<html> <head> <title> Security Enhanced Linux Reference Policy </title> <style type="text/css" media="all">@import "style.css";</style> </head> <body> <div id="Header">Security Enhanced Linux Reference Policy</div> <div id='Menu'> <a href="admin.html">+ admin</a></br/> <div id='subitem'> </div> <a href="apps.html">+ apps</a></br/> <div id='subitem'> </div> <a href="kernel.html">+ kernel</a></br/> <div id='subitem'> </div> <a href="services.html">+ services</a></br/> <div id='subitem'> </div> <a href="system.html">+ system</a></br/> <div id='subitem'> - <a href='system_authlogin.html'> authlogin</a><br/> - <a href='system_clock.html'> clock</a><br/> - <a href='system_fstools.html'> fstools</a><br/> - <a href='system_getty.html'> getty</a><br/> - <a href='system_hostname.html'> hostname</a><br/> - <a href='system_hotplug.html'> hotplug</a><br/> - <a href='system_init.html'> init</a><br/> - <a href='system_ipsec.html'> ipsec</a><br/> - <a href='system_iptables.html'> iptables</a><br/> - <a href='system_libraries.html'> libraries</a><br/> - <a href='system_locallogin.html'> locallogin</a><br/> - <a href='system_logging.html'> logging</a><br/> - <a href='system_lvm.html'> lvm</a><br/> - <a href='system_miscfiles.html'> miscfiles</a><br/> - <a href='system_modutils.html'> modutils</a><br/> - <a href='system_mount.html'> mount</a><br/> - <a href='system_pcmcia.html'> pcmcia</a><br/> - <a href='system_raid.html'> raid</a><br/> - <a href='system_selinuxutil.html'> selinuxutil</a><br/> - <a href='system_sysnetwork.html'> sysnetwork</a><br/> - <a href='system_udev.html'> udev</a><br/> - <a href='system_unconfined.html'> unconfined</a><br/> - <a href='system_userdomain.html'> userdomain</a><br/> </div> <br/><p/> <a href="global_booleans.html">* Global Booleans </a> <br/><p/> <a href="global_tunables.html">* Global Tunables </a> <p/><br/><p/> <a href="index.html">* Layer Index</a> <br/><p/> <a href="interfaces.html">* Interface Index</a> <br/><p/> <a href="templates.html">* Template Index</a> </div> <div id="Content"> <a name="top":></a> <h1>Layer: system</h1><p/> <h2>Module: unconfined</h2><p/> <a href=#interfaces>Interfaces</a> <a href=#templates>Templates</a> <h3>Description:</h3> <p><p>The unconfined domain.</p></p> <a name="interfaces"></a> <h3>Interfaces: </h3> <a name="link_unconfined_alias_domain"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_alias_domain</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Add an alias type to the unconfined domain. </p> <h5>Description</h5> <p> </p><p> Add an alias type to the unconfined domain. </p><p> </p><p> This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> New alias of the unconfined domain. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_dbus_send"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_dbus_send</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send messages to the unconfined domain over dbus. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_domtrans"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_domtrans</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Transition to the unconfined domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_dontaudit_read_pipe"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_dontaudit_read_pipe</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read unconfined domain unnamed pipes. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_dontaudit_rw_tcp_socket"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_dontaudit_rw_tcp_socket</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read or write unconfined domain tcp sockets. </p> <h5>Description</h5> <p> </p><p> Do not audit attempts to read or write unconfined domain tcp sockets. </p><p> </p><p> This interface was added due to a broken symptom in ldconfig. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain to not audit. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_read_pipe"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_read_pipe</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read unconfined domain unnamed pipes. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_run"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_run</b>( domain , role , terminal )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute specified programs in the unconfined domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> The type of the process performing this action. </td><td> No </td></tr> <tr><td> role </td><td> The role to allow the unconfined domain. </td><td> No </td></tr> <tr><td> terminal </td><td> The type of the terminal allow the unconfined domain to use. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_rw_pipe"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_rw_pipe</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read and write unconfined domain unnamed pipes. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_shell_domtrans"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_shell_domtrans</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Transition to the unconfined domain by executing a shell. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_sigchld"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_sigchld</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a SIGCHLD signal to the unconfined domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_signal"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_signal</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send generic signals to the unconfined domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a name="link_unconfined_use_fd"></a> <div id="interface"> <div id="codeblock"> <b>unconfined_use_fd</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Inherit file descriptors from the unconfined domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain allowed access. </td><td> No </td></tr> </table> </div> </div> <a href=#top>Return</a> <a name="templates"></a> <h3>Templates: </h3> <a name="link_unconfined_domain_template"></a> <div id="template"> <div id="codeblock"> <b>unconfined_domain_template</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> A template to make the specified domain unconfined. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> Domain to make unconfined. </td><td> No </td></tr> </table> </div> </div> <a href=#top>Return</a> </div> </body> </html>