<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/apparmor/include/file.h, branch v3.0.30</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/apparmor/include/file.h?h=v3.0.30</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/apparmor/include/file.h?h=v3.0.30'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-01-10T16:51:44Z</updated>
<entry>
<title>headers: path.h redux</title>
<updated>2011-01-10T16:51:44Z</updated>
<author>
<name>Alexey Dobriyan</name>
<email>adobriyan@gmail.com</email>
</author>
<published>2011-01-10T06:17:10Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=37721e1b0cf98cb65895f234d8c500d270546529'/>
<id>urn:sha1:37721e1b0cf98cb65895f234d8c500d270546529</id>
<content type='text'>
Remove path.h from sched.h and other files.

Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>AppArmor: file enforcement routines</title>
<updated>2010-08-02T05:35:14Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2010-07-29T21:48:04Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6380bd8ddf613b29f478396308b591867d401de4'/>
<id>urn:sha1:6380bd8ddf613b29f478396308b591867d401de4</id>
<content type='text'>
AppArmor does files enforcement via pathname matching.  Matching is done
at file open using a dfa match engine.  Permission is against the final
file object not parent directories, ie. the traversal of directories
as part of the file match is implicitly allowed.  In the case of nonexistant
files (creation) permissions are checked against the target file not the
directory.  eg. In case of creating the file /dir/new, permissions are
checked against the match /dir/new not against /dir/.

The permissions for matches are currently stored in the dfa accept table,
but this will change to allow for dfa reuse and also to allow for sharing
of wider accept states.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
</feed>
