mirror of
https://github.com/SELinuxProject/refpolicy
synced 2025-03-31 15:56:35 +00:00
create corosync_read_state interface, used by pcs_snmp_agent policy update file context list for corosync to include corosync-cmapctl, this allows pcs_snmp_agent to domtrans when calling it denial for execmem type=AVC msg=audit(1610036202.427:3772): avc: denied { execmem } for pid=10875 comm="ruby" scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:pcs_snmp_agent_t:s0 tclass=process permissive=1 create contexts for pcs_snmp_agent_t and allow it some self permissions allow pcs_snmp_agent_t to create allows and transision context of those logs allow pcs_snmp_agent_t to read kernel sysctls allow pcs_snmp_agent_t to exec bin_t allow pcs_snmp_agent_t to access pacemaker's cluster information base (cib) type=AVC msg=audit(1610037438.918:4524): avc: denied { read write } for pid=14866 comm="cibadmin" name="qb-request-cib_rw-header" dev="tmpfs" ino=160994 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:pacemaker_tmpfs_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037438.918:4524): avc: denied { open } for pid=14866 comm="cibadmin" path="/dev/shm/qb-3925-14866-13-FPiaad/qb-request-cib_rw-header" dev="tmpfs" ino=160994 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:pacemaker_tmpfs_t:s0 tclass=file permissive=1 type=SYSCALL msg=audit(1610037438.918:4524): arch=c000003e syscall=2 success=yes exit=5 a0=7ffe28cb09e0 a1=2 a2=180 a3=7ffe28cb02a0 items=1 ppid=14857 pid=14866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cibadmin" exe="/usr/sbin/cibadmin" subj=system_u:system_r:pcs_snmp_agent_t:s0 key=(null) type=AVC msg=audit(1610037438.919:4525): avc: denied { map } for pid=14866 comm="cibadmin" path="/dev/shm/qb-3925-14866-13-FPiaad/qb-request-cib_rw-header" dev="tmpfs" ino=160994 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:pacemaker_tmpfs_t:s0 tclass=file permissive=1 type=SYSCALL msg=audit(1610037438.919:4525): arch=c000003e syscall=9 success=yes exit=140505675866112 a0=0 a1=203c a2=3 a3=1 items=0 ppid=14857 pid=14866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cibadmin" exe="/usr/sbin/cibadmin" subj=system_u:system_r:pcs_snmp_agent_t:s0 key=(null) type=AVC msg=audit(1610037438.906:4523): avc: denied { connectto } for pid=14866 comm="cibadmin" path=006369625F72770000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:pacemaker_t:s0 tclass=unix_stream_socket permissive=1 type=SYSCALL msg=audit(1610037438.906:4523): arch=c000003e syscall=42 success=yes exit=0 a0=4 a1=7ffe28cb2a40 a2=6e a3=7ffe28cb2460 items=0 ppid=14857 pid=14866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cibadmin" exe="/usr/sbin/cibadmin" subj=system_u:system_r:pcs_snmp_agent_t:s0 key=(null) allow pcs_snmp_agent_t to read files with usr_t context type=AVC msg=audit(1610037437.737:4513): avc: denied { getattr } for pid=14857 comm="ruby" path="/usr/share/ruby/json.rb" dev="dm-0" ino=78097 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1610037439.029:4532): avc: denied { read } for pid=14869 comm="crm_mon" name="pacemaker" dev="dm-0" ino=78392 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610037561.019:4615): avc: denied { read } for pid=15257 comm="ruby" name="rubygems.rb" dev="dm-0" ino=78469 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037561.019:4615): avc: denied { open } for pid=15257 comm="ruby" path="/usr/share/rubygems/rubygems.rb" dev="dm-0" ino=78469 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037561.019:4616): avc: denied { getattr } for pid=15257 comm="ruby" path="/usr/share/rubygems/rubygems.rb" dev="dm-0" ino=78469 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037561.020:4617): avc: denied { ioctl } for pid=15257 comm="ruby" path="/usr/share/rubygems/rubygems.rb" dev="dm-0" ino=78469 ioctlcmd=5401 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to to get cgroup information type=AVC msg=audit(1610036387.957:3864): avc: denied { getattr } for pid=11499 comm="systemctl" path="/sys/fs/cgroup/systemd/system.slice/pacemaker.service/cgroup.procs" dev="cgroup" ino=31992 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610036480.913:3921): avc: denied { read } for pid=11807 comm="systemctl" name="pacemaker.service" dev="cgroup" ino=31990 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610036665.036:4019): avc: denied { read } for pid=12401 comm="systemctl" name="pacemaker.service" dev="cgroup" ino=31990 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610036788.922:4099): avc: denied { read } for pid=12798 comm="systemctl" name="pacemaker.service" dev="cgroup" ino=31990 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610036944.042:4202): avc: denied { read } for pid=13302 comm="systemctl" name="pacemaker.service" dev="cgroup" ino=31990 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610036977.714:4223): avc: denied { read } for pid=13416 comm="systemctl" name="cgroup.procs" dev="cgroup" ino=30811 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610036977.714:4223): avc: denied { open } for pid=13416 comm="systemctl" path="/sys/fs/cgroup/systemd/system.slice/corosync.service/cgroup.procs" dev="cgroup" ino=30811 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to read nsswitch type=AVC msg=audit(1610037562.211:4626): avc: denied { open } for pid=15266 comm="cibadmin" path="/etc/nsswitch.conf" dev="dm-0" ino=40445 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037562.212:4627): avc: denied { getattr } for pid=15266 comm="cibadmin" path="/etc/nsswitch.conf" dev="dm-0" ino=40445 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to read zoneinfo type=AVC msg=audit(1610035641.390:3398): avc: denied { search } for pid=3838 comm="pcs_snmp_agent" name="zoneinfo" dev="dm-0" ino=69241 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610035767.532:3480): avc: denied { getattr } for pid=3838 comm="pcs_snmp_agent" path="/usr/share/zoneinfo/GMT" dev="dm-0" ino=71453 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610035767.664:3481): avc: denied { read } for pid=9488 comm="ruby" name="GMT" dev="dm-0" ino=71453 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610035767.664:3481): avc: denied { open } for pid=9488 comm="ruby" path="/usr/share/zoneinfo/GMT" dev="dm-0" ino=71453 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to read certificates type=AVC msg=audit(1610037375.994:4485): avc: denied { getattr } for pid=14660 comm="ruby" path="/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem" dev="dm-0" ino=38862 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037499.874:4565): avc: denied { read } for pid=15055 comm="ruby" name="cert.pem" dev="dm-0" ino=38537 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=lnk_file permissive=1 type=AVC msg=audit(1610037529.975:4584): avc: denied { read } for pid=15144 comm="ruby" name="tls-ca-bundle.pem" dev="dm-0" ino=38862 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037529.975:4584): avc: denied { open } for pid=15144 comm="ruby" path="/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem" dev="dm-0" ino=38862 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t get service status type=USER_AVC msg=audit(1610034251.683:2349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: denied { status } for auid=n/a uid=0 gid=0 path="/usr/lib/systemd/system/pacemaker.service" cmdline="systemctl status pacemaker.service" scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:systemd_unit_t:s0 tclass=service exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' type=USER_AVC msg=audit(1610034251.773:2363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: denied { status } for auid=n/a uid=0 gid=0 cmdline="systemctl is-enabled pacemaker.service" scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=s ystem exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' type=USER_AVC msg=audit(1610034252.626:2367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: denied { status } for auid=n/a uid=0 gid=0 cmdline="systemctl status pacemaker_remote.service" scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:init_t:s0 tclas s=service exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' type=AVC msg=audit(1610034251.757:2361): avc: denied { getattr } for pid=4342 comm="systemctl" path="/etc/systemd/system" dev="dm-0" ino=38595 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:systemd_unit_t:s0 tclass=dir permissive=1 allow pcs_snmp_agent_t to search init_t dirs type=AVC msg=audit(1610037317.490:4460): avc: denied { search } for pid=14489 comm="systemctl" name="1" dev="proc" ino=9242 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=1 allow pcs_snmp_agent_t to connecto to systemd unix socket type=AVC msg=audit(1610037533.196:4600): avc: denied { connectto } for pid=15174 comm="systemctl" path="/run/systemd/private" scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket permissive=1 allow pcs_snmp_agent_t to run corosync in corosync_t domain type=AVC msg=audit(1610037437.793:4515): avc: denied { execute } for pid=14859 comm="ruby" name="corosync" dev="dm-0" ino=57633 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:corosync_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037437.793:4515): avc: denied { read open } for pid=14859 comm="ruby" path="/usr/sbin/corosync" dev="dm-0" ino=57633 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:corosync_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037437.793:4515): avc: denied { execute_no_trans } for pid=14859 comm="ruby" path="/usr/sbin/corosync" dev="dm-0" ino=57633 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:corosync_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037437.793:4515): avc: denied { map } for pid=14859 comm="corosync" path="/usr/sbin/corosync" dev="dm-0" ino=57633 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:corosync_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610034246.149:2265): avc: denied { execute } for pid=4258 comm="ruby" name="corosync-cmapctl" dev="dm-0" ino=57635 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to read corosync state type=AVC msg=audit(1610037503.610:4570): avc: denied { open } for pid=15101 comm="systemctl" path="/proc/3874/comm" dev="proc" ino=26243 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:corosync_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037503.611:4571): avc: denied { getattr } for pid=15101 comm="systemctl" path="/proc/3874/comm" dev="proc" ino=26243 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:corosync_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to exec hostname type=AVC msg=audit(1610037469.569:4545): avc: denied { execute } for pid=14951 comm="ruby" name="hostname" dev="dm-0" ino=54047 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037469.569:4545): avc: denied { read open } for pid=14951 comm="ruby" path="/usr/bin/hostname" dev="dm-0" ino=54047 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037469.569:4545): avc: denied { execute_no_trans } for pid=14951 comm="ruby" path="/usr/bin/hostname" dev="dm-0" ino=54047 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037469.569:4545): avc: denied { map } for pid=14951 comm="hostname" path="/usr/bin/hostname" dev="dm-0" ino=54047 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file permissive=1 allow pcs_snmp_agent_t to connecto to snmp socket type=AVC msg=audit(1610034242.897:2197): avc: denied { write } for pid=3838 comm="pcs_snmp_agent" name="master" dev="tmpfs" ino=30868 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:snmpd_var_lib_t:s0 tclass=sock_file permissive=1 type=AVC msg=audit(1610034242.897:2197): avc: denied { connectto } for pid=3838 comm="pcs_snmp_agent" path="/var/agentx/master" scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:system_r:snmpd_t:s0 tclass=unix_stream_socket permissive=1 allow pcs_snmp_agent_t to read systemd journal files type=AVC msg=audit(1610037472.176:4552): avc: denied { map } for pid=14980 comm="systemctl" path="/var/log/journal/c7aa97546e1f4d3783a3aeffeeb749e3/system.journal" dev="tmpfs" ino=146184 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:systemd_journal_t:s0 tclass=file permissive=1 type=AVC msg=audit(1610037533.220:4602): avc: denied { read } for pid=15174 comm="systemctl" name="/" dev="tmpfs" ino=10069 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:systemd_journal_t:s0 tclass=dir permissive=1 type=AVC msg=audit(1610037533.220:4602): avc: denied { open } for pid=15174 comm="systemctl" path="/var/log/journal" dev="tmpfs" ino=10069 scontext=system_u:system_r:pcs_snmp_agent_t:s0 tcontext=system_u:object_r:systemd_journal_t:s0 tclass=dir permissive=1 Signed-off-by: David Schadlich <dschadlich@owlcyberdefense.com> |
||
---|---|---|
.. | ||
abrt.fc | ||
abrt.if | ||
abrt.te | ||
accountsd.fc | ||
accountsd.if | ||
accountsd.te | ||
acpi.fc | ||
acpi.if | ||
acpi.te | ||
afs.fc | ||
afs.if | ||
afs.te | ||
aiccu.fc | ||
aiccu.if | ||
aiccu.te | ||
aisexec.fc | ||
aisexec.if | ||
aisexec.te | ||
amavis.fc | ||
amavis.if | ||
amavis.te | ||
apache.fc | ||
apache.if | ||
apache.te | ||
apcupsd.fc | ||
apcupsd.if | ||
apcupsd.te | ||
aptcacher.fc | ||
aptcacher.if | ||
aptcacher.te | ||
arpwatch.fc | ||
arpwatch.if | ||
arpwatch.te | ||
asterisk.fc | ||
asterisk.if | ||
asterisk.te | ||
automount.fc | ||
automount.if | ||
automount.te | ||
avahi.fc | ||
avahi.if | ||
avahi.te | ||
bind.fc | ||
bind.if | ||
bind.te | ||
bird.fc | ||
bird.if | ||
bird.te | ||
bitlbee.fc | ||
bitlbee.if | ||
bitlbee.te | ||
bluetooth.fc | ||
bluetooth.if | ||
bluetooth.te | ||
boinc.fc | ||
boinc.if | ||
boinc.te | ||
bugzilla.fc | ||
bugzilla.if | ||
bugzilla.te | ||
cachefilesd.fc | ||
cachefilesd.if | ||
cachefilesd.te | ||
callweaver.fc | ||
callweaver.if | ||
callweaver.te | ||
canna.fc | ||
canna.if | ||
canna.te | ||
ccs.fc | ||
ccs.if | ||
ccs.te | ||
certmaster.fc | ||
certmaster.if | ||
certmaster.te | ||
certmonger.fc | ||
certmonger.if | ||
certmonger.te | ||
cgmanager.fc | ||
cgmanager.if | ||
cgmanager.te | ||
cgroup.fc | ||
cgroup.if | ||
cgroup.te | ||
chronyd.fc | ||
chronyd.if | ||
chronyd.te | ||
cipe.fc | ||
cipe.if | ||
cipe.te | ||
clamav.fc | ||
clamav.if | ||
clamav.te | ||
clockspeed.fc | ||
clockspeed.if | ||
clockspeed.te | ||
clogd.fc | ||
clogd.if | ||
clogd.te | ||
cmirrord.fc | ||
cmirrord.if | ||
cmirrord.te | ||
cobbler.fc | ||
cobbler.if | ||
cobbler.te | ||
collectd.fc | ||
collectd.if | ||
collectd.te | ||
colord.fc | ||
colord.if | ||
colord.te | ||
comsat.fc | ||
comsat.if | ||
comsat.te | ||
condor.fc | ||
condor.if | ||
condor.te | ||
consolekit.fc | ||
consolekit.if | ||
consolekit.te | ||
consolesetup.fc | ||
consolesetup.if | ||
consolesetup.te | ||
corosync.fc | ||
corosync.if | ||
corosync.te | ||
couchdb.fc | ||
couchdb.if | ||
couchdb.te | ||
courier.fc | ||
courier.if | ||
courier.te | ||
cpucontrol.fc | ||
cpucontrol.if | ||
cpucontrol.te | ||
cron.fc | ||
cron.if | ||
cron.te | ||
ctdb.fc | ||
ctdb.if | ||
ctdb.te | ||
cups.fc | ||
cups.if | ||
cups.te | ||
cvs.fc | ||
cvs.if | ||
cvs.te | ||
cyphesis.fc | ||
cyphesis.if | ||
cyphesis.te | ||
cyrus.fc | ||
cyrus.if | ||
cyrus.te | ||
dante.fc | ||
dante.if | ||
dante.te | ||
dbskk.fc | ||
dbskk.if | ||
dbskk.te | ||
dbus.fc | ||
dbus.if | ||
dbus.te | ||
dcc.fc | ||
dcc.if | ||
dcc.te | ||
ddclient.fc | ||
ddclient.if | ||
ddclient.te | ||
denyhosts.fc | ||
denyhosts.if | ||
denyhosts.te | ||
devicekit.fc | ||
devicekit.if | ||
devicekit.te | ||
dhcp.fc | ||
dhcp.if | ||
dhcp.te | ||
dictd.fc | ||
dictd.if | ||
dictd.te | ||
dirmngr.fc | ||
dirmngr.if | ||
dirmngr.te | ||
distcc.fc | ||
distcc.if | ||
distcc.te | ||
djbdns.fc | ||
djbdns.if | ||
djbdns.te | ||
dkim.fc | ||
dkim.if | ||
dkim.te | ||
dnsmasq.fc | ||
dnsmasq.if | ||
dnsmasq.te | ||
dnssectrigger.fc | ||
dnssectrigger.if | ||
dnssectrigger.te | ||
dovecot.fc | ||
dovecot.if | ||
dovecot.te | ||
drbd.fc | ||
drbd.if | ||
drbd.te | ||
dspam.fc | ||
dspam.if | ||
dspam.te | ||
entropyd.fc | ||
entropyd.if | ||
entropyd.te | ||
exim.fc | ||
exim.if | ||
exim.te | ||
fail2ban.fc | ||
fail2ban.if | ||
fail2ban.te | ||
fcoe.fc | ||
fcoe.if | ||
fcoe.te | ||
fetchmail.fc | ||
fetchmail.if | ||
fetchmail.te | ||
finger.fc | ||
finger.if | ||
finger.te | ||
firewalld.fc | ||
firewalld.if | ||
firewalld.te | ||
fprintd.fc | ||
fprintd.if | ||
fprintd.te | ||
ftp.fc | ||
ftp.if | ||
ftp.te | ||
gatekeeper.fc | ||
gatekeeper.if | ||
gatekeeper.te | ||
gdomap.fc | ||
gdomap.if | ||
gdomap.te | ||
geoclue.fc | ||
geoclue.if | ||
geoclue.te | ||
git.fc | ||
git.if | ||
git.te | ||
glance.fc | ||
glance.if | ||
glance.te | ||
glusterfs.fc | ||
glusterfs.if | ||
glusterfs.te | ||
gnomeclock.fc | ||
gnomeclock.if | ||
gnomeclock.te | ||
gpm.fc | ||
gpm.if | ||
gpm.te | ||
gpsd.fc | ||
gpsd.if | ||
gpsd.te | ||
gssproxy.fc | ||
gssproxy.if | ||
gssproxy.te | ||
hadoop.fc | ||
hadoop.if | ||
hadoop.te | ||
hal.fc | ||
hal.if | ||
hal.te | ||
hddtemp.fc | ||
hddtemp.if | ||
hddtemp.te | ||
hostapd.fc | ||
hostapd.if | ||
hostapd.te | ||
howl.fc | ||
howl.if | ||
howl.te | ||
hypervkvp.fc | ||
hypervkvp.if | ||
hypervkvp.te | ||
i18n_input.fc | ||
i18n_input.if | ||
i18n_input.te | ||
icecast.fc | ||
icecast.if | ||
icecast.te | ||
ifplugd.fc | ||
ifplugd.if | ||
ifplugd.te | ||
imaze.fc | ||
imaze.if | ||
imaze.te | ||
inetd.fc | ||
inetd.if | ||
inetd.te | ||
inn.fc | ||
inn.if | ||
inn.te | ||
iodine.fc | ||
iodine.if | ||
iodine.te | ||
ircd.fc | ||
ircd.if | ||
ircd.te | ||
irqbalance.fc | ||
irqbalance.if | ||
irqbalance.te | ||
isns.fc | ||
isns.if | ||
isns.te | ||
jabber.fc | ||
jabber.if | ||
jabber.te | ||
jockey.fc | ||
jockey.if | ||
jockey.te | ||
kerberos.fc | ||
kerberos.if | ||
kerberos.te | ||
kerneloops.fc | ||
kerneloops.if | ||
kerneloops.te | ||
keyboardd.fc | ||
keyboardd.if | ||
keyboardd.te | ||
keystone.fc | ||
keystone.if | ||
keystone.te | ||
knot.fc | ||
knot.if | ||
knot.te | ||
ksmtuned.fc | ||
ksmtuned.if | ||
ksmtuned.te | ||
ktalk.fc | ||
ktalk.if | ||
ktalk.te | ||
l2tp.fc | ||
l2tp.if | ||
l2tp.te | ||
ldap.fc | ||
ldap.if | ||
ldap.te | ||
likewise.fc | ||
likewise.if | ||
likewise.te | ||
lircd.fc | ||
lircd.if | ||
lircd.te | ||
lldpad.fc | ||
lldpad.if | ||
lldpad.te | ||
lpd.fc | ||
lpd.if | ||
lpd.te | ||
lsm.fc | ||
lsm.if | ||
lsm.te | ||
mailman.fc | ||
mailman.if | ||
mailman.te | ||
mailscanner.fc | ||
mailscanner.if | ||
mailscanner.te | ||
mediawiki.fc | ||
mediawiki.if | ||
mediawiki.te | ||
memcached.fc | ||
memcached.if | ||
memcached.te | ||
metadata.xml | ||
milter.fc | ||
milter.if | ||
milter.te | ||
minidlna.fc | ||
minidlna.if | ||
minidlna.te | ||
minissdpd.fc | ||
minissdpd.if | ||
minissdpd.te | ||
modemmanager.fc | ||
modemmanager.if | ||
modemmanager.te | ||
mojomojo.fc | ||
mojomojo.if | ||
mojomojo.te | ||
mon.fc | ||
mon.if | ||
mon.te | ||
mongodb.fc | ||
mongodb.if | ||
mongodb.te | ||
monit.fc | ||
monit.if | ||
monit.te | ||
monop.fc | ||
monop.if | ||
monop.te | ||
mpd.fc | ||
mpd.if | ||
mpd.te | ||
mta.fc | ||
mta.if | ||
mta.te | ||
munin.fc | ||
munin.if | ||
munin.te | ||
mysql.fc | ||
mysql.if | ||
mysql.te | ||
nagios.fc | ||
nagios.if | ||
nagios.te | ||
nessus.fc | ||
nessus.if | ||
nessus.te | ||
networkmanager.fc | ||
networkmanager.if | ||
networkmanager.te | ||
nis.fc | ||
nis.if | ||
nis.te | ||
nscd.fc | ||
nscd.if | ||
nscd.te | ||
nsd.fc | ||
nsd.if | ||
nsd.te | ||
nslcd.fc | ||
nslcd.if | ||
nslcd.te | ||
ntop.fc | ||
ntop.if | ||
ntop.te | ||
ntp.fc | ||
ntp.if | ||
ntp.te | ||
numad.fc | ||
numad.if | ||
numad.te | ||
nut.fc | ||
nut.if | ||
nut.te | ||
nx.fc | ||
nx.if | ||
nx.te | ||
oav.fc | ||
oav.if | ||
oav.te | ||
obex.fc | ||
obex.if | ||
obex.te | ||
oddjob.fc | ||
oddjob.if | ||
oddjob.te | ||
oident.fc | ||
oident.if | ||
oident.te | ||
openca.fc | ||
openca.if | ||
openca.te | ||
openct.fc | ||
openct.if | ||
openct.te | ||
openhpi.fc | ||
openhpi.if | ||
openhpi.te | ||
openvpn.fc | ||
openvpn.if | ||
openvpn.te | ||
openvswitch.fc | ||
openvswitch.if | ||
openvswitch.te | ||
pacemaker.fc | ||
pacemaker.if | ||
pacemaker.te | ||
pads.fc | ||
pads.if | ||
pads.te | ||
pcscd.fc | ||
pcscd.if | ||
pcscd.te | ||
pegasus.fc | ||
pegasus.if | ||
pegasus.te | ||
perdition.fc | ||
perdition.if | ||
perdition.te | ||
pingd.fc | ||
pingd.if | ||
pingd.te | ||
pkcs.fc | ||
pkcs.if | ||
pkcs.te | ||
plymouthd.fc | ||
plymouthd.if | ||
plymouthd.te | ||
policykit.fc | ||
policykit.if | ||
policykit.te | ||
polipo.fc | ||
polipo.if | ||
polipo.te | ||
portmap.fc | ||
portmap.if | ||
portmap.te | ||
portreserve.fc | ||
portreserve.if | ||
portreserve.te | ||
portslave.fc | ||
portslave.if | ||
portslave.te | ||
postfix.fc | ||
postfix.if | ||
postfix.te | ||
postfixpolicyd.fc | ||
postfixpolicyd.if | ||
postfixpolicyd.te | ||
postgresql.fc | ||
postgresql.if | ||
postgresql.te | ||
postgrey.fc | ||
postgrey.if | ||
postgrey.te | ||
ppp.fc | ||
ppp.if | ||
ppp.te | ||
prelude.fc | ||
prelude.if | ||
prelude.te | ||
privoxy.fc | ||
privoxy.if | ||
privoxy.te | ||
procmail.fc | ||
procmail.if | ||
procmail.te | ||
psad.fc | ||
psad.if | ||
psad.te | ||
publicfile.fc | ||
publicfile.if | ||
publicfile.te | ||
pwauth.fc | ||
pwauth.if | ||
pwauth.te | ||
pxe.fc | ||
pxe.if | ||
pxe.te | ||
pyicqt.fc | ||
pyicqt.if | ||
pyicqt.te | ||
pyzor.fc | ||
pyzor.if | ||
pyzor.te | ||
qmail.fc | ||
qmail.if | ||
qmail.te | ||
qpid.fc | ||
qpid.if | ||
qpid.te | ||
quantum.fc | ||
quantum.if | ||
quantum.te | ||
rabbitmq.fc | ||
rabbitmq.if | ||
rabbitmq.te | ||
radius.fc | ||
radius.if | ||
radius.te | ||
radvd.fc | ||
radvd.if | ||
radvd.te | ||
razor.fc | ||
razor.if | ||
razor.te | ||
rdisc.fc | ||
rdisc.if | ||
rdisc.te | ||
realmd.fc | ||
realmd.if | ||
realmd.te | ||
redis.fc | ||
redis.if | ||
redis.te | ||
remotelogin.fc | ||
remotelogin.if | ||
remotelogin.te | ||
resmgr.fc | ||
resmgr.if | ||
resmgr.te | ||
rgmanager.fc | ||
rgmanager.if | ||
rgmanager.te | ||
rhcs.fc | ||
rhcs.if | ||
rhcs.te | ||
rhgb.fc | ||
rhgb.if | ||
rhgb.te | ||
rhsmcertd.fc | ||
rhsmcertd.if | ||
rhsmcertd.te | ||
ricci.fc | ||
ricci.if | ||
ricci.te | ||
rlogin.fc | ||
rlogin.if | ||
rlogin.te | ||
rngd.fc | ||
rngd.if | ||
rngd.te | ||
roundup.fc | ||
roundup.if | ||
roundup.te | ||
rpc.fc | ||
rpc.if | ||
rpc.te | ||
rpcbind.fc | ||
rpcbind.if | ||
rpcbind.te | ||
rshd.fc | ||
rshd.if | ||
rshd.te | ||
rsync.fc | ||
rsync.if | ||
rsync.te | ||
rtkit.fc | ||
rtkit.if | ||
rtkit.te | ||
rwho.fc | ||
rwho.if | ||
rwho.te | ||
samba.fc | ||
samba.if | ||
samba.te | ||
sanlock.fc | ||
sanlock.if | ||
sanlock.te | ||
sasl.fc | ||
sasl.if | ||
sasl.te | ||
sendmail.fc | ||
sendmail.if | ||
sendmail.te | ||
sensord.fc | ||
sensord.if | ||
sensord.te | ||
setroubleshoot.fc | ||
setroubleshoot.if | ||
setroubleshoot.te | ||
shibboleth.fc | ||
shibboleth.if | ||
shibboleth.te | ||
slpd.fc | ||
slpd.if | ||
slpd.te | ||
slrnpull.fc | ||
slrnpull.if | ||
slrnpull.te | ||
smartmon.fc | ||
smartmon.if | ||
smartmon.te | ||
smokeping.fc | ||
smokeping.if | ||
smokeping.te | ||
smstools.fc | ||
smstools.if | ||
smstools.te | ||
snmp.fc | ||
snmp.if | ||
snmp.te | ||
snort.fc | ||
snort.if | ||
snort.te | ||
soundserver.fc | ||
soundserver.if | ||
soundserver.te | ||
spamassassin.fc | ||
spamassassin.if | ||
spamassassin.te | ||
speedtouch.fc | ||
speedtouch.if | ||
speedtouch.te | ||
squid.fc | ||
squid.if | ||
squid.te | ||
ssh.fc | ||
ssh.if | ||
ssh.te | ||
sssd.fc | ||
sssd.if | ||
sssd.te | ||
stubby.fc | ||
stubby.if | ||
stubby.te | ||
stunnel.fc | ||
stunnel.if | ||
stunnel.te | ||
svnserve.fc | ||
svnserve.if | ||
svnserve.te | ||
sysstat.fc | ||
sysstat.if | ||
sysstat.te | ||
systemtap.fc | ||
systemtap.if | ||
systemtap.te | ||
tcpd.fc | ||
tcpd.if | ||
tcpd.te | ||
tcsd.fc | ||
tcsd.if | ||
tcsd.te | ||
telnet.fc | ||
telnet.if | ||
telnet.te | ||
tftp.fc | ||
tftp.if | ||
tftp.te | ||
tgtd.fc | ||
tgtd.if | ||
tgtd.te | ||
timidity.fc | ||
timidity.if | ||
timidity.te | ||
tor.fc | ||
tor.if | ||
tor.te | ||
tpm2.fc | ||
tpm2.if | ||
tpm2.te | ||
transproxy.fc | ||
transproxy.if | ||
transproxy.te | ||
tuned.fc | ||
tuned.if | ||
tuned.te | ||
ucspitcp.fc | ||
ucspitcp.if | ||
ucspitcp.te | ||
ulogd.fc | ||
ulogd.if | ||
ulogd.te | ||
uptime.fc | ||
uptime.if | ||
uptime.te | ||
usbmuxd.fc | ||
usbmuxd.if | ||
usbmuxd.te | ||
uucp.fc | ||
uucp.if | ||
uucp.te | ||
uuidd.fc | ||
uuidd.if | ||
uuidd.te | ||
uwimap.fc | ||
uwimap.if | ||
uwimap.te | ||
varnishd.fc | ||
varnishd.if | ||
varnishd.te | ||
vdagent.fc | ||
vdagent.if | ||
vdagent.te | ||
vhostmd.fc | ||
vhostmd.if | ||
vhostmd.te | ||
virt.fc | ||
virt.if | ||
virt.te | ||
vnstatd.fc | ||
vnstatd.if | ||
vnstatd.te | ||
w3c.fc | ||
w3c.if | ||
w3c.te | ||
watchdog.fc | ||
watchdog.if | ||
watchdog.te | ||
wdmd.fc | ||
wdmd.if | ||
wdmd.te | ||
wireguard.fc | ||
wireguard.if | ||
wireguard.te | ||
xfs.fc | ||
xfs.if | ||
xfs.te | ||
xprint.fc | ||
xprint.if | ||
xprint.te | ||
xserver.fc | ||
xserver.if | ||
xserver.te | ||
zabbix.fc | ||
zabbix.if | ||
zabbix.te | ||
zarafa.fc | ||
zarafa.if | ||
zarafa.te | ||
zebra.fc | ||
zebra.if | ||
zebra.te | ||
zosremote.fc | ||
zosremote.if | ||
zosremote.te |