Add SPDX license identifiers to all Make/Kconfig files which: - Have no license information of any form These files fall under the project license, GPL v2 only. The resulting SPDX license identifier is: GPL-2.0-only Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
		
			
				
	
	
		
			56 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			56 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| # SPDX-License-Identifier: GPL-2.0-only
 | |
| config SECURITY_SMACK
 | |
| 	bool "Simplified Mandatory Access Control Kernel Support"
 | |
| 	depends on NET
 | |
| 	depends on INET
 | |
| 	depends on SECURITY
 | |
| 	select NETLABEL
 | |
| 	select SECURITY_NETWORK
 | |
| 	default n
 | |
| 	help
 | |
| 	  This selects the Simplified Mandatory Access Control Kernel.
 | |
| 	  Smack is useful for sensitivity, integrity, and a variety
 | |
| 	  of other mandatory security schemes.
 | |
| 	  If you are unsure how to answer this question, answer N.
 | |
| 
 | |
| config SECURITY_SMACK_BRINGUP
 | |
| 	bool "Reporting on access granted by Smack rules"
 | |
| 	depends on SECURITY_SMACK
 | |
| 	default n
 | |
| 	help
 | |
| 	  Enable the bring-up ("b") access mode in Smack rules.
 | |
| 	  When access is granted by a rule with the "b" mode a
 | |
| 	  message about the access requested is generated. The
 | |
| 	  intention is that a process can be granted a wide set
 | |
| 	  of access initially with the bringup mode set on the
 | |
| 	  rules. The developer can use the information to
 | |
| 	  identify which rules are necessary and what accesses
 | |
| 	  may be inappropriate. The developer can reduce the
 | |
| 	  access rule set once the behavior is well understood.
 | |
| 	  This is a superior mechanism to the oft abused
 | |
| 	  "permissive" mode of other systems.
 | |
| 	  If you are unsure how to answer this question, answer N.
 | |
| 
 | |
| config SECURITY_SMACK_NETFILTER
 | |
| 	bool "Packet marking using secmarks for netfilter"
 | |
| 	depends on SECURITY_SMACK
 | |
| 	depends on NETWORK_SECMARK
 | |
| 	depends on NETFILTER
 | |
| 	default n
 | |
| 	help
 | |
| 	  This enables security marking of network packets using
 | |
| 	  Smack labels.
 | |
| 	  If you are unsure how to answer this question, answer N.
 | |
| 
 | |
| config SECURITY_SMACK_APPEND_SIGNALS
 | |
| 	bool "Treat delivering signals as an append operation"
 | |
| 	depends on SECURITY_SMACK
 | |
| 	default n
 | |
| 	help
 | |
| 	  Sending a signal has been treated as a write operation to the
 | |
| 	  receiving process. If this option is selected, the delivery
 | |
| 	  will be an append operation instead. This makes it possible
 | |
| 	  to differentiate between delivering a network packet and
 | |
| 	  delivering a signal in the Smack rules.
 | |
| 	  If you are unsure how to answer this question, answer N.
 |