## Policy for terminals. ## ## Depended on by other required modules. ## ######################################## ## ## Transform specified type into a pty type. ## ## ## ## An object type that will applied to a pty. ## ## # interface(`term_pty',` gen_require(` attribute ptynode; type devpts_t; ') dev_node($1) allow $1 devpts_t:filesystem associate; typeattribute $1 ptynode; ') ######################################## ## ## Transform specified type into an user ## pty type. This allows it to be relabeled via ## type change by login programs such as ssh. ## ## ## ## The type of the user domain associated with ## this pty. ## ## ## ## ## An object type that will applied to a pty. ## ## # interface(`term_user_pty',` gen_require(` attribute server_ptynode; ') term_pty($2) type_change $1 server_ptynode:chr_file $2; ') ######################################## ## ## Transform specified type into a pty type ## used by login programs, such as sshd. ## ## ## ## An object type that will applied to a pty. ## ## # interface(`term_login_pty',` gen_require(` attribute server_ptynode; ') term_pty($1) typeattribute $1 server_ptynode; ') ######################################## ## ## Transform specified type into a tty type. ## ## ## ## An object type that will applied to a tty. ## ## # interface(`term_tty',` gen_require(` attribute ttynode, serial_device; type tty_device_t; ') typeattribute $1 ttynode, serial_device; dev_node($1) ') ######################################## ## ## Transform specified type into a user tty type. ## ## ## ## User domain that is related to this tty. ## ## ## ## ## An object type that will applied to a tty. ## ## # interface(`term_user_tty',` gen_require(` attribute ttynode; type console_device_t; type tty_device_t; ') term_tty($2) type_change $1 tty_device_t:chr_file $2; # Debian login is from shadow utils and does not allow resetting the perms. # have to fix this! ifdef(`distro_debian',` type_change $1 ttynode:chr_file $2; ') tunable_policy(`login_console_enabled',` # When user logs in from /dev/console, relabel it # to user tty type as well. type_change $1 console_device_t:chr_file $2; ') ') ######################################## ## ## Create the /dev/pts directory. ## ## ## ## Domain allowed access. ## ## # interface(`term_create_pty_dir',` gen_require(` type devpts_t; ') allow $1 devpts_t:dir create_dir_perms; dev_filetrans($1, devpts_t, dir, "devpts") ') ######################################## ## ## Create a pty in the /dev/pts directory. ## ## ## ## The type of the process creating the pty. ## ## ## ## ## The type of the pty. ## ## # interface(`term_create_pty',` gen_require(` type bsdpty_device_t, devpts_t, ptmx_t; ') dev_list_all_dev_nodes($1) allow $1 ptmx_t:chr_file rw_file_perms; allow $1 devpts_t:dir list_dir_perms; allow $1 devpts_t:filesystem getattr; dontaudit $1 bsdpty_device_t:chr_file { getattr read write }; type_transition $1 devpts_t:chr_file $2; ') ######################################## ## ## Write the console, all ## ttys and all ptys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_write_all_terms',` gen_require(` attribute ttynode, ptynode; type console_device_t, devpts_t, tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; allow $1 { console_device_t tty_device_t ttynode ptynode }:chr_file write_chr_file_perms; ') ######################################## ## ## Read and write the console, all ## ttys and all ptys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_terms',` gen_require(` attribute ttynode, ptynode; type console_device_t, devpts_t, tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; allow $1 { devpts_t console_device_t tty_device_t ttynode ptynode }:chr_file rw_chr_file_perms; ') ######################################## ## ## Read and write the inherited console, all inherited ## ttys and ptys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_inherited_terms',` gen_require(` attribute ttynode, ptynode; type console_device_t, devpts_t, tty_device_t; ') allow $1 { devpts_t console_device_t tty_device_t ttynode ptynode }:chr_file rw_inherited_term_perms; ') ######################################## ## ## Write to the console. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_write_console',` gen_require(` type console_device_t; ') dev_list_all_dev_nodes($1) allow $1 console_device_t:chr_file write_chr_file_perms; ') ######################################## ## ## Read from the console. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_read_console',` gen_require(` type console_device_t; ') dev_list_all_dev_nodes($1) allow $1 console_device_t:chr_file read_chr_file_perms; ') ######################################## ## ## Do not audit attempts to read from the console. ## ## ## ## Domain to not audit. ## ## ## # interface(`term_dontaudit_read_console',` gen_require(` type console_device_t; ') dontaudit $1 console_device_t:chr_file read_chr_file_perms; ') ######################################## ## ## Read from and write to the console. ## ## ## ## Domain allowed access. ## ## # interface(`term_use_console',` gen_require(` type console_device_t; ') dev_list_all_dev_nodes($1) allow $1 console_device_t:chr_file rw_chr_file_perms; ') ######################################## ## ## Do not audit attemtps to read from ## or write to the console. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_console',` gen_require(` type console_device_t; type tty_device_t; ') init_dontaudit_use_fds($1) dontaudit $1 console_device_t:chr_file rw_inherited_chr_file_perms; dontaudit $1 tty_device_t:chr_file rw_inherited_chr_file_perms; ') ######################################## ## ## Set the attributes of the console ## device node. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_setattr_console',` gen_require(` type console_device_t; ') dev_list_all_dev_nodes($1) allow $1 console_device_t:chr_file setattr; ') ######################################## ## ## Relabel from and to the console type. ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_console',` gen_require(` type console_device_t; ') dev_list_all_dev_nodes($1) allow $1 console_device_t:chr_file relabel_chr_file_perms; ') ######################################## ## ## Create the console device (/dev/console). ## ## ## ## Domain allowed access. ## ## # interface(`term_create_console_dev',` gen_require(` type console_device_t; ') dev_add_entry_generic_dirs($1) allow $1 console_device_t:chr_file create; allow $1 self:capability mknod; ') ######################################## ## ## Watch the console device (/dev/console). ## ## ## ## Domain allowed access. ## ## # interface(`term_watch_console_dev',` gen_require(` type console_device_t; ') allow $1 console_device_t:chr_file watch_chr_file_perms; ') ######################################## ## ## Watch_reads the console device (/dev/console). ## ## ## ## Domain allowed access. ## ## # interface(`term_watch_reads_console_dev',` gen_require(` type console_device_t; ') allow $1 console_device_t:chr_file watch_reads_chr_file_perms; ') ######################################## ## ## Get the attributes of a pty filesystem ## ## ## ## Domain allowed access. ## ## # interface(`term_getattr_pty_fs',` gen_require(` type devpts_t; ') allow $1 devpts_t:filesystem getattr; ') ######################################## ## ## Mount a pty filesystem ## ## ## ## Domain allowed access. ## ## # interface(`term_mount_pty_fs',` gen_require(` type devpts_t; ') allow $1 devpts_t:filesystem mount; ') ######################################## ## ## Unmount a pty filesystem ## ## ## ## Domain allowed access. ## ## # interface(`term_unmount_pty_fs',` gen_require(` type devpts_t; ') allow $1 devpts_t:filesystem unmount; ') ######################################## ## ## Relabel from and to pty filesystem. ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_pty_fs',` gen_require(` type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:filesystem { relabelto relabelfrom }; ') ######################################## ## ## Do not audit attempts to get the ## attributes of the /dev/pts directory. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_pty_dirs',` gen_require(` type devpts_t; ') dontaudit $1 devpts_t:dir getattr; ') ######################################## ## ## Search the contents of the /dev/pts directory. ## ## ## ## Domain allowed access. ## ## # interface(`term_search_ptys',` gen_require(` type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir search_dir_perms; ') ######################################## ## ## Do not audit attempts to search the ## contents of the /dev/pts directory. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_search_ptys',` gen_require(` type devpts_t; ') dev_dontaudit_list_all_dev_nodes($1) dontaudit $1 devpts_t:dir search_dir_perms; ') ######################################## ## ## Read the /dev/pts directory to ## list all ptys. ## ## ## ## Domain allowed access. ## ## # interface(`term_list_ptys',` gen_require(` type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; ') ######################################## ## ## Relabel the /dev/pts directory ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_ptys_dirs',` gen_require(` type devpts_t; ') allow $1 devpts_t:dir relabel_dir_perms; ') ######################################## ## ## Do not audit attempts to read the ## /dev/pts directory. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_list_ptys',` gen_require(` type devpts_t; ') dontaudit $1 devpts_t:dir { getattr search read }; ') ######################################## ## ## Do not audit attempts to create, read, ## write, or delete the /dev/pts directory. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_manage_pty_dirs',` gen_require(` type devpts_t; ') dontaudit $1 devpts_t:dir manage_dir_perms; ') ######################################## ## ## Get the attributes of generic pty devices. ## ## ## ## Domain to allow ## ## # interface(`term_getattr_generic_ptys',` gen_require(` type devpts_t; ') allow $1 devpts_t:chr_file getattr; ') ######################################## ## ## Do not audit attempts to get the attributes ## of generic pty devices. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_generic_ptys',` gen_require(` type devpts_t; ') dontaudit $1 devpts_t:chr_file getattr; ') ######################################## ## ## ioctl of generic pty devices. ## ## ## ## Domain allowed access. ## ## # # cjp: added for ppp interface(`term_ioctl_generic_ptys',` gen_require(` type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir search; allow $1 devpts_t:chr_file ioctl; ') ######################################## ## ## Allow setting the attributes of ## generic pty devices. ## ## ## ## Domain allowed access. ## ## # # dwalsh: added for rhgb interface(`term_setattr_generic_ptys',` gen_require(` type devpts_t; ') allow $1 devpts_t:chr_file setattr; ') ######################################## ## ## Dontaudit setting the attributes of ## generic pty devices. ## ## ## ## Domain to not audit. ## ## # # dwalsh: added for rhgb interface(`term_dontaudit_setattr_generic_ptys',` gen_require(` type devpts_t; ') dontaudit $1 devpts_t:chr_file setattr; ') ######################################## ## ## Read and write the generic pty ## type. This is generally only used in ## the targeted policy. ## ## ## ## Domain allowed access. ## ## # interface(`term_use_generic_ptys',` gen_require(` type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; allow $1 devpts_t:chr_file { rw_term_perms lock append }; ') ######################################## ## ## Do not audit attempts to read and ## write the generic pty type. This is ## generally only used in the targeted policy. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_generic_ptys',` gen_require(` type devpts_t; ') init_dontaudit_use_fds($1) dontaudit $1 devpts_t:chr_file { getattr read write ioctl }; ') ####################################### ## ## Set the attributes of the tty device ## ## ## ## Domain allowed access. ## ## # interface(`term_setattr_controlling_term',` gen_require(` type devtty_t; ') dev_list_all_dev_nodes($1) allow $1 devtty_t:chr_file setattr; ') ######################################## ## ## Read and write the controlling ## terminal (/dev/tty). ## ## ## ## Domain allowed access. ## ## # interface(`term_use_controlling_term',` gen_require(` type devtty_t; ') dev_list_all_dev_nodes($1) allow $1 devtty_t:chr_file { rw_term_perms lock append }; ') ####################################### ## ## Get the attributes of the pty multiplexor (/dev/ptmx). ## ## ## ## Domain to not audit. ## ## # interface(`term_getattr_ptmx',` gen_require(` type ptmx_t; ') allow $1 ptmx_t:chr_file getattr; ') ######################################## ## ## Do not audit attempts to get attributes ## on the pty multiplexor (/dev/ptmx). ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_ptmx',` gen_require(` type ptmx_t; ') dontaudit $1 ptmx_t:chr_file getattr; ') ######################################## ## ## Read and write the pty multiplexor (/dev/ptmx). ## ## ## ## Domain allowed access. ## ## # interface(`term_use_ptmx',` gen_require(` type ptmx_t; ') dev_list_all_dev_nodes($1) allow $1 ptmx_t:chr_file rw_file_perms; ') ######################################## ## ## Do not audit attempts to read and ## write the pty multiplexor (/dev/ptmx). ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_ptmx',` gen_require(` type ptmx_t; ') dontaudit $1 ptmx_t:chr_file { getattr read write ioctl }; ') ######################################## ## ## Get the attributes of all ## pty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_getattr_all_ptys',` gen_require(` attribute ptynode; type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; allow $1 ptynode:chr_file getattr; ') ######################################## ## ## Do not audit attempts to get the ## attributes of any pty ## device nodes. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_all_ptys',` gen_require(` attribute ptynode; ') dontaudit $1 ptynode:chr_file getattr; ') ######################################## ## ## Set the attributes of all ## pty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_setattr_all_ptys',` gen_require(` attribute ptynode; type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; allow $1 ptynode:chr_file setattr; ') ######################################## ## ## Relabel to all ptys. ## ## ## ## Domain allowed access. ## ## # interface(`term_relabelto_all_ptys',` gen_require(` attribute ptynode; ') allow $1 ptynode:chr_file relabelto; ') ######################################## ## ## Write to all ptys. ## ## ## ## Domain allowed access. ## ## # interface(`term_write_all_ptys',` gen_require(` attribute ptynode; ') dev_list_all_dev_nodes($1) allow $1 ptynode:chr_file write_chr_file_perms; ') ######################################## ## ## Read and write all ptys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_ptys',` gen_require(` attribute ptynode; type devpts_t; ') dev_list_all_dev_nodes($1) allow $1 devpts_t:dir list_dir_perms; allow $1 ptynode:chr_file { rw_term_perms lock append }; ') ######################################## ## ## Read and write all inherited ptys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_inherited_ptys',` gen_require(` attribute ptynode; type devpts_t; ') allow $1 ptynode:chr_file { rw_inherited_term_perms lock }; ') ######################################## ## ## Do not audit attempts to read or write any ptys. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_all_ptys',` gen_require(` attribute ptynode; ') dontaudit $1 ptynode:chr_file { rw_inherited_term_perms lock append }; ') ######################################## ## ## Relabel from and to all pty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_all_ptys',` gen_require(` attribute ptynode; type devpts_t; ') dev_list_all_dev_nodes($1) relabel_chr_files_pattern($1, devpts_t, { ptynode devpts_t } ) ') ######################################## ## ## Get the attributes of all user ## pty device nodes. (Deprecated) ## ## ## ## Domain allowed access. ## ## ## # interface(`term_getattr_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_getattr_all_ptys() instead.') term_getattr_all_ptys($1) ') ######################################## ## ## Do not audit attempts to get the ## attributes of any user pty ## device nodes. (Deprecated) ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_dontaudit_getattr_all_ptys() instead.') term_dontaudit_getattr_all_ptys($1) ') ######################################## ## ## Set the attributes of all user ## pty device nodes. (Deprecated) ## ## ## ## Domain allowed access. ## ## ## # interface(`term_setattr_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_setattr_all_ptys() instead.') term_setattr_all_ptys($1) ') ######################################## ## ## Relabel to all user ptys. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`term_relabelto_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_relabelto_all_ptys() instead.') term_relabelto_all_ptys($1) ') ######################################## ## ## Write to all user ptys. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`term_write_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_write_all_ptys() instead.') term_write_all_ptys($1) ') ######################################## ## ## Read and write all user ptys. (Deprecated) ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_use_all_ptys() instead.') term_use_all_ptys($1) ') ######################################## ## ## Do not audit attempts to read any ## user ptys. (Deprecated) ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_dontaudit_use_all_ptys() instead.') term_dontaudit_use_all_ptys($1) ') ######################################## ## ## Relabel from and to all user ## user pty device nodes. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_all_user_ptys',` refpolicywarn(`$0 has been deprecated, use term_relabel_all_ptys() instead.') term_relabel_all_ptys($1) ') ######################################## ## ## Get the attributes of all unallocated ## tty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_getattr_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file getattr; ') ######################################## ## ## Allow open access for all unallocated ## tty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_open_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file open; ') ######################################## ## ## Do not audit attempts to get the attributes ## of all unallocated tty device nodes. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_unallocated_ttys',` gen_require(` type tty_device_t; ') dontaudit $1 tty_device_t:chr_file getattr; ') ######################################## ## ## Set the attributes of all unallocated ## tty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_setattr_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file setattr; ') ######################################## ## ## Do not audit attempts to set the attributes ## of unallocated tty device nodes. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_setattr_unallocated_ttys',` gen_require(` type tty_device_t; ') dontaudit $1 tty_device_t:chr_file setattr; ') ######################################## ## ## Do not audit attempts to ioctl ## unallocated tty device nodes. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_ioctl_unallocated_ttys',` gen_require(` type tty_device_t; ') dontaudit $1 tty_device_t:chr_file ioctl; ') ######################################## ## ## Watch unallocated tty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_watch_unallocated_ttys',` gen_require(` type tty_device_t; ') allow $1 tty_device_t:chr_file watch_chr_file_perms; ') ######################################## ## ## Watch_reads unallocated tty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_watch_reads_unallocated_ttys',` gen_require(` type tty_device_t; ') allow $1 tty_device_t:chr_file watch_reads_chr_file_perms; ') ######################################## ## ## Relabel from and to the unallocated ## tty type. ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file relabel_chr_file_perms; ') ######################################## ## ## Mounton unallocated tty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_mounton_unallocated_ttys',` gen_require(` type tty_device_t; ') allow $1 tty_device_t:chr_file mounton; ') ######################################## ## ## Relabel from all user tty types to ## the unallocated tty type. ## ## ## ## Domain allowed access. ## ## # interface(`term_reset_tty_labels',` gen_require(` attribute ttynode; type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file relabelfrom; allow $1 tty_device_t:chr_file relabelto; ') ######################################## ## ## Append to unallocated ttys. ## ## ## ## Domain allowed access. ## ## # interface(`term_append_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file append_chr_file_perms; ') ######################################## ## ## Write to unallocated ttys. ## ## ## ## Domain allowed access. ## ## # interface(`term_write_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file write_chr_file_perms; ') ######################################## ## ## Read and write unallocated ttys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_unallocated_ttys',` gen_require(` type tty_device_t; ') dev_list_all_dev_nodes($1) allow $1 tty_device_t:chr_file rw_chr_file_perms; ') ######################################## ## ## Do not audit attempts to read or ## write unallocated ttys. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_unallocated_ttys',` gen_require(` type tty_device_t; ') init_dontaudit_use_fds($1) dontaudit $1 tty_device_t:chr_file rw_inherited_chr_file_perms; ') ######################################## ## ## Read and write USB tty character ## device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_use_usb_ttys',` gen_require(` type usbtty_device_t; ') dev_list_all_dev_nodes($1) allow $1 usbtty_device_t:chr_file rw_chr_file_perms; ') ####################################### ## ## Setattr on USB tty character ## device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_setattr_usb_ttys',` gen_require(` type usbtty_device_t; ') allow $1 usbtty_device_t:chr_file setattr; ') ######################################## ## ## Get the attributes of all tty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_getattr_all_ttys',` gen_require(` type tty_device_t; attribute ttynode; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file getattr; allow $1 tty_device_t:chr_file getattr; ') ######################################## ## ## Do not audit attempts to get the ## attributes of any tty device nodes. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_all_ttys',` gen_require(` attribute ttynode; type tty_device_t; ') dev_list_all_dev_nodes($1) dontaudit $1 ttynode:chr_file getattr; dontaudit $1 tty_device_t:chr_file getattr; ') ######################################## ## ## Set the attributes of all tty device nodes. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_setattr_all_ttys',` gen_require(` attribute ttynode; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file setattr; ') ######################################## ## ## Relabel from and to all tty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_all_ttys',` gen_require(` attribute ttynode; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file relabel_chr_file_perms; ') ######################################## ## ## Write to all ttys. ## ## ## ## Domain allowed access. ## ## # interface(`term_write_all_ttys',` gen_require(` attribute ttynode; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file write_chr_file_perms; ') ######################################## ## ## Read and write all ttys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_ttys',` gen_require(` attribute ttynode; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file rw_term_perms; ') ######################################## ## ## Read and write all inherited ttys. ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_inherited_ttys',` gen_require(` attribute ttynode; ') dev_list_all_dev_nodes($1) allow $1 ttynode:chr_file rw_inherited_term_perms; ') ######################################## ## ## Do not audit attempts to read or write ## any ttys. ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_all_ttys',` gen_require(` attribute ttynode; ') dontaudit $1 ttynode:chr_file rw_inherited_chr_file_perms; ') ######################################## ## ## Get the attributes of all user tty ## device nodes. (Deprecated) ## ## ## ## Domain allowed access. ## ## ## # interface(`term_getattr_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_getattr_all_ttys() instead.') term_getattr_all_ttys($1) ') ######################################## ## ## Do not audit attempts to get the ## attributes of any user tty ## device nodes. (Deprecated) ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_getattr_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_dontaudit_getattr_all_ttys() instead.') term_dontaudit_getattr_all_ttys($1) ') ######################################## ## ## Set the attributes of all user tty ## device nodes. (Deprecated) ## ## ## ## Domain allowed access. ## ## ## # interface(`term_setattr_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_setattr_all_ttys() instead.') term_setattr_all_ttys($1) ') ######################################## ## ## Relabel from and to all user ## user tty device nodes. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`term_relabel_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_relabel_all_ttys() instead.') term_relabel_all_ttys($1) ') ######################################## ## ## Write to all user ttys. (Deprecated) ## ## ## ## Domain allowed access. ## ## # interface(`term_write_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_write_all_ttys() instead.') term_write_all_ttys($1) ') ######################################## ## ## Read and write all user to all user ttys. (Deprecated) ## ## ## ## Domain allowed access. ## ## ## # interface(`term_use_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_use_all_ttys() instead.') term_use_all_ttys($1) ') ######################################## ## ## Do not audit attempts to read or write ## any user ttys. (Deprecated) ## ## ## ## Domain to not audit. ## ## # interface(`term_dontaudit_use_all_user_ttys',` refpolicywarn(`$0() is deprecated, use term_dontaudit_use_all_ttys() instead.') term_dontaudit_use_all_ttys($1) ') ######################################## ## ## Watch user tty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_watch_user_ttys',` gen_require(` type user_tty_device_t; ') allow $1 user_tty_device_t:chr_file watch_chr_file_perms; ') ######################################## ## ## Watch_reads user tty device nodes. ## ## ## ## Domain allowed access. ## ## # interface(`term_watch_reads_user_ttys',` gen_require(` type user_tty_device_t; ') allow $1 user_tty_device_t:chr_file watch_reads_chr_file_perms; ') #################################### ## ## Getattr on the virtio console. ## ## ## ## Domain allowed access. ## ## # interface(`term_getattr_virtio_console',` gen_require(` type virtio_device_t; ') allow $1 virtio_device_t:chr_file getattr_chr_file_perms; ') ##################################### ## ## Read from and write to the virtio console. ## ## ## ## Domain allowed access. ## ## # interface(`term_use_virtio_console',` gen_require(` type virtio_device_t; ') dev_list_all_dev_nodes($1) allow $1 virtio_device_t:chr_file rw_chr_file_perms; ') ######################################## ## ## Create all named term devices with the correct label ## ## ## ## Domain allowed access. ## ## # interface(`term_filetrans_all_named_dev',` gen_require(` type tty_device_t; type bsdpty_device_t; type console_device_t; type ptmx_t; type devtty_t; type virtio_device_t; type devpts_t; type usbtty_device_t; ') dev_filetrans($1, devtty_t, chr_file, "tty") dev_filetrans($1, tty_device_t, chr_file, "tty0") dev_filetrans($1, tty_device_t, chr_file, "tty1") dev_filetrans($1, tty_device_t, chr_file, "tty2") dev_filetrans($1, tty_device_t, chr_file, "tty3") dev_filetrans($1, tty_device_t, chr_file, "tty4") dev_filetrans($1, tty_device_t, chr_file, "tty5") dev_filetrans($1, tty_device_t, chr_file, "tty6") dev_filetrans($1, tty_device_t, chr_file, "tty7") dev_filetrans($1, tty_device_t, chr_file, "tty8") dev_filetrans($1, tty_device_t, chr_file, "tty9") dev_filetrans($1, tty_device_t, chr_file, "tty10") dev_filetrans($1, tty_device_t, chr_file, "tty11") dev_filetrans($1, tty_device_t, chr_file, "tty12") dev_filetrans($1, tty_device_t, chr_file, "tty13") dev_filetrans($1, tty_device_t, chr_file, "tty14") dev_filetrans($1, tty_device_t, chr_file, "tty15") dev_filetrans($1, tty_device_t, chr_file, "tty16") dev_filetrans($1, tty_device_t, chr_file, "tty17") dev_filetrans($1, tty_device_t, chr_file, "tty18") dev_filetrans($1, tty_device_t, chr_file, "tty19") dev_filetrans($1, tty_device_t, chr_file, "tty20") dev_filetrans($1, tty_device_t, chr_file, "tty21") dev_filetrans($1, tty_device_t, chr_file, "tty22") dev_filetrans($1, tty_device_t, chr_file, "tty23") dev_filetrans($1, tty_device_t, chr_file, "tty24") dev_filetrans($1, tty_device_t, chr_file, "tty25") dev_filetrans($1, tty_device_t, chr_file, "tty26") dev_filetrans($1, tty_device_t, chr_file, "tty27") dev_filetrans($1, tty_device_t, chr_file, "tty28") dev_filetrans($1, tty_device_t, chr_file, "tty29") dev_filetrans($1, tty_device_t, chr_file, "tty30") dev_filetrans($1, tty_device_t, chr_file, "tty31") dev_filetrans($1, tty_device_t, chr_file, "tty32") dev_filetrans($1, tty_device_t, chr_file, "tty33") dev_filetrans($1, tty_device_t, chr_file, "tty34") dev_filetrans($1, tty_device_t, chr_file, "tty35") dev_filetrans($1, tty_device_t, chr_file, "tty36") dev_filetrans($1, tty_device_t, chr_file, "tty37") dev_filetrans($1, tty_device_t, chr_file, "tty38") dev_filetrans($1, tty_device_t, chr_file, "tty39") dev_filetrans($1, tty_device_t, chr_file, "tty40") dev_filetrans($1, tty_device_t, chr_file, "tty41") dev_filetrans($1, tty_device_t, chr_file, "tty42") dev_filetrans($1, tty_device_t, chr_file, "tty43") dev_filetrans($1, tty_device_t, chr_file, "tty44") dev_filetrans($1, tty_device_t, chr_file, "tty45") dev_filetrans($1, tty_device_t, chr_file, "tty46") dev_filetrans($1, tty_device_t, chr_file, "tty47") dev_filetrans($1, tty_device_t, chr_file, "tty48") dev_filetrans($1, tty_device_t, chr_file, "tty49") dev_filetrans($1, tty_device_t, chr_file, "tty50") dev_filetrans($1, tty_device_t, chr_file, "tty51") dev_filetrans($1, tty_device_t, chr_file, "tty52") dev_filetrans($1, tty_device_t, chr_file, "tty53") dev_filetrans($1, tty_device_t, chr_file, "tty54") dev_filetrans($1, tty_device_t, chr_file, "tty55") dev_filetrans($1, tty_device_t, chr_file, "tty56") dev_filetrans($1, tty_device_t, chr_file, "tty57") dev_filetrans($1, tty_device_t, chr_file, "tty58") dev_filetrans($1, tty_device_t, chr_file, "tty59") dev_filetrans($1, tty_device_t, chr_file, "tty60") dev_filetrans($1, tty_device_t, chr_file, "tty61") dev_filetrans($1, tty_device_t, chr_file, "tty62") dev_filetrans($1, tty_device_t, chr_file, "tty63") dev_filetrans($1, tty_device_t, chr_file, "tty64") dev_filetrans($1, tty_device_t, chr_file, "tty65") dev_filetrans($1, tty_device_t, chr_file, "tty66") dev_filetrans($1, tty_device_t, chr_file, "tty67") dev_filetrans($1, tty_device_t, chr_file, "tty68") dev_filetrans($1, tty_device_t, chr_file, "tty69") dev_filetrans($1, tty_device_t, chr_file, "tty70") dev_filetrans($1, tty_device_t, chr_file, "tty71") dev_filetrans($1, tty_device_t, chr_file, "tty72") dev_filetrans($1, tty_device_t, chr_file, "tty73") dev_filetrans($1, tty_device_t, chr_file, "tty74") dev_filetrans($1, tty_device_t, chr_file, "tty75") dev_filetrans($1, tty_device_t, chr_file, "tty76") dev_filetrans($1, tty_device_t, chr_file, "tty77") dev_filetrans($1, tty_device_t, chr_file, "tty78") dev_filetrans($1, tty_device_t, chr_file, "tty79") dev_filetrans($1, tty_device_t, chr_file, "tty80") dev_filetrans($1, tty_device_t, chr_file, "tty81") dev_filetrans($1, tty_device_t, chr_file, "tty82") dev_filetrans($1, tty_device_t, chr_file, "tty83") dev_filetrans($1, tty_device_t, chr_file, "tty84") dev_filetrans($1, tty_device_t, chr_file, "tty85") dev_filetrans($1, tty_device_t, chr_file, "tty86") dev_filetrans($1, tty_device_t, chr_file, "tty87") dev_filetrans($1, tty_device_t, chr_file, "tty88") dev_filetrans($1, tty_device_t, chr_file, "tty89") dev_filetrans($1, tty_device_t, chr_file, "tty90") dev_filetrans($1, tty_device_t, chr_file, "tty91") dev_filetrans($1, tty_device_t, chr_file, "tty92") dev_filetrans($1, tty_device_t, chr_file, "tty93") dev_filetrans($1, tty_device_t, chr_file, "tty94") dev_filetrans($1, tty_device_t, chr_file, "tty95") dev_filetrans($1, tty_device_t, chr_file, "tty96") dev_filetrans($1, tty_device_t, chr_file, "tty97") dev_filetrans($1, tty_device_t, chr_file, "tty98") dev_filetrans($1, tty_device_t, chr_file, "tty99") dev_filetrans($1, tty_device_t, chr_file, "pty") dev_filetrans($1, tty_device_t, chr_file, "pty0") dev_filetrans($1, tty_device_t, chr_file, "pty1") dev_filetrans($1, tty_device_t, chr_file, "pty2") dev_filetrans($1, tty_device_t, chr_file, "pty3") dev_filetrans($1, tty_device_t, chr_file, "pty4") dev_filetrans($1, tty_device_t, chr_file, "pty5") dev_filetrans($1, tty_device_t, chr_file, "pty6") dev_filetrans($1, tty_device_t, chr_file, "pty7") dev_filetrans($1, tty_device_t, chr_file, "pty8") dev_filetrans($1, tty_device_t, chr_file, "pty9") dev_filetrans($1, tty_device_t, chr_file, "pty10") dev_filetrans($1, tty_device_t, chr_file, "pty11") dev_filetrans($1, tty_device_t, chr_file, "pty12") dev_filetrans($1, tty_device_t, chr_file, "pty13") dev_filetrans($1, tty_device_t, chr_file, "pty14") dev_filetrans($1, tty_device_t, chr_file, "pty15") dev_filetrans($1, tty_device_t, chr_file, "pty16") dev_filetrans($1, tty_device_t, chr_file, "pty17") dev_filetrans($1, tty_device_t, chr_file, "pty18") dev_filetrans($1, tty_device_t, chr_file, "pty19") dev_filetrans($1, tty_device_t, chr_file, "pty20") dev_filetrans($1, tty_device_t, chr_file, "pty21") dev_filetrans($1, tty_device_t, chr_file, "pty22") dev_filetrans($1, tty_device_t, chr_file, "pty23") dev_filetrans($1, tty_device_t, chr_file, "pty24") dev_filetrans($1, tty_device_t, chr_file, "pty25") dev_filetrans($1, tty_device_t, chr_file, "pty26") dev_filetrans($1, tty_device_t, chr_file, "pty27") dev_filetrans($1, tty_device_t, chr_file, "pty28") dev_filetrans($1, tty_device_t, chr_file, "pty29") dev_filetrans($1, tty_device_t, chr_file, "pty30") dev_filetrans($1, tty_device_t, chr_file, "pty31") dev_filetrans($1, tty_device_t, chr_file, "pty32") dev_filetrans($1, tty_device_t, chr_file, "pty33") dev_filetrans($1, tty_device_t, chr_file, "pty34") dev_filetrans($1, tty_device_t, chr_file, "pty35") dev_filetrans($1, tty_device_t, chr_file, "pty36") dev_filetrans($1, tty_device_t, chr_file, "pty37") dev_filetrans($1, tty_device_t, chr_file, "pty38") dev_filetrans($1, tty_device_t, chr_file, "pty39") dev_filetrans($1, tty_device_t, chr_file, "pty40") dev_filetrans($1, tty_device_t, chr_file, "pty41") dev_filetrans($1, tty_device_t, chr_file, "pty42") dev_filetrans($1, tty_device_t, chr_file, "pty43") dev_filetrans($1, tty_device_t, chr_file, "pty44") dev_filetrans($1, tty_device_t, chr_file, "pty45") dev_filetrans($1, tty_device_t, chr_file, "pty46") dev_filetrans($1, tty_device_t, chr_file, "pty47") dev_filetrans($1, tty_device_t, chr_file, "pty48") dev_filetrans($1, tty_device_t, chr_file, "pty49") dev_filetrans($1, tty_device_t, chr_file, "pty50") dev_filetrans($1, tty_device_t, chr_file, "pty51") dev_filetrans($1, tty_device_t, chr_file, "pty52") dev_filetrans($1, tty_device_t, chr_file, "pty53") dev_filetrans($1, tty_device_t, chr_file, "pty54") dev_filetrans($1, tty_device_t, chr_file, "pty55") dev_filetrans($1, tty_device_t, chr_file, "pty56") dev_filetrans($1, tty_device_t, chr_file, "pty57") dev_filetrans($1, tty_device_t, chr_file, "pty58") dev_filetrans($1, tty_device_t, chr_file, "pty59") dev_filetrans($1, tty_device_t, chr_file, "pty60") dev_filetrans($1, tty_device_t, chr_file, "pty61") dev_filetrans($1, tty_device_t, chr_file, "pty62") dev_filetrans($1, tty_device_t, chr_file, "pty63") dev_filetrans($1, tty_device_t, chr_file, "pty64") dev_filetrans($1, tty_device_t, chr_file, "pty65") dev_filetrans($1, tty_device_t, chr_file, "pty66") dev_filetrans($1, tty_device_t, chr_file, "pty67") dev_filetrans($1, tty_device_t, chr_file, "pty68") dev_filetrans($1, tty_device_t, chr_file, "pty69") dev_filetrans($1, tty_device_t, chr_file, "pty70") dev_filetrans($1, tty_device_t, chr_file, "pty71") dev_filetrans($1, tty_device_t, chr_file, "pty72") dev_filetrans($1, tty_device_t, chr_file, "pty73") dev_filetrans($1, tty_device_t, chr_file, "pty74") dev_filetrans($1, tty_device_t, chr_file, "pty75") dev_filetrans($1, tty_device_t, chr_file, "pty76") dev_filetrans($1, tty_device_t, chr_file, "pty77") dev_filetrans($1, tty_device_t, chr_file, "pty78") dev_filetrans($1, tty_device_t, chr_file, "pty79") dev_filetrans($1, tty_device_t, chr_file, "pty80") dev_filetrans($1, tty_device_t, chr_file, "pty81") dev_filetrans($1, tty_device_t, chr_file, "pty82") dev_filetrans($1, tty_device_t, chr_file, "pty83") dev_filetrans($1, tty_device_t, chr_file, "pty84") dev_filetrans($1, tty_device_t, chr_file, "pty85") dev_filetrans($1, tty_device_t, chr_file, "pty86") dev_filetrans($1, tty_device_t, chr_file, "pty87") dev_filetrans($1, tty_device_t, chr_file, "pty88") dev_filetrans($1, tty_device_t, chr_file, "pty89") dev_filetrans($1, tty_device_t, chr_file, "pty90") dev_filetrans($1, tty_device_t, chr_file, "pty91") dev_filetrans($1, tty_device_t, chr_file, "pty92") dev_filetrans($1, tty_device_t, chr_file, "pty93") dev_filetrans($1, tty_device_t, chr_file, "pty94") dev_filetrans($1, tty_device_t, chr_file, "pty95") dev_filetrans($1, tty_device_t, chr_file, "pty96") dev_filetrans($1, tty_device_t, chr_file, "pty97") dev_filetrans($1, tty_device_t, chr_file, "pty98") dev_filetrans($1, tty_device_t, chr_file, "pty99") dev_filetrans($1, tty_device_t, chr_file, "adb0") dev_filetrans($1, tty_device_t, chr_file, "adb1") dev_filetrans($1, tty_device_t, chr_file, "adb2") dev_filetrans($1, tty_device_t, chr_file, "adb3") dev_filetrans($1, tty_device_t, chr_file, "adb4") dev_filetrans($1, tty_device_t, chr_file, "adb5") dev_filetrans($1, tty_device_t, chr_file, "adb6") dev_filetrans($1, tty_device_t, chr_file, "adb7") dev_filetrans($1, tty_device_t, chr_file, "adb8") dev_filetrans($1, tty_device_t, chr_file, "adb9") dev_filetrans($1, tty_device_t, chr_file, "capi0") dev_filetrans($1, tty_device_t, chr_file, "capi1") dev_filetrans($1, tty_device_t, chr_file, "capi2") dev_filetrans($1, tty_device_t, chr_file, "capi3") dev_filetrans($1, tty_device_t, chr_file, "capi4") dev_filetrans($1, tty_device_t, chr_file, "capi5") dev_filetrans($1, tty_device_t, chr_file, "capi6") dev_filetrans($1, tty_device_t, chr_file, "capi7") dev_filetrans($1, tty_device_t, chr_file, "capi8") dev_filetrans($1, tty_device_t, chr_file, "capi9") dev_filetrans($1, console_device_t, chr_file, "console") dev_filetrans($1, tty_device_t, chr_file, "cu0") dev_filetrans($1, tty_device_t, chr_file, "cu1") dev_filetrans($1, tty_device_t, chr_file, "cu2") dev_filetrans($1, tty_device_t, chr_file, "cu3") dev_filetrans($1, tty_device_t, chr_file, "cu4") dev_filetrans($1, tty_device_t, chr_file, "cu5") dev_filetrans($1, tty_device_t, chr_file, "cu6") dev_filetrans($1, tty_device_t, chr_file, "cu7") dev_filetrans($1, tty_device_t, chr_file, "cu8") dev_filetrans($1, tty_device_t, chr_file, "cu9") dev_filetrans($1, tty_device_t, chr_file, "dcbri0") dev_filetrans($1, tty_device_t, chr_file, "dcbri1") dev_filetrans($1, tty_device_t, chr_file, "dcbri2") dev_filetrans($1, tty_device_t, chr_file, "dcbri3") dev_filetrans($1, tty_device_t, chr_file, "dcbri4") dev_filetrans($1, tty_device_t, chr_file, "dcbri5") dev_filetrans($1, tty_device_t, chr_file, "dcbri6") dev_filetrans($1, tty_device_t, chr_file, "dcbri7") dev_filetrans($1, tty_device_t, chr_file, "dcbri8") dev_filetrans($1, tty_device_t, chr_file, "dcbri9") dev_filetrans($1, tty_device_t, chr_file, "vcsa") dev_filetrans($1, tty_device_t, chr_file, "vcsb") dev_filetrans($1, tty_device_t, chr_file, "vcsc") dev_filetrans($1, tty_device_t, chr_file, "vcsd") dev_filetrans($1, tty_device_t, chr_file, "vcse") dev_filetrans($1, tty_device_t, chr_file, "hvc0") dev_filetrans($1, tty_device_t, chr_file, "hvc1") dev_filetrans($1, tty_device_t, chr_file, "hvc2") dev_filetrans($1, tty_device_t, chr_file, "hvc3") dev_filetrans($1, tty_device_t, chr_file, "hvc4") dev_filetrans($1, tty_device_t, chr_file, "hvc5") dev_filetrans($1, tty_device_t, chr_file, "hvc6") dev_filetrans($1, tty_device_t, chr_file, "hvc7") dev_filetrans($1, tty_device_t, chr_file, "hvc8") dev_filetrans($1, tty_device_t, chr_file, "hvc9") dev_filetrans($1, tty_device_t, chr_file, "hvsi0") dev_filetrans($1, tty_device_t, chr_file, "hvsi1") dev_filetrans($1, tty_device_t, chr_file, "hvsi2") dev_filetrans($1, tty_device_t, chr_file, "hvsi3") dev_filetrans($1, tty_device_t, chr_file, "hvsi4") dev_filetrans($1, tty_device_t, chr_file, "hvsi5") dev_filetrans($1, tty_device_t, chr_file, "hvsi6") dev_filetrans($1, tty_device_t, chr_file, "hvsi7") dev_filetrans($1, tty_device_t, chr_file, "hvsi8") dev_filetrans($1, tty_device_t, chr_file, "hvsi9") dev_filetrans($1, tty_device_t, chr_file, "ircomm0") dev_filetrans($1, tty_device_t, chr_file, "ircomm1") dev_filetrans($1, tty_device_t, chr_file, "ircomm2") dev_filetrans($1, tty_device_t, chr_file, "ircomm3") dev_filetrans($1, tty_device_t, chr_file, "ircomm4") dev_filetrans($1, tty_device_t, chr_file, "ircomm5") dev_filetrans($1, tty_device_t, chr_file, "ircomm6") dev_filetrans($1, tty_device_t, chr_file, "ircomm7") dev_filetrans($1, tty_device_t, chr_file, "ircomm8") dev_filetrans($1, tty_device_t, chr_file, "ircomm9") dev_filetrans($1, tty_device_t, chr_file, "isdn0") dev_filetrans($1, tty_device_t, chr_file, "isdn1") dev_filetrans($1, tty_device_t, chr_file, "isdn2") dev_filetrans($1, tty_device_t, chr_file, "isdn3") dev_filetrans($1, tty_device_t, chr_file, "isdn4") dev_filetrans($1, tty_device_t, chr_file, "isdn5") dev_filetrans($1, tty_device_t, chr_file, "isdn6") dev_filetrans($1, tty_device_t, chr_file, "isdn7") dev_filetrans($1, tty_device_t, chr_file, "isdn8") dev_filetrans($1, tty_device_t, chr_file, "isdn9") filetrans_pattern($1, devpts_t, ptmx_t, chr_file, "ptmx") dev_filetrans($1, ptmx_t, chr_file, "ptmx") dev_filetrans($1, tty_device_t, chr_file, "rfcomm0") dev_filetrans($1, tty_device_t, chr_file, "rfcomm1") dev_filetrans($1, tty_device_t, chr_file, "rfcomm2") dev_filetrans($1, tty_device_t, chr_file, "rfcomm3") dev_filetrans($1, tty_device_t, chr_file, "rfcomm4") dev_filetrans($1, tty_device_t, chr_file, "rfcomm5") dev_filetrans($1, tty_device_t, chr_file, "rfcomm6") dev_filetrans($1, tty_device_t, chr_file, "rfcomm7") dev_filetrans($1, tty_device_t, chr_file, "rfcomm8") dev_filetrans($1, tty_device_t, chr_file, "rfcomm9") dev_filetrans($1, tty_device_t, chr_file, "slamr0") dev_filetrans($1, tty_device_t, chr_file, "slamr1") dev_filetrans($1, tty_device_t, chr_file, "slamr2") dev_filetrans($1, tty_device_t, chr_file, "slamr3") dev_filetrans($1, tty_device_t, chr_file, "slamr4") dev_filetrans($1, tty_device_t, chr_file, "slamr5") dev_filetrans($1, tty_device_t, chr_file, "slamr6") dev_filetrans($1, tty_device_t, chr_file, "slamr7") dev_filetrans($1, tty_device_t, chr_file, "slamr8") dev_filetrans($1, tty_device_t, chr_file, "slamr9") dev_filetrans($1, tty_device_t, chr_file, "ttyACM0") dev_filetrans($1, tty_device_t, chr_file, "ttyACM1") dev_filetrans($1, tty_device_t, chr_file, "ttyACM2") dev_filetrans($1, tty_device_t, chr_file, "ttyACM3") dev_filetrans($1, tty_device_t, chr_file, "ttyACM4") dev_filetrans($1, tty_device_t, chr_file, "ttyACM5") dev_filetrans($1, tty_device_t, chr_file, "ttyACM6") dev_filetrans($1, tty_device_t, chr_file, "ttyACM7") dev_filetrans($1, tty_device_t, chr_file, "ttyACM8") dev_filetrans($1, tty_device_t, chr_file, "ttyACM9") dev_filetrans($1, tty_device_t, chr_file, "ttyS0") dev_filetrans($1, tty_device_t, chr_file, "ttyS1") dev_filetrans($1, tty_device_t, chr_file, "ttyS2") dev_filetrans($1, tty_device_t, chr_file, "ttyS3") dev_filetrans($1, tty_device_t, chr_file, "ttyS4") dev_filetrans($1, tty_device_t, chr_file, "ttyS5") dev_filetrans($1, tty_device_t, chr_file, "ttyS6") dev_filetrans($1, tty_device_t, chr_file, "ttyS7") dev_filetrans($1, tty_device_t, chr_file, "ttyS8") dev_filetrans($1, tty_device_t, chr_file, "ttyS9") dev_filetrans($1, tty_device_t, chr_file, "ttySG0") dev_filetrans($1, tty_device_t, chr_file, "ttySG1") dev_filetrans($1, tty_device_t, chr_file, "ttySG2") dev_filetrans($1, tty_device_t, chr_file, "ttySG3") dev_filetrans($1, tty_device_t, chr_file, "ttySG4") dev_filetrans($1, tty_device_t, chr_file, "ttySG5") dev_filetrans($1, tty_device_t, chr_file, "ttySG6") dev_filetrans($1, tty_device_t, chr_file, "ttySG7") dev_filetrans($1, tty_device_t, chr_file, "ttySG8") dev_filetrans($1, tty_device_t, chr_file, "ttySG9") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB0") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB1") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB2") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB3") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB4") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB5") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB6") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB7") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB8") dev_filetrans($1, usbtty_device_t, chr_file, "ttyUSB9") dev_filetrans($1, virtio_device_t, chr_file, "vport0p0") dev_filetrans($1, virtio_device_t, chr_file, "vport0p1") dev_filetrans($1, virtio_device_t, chr_file, "vport0p2") dev_filetrans($1, virtio_device_t, chr_file, "vport0p3") dev_filetrans($1, virtio_device_t, chr_file, "vport0p4") dev_filetrans($1, virtio_device_t, chr_file, "vport0p5") dev_filetrans($1, virtio_device_t, chr_file, "vport0p6") dev_filetrans($1, virtio_device_t, chr_file, "vport0p7") dev_filetrans($1, virtio_device_t, chr_file, "vport0p8") dev_filetrans($1, virtio_device_t, chr_file, "vport0p9") dev_filetrans($1, devpts_t, dir, "pts") dev_filetrans($1, tty_device_t, chr_file, "xvc0") dev_filetrans($1, tty_device_t, chr_file, "xvc1") dev_filetrans($1, tty_device_t, chr_file, "xvc2") dev_filetrans($1, tty_device_t, chr_file, "xvc3") dev_filetrans($1, tty_device_t, chr_file, "xvc4") dev_filetrans($1, tty_device_t, chr_file, "xvc5") dev_filetrans($1, tty_device_t, chr_file, "xvc6") dev_filetrans($1, tty_device_t, chr_file, "xvc7") dev_filetrans($1, tty_device_t, chr_file, "xvc8") dev_filetrans($1, tty_device_t, chr_file, "xvc9") ')