The following changes since commit 1481087d553d08e75fadffaace0b98700cfdb526:
Linux 4.11 (2017-05-15 10:24:08 -0700)
are available in the git repository at:
git://kernel.ubuntu.com/jj/linux-apparmor-backports v4.11-aa3.6
for you to fetch changes up to bb15c5076ce564a898ed91ecd99456373fb447d7:
apparmor: add/use fns to print hash string hex value (2017-05-15 15:54:39 -0700)
----------------------------------------------------------------
John Johansen (17):
apparmor: fix invalid reference to index variable of iterator line 836
apparmor: fix parameters so that the permission test is bypassed at boot
apparmor: Make path_max parameter readonly
securityfs: update interface to allow inode_ops, and setup from vfs fns
apparmor: sync of apparmor 3.6+ (17.04)
UBUNTU: SAUCE: apparmor: fix label parse for stacked labels
UBUNTU: SAUCE: apparmor: add information about the query inteface to the feature set
UBUNTU: SAUCE: apparmor: add label data availability to the feature set
UBUNTU: SAUCE: apparmor: add policy revision file interface
apparmor: provide information about path buffer size at boot
UBUNTU: SAUCE: apparmor: fix complain mode failure for rlimit mediation
apparmor: update auditing of rlimit check to provide capability information
UBUNTU: SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
UBUNTU: SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode() fails
UBUNTU: SAUCE: apparmor: fix leak on securityfs pin count
UBUNTU: SAUCE: apparmor: fix lock ordering for mkdir
apparmor: add/use fns to print hash string hex value
Markus Elfring (2):
apparmorfs: Combine two function calls into one in aa_fs_seq_raw_abi_show()
apparmorfs: Use seq_putc() in two functions
Nicolas Iooss (1):
apparmor: use SHASH_DESC_ON_STACK
include/linux/security.h | 35 +-
security/apparmor/.gitignore | 1 +
security/apparmor/Kconfig | 35 +
security/apparmor/Makefile | 44 +-
security/apparmor/af_unix.c | 643 ++++++++++
security/apparmor/apparmorfs.c | 650 ++++++++--
security/apparmor/audit.c | 30 +-
security/apparmor/capability.c | 55 +-
security/apparmor/context.c | 87 +-
security/apparmor/crypto.c | 51 +-
security/apparmor/domain.c | 1373 +++++++++++++-------
security/apparmor/file.c | 544 +++++---
security/apparmor/include/af_unix.h | 114 ++
security/apparmor/include/apparmor.h | 9 +-
security/apparmor/include/apparmorfs.h | 7 +-
security/apparmor/include/audit.h | 56 +-
security/apparmor/include/capability.h | 6 +-
security/apparmor/include/context.h | 178 +--
security/apparmor/include/crypto.h | 11 +
security/apparmor/include/domain.h | 5 +
security/apparmor/include/file.h | 117 +-
security/apparmor/include/ipc.h | 22 +-
security/apparmor/include/label.h | 503 ++++++++
security/apparmor/include/lib.h | 130 +-
security/apparmor/include/mount.h | 54 +
security/apparmor/include/net.h | 124 ++
security/apparmor/include/path.h | 7 +-
security/apparmor/include/perms.h | 173 +++
security/apparmor/include/policy.h | 151 +--
security/apparmor/include/policy_ns.h | 9 +-
security/apparmor/include/procattr.h | 3 +-
security/apparmor/include/resource.h | 4 +-
security/apparmor/include/sig_names.h | 95 ++
security/apparmor/ipc.c | 224 +++-
security/apparmor/label.c | 2142 ++++++++++++++++++++++++++++++++
security/apparmor/lib.c | 389 +++++-
security/apparmor/lsm.c | 827 ++++++++++--
security/apparmor/mount.c | 705 +++++++++++
security/apparmor/net.c | 357 ++++++
security/apparmor/path.c | 132 +-
security/apparmor/policy.c | 367 +++---
security/apparmor/policy_ns.c | 22 +-
security/apparmor/policy_unpack.c | 98 +-
security/apparmor/procattr.c | 65 +-
security/apparmor/resource.c | 109 +-
security/inode.c | 108 +-
46 files changed, 9300 insertions(+), 1571 deletions(-)
create mode 100644 security/apparmor/af_unix.c
create mode 100644 security/apparmor/include/af_unix.h
create mode 100644 security/apparmor/include/label.h
create mode 100644 security/apparmor/include/mount.h
create mode 100644 security/apparmor/include/net.h
create mode 100644 security/apparmor/include/perms.h
create mode 100644 security/apparmor/include/sig_names.h
create mode 100644 security/apparmor/label.c
create mode 100644 security/apparmor/mount.c
create mode 100644 security/apparmor/net.c