Update callers for "pid" to "runtime" interface rename.

Signed-off-by: Chris PeBenito <pebenito@ieee.org>
This commit is contained in:
Chris PeBenito 2020-06-27 17:11:48 -04:00
parent be04bb3e7e
commit 0992763548
517 changed files with 1315 additions and 1304 deletions

View File

@ -19,7 +19,7 @@ type alsa_home_t;
userdom_user_home_content(alsa_home_t)
type alsa_runtime_t;
files_pid_file(alsa_runtime_t)
files_runtime_file(alsa_runtime_t)
type alsa_tmp_t;
files_tmp_file(alsa_tmp_t)
@ -61,7 +61,7 @@ can_exec(alsa_t, alsa_exec_t)
allow alsa_t alsa_runtime_t:dir manage_dir_perms;
allow alsa_t alsa_runtime_t:file manage_file_perms;
allow alsa_t alsa_runtime_t:lnk_file manage_lnk_file_perms;
files_pid_filetrans(alsa_t, alsa_runtime_t, { dir file })
files_runtime_filetrans(alsa_t, alsa_runtime_t, { dir file })
manage_dirs_pattern(alsa_t, alsa_tmp_t, alsa_tmp_t)
manage_files_pattern(alsa_t, alsa_tmp_t, alsa_tmp_t)

View File

@ -185,7 +185,7 @@ corenet_tcp_connect_amanda_port(amanda_recover_t)
domain_use_interactive_fds(amanda_recover_t)
files_read_etc_runtime_files(amanda_recover_t)
files_search_pids(amanda_recover_t)
files_search_runtime(amanda_recover_t)
files_search_tmp(amanda_recover_t)
auth_use_nsswitch(amanda_recover_t)

View File

@ -31,7 +31,7 @@ logging_send_audit_msgs(amtu_t)
userdom_use_user_terminals(amtu_t)
optional_policy(`
nscd_dontaudit_search_pid(amtu_t)
nscd_dontaudit_search_runtime(amtu_t)
')
optional_policy(`

View File

@ -88,6 +88,6 @@ interface(`bacula_admin',`
files_search_var_lib($1)
admin_pattern($1, bacula_var_lib_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, bacula_runtime_t)
')

View File

@ -21,7 +21,7 @@ type bacula_log_t;
logging_log_file(bacula_log_t)
type bacula_runtime_t alias bacula_var_run_t;
files_pid_file(bacula_runtime_t)
files_runtime_file(bacula_runtime_t)
type bacula_spool_t;
files_type(bacula_spool_t)
@ -66,7 +66,7 @@ manage_files_pattern(bacula_t, bacula_var_lib_t, bacula_var_lib_t)
files_var_lib_filetrans(bacula_t, bacula_var_lib_t, dir)
allow bacula_t bacula_runtime_t:file manage_file_perms;
files_pid_filetrans(bacula_t, bacula_runtime_t, file)
files_runtime_filetrans(bacula_t, bacula_runtime_t, file)
kernel_read_kernel_sysctls(bacula_t)
kernel_read_system_state(bacula_t)

View File

@ -143,7 +143,7 @@ interface(`bcfg2_admin',`
init_startstop_service($1, $2, bcfg2_t, bcfg2_initrc_exec_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, bcfg2_runtime_t)
files_search_var_lib($1)

View File

@ -13,7 +13,7 @@ type bcfg2_initrc_exec_t;
init_script_file(bcfg2_initrc_exec_t)
type bcfg2_runtime_t alias bcfg2_var_run_t;
files_pid_file(bcfg2_runtime_t)
files_runtime_file(bcfg2_runtime_t)
type bcfg2_var_lib_t;
files_type(bcfg2_var_lib_t)
@ -32,7 +32,7 @@ manage_files_pattern(bcfg2_t, bcfg2_var_lib_t, bcfg2_var_lib_t)
files_var_lib_filetrans(bcfg2_t, bcfg2_var_lib_t, dir)
manage_files_pattern(bcfg2_t, bcfg2_runtime_t, bcfg2_runtime_t)
files_pid_filetrans(bcfg2_t, bcfg2_runtime_t, file)
files_runtime_filetrans(bcfg2_t, bcfg2_runtime_t, file)
kernel_read_system_state(bcfg2_t)

View File

@ -10,7 +10,7 @@ type blueman_exec_t;
dbus_system_domain(blueman_t, blueman_exec_t)
type blueman_runtime_t alias blueman_var_run_t;
files_pid_file(blueman_runtime_t)
files_runtime_file(blueman_runtime_t)
type blueman_var_lib_t;
files_type(blueman_var_lib_t)
@ -30,7 +30,7 @@ files_var_lib_filetrans(blueman_t, blueman_var_lib_t, dir)
manage_dirs_pattern(blueman_t, blueman_runtime_t, blueman_runtime_t)
manage_files_pattern(blueman_t, blueman_runtime_t, blueman_runtime_t)
files_pid_filetrans(blueman_t, blueman_runtime_t, { dir file })
files_runtime_filetrans(blueman_t, blueman_runtime_t, { dir file })
kernel_read_net_sysctls(blueman_t)
kernel_read_system_state(blueman_t)
@ -62,7 +62,7 @@ optional_policy(`
optional_policy(`
dnsmasq_domtrans(blueman_t)
dnsmasq_read_pid_files(blueman_t)
dnsmasq_read_runtime_files(blueman_t)
')
optional_policy(`

View File

@ -116,7 +116,7 @@ files_read_var_files(bootloader_t)
files_read_kernel_modules(bootloader_t)
files_search_mnt(bootloader_t)
# for nscd
files_dontaudit_search_pids(bootloader_t)
files_dontaudit_search_runtime(bootloader_t)
# for blkid.tab
files_manage_etc_runtime_files(bootloader_t)
files_etc_filetrans_etc_runtime(bootloader_t, file)
@ -158,7 +158,7 @@ seutil_read_file_contexts(bootloader_t)
seutil_read_loadpolicy(bootloader_t)
seutil_dontaudit_search_config(bootloader_t)
udev_read_pid_files(bootloader_t)
udev_read_runtime_files(bootloader_t)
userdom_use_user_terminals(bootloader_t)
userdom_dontaudit_search_user_home_dirs(bootloader_t)
@ -244,7 +244,7 @@ optional_policy(`
')
optional_policy(`
raid_read_mdadm_pid(bootloader_t)
raid_read_mdadm_runtime_files(bootloader_t)
')
optional_policy(`

View File

@ -52,6 +52,6 @@ optional_policy(`
optional_policy(`
pcscd_domtrans(certwatch_t)
pcscd_read_pid_files(certwatch_t)
pcscd_read_runtime_files(certwatch_t)
pcscd_stream_connect(certwatch_t)
')

View File

@ -66,7 +66,7 @@ optional_policy(`
')
optional_policy(`
auth_read_pam_pid(consoletype_t)
auth_read_pam_runtime_files(consoletype_t)
')
optional_policy(`

View File

@ -46,7 +46,7 @@ dev_read_rand(dphysswapfile_t)
dev_read_urand(dphysswapfile_t)
# ignore ls -l /var/swap noise
files_dontaudit_getattr_pid_dirs(dphysswapfile_t)
files_dontaudit_getattr_runtime_dirs(dphysswapfile_t)
files_read_etc_files(dphysswapfile_t)
files_search_var(dphysswapfile_t)
files_var_filetrans(dphysswapfile_t, dphysswapfile_swap_t, file)

View File

@ -77,7 +77,7 @@ interface(`hwloc_read_runtime_files',`
type hwloc_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
read_files_pattern($1, hwloc_runtime_t, hwloc_runtime_t)
')
@ -102,5 +102,5 @@ interface(`hwloc_admin',`
ps_process_pattern($1, hwloc_dhwd_t)
admin_pattern($1, hwloc_runtime_t)
files_pid_filetrans($1, hwloc_runtime_t, dir, "hwloc")
files_runtime_filetrans($1, hwloc_runtime_t, dir, "hwloc")
')

View File

@ -17,7 +17,7 @@ type hwloc_dhwd_unit_t;
init_unit_file(hwloc_dhwd_unit_t)
type hwloc_runtime_t alias hwloc_var_run_t;
files_pid_file(hwloc_runtime_t)
files_runtime_file(hwloc_runtime_t)
########################################
#
@ -26,6 +26,6 @@ files_pid_file(hwloc_runtime_t)
allow hwloc_dhwd_t hwloc_runtime_t:dir manage_dir_perms;
allow hwloc_dhwd_t hwloc_runtime_t:file manage_file_perms;
files_pid_filetrans(hwloc_dhwd_t, hwloc_runtime_t, dir)
files_runtime_filetrans(hwloc_dhwd_t, hwloc_runtime_t, dir)
dev_read_sysfs(hwloc_dhwd_t)

View File

@ -128,7 +128,7 @@ interface(`kismet_read_runtime_files',`
type kismet_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
allow $1 kismet_runtime_t:file read_file_perms;
')
@ -148,7 +148,7 @@ interface(`kismet_manage_runtime_files',`
type kismet_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
allow $1 kismet_runtime_t:file manage_file_perms;
')
@ -325,7 +325,7 @@ interface(`kismet_admin',`
files_search_var_lib($1)
admin_pattern($1, kismet_var_lib_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, kismet_runtime_t)
logging_search_logs($1)

View File

@ -22,7 +22,7 @@ type kismet_log_t;
logging_log_file(kismet_log_t)
type kismet_runtime_t alias kismet_var_run_t;
files_pid_file(kismet_runtime_t)
files_runtime_file(kismet_runtime_t)
type kismet_tmp_t;
files_tmp_file(kismet_tmp_t)
@ -71,7 +71,7 @@ allow kismet_t kismet_var_lib_t:dir manage_dir_perms;
files_var_lib_filetrans(kismet_t, kismet_var_lib_t, { file dir })
allow kismet_t kismet_runtime_t:dir manage_dir_perms;
files_pid_filetrans(kismet_t, kismet_runtime_t, file)
files_runtime_filetrans(kismet_t, kismet_runtime_t, file)
can_exec(kismet_t, kismet_exec_t)

View File

@ -94,6 +94,6 @@ interface(`kudzu_admin',`
files_search_tmp($1)
admin_pattern($1, kudzu_tmp_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, kudzu_runtime_t)
')

View File

@ -16,7 +16,7 @@ type kudzu_initrc_exec_t;
init_script_file(kudzu_initrc_exec_t)
type kudzu_runtime_t alias kudzu_var_run_t;
files_pid_file(kudzu_runtime_t)
files_runtime_file(kudzu_runtime_t)
type kudzu_tmp_t;
files_tmp_file(kudzu_tmp_t)
@ -40,7 +40,7 @@ files_tmp_filetrans(kudzu_t, kudzu_tmp_t, { file dir chr_file })
manage_dirs_pattern(kudzu_t, kudzu_runtime_t, kudzu_runtime_t)
manage_files_pattern(kudzu_t, kudzu_runtime_t, kudzu_runtime_t)
files_pid_filetrans(kudzu_t, kudzu_runtime_t, file)
files_runtime_filetrans(kudzu_t, kudzu_runtime_t, file)
kernel_change_ring_buffer_level(kudzu_t)
kernel_read_device_sysctls(kudzu_t)

View File

@ -81,7 +81,7 @@ domain_read_all_domains_state(logrotate_t)
files_map_etc_files(logrotate_t)
files_read_usr_files(logrotate_t)
files_read_etc_runtime_files(logrotate_t)
files_read_all_pids(logrotate_t)
files_read_all_runtime_files(logrotate_t)
files_search_all(logrotate_t)
files_read_var_lib_files(logrotate_t)
files_manage_generic_spool(logrotate_t)
@ -229,7 +229,7 @@ optional_policy(`
')
optional_policy(`
openvswitch_read_pid_files(logrotate_t)
openvswitch_read_runtime_files(logrotate_t)
openvswitch_domtrans(logrotate_t)
')

View File

@ -24,7 +24,7 @@ type logwatch_lock_t;
files_lock_file(logwatch_lock_t)
type logwatch_runtime_t alias logwatch_var_run_t;
files_pid_file(logwatch_runtime_t)
files_runtime_file(logwatch_runtime_t)
type logwatch_tmp_t;
files_tmp_file(logwatch_tmp_t)
@ -53,7 +53,7 @@ manage_files_pattern(logwatch_t, logwatch_tmp_t, logwatch_tmp_t)
files_tmp_filetrans(logwatch_t, logwatch_tmp_t, { file dir })
allow logwatch_t logwatch_runtime_t:file manage_file_perms;
files_pid_filetrans(logwatch_t, logwatch_runtime_t, file)
files_runtime_filetrans(logwatch_t, logwatch_runtime_t, file)
kernel_read_fs_sysctls(logwatch_t)
kernel_read_kernel_sysctls(logwatch_t)
@ -136,7 +136,7 @@ optional_policy(`
')
optional_policy(`
avahi_dontaudit_search_pid(logwatch_t)
avahi_dontaudit_search_runtime(logwatch_t)
')
optional_policy(`

View File

@ -53,6 +53,6 @@ interface(`mcelog_admin',`
logging_search_logs($1)
admin_pattern($1, mcelog_log_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, mcelog_runtime_t)
')

View File

@ -58,7 +58,7 @@ type mcelog_log_t;
logging_log_file(mcelog_log_t)
type mcelog_runtime_t alias mcelog_var_run_t;
files_pid_file(mcelog_runtime_t)
files_runtime_file(mcelog_runtime_t)
########################################
#
@ -80,7 +80,7 @@ logging_log_filetrans(mcelog_t, mcelog_log_t, { dir file })
manage_dirs_pattern(mcelog_t, mcelog_runtime_t, mcelog_runtime_t)
manage_files_pattern(mcelog_t, mcelog_runtime_t, mcelog_runtime_t)
manage_sock_files_pattern(mcelog_t, mcelog_runtime_t, mcelog_runtime_t)
files_pid_filetrans(mcelog_t, mcelog_runtime_t, { dir file sock_file })
files_runtime_filetrans(mcelog_t, mcelog_runtime_t, { dir file sock_file })
kernel_read_system_state(mcelog_t)

View File

@ -76,7 +76,7 @@ interface(`mrtg_admin',`
logging_search_logs($1)
admin_pattern($1, mrtg_log_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, mrtg_runtime_t)
files_search_var_lib($1)

View File

@ -22,7 +22,7 @@ type mrtg_log_t;
logging_log_file(mrtg_log_t)
type mrtg_runtime_t alias mrtg_var_run_t;
files_pid_file(mrtg_runtime_t)
files_runtime_file(mrtg_runtime_t)
type mrtg_var_lib_t;
files_type(mrtg_var_lib_t)
@ -56,7 +56,7 @@ manage_files_pattern(mrtg_t, mrtg_var_lib_t, mrtg_var_lib_t)
manage_lnk_files_pattern(mrtg_t, mrtg_var_lib_t, mrtg_var_lib_t)
allow mrtg_t mrtg_runtime_t:file manage_file_perms;
files_pid_filetrans(mrtg_t, mrtg_runtime_t, file)
files_runtime_filetrans(mrtg_t, mrtg_runtime_t, file)
kernel_read_system_state(mrtg_t)
kernel_read_network_state(mrtg_t)

View File

@ -47,13 +47,13 @@ files_read_usr_files(ncftool_t)
miscfiles_read_localization(ncftool_t)
sysnet_delete_dhcpc_pid(ncftool_t)
sysnet_delete_dhcpc_runtime_files(ncftool_t)
sysnet_run_dhcpc(ncftool_t, ncftool_roles)
sysnet_run_ifconfig(ncftool_t, ncftool_roles)
sysnet_etc_filetrans_config(ncftool_t)
sysnet_manage_config(ncftool_t)
sysnet_read_dhcpc_state(ncftool_t)
sysnet_read_dhcpc_pid(ncftool_t)
sysnet_read_dhcpc_runtime_files(ncftool_t)
sysnet_signal_dhcpc(ncftool_t)
userdom_use_user_terminals(ncftool_t)

View File

@ -15,7 +15,7 @@ type passenger_log_t;
logging_log_file(passenger_log_t)
type passenger_runtime_t alias passenger_var_run_t;
files_pid_file(passenger_runtime_t)
files_runtime_file(passenger_runtime_t)
type passenger_var_lib_t;
files_type(passenger_var_lib_t)
@ -43,7 +43,7 @@ manage_dirs_pattern(passenger_t, passenger_runtime_t, passenger_runtime_t)
manage_files_pattern(passenger_t, passenger_runtime_t, passenger_runtime_t)
manage_fifo_files_pattern(passenger_t, passenger_runtime_t, passenger_runtime_t)
manage_sock_files_pattern(passenger_t, passenger_runtime_t, passenger_runtime_t)
files_pid_filetrans(passenger_t, passenger_runtime_t, { file dir sock_file })
files_runtime_filetrans(passenger_t, passenger_runtime_t, { file dir sock_file })
can_exec(passenger_t, passenger_exec_t)

View File

@ -110,7 +110,7 @@ files_manage_etc_files(gcc_config_t)
files_rw_etc_runtime_files(gcc_config_t)
files_read_usr_files(gcc_config_t)
files_search_var_lib(gcc_config_t)
files_search_pids(gcc_config_t)
files_search_runtime(gcc_config_t)
# complains loudly about not being able to list
# the directory it is being run from
files_list_all(gcc_config_t)
@ -295,7 +295,7 @@ domain_use_interactive_fds(portage_fetch_t)
files_read_etc_runtime_files(portage_fetch_t)
files_read_usr_files(portage_fetch_t)
files_dontaudit_search_pids(portage_fetch_t)
files_dontaudit_search_runtime(portage_fetch_t)
fs_search_auto_mountpoints(portage_fetch_t)

View File

@ -223,7 +223,7 @@ interface(`puppet_admin',`
files_search_var_lib($1)
admin_pattern($1, puppet_var_lib_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, puppet_runtime_t)
files_search_tmp($1)

View File

@ -30,8 +30,8 @@ type puppet_log_t;
logging_log_file(puppet_log_t)
type puppet_runtime_t alias puppet_var_run_t;
files_pid_file(puppet_runtime_t)
init_daemon_pid_file(puppet_runtime_t, dir, "puppet")
files_runtime_file(puppet_runtime_t)
init_daemon_runtime_file(puppet_runtime_t, dir, "puppet")
type puppet_tmp_t;
files_tmp_file(puppet_tmp_t)
@ -76,7 +76,7 @@ can_exec(puppet_t, puppet_var_lib_t)
setattr_dirs_pattern(puppet_t, puppet_runtime_t, puppet_runtime_t)
manage_files_pattern(puppet_t, puppet_runtime_t, puppet_runtime_t)
files_pid_filetrans(puppet_t, puppet_runtime_t, { file dir })
files_runtime_filetrans(puppet_t, puppet_runtime_t, { file dir })
allow puppet_t puppet_log_t:dir { create_dir_perms setattr_dir_perms };
append_files_pattern(puppet_t, puppet_log_t, puppet_log_t)
@ -232,7 +232,7 @@ dev_read_urand(puppetca_t)
dev_search_sysfs(puppetca_t)
files_read_etc_files(puppetca_t)
files_search_pids(puppetca_t)
files_search_runtime(puppetca_t)
files_search_var_lib(puppetca_t)
selinux_validate_context(puppetca_t)
@ -275,7 +275,7 @@ allow puppetmaster_t puppet_var_lib_t:file { manage_file_perms relabel_file_perm
allow puppetmaster_t puppet_runtime_t:dir { create_dir_perms setattr_dir_perms relabel_dir_perms };
allow puppetmaster_t puppet_runtime_t:file manage_file_perms;
files_pid_filetrans(puppetmaster_t, puppet_runtime_t, { file dir })
files_runtime_filetrans(puppetmaster_t, puppet_runtime_t, { file dir })
allow puppetmaster_t puppetmaster_tmp_t:dir { manage_dir_perms relabel_dir_perms };
allow puppetmaster_t puppetmaster_tmp_t:file manage_file_perms;

View File

@ -26,7 +26,7 @@ type quota_nld_initrc_exec_t;
init_script_file(quota_nld_initrc_exec_t)
type quota_nld_runtime_t alias quota_nld_var_run_t;
files_pid_file(quota_nld_runtime_t)
files_runtime_file(quota_nld_runtime_t)
########################################
#
@ -111,7 +111,7 @@ allow quota_nld_t self:netlink_socket create_socket_perms;
allow quota_nld_t self:unix_stream_socket { accept listen };
manage_files_pattern(quota_nld_t, quota_nld_runtime_t, quota_nld_runtime_t)
files_pid_filetrans(quota_nld_t, quota_nld_runtime_t, { file })
files_runtime_filetrans(quota_nld_t, quota_nld_runtime_t, { file })
kernel_read_network_state(quota_nld_t)

View File

@ -10,8 +10,8 @@ type readahead_exec_t;
init_system_domain(readahead_t, readahead_exec_t)
type readahead_runtime_t alias readahead_var_run_t;
files_pid_file(readahead_runtime_t)
init_daemon_pid_file(readahead_runtime_t, dir, "readahead")
files_runtime_file(readahead_runtime_t)
init_daemon_runtime_file(readahead_runtime_t, dir, "readahead")
type readahead_var_lib_t;
files_type(readahead_var_lib_t)
@ -30,7 +30,7 @@ manage_files_pattern(readahead_t, readahead_var_lib_t, readahead_var_lib_t)
manage_dirs_pattern(readahead_t, readahead_runtime_t, readahead_runtime_t)
manage_files_pattern(readahead_t, readahead_runtime_t, readahead_runtime_t)
files_pid_filetrans(readahead_t, readahead_runtime_t, { dir file })
files_runtime_filetrans(readahead_t, readahead_runtime_t, { dir file })
kernel_read_all_sysctls(readahead_t)
kernel_read_system_state(readahead_t)

View File

@ -88,7 +88,7 @@ files_read_all_chr_files(rkhunter_t)
files_getattr_all_pipes(rkhunter_t)
files_getattr_all_sockets(rkhunter_t)
files_check_write_lock_dirs(rkhunter_t)
files_check_write_pid_dirs(rkhunter_t)
files_check_write_runtime_dirs(rkhunter_t)
fs_getattr_tracefs(rkhunter_t)
fs_getattr_tracefs_dirs(rkhunter_t)

View File

@ -601,7 +601,7 @@ interface(`rpm_manage_runtime_files',`
')
manage_files_pattern($1, rpm_runtime_t, rpm_runtime_t)
files_search_pids($1)
files_search_runtime($1)
')
########################################
@ -651,7 +651,7 @@ interface(`rpm_admin',`
logging_list_logs($1)
admin_pattern($1, rpm_log_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, rpm_runtime_t)
fs_search_tmpfs($1)

View File

@ -38,7 +38,7 @@ type rpm_log_t;
logging_log_file(rpm_log_t)
type rpm_runtime_t alias rpm_var_run_t;
files_pid_file(rpm_runtime_t)
files_runtime_file(rpm_runtime_t)
type rpm_unit_t;
init_unit_file(rpm_unit_t)
@ -115,7 +115,7 @@ files_var_lib_filetrans(rpm_t, rpm_var_lib_t, { dir file })
manage_dirs_pattern(rpm_t, rpm_runtime_t, rpm_runtime_t)
manage_files_pattern(rpm_t, rpm_runtime_t, rpm_runtime_t)
files_pid_filetrans(rpm_t, rpm_runtime_t, { dir file })
files_runtime_filetrans(rpm_t, rpm_runtime_t, { dir file })
can_exec(rpm_t, { rpm_tmp_t rpm_tmpfs_t })

View File

@ -227,6 +227,6 @@ interface(`samhain_admin',`
logging_list_logs($1)
admin_pattern($1, samhain_log_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, samhain_runtime_t)
')

View File

@ -26,7 +26,7 @@ type samhain_initrc_exec_t;
init_script_file(samhain_initrc_exec_t)
type samhain_runtime_t alias samhain_var_run_t;
files_pid_file(samhain_runtime_t)
files_runtime_file(samhain_runtime_t)
samhain_service_template(samhain)
application_domain(samhain_t, samhain_exec_t)
@ -60,7 +60,7 @@ manage_files_pattern(samhain_domain, samhain_log_t, samhain_log_t)
logging_log_filetrans(samhain_domain, samhain_log_t, file)
manage_files_pattern(samhain_domain, samhain_runtime_t, samhain_runtime_t)
files_pid_filetrans(samhain_domain, samhain_runtime_t, file)
files_runtime_filetrans(samhain_domain, samhain_runtime_t, file)
kernel_getattr_core_if(samhain_domain)

View File

@ -61,6 +61,6 @@ interface(`sblim_admin',`
init_startstop_service($1, $2, sblim_domain, sblim_initrc_exec_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, sblim_runtime_t)
')

View File

@ -19,7 +19,7 @@ type sblim_initrc_exec_t;
init_script_file(sblim_initrc_exec_t)
type sblim_runtime_t alias sblim_var_run_t;
files_pid_file(sblim_runtime_t)
files_runtime_file(sblim_runtime_t)
######################################
#

View File

@ -17,7 +17,7 @@ type shutdown_etc_t;
files_config_file(shutdown_etc_t)
type shutdown_runtime_t alias shutdown_var_run_t;
files_pid_file(shutdown_runtime_t)
files_runtime_file(shutdown_runtime_t)
########################################
#
@ -33,14 +33,14 @@ manage_files_pattern(shutdown_t, shutdown_etc_t, shutdown_etc_t)
files_etc_filetrans(shutdown_t, shutdown_etc_t, file)
manage_files_pattern(shutdown_t, shutdown_runtime_t, shutdown_runtime_t)
files_pid_filetrans(shutdown_t, shutdown_runtime_t, file)
files_runtime_filetrans(shutdown_t, shutdown_runtime_t, file)
kernel_read_system_state(shutdown_t)
domain_use_interactive_fds(shutdown_t)
files_delete_boot_flag(shutdown_t)
files_read_generic_pids(shutdown_t)
files_read_runtime_files(shutdown_t)
fs_getattr_xattr_fs(shutdown_t)

View File

@ -14,7 +14,7 @@ application_domain(sosreport_t, sosreport_exec_t)
role sosreport_roles types sosreport_t;
type sosreport_runtime_t alias sosreport_var_run_t;
files_pid_file(sosreport_runtime_t)
files_runtime_file(sosreport_runtime_t)
type sosreport_tmp_t;
files_tmp_file(sosreport_tmp_t)
@ -51,7 +51,7 @@ manage_files_pattern(sosreport_t, sosreport_runtime_t, sosreport_runtime_t)
manage_dirs_pattern(sosreport_t, sosreport_runtime_t, sosreport_runtime_t)
manage_sock_files_pattern(sosreport_t, sosreport_runtime_t, sosreport_runtime_t)
manage_lnk_files_pattern(sosreport_t, sosreport_runtime_t, sosreport_runtime_t)
files_pid_filetrans(sosreport_t, sosreport_runtime_t, { file dir sock_file })
files_runtime_filetrans(sosreport_t, sosreport_runtime_t, { file dir sock_file })
kernel_read_network_state(sosreport_t)
kernel_read_all_sysctls(sosreport_t)
@ -114,7 +114,7 @@ miscfiles_read_localization(sosreport_t)
modutils_read_module_deps(sosreport_t)
optional_policy(`
abrt_manage_pid_files(sosreport_t)
abrt_manage_runtime_files(sosreport_t)
abrt_manage_cache(sosreport_t)
abrt_stream_connect(sosreport_t)
')

View File

@ -117,10 +117,11 @@ template(`sudo_role_template',`
term_relabel_all_ptys($1_sudo_t)
auth_run_chk_passwd($1_sudo_t, $2)
# sudo stores a token in the pam_pid directory
auth_manage_pam_pid($1_sudo_t)
# sudo stores a token in the pam runtime directory
auth_manage_pam_runtime_dirs($1_sudo_t)
auth_manage_pam_runtime_files($1_sudo_t)
auth_use_pam($1_sudo_t)
auth_pid_filetrans_pam_var_run($1_sudo_t, dir, "sudo")
auth_runtime_filetrans_pam_runtime($1_sudo_t, dir, "sudo")
init_rw_utmp($1_sudo_t)

View File

@ -18,6 +18,6 @@ interface(`usbguard_stream_connect',`
type usbguard_t, usbguard_tmpfs_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, usbguard_tmpfs_t, usbguard_tmpfs_t, usbguard_t)
')

View File

@ -344,7 +344,7 @@ domain_use_interactive_fds(passwd_t)
files_read_etc_runtime_files(passwd_t)
files_manage_etc_files(passwd_t)
files_search_var(passwd_t)
files_dontaudit_search_pids(passwd_t)
files_dontaudit_search_runtime(passwd_t)
files_relabel_etc_files(passwd_t)
# /usr/bin/passwd asks for w access to utmp, but it will operate
@ -436,7 +436,7 @@ files_manage_etc_files(sysadm_passwd_t)
files_relabel_etc_files(sysadm_passwd_t)
files_read_etc_runtime_files(sysadm_passwd_t)
# for nscd lookups
files_dontaudit_search_pids(sysadm_passwd_t)
files_dontaudit_search_runtime(sysadm_passwd_t)
# /usr/bin/passwd asks for w access to utmp, but it will operate
# correctly without it. Do not audit write denials to utmp.

View File

@ -50,7 +50,7 @@ tunable_policy(`vbetool_mmap_zero_ignore',`
')
optional_policy(`
hal_rw_pid_files(vbetool_t)
hal_rw_runtime_files(vbetool_t)
hal_write_log(vbetool_t)
hal_dontaudit_append_lib_files(vbetool_t)
')

View File

@ -14,7 +14,7 @@ application_domain(vpnc_t, vpnc_exec_t)
role vpnc_roles types vpnc_t;
type vpnc_runtime_t alias vpnc_var_run_t;
files_pid_file(vpnc_runtime_t)
files_runtime_file(vpnc_runtime_t)
type vpnc_tmp_t;
files_tmp_file(vpnc_tmp_t)
@ -39,7 +39,7 @@ files_tmp_filetrans(vpnc_t, vpnc_tmp_t, { file dir })
manage_dirs_pattern(vpnc_t, vpnc_runtime_t, vpnc_runtime_t)
manage_files_pattern(vpnc_t, vpnc_runtime_t, vpnc_runtime_t)
files_pid_filetrans(vpnc_t, vpnc_runtime_t, { file dir})
files_runtime_filetrans(vpnc_t, vpnc_runtime_t, { file dir})
kernel_read_system_state(vpnc_t)
kernel_read_network_state(vpnc_t)

View File

@ -78,7 +78,7 @@ optional_policy(`
')
optional_policy(`
nscd_dontaudit_search_pid(awstats_t)
nscd_dontaudit_search_runtime(awstats_t)
')
optional_policy(`

View File

@ -170,7 +170,7 @@ miscfiles_read_localization(chromium_t)
sysnet_dns_name_resolve(chromium_t)
# for /run/udev/data/*
udev_read_pid_files(chromium_t)
udev_read_runtime_files(chromium_t)
userdom_user_content_access_template(chromium, chromium_t)
userdom_dontaudit_list_user_home_dirs(chromium_t)

View File

@ -43,7 +43,7 @@ optional_policy(`
')
optional_policy(`
nscd_dontaudit_search_pid(cpufreqselector_t)
nscd_dontaudit_search_runtime(cpufreqselector_t)
')
optional_policy(`

View File

@ -28,7 +28,7 @@ type games_srv_t;
init_system_domain(games_srv_t, games_exec_t)
type games_srv_runtime_t alias games_srv_var_run_t;
files_pid_file(games_srv_runtime_t)
files_runtime_file(games_srv_runtime_t)
type games_tmp_t;
userdom_user_tmp_file(games_tmp_t)
@ -52,7 +52,7 @@ manage_files_pattern(games_srv_t, games_data_t, games_data_t)
manage_lnk_files_pattern(games_srv_t, games_data_t, games_data_t)
manage_files_pattern(games_srv_t, games_srv_runtime_t, games_srv_runtime_t)
files_pid_filetrans(games_srv_t, games_srv_runtime_t, file)
files_runtime_filetrans(games_srv_t, games_srv_runtime_t, file)
can_exec(games_srv_t, games_exec_t)

View File

@ -125,7 +125,7 @@ optional_policy(`
')
optional_policy(`
nscd_dontaudit_search_pid(gconfd_t)
nscd_dontaudit_search_runtime(gconfd_t)
')
optional_policy(`

View File

@ -38,7 +38,7 @@ userdom_user_application_domain(gpg_t, gpg_exec_t)
role gpg_roles types gpg_t;
type gpg_runtime_t;
files_pid_file(gpg_runtime_t)
files_runtime_file(gpg_runtime_t)
userdom_user_runtime_content(gpg_runtime_t)
type gpg_agent_t;

View File

@ -50,7 +50,7 @@ miscfiles_read_localization(libmtp_t)
userdom_use_inherited_user_terminals(libmtp_t)
optional_policy(`
udev_read_pid_files(libmtp_t)
udev_read_runtime_files(libmtp_t)
')
tunable_policy(`libmtp_enable_home_dirs',`

View File

@ -32,7 +32,7 @@ files_read_etc_files(loadkeys_t)
files_read_etc_runtime_files(loadkeys_t)
# keymap files are in /usr/share/keymaps or /usr/share/kbd/keymaps
files_read_usr_files(loadkeys_t)
files_search_pids(loadkeys_t)
files_search_runtime(loadkeys_t)
files_search_src(loadkeys_t)
files_search_tmp(loadkeys_t)
@ -57,5 +57,5 @@ optional_policy(`
')
optional_policy(`
nscd_dontaudit_search_pid(loadkeys_t)
nscd_dontaudit_search_runtime(loadkeys_t)
')

View File

@ -43,7 +43,7 @@ files_read_etc_files(mandb_t)
# /usr/local/man
files_read_usr_symlinks(mandb_t)
# search /var/run/nscd/socket
files_search_pids(mandb_t)
files_search_runtime(mandb_t)
fs_getattr_xattr_fs(mandb_t)

View File

@ -589,7 +589,7 @@ optional_policy(`
optional_policy(`
xserver_read_user_xauth(mozilla_plugin_t)
xserver_read_xdm_pid(mozilla_plugin_t)
xserver_read_xdm_runtime_files(mozilla_plugin_t)
xserver_stream_connect(mozilla_plugin_t)
xserver_use_user_fonts(mozilla_plugin_t)
xserver_dontaudit_read_xdm_tmp_files(mozilla_plugin_t)

View File

@ -201,7 +201,7 @@ interface(`pulseaudio_stream_connect',`
type pulseaudio_t, pulseaudio_runtime_t, pulseaudio_tmp_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, { pulseaudio_tmp_t pulseaudio_runtime_t }, { pulseaudio_tmp_t pulseaudio_runtime_t }, pulseaudio_t)
')

View File

@ -28,7 +28,7 @@ type pulseaudio_home_t;
userdom_user_home_content(pulseaudio_home_t)
type pulseaudio_runtime_t alias pulseaudio_var_run_t;
files_pid_file(pulseaudio_runtime_t)
files_runtime_file(pulseaudio_runtime_t)
type pulseaudio_tmp_t;
userdom_user_tmp_file(pulseaudio_tmp_t)
@ -88,7 +88,7 @@ files_var_lib_filetrans(pulseaudio_t, pulseaudio_var_lib_t, { dir file })
manage_dirs_pattern(pulseaudio_t, pulseaudio_runtime_t, pulseaudio_runtime_t)
manage_files_pattern(pulseaudio_t, pulseaudio_runtime_t, pulseaudio_runtime_t)
manage_sock_files_pattern(pulseaudio_t, pulseaudio_runtime_t, pulseaudio_runtime_t)
files_pid_filetrans(pulseaudio_t, pulseaudio_runtime_t, { dir file })
files_runtime_filetrans(pulseaudio_t, pulseaudio_runtime_t, { dir file })
manage_dirs_pattern(pulseaudio_t, pulseaudio_xdg_config_t, pulseaudio_xdg_config_t)
manage_files_pattern(pulseaudio_t, pulseaudio_xdg_config_t, pulseaudio_xdg_config_t)
@ -228,11 +228,11 @@ optional_policy(`
# for /run/systemd/seats and /run/systemd/sessions
systemd_read_logind_sessions_files(pulseaudio_t)
# for /run/systemd/users/$PID
systemd_read_logind_pids(pulseaudio_t)
systemd_read_logind_runtime_files(pulseaudio_t)
')
optional_policy(`
udev_read_pid_files(pulseaudio_t)
udev_read_runtime_files(pulseaudio_t)
udev_read_state(pulseaudio_t)
udev_read_db(pulseaudio_t)
')
@ -241,7 +241,7 @@ optional_policy(`
xserver_stream_connect(pulseaudio_t)
xserver_manage_xdm_tmp_files(pulseaudio_t)
xserver_read_xdm_lib_files(pulseaudio_t)
xserver_read_xdm_pid(pulseaudio_t)
xserver_read_xdm_runtime_files(pulseaudio_t)
xserver_user_x_domain_template(pulseaudio, pulseaudio_t, pulseaudio_tmpfs_t)
')

View File

@ -276,7 +276,7 @@ interface(`qemu_stream_connect',`
type qemu_t, qemu_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, qemu_runtime_t, qemu_runtime_t, qemu_t)
')

View File

@ -20,7 +20,7 @@ type qemu_exec_t;
application_executable_file(qemu_exec_t)
type qemu_runtime_t alias qemu_var_run_t;
files_pid_file(qemu_runtime_t)
files_runtime_file(qemu_runtime_t)
virt_domain_template(qemu)
role qemu_roles types qemu_t;
@ -38,7 +38,7 @@ kernel_read_crypto_sysctls(qemu_t)
dev_read_sysfs(qemu_t)
allow qemu_t qemu_runtime_t:sock_file create_sock_file_perms;
files_pid_filetrans(qemu_t, qemu_runtime_t, sock_file)
files_runtime_filetrans(qemu_t, qemu_runtime_t, sock_file)
tunable_policy(`qemu_full_network',`
corenet_udp_sendrecv_generic_if(qemu_t)
@ -56,7 +56,7 @@ optional_policy(`
xen_stream_connect_xenstore(qemu_t)
xen_append_log(qemu_t)
xen_pid_filetrans(qemu_t, qemu_runtime_t, sock_file)
xen_runtime_filetrans(qemu_t, qemu_runtime_t, sock_file)
')
optional_policy(`

View File

@ -44,7 +44,7 @@ optional_policy(`
')
optional_policy(`
nscd_dontaudit_search_pid(sambagui_t)
nscd_dontaudit_search_runtime(sambagui_t)
')
optional_policy(`

View File

@ -19,7 +19,7 @@ type screen_tmp_t;
userdom_user_tmp_file(screen_tmp_t)
type screen_runtime_t;
files_pid_file(screen_runtime_t)
files_runtime_file(screen_runtime_t)
ubac_constrained(screen_runtime_t)
########################################
@ -44,7 +44,7 @@ filetrans_pattern(screen_domain, screen_tmp_t, screen_runtime_t, sock_file)
manage_fifo_files_pattern(screen_domain, screen_runtime_t, screen_runtime_t)
manage_dirs_pattern(screen_domain, screen_runtime_t, screen_runtime_t)
manage_sock_files_pattern(screen_domain, screen_runtime_t, screen_runtime_t)
files_pid_filetrans(screen_domain, screen_runtime_t, dir)
files_runtime_filetrans(screen_domain, screen_runtime_t, dir)
manage_dirs_pattern(screen_domain, screen_home_t, screen_home_t)
read_files_pattern(screen_domain, screen_home_t, screen_home_t)

View File

@ -35,5 +35,5 @@ term_use_unallocated_ttys(sigrok_t)
userdom_use_user_ptys(sigrok_t)
optional_policy(`
udev_read_pid_files(sigrok_t)
udev_read_runtime_files(sigrok_t)
')

View File

@ -10,7 +10,7 @@ type locate_exec_t;
init_system_domain(locate_t, locate_exec_t)
type locate_runtime_t alias locate_var_run_t;
files_pid_file(locate_runtime_t)
files_runtime_file(locate_runtime_t)
type locate_var_lib_t;
files_type(locate_var_lib_t)
@ -29,7 +29,7 @@ manage_dirs_pattern(locate_t, locate_var_lib_t, locate_var_lib_t)
manage_files_pattern(locate_t, locate_var_lib_t, locate_var_lib_t)
allow locate_t locate_runtime_t:file manage_file_perms;
files_pid_filetrans(locate_t, locate_runtime_t, file, "mlocate.daily.lock")
files_runtime_filetrans(locate_t, locate_runtime_t, file, "mlocate.daily.lock")
can_exec(locate_t, locate_exec_t)

View File

@ -177,7 +177,7 @@ manage_files_pattern(telepathy_logger_t, telepathy_logger_xdg_data_t, telepathy_
# gnome_data_filetrans(telepathy_logger_t, telepathy_logger_xdg_data_t, dir, "TpLogger")
files_read_usr_files(telepathy_logger_t)
files_search_pids(telepathy_logger_t)
files_search_runtime(telepathy_logger_t)
tunable_policy(`use_nfs_home_dirs',`
fs_manage_nfs_dirs(telepathy_logger_t)
@ -422,7 +422,7 @@ tunable_policy(`use_samba_home_dirs',`
')
optional_policy(`
xserver_read_xdm_pid(telepathy_sunshine_t)
xserver_read_xdm_runtime_files(telepathy_sunshine_t)
xserver_stream_connect(telepathy_sunshine_t)
')

View File

@ -33,7 +33,7 @@ type uml_switch_exec_t;
init_daemon_domain(uml_switch_t, uml_switch_exec_t)
type uml_switch_runtime_t alias uml_swich_var_run_t;
files_pid_file(uml_switch_runtime_t)
files_runtime_file(uml_switch_runtime_t)
########################################
#
@ -137,7 +137,7 @@ allow uml_switch_t self:unix_stream_socket { accept listen };
manage_files_pattern(uml_switch_t, uml_switch_runtime_t, uml_switch_runtime_t)
manage_sock_files_pattern(uml_switch_t, uml_switch_runtime_t, uml_switch_runtime_t)
files_pid_filetrans(uml_switch_t, uml_switch_runtime_t, file)
files_runtime_filetrans(uml_switch_t, uml_switch_runtime_t, file)
kernel_read_kernel_sysctls(uml_switch_t)
kernel_list_proc(uml_switch_t)

View File

@ -55,7 +55,7 @@ files_search_mnt(consolehelper_type)
term_list_ptys(consolehelper_type)
auth_search_pam_console_data(consolehelper_type)
auth_read_pam_pid(consolehelper_type)
auth_read_pam_runtime_files(consolehelper_type)
miscfiles_read_localization(consolehelper_type)
miscfiles_read_fonts(consolehelper_type)
@ -85,7 +85,7 @@ optional_policy(`
optional_policy(`
xserver_domtrans_xauth(consolehelper_type)
xserver_read_xdm_pid(consolehelper_type)
xserver_read_xdm_runtime_files(consolehelper_type)
xserver_stream_connect(consolehelper_type)
')
@ -143,7 +143,8 @@ term_relabel_all_ptys(userhelper_type)
term_use_all_ttys(userhelper_type)
term_use_all_ptys(userhelper_type)
auth_manage_pam_pid(userhelper_type)
auth_manage_pam_runtime_dirs(userhelper_type)
auth_manage_pam_runtime_files(userhelper_type)
auth_manage_var_auth(userhelper_type)
auth_search_pam_console_data(userhelper_type)

View File

@ -38,7 +38,7 @@ domain_dontaudit_read_all_domains_state(usernetctl_t)
files_exec_etc_files(usernetctl_t)
files_read_etc_runtime_files(usernetctl_t)
files_list_pids(usernetctl_t)
files_list_runtime(usernetctl_t)
files_list_home(usernetctl_t)
files_read_usr_files(usernetctl_t)

View File

@ -20,7 +20,7 @@ type vmware_host_exec_t;
init_daemon_domain(vmware_host_t, vmware_host_exec_t)
type vmware_host_pid_t alias vmware_var_run_t;
files_pid_file(vmware_host_pid_t)
files_runtime_file(vmware_host_pid_t)
type vmware_host_tmp_t;
userdom_user_tmp_file(vmware_host_tmp_t)
@ -30,7 +30,7 @@ logging_log_file(vmware_log_t)
ubac_constrained(vmware_log_t)
type vmware_pid_t;
files_pid_file(vmware_pid_t)
files_runtime_file(vmware_pid_t)
ubac_constrained(vmware_pid_t)
type vmware_sys_conf_t;
@ -72,7 +72,7 @@ files_tmp_filetrans(vmware_host_t, vmware_host_tmp_t, { file dir })
manage_files_pattern(vmware_host_t, vmware_var_run_t, vmware_var_run_t)
manage_sock_files_pattern(vmware_host_t, vmware_var_run_t, vmware_var_run_t)
files_pid_filetrans(vmware_host_t, vmware_var_run_t, { file sock_file })
files_runtime_filetrans(vmware_host_t, vmware_var_run_t, { file sock_file })
append_files_pattern(vmware_host_t, vmware_log_t, vmware_log_t)
create_files_pattern(vmware_host_t, vmware_log_t, vmware_log_t)
@ -162,7 +162,7 @@ optional_policy(`
optional_policy(`
xserver_read_tmp_files(vmware_host_t)
xserver_read_xdm_pid(vmware_host_t)
xserver_read_xdm_runtime_files(vmware_host_t)
')
########################################
@ -209,7 +209,7 @@ manage_dirs_pattern(vmware_t, vmware_pid_t, vmware_pid_t)
manage_files_pattern(vmware_t, vmware_pid_t, vmware_pid_t)
manage_lnk_files_pattern(vmware_t, vmware_pid_t, vmware_pid_t)
manage_sock_files_pattern(vmware_t, vmware_pid_t, vmware_pid_t)
files_pid_filetrans(vmware_t, vmware_pid_t, { dir file lnk_file })
files_runtime_filetrans(vmware_t, vmware_pid_t, { dir file lnk_file })
can_exec(vmware_t, { vmware_tmp_t vmware_exec_t })

View File

@ -79,6 +79,6 @@ optional_policy(`
')
optional_policy(`
xserver_read_xdm_pid(wine_t)
xserver_read_xdm_runtime_files(wine_t)
xserver_rw_shm(wine_t)
')

View File

@ -76,7 +76,7 @@ selinux_get_enforce_mode(wm_domain)
seutil_read_config(wm_domain)
udev_read_pid_files(wm_domain)
udev_read_runtime_files(wm_domain)
# the following is needed by gnome-shell
userdom_exec_user_home_content_files(wm_domain)

View File

@ -179,7 +179,7 @@ files_mountpoint(var_lock_t)
# used for pid and other runtime files.
#
type var_run_t;
files_pid_file(var_run_t)
files_runtime_file(var_run_t)
files_mountpoint(var_run_t)
optional_policy(`

View File

@ -415,8 +415,8 @@ optional_policy(`
optional_policy(`
dev_ioctl_dri_dev(kernel_t)
plymouthd_delete_pid_files(kernel_t)
plymouthd_read_pid_files(kernel_t)
plymouthd_delete_runtime_files(kernel_t)
plymouthd_read_runtime_files(kernel_t)
plymouthd_read_spool_files(kernel_t)
plymouthd_rw_lib_files(kernel_t)

View File

@ -154,7 +154,7 @@ optional_policy(`
')
optional_policy(`
pcscd_read_pid_files(xguest_t)
pcscd_read_runtime_files(xguest_t)
pcscd_stream_connect(xguest_t)
')

View File

@ -89,7 +89,7 @@ interface(`abrt_stream_connect',`
type abrt_t, abrt_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, abrt_runtime_t, abrt_runtime_t, abrt_t)
')
@ -268,7 +268,7 @@ interface(`abrt_manage_runtime_files',`
type abrt_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
manage_files_pattern($1, abrt_runtime_t, abrt_runtime_t)
')
@ -311,7 +311,7 @@ interface(`abrt_admin',`
files_search_var($1)
admin_pattern($1, { abrt_retrace_cache_t abrt_var_cache_t abrt_retrace_spool_t })
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, abrt_runtime_t)
files_search_tmp($1)

View File

@ -48,7 +48,7 @@ type abrt_etc_t;
files_config_file(abrt_etc_t)
type abrt_runtime_t alias abrt_var_run_t;
files_pid_file(abrt_runtime_t)
files_runtime_file(abrt_runtime_t)
type abrt_var_log_t;
logging_log_file(abrt_var_log_t)
@ -136,7 +136,7 @@ manage_files_pattern(abrt_t, abrt_runtime_t, abrt_runtime_t)
manage_dirs_pattern(abrt_t, abrt_runtime_t, abrt_runtime_t)
manage_sock_files_pattern(abrt_t, abrt_runtime_t, abrt_runtime_t)
manage_lnk_files_pattern(abrt_t, abrt_runtime_t, abrt_runtime_t)
files_pid_filetrans(abrt_t, abrt_runtime_t, { file dir sock_file })
files_runtime_filetrans(abrt_t, abrt_runtime_t, { file dir sock_file })
can_exec(abrt_t, abrt_tmp_t)
@ -236,7 +236,7 @@ optional_policy(`
rpm_dontaudit_manage_db(abrt_t)
rpm_manage_cache(abrt_t)
rpm_manage_log(abrt_t)
rpm_manage_pid_files(abrt_t)
rpm_manage_runtime_files(abrt_t)
rpm_read_db(abrt_t)
rpm_signull(abrt_t)
')
@ -334,7 +334,7 @@ optional_policy(`
rpm_dontaudit_manage_db(abrt_retrace_coredump_t)
rpm_manage_cache(abrt_retrace_coredump_t)
rpm_manage_log(abrt_retrace_coredump_t)
rpm_manage_pid_files(abrt_retrace_coredump_t)
rpm_manage_runtime_files(abrt_retrace_coredump_t)
rpm_read_db(abrt_retrace_coredump_t)
rpm_signull(abrt_retrace_coredump_t)
')

View File

@ -135,7 +135,7 @@ interface(`acpi_stream_connect',`
type acpid_t, acpid_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, acpid_runtime_t, acpid_runtime_t, acpid_t)
')
@ -174,7 +174,7 @@ interface(`acpi_admin',`
files_search_locks($1)
admin_pattern($1, acpid_lock_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, acpid_runtime_t)
files_search_var_lib($1)

View File

@ -28,7 +28,7 @@ logging_log_file(acpid_log_t)
type acpid_runtime_t;
typealias acpid_runtime_t alias acpid_var_run_t;
files_pid_file(acpid_runtime_t)
files_runtime_file(acpid_runtime_t)
type acpid_tmp_t;
files_tmp_file(acpid_tmp_t)
@ -87,7 +87,7 @@ files_var_lib_filetrans(acpid_t, acpid_var_lib_t, dir)
manage_files_pattern(acpid_t, acpid_runtime_t, acpid_runtime_t)
manage_sock_files_pattern(acpid_t, acpid_runtime_t, acpid_runtime_t)
files_pid_filetrans(acpid_t, acpid_runtime_t, { file sock_file })
files_runtime_filetrans(acpid_t, acpid_runtime_t, { file sock_file })
can_exec(acpid_t, acpid_runtime_t)
@ -169,7 +169,7 @@ optional_policy(`
')
optional_policy(`
devicekit_manage_pid_files(acpid_t)
devicekit_manage_runtime_files(acpid_t)
devicekit_manage_log_files(acpid_t)
devicekit_relabel_log_files(acpid_t)
')

View File

@ -186,7 +186,7 @@ dev_read_urand(afs_fsserver_t)
files_read_etc_runtime_files(afs_fsserver_t)
files_list_home(afs_fsserver_t)
files_read_usr_files(afs_fsserver_t)
files_list_pids(afs_fsserver_t)
files_list_runtime(afs_fsserver_t)
files_dontaudit_search_mnt(afs_fsserver_t)
fs_getattr_xattr_fs(afs_fsserver_t)

View File

@ -83,5 +83,5 @@ interface(`aiccu_admin',`
files_list_etc($1)
admin_pattern($1, aiccu_runtime_t)
files_list_pids($1)
files_list_runtime($1)
')

View File

@ -16,7 +16,7 @@ type aiccu_etc_t;
files_config_file(aiccu_etc_t)
type aiccu_runtime_t alias aiccu_var_run_t;
files_pid_file(aiccu_runtime_t)
files_runtime_file(aiccu_runtime_t)
########################################
#
@ -37,7 +37,7 @@ allow aiccu_t aiccu_etc_t:file read_file_perms;
manage_dirs_pattern(aiccu_t, aiccu_runtime_t, aiccu_runtime_t)
manage_files_pattern(aiccu_t, aiccu_runtime_t, aiccu_runtime_t)
files_pid_filetrans(aiccu_t, aiccu_runtime_t, { file dir })
files_runtime_filetrans(aiccu_t, aiccu_runtime_t, { file dir })
kernel_read_system_state(aiccu_t)

View File

@ -35,7 +35,7 @@ interface(`aisexec_stream_connect',`
type aisexec_t, aisexec_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, aisexec_runtime_t, aisexec_runtime_t, aisexec_t)
')
@ -94,7 +94,7 @@ interface(`aisexecd_admin',`
logging_list_logs($1)
admin_pattern($1, aisexec_var_log_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, aisexec_runtime_t)
files_list_tmp($1)

View File

@ -13,7 +13,7 @@ type aisexec_initrc_exec_t;
init_script_file(aisexec_initrc_exec_t)
type aisexec_runtime_t alias aisexec_var_run_t;
files_pid_file(aisexec_runtime_t)
files_runtime_file(aisexec_runtime_t)
type aisexec_tmp_t;
files_tmp_file(aisexec_tmp_t)
@ -58,7 +58,7 @@ logging_log_filetrans(aisexec_t, aisexec_var_log_t, file)
manage_files_pattern(aisexec_t, aisexec_runtime_t, aisexec_runtime_t)
manage_sock_files_pattern(aisexec_t, aisexec_runtime_t, aisexec_runtime_t)
files_pid_filetrans(aisexec_t, aisexec_runtime_t, { file sock_file })
files_runtime_filetrans(aisexec_t, aisexec_runtime_t, { file sock_file })
kernel_read_system_state(aisexec_t)

View File

@ -217,7 +217,7 @@ interface(`amavis_setattr_runtime_files',`
')
allow $1 amavis_runtime_t:file setattr_file_perms;
files_search_pids($1)
files_search_runtime($1)
')
########################################
@ -236,7 +236,7 @@ interface(`amavis_create_runtime_files',`
')
create_files_pattern($1, amavis_runtime_t, amavis_runtime_t)
files_search_pids($1)
files_search_runtime($1)
')
########################################
@ -285,6 +285,6 @@ interface(`amavis_admin',`
logging_list_logs($1)
admin_pattern($1, amavis_var_log_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, amavis_runtime_t)
')

View File

@ -24,7 +24,7 @@ type amavis_initrc_exec_t;
init_script_file(amavis_initrc_exec_t)
type amavis_runtime_t alias amavis_var_run_t;
files_pid_file(amavis_runtime_t)
files_runtime_file(amavis_runtime_t)
type amavis_var_lib_t;
files_type(amavis_var_lib_t)
@ -83,7 +83,7 @@ logging_log_filetrans(amavis_t, amavis_var_log_t, { sock_file file dir })
manage_dirs_pattern(amavis_t, amavis_runtime_t, amavis_runtime_t)
manage_files_pattern(amavis_t, amavis_runtime_t, amavis_runtime_t)
manage_sock_files_pattern(amavis_t, amavis_runtime_t, amavis_runtime_t)
files_pid_filetrans(amavis_t, amavis_runtime_t, { dir file sock_file })
files_runtime_filetrans(amavis_t, amavis_runtime_t, { dir file sock_file })
can_exec(amavis_t, amavis_exec_t)

View File

@ -1369,7 +1369,7 @@ interface(`apache_admin',`
files_lock_filetrans($1, httpd_lock_t, file)
admin_pattern($1, httpd_runtime_t)
files_pid_filetrans($1, httpd_runtime_t, file)
files_runtime_filetrans($1, httpd_runtime_t, file)
admin_pattern($1, { httpdcontent httpd_script_exec_type httpd_htaccess_type })
admin_pattern($1, { httpd_tmp_t httpd_suexec_tmp_t })

View File

@ -304,7 +304,7 @@ type httpd_rotatelogs_exec_t;
init_daemon_domain(httpd_rotatelogs_t, httpd_rotatelogs_exec_t)
type httpd_runtime_t alias httpd_var_run_t;
files_pid_file(httpd_runtime_t)
files_runtime_file(httpd_runtime_t)
type httpd_squirrelmail_t;
files_type(httpd_squirrelmail_t)
@ -446,7 +446,7 @@ setattr_dirs_pattern(httpd_t, httpd_runtime_t, httpd_runtime_t)
manage_dirs_pattern(httpd_t, httpd_runtime_t, httpd_runtime_t)
manage_files_pattern(httpd_t, httpd_runtime_t, httpd_runtime_t)
manage_sock_files_pattern(httpd_t, httpd_runtime_t, httpd_runtime_t)
files_pid_filetrans(httpd_t, httpd_runtime_t, { file sock_file dir })
files_runtime_filetrans(httpd_t, httpd_runtime_t, { file sock_file dir })
manage_dirs_pattern(httpd_t, squirrelmail_spool_t, squirrelmail_spool_t)
manage_files_pattern(httpd_t, squirrelmail_spool_t, squirrelmail_spool_t)
@ -496,7 +496,7 @@ fs_rw_inherited_hugetlbfs_files(httpd_t)
fs_read_iso9660_files(httpd_t)
fs_search_auto_mountpoints(httpd_t)
files_dontaudit_getattr_all_pids(httpd_t)
files_dontaudit_getattr_all_runtime_files(httpd_t)
files_read_usr_files(httpd_t)
files_list_mnt(httpd_t)
files_search_spool(httpd_t)
@ -826,7 +826,7 @@ optional_policy(`
')
tunable_policy(`httpd_manage_ipa',`
memcached_manage_pid_files(httpd_t)
memcached_manage_runtime_files(httpd_t)
')
')
@ -851,7 +851,7 @@ optional_policy(`
')
optional_policy(`
pcscd_read_pid_files(httpd_t)
pcscd_read_runtime_files(httpd_t)
')
optional_policy(`
@ -967,7 +967,7 @@ fs_read_iso9660_files(httpd_suexec_t)
fs_search_auto_mountpoints(httpd_suexec_t)
files_read_usr_files(httpd_suexec_t)
files_dontaudit_search_pids(httpd_suexec_t)
files_dontaudit_search_runtime(httpd_suexec_t)
files_search_home(httpd_suexec_t)
auth_use_nsswitch(httpd_suexec_t)
@ -1251,7 +1251,7 @@ auth_use_nsswitch(httpd_sys_script_t)
logging_send_syslog_msg(httpd_sys_script_t)
ifdef(`init_systemd', `
init_search_pids(httpd_sys_script_t)
init_search_runtime(httpd_sys_script_t)
')
tunable_policy(`httpd_enable_homedirs',`

View File

@ -155,6 +155,6 @@ interface(`apcupsd_admin',`
files_list_tmp($1)
admin_pattern($1, apcupsd_tmp_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, apcupsd_runtime_t)
')

View File

@ -19,7 +19,7 @@ type apcupsd_log_t;
logging_log_file(apcupsd_log_t)
type apcupsd_runtime_t alias apcupsd_var_run_t;
files_pid_file(apcupsd_runtime_t)
files_runtime_file(apcupsd_runtime_t)
type apcupsd_tmp_t;
files_tmp_file(apcupsd_tmp_t)
@ -50,7 +50,7 @@ manage_files_pattern(apcupsd_t, apcupsd_tmp_t, apcupsd_tmp_t)
files_tmp_filetrans(apcupsd_t, apcupsd_tmp_t, file)
manage_files_pattern(apcupsd_t, apcupsd_runtime_t, apcupsd_runtime_t)
files_pid_filetrans(apcupsd_t, apcupsd_runtime_t, file)
files_runtime_filetrans(apcupsd_t, apcupsd_runtime_t, file)
kernel_read_system_state(apcupsd_t)

View File

@ -60,6 +60,6 @@ interface(`aptcacher_stream_connect',`
type aptcacher_t, aptcacher_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, aptcacher_runtime_t, aptcacher_runtime_t, aptcacher_t)
')

View File

@ -29,7 +29,7 @@ type aptcacher_log_t;
logging_log_file(aptcacher_log_t)
type aptcacher_runtime_t;
files_pid_file(aptcacher_runtime_t)
files_runtime_file(aptcacher_runtime_t)
########################################
#

View File

@ -150,6 +150,6 @@ interface(`arpwatch_admin',`
files_search_var_lib($1)
admin_pattern($1, arpwatch_data_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, arpwatch_pid_t)
')

View File

@ -22,7 +22,7 @@ type arpwatch_unit_t;
init_unit_file(arpwatch_unit_t)
type arpwatch_pid_t alias arpwatch_var_run_t;
files_pid_file(arpwatch_pid_t)
files_runtime_file(arpwatch_pid_t)
########################################
#
@ -46,7 +46,7 @@ manage_files_pattern(arpwatch_t, arpwatch_tmp_t, arpwatch_tmp_t)
files_tmp_filetrans(arpwatch_t, arpwatch_tmp_t, { file dir })
manage_files_pattern(arpwatch_t, arpwatch_pid_t, arpwatch_pid_t)
files_pid_filetrans(arpwatch_t, arpwatch_pid_t, file)
files_runtime_filetrans(arpwatch_t, arpwatch_pid_t, file)
kernel_read_kernel_sysctls(arpwatch_t)
kernel_read_network_state(arpwatch_t)

View File

@ -54,7 +54,7 @@ interface(`asterisk_stream_connect',`
type asterisk_t, asterisk_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, asterisk_runtime_t, asterisk_runtime_t, asterisk_t)
')
@ -140,6 +140,6 @@ interface(`asterisk_admin',`
files_list_var_lib($1)
admin_pattern($1, asterisk_var_lib_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, asterisk_runtime_t)
')

View File

@ -19,8 +19,8 @@ type asterisk_log_t;
logging_log_file(asterisk_log_t)
type asterisk_runtime_t alias asterisk_var_run_t;
files_pid_file(asterisk_runtime_t)
init_daemon_pid_file(asterisk_runtime_t, dir, "asterisk")
files_runtime_file(asterisk_runtime_t)
init_daemon_runtime_file(asterisk_runtime_t, dir, "asterisk")
type asterisk_spool_t;
files_type(asterisk_spool_t)
@ -76,7 +76,7 @@ manage_files_pattern(asterisk_t, asterisk_var_lib_t, asterisk_var_lib_t)
manage_files_pattern(asterisk_t, asterisk_runtime_t, asterisk_runtime_t)
manage_fifo_files_pattern(asterisk_t, asterisk_runtime_t, asterisk_runtime_t)
manage_sock_files_pattern(asterisk_t, asterisk_runtime_t, asterisk_runtime_t)
files_pid_filetrans(asterisk_t, asterisk_runtime_t, file)
files_runtime_filetrans(asterisk_t, asterisk_runtime_t, file)
can_exec(asterisk_t, asterisk_exec_t)

View File

@ -155,6 +155,6 @@ interface(`automount_admin',`
files_list_tmp($1)
admin_pattern($1, automount_tmp_t)
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, automount_runtime_t)
')

View File

@ -19,7 +19,7 @@ type automount_lock_t;
files_lock_file(automount_lock_t)
type automount_runtime_t alias automount_var_run_t;
files_pid_file(automount_runtime_t)
files_runtime_file(automount_runtime_t)
type automount_tmp_t;
files_tmp_file(automount_tmp_t)
@ -55,7 +55,7 @@ files_root_filetrans(automount_t, automount_tmp_t, dir)
manage_files_pattern(automount_t, automount_runtime_t, automount_runtime_t)
manage_fifo_files_pattern(automount_t, automount_runtime_t, automount_runtime_t)
files_pid_filetrans(automount_t, automount_runtime_t, { file fifo_file })
files_runtime_filetrans(automount_t, automount_runtime_t, { file fifo_file })
kernel_read_kernel_sysctls(automount_t)
kernel_read_irq_sysctls(automount_t)

View File

@ -129,7 +129,7 @@ interface(`avahi_stream_connect',`
type avahi_t, avahi_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
stream_connect_pattern($1, avahi_runtime_t, avahi_runtime_t, avahi_t)
')
@ -178,7 +178,7 @@ interface(`avahi_setattr_runtime_dirs',`
type avahi_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
allow $1 avahi_runtime_t:dir setattr_dir_perms;
')
@ -197,7 +197,7 @@ interface(`avahi_create_runtime_dirs',`
type avahi_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
allow $1 avahi_runtime_t:dir create_dir_perms;
')
@ -273,7 +273,7 @@ interface(`avahi_manage_runtime_files',`
type avahi_runtime_t;
')
files_search_pids($1)
files_search_runtime($1)
manage_files_pattern($1, avahi_runtime_t, avahi_runtime_t)
')
@ -322,7 +322,7 @@ interface(`avahi_filetrans_runtime',`
type avahi_runtime_t;
')
files_pid_filetrans($1, avahi_runtime_t, $2, $3)
files_runtime_filetrans($1, avahi_runtime_t, $2, $3)
')
########################################
@ -353,7 +353,7 @@ interface(`avahi_admin',`
init_startstop_service($1, $2, avahi_t, avahi_initrc_exec_t)
files_search_pids($1)
files_search_runtime($1)
admin_pattern($1, avahi_runtime_t)
files_search_var_lib($1)

View File

@ -14,13 +14,13 @@ type avahi_initrc_exec_t;
init_script_file(avahi_initrc_exec_t)
type avahi_runtime_t alias avahi_var_run_t;
files_pid_file(avahi_runtime_t)
files_runtime_file(avahi_runtime_t)
type avahi_unit_t;
init_unit_file(avahi_unit_t)
type avahi_var_lib_t;
files_pid_file(avahi_var_lib_t)
files_runtime_file(avahi_var_lib_t)
########################################
#
@ -43,7 +43,7 @@ manage_dirs_pattern(avahi_t, avahi_runtime_t, avahi_runtime_t)
manage_files_pattern(avahi_t, avahi_runtime_t, avahi_runtime_t)
manage_sock_files_pattern(avahi_t, avahi_runtime_t, avahi_runtime_t)
allow avahi_t avahi_runtime_t:dir setattr_dir_perms;
files_pid_filetrans(avahi_t, avahi_runtime_t, { dir file })
files_runtime_filetrans(avahi_t, avahi_runtime_t, { dir file })
kernel_read_kernel_sysctls(avahi_t)
kernel_read_network_state(avahi_t)

View File

@ -367,6 +367,6 @@ interface(`bind_admin',`
files_list_var($1)
admin_pattern($1, { dnssec_t named_cache_t named_zone_t })
files_list_pids($1)
files_list_runtime($1)
admin_pattern($1, named_runtime_t)
')

View File

@ -51,8 +51,8 @@ type named_log_t;
logging_log_file(named_log_t)
type named_runtime_t alias named_var_run_t;
files_pid_file(named_runtime_t)
init_daemon_pid_file(named_runtime_t, dir, "named")
files_runtime_file(named_runtime_t)
init_daemon_runtime_file(named_runtime_t, dir, "named")
type named_tmp_t;
files_tmp_file(named_tmp_t)
@ -104,7 +104,7 @@ files_tmp_filetrans(named_t, named_tmp_t, { file dir })
manage_dirs_pattern(named_t, named_runtime_t, named_runtime_t)
manage_files_pattern(named_t, named_runtime_t, named_runtime_t)
manage_sock_files_pattern(named_t, named_runtime_t, named_runtime_t)
files_pid_filetrans(named_t, named_runtime_t, { dir file sock_file })
files_runtime_filetrans(named_t, named_runtime_t, { dir file sock_file })
can_exec(named_t, named_exec_t)
@ -244,7 +244,7 @@ corenet_sendrecv_rndc_client_packets(ndc_t)
domain_use_interactive_fds(ndc_t)
files_search_pids(ndc_t)
files_search_runtime(ndc_t)
fs_getattr_xattr_fs(ndc_t)

Some files were not shown because too many files have changed in this diff Show More