mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-08-27 15:36:48 +00:00

When more than one security module is exporting data to audit and networking sub-systems a single 32 bit integer is no longer sufficient to represent the data. Add a structure to be used instead. The lsm_prop structure definition is intended to keep the LSM specific information private to the individual security modules. The module specific information is included in a new set of header files under include/lsm. Each security module is allowed to define the information included for its use in the lsm_prop. SELinux includes a u32 secid. Smack includes a pointer into its global label list. The conditional compilation based on feature inclusion is contained in the include/lsm files. Cc: apparmor@lists.ubuntu.com Cc: bpf@vger.kernel.org Cc: selinux@vger.kernel.org Cc: linux-security-module@vger.kernel.org Suggested-by: Paul Moore <paul@paul-moore.com> Signed-off-by: Casey Schaufler <casey@schaufler-ca.com> Acked-by: John Johansen <john.johansen@canonical.com> [PM: added include/linux/lsm/ to MAINTAINERS, subj tweak] Signed-off-by: Paul Moore <paul@paul-moore.com>
18 lines
378 B
C
18 lines
378 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Linux Security Module interface to other subsystems.
|
|
* AppArmor presents single pointer to an aa_label structure.
|
|
*/
|
|
#ifndef __LINUX_LSM_APPARMOR_H
|
|
#define __LINUX_LSM_APPARMOR_H
|
|
|
|
struct aa_label;
|
|
|
|
struct lsm_prop_apparmor {
|
|
#ifdef CONFIG_SECURITY_APPARMOR
|
|
struct aa_label *label;
|
|
#endif
|
|
};
|
|
|
|
#endif /* ! __LINUX_LSM_APPARMOR_H */
|