OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:selinux
(Results
26 - 50
of
1108
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/selinux/libselinux/man/man3/
selinux_policy_root.3
1
.TH "selinux_policy_root" "3" "25 May 2004" "dwalsh@redhat.com" "
SELinux
API documentation"
3
selinux_policy_root \- return the path of the
SELinux
policy files for this machine
4
selinux_set_policy_root \- Set an alternate
SELinux
root path for the
SELinux
policy files for this machine.
7
.B #include <
selinux
/
selinux
.h>
17
.I /etc/
selinux
/config
23
.I /etc/
selinux
/config
27
On success, selinux_policy_root returns a directory path containing the
SELinux
policy files.
34
.BR
selinux
"(8)
[
all
...]
matchmediacon.3
1
.TH "matchmediacon" "3" "15 November 2004" "dwalsh@redhat.com" "
SELinux
API documentation"
3
matchmediacon \- get the default
SELinux
security context for the specified mediatype from the policy
6
.B #include <
selinux
/
selinux
.h>
27
.I /etc/
selinux
/{POLICYTYPE}/contexts/files/media
30
.BR
selinux
"(8), " freecon "(3)
getseuserbyname.3
1
.TH "getseuserbyname" "3" "29 September 2005" "dwalsh@redhat.com" "
SELinux
API documentation"
3
getseuserbyname \- get
SELinux
username and level for a given Linux username
6
.B #include <
selinux
/
selinux
.h>
12
retrieves the
SELinux
username and security level associated with
13
a given Linux username. The
SELinux
username and security level can
19
The returned
SELinux
username and level should be freed by the caller
33
.BR
selinux
"(8)"
security_getenforce.3
1
.TH "security_getenforce" "3" "1 January 2004" "russell@coker.com.au" "
SELinux
API documentation"
3
security_getenforce, security_setenforce, security_deny_unknown \- get or set the enforcing state of
SELinux
6
.B #include <
selinux
/
selinux
.h>
16
returns 0 if
SELinux
is running in permissive mode, 1 if it is running in
20
sets
SELinux
to enforcing mode if the value 1 is passed in, and sets it to
25
returns 0 if
SELinux
treats policy queries on undefined object classes or
29
.BR
selinux
"(8)"
is_context_customizable.3
1
.TH "is_context_customizable" "3" "10 January 2005" "dwalsh@redhat.com" "
SELinux
API documentation"
3
is_context_customizable \- check whether
SELinux
context type is customizable by the administrator
6
.B #include <
selinux
/
selinux
.h>
12
.I /etc/
selinux
/{SELINUXTYPE}/context/customizable_types
21
.I /etc/
selinux
/{SELINUXTYPE}/context/customizable_types
24
.BR
selinux
"(8)"
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
start.txt
1
You must 'Select' the initial screen to view for
SELinux
Configuration.
4
This application allows you to browse
SELinux
confinement per application. You can enter the name of the application to see how
SELinux
confines it, or you could enter the
SELinux
name for the running process.
6
Alternatively you can select to manage
SELinux
on the system, lockdown the system via
SELinux
. You can also manage confined users and confined user mappings. Finally you could setup File System Labeling equivalence.
users.txt
1
By Default on a
SELinux
Targeted Policy system, all users login using the unconfined_t user.
3
SELinux
has a very powerful concept called confined users. You can setup individual users on your system to login with different
SELinux
user types. This
SELinux
User Screen allows you to create/modify
SELinux
Users and map them to
SELinux
Roles and MLS/MCS Ranges
5
Default
SELinux
Users:
20
-
SELinux
does not block access.
lockdown.txt
1
The Lockdown Screen allows you to tighten the
SELinux
Security on your machine.
4
These lockdown measures are recommended, but can cause
SELinux
issues. If you have a machine you truly want to secure, and are confident in your understanding of
SELinux
you should try some of these options.
system_current_mode.txt
1
You can switch
SELinux
between Enforcing mode and Permissive mode.
4
When a machine is in permissive mode,
SELinux
will continue to log
SELinux
AVC messages, that would have been denied if the machine was in enforcing mode.
login.txt
1
By Default on a
SELinux
Targeted Policy system, all users login using the unconfined_t user.
4
But
SELinux
has a very powerful concept called confined users. You can setup individual users on your system to login with different
SELinux
user types. This Login Mapping Screen allows you to map a Linux login user to an
SELinux
User.
6
Default
SELinux
Users:
21
-
SELinux
does not block access.
/external/selinux/libselinux/src/
setrans_internal.h
2
#include <
selinux
/
selinux
.h>
selinuxswig.i
5
%module
selinux
7
#include "../include/
selinux
/avc.h"
8
#include "../include/
selinux
/context.h"
9
#include "../include/
selinux
/get_context_list.h"
10
#include "../include/
selinux
/get_default_type.h"
11
#include "../include/
selinux
/label.h"
12
#include "../include/
selinux
/
selinux
.h"
59
%include "../include/
selinux
/avc.h"
60
%include "../include/
selinux
/context.h
[
all
...]
/external/selinux/policycoreutils/gui/
org.selinux.config.policy
7
<vendor>System Config
SELinux
</vendor>
8
<vendor_url>http://fedorahosted.org/system-config-
selinux
</vendor_url>
10
<action id="org.
selinux
.config.pkexec.run">
11
<description>Run System Config
SELinux
</description>
12
<message>Authentication is required to run system-config-
selinux
</message>
13
<icon_name>system-
selinux
</icon_name>
19
<annotate key="org.freedesktop.policykit.exec.path">/usr/share/system-config-
selinux
/system-config-
selinux
.py</annotate>
Makefile
5
SHAREDIR ?= $(PREFIX)/share/system-config-
selinux
21
system-config-
selinux
.glade \
22
system-config-
selinux
.png \
25
all: $(TARGETS) system-config-
selinux
.py polgengui.py
35
install -m 755 system-config-
selinux
.py $(SHAREDIR)
36
install -m 755 system-config-
selinux
$(BINDIR)
39
install -m 644 system-config-
selinux
.8 $(MANDIR)/man8
40
install -m 644
selinux
-polgengui.8 $(MANDIR)/man8
41
install -m 644 system-config-
selinux
.png $(DATADIR)/pixmaps
42
install -m 644 system-config-
selinux
.png $(DATADIR)/icons/hicolor/24x24/app
[
all
...]
/external/selinux/policycoreutils/mcstrans/src/
mcstrans.h
3
#include <
selinux
/
selinux
.h>
mcstrans.service
2
Description=Translates
SELinux
MCS/MLS labels to human readable form
3
ConditionSecurity=
selinux
/external/selinux/libselinux/include/
Makefile
3
INCDIR ?= $(PREFIX)/include/
selinux
9
install -m 644 $(wildcard
selinux
/*.h) $(INCDIR)
14
../../scripts/Lindent $(wildcard
selinux
/*.h)
17
-rm -f
selinux
/*~
/external/selinux/libselinux/man/man8/
selinuxenabled.8
1
.TH "selinuxenabled" "8" "7 April 2004" "dwalsh@redhat.com" "
SELinux
Command Line documentation"
3
selinuxenabled \- tool to be used within shell scripts to determine if
selinux
is enabled
9
Indicates whether
SELinux
is enabled or disabled.
12
It exits with status 0 if
SELinux
is enabled and 1 if it is not enabled.
18
.BR
selinux
(8),
getenforce.8
1
.TH "getenforce" "8" "7 April 2004" "dwalsh@redhat.com" "
SELinux
Command Line documentation"
3
getenforce \- get the current mode of
SELinux
10
reports whether
SELinux
is enforcing, permissive, or disabled.
16
.BR
selinux
(8),
/external/selinux/policycoreutils/mcstrans/share/examples/urcsts-via-include/
README
10
cp -L setrans.conf /etc/
selinux
/mls/
11
cp -L secolor.conf /etc/
selinux
/mls/
12
rm -f /etc/
selinux
/mls/setrans.d/*
13
cp setrans.d/* /etc/
selinux
/mls/setrans.d
/external/selinux/policycoreutils/restorecond/
org.selinux.Restorecond.service
2
Name=org.
selinux
.Restorecond
/external/selinux/policycoreutils/sepolicy/
sepolicy.8
3
sepolicy \-
SELinux
Policy Inspection tool
14
Query
SELinux
policy to see description of booleans
20
Query
SELinux
policy to see if domains can communicate with each other
27
Generate
SELinux
Policy module template
31
Launch Graphical User Interface for
SELinux
Policy, requires policycoreutils-gui package.
38
Print
SELinux
Policy interface information
44
Generate
SELinux
man pages
50
Query
SELinux
policy network information
56
Query
SELinux
Policy to see how a source process domain can transition to the target process domain
60
sepolicy is a tools set that will query the installed
SELinux
policy and generate useful reports, man pages, or even new policy modules
[
all
...]
sepolicy-communicate.8
3
sepolicy-communicate \- Generate a report showing if two
SELinux
Policy Domains can communicate
11
Use sepolicy communicate to examine
SELinux
Policy to if a source
SELinux
Domain can communicate with a target
SELinux
Domain.
17
Specify the
SELinux
class which the source domain will attempt to communicate with the target domain. (Default file)
23
Specify the source
SELinux
domain type.
26
Specify the list of accesses used by the source
SELinux
domain type to communicate with the target domain. Default Open, Write.
29
Specify the target
SELinux
domain type.
32
Specify the list of accesses used by the target
SELinux
domain type to receive communications from the source domain. Default Open, Read.
38
sepolicy(8),
selinux
(8
[
all
...]
/external/selinux/libselinux/man/man5/
default_type.5
1
.TH "default_type" "5" "28-Nov-2011" "Security Enhanced Linux" "
SELinux
configuration"
3
default_type \- The
SELinux
default type configuration file
6
The \fIdefault_type\fR file contains entries that allow
SELinux
-aware applications such as \fBnewrole\fR(1) to select a default type for a role if one is not supplied.
10
.I /etc/
selinux
/{SELINUXTYPE}/contexts/default_type
13
Where \fI{SELINUXTYPE}\fR is the entry from the
selinux
configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
22
The
SELinux
role.
39
.BR
selinux
"(8), " get_default_type "(3), " newrole "(1), " selinux_default_type_path "(3), " selinux_config "(5) "
securetty_types.5
1
.TH "securetty_types" "5" "28-Nov-2011" "Security Enhanced Linux" "
SELinux
configuration"
3
securetty_types \- The
SELinux
secure tty type configuration file
8
file contains a list of types associated to secure tty type that are defined in the policy for use by
SELinux
-aware applications.
13
.I /etc/
selinux
/{SELINUXTYPE}/contexts/securetty_types
16
Where \fI{SELINUXTYPE}\fR is the entry from the
selinux
configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
20
SELinux
-aware applications such as
45
.BR
selinux
"(8), " selinux_securetty_types_path "(3), " newrole "(1), " selinux_check_securetty_context "(3), " selinux_config "(5) "
Completed in 159 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>