| # SPDX-License-Identifier: GPL-2.0-only |
| |
| config SECURITY_LANDLOCK |
| bool "Landlock support" |
| depends on SECURITY |
| select SECURITY_NETWORK |
| select SECURITY_PATH |
| help |
| Landlock is a sandboxing mechanism that enables processes to restrict |
| themselves (and their future children) by gradually enforcing |
| tailored access control policies. A Landlock security policy is a |
| set of access rights (e.g. open a file in read-only, make a |
| directory, etc.) tied to a file hierarchy. Such policy can be |
| configured and enforced by any processes for themselves using the |
| dedicated system calls: landlock_create_ruleset(), |
| landlock_add_rule(), and landlock_restrict_self(). |
| |
| See Documentation/userspace-api/landlock.rst for further information. |
| |
| If you are unsure how to answer this question, answer N. Otherwise, |
| you should also prepend "landlock," to the content of CONFIG_LSM to |
| enable Landlock at boot time. |
| |
| config SECURITY_LANDLOCK_KUNIT_TEST |
| bool "KUnit tests for Landlock" if !KUNIT_ALL_TESTS |
| depends on KUNIT=y |
| depends on SECURITY_LANDLOCK |
| default KUNIT_ALL_TESTS |
| help |
| Build KUnit tests for Landlock. |
| |
| See the KUnit documentation in Documentation/dev-tools/kunit |
| |
| Run all KUnit tests for Landlock with: |
| ./tools/testing/kunit/kunit.py run --kunitconfig security/landlock |
| |
| If you are unsure how to answer this question, answer N. |