Searched full:labeling (Results 1 – 25 of 42) sorted by relevance
12
14 use of a common code base for several different packet labeling protocols.21 Since NetLabel supports multiple different packet labeling protocols and LSMs
28 configured to use CIPSO for packet labeling then a CIPSO IP option will be
65 u32 def_sid; /* default SID for labeling */67 unsigned short behavior; /* labeling behavior */
319 #define SECURITY_FS_USE_NONE 5 /* no labeling support */320 #define SECURITY_FS_USE_MNTPOINT 6 /* use mountpoint labeling */
12 NetLabel provides support for explicit network packet labeling
6 * which network labeling protocol to use for a given domain. The NetLabel
1042 * Remove all the NetLabel labeling from @sk. The caller is responsible for1066 * Examines the given sock to see if any NetLabel style labeling has been1250 * Remove all the NetLabel labeling from @req.1353 * Examines the given packet to see if a recognized form of packet labeling1393 * according to the packet's labeling protocol.
40 List of strings, labeling the mux controller states. An empty
11 * process from labeling an object with a different user
202 u32 behavior; /* labeling behavior for fs_use */293 fixed labeling behavior. */
1606 * kernel labeling of the MLS field if the MLS field is not present1892 * Compute a SID to use for labeling a new subject or object in the2810 * cannot support xattr or use a fixed labeling behavior like2901 * security_fs_use - Determine how to handle labeling for a filesystem.3236 * @nlbl_type: NetLabel labeling protocol type
302 SCTP Peer Labeling313 1) If peer labeling is not enabled, then the peer context will always be331 5) The NetLabel SCTP peer labeling rules apply as discussed in the following
108 7. Enable filesystem SELinux labeling at the next reboot:227 To remove SELinux labeling from local filesystems:
26 * Use IPv6 port labeling if IPv6 is enabled and secmarks224 #define MAY_TRANSMUTE 0x00001000 /* Controls directory labeling */
536 * If direct labeling works use it. in smack_populate_secattr()537 * Otherwise use mapped labeling. in smack_populate_secattr()
138 * done. This is safe to call even if you are unsure if NetLabel labeling is183 * @type: NetLabel labeling protocol type
171 * selinux_peerlbl_enabled - Check to see if peer labeling is currently enabled176 * always_check_network policy capability is enabled, peer labeling619 * labeling information.740 * Determine the labeling behavior to use for this in selinux_set_mnt_opts()788 * Switch to using mount point labeling behavior. in selinux_set_mnt_opts()796 * filesystem requested native labeling. We had already in selinux_set_mnt_opts()1326 * PID part to get a valid selinux labeling. in selinux_genfs_get_sid()4474 * Check the various different forms of network peer labeling and determine5578 /* we don't currently perform any NetLabel based labeling here and it in selinux_tun_dev_attach()5580 * labeling without the support of the TUN user the resulting labeled in selinux_tun_dev_attach()[all …]
186 /* for labeling diagnostics */
92 * for dealing with explicit packet labeling protocols such as CIPSO and138 * number of categories supported by most labeling protocols it is not
24 values conversion, labeling of inputs and hiding of unused inputs.30 will have to implement conversion, labeling and hiding of inputs. For
236 * we list the filesystem types for which per-file labeling is in main()
177 * = u_0 + u_1*y + u_2*y^2 + ... [re-labeling u_i --> u_{i+1}]
314 is dangerous and can ruin the proper labeling of your system.650 of systems that use compatible labeling schemes, and the DOI specified on the
315 a file's extended name. Think of slots as additional labeling for the
112 /* struct aa_label - lazy labeling struct