diff options
author | Yannick GICQUEL <yannick.gicquel@iot.bzh> | 2015-10-19 15:57:07 +0200 |
---|---|---|
committer | Gerrit Code Review <gerrit@172.30.200.200> | 2015-11-06 15:23:36 +0000 |
commit | ede19ea0c47fb23f3fc779833d1e57cf76f3371e (patch) | |
tree | 47d6fae2283c54def1871aaf2a73828ac68b1b34 /meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README | |
parent | 1cd8ab18abca96e4ee108f80225058d875b28347 (diff) |
kernel: smack security backport from kernel 4
Here is the backport of all patches relating to smack support
on kernel side. For more details, see file:
meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README
Please note that patches are applied only if "smack" is in the
ditro features. Here are the 2 lines to add in the local.conf
OVERRIDES .= ":smack"
DISTRO_FEATURES_append = " smack"
Change-Id: I147a3532aec531f977d6ec34c576261835711f1e
Signed-off-by: Yannick GICQUEL <yannick.gicquel@iot.bzh>
Signed-off-by: José Bollo <jose.bollo@iot.bzh>
Diffstat (limited to 'meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README')
-rw-r--r-- | meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README | 153 |
1 files changed, 153 insertions, 0 deletions
diff --git a/meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README b/meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README new file mode 100644 index 0000000..44216cf --- /dev/null +++ b/meta-rcar-gen2/recipes-kernel/linux/linux-renesas/smack/README @@ -0,0 +1,153 @@ +Patches in this directory were generated on top of the kernel + + git://git.kernel.org/pub/scm/linux/kernel/git/horms/renesas-backport.git + +branch + + bsp/v3.10.31-ltsi/rcar-gen2-1.9.2 + +This patches are subdivided in 3 sets. + +Set 1: from 3.10-rc1 to 3.14 + + 0001-Smack-Local-IPv6-port-based-controls.patch + 0002-Smack-Improve-access-check-performance.patch + 0003-Smack-Add-smkfstransmute-mount-option.patch + 0004-Smack-Fix-possible-NULL-pointer-dereference-at-smk_n.patch + 0005-Smack-Fix-the-bug-smackcipso-can-t-set-CIPSO-correct.patch + 0006-Security-Add-Hook-to-test-if-the-particular-xattr-is.patch + 0007-xattr-Constify-name-member-of-struct-xattr.patch + 0008-security-smack-fix-memleak-in-smk_write_rules_list.patch + 0009-security-smack-add-a-hash-table-to-quicken-smk_find_.patch + 0010-Smack-network-label-match-fix.patch + 0011-Smack-IPv6-casting-error-fix-for-3.11.patch + 0012-Smack-parse-multiple-rules-per-write-to-load2-up-to-.patch + 0013-Smack-Implement-lock-security-mode.patch + 0014-Smack-Ptrace-access-check-mode.patch + 0015-smack-fix-allow-either-entry-be-missing-on-access-ac.patch + 0016-Smack-Prevent-the-and-labels-from-being-used-in-SMAC.patch + 0017-Smack-Make-the-syslog-control-configurable.patch + 0018-Smack-change-rule-cap-check.patch + 0019-Smack-Rationalize-mount-restrictions.patch + 0020-Smack-File-receive-audit-correction.patch + 0021-smack-call-WARN_ONCE-instead-of-calling-audit_log_st.patch + + +Set 2: from 3.14 to 3.19 + + 0022-smack-fix-key-permission-verification.patch + 0023-Minor-improvement-of-smack_sb_kern_mount.patch + 0024-Smack-fix-the-subject-object-order-in-smack_ptrace_t.patch + 0025-Smack-unify-all-ptrace-accesses-in-the-smack.patch + 0026-Smack-adds-smackfs-ptrace-interface.patch + 0027-bugfix-patch-for-SMACK.patch + 0028-SMACK-Fix-handling-value-NULL-in-post-setxattr.patch + 0029-Smack-Correctly-remove-SMACK64TRANSMUTE-attribute.patch + 0030-Smack-bidirectional-UDS-connect-check.patch + 0031-Smack-Verify-read-access-on-file-open-v3.patch + 0032-Smack-Label-cgroup-files-for-systemd.patch + 0033-Warning-in-scanf-string-typing.patch + 0034-Smack-fix-behavior-of-smack_inode_listsecurity.patch + 0035-Smack-handle-zero-length-security-labels-without-pan.patch + 0036-Smack-remove-unneeded-NULL-termination-from-securtit.patch + 0037-Smack-Fix-setting-label-on-successful-file-open.patch + 0038-Smack-Bring-up-access-mode.patch + 0039-Small-fixes-in-comments-describing-function-paramete.patch + 0040-Fix-a-bidirectional-UDS-connect-check-typo.patch + 0041-Make-Smack-operate-on-smack_known-struct-where-it-st.patch + 0042-Smack-Lock-mode-for-the-floor-and-hat-labels.patch + 0043-Security-smack-replace-kzalloc-with-kmem_cache-for-i.patch + 0044-security-smack-fix-out-of-bounds-access-in-smk_parse.patch + +Set 3: from 3.19 to 4.0 + + 0045-smack-miscellaneous-small-fixes-in-function-comments.patch + 0046-smack-fix-logic-in-smack_inode_init_security-functio.patch + 0047-smack-introduce-a-special-case-for-tmpfs-in-smack_d_.patch + 0048-smack-Fix-a-bidirectional-UDS-connect-check-typo.patch + 0049-Smack-Rework-file-hooks.patch + 0050-Smack-secmark-support-for-netfilter.patch + 0051-smack-Add-missing-logging-in-bidirectional-UDS-conne.patch + 0052-smack-fix-possible-use-after-frees-in-task_security-.patch + 0053-Smack-Repair-netfilter-dependency.patch + 0054-Smack-secmark-connections.patch + +Some rewritting occured to avoid to take the commits below that are +affecting smack codes without being important for smack. + + f589594 KEYS: Move the flags representing required permission to linux/key.h + 41c3bd2 netlabel: fix a problem when setting bits below the previously lowest bit + 4b8feff netlabel: fix the horribly broken catmap functions + 4fbe63d netlabel: shorter names for the NetLabel catmap funcs/structs + e0b93ed security: make security_file_set_fowner, f_setown and __f_setown void return + a455589 assorted conversions to %p[dD] + +Some caution has to be taken about evolution of netlabel that is not +integrated. + +Here is the short log of the commit integrated (not the one prefixed +with sharp). + + c673944 Smack: Local IPv6 port based controls + 2f823ff Smack: Improve access check performance + e830b39 Smack: Add smkfstransmute mount option + 8cd77a0 Smack: Fix possible NULL pointer dereference at smk_netlbl_mls() + 0fcfee6 Smack: Fix the bug smackcipso can't set CIPSO correctly + 746df9b Security: Add Hook to test if the particular xattr is part of a MAC model. + 9548906 xattr: Constify ->name member of "struct xattr". + 470043b security: smack: fix memleak in smk_write_rules_list() + 4d7cf4a security: smack: add a hash table to quicken smk_find_entry() + 677264e Smack: network label match fix + 6ea0624 Smack: IPv6 casting error fix for 3.11 + 10289b0 Smack: parse multiple rules per write to load2, up to PAGE_SIZE-1 bytes + c0ab6e5 Smack: Implement lock security mode + b5dfd80 Smack: Ptrace access check mode + 398ce07 smack: fix: allow either entry be missing on access/access2 check (v2) + 19760ad Smack: Prevent the * and @ labels from being used in SMACK64EXEC + 00f84f3 Smack: Make the syslog control configurable + 4afde48 Smack: change rule cap check + 24ea1b6 Smack: Rationalize mount restrictions + 4482a44 Smack: File receive audit correction + 4eb0f4a smack: call WARN_ONCE() instead of calling audit_log_start() + # f589594 KEYS: Move the flags representing required permission to linux/key.h + fffea21 smack: fix key permission verifgit checkout ication + 55dfc5d Minor improvement of 'smack_sb_kern_mount' + 959e6c7 Smack: fix the subject/object order in smack_ptrace_traceme() + 5663884 Smack: unify all ptrace accesses in the smack + 6686781 Smack: adds smackfs/ptrace interface + 5e9ab59 bugfix patch for SMACK + 9598f4c SMACK: Fix handling value==NULL in post setxattr + f59bdfb Smack: Correctly remove SMACK64TRANSMUTE attribute + 54e70ec Smack: bidirectional UDS connect check + a6834c0 Smack: Verify read access on file open - v3 + 36ea735 Smack: Label cgroup files for systemd + ec554fa Warning in scanf string typing + # 41c3bd2 netlabel: fix a problem when setting bits below the previously lowest bit + # 4b8feff netlabel: fix the horribly broken catmap functions + # 4fbe63d netlabel: shorter names for the NetLabel catmap funcs/structs + fd5c9d2 Smack: fix behavior of smack_inode_listsecurity + b862e56 Smack: handle zero-length security labels without panic + da1b635 Smack: remove unneeded NULL-termination from securtity label + d83d2c2 Smack: Fix setting label on successful file open + d166c80 Smack: Bring-up access mode + e95ef49 Small fixes in comments describing function parameters + d0175790 Fix a bidirectional UDS connect check typo + 21c7eae Make Smack operate on smack_known struct where it still used char* + # e0b93ed security: make security_file_set_fowner, f_setown and __f_setown void return + 6c892df Smack: Lock mode for the floor and hat labels + 1a5b472 Security: smack: replace kzalloc with kmem_cache for inode_smack + # a455589 assorted conversions to %p[dD] + 5c1b662 security: smack: fix out-of-bounds access in smk_parse_smack() + 1a28979 smack: miscellaneous small fixes in function comments + 68390cc smack: fix logic in smack_inode_init_security function + 1d8c232 smack: introduce a special case for tmpfs in smack_d_instantiate() + 96be7b5 smack: Fix a bidirectional UDS connect check typo + 5e7270a Smack: Rework file hooks + 69f287a Smack: secmark support for netfilter + 138a868 smack: Add missing logging in bidirectional UDS connect check + 6d1cff2 smack: fix possible use after frees in task_security() callers + 82b0b2c Smack: Repair netfilter dependency + 7f368ad Smack: secmark connections + # 8802565 Smack: Use d_is_positive() rather than testing dentry->d_inode + + |