APPLIED: [SRU][Artful][v3][PATCH 0/2] Fixes for LP:1734327
Tetsuo Handa
penguin-kernel at I-love.SAKURA.ne.jp
Tue Apr 3 10:08:39 UTC 2018
Kleber Souza wrote:
> On 03/12/18 20:07, Joseph Salisbury wrote:
> > BugLink: http://bugs.launchpad.net/bugs/1734327
> >
> > == SRU Justification ==
> > The following commit introduced a regression identified in bug 1734327:
> > ac8f82a0b6d9 ("UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of the remaining blobs")
> >
> > The regression causes a kernel panic to occur after multiple TCP connection
> > creations/closures to the localhost. The bug was found using STAF RPC calls,
> > but is easily reproducible with SSH.
> >
> > A revert of commit ac8f82a0b6d9 is needed to resolve this bug. However, commit 4ae2508f0bed
> > also needs to be reverted because it depend on commit ac8f82a0b6d9.
> >
> > This has already been reverted in Bionic.
> >
> > == Fix ==
> > Revert 4ae2508f0bed ("UBUNTU: SAUCE: LSM stacking: add stacking support to apparmor network hooks")
> > Revert ac8f82a0b6d9 ("UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of the remaining blobs")
> >
> > == Test Case ==
> > A test kernel was built with these two commits reverted and tested by the original bug reporter.
> > The bug reporter states the test kernel resolved the bug.
> >
> > Joseph Salisbury (2):
> > Revert "UBUNTU: SAUCE: LSM stacking: add stacking support to apparmor
> > network hooks"
> > Revert "UBUNTU: SAUCE: LSM stacking: LSM: Infrastructure management of
> > the remaining blobs"
> >
> > include/linux/lsm_hooks.h | 8 -
> > security/apparmor/include/net.h | 12 +-
> > security/apparmor/lsm.c | 15 +-
> > security/security.c | 259 +---------------------------
> > security/selinux/hooks.c | 333 ++++++++++++++++++++++++------------
> > security/selinux/include/objsec.h | 65 +-------
> > security/selinux/netlabel.c | 15 +-
> > security/selinux/selinuxfs.c | 4 +-
> > security/selinux/ss/services.c | 3 +-
> > security/smack/smack.h | 61 +------
> > security/smack/smack_lsm.c | 343 +++++++++++++++++++++++++++-----------
> > security/smack/smack_netfilter.c | 8 +-
> > 12 files changed, 510 insertions(+), 616 deletions(-)
> >
>
> Applied to artful/master-next branch.
>
OK. Then, please also apply
----------
diff -ur linux-4.13.0-17.20.orig/security/apparmor/lsm.c linux-4.13.0-17.20/security/apparmor/lsm.c
--- linux-4.13.0-17.20.orig/security/apparmor/lsm.c
+++ linux-4.13.0-17.20/security/apparmor/lsm.c
@@ -1562,6 +1562,8 @@
security_module_enable("apparmor",
IS_ENABLED(CONFIG_SECURITY_APPARMOR_STACKED)))
security_add_blobs(&apparmor_blob_sizes);
+ else
+ apparmor_enabled = 0;
finish = 1;
return 0;
}
----------
because, without this fix, using security= parameter other than security=apparmor
causes kernel panic unless apparmor=0 is explicitly specified.
> Thanks,
> Kleber
More information about the kernel-team
mailing list