<html> <head> <title> Security Enhanced Linux Reference Policy </title> <style type="text/css" media="all">@import "style.css";</style> </head> <body> <div id="Header">Security Enhanced Linux Reference Policy</div> <div id='Menu'> <a href="admin.html">+ admin</a></br/> <div id='subitem'> </div> <a href="apps.html">+ apps</a></br/> <div id='subitem'> </div> <a href="contrib.html">+ contrib</a></br/> <div id='subitem'> </div> <a href="kernel.html">+ kernel</a></br/> <div id='subitem'> </div> <a href="roles.html">+ roles</a></br/> <div id='subitem'> </div> <a href="services.html">+ services</a></br/> <div id='subitem'> </div> <a href="system.html">+ system</a></br/> <div id='subitem'> - <a href='system_application.html'> application</a><br/> - <a href='system_authlogin.html'> authlogin</a><br/> - <a href='system_clock.html'> clock</a><br/> - <a href='system_fstools.html'> fstools</a><br/> - <a href='system_getty.html'> getty</a><br/> - <a href='system_hostname.html'> hostname</a><br/> - <a href='system_hotplug.html'> hotplug</a><br/> - <a href='system_init.html'> init</a><br/> - <a href='system_ipsec.html'> ipsec</a><br/> - <a href='system_iptables.html'> iptables</a><br/> - <a href='system_kdbus.html'> kdbus</a><br/> - <a href='system_libraries.html'> libraries</a><br/> - <a href='system_locallogin.html'> locallogin</a><br/> - <a href='system_logging.html'> logging</a><br/> - <a href='system_lvm.html'> lvm</a><br/> - <a href='system_miscfiles.html'> miscfiles</a><br/> - <a href='system_modutils.html'> modutils</a><br/> - <a href='system_mount.html'> mount</a><br/> - <a href='system_netlabel.html'> netlabel</a><br/> - <a href='system_selinuxutil.html'> selinuxutil</a><br/> - <a href='system_setrans.html'> setrans</a><br/> - <a href='system_sysnetwork.html'> sysnetwork</a><br/> - <a href='system_systemd.html'> systemd</a><br/> - <a href='system_udev.html'> udev</a><br/> - <a href='system_unconfined.html'> unconfined</a><br/> - <a href='system_userdomain.html'> userdomain</a><br/> </div> <br/><p/> <a href="global_booleans.html">* Global Booleans </a> <br/><p/> <a href="global_tunables.html">* Global Tunables </a> <p/><br/><p/> <a href="index.html">* Layer Index</a> <br/><p/> <a href="booleans.html">* Boolean Index</a> <br/><p/> <a href="tunables.html">* Tunable Index</a> <br/><p/> <a href="interfaces.html">* Interface Index</a> <br/><p/> <a href="templates.html">* Template Index</a> </div> <div id="Content"> <a name="top":></a> <h1>Layer: system</h1><p/> <h2>Module: selinuxutil</h2><p/> <a href=#interfaces>Interfaces</a> <h3>Description:</h3> <p><p>Policy for SELinux policy and userland applications.</p></p> <hr> <a name="interfaces"></a> <h3>Interfaces: </h3> <a name="link_seutil_access_check_load_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_access_check_load_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Allow access check on load_policy. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_access_check_module_store"></a> <div id="interface"> <div id="codeblock"> <b>seutil_access_check_module_store</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> List of the semanage module store. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_access_check_setfiles"></a> <div id="interface"> <div id="codeblock"> <b>seutil_access_check_setfiles</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Allow access check on setfiles. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_create_bin_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_create_bin_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create the SELinux binary policy. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dbus_chat_semanage"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dbus_chat_semanage</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send and receive messages from semanage dbus server over dbus. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_checkpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_checkpolicy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute checkpolicy in the checkpolicy domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_loadpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_loadpolicy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute load_policy in the load_policy domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_newrole"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_newrole</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute newrole in the newole domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_restorecon"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_restorecon</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute restorecon in the restorecon domain. (Deprecated) </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_runinit"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_runinit</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute run_init in the run_init domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_semanage"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_semanage</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute a domain transition to run semanage. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_setfiles"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_setfiles</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute setfiles in the setfiles domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_setfiles_mac"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_setfiles_mac</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute setfiles in the setfiles domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_domtrans_setsebool"></a> <div id="interface"> <div id="codeblock"> <b>seutil_domtrans_setsebool</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute a domain transition to run setsebool. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_access_check_load_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_access_check_load_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Dontaudit access check on load_policy. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_access_check_semanage_module_store"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_access_check_semanage_module_store</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Dontaudit access check on module store </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_access_check_semanage_read_lock"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_access_check_semanage_read_lock</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Dontaudit access check on module store </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_access_check_setfiles"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_access_check_setfiles</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Dontaudit access check on setfiles. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_libselinux_linked"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_libselinux_linked</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit SELinux-enabled program access for libselinux-linked programs. </p> <h5>Description</h5> <p> </p><p> SELinux-enabled programs are typically linked to the libselinux library. This interface will dontaudit access required for the libselinux constructor to function. </p><p> </p><p> Generally this should not be used on anything but simple SELinux-enabled programs that do not rely on data initialized by the libselinux constructor. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_read_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_read_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read the SELinux userland configuration (/etc/selinux). </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_read_file_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_read_file_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read the file_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_read_login_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_read_login_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to read the SELinux login configuration. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_search_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_search_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to search the SELinux configuration directory (/etc/selinux). </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_search_login_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_search_login_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to search the SELinux login configuration directory. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_signal_newrole"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_signal_newrole</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit the caller attempts to send a signal to newrole. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_dontaudit_use_newrole_fds"></a> <div id="interface"> <div id="codeblock"> <b>seutil_dontaudit_use_newrole_fds</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Do not audit attempts to inherit and use newrole file descriptors. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain to not audit. </p> </td></tr> </table> </div> </div> <a name="link_seutil_exec_checkpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_exec_checkpolicy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute checkpolicy in the caller domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_exec_loadpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_exec_loadpolicy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute load_policy in the caller domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_exec_newrole"></a> <div id="interface"> <div id="codeblock"> <b>seutil_exec_newrole</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute newrole in the caller domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_exec_restorecon"></a> <div id="interface"> <div id="codeblock"> <b>seutil_exec_restorecon</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute restorecon in the caller domain. (Deprecated) </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_exec_restorecond"></a> <div id="interface"> <div id="codeblock"> <b>seutil_exec_restorecond</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute restorecond in the caller domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_exec_setfiles"></a> <div id="interface"> <div id="codeblock"> <b>seutil_exec_setfiles</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute setfiles in the caller domain. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_filetrans_named_content"></a> <div id="interface"> <div id="codeblock"> <b>seutil_filetrans_named_content</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> File name transition for selinux utility content </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_get_semanage_read_lock"></a> <div id="interface"> <div id="codeblock"> <b>seutil_get_semanage_read_lock</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get read lock on module store </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_get_semanage_trans_lock"></a> <div id="interface"> <div id="codeblock"> <b>seutil_get_semanage_trans_lock</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Get trans lock on module store </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_init_script_domtrans_runinit"></a> <div id="interface"> <div id="codeblock"> <b>seutil_init_script_domtrans_runinit</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute init scripts in the run_init domain. </p> <h5>Description</h5> <p> </p><p> Execute init scripts in the run_init domain. This is used for the Gentoo integrated run_init. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> </table> </div> </div> <a name="link_seutil_init_script_run_runinit"></a> <div id="interface"> <div id="codeblock"> <b>seutil_init_script_run_runinit</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. </p> <h5>Description</h5> <p> </p><p> Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. </p><p> </p><p> This is used for the Gentoo integrated run_init. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_libselinux_linked"></a> <div id="interface"> <div id="codeblock"> <b>seutil_libselinux_linked</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> SELinux-enabled program access for libselinux-linked programs. </p> <h5>Description</h5> <p> </p><p> SELinux-enabled programs are typically linked to the libselinux library. This interface will allow access required for the libselinux constructor to function. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_bin_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_bin_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the SELinux binary policy. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the general selinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_config_dirs"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_config_dirs</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the general selinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_default_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_default_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the default_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_file_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_file_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the file_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_login_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_login_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the general selinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_login_config_files"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_login_config_files</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> manage the login selinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_module_store"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_module_store</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Full management of the semanage module store. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_selinux_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_selinux_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the general selinux configuration files. (Deprecated) </p> <h5>Description</h5> <p> </p><p> Create, read, write, and delete the general selinux configuration files. </p><p> </p><p> This interface has been deprecated, please use the seutil_manage_config() interface instead. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_manage_src_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_manage_src_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete SELinux policy source files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_bin_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_bin_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the SELinux binary policy. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the general SELinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_default_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_default_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the default_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_file_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_file_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the file_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_loadpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_loadpolicy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the load_policy program file. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_login_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_login_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read the SELinux login configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_module_store"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_module_store</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Full management of the semanage module store. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_read_src_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_read_src_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read SELinux policy source files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_relabelto_bin_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_relabelto_bin_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Allow the caller to relabel a file to the binary policy type. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_checkpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_checkpolicy</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute checkpolicy in the checkpolicy domain, and allow the specified role the checkpolicy domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_loadpolicy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_loadpolicy</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute load_policy in the load_policy domain, and allow the specified role the load_policy domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_newrole"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_newrole</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute newrole in the newrole domain, and allow the specified role the newrole domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_restorecon"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_restorecon</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute restorecon in the restorecon domain, and allow the specified role the restorecon domain, and use the caller's terminal. (Deprecated) </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_runinit"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_runinit</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute run_init in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_semanage"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_semanage</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute semanage in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_setfiles"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_setfiles</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute setfiles in the setfiles domain, and allow the specified role the setfiles domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed to transition. </p> </td></tr> <tr><td> role </td><td> <p> Role allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_setfiles_mac"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_setfiles_mac</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute setfiles in the setfiles_mac domain, and allow the specified role the setfiles_mac domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> <tr><td> role </td><td> <p> The role to be allowed the setfiles_mac domain. </p> </td></tr> </table> </div> </div> <a name="link_seutil_run_setsebool"></a> <div id="interface"> <div id="codeblock"> <b>seutil_run_setsebool</b>( domain , role )<br> </div> <div id="description"> <h5>Summary</h5> <p> Execute setsebool in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> <tr><td> role </td><td> <p> The role to be allowed the setsebool domain. </p> </td></tr> </table> </div> </div> <a name="link_seutil_rw_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_rw_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read and write the general SELinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_rw_default_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_rw_default_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read and write the default_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_rw_file_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_rw_file_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read and write the file_contexts files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_rw_login_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_rw_login_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Read and write the SELinux login configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_rw_login_config_dirs"></a> <div id="interface"> <div id="codeblock"> <b>seutil_rw_login_config_dirs</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Create, read, write, and delete the general selinux configuration files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_search_config"></a> <div id="interface"> <div id="codeblock"> <b>seutil_search_config</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Allow attempts to search the SELinux configuration directory (/etc/selinux). </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_search_default_contexts"></a> <div id="interface"> <div id="codeblock"> <b>seutil_search_default_contexts</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Search the policy directory with default_context files. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_semanage_policy"></a> <div id="interface"> <div id="codeblock"> <b>seutil_semanage_policy</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> All rules necessary to run semanage command </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_setfiles"></a> <div id="interface"> <div id="codeblock"> <b>seutil_setfiles</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> All rules necessary to run setfiles command </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_sigchld_newrole"></a> <div id="interface"> <div id="codeblock"> <b>seutil_sigchld_newrole</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Send a SIGCHLD signal to newrole. </p> <h5>Description</h5> <p> </p><p> Allow the specified domain to send a SIGCHLD signal to newrole. This signal is automatically sent from a process that is terminating to its parent. This may be needed by domains that are executed from newrole. </p><p> </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_use_newrole_fds"></a> <div id="interface"> <div id="codeblock"> <b>seutil_use_newrole_fds</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Inherit and use newrole file descriptors. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a name="link_seutil_use_runinit_fds"></a> <div id="interface"> <div id="codeblock"> <b>seutil_use_runinit_fds</b>( domain )<br> </div> <div id="description"> <h5>Summary</h5> <p> Inherit and use run_init file descriptors. </p> <h5>Parameters</h5> <table border="1" cellspacing="0" cellpadding="3" width="65%"> <tr><th >Parameter:</th><th >Description:</th></tr> <tr><td> domain </td><td> <p> Domain allowed access. </p> </td></tr> </table> </div> </div> <a href=#top>Return</a> </div> </body> </html>