2010-07-30 11:46:33 +08:00
|
|
|
# Makefile for AppArmor Linux Security Module
|
|
|
|
#
|
|
|
|
obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o
|
|
|
|
|
|
|
|
apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
|
|
|
|
path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \
|
2017-06-09 23:14:28 +08:00
|
|
|
resource.o secid.o file.o policy_ns.o label.o
|
2013-08-15 02:27:36 +08:00
|
|
|
apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o
|
2010-07-30 11:46:33 +08:00
|
|
|
|
2011-01-07 22:03:02 +08:00
|
|
|
clean-files := capability_names.h rlim_names.h
|
2010-07-30 11:46:33 +08:00
|
|
|
|
2011-03-05 18:18:02 +08:00
|
|
|
|
|
|
|
# Build a lower case string table of capability names
|
|
|
|
# Transforms lines from
|
|
|
|
# #define CAP_DAC_OVERRIDE 1
|
|
|
|
# to
|
|
|
|
# [1] = "dac_override",
|
2010-07-30 11:46:33 +08:00
|
|
|
quiet_cmd_make-caps = GEN $@
|
2012-03-15 14:41:17 +08:00
|
|
|
cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\
|
2011-03-05 18:18:02 +08:00
|
|
|
sed $< >>$@ -r -n -e '/CAP_FS_MASK/d' \
|
|
|
|
-e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/[\2] = "\L\1",/p';\
|
2013-08-15 02:27:32 +08:00
|
|
|
echo "};" >> $@ ;\
|
2017-05-25 21:23:42 +08:00
|
|
|
printf '%s' '\#define AA_SFS_CAPS_MASK "' >> $@ ;\
|
2013-08-15 02:27:32 +08:00
|
|
|
sed $< -r -n -e '/CAP_FS_MASK/d' \
|
|
|
|
-e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/\L\1/p' | \
|
|
|
|
tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@
|
2011-03-05 18:18:02 +08:00
|
|
|
|
2010-07-30 11:46:33 +08:00
|
|
|
|
2011-03-05 18:18:02 +08:00
|
|
|
# Build a lower case string table of rlimit names.
|
|
|
|
# Transforms lines from
|
|
|
|
# #define RLIMIT_STACK 3 /* max stack size */
|
|
|
|
# to
|
|
|
|
# [RLIMIT_STACK] = "stack",
|
|
|
|
#
|
|
|
|
# and build a second integer table (with the second sed cmd), that maps
|
2012-01-27 08:29:23 +08:00
|
|
|
# RLIMIT defines to the order defined in asm-generic/resource.h This is
|
2011-03-05 18:18:02 +08:00
|
|
|
# required by policy load to map policy ordering of RLIMITs to internal
|
|
|
|
# ordering for architectures that redefine an RLIMIT.
|
|
|
|
# Transforms lines from
|
|
|
|
# #define RLIMIT_STACK 3 /* max stack size */
|
|
|
|
# to
|
|
|
|
# RLIMIT_STACK,
|
2012-01-27 08:29:23 +08:00
|
|
|
#
|
|
|
|
# and build the securityfs entries for the mapping.
|
|
|
|
# Transforms lines from
|
|
|
|
# #define RLIMIT_FSIZE 1 /* Maximum filesize */
|
|
|
|
# #define RLIMIT_STACK 3 /* max stack size */
|
|
|
|
# to
|
2017-05-25 21:23:42 +08:00
|
|
|
# #define AA_SFS_RLIMIT_MASK "fsize stack"
|
2010-07-30 11:46:33 +08:00
|
|
|
quiet_cmd_make-rlim = GEN $@
|
2012-03-15 14:41:17 +08:00
|
|
|
cmd_make-rlim = echo "static const char *const rlim_names[RLIM_NLIMITS] = {" \
|
2012-03-14 20:53:40 +08:00
|
|
|
> $@ ;\
|
2011-03-05 18:18:02 +08:00
|
|
|
sed $< >> $@ -r -n \
|
|
|
|
-e 's/^\# ?define[ \t]+(RLIMIT_([A-Z0-9_]+)).*/[\1] = "\L\2",/p';\
|
|
|
|
echo "};" >> $@ ;\
|
2012-01-27 08:29:23 +08:00
|
|
|
echo "static const int rlim_map[RLIM_NLIMITS] = {" >> $@ ;\
|
2011-03-05 18:18:02 +08:00
|
|
|
sed -r -n "s/^\# ?define[ \t]+(RLIMIT_[A-Z0-9_]+).*/\1,/p" $< >> $@ ;\
|
2012-01-27 08:29:23 +08:00
|
|
|
echo "};" >> $@ ; \
|
2017-05-25 21:23:42 +08:00
|
|
|
printf '%s' '\#define AA_SFS_RLIMIT_MASK "' >> $@ ;\
|
2012-01-27 08:29:23 +08:00
|
|
|
sed -r -n 's/^\# ?define[ \t]+RLIMIT_([A-Z0-9_]+).*/\L\1/p' $< | \
|
|
|
|
tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@
|
2010-07-30 11:46:33 +08:00
|
|
|
|
|
|
|
$(obj)/capability.o : $(obj)/capability_names.h
|
|
|
|
$(obj)/resource.o : $(obj)/rlim_names.h
|
2012-10-18 04:29:33 +08:00
|
|
|
$(obj)/capability_names.h : $(srctree)/include/uapi/linux/capability.h \
|
2012-01-27 08:29:23 +08:00
|
|
|
$(src)/Makefile
|
2010-07-30 11:46:33 +08:00
|
|
|
$(call cmd,make-caps)
|
2012-10-05 01:20:15 +08:00
|
|
|
$(obj)/rlim_names.h : $(srctree)/include/uapi/asm-generic/resource.h \
|
2012-01-27 08:29:23 +08:00
|
|
|
$(src)/Makefile
|
2010-07-30 11:46:33 +08:00
|
|
|
$(call cmd,make-rlim)
|