~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/selinux/Kconfig

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 # SPDX-License-Identifier: GPL-2.0-only
  2 config SECURITY_SELINUX
  3         bool "SELinux Support"
  4         depends on SECURITY_NETWORK && AUDIT && NET && INET
  5         select NETWORK_SECMARK
  6         default n
  7         help
  8           This selects Security-Enhanced Linux (SELinux).
  9           You will also need a policy configuration and a labeled filesystem.
 10           If you are unsure how to answer this question, answer N.
 11 
 12 config SECURITY_SELINUX_BOOTPARAM
 13         bool "SELinux boot parameter"
 14         depends on SECURITY_SELINUX
 15         default n
 16         help
 17           This option adds a kernel parameter 'selinux', which allows SELinux
 18           to be disabled at boot.  If this option is selected, SELinux
 19           functionality can be disabled with selinux=0 on the kernel
 20           command line.  The purpose of this option is to allow a single
 21           kernel image to be distributed with SELinux built in, but not
 22           necessarily enabled.
 23 
 24           If you are unsure how to answer this question, answer N.
 25 
 26 config SECURITY_SELINUX_DEVELOP
 27         bool "SELinux Development Support"
 28         depends on SECURITY_SELINUX
 29         default y
 30         help
 31           This enables the development support option of SELinux,
 32           which is useful for experimenting with SELinux and developing
 33           policies.  If unsure, say Y.  With this option enabled, the
 34           kernel will start in permissive mode (log everything, deny nothing)
 35           unless you specify enforcing=1 on the kernel command line.  You
 36           can interactively toggle the kernel between enforcing mode and
 37           permissive mode (if permitted by the policy) via
 38           /sys/fs/selinux/enforce.
 39 
 40 config SECURITY_SELINUX_AVC_STATS
 41         bool "SELinux AVC Statistics"
 42         depends on SECURITY_SELINUX
 43         default y
 44         help
 45           This option collects access vector cache statistics to
 46           /sys/fs/selinux/avc/cache_stats, which may be monitored via
 47           tools such as avcstat.
 48 
 49 config SECURITY_SELINUX_SIDTAB_HASH_BITS
 50         int "SELinux sidtab hashtable size"
 51         depends on SECURITY_SELINUX
 52         range 8 13
 53         default 9
 54         help
 55           This option sets the number of buckets used in the sidtab hashtable
 56           to 2^SECURITY_SELINUX_SIDTAB_HASH_BITS buckets. The number of hash
 57           collisions may be viewed at /sys/fs/selinux/ss/sidtab_hash_stats. If
 58           chain lengths are high (e.g. > 20) then selecting a higher value here
 59           will ensure that lookups times are short and stable.
 60 
 61 config SECURITY_SELINUX_SID2STR_CACHE_SIZE
 62         int "SELinux SID to context string translation cache size"
 63         depends on SECURITY_SELINUX
 64         default 256
 65         help
 66           This option defines the size of the internal SID -> context string
 67           cache, which improves the performance of context to string
 68           conversion.  Setting this option to 0 disables the cache completely.
 69 
 70           If unsure, keep the default value.
 71 
 72 config SECURITY_SELINUX_DEBUG
 73         bool "SELinux kernel debugging support"
 74         depends on SECURITY_SELINUX
 75         default n
 76         help
 77           This enables debugging code designed to help SELinux kernel
 78           developers, unless you know what this does in the kernel code you
 79           should leave this disabled.
 80 
 81           To fine control the messages to be printed enable
 82           CONFIG_DYNAMIC_DEBUG and see
 83           Documentation/admin-guide/dynamic-debug-howto.rst for additional
 84           information.
 85 
 86           Example usage:
 87 
 88                 echo -n 'file "security/selinux/*" +p' > \
 89                         /proc/dynamic_debug/control

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php