| /linux/security/selinux/ |
| H A D | Makefile | 11 obj-$(CONFIG_SECURITY_SELINUX) := selinux.o 13 ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include 17 selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \ 22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o 23 selinux-$(CONFIG_NETLABEL) += netlabel.o 24 selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o 25 selinux-$(CONFIG_IMA) += ima.o 31 $(addprefix $(obj)/,$(selinux-y)): $(obj)/flask.h 44 HOST_EXTRACFLAGS += -I$(srctree)/security/selinux/include
|
| H A D | Kconfig | 17 This option adds a kernel parameter 'selinux', which allows SELinux 19 functionality can be disabled with selinux=0 on the kernel 38 /sys/fs/selinux/enforce. 46 /sys/fs/selinux/avc/cache_stats, which may be monitored via 57 collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If 81 /sys/fs/selinux/avc/cache_threshold. 99 echo -n 'file "security/selinux/*" +p' > \
|
| H A D | hooks.c | 3679 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop() 3697 crsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up() 4215 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop() 4394 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj() 4400 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj() 6544 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop() 6842 return selinux_secid_to_secctx(prop->selinux.secid, cp); in selinux_lsmprop_to_secctx() 7783 DEFINE_LSM(selinux) = {
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | SELinux.rst | 8 https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git/tree/README.md 10 https://github.com/selinuxproject/selinux-kernel/wiki 14 https://github.com/SELinuxProject/selinux/wiki 24 scripts/selinux. Note that this requires the selinux 29 1. Compile the kernel with selinux enabled. 33 you are, reboot with selinux disabled 37 cd scripts/selinux 41 kernel, with a single selinux user, role, and type. 43 ``dummy`` in ``/etc/selinux/config``, install the compiled policy
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 15 1. Download selinux-policy SRPM package (e.g. selinux-policy-3.14.4-48.fc31.src.rpm on FC31) 18 # rpm -Uhv selinux-policy-3.14.4-48.fc31.src.rpm 22 # rpmbuild -bp selinux-policy.spec 24 3. Place patch below at rpmbuild/BUILD/selinux-policy-b86eaaf4dbcf2d51dd4432df7185c0eaf3cbcc02 27 # patch -p1 < selinux-policy-perf-events-perfmon.patch 30 # cat selinux-policy-perf-events-perfmon.patch 71 # rpmbuild --noclean --noprep -ba selinux-policy.spec 79 -rw-r--r--. 1 root root 112K Mar 20 12:16 selinux-policy-3.14.4-48.fc31.noarch.rpm 80 -rw-r--r--. 1 root root 1.2M Mar 20 12:17 selinux-policy-devel-3.14.4-48.fc31.noarch.rpm 81 -rw-r--r--. 1 root root 2.3M Mar 20 12:17 selinux-policy-doc-3.14.4-48.fc31.noarch.rpm [all …]
|
| /linux/Documentation/ABI/removed/ |
| H A D | sysfs-selinux-disable | 1 What: /sys/fs/selinux/disable 4 Contact: selinux@vger.kernel.org 14 The preferred method of disabling SELinux is via the "selinux=0" boot 28 More information on /sys/fs/selinux/disable can be found under the
|
| H A D | sysfs-selinux-checkreqprot | 1 What: /sys/fs/selinux/checkreqprot 4 Contact: selinux@vger.kernel.org 19 explicitly writing a "0" to /sys/fs/selinux/checkreqprot during
|
| /linux/scripts/ |
| H A D | remove-stale-files | 24 rm -f scripts/selinux/genheaders/genheaders
|
| H A D | Makefile | 64 subdir-$(CONFIG_SECURITY_SELINUX) += selinux
|
| /linux/security/ |
| H A D | Makefile | 16 obj-$(CONFIG_SECURITY_SELINUX) += selinux/
|
| H A D | Kconfig | 223 source "security/selinux/Kconfig" 273 default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAULT_SECURITY_SMACK 274 default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAULT_SECURITY_APPARMOR 277 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
|
| /linux/Documentation/ABI/testing/ |
| H A D | procfs-attr-prev | 3 selinux@vger.kernel.org,
|
| H A D | procfs-attr-current | 3 selinux@vger.kernel.org,
|
| H A D | procfs-attr-exec | 3 selinux@vger.kernel.org,
|
| H A D | ima_policy | 73 label:= [selinux]|[kernel_info]|[data_label] 75 For example, "selinux" to measure critical data for SELinux.
|
| /linux/security/integrity/evm/ |
| H A D | Kconfig | 38 In addition to the original security xattrs (eg. security.selinux,
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | config.x86_64 | 129 CONFIG_LSM="selinux,bpf,integrity"
|
| /linux/tools/testing/selftests/hid/ |
| H A D | config.common | 120 CONFIG_LSM="selinux,bpf,integrity"
|
| /linux/Documentation/filesystems/ext4/ |
| H A D | attributes.rst | 9 ACLs and other security data (selinux). With the ``user_xattr`` mount
|
| /linux/Documentation/filesystems/caching/ |
| H A D | cachefiles.rst | 365 make -f /usr/share/selinux/devel/Makefile 368 You will need checkpolicy and selinux-policy-devel installed prior to the
|
| /linux/security/selinux/ss/ |
| H A D | services.c | 3742 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match() 3745 prop->selinux.secid); in selinux_audit_rule_match()
|
| /linux/include/linux/ |
| H A D | security.h | 165 struct lsm_prop_selinux selinux; member
|
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 783 See security/selinux/Kconfig help text. 789 /sys/fs/selinux/checkreqprot. 1698 See security/selinux/Kconfig help text. 1703 /sys/fs/selinux/enforce. 6940 selinux= [SELINUX] Disable or enable SELinux at boot time. 6942 See security/selinux/Kconfig help text.
|
| /linux/ |
| H A D | MAINTAINERS | 23940 X: security/selinux/ 23947 L: selinux@vger.kernel.org 23950 Q: https://patchwork.kernel.org/project/selinux/list 23951 B: mailto:selinux@vger.kernel.org 23952 P: https://github.com/SELinuxProject/selinux-kernel/blob/main/README.md 23953 T: git https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git 23954 F: Documentation/ABI/removed/sysfs-selinux-checkreqprot 23955 F: Documentation/ABI/removed/sysfs-selinux-disable 23959 F: scripts/selinux/ 23960 F: security/selinux/ [all...] |