Commit 303573e5 by Alexander Popov

Add the SECURITY_SELINUX_DEBUG check

parent 476c0992
...@@ -246,6 +246,7 @@ def add_kconfig_checks(l, arch): ...@@ -246,6 +246,7 @@ def add_kconfig_checks(l, arch):
l += [KconfigCheck('security_policy', 'kspp', 'SECURITY_LOCKDOWN_LSM_EARLY', 'y')] l += [KconfigCheck('security_policy', 'kspp', 'SECURITY_LOCKDOWN_LSM_EARLY', 'y')]
l += [KconfigCheck('security_policy', 'kspp', 'LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY', 'y')] l += [KconfigCheck('security_policy', 'kspp', 'LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY', 'y')]
l += [KconfigCheck('security_policy', 'kspp', 'SECURITY_WRITABLE_HOOKS', 'is not set')] # refers to SECURITY_SELINUX_DISABLE l += [KconfigCheck('security_policy', 'kspp', 'SECURITY_WRITABLE_HOOKS', 'is not set')] # refers to SECURITY_SELINUX_DISABLE
l += [KconfigCheck('security_policy', 'my', 'SECURITY_SELINUX_DEBUG', 'is not set')]
l += [OR(KconfigCheck('security_policy', 'my', 'SECURITY_SELINUX', 'y'), l += [OR(KconfigCheck('security_policy', 'my', 'SECURITY_SELINUX', 'y'),
KconfigCheck('security_policy', 'my', 'SECURITY_APPARMOR', 'y'), KconfigCheck('security_policy', 'my', 'SECURITY_APPARMOR', 'y'),
KconfigCheck('security_policy', 'my', 'SECURITY_SMACK', 'y'), KconfigCheck('security_policy', 'my', 'SECURITY_SMACK', 'y'),
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment