summaryrefslogtreecommitdiffstats
path: root/security/apparmor/include/context.h
Commit message (Collapse)AuthorAgeFilesLines
* apparmor: rename context abreviation cxt to the more standard ctxJohn Johansen2017-01-161-38/+40
| | | | Signed-off-by: John Johansen <john.johansen@canonical.com>
* apparmor: add ns being viewed as a param to policy_view_capable()John Johansen2017-01-161-0/+6
| | | | | | | | | | | Prepare for a tighter pairing of user namespaces and apparmor policy namespaces, by making the ns to be viewed available and checking that the user namespace level is the same as the policy ns level. This strict pairing will be relaxed once true support of user namespaces lands. Signed-off-by: John Johansen <john.johansen@canonical.com>
* apparmor: rename PFLAG_INVALID to PFLAG_STALEJohn Johansen2017-01-161-1/+1
| | | | | | Invalid does not convey the meaning of the flag anymore so rename it. Signed-off-by: John Johansen <john.johansen@canonical.com>
* apparmor: change how profile replacement update is doneJohn Johansen2013-08-141-8/+7
| | | | | | | | | | | remove the use of replaced by chaining and move to profile invalidation and lookup to handle task replacement. Replacement chaining can result in large chains of profiles being pinned in memory when one profile in the chain is use. With implicit labeling this will be even more of a problem, so move to a direct lookup method. Signed-off-by: John Johansen <john.johansen@canonical.com>
* apparmor: localize getting the security context to a few macrosJohn Johansen2013-04-281-2/+5
| | | | | Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Seth Arnold <seth.arnold@canonical.com>
* apparmor: use common fn to clear task_context for domain transitionsJohn Johansen2013-04-281-0/+13
| | | | | Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Steve Beattie <sbeattie@ubuntu.com>
* apparmor: add utility function to get an arbitrary tasks profile.John Johansen2013-04-281-16/+25
| | | | | Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Steve Beattie <sbeattie@ubuntu.com>
* AppArmor: contexts used in attaching policy to system objectsJohn Johansen2010-08-021-0/+154
AppArmor contexts attach profiles and state to tasks, files, etc. when a direct profile reference is not sufficient. Signed-off-by: John Johansen <john.johansen@canonical.com> Signed-off-by: James Morris <jmorris@namei.org>
OpenPOWER on IntegriCloud