AppArmor update for Precise
Tim Gardner
rtg.canonical at gmail.com
Fri Feb 24 22:03:25 UTC 2012
On 02/24/2012 08:56 AM, John Johansen wrote:
> This apparmor update is to meet the requirements of the following blue-prints
> https://blueprints.launchpad.net/ubuntu/+spec/security-p-apparmor-containers
> https://blueprints.launchpad.net/ubuntu/+spec/security-p-apparmor-permissions-rework
> https://blueprints.launchpad.net/ubuntu/+spec/security-p-apparmor-ubuntu
>
> it also contains the fix for
> BugLink: http://bugs.launchpad.net/bugs/925028
>
>
> The following changes since commit 00e2d7f3bcaf0cbb3d93defce24106966b6d017d:
>
> UBUNTU: Ubuntu-3.2.0-17.26 (2012-02-17 10:13:46 -0800)
>
> are available in the git repository at:
>
> ssh://kernel.ubuntu.com/srv/kernel.ubuntu.com/git/jj/ubuntu-precise.git apparmor
>
> for you to fetch changes up to 183a6edfaf235fafec23ee6ec608306f94cd5bd5:
>
> UBUNTU: SAUCE: AppArmor: Add mount information to apparmorfs (2012-02-24 05:50:47 -0800)
>
> ----------------------------------------------------------------
> John Johansen (19):
> Revert "UBUNTU: SAUCE: AppArmor: Fix unpack of network tables."
> Revert "AppArmor: compatibility patch for v5 interface"
> Revert "AppArmor: compatibility patch for v5 network controll"
> Revert "UBUNTU: SAUCE: AppArmor: Allow dfa backward compatibility with broken userspace"
> UBUNTU: SAUCE: AppArmor: Add mising end of structure test to caps unpacking
> UBUNTU: SAUCE: AppArmor: Fix dropping of allowed operations that are force audited
> UBUNTU: SAUCE: AppArmor: Fix underflow in xindex calculation
> UBUNTU: SAUCE: AppArmor: fix mapping of META_READ to audit and quiet flags
> UBUNTU: SAUCE: AppArmor: Fix the error case for chroot relative path name lookup
> UBUNTU: SAUCE: AppArmor: Retrieve the dentry_path for error reporting when path lookup fails
> UBUNTU: SAUCE: AppArmor: Minor cleanup of d_namespace_path to consolidate error handling
> UBUNTU: SAUCE: AppArmor: Update dfa matching routines.
> UBUNTU: SAUCE: AppArmor: Move path failure information into aa_get_name and rename
> UBUNTU: SAUCE: AppArmor: Make chroot relative the default path lookup type
> UBUNTU: SAUCE: AppArmor: Add ability to load extended policy
> UBUNTU: SAUCE: AppArmor: basic networking rules
> UBUNTU: SAUCE: AppArmor: Add profile introspection file to interface
> UBUNTU: SAUCE: AppArmor: Add the ability to mediate mount
> UBUNTU: SAUCE: AppArmor: Add mount information to apparmorfs
>
> Kees Cook (4):
> UBUNTU: SAUCE: AppArmor: refactor securityfs to use structures
> UBUNTU: SAUCE: AppArmor: add initial "features" directory to securityfs
> UBUNTU: SAUCE: AppArmor: add "file" details to securityfs
> UBUNTU: SAUCE: AppArmor: export known rlimit names/value mappings in securityfs
>
> include/linux/lsm_audit.h | 7 +
> security/apparmor/.gitignore | 2 +-
> security/apparmor/Kconfig | 9 -
> security/apparmor/Makefile | 71 +++-
> security/apparmor/apparmorfs-24.c | 287 ---------------
> security/apparmor/apparmorfs.c | 450 +++++++++++++++++++++---
> security/apparmor/audit.c | 5 +
> security/apparmor/domain.c | 7 +-
> security/apparmor/file.c | 21 +-
> security/apparmor/include/apparmor.h | 16 +-
> security/apparmor/include/apparmorfs.h | 50 +++-
> security/apparmor/include/audit.h | 9 +-
> security/apparmor/include/domain.h | 2 +
> security/apparmor/include/file.h | 2 +-
> security/apparmor/include/match.h | 3 +
> security/apparmor/include/mount.h | 53 +++
> security/apparmor/include/net.h | 6 +-
> security/apparmor/include/path.h | 3 +-
> security/apparmor/include/policy.h | 13 +
> security/apparmor/include/resource.h | 4 +
> security/apparmor/lsm.c | 59 ++++
> security/apparmor/match.c | 97 ++++-
> security/apparmor/mount.c | 600 ++++++++++++++++++++++++++++++++
> security/apparmor/net.c | 25 +-
> security/apparmor/path.c | 54 ++--
> security/apparmor/policy.c | 4 +
> security/apparmor/policy_unpack.c | 35 ++-
> security/apparmor/resource.c | 5 +
> 28 files changed, 1438 insertions(+), 461 deletions(-)
> delete mode 100644 security/apparmor/apparmorfs-24.c
> create mode 100644 security/apparmor/include/mount.h
> create mode 100644 security/apparmor/mount.c
>
John - this is kind of late in the game for such a large patch set. Have
you extracted a feature freeze exception from the release team? Where
are these patches with regard to the upstream process? Why shouldn't we
wait and backport them from the 3.4 merge window?
rtg
--
Tim Gardner tim.gardner at canonical.com
More information about the kernel-team
mailing list