selinux-policy/www/api-docs/system_domain.html
2005-10-19 21:12:22 +00:00

2338 lines
31 KiB
HTML

<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+&nbsp;
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_authlogin.html'>
authlogin</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_clock.html'>
clock</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_corecommands.html'>
corecommands</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_domain.html'>
domain</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_files.html'>
files</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_fstools.html'>
fstools</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_getty.html'>
getty</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hostname.html'>
hostname</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hotplug.html'>
hotplug</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_init.html'>
init</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_ipsec.html'>
ipsec</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_iptables.html'>
iptables</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_libraries.html'>
libraries</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_locallogin.html'>
locallogin</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_logging.html'>
logging</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_lvm.html'>
lvm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_miscfiles.html'>
miscfiles</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_modutils.html'>
modutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_mount.html'>
mount</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_pcmcia.html'>
pcmcia</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_raid.html'>
raid</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_selinuxutil.html'>
selinuxutil</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_sysnetwork.html'>
sysnetwork</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_udev.html'>
udev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_unconfined.html'>
unconfined</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_userdomain.html'>
userdomain</a><br/>
</div>
<br/><p/>
<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
<br/><p/>
<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
<p/><br/><p/>
<a href="index.html">*&nbsp;Layer Index</a>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
<br/><p/>
<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: system</h1><p/>
<h2>Module: domain</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>Core policy for domains.</p></p>
<p>This module is required to be included in all policies.</p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_domain_base_type"></a>
<div id="interface">
<div id="codeblock">
<b>domain_base_type</b>(
type
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Make the specified type usable as a basic domain.
</p>
<h5>Description</h5>
<p>
</p><p>
Make the specified type usable as a basic domain.
</p><p>
</p><p>
This is primarily used for kernel threads;
generally the domain_type() interface is
more appropriate for userland processes.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
type
</td><td>
Type to be used as a basic domain type.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_cron_exemption_source"></a>
<div id="interface">
<div id="codeblock">
<b>domain_cron_exemption_source</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
</p>
<h5>Description</h5>
<p>
</p><p>
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
</p><p>
</p><p>
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
cron domains.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain target for user exemption.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_cron_exemption_target"></a>
<div id="interface">
<div id="codeblock">
<b>domain_cron_exemption_target</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
</p>
<h5>Description</h5>
<p>
</p><p>
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
</p><p>
</p><p>
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
user cron jobs.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain target for user exemption.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getattr_all_key_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getattr_all_key_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get attribues of
all domains IPSEC key management sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getattr_all_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getattr_all_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
</p>
<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
</p><p>
</p><p>
This interface was added for PCMCIA cardmgr
and is probably excessive.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain to not audit.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getattr_all_tcp_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getattr_all_tcp_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes
of all domains TCP sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getattr_all_udp_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getattr_all_udp_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes
of all domains UDP sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getattr_all_unix_dgram_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getattr_all_unix_dgram_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getattr_all_unnamed_pipes"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getattr_all_unnamed_pipes</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes
of all domains unnamed pipes.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_getsession_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_getsession_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to get the
session ID of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_list_all_domains_proc"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_list_all_domains_proc</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read the process state
directories of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_ptrace_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_ptrace_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to ptrace all domains.
</p>
<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to ptrace all domains.
</p><p>
</p><p>
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_ptrace_confined_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_ptrace_confined_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to ptrace confined domains.
</p>
<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to ptrace confined domains.
</p><p>
</p><p>
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_read_all_domains_state"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_read_all_domains_state</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read the process
state (/proc/pid) of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_rw_all_key_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_rw_all_key_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read or write
all domains key sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_rw_all_udp_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_rw_all_udp_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read or write
all domains UDP sockets.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dontaudit_use_wide_inherit_fd"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dontaudit_use_wide_inherit_fd</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_dyntrans_type"></a>
<div id="interface">
<div id="codeblock">
<b>domain_dyntrans_type</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_entry_file"></a>
<div id="interface">
<div id="codeblock">
<b>domain_entry_file</b>(
domain
,
type
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Make the specified type usable as
an entry point for the domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain to be entered.
</td><td>
No
</td></tr>
<tr><td>
type
</td><td>
Type of program used for entering
the domain.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_exec_all_entry_files"></a>
<div id="interface">
<div id="codeblock">
<b>domain_exec_all_entry_files</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_getattr_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_getattr_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get the attributes of all domains of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_getattr_all_entry_files"></a>
<div id="interface">
<div id="codeblock">
<b>domain_getattr_all_entry_files</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get the attributes of entry point
files for all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_getattr_all_sockets"></a>
<div id="interface">
<div id="codeblock">
<b>domain_getattr_all_sockets</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get the attributes of all domains
sockets, for all socket types.
</p>
<h5>Description</h5>
<p>
</p><p>
Get the attributes of all domains
sockets, for all socket types.
</p><p>
</p><p>
This is commonly used for domains
that can use lsof on all domains.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_getattr_confined_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_getattr_confined_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get the attributes of all confined domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_getsession_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_getsession_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get the session ID of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_kill_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_kill_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a kill signal to all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_obj_id_change_exempt"></a>
<div id="interface">
<div id="codeblock">
<b>domain_obj_id_change_exempt</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Makes caller an exception to the constraint preventing
changing the user identity in object contexts.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The process type to make an exception to the constraint.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_ptrace_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_ptrace_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Ptrace all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_read_all_domains_state"></a>
<div id="interface">
<div id="codeblock">
<b>domain_read_all_domains_state</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the process state (/proc/pid) of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_read_all_entry_files"></a>
<div id="interface">
<div id="codeblock">
<b>domain_read_all_entry_files</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_read_confined_domains_state"></a>
<div id="interface">
<div id="codeblock">
<b>domain_read_confined_domains_state</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the process state (/proc/pid) of all confined domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_role_change_exempt"></a>
<div id="interface">
<div id="codeblock">
<b>domain_role_change_exempt</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Makes caller an exception to the constraint preventing
changing of role.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The process type to make an exception to the constraint.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_search_all_domains_state"></a>
<div id="interface">
<div id="codeblock">
<b>domain_search_all_domains_state</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Search the process state directory (/proc/pid) of all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_setpriority_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_setpriority_all_domains</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_sigchld_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_sigchld_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a child terminated signal to all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_sigchld_wide_inherit_fd"></a>
<div id="interface">
<div id="codeblock">
<b>domain_sigchld_wide_inherit_fd</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a SIGCHLD signal to domains whose file
discriptors are widely inheritable.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_signal_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_signal_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send general signals to all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_signull_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_signull_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a null signal to all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_sigstop_all_domains"></a>
<div id="interface">
<div id="codeblock">
<b>domain_sigstop_all_domains</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a stop signal to all domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_subj_id_change_exempt"></a>
<div id="interface">
<div id="codeblock">
<b>domain_subj_id_change_exempt</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Makes caller an exception to the constraint preventing
changing of user identity.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The process type to make an exception to the constraint.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_system_change_exempt"></a>
<div id="interface">
<div id="codeblock">
<b>domain_system_change_exempt</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Makes caller and execption to the constraint
preventing changing to the system user
identity and system role.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_type"></a>
<div id="interface">
<div id="codeblock">
<b>domain_type</b>(
type
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Make the specified type usable as a domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
type
</td><td>
Type to be used as a domain type.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_unconfined"></a>
<div id="interface">
<div id="codeblock">
<b>domain_unconfined</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Unconfined access to domains.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_use_wide_inherit_fd"></a>
<div id="interface">
<div id="codeblock">
<b>domain_use_wide_inherit_fd</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_user_exemption_target"></a>
<div id="interface">
<div id="codeblock">
<b>domain_user_exemption_target</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
</p>
<h5>Description</h5>
<p>
</p><p>
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
</p><p>
</p><p>
This interface is needed to decouple
the user domains from the base module.
It should not be used other than on
user domains.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain target for user exemption.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_wide_inherit_fd"></a>
<div id="interface">
<div id="codeblock">
<b>domain_wide_inherit_fd</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_domain_auto_trans"></a>
<div id="template">
<div id="codeblock">
<b>domain_auto_trans</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_domain_trans"></a>
<div id="template">
<div id="codeblock">
<b>domain_trans</b>(
?
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Summary is missing!
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
?
</td><td>
Parameter descriptions are missing!
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>