[APPLIED] [Maverick][GIT PULL] replacement of hacks with Yama

Leann Ogasawara leann.ogasawara at canonical.com
Thu Jul 1 21:38:16 UTC 2010


Applied to maverick linux master.  I took the liberty to tweak the
commit messages per the discussions in the thread.

Thanks,
Leann

On Tue, 2010-06-29 at 14:12 -0700, Kees Cook wrote: 
> This replaces the individual symlink/hardlink/ptrace patches with the Yama
> LSM that is being upstreamed currently.  It includes a SAUCE patch to glue
> it into place on Ubuntu, since there is no upstream way yet to sensibly
> chain arbitrary LSMs.  The PTRACE exception tracking patch is the
> kernel-side of the fix for LP: #589841, but since it is intended for
> upstream, I did not include the bug tags in the patch directly.
> 
> The following changes since commit 0719a918ccdaabb2188e94c94c4edceba5b56f03:
> 
>   UBUNTU: Ubuntu-2.6.35-6.9 (2010-06-28 12:41:55 -0700)
> 
> are available in the git repository at:
>   git://kernel.ubuntu.com/kees/linux-2.6.git maverick-yama
> 
> Kees Cook (8):
>       Revert "ptrace: limit scope to attach only (allow read)"
>       Revert "UBUNTU: SAUCE: ptrace: restrict ptrace scope to children"
>       Revert "UBUNTU: SAUCE: fs: block hardlinks to non-accessible sources"
>       Revert "UBUNTU: SAUCE: fs: block cross-uid sticky symlinks"
>       security: Yama LSM
>       security: create task_free security callback
>       Yama: add PTRACE exception tracking and interface
>       SAUCE: security: unconditionally chain to Yama LSM
> 
>  Documentation/Yama.txt   |   91 +++++++++++
>  include/linux/prctl.h    |    6 +
>  include/linux/security.h |   13 +-
>  kernel/fork.c            |    1 +
>  kernel/ptrace.c          |   25 ---
>  kernel/sysctl.c          |   28 ----
>  security/Kconfig         |    6 +
>  security/Makefile        |    2 +
>  security/apparmor/lsm.c  |    3 -
>  security/capability.c    |   16 ++
>  security/commoncap.c     |   68 --------
>  security/security.c      |   44 +++++
>  security/yama/Kconfig    |   13 ++
>  security/yama/Makefile   |    3 +
>  security/yama/yama_lsm.c |  404 ++++++++++++++++++++++++++++++++++++++++++++++
>  15 files changed, 594 insertions(+), 129 deletions(-)
>  create mode 100644 Documentation/Yama.txt
>  create mode 100644 security/yama/Kconfig
>  create mode 100644 security/yama/Makefile
>  create mode 100644 security/yama/yama_lsm.c
> 
> -- 
> Kees Cook
> Ubuntu Security Team
> 







More information about the kernel-team mailing list