class. If not specified, file is used. +Domain to not audit. -yes +No
- +
-files_create_var_lib( +files_dontaudit_getattr_home_dir( @@ -741,33 +769,15 @@ yes domain - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - )
Summary

-Create objects in the /var/lib directory +Do not audit attempts to get the +attributes of the home directories root +(/home).

@@ -779,48 +789,71 @@ Create objects in the /var/lib directory domain -Domain allowed access. +Domain to not audit. No - -file_type - + +
+
-The type of the object to be created + +
- -No - + +
+ +files_dontaudit_getattr_non_security_blk_dev( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to get the attributes +of non security block devices. +

+ + +
Parameters
+ +
Parameter:Description:Optional:
-object_class +domain -The object class. If not specified, file is used. +Domain to not audit. -yes +No
- +
-files_delete_all_locks( +files_dontaudit_getattr_non_security_chr_dev( - ? + domain )
@@ -829,7 +862,8 @@ yes
Summary

-Summary is missing! +Do not audit attempts to get the attributes +of non security character devices.

@@ -838,10 +872,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain to not audit. No @@ -851,18 +885,18 @@ No
- +
-files_delete_all_pid_dirs( +files_dontaudit_getattr_non_security_files( - ? + domain )
@@ -871,7 +905,8 @@ No
Summary

-Summary is missing! +Do not audit attempts to get the attributes +of non security files.

@@ -880,10 +915,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain to not audit. No @@ -893,18 +928,18 @@ No
- +
-files_delete_all_pids( +files_dontaudit_getattr_non_security_pipes( - ? + domain )
@@ -913,7 +948,8 @@ No
Summary

-Summary is missing! +Do not audit attempts to get the attributes +of non security named pipes.

@@ -922,10 +958,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain to not audit. No @@ -935,13 +971,13 @@ No
- +
-files_delete_etc_files( +files_dontaudit_getattr_non_security_sockets( @@ -955,7 +991,8 @@ No
Summary

-Delete system configuration files in /etc. +Do not audit attempts to get the attributes +of non security named sockets.

@@ -967,7 +1004,7 @@ Delete system configuration files in /etc. domain -The type of the process performing this action. +Domain to not audit. No @@ -977,18 +1014,18 @@ No
- +
-files_delete_root_dir_entry( +files_dontaudit_getattr_non_security_symlinks( - ? + domain )
@@ -997,7 +1034,8 @@ No
Summary

-Summary is missing! +Do not audit attempts to get the attributes +of non security symbolic links.

@@ -1006,10 +1044,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain to not audit. No @@ -1019,13 +1057,13 @@ No
- +
-files_dontaudit_getattr_all_dirs( +files_dontaudit_getattr_pid_dir( @@ -1040,7 +1078,7 @@ No
Summary

Do not audit attempts to get the attributes -of all directories. +of the /var/run directory.

@@ -1062,13 +1100,13 @@ No
- +
-files_dontaudit_getattr_all_files( +files_dontaudit_getattr_tmp_dir( @@ -1082,8 +1120,8 @@ No
Summary

-Do not audit attempts to get the attributes -of all files. +Do not audit attempts to get the +attributes of the tmp directory (/tmp).

@@ -1095,7 +1133,7 @@ of all files. domain -Domain to not audit. +The type of the process performing this action. No @@ -1105,13 +1143,13 @@ No
- +
-files_dontaudit_getattr_all_pipes( +files_dontaudit_ioctl_all_pids( @@ -1125,8 +1163,7 @@ No
Summary

-Do not audit attempts to get the attributes -of all named pipes. +Do not audit attempts to ioctl daemon runtime data files.

@@ -1138,7 +1175,7 @@ of all named pipes. domain -Domain to not audit. +The type of the process performing this action. No @@ -1148,13 +1185,13 @@ No
- +
-files_dontaudit_getattr_all_sockets( +files_dontaudit_list_default( @@ -1168,8 +1205,8 @@ No
Summary

-Do not audit attempts to get the attributes -of all named sockets. +Do not audit attempts to list contents of +directories with the default file type.

@@ -1191,13 +1228,13 @@ No
- +
-files_dontaudit_getattr_all_symlinks( +files_dontaudit_list_home( @@ -1211,8 +1248,8 @@ No
Summary

-Do not audit attempts to get the attributes -of all symbolic links. +Do not audit attempts to list +home directories root (/home).

@@ -1234,13 +1271,13 @@ No
- +
-files_dontaudit_getattr_default_dir( +files_dontaudit_list_non_security( @@ -1254,8 +1291,8 @@ No
Summary

-Do not audit attempts to get the attributes of -directories with the default file type. +Do not audit attempts to list all +non-security directories.

@@ -1277,13 +1314,13 @@ No
- +
-files_dontaudit_getattr_default_files( +files_dontaudit_list_tmp( @@ -1297,8 +1334,7 @@ No
Summary

-Do not audit attempts to get the attributes of -files with the default file type. +Do not audit listing of the tmp directory (/tmp).

@@ -1310,7 +1346,7 @@ files with the default file type. domain -Domain to not audit. +Domain not to audit. No @@ -1320,13 +1356,13 @@ No
- +
-files_dontaudit_getattr_home_dir( +files_dontaudit_read_default_files( @@ -1340,9 +1376,8 @@ No
Summary

-Do not audit attempts to get the -attributes of the home directories root -(/home). +Do not audit attempts to read files +with the default file type.

@@ -1364,13 +1399,13 @@ No
- +
-files_dontaudit_getattr_non_security_blk_dev( +files_dontaudit_read_etc_runtime_files( @@ -1384,8 +1419,9 @@ No
Summary

-Do not audit attempts to get the attributes -of non security block devices. +Do not audit attempts to read files +in /etc that are dynamically +created on boot, such as mtab.

@@ -1407,18 +1443,18 @@ No
- +
-files_dontaudit_getattr_non_security_chr_dev( +files_dontaudit_read_root_file( - domain + ? )
@@ -1427,8 +1463,7 @@ No
Summary

-Do not audit attempts to get the attributes -of non security character devices. +Summary is missing!

@@ -1437,10 +1472,10 @@ of non security character devices. Parameter:Description:Optional: -domain +? -Domain to not audit. +Parameter descriptions are missing! No @@ -1450,18 +1485,18 @@ No
- +
-files_dontaudit_getattr_non_security_files( +files_dontaudit_rw_root_chr_dev( - domain + ? )
@@ -1470,8 +1505,7 @@ No
Summary

-Do not audit attempts to get the attributes -of non security files. +Summary is missing!

@@ -1480,10 +1514,10 @@ of non security files. Parameter:Description:Optional: -domain +? -Domain to not audit. +Parameter descriptions are missing! No @@ -1493,18 +1527,18 @@ No
- +
-files_dontaudit_getattr_non_security_pipes( +files_dontaudit_rw_root_file( - domain + ? )
@@ -1513,8 +1547,7 @@ No
Summary

-Do not audit attempts to get the attributes -of non security named pipes. +Summary is missing!

@@ -1523,10 +1556,10 @@ of non security named pipes. Parameter:Description:Optional: -domain +? -Domain to not audit. +Parameter descriptions are missing! No @@ -1536,18 +1569,18 @@ No
- +
-files_dontaudit_getattr_non_security_sockets( +files_dontaudit_search_all_dirs( - domain + ? )
@@ -1556,8 +1589,7 @@ No
Summary

-Do not audit attempts to get the attributes -of non security named sockets. +Summary is missing!

@@ -1566,10 +1598,10 @@ of non security named sockets. Parameter:Description:Optional: -domain +? -Domain to not audit. +Parameter descriptions are missing! No @@ -1579,13 +1611,13 @@ No
- +
-files_dontaudit_getattr_non_security_symlinks( +files_dontaudit_search_home( @@ -1599,8 +1631,8 @@ No
Summary

-Do not audit attempts to get the attributes -of non security symbolic links. +Do not audit attempts to search +home directories root (/home).

@@ -1622,13 +1654,13 @@ No
- +
-files_dontaudit_getattr_pid_dir( +files_dontaudit_search_isid_type_dir( @@ -1642,8 +1674,8 @@ No
Summary

-Do not audit attempts to get the attributes -of the /var/run directory. +Do not audit attempts to search directories on new filesystems +that have not yet been labeled.

@@ -1655,7 +1687,7 @@ of the /var/run directory. domain -Domain to not audit. +The type of the process performing this action. No @@ -1665,13 +1697,13 @@ No
- +
-files_dontaudit_getattr_tmp_dir( +files_dontaudit_search_locks( @@ -1685,8 +1717,8 @@ No
Summary

-Do not audit attempts to get the -attributes of the tmp directory (/tmp). +Do not audit attempts to search the +locks directory (/var/lock).

@@ -1698,7 +1730,7 @@ attributes of the tmp directory (/tmp). domain -The type of the process performing this action. +Domain to not audit. No @@ -1708,13 +1740,13 @@ No
- +
-files_dontaudit_ioctl_all_pids( +files_dontaudit_search_pids( @@ -1728,7 +1760,8 @@ No
Summary

-Do not audit attempts to ioctl daemon runtime data files. +Do not audit attempts to search +the /var/run directory.

@@ -1740,7 +1773,7 @@ Do not audit attempts to ioctl daemon runtime data files. domain -The type of the process performing this action. +Domain to not audit. No @@ -1750,18 +1783,18 @@ No
- +
-files_dontaudit_list_default( +files_dontaudit_search_src( - domain + ? )
@@ -1770,8 +1803,7 @@ No
Summary

-Do not audit attempts to list contents of -directories with the default file type. +Summary is missing!

@@ -1780,10 +1812,10 @@ directories with the default file type. Parameter:Description:Optional: -domain +? -Domain to not audit. +Parameter descriptions are missing! No @@ -1793,13 +1825,13 @@ No
- +
-files_dontaudit_list_non_security( +files_dontaudit_search_var( @@ -1813,8 +1845,8 @@ No
Summary

-Do not audit attempts to list all -non security directories. +Do not audit attempts to search +the contents of /var.

@@ -1836,13 +1868,13 @@ No
- +
-files_dontaudit_read_default_files( +files_dontaudit_write_all_pids( @@ -1856,8 +1888,7 @@ No
Summary

-Do not audit attempts to read files -with the default file type. +Do not audit attempts to write to daemon runtime data files.

@@ -1869,7 +1900,7 @@ with the default file type. domain -Domain to not audit. +The type of the process performing this action. No @@ -1879,13 +1910,13 @@ No
- +
-files_dontaudit_read_etc_runtime_files( +files_dontaudit_write_var( @@ -1899,9 +1930,7 @@ No
Summary

-Do not audit attempts to read files -in /etc that are dynamically -created on boot, such as mtab. +Do not audit attempts to write to /var.

@@ -1923,13 +1952,13 @@ No
- +
-files_dontaudit_read_root_file( +files_exec_etc_files( @@ -1965,18 +1994,18 @@ No
- +
-files_dontaudit_rw_root_chr_dev( +files_exec_usr_files( - ? + domain )
@@ -1985,7 +2014,7 @@ No
Summary

-Summary is missing! +Execute generic programs in /usr in the caller domain.

@@ -1994,10 +2023,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +The type of the process performing this action. No @@ -2007,18 +2036,18 @@ No
- +
-files_dontaudit_rw_root_file( +files_exec_usr_src_files( - ? + domain )
@@ -2027,7 +2056,7 @@ No
Summary

-Summary is missing! +Execute programs in /usr/src in the caller domain.

@@ -2036,10 +2065,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +The type of the process performing this action. No @@ -2049,13 +2078,13 @@ No
- +
-files_dontaudit_search_all_dirs( +files_filetrans_etc( @@ -2091,13 +2120,13 @@ No
- +
-files_dontaudit_search_home( +files_filetrans_home( @@ -2105,14 +2134,33 @@ No domain + + , + + + + home_type + + + + , + + + + [ + + object + + ] + + )
Summary

-Do not audit attempts to search -home directories root (/home). +Create objects in /home.

@@ -2124,28 +2172,49 @@ home directories root (/home). domain -Domain to not audit. +The type of the process performing this action. + + +No + + + +home_type + + +The private type. No + +object + + +The object class of the object being created. If +no class is specified, dir will be used. + + +yes + +
- +
-files_dontaudit_search_isid_type_dir( +files_filetrans_lock( - domain + ? )
@@ -2154,8 +2223,7 @@ No
Summary

-Do not audit attempts to search directories on new filesystems -that have not yet been labeled. +Summary is missing!

@@ -2164,10 +2232,10 @@ that have not yet been labeled. Parameter:Description:Optional: -domain +? -The type of the process performing this action. +Parameter descriptions are missing! No @@ -2177,18 +2245,18 @@ No
- +
-files_dontaudit_search_locks( +files_filetrans_pid( - domain + ? )
@@ -2197,8 +2265,7 @@ No
Summary

-Do not audit attempts to search the -locks directory (/var/lock). +Summary is missing!

@@ -2207,10 +2274,10 @@ locks directory (/var/lock). Parameter:Description:Optional: -domain +? -Domain to not audit. +Parameter descriptions are missing! No @@ -2220,13 +2287,13 @@ No
- +
-files_dontaudit_search_pids( +files_filetrans_root( @@ -2234,14 +2301,34 @@ No domain + + , + + + + private type + + + + , + + + + [ + + object + + ] + + )
Summary

-Do not audit attempts to search -the /var/run directory. +Create an object in the root directory, with a private +type.

@@ -2253,23 +2340,44 @@ the /var/run directory. domain -Domain to not audit. +The type of the process performing this action. + + +No + + + +private type + + +The type of the object to be created. No + +object + + +The object class of the object being created. If +no class is specified, file will be used. + + +yes + +
- +
-files_dontaudit_search_src( +files_filetrans_tmp( @@ -2305,13 +2413,13 @@ No
- +
-files_dontaudit_search_var( +files_filetrans_usr( @@ -2319,14 +2427,33 @@ No domain + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + )
Summary

-Do not audit attempts to search -the contents of /var. +Create objects in the /usr directory

@@ -2338,23 +2465,43 @@ the contents of /var. domain -Domain to not audit. +Domain allowed access. + + +No + + + +file_type + + +The type of the object to be created No + +object_class + + +The object class. If not specified, file is used. + + +yes + +
- +
-files_dontaudit_write_all_pids( +files_filetrans_var( @@ -2362,13 +2509,33 @@ No domain + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + )
Summary

-Do not audit attempts to write to daemon runtime data files. +Create objects in the /var directory

@@ -2380,28 +2547,68 @@ Do not audit attempts to write to daemon runtime data files. domain -The type of the process performing this action. +Domain allowed access. + + +No + + + +file_type + + +The type of the object to be created No + +object_class + + +The object class. If not specified, file is used. + + +yes + +
- +
-files_exec_etc_files( +files_filetrans_var_lib( - ? + domain + + + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] )
@@ -2410,7 +2617,7 @@ No
Summary

-Summary is missing! +Create objects in the /var/lib directory

@@ -2419,26 +2626,46 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain allowed access. + + +No + + + +file_type + + +The type of the object to be created No + +object_class + + +The object class. If not specified, file is used. + + +yes + +
- +
-files_exec_usr_files( +files_getattr_all_dirs( @@ -2452,7 +2679,7 @@ No
Summary

-Execute generic programs in /usr in the caller domain. +Get the attributes of all directories.

@@ -2464,7 +2691,7 @@ Execute generic programs in /usr in the caller domain. domain -The type of the process performing this action. +Domain allowed access. No @@ -2474,13 +2701,13 @@ No
- +
-files_exec_usr_src_files( +files_getattr_all_file_type_sockets( @@ -2494,7 +2721,8 @@ No
Summary

-Execute programs in /usr/src in the caller domain. +Get the attributes of all sockets +with the type of a file.

@@ -2506,7 +2734,7 @@ Execute programs in /usr/src in the caller domain. domain -The type of the process performing this action. +Domain allowed access. No @@ -2516,13 +2744,13 @@ No
- +
-files_getattr_all_dirs( +files_getattr_all_files( @@ -2536,7 +2764,7 @@ No
Summary

-Get the attributes of all directories. +Get the attributes of all files.

@@ -2558,13 +2786,13 @@ No
- +
-files_getattr_all_file_type_sockets( +files_getattr_all_pipes( @@ -2578,8 +2806,7 @@ No
Summary

-Get the attributes of all sockets -with the type of a file. +Get the attributes of all named pipes.

@@ -2601,13 +2828,13 @@ No
- +
-files_getattr_all_files( +files_getattr_all_sockets( @@ -2621,7 +2848,7 @@ No
Summary

-Get the attributes of all files. +Get the attributes of all named sockets.

@@ -2643,13 +2870,13 @@ No
- +
-files_getattr_all_pipes( +files_getattr_all_symlinks( @@ -2663,7 +2890,7 @@ No
Summary

-Get the attributes of all named pipes. +Get the attributes of all symbolic links.

@@ -2685,13 +2912,13 @@ No
- +
-files_getattr_all_sockets( +files_getattr_default_dir( @@ -2705,7 +2932,7 @@ No
Summary

-Get the attributes of all named sockets. +Getattr of directories with the default file type.

@@ -2727,18 +2954,18 @@ No
- +
-files_getattr_all_symlinks( +files_getattr_generic_locks( - domain + ? )
@@ -2747,7 +2974,7 @@ No
Summary

-Get the attributes of all symbolic links. +Summary is missing!

@@ -2756,10 +2983,10 @@ Get the attributes of all symbolic links. Parameter:Description:Optional: -domain +? -Domain allowed access. +Parameter descriptions are missing! No @@ -2769,18 +2996,18 @@ No
- +
-files_getattr_generic_locks( +files_getattr_home_dir( - ? + domain )
@@ -2789,7 +3016,8 @@ No
Summary

-Summary is missing! +Get the attributes of the home directories root +(/home).

@@ -2798,10 +3026,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +The type of the process performing this action. No @@ -2811,13 +3039,13 @@ No
- +
-files_getattr_home_dir( +files_getattr_isid_type_dir( @@ -2831,8 +3059,8 @@ No
Summary

-Get the attributes of the home directories root -(/home). +Getattr of directories on new filesystems +that have not yet been labeled.

@@ -3275,6 +3503,48 @@ No
+ +
+ + +
+ +files_list_non_security( + + + + + domain + + + )
+
+
+ +
Summary
+

+List all non-security directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -4613,6 +4883,49 @@ No
+ +
+ + +
+ +files_mounton_all_poly_members( + + + + + domain + + + )
+
+
+ +
Summary
+

+Mount filesystems on all polyinstantiation +member directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -5019,6 +5332,49 @@ No
+ +
+ + +
+ +files_polyinstantiate_all( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow access to manage all polyinstantiated +directories on the system. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -5319,6 +5675,48 @@ yes
+ +
+ + +
+ +files_read_all_locks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read all lock files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -5435,7 +5833,7 @@ No
Summary

-Read all symbloic links on the filesystem, except +Read all symbolic links on the filesystem, except the listed exceptions.

@@ -5891,6 +6289,48 @@ No
+ +
+ + +
+ +files_read_non_security_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read all non-security files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -7816,6 +8256,48 @@ No
+ +
+ + +
+ +files_write_non_security_dir( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow attempts to modify any directory +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to allow + + +No +
+
+
+ Return diff --git a/www/api-docs/kernel_filesystem.html b/www/api-docs/kernel_filesystem.html index 081f402..3b6ec3d 100644 --- a/www/api-docs/kernel_filesystem.html +++ b/www/api-docs/kernel_filesystem.html @@ -318,18 +318,18 @@ No
- +
-fs_create_tmpfs_data( +fs_donaudit_read_removable_files( - ? + domain )
@@ -338,7 +338,7 @@ No
Summary

-Summary is missing! +Do not audit attempts to read removable storage files.

@@ -347,10 +347,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain not to audit. No @@ -620,6 +620,49 @@ No
+ +
+ + +
+ +fs_dontaudit_list_auto_mountpoints( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to list directories of automatically +mounted filesystems. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the domain performing this action. + + +No +
+
+
+
@@ -706,6 +749,48 @@ No
+ +
+ + +
+ +fs_dontaudit_list_removable_dirs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to list removable storage directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain not to audit. + + +No +
+
+
+
@@ -1097,6 +1182,91 @@ No
+ +
+ + +
+ +fs_dontaudit_rw_tmpfs_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to read or write +generic tmpfs files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+ + +
+ + +
+ +fs_dontaudit_use_tmpfs_chr_dev( + + + + + domain + + + )
+
+
+ +
Summary
+

+dontaudit Read and write character nodes on tmpfs filesystems. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
@@ -1226,6 +1396,48 @@ No
+ +
+ + +
+ +fs_filetrans_tmpfs( + + + + + ? + + + )
+
+
+ +
Summary
+

+Summary is missing! +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+? + + +Parameter descriptions are missing! + + +No +
+
+
+
@@ -2056,7 +2268,138 @@ No
-fs_getattr_tmpfs( +fs_getattr_tmpfs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of a tmpfs +filesystem. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the domain doing the +getattr on the filesystem. + + +No +
+
+
+ + +
+ + +
+ +fs_getattr_tmpfs_dir( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of tmpfs directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_getattr_xattr_fs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Get the attributes of a persistent +filesystem which has extended +attributes, such as ext3, JFS, or XFS. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the domain doing the +getattr on the filesystem. + + +No +
+
+
+ + +
+ + +
+ +fs_list_all( @@ -2070,8 +2413,7 @@ No
Summary

-Get the attributes of a tmpfs -filesystem. +List all directories with a filesystem type.

@@ -2083,8 +2425,7 @@ filesystem. domain -The type of the domain doing the -getattr on the filesystem. +Domain allowed access. No @@ -2094,13 +2435,13 @@ No
- +
-fs_getattr_tmpfs_dir( +fs_list_auto_mountpoints( @@ -2114,7 +2455,8 @@ No
Summary

-Get the attributes of tmpfs directories. +Read directories of automatically +mounted filesystems.

@@ -2126,7 +2468,7 @@ Get the attributes of tmpfs directories. domain -Domain allowed access. +The type of the domain performing this action. No @@ -2136,13 +2478,13 @@ No
- +
-fs_getattr_xattr_fs( +fs_list_cifs( @@ -2156,9 +2498,8 @@ No
Summary

-Get the attributes of a persistent -filesystem which has extended -attributes, such as ext3, JFS, or XFS. +List the contents of directories on a +CIFS or SMB filesystem.

@@ -2170,8 +2511,7 @@ attributes, such as ext3, JFS, or XFS. domain -The type of the domain doing the -getattr on the filesystem. +Domain allowed access. No @@ -2181,13 +2521,13 @@ No
- +
-fs_list_all( +fs_list_nfs( @@ -2201,7 +2541,7 @@ No
Summary

-List all directories with a filesystem type. +List NFS filesystem.

@@ -2223,13 +2563,13 @@ No
- +
-fs_list_cifs( +fs_list_noxattr_fs( @@ -2243,8 +2583,7 @@ No
Summary

-List the contents of directories on a -CIFS or SMB filesystem. +Read all noxattrfs directories.

@@ -2266,13 +2605,13 @@ No
- +
-fs_list_noxattr_fs( +fs_list_tmpfs( @@ -2286,7 +2625,7 @@ No
Summary

-Read all noxattrfs directories. +List the contents of generic tmpfs directories.

@@ -2308,13 +2647,13 @@ No
- +
-fs_list_tmpfs( +fs_make_noxattr_fs( @@ -2328,7 +2667,9 @@ No
Summary

-List the contents of generic tmpfs directories. +Transform specified type into a filesystem +type which does not have extended attribute +support.

@@ -2340,7 +2681,7 @@ List the contents of generic tmpfs directories. domain -Domain allowed access. +The type of the process performing this action. No @@ -2350,13 +2691,13 @@ No
- +
-fs_make_noxattr_fs( +fs_manage_auto_mountpoints( @@ -2370,9 +2711,8 @@ No
Summary

-Transform specified type into a filesystem -type which does not have extended attribute -support. +Create, read, write, and delete +auto moutpoints.

@@ -2384,7 +2724,7 @@ support. domain -The type of the process performing this action. +Domain allowed access. No @@ -3756,6 +4096,48 @@ No
+ +
+ + +
+ +fs_read_eventpollfs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read eventpollfs files +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -3924,6 +4306,90 @@ No
+ +
+ + +
+ +fs_read_removable_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read removable storage files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_read_removable_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read removable storage symbolic links. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -5255,6 +5721,90 @@ No
+ +
+ + +
+ +fs_search_removable_dirs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search removable storage directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +fs_search_rpc_dirs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search directories of RPC file system pipes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the domain reading the symbolic links. + + +No +
+
+
+
diff --git a/www/api-docs/kernel_kernel.html b/www/api-docs/kernel_kernel.html index f1ab180..28965cd 100644 --- a/www/api-docs/kernel_kernel.html +++ b/www/api-docs/kernel_kernel.html @@ -95,7 +95,8 @@

Description:

-Policy for kernel threads, proc filesystem,and unlabeled processes and objects. +Policy for kernel threads, proc filesystem, +and unlabeled processes and objects.

@@ -3545,7 +3546,7 @@ assocation.

The corenetwork interface -corenet_sendrecv_no_ipsec() should +corenet_non_ipsec_sendrecv() should be used instead of this one.

@@ -4180,7 +4181,7 @@ No
Summary

-Unconfined access to the kernel. +Unconfined access to kernel module resources.

diff --git a/www/api-docs/kernel_terminal.html b/www/api-docs/kernel_terminal.html index eb5f4fc..5915faa 100644 --- a/www/api-docs/kernel_terminal.html +++ b/www/api-docs/kernel_terminal.html @@ -337,6 +337,49 @@ No
+ +
+ + +
+ +term_dontaudit_ioctl_unallocated_ttys( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to ioctl +unallocated tty device nodes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -423,6 +466,49 @@ No
+ +
+ + +
+ +term_dontaudit_search_ptys( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to search the +contents of the /dev/pts directory. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -981,6 +1067,48 @@ No
+ +
+ + +
+ +term_read_console( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read from the console. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/services.html b/www/api-docs/services.html index f034e1a..cd38764 100644 --- a/www/api-docs/services.html +++ b/www/api-docs/services.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -300,6 +330,11 @@

Ethernet activity monitor.

+ + automount +

Filesystem automounter service.

+ + avahi

mDNS/DNS-SD daemon implementing Apple ZeroConf architecture

@@ -375,11 +410,21 @@

Distributed compiler daemon

+ + djbdns +

small and secure DNS daemon

+ + dovecot

Dovecot POP and IMAP mail server

+ + fetchmail +

Remote-mail retrieval and forwarding utility

+ + finger

Finger user information service.

@@ -480,6 +525,11 @@

Network time protocol daemon

+ + openct +

Service for handling smart card readers.

+ + pegasus

The Open Group Pegasus CIM/WBEM Server.

@@ -515,6 +565,11 @@

Procmail mail delivery agent

+ + publicfile +

publicfile supplies files to the public through HTTP and FTP

+ + radius

RADIUS authentication and accounting server.

@@ -540,6 +595,11 @@

Remote login daemon

+ + roundup +

Roundup Issue Tracking System policy

+ + rpc

Remote Procedure Call Daemon for managment of network based process communication

@@ -574,6 +634,16 @@ from Windows NT servers.

Policy for sendmail.

+ + slrnpull +

Service for downloading news feeds the slrn newsreader.

+ + + + smartmon +

Smart disk monitoring daemon policy

+ + snmp

Simple network management protocol services

@@ -599,6 +669,11 @@ from Windows NT servers.

SSL Tunneling Proxy

+ + sysstat +

Policy for sysstat. Reports on various system states

+ + tcpd

Policy for TCP daemon.

@@ -619,6 +694,11 @@ from Windows NT servers.

MIDI to WAV converter and player configured as a service

+ + ucspitcp +

ucspitcp policy

+ + uucp

Unix to Unix Copy

diff --git a/www/api-docs/services_apache.html b/www/api-docs/services_apache.html index fbc55f3..2b2fcc1 100644 --- a/www/api-docs/services_apache.html +++ b/www/api-docs/services_apache.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_apm.html b/www/api-docs/services_apm.html index 77943dd..d169cd5 100644 --- a/www/api-docs/services_apm.html +++ b/www/api-docs/services_apm.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_arpwatch.html b/www/api-docs/services_arpwatch.html index 383ae0c..48266bf 100644 --- a/www/api-docs/services_arpwatch.html +++ b/www/api-docs/services_arpwatch.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_automount.html b/www/api-docs/services_automount.html new file mode 100644 index 0000000..8b57fd2 --- /dev/null +++ b/www/api-docs/services_automount.html @@ -0,0 +1,400 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: automount

+ +

Description:

+ +

Filesystem automounter service.

+ + + + +

Interfaces:

+ + +
+ + +
+ +automount_domtrans( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute automount in the automount domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +automount_exec_config( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute automount in the caller domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_avahi.html b/www/api-docs/services_avahi.html index beb9fbf..0fb2104 100644 --- a/www/api-docs/services_avahi.html +++ b/www/api-docs/services_avahi.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_bind.html b/www/api-docs/services_bind.html index 7e4e3dc..ce9952e 100644 --- a/www/api-docs/services_bind.html +++ b/www/api-docs/services_bind.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -529,6 +559,48 @@ No
+ +
+ + +
+ +bind_read_zone( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read BIND zone files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -608,6 +680,48 @@ No
+ +
+ + +
+ +bind_search_cache( + + + + + domain + + + )
+
+
+ +
Summary
+

+Search the BIND cache directory. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/services_bluetooth.html b/www/api-docs/services_bluetooth.html index 68cb976..7d047a7 100644 --- a/www/api-docs/services_bluetooth.html +++ b/www/api-docs/services_bluetooth.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -402,6 +432,48 @@ No
+ +
+ + +
+ +bluetooth_read_config( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read bluetooth daemon configuration. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/services_canna.html b/www/api-docs/services_canna.html index 265c4af..65f9814 100644 --- a/www/api-docs/services_canna.html +++ b/www/api-docs/services_canna.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_comsat.html b/www/api-docs/services_comsat.html index 67bb85a..94ba93d 100644 --- a/www/api-docs/services_comsat.html +++ b/www/api-docs/services_comsat.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_cpucontrol.html b/www/api-docs/services_cpucontrol.html index 4efe63b..1862b08 100644 --- a/www/api-docs/services_cpucontrol.html +++ b/www/api-docs/services_cpucontrol.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_cron.html b/www/api-docs/services_cron.html index 2c5558d..edff2da 100644 --- a/www/api-docs/services_cron.html +++ b/www/api-docs/services_cron.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -405,6 +435,48 @@ No
+ +
+ + +
+ +cron_dontaudit_write_pipe( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to write cron daemon unnamed pipes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/services_cups.html b/www/api-docs/services_cups.html index a05da6c..388b501 100644 --- a/www/api-docs/services_cups.html +++ b/www/api-docs/services_cups.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_cvs.html b/www/api-docs/services_cvs.html index fced0b6..fa3eb7c 100644 --- a/www/api-docs/services_cvs.html +++ b/www/api-docs/services_cvs.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_cyrus.html b/www/api-docs/services_cyrus.html index 92eeb12..5d91df8 100644 --- a/www/api-docs/services_cyrus.html +++ b/www/api-docs/services_cyrus.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_dbskk.html b/www/api-docs/services_dbskk.html index 3a0af0f..8eeb9dd 100644 --- a/www/api-docs/services_dbskk.html +++ b/www/api-docs/services_dbskk.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_dbus.html b/www/api-docs/services_dbus.html index fc7d228..87739f1 100644 --- a/www/api-docs/services_dbus.html +++ b/www/api-docs/services_dbus.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -321,6 +351,48 @@ No
+ +
+ + +
+ +dbus_read_config( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read dbus configuration. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/services_dhcp.html b/www/api-docs/services_dhcp.html index 9779a73..0974ce8 100644 --- a/www/api-docs/services_dhcp.html +++ b/www/api-docs/services_dhcp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_dictd.html b/www/api-docs/services_dictd.html index 037b857..b8e2fd6 100644 --- a/www/api-docs/services_dictd.html +++ b/www/api-docs/services_dictd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_distcc.html b/www/api-docs/services_distcc.html index 2bd0e00..e774d37 100644 --- a/www/api-docs/services_distcc.html +++ b/www/api-docs/services_distcc.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_djbdns.html b/www/api-docs/services_djbdns.html new file mode 100644 index 0000000..d38b50c --- /dev/null +++ b/www/api-docs/services_djbdns.html @@ -0,0 +1,359 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: djbdns

+ +

Description:

+ +

small and secure DNS daemon

+ + + + + +

Templates:

+ + +
+ + +
+ +djbdns_daemontools_domain_template( + + + + + prefix + + + )
+
+
+ +
Summary
+

+Create a set of derived types for djbdns +components that are directly supervised by daemontools. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+prefix + + +The prefix to be used for deriving type names. + + +No +
+
+
+ + +Return + + + +
+ + diff --git a/www/api-docs/services_dovecot.html b/www/api-docs/services_dovecot.html index de3dd85..234d06e 100644 --- a/www/api-docs/services_dovecot.html +++ b/www/api-docs/services_dovecot.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_fetchmail.html b/www/api-docs/services_fetchmail.html new file mode 100644 index 0000000..2115aad --- /dev/null +++ b/www/api-docs/services_fetchmail.html @@ -0,0 +1,312 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: fetchmail

+ +

Description:

+ +

Remote-mail retrieval and forwarding utility

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_finger.html b/www/api-docs/services_finger.html index cc8a528..7367b29 100644 --- a/www/api-docs/services_finger.html +++ b/www/api-docs/services_finger.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ftp.html b/www/api-docs/services_ftp.html index a468326..34147ad 100644 --- a/www/api-docs/services_ftp.html +++ b/www/api-docs/services_ftp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_gpm.html b/www/api-docs/services_gpm.html index d858df8..1e59ca4 100644 --- a/www/api-docs/services_gpm.html +++ b/www/api-docs/services_gpm.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_hal.html b/www/api-docs/services_hal.html index 29df8e3..0454f4c 100644 --- a/www/api-docs/services_hal.html +++ b/www/api-docs/services_hal.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_howl.html b/www/api-docs/services_howl.html index c190610..f1b1ad7 100644 --- a/www/api-docs/services_howl.html +++ b/www/api-docs/services_howl.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_i18n_input.html b/www/api-docs/services_i18n_input.html index f5e836d..1f190c7 100644 --- a/www/api-docs/services_i18n_input.html +++ b/www/api-docs/services_i18n_input.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_inetd.html b/www/api-docs/services_inetd.html index 66dee8c..a110089 100644 --- a/www/api-docs/services_inetd.html +++ b/www/api-docs/services_inetd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_inn.html b/www/api-docs/services_inn.html index d38ac30..411f719 100644 --- a/www/api-docs/services_inn.html +++ b/www/api-docs/services_inn.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_irqbalance.html b/www/api-docs/services_irqbalance.html index ca2a6ff..97ee46b 100644 --- a/www/api-docs/services_irqbalance.html +++ b/www/api-docs/services_irqbalance.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_kerberos.html b/www/api-docs/services_kerberos.html index e0fac65..68ea859 100644 --- a/www/api-docs/services_kerberos.html +++ b/www/api-docs/services_kerberos.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ktalk.html b/www/api-docs/services_ktalk.html index c7a8ce2..8a66795 100644 --- a/www/api-docs/services_ktalk.html +++ b/www/api-docs/services_ktalk.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ldap.html b/www/api-docs/services_ldap.html index 220f195..4b9ace7 100644 --- a/www/api-docs/services_ldap.html +++ b/www/api-docs/services_ldap.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_lpd.html b/www/api-docs/services_lpd.html index 46f63e4..dafce81 100644 --- a/www/api-docs/services_lpd.html +++ b/www/api-docs/services_lpd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_mailman.html b/www/api-docs/services_mailman.html index 67db042..133746d 100644 --- a/www/api-docs/services_mailman.html +++ b/www/api-docs/services_mailman.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_mta.html b/www/api-docs/services_mta.html index 76b2468..05afb9d 100644 --- a/www/api-docs/services_mta.html +++ b/www/api-docs/services_mta.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -533,6 +563,133 @@ No
+ +
+ + +
+ +mta_filetrans_etc_aliases( + + + + + domain + + + )
+
+
+ +
Summary
+

+Type transition files created in /etc +to the mail address aliases type. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +mta_filetrans_spool( + + + + + domain + + + + , + + + + private type + + + + , + + + + [ + + object + + ] + + + )
+
+
+ +
Summary
+

+Create private objects in the +mail spool directory. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+private type + + +The type of the object to be created. + + +No +
+object + + +The object class of the object being created. If +no class is specified, file will be used. + + +yes +
+
+
+
@@ -863,7 +1020,7 @@ Read mail address aliases. domain -The type of the process performing this action. +Domain allowed access. No @@ -905,7 +1062,7 @@ Read mail server configuration. domain -The type of the process performing this action. +Domain allowed access. No diff --git a/www/api-docs/services_mysql.html b/www/api-docs/services_mysql.html index be814d6..5bcafc7 100644 --- a/www/api-docs/services_mysql.html +++ b/www/api-docs/services_mysql.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_networkmanager.html b/www/api-docs/services_networkmanager.html index cf5fac4..4feec98 100644 --- a/www/api-docs/services_networkmanager.html +++ b/www/api-docs/services_networkmanager.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_nis.html b/www/api-docs/services_nis.html index 8d9cacc..22560d6 100644 --- a/www/api-docs/services_nis.html +++ b/www/api-docs/services_nis.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_nscd.html b/www/api-docs/services_nscd.html index 871381a..c846b3b 100644 --- a/www/api-docs/services_nscd.html +++ b/www/api-docs/services_nscd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ntp.html b/www/api-docs/services_ntp.html index 71a41ce..3e47897 100644 --- a/www/api-docs/services_ntp.html +++ b/www/api-docs/services_ntp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_openct.html b/www/api-docs/services_openct.html new file mode 100644 index 0000000..69539aa --- /dev/null +++ b/www/api-docs/services_openct.html @@ -0,0 +1,312 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: openct

+ +

Description:

+ +

Service for handling smart card readers.

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_pegasus.html b/www/api-docs/services_pegasus.html index b316f92..da6530c 100644 --- a/www/api-docs/services_pegasus.html +++ b/www/api-docs/services_pegasus.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_portmap.html b/www/api-docs/services_portmap.html index 8101355..ecd695a 100644 --- a/www/api-docs/services_portmap.html +++ b/www/api-docs/services_portmap.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_postfix.html b/www/api-docs/services_postfix.html index 8e67eed..d6bf20c 100644 --- a/www/api-docs/services_postfix.html +++ b/www/api-docs/services_postfix.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -278,13 +308,13 @@

Interfaces:

- +
-postfix_create_config( +postfix_domtrans_map( @@ -292,34 +322,13 @@ domain - - , - - - - private type - - - - , - - - - [ - - object - - ] - - )
Summary

-Create files with the specified type in -the postfix configuration directories. +Execute postfix_map in the postfix_map domain.

@@ -337,38 +346,17 @@ Domain allowed access. No - -private type - - -The type of the object to be created. - - -No - - - -object - - -The object class of the object being created. If -no class is specified, file will be used. - - -yes - -
- +
-postfix_domtrans_map( +postfix_domtrans_master( @@ -382,7 +370,8 @@ yes
Summary

-Execute postfix_map in the postfix_map domain. +Execute the master postfix program in the +postfix_master domain.

@@ -404,13 +393,13 @@ No
- +
-postfix_domtrans_master( +postfix_domtrans_user_mail_handler( @@ -424,8 +413,8 @@ No
Summary

-Execute the master postfix program in the -postfix_master domain. +Execute postfix user mail programs +in their respective domains.

@@ -447,13 +436,13 @@ No
- +
-postfix_domtrans_user_mail_handler( +postfix_dontaudit_rw_local_tcp_socket( @@ -467,8 +456,9 @@ No
Summary

-Execute postfix user mail programs -in their respective domains. +Do not audit attempts to read and +write postfix local delivery +TCP sockets.

@@ -480,7 +470,7 @@ in their respective domains. domain -Domain allowed access. +Domain to not audit. No @@ -490,13 +480,13 @@ No
- +
-postfix_dontaudit_rw_local_tcp_socket( +postfix_dontaudit_use_fd( @@ -510,9 +500,9 @@ No
Summary

-Do not audit attempts to read and -write postfix local delivery -TCP sockets. +Do not audit attempts to use +postfix master process file +file descriptors.

@@ -534,13 +524,13 @@ No
- +
-postfix_dontaudit_use_fd( +postfix_exec_master( @@ -554,9 +544,8 @@ No
Summary

-Do not audit attempts to use -postfix master process file -file descriptors. +Execute the master postfix program in the +caller domain.

@@ -568,7 +557,7 @@ file descriptors. domain -Domain to not audit. +Domain allowed access. No @@ -578,13 +567,13 @@ No
- +
-postfix_exec_master( +postfix_filetrans_config( @@ -592,14 +581,34 @@ No domain + + , + + + + private type + + + + , + + + + [ + + object + + ] + + )
Summary

-Execute the master postfix program in the -caller domain. +Create files with the specified type in +the postfix configuration directories.

@@ -617,6 +626,27 @@ Domain allowed access. No + +private type + + +The type of the object to be created. + + +No + + + +object + + +The object class of the object being created. If +no class is specified, file will be used. + + +yes + +
diff --git a/www/api-docs/services_postgresql.html b/www/api-docs/services_postgresql.html index 0ffd0a9..8cb81b1 100644 --- a/www/api-docs/services_postgresql.html +++ b/www/api-docs/services_postgresql.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ppp.html b/www/api-docs/services_ppp.html index 876852e..a63f79c 100644 --- a/www/api-docs/services_ppp.html +++ b/www/api-docs/services_ppp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_privoxy.html b/www/api-docs/services_privoxy.html index a0bc64d..fa64e0e 100644 --- a/www/api-docs/services_privoxy.html +++ b/www/api-docs/services_privoxy.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_procmail.html b/www/api-docs/services_procmail.html index 25e4ada..e9a5869 100644 --- a/www/api-docs/services_procmail.html +++ b/www/api-docs/services_procmail.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_publicfile.html b/www/api-docs/services_publicfile.html new file mode 100644 index 0000000..4cead32 --- /dev/null +++ b/www/api-docs/services_publicfile.html @@ -0,0 +1,312 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: publicfile

+ +

Description:

+ +

publicfile supplies files to the public through HTTP and FTP

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_radius.html b/www/api-docs/services_radius.html index e3c2d6b..349b827 100644 --- a/www/api-docs/services_radius.html +++ b/www/api-docs/services_radius.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_radvd.html b/www/api-docs/services_radvd.html index 41b66e6..7a346fa 100644 --- a/www/api-docs/services_radvd.html +++ b/www/api-docs/services_radvd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_rdisc.html b/www/api-docs/services_rdisc.html index 362bf2e..3083c2f 100644 --- a/www/api-docs/services_rdisc.html +++ b/www/api-docs/services_rdisc.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_remotelogin.html b/www/api-docs/services_remotelogin.html index 760c912..2c57654 100644 --- a/www/api-docs/services_remotelogin.html +++ b/www/api-docs/services_remotelogin.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_rlogin.html b/www/api-docs/services_rlogin.html index 292758b..a62d51f 100644 --- a/www/api-docs/services_rlogin.html +++ b/www/api-docs/services_rlogin.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_roundup.html b/www/api-docs/services_roundup.html new file mode 100644 index 0000000..6c3088a --- /dev/null +++ b/www/api-docs/services_roundup.html @@ -0,0 +1,312 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: roundup

+ +

Description:

+ +

Roundup Issue Tracking System policy

+ + + + + +

No interfaces or templates.

+ + +
+ + diff --git a/www/api-docs/services_rpc.html b/www/api-docs/services_rpc.html index f455008..7b13383 100644 --- a/www/api-docs/services_rpc.html +++ b/www/api-docs/services_rpc.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_rshd.html b/www/api-docs/services_rshd.html index 949f13c..add52d9 100644 --- a/www/api-docs/services_rshd.html +++ b/www/api-docs/services_rshd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_rsync.html b/www/api-docs/services_rsync.html index ca7a406..3c06a63 100644 --- a/www/api-docs/services_rsync.html +++ b/www/api-docs/services_rsync.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_samba.html b/www/api-docs/services_samba.html index 62b0a11..bf7c0da 100644 --- a/www/api-docs/services_samba.html +++ b/www/api-docs/services_samba.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_sasl.html b/www/api-docs/services_sasl.html index 83a2abc..ea35ce2 100644 --- a/www/api-docs/services_sasl.html +++ b/www/api-docs/services_sasl.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_sendmail.html b/www/api-docs/services_sendmail.html index ad39a7b..e545f23 100644 --- a/www/api-docs/services_sendmail.html +++ b/www/api-docs/services_sendmail.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_slrnpull.html b/www/api-docs/services_slrnpull.html new file mode 100644 index 0000000..830422d --- /dev/null +++ b/www/api-docs/services_slrnpull.html @@ -0,0 +1,401 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: slrnpull

+ +

Description:

+ +

Service for downloading news feeds the slrn newsreader.

+ + + + +

Interfaces:

+ + +
+ + +
+ +slrnpull_manage_spool( + + + + + pty_type + + + )
+
+
+ +
Summary
+

+Allow the domain to create, read, +write, and delete slrnpull spools. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+pty_type + + +domain allowed access + + +No +
+
+
+ + +
+ + +
+ +slrnpull_search_spool( + + + + + pty_type + + + )
+
+
+ +
Summary
+

+Allow the domain to search slrnpull spools. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+pty_type + + +domain allowed access + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_smartmon.html b/www/api-docs/services_smartmon.html new file mode 100644 index 0000000..0429d46 --- /dev/null +++ b/www/api-docs/services_smartmon.html @@ -0,0 +1,358 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: smartmon

+ +

Description:

+ +

Smart disk monitoring daemon policy

+ + + + +

Interfaces:

+ + +
+ + +
+ +smartmon_read_tmp( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow caller to read smartmon temporary files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The process type reading the temporary files. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_snmp.html b/www/api-docs/services_snmp.html index 22cd908..bc0bbfb 100644 --- a/www/api-docs/services_snmp.html +++ b/www/api-docs/services_snmp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_spamassassin.html b/www/api-docs/services_spamassassin.html index e5ccfe8..ba8cf6d 100644 --- a/www/api-docs/services_spamassassin.html +++ b/www/api-docs/services_spamassassin.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_squid.html b/www/api-docs/services_squid.html index 574ea67..7019ea1 100644 --- a/www/api-docs/services_squid.html +++ b/www/api-docs/services_squid.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ssh.html b/www/api-docs/services_ssh.html index 788c409..437a9af 100644 --- a/www/api-docs/services_ssh.html +++ b/www/api-docs/services_ssh.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_stunnel.html b/www/api-docs/services_stunnel.html index 57b27b4..a17c45b 100644 --- a/www/api-docs/services_stunnel.html +++ b/www/api-docs/services_stunnel.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_sysstat.html b/www/api-docs/services_sysstat.html new file mode 100644 index 0000000..4d7c576 --- /dev/null +++ b/www/api-docs/services_sysstat.html @@ -0,0 +1,358 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: sysstat

+ +

Description:

+ +

Policy for sysstat. Reports on various system states

+ + + + +

Interfaces:

+ + +
+ + +
+ +sysstat_manage_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Manage sysstat logs. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_tcpd.html b/www/api-docs/services_tcpd.html index ccb75f1..e58c5df 100644 --- a/www/api-docs/services_tcpd.html +++ b/www/api-docs/services_tcpd.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_telnet.html b/www/api-docs/services_telnet.html index 51bdaba..8a7ff0b 100644 --- a/www/api-docs/services_telnet.html +++ b/www/api-docs/services_telnet.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_tftp.html b/www/api-docs/services_tftp.html index af6d73a..8b0d554 100644 --- a/www/api-docs/services_tftp.html +++ b/www/api-docs/services_tftp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_timidity.html b/www/api-docs/services_timidity.html index 1fb3ea6..be9e71a 100644 --- a/www/api-docs/services_timidity.html +++ b/www/api-docs/services_timidity.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_ucspitcp.html b/www/api-docs/services_ucspitcp.html new file mode 100644 index 0000000..c04cf98 --- /dev/null +++ b/www/api-docs/services_ucspitcp.html @@ -0,0 +1,380 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: services

+

Module: ucspitcp

+ +

Description:

+ +

+

+Policy for DJB's ucspi-tcpd +

+

+ + + + +

Interfaces:

+ + +
+ + +
+ +ucspitcp_service_domain( + + + + + domain + + + + , + + + + entrypoint + + + )
+
+
+ +
Summary
+

+Define a specified domain as a ucspitcp service. +

+ + +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+entrypoint + + +The type associated with the process program. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/services_uucp.html b/www/api-docs/services_uucp.html index 0a5a55c..6836fa0 100644 --- a/www/api-docs/services_uucp.html +++ b/www/api-docs/services_uucp.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_xdm.html b/www/api-docs/services_xdm.html index 669cdac..01e0011 100644 --- a/www/api-docs/services_xdm.html +++ b/www/api-docs/services_xdm.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_xfs.html b/www/api-docs/services_xfs.html index eaf906a..506bb31 100644 --- a/www/api-docs/services_xfs.html +++ b/www/api-docs/services_xfs.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/services_zebra.html b/www/api-docs/services_zebra.html index 93f3d18..ecc6a8a 100644 --- a/www/api-docs/services_zebra.html +++ b/www/api-docs/services_zebra.html @@ -40,6 +40,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -85,9 +88,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -148,6 +157,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -169,6 +181,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -184,6 +199,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -202,6 +220,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -217,6 +241,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -229,6 +256,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
diff --git a/www/api-docs/system.html b/www/api-docs/system.html index e55ad68..360a79c 100644 --- a/www/api-docs/system.html +++ b/www/api-docs/system.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -156,6 +159,11 @@

Policy for reading and setting the hardware clock.

+ + daemontools +

Collection of tools for managing UNIX services

+ + fstools

Tools for filesystem management, such as mkfs and fsck.

diff --git a/www/api-docs/system_authlogin.html b/www/api-docs/system_authlogin.html index 8353f14..dec0da3 100644 --- a/www/api-docs/system_authlogin.html +++ b/www/api-docs/system_authlogin.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -263,13 +266,13 @@ No
- +
-auth_create_login_records( +auth_can_read_shadow_passwords( @@ -617,6 +620,48 @@ No
+ +
+ + +
+ +auth_dontaudit_exec_utempter( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attemps to execute utempter executable. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain to not audit. + + +No +
+
+
+
@@ -829,6 +874,48 @@ No
+ +
+ + +
+ +auth_filetrans_login_records( + + + + + ? + + + )
+
+
+ +
Summary
+

+Summary is missing! +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+? + + +Parameter descriptions are missing! + + +No +
+
+
+
@@ -2074,6 +2161,90 @@ No
+ +
+ + +
+ +auth_setattr_login_records( + + + + + ? + + + )
+
+
+ +
Summary
+

+Summary is missing! +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+? + + +Parameter descriptions are missing! + + +No +
+
+
+ + +
+ + +
+ +auth_tunable_read_shadow( + + + + + ? + + + )
+
+
+ +
Summary
+

+Summary is missing! +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+? + + +Parameter descriptions are missing! + + +No +
+
+
+
@@ -2293,6 +2464,57 @@ No
+ +
+ + +
+ +authlogin_common_auth_domain_template( + + + + + userdomain_prefix + + + )
+
+
+ +
Summary
+

+Common template to create a domain for authentication. +

+ + +
Description
+

+

+This template creates a derived domain which is allowed +to authenticate users by using PAM unix_chkpwd support. +

+

+ +
Parameters
+ + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+
+
+
diff --git a/www/api-docs/system_clock.html b/www/api-docs/system_clock.html index f43a44b..a33a0f3 100644 --- a/www/api-docs/system_clock.html +++ b/www/api-docs/system_clock.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_daemontools.html b/www/api-docs/system_daemontools.html new file mode 100644 index 0000000..ea91cb2 --- /dev/null +++ b/www/api-docs/system_daemontools.html @@ -0,0 +1,464 @@ + + + + Security Enhanced Linux Reference Policy + + + + + + + +
+ +

Layer: system

+

Module: daemontools

+ +

Description:

+ +

+

+Policy for DJB's daemontools +

+

+ + + + +

Interfaces:

+ + +
+ + +
+ +daemontools_domtrans_multilog( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute in the svc_multilog_t domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +daemontools_domtrans_run( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute in the svc_run_t domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +daemontools_domtrans_start( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute in the svc_start_t domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +daemontools_ipc_domain( + + + + + domain + + + )
+
+
+ +
Summary
+

+An ipc channel between the supervised domain and svc_start_t +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access to svc_start_t. + + +No +
+
+
+ + +
+ + +
+ +daemontools_manage_svc( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow a domain to create svc_svc_t files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +daemontools_read_svc( + + + + + domain + + + )
+
+
+ +
Summary
+

+Allow a domain to read svc_svc_t files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +daemontools_service_domain( + + + + + domain + + + + , + + + + entrypoint + + + )
+
+
+ +
Summary
+

+Define a specified domain as a supervised service. +

+ + +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+entrypoint + + +The type associated with the process program. + + +No +
+
+
+ + +Return + + + + +
+ + diff --git a/www/api-docs/system_fstools.html b/www/api-docs/system_fstools.html index fcf6588..984d2d2 100644 --- a/www/api-docs/system_fstools.html +++ b/www/api-docs/system_fstools.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_getty.html b/www/api-docs/system_getty.html index 3db5f53..d1fa34f 100644 --- a/www/api-docs/system_getty.html +++ b/www/api-docs/system_getty.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_hostname.html b/www/api-docs/system_hostname.html index 986c052..71fa6cc 100644 --- a/www/api-docs/system_hostname.html +++ b/www/api-docs/system_hostname.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_hotplug.html b/www/api-docs/system_hotplug.html index b07fb79..6f78a6c 100644 --- a/www/api-docs/system_hotplug.html +++ b/www/api-docs/system_hotplug.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_init.html b/www/api-docs/system_init.html index 28bd1f5..63e0941 100644 --- a/www/api-docs/system_init.html +++ b/www/api-docs/system_init.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -134,89 +137,6 @@

Interfaces:

- -
- - -
- -init_create_script_tmp( - - - - - domain - - - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - - )
-
-
- -
Summary
-

-Create files in a init script -temporary data directory. -

- - -
Parameters
- - - - - - - - - -
Parameter:Description:Optional:
-domain - - -Domain allowed access. - - -No -
-file_type - - -The type of the object to be created - - -No -
-object_class - - -The object class. If not specified, file is used. - - -yes -
-
-
-
@@ -507,6 +427,49 @@ No
+ +
+ + +
+ +init_dontaudit_lock_pid( + + + + + domain + + + )
+
+
+ +
Summary
+

+Do not audit attempts to lock +init script pid files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -887,6 +850,89 @@ No
+ +
+ + +
+ +init_filetrans_script_tmp( + + + + + domain + + + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + + )
+
+
+ +
Summary
+

+Create files in a init script +temporary data directory. +

+ + +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+file_type + + +The type of the object to be created + + +No +
+object_class + + +The object class. If not specified, file is used. + + +yes +
+
+
+
diff --git a/www/api-docs/system_ipsec.html b/www/api-docs/system_ipsec.html index 2b72ca4..e26d0a2 100644 --- a/www/api-docs/system_ipsec.html +++ b/www/api-docs/system_ipsec.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_iptables.html b/www/api-docs/system_iptables.html index c06158e..02b8701 100644 --- a/www/api-docs/system_iptables.html +++ b/www/api-docs/system_iptables.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_libraries.html b/www/api-docs/system_libraries.html index 4240751..c50a752 100644 --- a/www/api-docs/system_libraries.html +++ b/www/api-docs/system_libraries.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -346,6 +349,134 @@ No
+ +
+ + +
+ +libs_manage_ld_so( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete the +dynamic link/loader. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +libs_manage_lib_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete generic +files in library directories. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +libs_manage_shared_libs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete shared libraries. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
@@ -389,6 +520,135 @@ No
+ +
+ + +
+ +libs_relabel_ld_so( + + + + + domain + + + )
+
+
+ +
Summary
+

+Relabel to and from the type used for +the dynamic link/loader. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +libs_relabel_lib_files( + + + + + domain + + + )
+
+
+ +
Summary
+

+Relabel to and from the type used +for generic lib files. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +libs_relabel_shared_libs( + + + + + domain + + + )
+
+
+ +
Summary
+

+Relabel to and from the type used for +shared libraries. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/system_locallogin.html b/www/api-docs/system_locallogin.html index 36811c3..1bac391 100644 --- a/www/api-docs/system_locallogin.html +++ b/www/api-docs/system_locallogin.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_logging.html b/www/api-docs/system_logging.html index fb90882..a3ed069 100644 --- a/www/api-docs/system_logging.html +++ b/www/api-docs/system_logging.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -176,18 +179,18 @@ No
- +
-logging_create_log( +logging_domtrans_auditctl( - ? + domain )
@@ -196,7 +199,7 @@ No
Summary

-Summary is missing! +Execute auditctl in the auditctl domain.

@@ -205,10 +208,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +Domain allowed access. No @@ -218,13 +221,13 @@ No
- +
-logging_domtrans_auditctl( +logging_domtrans_syslog( @@ -238,7 +241,7 @@ No
Summary

-Execute auditctl in the auditctl domain. +Execute syslogd in the syslog domain.

@@ -250,7 +253,7 @@ Execute auditctl in the auditctl domain. domain -Domain allowed access. +The type of the process performing this action. No @@ -260,18 +263,18 @@ No
- +
-logging_domtrans_syslog( +logging_dontaudit_getattr_all_logs( - domain + ? )
@@ -280,7 +283,7 @@ No
Summary

-Execute syslogd in the syslog domain. +Summary is missing!

@@ -289,10 +292,10 @@ Execute syslogd in the syslog domain. Parameter:Description:Optional: -domain +? -The type of the process performing this action. +Parameter descriptions are missing! No @@ -302,18 +305,18 @@ No
- +
-logging_dontaudit_getattr_all_logs( +logging_exec_all_logs( - ? + domain )
@@ -322,7 +325,7 @@ No
Summary

-Summary is missing! +Execute all log files in the caller domain.

@@ -331,10 +334,10 @@ Summary is missing! Parameter:Description:Optional: -? +domain -Parameter descriptions are missing! +The type of the process performing this action. No @@ -344,18 +347,18 @@ No
- +
-logging_exec_all_logs( +logging_filetrans_log( - domain + ? )
@@ -364,7 +367,7 @@ No
Summary

-Execute all log files in the caller domain. +Summary is missing!

@@ -373,10 +376,10 @@ Execute all log files in the caller domain. Parameter:Description:Optional: -domain +? -The type of the process performing this action. +Parameter descriptions are missing! No @@ -598,6 +601,48 @@ No
+ +
+ + +
+ +logging_read_audit_log( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read the audit log. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+
diff --git a/www/api-docs/system_lvm.html b/www/api-docs/system_lvm.html index 305a7db..25e356d 100644 --- a/www/api-docs/system_lvm.html +++ b/www/api-docs/system_lvm.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_miscfiles.html b/www/api-docs/system_miscfiles.html index 7606e11..6d68d01 100644 --- a/www/api-docs/system_miscfiles.html +++ b/www/api-docs/system_miscfiles.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_modutils.html b/www/api-docs/system_modutils.html index 1311505..71e40c4 100644 --- a/www/api-docs/system_modutils.html +++ b/www/api-docs/system_modutils.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_mount.html b/www/api-docs/system_mount.html index 8e81b44..cff208a 100644 --- a/www/api-docs/system_mount.html +++ b/www/api-docs/system_mount.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -176,6 +179,48 @@ No
+ +
+ + +
+ +mount_exec( + + + + + domain + + + )
+
+
+ +
Summary
+

+Execute mount in the caller domain. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +The type of the process performing this action. + + +No +
+
+
+
diff --git a/www/api-docs/system_pcmcia.html b/www/api-docs/system_pcmcia.html index 84ae1f4..4b15f40 100644 --- a/www/api-docs/system_pcmcia.html +++ b/www/api-docs/system_pcmcia.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_raid.html b/www/api-docs/system_raid.html index fd92e07..368bb1b 100644 --- a/www/api-docs/system_raid.html +++ b/www/api-docs/system_raid.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_selinuxutil.html b/www/api-docs/system_selinuxutil.html index 40781ae..e05bfad 100644 --- a/www/api-docs/system_selinuxutil.html +++ b/www/api-docs/system_selinuxutil.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_sysnetwork.html b/www/api-docs/system_sysnetwork.html index a3379d9..47a4655 100644 --- a/www/api-docs/system_sysnetwork.html +++ b/www/api-docs/system_sysnetwork.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -134,13 +137,13 @@

Interfaces:

- +
-sysnet_create_config( +sysnet_dbus_chat_dhcpc( @@ -154,8 +157,8 @@
Summary

-Create files in /etc with the type used for -the network config files. +Send and receive messages from +dhcpc over dbus.

@@ -167,7 +170,7 @@ the network config files. domain -The type of the process performing this action. +Domain allowed access. No @@ -177,13 +180,13 @@ No
- +
-sysnet_create_dhcp_state( +sysnet_delete_dhcpc_pid( @@ -191,48 +194,16 @@ No domain - - , - - - - file_type - - - - , - - - - [ - - object_class - - ] - - )
Summary

-Create DHCP state data. +Delete the dhcp client pid file.

-
Description
-

-

-Create DHCP state data. -

-

-This is added for DHCP server, as -the server and client put their state -files in the same directory. -

-

-
Parameters
@@ -241,43 +212,23 @@ files in the same directory. domain - - - -
Parameter:Description:Optional:
-Domain allowed access. - - -No -
-file_type - - -The type of the object to be created +The type of the process performing this action. No
-object_class - - -The object class. If not specified, file is used. - - -yes -
- +
-sysnet_dbus_chat_dhcpc( +sysnet_dns_name_resolve( @@ -291,8 +242,7 @@ yes
Summary

-Send and receive messages from -dhcpc over dbus. +Perform a DNS name resolution.

@@ -314,13 +264,13 @@ No
- +
-sysnet_delete_dhcpc_pid( +sysnet_domtrans_dhcpc( @@ -334,7 +284,7 @@ No
Summary

-Delete the dhcp client pid file. +Execute dhcp client in dhcpc domain.

@@ -356,13 +306,13 @@ No
- +
-sysnet_dns_name_resolve( +sysnet_domtrans_ifconfig( @@ -376,7 +326,7 @@ No
Summary

-Perform a DNS name resolution. +Execute ifconfig in the ifconfig domain.

@@ -388,7 +338,7 @@ Perform a DNS name resolution. domain -Domain allowed access. +The type of the process performing this action. No @@ -398,13 +348,13 @@ No
- +
-sysnet_domtrans_dhcpc( +sysnet_dontaudit_read_config( @@ -418,7 +368,7 @@ No
Summary

-Execute dhcp client in dhcpc domain. +Do not audit attempts to read network config files.

@@ -430,7 +380,7 @@ Execute dhcp client in dhcpc domain. domain -The type of the process performing this action. +Domain to not audit. No @@ -440,13 +390,13 @@ No
- +
-sysnet_domtrans_ifconfig( +sysnet_exec_ifconfig( @@ -460,7 +410,7 @@ No
Summary

-Execute ifconfig in the ifconfig domain. +Execute ifconfig in the caller domain.

@@ -472,7 +422,7 @@ Execute ifconfig in the ifconfig domain. domain -The type of the process performing this action. +Domain allowed access. No @@ -482,13 +432,13 @@ No
- +
-sysnet_dontaudit_read_config( +sysnet_filetrans_config( @@ -502,7 +452,8 @@ No
Summary

-Do not audit attempts to read network config files. +Create files in /etc with the type used for +the network config files.

@@ -514,7 +465,7 @@ Do not audit attempts to read network config files. domain -Domain to not audit. +The type of the process performing this action. No @@ -524,13 +475,13 @@ No
- +
-sysnet_exec_ifconfig( +sysnet_filetrans_dhcp_state( @@ -538,16 +489,48 @@ No domain + + , + + + + file_type + + + + , + + + + [ + + object_class + + ] + + )
Summary

-Execute ifconfig in the caller domain. +Create DHCP state data.

+
Description
+

+

+Create DHCP state data. +

+

+This is added for DHCP server, as +the server and client put their state +files in the same directory. +

+

+
Parameters
@@ -562,6 +545,26 @@ Domain allowed access. No + + + +
Parameter:Description:Optional:
+file_type + + +The type of the object to be created + + +No +
+object_class + + +The object class. If not specified, file is used. + + +yes +
diff --git a/www/api-docs/system_udev.html b/www/api-docs/system_udev.html index cc9f68a..e87ec3d 100644 --- a/www/api-docs/system_udev.html +++ b/www/api-docs/system_udev.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_unconfined.html b/www/api-docs/system_unconfined.html index 15013f1..c800bef 100644 --- a/www/api-docs/system_unconfined.html +++ b/www/api-docs/system_unconfined.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
diff --git a/www/api-docs/system_userdomain.html b/www/api-docs/system_userdomain.html index 7b07959..d20b699 100644 --- a/www/api-docs/system_userdomain.html +++ b/www/api-docs/system_userdomain.html @@ -43,6 +43,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -137,13 +140,13 @@

Interfaces:

- +
-userdom_create_generic_user_home( +userdom_create_sysadm_home( @@ -169,7 +172,7 @@
Summary

-Create objects in generic user home directories +Create objects in sysadm home directories with automatic file type transition.

@@ -203,13 +206,13 @@ yes
- +
-userdom_create_generic_user_home_dir( +userdom_dbus_send_all_users( @@ -223,8 +226,7 @@ yes
Summary

-Create generic user home directories -with automatic file type transition. +Send a dbus message to all user domains.

@@ -246,13 +248,13 @@ No
- +
-userdom_create_sysadm_home( +userdom_dontaudit_getattr_sysadm_home_dir( @@ -260,26 +262,15 @@ No domain - - , - - - - [ - - object_class - - ] - - )
Summary

-Create objects in sysadm home directories -with automatic file type transition. +Do not audit attempts to get the +attributes of the sysadm users +home directory.

@@ -291,34 +282,23 @@ with automatic file type transition. domain -Domain allowed access. +Domain to not audit. No - -object_class - - -The class of the object to be created. -If not specified, file is used. - - -yes - -
- +
-userdom_dbus_send_all_users( +userdom_dontaudit_getattr_sysadm_tty( @@ -332,7 +312,8 @@ yes
Summary

-Send a dbus message to all user domains. +Do not audit attepts to get the attributes +of sysadm ttys.

@@ -354,13 +335,13 @@ No
- +
-userdom_dontaudit_getattr_sysadm_home_dir( +userdom_dontaudit_list_sysadm_home_dir( @@ -374,9 +355,8 @@ No
Summary

-Do not audit attempts to get the -attributes of the sysadm users -home directory. +Do not audit attempts to list the sysadm +users home directory.

@@ -398,13 +378,13 @@ No
- +
-userdom_dontaudit_getattr_sysadm_tty( +userdom_dontaudit_search_all_users_home( @@ -418,8 +398,7 @@ No
Summary

-Do not audit attepts to get the attributes -of sysadm ttys. +Do not audit attempts to search all users home directories.

@@ -431,7 +410,7 @@ of sysadm ttys. domain -Domain allowed access. +Domain to not audit. No @@ -441,13 +420,13 @@ No
- +
-userdom_dontaudit_list_sysadm_home_dir( +userdom_dontaudit_search_staff_home_dir( @@ -461,7 +440,7 @@ No
Summary

-Do not audit attempts to list the sysadm +Do not audit attempts to search the staff users home directory.

@@ -484,13 +463,13 @@ No
- +
-userdom_dontaudit_search_all_users_home( +userdom_dontaudit_search_sysadm_home_dir( @@ -504,7 +483,8 @@ No
Summary

-Do not audit attempts to search all users home directories. +Do not audit attempts to search the sysadm +users home directory.

@@ -526,13 +506,13 @@ No
- +
-userdom_dontaudit_search_staff_home_dir( +userdom_dontaudit_search_user_home_dirs( @@ -546,8 +526,7 @@ No
Summary

-Do not audit attempts to search the staff -users home directory. +Don't audit search on the user home subdirectory.

@@ -559,7 +538,7 @@ users home directory. domain -Domain to not audit. +Domain allowed access. No @@ -569,13 +548,13 @@ No
- +
-userdom_dontaudit_search_sysadm_home_dir( +userdom_dontaudit_use_all_user_fd( @@ -589,8 +568,8 @@ No
Summary

-Do not audit attempts to search the sysadm -users home directory. +Do not audit attempts to inherit the file +descriptors from any user domains.

@@ -612,13 +591,13 @@ No
- +
-userdom_dontaudit_search_user_home_dirs( +userdom_dontaudit_use_sysadm_pty( @@ -632,7 +611,7 @@ No
Summary

-Don't audit search on the user home subdirectory. +Dont audit attempts to read and write sysadm ptys.

@@ -644,7 +623,7 @@ Don't audit search on the user home subdirectory. domain -Domain allowed access. +Domain to not audit. No @@ -654,13 +633,13 @@ No
- +
-userdom_dontaudit_use_all_user_fd( +userdom_dontaudit_use_sysadm_terms( @@ -674,8 +653,7 @@ No
Summary

-Do not audit attempts to inherit the file -descriptors from any user domains. +Do not audit attempts to use sysadm ttys and ptys.

@@ -697,13 +675,13 @@ No
- +
-userdom_dontaudit_use_sysadm_pty( +userdom_dontaudit_use_sysadm_tty( @@ -717,7 +695,7 @@ No
Summary

-Dont audit attempts to read and write sysadm ptys. +Do not audit attempts to use sysadm ttys.

@@ -739,13 +717,13 @@ No
- +
-userdom_dontaudit_use_sysadm_terms( +userdom_dontaudit_use_unpriv_user_fd( @@ -759,7 +737,8 @@ No
Summary

-Do not audit attempts to use sysadm ttys and ptys. +Do not audit attempts to inherit the +file descriptors from all user domains.

@@ -771,7 +750,7 @@ Do not audit attempts to use sysadm ttys and ptys. domain -Domain to not audit. +Domain allowed access. No @@ -781,13 +760,13 @@ No
- +
-userdom_dontaudit_use_sysadm_tty( +userdom_dontaudit_use_unpriv_user_pty( @@ -801,7 +780,8 @@ No
Summary

-Do not audit attempts to use sysadm ttys. +Do not audit attempts to use unprivileged +user ptys.

@@ -823,13 +803,13 @@ No
- +
-userdom_dontaudit_use_unpriv_user_fd( +userdom_dontaudit_use_unpriv_user_tty( @@ -843,8 +823,8 @@ No
Summary

-Do not audit attempts to inherit the -file descriptors from all user domains. +Do not audit attempts to use unprivileged +user ttys.

@@ -866,13 +846,13 @@ No
- +
-userdom_dontaudit_use_unpriv_user_pty( +userdom_filetrans_generic_user_home( @@ -880,14 +860,26 @@ No domain + + , + + + + [ + + object_class + + ] + + )
Summary

-Do not audit attempts to use unprivileged -user ptys. +Create objects in generic user home directories +with automatic file type transition.

@@ -899,23 +891,34 @@ user ptys. domain -Domain to not audit. +Domain allowed access. No + +object_class + + +The class of the object to be created. +If not specified, file is used. + + +yes + +
- +
-userdom_dontaudit_use_unpriv_user_tty( +userdom_filetrans_generic_user_home_dir( @@ -929,8 +932,8 @@ No
Summary

-Do not audit attempts to use unprivileged -user ttys. +Create generic user home directories +with automatic file type transition.

@@ -1509,13 +1512,13 @@ No
- +
-userdom_priveleged_home_dir_manager( +userdom_manage_unpriv_user_semaphores( @@ -1529,22 +1532,10 @@ No
Summary

-Make the specified domain a privileged -home directory manager. +Manage unpriviledged user SysV sempaphores.

-
Description
-

-

-Make the specified domain a privileged -home directory manager. This domain will be -able to manage the contents of all users -general home directory content, and create -files with the correct context. -

-

-
Parameters
@@ -1563,13 +1554,13 @@ No - +
-userdom_read_all_user_files( +userdom_manage_unpriv_user_shared_mem( @@ -1583,7 +1574,8 @@ No
Summary

-Read all files in all users home directories. +Manage unpriviledged user SysV shared +memory segments.

@@ -1605,13 +1597,13 @@ No
- +
-userdom_read_all_userdomains_state( +userdom_priveleged_home_dir_manager( @@ -1625,10 +1617,22 @@ No
Summary

-Read the process state of all user domains. +Make the specified domain a privileged +home directory manager.

+
Description
+

+

+Make the specified domain a privileged +home directory manager. This domain will be +able to manage the contents of all users +general home directory content, and create +files with the correct context. +

+

+
Parameters
Parameter:Description:Optional:
@@ -1647,13 +1651,13 @@ No - +
-userdom_read_staff_home_files( +userdom_read_all_user_files( @@ -1667,7 +1671,7 @@ No
Summary

-Read files in the staff users home directory. +Read all files in all users home directories.

@@ -1689,13 +1693,13 @@ No
- +
-userdom_read_sysadm_home_files( +userdom_read_all_userdomains_state( @@ -1709,7 +1713,7 @@ No
Summary

-Read files in the sysadm users home directory. +Read the process state of all user domains.

@@ -1731,13 +1735,13 @@ No
- +
-userdom_read_unpriv_user_home_files( +userdom_read_staff_home_files( @@ -1751,8 +1755,7 @@ No
Summary

-Read all unprivileged users home directory -files. +Read files in the staff users home directory.

@@ -1774,13 +1777,13 @@ No
- +
-userdom_read_unpriv_user_tmp_files( +userdom_read_sysadm_home_files( @@ -1794,7 +1797,7 @@ No
Summary

-Read all unprivileged users temporary files. +Read files in the sysadm users home directory.

@@ -1816,13 +1819,13 @@ No
- +
-userdom_read_unpriv_user_tmp_symlinks( +userdom_read_unpriv_user_home_files( @@ -1836,7 +1839,8 @@ No
Summary

-Read all unprivileged users temporary symbolic links. +Read all unprivileged users home directory +files.

@@ -1858,13 +1862,13 @@ No
- +
-userdom_rw_sysadm_pipe( +userdom_read_unpriv_user_tmp_files( @@ -1878,7 +1882,7 @@ No
Summary

-Read and write sysadm user unnamed pipes. +Read all unprivileged users temporary files.

@@ -1900,7 +1904,91 @@ No
- + +
+ + +
+ +userdom_read_unpriv_user_tmp_symlinks( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read all unprivileged users temporary symbolic links. +

+ + +
Parameters
+
Parameter:Description:Optional:
+ + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_rw_sysadm_pipe( + + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write sysadm user unnamed pipes. +

+ + +
Parameters
+ + + + + +
Parameter:Description:Optional:
+domain + + +Domain allowed access. + + +No +
+
+
+ +
@@ -2016,7 +2104,7 @@ Search the staff users home directory. domain -Domain to not audit. +Domain allowed access. No @@ -3173,13 +3261,13 @@ yes
- +
-userdom_exec_user_home_files( +userdom_create_user_pty( @@ -3201,14 +3289,14 @@ yes
Summary

-Execute user home files. +Create a user pty.

Description

-Execute user home files. +Create a user pty.

This is a templated interface, and should only @@ -3245,13 +3333,13 @@ No

- +
-userdom_home_file( +userdom_dontaudit_exec_user_home_files( @@ -3264,7 +3352,7 @@ No - type + domain )
@@ -3273,16 +3361,14 @@ No
Summary

-Make the specified type usable in a -user home directory. +Do not audit attempts to execute user home files.

Description

-Make the specified type usable in a -user home directory. +Do not audit attempts to execute user home files.

This is a templated interface, and should only @@ -3306,11 +3392,10 @@ No -type +domain -Type to be used as a file in the -user home directory. +Domain allowed access. No @@ -3320,13 +3405,13 @@ No

- +
-userdom_manage_user_home_subdir_files( +userdom_dontaudit_list_user_home_dir( @@ -3348,16 +3433,14 @@ No
Summary

-Create, read, write, and delete files -in a user home subdirectory. +Do not audit attempts to list user home subdirectories.

Description

-Create, read, write, and delete files -in a user home subdirectory. +Do not audit attempts to list user home subdirectories.

This is a templated interface, and should only @@ -3384,7 +3467,7 @@ No domain -Domain allowed access. +Domain to not audit No @@ -3394,13 +3477,13 @@ No

- +
-userdom_manage_user_home_subdir_pipes( +userdom_dontaudit_list_user_tmp( @@ -3422,16 +3505,16 @@ No
Summary

-Create, read, write, and delete named pipes -in a user home subdirectory. +Do not audit attempts to list user +temporary directories.

Description

-Create, read, write, and delete named pipes -in a user home subdirectory. +Do not audit attempts to list user +temporary directories.

This is a templated interface, and should only @@ -3458,7 +3541,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3468,13 +3551,13 @@ No

- +
-userdom_manage_user_home_subdir_sockets( +userdom_dontaudit_list_user_tmp_untrusted_content( @@ -3496,16 +3579,16 @@ No
Summary

-Create, read, write, and delete named sockets -in a user home subdirectory. +Do not audit attempts to list user +temporary untrusted directories.

Description

-Create, read, write, and delete named sockets -in a user home subdirectory. +Do not audit attempts to list user +temporary directories.

This is a templated interface, and should only @@ -3532,7 +3615,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3542,13 +3625,13 @@ No

- +
-userdom_manage_user_home_subdir_symlinks( +userdom_dontaudit_list_user_untrusted_content( @@ -3570,16 +3653,16 @@ No
Summary

-Create, read, write, and delete symbolic links -in a user home subdirectory. +Do not audit attempts to list user +untrusted directories.

Description

-Create, read, write, and delete symbolic links -in a user home subdirectory. +Do not audit attempts to read user +untrusted directories.

This is a templated interface, and should only @@ -3606,7 +3689,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3616,13 +3699,13 @@ No

- +
-userdom_manage_user_home_subdirs( +userdom_dontaudit_read_user_home_files( @@ -3644,16 +3727,14 @@ No
Summary

-Create, read, write, and delete symbolic links -in a user home subdirectory. +Do not audit attempts to read user home files.

Description

-Create, read, write, and delete symbolic links -in a user home subdirectory. +Do not audit attempts to read user home files.

This is a templated interface, and should only @@ -3680,7 +3761,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3690,13 +3771,13 @@ No

- +
-userdom_manage_user_tmp_dirs( +userdom_dontaudit_read_user_tmp_files( @@ -3718,16 +3799,16 @@ No
Summary

-Create, read, write, and delete user -temporary directories. +Do not audit attempts to read users +temporary files.

Description

-Create, read, write, and delete user -temporary directories. +Do not audit attempts to read users +temporary files.

This is a templated interface, and should only @@ -3754,7 +3835,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3764,13 +3845,13 @@ No

- +
-userdom_manage_user_tmp_files( +userdom_dontaudit_read_user_tmp_untrusted_content_files( @@ -3792,16 +3873,16 @@ No
Summary

-Create, read, write, and delete user -temporary files. +Do not audit attempts to read users +temporary untrusted files.

Description

-Create, read, write, and delete user -temporary files. +Do not audit attempts to read users +temporary untrusted files.

This is a templated interface, and should only @@ -3828,7 +3909,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3838,13 +3919,13 @@ No

- +
-userdom_manage_user_tmp_pipes( +userdom_dontaudit_read_user_untrusted_content_files( @@ -3866,16 +3947,16 @@ No
Summary

-Create, read, write, and delete user -temporary named pipes. +Do not audit attempts to read users +untrusted files.

Description

-Create, read, write, and delete user -temporary named pipes. +Do not audit attempts to read users +untrusted files.

This is a templated interface, and should only @@ -3902,7 +3983,7 @@ No domain -Domain allowed access. +Domain to not audit. No @@ -3912,13 +3993,13 @@ No

- +
-userdom_manage_user_tmp_sockets( +userdom_dontaudit_setattr_user_home_files( @@ -3940,16 +4021,16 @@ No
Summary

-Create, read, write, and delete user -temporary named sockets. +Do not audit attempts to set the +attributes of user home files.

Description

-Create, read, write, and delete user -temporary named sockets. +Do not audit attempts to set the +attributes of user home files.

This is a templated interface, and should only @@ -3986,13 +4067,13 @@ No

- +
-userdom_manage_user_tmp_symlinks( +userdom_dontaudit_use_user_terminals( @@ -4014,16 +4095,16 @@ No
Summary

-Create, read, write, and delete user -temporary symbolic links. +Do not audit attempts to read and write +a user domain tty and pty.

Description

-Create, read, write, and delete user -temporary symbolic links. +Do not audit attempts to read and write +a user domain tty and pty.

This is a templated interface, and should only @@ -4060,13 +4141,13 @@ No

- +
-userdom_read_user_home_files( +userdom_exec_user_home_files( @@ -4088,14 +4169,14 @@ No
Summary

-Read user home files. +Execute user home files.

Description

-Read user home files. +Execute user home files.

This is a templated interface, and should only @@ -4132,13 +4213,13 @@ No

- +
-userdom_search_user_home( +userdom_home_file( @@ -4151,7 +4232,7 @@ No - domain + type )
@@ -4160,14 +4241,16 @@ No
Summary

-Search user home directories. +Make the specified type usable in a +user home directory.

Description

-Search user home directories. +Make the specified type usable in a +user home directory.

This is a templated interface, and should only @@ -4191,10 +4274,11 @@ No -domain +type -Domain allowed access. +Type to be used as a file in the +user home directory. No @@ -4204,13 +4288,13 @@ No

- +
-userdom_use_user_terminals( +userdom_list_user_tmp( @@ -4232,14 +4316,1863 @@ No
Summary

-Read and write a user domain tty and pty. +List user temporary directories.

Description

-Read and write a user domain tty and pty. +List user temporary directories. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_list_user_tmp_untrusted_content( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+List users temporary untrusted directories. +

+ + +
Description
+

+

+List users temporary untrusted directories. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_list_user_untrusted_content( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+List users untrusted directories. +

+ + +
Description
+

+

+List users untrusted directories. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_home_subdir_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete files +in a user home subdirectory. +

+ + +
Description
+

+

+Create, read, write, and delete files +in a user home subdirectory. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_home_subdir_pipes( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete named pipes +in a user home subdirectory. +

+ + +
Description
+

+

+Create, read, write, and delete named pipes +in a user home subdirectory. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_home_subdir_sockets( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete named sockets +in a user home subdirectory. +

+ + +
Description
+

+

+Create, read, write, and delete named sockets +in a user home subdirectory. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_home_subdir_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete symbolic links +in a user home subdirectory. +

+ + +
Description
+

+

+Create, read, write, and delete symbolic links +in a user home subdirectory. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_home_subdirs( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete directories +in a user home subdirectory. +

+ + +
Description
+

+

+Create, read, write, and delete directories +in a user home subdirectory. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_tmp_dirs( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete user +temporary directories. +

+ + +
Description
+

+

+Create, read, write, and delete user +temporary directories. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_tmp_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete user +temporary files. +

+ + +
Description
+

+

+Create, read, write, and delete user +temporary files. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_tmp_pipes( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete user +temporary named pipes. +

+ + +
Description
+

+

+Create, read, write, and delete user +temporary named pipes. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_tmp_sockets( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete user +temporary named sockets. +

+ + +
Description
+

+

+Create, read, write, and delete user +temporary named sockets. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_manage_user_tmp_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Create, read, write, and delete user +temporary symbolic links. +

+ + +
Description
+

+

+Create, read, write, and delete user +temporary symbolic links. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_home_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user home files. +

+ + +
Description
+

+

+Read user home files. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_home_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user home subdirectory symbolic links. +

+ + +
Description
+

+

+Read user home subdirectory symbolic links. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_tmp_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user temporary files. +

+ + +
Description
+

+

+Read user temporary files. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_tmp_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user +temporary symbolic links. +

+ + +
Description
+

+

+Read user +temporary symbolic links. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_tmp_untrusted_content_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user temporary untrusted files. +

+ + +
Description
+

+

+Read user temporary untrusted files. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_tmp_untrusted_content_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user temporary untrusted symbolic links. +

+ + +
Description
+

+

+Read user temporary untrusted symbolic links. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_untrusted_content_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user untrusted files. +

+ + +
Description
+

+

+Read user untrusted files. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_read_user_untrusted_content_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read user untrusted symbolic links. +

+ + +
Description
+

+

+Read user untrusted symbolic links. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_search_user_home( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Search user home directories. +

+ + +
Description
+

+

+Search user home directories. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_setattr_user_pty( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Set the attributes of a user pty. +

+ + +
Description
+

+

+Set the attributes of a user pty. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_use_user_terminals( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Read and write a user domain tty and pty. +

+ + +
Description
+

+

+Read and write a user domain tty and pty. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+domain + + +Domain allowed access. + + +No +
+
+
+ + +
+ + +
+ +userdom_user_home_domtrans( + + + + + userdomain_prefix + + + + , + + + + source_domain + + + + , + + + + target_domain + + + )
+
+
+ +
Summary
+

+Do a domain transition to the specified +domain when executing a program in the +user home directory. +

+ + +
Description
+

+

+Do a domain transition to the specified +domain when executing a program in the +user home directory. +

+

+No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +

+

+This is a templated interface, and should only +be called from a per-userdomain template. +

+

+ +
Parameters
+ + + + + + + + + +
Parameter:Description:Optional:
+userdomain_prefix + + +The prefix of the user domain (e.g., user +is the prefix for user_t). + + +No +
+source_domain + + +Domain allowed access. + + +No +
+target_domain + + +Domain to transition to. + + +No +
+
+
+ + +
+ + +
+ +userdom_write_user_tmp_sockets( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+
+ +
Summary
+

+Write to user temporary named sockets. +

+ + +
Description
+

+

+Write to user temporary named sockets.

This is a templated interface, and should only diff --git a/www/api-docs/templates.html b/www/api-docs/templates.html index 35a8a0f..59bdb3b 100644 --- a/www/api-docs/templates.html +++ b/www/api-docs/templates.html @@ -16,6 +16,9 @@    -  acct
+    -  + alsa
+    -  amanda
@@ -25,6 +28,9 @@    -  consoletype
+    -  + ddcprobe
+    -  dmesg
@@ -40,12 +46,21 @@    -  logrotate
+    -  + logwatch
+    -  netutils
+    -  + prelink
+    -  quota
+    -  + readahead
+    -  rpm
@@ -61,9 +76,15 @@    -  updfstab
+    -  + usbmodules
+    -  usermanage
+    -  + vbetool
+    -  vpn
@@ -73,12 +94,30 @@ apps

+    -  + cdrecord
+    -  gpg
+    -  + irc
+ +    -  + java
+    -  loadkeys
+    -  + lockdev
+ +    -  + screen
+ +    -  + slocate
+    -  webalizer
@@ -139,6 +178,9 @@    -  arpwatch
+    -  + automount
+    -  avahi
@@ -184,9 +226,15 @@    -  distcc
+    -  + djbdns
+    -  dovecot
+    -  + fetchmail
+    -  finger
@@ -247,6 +295,9 @@    -  ntp
+    -  + openct
+    -  pegasus
@@ -268,6 +319,9 @@    -  procmail
+    -  + publicfile
+    -  radius
@@ -283,6 +337,9 @@    -  rlogin
+    -  + roundup
+    -  rpc
@@ -301,6 +358,12 @@    -  sendmail
+    -  + slrnpull
+ +    -  + smartmon
+    -  snmp
@@ -316,6 +379,9 @@    -  stunnel
+    -  + sysstat
+    -  tcpd
@@ -328,6 +394,9 @@    -  timidity
+    -  + ucspitcp
+    -  uucp
@@ -352,6 +421,9 @@    -  clock
+    -  + daemontools
+    -  fstools
@@ -564,6 +636,32 @@ for a user domain.
+Module: +authlogin

+Layer: +system

+

+ +authlogin_common_auth_domain_template( + + + + + userdomain_prefix + + + )
+
+ +
+

+Common template to create a domain for authentication. +

+
+ +
+ +
+Module: +cdrecord

+Layer: +apps

+

+ +cdrecord_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+ +
+

+The per user domain template for the cdrecord module. +

+
+ +
+ +
+Module: +djbdns

+Layer: +services

+

+ +djbdns_daemontools_domain_template( + + + + + prefix + + + )
+
+ +
+

+Create a set of derived types for djbdns +components that are directly supervised by daemontools. +

+
+ +
+ +
+Module: +irc

+Layer: +apps

+

+ +irc_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+ +
+

+The per user domain template for the irc module. +

+
+ +
+ +
+Module: +java

+Layer: +apps

+

+ +java_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+ +
+

+The per user domain template for the java module. +

+
+ +
+ +
+Module: +lockdev

+Layer: +apps

+

+ +lockdev_per_userdomain_template( + + + + + userdomain_prefix + + + + , + + + + user_domain + + + + , + + + + user_role + + + )
+
+ +
+

+The per user domain template for the lockdev module. +

+
+ +
+ +
-Module: -spamassassin

-Layer: -services

+Module: +screen

+Layer: +apps

-spamassassin_per_userdomain_template( +screen_per_userdomain_template( @@ -1244,20 +1537,20 @@ services

-The per user domain template for the spamassassin module. +The per user domain template for the screen module.

-Module: -ssh

+Module: +spamassassin

Layer: services

-ssh_per_userdomain_template( +spamassassin_per_userdomain_template( @@ -1286,20 +1579,20 @@ services

-The per user domain template for the ssh module. +The per user domain template for the spamassassin module.

-Module: +Module: ssh

Layer: services

-ssh_server_template( +ssh_per_userdomain_template( @@ -1307,21 +1600,63 @@ services

userdomain_prefix - )
-

- -
-

-The template to define a ssh server. -

-
- -
- - + +
+

+The per user domain template for the ssh module. +

+
+ +
+ +
+Module: +ssh

+Layer: +services

+

+ +ssh_server_template( + + + + + userdomain_prefix + + + )
+
+ +
+

+The template to define a ssh server. +

+
+ +
+ +
+Module: +su

+Layer: admin

@@ -1539,13 +1874,13 @@ system

-Module: +Module: userdomain

Layer: system

-userdom_exec_user_home_files( +userdom_create_user_pty( @@ -1566,20 +1901,20 @@ system

-Execute user home files. +Create a user pty.

-Module: +Module: userdomain

Layer: system

-userdom_home_file( +userdom_dontaudit_exec_user_home_files( @@ -1592,7 +1927,7 @@ system

- type + domain )
@@ -1600,21 +1935,20 @@ system

-Make the specified type usable in a -user home directory. +Do not audit attempts to execute user home files.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_home_subdir_files( +userdom_dontaudit_list_user_home_dir( @@ -1635,21 +1969,20 @@ system

-Create, read, write, and delete files -in a user home subdirectory. +Do not audit attempts to list user home subdirectories.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_home_subdir_pipes( +userdom_dontaudit_list_user_tmp( @@ -1670,21 +2003,21 @@ system

-Create, read, write, and delete named pipes -in a user home subdirectory. +Do not audit attempts to list user +temporary directories.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_home_subdir_sockets( +userdom_dontaudit_list_user_tmp_untrusted_content( @@ -1705,21 +2038,21 @@ system

-Create, read, write, and delete named sockets -in a user home subdirectory. +Do not audit attempts to list user +temporary untrusted directories.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_home_subdir_symlinks( +userdom_dontaudit_list_user_untrusted_content( @@ -1740,21 +2073,21 @@ system

-Create, read, write, and delete symbolic links -in a user home subdirectory. +Do not audit attempts to list user +untrusted directories.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_home_subdirs( +userdom_dontaudit_read_user_home_files( @@ -1775,21 +2108,20 @@ system

-Create, read, write, and delete symbolic links -in a user home subdirectory. +Do not audit attempts to read user home files.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_tmp_dirs( +userdom_dontaudit_read_user_tmp_files( @@ -1810,21 +2142,21 @@ system

-Create, read, write, and delete user -temporary directories. +Do not audit attempts to read users +temporary files.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_tmp_files( +userdom_dontaudit_read_user_tmp_untrusted_content_files( @@ -1845,21 +2177,21 @@ system

-Create, read, write, and delete user -temporary files. +Do not audit attempts to read users +temporary untrusted files.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_tmp_pipes( +userdom_dontaudit_read_user_untrusted_content_files( @@ -1880,21 +2212,21 @@ system

-Create, read, write, and delete user -temporary named pipes. +Do not audit attempts to read users +untrusted files.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_tmp_sockets( +userdom_dontaudit_setattr_user_home_files( @@ -1915,21 +2247,21 @@ system

-Create, read, write, and delete user -temporary named sockets. +Do not audit attempts to set the +attributes of user home files.

-Module: +Module: userdomain

Layer: system

-userdom_manage_user_tmp_symlinks( +userdom_dontaudit_use_user_terminals( @@ -1950,21 +2282,21 @@ system

-Create, read, write, and delete user -temporary symbolic links. +Do not audit attempts to read and write +a user domain tty and pty.

-Module: +Module: userdomain

Layer: system

-userdom_read_user_home_files( +userdom_exec_user_home_files( @@ -1985,20 +2317,55 @@ system

-Read user home files. +Execute user home files.

-Module: +Module: userdomain

Layer: system

-userdom_search_user_home( +userdom_home_file( + + + + + userdomain_prefix + + + + , + + + + type + + + )
+
+ +
+

+Make the specified type usable in a +user home directory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_list_user_tmp( @@ -2019,20 +2386,20 @@ system

-Search user home directories. +List user temporary directories.

-Module: +Module: userdomain

Layer: system

-userdom_use_user_terminals( +userdom_list_user_tmp_untrusted_content( @@ -2053,7 +2420,844 @@ system

-Read and write a user domain tty and pty. +List users temporary untrusted directories. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_list_user_untrusted_content( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+List users untrusted directories. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_home_subdir_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete files +in a user home subdirectory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_home_subdir_pipes( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete named pipes +in a user home subdirectory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_home_subdir_sockets( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete named sockets +in a user home subdirectory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_home_subdir_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete symbolic links +in a user home subdirectory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_home_subdirs( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete directories +in a user home subdirectory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_tmp_dirs( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete user +temporary directories. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_tmp_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete user +temporary files. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_tmp_pipes( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete user +temporary named pipes. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_tmp_sockets( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete user +temporary named sockets. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_manage_user_tmp_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Create, read, write, and delete user +temporary symbolic links. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_home_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user home files. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_home_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user home subdirectory symbolic links. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_tmp_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user temporary files. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_tmp_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user +temporary symbolic links. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_tmp_untrusted_content_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user temporary untrusted files. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_tmp_untrusted_content_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user temporary untrusted symbolic links. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_untrusted_content_files( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user untrusted files. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_read_user_untrusted_content_symlinks( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read user untrusted symbolic links. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_search_user_home( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Search user home directories. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_setattr_user_pty( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Set the attributes of a user pty. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_use_user_terminals( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Read and write a user domain tty and pty. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_user_home_domtrans( + + + + + userdomain_prefix + + + + , + + + + source_domain + + + + , + + + + target_domain + + + )
+
+ +
+

+Do a domain transition to the specified +domain when executing a program in the +user home directory. +

+
+ +
+ +
+Module: +userdomain

+Layer: +system

+

+ +userdom_write_user_tmp_sockets( + + + + + userdomain_prefix + + + + , + + + + domain + + + )
+
+ +
+

+Write to user temporary named sockets.

diff --git a/www/html/Changelog.txt b/www/html/Changelog.txt index 20895fb..db66471 100644 --- a/www/html/Changelog.txt +++ b/www/html/Changelog.txt @@ -1,6 +1,50 @@ +* Tue Jan 17 2006 Chris PeBenito - 20060117 +- Adds support for generating corenetwork interfaces based on attributes + in addition to types. +- Permits the listing of multiple nodes in a network_node() that will be + given the same type. +- Add two new permission sets for stream sockets. +- Rename file type transition interfaces verb from create to + filetrans to differentiate it from create interfaces without + type transitions. +- Fix expansion of interfaces from disabled modules. +- Rsync can be long running from init, + added rules to allow this. +- Add polyinstantiation build option. +- Add setcontext to the association object class. +- Add apache relay and db connect tunables. +- Rename texrel_shlib_t to textrel_shlib_t. +- Add swat to samba module. +- Numerous miscellaneous fixes from Dan Walsh. +- Added modules: + alsa + automount + cdrecord + daemontools (Petre Rodan) + ddcprobe + djbdns (Petre Rodan) + fetchmail + irc + java + lockdev + logwatch (Dan Walsh) + openct + prelink (Dan Walsh) + publicfile (Petre Rodan) + readahead + roundup + screen + slocate (Dan Walsh) + slrnpull + smartmon + sysstat + ucspitcp (Petre Rodan) + usbmodules + vbetool (Dan Walsh) + * Wed Dec 07 2005 Chris PeBenito - 20051207 -- Add unlabeled IPSEC association to domains with - networking permsiisions. +- Add unlabeled IPSEC association rule to domains with + networking permissions. - Merge systemuser back in to users, as these files do not need to be split. - Add check for duplicate interface/template definitions. diff --git a/www/html/status.html b/www/html/status.html index 9842931..2ed9bf1 100644 --- a/www/html/status.html +++ b/www/html/status.html @@ -1,13 +1,12 @@

Status

-Current Version: 20051207 +Current Version: 20060117

See download for download information. Details of this release are part of the changelog. This release focused on preparating the policy for use as the Fedora - Core targeted policy. Currently both strict and targeted policies can - be built. MLS policies can be built, but the policy has not been tested - on running systems. MCS support has also been added, and is being tested - with the targeted policy in the Fedora development repositories (Rawhide). + Core MLS policy. Currently both strict and targeted policies can + be built. MLS policies can be built, but the policy is still undergoing + testing on running systems.

 

Status and Tasks

@@ -253,11 +252,6 @@ converted: - daemontools - daemontools.te daemontools.fc daemontools_macros.te - Petre Rodan - - dante dante.te dante.fc @@ -273,11 +267,6 @@ converted: - djbdns - djbdns.te djbdns.fc - Petre Rodan - - dnsmasq dnsmasq.te dnsmasq.fc @@ -348,11 +337,6 @@ converted: - java + - java.te java.fc java_macros.te - Tresys - - lcd lcd.te lcd.fc @@ -423,11 +407,6 @@ converted: - publicfile - publicfile.te publicfile.fc - Petre Rodan - - pxe pxe.te pxe.fc @@ -463,19 +442,14 @@ converted: - slocate + - slocate.te slocate.fc slocate_macros.te - Tresys - - snort snort.te snort.fc - sound + - alsa.te alsa.fc sound.te sound.fc sound-server.te sound-server.fc - Tresys + sound-server + + sound-server.te sound-server.fc + speedtouch @@ -493,11 +467,6 @@ converted: - tinydns - tinydns.te tinydns.fc - - - transproxy transproxy.te transproxy.fc @@ -513,11 +482,6 @@ converted: - ucspi-tcp - ucspi-tcp.te ucspi-tcp.fc - Petre Rodan - - uml + uml.te uml.fc uml_macros.te uml_net.te uml_net.fc