This module contains basic filesystem types and interfaces. This includes:
The concept of different file types including basic files, mount points, tmp files, etc.
Access to groups of files and all files.
Types and interfaces for the basic filesystem layout (/, /etc, /tmp, /usr, etc.).
This module is required to be included in all policies.
Allow caller to append inherited tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Append files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow the specified type to associate to a filesystem with the type of the / file system
Parameter: | Description: |
---|---|
file_type |
Type of the file to associate. |
Allow the specified type to associate to a filesystem with the type of the temporary directory (/tmp).
Parameter: | Description: |
---|---|
file_type |
Type of the file to associate. |
Mark the specified type as a file that is related to authentication.
Parameter: | Description: |
---|---|
file_type |
Type of the authentication-related file. |
Make the specified type a base file.
Identify file type as base file type. Tools will use this attribute, to help users diagnose problems.
Parameter: | Description: |
---|---|
file_type |
Type to be used as a base files. |
Create a private type object in boot with an automatic type transition
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to be created. |
object_class |
The object class of the object being created. |
name |
The name of the object being created. |
Allow the specified domain to modify the systemd configuration of any file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a configuration file.
Make the specified type usable for configuration files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with configuration management tools.
Example usage with a domain that can read its configuration file /etc:
type myconffile_t; files_config_file(myconffile_t) allow mydomain_t myconffile_t:file read_file_perms; files_search_etc(mydomain_t)
Parameter: | Description: |
---|---|
file_type |
Type to be used as a configuration file. |
Create all pid named pipes
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create all pid sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create all spool sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow domain to create_file_ass all types
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create directories in /boot
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create a boot flag.
Create a boot flag, such as /.autorelabel and /.autofsck.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
name |
The name of the object being created. |
Create a default directory
Create a default_t direcrory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Install a kernel into the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Install a system.map into the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create lock directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Create directories in /var/lib
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create generic pid directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow domain to delete to all dirs
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Allow domain to delete to all files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Delete all process ID directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all pid named pipes
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all pid sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all process IDs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete all spool sockets
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a boot flag.
Delete a boot flag, such as /.autorelabel and /.autofsck.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remove entries from the etc directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete system configuration files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete generic lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete block files on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete chr files on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete named pipes on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete files on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete named sockets on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete symbolic links on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a kernel from /boot.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete a system.map in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remove entries from the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Remove entries from the tmp directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow delete all tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Delete generic directories in /usr in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete generic files in /usr in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Dontaudit getattr attempts on the system.map file
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to check the access on etc files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to check the access on home root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to check the write access on mnt files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to check the access on root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to check the access on tmp files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to check the access on all files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to rw inherited file perms of non security files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of daemon runtime data files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all named pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all named sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all tmp files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all tmp sock_file.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get attributes of the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of the home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security block devices.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security character devices.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security named pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security named sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of non security symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to getattr all tmpfs files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to ioctl daemon runtime data files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write all leaked files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit listing of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to list contents of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
dontaudit List the contents of /mnt.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to list all non-security directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read security dirs
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit listing of the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit listing of the var directory (/var).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Dontaudit Moundon directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on the root file system
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to read of all security file types.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read of all named sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files in /etc that are dynamically created on boot, such as mtab.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read security files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Dontaudit remove dir /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read/write inherited locks (/var/lock).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read/write of non security named pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write character device nodes in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write files in the root directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to add and remove entries from /usr directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the contents of any directories on extended attribute filesystems.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit searching of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the all /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the locks directory (/var/lock).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search /mnt.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search non security dirs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search security files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search generic spool directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the contents of /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes on all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes of the etc_runtime files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes of non security directories.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to set the attributes of non security files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write all leaked tmpfiles files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to unmount all mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to all files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to mount points.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to daemon runtime data files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to /etc dirs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write etc_runtime files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to character files that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to / dirs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit write of /usr dirs
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
dontaudit write of /usr files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to write to /var.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Allow any file point to be the entrypoint of this domain
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make all mountpoint as entrypoint.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create objects in /etc with a private type using a type_transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
Private file type. |
class |
Object classes to be created. |
name |
The name of the object being created. |
Create, etc runtime objects with an automatic type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object |
The class of the object being created. |
name |
The name of the object being created. |
Create files in /etc with the type used for the manageable system config files.
Parameter: | Description: |
---|---|
domain |
The type of the process performing this action. |
Execute all base ro files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute generic programs in /var/run in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute files on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute generic programs in /usr in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Execute programs in /usr/src in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow shared library text relocations in all files.
Allow shared library text relocations in all files.
This is added to support WINE policy.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow shared library text relocations in tmp files.
Allow shared library text relocations in tmp files.
This is added to support java policy.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, lib_t objects with an automatic type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
directory_type |
Type of the directory to be transitioned from |
object |
The class of the object being created. |
name |
The name of the object being created. |
Transition named content in the var_run_t directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
File name transition for system configuration files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
File name transition for system db files in /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all blk files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all chr files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all filesystems with the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all named pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all named sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to get the attributes of all tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get attributes of the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Getattr of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of generic lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Getattr all file opbjects on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Getattr of directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of files in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of files in /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create objects in /home.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
home_type |
The private type. |
object |
The class of the object being created. |
name |
The name of the object being created. |
Create objects in the kernel module directories with a private type via an automatic type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to be created. |
object_class |
The object class of the object being created. |
name |
The name of the object being created. |
List the contents of all directories on extended attribute filesystems.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List all tmp directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List contents of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get listing of home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the kernel module directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List generic lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-authentication related directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List all non-security directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the runtime process ID directories (/var/run).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of generic spool (/var/spool) directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of generic directories in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List the contents of the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
List world-readable directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable for lock files.
Parameter: | Description: |
---|---|
type |
Type to be used for lock files. |
Create an object in the locks directory, with a private type using a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Manage all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
manage all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
manage all pidfile directories in the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
manage all pidfiles in the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in /boot.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage all configuration directories on filesystem
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage all configuration files on filesystem
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage generic directories in /etc
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Create, read, write, and delete generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in /etc that are dynamically created on boot, such as mtab.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete generic lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
manage generic symbolic links in the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete generic spool files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete generic spool directories (/var/spool).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage temporary directories in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage temporary files and directories in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete block device nodes on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete character device nodes on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete objects in lost+found directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow domain to manage mount tables necessary for rpcd, nfsd, etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to manage non-security directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create a core files in /
Create a core file in /,
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage manageable system configuration files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Manage manageable system db files in /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete the pseudorandom number generator seed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in the /usr directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete directories in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
manage generic symbolic links in the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete symbolic links in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount all filesystems with the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount filesystems on all polyinstantiation member directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on a directory with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mounton directories on filesystem /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Moundon directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on a new chr_file that has not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on a directory on new filesystems that has not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on all non-security directories and files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mount a filesystem on the root file system
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable for filesystem mount points.
Parameter: | Description: |
---|---|
type |
Type to be used for mount points. |
Create a private type object in mountpoint dir with an automatic type transition
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private_type |
The type of the object to be created. |
object_class |
The object class of the object being created. |
name |
The name of the object being created. |
Make the specified type usable for runtime process ID files.
Make the specified type usable for runtime process ID files, typically found in /var/run. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a PID file type may result in problems with starting or stopping services.
Related interfaces:
files_pid_filetrans()
Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:
type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file)
Parameter: | Description: |
---|---|
type |
Type to be used for PID files. |
Create an object in the process ID directory, with a private type.
Create an object in the process ID directory (e.g., /var/run) with a private type. Typically this is used for creating private PID files in /var/run with the private type instead of the general PID file type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.
Related interfaces:
files_pid_file()
Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:
type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Create a generic lock directory within the run directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
name |
The name of the object being created. |
Make the specified type a polyinstantiated directory.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a polyinstantiated directory. |
Make the specified type a polyinstantiation member directory.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a member directory. |
Make the domain use the specified type of polyinstantiated directory.
Parameter: | Description: |
---|---|
domain |
Domain using the polyinstantiated directory. |
file_type |
Type of the file to be used as a member directory. |
Make the specified type a parent of a polyinstantiated directory.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a parent directory. |
Allow access to manage all polyinstantiated directories on the system.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Delete the contents of /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all ro base files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all block nodes with file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all character nodes with file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all directories on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read all files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read all lock files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all mountpoint symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all process ID files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all symbolic links on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Read all tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
read files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read config files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read named pipes with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read sockets with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic files in /etc.
Allow the specified domain to read generic files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:
/etc/fstab
/etc/passwd
/etc/services
/etc/shells
This interface does not include access to /etc/shadow.
Generally, it is safe for many domains to have this access. However, since this interface provides access to the /etc/passwd file, caution must be exercised, as user account names can be leaked through this access.
Related interfaces:
auth_read_shadow()
files_read_etc_runtime_files()
seutil_read_config()
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in /etc that are dynamically created on boot, such as mtab.
Allow the specified domain to read dynamically created configuration files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:
/etc/motd
/etc/mtab
/etc/nologin
This interface does not include access to /etc/shadow.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic process ID files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic spool files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow caller to read inherited tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read kernel files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read system.map in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
read files in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-authentication related symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read manageable system configuration files in /etc
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic files in /usr.
Allow the specified domain to read generic files in /usr. These files are various program files that do not have more specific SELinux types. Some examples of these files are:
/usr/include/*
/usr/share/doc/*
/usr/share/info/*
Generally, it is safe for many domains to have this access.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in /usr/src.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic files in /var/lib.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read generic symbolic links in /var/lib
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read symbolic links in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable named pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read world-readable symbolic links.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a filesystem to the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
Relabel to and from all lock directory types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all lock file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relable all pid directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relable all pid files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all spool directory types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all temporary directory types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all temporary file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all base file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel configuration directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel configuration files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from and to generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from and to kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel all non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a rootfs filesystem.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel dirs in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel dirs in the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel from files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabelfrom all file opbjects on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel manageable system configuration files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a dir from the type used in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a file from the type used in /tmp.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a file from the type used in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a filesystem to the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to files in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to user home root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel manageable system configuration files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel a file to the type used in /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to dirs in the /var/lib directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a base read only file.
Make the specified type readable for all domains.
Parameter: | Description: |
---|---|
file_type |
Type to be used as a base read only files. |
Create an object in the root directory, with a private type using a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Create, default_t objects with an automatic type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object |
The class of the object being created. |
rw all files on the filesystem, except the listed exceptions.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
exception_types |
The types to be excluded. Each type or attribute must be negated by the caller. |
rw any files inherited from another process
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
object_type |
Object type. |
Read and write symbolic links in the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Add and remove entries from /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write generic files in /etc.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write files in /etc that are dynamically created on boot, such as mtab.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write generic process ID files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow read and write to the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain not to audit. |
Read and write generic named sockets in the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
rw generic pid files inherited from another process
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
rw any files inherited from another process on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read/Write all inherited non-security files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow caller to read and write inherited tmp files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write block device nodes on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Add and remove entries in the /var/lock directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
rw non-authentication related files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Add and remove entries from pid directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do allow attempts to read or write all leaked tmpfiles files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Allow read write all tmpfs files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Add and remove entries from /usr directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write files in the /var directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read-write /var/lib directories
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of all directories on extended attribute filesystems.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow search the all /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Search all base file dirs.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the /boot directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of directories with the default file type.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search home directories root (/home).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of the kernel module directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the locks directory (/var/lock).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of /mnt.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of runtime process ID directories (/var/run).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of generic spool directories (/var/spool).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the tmp directory (/tmp).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the content of /usr.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the contents of /var.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Search the /var/lib directory.
Search the /var/lib directory. This is necessary to access files or directories under /var/lib that have a private type. For example, a domain accessing a private library file in the /var/lib directory:
allow mydomain_t mylibfile_t:file read_file_perms; files_search_var_lib(mydomain_t)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a file that should not be dontaudited from browsing from user domains.
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a member directory. |
Make the specified type usable for security file filesystem mount points.
Parameter: | Description: |
---|---|
type |
Type to be used for mount points. |
Set the attributes of all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of all tmp directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /etc directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Setattr of directories on new filesystems that have not yet been labeled.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /var/lock directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to setattr any directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set attributes of the root directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the attributes of the /usr directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type a file used for spool files.
Make the specified type usable for spool files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a spool file may result in problems with purging spool files.
Related interfaces:
files_spool_filetrans()
Example usage with a domain that can create and write its spool file in the system spool file directories (/var/spool):
type myspoolfile_t; files_spool_file(myfile_spool_t) allow mydomain_t myfile_spool_t:file { create_file_perms write_file_perms }; files_spool_filetrans(mydomain_t, myfile_spool_t, file)
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a spool file. |
Create objects in the spool directory with a private type with a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file |
Type to which the created node will be transitioned. |
class |
Object class(es) (single or set including {}) for which this the transition will occur. |
name |
The name of the object being created. |
Get the status of etc_t files
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
files stub etc_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub tmp_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub var_run_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub var_lib_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub var_lock_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub var_log_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub var_run_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
files stub var_run_t interface. No access allowed.
Parameter: | Description: |
---|---|
domain |
Domain allowed access |
Make the specified type a file used for temporary files.
Make the specified type usable for temporary files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with purging temporary files.
Related interfaces:
files_tmp_filetrans()
Example usage with a domain that can create and write its temporary file in the system temporary file directories (/tmp or /var/tmp):
type mytmpfile_t; files_tmp_file(mytmpfile_t) allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms }; files_tmp_filetrans(mydomain_t, mytmpfile_t, file)
Parameter: | Description: |
---|---|
file_type |
Type of the file to be used as a temporary file. |
Create an object in the tmp directories, with a private type using a type transition.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
private type |
The type of the object to be created. |
object |
The object class of the object being created. |
name |
The name of the object being created. |
Transform the type into a file, for use on a virtual memory filesystem (tmpfs).
Parameter: | Description: |
---|---|
type |
The type to be transformed. |
Make the specified type usable for files in a filesystem.
Make the specified type usable for files in a filesystem. Types used for files that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running. If the type is used for device nodes (character or block files), then the dev_node() interface is more appropriate.
Related interfaces:
application_domain()
application_executable_file()
corecmd_executable_file()
init_daemon_domain()
init_domaion()
init_ranged_daemon_domain()
init_ranged_domain()
init_ranged_system_domain()
init_script_file()
init_script_domain()
init_system_domain()
files_config_files()
files_lock_file()
files_mountpoint()
files_pid_file()
files_security_file()
files_security_mountpoint()
files_spool_file()
files_tmp_file()
files_tmpfs_file()
logging_log_file()
userdom_user_home_content()
Example:
type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;
Parameter: | Description: |
---|---|
type |
Type to be used for files. |
Unconfined access to files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Unmount all filesystems with the type of a file.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Unmount a rootfs filesystem.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create objects in the /usr directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
The type of the object to be created |
object_class |
The object class. |
name |
The name of the object being created. |
Create objects in the /var directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
The type of the object to be created |
object_class |
The object class. |
name |
The name of the object being created. |
Create objects in the /var/lib directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
file_type |
The type of the object to be created |
object_class |
The object class. |
name |
The name of the object being created. |
Write all file type directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write all mount points.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write all sockets in the /var/run directory.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write named generic process ID pipes
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write kernel module files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow attempts to modify any directory
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to write to / dirs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Allow attempts to write to /var.dirs
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |