more comments
This commit is contained in:
parent
f0b1efa2a2
commit
8843093607
@ -61,6 +61,16 @@ interface(`selinux_get_enforce_mode',`
|
|||||||
## Allow caller to set the mode of policy enforcement
|
## Allow caller to set the mode of policy enforcement
|
||||||
## (enforcing or permissive mode).
|
## (enforcing or permissive mode).
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow caller to set the mode of policy enforcement
|
||||||
|
## (enforcing or permissive mode).
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Since this is a security event, this action is
|
||||||
|
## always audited.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## The process type to allow to set the enforcement mode.
|
## The process type to allow to set the enforcement mode.
|
||||||
## </param>
|
## </param>
|
||||||
@ -110,6 +120,16 @@ interface(`selinux_load_policy',`
|
|||||||
## Allow caller to set the state of Booleans to
|
## Allow caller to set the state of Booleans to
|
||||||
## enable or disable conditional portions of the policy.
|
## enable or disable conditional portions of the policy.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow caller to set the state of Booleans to
|
||||||
|
## enable or disable conditional portions of the policy.
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Since this is a security event, this action is
|
||||||
|
## always audited.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## The process type allowed to set the Boolean.
|
## The process type allowed to set the Boolean.
|
||||||
## </param>
|
## </param>
|
||||||
@ -140,8 +160,19 @@ interface(`selinux_set_boolean',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow caller to set selinux security parameters.
|
## Allow caller to set SELinux access vector cache parameters.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Allow caller to set SELinux access vector cache parameters.
|
||||||
|
## The allows the domain to set performance related parameters
|
||||||
|
## of the AVC, such as cache threshold.
|
||||||
|
## </p>
|
||||||
|
## <p>
|
||||||
|
## Since this is a security event, this action is
|
||||||
|
## always audited.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## The process type to allow to set security parameters.
|
## The process type to allow to set security parameters.
|
||||||
## </param>
|
## </param>
|
||||||
@ -206,10 +237,10 @@ interface(`selinux_compute_access_vector',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
##
|
## Calculate the default type for object creation.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
##
|
## Domain allowed access.
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`selinux_compute_create_context',`
|
interface(`selinux_compute_create_context',`
|
||||||
@ -227,10 +258,19 @@ interface(`selinux_compute_create_context',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
##
|
## Calculate the context for relabeling objects.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
## <desc>
|
||||||
|
## <p>
|
||||||
|
## Calculate the context for relabeling objects.
|
||||||
|
## This is determined by using the type_change
|
||||||
|
## rules in the policy, and is generally used
|
||||||
|
## for determining the context for relabeling
|
||||||
|
## a terminal when a user logs in.
|
||||||
|
## </p>
|
||||||
|
## </desc>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## The process type to
|
## Domain allowed access.
|
||||||
## </param>
|
## </param>
|
||||||
#
|
#
|
||||||
interface(`selinux_compute_relabel_context',`
|
interface(`selinux_compute_relabel_context',`
|
||||||
@ -269,7 +309,7 @@ interface(`selinux_compute_user_contexts',`
|
|||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Unconfined access to the SELinux security server.
|
## Unconfined access to the SELinux kernel security server.
|
||||||
## </summary>
|
## </summary>
|
||||||
## <param name="domain">
|
## <param name="domain">
|
||||||
## Domain allowed access.
|
## Domain allowed access.
|
||||||
|
Loading…
Reference in New Issue
Block a user