| /linux/scripts/selinux/ |
| H A D | install_policy.sh | 39 mkdir -p /etc/selinux/dummy/policy 40 mkdir -p /etc/selinux/dummy/contexts/files 42 echo "__default__:user_u:s0" > /etc/selinux/dummy/seusers 43 echo "base_r:base_t:s0" > /etc/selinux/dummy/contexts/failsafe_context 44 echo "base_r:base_t:s0 base_r:base_t:s0" > /etc/selinux/dummy/default_contexts 45 cat > /etc/selinux/dummy/contexts/x_contexts <<EOF 52 touch /etc/selinux/dummy/contexts/virtual_domain_context 53 touch /etc/selinux/dummy/contexts/virtual_image_context 55 cp file_contexts /etc/selinux/dummy/contexts/files 56 cp dbus_contexts /etc/selinux/dummy/contexts [all …]
|
| /linux/security/selinux/ |
| H A D | Makefile | 11 obj-$(CONFIG_SECURITY_SELINUX) := selinux.o 13 ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include 17 selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \ 22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o 23 selinux-$(CONFIG_NETLABEL) += netlabel.o 24 selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o 25 selinux-$(CONFIG_IMA) += ima.o 31 $(addprefix $(obj)/,$(selinux-y)): $(obj)/flask.h 44 HOST_EXTRACFLAGS += -I$(srctree)/security/selinux/include
|
| H A D | Kconfig | 17 This option adds a kernel parameter 'selinux', which allows SELinux 19 functionality can be disabled with selinux=0 on the kernel 38 /sys/fs/selinux/enforce. 46 /sys/fs/selinux/avc/cache_stats, which may be monitored via 57 collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If 81 /sys/fs/selinux/avc/cache_threshold. 99 echo -n 'file "security/selinux/*" +p' > \
|
| H A D | hooks.c | 3703 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop() 3721 crsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up() 4327 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop() 4506 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj() 4512 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj() 6656 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop() 6954 return selinux_secid_to_secctx(prop->selinux.secid, cp); in selinux_lsmprop_to_secctx() 7898 DEFINE_LSM(selinux) = {
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | SELinux.rst | 8 https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git/tree/README.md 10 https://github.com/selinuxproject/selinux-kernel/wiki 14 https://github.com/SELinuxProject/selinux/wiki 24 scripts/selinux. Note that this requires the selinux 29 1. Compile the kernel with selinux enabled. 33 you are, reboot with selinux disabled 37 cd scripts/selinux 41 kernel, with a single selinux user, role, and type. 43 ``dummy`` in ``/etc/selinux/config``, install the compiled policy
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 15 1. Download selinux-policy SRPM package (e.g. selinux-policy-3.14.4-48.fc31.src.rpm on FC31) 18 # rpm -Uhv selinux-policy-3.14.4-48.fc31.src.rpm 22 # rpmbuild -bp selinux-policy.spec 24 3. Place patch below at rpmbuild/BUILD/selinux-policy-b86eaaf4dbcf2d51dd4432df7185c0eaf3cbcc02 27 # patch -p1 < selinux-policy-perf-events-perfmon.patch 30 # cat selinux-policy-perf-events-perfmon.patch 71 # rpmbuild --noclean --noprep -ba selinux-policy.spec 79 -rw-r--r--. 1 root root 112K Mar 20 12:16 selinux-policy-3.14.4-48.fc31.noarch.rpm 80 -rw-r--r--. 1 root root 1.2M Mar 20 12:17 selinux-policy-devel-3.14.4-48.fc31.noarch.rpm 81 -rw-r--r--. 1 root root 2.3M Mar 20 12:17 selinux-policy-doc-3.14.4-48.fc31.noarch.rpm [all …]
|
| /linux/Documentation/ABI/removed/ |
| H A D | sysfs-selinux-disable | 1 What: /sys/fs/selinux/disable 4 Contact: selinux@vger.kernel.org 14 The preferred method of disabling SELinux is via the "selinux=0" boot 28 More information on /sys/fs/selinux/disable can be found under the
|
| H A D | sysfs-selinux-checkreqprot | 1 What: /sys/fs/selinux/checkreqprot 4 Contact: selinux@vger.kernel.org 19 explicitly writing a "0" to /sys/fs/selinux/checkreqprot during
|
| /linux/Documentation/ABI/obsolete/ |
| H A D | sysfs-selinux-user | 1 What: /sys/fs/selinux/user 4 Contact: selinux@vger.kernel.org
|
| /linux/scripts/ |
| H A D | remove-stale-files | 24 rm -f scripts/selinux/genheaders/genheaders
|
| H A D | Makefile | 64 subdir-$(CONFIG_SECURITY_SELINUX) += selinux
|
| /linux/scripts/selinux/mdp/ |
| H A D | Makefile | 5 -I$(srctree)/security/selinux/include -I$(objtree)/include
|
| /linux/security/ |
| H A D | Makefile | 16 obj-$(CONFIG_SECURITY_SELINUX) += selinux/
|
| H A D | Kconfig | 221 source "security/selinux/Kconfig" 271 …default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAUL… 272 …default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAUL… 275 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
|
| /linux/Documentation/ABI/testing/ |
| H A D | procfs-attr-prev | 3 selinux@vger.kernel.org,
|
| H A D | procfs-attr-current | 3 selinux@vger.kernel.org,
|
| H A D | procfs-attr-exec | 3 selinux@vger.kernel.org,
|
| H A D | ima_policy | 73 label:= [selinux]|[kernel_info]|[data_label] 75 For example, "selinux" to measure critical data for SELinux.
|
| /linux/security/integrity/evm/ |
| H A D | Kconfig | 38 In addition to the original security xattrs (eg. security.selinux,
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | config.x86_64 | 129 CONFIG_LSM="selinux,bpf,integrity"
|
| /linux/tools/testing/selftests/hid/ |
| H A D | config.common | 120 CONFIG_LSM="selinux,bpf,integrity"
|
| /linux/Documentation/filesystems/ext4/ |
| H A D | attributes.rst | 9 ACLs and other security data (selinux). With the ``user_xattr`` mount
|
| /linux/Documentation/filesystems/caching/ |
| H A D | cachefiles.rst | 365 make -f /usr/share/selinux/devel/Makefile 368 You will need checkpolicy and selinux-policy-devel installed prior to the
|
| /linux/security/selinux/ss/ |
| H A D | services.c | 3742 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match() 3745 prop->selinux.secid); in selinux_audit_rule_match()
|
| /linux/include/linux/ |
| H A D | security.h | 165 struct lsm_prop_selinux selinux; member
|