HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 26 - 50 of 1108) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/selinux/libselinux/man/man3/
selinux_policy_root.3 1 .TH "selinux_policy_root" "3" "25 May 2004" "dwalsh@redhat.com" "SELinux API documentation"
3 selinux_policy_root \- return the path of the SELinux policy files for this machine
4 selinux_set_policy_root \- Set an alternate SELinux root path for the SELinux policy files for this machine.
7 .B #include <selinux/selinux.h>
17 .I /etc/selinux/config
23 .I /etc/selinux/config
27 On success, selinux_policy_root returns a directory path containing the SELinux policy files.
34 .BR selinux "(8)
    [all...]
matchmediacon.3 1 .TH "matchmediacon" "3" "15 November 2004" "dwalsh@redhat.com" "SELinux API documentation"
3 matchmediacon \- get the default SELinux security context for the specified mediatype from the policy
6 .B #include <selinux/selinux.h>
27 .I /etc/selinux/{POLICYTYPE}/contexts/files/media
30 .BR selinux "(8), " freecon "(3)
getseuserbyname.3 1 .TH "getseuserbyname" "3" "29 September 2005" "dwalsh@redhat.com" "SELinux API documentation"
3 getseuserbyname \- get SELinux username and level for a given Linux username
6 .B #include <selinux/selinux.h>
12 retrieves the SELinux username and security level associated with
13 a given Linux username. The SELinux username and security level can
19 The returned SELinux username and level should be freed by the caller
33 .BR selinux "(8)"
security_getenforce.3 1 .TH "security_getenforce" "3" "1 January 2004" "russell@coker.com.au" "SELinux API documentation"
3 security_getenforce, security_setenforce, security_deny_unknown \- get or set the enforcing state of SELinux
6 .B #include <selinux/selinux.h>
16 returns 0 if SELinux is running in permissive mode, 1 if it is running in
20 sets SELinux to enforcing mode if the value 1 is passed in, and sets it to
25 returns 0 if SELinux treats policy queries on undefined object classes or
29 .BR selinux "(8)"
is_context_customizable.3 1 .TH "is_context_customizable" "3" "10 January 2005" "dwalsh@redhat.com" "SELinux API documentation"
3 is_context_customizable \- check whether SELinux context type is customizable by the administrator
6 .B #include <selinux/selinux.h>
12 .I /etc/selinux/{SELINUXTYPE}/context/customizable_types
21 .I /etc/selinux/{SELINUXTYPE}/context/customizable_types
24 .BR selinux "(8)"
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
start.txt 1 You must 'Select' the initial screen to view for SELinux Configuration.
4 This application allows you to browse SELinux confinement per application. You can enter the name of the application to see how SELinux confines it, or you could enter the SELinux name for the running process.
6 Alternatively you can select to manage SELinux on the system, lockdown the system via SELinux. You can also manage confined users and confined user mappings. Finally you could setup File System Labeling equivalence.
users.txt 1 By Default on a SELinux Targeted Policy system, all users login using the unconfined_t user.
3 SELinux has a very powerful concept called confined users. You can setup individual users on your system to login with different SELinux user types. This SELinux User Screen allows you to create/modify SELinux Users and map them to SELinux Roles and MLS/MCS Ranges
5 Default SELinux Users:
20 - SELinux does not block access.
lockdown.txt 1 The Lockdown Screen allows you to tighten the SELinux Security on your machine.
4 These lockdown measures are recommended, but can cause SELinux issues. If you have a machine you truly want to secure, and are confident in your understanding of SELinux you should try some of these options.
system_current_mode.txt 1 You can switch SELinux between Enforcing mode and Permissive mode.
4 When a machine is in permissive mode, SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was in enforcing mode.
login.txt 1 By Default on a SELinux Targeted Policy system, all users login using the unconfined_t user.
4 But SELinux has a very powerful concept called confined users. You can setup individual users on your system to login with different SELinux user types. This Login Mapping Screen allows you to map a Linux login user to an SELinux User.
6 Default SELinux Users:
21 - SELinux does not block access.
  /external/selinux/libselinux/src/
setrans_internal.h 2 #include <selinux/selinux.h>
selinuxswig.i 5 %module selinux
7 #include "../include/selinux/avc.h"
8 #include "../include/selinux/context.h"
9 #include "../include/selinux/get_context_list.h"
10 #include "../include/selinux/get_default_type.h"
11 #include "../include/selinux/label.h"
12 #include "../include/selinux/selinux.h"
59 %include "../include/selinux/avc.h"
60 %include "../include/selinux/context.h
    [all...]
  /external/selinux/policycoreutils/gui/
org.selinux.config.policy 7 <vendor>System Config SELinux</vendor>
8 <vendor_url>http://fedorahosted.org/system-config-selinux</vendor_url>
10 <action id="org.selinux.config.pkexec.run">
11 <description>Run System Config SELinux</description>
12 <message>Authentication is required to run system-config-selinux</message>
13 <icon_name>system-selinux</icon_name>
19 <annotate key="org.freedesktop.policykit.exec.path">/usr/share/system-config-selinux/system-config-selinux.py</annotate>
Makefile 5 SHAREDIR ?= $(PREFIX)/share/system-config-selinux
21 system-config-selinux.glade \
22 system-config-selinux.png \
25 all: $(TARGETS) system-config-selinux.py polgengui.py
35 install -m 755 system-config-selinux.py $(SHAREDIR)
36 install -m 755 system-config-selinux $(BINDIR)
39 install -m 644 system-config-selinux.8 $(MANDIR)/man8
40 install -m 644 selinux-polgengui.8 $(MANDIR)/man8
41 install -m 644 system-config-selinux.png $(DATADIR)/pixmaps
42 install -m 644 system-config-selinux.png $(DATADIR)/icons/hicolor/24x24/app
    [all...]
  /external/selinux/policycoreutils/mcstrans/src/
mcstrans.h 3 #include <selinux/selinux.h>
mcstrans.service 2 Description=Translates SELinux MCS/MLS labels to human readable form
3 ConditionSecurity=selinux
  /external/selinux/libselinux/include/
Makefile 3 INCDIR ?= $(PREFIX)/include/selinux
9 install -m 644 $(wildcard selinux/*.h) $(INCDIR)
14 ../../scripts/Lindent $(wildcard selinux/*.h)
17 -rm -f selinux/*~
  /external/selinux/libselinux/man/man8/
selinuxenabled.8 1 .TH "selinuxenabled" "8" "7 April 2004" "dwalsh@redhat.com" "SELinux Command Line documentation"
3 selinuxenabled \- tool to be used within shell scripts to determine if selinux is enabled
9 Indicates whether SELinux is enabled or disabled.
12 It exits with status 0 if SELinux is enabled and 1 if it is not enabled.
18 .BR selinux (8),
getenforce.8 1 .TH "getenforce" "8" "7 April 2004" "dwalsh@redhat.com" "SELinux Command Line documentation"
3 getenforce \- get the current mode of SELinux
10 reports whether SELinux is enforcing, permissive, or disabled.
16 .BR selinux (8),
  /external/selinux/policycoreutils/mcstrans/share/examples/urcsts-via-include/
README 10 cp -L setrans.conf /etc/selinux/mls/
11 cp -L secolor.conf /etc/selinux/mls/
12 rm -f /etc/selinux/mls/setrans.d/*
13 cp setrans.d/* /etc/selinux/mls/setrans.d
  /external/selinux/policycoreutils/restorecond/
org.selinux.Restorecond.service 2 Name=org.selinux.Restorecond
  /external/selinux/policycoreutils/sepolicy/
sepolicy.8 3 sepolicy \- SELinux Policy Inspection tool
14 Query SELinux policy to see description of booleans
20 Query SELinux policy to see if domains can communicate with each other
27 Generate SELinux Policy module template
31 Launch Graphical User Interface for SELinux Policy, requires policycoreutils-gui package.
38 Print SELinux Policy interface information
44 Generate SELinux man pages
50 Query SELinux policy network information
56 Query SELinux Policy to see how a source process domain can transition to the target process domain
60 sepolicy is a tools set that will query the installed SELinux policy and generate useful reports, man pages, or even new policy modules
    [all...]
sepolicy-communicate.8 3 sepolicy-communicate \- Generate a report showing if two SELinux Policy Domains can communicate
11 Use sepolicy communicate to examine SELinux Policy to if a source SELinux Domain can communicate with a target SELinux Domain.
17 Specify the SELinux class which the source domain will attempt to communicate with the target domain. (Default file)
23 Specify the source SELinux domain type.
26 Specify the list of accesses used by the source SELinux domain type to communicate with the target domain. Default Open, Write.
29 Specify the target SELinux domain type.
32 Specify the list of accesses used by the target SELinux domain type to receive communications from the source domain. Default Open, Read.
38 sepolicy(8), selinux(8
    [all...]
  /external/selinux/libselinux/man/man5/
default_type.5 1 .TH "default_type" "5" "28-Nov-2011" "Security Enhanced Linux" "SELinux configuration"
3 default_type \- The SELinux default type configuration file
6 The \fIdefault_type\fR file contains entries that allow SELinux-aware applications such as \fBnewrole\fR(1) to select a default type for a role if one is not supplied.
10 .I /etc/selinux/{SELINUXTYPE}/contexts/default_type
13 Where \fI{SELINUXTYPE}\fR is the entry from the selinux configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
22 The SELinux role.
39 .BR selinux "(8), " get_default_type "(3), " newrole "(1), " selinux_default_type_path "(3), " selinux_config "(5) "
securetty_types.5 1 .TH "securetty_types" "5" "28-Nov-2011" "Security Enhanced Linux" "SELinux configuration"
3 securetty_types \- The SELinux secure tty type configuration file
8 file contains a list of types associated to secure tty type that are defined in the policy for use by SELinux-aware applications.
13 .I /etc/selinux/{SELINUXTYPE}/contexts/securetty_types
16 Where \fI{SELINUXTYPE}\fR is the entry from the selinux configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
20 SELinux-aware applications such as
45 .BR selinux "(8), " selinux_securetty_types_path "(3), " newrole "(1), " selinux_check_securetty_context "(3), " selinux_config "(5) "

Completed in 159 milliseconds

12 3 4 5 6 7 8 91011>>