O'Reilly logo

SELinux by Example: Using Security Enhanced Linux by David Caplan, Karl MacMillan, Frank Mayer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix C. Object Classes and Permissions

In this chapter

• C.1 Common Permission Sets

• C.2 Object Classes and Defined Permission Sets

This appendix provides a detailed summary and listing of all object classes and permissions supported by the kernel at the time of this writing. Be aware that object classes and permissions are occasionally changed and added. Some object classes and permissions listed are no longer used. They remain defined primarily for compatibility reasons. Their use in a policy would have no effect on a system with an up-to-date kernel. You can find a maintained list of object classes and permissions at www.tresys.com/selinux. You can also use the National Security Agency (NSA) technical report “Implementing SELinux as a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required