Desktop messaging bus
Allow attempts to send dbus messages to system dbusd type.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Do not audit attempts to send dbus messages to session bus types.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Allow attempts to send dbus messages to system bus types.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Connect to the system DBUS for service (acquire_svc).
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Connect to the system DBUS for service (acquire_svc).
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Delete all dbus pid files
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Do not audit attempts to send dbus messages to session bus types.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Do not audit attempts to send dbus messages to system bus types.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Do not audit attempts to connect to session bus types with a unix stream socket.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Do not audit attempts to connect to session bus types with a unix stream socket.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Execute dbus-daemon in the caller domain.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access |
Transition to dbus named content
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Create, read, write, and delete system dbus lib files.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Read dbus configuration.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Read system dbus lib files.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Read all dbus pid files
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Send a message the session DBUS.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Send a message on the system DBUS.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Template for creating connections to a user DBUS.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Creating connections to specified DBUS sessions.
| Parameter: | Description: |
|---|---|
| role_prefix |
The prefix of the user role (e.g., user is the prefix for user_r). |
| domain |
Domain allowed access. |
Allow a application domain to be started by the session dbus.
| Parameter: | Description: |
|---|---|
| domain_prefix |
User domain prefix to be used. |
| domain |
Type to be used as a domain. |
| entry_point |
Type of the program to be used as an entry point to this domain. |
Allow attempts to connect to session bus types with a unix stream socket.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
Allow attempts to connect to session bus types with a unix stream socket.
| Parameter: | Description: |
|---|---|
| domain |
Domain to not audit. |
DBUS stub interface. No access allowed.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access |
Template for creating connections to the system DBUS.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Allow unconfined access to the system DBUS.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Create a domain for processes which can be started by the system dbus
| Parameter: | Description: |
|---|---|
| domain |
Type to be used as a domain. |
| entry_point |
Type of the program to be used as an entry point to this domain. |
Allow unconfined access to the system DBUS.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Use and inherit system DBUS file descriptors.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Role access for dbus
| Parameter: | Description: |
|---|---|
| role_prefix |
The prefix of the user role (e.g., user is the prefix for user_r). |
| role |
Role allowed access |
| domain |
User domain for the role |