| # Makefile for AppArmor Linux Security Module |
| # |
| obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o |
| |
| apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \ |
| path.o domain.o policy.o policy_unpack.o procattr.o lsm.o \ |
| resource.o secid.o file.o policy_ns.o label.o |
| apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o |
| |
| clean-files := capability_names.h rlim_names.h |
| |
| |
| # Build a lower case string table of capability names |
| # Transforms lines from |
| # #define CAP_DAC_OVERRIDE 1 |
| # to |
| # [1] = "dac_override", |
| quiet_cmd_make-caps = GEN $@ |
| cmd_make-caps = echo "static const char *const capability_names[] = {" > $@ ;\ |
| sed $< >>$@ -r -n -e '/CAP_FS_MASK/d' \ |
| -e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/[\2] = "\L\1",/p';\ |
| echo "};" >> $@ ;\ |
| printf '%s' '\#define AA_SFS_CAPS_MASK "' >> $@ ;\ |
| sed $< -r -n -e '/CAP_FS_MASK/d' \ |
| -e 's/^\#define[ \t]+CAP_([A-Z0-9_]+)[ \t]+([0-9]+)/\L\1/p' | \ |
| tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@ |
| |
| |
| # Build a lower case string table of rlimit names. |
| # Transforms lines from |
| # #define RLIMIT_STACK 3 /* max stack size */ |
| # to |
| # [RLIMIT_STACK] = "stack", |
| # |
| # and build a second integer table (with the second sed cmd), that maps |
| # RLIMIT defines to the order defined in asm-generic/resource.h This is |
| # required by policy load to map policy ordering of RLIMITs to internal |
| # ordering for architectures that redefine an RLIMIT. |
| # Transforms lines from |
| # #define RLIMIT_STACK 3 /* max stack size */ |
| # to |
| # RLIMIT_STACK, |
| # |
| # and build the securityfs entries for the mapping. |
| # Transforms lines from |
| # #define RLIMIT_FSIZE 1 /* Maximum filesize */ |
| # #define RLIMIT_STACK 3 /* max stack size */ |
| # to |
| # #define AA_SFS_RLIMIT_MASK "fsize stack" |
| quiet_cmd_make-rlim = GEN $@ |
| cmd_make-rlim = echo "static const char *const rlim_names[RLIM_NLIMITS] = {" \ |
| > $@ ;\ |
| sed $< >> $@ -r -n \ |
| -e 's/^\# ?define[ \t]+(RLIMIT_([A-Z0-9_]+)).*/[\1] = "\L\2",/p';\ |
| echo "};" >> $@ ;\ |
| echo "static const int rlim_map[RLIM_NLIMITS] = {" >> $@ ;\ |
| sed -r -n "s/^\# ?define[ \t]+(RLIMIT_[A-Z0-9_]+).*/\1,/p" $< >> $@ ;\ |
| echo "};" >> $@ ; \ |
| printf '%s' '\#define AA_SFS_RLIMIT_MASK "' >> $@ ;\ |
| sed -r -n 's/^\# ?define[ \t]+RLIMIT_([A-Z0-9_]+).*/\L\1/p' $< | \ |
| tr '\n' ' ' | sed -e 's/ $$/"\n/' >> $@ |
| |
| $(obj)/capability.o : $(obj)/capability_names.h |
| $(obj)/resource.o : $(obj)/rlim_names.h |
| $(obj)/capability_names.h : $(srctree)/include/uapi/linux/capability.h \ |
| $(src)/Makefile |
| $(call cmd,make-caps) |
| $(obj)/rlim_names.h : $(srctree)/include/uapi/asm-generic/resource.h \ |
| $(src)/Makefile |
| $(call cmd,make-rlim) |