Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Found 83 semantic av rules:
- allow nsswitch_domain nmbd_var_run_t : sock_file { write getattr append open } ;
- allow nsswitch_domain sssd_var_lib_t : sock_file { write getattr append open } ;
- allow bacula_t var_lib_t : dir { ioctl read write getattr lock add_name remove_name search open } ;
- allow nsswitch_domain avahi_var_run_t : sock_file { write getattr append open } ;
- allow bacula_t tmp_t : dir { ioctl read write getattr lock add_name remove_name search open } ;
- allow bacula_t bacula_tmp_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ;
- allow daemon nscd_var_run_t : sock_file { write getattr append open } ;
- allow bacula_t bacula_log_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ;
- allow nsswitch_domain winbind_var_run_t : sock_file { write getattr append open } ;
- allow bacula_t var_run_t : dir { ioctl read write getattr lock add_name remove_name search open } ;
- allow daemon initrc_tmp_t : file { ioctl read write getattr lock append } ;
- allow domain puppet_tmp_t : file { ioctl read write getattr lock append } ;
- allow bacula_t mysqld_var_run_t : sock_file { write getattr append open } ;
- allow domain setrans_var_run_t : sock_file { write getattr append open } ;
- allow bacula_t bacula_store_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ;
- allow daemon abrt_var_run_t : sock_file { write getattr append open } ;
- allow bacula_t bacula_spool_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ;
- allow nsswitch_domain nslcd_var_run_t : sock_file { write getattr append open } ;
- allow daemon init_var_run_t : sock_file write ;
- allow syslog_client_type devlog_t : sock_file { write getattr append open } ;
- allow bacula_t bacula_var_run_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ;
- allow bacula_t avahi_var_run_t : sock_file { write getattr append open } ;
- allow daemon initrc_devpts_t : chr_file { ioctl read write getattr lock append open } ;
- allow bacula_t bacula_var_lib_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ;
- allow bacula_t slapd_var_run_t : sock_file { write getattr append open } ;
- allow daemon puppet_tmp_t : file { ioctl read write getattr lock append } ;
- allow nsswitch_domain lsassd_var_socket_t : sock_file { write getattr append open } ;
- allow bacula_t bacula_tmp_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ;
- allow domain afs_cache_t : file { read write } ;
- allow domain var_run_t : fifo_file write ;
- allow bacula_t var_log_t : dir { ioctl read write getattr lock add_name remove_name search open } ;
- allow bacula_t bacula_store_t : lnk_file { ioctl read write create getattr setattr lock append unlink link rename } ;
- allow bacula_t bacula_spool_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ;
- allow bacula_t postgresql_tmp_t : sock_file { write getattr append open } ;
- allow daemon user_cron_spool_t : file { ioctl read write getattr lock append } ;
- allow bacula_t bacula_store_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ;
- allow domain rpm_script_tmp_t : fifo_file { ioctl read write getattr lock append } ;
- allow bacula_t postgresql_var_run_t : sock_file { write getattr append open } ;
- allow bacula_t bacula_var_lib_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ;
- allow syslog_client_type syslogd_var_run_t : sock_file { write getattr append open } ;
- DT allow daemon root_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ daemons_dump_core ]
- DT allow daemon cluster_var_run_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ daemons_enable_cluster_mode ]
- DT allow userdom_home_manager_type nfs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_nfs_home_dirs ]
- DT allow userdom_home_manager_type nfs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_nfs_home_dirs ]
- DT allow userdom_home_manager_type nfs_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ; [ use_nfs_home_dirs ]
- DT allow userdom_home_manager_type fusefs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_fusefs_home_dirs ]
- DT allow userdom_home_manager_type fusefs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_fusefs_home_dirs ]
- DT allow userdom_home_manager_type fusefs_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ; [ use_fusefs_home_dirs ]
- DT allow daemon cluster_tmp_t : file { ioctl read write getattr lock append } ; [ daemons_enable_cluster_mode ]
- DT allow userdom_home_manager_type ecryptfs_t : lnk_file { ioctl read write create getattr setattr lock append unlink link rename } ; [ use_ecryptfs_home_dirs ]
- DT allow daemon root_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ daemons_dump_core ]
- DF allow nsswitch_domain nscd_var_run_t : sock_file { write getattr append open } ; [ nscd_use_shm ]
- DF allow nsswitch_domain nscd_var_run_t : sock_file { write getattr append open } ; [ nscd_use_shm ]
- ET allow nsswitch_domain nscd_var_run_t : sock_file { write getattr append open } ; [ nscd_use_shm ]
- ET allow nsswitch_domain nscd_var_run_t : sock_file { write getattr append open } ; [ nscd_use_shm ]
- DT allow daemon devpts_t : chr_file { ioctl read write getattr lock append open } ; [ daemons_use_tty ]
- DT allow userdom_home_manager_type ecryptfs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_ecryptfs_home_dirs ]
- DT allow userdom_home_manager_type ecryptfs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_ecryptfs_home_dirs ]
- DT allow userdom_home_manager_type ecryptfs_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ; [ use_ecryptfs_home_dirs ]
- DT allow userdom_home_manager_type ecryptfs_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ; [ use_ecryptfs_home_dirs ]
- DT allow userdom_home_manager_type ecryptfs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_ecryptfs_home_dirs ]
- DT allow nsswitch_domain slapd_var_run_t : sock_file { write getattr append open } ; [ authlogin_nsswitch_use_ldap ]
- DF allow bacula_t nscd_var_run_t : sock_file { write getattr append open } ; [ nscd_use_shm ]
- ET allow bacula_t nscd_var_run_t : sock_file { write getattr append open } ; [ nscd_use_shm ]
- DT allow daemon cluster_conf_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ daemons_enable_cluster_mode ]
- DT allow userdom_home_manager_type nfs_t : lnk_file { ioctl read write create getattr setattr lock append unlink link rename } ; [ use_nfs_home_dirs ]
- DT allow daemon cluster_var_run_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ daemons_enable_cluster_mode ]
- DT allow daemon cluster_var_lib_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ daemons_enable_cluster_mode ]
- DT allow userdom_home_manager_type cifs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_samba_home_dirs ]
- DT allow userdom_home_manager_type cifs_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ use_samba_home_dirs ]
- DT allow userdom_home_manager_type cifs_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ; [ use_samba_home_dirs ]
- DT allow userdom_home_manager_type cifs_t : lnk_file { ioctl read write create getattr setattr lock append unlink link rename } ; [ use_samba_home_dirs ]
- DT allow daemon cluster_var_lib_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ daemons_enable_cluster_mode ]
- DT allow userdom_home_manager_type ecryptfs_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ use_ecryptfs_home_dirs ]
- ET allow nsswitch_domain pcscd_var_run_t : sock_file { write getattr append open } ; [ kerberos_enabled ]
- DT allow userdom_home_manager_type cifs_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ use_samba_home_dirs ]
- DT allow userdom_home_manager_type fusefs_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ use_fusefs_home_dirs ]
- DT allow daemon cluster_conf_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ daemons_enable_cluster_mode ]
- DT allow daemon cluster_conf_t : dir { ioctl read write create getattr setattr lock unlink link rename add_name remove_name reparent search rmdir open } ; [ daemons_enable_cluster_mode ]
- DT allow daemon cluster_conf_t : dir { ioctl read write getattr lock add_name remove_name search open } ; [ daemons_enable_cluster_mode ]
- DT allow userdom_home_manager_type nfs_t : file { ioctl read write create getattr setattr lock append unlink link rename open } ; [ use_nfs_home_dirs ]
- DT allow userdom_home_manager_type fusefs_t : lnk_file { ioctl read write create getattr setattr lock append unlink link rename } ; [ use_fusefs_home_dirs ]
- DT allow nsswitch_domain dirsrv_var_run_t : sock_file { write getattr append open } ; [ authlogin_nsswitch_use_ldap ]
- Found 8 semantic te rules:
- type_transition bacula_t var_lib_t : dir bacula_var_lib_t;
- type_transition bacula_t tmp_t : file bacula_tmp_t;
- type_transition bacula_t tmp_t : dir bacula_tmp_t;
- type_transition bacula_t bacula_unconfined_script_exec_t : process bacula_unconfined_script_t;
- type_transition bacula_t var_run_t : file bacula_var_run_t;
- type_transition bacula_t var_log_t : dir bacula_log_t;
- type_transition bacula_t abrt_helper_exec_t : process abrt_helper_t;
- type_transition bacula_t var_log_t : file bacula_log_t;
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement