A class that may appear in SELinux policy or an access vector cache query.
A permission that may appear in SELinux policy or an access vector cache query.
A well-known “anon_file” class permission used to manage special file-like nodes not linked
into any directory structures.
A well-known “blk_file” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known “chr_file” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
Permissions common to all file-like object classes (e.g. “lnk_file”, “dir”). These are
combined with a specific FileClass
by policy enforcement hooks, to obtain class-affine
permission values to check.
A well-known “dir” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known “fd” class permission in SELinux policy that has a particular meaning in policy
enforcement hooks.
A well-known “fifo_file” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known file-like class in SELinux policy that has a particular meaning in policy
enforcement hooks.
A well-known “file” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known “filesystem” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
Initial Security Identifier (SID) values actually used by this implementation.
These must be present in the policy, for it to be valid.
A well-known “lnk_file” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known class in SELinux policy that has a particular meaning in policy enforcement
hooks.
A well-known (class, permission)
pair in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known “process” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.
A well-known “security” class permission in SELinux policy, used to control access to
sensitive administrative and query API surfaces in the “selinuxfs”.
A well-known “sock_file” class permission in SELinux policy that has a particular meaning in
policy enforcement hooks.