mirror of
https://github.com/SELinuxProject/selinux
synced 2024-12-28 17:02:03 +00:00
libselinux: selinux_restorecon.3 man page corrections.
Fix typo's and clarify usage. Reported-by: Nicolas Iooss <nicolas.iooss@m4x.org> Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
This commit is contained in:
parent
6c20534b6f
commit
945cad865a
@ -6,7 +6,7 @@ selinux_restorecon \- restore file(s) default SELinux security contexts
|
||||
.SH "SYNOPSIS"
|
||||
.B #include <selinux/restorecon.h>
|
||||
.sp
|
||||
.BI "int selinux_restorecon(const char **" pathname ,
|
||||
.BI "int selinux_restorecon(const char *" pathname ,
|
||||
.in +\w'int selinux_restorecon('u
|
||||
.br
|
||||
.BI "unsigned int " restorecon_flags ");"
|
||||
@ -14,7 +14,10 @@ selinux_restorecon \- restore file(s) default SELinux security contexts
|
||||
.
|
||||
.SH "DESCRIPTION"
|
||||
.BR selinux_restorecon ()
|
||||
restores file default security contexts based on:
|
||||
restores file default security contexts on filesystems that support extended
|
||||
attributes (see
|
||||
.BR xattr (7)),
|
||||
based on:
|
||||
.sp
|
||||
.RS
|
||||
.IR pathname
|
||||
@ -40,7 +43,7 @@ flag set. If any of the specfiles had been updated, the digest
|
||||
will also be updated. However if the digest is the same, no relabeling checks
|
||||
will take place (unless the
|
||||
.B SELINUX_RESTORECON_IGNORE_DIGEST
|
||||
is set).
|
||||
flag is set).
|
||||
.sp
|
||||
.IR restorecon_flags
|
||||
contains the labeling option/rules as follows:
|
||||
@ -53,7 +56,7 @@ specfiles SHA1 digest. The specfiles digest will be written to the
|
||||
.IR security.restorecon_last
|
||||
extended attribute once relabeling has been completed successfully provided the
|
||||
.B SELINUX_RESTORECON_NOCHANGE
|
||||
has not been set.
|
||||
flag has not been set.
|
||||
.sp
|
||||
.B SELINUX_RESTORECON_NOCHANGE
|
||||
don't change any file labels (passive check) or update the digest in the
|
||||
@ -62,7 +65,7 @@ extended attribute.
|
||||
.sp
|
||||
.B SELINUX_RESTORECON_SET_SPECFILE_CTX
|
||||
If set, reset the files label to match the default specfile context.
|
||||
if not set only reset the files "type" component of the context to match the
|
||||
If not set only reset the files "type" component of the context to match the
|
||||
default specfile context.
|
||||
.br
|
||||
|
||||
@ -114,8 +117,8 @@ to set the handle to be used by
|
||||
.sp
|
||||
If the
|
||||
.I pathname
|
||||
is a directory path, then it is possible to set files/directories to be exluded
|
||||
from the path by calling
|
||||
is a directory path, then it is possible to set files/directories to be
|
||||
excluded from the path by calling
|
||||
.BR selinux_restorecon_set_exclude_list (3)
|
||||
with a
|
||||
.B NULL
|
||||
@ -177,15 +180,20 @@ is not set).
|
||||
.B /sys
|
||||
and in-memory filesystems do not support the
|
||||
.IR security.restorecon_last
|
||||
extended attribute.
|
||||
extended attribute and are automatically excluded from any relabeling checks.
|
||||
.sp
|
||||
.BR selinux_restorecon ()
|
||||
does not check whether the mounted filesystems support the
|
||||
does not check whether mounted filesystems support the
|
||||
.B seclabel
|
||||
option. These should be set by the caller by
|
||||
option (i.e. support extended attributes as described in
|
||||
.BR xattr (7)).
|
||||
To exclude these filesystems from any relabeling checks
|
||||
.BR selinux_restorecon_set_exclude_list (3)
|
||||
in the
|
||||
.IR exclude_list .
|
||||
should be called prior to
|
||||
.BR selinux_restorecon ()
|
||||
with a NULL terminated
|
||||
.IR exclude_list
|
||||
of these filesystems.
|
||||
.
|
||||
.SH "SEE ALSO"
|
||||
.BR selinux_restorecon_set_sehandle (3),
|
||||
|
Loading…
Reference in New Issue
Block a user