Home
last modified time | relevance | path

Searched refs:selinux (Results 1 – 24 of 24) sorted by relevance

/linux/security/selinux/
H A DMakefile11 obj-$(CONFIG_SECURITY_SELINUX) := selinux.o
13 ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include
17 selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \
22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o
23 selinux-$(CONFIG_NETLABEL) += netlabel.o
24 selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o
25 selinux-$(CONFIG_IMA) += ima.o
31 $(addprefix $(obj)/,$(selinux-y)): $(obj)/flask.h
44 HOST_EXTRACFLAGS += -I$(srctree)/security/selinux/include
H A DKconfig17 This option adds a kernel parameter 'selinux', which allows SELinux
19 functionality can be disabled with selinux=0 on the kernel
38 /sys/fs/selinux/enforce.
46 /sys/fs/selinux/avc/cache_stats, which may be monitored via
57 collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If
81 /sys/fs/selinux/avc/cache_threshold.
99 echo -n 'file "security/selinux/*" +p' > \
H A Dhooks.c3679 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop()
3697 crsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up()
4215 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop()
4394 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj()
4400 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj()
6544 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop()
6842 return selinux_secid_to_secctx(prop->selinux.secid, cp); in selinux_lsmprop_to_secctx()
7783 DEFINE_LSM(selinux) = {
/linux/Documentation/admin-guide/LSM/
H A DSELinux.rst8 https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git/tree/README.md
10 https://github.com/selinuxproject/selinux-kernel/wiki
14 https://github.com/SELinuxProject/selinux/wiki
24 scripts/selinux. Note that this requires the selinux
29 1. Compile the kernel with selinux enabled.
33 you are, reboot with selinux disabled
37 cd scripts/selinux
41 kernel, with a single selinux user, role, and type.
43 ``dummy`` in ``/etc/selinux/config``, install the compiled policy
/linux/tools/perf/Documentation/
H A Dsecurity.txt15 1. Download selinux-policy SRPM package (e.g. selinux-policy-3.14.4-48.fc31.src.rpm on FC31)
18 # rpm -Uhv selinux-policy-3.14.4-48.fc31.src.rpm
22 # rpmbuild -bp selinux-policy.spec
24 3. Place patch below at rpmbuild/BUILD/selinux-policy-b86eaaf4dbcf2d51dd4432df7185c0eaf3cbcc02
27 # patch -p1 < selinux-policy-perf-events-perfmon.patch
30 # cat selinux-policy-perf-events-perfmon.patch
71 # rpmbuild --noclean --noprep -ba selinux-policy.spec
79 -rw-r--r--. 1 root root 112K Mar 20 12:16 selinux-policy-3.14.4-48.fc31.noarch.rpm
80 -rw-r--r--. 1 root root 1.2M Mar 20 12:17 selinux-policy-devel-3.14.4-48.fc31.noarch.rpm
81 -rw-r--r--. 1 root root 2.3M Mar 20 12:17 selinux-policy-doc-3.14.4-48.fc31.noarch.rpm
[all …]
/linux/Documentation/ABI/removed/
H A Dsysfs-selinux-disable1 What: /sys/fs/selinux/disable
4 Contact: selinux@vger.kernel.org
14 The preferred method of disabling SELinux is via the "selinux=0" boot
28 More information on /sys/fs/selinux/disable can be found under the
H A Dsysfs-selinux-checkreqprot1 What: /sys/fs/selinux/checkreqprot
4 Contact: selinux@vger.kernel.org
19 explicitly writing a "0" to /sys/fs/selinux/checkreqprot during
/linux/scripts/
H A Dremove-stale-files24 rm -f scripts/selinux/genheaders/genheaders
H A DMakefile64 subdir-$(CONFIG_SECURITY_SELINUX) += selinux
/linux/security/
H A DMakefile16 obj-$(CONFIG_SECURITY_SELINUX) += selinux/
H A DKconfig223 source "security/selinux/Kconfig"
273 default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAULT_SECURITY_SMACK
274 default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAULT_SECURITY_APPARMOR
277 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
/linux/Documentation/ABI/testing/
H A Dprocfs-attr-prev3 selinux@vger.kernel.org,
H A Dprocfs-attr-current3 selinux@vger.kernel.org,
H A Dprocfs-attr-exec3 selinux@vger.kernel.org,
H A Dima_policy73 label:= [selinux]|[kernel_info]|[data_label]
75 For example, "selinux" to measure critical data for SELinux.
/linux/security/integrity/evm/
H A DKconfig38 In addition to the original security xattrs (eg. security.selinux,
/linux/tools/testing/selftests/bpf/
H A Dconfig.x86_64129 CONFIG_LSM="selinux,bpf,integrity"
/linux/tools/testing/selftests/hid/
H A Dconfig.common120 CONFIG_LSM="selinux,bpf,integrity"
/linux/Documentation/filesystems/ext4/
H A Dattributes.rst9 ACLs and other security data (selinux). With the ``user_xattr`` mount
/linux/Documentation/filesystems/caching/
H A Dcachefiles.rst365 make -f /usr/share/selinux/devel/Makefile
368 You will need checkpolicy and selinux-policy-devel installed prior to the
/linux/security/selinux/ss/
H A Dservices.c3742 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match()
3745 prop->selinux.secid); in selinux_audit_rule_match()
/linux/include/linux/
H A Dsecurity.h165 struct lsm_prop_selinux selinux; member
/linux/Documentation/admin-guide/
H A Dkernel-parameters.txt783 See security/selinux/Kconfig help text.
789 /sys/fs/selinux/checkreqprot.
1698 See security/selinux/Kconfig help text.
1703 /sys/fs/selinux/enforce.
6940 selinux= [SELINUX] Disable or enable SELinux at boot time.
6942 See security/selinux/Kconfig help text.
/linux/
H A DMAINTAINERS23940 X: security/selinux/
23947 L: selinux@vger.kernel.org
23950 Q: https://patchwork.kernel.org/project/selinux/list
23951 B: mailto:selinux@vger.kernel.org
23952 P: https://github.com/SELinuxProject/selinux-kernel/blob/main/README.md
23953 T: git https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
23954 F: Documentation/ABI/removed/sysfs-selinux-checkreqprot
23955 F: Documentation/ABI/removed/sysfs-selinux-disable
23959 F: scripts/selinux/
23960 F: security/selinux/
[all...]