aboutsummaryrefslogtreecommitdiffstats
path: root/libselinux/man/man3
diff options
context:
space:
mode:
authorGuillem Jover <guillem@debian.org>2012-11-10 04:32:07 +0100
committerEric Paris <eparis@redhat.com>2013-02-05 20:14:43 -0500
commit9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3 (patch)
tree82958167eedc8ef17dadfa8d33b61ab47724fddd /libselinux/man/man3
parent4f289b50ac1aa32e228e06ee0d29e2e472c8a661 (diff)
downloadandroid_external_selinux-9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3.tar.gz
android_external_selinux-9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3.tar.bz2
android_external_selinux-9acdd37989ce2bd3c239a7c14a9f7a7a9bb971e3.zip
libselinux: man: Add references and man page links to _raw function variants
Signed-off-by: Guillem Jover <guillem@debian.org> Signed-off-by: Eric Paris <eparis@redhat.com> Acked-by: Dan Walsh <dwalsh@redhat.com>
Diffstat (limited to 'libselinux/man/man3')
-rw-r--r--libselinux/man/man3/fgetfilecon_raw.31
-rw-r--r--libselinux/man/man3/fsetfilecon_raw.31
-rw-r--r--libselinux/man/man3/getcon.319
-rw-r--r--libselinux/man/man3/getcon_raw.31
-rw-r--r--libselinux/man/man3/getexeccon.310
-rw-r--r--libselinux/man/man3/getexeccon_raw.31
-rw-r--r--libselinux/man/man3/getfilecon.313
-rw-r--r--libselinux/man/man3/getfilecon_raw.31
-rw-r--r--libselinux/man/man3/getfscreatecon.310
-rw-r--r--libselinux/man/man3/getfscreatecon_raw.31
-rw-r--r--libselinux/man/man3/getkeycreatecon.310
-rw-r--r--libselinux/man/man3/getkeycreatecon_raw.31
-rw-r--r--libselinux/man/man3/getpeercon_raw.31
-rw-r--r--libselinux/man/man3/getpidcon_raw.31
-rw-r--r--libselinux/man/man3/getprevcon_raw.31
-rw-r--r--libselinux/man/man3/getsockcreatecon.310
-rw-r--r--libselinux/man/man3/getsockcreatecon_raw.31
-rw-r--r--libselinux/man/man3/lgetfilecon_raw.31
-rw-r--r--libselinux/man/man3/lsetfilecon_raw.31
-rw-r--r--libselinux/man/man3/security_check_context.37
-rw-r--r--libselinux/man/man3/security_check_context_raw.31
-rw-r--r--libselinux/man/man3/security_compute_av.328
-rw-r--r--libselinux/man/man3/security_compute_av_flags_raw.31
-rw-r--r--libselinux/man/man3/security_compute_av_raw.31
-rw-r--r--libselinux/man/man3/security_compute_create_name_raw.31
-rw-r--r--libselinux/man/man3/security_compute_create_raw.31
-rw-r--r--libselinux/man/man3/security_compute_member_raw.31
-rw-r--r--libselinux/man/man3/security_compute_relabel_raw.31
-rw-r--r--libselinux/man/man3/security_compute_user_raw.31
-rw-r--r--libselinux/man/man3/security_get_initial_context_raw.31
-rw-r--r--libselinux/man/man3/selabel_lookup_raw.31
-rw-r--r--libselinux/man/man3/setcon_raw.31
-rw-r--r--libselinux/man/man3/setexeccon_raw.31
-rw-r--r--libselinux/man/man3/setfilecon.313
-rw-r--r--libselinux/man/man3/setfilecon_raw.31
-rw-r--r--libselinux/man/man3/setfscreatecon_raw.31
-rw-r--r--libselinux/man/man3/setkeycreatecon_raw.31
-rw-r--r--libselinux/man/man3/setsockcreatecon_raw.31
38 files changed, 149 insertions, 0 deletions
diff --git a/libselinux/man/man3/fgetfilecon_raw.3 b/libselinux/man/man3/fgetfilecon_raw.3
new file mode 100644
index 00000000..ae6dfcfd
--- /dev/null
+++ b/libselinux/man/man3/fgetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfilecon.3
diff --git a/libselinux/man/man3/fsetfilecon_raw.3 b/libselinux/man/man3/fsetfilecon_raw.3
new file mode 100644
index 00000000..33c321ac
--- /dev/null
+++ b/libselinux/man/man3/fsetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/setfilecon.3
diff --git a/libselinux/man/man3/getcon.3 b/libselinux/man/man3/getcon.3
index f1d3a7f6..239bb7dd 100644
--- a/libselinux/man/man3/getcon.3
+++ b/libselinux/man/man3/getcon.3
@@ -13,17 +13,27 @@ setcon \- set current security context of a process
.sp
.BI "int getcon(security_context_t *" context );
.sp
+.BI "int getcon_raw(security_context_t *" context );
+.sp
.BI "int getprevcon(security_context_t *" context );
.sp
+.BI "int getprevcon_raw(security_context_t *" context );
+.sp
.BI "int getpidcon(pid_t " pid ", security_context_t *" context );
.sp
+.BI "int getpidcon_raw(pid_t " pid ", security_context_t *" context );
+.sp
.BI "int getpeercon(int " fd ", security_context_t *" context );
.sp
+.BI "int getpeercon_raw(int " fd ", security_context_t *" context );
+.sp
.BI "void freecon(security_context_t "con );
.sp
.BI "void freeconary(security_context_t *" con );
.sp
.BI "int setcon(security_context_t " context );
+.sp
+.BI "int setcon_raw(security_context_t " context );
.
.SH "DESCRIPTION"
.BR getcon ()
@@ -91,6 +101,15 @@ operation, ptrace permission will be revalidated against the new
context and the
.BR setcon ()
will fail if it is not allowed by policy.
+
+.BR getcon_raw (),
+.BR getprevcon_raw (),
+.BR getpidcon_raw (),
+.BR getpeercon_raw ()
+and
+.BR setcon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
.
.SH "RETURN VALUE"
On error \-1 is returned. On success 0 is returned.
diff --git a/libselinux/man/man3/getcon_raw.3 b/libselinux/man/man3/getcon_raw.3
new file mode 100644
index 00000000..1210b5a0
--- /dev/null
+++ b/libselinux/man/man3/getcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getexeccon.3 b/libselinux/man/man3/getexeccon.3
index 54fb873a..c188a3a8 100644
--- a/libselinux/man/man3/getexeccon.3
+++ b/libselinux/man/man3/getexeccon.3
@@ -9,8 +9,12 @@ rpm_execcon \- run a helper for rpm in an appropriate security context
.sp
.BI "int getexeccon(security_context_t *" context );
.sp
+.BI "int getexeccon_raw(security_context_t *" context );
+.sp
.BI "int setexeccon(security_context_t "context );
.sp
+.BI "int setexeccon_raw(security_context_t "context );
+.sp
.BI "int rpm_execcon(unsigned int " verified ", const char *" filename ", char *const " argv "[] , char *const " envp "[]);
.
.SH "DESCRIPTION"
@@ -46,6 +50,12 @@ e.g.
.BR popen (3),
in order to set an exec context for that operation.
+.BR getexeccon_raw ()
+and
+.BR setexeccon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
.B Note:
Signal handlers that perform an
.BR execve (2)
diff --git a/libselinux/man/man3/getexeccon_raw.3 b/libselinux/man/man3/getexeccon_raw.3
new file mode 100644
index 00000000..b2e6ab81
--- /dev/null
+++ b/libselinux/man/man3/getexeccon_raw.3
@@ -0,0 +1 @@
+.so man3/getexeccon.3
diff --git a/libselinux/man/man3/getfilecon.3 b/libselinux/man/man3/getfilecon.3
index 8605a0c6..ea79b31f 100644
--- a/libselinux/man/man3/getfilecon.3
+++ b/libselinux/man/man3/getfilecon.3
@@ -7,9 +7,15 @@ getfilecon, fgetfilecon, lgetfilecon \- get SELinux security context of a file
.sp
.BI "int getfilecon(const char *" path ", security_context_t *" con );
.sp
+.BI "int getfilecon_raw(const char *" path ", security_context_t *" con );
+.sp
.BI "int lgetfilecon(const char *" path ", security_context_t *" con );
.sp
+.BI "int lgetfilecon_raw(const char *" path ", security_context_t *" con );
+.sp
.BI "int fgetfilecon(int "fd ", security_context_t *" con );
+.sp
+.BI "int fgetfilecon_raw(int "fd ", security_context_t *" con );
.
.SH "DESCRIPTION"
.BR getfilecon ()
@@ -29,6 +35,13 @@ only the open file pointed to by filedes (as returned by
.BR open (2))
is interrogated in place of path.
+.BR getfilecon_raw (),
+.BR lgetfilecon_raw ()
+and
+.BR fgetfilecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
The returned context should be freed with
.BR freecon (3)
if non-NULL.
diff --git a/libselinux/man/man3/getfilecon_raw.3 b/libselinux/man/man3/getfilecon_raw.3
new file mode 100644
index 00000000..ae6dfcfd
--- /dev/null
+++ b/libselinux/man/man3/getfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfilecon.3
diff --git a/libselinux/man/man3/getfscreatecon.3 b/libselinux/man/man3/getfscreatecon.3
index 1b0f3d16..c7675be1 100644
--- a/libselinux/man/man3/getfscreatecon.3
+++ b/libselinux/man/man3/getfscreatecon.3
@@ -7,7 +7,11 @@ getfscreatecon, setfscreatecon \- get or set the SELinux security context used f
.sp
.BI "int getfscreatecon(security_context_t *" con );
.sp
+.BI "int getfscreatecon_raw(security_context_t *" con );
+.sp
.BI "int setfscreatecon(security_context_t "context );
+.sp
+.BI "int setfscreatecon_raw(security_context_t "context );
.
.SH "DESCRIPTION"
.BR getfscreatecon ()
@@ -33,6 +37,12 @@ can be applied prior to library
functions that internally perform an file creation,
in order to set an file context on the objects.
+.BR getfscreatecon_raw ()
+and
+.BR setfscreatecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
.B Note:
Signal handlers that perform a
.BR setfscreatecon ()
diff --git a/libselinux/man/man3/getfscreatecon_raw.3 b/libselinux/man/man3/getfscreatecon_raw.3
new file mode 100644
index 00000000..21aeebd4
--- /dev/null
+++ b/libselinux/man/man3/getfscreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfscreatecon.3
diff --git a/libselinux/man/man3/getkeycreatecon.3 b/libselinux/man/man3/getkeycreatecon.3
index 709be512..d6a118c8 100644
--- a/libselinux/man/man3/getkeycreatecon.3
+++ b/libselinux/man/man3/getkeycreatecon.3
@@ -7,7 +7,11 @@ getkeycreatecon, setkeycreatecon \- get or set the SELinux security context used
.sp
.BI "int getkeycreatecon(security_context_t *" con );
.sp
+.BI "int getkeycreatecon_raw(security_context_t *" con );
+.sp
.BI "int setkeycreatecon(security_context_t "context );
+.sp
+.BI "int setkeycreatecon_raw(security_context_t "context );
.
.SH "DESCRIPTION"
.BR getkeycreatecon ()
@@ -33,6 +37,12 @@ can be applied prior to library
functions that internally perform an file creation,
in order to set an file context on the objects.
+.BR getkeycreatecon_raw ()
+and
+.BR setkeycreatecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
.B Note:
Signal handlers that perform a
.BR setkeycreatecon ()
diff --git a/libselinux/man/man3/getkeycreatecon_raw.3 b/libselinux/man/man3/getkeycreatecon_raw.3
new file mode 100644
index 00000000..1e0ec5f2
--- /dev/null
+++ b/libselinux/man/man3/getkeycreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getkeycreatecon.3
diff --git a/libselinux/man/man3/getpeercon_raw.3 b/libselinux/man/man3/getpeercon_raw.3
new file mode 100644
index 00000000..1210b5a0
--- /dev/null
+++ b/libselinux/man/man3/getpeercon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getpidcon_raw.3 b/libselinux/man/man3/getpidcon_raw.3
new file mode 100644
index 00000000..1210b5a0
--- /dev/null
+++ b/libselinux/man/man3/getpidcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getprevcon_raw.3 b/libselinux/man/man3/getprevcon_raw.3
new file mode 100644
index 00000000..1210b5a0
--- /dev/null
+++ b/libselinux/man/man3/getprevcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getsockcreatecon.3 b/libselinux/man/man3/getsockcreatecon.3
index 8fb2061e..99e94362 100644
--- a/libselinux/man/man3/getsockcreatecon.3
+++ b/libselinux/man/man3/getsockcreatecon.3
@@ -7,7 +7,11 @@ getsockcreatecon, setsockcreatecon \- get or set the SELinux security context us
.sp
.BI "int getsockcreatecon(security_context_t *" con );
.sp
+.BI "int getsockcreatecon_raw(security_context_t *" con );
+.sp
.BI "int setsockcreatecon(security_context_t "context );
+.sp
+.BI "int setsockcreatecon_raw(security_context_t "context );
.
.SH "DESCRIPTION"
.BR getsockcreatecon ()
@@ -33,6 +37,12 @@ can be applied prior to library
functions that internally perform an file creation,
in order to set an file context on the objects.
+.BR getsockcreatecon_raw ()
+and
+.BR setsockcreatecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
.B Note:
Signal handlers that perform a
.BR setsockcreatecon ()
diff --git a/libselinux/man/man3/getsockcreatecon_raw.3 b/libselinux/man/man3/getsockcreatecon_raw.3
new file mode 100644
index 00000000..ed1a371c
--- /dev/null
+++ b/libselinux/man/man3/getsockcreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getsockcreatecon.3
diff --git a/libselinux/man/man3/lgetfilecon_raw.3 b/libselinux/man/man3/lgetfilecon_raw.3
new file mode 100644
index 00000000..ae6dfcfd
--- /dev/null
+++ b/libselinux/man/man3/lgetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfilecon.3
diff --git a/libselinux/man/man3/lsetfilecon_raw.3 b/libselinux/man/man3/lsetfilecon_raw.3
new file mode 100644
index 00000000..33c321ac
--- /dev/null
+++ b/libselinux/man/man3/lsetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/setfilecon.3
diff --git a/libselinux/man/man3/security_check_context.3 b/libselinux/man/man3/security_check_context.3
index 60d571d5..7ba4ead8 100644
--- a/libselinux/man/man3/security_check_context.3
+++ b/libselinux/man/man3/security_check_context.3
@@ -6,11 +6,18 @@ security_check_context \- check the validity of a SELinux context
.B #include <selinux/selinux.h>
.sp
.BI "int security_check_context(security_context_t "con );
+.sp
+.BI "int security_check_context_raw(security_context_t "con );
.
.SH "DESCRIPTION"
.BR security_check_context ()
returns 0 if SELinux is running and the context is valid, otherwise it
returns \-1.
+
+.BR security_check_context_raw ()
+behaves identically to
+.BR \%security_check_context ()
+but does not perform context translation.
.
.SH "SEE ALSO"
.BR selinux "(8)"
diff --git a/libselinux/man/man3/security_check_context_raw.3 b/libselinux/man/man3/security_check_context_raw.3
new file mode 100644
index 00000000..ee93986e
--- /dev/null
+++ b/libselinux/man/man3/security_check_context_raw.3
@@ -0,0 +1 @@
+.so man3/security_check_context.3
diff --git a/libselinux/man/man3/security_compute_av.3 b/libselinux/man/man3/security_compute_av.3
index 6034019a..c6837fc3 100644
--- a/libselinux/man/man3/security_compute_av.3
+++ b/libselinux/man/man3/security_compute_av.3
@@ -11,20 +11,36 @@ the SELinux policy database in the kernel
.sp
.BI "int security_compute_av(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
.sp
+.BI "int security_compute_av_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
+.sp
.BI "int security_compute_av_flags(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
.sp
+.BI "int security_compute_av_flags_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
+.sp
.BI "int security_compute_create(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
.sp
+.BI "int security_compute_create_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
+.sp
.BI "int security_compute_create_name(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", const char *"objname ", security_context_t *" newcon );
.sp
+.BI "int security_compute_create_name_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", const char *"objname ", security_context_t *" newcon );
+.sp
.BI "int security_compute_relabel(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
.sp
+.BI "int security_compute_relabel_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
+.sp
.BI "int security_compute_member(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
.sp
+.BI "int security_compute_member_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
+.sp
.BI "int security_compute_user(security_context_t "scon ", const char *" username ", security_context_t **" con );
.sp
+.BI "int security_compute_user_raw(security_context_t "scon ", const char *" username ", security_context_t **" con );
+.sp
.BI "int security_get_initial_context(const char *" name ", security_context_t " con );
.sp
+.BI "int security_get_initial_context_raw(const char *" name ", security_context_t " con );
+.sp
.BI "int selinux_check_access(const security_context_t " scon ", const security_context_t " tcon ", const char *" class ", const char *" perm ", void *" auditdata);
.sp
.BI "int selinux_check_passwd_access(access_vector_t " requested );
@@ -90,6 +106,18 @@ source context. It is mainly used by
is used to get the context of a kernel initial security identifier specified by
.I name
+.BR security_compute_av_raw (),
+.BR security_compute_av_flags_raw (),
+.BR \%security_compute_create_raw (),
+.BR \%security_compute_create_name_raw (),
+.BR \%security_compute_relabel_raw (),
+.BR \%security_compute_member_raw (),
+.BR \%security_compute_user_raw ()
+and
+.BR \%security_get_initial_context_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
.BR selinux_check_access ()
is used to check if the source context has the access permission for the specified class on the target context.
diff --git a/libselinux/man/man3/security_compute_av_flags_raw.3 b/libselinux/man/man3/security_compute_av_flags_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_av_flags_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_av_raw.3 b/libselinux/man/man3/security_compute_av_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_av_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_create_name_raw.3 b/libselinux/man/man3/security_compute_create_name_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_create_name_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_create_raw.3 b/libselinux/man/man3/security_compute_create_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_create_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_member_raw.3 b/libselinux/man/man3/security_compute_member_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_member_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_relabel_raw.3 b/libselinux/man/man3/security_compute_relabel_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_relabel_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_user_raw.3 b/libselinux/man/man3/security_compute_user_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_compute_user_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_get_initial_context_raw.3 b/libselinux/man/man3/security_get_initial_context_raw.3
new file mode 100644
index 00000000..a60bca4d
--- /dev/null
+++ b/libselinux/man/man3/security_get_initial_context_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/selabel_lookup_raw.3 b/libselinux/man/man3/selabel_lookup_raw.3
new file mode 100644
index 00000000..64e003e0
--- /dev/null
+++ b/libselinux/man/man3/selabel_lookup_raw.3
@@ -0,0 +1 @@
+.so man3/selabel_lookup.3
diff --git a/libselinux/man/man3/setcon_raw.3 b/libselinux/man/man3/setcon_raw.3
new file mode 100644
index 00000000..1210b5a0
--- /dev/null
+++ b/libselinux/man/man3/setcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/setexeccon_raw.3 b/libselinux/man/man3/setexeccon_raw.3
new file mode 100644
index 00000000..b2e6ab81
--- /dev/null
+++ b/libselinux/man/man3/setexeccon_raw.3
@@ -0,0 +1 @@
+.so man3/getexeccon.3
diff --git a/libselinux/man/man3/setfilecon.3 b/libselinux/man/man3/setfilecon.3
index 7da024ba..5acc9bbd 100644
--- a/libselinux/man/man3/setfilecon.3
+++ b/libselinux/man/man3/setfilecon.3
@@ -7,9 +7,15 @@ setfilecon, fsetfilecon, lsetfilecon \- set SELinux security context of a file
.sp
.BI "int setfilecon(const char *" path ", security_context_t "con );
.sp
+.BI "int setfilecon_raw(const char *" path ", security_context_t "con );
+.sp
.BI "int lsetfilecon(const char *" path ", security_context_t "con );
.sp
+.BI "int lsetfilecon_raw(const char *" path ", security_context_t "con );
+.sp
.BI "int fsetfilecon(int "fd ", security_context_t "con );
+.sp
+.BI "int fsetfilecon_raw(int "fd ", security_context_t "con );
.
.SH "DESCRIPTION"
.BR setfilecon ()
@@ -24,6 +30,13 @@ is identical to setfilecon, only the open file pointed to by filedes (as
returned by
.BR open (2))
has it's context set in place of path.
+
+.BR setfilecon_raw (),
+.BR lsetfilecon_raw (),
+and
+.BR fsetfilecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
.
.SH "RETURN VALUE"
On success, zero is returned. On failure, \-1 is returned and
diff --git a/libselinux/man/man3/setfilecon_raw.3 b/libselinux/man/man3/setfilecon_raw.3
new file mode 100644
index 00000000..33c321ac
--- /dev/null
+++ b/libselinux/man/man3/setfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/setfilecon.3
diff --git a/libselinux/man/man3/setfscreatecon_raw.3 b/libselinux/man/man3/setfscreatecon_raw.3
new file mode 100644
index 00000000..21aeebd4
--- /dev/null
+++ b/libselinux/man/man3/setfscreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfscreatecon.3
diff --git a/libselinux/man/man3/setkeycreatecon_raw.3 b/libselinux/man/man3/setkeycreatecon_raw.3
new file mode 100644
index 00000000..1e0ec5f2
--- /dev/null
+++ b/libselinux/man/man3/setkeycreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getkeycreatecon.3
diff --git a/libselinux/man/man3/setsockcreatecon_raw.3 b/libselinux/man/man3/setsockcreatecon_raw.3
new file mode 100644
index 00000000..ed1a371c
--- /dev/null
+++ b/libselinux/man/man3/setsockcreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getsockcreatecon.3