mirror of
https://github.com/raspberrypi/linux.git
synced 2026-01-05 10:47:34 +00:00
aa_label_audit, aa_label_find, aa_label_seq_print and aa_update_label_name were added by commitf1bd904175("apparmor: add the base fns() for domain labels") but never used. aa_profile_label_perm was added by commit637f688dc3("apparmor: switch from profiles to using labels on contexts") but never used. aa_secid_update was added by commitc092921219("apparmor: add support for mapping secids and using secctxes") but never used. aa_split_fqname has been unused since commit3664268f19("apparmor: add namespace lookup fns()") aa_lookup_profile has been unused since commit93c98a484c("apparmor: move exec domain mediation to using labels") aa_audit_perms_cb was only used by aa_profile_label_perm (see above). All of these commits are from around 2017. Remove them. Signed-off-by: Dr. David Alan Gilbert <linux@treblig.org> Signed-off-by: John Johansen <john.johansen@canonical.com>
39 lines
1.0 KiB
C
39 lines
1.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* AppArmor security module
|
|
*
|
|
* This file contains AppArmor security identifier (secid) definitions
|
|
*
|
|
* Copyright 2009-2018 Canonical Ltd.
|
|
*/
|
|
|
|
#ifndef __AA_SECID_H
|
|
#define __AA_SECID_H
|
|
|
|
#include <linux/slab.h>
|
|
#include <linux/types.h>
|
|
|
|
struct aa_label;
|
|
|
|
/* secid value that will not be allocated */
|
|
#define AA_SECID_INVALID 0
|
|
|
|
/* secid value that matches any other secid */
|
|
#define AA_SECID_WILDCARD 1
|
|
|
|
/* sysctl to enable displaying mode when converting secid to secctx */
|
|
extern int apparmor_display_secid_mode;
|
|
|
|
struct aa_label *aa_secid_to_label(u32 secid);
|
|
int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
|
|
int apparmor_lsmprop_to_secctx(struct lsm_prop *prop, char **secdata,
|
|
u32 *seclen);
|
|
int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
|
|
void apparmor_release_secctx(char *secdata, u32 seclen);
|
|
|
|
|
|
int aa_alloc_secid(struct aa_label *label, gfp_t gfp);
|
|
void aa_free_secid(u32 secid);
|
|
|
|
#endif /* __AA_SECID_H */
|