1016d825fSJohn Johansen# Makefile for AppArmor Linux Security Module 2016d825fSJohn Johansen# 3016d825fSJohn Johansenobj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o 4016d825fSJohn Johansen 5016d825fSJohn Johansenapparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \ 6016d825fSJohn Johansen path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \ 7016d825fSJohn Johansen resource.o sid.o file.o 8016d825fSJohn Johansen 90f825026SMichal Hockoclean-files := capability_names.h rlim_names.h 10016d825fSJohn Johansen 114fdef218SJohn Johansen 124fdef218SJohn Johansen# Build a lower case string table of capability names 134fdef218SJohn Johansen# Transforms lines from 144fdef218SJohn Johansen# #define CAP_DAC_OVERRIDE 1 154fdef218SJohn Johansen# to 164fdef218SJohn Johansen# [1] = "dac_override", 17016d825fSJohn Johansenquiet_cmd_make-caps = GEN $@ 187e570145STetsuo Handacmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\ 194fdef218SJohn Johansen sed $< >>$@ -r -n -e '/CAP_FS_MASK/d' \ 204fdef218SJohn Johansen -e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/[\2] = "\L\1",/p';\ 21*84f1f787SJohn Johansen echo "};" >> $@ ;\ 22*84f1f787SJohn Johansen echo -n '\#define AA_FS_CAPS_MASK "' >> $@ ;\ 23*84f1f787SJohn Johansen sed $< -r -n -e '/CAP_FS_MASK/d' \ 24*84f1f787SJohn Johansen -e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/\L\1/p' | \ 25*84f1f787SJohn Johansen tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@ 26016d825fSJohn Johansen 274fdef218SJohn Johansen 284fdef218SJohn Johansen# Build a lower case string table of rlimit names. 294fdef218SJohn Johansen# Transforms lines from 304fdef218SJohn Johansen# #define RLIMIT_STACK 3 /* max stack size */ 314fdef218SJohn Johansen# to 324fdef218SJohn Johansen# [RLIMIT_STACK] = "stack", 334fdef218SJohn Johansen# 344fdef218SJohn Johansen# and build a second integer table (with the second sed cmd), that maps 35d384b0a1SKees Cook# RLIMIT defines to the order defined in asm-generic/resource.h This is 364fdef218SJohn Johansen# required by policy load to map policy ordering of RLIMITs to internal 374fdef218SJohn Johansen# ordering for architectures that redefine an RLIMIT. 384fdef218SJohn Johansen# Transforms lines from 394fdef218SJohn Johansen# #define RLIMIT_STACK 3 /* max stack size */ 404fdef218SJohn Johansen# to 414fdef218SJohn Johansen# RLIMIT_STACK, 42d384b0a1SKees Cook# 43d384b0a1SKees Cook# and build the securityfs entries for the mapping. 44d384b0a1SKees Cook# Transforms lines from 45d384b0a1SKees Cook# #define RLIMIT_FSIZE 1 /* Maximum filesize */ 46d384b0a1SKees Cook# #define RLIMIT_STACK 3 /* max stack size */ 47d384b0a1SKees Cook# to 48d384b0a1SKees Cook# #define AA_FS_RLIMIT_MASK "fsize stack" 49016d825fSJohn Johansenquiet_cmd_make-rlim = GEN $@ 507e570145STetsuo Handacmd_make-rlim = echo "static const char *const rlim_names[RLIM_NLIMITS] = {" \ 5133e521acSJohn Johansen > $@ ;\ 524fdef218SJohn Johansen sed $< >> $@ -r -n \ 534fdef218SJohn Johansen -e 's/^\# ?define[ \t]+(RLIMIT_([A-Z0-9_]+)).*/[\1] = "\L\2",/p';\ 544fdef218SJohn Johansen echo "};" >> $@ ;\ 55d384b0a1SKees Cook echo "static const int rlim_map[RLIM_NLIMITS] = {" >> $@ ;\ 564fdef218SJohn Johansen sed -r -n "s/^\# ?define[ \t]+(RLIMIT_[A-Z0-9_]+).*/\1,/p" $< >> $@ ;\ 57d384b0a1SKees Cook echo "};" >> $@ ; \ 58d384b0a1SKees Cook echo -n '\#define AA_FS_RLIMIT_MASK "' >> $@ ;\ 59d384b0a1SKees Cook sed -r -n 's/^\# ?define[ \t]+RLIMIT_([A-Z0-9_]+).*/\L\1/p' $< | \ 60d384b0a1SKees Cook tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@ 61016d825fSJohn Johansen 62016d825fSJohn Johansen$(obj)/capability.o : $(obj)/capability_names.h 63016d825fSJohn Johansen$(obj)/resource.o : $(obj)/rlim_names.h 6443c422edSJohn Johansen$(obj)/capability_names.h : $(srctree)/include/uapi/linux/capability.h \ 65d384b0a1SKees Cook $(src)/Makefile 66016d825fSJohn Johansen $(call cmd,make-caps) 678a1ab315SDavid Howells$(obj)/rlim_names.h : $(srctree)/include/uapi/asm-generic/resource.h \ 68d384b0a1SKees Cook $(src)/Makefile 69016d825fSJohn Johansen $(call cmd,make-rlim) 70