Searched refs:apparmor (Results 1 – 18 of 18) sorted by relevance
| /linux/security/apparmor/ |
| H A D | Kconfig | 14 http://apparmor.wiki.kernel.org 23 Build apparmor with debugging logic in apparmor. Not all 43 Set the default value of the apparmor.debug kernel parameter. 53 is available to userspace via the apparmor filesystem. This 66 hashes is available to userspace via the apparmor 101 This options allows controlling whether apparmor does a full
|
| H A D | Makefile | 4 obj-$(CONFIG_SECURITY_APPARMOR) += apparmor.o 6 apparmor-y := apparmorfs.o audit.o capability.o task.o ipc.o lib.o match.o \ 10 apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o
|
| H A D | audit.c | 273 label = prop->apparmor.label; in aa_audit_rule_match()
|
| H A D | lsm.c | 990 prop->apparmor.label = label; in apparmor_current_getlsmprop_subj() 999 prop->apparmor.label = label; in apparmor_task_getlsmprop_obj() 2569 DEFINE_LSM(apparmor) = {
|
| /linux/Documentation/userspace-api/ |
| H A D | lsm.rst | 22 AppArmor also provides this value in ``/proc/self/attr/apparmor/current``. 28 AppArmor also provides this value in ``/proc/self/attr/apparmor/exec``. 44 AppArmor also provides this value in ``/proc/self/attr/apparmor/prev``.
|
| /linux/security/ |
| H A D | Makefile | 20 obj-$(CONFIG_SECURITY_APPARMOR) += apparmor/
|
| H A D | Kconfig | 226 source "security/apparmor/Kconfig" 273 default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAULT_SECURITY_SMACK 274 default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAULT_SECURITY_APPARMOR 277 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
|
| /linux/Documentation/ABI/testing/ |
| H A D | procfs-attr-prev | 4 apparmor@lists.ubuntu.com
|
| H A D | procfs-attr-current | 4 apparmor@lists.ubuntu.com
|
| H A D | procfs-attr-exec | 4 apparmor@lists.ubuntu.com
|
| /linux/Documentation/dev-tools/kunit/ |
| H A D | style.rst | 49 ``apparmor`` 103 Part of the ``apparmor`` subsystem, testing the ``property_entry`` area.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 323 If a traditional MAC system is enabled (SELinux, apparmor, smack), all 340 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera), 551 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera),
|
| /linux/include/linux/ |
| H A D | security.h | 167 struct lsm_prop_apparmor apparmor; member
|
| /linux/Documentation/translations/sp_SP/process/ |
| H A D | handling-regressions.rst | 481 de apparmor hasta que la gente involucrada entienda como se hace
|
| /linux/Documentation/process/ |
| H A D | handling-regressions.rst | 486 three weeks means that I will revert, and I will stop pulling apparmor
|
| /linux/fs/proc/ |
| H A D | base.c | 2904 LSM_DIR_OPS(apparmor);
|
| /linux/ |
| H A D | MAINTAINERS | 1914 M: John Johansen <john@apparmor.net> 1915 L: apparmor@lists.ubuntu.com (moderated for non-subscribers) 1917 W: apparmor.net 1918 B: https://gitlab.com/apparmor/apparmor-kernel 1919 C: irc://irc.oftc.net/apparmor 1920 T: git git://git.kernel.org/pub/scm/linux/kernel/git/jj/linux-apparmor 1921 T: https://gitlab.com/apparmor/apparmor-kernel.git 1922 F: Documentation/admin-guide/LSM/apparmor [all...] |
| /linux/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 540 apparmor= [APPARMOR] Disable or enable AppArmor at boot time 542 See security/apparmor/Kconfig help text
|