mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2026-02-24 12:26:39 -05:00
Add a new hook security_lsmprop_to_secctx() and its LSM specific implementations. The LSM specific code will use the lsm_prop element allocated for that module. This allows for the possibility that more than one module may be called upon to translate a secid to a string, as can occur in the audit code. Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> [PM: subject line tweak] Signed-off-by: Paul Moore <paul@paul-moore.com>
40 lines
1.1 KiB
C
40 lines
1.1 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* AppArmor security module
|
|
*
|
|
* This file contains AppArmor security identifier (secid) definitions
|
|
*
|
|
* Copyright 2009-2018 Canonical Ltd.
|
|
*/
|
|
|
|
#ifndef __AA_SECID_H
|
|
#define __AA_SECID_H
|
|
|
|
#include <linux/slab.h>
|
|
#include <linux/types.h>
|
|
|
|
struct aa_label;
|
|
|
|
/* secid value that will not be allocated */
|
|
#define AA_SECID_INVALID 0
|
|
|
|
/* secid value that matches any other secid */
|
|
#define AA_SECID_WILDCARD 1
|
|
|
|
/* sysctl to enable displaying mode when converting secid to secctx */
|
|
extern int apparmor_display_secid_mode;
|
|
|
|
struct aa_label *aa_secid_to_label(u32 secid);
|
|
int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
|
|
int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, char **secdata,
|
|
u32 *seclen);
|
|
int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
|
|
void apparmor_release_secctx(char *secdata, u32 seclen);
|
|
|
|
|
|
int aa_alloc_secid(struct aa_label *label, gfp_t gfp);
|
|
void aa_free_secid(u32 secid);
|
|
void aa_secid_update(u32 secid, struct aa_label *label);
|
|
|
|
#endif /* __AA_SECID_H */
|