 c88d4c7b04
			
		
	
	
	c88d4c7b04
	
	
	
		
			
			The basic routines and defines for AppArmor policy.  AppArmor policy
is defined by a few basic components.
      profiles - the basic unit of confinement contain all the information
                 to enforce policy on a task
                 Profiles tend to be named after an executable that they
                 will attach to but this is not required.
      namespaces - a container for a set of profiles that will be used
                 during attachment and transitions between profiles.
      sids - which provide a unique id for each profile
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: James Morris <jmorris@namei.org>
		
	
			
		
			
				
	
	
		
			24 lines
		
	
	
	
		
			519 B
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			24 lines
		
	
	
	
		
			519 B
			
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * AppArmor security module
 | |
|  *
 | |
|  * This file contains AppArmor security identifier (sid) definitions
 | |
|  *
 | |
|  * Copyright 2009-2010 Canonical Ltd.
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU General Public License as
 | |
|  * published by the Free Software Foundation, version 2 of the
 | |
|  * License.
 | |
|  */
 | |
| 
 | |
| #ifndef __AA_SID_H
 | |
| #define __AA_SID_H
 | |
| 
 | |
| #include <linux/types.h>
 | |
| 
 | |
| struct aa_profile;
 | |
| 
 | |
| u32 aa_alloc_sid(void);
 | |
| void aa_free_sid(u32 sid);
 | |
| 
 | |
| #endif /* __AA_SID_H */
 |