Home
last modified time | relevance | path

Searched refs:selinux (Results 1 – 25 of 28) sorted by relevance

12

/linux-6.14.4/scripts/selinux/
Dinstall_policy.sh39 mkdir -p /etc/selinux/dummy/policy
40 mkdir -p /etc/selinux/dummy/contexts/files
42 echo "__default__:user_u:s0" > /etc/selinux/dummy/seusers
43 echo "base_r:base_t:s0" > /etc/selinux/dummy/contexts/failsafe_context
44 echo "base_r:base_t:s0 base_r:base_t:s0" > /etc/selinux/dummy/default_contexts
45 cat > /etc/selinux/dummy/contexts/x_contexts <<EOF
52 touch /etc/selinux/dummy/contexts/virtual_domain_context
53 touch /etc/selinux/dummy/contexts/virtual_image_context
55 cp file_contexts /etc/selinux/dummy/contexts/files
56 cp dbus_contexts /etc/selinux/dummy/contexts
[all …]
/linux-6.14.4/security/selinux/
DMakefile11 obj-$(CONFIG_SECURITY_SELINUX) := selinux.o
13 ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include
17 selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \
22 selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o
23 selinux-$(CONFIG_NETLABEL) += netlabel.o
24 selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o
25 selinux-$(CONFIG_IMA) += ima.o
31 $(addprefix $(obj)/,$(selinux-y)): $(obj)/flask.h
44 HOST_EXTRACFLAGS += -I$(srctree)/security/selinux/include
DKconfig17 This option adds a kernel parameter 'selinux', which allows SELinux
19 functionality can be disabled with selinux=0 on the kernel
38 /sys/fs/selinux/enforce.
46 /sys/fs/selinux/avc/cache_stats, which may be monitored via
57 collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If
88 echo -n 'file "security/selinux/*" +p' > \
Dhooks.c3511 prop->selinux.secid = isec->sid; in selinux_inode_getlsmprop()
3529 tsec->create_sid = prop.selinux.secid; in selinux_inode_copy_up()
4041 prop->selinux.secid = cred_sid(c); in selinux_cred_getlsmprop()
4181 prop->selinux.secid = current_sid(); in selinux_current_getlsmprop_subj()
4187 prop->selinux.secid = task_sid_obj(p); in selinux_task_getlsmprop_obj()
6367 prop->selinux.secid = isec->sid; in selinux_ipc_getlsmprop()
6665 return selinux_secid_to_secctx(prop->selinux.secid, cp); in selinux_lsmprop_to_secctx()
7506 DEFINE_LSM(selinux) = {
/linux-6.14.4/Documentation/admin-guide/LSM/
DSELinux.rst13 scripts/selinux. Note that this requires the selinux
18 1. Compile the kernel with selinux enabled.
22 you are, reboot with selinux disabled
26 cd scripts/selinux
30 kernel, with a single selinux user, role, and type.
32 ``dummy`` in ``/etc/selinux/config``, install the compiled policy
/linux-6.14.4/tools/perf/Documentation/
Dsecurity.txt15 1. Download selinux-policy SRPM package (e.g. selinux-policy-3.14.4-48.fc31.src.rpm on FC31)
18 # rpm -Uhv selinux-policy-3.14.4-48.fc31.src.rpm
22 # rpmbuild -bp selinux-policy.spec
24 3. Place patch below at rpmbuild/BUILD/selinux-policy-b86eaaf4dbcf2d51dd4432df7185c0eaf3cbcc02
27 # patch -p1 < selinux-policy-perf-events-perfmon.patch
30 # cat selinux-policy-perf-events-perfmon.patch
71 # rpmbuild --noclean --noprep -ba selinux-policy.spec
79 -rw-r--r--. 1 root root 112K Mar 20 12:16 selinux-policy-3.14.4-48.fc31.noarch.rpm
80 -rw-r--r--. 1 root root 1.2M Mar 20 12:17 selinux-policy-devel-3.14.4-48.fc31.noarch.rpm
81 -rw-r--r--. 1 root root 2.3M Mar 20 12:17 selinux-policy-doc-3.14.4-48.fc31.noarch.rpm
[all …]
/linux-6.14.4/Documentation/ABI/removed/
Dsysfs-selinux-disable1 What: /sys/fs/selinux/disable
4 Contact: selinux@vger.kernel.org
14 The preferred method of disabling SELinux is via the "selinux=0" boot
28 More information on /sys/fs/selinux/disable can be found under the
Dsysfs-selinux-checkreqprot1 What: /sys/fs/selinux/checkreqprot
4 Contact: selinux@vger.kernel.org
19 explicitly writing a "0" to /sys/fs/selinux/checkreqprot during
/linux-6.14.4/Documentation/ABI/obsolete/
Dsysfs-selinux-user1 What: /sys/fs/selinux/user
4 Contact: selinux@vger.kernel.org
/linux-6.14.4/scripts/
Dremove-stale-files24 rm -f scripts/selinux/genheaders/genheaders
DMakefile58 subdir-$(CONFIG_SECURITY_SELINUX) += selinux
/linux-6.14.4/scripts/selinux/mdp/
DMakefile5 -I$(srctree)/security/selinux/include -I$(objtree)/include
/linux-6.14.4/security/
DMakefile16 obj-$(CONFIG_SECURITY_SELINUX) += selinux/
DKconfig223 source "security/selinux/Kconfig"
272 …default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAUL…
273 …default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAUL…
276 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
/linux-6.14.4/Documentation/ABI/testing/
Dprocfs-attr-prev3 selinux@vger.kernel.org,
Dprocfs-attr-current3 selinux@vger.kernel.org,
Dprocfs-attr-exec3 selinux@vger.kernel.org,
Dima_policy72 label:= [selinux]|[kernel_info]|[data_label]
74 For example, "selinux" to measure critical data for SELinux.
/linux-6.14.4/security/integrity/evm/
DKconfig38 In addition to the original security xattrs (eg. security.selinux,
/linux-6.14.4/tools/testing/selftests/bpf/
Dconfig.x86_64133 CONFIG_LSM="selinux,bpf,integrity"
/linux-6.14.4/tools/testing/selftests/hid/
Dconfig.common121 CONFIG_LSM="selinux,bpf,integrity"
/linux-6.14.4/Documentation/filesystems/ext4/
Dattributes.rst9 ACLs and other security data (selinux). With the ``user_xattr`` mount
/linux-6.14.4/Documentation/filesystems/caching/
Dcachefiles.rst365 make -f /usr/share/selinux/devel/Makefile
368 You will need checkpolicy and selinux-policy-devel installed prior to the
/linux-6.14.4/security/selinux/ss/
Dservices.c3690 ctxt = sidtab_search(policy->sidtab, prop->selinux.secid); in selinux_audit_rule_match()
3693 prop->selinux.secid); in selinux_audit_rule_match()
/linux-6.14.4/include/linux/
Dsecurity.h163 struct lsm_prop_selinux selinux; member

12