Blame view
security/apparmor/Makefile
2.56 KB
016d825fe AppArmor: Enable ... |
1 2 3 4 5 6 7 |
# Makefile for AppArmor Linux Security Module # obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \ path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \ resource.o sid.o file.o |
f8eb8a132 apparmor: add the... |
8 |
apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o |
016d825fe AppArmor: Enable ... |
9 |
|
0f8250265 AppArmor: cleanup... |
10 |
clean-files := capability_names.h rlim_names.h |
016d825fe AppArmor: Enable ... |
11 |
|
4fdef2183 AppArmor: Cleanup... |
12 13 14 15 16 17 |
# Build a lower case string table of capability names # Transforms lines from # #define CAP_DAC_OVERRIDE 1 # to # [1] = "dac_override", |
016d825fe AppArmor: Enable ... |
18 |
quiet_cmd_make-caps = GEN $@ |
7e570145c AppArmor: Fix loc... |
19 |
cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\ |
4fdef2183 AppArmor: Cleanup... |
20 21 |
sed $< >>$@ -r -n -e '/CAP_FS_MASK/d' \ -e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/[\2] = "\L\1",/p';\ |
84f1f7874 apparmor: export ... |
22 23 24 25 26 27 28 |
echo "};" >> $@ ;\ echo -n '\#define AA_FS_CAPS_MASK "' >> $@ ;\ sed $< -r -n -e '/CAP_FS_MASK/d' \ -e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/\L\1/p' | \ tr ' ' ' ' | sed -e 's/ $$/" /' >> $@ |
4fdef2183 AppArmor: Cleanup... |
29 |
|
016d825fe AppArmor: Enable ... |
30 |
|
4fdef2183 AppArmor: Cleanup... |
31 32 33 34 35 36 37 |
# Build a lower case string table of rlimit names. # Transforms lines from # #define RLIMIT_STACK 3 /* max stack size */ # to # [RLIMIT_STACK] = "stack", # # and build a second integer table (with the second sed cmd), that maps |
d384b0a1a AppArmor: export ... |
38 |
# RLIMIT defines to the order defined in asm-generic/resource.h This is |
4fdef2183 AppArmor: Cleanup... |
39 40 41 42 43 44 |
# required by policy load to map policy ordering of RLIMITs to internal # ordering for architectures that redefine an RLIMIT. # Transforms lines from # #define RLIMIT_STACK 3 /* max stack size */ # to # RLIMIT_STACK, |
d384b0a1a AppArmor: export ... |
45 46 47 48 49 50 51 |
# # and build the securityfs entries for the mapping. # Transforms lines from # #define RLIMIT_FSIZE 1 /* Maximum filesize */ # #define RLIMIT_STACK 3 /* max stack size */ # to # #define AA_FS_RLIMIT_MASK "fsize stack" |
016d825fe AppArmor: Enable ... |
52 |
quiet_cmd_make-rlim = GEN $@ |
7e570145c AppArmor: Fix loc... |
53 |
cmd_make-rlim = echo "static const char *const rlim_names[RLIM_NLIMITS] = {" \ |
33e521acf AppArmor: Add con... |
54 |
> $@ ;\ |
4fdef2183 AppArmor: Cleanup... |
55 56 57 |
sed $< >> $@ -r -n \ -e 's/^\# ?define[ \t]+(RLIMIT_([A-Z0-9_]+)).*/[\1] = "\L\2",/p';\ echo "};" >> $@ ;\ |
d384b0a1a AppArmor: export ... |
58 |
echo "static const int rlim_map[RLIM_NLIMITS] = {" >> $@ ;\ |
4fdef2183 AppArmor: Cleanup... |
59 |
sed -r -n "s/^\# ?define[ \t]+(RLIMIT_[A-Z0-9_]+).*/\1,/p" $< >> $@ ;\ |
d384b0a1a AppArmor: export ... |
60 61 62 63 64 65 |
echo "};" >> $@ ; \ echo -n '\#define AA_FS_RLIMIT_MASK "' >> $@ ;\ sed -r -n 's/^\# ?define[ \t]+RLIMIT_([A-Z0-9_]+).*/\L\1/p' $< | \ tr ' ' ' ' | sed -e 's/ $$/" /' >> $@ |
016d825fe AppArmor: Enable ... |
66 67 68 |
$(obj)/capability.o : $(obj)/capability_names.h $(obj)/resource.o : $(obj)/rlim_names.h |
43c422eda apparmor: fix app... |
69 |
$(obj)/capability_names.h : $(srctree)/include/uapi/linux/capability.h \ |
d384b0a1a AppArmor: export ... |
70 |
$(src)/Makefile |
016d825fe AppArmor: Enable ... |
71 |
$(call cmd,make-caps) |
8a1ab3155 UAPI: (Scripted) ... |
72 |
$(obj)/rlim_names.h : $(srctree)/include/uapi/asm-generic/resource.h \ |
d384b0a1a AppArmor: export ... |
73 |
$(src)/Makefile |
016d825fe AppArmor: Enable ... |
74 |
$(call cmd,make-rlim) |