Core policy for domains.
This module is required to be included in all policies.
false
Control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.
Allow specified type to receive labeled networking packets from all domains, over all protocols (TCP, UDP, etc)
Parameter: | Description: |
---|---|
type |
Domain allowed access. |
Make the specified type usable as a basic domain.
Make the specified type usable as a basic domain.
This is primarily used for kernel threads; generally the domain_type() interface is more appropriate for userland processes.
Parameter: | Description: |
---|---|
type |
Type to be used as a basic domain type. |
Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.
Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.
This interface is needed to decouple the cron domains from the base module. It should not be used other than on cron domains.
Parameter: | Description: |
---|---|
domain |
Domain target for user exemption. |
Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.
Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.
This interface is needed to decouple the cron domains from the base module. It should not be used other than on user cron jobs.
Parameter: | Description: |
---|---|
domain |
Domain target for user exemption. |
dontaudit checking for execute on all entry point files
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains unix datagram sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Do not audit attempts to get the attributes of all entry point files.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get attributes of all domains IPSEC key management sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get attributes of all domains packet sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains unnamed pipes.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get attributes of all domains raw sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains sockets, for all socket types.
Do not audit attempts to get the attributes of all domains sockets, for all socket types.
This interface was added for PCMCIA cardmgr and is probably excessive.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains unix stream sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains TCP sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the attributes of all domains UDP sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to get the session ID of all domains.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read the process state directories of all domains.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to ptrace all domains.
Do not audit attempts to ptrace all domains.
Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to ptrace confined domains.
Do not audit attempts to ptrace confined domains.
Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read the process state (/proc/pid) of all domains.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write all domains key sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to read or write all domains UDP sockets.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to search the process state directory (/proc/pid) of all domains.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to send general signals to all domains.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Do not audit attempts to inherit file descriptors from domains with interactive programs.
Parameter: | Description: |
---|---|
domain |
Domain to not audit. |
Allow the specified domain to perform dynamic transitions.
Allow the specified domain to perform dynamic transitions.
This violates process tranquility, and it is strongly suggested that this not be used.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable as an entry point for the domain.
Parameter: | Description: |
---|---|
domain |
Domain to be entered. |
type |
Type of program used for entering the domain. |
Execute an entry_type in the specified domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed to transition. |
target_domain |
The type of the new process. |
Execute the entry point files for all domains in the caller domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all domains
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of entry point files for all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all domains unnamed pipes.
Get the attributes of all domains unnamed pipes.
This is commonly used for domains that can use lsof on all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all domains sockets, for all socket types.
Get the attributes of all domains sockets, for all socket types.
This is commonly used for domains that can use lsof on all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all domains unix datagram sockets.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the attributes of all confined domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the capability information of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the process group ID of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the scheduler information of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Get the session ID of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the file descriptors of the specified domain for interactive use (widely inheritable)
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow specified type to set context of all domains IPSEC associations.
Parameter: | Description: |
---|---|
type |
Domain allowed access. |
Send a kill signal to all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Create, read, write, and delete all entrypoint files.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Mmap all entry point files as executable.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Ability to mmap a low area of the address space conditionally, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Ability to mmap a low area of the address space unconditionally, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Makes caller an exception to the constraint preventing changing the user identity in object contexts.
Parameter: | Description: |
---|---|
domain |
The process type to make an exception to the constraint. |
Ptrace all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Allow all domains to search specified type keys.
When setting up IMA/EVM key(s) are added to the kernel keyring but the type of the key is the domain adding the key. This interface will allow all domains search the key so IMA/EVM validation can happen.
Parameter: | Description: |
---|---|
type |
Type of key to be searched. |
Read the process state (/proc/pid) of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read the entry point files for all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Read the process state (/proc/pid) of all confined domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Relabel to and from all entry point file types.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Makes caller an exception to the constraint preventing changing of role.
Parameter: | Description: |
---|---|
domain |
The process type to make an exception to the constraint. |
Search the process state directory (/proc/pid) of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Set the nice level of all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a child terminated signal to all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a SIGCHLD signal to domains whose file discriptors are widely inheritable.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send general signals to all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a null signal to all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send a stop signal to all domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Makes caller an exception to the constraint preventing changing of user identity.
Parameter: | Description: |
---|---|
domain |
The process type to make an exception to the constraint. |
Makes caller and exception to the constraint preventing changing to the system user identity and system role.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified type usable as a domain.
Make the specified type usable as a domain. This, or an interface that calls this interface, must be used on all types that are used as domains.
Related interfaces:
application_domain()
init_daemon_domain()
init_domaion()
init_ranged_daemon_domain()
init_ranged_domain()
init_ranged_system_domain()
init_script_domain()
init_system_domain()
Example:
type mydomain_t; domain_type(mydomain_t) type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;
Parameter: | Description: |
---|---|
type |
Type to be used as a domain type. |
Unconfined access to domains.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Send generic signals to the unconfined domain.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Inherit and use file descriptors from domains with interactive programs.
Allow the specified domain to inherit and use file descriptors from domains with interactive programs. This does not allow access to the objects being referenced by the file descriptors.
Parameter: | Description: |
---|---|
domain |
Domain allowed access. |
Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.
Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.
This interface is needed to decouple the user domains from the base module. It should not be used other than on user domains.
Parameter: | Description: |
---|---|
domain |
Domain target for user exemption. |