Sophie

Sophie

distrib > Mageia > 7 > i586 > by-pkgid > 8ffb4313e5f0f160ec01fd6f8705a59d > files > 477

selinux-policy-doc-3.13.1-9.mga7.noarch.rpm

<html>
<head>
<title>
 Security Enhanced Linux Reference Policy
 </title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
	
		<a href="admin.html">+&nbsp;
		admin</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="apps.html">+&nbsp;
		apps</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="contrib.html">+&nbsp;
		contrib</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="kernel.html">+&nbsp;
		kernel</a></br/>
		<div id='subitem'>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corecommands.html'>
			corecommands</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_corenetwork.html'>
			corenetwork</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_devices.html'>
			devices</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_domain.html'>
			domain</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_files.html'>
			files</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_filesystem.html'>
			filesystem</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_kernel.html'>
			kernel</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mcs.html'>
			mcs</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_mls.html'>
			mls</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_selinux.html'>
			selinux</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_storage.html'>
			storage</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_terminal.html'>
			terminal</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_ubac.html'>
			ubac</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='kernel_unlabelednet.html'>
			unlabelednet</a><br/>
		
		</div>
	
		<a href="roles.html">+&nbsp;
		roles</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="services.html">+&nbsp;
		services</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="system.html">+&nbsp;
		system</a></br/>
		<div id='subitem'>
		
		</div>
	
	<br/><p/>
	<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
	<br/><p/>
	<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
	<p/><br/><p/>
	<a href="index.html">*&nbsp;Layer Index</a>
	<br/><p/>
	<a href="booleans.html">*&nbsp;Boolean&nbsp;Index</a>
	<br/><p/>
	<a href="tunables.html">*&nbsp;Tunable&nbsp;Index</a>
	<br/><p/>
	<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
	<br/><p/>
	<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>

<div id="Content">
<a name="top":></a>
<h1>Layer: kernel</h1><p/>
<h2>Module: kernel</h2><p/>

<a href=#booleans>Booleans</a>



<a href=#interfaces>Interfaces</a>


<h3>Description:</h3>

<p><p>
Policy for kernel threads, proc filesystem,
and unlabeled processes and objects.
</p></p>


<p>This module is required to be included in all policies.</p>

<hr>

<a name="booleans"></a>
<h3>Booleans: </h3>

<a name="link_secure_mode_insmod"></a>
<div id="interface">
<div id="codeblock">secure_mode_insmod</div>
<div id="description">
<h5>Default value</h5>
<p>false</p>

<h5>Description</h5>
<p>
</p><p>
Disable kernel module loading.
</p><p>
</p>

</div></div>


<a href=#top>Return</a>



<a name="interfaces"></a>
<h3>Interfaces: </h3>

<a name="link_kernel_change_ring_buffer_level"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_change_ring_buffer_level</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Change the level of kernel messages logged to the console.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_clear_ring_buffer"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_clear_ring_buffer</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows the caller to clear the ring buffer.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dccp_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dccp_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive DCCP packets from an unlabeled connection.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_delete_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_delete_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Delete unlabeled files
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dgram_send"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dgram_send</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send messages to kernel unix datagram sockets.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_domtrans_to"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_domtrans_to</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		entrypoint
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows to start userland processes
by transitioning to the specified domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
The process type entered by kernel.
</p>
</td></tr>

<tr><td>
entrypoint
</td><td>
<p>
The executable type for the entrypoint.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_access_check_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_access_check_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to check the
access on generic proc entries.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_dccp_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_dccp_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to receive DCCP packets from an unlabeled
connection.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_all_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_all_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get attributes on all sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_core_if"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_core_if</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to get the attributes of
core kernel interfaces.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_message_if"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_message_if</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get the attributes of kernel
message interfaces.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_unlabeled_blk_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_unlabeled_blk_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get attributes for
unlabeled block devices.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_unlabeled_chr_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_unlabeled_chr_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get attributes for
unlabeled character devices.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_unlabeled_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_unlabeled_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get the
attributes of an unlabeled file.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_unlabeled_pipes"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_unlabeled_pipes</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_unlabeled_sockets"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_unlabeled_sockets</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_getattr_unlabeled_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_getattr_unlabeled_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_link_key"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_link_key</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
dontaudit link to the kernel key ring.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_list_all_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_list_all_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to list all proc directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_list_all_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_list_all_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to list all sysctl directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_list_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_list_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to list the
contents of directories in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_list_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_list_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to list unlabeled directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_raw_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_raw_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
</p><p>
</p><p>
The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
should be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_read_proc_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_read_proc_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to
read system state information in proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_read_ring_buffer"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_read_ring_buffer</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to read the ring buffer.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_read_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_read_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Dontaudit attempts to read the process state (/proc/pid) of the kernel.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_read_system_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_read_system_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to
read system state information in proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_read_unlabeled_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_read_unlabeled_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to
read an unlabeled file.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_recvfrom_unlabeled_peer"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_recvfrom_unlabeled_peer</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to receive packets from an unlabeled peer.
</p>


<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to receive packets from an unlabeled peer,
these packets do not have any peer labeling information present.
</p><p>
</p><p>
The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
should be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_request_load_module"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_request_load_module</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit requests to the kernel to load a module.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the kernel debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_kernel_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_kernel_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search generic kernel sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_key"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_key</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
dontaudit search the kernel key ring.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_network_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_network_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the network
state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_network_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_network_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to search network sysctl directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_numa_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_numa_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the numa
state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_security_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_security_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the security
state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts by caller to search
the base directory of sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_usermodehelper_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_usermodehelper_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the usermodehelper
state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_search_xen_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_search_xen_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the xen
state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_sendrecv_unlabeled_association"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_sendrecv_unlabeled_association</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to send and receive messages
from an	unlabeled IPSEC association.
</p>


<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to send and receive messages
from an	unlabeled IPSEC association.  Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
</p><p>
</p><p>
The corenetwork interface
corenet_dontaudit_non_ipsec_sendrecv() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_setattr_proc_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_setattr_proc_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to set the
attributes of directories in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_setattr_proc_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_setattr_proc_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to set the
attributes of files in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_setsched"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_setsched</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Dontaudit attempts to set the priority of kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_tcp_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_tcp_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
</p><p>
</p><p>
The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
should be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_udp_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_udp_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
</p><p>
</p><p>
The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
should be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_use_fds"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_use_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to use
kernel file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_write_debugfs_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_write_debugfs_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to write kernel debugging filesystem dirs.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_write_kernel_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_write_kernel_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to write generic kernel sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_write_proc_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_write_proc_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to write the
directories in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_write_proc_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_write_proc_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to write the
file in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_dontaudit_write_usermodehelper_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_dontaudit_write_usermodehelper_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Dontaudit write usermodehelper state
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_get_sysvipc_info"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_get_sysvipc_info</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get information on all System V IPC objects.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_getattr_core_if"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_getattr_core_if</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows caller to get attribues of core kernel interface.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_getattr_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_getattr_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get the attributes of a kernel debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_getattr_message_if"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_getattr_message_if</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to get the attributes of kernel message
interface (/proc/kmsg).
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_getattr_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_getattr_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get the attributes of the proc filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_getattr_proc_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_getattr_proc_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get the attributes of files in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_kill"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_kill</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a kill signal to kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_kill_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_kill_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a kill signal to unlabeled processes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_link_key"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_link_key</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow link to the kernel key ring.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_list_all_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_list_all_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow attempts to list all proc directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_list_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_list_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
List the contents of directories in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_list_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_list_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
List unlabeled directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_load_module"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_load_module</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows caller to load kernel modules
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_manage_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_manage_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Manage information from the debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mount_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mount_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Mount a kernel debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mount_kvmfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mount_kvmfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Mount a kernel VM filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mount_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mount_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Mount the proc filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mount_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mount_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Mount a kernel unlabeled filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mounton_all_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mounton_all_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow attempts to mounton all proc directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mounton_all_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mounton_all_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow attempts to mounton all sysctl directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mounton_messages"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mounton_messages</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to mounton the kernel messages file
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_mounton_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_mounton_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Mounton a proc filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_proc_type"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_proc_type</b>(
	
		
		
		
		type
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Make the specified type usable for regular entries in proc
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
type
</td><td>
<p>
Type to be used for /proc entries.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_ranged_domtrans_to"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_ranged_domtrans_to</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		entrypoint
		
	
		
			,
		
		
		
		range
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows to start userland processes
by transitioning to the specified domain,
with a range transition.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
The process type entered by kernel.
</p>
</td></tr>

<tr><td>
entrypoint
</td><td>
<p>
The executable type for the entrypoint.
</p>
</td></tr>

<tr><td>
range
</td><td>
<p>
Range for the domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_raw_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_raw_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive Raw IP packets from an unlabeled connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Receive Raw IP packets from an unlabeled connection.
</p><p>
</p><p>
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_all_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_all_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow attempts to read all proc types.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_all_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_all_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read all sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_core_if"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_core_if</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows caller to read the core kernel interface.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_crypto_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_crypto_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read generic crypto sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read information from the debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_device_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_device_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the device sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_fs_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_fs_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read filesystem sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_hotplug_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_hotplug_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the hotplug sysctl.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_irq_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_irq_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read IRQ sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_kernel_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_kernel_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read general kernel sysctls.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to read general
kernel sysctl settings. These settings are typically
read using the sysctl program.  The settings
that are included by this interface are prefixed
with "kernel.", for example, kernel.sysrq.
</p><p>
</p><p>
This does not include access to the hotplug
handler setting (kernel.hotplug)
nor the module installer handler setting
(kernel.modprobe).
</p><p>
</p><p>
Related interfaces:
</p><p>
</p><ul><p>
</p><li><p>kernel_rw_kernel_sysctl()</p></li><p>
</p></ul><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_messages"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_messages</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read kernel messages
using the /proc/kmsg interface.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_modprobe_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_modprobe_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the modprobe sysctl.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_net_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_net_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read network sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_netlink_audit_socket"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_netlink_audit_socket</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read netlink audit socket
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_network_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_network_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the network state information.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to read the networking
state information. This includes several pieces
of networking information, such as network interface
names, netfilter (iptables) statistics, protocol
information, routes, and remote procedure call (RPC)
information.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_network_state_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_network_state_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the network state symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_numa_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_numa_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the numa state information.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_numa_state_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_numa_state_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the numa state symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_proc_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_proc_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read generic symbolic links in /proc.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to read (follow) generic
symbolic links (symlinks) in the proc filesystem (/proc).
This interface does not include access to the targets of
these links.  An example symlink is /proc/self.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_ring_buffer"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_ring_buffer</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows caller to read the ring buffer.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_rpc_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_rpc_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read RPC sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_security_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_security_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the security state information.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to read the security
state information.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_security_state_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_security_state_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the security state symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_software_raid_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_software_raid_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the state information for software raid.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the process state (/proc/pid) of the kernel.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow access to read sysctl directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_system_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_system_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows caller to read system state information in /proc.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to read general system
state information from the proc filesystem (/proc).
</p><p>
</p><p>
Generally it should be safe to allow this access.  Some
example files that can be read based on this interface:
</p><p>
</p><ul><p>
</p><li><p>/proc/cpuinfo</p></li><p>
</p><li><p>/proc/meminfo</p></li><p>
</p><li><p>/proc/uptime</p></li><p>
</p></ul><p>
</p><p>
This does not allow access to sysctl entries (/proc/sys/*)
nor process state information (/proc/pid).
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_unix_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_unix_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read unix domain
socket sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_unlabeled_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_unlabeled_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the process state (/proc/pid) of all unlabeled_t.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_usermodehelper_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_usermodehelper_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the usermodehelper state information.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to read the usermodehelpering
state information. This includes several pieces
of usermodehelpering information, such as usermodehelper interface
names, usermodehelperfilter (iptables) statistics, protocol
information, routes, and remote procedure call (RPC)
information.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_usermodehelper_state_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_usermodehelper_state_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the usermodehelper state symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_vm_overcommit_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_vm_overcommit_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read virtual memory overcommit sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_vm_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_vm_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read virtual memory sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_xen_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_xen_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the xen state information.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_read_xen_state_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_read_xen_state_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the xen state symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_recvfrom_unlabeled_peer"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_recvfrom_unlabeled_peer</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive packets from an unlabeled peer.
</p>


<h5>Description</h5>
<p>
</p><p>
Receive packets from an unlabeled peer, these packets do not have any
peer labeling information present.
</p><p>
</p><p>
The corenetwork interface corenet_recvfrom_unlabeled_peer() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_database"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_database</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Relabel from unlabeled database objects.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to relabel unlabeled directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to relabel unlabeled files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_fs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_fs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to relabel unlabeled filesystems.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_pipes"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_pipes</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to relabel unlabeled named pipes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_sockets"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_sockets</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to relabel unlabeled named sockets.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelfrom_unlabeled_symlinks"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelfrom_unlabeled_symlinks</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to relabel unlabeled symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelto_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelto_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Relabel to unlabeled context .
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_relabelto_usermodehelper"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_relabelto_usermodehelper</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Relabel to usermodehelper context .
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_remount_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_remount_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Remount a kernel debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_request_load_module"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_request_load_module</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows caller to request the kernel to load a module
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to request that the kernel
load a kernel module.  An example of this is the
auto-loading of network drivers when doing an
ioctl() on a network interface.
</p><p>
</p><p>
In the specific case of a module loading request
on a network interface, the domain will also
need the net_admin capability.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rootfs_mountpoint"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rootfs_mountpoint</b>(
	
		
		
		
		directory_type
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows the kernel to mount filesystems on
the specified directory type.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
directory_type
</td><td>
<p>
The type of the directory to use as a mountpoint.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_afs_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_afs_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read and write state information for AFS.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_all_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_all_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write all sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_device_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_device_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write device sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_fs_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_fs_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write fileystem sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_hotplug_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_hotplug_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write the hotplug sysctl.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_irq_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_irq_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write IRQ sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_kernel_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_kernel_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write generic kernel sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_modprobe_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_modprobe_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write the modprobe sysctl.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_net_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_net_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to modiry contents of sysctl network files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_pipes"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_pipes</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write kernel unnamed pipes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_rpc_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_rpc_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write RPC sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_security_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_security_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read the security state symbolic links.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_software_raid_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_software_raid_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to read and set the state information for software raid.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_stream_socket_perms"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_stream_socket_perms</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow the specified domain to read/write on
the kernel with a unix socket.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unix_dgram_sockets"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unix_dgram_sockets</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write kernel unix datagram sockets.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unix_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unix_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write unix domain
socket sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unlabeled_blk_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unlabeled_blk_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write unlabeled block device nodes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unlabeled_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unlabeled_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write unlabeled directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unlabeled_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unlabeled_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write unlabeled files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unlabeled_rawip_socket"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unlabeled_rawip_socket</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read/Write Raw IP packets from an unlabeled connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Receive Raw IP packets from an unlabeled connection.
</p><p>
</p><p>
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_unlabeled_socket"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_unlabeled_socket</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write unlabeled sockets.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_usermodehelper_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_usermodehelper_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write usermodehelper state
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_vm_overcommit_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_vm_overcommit_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write virtual memory overcommit sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_rw_vm_sysctls"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_rw_vm_sysctls</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write virtual memory sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Search the contents of a kernel debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_key"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_key</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow search the kernel key ring.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_network_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_network_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow searching of network state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_network_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_network_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Search network sysctl directories.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_numa_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_numa_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow searching of numa state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Search directories in /proc.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_security_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_security_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow searching of security state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_usermodehelper_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_usermodehelper_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow searching of usermodehelper state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_vm_overcommit_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_vm_overcommit_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to search virtual memory overcommit sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_vm_sysctl"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_vm_sysctl</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to search virtual memory sysctls.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_search_xen_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_search_xen_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow searching of xen state directory.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_sendrecv_unlabeled_association"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_sendrecv_unlabeled_association</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send and receive messages from an
unlabeled IPSEC association.
</p>


<h5>Description</h5>
<p>
</p><p>
Send and receive messages from an
unlabeled IPSEC association.  Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
</p><p>
</p><p>
The corenetwork interface
corenet_non_ipsec_sendrecv() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_sendrecv_unlabeled_packets"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_sendrecv_unlabeled_packets</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send and receive unlabeled packets.
</p>


<h5>Description</h5>
<p>
</p><p>
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
</p><p>
</p><p>
The corenetwork interface
corenet_sendrecv_unlabeled_packets() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_setpgid"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_setpgid</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Set the process group of kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_setsched"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_setsched</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Set the priority of kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_share_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_share_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allows the kernel to share state information with
the caller.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
The type of the process with which to share state information.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_sigchld"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_sigchld</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a SIGCHLD signal to kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_sigchld_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_sigchld_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a child terminated signal to unlabeled processes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_signal"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_signal</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a generic signal to kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_signal_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_signal_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send general signals to unlabeled processes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_signull"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_signull</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send signull to kernel threads.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_signull_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_signull_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a null signal to unlabeled processes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_sigstop_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_sigstop_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a stop signal to unlabeled processes.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_stream_connect"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_stream_connect</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Connect to kernel using a unix
domain stream socket.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_stream_read"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_stream_read</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow the specified domain to getattr on
the kernel with a unix socket.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_stream_write"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_stream_write</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow the specified domain to write on
the kernel with a unix socket.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_tcp_recvfrom"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_tcp_recvfrom</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive messages from kernel TCP sockets.  (Deprecated)
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_tcp_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_tcp_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive TCP packets from an unlabeled connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Receive TCP packets from an unlabeled connection.
</p><p>
</p><p>
The corenetwork interface corenet_tcp_recv_unlabeled() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_udp_recvfrom"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_udp_recvfrom</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive messages from kernel UDP sockets.  (Deprecated)
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_udp_recvfrom_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_udp_recvfrom_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Receive UDP packets from an unlabeled connection.
</p>


<h5>Description</h5>
<p>
</p><p>
Receive UDP packets from an unlabeled connection.
</p><p>
</p><p>
The corenetwork interface corenet_udp_recv_unlabeled() should
be used instead of this one.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_udp_send"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_udp_send</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send UDP network traffic to the kernel.  (Deprecated)
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_unconfined"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_unconfined</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Unconfined access to kernel module resources.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_unlabeled_domtrans"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_unlabeled_domtrans</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		target_domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute an unlabeled file in the specified domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>

<tr><td>
target_domain
</td><td>
<p>
The type of the new process.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_unlabeled_entry_type"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_unlabeled_entry_type</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Make general progams without labeles an entrypoint for
the specified domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
The domain for which unlabeled_t is an entrypoint.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_unmount_debugfs"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_unmount_debugfs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Unmount a kernel debugging filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_unmount_proc"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_unmount_proc</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Unmount the proc filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_unmount_unlabeled"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_unmount_unlabeled</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Unmount a kernel unlabeled filesystem.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_use_fds"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_use_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Permits caller to use kernel file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_write_numa_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_write_numa_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to write numa state information.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_write_proc_files"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_write_proc_files</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Write to generic proc entries.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_write_security_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_write_security_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Write the security state information.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to write the security
state information.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_kernel_write_xen_state"></a>
<div id="interface">


<div id="codeblock">

<b>kernel_write_xen_state</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow caller to write xen state information.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>


<a href=#top>Return</a>




</div>
</body>
</html>