linux-sg2042/security/apparmor/include
John Johansen c88d4c7b04 AppArmor: core policy routines
The basic routines and defines for AppArmor policy.  AppArmor policy
is defined by a few basic components.
      profiles - the basic unit of confinement contain all the information
                 to enforce policy on a task

                 Profiles tend to be named after an executable that they
                 will attach to but this is not required.
      namespaces - a container for a set of profiles that will be used
                 during attachment and transitions between profiles.
      sids - which provide a unique id for each profile

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: James Morris <jmorris@namei.org>
2010-08-02 15:38:37 +10:00
..
apparmor.h
apparmorfs.h AppArmor: userspace interfaces 2010-08-02 15:35:13 +10:00
audit.h AppArmor: basic auditing infrastructure. 2010-08-02 15:35:11 +10:00
capability.h AppArmor: mediation of non file objects 2010-08-02 15:38:35 +10:00
context.h AppArmor: contexts used in attaching policy to system objects 2010-08-02 15:35:12 +10:00
domain.h AppArmor: functions for domain transitions 2010-08-02 15:35:14 +10:00
file.h AppArmor: file enforcement routines 2010-08-02 15:35:14 +10:00
ipc.h AppArmor: mediation of non file objects 2010-08-02 15:38:35 +10:00
match.h AppArmor: dfa match engine 2010-08-02 15:35:13 +10:00
path.h
policy.h AppArmor: core policy routines 2010-08-02 15:38:37 +10:00
policy_unpack.h AppArmor: policy routines for loading and unpacking policy 2010-08-02 15:38:36 +10:00
procattr.h AppArmor: userspace interfaces 2010-08-02 15:35:13 +10:00
resource.h AppArmor: mediation of non file objects 2010-08-02 15:38:35 +10:00
sid.h AppArmor: core policy routines 2010-08-02 15:38:37 +10:00