blob: d8b1a360a6368cca12f534c6057d584d54617f26 [file] [log] [blame]
Thomas Gleixnerec8f24b2019-05-19 13:07:45 +01001# SPDX-License-Identifier: GPL-2.0-only
John Johansen016d8252010-07-30 13:46:33 +10002config SECURITY_APPARMOR
3 bool "AppArmor support"
Randy Dunlap06c22da2010-08-02 10:52:18 -07004 depends on SECURITY && NET
John Johansen016d8252010-07-30 13:46:33 +10005 select AUDIT
6 select SECURITY_PATH
7 select SECURITYFS
8 select SECURITY_NETWORK
9 default n
10 help
11 This enables the AppArmor security module.
12 Required userspace tools (if they are not included in your
13 distribution) and further information may be found at
14 http://apparmor.wiki.kernel.org
15
16 If you are unsure how to answer this question, answer N.
17
John Johansenf8eb8a12013-08-14 11:27:36 -070018config SECURITY_APPARMOR_HASH
John Johansen6059f712014-10-24 09:16:14 -070019 bool "Enable introspection of sha1 hashes for loaded profiles"
John Johansenf8eb8a12013-08-14 11:27:36 -070020 depends on SECURITY_APPARMOR
Arnd Bergmann083c1292015-10-21 21:16:29 +020021 select CRYPTO
John Johansenf8eb8a12013-08-14 11:27:36 -070022 select CRYPTO_SHA1
23 default y
John Johansenf8eb8a12013-08-14 11:27:36 -070024 help
John Johansen6059f712014-10-24 09:16:14 -070025 This option selects whether introspection of loaded policy
26 is available to userspace via the apparmor filesystem.
27
28config SECURITY_APPARMOR_HASH_DEFAULT
29 bool "Enable policy hash introspection by default"
30 depends on SECURITY_APPARMOR_HASH
31 default y
John Johansen6059f712014-10-24 09:16:14 -070032 help
33 This option selects whether sha1 hashing of loaded policy
34 is enabled by default. The generation of sha1 hashes for
35 loaded policy provide system administrators a quick way
36 to verify that policy in the kernel matches what is expected,
37 however it can slow down policy load on some devices. In
38 these cases policy hashing can be disabled by default and
39 enabled only if needed.
John Johansen680cd622017-01-16 00:42:27 -080040
41config SECURITY_APPARMOR_DEBUG
42 bool "Build AppArmor with debug code"
43 depends on SECURITY_APPARMOR
44 default n
45 help
46 Build apparmor with debugging logic in apparmor. Not all
47 debugging logic will necessarily be enabled. A submenu will
48 provide fine grained control of the debug options that are
49 available.
50
51config SECURITY_APPARMOR_DEBUG_ASSERTS
52 bool "Build AppArmor with debugging asserts"
53 depends on SECURITY_APPARMOR_DEBUG
54 default y
55 help
56 Enable code assertions made with AA_BUG. These are primarily
57 function entry preconditions but also exist at other key
58 points. If the assert is triggered it will trigger a WARN
59 message.
60
61config SECURITY_APPARMOR_DEBUG_MESSAGES
62 bool "Debug messages enabled by default"
63 depends on SECURITY_APPARMOR_DEBUG
64 default n
65 help
66 Set the default value of the apparmor.debug kernel parameter.
67 When enabled, various debug messages will be logged to
68 the kernel message buffer.