^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) # SPDX-License-Identifier: GPL-2.0-only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) config SECURITY_SMACK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) bool "Simplified Mandatory Access Control Kernel Support"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) depends on NET
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) depends on INET
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) depends on SECURITY
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) select NETLABEL
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) select SECURITY_NETWORK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) default n
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) This selects the Simplified Mandatory Access Control Kernel.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) Smack is useful for sensitivity, integrity, and a variety
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) of other mandatory security schemes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) If you are unsure how to answer this question, answer N.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) config SECURITY_SMACK_BRINGUP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) bool "Reporting on access granted by Smack rules"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) depends on SECURITY_SMACK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) default n
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) Enable the bring-up ("b") access mode in Smack rules.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) When access is granted by a rule with the "b" mode a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) message about the access requested is generated. The
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) intention is that a process can be granted a wide set
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) of access initially with the bringup mode set on the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) rules. The developer can use the information to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) identify which rules are necessary and what accesses
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) may be inappropriate. The developer can reduce the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) access rule set once the behavior is well understood.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) This is a superior mechanism to the oft abused
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) "permissive" mode of other systems.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) If you are unsure how to answer this question, answer N.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) config SECURITY_SMACK_NETFILTER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) bool "Packet marking using secmarks for netfilter"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) depends on SECURITY_SMACK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) depends on NETWORK_SECMARK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) depends on NETFILTER
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) default n
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) This enables security marking of network packets using
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) Smack labels.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) If you are unsure how to answer this question, answer N.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) config SECURITY_SMACK_APPEND_SIGNALS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) bool "Treat delivering signals as an append operation"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) depends on SECURITY_SMACK
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) default n
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) help
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) Sending a signal has been treated as a write operation to the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) receiving process. If this option is selected, the delivery
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) will be an append operation instead. This makes it possible
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) to differentiate between delivering a network packet and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) delivering a signal in the Smack rules.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) If you are unsure how to answer this question, answer N.