/linux-6.14.4/scripts/selinux/ |
D | install_policy.sh | 39 mkdir -p /etc/selinux/dummy/policy 40 mkdir -p /etc/selinux/dummy/contexts/files 42 echo "__default__:user_u:s0" > /etc/selinux/dummy/seusers 43 echo "base_r:base_t:s0" > /etc/selinux/dummy/contexts/failsafe_context 44 echo "base_r:base_t:s0 base_r:base_t:s0" > /etc/selinux/dummy/default_contexts 45 cat > /etc/selinux/dummy/contexts/x_contexts <<EOF 52 touch /etc/selinux/dummy/contexts/virtual_domain_context 53 touch /etc/selinux/dummy/contexts/virtual_image_context 55 cp file_contexts /etc/selinux/dummy/contexts/files 56 cp dbus_contexts /etc/selinux/dummy/contexts [all …]
|
/linux-6.14.4/security/selinux/ |
D | Makefile | 11 obj-$(CONFIG_SECURITY_SELINUX) := selinux.o 13 ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include 17 selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \ 22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o 23 selinux-$(CONFIG_NETLABEL) += netlabel.o 24 selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o 25 selinux-$(CONFIG_IMA) += ima.o 31 $(addprefix $(obj)/,$(selinux-y)): $(obj)/flask.h 44 HOST_EXTRACFLAGS += -I$(srctree)/security/selinux/include
|
D | Kconfig | 17 This option adds a kernel parameter 'selinux', which allows SELinux 19 functionality can be disabled with selinux=0 on the kernel 38 /sys/fs/selinux/enforce. 46 /sys/fs/selinux/avc/cache_stats, which may be monitored via 57 collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If 88 echo -n 'file "security/selinux/*" +p' > \
|
D | hooks.c | 3511 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop() 3529 tsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up() 4041 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop() 4181 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj() 4187 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj() 6367 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop() 6665 return selinux_secid_to_secctx(prop->selinux.secid, cp); in selinux_lsmprop_to_secctx() 7506 DEFINE_LSM(selinux) = {
|
/linux-6.14.4/Documentation/admin-guide/LSM/ |
D | SELinux.rst | 13 scripts/selinux. Note that this requires the selinux 18 1. Compile the kernel with selinux enabled. 22 you are, reboot with selinux disabled 26 cd scripts/selinux 30 kernel, with a single selinux user, role, and type. 32 ``dummy`` in ``/etc/selinux/config``, install the compiled policy
|
/linux-6.14.4/tools/perf/Documentation/ |
D | security.txt | 15 1. Download selinux-policy SRPM package (e.g. selinux-policy-3.14.4-48.fc31.src.rpm on FC31) 18 # rpm -Uhv selinux-policy-3.14.4-48.fc31.src.rpm 22 # rpmbuild -bp selinux-policy.spec 24 3. Place patch below at rpmbuild/BUILD/selinux-policy-b86eaaf4dbcf2d51dd4432df7185c0eaf3cbcc02 27 # patch -p1 < selinux-policy-perf-events-perfmon.patch 30 # cat selinux-policy-perf-events-perfmon.patch 71 # rpmbuild --noclean --noprep -ba selinux-policy.spec 79 -rw-r--r--. 1 root root 112K Mar 20 12:16 selinux-policy-3.14.4-48.fc31.noarch.rpm 80 -rw-r--r--. 1 root root 1.2M Mar 20 12:17 selinux-policy-devel-3.14.4-48.fc31.noarch.rpm 81 -rw-r--r--. 1 root root 2.3M Mar 20 12:17 selinux-policy-doc-3.14.4-48.fc31.noarch.rpm [all …]
|
/linux-6.14.4/Documentation/ABI/removed/ |
D | sysfs-selinux-disable | 1 What: /sys/fs/selinux/disable 4 Contact: selinux@vger.kernel.org 14 The preferred method of disabling SELinux is via the "selinux=0" boot 28 More information on /sys/fs/selinux/disable can be found under the
|
D | sysfs-selinux-checkreqprot | 1 What: /sys/fs/selinux/checkreqprot 4 Contact: selinux@vger.kernel.org 19 explicitly writing a "0" to /sys/fs/selinux/checkreqprot during
|
/linux-6.14.4/Documentation/ABI/obsolete/ |
D | sysfs-selinux-user | 1 What: /sys/fs/selinux/user 4 Contact: selinux@vger.kernel.org
|
/linux-6.14.4/scripts/ |
D | remove-stale-files | 24 rm -f scripts/selinux/genheaders/genheaders
|
D | Makefile | 58 subdir-$(CONFIG_SECURITY_SELINUX) += selinux
|
/linux-6.14.4/scripts/selinux/mdp/ |
D | Makefile | 5 -I$(srctree)/security/selinux/include -I$(objtree)/include
|
/linux-6.14.4/security/ |
D | Makefile | 16 obj-$(CONFIG_SECURITY_SELINUX) += selinux/
|
D | Kconfig | 223 source "security/selinux/Kconfig" 272 …default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAUL… 273 …default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAUL… 276 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
|
/linux-6.14.4/Documentation/ABI/testing/ |
D | procfs-attr-prev | 3 selinux@vger.kernel.org,
|
D | procfs-attr-current | 3 selinux@vger.kernel.org,
|
D | procfs-attr-exec | 3 selinux@vger.kernel.org,
|
D | ima_policy | 72 label:= [selinux]|[kernel_info]|[data_label] 74 For example, "selinux" to measure critical data for SELinux.
|
/linux-6.14.4/security/integrity/evm/ |
D | Kconfig | 38 In addition to the original security xattrs (eg. security.selinux,
|
/linux-6.14.4/tools/testing/selftests/bpf/ |
D | config.x86_64 | 133 CONFIG_LSM="selinux,bpf,integrity"
|
/linux-6.14.4/tools/testing/selftests/hid/ |
D | config.common | 121 CONFIG_LSM="selinux,bpf,integrity"
|
/linux-6.14.4/Documentation/filesystems/ext4/ |
D | attributes.rst | 9 ACLs and other security data (selinux). With the ``user_xattr`` mount
|
/linux-6.14.4/Documentation/filesystems/caching/ |
D | cachefiles.rst | 365 make -f /usr/share/selinux/devel/Makefile 368 You will need checkpolicy and selinux-policy-devel installed prior to the
|
/linux-6.14.4/security/selinux/ss/ |
D | services.c | 3690 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match() 3693 prop->selinux.secid); in selinux_audit_rule_match()
|
/linux-6.14.4/include/linux/ |
D | security.h | 163 struct lsm_prop_selinux selinux; member
|