diff options
author | John Johansen <john.johansen@canonical.com> | 2025-02-17 01:46:37 -0800 |
---|---|---|
committer | John Johansen <john.johansen@canonical.com> | 2025-07-20 02:31:06 -0700 |
commit | 9afdc6abb007d5a86f54e9f10870ac1468155ca5 (patch) | |
tree | ca4322b73a8c95da56d8e0866ef2c490791ffdd1 /security/apparmor/net.c | |
parent | f9c9dce01e9640d94a37304bddc97b738ee4ac35 (diff) |
apparmor: transition from a list of rules to a vector of rules
The set of rules on a profile is not dynamically extended, instead
if a new ruleset is needed a new version of the profile is created.
This allows us to use a vector of rules instead of a list, slightly
reducing memory usage and simplifying the code.
Signed-off-by: John Johansen <john.johansen@canonical.com>
Diffstat (limited to 'security/apparmor/net.c')
-rw-r--r-- | security/apparmor/net.c | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/security/apparmor/net.c b/security/apparmor/net.c index 7382069efd7d..45cf25605c34 100644 --- a/security/apparmor/net.c +++ b/security/apparmor/net.c @@ -251,8 +251,7 @@ int aa_profile_af_perm(struct aa_profile *profile, struct apparmor_audit_data *ad, u32 request, u16 family, int type, int protocol) { - struct aa_ruleset *rules = list_first_entry(&profile->rules, - typeof(*rules), list); + struct aa_ruleset *rules = profile->label.rules[0]; struct aa_perms *p = NULL; aa_state_t state; @@ -362,8 +361,7 @@ static int aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, { int i, ret; struct aa_perms perms = { }; - struct aa_ruleset *rules = list_first_entry(&profile->rules, - typeof(*rules), list); + struct aa_ruleset *rules = profile->label.rules[0]; if (rules->secmark_count == 0) return 0; |