<html> <head> <title> Security Enhanced Linux Reference Policy </title> <style type="text/css" media="all">@import "style.css";</style> </head> <body> <div id="Header">Security Enhanced Linux Reference Policy</div> <div id='Menu'> <a href="admin.html">+ admin</a></br/> <div id='subitem'> </div> <a href="apps.html">+ apps</a></br/> <div id='subitem'> </div> <a href="kernel.html">+ kernel</a></br/> <div id='subitem'> - <a href='kernel_corecommands.html'> corecommands</a><br/> - <a href='kernel_corenetwork.html'> corenetwork</a><br/> - <a href='kernel_devices.html'> devices</a><br/> - <a href='kernel_domain.html'> domain</a><br/> - <a href='kernel_files.html'> files</a><br/> - <a href='kernel_filesystem.html'> filesystem</a><br/> - <a href='kernel_kernel.html'> kernel</a><br/> - <a href='kernel_mcs.html'> mcs</a><br/> - <a href='kernel_mls.html'> mls</a><br/> - <a href='kernel_selinux.html'> selinux</a><br/> - <a href='kernel_storage.html'> storage</a><br/> - <a href='kernel_terminal.html'> terminal</a><br/> </div> <a href="services.html">+ services</a></br/> <div id='subitem'> </div> <a href="system.html">+ system</a></br/> <div id='subitem'> </div> <br/><p/> <a href="global_booleans.html">* Global Booleans </a> <br/><p/> <a href="global_tunables.html">* Global Tunables </a> <p/><br/><p/> <a href="index.html">* Layer Index</a> <br/><p/> <a href="interfaces.html">* Interface Index</a> <br/><p/> <a href="templates.html">* Template Index</a> </div> <div id="Content"> <a name="top":></a> <h1>Layer: kernel</h1><p/> <h2>Module: domain</h2><p/> <a href=#interfaces>Interfaces</a> <a href=#templates>Templates</a> <h3>Description:</h3> <p><p>Core policy for domains.</p></p> <p>This module is required to be included in all policies.</p> <a name="interfaces"></a> <h3>Interfaces: </h3> <a name="link_domain_base_type"></a> <div id="interface"> <div id="codeblock"> <b>domain_base_type</b>( type )<br> </div> <div id="description"> <h5>Summary</h5> <p> Make the specified type usable as a basic domain. </p> <h5>Description</h5> <p> </p><p> Make the specified type usable as a basic domain. </p><p> </p><p> This is primarily used for kernel threads; generally the domain_type() interface is more appropriate for userland processes. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> type </td><td> <p> Type to be used as a basic domain type. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_cron_exemption_source"></a> <div id="interface"> <div id="codeblock"> <b>domain_cron_exemption_source</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints. </p> <h5>Description</h5> <p> </p><p> Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints. </p><p> </p><p> This interface is needed to decouple the cron domains from the base module. It should not be used other than on cron domains. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain target for user exemption. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_cron_exemption_target"></a> <div id="interface"> <div id="codeblock"> <b>domain_cron_exemption_target</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints. </p> <h5>Description</h5> <p> </p><p> Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints. </p><p> </p><p> This interface is needed to decouple the cron domains from the base module. It should not be used other than on user cron jobs. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain target for user exemption. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_dgram_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_dgram_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the attributes of all domains unix datagram sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get the attributes of all domains of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_key_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_key_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get attribues of all domains IPSEC key management sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_packet_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_packet_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get attribues of all domains packet sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_pipes"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_pipes</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the attributes of all domains unnamed pipes. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_raw_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_raw_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get attribues of all domains raw sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the attributes of all domains sockets, for all socket types. </p> <h5>Description</h5> <p> </p><p> Do not audit attempts to get the attributes of all domains sockets, for all socket types. </p><p> </p><p> This interface was added for PCMCIA cardmgr and is probably excessive. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_stream_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_stream_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the attributes of all domains unix datagram sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_tcp_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_tcp_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the attributes of all domains TCP sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getattr_all_udp_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getattr_all_udp_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the attributes of all domains UDP sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_getsession_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_getsession_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to get the session ID of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_list_all_domains_state"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_list_all_domains_state</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read the process state directories of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_ptrace_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_ptrace_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to ptrace all domains. </p> <h5>Description</h5> <p> </p><p> Do not audit attempts to ptrace all domains. </p><p> </p><p> Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6). </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_ptrace_confined_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_ptrace_confined_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to ptrace confined domains. </p> <h5>Description</h5> <p> </p><p> Do not audit attempts to ptrace confined domains. </p><p> </p><p> Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6). </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_read_all_domains_state"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_read_all_domains_state</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read the process state (/proc/pid) of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_rw_all_key_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_rw_all_key_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read or write all domains key sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_rw_all_udp_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_rw_all_udp_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read or write all domains UDP sockets. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_search_all_domains_state"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_search_all_domains_state</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to search the process state directory (/proc/pid) of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dontaudit_use_interactive_fds"></a> <div id="interface"> <div id="codeblock"> <b>domain_dontaudit_use_interactive_fds</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_dyntrans_type"></a> <div id="interface"> <div id="codeblock"> <b>domain_dyntrans_type</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_entry_file"></a> <div id="interface"> <div id="codeblock"> <b>domain_entry_file</b>( domain , type )<br> </div> <div id="description"> <h5>Summary</h5> <p> Make the specified type usable as an entry point for the domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain to be entered. </p> </td><td> No </td></tr> <tr><td> type </td><td> <p> Type of program used for entering the domain. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_entry_file_spec_domtrans"></a> <div id="interface"> <div id="codeblock"> <b>domain_entry_file_spec_domtrans</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute an entry_type in the specified domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_exec_all_entry_files"></a> <div id="interface"> <div id="codeblock"> <b>domain_exec_all_entry_files</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_getattr_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_getattr_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get the attributes of all domains of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_getattr_all_entry_files"></a> <div id="interface"> <div id="codeblock"> <b>domain_getattr_all_entry_files</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get the attributes of entry point files for all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_getattr_all_sockets"></a> <div id="interface"> <div id="codeblock"> <b>domain_getattr_all_sockets</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get the attributes of all domains sockets, for all socket types. </p> <h5>Description</h5> <p> </p><p> Get the attributes of all domains sockets, for all socket types. </p><p> </p><p> This is commonly used for domains that can use lsof on all domains. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_getattr_confined_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_getattr_confined_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get the attributes of all confined domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_getsession_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_getsession_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get the session ID of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_interactive_fd"></a> <div id="interface"> <div id="codeblock"> <b>domain_interactive_fd</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_kill_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_kill_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a kill signal to all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_manage_all_entry_files"></a> <div id="interface"> <div id="codeblock"> <b>domain_manage_all_entry_files</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete all entrypoint files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_mmap_all_entry_files"></a> <div id="interface"> <div id="codeblock"> <b>domain_mmap_all_entry_files</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Mmap all entry point files as executable. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_obj_id_change_exemption"></a> <div id="interface"> <div id="codeblock"> <b>domain_obj_id_change_exemption</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Makes caller an exception to the constraint preventing changing the user identity in object contexts. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The process type to make an exception to the constraint. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_ptrace_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_ptrace_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Ptrace all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_read_all_domains_state"></a> <div id="interface"> <div id="codeblock"> <b>domain_read_all_domains_state</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the process state (/proc/pid) of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_read_all_entry_files"></a> <div id="interface"> <div id="codeblock"> <b>domain_read_all_entry_files</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_read_confined_domains_state"></a> <div id="interface"> <div id="codeblock"> <b>domain_read_confined_domains_state</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the process state (/proc/pid) of all confined domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_relabel_all_entry_files"></a> <div id="interface"> <div id="codeblock"> <b>domain_relabel_all_entry_files</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Relabel to and from all entry point file types. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_role_change_exemption"></a> <div id="interface"> <div id="codeblock"> <b>domain_role_change_exemption</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Makes caller an exception to the constraint preventing changing of role. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The process type to make an exception to the constraint. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_search_all_domains_state"></a> <div id="interface"> <div id="codeblock"> <b>domain_search_all_domains_state</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Search the process state directory (/proc/pid) of all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_setpriority_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_setpriority_all_domains</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_sigchld_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_sigchld_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a child terminated signal to all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_sigchld_interactive_fds"></a> <div id="interface"> <div id="codeblock"> <b>domain_sigchld_interactive_fds</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a SIGCHLD signal to domains whose file discriptors are widely inheritable. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_signal_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_signal_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send general signals to all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_signull_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_signull_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a null signal to all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_sigstop_all_domains"></a> <div id="interface"> <div id="codeblock"> <b>domain_sigstop_all_domains</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a stop signal to all domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_subj_id_change_exemption"></a> <div id="interface"> <div id="codeblock"> <b>domain_subj_id_change_exemption</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Makes caller an exception to the constraint preventing changing of user identity. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The process type to make an exception to the constraint. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_system_change_exemption"></a> <div id="interface"> <div id="codeblock"> <b>domain_system_change_exemption</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Makes caller and execption to the constraint preventing changing to the system user identity and system role. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_type"></a> <div id="interface"> <div id="codeblock"> <b>domain_type</b>( type )<br> </div> <div id="description"> <h5>Summary</h5> <p> Make the specified type usable as a domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> type </td><td> <p> Type to be used as a domain type. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_unconfined"></a> <div id="interface"> <div id="codeblock"> <b>domain_unconfined</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Unconfined access to domains. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> The type of the process performing this action. </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_use_interactive_fds"></a> <div id="interface"> <div id="codeblock"> <b>domain_use_interactive_fds</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_user_exemption_target"></a> <div id="interface"> <div id="codeblock"> <b>domain_user_exemption_target</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints. </p> <h5>Description</h5> <p> </p><p> Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints. </p><p> </p><p> This interface is needed to decouple the user domains from the base module. It should not be used other than on user domains. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> domain </td><td> <p> Domain target for user exemption. </p> </td><td> No </td></tr> </table> </div> </div> <a href=#top>Return</a> <a name="templates"></a> <h3>Templates: </h3> <a name="link_domain_auto_trans"></a> <div id="template"> <div id="codeblock"> <b>domain_auto_trans</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a name="link_domain_trans"></a> <div id="template"> <div id="codeblock"> <b>domain_trans</b>( ? )<br> </div> <div id="description"> <h5>Summary</h5> <p> Summary is missing! </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="80%"> <tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr> <tr><td> ? </td><td> <p> Parameter descriptions are missing! </p> </td><td> No </td></tr> </table> </div> </div> <a href=#top>Return</a> </div> </body> </html>