Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp5836630imw; Wed, 20 Jul 2022 13:38:04 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tRqrwNmLvwn8zlCMRwYogx5LkxfYFQGKglOT7coM5+KSQYf1c+XYitw7jYUzJfWMUQ+O3I X-Received: by 2002:a05:6402:2425:b0:43b:20a8:ae8b with SMTP id t37-20020a056402242500b0043b20a8ae8bmr45824240eda.234.1658349483960; Wed, 20 Jul 2022 13:38:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658349483; cv=none; d=google.com; s=arc-20160816; b=Tt7hIe2kUFEM/ROu0yKivDBdxQPDEcf0drZwu8H+DGfu+nim3i+1OKdZ+g2q3ld+Hc XLH+ORrvj09lajCdUbeDApBaKxM6PZNxQtVHsJIhzgYeFei5ONV7rUGzNL2HdUJzBVxt WcMboHQm4KcGAYH/khNKKGPQYRjkt2TnwfSlB/kSKNDM0ET/8buByy2KMCpTylIIRPDE u4DSCPFbVPxWLPyIR6lulUXV38WyQbQR3zW612AgzsciYfzmwJVj/jyWCZqJLJhyShNZ YNuhdvc7icNXg4o83xJP/pzH8Xt1wK51GDq6yfvzEXPhf/RX0FOZkAeMGaoxzYBI/PoC ATUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:from:references:cc:to:content-language:subject :user-agent:mime-version:date:message-id:dkim-signature; bh=2Y97BB6vjKwhsIP/n0mmC5lKGsgfc1sWpUPesvKpSUs=; b=EyUmPMGVEYNwcXR3zeeKyPF6Mwxl/E6o71BptGk02X+LbxzfPHl2ku2Ja2sCN5kyFo 6MJudno7lpycc22OOnJTJbvCpxXeg/xpyFT0G/gm6l/EIKnbyD+OuI7z55XEMNMztd8H KT/zE9wpOiZRxaL8hvXCxmtUkG0XkccUVDDRFprUjmQkW0NqibdSyHDtb7NMYNJ4zQZF WYEGHN8RP5ZLGkICHlw3tcLLJ7oGzBrmAzcHFXvbahAViK8JZh7k33v5dQRZUMGyBUNP OvZt/M55z1gxIj9dq2e6CTJxgUd/V9ZYxcip7TD4YtIUGaQFkcefz8rdfyrmav9hxgAh Iv4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=BkHvcOoT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oz30-20020a1709077d9e00b006f38560fe61si240120ejc.94.2022.07.20.13.37.37; Wed, 20 Jul 2022 13:38:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=BkHvcOoT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229819AbiGTUYm (ORCPT + 99 others); Wed, 20 Jul 2022 16:24:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229452AbiGTUYl (ORCPT ); Wed, 20 Jul 2022 16:24:41 -0400 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0504B4A820; Wed, 20 Jul 2022 13:24:39 -0700 (PDT) Received: from [192.168.192.83] (unknown [50.126.114.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id B9FFD3F3C0; Wed, 20 Jul 2022 20:24:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1658348678; bh=2Y97BB6vjKwhsIP/n0mmC5lKGsgfc1sWpUPesvKpSUs=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=BkHvcOoTUxNqlPN6hRu6IhlmX/H22u5RTBiCWqXmvS4tR+w1w2JCEOrMCciawX516 keEJTKastKE5xCQIbR3C5sUSt6YZClBVAnWLskC/fRFmrnzahoeel6ErhhLVSqDZoD Priuv9JFPA/JzOUcKAnKH3yyM26SGZOfpy86FvShyprVvMUcmoOgefroPRRBDC6L7p 74CPbbeuY8WMU0q9bJW7gfehEHcoV+SoCihf6eTOcSgSAjUgRzGDivzkQf145GY91D A/Flm1SMM2Jqn9MUWY2IachSuWNPlFNIKSYzClXaKHZRvxts4bKCvGRA6O2NnubjC0 jK3vvPsSzsLWA== Message-ID: <847ef193-71a7-9714-be20-2cbb654e9c09@canonical.com> Date: Wed, 20 Jul 2022 13:24:34 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH] apparmor: correct config reference to intended one Content-Language: en-US To: Lukas Bulwahn , Paul Moore , James Morris , "Serge E . Hallyn" , apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220720120443.16518-1-lukas.bulwahn@gmail.com> From: John Johansen Organization: Canonical In-Reply-To: <20220720120443.16518-1-lukas.bulwahn@gmail.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/20/22 05:04, Lukas Bulwahn wrote: > Commit 5bfcbd22ee4e ("apparmor: Enable tuning of policy paranoid load for > embedded systems") introduces the config SECURITY_APPARMOR_PARANOID_LOAD, > but then refers in the code to SECURITY_PARANOID_LOAD; note the missing > APPARMOR in the middle. > > Correct this to the introduced and intended config option. > > Signed-off-by: Lukas Bulwahn thanks, I have pulled this into apparmor-next Acked-by: John Johansen > --- > security/apparmor/lsm.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c > index 090a20805664..e29cade7b662 100644 > --- a/security/apparmor/lsm.c > +++ b/security/apparmor/lsm.c > @@ -1402,7 +1402,7 @@ module_param_named(path_max, aa_g_path_max, aauint, S_IRUSR); > * DEPRECATED: read only as strict checking of load is always done now > * that none root users (user namespaces) can load policy. > */ > -bool aa_g_paranoid_load = IS_ENABLED(CONFIG_SECURITY_PARANOID_LOAD); > +bool aa_g_paranoid_load = IS_ENABLED(CONFIG_SECURITY_APPARMOR_PARANOID_LOAD); > module_param_named(paranoid_load, aa_g_paranoid_load, aabool, S_IRUGO); > > static int param_get_aaintbool(char *buffer, const struct kernel_param *kp);