Home
last modified time | relevance | path

Searched hist:"5 d5182cae40115c03933989473288e54afb39c7c" (Results 1 – 7 of 7) sorted by relevance

/openbmc/linux/security/apparmor/include/
H A Dpolicy_ns.hdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
H A Dapparmorfs.hdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
H A Dpolicy_unpack.hdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
/openbmc/linux/security/apparmor/
H A Dpolicy_ns.cdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
H A Dpolicy_unpack.cdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
H A Dpolicy.cdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
H A Dapparmorfs.cdiff 5d5182cae40115c03933989473288e54afb39c7c Tue May 09 02:08:41 CDT 2017 John Johansen <john.johansen@canonical.com> apparmor: move to per loaddata files, instead of replicating in profiles

The loaddata sets cover more than just a single profile and should
be tracked at the ns level. Move the load data files under the namespace
and reference the files from the profiles via a symlink.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: Seth Arnold <seth.arnold@canonical.com>
Reviewed-by: Kees Cook <keescook@chromium.org>