9eb9c93275
In attempting to enable building various part of Android with -Wall -Werror, we found that the const security_context_t declarations in libselinux are incorrect; const char * was intended, but const security_context_t translates to char * const and triggers warnings on passing const char * from the caller. Easiest fix is to replace them all with const char *. And while we are at it, just get rid of all usage of security_context_t itself as it adds no value - there is no true encapsulation of the security context strings and callers already directly use string functions on them. typedef left to permit building legacy users until such a time as all are updated. This is a port of Change-Id I2f9df7bb9f575f76024c3e5f5b660345da2931a7 from Android, augmented to deal with all of the other code in upstream libselinux and updating the man pages too. Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Acked-by: Eric Paris <eparis@redhat.com>
57 lines
1.7 KiB
Groff
57 lines
1.7 KiB
Groff
.TH "getsockcreatecon" "3" "24 September 2008" "dwalsh@redhat.com" "SELinux API documentation"
|
|
.SH "NAME"
|
|
getsockcreatecon, setsockcreatecon \- get or set the SELinux security context used for creating a new labeled sockets
|
|
.
|
|
.SH "SYNOPSIS"
|
|
.B #include <selinux/selinux.h>
|
|
.sp
|
|
.BI "int getsockcreatecon(char **" con );
|
|
.sp
|
|
.BI "int getsockcreatecon_raw(char **" con );
|
|
.sp
|
|
.BI "int setsockcreatecon(char * "context );
|
|
.sp
|
|
.BI "int setsockcreatecon_raw(char * "context );
|
|
.
|
|
.SH "DESCRIPTION"
|
|
.BR getsockcreatecon ()
|
|
retrieves the context used for creating a new labeled network socket.
|
|
This returned context should be freed with
|
|
.BR freecon (3)
|
|
if non-NULL.
|
|
.BR getsockcreatecon ()
|
|
sets *con to NULL if no sockcreate context has been explicitly
|
|
set by the program (i.e. using the default policy behavior).
|
|
|
|
.BR setsockcreatecon ()
|
|
sets the context used for creating a new labeled network sockets
|
|
NULL can be passed to
|
|
.BR setsockcreatecon ()
|
|
to reset to the default policy behavior.
|
|
The sockcreate context is automatically reset after the next
|
|
.BR execve (2),
|
|
so a program doesn't need to explicitly sanitize it upon startup.
|
|
|
|
.BR setsockcreatecon ()
|
|
can be applied prior to library
|
|
functions that internally perform an file creation,
|
|
in order to set an file context on the objects.
|
|
|
|
.BR getsockcreatecon_raw ()
|
|
and
|
|
.BR setsockcreatecon_raw ()
|
|
behave identically to their non-raw counterparts but do not perform context
|
|
translation.
|
|
|
|
.B Note:
|
|
Signal handlers that perform a
|
|
.BR setsockcreatecon ()
|
|
must take care to
|
|
save, reset, and restore the sockcreate context to avoid unexpected behavior.
|
|
.
|
|
.SH "RETURN VALUE"
|
|
On error \-1 is returned.
|
|
On success 0 is returned.
|
|
.
|
|
.SH "SEE ALSO"
|
|
.BR selinux "(8), " freecon "(3), " getcon "(3)
|