ACIL FM
Dark
Refresh
Current DIR:
/usr/src/kernels/5.14.0-611.34.1.el9_7.x86_64/security/landlock
/
usr
src
kernels
5.14.0-611.34.1.el9_7.x86_64
security
landlock
Upload
Zip Selected
Delete Selected
Pilih semua
Nama
Ukuran
Permission
Aksi
Kconfig
1.34 MB
chmod
View
DL
Edit
Rename
Delete
Makefile
155 B
chmod
View
DL
Edit
Rename
Delete
Edit file: /usr/src/kernels/5.14.0-611.34.1.el9_7.x86_64/security/landlock/Kconfig
# SPDX-License-Identifier: GPL-2.0-only config SECURITY_LANDLOCK bool "Landlock support" depends on SECURITY select SECURITY_NETWORK select SECURITY_PATH help Landlock is a sandboxing mechanism that enables processes to restrict themselves (and their future children) by gradually enforcing tailored access control policies. A Landlock security policy is a set of access rights (e.g. open a file in read-only, make a directory, etc.) tied to a file hierarchy. Such policy can be configured and enforced by any processes for themselves using the dedicated system calls: landlock_create_ruleset(), landlock_add_rule(), and landlock_restrict_self(). See Documentation/userspace-api/landlock.rst for further information. If you are unsure how to answer this question, answer N. Otherwise, you should also prepend "landlock," to the content of CONFIG_LSM to enable Landlock at boot time. config SECURITY_LANDLOCK_KUNIT_TEST bool "KUnit tests for Landlock" if !KUNIT_ALL_TESTS depends on KUNIT=y depends on SECURITY_LANDLOCK default KUNIT_ALL_TESTS help Build KUnit tests for Landlock. See the KUnit documentation in Documentation/dev-tools/kunit Run all KUnit tests for Landlock with: ./tools/testing/kunit/kunit.py run --kunitconfig security/landlock If you are unsure how to answer this question, answer N.
Simpan
Batal
Isi Zip:
Unzip
Create
Buat Folder
Buat File
Terminal / Execute
Run
Chmod Bulk
All File
All Folder
All File dan Folder
Apply