Commit Graph

306642 Commits

Author SHA1 Message Date
Tim Gardner
efe3153c6f UBUNTU: tools/perf/builtin-periodic.c - fix FTBS
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 17:05:31 +00:00
Tim Gardner
3cf71eb9dd UBUNTU: disable lttng for FTBS
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 17:05:30 +00:00
Tim Gardner
a4943b8265 UBUNTU: manta -> flo
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 17:05:29 +00:00
Andy Whitcroft
62744bae5b UBUNTU: [Config] switch build-depends to libiberty-dev
Switch from binutils-dev to libiberty-dev in order to simplify
cross-compilation.

Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:55 -07:00
Andy Whitcroft
c019a6f899 UBUNTU: Ubuntu-manta-3.4.0-4.19
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:55 -07:00
John Johansen
0ea99ca65a UBUNTU: SAUCE: apparmor: fix bad lock balance when introspecting policy
BugLink: http://bugs.launchpad.net/bugs/1235977

The profile introspection seq file has a locking bug when policy is viewed
from a virtual root (task in a policy namespace, introspection from the
real root is not affected).

The test for root
    while (parent) {
is correct for the real root, but incorrect for tasks in a policy namespace.
This allows the task to walk backup the policy tree past its virtual root
causing it to be unlocked before the virtual root should be in the p_stop
fn.

This results in the following lockdep back trace:
[   78.479744] [ BUG: bad unlock balance detected! ]
[   78.479792] 3.11.0-11-generic #17 Not tainted
[   78.479838] -------------------------------------
[   78.479885] grep/2223 is trying to release lock (&ns->lock) at:
[   78.479952] [<ffffffff817bf3be>] mutex_unlock+0xe/0x10
[   78.480002] but there are no more locks to release!
[   78.480037]
[   78.480037] other info that might help us debug this:
[   78.480037] 1 lock held by grep/2223:
[   78.480037]  #0:  (&p->lock){+.+.+.}, at: [<ffffffff812111bd>] seq_read+0x3d/0x3d0
[   78.480037]
[   78.480037] stack backtrace:
[   78.480037] CPU: 0 PID: 2223 Comm: grep Not tainted 3.11.0-11-generic #17
[   78.480037] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[   78.480037]  ffffffff817bf3be ffff880007763d60 ffffffff817b97ef ffff8800189d2190
[   78.480037]  ffff880007763d88 ffffffff810e1c6e ffff88001f044730 ffff8800189d2190
[   78.480037]  ffffffff817bf3be ffff880007763e00 ffffffff810e5bd6 0000000724fe56b7
[   78.480037] Call Trace:
[   78.480037]  [<ffffffff817bf3be>] ? mutex_unlock+0xe/0x10
[   78.480037]  [<ffffffff817b97ef>] dump_stack+0x54/0x74
[   78.480037]  [<ffffffff810e1c6e>] print_unlock_imbalance_bug+0xee/0x100
[   78.480037]  [<ffffffff817bf3be>] ? mutex_unlock+0xe/0x10
[   78.480037]  [<ffffffff810e5bd6>] lock_release_non_nested+0x226/0x300
[   78.480037]  [<ffffffff817bf2fe>] ? __mutex_unlock_slowpath+0xce/0x180
[   78.480037]  [<ffffffff817bf3be>] ? mutex_unlock+0xe/0x10
[   78.480037]  [<ffffffff810e5d5c>] lock_release+0xac/0x310
[   78.480037]  [<ffffffff817bf2b3>] __mutex_unlock_slowpath+0x83/0x180
[   78.480037]  [<ffffffff817bf3be>] mutex_unlock+0xe/0x10
[   78.480037]  [<ffffffff81376c91>] p_stop+0x51/0x90
[   78.480037]  [<ffffffff81211408>] seq_read+0x288/0x3d0
[   78.480037]  [<ffffffff811e9d9e>] vfs_read+0x9e/0x170
[   78.480037]  [<ffffffff811ea8cc>] SyS_read+0x4c/0xa0
[   78.480037]  [<ffffffff817ccc9d>] system_call_fastpath+0x1a/0x1f

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:55 -07:00
John Johansen
1deb91e912 UBUNTU: SAUCE: apparmor: fix memleak of replacedby struct
BugLink: http://bugs.launchpad.net/bugs/1235973

This fixes the following kmemleak trace:
unreferenced object 0xffff8800245476d8 (size 16):
  comm "apparmor_parser", pid 14163, jiffies 4295196456 (age 3312.192s)
  hex dump (first 16 bytes):
    01 00 00 00 00 00 00 00 30 00 89 3d 00 88 ff ff  ........0..=....
  backtrace:
    [<ffffffff817a99ae>] kmemleak_alloc+0x4e/0xb0
    [<ffffffff811c98b6>] kmem_cache_alloc_trace+0xe6/0x260
    [<ffffffff81386d97>] aa_alloc_replacedby+0x27/0x80
    [<ffffffff8137f1fc>] aa_replace_profiles+0x48c/0xd80
    [<ffffffff813769ea>] profile_load+0x3a/0x60
    [<ffffffff811e9f2d>] vfs_write+0xbd/0x1e0
    [<ffffffff811ea96c>] SyS_write+0x4c/0xa0
    [<ffffffff817cccdd>] system_call_fastpath+0x1a/0x1f
    [<ffffffffffffffff>] 0xffffffffffffffff

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:55 -07:00
John Johansen
685044db97 UBUNTU: SAUCE: apparmor: fix memleak of the profile hash
BugLink: http://bugs.launchpad.net/bugs/1235523

This fixes the following kmemleak trace:
unreferenced object 0xffff8801e8c35680 (size 32):
  comm "apparmor_parser", pid 691, jiffies 4294895667 (age 13230.876s)
  hex dump (first 32 bytes):
    e0 d3 4e b5 ac 6d f4 ed 3f cb ee 48 1c fd 40 cf  ..N..m..?..H..@.
    5b cc e9 93 00 00 00 00 00 00 00 00 00 00 00 00  [...............
  backtrace:
    [<ffffffff817a97ee>] kmemleak_alloc+0x4e/0xb0
    [<ffffffff811ca9f3>] __kmalloc+0x103/0x290
    [<ffffffff8138acbc>] aa_calc_profile_hash+0x6c/0x150
    [<ffffffff8138074d>] aa_unpack+0x39d/0xd50
    [<ffffffff8137eced>] aa_replace_profiles+0x3d/0xd80
    [<ffffffff81376937>] profile_replace+0x37/0x50
    [<ffffffff811e9f2d>] vfs_write+0xbd/0x1e0
    [<ffffffff811ea96c>] SyS_write+0x4c/0xa0
    [<ffffffff817ccb1d>] system_call_fastpath+0x1a/0x1f
    [<ffffffffffffffff>] 0xffffffffffffffff

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:55 -07:00
John Johansen
905491ccf3 UBUNTU: SAUCE: apparmor: allocate path lookup buffers during init
BugLink: http://bugs.launchpad.net/bugs/1208988
dependency of: fix unix domain sockets to be mediated on connection
               needed to fix sleep in atomic context

Dynamically allocating buffers to store the path lookup slows mediation
down, and may require being able to sleep or accept failure of buffer
allocation. Handling fd inheritance during committing_creds, and unix
domain sockets can't fail nor can it sleep to do an allocation, so it
requires having preallocated buffers.

So add support for preallocated buffers and convert everything that
can be to use them.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:55 -07:00
John Johansen
69e4498aa1 UBUNTU: SAUCE: apparmor: fix unix domain sockets to be mediated on connection
BugLink: http://bugs.launchpad.net/bugs/1208988

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:54 -07:00
Scott James Remnant
61886ff09c UBUNTU: SAUCE: (no-up) trace: add trace events for open(), exec() and uselib()
BugLink: http://bugs.launchpad.net/bugs/1194127

This patch uses TRACE_EVENT to add tracepoints for the open(),
exec() and uselib() syscalls so that ureadahead can cheaply trace
the boot sequence to determine what to read to speed up the next.

It's not upstream because it will need to be rebased onto the syscall
trace events whenever that gets merged, and is a stop-gap.

Signed-off-by: Scott James Remnant <scott@ubuntu.com>
Acked-by: Stefan Bader <stefan.bader@canonical.com>
Acked-by: Andy Whitcroft <andy.whitcroft@canonical.com>
[apw@canonical.com: ported for 3.4]
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:54 -07:00
Andy Whitcroft
f2c8c2f074 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:54 -07:00
Tim Gardner
439a1c3a8a UBUNTU: Ubuntu-3.4.0-4.18
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:54 -07:00
John Johansen
1992ec6ce4 UBUNTU: SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 4 snapshot
This is a sync and squash to the apparmor 3 alpha 4 development snapshot
backported from 3.12. The set of patches in this squash are available
is the aa3.0-presquash branch of the dev tree.

Several of the patches in the squash have been submitted upstream.
Several more will be submitted soon, and other parts are still in
active review and development.

This squash will be updated to remove patches as they are pulled
into the upstream tree, and add new patches as they become available
to the stable apparmor dev branch.

In addition to the apparmor 3 sync this contains the backport patch
series for the 3.4 manta kernel
- apparmor: 3.10 backport revert no delay vfree()
- apparmor: 3.8 backport provide file_inode helper 496ad9aa
- apparmor: 3.6 backport revert uapi for capnames 43c422ed
- apparmor: 3.6 backport revert uapi for resnames 8a1ab315
- apparmor: 3.6 backport define kuid_t d2b31ca64
- apparmor: 3.6 backport kuid_t support for audit 2db81452
- apparmor: 3.6 backport remove const from sb_mount 808d4e3c
- apparmor: 3.4 backport revert file_mmap e5467859
- apparmor: 3.4 backport cap_mmap_addr d007794a
- apparmor: 3.4 backport fake no_new_privs 259e5e6c
- apparmor: 3.4 backport revert task audi_data 0972c74e
- apparmor: 3.4 backport alias file_open 83d49856
- UBUNTU: SAUCE: (no-up) apparmor: update config options

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:54 -07:00
John Johansen
079cd551d0 Revert "UBUNTU SAUCE: apparmor: 3.4 backport of apparmor3"
This reverts commit 4191785f19cdfe6472162e11d22f604b9ebefc42.

Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:54 -07:00
John Johansen
e991a56d0a Revert "UBUNTU: SAUCE: (no-up) apparmor: fix apparmor module status for none root users"
This reverts commit 33a2c58fbbb1f2742a0245965a3484cc39fdeebf.

Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:53 -07:00
Tim Gardner
d1ad0985ad UBUNTU: SAUCE: ALSA: pcm: Use snd_printd_ratelimit()
BugLink: http://bugs.launchpad.net/bugs/1213136

upstreamed

The use of snd_printd_ratelimit() supresses superfluous output from
printk_ratelimit() when CONFIG_SND_DEBUG is not defined. For example,

[   43.753692] snd_pcm_update_hw_ptr0: 26 callbacks suppressed
[   48.822131] snd_pcm_update_hw_ptr0: 25 callbacks suppressed
[   53.894953] snd_pcm_update_hw_ptr0: 25 callbacks suppressed
[   58.997761] snd_pcm_update_hw_ptr0: 25 callbacks suppressed
[   64.100952] snd_pcm_update_hw_ptr0: 25 callbacks suppressed

fills the log even when no debug output is actually produced.

Cc: Jaroslav Kysela <perex@perex.cz>
Cc: Takashi Iwai <tiwai@suse.de>
Cc: Pierre-Louis Bossart <pierre-louis.bossart@linux.intel.com>
Cc: Lars-Peter Clausen <lars@metafoo.de>
Cc: Yacine Belkadi <yacine.belkadi.1@gmail.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:53 -07:00
Tim Gardner
d46fbeb890 UBUNTU: SAUCE: ALSA: pcm: Add snd_printd_ratelimit()
BugLink: http://bugs.launchpad.net/bugs/1213136

upstreamed

Direct calls to printk_limit() will emit log noise even when CONFIG_SND_DEBUG is not
defined. Add a wrapper macro around printk_limit() that is conditionally defined by
CONFIG_SND_DEBUG.

Cc: Jaroslav Kysela <perex@perex.cz>
Cc: Takashi Iwai <tiwai@suse.de>
Cc: Pierre-Louis Bossart <pierre-louis.bossart@linux.intel.com>
Cc: Lars-Peter Clausen <lars@metafoo.de>
Cc: Yacine Belkadi <yacine.belkadi.1@gmail.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:53 -07:00
Tim Gardner
2163dcb970 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:53 -07:00
Tim Gardner
bf541415b6 UBUNTU: Ubuntu-3.4.0-4.17
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:53 -07:00
Ricardo Mendoza
b3574a04ed binder: search for receiving context pid in global namespace
BugLink: http://bugs.launchpad.net/bugs/1210149

If binder cannot find the receiving task in the sender's namespace it
will default to a null PID which thus breaks communication in our
container-based scenario. This patch extends binder to first look in the
senders namespace and if unsuccesfull search in the global namespace.

Signed-off-by: Ricardo Mendoza <ricardo.mendoza@canonical.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:53 -07:00
Tim Gardner
b91905ceaf UBUNTU: Start new release
Ignore: yes
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:52 -07:00
Tim Gardner
a216fb880c UBUNTU: Ubuntu-3.4.0-4.16
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:52 -07:00
Tim Gardner
bf3611ea91 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:52 -07:00
Andy Whitcroft
d2d47fb6b1 UBUNTU: SAUCE: allow mem= banks to be reset on the command line
Each mem=X option specified an _additional_ memory segment.  This
cummulative behaviour prevents us from using mem=X to limit ram in play
during testing, especially where the bootloader is supplying the actual
memory of the device unconditionally.  Allow the memory map to be reset
to empty via a '!' prefix.

BugLink: http://bugs.launchpad.net/bugs/1206835
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:52 -07:00
Tim Gardner
0e1f625343 UBUNTU: Ubuntu-3.4.0-4.15
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:52 -07:00
Colin Ian King
92259ee635 UBUNTU: [Config] enable deadline I/O scheduler by default
Testing shows that the deadline scheduler on the flash file system
performs slightly better than CFQ.  It also consumes marginally less
power.  So enable deadline by default.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:52 -07:00
John Johansen
522c25b5ab UBUNTU: SAUCE: (no-up) apparmor: fix apparmor module status for none root users
This fixes a bug in the current apparmor3 alpha2 sync, where none root
users can not query whether the apparmor module is enabled. It has been
incorporated into the apparmor dev tree and will be integrated as part
of the next sync, at which point this patch will be reverted.

BugLink: http://bugs.launchpad.net/bugs/1199912

Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:52 -07:00
Tim Gardner
2653a0aec9 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:51 -07:00
Tim Gardner
22effc82ff UBUNTU: Ubuntu-3.4.0-4.14
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:51 -07:00
Tim Gardner
887a699a29 UBUNTU: [Config] Harmonize NF, NETFILTER, IP_NF, and IP6_NF options
Use this script, then when updating configs set everything to 'm'
that is possible, otherwise y (except for the one debug option)

for i in CONFIG_IP_NF_ CONFIG_IP6_NF_ CONFIG_NETFILTER_ CONFIG_NF_
do
sed -i '/'$i'.*set/d' debian.*/config/config.common.ubuntu
sed -i '/'$i'.*=y/d' debian.*/config/config.common.ubuntu
done

Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:51 -07:00
Tim Gardner
2d03f8da04 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:51 -07:00
Tim Gardner
1d5227b6a4 UBUNTU: Ubuntu-3.4.0-4.13
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:51 -07:00
Tim Gardner
d3f521bce5 UBUNTU: [Config] Enable more NF options
BugLink: http://bugs.launchpad.net/bugs/1199351

Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:51 -07:00
Andy Whitcroft
57f728c34d UBUNTU: [Config] CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS=y
BugLink: http://bugs.launchpad.net/bugs/1108082

Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
cea43f6225 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
6e290708ce UBUNTU: Ubuntu-3.4.0-4.12
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
8d25b13b54 Revert "UBUNTU: [Config] CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=0"
This reverts commit c391add22b23026fcbec6bd555c604d030865229.

Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
8e3c0cf069 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
2233b36143 UBUNTU: Ubuntu-3.4.0-4.11
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
6691821d8b UBUNTU: Start new release
Ignore: yes
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:50 -07:00
Andy Whitcroft
30f90c58ef UBUNTU: [Config] CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=0
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:49 -07:00
Andy Whitcroft
b5d52a5ef1 UBUNTU: Ubuntu-manta-3.4.0-4.10
Signed-off-by: Andy Whitcroft <apw@canonical.com>
2014-01-09 07:43:49 -07:00
John Johansen
987121b8fe UBUNTU SAUCE: apparmor: 3.4 backport of apparmor3
This is a squash of the following commits from the branch
  v3.4-backport-of-apparmor3

Signed-off-by: John Johansen <john.johansen@canonical.com>

----------------------------------------------------------------

sync to Linux 3.10 apparmor

UBUNTU SAUCE: apparmor: sync apparmor3 dev snapshot

----------------------------------------------------------------
John Johansen (67):
      apparmor: fix auditing of domain transition failures due to incomplete policy
      apparmor: Remove -W1 warnings
      apparmor: refactor profile mode macros
      apparmor: fix error code to failure message mapping for name lookup
      apparmor: add utility function to get an arbitrary tasks profile.
      apparmor: add kvzalloc to handle zeroing for kvmalloc
      apparmor: use common fn to clear task_context for domain transitions
      apparmor: remove "permipc" command
      apparmor: relax the restrictions on setting rlimits
      apparmor: misc cleanup of match
      apparmor: move perm defines into policy_unpack
      apparmor: remove sid from profiles
      apparmor: move the free_profile fn ahead of aa_alloc_profile
      apparmor: reserve and mask off the top 8 bits of the base field
      apparmor: fix the audit type table
      apparmor: add a features/policy dir to interface
      apparmor: Fix smatch warning in aa_remove_profiles
      apparmor: fix sparse warnings
      apparmor: localize getting the security context to a few macros
      apparmor: fix setprocattr arg processing for onexec
      apparmor: fix fully qualified name parsing
      apparmor: enable users to query whether apparmor is enabled
      apparmor: provide base for multiple profiles to be replaced at once
      apparmor: convert profile lists to RCU based locking
      apparmor: change how profile replacement update is done
      apparmor: update how unconfined is handled
      apparmor: fix namespace to be freeded via RCU
      apparmor: rework namespace free path
      apparmor: make free_profile available outside of policy.c
      apparmor: allow setting any profile into the unconfined state
      apparmor: provide the ability to boot with a default profile set on init
      apparmor: fix fs extry display for default profile
      apparmor: Add interface files for profiles and namespaces
      FIX: collapse aa_fs_entry to a single entry instead of a null terminated array
      apparmor: merge profile mode names
      apparmor: fix the locking etc. in the new policy interface
      apparmor: add an optional profile attachment string
      apparmor: Add profile introspection file to interface
      apparmor: update compatibility patch for RCU locking
      FIX: more fixes to aafs/profiles file
      apparmor: reuse name string from previous profile
      apparmor: add basic support for implicit labeling of files
      apparmor: directly free a label if it has not been added to a labelset
      FIX: ensure label is only inserted if not already in tree
      apparmor: baby step - now add labels to the labelset trees
      FIX: ensure all profiles get added to the correct lists
      apparmor: move replacedby to use labels instead of profiles
      apparmor: introduce using labels from contexts
      apparmor: add abilitiy to print labels and update interface to use
      apparmor: rework auditing to use the label
      apparmor: audit the profile and namespace for all messages
      apparmor: treat each task as if the label can have mutiple entries
      apparmor: use most recent label available, when possible.
      apparmor: remove FLAG_MEDIATE_DELETED
      apparmor: move aa_label_insert
      apparmor: add a log fn to generate log message for each profile in a label
      apparmor: add helper for getting the newest profile
      apparmor: add the ability to create a new label based on merging 2 labels
      apparmor: invalidate compound labels, and replace
      apparmor: set up base labeling on sockets
      apparmor: Add the ability to mediate mount
      apparmor: convert mount to label instead of profile
      apparmor: treat mount as if each task may have multi-profile labels
      apparmor: implement profile-based query interface in      apparmorfs
      apparmor: update profile permission query interface to use labels
      apparmor: fix returning -einval when should be no perms on query interface
      apparmor: add a features/dbus dir to securityfs interface

 security/apparmor/.gitignore              |    1 +
 security/apparmor/Kconfig                 |   35 ++
 security/apparmor/Makefile                |   42 ++-
 security/apparmor/apparmorfs.c            |  757 +++++++++++++++++++++++++++++++++++++-
 security/apparmor/audit.c                 |   30 +-
 security/apparmor/context.c               |  122 ++++---
 security/apparmor/domain.c                |  123 ++++---
 security/apparmor/file.c                  |  173 +++++----
 security/apparmor/include/apparmor.h      |   58 ++-
 security/apparmor/include/apparmorfs.h    |   39 ++
 security/apparmor/include/audit.h         |   21 +-
 security/apparmor/include/context.h       |  158 +++++---
 security/apparmor/include/domain.h        |    2 +
 security/apparmor/include/file.h          |   23 +-
 security/apparmor/include/ipc.h           |    4 +-
 security/apparmor/include/label.h         |  325 +++++++++++++++++
 security/apparmor/include/match.h         |   21 +-
 security/apparmor/include/mount.h         |   54 +++
 security/apparmor/include/net.h           |   54 +++
 security/apparmor/include/path.h          |    2 +-
 security/apparmor/include/policy.h        |  214 ++++++-----
 security/apparmor/include/policy_unpack.h |   21 +-
 security/apparmor/include/procattr.h      |    3 +-
 security/apparmor/include/resource.h      |    4 +-
 security/apparmor/include/sid.h           |    4 +-
 security/apparmor/ipc.c                   |   48 +--
 security/apparmor/label.c                 | 1626 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 security/apparmor/lib.c                   |   37 +-
 security/apparmor/lsm.c                   |  645 ++++++++++++++++++++++++++++-----
 security/apparmor/match.c                 |   23 +-
 security/apparmor/mount.c                 |  704 ++++++++++++++++++++++++++++++++++++
 security/apparmor/net.c                   |  169 +++++++++
 security/apparmor/path.c                  |    2 +-
 security/apparmor/policy.c                |  871 +++++++++++++++++++++++++++-----------------
 security/apparmor/policy_unpack.c         |  188 ++++++++--
 security/apparmor/procattr.c              |   57 +--
 security/apparmor/resource.c              |   91 +++--
 37 files changed, 5790 insertions(+), 961 deletions(-)
 create mode 100644 security/apparmor/include/label.h
 create mode 100644 security/apparmor/include/mount.h
 create mode 100644 security/apparmor/include/net.h
 create mode 100644 security/apparmor/label.c
 create mode 100644 security/apparmor/mount.c
 create mode 100644 security/apparmor/net.c

UBUNTU SAUCE: apparmor: 3.8 backport provide file_inode helper 496ad9aa

support changes from commit 496ad9aa8ef448058e36ca7a787c61f2e63f0f54

UBUNTU SAUCE: apparmor: 3.6 backport revert uapi for capnames 43c422ed

partial revert of 43c422eda99b894f18d1cca17bcd2401efaf7bd0

UBUNTU SAUCE: apparmor: 3.6 backport revert uapi for resnames 8a1ab315

partial revert 8a1ab3155c2ac7fbe5f2038d6e26efeb607a1498

UBUNTU SAUCE: apparmor: 3.6 backport define kuid_t d2b31ca64

support changes from commit d2b31ca644fdc8704de3367a6a56a5c958c77f53

UBUNTU SAUCE: apparmor: 3.6 backport kuid_t support for audit 2db81452

support changes from commit 2db81452931eb51cc739d6e495cf1bd4860c3c99

UBUNTU SAUCE: apparmor: 3.6 backport remove const from sb_mount 808d4e3c

partial revert of 808d4e3cfdcc52b19276175464f6dbca4df13b09

UBUNTU SAUCE: apparmor: 3.4 backport revert file_mmap e5467859

partial revert of e5467859f7f79b69fc49004403009dfdba3bec53

UBUNTU SAUCE: apparmor: 3.4 backport cap_mmap_addr d007794a

support changes from d007794a182bc072a7b7479909dbd0d67ba341be

UBUNTU SAUCE: apparmor: 3.4 backport fake no_new_privs 259e5e6c

support interface from 259e5e6c75a910f3b5e656151dc602f53f9d7548
                       c29bceb3967398cf2ac8bf8edf9634fdb722df7d

UBUNTU SAUCE: apparmor: 3.4 backport alias file_open 83d49856

add support for 83d498569e9a7a4b92c4c5d3566f2d6a604f28c9
2014-01-09 07:43:49 -07:00
Tim Gardner
61f025c0da UBUNTU: do_tools=false when cross compiling
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:49 -07:00
Tim Gardner
b3d44156e5 UBUNTU: [debian] Use dh_strip
BugLink: http://bugs.launchpad.net/bugs/1192759

Rely on dh_strip to strip any binaries for the
host arch instead of using install -s

Signed-off-by: Steve Langasek <steve.langasek@canonical.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:49 -07:00
Tim Gardner
861d3d7543 UBUNTU: Fix insertchanges for manta
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:49 -07:00
Tim Gardner
8c3bbc95b1 UBUNTU: Start new release
Ignore: yes
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:48 -07:00
Tim Gardner
51fd48a380 UBUNTU: Ubuntu-manta-3.4.0-4.9
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:48 -07:00
Tim Gardner
df7d03f48e UBUNTU: [Config] Enable and modularize all netfilter matches
BugLink:  http://bugs.launchpad.net/bugs/1191197

Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
2014-01-09 07:43:48 -07:00