-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
yaml --- r: 201916 b: refs/heads/master c: 016d825 h: refs/heads/master v: v3
- Loading branch information
John Johansen
authored and
James Morris
committed
Aug 2, 2010
1 parent
9787bf3
commit 465dbce
Showing
4 changed files
with
61 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,2 @@ | ||
--- | ||
refs/heads/master: 484ca79c653121d3c79fffb86e1deea724f2e20b | ||
refs/heads/master: 016d825fe02cd20fd8803ca37a1e6d428fe878f6 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
# | ||
# Generated include files | ||
# | ||
af_names.h | ||
capability_names.h |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
config SECURITY_APPARMOR | ||
bool "AppArmor support" | ||
depends on SECURITY | ||
select AUDIT | ||
select SECURITY_PATH | ||
select SECURITYFS | ||
select SECURITY_NETWORK | ||
default n | ||
help | ||
This enables the AppArmor security module. | ||
Required userspace tools (if they are not included in your | ||
distribution) and further information may be found at | ||
http://apparmor.wiki.kernel.org | ||
|
||
If you are unsure how to answer this question, answer N. | ||
|
||
config SECURITY_APPARMOR_BOOTPARAM_VALUE | ||
int "AppArmor boot parameter default value" | ||
depends on SECURITY_APPARMOR | ||
range 0 1 | ||
default 1 | ||
help | ||
This option sets the default value for the kernel parameter | ||
'apparmor', which allows AppArmor to be enabled or disabled | ||
at boot. If this option is set to 0 (zero), the AppArmor | ||
kernel parameter will default to 0, disabling AppArmor at | ||
boot. If this option is set to 1 (one), the AppArmor | ||
kernel parameter will default to 1, enabling AppArmor at | ||
boot. | ||
|
||
If you are unsure how to answer this question, answer 1. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
# Makefile for AppArmor Linux Security Module | ||
# | ||
obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o | ||
|
||
apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \ | ||
path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \ | ||
resource.o sid.o file.o | ||
|
||
clean-files: capability_names.h af_names.h | ||
|
||
quiet_cmd_make-caps = GEN $@ | ||
cmd_make-caps = echo "static const char *capability_names[] = {" > $@ ; sed -n -e "/CAP_FS_MASK/d" -e "s/^\#define[ \\t]\\+CAP_\\([A-Z0-9_]\\+\\)[ \\t]\\+\\([0-9]\\+\\)\$$/[\\2] = \"\\1\",/p" $< | tr A-Z a-z >> $@ ; echo "};" >> $@ | ||
|
||
quiet_cmd_make-rlim = GEN $@ | ||
cmd_make-rlim = echo "static const char *rlim_names[] = {" > $@ ; sed -n --e "/AF_MAX/d" -e "s/^\# \\?define[ \\t]\\+RLIMIT_\\([A-Z0-9_]\\+\\)[ \\t]\\+\\([0-9]\\+\\)\\(.*\\)\$$/[\\2] = \"\\1\",/p" $< | tr A-Z a-z >> $@ ; echo "};" >> $@ ; echo "static const int rlim_map[] = {" >> $@ ; sed -n -e "/AF_MAX/d" -e "s/^\# \\?define[ \\t]\\+\\(RLIMIT_[A-Z0-9_]\\+\\)[ \\t]\\+\\([0-9]\\+\\)\\(.*\\)\$$/\\1,/p" $< >> $@ ; echo "};" >> $@ | ||
|
||
$(obj)/capability.o : $(obj)/capability_names.h | ||
$(obj)/resource.o : $(obj)/rlim_names.h | ||
$(obj)/capability_names.h : $(srctree)/include/linux/capability.h | ||
$(call cmd,make-caps) | ||
$(obj)/af_names.h : $(srctree)/include/linux/socket.h | ||
$(call cmd,make-af) | ||
$(obj)/rlim_names.h : $(srctree)/include/asm-generic/resource.h | ||
$(call cmd,make-rlim) |