File: //usr/share/doc/selinux-policy/html/system_selinuxutil.html
<html>
<head>
<title>
Security Enhanced Linux Reference Policy
</title>
<style type="text/css" media="all">@import "style.css";</style>
</head>
<body>
<div id="Header">Security Enhanced Linux Reference Policy</div>
<div id='Menu'>
<a href="admin.html">+
admin</a></br/>
<div id='subitem'>
</div>
<a href="apps.html">+
apps</a></br/>
<div id='subitem'>
</div>
<a href="contrib.html">+
contrib</a></br/>
<div id='subitem'>
</div>
<a href="kernel.html">+
kernel</a></br/>
<div id='subitem'>
</div>
<a href="roles.html">+
roles</a></br/>
<div id='subitem'>
</div>
<a href="services.html">+
services</a></br/>
<div id='subitem'>
</div>
<a href="system.html">+
system</a></br/>
<div id='subitem'>
- <a href='system_application.html'>
application</a><br/>
- <a href='system_authlogin.html'>
authlogin</a><br/>
- <a href='system_clock.html'>
clock</a><br/>
- <a href='system_fstools.html'>
fstools</a><br/>
- <a href='system_getty.html'>
getty</a><br/>
- <a href='system_hostname.html'>
hostname</a><br/>
- <a href='system_hotplug.html'>
hotplug</a><br/>
- <a href='system_init.html'>
init</a><br/>
- <a href='system_ipsec.html'>
ipsec</a><br/>
- <a href='system_iptables.html'>
iptables</a><br/>
- <a href='system_kdbus.html'>
kdbus</a><br/>
- <a href='system_libraries.html'>
libraries</a><br/>
- <a href='system_locallogin.html'>
locallogin</a><br/>
- <a href='system_logging.html'>
logging</a><br/>
- <a href='system_lvm.html'>
lvm</a><br/>
- <a href='system_miscfiles.html'>
miscfiles</a><br/>
- <a href='system_modutils.html'>
modutils</a><br/>
- <a href='system_mount.html'>
mount</a><br/>
- <a href='system_netlabel.html'>
netlabel</a><br/>
- <a href='system_selinuxutil.html'>
selinuxutil</a><br/>
- <a href='system_setrans.html'>
setrans</a><br/>
- <a href='system_sysnetwork.html'>
sysnetwork</a><br/>
- <a href='system_systemd.html'>
systemd</a><br/>
- <a href='system_udev.html'>
udev</a><br/>
- <a href='system_unconfined.html'>
unconfined</a><br/>
- <a href='system_userdomain.html'>
userdomain</a><br/>
</div>
<br/><p/>
<a href="global_booleans.html">* Global Booleans </a>
<br/><p/>
<a href="global_tunables.html">* Global Tunables </a>
<p/><br/><p/>
<a href="index.html">* Layer Index</a>
<br/><p/>
<a href="booleans.html">* Boolean Index</a>
<br/><p/>
<a href="tunables.html">* Tunable Index</a>
<br/><p/>
<a href="interfaces.html">* Interface Index</a>
<br/><p/>
<a href="templates.html">* Template Index</a>
</div>
<div id="Content">
<a name="top":></a>
<h1>Layer: system</h1><p/>
<h2>Module: selinuxutil</h2><p/>
<a href=#interfaces>Interfaces</a>
<h3>Description:</h3>
<p><p>Policy for SELinux policy and userland applications.</p></p>
<hr>
<a name="interfaces"></a>
<h3>Interfaces: </h3>
<a name="link_seutil_access_check_load_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_access_check_load_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow access check on load_policy.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_access_check_module_store"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_access_check_module_store</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
List of the semanage
module store.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_access_check_setfiles"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_access_check_setfiles</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow access check on setfiles.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_create_bin_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_create_bin_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create the SELinux binary policy.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dbus_chat_semanage"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dbus_chat_semanage</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send and receive messages from
semanage dbus server over dbus.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_checkpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_checkpolicy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute checkpolicy in the checkpolicy domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_loadpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_loadpolicy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute load_policy in the load_policy domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_newrole"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_newrole</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute newrole in the newole domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_restorecon"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_restorecon</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute restorecon in the restorecon domain. (Deprecated)
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_runinit"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_runinit</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute run_init in the run_init domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_semanage"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_semanage</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute a domain transition to run semanage.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_setfiles"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_setfiles</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_setfiles_mac"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_setfiles_mac</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_domtrans_setsebool"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_domtrans_setsebool</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute a domain transition to run setsebool.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_access_check_load_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_access_check_load_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Dontaudit access check on load_policy.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_access_check_semanage_module_store"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_access_check_semanage_module_store</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Dontaudit access check on module store
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_access_check_semanage_read_lock"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_access_check_semanage_read_lock</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Dontaudit access check on module store
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_access_check_setfiles"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_access_check_setfiles</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Dontaudit access check on setfiles.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_libselinux_linked"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_libselinux_linked</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit SELinux-enabled program access for
libselinux-linked programs.
</p>
<h5>Description</h5>
<p>
</p><p>
SELinux-enabled programs are typically
linked to the libselinux library. This
interface will dontaudit access required for
the libselinux constructor to function.
</p><p>
</p><p>
Generally this should not be used on anything
but simple SELinux-enabled programs that do not
rely on data initialized by the libselinux
constructor.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_read_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_read_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read the SELinux
userland configuration (/etc/selinux).
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_read_file_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_read_file_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read the file_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_read_login_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_read_login_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to read the SELinux
login configuration.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_read_module_store"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_read_module_store</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Dontaudit read selinux module store
module store.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_search_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_search_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to search the SELinux
configuration directory (/etc/selinux).
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_search_login_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_search_login_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to search the SELinux
login configuration directory.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_signal_newrole"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_signal_newrole</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit the caller attempts to send
a signal to newrole.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_dontaudit_use_newrole_fds"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_dontaudit_use_newrole_fds</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Do not audit attempts to inherit and use
newrole file descriptors.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain to not audit.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_exec_checkpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_exec_checkpolicy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute checkpolicy in the caller domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_exec_loadpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_exec_loadpolicy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute load_policy in the caller domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_exec_newrole"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_exec_newrole</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute newrole in the caller domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_exec_restorecon"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_exec_restorecon</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute restorecon in the caller domain. (Deprecated)
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_exec_restorecond"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_exec_restorecond</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute restorecond in the caller domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_exec_setfiles"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_exec_setfiles</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute setfiles in the caller domain.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_filetrans_named_content"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_filetrans_named_content</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
File name transition for selinux utility content
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_get_semanage_read_lock"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_get_semanage_read_lock</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get read lock on module store
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_get_semanage_trans_lock"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_get_semanage_trans_lock</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Get trans lock on module store
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_init_script_domtrans_runinit"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_init_script_domtrans_runinit</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute init scripts in the run_init domain.
</p>
<h5>Description</h5>
<p>
</p><p>
Execute init scripts in the run_init domain.
This is used for the Gentoo integrated run_init.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_init_script_run_runinit"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_init_script_run_runinit</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>
<h5>Description</h5>
<p>
</p><p>
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p><p>
</p><p>
This is used for the Gentoo integrated run_init.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_libselinux_linked"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_libselinux_linked</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
SELinux-enabled program access for
libselinux-linked programs.
</p>
<h5>Description</h5>
<p>
</p><p>
SELinux-enabled programs are typically
linked to the libselinux library. This
interface will allow access required for
the libselinux constructor to function.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_bin_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_bin_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete the SELinux
binary policy.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_config_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_config_dirs</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_default_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_default_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete the default_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_file_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_file_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete the file_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_login_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_login_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_login_config_files"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_login_config_files</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
manage the login selinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_module_store"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_module_store</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Full management of the semanage
module store.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_selinux_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_selinux_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files. (Deprecated)
</p>
<h5>Description</h5>
<p>
</p><p>
Create, read, write, and delete
the general selinux configuration files.
</p><p>
</p><p>
This interface has been deprecated, please
use the seutil_manage_config() interface instead.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_manage_src_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_manage_src_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete SELinux
policy source files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_bin_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_bin_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the SELinux binary policy.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the general SELinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_default_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_default_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the default_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_file_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_file_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the file_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_loadpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_loadpolicy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the load_policy program file.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_login_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_login_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read the SELinux login configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_module_store"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_module_store</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Full management of the semanage
module store.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_read_src_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_read_src_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read SELinux policy source files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_relabelto_bin_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_relabelto_bin_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow the caller to relabel a file to the binary policy type.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_checkpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_checkpolicy</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute checkpolicy in the checkpolicy domain, and
allow the specified role the checkpolicy domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_loadpolicy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_loadpolicy</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute load_policy in the load_policy domain, and
allow the specified role the load_policy domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_newrole"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_newrole</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute newrole in the newrole domain, and
allow the specified role the newrole domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_restorecon"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_restorecon</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute restorecon in the restorecon domain, and
allow the specified role the restorecon domain,
and use the caller's terminal. (Deprecated)
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_runinit"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_runinit</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute run_init in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_semanage"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_semanage</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_setfiles"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_setfiles</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute setfiles in the setfiles domain, and
allow the specified role the setfiles domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed to transition.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
Role allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_setfiles_mac"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_setfiles_mac</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute setfiles in the setfiles_mac domain, and
allow the specified role the setfiles_mac domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to be allowed the setfiles_mac domain.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_run_setsebool"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_run_setsebool</b>(
domain
,
role
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Execute setsebool in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
<tr><td>
role
</td><td>
<p>
The role to be allowed the setsebool domain.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_rw_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_rw_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the general SELinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_rw_default_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_rw_default_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the default_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_rw_file_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_rw_file_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the file_contexts files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_rw_login_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_rw_login_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Read and write the SELinux login configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_rw_login_config_dirs"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_rw_login_config_dirs</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Create, read, write, and delete
the general selinux configuration files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_search_config"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_search_config</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Allow attempts to search the SELinux
configuration directory (/etc/selinux).
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_search_default_contexts"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_search_default_contexts</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Search the policy directory with default_context files.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_semanage_policy"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_semanage_policy</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
All rules necessary to run semanage command
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_setfiles"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_setfiles</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
All rules necessary to run setfiles command
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_sigchld_newrole"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_sigchld_newrole</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Send a SIGCHLD signal to newrole.
</p>
<h5>Description</h5>
<p>
</p><p>
Allow the specified domain to send a SIGCHLD
signal to newrole. This signal is automatically
sent from a process that is terminating to
its parent. This may be needed by domains
that are executed from newrole.
</p><p>
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_use_newrole_fds"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_use_newrole_fds</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Inherit and use newrole file descriptors.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a name="link_seutil_use_runinit_fds"></a>
<div id="interface">
<div id="codeblock">
<b>seutil_use_runinit_fds</b>(
domain
)<br>
</div>
<div id="description">
<h5>Summary</h5>
<p>
Inherit and use run_init file descriptors.
</p>
<h5>Parameters</h5>
<table border="1" cellspacing="0" cellpadding="3" width="65%">
<tr><th >Parameter:</th><th >Description:</th></tr>
<tr><td>
domain
</td><td>
<p>
Domain allowed access.
</p>
</td></tr>
</table>
</div>
</div>
<a href=#top>Return</a>
</div>
</body>
</html>