mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Replace the (secctx,seclen) pointer pair with a single lsm_context pointer to allow return of the LSM identifier along with the context and context length. This allows security_release_secctx() to know how to release the context. Callers have been modified to use or save the returned data from the new structure. security_secid_to_secctx() and security_lsmproc_to_secctx() will now return the length value on success instead of 0. Cc: netdev@vger.kernel.org Cc: audit@vger.kernel.org Cc: netfilter-devel@vger.kernel.org Cc: Todd Kjos <tkjos@google.com> Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> [PM: subject tweak, kdoc fix, signedness fix from Dan Carpenter] Signed-off-by: Paul Moore <paul@paul-moore.com>
37 lines
1,002 B
C
37 lines
1,002 B
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* AppArmor security module
|
|
*
|
|
* This file contains AppArmor security identifier (secid) definitions
|
|
*
|
|
* Copyright 2009-2018 Canonical Ltd.
|
|
*/
|
|
|
|
#ifndef __AA_SECID_H
|
|
#define __AA_SECID_H
|
|
|
|
#include <linux/slab.h>
|
|
#include <linux/types.h>
|
|
|
|
struct aa_label;
|
|
|
|
/* secid value that will not be allocated */
|
|
#define AA_SECID_INVALID 0
|
|
|
|
/* secid value that matches any other secid */
|
|
#define AA_SECID_WILDCARD 1
|
|
|
|
/* sysctl to enable displaying mode when converting secid to secctx */
|
|
extern int apparmor_display_secid_mode;
|
|
|
|
struct aa_label *aa_secid_to_label(u32 secid);
|
|
int apparmor_secid_to_secctx(u32 secid, struct lsm_context *cp);
|
|
int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, struct lsm_context *cp);
|
|
int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
|
|
void apparmor_release_secctx(struct lsm_context *cp);
|
|
|
|
|
|
int aa_alloc_secid(struct aa_label *label, gfp_t gfp);
|
|
void aa_free_secid(u32 secid);
|
|
|
|
#endif /* __AA_SECID_H */
|