~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/selinux/Kconfig

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/selinux/Kconfig (Version linux-6.12-rc7) and /security/selinux/Kconfig (Version linux-5.16.20)


  1 # SPDX-License-Identifier: GPL-2.0-only             1 # SPDX-License-Identifier: GPL-2.0-only
  2 config SECURITY_SELINUX                             2 config SECURITY_SELINUX
  3         bool "SELinux Support"                 !!   3         bool "NSA SELinux Support"
  4         depends on SECURITY_NETWORK && AUDIT &      4         depends on SECURITY_NETWORK && AUDIT && NET && INET
  5         select NETWORK_SECMARK                      5         select NETWORK_SECMARK
  6         default n                                   6         default n
  7         help                                        7         help
  8           This selects Security-Enhanced Linux !!   8           This selects NSA Security-Enhanced Linux (SELinux).
  9           You will also need a policy configur      9           You will also need a policy configuration and a labeled filesystem.
 10           If you are unsure how to answer this     10           If you are unsure how to answer this question, answer N.
 11                                                    11 
 12 config SECURITY_SELINUX_BOOTPARAM                  12 config SECURITY_SELINUX_BOOTPARAM
 13         bool "SELinux boot parameter"          !!  13         bool "NSA SELinux boot parameter"
 14         depends on SECURITY_SELINUX                14         depends on SECURITY_SELINUX
 15         default n                                  15         default n
 16         help                                       16         help
 17           This option adds a kernel parameter      17           This option adds a kernel parameter 'selinux', which allows SELinux
 18           to be disabled at boot.  If this opt     18           to be disabled at boot.  If this option is selected, SELinux
 19           functionality can be disabled with s     19           functionality can be disabled with selinux=0 on the kernel
 20           command line.  The purpose of this o     20           command line.  The purpose of this option is to allow a single
 21           kernel image to be distributed with      21           kernel image to be distributed with SELinux built in, but not
 22           necessarily enabled.                     22           necessarily enabled.
 23                                                    23 
 24           If you are unsure how to answer this     24           If you are unsure how to answer this question, answer N.
 25                                                    25 
                                                   >>  26 config SECURITY_SELINUX_DISABLE
                                                   >>  27         bool "NSA SELinux runtime disable"
                                                   >>  28         depends on SECURITY_SELINUX
                                                   >>  29         select SECURITY_WRITABLE_HOOKS
                                                   >>  30         default n
                                                   >>  31         help
                                                   >>  32           This option enables writing to a selinuxfs node 'disable', which
                                                   >>  33           allows SELinux to be disabled at runtime prior to the policy load.
                                                   >>  34           SELinux will then remain disabled until the next boot.
                                                   >>  35           This option is similar to the selinux=0 boot parameter, but is to
                                                   >>  36           support runtime disabling of SELinux, e.g. from /sbin/init, for
                                                   >>  37           portability across platforms where boot parameters are difficult
                                                   >>  38           to employ.
                                                   >>  39 
                                                   >>  40           NOTE: selecting this option will disable the '__ro_after_init'
                                                   >>  41           kernel hardening feature for security hooks.   Please consider
                                                   >>  42           using the selinux=0 boot parameter instead of enabling this
                                                   >>  43           option.
                                                   >>  44 
                                                   >>  45           WARNING: this option is deprecated and will be removed in a future
                                                   >>  46           kernel release.
                                                   >>  47 
                                                   >>  48           If you are unsure how to answer this question, answer N.
                                                   >>  49 
 26 config SECURITY_SELINUX_DEVELOP                    50 config SECURITY_SELINUX_DEVELOP
 27         bool "SELinux Development Support"     !!  51         bool "NSA SELinux Development Support"
 28         depends on SECURITY_SELINUX                52         depends on SECURITY_SELINUX
 29         default y                                  53         default y
 30         help                                       54         help
 31           This enables the development support !!  55           This enables the development support option of NSA SELinux,
 32           which is useful for experimenting wi     56           which is useful for experimenting with SELinux and developing
 33           policies.  If unsure, say Y.  With t     57           policies.  If unsure, say Y.  With this option enabled, the
 34           kernel will start in permissive mode     58           kernel will start in permissive mode (log everything, deny nothing)
 35           unless you specify enforcing=1 on th     59           unless you specify enforcing=1 on the kernel command line.  You
 36           can interactively toggle the kernel      60           can interactively toggle the kernel between enforcing mode and
 37           permissive mode (if permitted by the     61           permissive mode (if permitted by the policy) via
 38           /sys/fs/selinux/enforce.                 62           /sys/fs/selinux/enforce.
 39                                                    63 
 40 config SECURITY_SELINUX_AVC_STATS                  64 config SECURITY_SELINUX_AVC_STATS
 41         bool "SELinux AVC Statistics"          !!  65         bool "NSA SELinux AVC Statistics"
 42         depends on SECURITY_SELINUX                66         depends on SECURITY_SELINUX
 43         default y                                  67         default y
 44         help                                       68         help
 45           This option collects access vector c     69           This option collects access vector cache statistics to
 46           /sys/fs/selinux/avc/cache_stats, whi     70           /sys/fs/selinux/avc/cache_stats, which may be monitored via
 47           tools such as avcstat.                   71           tools such as avcstat.
 48                                                    72 
                                                   >>  73 config SECURITY_SELINUX_CHECKREQPROT_VALUE
                                                   >>  74         int "NSA SELinux checkreqprot default value"
                                                   >>  75         depends on SECURITY_SELINUX
                                                   >>  76         range 0 1
                                                   >>  77         default 0
                                                   >>  78         help
                                                   >>  79           This option sets the default value for the 'checkreqprot' flag
                                                   >>  80           that determines whether SELinux checks the protection requested
                                                   >>  81           by the application or the protection that will be applied by the
                                                   >>  82           kernel (including any implied execute for read-implies-exec) for
                                                   >>  83           mmap and mprotect calls.  If this option is set to 0 (zero),
                                                   >>  84           SELinux will default to checking the protection that will be applied
                                                   >>  85           by the kernel.  If this option is set to 1 (one), SELinux will
                                                   >>  86           default to checking the protection requested by the application.
                                                   >>  87           The checkreqprot flag may be changed from the default via the
                                                   >>  88           'checkreqprot=' boot parameter.  It may also be changed at runtime
                                                   >>  89           via /sys/fs/selinux/checkreqprot if authorized by policy.
                                                   >>  90 
                                                   >>  91           WARNING: this option is deprecated and will be removed in a future
                                                   >>  92           kernel release.
                                                   >>  93 
                                                   >>  94           If you are unsure how to answer this question, answer 0.
                                                   >>  95 
 49 config SECURITY_SELINUX_SIDTAB_HASH_BITS           96 config SECURITY_SELINUX_SIDTAB_HASH_BITS
 50         int "SELinux sidtab hashtable size"    !!  97         int "NSA SELinux sidtab hashtable size"
 51         depends on SECURITY_SELINUX                98         depends on SECURITY_SELINUX
 52         range 8 13                                 99         range 8 13
 53         default 9                                 100         default 9
 54         help                                      101         help
 55           This option sets the number of bucke    102           This option sets the number of buckets used in the sidtab hashtable
 56           to 2^SECURITY_SELINUX_SIDTAB_HASH_BI    103           to 2^SECURITY_SELINUX_SIDTAB_HASH_BITS buckets. The number of hash
 57           collisions may be viewed at /sys/fs/    104           collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If
 58           chain lengths are high (e.g. > 20) t    105           chain lengths are high (e.g. > 20) then selecting a higher value here
 59           will ensure that lookups times are s    106           will ensure that lookups times are short and stable.
 60                                                   107 
 61 config SECURITY_SELINUX_SID2STR_CACHE_SIZE        108 config SECURITY_SELINUX_SID2STR_CACHE_SIZE
 62         int "SELinux SID to context string tra !! 109         int "NSA SELinux SID to context string translation cache size"
 63         depends on SECURITY_SELINUX               110         depends on SECURITY_SELINUX
 64         default 256                               111         default 256
 65         help                                      112         help
 66           This option defines the size of the     113           This option defines the size of the internal SID -> context string
 67           cache, which improves the performanc    114           cache, which improves the performance of context to string
 68           conversion.  Setting this option to     115           conversion.  Setting this option to 0 disables the cache completely.
 69                                                   116 
 70           If unsure, keep the default value.      117           If unsure, keep the default value.
 71                                                << 
 72 config SECURITY_SELINUX_DEBUG                  << 
 73         bool "SELinux kernel debugging support << 
 74         depends on SECURITY_SELINUX            << 
 75         default n                              << 
 76         help                                   << 
 77           This enables debugging code designed << 
 78           developers, unless you know what thi << 
 79           should leave this disabled.          << 
 80                                                << 
 81           To fine control the messages to be p << 
 82           CONFIG_DYNAMIC_DEBUG and see         << 
 83           Documentation/admin-guide/dynamic-de << 
 84           information.                         << 
 85                                                << 
 86           Example usage:                       << 
 87                                                << 
 88                 echo -n 'file "security/selinu << 
 89                         /proc/dynamic_debug/co << 
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php