avc_context_to_sid(3) SELinux API documentation avc_context_to_sid(3)NAME
avc_context_to_sid, avc_sid_to_context, avc_get_initial_sid - obtain and manipulate SELinux security ID's
SYNOPSIS
#include <selinux/selinux.h>
#include <selinux/avc.h>
int avc_context_to_sid(security_context_t ctx, security_id_t *sid);
int avc_sid_to_context(security_id_t sid, security_context_t *ctx);
int avc_get_initial_sid(const char *name, security_id_t *sid);
DESCRIPTION
Security ID's (SID's) are opaque representations of security contexts, managed by the userspace AVC.
avc_context_to_sid() returns a SID for the given context in the memory referenced by sid.
avc_sid_to_context() returns a copy of the context represented by sid in the memory referenced by ctx. The user must free the copy with
freecon(3).
avc_get_initial_sid() returns a SID for the kernel initial security identifier specified by name.
RETURN VALUE
avc_context_to_sid() and avc_sid_to_context() return zero on success. On error, -1 is returned and errno is set appropriately.
ERRORS
ENOMEM An attempt to allocate memory failed.
NOTES
As of libselinux version 2.0.86, SID's are no longer reference counted. A SID will be valid from the time it is first obtained until the
next call to avc_destroy(3). The sidget(3) and sidput(3) functions, formerly used to adjust the reference count, are no-ops and are depre-
cated.
AUTHOR
Eamon Walsh <ewalsh@tycho.nsa.gov>
SEE ALSO avc_init(3), avc_has_perm(3), avc_cache_stats(3), avc_add_callback(3), getcon(3), freecon(3), selinux(8)
27 May 2004 avc_context_to_sid(3)
Check Out this Related Man Page
avc_context_to_sid(3) SELinux API documentation avc_context_to_sid(3)NAME
avc_context_to_sid, avc_sid_to_context, avc_get_initial_sid - obtain and manipulate SELinux security ID's
SYNOPSIS
#include <selinux/selinux.h>
#include <selinux/avc.h>
int avc_context_to_sid(security_context_t ctx, security_id_t *sid);
int avc_sid_to_context(security_id_t sid, security_context_t *ctx);
int avc_get_initial_sid(const char *name, security_id_t *sid);
DESCRIPTION
Security ID's (SID's) are opaque representations of security contexts, managed by the userspace AVC.
avc_context_to_sid() returns a SID for the given context in the memory referenced by sid.
avc_sid_to_context() returns a copy of the context represented by sid in the memory referenced by ctx. The user must free the copy with
freecon(3).
avc_get_initial_sid() returns a SID for the kernel initial security identifier specified by name.
RETURN VALUE
avc_context_to_sid() and avc_sid_to_context() return zero on success. On error, -1 is returned and errno is set appropriately.
ERRORS
ENOMEM An attempt to allocate memory failed.
NOTES
As of libselinux version 2.0.86, SID's are no longer reference counted. A SID will be valid from the time it is first obtained until the
next call to avc_destroy(3). The sidget(3) and sidput(3) functions, formerly used to adjust the reference count, are no-ops and are depre-
cated.
AUTHOR
Eamon Walsh <ewalsh@tycho.nsa.gov>
SEE ALSO avc_init(3), avc_has_perm(3), avc_cache_stats(3), avc_add_callback(3), getcon(3), freecon(3), selinux(8)
27 May 2004 avc_context_to_sid(3)
Hi,
I have a korn shell script with 1 parameter.
My script deletes certain files, for example....
sid=$1
rm $ORC/dbs/orapwd${sid} #orapwddb1
rm $ORC/dbs/lk${sid} #lkDB1
In the first file, the $sid must be in small letters and in the second file, the $sid must be in capital... (4 Replies)
#!/usr/bin/ksh
totalInstance=3
c=1
SID=SID
SID_1=BOYISH
SID_2=EAGALE
SID_3=PLUNE
while
do
BDUMP_DIR="${SID}_${c}"
echo "$BDUMP_DIR"
c=`expr $c + 1`
echo "$c"
done
having problem printing the value of my var SID_1, SID_2, SID_3 (12 Replies)