[PATCH 62/84] libselinux: man: Add references and man page links to

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


   This patch looks good to me. acked.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlD+qDcACgkQrlYvE4MpobNOLgCguVdGwQICuPv8uztB/jBUWVNi
KzoAn2qRavlz9Aw4vJH+z+DuWyf2SH3N
=52WG
-----END PGP SIGNATURE-----
>From 3480f14157554a3860f9111b04622f51e76e9085 Mon Sep 17 00:00:00 2001
From: Guillem Jover <guillem@xxxxxxxxxx>
Date: Sat, 10 Nov 2012 04:32:07 +0100
Subject: [PATCH 62/84] libselinux: man: Add references and man page links to
 _raw function variants

Signed-off-by: Guillem Jover <guillem@xxxxxxxxxx>
Signed-off-by: Eric Paris <eparis@xxxxxxxxxx>
---
 libselinux/man/man3/fgetfilecon_raw.3              |  1 +
 libselinux/man/man3/fsetfilecon_raw.3              |  1 +
 libselinux/man/man3/getcon.3                       | 19 +++++++++++++++
 libselinux/man/man3/getcon_raw.3                   |  1 +
 libselinux/man/man3/getexeccon.3                   | 10 ++++++++
 libselinux/man/man3/getexeccon_raw.3               |  1 +
 libselinux/man/man3/getfilecon.3                   | 13 ++++++++++
 libselinux/man/man3/getfilecon_raw.3               |  1 +
 libselinux/man/man3/getfscreatecon.3               | 10 ++++++++
 libselinux/man/man3/getfscreatecon_raw.3           |  1 +
 libselinux/man/man3/getkeycreatecon.3              | 10 ++++++++
 libselinux/man/man3/getkeycreatecon_raw.3          |  1 +
 libselinux/man/man3/getpeercon_raw.3               |  1 +
 libselinux/man/man3/getpidcon_raw.3                |  1 +
 libselinux/man/man3/getprevcon_raw.3               |  1 +
 libselinux/man/man3/getsockcreatecon.3             | 10 ++++++++
 libselinux/man/man3/getsockcreatecon_raw.3         |  1 +
 libselinux/man/man3/lgetfilecon_raw.3              |  1 +
 libselinux/man/man3/lsetfilecon_raw.3              |  1 +
 libselinux/man/man3/security_check_context.3       |  7 ++++++
 libselinux/man/man3/security_check_context_raw.3   |  1 +
 libselinux/man/man3/security_compute_av.3          | 28 ++++++++++++++++++++++
 .../man/man3/security_compute_av_flags_raw.3       |  1 +
 libselinux/man/man3/security_compute_av_raw.3      |  1 +
 .../man/man3/security_compute_create_name_raw.3    |  1 +
 libselinux/man/man3/security_compute_create_raw.3  |  1 +
 libselinux/man/man3/security_compute_member_raw.3  |  1 +
 libselinux/man/man3/security_compute_relabel_raw.3 |  1 +
 libselinux/man/man3/security_compute_user_raw.3    |  1 +
 .../man/man3/security_get_initial_context_raw.3    |  1 +
 libselinux/man/man3/selabel_lookup_raw.3           |  1 +
 libselinux/man/man3/setcon_raw.3                   |  1 +
 libselinux/man/man3/setexeccon_raw.3               |  1 +
 libselinux/man/man3/setfilecon.3                   | 13 ++++++++++
 libselinux/man/man3/setfilecon_raw.3               |  1 +
 libselinux/man/man3/setfscreatecon_raw.3           |  1 +
 libselinux/man/man3/setkeycreatecon_raw.3          |  1 +
 libselinux/man/man3/setsockcreatecon_raw.3         |  1 +
 38 files changed, 149 insertions(+)
 create mode 100644 libselinux/man/man3/fgetfilecon_raw.3
 create mode 100644 libselinux/man/man3/fsetfilecon_raw.3
 create mode 100644 libselinux/man/man3/getcon_raw.3
 create mode 100644 libselinux/man/man3/getexeccon_raw.3
 create mode 100644 libselinux/man/man3/getfilecon_raw.3
 create mode 100644 libselinux/man/man3/getfscreatecon_raw.3
 create mode 100644 libselinux/man/man3/getkeycreatecon_raw.3
 create mode 100644 libselinux/man/man3/getpeercon_raw.3
 create mode 100644 libselinux/man/man3/getpidcon_raw.3
 create mode 100644 libselinux/man/man3/getprevcon_raw.3
 create mode 100644 libselinux/man/man3/getsockcreatecon_raw.3
 create mode 100644 libselinux/man/man3/lgetfilecon_raw.3
 create mode 100644 libselinux/man/man3/lsetfilecon_raw.3
 create mode 100644 libselinux/man/man3/security_check_context_raw.3
 create mode 100644 libselinux/man/man3/security_compute_av_flags_raw.3
 create mode 100644 libselinux/man/man3/security_compute_av_raw.3
 create mode 100644 libselinux/man/man3/security_compute_create_name_raw.3
 create mode 100644 libselinux/man/man3/security_compute_create_raw.3
 create mode 100644 libselinux/man/man3/security_compute_member_raw.3
 create mode 100644 libselinux/man/man3/security_compute_relabel_raw.3
 create mode 100644 libselinux/man/man3/security_compute_user_raw.3
 create mode 100644 libselinux/man/man3/security_get_initial_context_raw.3
 create mode 100644 libselinux/man/man3/selabel_lookup_raw.3
 create mode 100644 libselinux/man/man3/setcon_raw.3
 create mode 100644 libselinux/man/man3/setexeccon_raw.3
 create mode 100644 libselinux/man/man3/setfilecon_raw.3
 create mode 100644 libselinux/man/man3/setfscreatecon_raw.3
 create mode 100644 libselinux/man/man3/setkeycreatecon_raw.3
 create mode 100644 libselinux/man/man3/setsockcreatecon_raw.3

diff --git a/libselinux/man/man3/fgetfilecon_raw.3 b/libselinux/man/man3/fgetfilecon_raw.3
new file mode 100644
index 0000000..ae6dfcf
--- /dev/null
+++ b/libselinux/man/man3/fgetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfilecon.3
diff --git a/libselinux/man/man3/fsetfilecon_raw.3 b/libselinux/man/man3/fsetfilecon_raw.3
new file mode 100644
index 0000000..33c321a
--- /dev/null
+++ b/libselinux/man/man3/fsetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/setfilecon.3
diff --git a/libselinux/man/man3/getcon.3 b/libselinux/man/man3/getcon.3
index f1d3a7f..239bb7d 100644
--- a/libselinux/man/man3/getcon.3
+++ b/libselinux/man/man3/getcon.3
@@ -13,17 +13,27 @@ setcon \- set current security context of a process
 .sp
 .BI "int getcon(security_context_t *" context );
 .sp
+.BI "int getcon_raw(security_context_t *" context );
+.sp
 .BI "int getprevcon(security_context_t *" context );
 .sp
+.BI "int getprevcon_raw(security_context_t *" context );
+.sp
 .BI "int getpidcon(pid_t " pid ", security_context_t *" context );
 .sp
+.BI "int getpidcon_raw(pid_t " pid ", security_context_t *" context );
+.sp
 .BI "int getpeercon(int " fd ", security_context_t *" context );
 .sp
+.BI "int getpeercon_raw(int " fd ", security_context_t *" context );
+.sp
 .BI "void freecon(security_context_t "con );
 .sp
 .BI "void freeconary(security_context_t *" con );
 .sp
 .BI "int setcon(security_context_t " context );
+.sp
+.BI "int setcon_raw(security_context_t " context );
 .
 .SH "DESCRIPTION"
 .BR getcon ()
@@ -91,6 +101,15 @@ operation, ptrace permission will be revalidated against the new
 context and the
 .BR setcon ()
 will fail if it is not allowed by policy.
+
+.BR getcon_raw (),
+.BR getprevcon_raw (),
+.BR getpidcon_raw (),
+.BR getpeercon_raw ()
+and
+.BR setcon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
 .
 .SH "RETURN VALUE"
 On error \-1 is returned.  On success 0 is returned.
diff --git a/libselinux/man/man3/getcon_raw.3 b/libselinux/man/man3/getcon_raw.3
new file mode 100644
index 0000000..1210b5a
--- /dev/null
+++ b/libselinux/man/man3/getcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getexeccon.3 b/libselinux/man/man3/getexeccon.3
index 54fb873..c188a3a 100644
--- a/libselinux/man/man3/getexeccon.3
+++ b/libselinux/man/man3/getexeccon.3
@@ -9,8 +9,12 @@ rpm_execcon \- run a helper for rpm in an appropriate security context
 .sp
 .BI "int getexeccon(security_context_t *" context );
 .sp
+.BI "int getexeccon_raw(security_context_t *" context );
+.sp
 .BI "int setexeccon(security_context_t "context );
 .sp
+.BI "int setexeccon_raw(security_context_t "context );
+.sp
 .BI "int rpm_execcon(unsigned int " verified ", const char *" filename ", char *const " argv "[] , char *const " envp "[]);
 .
 .SH "DESCRIPTION"
@@ -46,6 +50,12 @@ e.g.
 .BR popen (3),
 in order to set an exec context for that operation.  
 
+.BR getexeccon_raw ()
+and
+.BR setexeccon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
 .B Note:
 Signal handlers that perform an
 .BR execve (2)
diff --git a/libselinux/man/man3/getexeccon_raw.3 b/libselinux/man/man3/getexeccon_raw.3
new file mode 100644
index 0000000..b2e6ab8
--- /dev/null
+++ b/libselinux/man/man3/getexeccon_raw.3
@@ -0,0 +1 @@
+.so man3/getexeccon.3
diff --git a/libselinux/man/man3/getfilecon.3 b/libselinux/man/man3/getfilecon.3
index 8605a0c..ea79b31 100644
--- a/libselinux/man/man3/getfilecon.3
+++ b/libselinux/man/man3/getfilecon.3
@@ -7,9 +7,15 @@ getfilecon, fgetfilecon, lgetfilecon \- get SELinux security context of a file
 .sp
 .BI "int getfilecon(const char *" path ", security_context_t *" con );
 .sp
+.BI "int getfilecon_raw(const char *" path ", security_context_t *" con );
+.sp
 .BI "int lgetfilecon(const char *" path ", security_context_t *" con );
 .sp
+.BI "int lgetfilecon_raw(const char *" path ", security_context_t *" con );
+.sp
 .BI "int fgetfilecon(int "fd ", security_context_t *" con );
+.sp
+.BI "int fgetfilecon_raw(int "fd ", security_context_t *" con );
 .
 .SH "DESCRIPTION"
 .BR getfilecon ()
@@ -29,6 +35,13 @@ only the open file pointed to by filedes (as returned by
 .BR open (2))
 is interrogated in place of path.
 
+.BR getfilecon_raw (),
+.BR lgetfilecon_raw ()
+and
+.BR fgetfilecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
 The returned context should be freed with
 .BR freecon (3)
 if non-NULL.
diff --git a/libselinux/man/man3/getfilecon_raw.3 b/libselinux/man/man3/getfilecon_raw.3
new file mode 100644
index 0000000..ae6dfcf
--- /dev/null
+++ b/libselinux/man/man3/getfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfilecon.3
diff --git a/libselinux/man/man3/getfscreatecon.3 b/libselinux/man/man3/getfscreatecon.3
index 1b0f3d1..c7675be 100644
--- a/libselinux/man/man3/getfscreatecon.3
+++ b/libselinux/man/man3/getfscreatecon.3
@@ -7,7 +7,11 @@ getfscreatecon, setfscreatecon \- get or set the SELinux security context used f
 .sp
 .BI "int getfscreatecon(security_context_t *" con );
 .sp
+.BI "int getfscreatecon_raw(security_context_t *" con );
+.sp
 .BI "int setfscreatecon(security_context_t "context );
+.sp
+.BI "int setfscreatecon_raw(security_context_t "context );
 .
 .SH "DESCRIPTION"
 .BR getfscreatecon ()
@@ -33,6 +37,12 @@ can be applied prior to library
 functions that internally perform an file creation,
 in order to set an file context on the objects.
 
+.BR getfscreatecon_raw ()
+and
+.BR setfscreatecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
 .B Note:
 Signal handlers that perform a
 .BR setfscreatecon ()
diff --git a/libselinux/man/man3/getfscreatecon_raw.3 b/libselinux/man/man3/getfscreatecon_raw.3
new file mode 100644
index 0000000..21aeebd
--- /dev/null
+++ b/libselinux/man/man3/getfscreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfscreatecon.3
diff --git a/libselinux/man/man3/getkeycreatecon.3 b/libselinux/man/man3/getkeycreatecon.3
index 709be51..d6a118c 100644
--- a/libselinux/man/man3/getkeycreatecon.3
+++ b/libselinux/man/man3/getkeycreatecon.3
@@ -7,7 +7,11 @@ getkeycreatecon, setkeycreatecon \- get or set the SELinux security context used
 .sp
 .BI "int getkeycreatecon(security_context_t *" con );
 .sp
+.BI "int getkeycreatecon_raw(security_context_t *" con );
+.sp
 .BI "int setkeycreatecon(security_context_t "context );
+.sp
+.BI "int setkeycreatecon_raw(security_context_t "context );
 .
 .SH "DESCRIPTION"
 .BR getkeycreatecon ()
@@ -33,6 +37,12 @@ can be applied prior to library
 functions that internally perform an file creation,
 in order to set an file context on the objects.
 
+.BR getkeycreatecon_raw ()
+and
+.BR setkeycreatecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
 .B Note:
 Signal handlers that perform a
 .BR setkeycreatecon ()
diff --git a/libselinux/man/man3/getkeycreatecon_raw.3 b/libselinux/man/man3/getkeycreatecon_raw.3
new file mode 100644
index 0000000..1e0ec5f
--- /dev/null
+++ b/libselinux/man/man3/getkeycreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getkeycreatecon.3
diff --git a/libselinux/man/man3/getpeercon_raw.3 b/libselinux/man/man3/getpeercon_raw.3
new file mode 100644
index 0000000..1210b5a
--- /dev/null
+++ b/libselinux/man/man3/getpeercon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getpidcon_raw.3 b/libselinux/man/man3/getpidcon_raw.3
new file mode 100644
index 0000000..1210b5a
--- /dev/null
+++ b/libselinux/man/man3/getpidcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getprevcon_raw.3 b/libselinux/man/man3/getprevcon_raw.3
new file mode 100644
index 0000000..1210b5a
--- /dev/null
+++ b/libselinux/man/man3/getprevcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/getsockcreatecon.3 b/libselinux/man/man3/getsockcreatecon.3
index 8fb2061..99e9436 100644
--- a/libselinux/man/man3/getsockcreatecon.3
+++ b/libselinux/man/man3/getsockcreatecon.3
@@ -7,7 +7,11 @@ getsockcreatecon, setsockcreatecon \- get or set the SELinux security context us
 .sp
 .BI "int getsockcreatecon(security_context_t *" con );
 .sp
+.BI "int getsockcreatecon_raw(security_context_t *" con );
+.sp
 .BI "int setsockcreatecon(security_context_t "context );
+.sp
+.BI "int setsockcreatecon_raw(security_context_t "context );
 .
 .SH "DESCRIPTION"
 .BR getsockcreatecon ()
@@ -33,6 +37,12 @@ can be applied prior to library
 functions that internally perform an file creation,
 in order to set an file context on the objects.
 
+.BR getsockcreatecon_raw ()
+and
+.BR setsockcreatecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
 .B Note:
 Signal handlers that perform a
 .BR setsockcreatecon ()
diff --git a/libselinux/man/man3/getsockcreatecon_raw.3 b/libselinux/man/man3/getsockcreatecon_raw.3
new file mode 100644
index 0000000..ed1a371
--- /dev/null
+++ b/libselinux/man/man3/getsockcreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getsockcreatecon.3
diff --git a/libselinux/man/man3/lgetfilecon_raw.3 b/libselinux/man/man3/lgetfilecon_raw.3
new file mode 100644
index 0000000..ae6dfcf
--- /dev/null
+++ b/libselinux/man/man3/lgetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfilecon.3
diff --git a/libselinux/man/man3/lsetfilecon_raw.3 b/libselinux/man/man3/lsetfilecon_raw.3
new file mode 100644
index 0000000..33c321a
--- /dev/null
+++ b/libselinux/man/man3/lsetfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/setfilecon.3
diff --git a/libselinux/man/man3/security_check_context.3 b/libselinux/man/man3/security_check_context.3
index 60d571d..7ba4ead 100644
--- a/libselinux/man/man3/security_check_context.3
+++ b/libselinux/man/man3/security_check_context.3
@@ -6,11 +6,18 @@ security_check_context \- check the validity of a SELinux context
 .B #include <selinux/selinux.h>
 .sp
 .BI "int security_check_context(security_context_t "con );
+.sp
+.BI "int security_check_context_raw(security_context_t "con );
 .
 .SH "DESCRIPTION"
 .BR security_check_context ()
 returns 0 if SELinux is running and the context is valid, otherwise it
 returns \-1.
+
+.BR security_check_context_raw ()
+behaves identically to
+.BR \%security_check_context ()
+but does not perform context translation.
 .
 .SH "SEE ALSO"
 .BR selinux "(8)"
diff --git a/libselinux/man/man3/security_check_context_raw.3 b/libselinux/man/man3/security_check_context_raw.3
new file mode 100644
index 0000000..ee93986
--- /dev/null
+++ b/libselinux/man/man3/security_check_context_raw.3
@@ -0,0 +1 @@
+.so man3/security_check_context.3
diff --git a/libselinux/man/man3/security_compute_av.3 b/libselinux/man/man3/security_compute_av.3
index 6034019..c6837fc 100644
--- a/libselinux/man/man3/security_compute_av.3
+++ b/libselinux/man/man3/security_compute_av.3
@@ -11,20 +11,36 @@ the SELinux policy database in the kernel
 .sp
 .BI "int security_compute_av(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
 .sp
+.BI "int security_compute_av_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
+.sp
 .BI "int security_compute_av_flags(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
 .sp
+.BI "int security_compute_av_flags_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", access_vector_t "requested ", struct av_decision *" avd );
+.sp
 .BI "int security_compute_create(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
 .sp
+.BI "int security_compute_create_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
+.sp
 .BI "int security_compute_create_name(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", const char *"objname ", security_context_t *" newcon );
 .sp
+.BI "int security_compute_create_name_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", const char *"objname ", security_context_t *" newcon );
+.sp
 .BI "int security_compute_relabel(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
 .sp
+.BI "int security_compute_relabel_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
+.sp
 .BI "int security_compute_member(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
 .sp
+.BI "int security_compute_member_raw(security_context_t "scon ", security_context_t "tcon ", security_class_t "tclass ", security_context_t *" newcon );
+.sp
 .BI "int security_compute_user(security_context_t "scon ", const char *" username ", security_context_t **" con );
 .sp
+.BI "int security_compute_user_raw(security_context_t "scon ", const char *" username ", security_context_t **" con );
+.sp
 .BI "int security_get_initial_context(const char *" name ", security_context_t " con );
 .sp
+.BI "int security_get_initial_context_raw(const char *" name ", security_context_t " con );
+.sp
 .BI "int selinux_check_access(const security_context_t " scon ", const security_context_t " tcon ", const char *" class ", const char *" perm ", void *" auditdata);
 .sp
 .BI "int selinux_check_passwd_access(access_vector_t " requested );
@@ -90,6 +106,18 @@ source context. It is mainly used by
 is used to get the context of a kernel initial security identifier specified by 
 .I name
 
+.BR security_compute_av_raw (),
+.BR security_compute_av_flags_raw (),
+.BR \%security_compute_create_raw (),
+.BR \%security_compute_create_name_raw (),
+.BR \%security_compute_relabel_raw (),
+.BR \%security_compute_member_raw (),
+.BR \%security_compute_user_raw ()
+and
+.BR \%security_get_initial_context_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
+
 .BR selinux_check_access ()
 is used to check if the source context has the access permission for the specified class on the target context.
 
diff --git a/libselinux/man/man3/security_compute_av_flags_raw.3 b/libselinux/man/man3/security_compute_av_flags_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_av_flags_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_av_raw.3 b/libselinux/man/man3/security_compute_av_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_av_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_create_name_raw.3 b/libselinux/man/man3/security_compute_create_name_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_create_name_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_create_raw.3 b/libselinux/man/man3/security_compute_create_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_create_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_member_raw.3 b/libselinux/man/man3/security_compute_member_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_member_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_relabel_raw.3 b/libselinux/man/man3/security_compute_relabel_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_relabel_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_compute_user_raw.3 b/libselinux/man/man3/security_compute_user_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_compute_user_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/security_get_initial_context_raw.3 b/libselinux/man/man3/security_get_initial_context_raw.3
new file mode 100644
index 0000000..a60bca4
--- /dev/null
+++ b/libselinux/man/man3/security_get_initial_context_raw.3
@@ -0,0 +1 @@
+.so man3/security_compute_av.3
diff --git a/libselinux/man/man3/selabel_lookup_raw.3 b/libselinux/man/man3/selabel_lookup_raw.3
new file mode 100644
index 0000000..64e003e
--- /dev/null
+++ b/libselinux/man/man3/selabel_lookup_raw.3
@@ -0,0 +1 @@
+.so man3/selabel_lookup.3
diff --git a/libselinux/man/man3/setcon_raw.3 b/libselinux/man/man3/setcon_raw.3
new file mode 100644
index 0000000..1210b5a
--- /dev/null
+++ b/libselinux/man/man3/setcon_raw.3
@@ -0,0 +1 @@
+.so man3/getcon.3
diff --git a/libselinux/man/man3/setexeccon_raw.3 b/libselinux/man/man3/setexeccon_raw.3
new file mode 100644
index 0000000..b2e6ab8
--- /dev/null
+++ b/libselinux/man/man3/setexeccon_raw.3
@@ -0,0 +1 @@
+.so man3/getexeccon.3
diff --git a/libselinux/man/man3/setfilecon.3 b/libselinux/man/man3/setfilecon.3
index 7da024b..5acc9bb 100644
--- a/libselinux/man/man3/setfilecon.3
+++ b/libselinux/man/man3/setfilecon.3
@@ -7,9 +7,15 @@ setfilecon, fsetfilecon, lsetfilecon \- set SELinux security context of a file
 .sp
 .BI "int setfilecon(const char *" path ", security_context_t "con );
 .sp
+.BI "int setfilecon_raw(const char *" path ", security_context_t "con );
+.sp
 .BI "int lsetfilecon(const char *" path ", security_context_t "con );
 .sp
+.BI "int lsetfilecon_raw(const char *" path ", security_context_t "con );
+.sp
 .BI "int fsetfilecon(int "fd ", security_context_t "con );
+.sp
+.BI "int fsetfilecon_raw(int "fd ", security_context_t "con );
 .
 .SH "DESCRIPTION"
 .BR setfilecon ()
@@ -24,6 +30,13 @@ is identical to setfilecon, only the open file pointed to by filedes (as
 returned by
 .BR open (2))
 has it's context set in place of path.
+
+.BR setfilecon_raw (),
+.BR lsetfilecon_raw (),
+and
+.BR fsetfilecon_raw ()
+behave identically to their non-raw counterparts but do not perform context
+translation.
 .
 .SH "RETURN VALUE"
 On success, zero is returned. On failure, \-1 is returned and
diff --git a/libselinux/man/man3/setfilecon_raw.3 b/libselinux/man/man3/setfilecon_raw.3
new file mode 100644
index 0000000..33c321a
--- /dev/null
+++ b/libselinux/man/man3/setfilecon_raw.3
@@ -0,0 +1 @@
+.so man3/setfilecon.3
diff --git a/libselinux/man/man3/setfscreatecon_raw.3 b/libselinux/man/man3/setfscreatecon_raw.3
new file mode 100644
index 0000000..21aeebd
--- /dev/null
+++ b/libselinux/man/man3/setfscreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getfscreatecon.3
diff --git a/libselinux/man/man3/setkeycreatecon_raw.3 b/libselinux/man/man3/setkeycreatecon_raw.3
new file mode 100644
index 0000000..1e0ec5f
--- /dev/null
+++ b/libselinux/man/man3/setkeycreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getkeycreatecon.3
diff --git a/libselinux/man/man3/setsockcreatecon_raw.3 b/libselinux/man/man3/setsockcreatecon_raw.3
new file mode 100644
index 0000000..ed1a371
--- /dev/null
+++ b/libselinux/man/man3/setsockcreatecon_raw.3
@@ -0,0 +1 @@
+.so man3/getsockcreatecon.3
-- 
1.8.1


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux