Common policy for sensitive resources
Create a domain for applications.
Create a domain for applications. Typically these are programs that are run interactively.
The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.
| Parameter: | Description: |
|---|---|
| domain |
Type to be used as an application domain. |
| entry_point |
Type of the program to be used as an entry point to this domain. |
Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
bility to mmap a low area of the address space conditionally, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel.
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Make the specified type usable as a basic domain.
Make the specified type usable as a basic domain.
| Parameter: | Description: |
|---|---|
| type |
Type to be used as a basic domain type. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Common file type.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Create a domain for short running processes which are started by init scripts.
Create a domain for short running processes which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes, such as daemons/services should use the init_daemon_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface.
The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.
If the process must also run in a specific MLS/MCS level, the init_ranged_system_domain() should be used instead.
| Parameter: | Description: |
|---|---|
| domain |
Type to be used as a system domain. |
| entry_point |
Type of the program to be used as an entry point to this domain. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Load selinux policy
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_account_daemon_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_active_modules_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_active_modules_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_auditd_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_authentication_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_autorelabel_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_boot_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_boot_grub_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_boot_grub_cfg_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_boot_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_context_files_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_context_files_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_context_users_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_context_users_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_default_active_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_default_active_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_default_context_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_default_context_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_selinux_policy_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_selinux_policy_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_dev_mem_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_dev_ram_t;
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_audit_conf_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_audit_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_ctmm_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_ctmm_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_init_ima_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_pam_d_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_pam_d_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_passwd_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_selinux_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_selinux_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_shadow_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_whitelist_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_etc_whitelist_sm3_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_journald_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_lib_selinux_default_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_lib_selinux_default_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_lightdm_conf_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_lightdm_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_loadmodules_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_polikitd_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_restorecond_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_rsyslog_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Read selinux policy
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_selinux_config_t file
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_selinux_default_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_selinux_default_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_service_file_t file
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_system_map_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_systemd_logind_service_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Summary is missing!
| Parameter: | Description: |
|---|---|
| ? |
Parameter descriptions are missing! |
Summary is missing!
| Parameter: | Description: |
|---|---|
| ? |
Parameter descriptions are missing! |
Manage nfs_var_log_audit_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_var_log_brasero_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_var_log_cups_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_var_log_lightdm_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Manage nfs_var_log_messages_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Read nfs_dev_mem_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Read nfs_dev_ram_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Summary is missing!
| Parameter: | Description: |
|---|---|
| ? |
Parameter descriptions are missing! |
Read selinux policy
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Relabel all file
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Setattr nfs_dev_ram_t
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Setenforce policy
| Parameter: | Description: |
|---|---|
| domain |
Domain allowed access. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Domain associated role.
| Parameter: | Description: |
|---|---|
| type |
Type to be used for files. |
Summary is missing!
| Parameter: | Description: |
|---|---|
| ? |
Parameter descriptions are missing! |
Summary is missing!
| Parameter: | Description: |
|---|---|
| ? |
Parameter descriptions are missing! |