selinux-policy/www/api-docs/system_selinuxutil.html
2005-06-15 21:11:49 +00:00

922 lines
12 KiB
HTML

<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+&nbsp;
admin</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+&nbsp;
kernel</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+&nbsp;
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+&nbsp;
system</a></br/>
<div id='subitem'>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_authlogin.html'>
authlogin</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_clock.html'>
clock</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_corecommands.html'>
corecommands</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_domain.html'>
domain</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_files.html'>
files</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_getty.html'>
getty</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hostname.html'>
hostname</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hotplug.html'>
hotplug</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_init.html'>
init</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_iptables.html'>
iptables</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_libraries.html'>
libraries</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_locallogin.html'>
locallogin</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_logging.html'>
logging</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_lvm.html'>
lvm</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_miscfiles.html'>
miscfiles</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_modutils.html'>
modutils</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_mount.html'>
mount</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_selinuxutil.html'>
selinuxutil</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_sysnetwork.html'>
sysnetwork</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_udev.html'>
udev</a><br/>
&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_userdomain.html'>
userdomain</a><br/>
</div>
<br/><p/>
<a href="interfaces.html">*&nbsp;Interface Index</a>
</div>
<div id="Content">
<h1>Layer: system</h1><p/>
<h2>Module: selinuxutil</h2><p/>
<h3>Description:</h3>
<p>Policy for SELinux policy and userland applications.</p>
<h3>Interfaces: </h3>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_checkpol</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute checkpolicy in the checkpolicy domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_loadpol</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute load_policy in the load_policy domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_newrole</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute newrole in the load_policy domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_restorecon</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute restorecon in the restorecon domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_runinit</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute run_init in the run_init domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_setfiles</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute setfiles in the setfiles domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_newrole_signal</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Do not audit the caller attempts to send
a signal to newrole.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_relabelto_binary_pol</b>(
domain
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Allow the caller to relabel a file to the binary policy type.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_run_checkpol</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute checkpolicy in the checkpolicy domain, and
allow the specified role the checkpolicy domain,
and use the caller's terminal.
Has a SIGCHLD signal backchannel.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to be allowed the checkpolicy domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the checkpolicy domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_run_loadpol</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute load_policy in the load_policy domain, and
allow the specified role the load_policy domain,
and use the caller's terminal.
Has a SIGCHLD signal backchannel.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to be allowed the load_policy domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the load_policy domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_run_newrole</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute newrole in the newrole domain, and
allow the specified role the newrole domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to be allowed the newrole domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the newrole domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_run_restorecon</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute restorecon in the restorecon domain, and
allow the specified role the restorecon domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to be allowed the restorecon domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the restorecon domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_run_runinit</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute run_init in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to be allowed the run_init domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the run_init domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
<div id="interface">
<div id="codeblock">
<b>seutil_run_setfiles</b>(
domain
,
role
,
terminal
)<br>
</div>
<div id="description">
<h5>Description</h5>
<p>
Execute setfiles in the setfiles domain, and
allow the specified role the setfiles domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>
<tr><td>
domain
</td><td>
The type of the process performing this action.
</td><td>
No
</td></tr>
<tr><td>
role
</td><td>
The role to be allowed the setfiles domain.
</td><td>
No
</td></tr>
<tr><td>
terminal
</td><td>
The type of the terminal allow the setfiles domain to use.
</td><td>
No
</td></tr>
</table>
</div>
</div>
</div>
</body>
</html>