Sophie

Sophie

distrib > CentOS > 5 > x86_64 > by-pkgid > cf4a9bde65c6e35824e39db5a2da167e > files > 269

selinux-policy-2.4.6-351.el5.noarch.rpm

<html>
<head>
<title>
 Security Enhanced Linux Reference Policy
 </title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
	
		<a href="admin.html">+&nbsp;
		admin</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="apps.html">+&nbsp;
		apps</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="kernel.html">+&nbsp;
		kernel</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="services.html">+&nbsp;
		services</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="system.html">+&nbsp;
		system</a></br/>
		<div id='subitem'>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_application.html'>
			application</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_authlogin.html'>
			authlogin</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_clock.html'>
			clock</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_daemontools.html'>
			daemontools</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_fstools.html'>
			fstools</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_getty.html'>
			getty</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hostname.html'>
			hostname</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hotplug.html'>
			hotplug</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_init.html'>
			init</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_ipsec.html'>
			ipsec</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_iptables.html'>
			iptables</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_iscsi.html'>
			iscsi</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_libraries.html'>
			libraries</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_locallogin.html'>
			locallogin</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_logging.html'>
			logging</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_lvm.html'>
			lvm</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_miscfiles.html'>
			miscfiles</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_modutils.html'>
			modutils</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_mount.html'>
			mount</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_netlabel.html'>
			netlabel</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_pcmcia.html'>
			pcmcia</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_raid.html'>
			raid</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_selinuxutil.html'>
			selinuxutil</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_setrans.html'>
			setrans</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_sysnetwork.html'>
			sysnetwork</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_tzdata.html'>
			tzdata</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_udev.html'>
			udev</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_unconfined.html'>
			unconfined</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_userdomain.html'>
			userdomain</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_virtual.html'>
			virtual</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_xen.html'>
			xen</a><br/>
		
		</div>
	
	<br/><p/>
	<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
	<br/><p/>
	<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
	<p/><br/><p/>
	<a href="index.html">*&nbsp;Layer Index</a>
	<br/><p/>
	<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
	<br/><p/>
	<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>

<div id="Content">
<a name="top":></a>
<h1>Layer: system</h1><p/>
<h2>Module: selinuxutil</h2><p/>

<h3>Description:</h3>

<p><p>Policy for SELinux policy and userland applications.</p></p>



<a name="interfaces"></a>
<h3>Interfaces: </h3>

<a name="link_seutil_create_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_create_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create the SELinux binary policy.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_checkpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_checkpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute checkpolicy in the checkpolicy domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_loadpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute load_policy in the load_policy domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute newrole in the load_policy domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_restorecon"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_restorecon</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecon in the restorecon domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_runinit</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute run_init in the run_init domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_semanage"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_semanage</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute a domain transition to run semanage.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_setfiles</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_read_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_read_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to read the SELinux
userland configuration (/etc/selinux).
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_read_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_read_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
dontaudit Read the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_search_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_search_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the SELinux
configuration directory (/etc/selinux).
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_signal_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_signal_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit the caller attempts to send
a signal to newrole.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_checkpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_checkpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute checkpolicy in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_loadpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute load_policy in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute newrole in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_restorecon"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_restorecon</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecon in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_setfiles</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_get_semanage_read_lock"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_get_semanage_read_lock</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get read lock on module store
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_get_semanage_trans_lock"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_get_semanage_trans_lock</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get trans lock on module store
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_init_script_domtrans_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_init_script_domtrans_runinit</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute init scripts in the run_init domain.
</p>


<h5>Description</h5>
<p>
</p><p>
Execute init scripts in the run_init domain.
This is used for the Gentoo integrated run_init.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_init_script_run_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_init_script_run_runinit</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>


<h5>Description</h5>
<p>
</p><p>
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p><p>
</p><p>
This is used for the Gentoo integrated run_init.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the run_init domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the run_init domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete the SELinux
binary policy.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_config_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_config_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_default_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_default_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete the default_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_module_store"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_module_store</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Full management of the semanage
module store.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_selinux_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_selinux_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_src_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_src_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete SELinux
policy source files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the SELinux binary policy.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the general SELinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_default_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_default_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the default_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_loadpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the load_policy program file.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_src_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_src_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read SELinux policy source files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_relabelto_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_relabelto_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow the caller to relabel a file to the binary policy type.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_checkpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_checkpolicy</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute checkpolicy in the checkpolicy domain, and
allow the specified role the checkpolicy domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the checkpolicy domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the checkpolicy domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_loadpolicy</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute load_policy in the load_policy domain, and
allow the specified role the load_policy domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the load_policy domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the load_policy domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_newrole</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute newrole in the newrole domain, and
allow the specified role the newrole domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the newrole domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the newrole domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_restorecon"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_restorecon</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecon in the restorecon domain, and
allow the specified role the restorecon domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the restorecon domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the restorecon domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_runinit</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute run_init in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the run_init domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the run_init domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_semanage"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_semanage</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the checkpolicy domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the semanage domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_setfiles</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
		
			,
		
		
		
		terminal
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain, and
allow the specified role the setfiles domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the setfiles domain.
</p>
</td><td>
No
</td></tr>

<tr><td>
terminal
</td><td>
<p>
The type of the terminal allow the setfiles domain to use.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_rw_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_rw_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write the general SELinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_rw_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_rw_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_search_default_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_search_default_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Search the policy directory with default_context files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_semanage_domain"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_semanage_domain</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Make the specified domain be a SELinux management gui
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_sigchld_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_sigchld_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a SIGCHLD signal to newrole.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_use_newrole_fds"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_use_newrole_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Inherit and use newrole file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_use_runinit_fds"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_use_runinit_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Inherit and use run_init file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="80%">
<tr><th >Parameter:</td><th >Description:</td><th >Optional:</td></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td><td>
No
</td></tr>

</table>
</div>
</div>


<a href=#top>Return</a>




</div>
</body>
</html>