Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] sample policies, obtaining example policies reference policy seaudit tool, audit messages, security attributes, security context, basics extended attributes labeling, strict example policy 2nd managing in extended attribute filesystems object labeling apol basics capability objects file-related initial SIDs network and socket objects process objects security object system objects System V IPC policy directories SELinux versus standard Linux system utility tools changing labeling Security Enhanced Linux (SELinux), annual conference history IRC channel mail list open source site security identifier (SID), security initial SIDs, security levels defining extensions MLS (multilevel security) security object class, security object labeling, security permissions, security servers, sediff tool, seedit tool, self keyword, AV (access vector) syntax, SELinux (Security Enhanced Linux), annual conference history IRC channel mail list open source site selinuxenabled tool, sem object class, sem permissions, send_msg permission, sendto permission, sensitivities, MLS (multilevel security), sensitivity statement, defining security levels, servers kernel security, userspace object managers policy architecture sestatus tool, setattr permission, 2nd setcap permission, setcurrent permission, 2nd setenforce tool, setexec permission, setfiles tool, setfscreate permission, 2nd SETools package, SETools Suite, setopt permission, setpgid permission, setrlimit permission, setsched permission, setsebool command, shadow password files, share permission, shm object class, shm permissions, shutdown permission, SID (security identifier), sigchld permission, siginh permission, sigkill permission, signal permission, signull permission, sigstop permission, Slat tool, sock_file object class, sock_file permissions, socket common permission sets, socket object classes, 2nd socket objects, labeling, socket permissions, software, flawed security enforcement, source files, strict example policy application configuration files domain types object class and permission definition policy rules security context labeling top-level files and directories unaffiliated types source identifiers, allow (UL) rule, source modules, source policy files, source types, allow (UL) rule, stat command, status information tools, strict example policies, build options build-time tunables configuring policy modules enabling optional MLS features policy module audit rules conditional policy example defining domain types ping access security context labeling transition rules source file structure application configuration files domain types object class and permission definition policy rules security context labeling top-level files and directories unaffiliated types su command, sudo/sudoedit command, support files, reference policy, swapon permission, 2nd symposiums, SELinux, sysctl initial SIDs, system administration, SELinux impact audit messages file-related object labeling multiple policy management user management system managmenet configuration files etc/selinux/config file policy directories policy management files etc/selinux/config file policy directories system administration audit messages file-related object labeling managing users multiple policy management system object class, system object labeling, system permissions, system policies, 2nd example policy reference policy system utilities modified SELinux commands policy module manual pages policy tools security context status information System V IPC objects, 2nd |