1661887 |
AMDGPU support for CIK parts in kernel config? |
1661030 |
regession tests failing after stackprofile test is run |
1648903 |
Permission denied and inconsistent behavior in complain mode with 'ip netns list' command |
1658219 |
flock not mediated by 'k' |
1656121 |
unexpected errno=13 and disconnected path when trying to open /proc/1/ns/mnt from a unshared mount namespace |
1660849 |
apparmor refcount leak of profile namespace when removing profiles |
1648143 |
tor in lxd: apparmor=\ |
1645037 |
apparmor_parser hangs indefinitely when called by multiple threads |
1660846 |
apparmor leaking securityfs pin count |
1660845 |
apparmor reference count leak when securityfs_setup_d_inode\\ () fails |
1660842 |
apparmor not checking error if security_pin_fs() fails |
1660840 |
apparmor oops in bind_mnt when dev_path lookup fails |
1660836 |
apparmor auditing denied access of special apparmor .null fi\\ le |
1660834 |
apparmor label leak when new label is unused |
1660833 |
apparmor reference count bug in label_merge_insert() |
1638996 |
apparmor's raw_data file in securityfs is sometimes truncated |
1660832 |
unix domain socket cross permission check failing with nested namespaces |
1630069 |
Regression tests can not detect binfmt_elf mmpa semantic change |
1611078 |
Support snaps inside of lxd containers |
1615893 |
change_hat is logging failures during expected hat probing |
1615892 |
deleted files outside of the namespace are not being treated as disconnected |
1615890 |
stacking to unconfined in a child namespace confuses mediation |
1615895 |
apparmor module parameters can be changed after the policy is locked |
1579135 |
AppArmor profile reloading causes an intermittent kernel BUG |
1615889 |
label vec reductions can result in reference labels instead of direct access to labels |
1615887 |
profiles from different namespaces can block other namespaces from being able to load a profile |
1615881 |
The label build for onexec when stacking is wrong |
1615880 |
The inherit check for new to old label comparison for domain transitions is wrong |
1593874 |
warning stack trace while playing with apparmor namespaces |
1615878 |
__label_update proxy comparison test is wrong |
1560583 |
reading /sys/kernel/security/apparmor/profiles requires CAP_MAC_ADMIN |
1379535 |
policy namespace stacking |
1593293 |
brd module compiled as built-in |