~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/smack/Kconfig

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/smack/Kconfig (Version linux-6.12-rc7) and /security/smack/Kconfig (Version linux-2.6.0)


  1 # SPDX-License-Identifier: GPL-2.0-only           
  2 config SECURITY_SMACK                             
  3         bool "Simplified Mandatory Access Cont    
  4         depends on NET                            
  5         depends on INET                           
  6         depends on SECURITY                       
  7         select NETLABEL                           
  8         select SECURITY_NETWORK                   
  9         default n                                 
 10         help                                      
 11           This selects the Simplified Mandator    
 12           Smack is useful for sensitivity, int    
 13           of other mandatory security schemes.    
 14           If you are unsure how to answer this    
 15                                                   
 16 config SECURITY_SMACK_BRINGUP                     
 17         bool "Reporting on access granted by S    
 18         depends on SECURITY_SMACK                 
 19         default n                                 
 20         help                                      
 21           Enable the bring-up ("b") access mod    
 22           When access is granted by a rule wit    
 23           message about the access requested i    
 24           intention is that a process can be g    
 25           of access initially with the bringup    
 26           rules. The developer can use the inf    
 27           identify which rules are necessary a    
 28           may be inappropriate. The developer     
 29           access rule set once the behavior is    
 30           This is a superior mechanism to the     
 31           "permissive" mode of other systems.     
 32           If you are unsure how to answer this    
 33                                                   
 34 config SECURITY_SMACK_NETFILTER                   
 35         bool "Packet marking using secmarks fo    
 36         depends on SECURITY_SMACK                 
 37         depends on NETWORK_SECMARK                
 38         depends on NETFILTER                      
 39         default n                                 
 40         help                                      
 41           This enables security marking of net    
 42           Smack labels.                           
 43           If you are unsure how to answer this    
 44                                                   
 45 config SECURITY_SMACK_APPEND_SIGNALS              
 46         bool "Treat delivering signals as an a    
 47         depends on SECURITY_SMACK                 
 48         default n                                 
 49         help                                      
 50           Sending a signal has been treated as    
 51           receiving process. If this option is    
 52           will be an append operation instead.    
 53           to differentiate between delivering     
 54           delivering a signal in the Smack rul    
 55           If you are unsure how to answer this    
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php