mirror of
https://gitlab.com/apparmor/apparmor
synced 2025-08-30 22:05:27 +00:00
This patch changes the aa_policy_cache_new() prototype and gets rid of aa_policy_cache_is_valid() and aa_policy_cache_create(). The create bool of aa_policy_cache_new() is replaced with a 16 bit unsigned int used to specify the maximum number of caches that should be present in the specified cache directory. If the number is exceeded, the old cache directories are reaped. The definition of "old" is private to libapparmor and only 1 cache directory is currently supported. However, that will change in the near future and multiple cache directories will be supported. If 0 is specified for the max_caches parameter, no new caches can be created and only an existing, valid cache can be used. An error is returned if no valid caches exist in that case. If UINT16_MAX is specified, an unlimited amount of caches can be created and reaping is disabled. This means that 0 to (2^16)-2, or infinite, caches will be supported in the future. This change allows for the parser to continue to support the --skip-bad-cache (by passing 0 for max_caches) and the --write-cache option (by passing 1 or more for max_caches) without confusing libapparmor users with the aa_policy_cache_{is_valid,create}() functions. Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Acked-by: John Johansen <john.johansen@canonical.com>
The apparmor_parser allows you to add, replace, and remove AppArmor policy through the use of command line options. The default is to add. `apparmor_parser --help` shows what the command line options are. You can also find more information at http://wiki.apparmor.net Please send all complaints, feature requests, rants about the software, and questions to the apparmor@lists.ubuntu.com mailing list. Bug reports can be filed against the AppArmor project on launchpad.net at https://launchpad.net/apparmor or reported to the mailing list directly for those who wish not to register for an account on launchpad. Security issues can be filed as security bugs on launchpad or directed to security@ubuntu.com. We will attempt to conform to the RFP vulnerability disclosure protocol: http://www.wiretrip.net/rfp/policy.html Thanks. -- The AppArmor development team