~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/smack/Kconfig

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/smack/Kconfig (Version linux-6.12-rc7) and /security/smack/Kconfig (Version linux-2.6.32.71)


  1 # SPDX-License-Identifier: GPL-2.0-only        << 
  2 config SECURITY_SMACK                               1 config SECURITY_SMACK
  3         bool "Simplified Mandatory Access Cont      2         bool "Simplified Mandatory Access Control Kernel Support"
  4         depends on NET                         !!   3         depends on NETLABEL && SECURITY_NETWORK
  5         depends on INET                        << 
  6         depends on SECURITY                    << 
  7         select NETLABEL                        << 
  8         select SECURITY_NETWORK                << 
  9         default n                                   4         default n
 10         help                                        5         help
 11           This selects the Simplified Mandator      6           This selects the Simplified Mandatory Access Control Kernel.
 12           Smack is useful for sensitivity, int      7           Smack is useful for sensitivity, integrity, and a variety
 13           of other mandatory security schemes.      8           of other mandatory security schemes.
 14           If you are unsure how to answer this      9           If you are unsure how to answer this question, answer N.
 15                                                    10 
 16 config SECURITY_SMACK_BRINGUP                  << 
 17         bool "Reporting on access granted by S << 
 18         depends on SECURITY_SMACK              << 
 19         default n                              << 
 20         help                                   << 
 21           Enable the bring-up ("b") access mod << 
 22           When access is granted by a rule wit << 
 23           message about the access requested i << 
 24           intention is that a process can be g << 
 25           of access initially with the bringup << 
 26           rules. The developer can use the inf << 
 27           identify which rules are necessary a << 
 28           may be inappropriate. The developer  << 
 29           access rule set once the behavior is << 
 30           This is a superior mechanism to the  << 
 31           "permissive" mode of other systems.  << 
 32           If you are unsure how to answer this << 
 33                                                << 
 34 config SECURITY_SMACK_NETFILTER                << 
 35         bool "Packet marking using secmarks fo << 
 36         depends on SECURITY_SMACK              << 
 37         depends on NETWORK_SECMARK             << 
 38         depends on NETFILTER                   << 
 39         default n                              << 
 40         help                                   << 
 41           This enables security marking of net << 
 42           Smack labels.                        << 
 43           If you are unsure how to answer this << 
 44                                                << 
 45 config SECURITY_SMACK_APPEND_SIGNALS           << 
 46         bool "Treat delivering signals as an a << 
 47         depends on SECURITY_SMACK              << 
 48         default n                              << 
 49         help                                   << 
 50           Sending a signal has been treated as << 
 51           receiving process. If this option is << 
 52           will be an append operation instead. << 
 53           to differentiate between delivering  << 
 54           delivering a signal in the Smack rul << 
 55           If you are unsure how to answer this << 
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php