121d4a91e3
Move to common terminology with other LSMs and kernel infrastucture Signed-off-by: John Johansen <john.johansen@canonical.com>
56 lines
1.2 KiB
C
56 lines
1.2 KiB
C
/*
|
|
* AppArmor security module
|
|
*
|
|
* This file contains AppArmor security identifier (secid) manipulation fns
|
|
*
|
|
* Copyright 2009-2010 Canonical Ltd.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License as
|
|
* published by the Free Software Foundation, version 2 of the
|
|
* License.
|
|
*
|
|
*
|
|
* AppArmor allocates a unique secid for every profile loaded. If a profile
|
|
* is replaced it receives the secid of the profile it is replacing.
|
|
*
|
|
* The secid value of 0 is invalid.
|
|
*/
|
|
|
|
#include <linux/spinlock.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/err.h>
|
|
|
|
#include "include/secid.h"
|
|
|
|
/* global counter from which secids are allocated */
|
|
static u32 global_secid;
|
|
static DEFINE_SPINLOCK(secid_lock);
|
|
|
|
/* TODO FIXME: add secid to profile mapping, and secid recycling */
|
|
|
|
/**
|
|
* aa_alloc_secid - allocate a new secid for a profile
|
|
*/
|
|
u32 aa_alloc_secid(void)
|
|
{
|
|
u32 secid;
|
|
|
|
/*
|
|
* TODO FIXME: secid recycling - part of profile mapping table
|
|
*/
|
|
spin_lock(&secid_lock);
|
|
secid = (++global_secid);
|
|
spin_unlock(&secid_lock);
|
|
return secid;
|
|
}
|
|
|
|
/**
|
|
* aa_free_secid - free a secid
|
|
* @secid: secid to free
|
|
*/
|
|
void aa_free_secid(u32 secid)
|
|
{
|
|
; /* NOP ATM */
|
|
}
|