<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>b11e51dd - apparmor: test: make static symbols visible during kunit testing</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#b11e51dd</link>
        <description>apparmor: test: make static symbols visible during kunit testingUse macros, VISIBLE_IF_KUNIT and EXPORT_SYMBOL_IF_KUNIT, to allowstatic symbols to be conditionally set to be visible duringapparmor_policy_unpack_test, which removes the need to include the testingfile in the implementation file.Change the namespace of the symbols that are now conditionally visible (byadding the prefix aa_) to avoid confusion with symbols of the same name.Allow the test to be built as a module and namespace the module name frompolicy_unpack_test to apparmor_policy_unpack_test to improve clarity ofthe module name.Provide an example of how static symbols can be dealt with in testing.Signed-off-by: Rae Moar &lt;rmoar@google.com&gt;Reviewed-by: David Gow &lt;davidgow@google.com&gt;Acked-by: John Johansen &lt;john.johansen@canonical.com&gt;Signed-off-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 07 Dec 2022 01:40:24 +0000</pubDate>
        <dc:creator>Rae Moar &lt;rmoar@google.com&gt;</dc:creator>
    </item>
<item>
        <title>caa9f579 - apparmor: isolate policy backwards compatibility to its own file</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#caa9f579</link>
        <description>apparmor: isolate policy backwards compatibility to its own fileThe details of mapping old policy into newer policy formats cluttersup the unpack code and makes it possible to accidentally use oldmappings in code, so isolate the mapping code into its own file.This will become more important when the dfa remapping code lands,as it will greatly expand the compat code base.Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Mon, 22 Aug 2022 05:48:32 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>56974a6f - apparmor: add base infastructure for socket mediation</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#56974a6f</link>
        <description>apparmor: add base infastructure for socket mediationversion 2 - Force an abi break. Network mediation will only be            available in v8 abi complaint policy.Provide a basic mediation of sockets. This is not a full net mediationbut just whether a spcific family of socket can be used by anapplication, along with setting up some basic infrastructure fornetwork mediation to follow.the user space rule hav the basic form of  NETWORK RULE = [ QUALIFIERS ] &apos;network&apos; [ DOMAIN ]                 [ TYPE | PROTOCOL ]  DOMAIN = ( &apos;inet&apos; | &apos;ax25&apos; | &apos;ipx&apos; | &apos;appletalk&apos; | &apos;netrom&apos; |             &apos;bridge&apos; | &apos;atmpvc&apos; | &apos;x25&apos; | &apos;inet6&apos; | &apos;rose&apos; |	     &apos;netbeui&apos; | &apos;security&apos; | &apos;key&apos; | &apos;packet&apos; | &apos;ash&apos; |	     &apos;econet&apos; | &apos;atmsvc&apos; | &apos;sna&apos; | &apos;irda&apos; | &apos;pppox&apos; |	     &apos;wanpipe&apos; | &apos;bluetooth&apos; | &apos;netlink&apos; | &apos;unix&apos; | &apos;rds&apos; |	     &apos;llc&apos; | &apos;can&apos; | &apos;tipc&apos; | &apos;iucv&apos; | &apos;rxrpc&apos; | &apos;isdn&apos; |	     &apos;phonet&apos; | &apos;ieee802154&apos; | &apos;caif&apos; | &apos;alg&apos; | &apos;nfc&apos; |	     &apos;vsock&apos; | &apos;mpls&apos; | &apos;ib&apos; | &apos;kcm&apos; ) &apos;,&apos;  TYPE = ( &apos;stream&apos; | &apos;dgram&apos; | &apos;seqpacket&apos; |  &apos;rdm&apos; | &apos;raw&apos; |           &apos;packet&apos; )  PROTOCOL = ( &apos;tcp&apos; | &apos;udp&apos; | &apos;icmp&apos; )eg.  network,  network inet,Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Acked-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 19 Jul 2017 06:18:33 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>de62de59 - apparmor: move task related defines and fns to task.X files</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#de62de59</link>
        <description>apparmor: move task related defines and fns to task.X filesSigned-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Sun, 08 Oct 2017 07:43:02 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>b2441318 - License cleanup: add SPDX GPL-2.0 license identifier to files with no license</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#b2441318</link>
        <description>License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseMany source files in the tree are missing licensing information, whichmakes it harder for compliance tools to determine the correct license.By default all files without license information are under the defaultlicense of the kernel, which is GPL version 2.Update the files which contain no license information with the &apos;GPL-2.0&apos;SPDX license identifier.  The SPDX identifier is a legally bindingshorthand, which can be used instead of the full boiler plate text.This patch is based on work done by Thomas Gleixner and Kate Stewart andPhilippe Ombredanne.How this work was done:Patches were generated and checked against linux-4.14-rc6 for a subset ofthe use cases: - file had no licensing information it it. - file was a */uapi/* one with no licensing information in it, - file was a */uapi/* one with existing licensing information,Further patches will be generated in subsequent months to fix up caseswhere non-standard license headers were used, and references to licensehad to be inferred by heuristics based on keywords.The analysis to determine which SPDX License Identifier to be applied toa file was done in a spreadsheet of side by side results from of theoutput of two independent scanners (ScanCode &amp; Windriver) producing SPDXtag:value files created by Philippe Ombredanne.  Philippe prepared thebase worksheet, and did an initial spot review of a few 1000 files.The 4.13 kernel was the starting point of the analysis with 60,537 filesassessed.  Kate Stewart did a file by file comparison of the scannerresults in the spreadsheet to determine which SPDX license identifier(s)to be applied to the file. She confirmed any determination that was notimmediately clear with lawyers working with the Linux Foundation.Criteria used to select files for SPDX license identifier tagging was: - Files considered eligible had to be source code files. - Make and config files were included as candidates if they contained &gt;5   lines of source - File already had some variant of a license header in it (even if &lt;5   lines).All documentation files were explicitly excluded.The following heuristics were used to determine which SPDX licenseidentifiers to apply. - when both scanners couldn&apos;t find any license traces, file was   considered to have no license information in it, and the top level   COPYING file license applied.   For non */uapi/* files that summary was:   SPDX license identifier                            # files   ---------------------------------------------------|-------   GPL-2.0                                              11139   and resulted in the first patch in this series.   If that file was a */uapi/* path one, it was &quot;GPL-2.0 WITH   Linux-syscall-note&quot; otherwise it was &quot;GPL-2.0&quot;.  Results of that was:   SPDX license identifier                            # files   ---------------------------------------------------|-------   GPL-2.0 WITH Linux-syscall-note                        930   and resulted in the second patch in this series. - if a file had some form of licensing information in it, and was one   of the */uapi/* ones, it was denoted with the Linux-syscall-note if   any GPL family license was found in the file or had no licensing in   it (per prior point).  Results summary:   SPDX license identifier                            # files   ---------------------------------------------------|------   GPL-2.0 WITH Linux-syscall-note                       270   GPL-2.0+ WITH Linux-syscall-note                      169   ((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause)    21   ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause)    17   LGPL-2.1+ WITH Linux-syscall-note                      15   GPL-1.0+ WITH Linux-syscall-note                       14   ((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause)    5   LGPL-2.0+ WITH Linux-syscall-note                       4   LGPL-2.1 WITH Linux-syscall-note                        3   ((GPL-2.0 WITH Linux-syscall-note) OR MIT)              3   ((GPL-2.0 WITH Linux-syscall-note) AND MIT)             1   and that resulted in the third patch in this series. - when the two scanners agreed on the detected license(s), that became   the concluded license(s). - when there was disagreement between the two scanners (one detected a   license but the other didn&apos;t, or they both detected different   licenses) a manual inspection of the file occurred. - In most cases a manual inspection of the information in the file   resulted in a clear resolution of the license that should apply (and   which scanner probably needed to revisit its heuristics). - When it was not immediately clear, the license identifier was   confirmed with lawyers working with the Linux Foundation. - If there was any question as to the appropriate license identifier,   the file was flagged for further research and to be revisited later   in time.In total, over 70 hours of logged manual review was done on thespreadsheet to determine the SPDX license identifiers to apply to thesource files by Kate, Philippe, Thomas and, in some cases, confirmationby lawyers working with the Linux Foundation.Kate also obtained a third independent scan of the 4.13 code base fromFOSSology, and compared selected files where the other two scannersdisagreed against that SPDX file, to see if there was new insights.  TheWindriver scanner is based on an older version of FOSSology in part, sothey are related.Thomas did random spot checks in about 500 files from the spreadsheetsfor the uapi headers and agreed with SPDX license identifier in thefiles he inspected. For the non-uapi files Thomas did random spot checksin about 15000 files.In initial set of patches against 4.14-rc6, 3 files were found to havecopy/paste license identifier errors, and have been fixed to reflect thecorrect identifier.Additionally Philippe spent 10 hours this week doing a detailed manualinspection and review of the 12,461 patched files from the initial patchversion early this week with: - a full scancode scan run, collecting the matched texts, detected   license ids and scores - reviewing anything where there was a license detected (about 500+   files) to ensure that the applied SPDX license was correct - reviewing anything where there was no detection but the patch license   was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied   SPDX license was correctThis produced a worksheet with 20 files needing minor correction.  Thisworksheet was then exported into 3 different .csv files for thedifferent types of files to be modified.These .csv files were then reviewed by Greg.  Thomas wrote a script toparse the csv files and add the proper SPDX tag to the file, in theformat that the file expected.  This script was further refined by Gregbased on the output to detect more types of files automatically and todistinguish between header and source .c files (which need differentcomment types.)  Finally Greg ran the script using the .csv files togenerate the patches.Reviewed-by: Kate Stewart &lt;kstewart@linuxfoundation.org&gt;Reviewed-by: Philippe Ombredanne &lt;pombredanne@nexb.com&gt;Reviewed-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 01 Nov 2017 14:07:57 +0000</pubDate>
        <dc:creator>Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;</dc:creator>
    </item>
<item>
        <title>80c094a4 - Revert &quot;apparmor: add base infastructure for socket mediation&quot;</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#80c094a4</link>
        <description>Revert &quot;apparmor: add base infastructure for socket mediation&quot;This reverts commit 651e28c5537abb39076d3949fb7618536f1d242e.This caused a regression: &quot;The specific problem is that dnsmasq refuses to start on openSUSE Leap  42.2.  The specific cause is that and attempt to open a PF_LOCAL socket  gets EACCES.  This means that networking doesn&apos;t function on a system  with a 4.14-rc2 system.&quot;Sadly, the developers involved seemed to be in denial for several weeksabout this, delaying the revert.  This has not been a good release forthe security subsystem, and this area needs to change developmentpractices.Reported-and-bisected-by: James Bottomley &lt;James.Bottomley@hansenpartnership.com&gt;Tracked-by: Thorsten Leemhuis &lt;regressions@leemhuis.info&gt;Cc: John Johansen &lt;john.johansen@canonical.com&gt;Cc: Vlastimil Babka &lt;vbabka@suse.cz&gt;Cc: Seth Arnold &lt;seth.arnold@canonical.com&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Thu, 26 Oct 2017 17:35:35 +0000</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>651e28c5 - apparmor: add base infastructure for socket mediation</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#651e28c5</link>
        <description>apparmor: add base infastructure for socket mediationProvide a basic mediation of sockets. This is not a full net mediationbut just whether a spcific family of socket can be used by anapplication, along with setting up some basic infrastructure fornetwork mediation to follow.the user space rule hav the basic form of  NETWORK RULE = [ QUALIFIERS ] &apos;network&apos; [ DOMAIN ]                 [ TYPE | PROTOCOL ]  DOMAIN = ( &apos;inet&apos; | &apos;ax25&apos; | &apos;ipx&apos; | &apos;appletalk&apos; | &apos;netrom&apos; |             &apos;bridge&apos; | &apos;atmpvc&apos; | &apos;x25&apos; | &apos;inet6&apos; | &apos;rose&apos; |	     &apos;netbeui&apos; | &apos;security&apos; | &apos;key&apos; | &apos;packet&apos; | &apos;ash&apos; |	     &apos;econet&apos; | &apos;atmsvc&apos; | &apos;sna&apos; | &apos;irda&apos; | &apos;pppox&apos; |	     &apos;wanpipe&apos; | &apos;bluetooth&apos; | &apos;netlink&apos; | &apos;unix&apos; | &apos;rds&apos; |	     &apos;llc&apos; | &apos;can&apos; | &apos;tipc&apos; | &apos;iucv&apos; | &apos;rxrpc&apos; | &apos;isdn&apos; |	     &apos;phonet&apos; | &apos;ieee802154&apos; | &apos;caif&apos; | &apos;alg&apos; | &apos;nfc&apos; |	     &apos;vsock&apos; | &apos;mpls&apos; | &apos;ib&apos; | &apos;kcm&apos; ) &apos;,&apos;  TYPE = ( &apos;stream&apos; | &apos;dgram&apos; | &apos;seqpacket&apos; |  &apos;rdm&apos; | &apos;raw&apos; |           &apos;packet&apos; )  PROTOCOL = ( &apos;tcp&apos; | &apos;udp&apos; | &apos;icmp&apos; )eg.  network,  network inet,Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Acked-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 19 Jul 2017 06:18:33 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>2ea3ffb7 - apparmor: add mount mediation</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#2ea3ffb7</link>
        <description>apparmor: add mount mediationAdd basic mount mediation. That allows controlling based on basicmount parameters. It does not include special mount parameters forapparmor, super block labeling, or any triggers for apparmor namespaceparameter modifications on pivot root.default userspace policy rules have the form of  MOUNT RULE = ( MOUNT | REMOUNT | UMOUNT )  MOUNT = [ QUALIFIERS ] &apos;mount&apos; [ MOUNT CONDITIONS ] [ SOURCE FILEGLOB ]          [ &apos;-&gt;&apos; MOUNTPOINT FILEGLOB ]  REMOUNT = [ QUALIFIERS ] &apos;remount&apos; [ MOUNT CONDITIONS ]            MOUNTPOINT FILEGLOB  UMOUNT = [ QUALIFIERS ] &apos;umount&apos; [ MOUNT CONDITIONS ] MOUNTPOINT FILEGLOB  MOUNT CONDITIONS = [ ( &apos;fstype&apos; | &apos;vfstype&apos; ) ( &apos;=&apos; | &apos;in&apos; )                       MOUNT FSTYPE EXPRESSION ]		       [ &apos;options&apos; ( &apos;=&apos; | &apos;in&apos; ) MOUNT FLAGS EXPRESSION ]  MOUNT FSTYPE EXPRESSION = ( MOUNT FSTYPE LIST | MOUNT EXPRESSION )  MOUNT FSTYPE LIST = Comma separated list of valid filesystem and                      virtual filesystem types (eg ext4, debugfs, etc)  MOUNT FLAGS EXPRESSION = ( MOUNT FLAGS LIST | MOUNT EXPRESSION )  MOUNT FLAGS LIST = Comma separated list of MOUNT FLAGS.  MOUNT FLAGS = ( &apos;ro&apos; | &apos;rw&apos; | &apos;nosuid&apos; | &apos;suid&apos; | &apos;nodev&apos; | &apos;dev&apos; |                  &apos;noexec&apos; | &apos;exec&apos; | &apos;sync&apos; | &apos;async&apos; | &apos;remount&apos; |		  &apos;mand&apos; | &apos;nomand&apos; | &apos;dirsync&apos; | &apos;noatime&apos; | &apos;atime&apos; |		  &apos;nodiratime&apos; | &apos;diratime&apos; | &apos;bind&apos; | &apos;rbind&apos; | &apos;move&apos; |		  &apos;verbose&apos; | &apos;silent&apos; | &apos;loud&apos; | &apos;acl&apos; | &apos;noacl&apos; |		  &apos;unbindable&apos; | &apos;runbindable&apos; | &apos;private&apos; | &apos;rprivate&apos; |		  &apos;slave&apos; | &apos;rslave&apos; | &apos;shared&apos; | &apos;rshared&apos; |		  &apos;relatime&apos; | &apos;norelatime&apos; | &apos;iversion&apos; | &apos;noiversion&apos; |		  &apos;strictatime&apos; | &apos;nouser&apos; | &apos;user&apos; )  MOUNT EXPRESSION = ( ALPHANUMERIC | AARE ) ...  PIVOT ROOT RULE = [ QUALIFIERS ] pivot_root [ oldroot=OLD PUT FILEGLOB ]                    [ NEW ROOT FILEGLOB ]  SOURCE FILEGLOB = FILEGLOB  MOUNTPOINT FILEGLOB = FILEGLOBeg.  mount,  mount /dev/foo,  mount options=ro /dev/foo -&gt; /mnt/,  mount options in (ro,atime) /dev/foo -&gt; /mnt/,  mount options=ro options=atime,Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Acked-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 19 Jul 2017 06:04:47 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>637f688d - apparmor: switch from profiles to using labels on contexts</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#637f688d</link>
        <description>apparmor: switch from profiles to using labels on contextsBegin the actual switch to using domain labels by storing them onthe context and converting the label to a singular profile wherepossible.Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Fri, 09 Jun 2017 15:14:28 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>c97204ba - apparmor: rename apparmor file fns and data to indicate use</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#c97204ba</link>
        <description>apparmor: rename apparmor file fns and data to indicate useprefixes are used for fns/data that are not static to apparmorfs.cwith the prefixes being  aafs   - special magic apparmorfs for policy namespace data  aa_sfs - for fns/data that go into securityfs  aa_fs  - for fns/data that may be used in the either of aafs or           securityfsSigned-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Reviewed-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Thu, 25 May 2017 13:23:42 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>651e5495 - security/apparmor: Use POSIX-compatible &quot;printf &apos;%s&apos;&quot;</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#651e5495</link>
        <description>security/apparmor: Use POSIX-compatible &quot;printf &apos;%s&apos;&quot;When using a strictly POSIX-compliant shell, &quot;-n #define ...&quot; getswritten into the file.  Use &quot;printf &apos;%s&apos;&quot; to avoid this.Signed-off-by: Thomas Schneider &lt;qsx@qsx.re&gt;Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Fri, 14 Oct 2016 19:29:49 +0000</pubDate>
        <dc:creator>Thomas Schneider &lt;qsx@qsx.re&gt;</dc:creator>
    </item>
<item>
        <title>121d4a91 - apparmor: rename sid to secid</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#121d4a91</link>
        <description>apparmor: rename sid to secidMove to common terminology with other LSMs and kernel infrastuctureSigned-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Mon, 16 Jan 2017 08:42:17 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>cff281f6 - apparmor: split apparmor policy namespaces code into its own file</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#cff281f6</link>
        <description>apparmor: split apparmor policy namespaces code into its own filePolicy namespaces will be diverging from profile management andexpanding so put it in its own file.Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Mon, 16 Jan 2017 08:42:15 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>f8eb8a13 - apparmor: add the ability to report a sha1 hash of loaded policy</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#f8eb8a13</link>
        <description>apparmor: add the ability to report a sha1 hash of loaded policyProvide userspace the ability to introspect a sha1 hash value for eachprofile currently loaded.Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Acked-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 14 Aug 2013 18:27:36 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>84f1f787 - apparmor: export set of capabilities supported by the apparmor module</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#84f1f787</link>
        <description>apparmor: export set of capabilities supported by the apparmor moduleSigned-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Acked-by: Seth Arnold &lt;seth.arnold@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 14 Aug 2013 18:27:32 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>43c422ed - apparmor: fix apparmor OOPS in audit_log_untrustedstring+0x1c/0x40</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#43c422ed</link>
        <description>apparmor: fix apparmor OOPS in audit_log_untrustedstring+0x1c/0x40The capability defines have moved causing the auto generated namesof capabilities that apparmor uses in logging to be incorrect.Fix the autogenerated table source to uapi/linux/capability.hReported-by: YanHong &lt;clouds.yan@gmail.com&gt;Reported-by: Krzysztof Kolasa &lt;kkolasa@winsoft.pl&gt;Analyzed-by: Al Viro &lt;viro@ZenIV.linux.org.uk&gt;Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;Acked-by: David Howells &lt;dhowells@redhat.com&gt;Acked-by: James Morris &lt;james.l.morris@oracle.com&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 17 Oct 2012 20:29:33 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>8a1ab315 - UAPI: (Scripted) Disintegrate include/asm-generic</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#8a1ab315</link>
        <description>UAPI: (Scripted) Disintegrate include/asm-genericSigned-off-by: David Howells &lt;dhowells@redhat.com&gt;Acked-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Acked-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Acked-by: Michael Kerrisk &lt;mtk.manpages@gmail.com&gt;Acked-by: Paul E. McKenney &lt;paulmck@linux.vnet.ibm.com&gt;Acked-by: Dave Jones &lt;davej@redhat.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Thu, 04 Oct 2012 17:20:15 +0000</pubDate>
        <dc:creator>David Howells &lt;dhowells@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>7e570145 - AppArmor: Fix location of const qualifier on generated string tables</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#7e570145</link>
        <description>AppArmor: Fix location of const qualifier on generated string tablesSigned-off-by: Tetsuo Handa &lt;penguin-kernel@i-love.sakura.ne.jp&gt;Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Thu, 15 Mar 2012 06:41:17 +0000</pubDate>
        <dc:creator>Tetsuo Handa &lt;penguin-kernel@i-love.sakura.ne.jp&gt;</dc:creator>
    </item>
<item>
        <title>33e521ac - AppArmor: Add const qualifiers to generated string tables</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#33e521ac</link>
        <description>AppArmor: Add const qualifiers to generated string tablesSigned-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Wed, 14 Mar 2012 12:53:40 +0000</pubDate>
        <dc:creator>John Johansen &lt;john.johansen@canonical.com&gt;</dc:creator>
    </item>
<item>
        <title>d384b0a1 - AppArmor: export known rlimit names/value mappings in securityfs</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/apparmor/Makefile#d384b0a1</link>
        <description>AppArmor: export known rlimit names/value mappings in securityfsSince the parser needs to know which rlimits are known to the kernel,export the list via a mask file in the &quot;rlimit&quot; subdirectory in thesecurityfs &quot;features&quot; directory.Signed-off-by: Kees Cook &lt;kees@ubuntu.com&gt;Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;

            List of files:
            /linux-6.15/security/apparmor/Makefile</description>
        <pubDate>Fri, 27 Jan 2012 00:29:23 +0000</pubDate>
        <dc:creator>Kees Cook &lt;kees@ubuntu.com&gt;</dc:creator>
    </item>
</channel>
</rss>
