On Thu, 2 Jun 2016, Tyler Hicks wrote:
> On 05/17/2016 09:13 AM, Tyler Hicks wrote:
> > On 05/08/2016 10:56 PM, David Miller wrote:
> >> From: Tyler Hicks
> >> Date: Fri, 6 May 2016 18:04:12 -0500
> >>
> >>> This pair of patches does away with what I believe is a useless
On Thu, 2 Jun 2016, Tyler Hicks wrote:
> On 05/17/2016 09:13 AM, Tyler Hicks wrote:
> > On 05/08/2016 10:56 PM, David Miller wrote:
> >> From: Tyler Hicks
> >> Date: Fri, 6 May 2016 18:04:12 -0500
> >>
> >>> This pair of patches does away with what I believe is a useless denial
> >>> audit
On 05/17/2016 09:13 AM, Tyler Hicks wrote:
> On 05/08/2016 10:56 PM, David Miller wrote:
>> From: Tyler Hicks
>> Date: Fri, 6 May 2016 18:04:12 -0500
>>
>>> This pair of patches does away with what I believe is a useless denial
>>> audit message when a privileged process
On 05/17/2016 09:13 AM, Tyler Hicks wrote:
> On 05/08/2016 10:56 PM, David Miller wrote:
>> From: Tyler Hicks
>> Date: Fri, 6 May 2016 18:04:12 -0500
>>
>>> This pair of patches does away with what I believe is a useless denial
>>> audit message when a privileged process initially accesses a net
On 05/08/2016 10:56 PM, David Miller wrote:
> From: Tyler Hicks
> Date: Fri, 6 May 2016 18:04:12 -0500
>
>> This pair of patches does away with what I believe is a useless denial
>> audit message when a privileged process initially accesses a net sysctl.
>
> The LSM
On 05/08/2016 10:56 PM, David Miller wrote:
> From: Tyler Hicks
> Date: Fri, 6 May 2016 18:04:12 -0500
>
>> This pair of patches does away with what I believe is a useless denial
>> audit message when a privileged process initially accesses a net sysctl.
>
> The LSM folks can apply this if
From: Tyler Hicks
Date: Fri, 6 May 2016 18:04:12 -0500
> This pair of patches does away with what I believe is a useless denial
> audit message when a privileged process initially accesses a net sysctl.
The LSM folks can apply this if they agree with you.
From: Tyler Hicks
Date: Fri, 6 May 2016 18:04:12 -0500
> This pair of patches does away with what I believe is a useless denial
> audit message when a privileged process initially accesses a net sysctl.
The LSM folks can apply this if they agree with you.
This pair of patches does away with what I believe is a useless denial
audit message when a privileged process initially accesses a net sysctl.
The bug was first discovered when running Go applications under AppArmor
confinement. It can be triggered like so:
$ echo "profile test { file, }" |
This pair of patches does away with what I believe is a useless denial
audit message when a privileged process initially accesses a net sysctl.
The bug was first discovered when running Go applications under AppArmor
confinement. It can be triggered like so:
$ echo "profile test { file, }" |
10 matches
Mail list logo