[apparmor] 4.7 upstream kernel patches

John Johansen john.johansen at canonical.com
Fri Jul 29 02:45:22 UTC 2016


I have pushed updated 4.7 upstream kernel patches to

git://git.kernel.org/pub/scm/linux/kernel/git/jj/linux-apparmor v4.7-aa2.8-out-of-tree
I will attach the full request-pull text below

the patches have also been pushed to the bzr tree
bzr lp:apparmor kernel-patches/4.7/

the patches
0001-0022 are backports of fixes from the 4.8 pull-request
0023-0025 are the out of tree feature patches

the backport of bug fix patches are of course not required, in the sense that you can just apply 0023-0025 to get the out of tree feature patches however then you won't have several important bug fixes.

backported/update patches for 4.4-4.6 will follow later tonight in branches
v4.4-aa2.8-out-of-tree
v4.5-aa2.8-out-of-tree
v4.6-aa2.8-out-of-tree

As noted above all the fixes have been upstream and will show up in the 4.8 version of the kernel, once that happens I can go back and annotate the set with proper backport sha1s


And now to the pull request text with the start and end shas of the series

---

The following changes since commit 523d939ef98fd712632d93a5a2b588e477a7565e:

  Linux 4.7 (2016-07-24 12:23:50 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/jj/linux-apparmor v4.7-aa2.8-out-of-tree

for you to fetch changes up to f7cef61751a2382fb4ea26c18736d7552ffdb24a:

  UBUNTU: SAUCE: apparmor: Add the ability to mediate mount (2016-07-28 17:54:20 -0700)

----------------------------------------------------------------
Geliang Tang (1):
      apparmor: use list_next_entry instead of list_entry_next

Heinrich Schuchardt (1):
      apparmor: do not expose kernel stack

Jeff Mahoney (1):
      apparmor: allow SYS_CAP_RESOURCE to be sufficient to prlimit another task

John Johansen (22):
      apparmor: fix refcount bug in profile replacement
      apparmor: fix replacement bug that adds new child to old parent
      apparmor: fix uninitialized lsm_audit member
      apparmor: exec should not be returning ENOENT when it denies
      apparmor: fix update the mtime of the profile file on replacement
      apparmor: fix disconnected bind mnts reconnection
      apparmor: internal paths should be treated as disconnected
      apparmor: fix put() parent ref after updating the active ref
      apparmor: fix log failures for all profiles in a set
      apparmor: fix audit full profile hname on successful load
      apparmor: ensure the target profile name is always audited
      apparmor: check that xindex is in trans_table bounds
      apparmor: fix ref count leak when profile sha1 hash is read
      apparmor: fix refcount race when finding a child profile
      apparmor: add missing id bounds check on dfa verification
      apparmor: don't check for vmalloc_addr if kvzalloc() failed
      apparmor: fix oops in profile_unpack() when policy_db is not present
      apparmor: fix module parameters can be changed after policy is locked
      apparmor: fix arg_size computation for when setprocattr is null terminated
      UBUNTU: SAUCE: AppArmor: basic networking rules
      apparmor: Fix quieting of audit messages for network mediation
      UBUNTU: SAUCE: apparmor: Add the ability to mediate mount

 security/apparmor/.gitignore         |   1 +
 security/apparmor/Makefile           |  42 ++-
 security/apparmor/apparmorfs.c       |  27 +-
 security/apparmor/audit.c            |   7 +-
 security/apparmor/domain.c           |  24 +-
 security/apparmor/file.c             |   3 +-
 security/apparmor/include/apparmor.h |   3 +-
 security/apparmor/include/audit.h    |  15 +
 security/apparmor/include/domain.h   |   2 +
 security/apparmor/include/match.h    |   1 +
 security/apparmor/include/mount.h    |  54 +++
 security/apparmor/include/net.h      |  44 +++
 security/apparmor/include/policy.h   |   5 +
 security/apparmor/lsm.c              | 196 ++++++++++-
 security/apparmor/match.c            |  16 +-
 security/apparmor/mount.c            | 620 +++++++++++++++++++++++++++++++++++
 security/apparmor/net.c              | 162 +++++++++
 security/apparmor/path.c             |  61 ++--
 security/apparmor/policy.c           |  62 +++-
 security/apparmor/policy_unpack.c    |  51 ++-
 security/apparmor/resource.c         |   6 +-
 21 files changed, 1314 insertions(+), 88 deletions(-)
 create mode 100644 security/apparmor/include/mount.h
 create mode 100644 security/apparmor/include/net.h
 create mode 100644 security/apparmor/mount.c
 create mode 100644 security/apparmor/net.c



More information about the AppArmor mailing list