[APPLIED] [Maverick][pull-request] Updated AppArmor patchset

Leann Ogasawara leann.ogasawara at canonical.com
Thu Jun 24 22:56:46 UTC 2010


Applied to Maverick linux master.

Thanks,
Leann

On Thu, 2010-06-24 at 09:00 -0700, John Johansen wrote: 
> This is a sync of the latest AppArmor patches
> 
> It is done as a rebase dropping the previous AppArmor commits
> fbc0f9759ae773b4cd41f61e0a8adc52bda13b3b
> acfe28126c3e9bd37c64d8a24a4df1d22cf5d2fc
> 9f4d674ba0de3b40663ea4b7a8c307ba6e05abee
> 652d3f2581fe3e94d2f5a141fabccc9cb53a8fdf
> 83b9af9a21b2adf148fada269293ac1e34ac2b2b
> 8b06cd508e740f91d7ab13d67582de0fc98a9ee5
> 2387cdb71c4a95d455947e7c33c725ad3fa749e8
> 1e293be54573280bb94e136729532e5c191a73ea
> 08ae33b80da0e340561783d7b22b43506936c282
> bf4fc980354548a1f5dd35c7babb3cb85b2e8d94
> a4ca3b9b8fed2929bd7b9334a5a1376234269f50
> eb8204ea8161e609606de51eae547cda68b3b961
> fd85e16a3de49437c148ab5306918258513796c7
> 6a00d866cb55db6829d6df666675277a5160b7fb
> 4230f0df8599961a3f191f98dd723b24664189e4
> c73867ddd2d5d1be3df6647fa16f42115b25f879
> 45eca64635739462f6330aa66139716aec8db6bb
> d57880f2aa303c48fa874eb7aab9214b17cf0b71
> 34a3b76f4a632b64754f9501e12ce227aab1ee70
> c34dad64bcda7df64923e3e152e1120bb67cde88
> 8295fbc5ded3fcc460652c3243f72504a1f492a0
> 
> and modifying
> commit 069cb89e17c6dc5b2a1de2469746bc42935850fb
> Author: Kees Cook <kees at ubuntu.com>
> Date:   Wed May 12 09:03:08 2010 -0700
> 
>     UBUNTU: SAUCE: fs: block hardlinks to non-accessible sources
> 
> to split the AppArmor portion into a new patch on top of the
> updated AppArmor patchset
> 
> The following changes since commit 42badb6629b859c9b2e081f44eb53a4905341015:
>   Mathieu J. Poirier (1):
>         UBUNTU: [Config] ARM: Turning off CONFIG_CPU_IDLE on omap
> 
> are available in the git repository at:
> 
>   git://kernel.ubuntu.com/jj/ubuntu-maverick.git AA
> 
> John Johansen (3):
>       UBUNTU: SAUCE: AppArmor: -- mainline 2010-06-23
>       UBUNTU: SAUCE: AppArmor 2.4 compatibility patch
>       UBUNTU: SAUCE: fs: block hardlinks to non-accessible sources AppArmor portion
> 
>  include/linux/lsm_audit.h                 |   33 +-
>  security/Kconfig                          |    6 +
>  security/Makefile                         |    2 +
>  security/apparmor/.gitignore              |    5 +
>  security/apparmor/Kconfig                 |   40 +
>  security/apparmor/Makefile                |   30 +
>  security/apparmor/apparmorfs-24.c         |  287 +++++++
>  security/apparmor/apparmorfs.c            |  298 ++++++++
>  security/apparmor/audit.c                 |  206 +++++
>  security/apparmor/capability.c            |  141 ++++
>  security/apparmor/context.c               |  216 ++++++
>  security/apparmor/domain.c                |  819 ++++++++++++++++++++
>  security/apparmor/file.c                  |  484 ++++++++++++
>  security/apparmor/include/apparmor.h      |   82 ++
>  security/apparmor/include/apparmorfs.h    |   29 +
>  security/apparmor/include/audit.h         |  127 ++++
>  security/apparmor/include/capability.h    |   45 ++
>  security/apparmor/include/context.h       |  154 ++++
>  security/apparmor/include/domain.h        |   36 +
>  security/apparmor/include/file.h          |  224 ++++++
>  security/apparmor/include/ipc.h           |   28 +
>  security/apparmor/include/match.h         |  139 ++++
>  security/apparmor/include/net.h           |   40 +
>  security/apparmor/include/path.h          |   32 +
>  security/apparmor/include/policy.h        |  314 ++++++++
>  security/apparmor/include/policy_unpack.h |   20 +
>  security/apparmor/include/procattr.h      |   26 +
>  security/apparmor/include/resource.h      |   46 ++
>  security/apparmor/include/sid.h           |   24 +
>  security/apparmor/ipc.c                   |  114 +++
>  security/apparmor/lib.c                   |   84 ++
>  security/apparmor/lsm.c                   | 1083 ++++++++++++++++++++++++++
>  security/apparmor/match.c                 |  387 ++++++++++
>  security/apparmor/net.c                   |  167 ++++
>  security/apparmor/path.c                  |  243 ++++++
>  security/apparmor/policy.c                | 1177 +++++++++++++++++++++++++++++
>  security/apparmor/policy_unpack.c         |  731 ++++++++++++++++++
>  security/apparmor/procattr.c              |  167 ++++
>  security/apparmor/resource.c              |  132 ++++
>  security/apparmor/sid.c                   |   55 ++
>  40 files changed, 8272 insertions(+), 1 deletions(-)
>  create mode 100644 security/apparmor/.gitignore
>  create mode 100644 security/apparmor/Kconfig
>  create mode 100644 security/apparmor/Makefile
>  create mode 100644 security/apparmor/apparmorfs-24.c
>  create mode 100644 security/apparmor/apparmorfs.c
>  create mode 100644 security/apparmor/audit.c
>  create mode 100644 security/apparmor/capability.c
>  create mode 100644 security/apparmor/context.c
>  create mode 100644 security/apparmor/domain.c
>  create mode 100644 security/apparmor/file.c
>  create mode 100644 security/apparmor/include/apparmor.h
>  create mode 100644 security/apparmor/include/apparmorfs.h
>  create mode 100644 security/apparmor/include/audit.h
>  create mode 100644 security/apparmor/include/capability.h
>  create mode 100644 security/apparmor/include/context.h
>  create mode 100644 security/apparmor/include/domain.h
>  create mode 100644 security/apparmor/include/file.h
>  create mode 100644 security/apparmor/include/ipc.h
>  create mode 100644 security/apparmor/include/match.h
>  create mode 100644 security/apparmor/include/net.h
>  create mode 100644 security/apparmor/include/path.h
>  create mode 100644 security/apparmor/include/policy.h
>  create mode 100644 security/apparmor/include/policy_unpack.h
>  create mode 100644 security/apparmor/include/procattr.h
>  create mode 100644 security/apparmor/include/resource.h
>  create mode 100644 security/apparmor/include/sid.h
>  create mode 100644 security/apparmor/ipc.c
>  create mode 100644 security/apparmor/lib.c
>  create mode 100644 security/apparmor/lsm.c
>  create mode 100644 security/apparmor/match.c
>  create mode 100644 security/apparmor/net.c
>  create mode 100644 security/apparmor/path.c
>  create mode 100644 security/apparmor/policy.c
>  create mode 100644 security/apparmor/policy_unpack.c
>  create mode 100644 security/apparmor/procattr.c
>  create mode 100644 security/apparmor/resource.c
>  create mode 100644 security/apparmor/sid.c
> 









More information about the kernel-team mailing list