1 # SPDX-License-Identifier: GPL-2.0-only << 2 config SECURITY_SELINUX 1 config SECURITY_SELINUX 3 bool "SELinux Support" !! 2 bool "NSA SELinux Support" 4 depends on SECURITY_NETWORK && AUDIT & !! 3 depends on SECURITY 5 select NETWORK_SECMARK << 6 default n 4 default n 7 help 5 help 8 This selects Security-Enhanced Linux !! 6 This selects NSA Security-Enhanced Linux (SELinux). 9 You will also need a policy configur 7 You will also need a policy configuration and a labeled filesystem. >> 8 You can obtain the policy compiler (checkpolicy), the utility for >> 9 labeling filesystems (setfiles), and an example policy configuration >> 10 from http://www.nsa.gov/selinux. 10 If you are unsure how to answer this 11 If you are unsure how to answer this question, answer N. 11 12 12 config SECURITY_SELINUX_BOOTPARAM 13 config SECURITY_SELINUX_BOOTPARAM 13 bool "SELinux boot parameter" !! 14 bool "NSA SELinux boot parameter" 14 depends on SECURITY_SELINUX 15 depends on SECURITY_SELINUX 15 default n 16 default n 16 help 17 help 17 This option adds a kernel parameter 18 This option adds a kernel parameter 'selinux', which allows SELinux 18 to be disabled at boot. If this opt 19 to be disabled at boot. If this option is selected, SELinux 19 functionality can be disabled with s 20 functionality can be disabled with selinux=0 on the kernel 20 command line. The purpose of this o 21 command line. The purpose of this option is to allow a single 21 kernel image to be distributed with 22 kernel image to be distributed with SELinux built in, but not 22 necessarily enabled. 23 necessarily enabled. 23 24 24 If you are unsure how to answer this 25 If you are unsure how to answer this question, answer N. 25 26 26 config SECURITY_SELINUX_DEVELOP 27 config SECURITY_SELINUX_DEVELOP 27 bool "SELinux Development Support" !! 28 bool "NSA SELinux Development Support" 28 depends on SECURITY_SELINUX 29 depends on SECURITY_SELINUX 29 default y 30 default y 30 help 31 help 31 This enables the development support !! 32 This enables the development support option of NSA SELinux, 32 which is useful for experimenting wi 33 which is useful for experimenting with SELinux and developing 33 policies. If unsure, say Y. With t 34 policies. If unsure, say Y. With this option enabled, the 34 kernel will start in permissive mode 35 kernel will start in permissive mode (log everything, deny nothing) 35 unless you specify enforcing=1 on th 36 unless you specify enforcing=1 on the kernel command line. You 36 can interactively toggle the kernel 37 can interactively toggle the kernel between enforcing mode and 37 permissive mode (if permitted by the !! 38 permissive mode (if permitted by the policy) via /selinux/enforce. 38 /sys/fs/selinux/enforce. << 39 39 40 config SECURITY_SELINUX_AVC_STATS !! 40 config SECURITY_SELINUX_MLS 41 bool "SELinux AVC Statistics" !! 41 bool "NSA SELinux MLS policy (EXPERIMENTAL)" 42 depends on SECURITY_SELINUX !! 42 depends on SECURITY_SELINUX && EXPERIMENTAL 43 default y << 44 help << 45 This option collects access vector c << 46 /sys/fs/selinux/avc/cache_stats, whi << 47 tools such as avcstat. << 48 << 49 config SECURITY_SELINUX_SIDTAB_HASH_BITS << 50 int "SELinux sidtab hashtable size" << 51 depends on SECURITY_SELINUX << 52 range 8 13 << 53 default 9 << 54 help << 55 This option sets the number of bucke << 56 to 2^SECURITY_SELINUX_SIDTAB_HASH_BI << 57 collisions may be viewed at /sys/fs/ << 58 chain lengths are high (e.g. > 20) t << 59 will ensure that lookups times are s << 60 << 61 config SECURITY_SELINUX_SID2STR_CACHE_SIZE << 62 int "SELinux SID to context string tra << 63 depends on SECURITY_SELINUX << 64 default 256 << 65 help << 66 This option defines the size of the << 67 cache, which improves the performanc << 68 conversion. Setting this option to << 69 << 70 If unsure, keep the default value. << 71 << 72 config SECURITY_SELINUX_DEBUG << 73 bool "SELinux kernel debugging support << 74 depends on SECURITY_SELINUX << 75 default n 43 default n 76 help 44 help 77 This enables debugging code designed !! 45 This enables the NSA SELinux Multi-Level Security (MLS) policy in 78 developers, unless you know what thi !! 46 addition to the default RBAC/TE policy. This policy is 79 should leave this disabled. !! 47 experimental and has not been configured for use. Unless you 80 !! 48 specifically want to experiment with MLS, say N. 81 To fine control the messages to be p << 82 CONFIG_DYNAMIC_DEBUG and see << 83 Documentation/admin-guide/dynamic-de << 84 information. << 85 << 86 Example usage: << 87 << 88 echo -n 'file "security/selinu << 89 /proc/dynamic_debug/co <<
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.