Searched refs:profiles (Results 1 - 4 of 4) sorted by relevance

/security/apparmor/
H A Dpolicy.c15 * AppArmor policy is based around profiles, which contain the rules a
18 * visible set of profiles or by following a profiles attachment rules.
21 * visible profiles. Each namespace contains a special "unconfined" profile,
34 * null-XXXX-YYYY - special automatically generated learning profiles
38 * user-XXXX - user defined profiles
44 * The namespace contains the set of visible profiles that are considered
46 * the namespace so that for example a chroot can have its own set of profiles
49 * - it allows for sub profiles or hats, which allows an application to run
55 * - it allows for binary hierarchy of profiles, s
[all...]
H A Dapparmorfs.c96 * Don't allow profile load/replace/remove from profiles that don't
360 list_for_each_entry(child, &profile->base.profiles, base.list)
412 dent = securityfs_create_dir("profiles", dent);
460 list_for_each_entry(child, &profile->base.profiles, base.list) {
486 list_for_each_entry(child, &ns->base.profiles, base.list)
517 dent = securityfs_create_dir("profiles", dir);
527 list_for_each_entry(child, &ns->base.profiles, base.list) {
599 * @root: namespace that is root of profiles being displayed (NOT NULL)
609 if (!list_empty(&ns->base.profiles))
610 return list_first_entry(&ns->base.profiles,
[all...]
H A Ddomain.c130 * Do a linear search on the profiles in the list. There is a matching
314 new_profile = find_attach(ns, &profile->base.profiles,
318 new_profile = find_attach(ns, &ns->base.profiles,
388 new_profile = find_attach(ns, &ns->base.profiles, name);
504 /* when transitioning profiles clear unsafe personality bits */
653 if (list_empty(&root->base.profiles))
/security/apparmor/include/
H A Dpolicy.h50 * FIXME: currently need a clean way to replace and remove profiles as a
52 * Either, with a set of profiles loaded at the namespace level or via
79 /* struct aa_policy - common part of both namespaces and profiles
83 * @profiles: head of the profiles list contained in the object
89 struct list_head profiles; member in struct:aa_policy
92 /* struct aa_ns_acct - accounting of profiles in namespace
93 * @max_size: maximum space allowed for all profiles in namespace
94 * @max_count: maximum number of profiles that can be in this namespace
95 * @size: current size of profiles
[all...]

Completed in 25 milliseconds