@@ -124,6 +124,7 @@ source security/tomoyo/Kconfig
source security/apparmor/Kconfig
source security/loadpin/Kconfig
source security/yama/Kconfig
+source security/landlock/Kconfig
source security/integrity/Kconfig
new file mode 100644
@@ -0,0 +1,16 @@
+config SECURITY_LANDLOCK
+ bool "Landlock sandbox support"
+ depends on SECURITY
+ select BPF_SYSCALL
+ select SECCOMP
+ default y
+ help
+ Landlock is a stacked LSM which allows any user to load a security policy
+ to restrict their processes (i.e. create a sandbox). The policy is a list
+ of stacked eBPF programs for some LSM hooks. Each program can do some
+ access comparison to check if an access request is legitimate.
+
+ Further information about eBPF can be found in
+ Documentation/networking/filter.txt
+
+ If you are unsure how to answer this question, answer Y.
Initial Landlock Kconfig needed to split the Landlock eBPF and seccomp parts to ease the review. Signed-off-by: Mickaël Salaün <mic@digikod.net> Cc: James Morris <james.l.morris@oracle.com> Cc: Kees Cook <keescook@chromium.org> Cc: Serge E. Hallyn <serge@hallyn.com> --- security/Kconfig | 1 + security/landlock/Kconfig | 16 ++++++++++++++++ 2 files changed, 17 insertions(+) create mode 100644 security/landlock/Kconfig