Lines Matching refs:context

56 * csplit: (coreutils)csplit invocation.         Split by context.
206 * Working context:: pwd stty printenv tty
208 * System context:: date arch nproc uname hostname hostid uptime
209 * SELinux context:: chcon runcon
262 * csplit invocation:: Split a file into context-determined pieces
399 Working context
425 System context
446 SELinux context
448 * chcon invocation:: Change SELinux context of file
449 * runcon invocation:: Run a command in specified SELinux context
791 standard output if that is clear from the context. For example, @samp{sort -}
2961 * csplit invocation:: Split a file into context-determined pieces.
3555 @section @command{csplit}: Split a file into context-determined pieces
3558 @cindex context splitting
3559 @cindex splitting a file into pieces by context
5627 each keyword in its context. The calling sketch is either one of:
5794 @emph{when} the context ends exactly at the newline. If option
5832 output context line; when the keywords happen to be near the end of the
5834 the output context line. The program tries to fill those unused areas
5835 by wrapping around context in them; the tail of the input line or
5877 left context, that is, if option @option{-R} is @emph{not} selected, then
5906 selected, that is, when references are output before the left context,
5909 output after the right context, the maximum output width does not take
5932 placed to the far right of output lines, after the right context. With
5935 context. For any other output format, option @option{-R} is
6220 total ordering. In the context of the call graph above, the function
8055 with a security context, but no other alternate access method.
8099 @itemx --context
8101 @opindex --context
8103 @cindex security context
8104 Display the SELinux security context or @samp{?} if none is found.
8105 In long format, print the security context to the left of the size column.
8931 Try to preserve SELinux security context and extended attributes (xattr),
9126 @item context
9127 Preserve SELinux security context of the file, or fail with full diagnostics.
9132 If SELinux context, ACLs or Capabilities are implemented using xattrs,
9134 specifying @option{--preserve=mode} or @option{--preserve=context}.
9138 that failure to preserve SELinux security context or extended attributes
9357 @itemx --context[=@var{context}]
9359 @opindex --context
9360 @cindex SELinux, setting/restoring security context
9361 @cindex security context
9362 Without a specified @var{context}, adjust the SELinux security context according
9365 The long form of this option with a specific context specified,
9366 will set the context for newly created files only.
9367 With a specified context, if both SELinux and SMACK are disabled, a warning is
9371 This option is mutually exclusive with the @option{--preserve=context}
10026 SELinux context, then do not modify the destination at all.
10095 @item --preserve-context
10096 @opindex --preserve-context
10098 @cindex security context
10099 Preserve the SELinux security context of files and directories.
10100 Failure to preserve the context in all of the files or directories
10144 This option is mutually exclusive with the @option{--preserve-context} option.
10191 include SELinux context, ACLs or Capabilities.
10293 @itemx --context
10295 @opindex --context
10296 @cindex SELinux, restoring security context
10297 @cindex security context
10299 by adjusting the SELinux security context according
12923 active SELinux security context.
12944 @item %C -- The SELinux security context of a file, if available
13336 depending on whether the context expects a string or a number. For
15017 @node Working context
15018 @chapter Working context
15020 @cindex working context
15021 @cindex commands for printing the working context
15023 This section describes commands that display or alter the context in
15945 then print @samp{context=@var{c}}, where @var{c} is the security context.
15987 @itemx --context
15989 @opindex --context
15991 @cindex security context
15992 Print only the security context of the process, which is generally
15993 the user's security context inherited from the parent process.
16278 @node System context
16279 @chapter System context
16281 @cindex system context
16282 @cindex context, system
16283 @cindex commands for system context
17358 @node SELinux context
17359 @chapter SELinux context
17361 @cindex SELinux context
17362 @cindex SELinux, context
17363 @cindex commands for SELinux context
17369 * chcon invocation:: Change SELinux context of file
17370 * runcon invocation:: Run a command in specified SELinux context
17374 @section @command{chcon}: Change SELinux context of file
17377 @cindex changing security context
17378 @cindex change SELinux context
17380 @command{chcon} changes the SELinux security context of the selected files.
17384 chcon [@var{option}]@dots{} @var{context} @var{file}@dots{}
17390 Change the SELinux security context of each @var{file} to @var{context}.
17391 With @option{--reference}, change the security context of each @var{file}
17412 Use @var{rfile}'s security context rather than specifying a @var{context} value.
17452 Set user @var{user} in the target security context.
17458 Set role @var{role} in the target security context.
17464 Set type @var{type} in the target security context.
17470 Set range @var{range} in the target security context.
17477 @section @command{runcon}: Run a command in specified SELinux context
17480 @cindex run with security context
17483 @command{runcon} runs file in specified SELinux security context.
17487 runcon @var{context} @var{command} [@var{args}]
17492 Run @var{command} with completely-specified @var{context}, or with
17493 current or transitioned security context modified by one or more of @var{level},
17497 is specified, the first argument is used as the complete context.
17501 With neither @var{context} nor @var{command}, print the current
17502 security context.
17504 @cindex restricted security context
17508 thus disallowing usage of a security context with more privileges
17519 Compute process transition context before modifying.
17525 Set user @var{user} in the target security context.
17531 Set role @var{role} in the target security context.
17537 Set type @var{type} in the target security context.
17543 Set range @var{range} in the target security context.
17564 This section describes commands that run other commands in some context
17849 in a different context. For example: