~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/selinux/Kconfig

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/selinux/Kconfig (Version linux-6.12-rc7) and /security/selinux/Kconfig (Version linux-2.6.0)


  1 # SPDX-License-Identifier: GPL-2.0-only        << 
  2 config SECURITY_SELINUX                             1 config SECURITY_SELINUX
  3         bool "SELinux Support"                 !!   2         bool "NSA SELinux Support"
  4         depends on SECURITY_NETWORK && AUDIT & !!   3         depends on SECURITY
  5         select NETWORK_SECMARK                 << 
  6         default n                                   4         default n
  7         help                                        5         help
  8           This selects Security-Enhanced Linux !!   6           This selects NSA Security-Enhanced Linux (SELinux).
  9           You will also need a policy configur      7           You will also need a policy configuration and a labeled filesystem.
                                                   >>   8           You can obtain the policy compiler (checkpolicy), the utility for
                                                   >>   9           labeling filesystems (setfiles), and an example policy configuration
                                                   >>  10           from http://www.nsa.gov/selinux.
 10           If you are unsure how to answer this     11           If you are unsure how to answer this question, answer N.
 11                                                    12 
 12 config SECURITY_SELINUX_BOOTPARAM                  13 config SECURITY_SELINUX_BOOTPARAM
 13         bool "SELinux boot parameter"          !!  14         bool "NSA SELinux boot parameter"
 14         depends on SECURITY_SELINUX                15         depends on SECURITY_SELINUX
 15         default n                                  16         default n
 16         help                                       17         help
 17           This option adds a kernel parameter      18           This option adds a kernel parameter 'selinux', which allows SELinux
 18           to be disabled at boot.  If this opt     19           to be disabled at boot.  If this option is selected, SELinux
 19           functionality can be disabled with s     20           functionality can be disabled with selinux=0 on the kernel
 20           command line.  The purpose of this o     21           command line.  The purpose of this option is to allow a single
 21           kernel image to be distributed with      22           kernel image to be distributed with SELinux built in, but not
 22           necessarily enabled.                     23           necessarily enabled.
 23                                                    24 
 24           If you are unsure how to answer this     25           If you are unsure how to answer this question, answer N.
 25                                                    26 
 26 config SECURITY_SELINUX_DEVELOP                    27 config SECURITY_SELINUX_DEVELOP
 27         bool "SELinux Development Support"     !!  28         bool "NSA SELinux Development Support"
 28         depends on SECURITY_SELINUX                29         depends on SECURITY_SELINUX
 29         default y                                  30         default y
 30         help                                       31         help
 31           This enables the development support !!  32           This enables the development support option of NSA SELinux,
 32           which is useful for experimenting wi     33           which is useful for experimenting with SELinux and developing
 33           policies.  If unsure, say Y.  With t     34           policies.  If unsure, say Y.  With this option enabled, the
 34           kernel will start in permissive mode     35           kernel will start in permissive mode (log everything, deny nothing)
 35           unless you specify enforcing=1 on th     36           unless you specify enforcing=1 on the kernel command line.  You
 36           can interactively toggle the kernel      37           can interactively toggle the kernel between enforcing mode and
 37           permissive mode (if permitted by the !!  38           permissive mode (if permitted by the policy) via /selinux/enforce.
 38           /sys/fs/selinux/enforce.             << 
 39                                                    39 
 40 config SECURITY_SELINUX_AVC_STATS              !!  40 config SECURITY_SELINUX_MLS
 41         bool "SELinux AVC Statistics"          !!  41         bool "NSA SELinux MLS policy (EXPERIMENTAL)"
 42         depends on SECURITY_SELINUX            !!  42         depends on SECURITY_SELINUX && EXPERIMENTAL
 43         default y                              << 
 44         help                                   << 
 45           This option collects access vector c << 
 46           /sys/fs/selinux/avc/cache_stats, whi << 
 47           tools such as avcstat.               << 
 48                                                << 
 49 config SECURITY_SELINUX_SIDTAB_HASH_BITS       << 
 50         int "SELinux sidtab hashtable size"    << 
 51         depends on SECURITY_SELINUX            << 
 52         range 8 13                             << 
 53         default 9                              << 
 54         help                                   << 
 55           This option sets the number of bucke << 
 56           to 2^SECURITY_SELINUX_SIDTAB_HASH_BI << 
 57           collisions may be viewed at /sys/fs/ << 
 58           chain lengths are high (e.g. > 20) t << 
 59           will ensure that lookups times are s << 
 60                                                << 
 61 config SECURITY_SELINUX_SID2STR_CACHE_SIZE     << 
 62         int "SELinux SID to context string tra << 
 63         depends on SECURITY_SELINUX            << 
 64         default 256                            << 
 65         help                                   << 
 66           This option defines the size of the  << 
 67           cache, which improves the performanc << 
 68           conversion.  Setting this option to  << 
 69                                                << 
 70           If unsure, keep the default value.   << 
 71                                                << 
 72 config SECURITY_SELINUX_DEBUG                  << 
 73         bool "SELinux kernel debugging support << 
 74         depends on SECURITY_SELINUX            << 
 75         default n                                  43         default n
 76         help                                       44         help
 77           This enables debugging code designed !!  45           This enables the NSA SELinux Multi-Level Security (MLS) policy in
 78           developers, unless you know what thi !!  46           addition to the default RBAC/TE policy.  This policy is
 79           should leave this disabled.          !!  47           experimental and has not been configured for use.  Unless you
 80                                                !!  48           specifically want to experiment with MLS, say N.
 81           To fine control the messages to be p << 
 82           CONFIG_DYNAMIC_DEBUG and see         << 
 83           Documentation/admin-guide/dynamic-de << 
 84           information.                         << 
 85                                                << 
 86           Example usage:                       << 
 87                                                << 
 88                 echo -n 'file "security/selinu << 
 89                         /proc/dynamic_debug/co << 
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php