Provided by: libselinux1-dev_2.7-2build2_amd64 bug

NAME

       avc_open, avc_destroy, avc_reset, avc_cleanup - userspace SELinux AVC setup and teardown

SYNOPSIS

       #include <selinux/selinux.h>
       #include <selinux/avc.h>

       int avc_open(struct selinux_opt *options, unsigned nopt);

       void avc_destroy(void);

       int avc_reset(void);

       void avc_cleanup(void);

DESCRIPTION

       avc_open() initializes the userspace AVC and must be called before any other AVC operation
       can be performed.

       avc_destroy() destroys the userspace AVC, freeing all internal memory  structures.   After
       this  call has been made, avc_open() must be called again before any AVC operations can be
       performed.

       avc_reset() flushes the userspace AVC, causing it to forget any cached  access  decisions.
       The  userspace  AVC  normally  calls  this function automatically when needed, see NETLINK
       NOTIFICATION below.

       avc_cleanup() attempts to free unused memory within the userspace AVC, but does not  flush
       any  cached access decisions.  Under normal operation, calling this function should not be
       necessary.

OPTIONS

       The userspace AVC obeys callbacks  set  via  selinux_set_callback(3),  in  particular  the
       logging and audit callbacks.

       The options which may be passed to avc_open() include the following:

       AVC_OPT_SETENFORCE
              This  option  forces  the  userspace AVC into enforcing mode if the option value is
              non-NULL; permissive mode otherwise.  The system enforcing mode will be ignored.

NETLINK NOTIFICATION

       Beginning with version 2.6.4, the Linux kernel supports SELinux status change notification
       via  netlink.   Two  message  types  are  currently implemented, indicating changes to the
       enforcing mode and to the loaded policy in the kernel, respectively.   The  userspace  AVC
       listens  for  these  messages  and takes the appropriate action, modifying the behavior of
       avc_has_perm(3) to reflect the current enforcing mode and flushing the cache on receipt of
       a  policy  load  notification.  Audit messages are produced when netlink notifications are
       processed.

RETURN VALUE

       Functions with a return value return zero on success.  On error, -1 is returned and  errno
       is set appropriately.

AUTHOR

       Eamon Walsh <ewalsh@tycho.nsa.gov>

SEE ALSO

       selinux(8),        avc_has_perm(3),       avc_context_to_sid(3),       avc_cache_stats(3),
       avc_add_callback(3), selinux_set_callback(3), security_compute_av(3)

                                           12 Jun 2008                                avc_open(3)