mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-25 15:00:53 +07:00
617a629c08
Reserve a secid value that we can use as a wildcard, allowing us to define policy that's expected to match against all secids. Signed-off-by: Matthew Garrett <mjg59@google.com> Signed-off-by: John Johansen <john.johansen@canonical.com>
41 lines
1.0 KiB
C
41 lines
1.0 KiB
C
/*
|
|
* AppArmor security module
|
|
*
|
|
* This file contains AppArmor security identifier (secid) definitions
|
|
*
|
|
* Copyright 2009-2018 Canonical Ltd.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License as
|
|
* published by the Free Software Foundation, version 2 of the
|
|
* License.
|
|
*/
|
|
|
|
#ifndef __AA_SECID_H
|
|
#define __AA_SECID_H
|
|
|
|
#include <linux/slab.h>
|
|
#include <linux/types.h>
|
|
|
|
struct aa_label;
|
|
|
|
/* secid value that will not be allocated */
|
|
#define AA_SECID_INVALID 0
|
|
|
|
/* secid value that matches any other secid */
|
|
#define AA_SECID_WILDCARD 1
|
|
|
|
struct aa_label *aa_secid_to_label(u32 secid);
|
|
int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
|
|
int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
|
|
void apparmor_release_secctx(char *secdata, u32 seclen);
|
|
|
|
|
|
int aa_alloc_secid(struct aa_label *label, gfp_t gfp);
|
|
void aa_free_secid(u32 secid);
|
|
void aa_secid_update(u32 secid, struct aa_label *label);
|
|
|
|
void aa_secids_init(void);
|
|
|
|
#endif /* __AA_SECID_H */
|