more comments

This commit is contained in:
Chris PeBenito 2005-08-12 19:28:30 +00:00
parent f0b1efa2a2
commit 8843093607

View File

@ -61,6 +61,16 @@ interface(`selinux_get_enforce_mode',`
## Allow caller to set the mode of policy enforcement ## Allow caller to set the mode of policy enforcement
## (enforcing or permissive mode). ## (enforcing or permissive mode).
## </summary> ## </summary>
## <desc>
## <p>
## Allow caller to set the mode of policy enforcement
## (enforcing or permissive mode).
## </p>
## <p>
## Since this is a security event, this action is
## always audited.
## </p>
## </desc>
## <param name="domain"> ## <param name="domain">
## The process type to allow to set the enforcement mode. ## The process type to allow to set the enforcement mode.
## </param> ## </param>
@ -110,6 +120,16 @@ interface(`selinux_load_policy',`
## Allow caller to set the state of Booleans to ## Allow caller to set the state of Booleans to
## enable or disable conditional portions of the policy. ## enable or disable conditional portions of the policy.
## </summary> ## </summary>
## <desc>
## <p>
## Allow caller to set the state of Booleans to
## enable or disable conditional portions of the policy.
## </p>
## <p>
## Since this is a security event, this action is
## always audited.
## </p>
## </desc>
## <param name="domain"> ## <param name="domain">
## The process type allowed to set the Boolean. ## The process type allowed to set the Boolean.
## </param> ## </param>
@ -140,8 +160,19 @@ interface(`selinux_set_boolean',`
######################################## ########################################
## <summary> ## <summary>
## Allow caller to set selinux security parameters. ## Allow caller to set SELinux access vector cache parameters.
## </summary> ## </summary>
## <desc>
## <p>
## Allow caller to set SELinux access vector cache parameters.
## The allows the domain to set performance related parameters
## of the AVC, such as cache threshold.
## </p>
## <p>
## Since this is a security event, this action is
## always audited.
## </p>
## </desc>
## <param name="domain"> ## <param name="domain">
## The process type to allow to set security parameters. ## The process type to allow to set security parameters.
## </param> ## </param>
@ -206,10 +237,10 @@ interface(`selinux_compute_access_vector',`
######################################## ########################################
## <summary> ## <summary>
## ## Calculate the default type for object creation.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## ## Domain allowed access.
## </param> ## </param>
# #
interface(`selinux_compute_create_context',` interface(`selinux_compute_create_context',`
@ -227,10 +258,19 @@ interface(`selinux_compute_create_context',`
######################################## ########################################
## <summary> ## <summary>
## ## Calculate the context for relabeling objects.
## </summary> ## </summary>
## <desc>
## <p>
## Calculate the context for relabeling objects.
## This is determined by using the type_change
## rules in the policy, and is generally used
## for determining the context for relabeling
## a terminal when a user logs in.
## </p>
## </desc>
## <param name="domain"> ## <param name="domain">
## The process type to ## Domain allowed access.
## </param> ## </param>
# #
interface(`selinux_compute_relabel_context',` interface(`selinux_compute_relabel_context',`
@ -269,7 +309,7 @@ interface(`selinux_compute_user_contexts',`
######################################## ########################################
## <summary> ## <summary>
## Unconfined access to the SELinux security server. ## Unconfined access to the SELinux kernel security server.
## </summary> ## </summary>
## <param name="domain"> ## <param name="domain">
## Domain allowed access. ## Domain allowed access.