diff options
author | Guillem Jover <guillem@debian.org> | 2012-11-10 04:32:07 +0100 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2013-02-05 20:14:43 -0500 |
commit | 9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3 (patch) | |
tree | 82958167eedc8ef17dadfa8d33b61ab47724fddd /libselinux/man/man3 | |
parent | 4f289b50ac1aa32e228e06ee0d29e2e472c8a661 (diff) | |
download | android_external_selinux-9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3.tar.gz android_external_selinux-9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3.tar.bz2 android_external_selinux-9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3.zip |
libselinux: man: Add references and man page links to _raw function variants
Signed-off-by: Guillem Jover <guillem@debian.org>
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Dan Walsh <dwalsh@redhat.com>
Diffstat (limited to 'libselinux/man/man3')
38 files changed, 149 insertions, 0 deletions
diff --git a/libselinux/man/man3/fgetfilecon_raw.3 b/libselinux/man/man3/fgetfilecon_raw.3 new file mode 100644 index 00000000..ae6dfcfd --- /dev/null +++ b/libselinux/man/man3/fgetfilecon_raw.3 @@ -0,0 +1 @@ +.so man3/getfilecon.3 diff --git a/libselinux/man/man3/fsetfilecon_raw.3 b/libselinux/man/man3/fsetfilecon_raw.3 new file mode 100644 index 00000000..33c321ac --- /dev/null +++ b/libselinux/man/man3/fsetfilecon_raw.3 @@ -0,0 +1 @@ +.so man3/setfilecon.3 diff --git a/libselinux/man/man3/getcon.3 b/libselinux/man/man3/getcon.3 index f1d3a7f6..239bb7dd 100644 --- a/libselinux/man/man3/getcon.3 +++ b/libselinux/man/man3/getcon.3 @@ -13,17 +13,27 @@ setcon \- set current security context of a process .sp .BI "int getcon(security_context_t *" context ); .sp +.BI "int getcon_raw(security_context_t *" context ); +.sp .BI "int getprevcon(security_context_t *" context ); .sp +.BI "int getprevcon_raw(security_context_t *" context ); +.sp .BI "int getpidcon(pid_t " pid ", security_context_t *" context ); .sp +.BI "int getpidcon_raw(pid_t " pid ", security_context_t *" context ); +.sp .BI "int getpeercon(int " fd ", security_context_t *" context ); .sp +.BI "int getpeercon_raw(int " fd ", security_context_t *" context ); +.sp .BI "void freecon(security_context_t "con ); .sp .BI "void freeconary(security_context_t *" con ); .sp .BI "int setcon(security_context_t " context ); +.sp +.BI "int setcon_raw(security_context_t " context ); . .SH "DESCRIPTION" .BR getcon () @@ -91,6 +101,15 @@ operation, ptrace permission will be revalidated against the new context and the .BR setcon () will fail if it is not allowed by policy. + +.BR getcon_raw (), +.BR getprevcon_raw (), +.BR getpidcon_raw (), +.BR getpeercon_raw () +and +.BR setcon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. . .SH "RETURN VALUE" On error \-1 is returned. On success 0 is returned. diff --git a/libselinux/man/man3/getcon_raw.3 b/libselinux/man/man3/getcon_raw.3 new file mode 100644 index 00000000..1210b5a0 --- /dev/null +++ b/libselinux/man/man3/getcon_raw.3 @@ -0,0 +1 @@ +.so man3/getcon.3 diff --git a/libselinux/man/man3/getexeccon.3 b/libselinux/man/man3/getexeccon.3 index 54fb873a..c188a3a8 100644 --- a/libselinux/man/man3/getexeccon.3 +++ b/libselinux/man/man3/getexeccon.3 @@ -9,8 +9,12 @@ rpm_execcon \- run a helper for rpm in an appropriate security context .sp .BI "int getexeccon(security_context_t *" context ); .sp +.BI "int getexeccon_raw(security_context_t *" context ); +.sp .BI "int setexeccon(security_context_t "context ); .sp +.BI "int setexeccon_raw(security_context_t "context ); +.sp .BI "int rpm_execcon(unsigned int " verified ", const char *" filename ", char *const " argv "[] , char *const " envp "[]); . .SH "DESCRIPTION" @@ -46,6 +50,12 @@ e.g. .BR popen (3), in order to set an exec context for that operation. +.BR getexeccon_raw () +and +.BR setexeccon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. + .B Note: Signal handlers that perform an .BR execve (2) diff --git a/libselinux/man/man3/getexeccon_raw.3 b/libselinux/man/man3/getexeccon_raw.3 new file mode 100644 index 00000000..b2e6ab81 --- /dev/null +++ b/libselinux/man/man3/getexeccon_raw.3 @@ -0,0 +1 @@ +.so man3/getexeccon.3 diff --git a/libselinux/man/man3/getfilecon.3 b/libselinux/man/man3/getfilecon.3 index 8605a0c6..ea79b31f 100644 --- a/libselinux/man/man3/getfilecon.3 +++ b/libselinux/man/man3/getfilecon.3 @@ -7,9 +7,15 @@ getfilecon, fgetfilecon, lgetfilecon \- get SELinux security context of a file .sp .BI "int getfilecon(const char *" path ", security_context_t *" con ); .sp +.BI "int getfilecon_raw(const char *" path ", security_context_t *" con ); +.sp .BI "int lgetfilecon(const char *" path ", security_context_t *" con ); .sp +.BI "int lgetfilecon_raw(const char *" path ", security_context_t *" con ); +.sp .BI "int fgetfilecon(int "fd ", security_context_t *" con ); +.sp +.BI "int fgetfilecon_raw(int "fd ", security_context_t *" con ); . .SH "DESCRIPTION" .BR getfilecon () @@ -29,6 +35,13 @@ only the open file pointed to by filedes (as returned by .BR open (2)) is interrogated in place of path. +.BR getfilecon_raw (), +.BR lgetfilecon_raw () +and +.BR fgetfilecon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. + The returned context should be freed with .BR freecon (3) if non-NULL. diff --git a/libselinux/man/man3/getfilecon_raw.3 b/libselinux/man/man3/getfilecon_raw.3 new file mode 100644 index 00000000..ae6dfcfd --- /dev/null +++ b/libselinux/man/man3/getfilecon_raw.3 @@ -0,0 +1 @@ +.so man3/getfilecon.3 diff --git a/libselinux/man/man3/getfscreatecon.3 b/libselinux/man/man3/getfscreatecon.3 index 1b0f3d16..c7675be1 100644 --- a/libselinux/man/man3/getfscreatecon.3 +++ b/libselinux/man/man3/getfscreatecon.3 @@ -7,7 +7,11 @@ getfscreatecon, setfscreatecon \- get or set the SELinux security context used f .sp .BI "int getfscreatecon(security_context_t *" con ); .sp +.BI "int getfscreatecon_raw(security_context_t *" con ); +.sp .BI "int setfscreatecon(security_context_t "context ); +.sp +.BI "int setfscreatecon_raw(security_context_t "context ); . .SH "DESCRIPTION" .BR getfscreatecon () @@ -33,6 +37,12 @@ can be applied prior to library functions that internally perform an file creation, in order to set an file context on the objects. +.BR getfscreatecon_raw () +and +.BR setfscreatecon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. + .B Note: Signal handlers that perform a .BR setfscreatecon () diff --git a/libselinux/man/man3/getfscreatecon_raw.3 b/libselinux/man/man3/getfscreatecon_raw.3 new file mode 100644 index 00000000..21aeebd4 --- /dev/null +++ b/libselinux/man/man3/getfscreatecon_raw.3 @@ -0,0 +1 @@ +.so man3/getfscreatecon.3 diff --git a/libselinux/man/man3/getkeycreatecon.3 b/libselinux/man/man3/getkeycreatecon.3 index 709be512..d6a118c8 100644 --- a/libselinux/man/man3/getkeycreatecon.3 +++ b/libselinux/man/man3/getkeycreatecon.3 @@ -7,7 +7,11 @@ getkeycreatecon, setkeycreatecon \- get or set the SELinux security context used .sp .BI "int getkeycreatecon(security_context_t *" con ); .sp +.BI "int getkeycreatecon_raw(security_context_t *" con ); +.sp .BI "int setkeycreatecon(security_context_t "context ); +.sp +.BI "int setkeycreatecon_raw(security_context_t "context ); . .SH "DESCRIPTION" .BR getkeycreatecon () @@ -33,6 +37,12 @@ can be applied prior to library functions that internally perform an file creation, in order to set an file context on the objects. +.BR getkeycreatecon_raw () +and +.BR setkeycreatecon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. + .B Note: Signal handlers that perform a .BR setkeycreatecon () diff --git a/libselinux/man/man3/getkeycreatecon_raw.3 b/libselinux/man/man3/getkeycreatecon_raw.3 new file mode 100644 index 00000000..1e0ec5f2 --- /dev/null +++ b/libselinux/man/man3/getkeycreatecon_raw.3 @@ -0,0 +1 @@ +.so man3/getkeycreatecon.3 diff --git a/libselinux/man/man3/getpeercon_raw.3 b/libselinux/man/man3/getpeercon_raw.3 new file mode 100644 index 00000000..1210b5a0 --- /dev/null +++ b/libselinux/man/man3/getpeercon_raw.3 @@ -0,0 +1 @@ +.so man3/getcon.3 diff --git a/libselinux/man/man3/getpidcon_raw.3 b/libselinux/man/man3/getpidcon_raw.3 new file mode 100644 index 00000000..1210b5a0 --- /dev/null +++ b/libselinux/man/man3/getpidcon_raw.3 @@ -0,0 +1 @@ +.so man3/getcon.3 diff --git a/libselinux/man/man3/getprevcon_raw.3 b/libselinux/man/man3/getprevcon_raw.3 new file mode 100644 index 00000000..1210b5a0 --- /dev/null +++ b/libselinux/man/man3/getprevcon_raw.3 @@ -0,0 +1 @@ +.so man3/getcon.3 diff --git a/libselinux/man/man3/getsockcreatecon.3 b/libselinux/man/man3/getsockcreatecon.3 index 8fb2061e..99e94362 100644 --- a/libselinux/man/man3/getsockcreatecon.3 +++ b/libselinux/man/man3/getsockcreatecon.3 @@ -7,7 +7,11 @@ getsockcreatecon, setsockcreatecon \- get or set the SELinux security context us .sp .BI "int getsockcreatecon(security_context_t *" con ); .sp +.BI "int getsockcreatecon_raw(security_context_t *" con ); +.sp .BI "int setsockcreatecon(security_context_t "context ); +.sp +.BI "int setsockcreatecon_raw(security_context_t "context ); . .SH "DESCRIPTION" .BR getsockcreatecon () @@ -33,6 +37,12 @@ can be applied prior to library functions that internally perform an file creation, in order to set an file context on the objects. +.BR getsockcreatecon_raw () +and +.BR setsockcreatecon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. + .B Note: Signal handlers that perform a .BR setsockcreatecon () diff --git a/libselinux/man/man3/getsockcreatecon_raw.3 b/libselinux/man/man3/getsockcreatecon_raw.3 new file mode 100644 index 00000000..ed1a371c --- /dev/null +++ b/libselinux/man/man3/getsockcreatecon_raw.3 @@ -0,0 +1 @@ +.so man3/getsockcreatecon.3 diff --git a/libselinux/man/man3/lgetfilecon_raw.3 b/libselinux/man/man3/lgetfilecon_raw.3 new file mode 100644 index 00000000..ae6dfcfd --- /dev/null +++ b/libselinux/man/man3/lgetfilecon_raw.3 @@ -0,0 +1 @@ +.so man3/getfilecon.3 diff --git a/libselinux/man/man3/lsetfilecon_raw.3 b/libselinux/man/man3/lsetfilecon_raw.3 new file mode 100644 index 00000000..33c321ac --- /dev/null +++ b/libselinux/man/man3/lsetfilecon_raw.3 @@ -0,0 +1 @@ +.so man3/setfilecon.3 diff --git a/libselinux/man/man3/security_check_context.3 b/libselinux/man/man3/security_check_context.3 index 60d571d5..7ba4ead8 100644 --- a/libselinux/man/man3/security_check_context.3 +++ b/libselinux/man/man3/security_check_context.3 @@ -6,11 +6,18 @@ security_check_context \- check the validity of a SELinux context .B #include <selinux/selinux.h> .sp .BI "int security_check_context(security_context_t "con ); +.sp +.BI "int security_check_context_raw(security_context_t "con ); . .SH "DESCRIPTION" .BR security_check_context () returns 0 if SELinux is running and the context is valid, otherwise it returns \-1. + +.BR security_check_context_raw () +behaves identically to +.BR \%security_check_context () +but does not perform context translation. . .SH "SEE ALSO" .BR selinux "(8)" diff --git a/libselinux/man/man3/security_check_context_raw.3 b/libselinux/man/man3/security_check_context_raw.3 new file mode 100644 index 00000000..ee93986e --- /dev/null +++ b/libselinux/man/man3/security_check_context_raw.3 @@ -0,0 +1 @@ +.so man3/security_check_context.3 diff --git a/libselinux/man/man3/security_compute_av.3 b/libselinux/man/man3/security_compute_av.3 index 6034019a..c6837fc3 100644 --- a/libselinux/man/man3/security_compute_av.3 +++ b/libselinux/man/man3/security_compute_av.3 @@ -11,20 +11,36 @@ the SELinux policy database in the kernel .sp .BI "int security_compute_av(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); .sp +.BI "int security_compute_av_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); +.sp .BI "int security_compute_av_flags(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); .sp +.BI "int security_compute_av_flags_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd ); +.sp .BI "int security_compute_create(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon ); .sp +.BI "int security_compute_create_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon ); +.sp .BI "int security_compute_create_name(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", const char *"objname ", security_context_t *" newcon ); .sp +.BI "int security_compute_create_name_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", const char *"objname ", security_context_t *" newcon ); +.sp .BI "int security_compute_relabel(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon ); .sp +.BI "int security_compute_relabel_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon ); +.sp .BI "int security_compute_member(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon ); .sp +.BI "int security_compute_member_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon ); +.sp .BI "int security_compute_user(security_context_t "scon ", const char *" username ", security_context_t **" con ); .sp +.BI "int security_compute_user_raw(security_context_t "scon ", const char *" username ", security_context_t **" con ); +.sp .BI "int security_get_initial_context(const char *" name ", security_context_t " con ); .sp +.BI "int security_get_initial_context_raw(const char *" name ", security_context_t " con ); +.sp .BI "int selinux_check_access(const security_context_t " scon ", const security_context_t " tcon ", const char *" class ", const char *" perm ", void *" auditdata); .sp .BI "int selinux_check_passwd_access(access_vector_t " requested ); @@ -90,6 +106,18 @@ source context. It is mainly used by is used to get the context of a kernel initial security identifier specified by .I name +.BR security_compute_av_raw (), +.BR security_compute_av_flags_raw (), +.BR \%security_compute_create_raw (), +.BR \%security_compute_create_name_raw (), +.BR \%security_compute_relabel_raw (), +.BR \%security_compute_member_raw (), +.BR \%security_compute_user_raw () +and +.BR \%security_get_initial_context_raw () +behave identically to their non-raw counterparts but do not perform context +translation. + .BR selinux_check_access () is used to check if the source context has the access permission for the specified class on the target context. diff --git a/libselinux/man/man3/security_compute_av_flags_raw.3 b/libselinux/man/man3/security_compute_av_flags_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_av_flags_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_compute_av_raw.3 b/libselinux/man/man3/security_compute_av_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_av_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_compute_create_name_raw.3 b/libselinux/man/man3/security_compute_create_name_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_create_name_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_compute_create_raw.3 b/libselinux/man/man3/security_compute_create_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_create_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_compute_member_raw.3 b/libselinux/man/man3/security_compute_member_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_member_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_compute_relabel_raw.3 b/libselinux/man/man3/security_compute_relabel_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_relabel_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_compute_user_raw.3 b/libselinux/man/man3/security_compute_user_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_compute_user_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/security_get_initial_context_raw.3 b/libselinux/man/man3/security_get_initial_context_raw.3 new file mode 100644 index 00000000..a60bca4d --- /dev/null +++ b/libselinux/man/man3/security_get_initial_context_raw.3 @@ -0,0 +1 @@ +.so man3/security_compute_av.3 diff --git a/libselinux/man/man3/selabel_lookup_raw.3 b/libselinux/man/man3/selabel_lookup_raw.3 new file mode 100644 index 00000000..64e003e0 --- /dev/null +++ b/libselinux/man/man3/selabel_lookup_raw.3 @@ -0,0 +1 @@ +.so man3/selabel_lookup.3 diff --git a/libselinux/man/man3/setcon_raw.3 b/libselinux/man/man3/setcon_raw.3 new file mode 100644 index 00000000..1210b5a0 --- /dev/null +++ b/libselinux/man/man3/setcon_raw.3 @@ -0,0 +1 @@ +.so man3/getcon.3 diff --git a/libselinux/man/man3/setexeccon_raw.3 b/libselinux/man/man3/setexeccon_raw.3 new file mode 100644 index 00000000..b2e6ab81 --- /dev/null +++ b/libselinux/man/man3/setexeccon_raw.3 @@ -0,0 +1 @@ +.so man3/getexeccon.3 diff --git a/libselinux/man/man3/setfilecon.3 b/libselinux/man/man3/setfilecon.3 index 7da024ba..5acc9bbd 100644 --- a/libselinux/man/man3/setfilecon.3 +++ b/libselinux/man/man3/setfilecon.3 @@ -7,9 +7,15 @@ setfilecon, fsetfilecon, lsetfilecon \- set SELinux security context of a file .sp .BI "int setfilecon(const char *" path ", security_context_t "con ); .sp +.BI "int setfilecon_raw(const char *" path ", security_context_t "con ); +.sp .BI "int lsetfilecon(const char *" path ", security_context_t "con ); .sp +.BI "int lsetfilecon_raw(const char *" path ", security_context_t "con ); +.sp .BI "int fsetfilecon(int "fd ", security_context_t "con ); +.sp +.BI "int fsetfilecon_raw(int "fd ", security_context_t "con ); . .SH "DESCRIPTION" .BR setfilecon () @@ -24,6 +30,13 @@ is identical to setfilecon, only the open file pointed to by filedes (as returned by .BR open (2)) has it's context set in place of path. + +.BR setfilecon_raw (), +.BR lsetfilecon_raw (), +and +.BR fsetfilecon_raw () +behave identically to their non-raw counterparts but do not perform context +translation. . .SH "RETURN VALUE" On success, zero is returned. On failure, \-1 is returned and diff --git a/libselinux/man/man3/setfilecon_raw.3 b/libselinux/man/man3/setfilecon_raw.3 new file mode 100644 index 00000000..33c321ac --- /dev/null +++ b/libselinux/man/man3/setfilecon_raw.3 @@ -0,0 +1 @@ +.so man3/setfilecon.3 diff --git a/libselinux/man/man3/setfscreatecon_raw.3 b/libselinux/man/man3/setfscreatecon_raw.3 new file mode 100644 index 00000000..21aeebd4 --- /dev/null +++ b/libselinux/man/man3/setfscreatecon_raw.3 @@ -0,0 +1 @@ +.so man3/getfscreatecon.3 diff --git a/libselinux/man/man3/setkeycreatecon_raw.3 b/libselinux/man/man3/setkeycreatecon_raw.3 new file mode 100644 index 00000000..1e0ec5f2 --- /dev/null +++ b/libselinux/man/man3/setkeycreatecon_raw.3 @@ -0,0 +1 @@ +.so man3/getkeycreatecon.3 diff --git a/libselinux/man/man3/setsockcreatecon_raw.3 b/libselinux/man/man3/setsockcreatecon_raw.3 new file mode 100644 index 00000000..ed1a371c --- /dev/null +++ b/libselinux/man/man3/setsockcreatecon_raw.3 @@ -0,0 +1 @@ +.so man3/getsockcreatecon.3 |