apparmorfs.c (f4d6b94b40c966ddd9eeb0d451e8a02c595ec7e3) | apparmorfs.c (2218d08123362c63bab257caf5ec3bc1a6e87ae9) |
---|---|
1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AppArmor security module 4 * 5 * This file contains AppArmor /sys/kernel/security/apparmor interface functions 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. --- 1185 unchanged lines hidden (view full) --- 1194{ 1195 struct aa_label *label = begin_current_label_crit_section(); 1196 seq_printf(seq, "%s\n", labels_ns(label)->base.name); 1197 end_current_label_crit_section(label); 1198 1199 return 0; 1200} 1201 | 1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AppArmor security module 4 * 5 * This file contains AppArmor /sys/kernel/security/apparmor interface functions 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. --- 1185 unchanged lines hidden (view full) --- 1194{ 1195 struct aa_label *label = begin_current_label_crit_section(); 1196 seq_printf(seq, "%s\n", labels_ns(label)->base.name); 1197 end_current_label_crit_section(label); 1198 1199 return 0; 1200} 1201 |
1202static int seq_ns_compress_min_show(struct seq_file *seq, void *v) 1203{ 1204 seq_printf(seq, "%d\n", zstd_min_clevel()); 1205 return 0; 1206} 1207 1208static int seq_ns_compress_max_show(struct seq_file *seq, void *v) 1209{ 1210 seq_printf(seq, "%d\n", zstd_max_clevel()); 1211 return 0; 1212} 1213 |
|
1202SEQ_NS_FOPS(stacked); 1203SEQ_NS_FOPS(nsstacked); 1204SEQ_NS_FOPS(level); 1205SEQ_NS_FOPS(name); | 1214SEQ_NS_FOPS(stacked); 1215SEQ_NS_FOPS(nsstacked); 1216SEQ_NS_FOPS(level); 1217SEQ_NS_FOPS(name); |
1218SEQ_NS_FOPS(compress_min); 1219SEQ_NS_FOPS(compress_max); |
|
1206 1207 1208/* policy/raw_data/ * file ops */ 1209#ifdef CONFIG_SECURITY_APPARMOR_EXPORT_BINARY 1210#define SEQ_RAWDATA_FOPS(NAME) \ 1211static int seq_rawdata_ ##NAME ##_open(struct inode *inode, struct file *file)\ 1212{ \ 1213 return seq_rawdata_open(inode, file, seq_rawdata_ ##NAME ##_show); \ --- 1163 unchanged lines hidden (view full) --- 2377 2378static struct aa_sfs_entry aa_sfs_entry_apparmor[] = { 2379 AA_SFS_FILE_FOPS(".access", 0666, &aa_sfs_access), 2380 AA_SFS_FILE_FOPS(".stacked", 0444, &seq_ns_stacked_fops), 2381 AA_SFS_FILE_FOPS(".ns_stacked", 0444, &seq_ns_nsstacked_fops), 2382 AA_SFS_FILE_FOPS(".ns_level", 0444, &seq_ns_level_fops), 2383 AA_SFS_FILE_FOPS(".ns_name", 0444, &seq_ns_name_fops), 2384 AA_SFS_FILE_FOPS("profiles", 0444, &aa_sfs_profiles_fops), | 1220 1221 1222/* policy/raw_data/ * file ops */ 1223#ifdef CONFIG_SECURITY_APPARMOR_EXPORT_BINARY 1224#define SEQ_RAWDATA_FOPS(NAME) \ 1225static int seq_rawdata_ ##NAME ##_open(struct inode *inode, struct file *file)\ 1226{ \ 1227 return seq_rawdata_open(inode, file, seq_rawdata_ ##NAME ##_show); \ --- 1163 unchanged lines hidden (view full) --- 2391 2392static struct aa_sfs_entry aa_sfs_entry_apparmor[] = { 2393 AA_SFS_FILE_FOPS(".access", 0666, &aa_sfs_access), 2394 AA_SFS_FILE_FOPS(".stacked", 0444, &seq_ns_stacked_fops), 2395 AA_SFS_FILE_FOPS(".ns_stacked", 0444, &seq_ns_nsstacked_fops), 2396 AA_SFS_FILE_FOPS(".ns_level", 0444, &seq_ns_level_fops), 2397 AA_SFS_FILE_FOPS(".ns_name", 0444, &seq_ns_name_fops), 2398 AA_SFS_FILE_FOPS("profiles", 0444, &aa_sfs_profiles_fops), |
2399 AA_SFS_FILE_FOPS("raw_data_compression_level_min", 0444, &seq_ns_compress_min_fops), 2400 AA_SFS_FILE_FOPS("raw_data_compression_level_max", 0444, &seq_ns_compress_max_fops), |
|
2385 AA_SFS_DIR("features", aa_sfs_entry_features), 2386 { } 2387}; 2388 2389static struct aa_sfs_entry aa_sfs_entry = 2390 AA_SFS_DIR("apparmor", aa_sfs_entry_apparmor); 2391 2392/** --- 278 unchanged lines hidden --- | 2401 AA_SFS_DIR("features", aa_sfs_entry_features), 2402 { } 2403}; 2404 2405static struct aa_sfs_entry aa_sfs_entry = 2406 AA_SFS_DIR("apparmor", aa_sfs_entry_apparmor); 2407 2408/** --- 278 unchanged lines hidden --- |