diff options
-rw-r--r-- | security/apparmor/.gitignore | 5 | ||||
-rw-r--r-- | security/apparmor/Kconfig | 31 | ||||
-rw-r--r-- | security/apparmor/Makefile | 24 |
3 files changed, 60 insertions, 0 deletions
diff --git a/security/apparmor/.gitignore b/security/apparmor/.gitignore new file mode 100644 index 000000000000..0a0a99f3b083 --- /dev/null +++ b/security/apparmor/.gitignore | |||
@@ -0,0 +1,5 @@ | |||
1 | # | ||
2 | # Generated include files | ||
3 | # | ||
4 | af_names.h | ||
5 | capability_names.h | ||
diff --git a/security/apparmor/Kconfig b/security/apparmor/Kconfig new file mode 100644 index 000000000000..72555b9ca7d6 --- /dev/null +++ b/security/apparmor/Kconfig | |||
@@ -0,0 +1,31 @@ | |||
1 | config SECURITY_APPARMOR | ||
2 | bool "AppArmor support" | ||
3 | depends on SECURITY | ||
4 | select AUDIT | ||
5 | select SECURITY_PATH | ||
6 | select SECURITYFS | ||
7 | select SECURITY_NETWORK | ||
8 | default n | ||
9 | help | ||
10 | This enables the AppArmor security module. | ||
11 | Required userspace tools (if they are not included in your | ||
12 | distribution) and further information may be found at | ||
13 | http://apparmor.wiki.kernel.org | ||
14 | |||
15 | If you are unsure how to answer this question, answer N. | ||
16 | |||
17 | config SECURITY_APPARMOR_BOOTPARAM_VALUE | ||
18 | int "AppArmor boot parameter default value" | ||
19 | depends on SECURITY_APPARMOR | ||
20 | range 0 1 | ||
21 | default 1 | ||
22 | help | ||
23 | This option sets the default value for the kernel parameter | ||
24 | 'apparmor', which allows AppArmor to be enabled or disabled | ||
25 | at boot. If this option is set to 0 (zero), the AppArmor | ||
26 | kernel parameter will default to 0, disabling AppArmor at | ||
27 | boot. If this option is set to 1 (one), the AppArmor | ||
28 | kernel parameter will default to 1, enabling AppArmor at | ||
29 | boot. | ||
30 | |||
31 | If you are unsure how to answer this question, answer 1. | ||
diff --git a/security/apparmor/Makefile b/security/apparmor/Makefile new file mode 100644 index 000000000000..f204869399ea --- /dev/null +++ b/security/apparmor/Makefile | |||
@@ -0,0 +1,24 @@ | |||
1 | # Makefile for AppArmor Linux Security Module | ||
2 | # | ||
3 | obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o | ||
4 | |||
5 | apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \ | ||
6 | path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \ | ||
7 | resource.o sid.o file.o | ||
8 | |||
9 | clean-files: capability_names.h af_names.h | ||
10 | |||
11 | quiet_cmd_make-caps = GEN $@ | ||
12 | cmd_make-caps = echo "static const char *capability_names[] = {" > $@ ; sed -n -e "/CAP_FS_MASK/d" -e "s/^\#define[ \\t]\\+CAP_\\([A-Z0-9_]\\+\\)[ \\t]\\+\\([0-9]\\+\\)\$$/[\\2] = \"\\1\",/p" $< | tr A-Z a-z >> $@ ; echo "};" >> $@ | ||
13 | |||
14 | quiet_cmd_make-rlim = GEN $@ | ||
15 | cmd_make-rlim = echo "static const char *rlim_names[] = {" > $@ ; sed -n --e "/AF_MAX/d" -e "s/^\# \\?define[ \\t]\\+RLIMIT_\\([A-Z0-9_]\\+\\)[ \\t]\\+\\([0-9]\\+\\)\\(.*\\)\$$/[\\2] = \"\\1\",/p" $< | tr A-Z a-z >> $@ ; echo "};" >> $@ ; echo "static const int rlim_map[] = {" >> $@ ; sed -n -e "/AF_MAX/d" -e "s/^\# \\?define[ \\t]\\+\\(RLIMIT_[A-Z0-9_]\\+\\)[ \\t]\\+\\([0-9]\\+\\)\\(.*\\)\$$/\\1,/p" $< >> $@ ; echo "};" >> $@ | ||
16 | |||
17 | $(obj)/capability.o : $(obj)/capability_names.h | ||
18 | $(obj)/resource.o : $(obj)/rlim_names.h | ||
19 | $(obj)/capability_names.h : $(srctree)/include/linux/capability.h | ||
20 | $(call cmd,make-caps) | ||
21 | $(obj)/af_names.h : $(srctree)/include/linux/socket.h | ||
22 | $(call cmd,make-af) | ||
23 | $(obj)/rlim_names.h : $(srctree)/include/asm-generic/resource.h | ||
24 | $(call cmd,make-rlim) | ||