Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/, policy/modules/kernel/, doc/
Date: Mon, 31 Jan 2022 19:31:26
Message-Id: 1643657276.b293bd6062b6007870720a7a8ed255cf2f667280.perfinion@gentoo
1 commit: b293bd6062b6007870720a7a8ed255cf2f667280
2 Author: Jason Zaman <perfinion <AT> gentoo <DOT> org>
3 AuthorDate: Mon Jan 31 19:27:56 2022 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Mon Jan 31 19:27:56 2022 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=b293bd60
7
8 Update generated policy and doc files
9
10 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
11
12 doc/policy.xml | 11907 ++++++++++++++++++++-------------
13 policy/booleans.conf | 64 +-
14 policy/modules.conf | 35 +
15 policy/modules/kernel/corenetwork.if | 421 ++
16 policy/modules/kernel/corenetwork.te | 15 +-
17 5 files changed, 7744 insertions(+), 4698 deletions(-)
18
19 diff --git a/doc/policy.xml b/doc/policy.xml
20 index 12758be9..35687d71 100644
21 --- a/doc/policy.xml
22 +++ b/doc/policy.xml
23 @@ -3472,22 +3472,33 @@ Role allowed access.
24 </module>
25 <module name="shutdown" filename="policy/modules/admin/shutdown.if">
26 <summary>System shutdown command.</summary>
27 -<interface name="shutdown_role" lineno="18">
28 +<template name="shutdown_role" lineno="29">
29 <summary>
30 Role access for shutdown.
31 </summary>
32 -<param name="role">
33 +<param name="role_prefix">
34 <summary>
35 -Role allowed access.
36 +The prefix of the user role (e.g., user
37 +is the prefix for user_r).
38 </summary>
39 </param>
40 -<param name="domain">
41 +<param name="user_domain">
42 <summary>
43 User domain for the role.
44 </summary>
45 </param>
46 -</interface>
47 -<interface name="shutdown_domtrans" lineno="39">
48 +<param name="user_exec_domain">
49 +<summary>
50 +User exec domain for execute and transition access.
51 +</summary>
52 +</param>
53 +<param name="role">
54 +<summary>
55 +Role allowed access
56 +</summary>
57 +</param>
58 +</template>
59 +<interface name="shutdown_domtrans" lineno="64">
60 <summary>
61 Execute a domain transition to run shutdown.
62 </summary>
63 @@ -3497,7 +3508,7 @@ Domain allowed to transition.
64 </summary>
65 </param>
66 </interface>
67 -<interface name="shutdown_run" lineno="65">
68 +<interface name="shutdown_run" lineno="90">
69 <summary>
70 Execute shutdown in the shutdown
71 domain, and allow the specified role
72 @@ -3514,7 +3525,7 @@ Role allowed access.
73 </summary>
74 </param>
75 </interface>
76 -<interface name="shutdown_signal" lineno="84">
77 +<interface name="shutdown_signal" lineno="109">
78 <summary>
79 Send generic signals to shutdown.
80 </summary>
81 @@ -3524,7 +3535,7 @@ Domain allowed access.
82 </summary>
83 </param>
84 </interface>
85 -<interface name="shutdown_sigchld" lineno="102">
86 +<interface name="shutdown_sigchld" lineno="127">
87 <summary>
88 Send SIGCHLD signals to shutdown.
89 </summary>
90 @@ -3534,7 +3545,7 @@ Domain allowed access.
91 </summary>
92 </param>
93 </interface>
94 -<interface name="shutdown_getattr_exec_files" lineno="120">
95 +<interface name="shutdown_getattr_exec_files" lineno="145">
96 <summary>
97 Get attributes of shutdown executable files.
98 </summary>
99 @@ -3544,6 +3555,16 @@ Domain allowed access.
100 </summary>
101 </param>
102 </interface>
103 +<tunable name="shutdown_allow_user_exec_domains" dftval="false">
104 +<desc>
105 +<p>
106 +Determine whether the user application exec
107 +domain attribute should be respected for
108 +shutdown access. If not enabled, only user
109 +domains themselves may use shutdown.
110 +</p>
111 +</desc>
112 +</tunable>
113 </module>
114 <module name="sosreport" filename="policy/modules/admin/sosreport.if">
115 <summary>Generate debugging information for system.</summary>
116 @@ -3650,7 +3671,7 @@ The role associated with the user domain.
117 </summary>
118 </param>
119 </template>
120 -<template name="su_role_template" lineno="144">
121 +<template name="su_role_template" lineno="149">
122 <summary>
123 The role template for the su module.
124 </summary>
125 @@ -3660,18 +3681,23 @@ The prefix of the user role (e.g., user
126 is the prefix for user_r).
127 </summary>
128 </param>
129 -<param name="user_role">
130 +<param name="user_domain">
131 <summary>
132 -The role associated with the user domain.
133 +User domain for the role.
134 </summary>
135 </param>
136 -<param name="user_domain">
137 +<param name="user_exec_domain">
138 <summary>
139 -The type of the user domain.
140 +User exec domain for execute and transition access.
141 +</summary>
142 +</param>
143 +<param name="role">
144 +<summary>
145 +Role allowed access
146 </summary>
147 </param>
148 </template>
149 -<interface name="su_exec" lineno="280">
150 +<interface name="su_exec" lineno="303">
151 <summary>
152 Execute su in the caller domain.
153 </summary>
154 @@ -3681,10 +3707,20 @@ Domain allowed access.
155 </summary>
156 </param>
157 </interface>
158 +<tunable name="su_allow_user_exec_domains" dftval="false">
159 +<desc>
160 +<p>
161 +Determine whether the user application
162 +exec domain attribute should be respected
163 +for su access. If not enabled, only user
164 +domains themselves may use su.
165 +</p>
166 +</desc>
167 +</tunable>
168 </module>
169 <module name="sudo" filename="policy/modules/admin/sudo.if">
170 <summary>Execute a command with a substitute user</summary>
171 -<template name="sudo_role_template" lineno="31">
172 +<template name="sudo_role_template" lineno="36">
173 <summary>
174 The role template for the sudo module.
175 </summary>
176 @@ -3701,18 +3737,23 @@ The prefix of the user role (e.g., user
177 is the prefix for user_r).
178 </summary>
179 </param>
180 -<param name="user_role">
181 +<param name="user_domain">
182 <summary>
183 -The user role.
184 +User domain for the role.
185 </summary>
186 </param>
187 -<param name="user_domain">
188 +<param name="user_exec_domain">
189 <summary>
190 -The user domain associated with the role.
191 +User exec domain for execute and transition access.
192 +</summary>
193 +</param>
194 +<param name="role">
195 +<summary>
196 +Role allowed access
197 </summary>
198 </param>
199 </template>
200 -<interface name="sudo_sigchld" lineno="195">
201 +<interface name="sudo_sigchld" lineno="215">
202 <summary>
203 Send a SIGCHLD signal to the sudo domain.
204 </summary>
205 @@ -3733,6 +3774,16 @@ required for users to use sudo.
206 </p>
207 </desc>
208 </tunable>
209 +<tunable name="sudo_allow_user_exec_domains" dftval="false">
210 +<desc>
211 +<p>
212 +Determine whether the user application exec
213 +domain attribute should be respected for sudo
214 +access. If not enabled, only user domains
215 +themselves may use sudo.
216 +</p>
217 +</desc>
218 +</tunable>
219 </module>
220 <module name="sxid" filename="policy/modules/admin/sxid.if">
221 <summary>SUID/SGID program monitoring.</summary>
222 @@ -4409,22 +4460,33 @@ Role allowed access.
223 </module>
224 <module name="cdrecord" filename="policy/modules/apps/cdrecord.if">
225 <summary>Record audio or data Compact Discs from a master.</summary>
226 -<interface name="cdrecord_role" lineno="18">
227 +<template name="cdrecord_role" lineno="29">
228 <summary>
229 Role access for cdrecord.
230 </summary>
231 -<param name="role">
232 +<param name="role_prefix">
233 <summary>
234 -Role allowed access.
235 +The prefix of the user role (e.g., user
236 +is the prefix for user_r).
237 </summary>
238 </param>
239 -<param name="domain">
240 +<param name="user_domain">
241 <summary>
242 User domain for the role.
243 </summary>
244 </param>
245 -</interface>
246 -<interface name="cdrecord_exec" lineno="44">
247 +<param name="user_exec_domain">
248 +<summary>
249 +User exec domain for execute and transition access.
250 +</summary>
251 +</param>
252 +<param name="role">
253 +<summary>
254 +Role allowed access
255 +</summary>
256 +</param>
257 +</template>
258 +<interface name="cdrecord_exec" lineno="59">
259 <summary>
260 Execute cdrecord in the caller domain.
261 </summary>
262 @@ -4447,22 +4509,33 @@ content files
263 </module>
264 <module name="chromium" filename="policy/modules/apps/chromium.if">
265 <summary>Chromium browser</summary>
266 -<interface name="chromium_role" lineno="18">
267 +<template name="chromium_role" lineno="29">
268 <summary>
269 Role access for chromium
270 </summary>
271 -<param name="role">
272 +<param name="role_prefix">
273 <summary>
274 -Role allowed access
275 +The prefix of the user role (e.g., user
276 +is the prefix for user_r).
277 </summary>
278 </param>
279 -<param name="domain">
280 +<param name="user_domain">
281 <summary>
282 -User domain for the role
283 +User domain for the role.
284 </summary>
285 </param>
286 -</interface>
287 -<interface name="chromium_rw_tmp_pipes" lineno="67">
288 +<param name="user_exec_domain">
289 +<summary>
290 +User exec domain for execute and transition access.
291 +</summary>
292 +</param>
293 +<param name="role">
294 +<summary>
295 +Role allowed access
296 +</summary>
297 +</param>
298 +</template>
299 +<interface name="chromium_rw_tmp_pipes" lineno="82">
300 <summary>
301 Read-write access to Chromiums' temporary fifo files
302 </summary>
303 @@ -4472,7 +4545,7 @@ Domain allowed access
304 </summary>
305 </param>
306 </interface>
307 -<interface name="chromium_tmp_filetrans" lineno="101">
308 +<interface name="chromium_tmp_filetrans" lineno="116">
309 <summary>
310 Automatically use the specified type for resources created in chromium's
311 temporary locations
312 @@ -4498,7 +4571,7 @@ The name of the resource being created
313 </summary>
314 </param>
315 </interface>
316 -<interface name="chromium_domtrans" lineno="120">
317 +<interface name="chromium_domtrans" lineno="135">
318 <summary>
319 Execute a domain transition to the chromium domain (chromium_t)
320 </summary>
321 @@ -4508,7 +4581,7 @@ Domain allowed access
322 </summary>
323 </param>
324 </interface>
325 -<interface name="chromium_run" lineno="146">
326 +<interface name="chromium_run" lineno="161">
327 <summary>
328 Execute chromium in the chromium domain and allow the specified role to access the chromium domain
329 </summary>
330 @@ -4612,21 +4685,32 @@ Domain allowed access.
331 </module>
332 <module name="cryfs" filename="policy/modules/apps/cryfs.if">
333 <summary>CryFS and similar other tools which mount encrypted directories using FUSE.</summary>
334 -<interface name="cryfs_role" lineno="18">
335 +<template name="cryfs_role" lineno="29">
336 <summary>
337 Role access for CryFS.
338 </summary>
339 -<param name="role">
340 +<param name="role_prefix">
341 <summary>
342 -Role allowed access.
343 +The prefix of the user role (e.g., user
344 +is the prefix for user_r).
345 </summary>
346 </param>
347 -<param name="domain">
348 +<param name="user_domain">
349 <summary>
350 User domain for the role.
351 </summary>
352 </param>
353 -</interface>
354 +<param name="user_exec_domain">
355 +<summary>
356 +User exec domain for execute and transition access.
357 +</summary>
358 +</param>
359 +<param name="role">
360 +<summary>
361 +Role allowed access
362 +</summary>
363 +</param>
364 +</template>
365 <tunable name="cryfs_read_generic_user_content" dftval="true">
366 <desc>
367 <p>
368 @@ -4658,22 +4742,33 @@ Grant the cryfs domains manage rights on all user content
369 </module>
370 <module name="evolution" filename="policy/modules/apps/evolution.if">
371 <summary>Evolution email client.</summary>
372 -<interface name="evolution_role" lineno="18">
373 +<template name="evolution_role" lineno="29">
374 <summary>
375 Role access for evolution.
376 </summary>
377 -<param name="role">
378 +<param name="role_prefix">
379 <summary>
380 -Role allowed access.
381 +The prefix of the user role (e.g., user
382 +is the prefix for user_r).
383 </summary>
384 </param>
385 -<param name="domain">
386 +<param name="user_domain">
387 <summary>
388 User domain for the role.
389 </summary>
390 </param>
391 -</interface>
392 -<interface name="evolution_home_filetrans" lineno="99">
393 +<param name="user_exec_domain">
394 +<summary>
395 +User exec domain for execute and transition access.
396 +</summary>
397 +</param>
398 +<param name="role">
399 +<summary>
400 +Role allowed access
401 +</summary>
402 +</param>
403 +</template>
404 +<interface name="evolution_home_filetrans" lineno="118">
405 <summary>
406 Create objects in the evolution home
407 directories with a private type.
408 @@ -4699,7 +4794,7 @@ The name of the object being created.
409 </summary>
410 </param>
411 </interface>
412 -<interface name="evolution_read_home_files" lineno="118">
413 +<interface name="evolution_read_home_files" lineno="137">
414 <summary>
415 Read evolution home files.
416 </summary>
417 @@ -4709,7 +4804,7 @@ Domain allowed access.
418 </summary>
419 </param>
420 </interface>
421 -<interface name="evolution_stream_connect" lineno="137">
422 +<interface name="evolution_stream_connect" lineno="156">
423 <summary>
424 Connect to evolution using a unix
425 domain stream socket.
426 @@ -4720,7 +4815,7 @@ Domain allowed access.
427 </summary>
428 </param>
429 </interface>
430 -<interface name="evolution_read_orbit_tmp_files" lineno="158">
431 +<interface name="evolution_read_orbit_tmp_files" lineno="177">
432 <summary>
433 Read evolution orbit temporary
434 files.
435 @@ -4731,7 +4826,7 @@ Domain allowed access.
436 </summary>
437 </param>
438 </interface>
439 -<interface name="evolution_dbus_chat" lineno="179">
440 +<interface name="evolution_dbus_chat" lineno="198">
441 <summary>
442 Send and receive messages from
443 evolution over dbus.
444 @@ -4742,7 +4837,7 @@ Domain allowed access.
445 </summary>
446 </param>
447 </interface>
448 -<interface name="evolution_alarm_dbus_chat" lineno="200">
449 +<interface name="evolution_alarm_dbus_chat" lineno="219">
450 <summary>
451 Send and receive messages from
452 evolution_alarm over dbus.
453 @@ -4753,7 +4848,7 @@ Domain allowed access.
454 </summary>
455 </param>
456 </interface>
457 -<interface name="evolution_domtrans" lineno="221">
458 +<interface name="evolution_domtrans" lineno="240">
459 <summary>
460 Make a domain transition to the
461 evolution target domain.
462 @@ -4804,22 +4899,33 @@ Grant the evolution domains manage rights on all user content
463 </module>
464 <module name="games" filename="policy/modules/apps/games.if">
465 <summary>Various games.</summary>
466 -<interface name="games_role" lineno="18">
467 +<template name="games_role" lineno="29">
468 <summary>
469 Role access for games.
470 </summary>
471 -<param name="role">
472 +<param name="role_prefix">
473 <summary>
474 -Role allowed access.
475 +The prefix of the user role (e.g., user
476 +is the prefix for user_r).
477 </summary>
478 </param>
479 -<param name="domain">
480 +<param name="user_domain">
481 <summary>
482 User domain for the role.
483 </summary>
484 </param>
485 -</interface>
486 -<interface name="games_rw_data" lineno="52">
487 +<param name="user_exec_domain">
488 +<summary>
489 +User exec domain for execute and transition access.
490 +</summary>
491 +</param>
492 +<param name="role">
493 +<summary>
494 +Role allowed access
495 +</summary>
496 +</param>
497 +</template>
498 +<interface name="games_rw_data" lineno="67">
499 <summary>
500 Read and write games data files.
501 </summary>
502 @@ -4829,7 +4935,7 @@ Domain allowed access.
503 </summary>
504 </param>
505 </interface>
506 -<interface name="games_domtrans" lineno="71">
507 +<interface name="games_domtrans" lineno="86">
508 <summary>
509 Run a game in the game domain.
510 </summary>
511 @@ -4839,7 +4945,7 @@ Domain allowed to transition.
512 </summary>
513 </param>
514 </interface>
515 -<interface name="games_dbus_chat" lineno="91">
516 +<interface name="games_dbus_chat" lineno="106">
517 <summary>
518 Send and receive messages from
519 games over dbus.
520 @@ -4911,28 +5017,33 @@ Determine whether Gitosis can send mail.
521 </module>
522 <module name="gnome" filename="policy/modules/apps/gnome.if">
523 <summary>GNU network object model environment.</summary>
524 -<template name="gnome_role_template" lineno="24">
525 +<template name="gnome_role_template" lineno="29">
526 <summary>
527 The role template for gnome.
528 </summary>
529 <param name="role_prefix">
530 <summary>
531 -The prefix of the user domain (e.g., user
532 -is the prefix for user_t).
533 +The prefix of the user role (e.g., user
534 +is the prefix for user_r).
535 </summary>
536 </param>
537 -<param name="user_role">
538 +<param name="user_domain">
539 <summary>
540 -The role associated with the user domain.
541 +User domain for the role.
542 </summary>
543 </param>
544 -<param name="user_domain">
545 +<param name="user_exec_domain">
546 <summary>
547 -The type of the user domain.
548 +User exec domain for execute and transition access.
549 +</summary>
550 +</param>
551 +<param name="role">
552 +<summary>
553 +Role allowed access
554 </summary>
555 </param>
556 </template>
557 -<interface name="gnome_exec_gconf" lineno="121">
558 +<interface name="gnome_exec_gconf" lineno="134">
559 <summary>
560 Execute gconf in the caller domain.
561 </summary>
562 @@ -4942,7 +5053,7 @@ Domain allowed access.
563 </summary>
564 </param>
565 </interface>
566 -<interface name="gnome_read_gconf_config" lineno="140">
567 +<interface name="gnome_read_gconf_config" lineno="153">
568 <summary>
569 Read gconf configuration content.
570 </summary>
571 @@ -4952,7 +5063,7 @@ Domain allowed access.
572 </summary>
573 </param>
574 </interface>
575 -<interface name="gnome_dontaudit_read_inherited_gconf_config_files" lineno="162">
576 +<interface name="gnome_dontaudit_read_inherited_gconf_config_files" lineno="175">
577 <summary>
578 Do not audit attempts to read
579 inherited gconf configuration files.
580 @@ -4963,7 +5074,7 @@ Domain to not audit.
581 </summary>
582 </param>
583 </interface>
584 -<interface name="gnome_manage_gconf_config" lineno="181">
585 +<interface name="gnome_manage_gconf_config" lineno="194">
586 <summary>
587 Create, read, write, and delete
588 gconf configuration content.
589 @@ -4974,7 +5085,7 @@ Domain allowed access.
590 </summary>
591 </param>
592 </interface>
593 -<interface name="gnome_stream_connect_gconf" lineno="203">
594 +<interface name="gnome_stream_connect_gconf" lineno="216">
595 <summary>
596 Connect to gconf using a unix
597 domain stream socket.
598 @@ -4985,7 +5096,7 @@ Domain allowed access.
599 </summary>
600 </param>
601 </interface>
602 -<interface name="gnome_domtrans_gconfd" lineno="222">
603 +<interface name="gnome_domtrans_gconfd" lineno="235">
604 <summary>
605 Run gconfd in gconfd domain.
606 </summary>
607 @@ -4995,7 +5106,7 @@ Domain allowed to transition.
608 </summary>
609 </param>
610 </interface>
611 -<interface name="gnome_create_generic_home_dirs" lineno="241">
612 +<interface name="gnome_create_generic_home_dirs" lineno="254">
613 <summary>
614 Create generic gnome home directories.
615 </summary>
616 @@ -5005,7 +5116,7 @@ Domain allowed access.
617 </summary>
618 </param>
619 </interface>
620 -<interface name="gnome_setattr_generic_home_dirs" lineno="260">
621 +<interface name="gnome_setattr_generic_home_dirs" lineno="273">
622 <summary>
623 Set attributes of generic gnome
624 user home directories.
625 @@ -5016,7 +5127,7 @@ Domain allowed access.
626 </summary>
627 </param>
628 </interface>
629 -<interface name="gnome_read_generic_home_content" lineno="279">
630 +<interface name="gnome_read_generic_home_content" lineno="292">
631 <summary>
632 Read generic gnome home content.
633 </summary>
634 @@ -5026,7 +5137,7 @@ Domain allowed access.
635 </summary>
636 </param>
637 </interface>
638 -<interface name="gnome_manage_generic_home_content" lineno="303">
639 +<interface name="gnome_manage_generic_home_content" lineno="316">
640 <summary>
641 Create, read, write, and delete
642 generic gnome home content.
643 @@ -5037,7 +5148,7 @@ Domain allowed access.
644 </summary>
645 </param>
646 </interface>
647 -<interface name="gnome_search_generic_home" lineno="326">
648 +<interface name="gnome_search_generic_home" lineno="339">
649 <summary>
650 Search generic gnome home directories.
651 </summary>
652 @@ -5047,7 +5158,7 @@ Domain allowed access.
653 </summary>
654 </param>
655 </interface>
656 -<interface name="gnome_home_filetrans" lineno="361">
657 +<interface name="gnome_home_filetrans" lineno="374">
658 <summary>
659 Create objects in gnome user home
660 directories with a private type.
661 @@ -5073,7 +5184,7 @@ The name of the object being created.
662 </summary>
663 </param>
664 </interface>
665 -<interface name="gnome_create_generic_gconf_home_dirs" lineno="380">
666 +<interface name="gnome_create_generic_gconf_home_dirs" lineno="393">
667 <summary>
668 Create generic gconf home directories.
669 </summary>
670 @@ -5083,7 +5194,7 @@ Domain allowed access.
671 </summary>
672 </param>
673 </interface>
674 -<interface name="gnome_read_generic_gconf_home_content" lineno="398">
675 +<interface name="gnome_read_generic_gconf_home_content" lineno="411">
676 <summary>
677 Read generic gconf home content.
678 </summary>
679 @@ -5093,7 +5204,7 @@ Domain allowed access.
680 </summary>
681 </param>
682 </interface>
683 -<interface name="gnome_manage_generic_gconf_home_content" lineno="422">
684 +<interface name="gnome_manage_generic_gconf_home_content" lineno="435">
685 <summary>
686 Create, read, write, and delete
687 generic gconf home content.
688 @@ -5104,7 +5215,7 @@ Domain allowed access.
689 </summary>
690 </param>
691 </interface>
692 -<interface name="gnome_search_generic_gconf_home" lineno="445">
693 +<interface name="gnome_search_generic_gconf_home" lineno="458">
694 <summary>
695 Search generic gconf home directories.
696 </summary>
697 @@ -5114,7 +5225,7 @@ Domain allowed access.
698 </summary>
699 </param>
700 </interface>
701 -<interface name="gnome_home_filetrans_gconf_home" lineno="476">
702 +<interface name="gnome_home_filetrans_gconf_home" lineno="489">
703 <summary>
704 Create objects in user home
705 directories with the generic gconf
706 @@ -5136,7 +5247,7 @@ The name of the object being created.
707 </summary>
708 </param>
709 </interface>
710 -<interface name="gnome_home_filetrans_gnome_home" lineno="506">
711 +<interface name="gnome_home_filetrans_gnome_home" lineno="519">
712 <summary>
713 Create objects in user home
714 directories with the generic gnome
715 @@ -5158,7 +5269,7 @@ The name of the object being created.
716 </summary>
717 </param>
718 </interface>
719 -<interface name="gnome_gconf_home_filetrans" lineno="540">
720 +<interface name="gnome_gconf_home_filetrans" lineno="553">
721 <summary>
722 Create objects in gnome gconf home
723 directories with a private type.
724 @@ -5184,7 +5295,7 @@ The name of the object being created.
725 </summary>
726 </param>
727 </interface>
728 -<interface name="gnome_user_home_dir_filetrans_gstreamer_orcexec" lineno="571">
729 +<interface name="gnome_user_home_dir_filetrans_gstreamer_orcexec" lineno="584">
730 <summary>
731 Create objects in user home
732 directories with the gstreamer
733 @@ -5206,7 +5317,7 @@ The name of the object being created.
734 </summary>
735 </param>
736 </interface>
737 -<interface name="gnome_user_runtime_filetrans_gstreamer_orcexec" lineno="601">
738 +<interface name="gnome_user_runtime_filetrans_gstreamer_orcexec" lineno="614">
739 <summary>
740 Create objects in the user
741 runtime directories with the
742 @@ -5228,7 +5339,7 @@ The name of the object being created.
743 </summary>
744 </param>
745 </interface>
746 -<interface name="gnome_read_keyring_home_files" lineno="619">
747 +<interface name="gnome_read_keyring_home_files" lineno="632">
748 <summary>
749 Read generic gnome keyring home files.
750 </summary>
751 @@ -5238,7 +5349,7 @@ Domain allowed access.
752 </summary>
753 </param>
754 </interface>
755 -<interface name="gnome_dbus_chat_gconfd" lineno="640">
756 +<interface name="gnome_dbus_chat_gconfd" lineno="653">
757 <summary>
758 Send and receive messages from
759 gnome configuration daemon over
760 @@ -5250,7 +5361,7 @@ Domain allowed access.
761 </summary>
762 </param>
763 </interface>
764 -<template name="gnome_dbus_chat_gkeyringd" lineno="667">
765 +<template name="gnome_dbus_chat_gkeyringd" lineno="680">
766 <summary>
767 Send and receive messages from
768 gnome keyring daemon over dbus.
769 @@ -5267,7 +5378,7 @@ Domain allowed access.
770 </summary>
771 </param>
772 </template>
773 -<interface name="gnome_dbus_chat_all_gkeyringd" lineno="688">
774 +<interface name="gnome_dbus_chat_all_gkeyringd" lineno="701">
775 <summary>
776 Send and receive messages from all
777 gnome keyring daemon over dbus.
778 @@ -5278,7 +5389,7 @@ Domain allowed access.
779 </summary>
780 </param>
781 </interface>
782 -<interface name="gnome_spec_domtrans_all_gkeyringd" lineno="708">
783 +<interface name="gnome_spec_domtrans_all_gkeyringd" lineno="721">
784 <summary>
785 Run all gkeyringd in gkeyringd domain.
786 </summary>
787 @@ -5288,7 +5399,7 @@ Domain allowed to transition.
788 </summary>
789 </param>
790 </interface>
791 -<template name="gnome_stream_connect_gkeyringd" lineno="735">
792 +<template name="gnome_stream_connect_gkeyringd" lineno="748">
793 <summary>
794 Connect to gnome keyring daemon
795 with a unix stream socket.
796 @@ -5305,7 +5416,7 @@ Domain allowed access.
797 </summary>
798 </param>
799 </template>
800 -<interface name="gnome_stream_connect_all_gkeyringd" lineno="756">
801 +<interface name="gnome_stream_connect_all_gkeyringd" lineno="769">
802 <summary>
803 Connect to all gnome keyring daemon
804 with a unix stream socket.
805 @@ -5316,7 +5427,7 @@ Domain allowed access.
806 </summary>
807 </param>
808 </interface>
809 -<interface name="gnome_manage_gstreamer_orcexec" lineno="778">
810 +<interface name="gnome_manage_gstreamer_orcexec" lineno="791">
811 <summary>
812 Manage gstreamer ORC optimized
813 code.
814 @@ -5327,7 +5438,7 @@ Domain allowed access.
815 </summary>
816 </param>
817 </interface>
818 -<interface name="gnome_mmap_gstreamer_orcexec" lineno="797">
819 +<interface name="gnome_mmap_gstreamer_orcexec" lineno="810">
820 <summary>
821 Mmap gstreamer ORC optimized
822 code.
823 @@ -5341,22 +5452,33 @@ Domain allowed access.
824 </module>
825 <module name="gpg" filename="policy/modules/apps/gpg.if">
826 <summary>Policy for GNU Privacy Guard and related programs.</summary>
827 -<interface name="gpg_role" lineno="18">
828 +<template name="gpg_role" lineno="29">
829 <summary>
830 Role access for gpg.
831 </summary>
832 -<param name="role">
833 +<param name="role_prefix">
834 <summary>
835 -Role allowed access.
836 +The prefix of the user role (e.g., user
837 +is the prefix for user_r).
838 </summary>
839 </param>
840 -<param name="domain">
841 +<param name="user_domain">
842 <summary>
843 User domain for the role.
844 </summary>
845 </param>
846 -</interface>
847 -<interface name="gpg_domtrans" lineno="64">
848 +<param name="user_exec_domain">
849 +<summary>
850 +User exec domain for execute and transition access.
851 +</summary>
852 +</param>
853 +<param name="role">
854 +<summary>
855 +Role allowed access
856 +</summary>
857 +</param>
858 +</template>
859 +<interface name="gpg_domtrans" lineno="80">
860 <summary>
861 Execute the gpg in the gpg domain.
862 </summary>
863 @@ -5366,7 +5488,7 @@ Domain allowed to transition.
864 </summary>
865 </param>
866 </interface>
867 -<interface name="gpg_exec" lineno="83">
868 +<interface name="gpg_exec" lineno="99">
869 <summary>
870 Execute the gpg in the caller domain.
871 </summary>
872 @@ -5376,7 +5498,7 @@ Domain allowed access.
873 </summary>
874 </param>
875 </interface>
876 -<interface name="gpg_spec_domtrans" lineno="117">
877 +<interface name="gpg_spec_domtrans" lineno="133">
878 <summary>
879 Execute gpg in a specified domain.
880 </summary>
881 @@ -5401,7 +5523,7 @@ Domain to transition to.
882 </summary>
883 </param>
884 </interface>
885 -<interface name="gpg_exec_agent" lineno="136">
886 +<interface name="gpg_exec_agent" lineno="152">
887 <summary>
888 Execute the gpg-agent in the caller domain.
889 </summary>
890 @@ -5411,7 +5533,17 @@ Domain allowed access.
891 </summary>
892 </param>
893 </interface>
894 -<interface name="gpg_entry_type" lineno="156">
895 +<interface name="gpg_dontaudit_exec_agent" lineno="171">
896 +<summary>
897 +Do not audit attempts to execute the gpg-agent.
898 +</summary>
899 +<param name="domain">
900 +<summary>
901 +Domain to not audit.
902 +</summary>
903 +</param>
904 +</interface>
905 +<interface name="gpg_entry_type" lineno="190">
906 <summary>
907 Make gpg executable files an
908 entrypoint for the specified domain.
909 @@ -5422,7 +5554,7 @@ The domain for which gpg_exec_t is an entrypoint.
910 </summary>
911 </param>
912 </interface>
913 -<interface name="gpg_signal" lineno="174">
914 +<interface name="gpg_signal" lineno="208">
915 <summary>
916 Send generic signals to gpg.
917 </summary>
918 @@ -5432,7 +5564,7 @@ Domain allowed access.
919 </summary>
920 </param>
921 </interface>
922 -<interface name="gpg_rw_agent_pipes" lineno="192">
923 +<interface name="gpg_rw_agent_pipes" lineno="226">
924 <summary>
925 Read and write gpg agent pipes.
926 </summary>
927 @@ -5442,7 +5574,7 @@ Domain allowed access.
928 </summary>
929 </param>
930 </interface>
931 -<interface name="gpg_stream_connect_agent" lineno="210">
932 +<interface name="gpg_stream_connect_agent" lineno="244">
933 <summary>
934 Connect to gpg agent socket
935 </summary>
936 @@ -5452,7 +5584,7 @@ Domain allowed access.
937 </summary>
938 </param>
939 </interface>
940 -<interface name="gpg_search_agent_tmp_dirs" lineno="232">
941 +<interface name="gpg_search_agent_tmp_dirs" lineno="266">
942 <summary>
943 Search gpg agent dirs.
944 </summary>
945 @@ -5462,7 +5594,7 @@ Domain allowed access.
946 </summary>
947 </param>
948 </interface>
949 -<interface name="gpg_agent_tmp_filetrans" lineno="266">
950 +<interface name="gpg_agent_tmp_filetrans" lineno="300">
951 <summary>
952 filetrans in gpg_agent_tmp_t dirs
953 </summary>
954 @@ -5488,7 +5620,7 @@ The name of the object being created.
955 </summary>
956 </param>
957 </interface>
958 -<interface name="gpg_runtime_filetrans" lineno="301">
959 +<interface name="gpg_runtime_filetrans" lineno="335">
960 <summary>
961 filetrans in gpg_runtime_t dirs
962 </summary>
963 @@ -5514,7 +5646,7 @@ The name of the object being created.
964 </summary>
965 </param>
966 </interface>
967 -<interface name="gpg_secret_filetrans" lineno="336">
968 +<interface name="gpg_secret_filetrans" lineno="370">
969 <summary>
970 filetrans in gpg_secret_t dirs
971 </summary>
972 @@ -5540,7 +5672,7 @@ The name of the object being created.
973 </summary>
974 </param>
975 </interface>
976 -<interface name="gpg_pinentry_dbus_chat" lineno="357">
977 +<interface name="gpg_pinentry_dbus_chat" lineno="391">
978 <summary>
979 Send messages to and from gpg
980 pinentry over DBUS.
981 @@ -5551,7 +5683,18 @@ Domain allowed access.
982 </summary>
983 </param>
984 </interface>
985 -<interface name="gpg_list_user_secrets" lineno="377">
986 +<interface name="gpg_dontaudit_search_user_secrets" lineno="412">
987 +<summary>
988 +Do not audit attempts to search gpg
989 +user secrets.
990 +</summary>
991 +<param name="domain">
992 +<summary>
993 +Domain to not audit.
994 +</summary>
995 +</param>
996 +</interface>
997 +<interface name="gpg_list_user_secrets" lineno="430">
998 <summary>
999 List gpg user secrets.
1000 </summary>
1001 @@ -5609,21 +5752,32 @@ Grant the gpg domains manage rights on all user content
1002 </module>
1003 <module name="irc" filename="policy/modules/apps/irc.if">
1004 <summary>IRC client policy.</summary>
1005 -<interface name="irc_role" lineno="18">
1006 +<template name="irc_role" lineno="29">
1007 <summary>
1008 Role access for IRC.
1009 </summary>
1010 -<param name="role">
1011 +<param name="role_prefix">
1012 <summary>
1013 -Role allowed access.
1014 +The prefix of the user role (e.g., user
1015 +is the prefix for user_r).
1016 </summary>
1017 </param>
1018 -<param name="domain">
1019 +<param name="user_domain">
1020 <summary>
1021 User domain for the role.
1022 </summary>
1023 </param>
1024 -</interface>
1025 +<param name="user_exec_domain">
1026 +<summary>
1027 +User exec domain for execute and transition access.
1028 +</summary>
1029 +</param>
1030 +<param name="role">
1031 +<summary>
1032 +Role allowed access
1033 +</summary>
1034 +</param>
1035 +</template>
1036 <tunable name="irc_use_any_tcp_ports" dftval="false">
1037 <desc>
1038 <p>
1039 @@ -5664,22 +5818,33 @@ Grant the irc domains manage rights on all user content
1040 </module>
1041 <module name="java" filename="policy/modules/apps/java.if">
1042 <summary>Java virtual machine</summary>
1043 -<interface name="java_role" lineno="18">
1044 +<template name="java_role" lineno="29">
1045 <summary>
1046 Role access for java.
1047 </summary>
1048 -<param name="role">
1049 +<param name="role_prefix">
1050 <summary>
1051 -Role allowed access.
1052 +The prefix of the user role (e.g., user
1053 +is the prefix for user_r).
1054 </summary>
1055 </param>
1056 -<param name="domain">
1057 +<param name="user_domain">
1058 <summary>
1059 User domain for the role.
1060 </summary>
1061 </param>
1062 -</interface>
1063 -<template name="java_role_template" lineno="90">
1064 +<param name="user_exec_domain">
1065 +<summary>
1066 +User exec domain for execute and transition access.
1067 +</summary>
1068 +</param>
1069 +<param name="role">
1070 +<summary>
1071 +Role allowed access
1072 +</summary>
1073 +</param>
1074 +</template>
1075 +<template name="java_role_template" lineno="110">
1076 <summary>
1077 The role template for the java module.
1078 </summary>
1079 @@ -5691,22 +5856,27 @@ for java applications.
1080 </desc>
1081 <param name="role_prefix">
1082 <summary>
1083 -The prefix of the user domain (e.g., user
1084 -is the prefix for user_t).
1085 +The prefix of the user role (e.g., user
1086 +is the prefix for user_r).
1087 </summary>
1088 </param>
1089 -<param name="user_role">
1090 +<param name="user_domain">
1091 <summary>
1092 -The role associated with the user domain.
1093 +User domain for the role.
1094 </summary>
1095 </param>
1096 -<param name="user_domain">
1097 +<param name="user_exec_domain">
1098 <summary>
1099 -The type of the user domain.
1100 +User exec domain for execute and transition access.
1101 +</summary>
1102 +</param>
1103 +<param name="role">
1104 +<summary>
1105 +Role allowed access
1106 </summary>
1107 </param>
1108 </template>
1109 -<interface name="java_domtrans" lineno="148">
1110 +<interface name="java_domtrans" lineno="168">
1111 <summary>
1112 Execute the java program in the java domain.
1113 </summary>
1114 @@ -5716,7 +5886,7 @@ Domain allowed to transition.
1115 </summary>
1116 </param>
1117 </interface>
1118 -<interface name="java_run" lineno="178">
1119 +<interface name="java_run" lineno="198">
1120 <summary>
1121 Execute java in the java domain, and
1122 allow the specified role the java domain.
1123 @@ -5732,7 +5902,7 @@ Role allowed access.
1124 </summary>
1125 </param>
1126 </interface>
1127 -<interface name="java_domtrans_unconfined" lineno="198">
1128 +<interface name="java_domtrans_unconfined" lineno="218">
1129 <summary>
1130 Execute the java program in the
1131 unconfined java domain.
1132 @@ -5743,7 +5913,7 @@ Domain allowed to transition.
1133 </summary>
1134 </param>
1135 </interface>
1136 -<interface name="java_run_unconfined" lineno="224">
1137 +<interface name="java_run_unconfined" lineno="244">
1138 <summary>
1139 Execute the java program in the
1140 unconfined java domain and allow the
1141 @@ -5760,7 +5930,7 @@ Role allowed access.
1142 </summary>
1143 </param>
1144 </interface>
1145 -<interface name="java_exec" lineno="244">
1146 +<interface name="java_exec" lineno="264">
1147 <summary>
1148 Execute the java program in
1149 the callers domain.
1150 @@ -5771,7 +5941,7 @@ Domain allowed access.
1151 </summary>
1152 </param>
1153 </interface>
1154 -<interface name="java_manage_generic_home_content" lineno="264">
1155 +<interface name="java_manage_generic_home_content" lineno="284">
1156 <summary>
1157 Create, read, write, and delete
1158 generic java home content.
1159 @@ -5782,7 +5952,7 @@ Domain allowed access.
1160 </summary>
1161 </param>
1162 </interface>
1163 -<interface name="java_manage_java_tmp" lineno="285">
1164 +<interface name="java_manage_java_tmp" lineno="305">
1165 <summary>
1166 Create, read, write, and delete
1167 temporary java content.
1168 @@ -5793,7 +5963,7 @@ Domain allowed access.
1169 </summary>
1170 </param>
1171 </interface>
1172 -<interface name="java_home_filetrans_java_home" lineno="316">
1173 +<interface name="java_home_filetrans_java_home" lineno="336">
1174 <summary>
1175 Create specified objects in user home
1176 directories with the generic java
1177 @@ -5815,7 +5985,7 @@ The name of the object being created.
1178 </summary>
1179 </param>
1180 </interface>
1181 -<template name="java_noatsecure_domtrans" lineno="341">
1182 +<template name="java_noatsecure_domtrans" lineno="361">
1183 <summary>
1184 Run java in javaplugin domain and
1185 do not clean the environment (atsecure)
1186 @@ -5832,7 +6002,7 @@ Domain allowed to transition.
1187 </summary>
1188 </param>
1189 </template>
1190 -<template name="java_domain_type" lineno="369">
1191 +<template name="java_domain_type" lineno="389">
1192 <summary>
1193 The template for using java in a domain.
1194 </summary>
1195 @@ -5887,21 +6057,32 @@ Grant the java domains manage rights on all user content
1196 </module>
1197 <module name="libmtp" filename="policy/modules/apps/libmtp.if">
1198 <summary>libmtp: An Initiatior implementation of the Media Transfer Protocol (MTP).</summary>
1199 -<interface name="libmtp_role" lineno="18">
1200 +<template name="libmtp_role" lineno="29">
1201 <summary>
1202 Role access for libmtp.
1203 </summary>
1204 -<param name="role">
1205 +<param name="role_prefix">
1206 <summary>
1207 -Role allowed access.
1208 +The prefix of the user role (e.g., user
1209 +is the prefix for user_r).
1210 </summary>
1211 </param>
1212 -<param name="domain">
1213 +<param name="user_domain">
1214 <summary>
1215 User domain for the role.
1216 </summary>
1217 </param>
1218 -</interface>
1219 +<param name="user_exec_domain">
1220 +<summary>
1221 +User exec domain for execute and transition access.
1222 +</summary>
1223 +</param>
1224 +<param name="role">
1225 +<summary>
1226 +Role allowed access
1227 +</summary>
1228 +</param>
1229 +</template>
1230 <tunable name="libmtp_enable_home_dirs" dftval="false">
1231 <desc>
1232 <p>
1233 @@ -6135,7 +6316,7 @@ Role allowed access.
1234 </module>
1235 <module name="mono" filename="policy/modules/apps/mono.if">
1236 <summary>Run .NET server and client applications on Linux.</summary>
1237 -<template name="mono_role_template" lineno="30">
1238 +<template name="mono_role_template" lineno="35">
1239 <summary>
1240 The role template for the mono module.
1241 </summary>
1242 @@ -6147,22 +6328,27 @@ for mono applications.
1243 </desc>
1244 <param name="role_prefix">
1245 <summary>
1246 -The prefix of the user domain (e.g., user
1247 -is the prefix for user_t).
1248 +The prefix of the user role (e.g., user
1249 +is the prefix for user_r).
1250 </summary>
1251 </param>
1252 -<param name="user_role">
1253 +<param name="user_domain">
1254 <summary>
1255 -The role associated with the user domain.
1256 +User domain for the role.
1257 </summary>
1258 </param>
1259 -<param name="user_domain">
1260 +<param name="user_exec_domain">
1261 <summary>
1262 -The type of the user domain.
1263 +User exec domain for execute and transition access.
1264 +</summary>
1265 +</param>
1266 +<param name="role">
1267 +<summary>
1268 +Role allowed access
1269 </summary>
1270 </param>
1271 </template>
1272 -<interface name="mono_domtrans" lineno="80">
1273 +<interface name="mono_domtrans" lineno="85">
1274 <summary>
1275 Execute mono in the mono domain.
1276 </summary>
1277 @@ -6172,7 +6358,7 @@ Domain allowed to transition.
1278 </summary>
1279 </param>
1280 </interface>
1281 -<interface name="mono_run" lineno="105">
1282 +<interface name="mono_run" lineno="110">
1283 <summary>
1284 Execute mono in the mono domain, and
1285 allow the specified role the mono domain.
1286 @@ -6188,7 +6374,7 @@ Role allowed access.
1287 </summary>
1288 </param>
1289 </interface>
1290 -<interface name="mono_exec" lineno="124">
1291 +<interface name="mono_exec" lineno="129">
1292 <summary>
1293 Execute mono in the caller domain.
1294 </summary>
1295 @@ -6198,7 +6384,7 @@ Domain allowed access.
1296 </summary>
1297 </param>
1298 </interface>
1299 -<interface name="mono_rw_shm" lineno="143">
1300 +<interface name="mono_rw_shm" lineno="148">
1301 <summary>
1302 Read and write mono shared memory.
1303 </summary>
1304 @@ -6211,22 +6397,33 @@ Domain allowed access.
1305 </module>
1306 <module name="mozilla" filename="policy/modules/apps/mozilla.if">
1307 <summary>Policy for Mozilla and related web browsers.</summary>
1308 -<interface name="mozilla_role" lineno="18">
1309 +<template name="mozilla_role" lineno="29">
1310 <summary>
1311 Role access for mozilla.
1312 </summary>
1313 -<param name="role">
1314 +<param name="role_prefix">
1315 <summary>
1316 -Role allowed access.
1317 +The prefix of the user role (e.g., user
1318 +is the prefix for user_r).
1319 </summary>
1320 </param>
1321 -<param name="domain">
1322 +<param name="user_domain">
1323 <summary>
1324 User domain for the role.
1325 </summary>
1326 </param>
1327 -</interface>
1328 -<interface name="mozilla_role_plugin" lineno="90">
1329 +<param name="user_exec_domain">
1330 +<summary>
1331 +User exec domain for execute and transition access.
1332 +</summary>
1333 +</param>
1334 +<param name="role">
1335 +<summary>
1336 +Role allowed access
1337 +</summary>
1338 +</param>
1339 +</template>
1340 +<interface name="mozilla_role_plugin" lineno="105">
1341 <summary>
1342 Role access for mozilla plugin.
1343 </summary>
1344 @@ -6241,7 +6438,7 @@ User domain for the role.
1345 </summary>
1346 </param>
1347 </interface>
1348 -<interface name="mozilla_read_user_home" lineno="151">
1349 +<interface name="mozilla_read_user_home" lineno="166">
1350 <summary>
1351 Read mozilla home directory content.
1352 </summary>
1353 @@ -6251,7 +6448,7 @@ Domain allowed access.
1354 </summary>
1355 </param>
1356 </interface>
1357 -<interface name="mozilla_read_user_home_files" lineno="172">
1358 +<interface name="mozilla_read_user_home_files" lineno="187">
1359 <summary>
1360 Read mozilla home directory files
1361 </summary>
1362 @@ -6261,7 +6458,7 @@ Domain allowed access.
1363 </summary>
1364 </param>
1365 </interface>
1366 -<interface name="mozilla_write_user_home_files" lineno="193">
1367 +<interface name="mozilla_write_user_home_files" lineno="208">
1368 <summary>
1369 Write mozilla home directory files.
1370 </summary>
1371 @@ -6271,7 +6468,7 @@ Domain allowed access.
1372 </summary>
1373 </param>
1374 </interface>
1375 -<interface name="mozilla_dontaudit_rw_user_home_files" lineno="213">
1376 +<interface name="mozilla_dontaudit_rw_user_home_files" lineno="228">
1377 <summary>
1378 Do not audit attempts to read and
1379 write mozilla home directory files.
1380 @@ -6282,7 +6479,7 @@ Domain to not audit.
1381 </summary>
1382 </param>
1383 </interface>
1384 -<interface name="mozilla_dontaudit_manage_user_home_files" lineno="233">
1385 +<interface name="mozilla_dontaudit_manage_user_home_files" lineno="248">
1386 <summary>
1387 Do not audit attempt to Create,
1388 read, write, and delete mozilla
1389 @@ -6294,7 +6491,7 @@ Domain to not audit.
1390 </summary>
1391 </param>
1392 </interface>
1393 -<interface name="mozilla_exec_user_plugin_home_files" lineno="253">
1394 +<interface name="mozilla_exec_user_plugin_home_files" lineno="268">
1395 <summary>
1396 Execute mozilla plugin home directory files.
1397 </summary>
1398 @@ -6304,7 +6501,7 @@ Domain allowed access.
1399 </summary>
1400 </param>
1401 </interface>
1402 -<interface name="mozilla_execmod_user_plugin_home_files" lineno="273">
1403 +<interface name="mozilla_execmod_user_plugin_home_files" lineno="288">
1404 <summary>
1405 Mozilla plugin home directory file
1406 text relocation.
1407 @@ -6315,7 +6512,7 @@ Domain allowed access.
1408 </summary>
1409 </param>
1410 </interface>
1411 -<interface name="mozilla_read_tmp_files" lineno="291">
1412 +<interface name="mozilla_read_tmp_files" lineno="306">
1413 <summary>
1414 Read temporary mozilla files.
1415 </summary>
1416 @@ -6325,7 +6522,7 @@ Domain allowed access.
1417 </summary>
1418 </param>
1419 </interface>
1420 -<interface name="mozilla_domtrans" lineno="309">
1421 +<interface name="mozilla_domtrans" lineno="324">
1422 <summary>
1423 Run mozilla in the mozilla domain.
1424 </summary>
1425 @@ -6335,7 +6532,7 @@ Domain allowed to transition.
1426 </summary>
1427 </param>
1428 </interface>
1429 -<interface name="mozilla_domtrans_plugin" lineno="329">
1430 +<interface name="mozilla_domtrans_plugin" lineno="344">
1431 <summary>
1432 Execute a domain transition to
1433 run mozilla plugin.
1434 @@ -6346,7 +6543,7 @@ Domain allowed to transition.
1435 </summary>
1436 </param>
1437 </interface>
1438 -<interface name="mozilla_run_plugin" lineno="356">
1439 +<interface name="mozilla_run_plugin" lineno="371">
1440 <summary>
1441 Execute mozilla plugin in the
1442 mozilla plugin domain, and allow
1443 @@ -6364,7 +6561,7 @@ Role allowed access.
1444 </summary>
1445 </param>
1446 </interface>
1447 -<interface name="mozilla_domtrans_plugin_config" lineno="376">
1448 +<interface name="mozilla_domtrans_plugin_config" lineno="391">
1449 <summary>
1450 Execute a domain transition to
1451 run mozilla plugin config.
1452 @@ -6375,7 +6572,7 @@ Domain allowed to transition.
1453 </summary>
1454 </param>
1455 </interface>
1456 -<interface name="mozilla_run_plugin_config" lineno="403">
1457 +<interface name="mozilla_run_plugin_config" lineno="418">
1458 <summary>
1459 Execute mozilla plugin config in
1460 the mozilla plugin config domain,
1461 @@ -6393,7 +6590,7 @@ Role allowed access.
1462 </summary>
1463 </param>
1464 </interface>
1465 -<interface name="mozilla_dbus_chat" lineno="423">
1466 +<interface name="mozilla_dbus_chat" lineno="438">
1467 <summary>
1468 Send and receive messages from
1469 mozilla over dbus.
1470 @@ -6404,7 +6601,7 @@ Domain allowed access.
1471 </summary>
1472 </param>
1473 </interface>
1474 -<interface name="mozilla_dbus_chat_plugin" lineno="444">
1475 +<interface name="mozilla_dbus_chat_plugin" lineno="459">
1476 <summary>
1477 Send and receive messages from
1478 mozilla plugin over dbus.
1479 @@ -6415,7 +6612,7 @@ Domain allowed access.
1480 </summary>
1481 </param>
1482 </interface>
1483 -<interface name="mozilla_rw_tcp_sockets" lineno="464">
1484 +<interface name="mozilla_rw_tcp_sockets" lineno="479">
1485 <summary>
1486 Read and write mozilla TCP sockets.
1487 </summary>
1488 @@ -6425,7 +6622,7 @@ Domain allowed access.
1489 </summary>
1490 </param>
1491 </interface>
1492 -<interface name="mozilla_manage_plugin_rw_files" lineno="483">
1493 +<interface name="mozilla_manage_plugin_rw_files" lineno="498">
1494 <summary>
1495 Create, read, write, and delete
1496 mozilla plugin rw files.
1497 @@ -6436,7 +6633,7 @@ Domain allowed access.
1498 </summary>
1499 </param>
1500 </interface>
1501 -<interface name="mozilla_plugin_read_tmpfs_files" lineno="502">
1502 +<interface name="mozilla_plugin_read_tmpfs_files" lineno="517">
1503 <summary>
1504 Read mozilla_plugin tmpfs files.
1505 </summary>
1506 @@ -6446,7 +6643,7 @@ Domain allowed access.
1507 </summary>
1508 </param>
1509 </interface>
1510 -<interface name="mozilla_plugin_delete_tmpfs_files" lineno="521">
1511 +<interface name="mozilla_plugin_delete_tmpfs_files" lineno="536">
1512 <summary>
1513 Delete mozilla_plugin tmpfs files.
1514 </summary>
1515 @@ -6456,7 +6653,7 @@ Domain allowed access.
1516 </summary>
1517 </param>
1518 </interface>
1519 -<interface name="mozilla_rw_tmp_pipes" lineno="540">
1520 +<interface name="mozilla_rw_tmp_pipes" lineno="555">
1521 <summary>
1522 Read/write to mozilla's tmp fifo files
1523 </summary>
1524 @@ -6466,7 +6663,7 @@ Domain allowed access
1525 </summary>
1526 </param>
1527 </interface>
1528 -<interface name="mozilla_manage_generic_plugin_home_content" lineno="559">
1529 +<interface name="mozilla_manage_generic_plugin_home_content" lineno="574">
1530 <summary>
1531 Create, read, write, and delete
1532 generic mozilla plugin home content.
1533 @@ -6477,7 +6674,7 @@ Domain allowed access.
1534 </summary>
1535 </param>
1536 </interface>
1537 -<interface name="mozilla_home_filetrans_plugin_home" lineno="594">
1538 +<interface name="mozilla_home_filetrans_plugin_home" lineno="609">
1539 <summary>
1540 Create objects in user home
1541 directories with the generic mozilla
1542 @@ -6499,7 +6696,7 @@ The name of the object being created.
1543 </summary>
1544 </param>
1545 </interface>
1546 -<interface name="mozilla_dontaudit_use_fds" lineno="614">
1547 +<interface name="mozilla_dontaudit_use_fds" lineno="629">
1548 <summary>
1549 Do not audit use of mozilla file descriptors
1550 </summary>
1551 @@ -6509,7 +6706,7 @@ Domain to dont audit access from
1552 </summary>
1553 </param>
1554 </interface>
1555 -<interface name="mozilla_send_dgram_plugin" lineno="632">
1556 +<interface name="mozilla_send_dgram_plugin" lineno="647">
1557 <summary>
1558 Send messages to mozilla plugin unix datagram sockets
1559 </summary>
1560 @@ -6575,22 +6772,33 @@ unreserved ports (for instance when dealing with Google Talk)
1561 </module>
1562 <module name="mplayer" filename="policy/modules/apps/mplayer.if">
1563 <summary>Mplayer media player and encoder.</summary>
1564 -<interface name="mplayer_role" lineno="18">
1565 +<template name="mplayer_role" lineno="29">
1566 <summary>
1567 Role access for mplayer
1568 </summary>
1569 -<param name="role">
1570 +<param name="role_prefix">
1571 <summary>
1572 -Role allowed access
1573 +The prefix of the user role (e.g., user
1574 +is the prefix for user_r).
1575 </summary>
1576 </param>
1577 -<param name="domain">
1578 +<param name="user_domain">
1579 <summary>
1580 -User domain for the role
1581 +User domain for the role.
1582 </summary>
1583 </param>
1584 -</interface>
1585 -<interface name="mplayer_domtrans" lineno="65">
1586 +<param name="user_exec_domain">
1587 +<summary>
1588 +User exec domain for execute and transition access.
1589 +</summary>
1590 +</param>
1591 +<param name="role">
1592 +<summary>
1593 +Role allowed access
1594 +</summary>
1595 +</param>
1596 +</template>
1597 +<interface name="mplayer_domtrans" lineno="81">
1598 <summary>
1599 Run mplayer in mplayer domain.
1600 </summary>
1601 @@ -6600,7 +6808,7 @@ Domain allowed to transition.
1602 </summary>
1603 </param>
1604 </interface>
1605 -<interface name="mplayer_exec" lineno="85">
1606 +<interface name="mplayer_exec" lineno="101">
1607 <summary>
1608 Execute mplayer in the caller domain.
1609 </summary>
1610 @@ -6610,7 +6818,7 @@ Domain allowed access.
1611 </summary>
1612 </param>
1613 </interface>
1614 -<interface name="mplayer_read_user_home_files" lineno="104">
1615 +<interface name="mplayer_read_user_home_files" lineno="120">
1616 <summary>
1617 Read mplayer user home content files.
1618 </summary>
1619 @@ -6620,7 +6828,7 @@ Domain allowed access.
1620 </summary>
1621 </param>
1622 </interface>
1623 -<interface name="mplayer_manage_generic_home_content" lineno="124">
1624 +<interface name="mplayer_manage_generic_home_content" lineno="140">
1625 <summary>
1626 Create, read, write, and delete
1627 generic mplayer home content.
1628 @@ -6631,7 +6839,7 @@ Domain allowed access.
1629 </summary>
1630 </param>
1631 </interface>
1632 -<interface name="mplayer_home_filetrans_mplayer_home" lineno="157">
1633 +<interface name="mplayer_home_filetrans_mplayer_home" lineno="173">
1634 <summary>
1635 Create specified objects in user home
1636 directories with the generic mplayer
1637 @@ -6720,22 +6928,33 @@ Grant the mplayer domains manage rights on all user content
1638 </module>
1639 <module name="openoffice" filename="policy/modules/apps/openoffice.if">
1640 <summary>Openoffice suite.</summary>
1641 -<interface name="ooffice_role" lineno="18">
1642 +<template name="ooffice_role" lineno="29">
1643 <summary>
1644 Role access for openoffice.
1645 </summary>
1646 -<param name="role">
1647 +<param name="role_prefix">
1648 <summary>
1649 -Role allowed access.
1650 +The prefix of the user role (e.g., user
1651 +is the prefix for user_r).
1652 </summary>
1653 </param>
1654 -<param name="domain">
1655 +<param name="user_domain">
1656 <summary>
1657 User domain for the role.
1658 </summary>
1659 </param>
1660 -</interface>
1661 -<interface name="ooffice_domtrans" lineno="48">
1662 +<param name="user_exec_domain">
1663 +<summary>
1664 +User exec domain for execute and transition access.
1665 +</summary>
1666 +</param>
1667 +<param name="role">
1668 +<summary>
1669 +Role allowed access
1670 +</summary>
1671 +</param>
1672 +</template>
1673 +<interface name="ooffice_domtrans" lineno="63">
1674 <summary>
1675 Run openoffice in its own domain.
1676 </summary>
1677 @@ -6745,7 +6964,7 @@ Domain allowed to transition.
1678 </summary>
1679 </param>
1680 </interface>
1681 -<interface name="ooffice_dontaudit_exec_tmp_files" lineno="67">
1682 +<interface name="ooffice_dontaudit_exec_tmp_files" lineno="82">
1683 <summary>
1684 Do not audit attempts to execute
1685 files in temporary directories.
1686 @@ -6756,7 +6975,7 @@ Domain to not audit.
1687 </summary>
1688 </param>
1689 </interface>
1690 -<interface name="ooffice_rw_tmp_files" lineno="86">
1691 +<interface name="ooffice_rw_tmp_files" lineno="101">
1692 <summary>
1693 Read and write temporary
1694 openoffice files.
1695 @@ -6767,7 +6986,7 @@ Domain allowed access.
1696 </summary>
1697 </param>
1698 </interface>
1699 -<interface name="ooffice_dbus_chat" lineno="106">
1700 +<interface name="ooffice_dbus_chat" lineno="121">
1701 <summary>
1702 Send and receive dbus messages
1703 from and to the openoffice
1704 @@ -6779,7 +6998,7 @@ Domain allowed access.
1705 </summary>
1706 </param>
1707 </interface>
1708 -<interface name="ooffice_stream_connect" lineno="127">
1709 +<interface name="ooffice_stream_connect" lineno="142">
1710 <summary>
1711 Connect to openoffice using a
1712 unix domain stream socket.
1713 @@ -6843,22 +7062,44 @@ Grant the openoffice domains manage rights on all user content
1714 </module>
1715 <module name="pulseaudio" filename="policy/modules/apps/pulseaudio.if">
1716 <summary>Pulseaudio network sound server.</summary>
1717 -<interface name="pulseaudio_role" lineno="18">
1718 +<template name="pulseaudio_role" lineno="29">
1719 <summary>
1720 Role access for pulseaudio.
1721 </summary>
1722 +<param name="role_prefix">
1723 +<summary>
1724 +The prefix of the user role (e.g., user
1725 +is the prefix for user_r).
1726 +</summary>
1727 +</param>
1728 +<param name="user_domain">
1729 +<summary>
1730 +User domain for the role.
1731 +</summary>
1732 +</param>
1733 +<param name="user_exec_domain">
1734 +<summary>
1735 +User exec domain for execute and transition access.
1736 +</summary>
1737 +</param>
1738 <param name="role">
1739 <summary>
1740 -Role allowed access.
1741 +Role allowed access
1742 </summary>
1743 </param>
1744 +</template>
1745 +<interface name="pulseaudio_client_domain" lineno="73">
1746 +<summary>
1747 +Connect to pulseaudio and manage
1748 +pulseaudio config data.
1749 +</summary>
1750 <param name="domain">
1751 <summary>
1752 -User domain for the role.
1753 +Domain allowed access.
1754 </summary>
1755 </param>
1756 </interface>
1757 -<interface name="pulseaudio_domtrans" lineno="56">
1758 +<interface name="pulseaudio_domtrans" lineno="91">
1759 <summary>
1760 Execute a domain transition to run pulseaudio.
1761 </summary>
1762 @@ -6868,7 +7109,7 @@ Domain allowed to transition.
1763 </summary>
1764 </param>
1765 </interface>
1766 -<interface name="pulseaudio_run" lineno="85">
1767 +<interface name="pulseaudio_run" lineno="117">
1768 <summary>
1769 Execute pulseaudio in the pulseaudio
1770 domain, and allow the specified role
1771 @@ -6885,7 +7126,7 @@ Role allowed access.
1772 </summary>
1773 </param>
1774 </interface>
1775 -<interface name="pulseaudio_exec" lineno="104">
1776 +<interface name="pulseaudio_exec" lineno="137">
1777 <summary>
1778 Execute pulseaudio in the caller domain.
1779 </summary>
1780 @@ -6895,7 +7136,7 @@ Domain allowed access.
1781 </summary>
1782 </param>
1783 </interface>
1784 -<interface name="pulseaudio_dontaudit_exec" lineno="123">
1785 +<interface name="pulseaudio_dontaudit_exec" lineno="156">
1786 <summary>
1787 Do not audit attempts to execute pulseaudio.
1788 </summary>
1789 @@ -6905,7 +7146,7 @@ Domain to not audit.
1790 </summary>
1791 </param>
1792 </interface>
1793 -<interface name="pulseaudio_signull" lineno="142">
1794 +<interface name="pulseaudio_signull" lineno="175">
1795 <summary>
1796 Send null signals to pulseaudio.
1797 processes.
1798 @@ -6916,7 +7157,7 @@ Domain allowed access.
1799 </summary>
1800 </param>
1801 </interface>
1802 -<interface name="pulseaudio_use_fds" lineno="161">
1803 +<interface name="pulseaudio_use_fds" lineno="194">
1804 <summary>
1805 Use file descriptors for
1806 pulseaudio.
1807 @@ -6927,7 +7168,7 @@ Domain allowed access.
1808 </summary>
1809 </param>
1810 </interface>
1811 -<interface name="pulseaudio_dontaudit_use_fds" lineno="180">
1812 +<interface name="pulseaudio_dontaudit_use_fds" lineno="213">
1813 <summary>
1814 Do not audit attempts to use the
1815 file descriptors for pulseaudio.
1816 @@ -6938,7 +7179,7 @@ Domain allowed access.
1817 </summary>
1818 </param>
1819 </interface>
1820 -<interface name="pulseaudio_stream_connect" lineno="199">
1821 +<interface name="pulseaudio_stream_connect" lineno="232">
1822 <summary>
1823 Connect to pulseaudio with a unix
1824 domain stream socket.
1825 @@ -6949,7 +7190,7 @@ Domain allowed access.
1826 </summary>
1827 </param>
1828 </interface>
1829 -<interface name="pulseaudio_dbus_chat" lineno="219">
1830 +<interface name="pulseaudio_dbus_chat" lineno="252">
1831 <summary>
1832 Send and receive messages from
1833 pulseaudio over dbus.
1834 @@ -6960,7 +7201,7 @@ Domain allowed access.
1835 </summary>
1836 </param>
1837 </interface>
1838 -<interface name="pulseaudio_setattr_home_dir" lineno="239">
1839 +<interface name="pulseaudio_setattr_home_dir" lineno="272">
1840 <summary>
1841 Set attributes of pulseaudio home directories.
1842 </summary>
1843 @@ -6970,7 +7211,7 @@ Domain allowed access.
1844 </summary>
1845 </param>
1846 </interface>
1847 -<interface name="pulseaudio_read_home" lineno="257">
1848 +<interface name="pulseaudio_read_home" lineno="290">
1849 <summary>
1850 Read pulseaudio home content.
1851 </summary>
1852 @@ -6980,7 +7221,7 @@ Domain allowed access.
1853 </summary>
1854 </param>
1855 </interface>
1856 -<interface name="pulseaudio_rw_home_files" lineno="278">
1857 +<interface name="pulseaudio_rw_home_files" lineno="311">
1858 <summary>
1859 Read and write Pulse Audio files.
1860 </summary>
1861 @@ -6990,7 +7231,7 @@ Domain allowed access.
1862 </summary>
1863 </param>
1864 </interface>
1865 -<interface name="pulseaudio_manage_home" lineno="299">
1866 +<interface name="pulseaudio_manage_home" lineno="332">
1867 <summary>
1868 Create, read, write, and delete
1869 pulseaudio home content.
1870 @@ -7001,7 +7242,7 @@ Domain allowed access.
1871 </summary>
1872 </param>
1873 </interface>
1874 -<interface name="pulseaudio_home_filetrans_pulseaudio_home" lineno="332">
1875 +<interface name="pulseaudio_home_filetrans_pulseaudio_home" lineno="365">
1876 <summary>
1877 Create objects in user home
1878 directories with the pulseaudio
1879 @@ -7023,7 +7264,7 @@ The name of the object being created.
1880 </summary>
1881 </param>
1882 </interface>
1883 -<interface name="pulseaudio_tmpfs_content" lineno="351">
1884 +<interface name="pulseaudio_tmpfs_content" lineno="384">
1885 <summary>
1886 Make the specified tmpfs file type
1887 pulseaudio tmpfs content.
1888 @@ -7034,7 +7275,7 @@ File type to make pulseaudio tmpfs content.
1889 </summary>
1890 </param>
1891 </interface>
1892 -<interface name="pulseaudio_read_tmpfs_files" lineno="369">
1893 +<interface name="pulseaudio_read_tmpfs_files" lineno="402">
1894 <summary>
1895 Read pulseaudio tmpfs files.
1896 </summary>
1897 @@ -7044,7 +7285,7 @@ Domain allowed access.
1898 </summary>
1899 </param>
1900 </interface>
1901 -<interface name="pulseaudio_rw_tmpfs_files" lineno="389">
1902 +<interface name="pulseaudio_rw_tmpfs_files" lineno="422">
1903 <summary>
1904 Read and write pulseaudio tmpfs
1905 files.
1906 @@ -7055,23 +7296,6 @@ Domain allowed access.
1907 </summary>
1908 </param>
1909 </interface>
1910 -<interface name="pulseaudio_client_domain" lineno="417">
1911 -<summary>
1912 -Mark the specified domain as a PulseAudio client domain
1913 -and the related tmpfs file type as a (shared) PulseAudio tmpfs
1914 -file type used for the shared memory access
1915 -</summary>
1916 -<param name="domain">
1917 -<summary>
1918 -Domain to become a PulseAudio client domain
1919 -</summary>
1920 -</param>
1921 -<param name="tmpfstype">
1922 -<summary>
1923 -Tmpfs type used for shared memory of the given domain
1924 -</summary>
1925 -</param>
1926 -</interface>
1927 <tunable name="pulseaudio_execmem" dftval="false">
1928 <desc>
1929 <p>
1930 @@ -7307,22 +7531,33 @@ access to the network.
1931 </module>
1932 <module name="rssh" filename="policy/modules/apps/rssh.if">
1933 <summary>Restricted (scp/sftp) only shell.</summary>
1934 -<interface name="rssh_role" lineno="18">
1935 +<template name="rssh_role" lineno="29">
1936 <summary>
1937 Role access for rssh.
1938 </summary>
1939 -<param name="role">
1940 +<param name="role_prefix">
1941 <summary>
1942 -Role allowed access.
1943 +The prefix of the user role (e.g., user
1944 +is the prefix for user_r).
1945 </summary>
1946 </param>
1947 -<param name="domain">
1948 +<param name="user_domain">
1949 <summary>
1950 User domain for the role.
1951 </summary>
1952 </param>
1953 -</interface>
1954 -<interface name="rssh_spec_domtrans" lineno="46">
1955 +<param name="user_exec_domain">
1956 +<summary>
1957 +User exec domain for execute and transition access.
1958 +</summary>
1959 +</param>
1960 +<param name="role">
1961 +<summary>
1962 +Role allowed access
1963 +</summary>
1964 +</param>
1965 +</template>
1966 +<interface name="rssh_spec_domtrans" lineno="57">
1967 <summary>
1968 Execute rssh in the rssh domain.
1969 </summary>
1970 @@ -7332,7 +7567,7 @@ Domain allowed to transition.
1971 </summary>
1972 </param>
1973 </interface>
1974 -<interface name="rssh_exec" lineno="66">
1975 +<interface name="rssh_exec" lineno="77">
1976 <summary>
1977 Execute the rssh program
1978 in the caller domain.
1979 @@ -7343,7 +7578,7 @@ Domain allowed access.
1980 </summary>
1981 </param>
1982 </interface>
1983 -<interface name="rssh_domtrans_chroot_helper" lineno="86">
1984 +<interface name="rssh_domtrans_chroot_helper" lineno="97">
1985 <summary>
1986 Execute a domain transition to
1987 run rssh chroot helper.
1988 @@ -7354,7 +7589,7 @@ Domain allowed to transition.
1989 </summary>
1990 </param>
1991 </interface>
1992 -<interface name="rssh_read_ro_content" lineno="105">
1993 +<interface name="rssh_read_ro_content" lineno="116">
1994 <summary>
1995 Read users rssh read-only content.
1996 </summary>
1997 @@ -7367,7 +7602,7 @@ Domain allowed access.
1998 </module>
1999 <module name="screen" filename="policy/modules/apps/screen.if">
2000 <summary>GNU terminal multiplexer.</summary>
2001 -<template name="screen_role_template" lineno="24">
2002 +<template name="screen_role_template" lineno="29">
2003 <summary>
2004 The role template for the screen module.
2005 </summary>
2006 @@ -7377,18 +7612,23 @@ The prefix of the user role (e.g., user
2007 is the prefix for user_r).
2008 </summary>
2009 </param>
2010 -<param name="user_role">
2011 +<param name="user_domain">
2012 <summary>
2013 -The role associated with the user domain.
2014 +The type of the user domain.
2015 </summary>
2016 </param>
2017 -<param name="user_domain">
2018 +<param name="user_exec_domain">
2019 <summary>
2020 -The type of the user domain.
2021 +User exec domain for execute and transition access.
2022 +</summary>
2023 +</param>
2024 +<param name="user_role">
2025 +<summary>
2026 +The role associated with the user domain.
2027 </summary>
2028 </param>
2029 </template>
2030 -<interface name="screen_execute_sock_file" lineno="103">
2031 +<interface name="screen_execute_sock_file" lineno="114">
2032 <summary>
2033 Execute the screen runtime sock file.
2034 </summary>
2035 @@ -7476,21 +7716,32 @@ Domain allowed access.
2036 </module>
2037 <module name="syncthing" filename="policy/modules/apps/syncthing.if">
2038 <summary>Application that lets you synchronize your files across multiple devices.</summary>
2039 -<interface name="syncthing_role" lineno="18">
2040 +<template name="syncthing_role" lineno="29">
2041 <summary>
2042 Role access for Syncthing
2043 </summary>
2044 -<param name="role">
2045 +<param name="role_prefix">
2046 <summary>
2047 -Role allowed access
2048 +The prefix of the user role (e.g., user
2049 +is the prefix for user_r).
2050 </summary>
2051 </param>
2052 -<param name="domain">
2053 +<param name="user_domain">
2054 <summary>
2055 -User domain for the role
2056 +User domain for the role.
2057 </summary>
2058 </param>
2059 -</interface>
2060 +<param name="user_exec_domain">
2061 +<summary>
2062 +User exec domain for execute and transition access.
2063 +</summary>
2064 +</param>
2065 +<param name="role">
2066 +<summary>
2067 +Role allowed access
2068 +</summary>
2069 +</param>
2070 +</template>
2071 <tunable name="syncthing_read_generic_user_content" dftval="true">
2072 <desc>
2073 <p>
2074 @@ -7532,7 +7783,7 @@ Domain prefix to be used.
2075 </summary>
2076 </param>
2077 </template>
2078 -<template name="telepathy_role_template" lineno="59">
2079 +<template name="telepathy_role_template" lineno="64">
2080 <summary>
2081 The role template for the telepathy module.
2082 </summary>
2083 @@ -7544,22 +7795,27 @@ for window manager applications.
2084 </desc>
2085 <param name="role_prefix">
2086 <summary>
2087 -The prefix of the user domain (e.g., user
2088 -is the prefix for user_t).
2089 +The prefix of the user role (e.g., user
2090 +is the prefix for user_r).
2091 </summary>
2092 </param>
2093 -<param name="user_role">
2094 +<param name="user_domain">
2095 <summary>
2096 -The role associated with the user domain.
2097 +User domain for the role.
2098 </summary>
2099 </param>
2100 -<param name="user_domain">
2101 +<param name="user_exec_domain">
2102 <summary>
2103 -The type of the user domain.
2104 +User exec domain for execute and transition access.
2105 +</summary>
2106 +</param>
2107 +<param name="role">
2108 +<summary>
2109 +Role allowed access
2110 </summary>
2111 </param>
2112 </template>
2113 -<interface name="telepathy_gabble_stream_connect" lineno="137">
2114 +<interface name="telepathy_gabble_stream_connect" lineno="146">
2115 <summary>
2116 Connect to gabble with a unix
2117 domain stream socket.
2118 @@ -7570,7 +7826,7 @@ Domain allowed access.
2119 </summary>
2120 </param>
2121 </interface>
2122 -<interface name="telepathy_gabble_dbus_chat" lineno="157">
2123 +<interface name="telepathy_gabble_dbus_chat" lineno="166">
2124 <summary>
2125 Send dbus messages to and from
2126 gabble.
2127 @@ -7581,7 +7837,7 @@ Domain allowed access.
2128 </summary>
2129 </param>
2130 </interface>
2131 -<interface name="telepathy_mission_control_dbus_chat" lineno="178">
2132 +<interface name="telepathy_mission_control_dbus_chat" lineno="187">
2133 <summary>
2134 Send dbus messages to and from
2135 mission control.
2136 @@ -7592,7 +7848,7 @@ Domain allowed access.
2137 </summary>
2138 </param>
2139 </interface>
2140 -<interface name="telepathy_mission_control_read_state" lineno="198">
2141 +<interface name="telepathy_mission_control_read_state" lineno="207">
2142 <summary>
2143 Read mission control process state files.
2144 </summary>
2145 @@ -7602,7 +7858,7 @@ Domain allowed access.
2146 </summary>
2147 </param>
2148 </interface>
2149 -<interface name="telepathy_msn_stream_connect" lineno="220">
2150 +<interface name="telepathy_msn_stream_connect" lineno="229">
2151 <summary>
2152 Connect to msn with a unix
2153 domain stream socket.
2154 @@ -7613,7 +7869,7 @@ Domain allowed access.
2155 </summary>
2156 </param>
2157 </interface>
2158 -<interface name="telepathy_salut_stream_connect" lineno="240">
2159 +<interface name="telepathy_salut_stream_connect" lineno="249">
2160 <summary>
2161 Connect to salut with a unix
2162 domain stream socket.
2163 @@ -7643,22 +7899,33 @@ managers can connect to any port.
2164 </module>
2165 <module name="thunderbird" filename="policy/modules/apps/thunderbird.if">
2166 <summary>Thunderbird email client.</summary>
2167 -<interface name="thunderbird_role" lineno="18">
2168 +<template name="thunderbird_role" lineno="29">
2169 <summary>
2170 Role access for thunderbird.
2171 </summary>
2172 -<param name="role">
2173 +<param name="role_prefix">
2174 <summary>
2175 -Role allowed access.
2176 +The prefix of the user role (e.g., user
2177 +is the prefix for user_r).
2178 </summary>
2179 </param>
2180 -<param name="domain">
2181 +<param name="user_domain">
2182 <summary>
2183 User domain for the role.
2184 </summary>
2185 </param>
2186 -</interface>
2187 -<interface name="thunderbird_domtrans" lineno="52">
2188 +<param name="user_exec_domain">
2189 +<summary>
2190 +User exec domain for execute and transition access.
2191 +</summary>
2192 +</param>
2193 +<param name="role">
2194 +<summary>
2195 +Role allowed access
2196 +</summary>
2197 +</param>
2198 +</template>
2199 +<interface name="thunderbird_domtrans" lineno="67">
2200 <summary>
2201 Execute thunderbird in the thunderbird domain.
2202 </summary>
2203 @@ -7699,40 +7966,62 @@ Grant the thunderbird domains manage rights on all user content
2204 </module>
2205 <module name="tvtime" filename="policy/modules/apps/tvtime.if">
2206 <summary>High quality television application.</summary>
2207 -<interface name="tvtime_role" lineno="18">
2208 +<template name="tvtime_role" lineno="29">
2209 <summary>
2210 Role access for tvtime
2211 </summary>
2212 -<param name="role">
2213 +<param name="role_prefix">
2214 <summary>
2215 -Role allowed access
2216 +The prefix of the user role (e.g., user
2217 +is the prefix for user_r).
2218 </summary>
2219 </param>
2220 -<param name="domain">
2221 +<param name="user_domain">
2222 <summary>
2223 -User domain for the role
2224 +User domain for the role.
2225 </summary>
2226 </param>
2227 -</interface>
2228 +<param name="user_exec_domain">
2229 +<summary>
2230 +User exec domain for execute and transition access.
2231 +</summary>
2232 +</param>
2233 +<param name="role">
2234 +<summary>
2235 +Role allowed access
2236 +</summary>
2237 +</param>
2238 +</template>
2239 </module>
2240 <module name="uml" filename="policy/modules/apps/uml.if">
2241 <summary>User mode linux tools and services.</summary>
2242 -<interface name="uml_role" lineno="18">
2243 +<template name="uml_role" lineno="29">
2244 <summary>
2245 Role access for uml.
2246 </summary>
2247 -<param name="role">
2248 +<param name="role_prefix">
2249 <summary>
2250 -Role allowed access.
2251 +The prefix of the user role (e.g., user
2252 +is the prefix for user_r).
2253 </summary>
2254 </param>
2255 -<param name="domain">
2256 +<param name="user_domain">
2257 <summary>
2258 User domain for the role.
2259 </summary>
2260 </param>
2261 -</interface>
2262 -<interface name="uml_setattr_util_sockets" lineno="55">
2263 +<param name="user_exec_domain">
2264 +<summary>
2265 +User exec domain for execute and transition access.
2266 +</summary>
2267 +</param>
2268 +<param name="role">
2269 +<summary>
2270 +Role allowed access
2271 +</summary>
2272 +</param>
2273 +</template>
2274 +<interface name="uml_setattr_util_sockets" lineno="70">
2275 <summary>
2276 Set attributes of uml pid sock files.
2277 </summary>
2278 @@ -7742,7 +8031,7 @@ Domain allowed access.
2279 </summary>
2280 </param>
2281 </interface>
2282 -<interface name="uml_manage_util_files" lineno="74">
2283 +<interface name="uml_manage_util_files" lineno="89">
2284 <summary>
2285 Create, read, write, and delete
2286 uml pid files.
2287 @@ -7756,28 +8045,33 @@ Domain allowed access.
2288 </module>
2289 <module name="userhelper" filename="policy/modules/apps/userhelper.if">
2290 <summary>A wrapper that helps users run system programs.</summary>
2291 -<template name="userhelper_role_template" lineno="24">
2292 +<template name="userhelper_role_template" lineno="29">
2293 <summary>
2294 The role template for the userhelper module.
2295 </summary>
2296 -<param name="userrole_prefix">
2297 +<param name="role_prefix">
2298 <summary>
2299 The prefix of the user role (e.g., user
2300 is the prefix for user_r).
2301 </summary>
2302 </param>
2303 -<param name="user_role">
2304 +<param name="user_domain">
2305 <summary>
2306 -The user role.
2307 +User domain for the role.
2308 </summary>
2309 </param>
2310 -<param name="user_domain">
2311 +<param name="user_exec_domain">
2312 +<summary>
2313 +User exec domain for execute and transition access.
2314 +</summary>
2315 +</param>
2316 +<param name="role">
2317 <summary>
2318 -The user domain associated with the role.
2319 +Role allowed access
2320 </summary>
2321 </param>
2322 </template>
2323 -<interface name="userhelper_search_config" lineno="110">
2324 +<interface name="userhelper_search_config" lineno="123">
2325 <summary>
2326 Search userhelper configuration directories.
2327 </summary>
2328 @@ -7787,7 +8081,7 @@ Domain allowed access.
2329 </summary>
2330 </param>
2331 </interface>
2332 -<interface name="userhelper_dontaudit_search_config" lineno="129">
2333 +<interface name="userhelper_dontaudit_search_config" lineno="142">
2334 <summary>
2335 Do not audit attempts to search
2336 userhelper configuration directories.
2337 @@ -7798,7 +8092,7 @@ Domain to not audit.
2338 </summary>
2339 </param>
2340 </interface>
2341 -<interface name="userhelper_dbus_chat_all_consolehelper" lineno="148">
2342 +<interface name="userhelper_dbus_chat_all_consolehelper" lineno="161">
2343 <summary>
2344 Send and receive messages from
2345 consolehelper over dbus.
2346 @@ -7809,7 +8103,7 @@ Domain allowed access.
2347 </summary>
2348 </param>
2349 </interface>
2350 -<interface name="userhelper_use_fd" lineno="168">
2351 +<interface name="userhelper_use_fd" lineno="181">
2352 <summary>
2353 Use userhelper all userhelper file descriptors.
2354 </summary>
2355 @@ -7819,7 +8113,7 @@ Domain allowed access.
2356 </summary>
2357 </param>
2358 </interface>
2359 -<interface name="userhelper_sigchld" lineno="186">
2360 +<interface name="userhelper_sigchld" lineno="199">
2361 <summary>
2362 Send child terminated signals to all userhelper.
2363 </summary>
2364 @@ -7829,7 +8123,7 @@ Domain allowed access.
2365 </summary>
2366 </param>
2367 </interface>
2368 -<interface name="userhelper_exec" lineno="204">
2369 +<interface name="userhelper_exec" lineno="217">
2370 <summary>
2371 Execute the userhelper program in the caller domain.
2372 </summary>
2373 @@ -7839,7 +8133,7 @@ Domain allowed access.
2374 </summary>
2375 </param>
2376 </interface>
2377 -<interface name="userhelper_exec_consolehelper" lineno="224">
2378 +<interface name="userhelper_exec_consolehelper" lineno="237">
2379 <summary>
2380 Execute the consolehelper program
2381 in the caller domain.
2382 @@ -7915,22 +8209,33 @@ Role allowed to access.
2383 </module>
2384 <module name="vmware" filename="policy/modules/apps/vmware.if">
2385 <summary>VMWare Workstation virtual machines.</summary>
2386 -<interface name="vmware_role" lineno="18">
2387 +<template name="vmware_role" lineno="29">
2388 <summary>
2389 Role access for vmware.
2390 </summary>
2391 -<param name="role">
2392 +<param name="role_prefix">
2393 <summary>
2394 -Role allowed access.
2395 +The prefix of the user role (e.g., user
2396 +is the prefix for user_r).
2397 </summary>
2398 </param>
2399 -<param name="domain">
2400 +<param name="user_domain">
2401 <summary>
2402 User domain for the role.
2403 </summary>
2404 </param>
2405 -</interface>
2406 -<interface name="vmware_exec_host" lineno="50">
2407 +<param name="user_exec_domain">
2408 +<summary>
2409 +User exec domain for execute and transition access.
2410 +</summary>
2411 +</param>
2412 +<param name="role">
2413 +<summary>
2414 +Role allowed access
2415 +</summary>
2416 +</param>
2417 +</template>
2418 +<interface name="vmware_exec_host" lineno="65">
2419 <summary>
2420 Execute vmware host executables
2421 </summary>
2422 @@ -7940,7 +8245,7 @@ Domain allowed access.
2423 </summary>
2424 </param>
2425 </interface>
2426 -<interface name="vmware_read_system_config" lineno="69">
2427 +<interface name="vmware_read_system_config" lineno="84">
2428 <summary>
2429 Read vmware system configuration files.
2430 </summary>
2431 @@ -7950,7 +8255,7 @@ Domain allowed access.
2432 </summary>
2433 </param>
2434 </interface>
2435 -<interface name="vmware_append_system_config" lineno="88">
2436 +<interface name="vmware_append_system_config" lineno="103">
2437 <summary>
2438 Append vmware system configuration files.
2439 </summary>
2440 @@ -7960,7 +8265,7 @@ Domain allowed access.
2441 </summary>
2442 </param>
2443 </interface>
2444 -<interface name="vmware_append_log" lineno="107">
2445 +<interface name="vmware_append_log" lineno="122">
2446 <summary>
2447 Append vmware log files.
2448 </summary>
2449 @@ -8025,22 +8330,33 @@ be labeled public_content_rw_t.
2450 </module>
2451 <module name="wine" filename="policy/modules/apps/wine.if">
2452 <summary>Run Windows programs in Linux.</summary>
2453 -<interface name="wine_role" lineno="18">
2454 +<template name="wine_role" lineno="29">
2455 <summary>
2456 Role access for wine.
2457 </summary>
2458 -<param name="role">
2459 +<param name="role_prefix">
2460 <summary>
2461 -Role allowed access.
2462 +The prefix of the user role (e.g., user
2463 +is the prefix for user_r).
2464 </summary>
2465 </param>
2466 -<param name="domain">
2467 +<param name="user_domain">
2468 <summary>
2469 User domain for the role.
2470 </summary>
2471 </param>
2472 -</interface>
2473 -<template name="wine_role_template" lineno="73">
2474 +<param name="user_exec_domain">
2475 +<summary>
2476 +User exec domain for execute and transition access.
2477 +</summary>
2478 +</param>
2479 +<param name="role">
2480 +<summary>
2481 +Role allowed access
2482 +</summary>
2483 +</param>
2484 +</template>
2485 +<template name="wine_role_template" lineno="89">
2486 <summary>
2487 The role template for the wine module.
2488 </summary>
2489 @@ -8052,22 +8368,27 @@ for wine applications.
2490 </desc>
2491 <param name="role_prefix">
2492 <summary>
2493 -The prefix of the user domain (e.g., user
2494 -is the prefix for user_t).
2495 +The prefix of the user role (e.g., user
2496 +is the prefix for user_r).
2497 </summary>
2498 </param>
2499 -<param name="user_role">
2500 +<param name="user_domain">
2501 <summary>
2502 -The role associated with the user domain.
2503 +User domain for the role.
2504 </summary>
2505 </param>
2506 -<param name="user_domain">
2507 +<param name="user_exec_domain">
2508 <summary>
2509 -The type of the user domain.
2510 +User exec domain for execute and transition access.
2511 +</summary>
2512 +</param>
2513 +<param name="role">
2514 +<summary>
2515 +Role allowed access
2516 </summary>
2517 </param>
2518 </template>
2519 -<interface name="wine_domtrans" lineno="114">
2520 +<interface name="wine_domtrans" lineno="130">
2521 <summary>
2522 Execute the wine program in the wine domain.
2523 </summary>
2524 @@ -8077,7 +8398,7 @@ Domain allowed to transition.
2525 </summary>
2526 </param>
2527 </interface>
2528 -<interface name="wine_run" lineno="140">
2529 +<interface name="wine_run" lineno="156">
2530 <summary>
2531 Execute wine in the wine domain,
2532 and allow the specified role
2533 @@ -8094,7 +8415,7 @@ Role allowed access.
2534 </summary>
2535 </param>
2536 </interface>
2537 -<interface name="wine_rw_shm" lineno="160">
2538 +<interface name="wine_rw_shm" lineno="176">
2539 <summary>
2540 Read and write wine Shared
2541 memory segments.
2542 @@ -8117,22 +8438,33 @@ be silently blocked.
2543 </module>
2544 <module name="wireshark" filename="policy/modules/apps/wireshark.if">
2545 <summary>Wireshark packet capture tool.</summary>
2546 -<interface name="wireshark_role" lineno="18">
2547 +<template name="wireshark_role" lineno="29">
2548 <summary>
2549 Role access for wireshark.
2550 </summary>
2551<