<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/apparmor/include/context.h, branch v3.12-rc7</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/apparmor/include/context.h?h=v3.12-rc7</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/apparmor/include/context.h?h=v3.12-rc7'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2013-08-14T18:42:06Z</updated>
<entry>
<title>apparmor: change how profile replacement update is done</title>
<updated>2013-08-14T18:42:06Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2013-07-11T04:07:43Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=77b071b34045a0c65d0e1f85f3d47fd2b8b7a8a1'/>
<id>urn:sha1:77b071b34045a0c65d0e1f85f3d47fd2b8b7a8a1</id>
<content type='text'>
remove the use of replaced by chaining and move to profile invalidation
and lookup to handle task replacement.

Replacement chaining can result in large chains of profiles being pinned
in memory when one profile in the chain is use. With implicit labeling
this will be even more of a problem, so move to a direct lookup method.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
<entry>
<title>apparmor: localize getting the security context to a few macros</title>
<updated>2013-04-28T07:39:35Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2013-02-27T11:43:40Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=214beacaa7b669473bc963af719fa359a8312ea4'/>
<id>urn:sha1:214beacaa7b669473bc963af719fa359a8312ea4</id>
<content type='text'>
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;
</content>
</entry>
<entry>
<title>apparmor: use common fn to clear task_context for domain transitions</title>
<updated>2013-04-28T07:36:20Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2013-02-19T00:05:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7a2871b566f34d980556072943295efd107eb53c'/>
<id>urn:sha1:7a2871b566f34d980556072943295efd107eb53c</id>
<content type='text'>
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Steve Beattie &lt;sbeattie@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>apparmor: add utility function to get an arbitrary tasks profile.</title>
<updated>2013-04-28T07:35:53Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2013-02-19T00:03:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3cfcc19e0b5390c04cb5bfa4e8fde39395410e61'/>
<id>urn:sha1:3cfcc19e0b5390c04cb5bfa4e8fde39395410e61</id>
<content type='text'>
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Steve Beattie &lt;sbeattie@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: contexts used in attaching policy to system objects</title>
<updated>2010-08-02T05:35:12Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2010-07-29T21:47:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c75afcd153f6147d3b094f45a1d87e5df7f4f053'/>
<id>urn:sha1:c75afcd153f6147d3b094f45a1d87e5df7f4f053</id>
<content type='text'>
AppArmor contexts attach profiles and state to tasks, files, etc. when
a direct profile reference is not sufficient.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
</feed>
