Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1782094ybl; Tue, 3 Dec 2019 12:34:36 -0800 (PST) X-Google-Smtp-Source: APXvYqwKgcTnfbYh+S5m4QyBqIpNR3egHlMtuvtWiLa4KDfn5Pxs1XpTiqLlTK15KNZjW3Zf/yKk X-Received: by 2002:a05:6830:2116:: with SMTP id i22mr5026414otc.0.1575405276085; Tue, 03 Dec 2019 12:34:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575405276; cv=none; d=google.com; s=arc-20160816; b=MUCeqqYWQvlqv/xdc7w/Z+t1l+aljEVZqvTf3YVYjc6R/VKW3pR6Jxz/6i6PJ9nzWt DwNTA1IVuLGbF/c1wVZiEErJTgtt2SDFDbRuF0vBT8TnJ91Am5a/3cFb54N2bwuBG5tO C9UDmYXgcXk0XN/S58c3DGJ0PQ514kNzI3Zz+ctUxgvbpbF80OTEJkgbp3WR5gcxTYuH sgsdjJxAHAeRnATgBDXpCphBAd6Sq3H9A7KJt7hGeS+qXDNM0qUQlyPlzZEsIC/6a2te vzbQKE1S9lmcm/UZzhNeU7hY45FAxlYUZ0wXYHe/60gxPHC39eMOQEd5btY80Zi/hpl1 QjnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id :organization:cc:to:subject:from; bh=QqFJdaxRO4jfa/GrU1V2AZImvSADK+zl679WygAAbPE=; b=ixv7uULJRJZ9nxpcUpY3w/iFXDjd8sDMPyy1ecCcVykFbaeyB/owmUMu1Mc3BRMzde 7+d0Z892ow9JM16WHpP1IPIQnlyk64kJIG4BQse/i4WYWWqTQ6ouinRuXDDRH5KGGlkl 0iyAUucwg6xwspdiKcIJR23wz/BBKGiPLyWhTczqK040iTQi47Y5ULlB4YnlUEmaFDST asQ3z0HL/xKZzsXBBDcJJHRHOHawkkVIGge2akKF6WIOpyhYW9eb9PCHNQfI9ScfxHdr 9PsOV7ax8rgCQnzxNTkm3qWWQMB3gBXmSLlbQSe8RpljOWt9vuUAiUWxjC80JsFoIJnW FSmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l2si2156321otb.4.2019.12.03.12.34.23; Tue, 03 Dec 2019 12:34:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727439AbfLCUdu (ORCPT + 99 others); Tue, 3 Dec 2019 15:33:50 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:58106 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727249AbfLCUdt (ORCPT ); Tue, 3 Dec 2019 15:33:49 -0500 Received: from static-50-53-33-191.bvtn.or.frontiernet.net ([50.53.33.191] helo=[192.168.192.153]) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1icErh-0001Y7-RR; Tue, 03 Dec 2019 20:33:46 +0000 From: John Johansen Subject: [GIT PULL] apparmor updates for 5.5 To: Linus Torvalds Cc: LKLM , "open list:SECURITY SUBSYSTEM" Organization: Canonical Message-ID: Date: Tue, 3 Dec 2019 12:33:43 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Sorry I didn't manage to get these out before last weeks vacation. Can you please pull the following changes for apparmor Thanks! - John The following changes since commit 582549e3fbe137eb6ce9be591aca25c2222a36b4: Merge tag 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma (2019-04-10 09:39:04 -1000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jj/linux-apparmor tags/apparmor-pr-2019-12-03 for you to fetch changes up to 341c1fda5e17156619fb71acfc7082b2669b4b72: apparmor: make it so work buffers can be allocated from atomic context (2019-11-22 16:41:08 -0800) ---------------------------------------------------------------- + Features - increase left match history buffer size to provide inproved conflict resolution in overlapping execution rules. - switch buffer allocation to use a memory pool and GFP_KERNEL where possible. - add compression of policy blobs to reduce memory usage. + Cleanups - fix spelling mistake "immutible" -> "immutable" + Bug fixes - fix unsigned len comparison in update_for_len macro - fix sparse warning for type-casting of current->real_cred ---------------------------------------------------------------- Bharath Vedartham (1): apparmor: Force type-casting of current->real_cred Chris Coulson (1): apparmor: Initial implementation of raw policy blob compression Colin Ian King (2): apparmor: fix spelling mistake "immutible" -> "immutable" apparmor: fix unsigned len comparison with less than zero John Johansen (7): apparmor: fix blob compression build failure on ppc apparmor: fix missing ZLIB defines apparmor: fix blob compression when ns is forced on a policy load apparmor: increase left match history buffer size apparmor: fix wrong buffer allocation in aa_new_mount apparmor: reduce rcu_read_lock scope for aa_file_perm mediation apparmor: make it so work buffers can be allocated from atomic context Sebastian Andrzej Siewior (2): apparmor: Use a memory pool instead per-CPU caches apparmor: Switch to GFP_KERNEL where possible security/apparmor/Kconfig | 2 + security/apparmor/apparmorfs.c | 130 +++++++++++++++++++- security/apparmor/domain.c | 46 +++---- security/apparmor/file.c | 45 ++++--- security/apparmor/include/apparmor.h | 1 + security/apparmor/include/file.h | 2 +- security/apparmor/include/match.h | 3 +- security/apparmor/include/path.h | 50 +------- security/apparmor/include/policy_unpack.h | 8 +- security/apparmor/label.c | 12 +- security/apparmor/lsm.c | 198 ++++++++++++++++++++++++------ security/apparmor/match.c | 6 +- security/apparmor/mount.c | 67 +++++++--- security/apparmor/policy.c | 5 +- security/apparmor/policy_unpack.c | 116 ++++++++++++++++- 15 files changed, 526 insertions(+), 165 deletions(-)