linux-imx/security/apparmor/Makefile
John Johansen f8eb8a1324 apparmor: add the ability to report a sha1 hash of loaded policy
Provide userspace the ability to introspect a sha1 hash value for each
profile currently loaded.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Acked-by: Seth Arnold <seth.arnold@canonical.com>
2013-08-14 11:42:08 -07:00

2.6 KiB

Makefile for AppArmor Linux Security Module

obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o

apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o
path.o domain.o policy.o policy_unpack.o procattr.o lsm.o
resource.o sid.o file.o apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o

clean-files := capability_names.h rlim_names.h

Build a lower case string table of capability names

Transforms lines from

#define CAP_DAC_OVERRIDE 1

to

[1] = "dac_override",

quiet_cmd_make-caps = GEN $@ cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;
sed $< >>$@ -r -n -e '/CAP_FS_MASK/d'
-e 's/^#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/[\2] = "\L\1",/p';
echo "};" >> $@ ;
echo -n '#define AA_FS_CAPS_MASK "' >> $@ ;
sed $< -r -n -e '/CAP_FS_MASK/d'
-e 's/^#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/\L\1/p' |
tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@

Build a lower case string table of rlimit names.

Transforms lines from

#define RLIMIT_STACK 3 /* max stack size */

to

[RLIMIT_STACK] = "stack",

and build a second integer table (with the second sed cmd), that maps

RLIMIT defines to the order defined in asm-generic/resource.h This is

required by policy load to map policy ordering of RLIMITs to internal

ordering for architectures that redefine an RLIMIT.

Transforms lines from

#define RLIMIT_STACK 3 /* max stack size */

to

RLIMIT_STACK,

and build the securityfs entries for the mapping.

Transforms lines from

#define RLIMIT_FSIZE 1 /* Maximum filesize */

#define RLIMIT_STACK 3 /* max stack size */

to

#define AA_FS_RLIMIT_MASK "fsize stack"

quiet_cmd_make-rlim = GEN $@ cmd_make-rlim = echo "static const char const rlim_names[RLIM_NLIMITS] = {"
> $@ ;
sed $< >> $@ -r -n
-e 's/^# ?define[ \t]+(RLIMIT_([A-Z0-9_]+)).
/[\1] = "\L\2",/p';
echo "};" >> $@ ;
echo "static const int rlim_map[RLIM_NLIMITS] = {" >> $@ ;
sed -r -n "s/^# ?define[ \t]+(RLIMIT_[A-Z0-9_]+)./\1,/p" $< >> $@ ;
echo "};" >> $@ ;
echo -n '#define AA_FS_RLIMIT_MASK "' >> $@ ;
sed -r -n 's/^# ?define[ \t]+RLIMIT_([A-Z0-9_]+).
/\L\1/p' $< |
tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@

$(obj)/capability.o : $(obj)/capability_names.h $(obj)/resource.o : $(obj)/rlim_names.h $(obj)/capability_names.h : $(srctree)/include/uapi/linux/capability.h
$(src)/Makefile $(call cmd,make-caps) $(obj)/rlim_names.h : $(srctree)/include/uapi/asm-generic/resource.h
$(src)/Makefile $(call cmd,make-rlim)