Hi,
Ho do I differentiate system call from library call?
for example if I am using chmod , how do I find out if it is a system call or library call?
Thanks
Muru (2 Replies)
hi,
where can I find the detail information about the syscall in binary instructions of linux/mips.
for example, in linux/mips:
li v0, 4140
syscall
it's a syacall of "lseek" , but how can I find that which registers will be used in this syscall , and the meaning of the arguments in the... (2 Replies)
Hi
I'm studing the system call. I've written a small program that return the time spent in doing some operations. Now I'd like to write one that return the time spent in user mode of a process.
I'm reading that i should use the tms struct:
clock_t times(struct tms *buf);
struct tms {... (2 Replies)
I have a cgi script which is called after certain time interval, which has this:
system ("ls -l /tmp/cgic* | grep -v \"cgicsave.env\" | awk '{print $5}'");
During the execution of this script,the output is 0 sometimes. But due to this the system call is not working at all and doesnt o/p... (2 Replies)
hi everyone
i wrote a system call and compiled the kernel succesfully...
my system call is in a file in the kernel folder named my_syscall1.c (kernel/my_syscall1.c)
the header file for this system call i added it in the folder include like this include/my_syscall1/my_syscall1.h
my problem is... (2 Replies)
Trying to figure out a load issue with a webserver. I have traced a php script and noticed the following
connect(4, {sa_family=AF_INET, sin_port=htons(3306), sin_addr=inet_addr("XX.XX.XX.XX")}, 16) = -1 EINPROGRESS (Operation now in progress) <0.000035>
poll(, 1, 2000) = 1 () <0.000120>... (5 Replies)
We are calling the bind system call as below
bind(sfd, (struct sockaddr *) &addr, sizeof(struct sockaddr_un));Why there is difference in third parameter getting the sizeof as "struct sockaddr_un", wherein the 2nd parametere we are passing it as "(struct sockaddr *)"?
Regards,
Sajjan (2 Replies)
Discussion started by: VSSajjan
2 Replies
LEARN ABOUT DEBIAN
logprof.conf
LOGPROF.CONF(5) AppArmor LOGPROF.CONF(5)NAME
logprof.conf - configuration file for expert options that modify the behavior of the AppArmor aa-logprof(1) program.
DESCRIPTION
The aa-logprof(1) program can be configured to have certain default behavior by the contents of logprof.conf.
The [qualifiers] section lists specific programs that should have a subset of the full ix/px/ux list when asking what mode to execute it
using.
Since creating a separate profile for /bin/bash is dangerous, we can specify that for /bin/bash, only (I)nherit, (U)nconstrained, and
(D)eny should be allowed options and only those will show up in the prompt when we're asking about adding that to a profile.
Likewise, if someone currently exec's /bin/mount in ix or px mode, things won't work, so we can provide only (U)nconstrained and (D)eny as
options.
And certain apps like grep, awk, sed, cp, and mkdir should always inherit the parent profile rather than having their own profile or
running unconfined, so for them we can specify that only (I)nherit and (D)eny are the allowed options.
Any programs that are not listed in the qualifiers section get the full (I)nherit / (P)rofile / (U)nconstrained / (D)eny option set.
If the user is doing something tricky and wants different behavior, they can tweak or remove the corresponding line in the conf file.
The [defaulthat] section lists changehat-aware programs and what hat aa-logprof(1) will collapse the entries to for that program if the
user specifies that the access should be allowed, but should not have it's own hat.
The [globs] section allows modification of the logprof rule engine with respect to globbing suggestions that the user will be prompted
with.
The format of each line is-- "<perl glob> = <apparmor glob>".
When aa-logprof(1) asks about a specific path, if the perl glob matches the path, it replaces the part of the path that matched with the
corresponding apparmor glob and adds it to the list of globbing suggestions.
Lines starting with # are comments and are ignored.
EXAMPLE
[qualifiers]
# things will very likely be painfully broken if bash has it's own profile
/bin/bash = iu
# mount doesn't work if it's confined
/bin/mount = u
# these helper utilities should inherit the parent profile and
# shouldn't have their own profiles
/bin/awk = i
/bin/grep = i
/bin/sed = i
[defaulthat]
/usr/sbin/sshd = EXEC
/usr/sbin/httpd2 = DEFAULT_URI
/usr/sbin/httpd2-prefork = DEFAULT_URI
[globs]
# /foo/bar/lib/libbaz.so -> /foo/bar/lib/lib*
/lib/lib[^/]+so[^/]*$ = /lib/lib*so*
# strip kernel version numbers from kernel module accesses
^/lib/modules/[^/]+/ = /lib/modules/*/
# strip pid numbers from /proc accesses
^/proc/d+/ = /proc/*/
BUGS
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO apparmor(7), apparmor.d(5), aa-enforce(1), aa-complain(1), aa-disable(1), aa_change_hat(2), aa-logprof(1), aa-genprof(1), and
<http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 LOGPROF.CONF(5)