Sophie

Sophie

distrib > Fedora > 13 > i386 > media > updates > by-pkgid > b6e83d73630f9ce6548109943a4c0a31 > files > 368

selinux-policy-doc-3.7.19-101.fc13.noarch.rpm

<html>
<head>
<title>
 Security Enhanced Linux Reference Policy
 </title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
	
		<a href="admin.html">+&nbsp;
		admin</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="apps.html">+&nbsp;
		apps</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="kernel.html">+&nbsp;
		kernel</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="roles.html">+&nbsp;
		roles</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="services.html">+&nbsp;
		services</a></br/>
		<div id='subitem'>
		
		</div>
	
		<a href="system.html">+&nbsp;
		system</a></br/>
		<div id='subitem'>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_application.html'>
			application</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_authlogin.html'>
			authlogin</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_clock.html'>
			clock</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_daemontools.html'>
			daemontools</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_fstools.html'>
			fstools</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_getty.html'>
			getty</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hostname.html'>
			hostname</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_hotplug.html'>
			hotplug</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_init.html'>
			init</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_ipsec.html'>
			ipsec</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_iptables.html'>
			iptables</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_iscsi.html'>
			iscsi</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_kdump.html'>
			kdump</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_libraries.html'>
			libraries</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_locallogin.html'>
			locallogin</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_logging.html'>
			logging</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_lvm.html'>
			lvm</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_miscfiles.html'>
			miscfiles</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_modutils.html'>
			modutils</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_mount.html'>
			mount</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_netlabel.html'>
			netlabel</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_pcmcia.html'>
			pcmcia</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_raid.html'>
			raid</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_selinuxutil.html'>
			selinuxutil</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_setrans.html'>
			setrans</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_sosreport.html'>
			sosreport</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_sysnetwork.html'>
			sysnetwork</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_udev.html'>
			udev</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_unconfined.html'>
			unconfined</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_userdomain.html'>
			userdomain</a><br/>
		
			&nbsp;&nbsp;&nbsp;-&nbsp;<a href='system_xen.html'>
			xen</a><br/>
		
		</div>
	
	<br/><p/>
	<a href="global_booleans.html">*&nbsp;Global&nbsp;Booleans&nbsp;</a>
	<br/><p/>
	<a href="global_tunables.html">*&nbsp;Global&nbsp;Tunables&nbsp;</a>
	<p/><br/><p/>
	<a href="index.html">*&nbsp;Layer Index</a>
	<br/><p/>
	<a href="booleans.html">*&nbsp;Boolean&nbsp;Index</a>
	<br/><p/>
	<a href="tunables.html">*&nbsp;Tunable&nbsp;Index</a>
	<br/><p/>
	<a href="interfaces.html">*&nbsp;Interface&nbsp;Index</a>
	<br/><p/>
	<a href="templates.html">*&nbsp;Template&nbsp;Index</a>
</div>

<div id="Content">
<a name="top":></a>
<h1>Layer: system</h1><p/>
<h2>Module: selinuxutil</h2><p/>



<a href=#interfaces>Interfaces</a>


<h3>Description:</h3>

<p><p>Policy for SELinux policy and userland applications.</p></p>


<hr>



<a name="interfaces"></a>
<h3>Interfaces: </h3>

<a name="link_seutil_create_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_create_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create the SELinux binary policy.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_checkpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_checkpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute checkpolicy in the checkpolicy domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_loadpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute load_policy in the load_policy domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute newrole in the newole domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_restorecon"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_restorecon</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecon in the restorecon domain.  (Deprecated)
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_runinit</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute run_init in the run_init domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_semanage"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_semanage</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute a domain transition to run semanage.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_setfiles</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_setfiles_mac"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_setfiles_mac</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_domtrans_setsebool"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_domtrans_setsebool</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute a domain transition to run setsebool.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_libselinux_linked"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_libselinux_linked</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit SELinux-enabled program access for
libselinux-linked programs.
</p>


<h5>Description</h5>
<p>
</p><p>
SELinux-enabled programs are typically
linked to the libselinux library.  This
interface will dontaudit access required for
the libselinux constructor to function.
</p><p>
</p><p>
Generally this should not be used on anything
but simple SELinux-enabled programs that do not
rely on data initialized by the libselinux
constructor.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_read_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_read_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to read the SELinux
userland configuration (/etc/selinux).
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_read_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_read_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to read the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_search_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_search_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to search the SELinux
configuration directory (/etc/selinux).
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_signal_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_signal_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit the caller attempts to send
a signal to newrole.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_dontaudit_use_newrole_fds"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_dontaudit_use_newrole_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Do not audit attempts to inherit and use
newrole file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_checkpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_checkpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute checkpolicy in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_loadpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute load_policy in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute newrole in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_restorecon"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_restorecon</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecon in the caller domain.  (Deprecated)
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_restorecond"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_restorecond</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecond in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_exec_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_exec_setfiles</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the caller domain.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_get_semanage_read_lock"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_get_semanage_read_lock</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get read lock on module store
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_get_semanage_trans_lock"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_get_semanage_trans_lock</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Get trans lock on module store
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_init_script_domtrans_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_init_script_domtrans_runinit</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute init scripts in the run_init domain.
</p>


<h5>Description</h5>
<p>
</p><p>
Execute init scripts in the run_init domain.
This is used for the Gentoo integrated run_init.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_init_script_run_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_init_script_run_runinit</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>


<h5>Description</h5>
<p>
</p><p>
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p><p>
</p><p>
This is used for the Gentoo integrated run_init.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the run_init domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_libselinux_linked"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_libselinux_linked</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
SELinux-enabled program access for
libselinux-linked programs.
</p>


<h5>Description</h5>
<p>
</p><p>
SELinux-enabled programs are typically
linked to the libselinux library.  This
interface will allow access required for
the libselinux constructor to function.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete the SELinux
binary policy.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_config_dirs"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_config_dirs</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_default_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_default_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete the default_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_module_store"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_module_store</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Full management of the semanage
module store.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_selinux_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_selinux_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.  (Deprecated)
</p>


<h5>Description</h5>
<p>
</p><p>
Create, read, write, and delete
the general selinux configuration files.
</p><p>
</p><p>
This interface has been deprecated, please
use the seutil_manage_config() interface instead.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_manage_src_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_manage_src_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Create, read, write, and delete SELinux
policy source files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the SELinux binary policy.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the general SELinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_default_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_default_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the default_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_loadpolicy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read the load_policy program file.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_module_store"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_module_store</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Full management of the semanage
module store.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_read_src_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_read_src_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read SELinux policy source files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_relabelto_bin_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_relabelto_bin_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow the caller to relabel a file to the binary policy type.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_role_allow_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_role_allow_setfiles</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Allow access for a role to setfiles_t private type
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the setfiles domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_checkpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_checkpolicy</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute checkpolicy in the checkpolicy domain, and
allow the specified role the checkpolicy domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the checkpolicy domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_loadpolicy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_loadpolicy</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute load_policy in the load_policy domain, and
allow the specified role the load_policy domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the load_policy domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_newrole</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute newrole in the newrole domain, and
allow the specified role the newrole domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the newrole domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_restorecon"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_restorecon</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute restorecon in the restorecon domain, and
allow the specified role the restorecon domain,
and use the caller's terminal.  (Deprecated)
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the restorecon domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_runinit"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_runinit</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute run_init in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the run_init domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_semanage"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_semanage</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the semanage domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_setfiles</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain, and
allow the specified role the setfiles domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the setfiles domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_setfiles_mac"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_setfiles_mac</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setfiles in the setfiles_mac domain, and
allow the specified role the setfiles_mac domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the setfiles_mac domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_run_setsebool"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_run_setsebool</b>(
	
		
		
		
		domain
		
	
		
			,
		
		
		
		role
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Execute setsebool in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

<tr><td>
role
</td><td>
<p>
The role to be allowed the setsebool domain.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_rw_config"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_rw_config</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write the general SELinux configuration files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_rw_file_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_rw_file_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Read and write the file_contexts files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_search_default_contexts"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_search_default_contexts</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Search the policy directory with default_context files.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_semanage_policy"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_semanage_policy</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
All rules necessary to run semanage command
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_setfiles"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_setfiles</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
All rules necessary to run setfiles command
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_sigchld_newrole"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_sigchld_newrole</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Send a SIGCHLD signal to newrole.
</p>


<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to send a SIGCHLD
signal to newrole.  This signal is automatically
sent from a process that is terminating to
its parent.  This may be needed by domains
that are executed from newrole.
</p><p>
</p>

<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_use_newrole_fds"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_use_newrole_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Inherit and use newrole file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>

<a name="link_seutil_use_runinit_fds"></a>
<div id="interface">


<div id="codeblock">

<b>seutil_use_runinit_fds</b>(
	
		
		
		
		domain
		
	
	)<br>
</div>
<div id="description">

<h5>Summary</h5>
<p>
Inherit and use run_init file descriptors.
</p>


<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>

<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>

</table>
</div>
</div>


<a href=#top>Return</a>




</div>
</body>
</html>