+ Features
  - Convert secid mapping to XArrays instead of IDR
  - Add a kernel label to use on kernel objects
  - Extend policydb permission set by making use of the xbits
  - Make export of raw binary profile to userspace optional
  - Enable tuning of policy paranoid load for embedded systems
  - Don't create raw_sha1 symlink if sha1 hashing is disabled
  - Allow labels to carry debug flags

+ Cleanups
  - Update MAINTAINERS file
  - Use struct_size() helper in kmalloc()
  - Move ptrace mediation to more logical task.{h,c}
  - Resolve uninitialized symbol warnings
  - Remove redundant ret variable
  - Mark alloc_unconfined() as static
  - Update help description of policy hash for introspection
  - Remove some casts which are no-longer required

+ Bug Fixes
  - Fix aa_label_asxprint return check
  - Fix reference count leak in aa_pivotroot()
  - Fix memleak in aa_simple_write_to_buffer()
  - Fix kernel doc comments
  - Fix absroot causing audited secids to begin with =
  - Fix quiet_denied for file rules
  - Fix failed mount permission check error message
  - Disable showing the mode as part of a secid to secctx
  - Fix setting unconfined mode on a loaded profile
  - Fix overlapping attachment computation
  - Fix undefined reference to `zlib_deflate_workspacesize'
apparmor: Update MAINTAINERS file with new email address

Add the apparmor.net email address that the project is transitioning
emails to.

Signed-off-by: John Johansen <john.johansen@canonical.com>
1 file changed