From: "Dr. David Alan Gilbert"
aa_label_audit, aa_label_find, aa_label_seq_print and aa_update_label_name
were added by commit
f1bd904175e8 ("apparmor: add the base fns() for domain labels")
but never used.
aa_profile_label_perm was added by commit
637f688dc3dc ("apparmor: switch from profiles t
Good day,
I run AppArmor version 2.10.2 on a kernel 4.4 system.
I creates a profile for gpg and that profile requested now the
capability dac_override.
This raises some questions to me. First, does dac_override honor the
folder permission rules within the profile? For example, if there is a
rule
>> This raises some questions to me. First, does dac_override honor the
>> folder permission rules within the profile? For example, if there is a
>> rule "/foo/** r," does dac_override this rule?
>> (...)
> So gpg was run as root and tried to read, write, or execute, a file
> (or write to a direc
From: Luis Chamberlain On Behalf Of Luis Chamberlain
Sent: Thursday, March 2, 2023 12:46 PM
>
> register_sysctl_table() is a deprecated compatibility wrapper.
> register_sysctl() can do the directory creation for you so just use
> that.
>
> Signed-off-by: Luis Chamberlain
> ---
> drivers/hv/vm
Hello:
This pull request was applied to riscv/linux.git (fixes)
by Linus Torvalds :
On Wed, 24 Jul 2024 23:00:14 +0200 you wrote:
> Linus
>
> Constifying ctl_table structs will prevent the modification of
> proc_handler function pointers as they would reside in .rodata. To get
> there, the proc_
Hello:
This pull request was applied to riscv/linux.git (for-next)
by Linus Torvalds :
On Wed, 24 Jul 2024 23:00:14 +0200 you wrote:
> Linus
>
> Constifying ctl_table structs will prevent the modification of
> proc_handler function pointers as they would reside in .rodata. To get
> there, the pr