<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+
apps</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+
system</a></br/>
<div id='subitem'>
- <a href='system_authlogin.html'>
authlogin</a><br/>
- <a href='system_clock.html'>
clock</a><br/>
- <a href='system_fstools.html'>
fstools</a><br/>
- <a href='system_getty.html'>
getty</a><br/>
- <a href='system_hostname.html'>
hostname</a><br/>
- <a href='system_hotplug.html'>
hotplug</a><br/>
- <a href='system_init.html'>
init</a><br/>
- <a href='system_ipsec.html'>
ipsec</a><br/>
- <a href='system_iptables.html'>
iptables</a><br/>
- <a href='system_libraries.html'>
libraries</a><br/>
- <a href='system_locallogin.html'>
locallogin</a><br/>
- <a href='system_logging.html'>
logging</a><br/>
- <a href='system_lvm.html'>
lvm</a><br/>
- <a href='system_miscfiles.html'>
miscfiles</a><br/>
- <a href='system_modutils.html'>
modutils</a><br/>
- <a href='system_mount.html'>
mount</a><br/>
- <a href='system_pcmcia.html'>
pcmcia</a><br/>
- <a href='system_raid.html'>
raid</a><br/>
- <a href='system_selinuxutil.html'>
selinuxutil</a><br/>
- <a href='system_sysnetwork.html'>
sysnetwork</a><br/>
- <a href='system_udev.html'>
udev</a><br/>
- <a href='system_unconfined.html'>
unconfined</a><br/>
- <a href='system_userdomain.html'>
userdomain</a><br/>
</div>
<br/><p/>
<a href="global_booleans.html">* Global Booleans </a>
<br/><p/>
<a href="global_tunables.html">* Global Tunables </a>
<p/><br/><p/>
<a href="index.html">* Layer Index</a>
<br/><p/>
<a href="interfaces.html">* Interface Index</a>
<br/><p/>
<a href="templates.html">* Template Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: system</h1><p/>
<h2>Module: unconfined</h2><p/>
<a href=#interfaces>Interfaces</a>
<a href=#templates>Templates</a>
<h3>Description:</h3>
<p><p>The unconfined domain.</p></p>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_unconfined_alias_domain"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_alias_domain</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Add an alias type to the unconfined domain.
</p>
<h5>Description</h5>
<p>
</p><p>
Add an alias type to the unconfined domain.
</p><p>
</p><p>
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
New alias of the unconfined domain.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_dbus_send"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_dbus_send</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send messages to the unconfined domain over dbus.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Transition to the unconfined domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_dontaudit_read_pipe"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_dontaudit_read_pipe</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read unconfined domain unnamed pipes.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_dontaudit_rw_tcp_socket"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_dontaudit_rw_tcp_socket</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read or write
unconfined domain tcp sockets.
</p>
<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to read or write
unconfined domain tcp sockets.
</p><p>
</p><p>
This interface was added due to a broken
symptom in ldconfig.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain to not audit.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_read_pipe"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_read_pipe</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read unconfined domain unnamed pipes.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_run"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_run</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute specified programs in the unconfined domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to allow the unconfined domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the unconfined domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_rw_pipe"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_rw_pipe</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write unconfined domain unnamed pipes.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_shell_domtrans"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_shell_domtrans</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Transition to the unconfined domain by executing a shell.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_sigchld"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_sigchld</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a SIGCHLD signal to the unconfined domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_signal"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_signal</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send generic signals to the unconfined domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a name="link_unconfined_use_fd"></a>
<div id="interface">
<div id="codeblock">
<b>unconfined_use_fd</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Inherit file descriptors from the unconfined domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain allowed access.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
<a name="templates"></a>
<h3>Templates: </h3>
<a name="link_unconfined_domain_template"></a>
<div id="template">
<div id="codeblock">
<b>unconfined_domain_template</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
A template to make the specified domain unconfined.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
Domain to make unconfined.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>