The unconfined domain.
true
Enabling this allows some daemons to access unconfined_home_dir_t and unconfined_home_t as if they were regular home directories. This does reduce the protection...
Allow a domain to be in role unconfined_r
Allow the specified domain to be run in the role unconfined_r This is suitable for domains that are entered indirectly from unconfined_t
Also allow the domain to send sigchld to unconfined_t and use fds
Parameter: | Description: |
---|---|
domain |
Domain to be in unconfined_r |
Allow domain to attach to TUN devices created by unconfined_t users.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create keys for the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send and receive messages from unconfined_t over dbus.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Connect to the the unconfined DBUS for service (acquire_svc).
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send messages to the unconfined domain over dbus.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified domain unconfined and audit executable heap usage.
Make the specified domain unconfined and audit executable heap usage. With exception of memory protections, usage of this interface will result in the level of access the domain has is like SELinux was not being used.
Only completely trusted domains should use this interface.
Parameter: | Description: |
---|---|
domain |
Domain to make unconfined. |
Make the specified domain unconfined.
Parameter: | Description: |
---|---|
domain |
Domain to make unconfined. |
Transition to the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow unconfined to execute the specified program in the specified domain.
Allow unconfined to execute the specified program in the specified domain.
This is a interface to support third party modules and its use is not allowed in upstream reference policy.
Parameter: | Description: |
---|---|
domain |
Domain to execute in. |
entry_file |
Domain entry point file. |
Do not audit attempts to read unconfined domain unnamed pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write unconfined domain packet sockets.
Do not audit attempts to read or write unconfined domain packet sockets.
This interface was added due to a broken symptom.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write unconfined domain unnamed pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read and write unconfined domain stream.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write unconfined domain tcp sockets.
Do not audit attempts to read or write unconfined domain tcp sockets.
This interface was added due to a broken symptom in ldconfig.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the unconfined users home directory.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Get the process group of unconfined.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow ptrace of unconfined domain
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read files in unconfined users home directories.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read unconfined domain unnamed pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read unconfined users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Change to the unconfined role.
Parameter: | Description: |
---|---|
role |
Role allowed access. |
Change from the unconfineduser role.
Change from the unconfineduser role to the specified role.
This is an interface to support third party modules and its use is not allowed in upstream reference policy.
Parameter: | Description: |
---|---|
role |
Role allowed access. |
Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.
Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.
This is a interface to support third party modules and its use is not allowed in upstream reference policy.
Parameter: | Description: |
---|---|
domain |
Domain to execute in. |
entry_file |
Domain entry point file. |
Read and write unconfined domain unnamed pipes.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read and write to unconfined shared memory.
Parameter: | Description: |
---|---|
domain |
The type of the process performing this action. |
rw access to a semaphore created by the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow apps to set rlimits on userdomain
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Transition to the unconfined domain by executing a shell.
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
Send a SIGCHLD signal to the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send generic signals to the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a SIGNULL signal to the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Connect to the unconfined domain using a unix domain stream socket.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Inherit file descriptors from the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Write unconfined users temporary files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |