From: Eric Paris <eparis-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
To: Gao feng <gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
Cc: containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org,
linux-audit-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
Subject: Re: [PATCH RFC 00/48] Add namespace support for audit
Date: Wed, 08 May 2013 12:55:12 -0400 [thread overview]
Message-ID: <1368032112.2139.0.camel@localhost> (raw)
In-Reply-To: <1367893269-9308-1-git-send-email-gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
What kernel are these patches against?
On Tue, 2013-05-07 at 10:20 +0800, Gao feng wrote:
> This patchset try to add namespace support for audit.
>
> I choose to assign audit to the user namespace.
> Right now,there are six kinds of namespaces, such as
> net, mount, ipc, pid, uts and user. the first five
> namespaces have special usage. the audit isn't suitable to
> belong to these five namespaces, so the user namespace
> may be the best choice.
>
> Through I decide to make audit related resources per user
> namespace, but audit uses netlink to communicate between kernel
> space and user space, and the netlink is a private resource
> of per net namespace. So we need the capability to allow the
> netlink sockets to communicate with each other in the same user
> namespace even they are in different net namespace. [PATCH 2/48]
> does this job, it adds a new function "compare" for per netlink
> table to compare two sockets. it means the netlink protocols can
> has its own compare fuction, For other protocols, two netlink
> sockets are different if they belong to the different net namespace.
> For audit protocol, two sockets can be the same even they in different
> net namespace,we use user namespace not net namespace to make the
> decision.
>
> There is one point that some people may dislike,in [PATCH 1/48],
> the kernel side audit netlink socket is created only when we create
> the first netns for the userns, and this userns will hold the netns
> until we destroy this userns.
>
> The other patches just make the audit related resources per
> user namespace.
>
> This patchset is sent as an RFC,any comments are welcome.
>
> Gao feng (48):
> Audit: make audit kernel side netlink sock per userns
> netlink: Add compare function for netlink_table
> Audit: implement audit self-defined compare function
> Audit: make audit_skb_queue per user namespace
> Audit: make audit_skb_hold_queue per user namespace
> Audit: make kauditd_task per user namespace
> Audit: make audit_pid per user namespace
> Audit: make audit_nlk_portid per user namesapce
> Audit: make audit_enabled per user namespace
> Audit: change type of audit_ever_enabled to bool
> Audit: make audit_ever_enabled per user namespace
> Audit: make audit_initialized per user namespace
> Audit: only allow init user namespace to change audit_rate_limit
> Audit: only allow init user namespace to change audit_failure
> Audit: allow to send netlink message to auditd in uninit user
> namespace
> Audit: user proper user namespace in audit_log_config_change
> Audit: make kauditd_wait per user namespace
> Audit: make audit_backlog_wait per user namespace
> Audit: remove duplicate comments
> Audit: introduce new audit logging interface for user namespace
> Audit: pass proper user namespace to audit_log_common_recv_msg
> Audit: Log audit config change in uninit user namespace
> Audit: netfilter: Log xt table replace behavior in proper user
> namespace
> Audit: xt_AUDIT: Log audit message in proper user namespace
> Audit: send reply message to the auditd in proper user namespace
> Audit: make audit_inode_hash per user namespace
> Audit: make tree_list per user namespace
> Audit: make audit filter list per user namespace
> Audit: make audit_krule belongs to user namespace
> Audit: reply audit filter list request to proper user namespace
> Audit: pass proper user namespace to audit_filter_syscall
> Audit: pass proper user namespace to audit_filter_inode_name
> Audit: Log filter related audit message to proper user namespace
> Log audit tree related message in proper user namespace
> Audit: Log task related audit message to proper user namespace
> Audit: Log watch related audit message to proper user namespace
> Audit: translate audit_log_start to audit_log_start_ns
> Audit: tty: translate audit_log_start to audit_log_start_ns
> Audit: netlabel: translate audit_log_start to audit_log_start_ns
> Audit: ima: translate audit_log_start to audit_log_start_ns
> Audit: lsm: translate audit_log_start to audit_log_start_ns
> Audit: selinux: translate audit_log_start to audit_log_start_ns
> Audit: xfrm: translate audit_log_start to audit_log_start_ns
> Audit: rename audit_log_start_ns to audit_log_start
> Audit: user audit_enabled_ns to replace audit_enabled
> Audit: rename audit_enabled_ns to audit_enabled
> Audit: make audit_log user namespace awared
> Audit: allow root user of un-init user namespace to set audit
>
> drivers/tty/tty_audit.c | 9 +-
> include/linux/audit.h | 44 ++--
> include/linux/netlink.h | 1 +
> include/linux/user_namespace.h | 25 +++
> include/net/xfrm.h | 7 +-
> kernel/audit.c | 393 +++++++++++++++++++++---------------
> kernel/audit.h | 24 +--
> kernel/audit_tree.c | 49 ++---
> kernel/audit_watch.c | 23 ++-
> kernel/auditfilter.c | 76 +++----
> kernel/auditsc.c | 156 ++++++++------
> kernel/user.c | 19 ++
> kernel/user_namespace.c | 3 +
> net/core/dev.c | 12 +-
> net/ipv4/cipso_ipv4.c | 4 +-
> net/netfilter/x_tables.c | 9 +-
> net/netfilter/xt_AUDIT.c | 8 +-
> net/netlabel/netlabel_domainhash.c | 4 +-
> net/netlabel/netlabel_unlabeled.c | 8 +-
> net/netlabel/netlabel_user.c | 8 +-
> net/netlink/af_netlink.c | 26 ++-
> net/netlink/af_netlink.h | 1 +
> net/xfrm/xfrm_policy.c | 4 +-
> net/xfrm/xfrm_state.c | 14 +-
> security/apparmor/lib.c | 2 +-
> security/integrity/ima/ima_api.c | 5 +-
> security/integrity/ima/ima_audit.c | 11 +-
> security/integrity/ima/ima_policy.c | 5 +-
> security/lsm_audit.c | 8 +-
> security/selinux/avc.c | 3 +-
> security/selinux/hooks.c | 17 +-
> security/selinux/selinuxfs.c | 9 +-
> security/selinux/ss/services.c | 30 ++-
> security/smack/smack_lsm.c | 3 +-
> 34 files changed, 630 insertions(+), 390 deletions(-)
>
next prev parent reply other threads:[~2013-05-08 16:55 UTC|newest]
Thread overview: 65+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-05-07 2:20 [PATCH RFC 00/48] Add namespace support for audit Gao feng
[not found] ` <1367893269-9308-1-git-send-email-gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-05-07 2:20 ` [PATCH RFC 01/48] Audit: make audit kernel side netlink sock per userns Gao feng
2013-05-07 2:20 ` [PATCH RFC 02/48] netlink: Add compare function for netlink_table Gao feng
2013-05-07 2:20 ` [PATCH RFC 03/48] Audit: implement audit self-defined compare function Gao feng
2013-05-07 2:20 ` [PATCH RFC 04/48] Audit: make audit_skb_queue per user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 05/48] Audit: make audit_skb_hold_queue " Gao feng
2013-05-07 2:20 ` [PATCH RFC 06/48] Audit: make kauditd_task " Gao feng
[not found] ` <1367893269-9308-7-git-send-email-gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-05-21 9:15 ` Gao feng
2013-05-07 2:20 ` [PATCH RFC 07/48] Audit: make audit_pid " Gao feng
2013-05-07 2:20 ` [PATCH RFC 08/48] Audit: make audit_nlk_portid per user namesapce Gao feng
2013-05-07 2:20 ` [PATCH RFC 09/48] Audit: make audit_enabled per user namespace Gao feng
[not found] ` <1367893269-9308-10-git-send-email-gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-05-07 15:44 ` Aristeu Rozanski
2013-05-08 5:22 ` Gao feng
2013-05-07 2:20 ` [PATCH RFC 10/48] Audit: change type of audit_ever_enabled to bool Gao feng
[not found] ` <1367893269-9308-11-git-send-email-gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-05-08 2:06 ` Matt Helsley
[not found] ` <20130508020626.GD24627-r/Jw6+rmf7HQT0dZR+AlfA@public.gmane.org>
2013-05-08 5:24 ` Gao feng
2013-05-07 2:20 ` [PATCH RFC 11/48] Audit: make audit_ever_enabled per user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 12/48] Audit: make audit_initialized " Gao feng
2013-05-07 2:20 ` [PATCH RFC 13/48] Audit: only allow init user namespace to change audit_rate_limit Gao feng
2013-05-07 2:20 ` [PATCH RFC 14/48] Audit: only allow init user namespace to change audit_failure Gao feng
2013-05-07 2:20 ` [PATCH RFC 16/48] Audit: user proper user namespace in audit_log_config_change Gao feng
2013-05-07 2:20 ` [PATCH RFC 17/48] Audit: make kauditd_wait per user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 18/48] Audit: make audit_backlog_wait " Gao feng
2013-05-07 2:20 ` [PATCH RFC 19/48] Audit: remove duplicate comments Gao feng
2013-05-07 2:20 ` [PATCH RFC 20/48] Audit: introduce new audit logging interface for user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 21/48] Audit: pass proper user namespace to audit_log_common_recv_msg Gao feng
2013-05-07 2:20 ` [PATCH RFC 22/48] Audit: Log audit config change in uninit user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 23/48] Audit: netfilter: Log xt table replace behavior in proper " Gao feng
2013-05-07 2:20 ` [PATCH RFC 24/48] Audit: xt_AUDIT: Log audit message " Gao feng
2013-05-07 2:20 ` [PATCH RFC 25/48] Audit: send reply message to the auditd " Gao feng
2013-05-07 2:20 ` [PATCH RFC 26/48] Audit: make audit_inode_hash per " Gao feng
2013-05-07 2:20 ` [PATCH RFC 28/48] Audit: make audit filter list " Gao feng
2013-05-07 2:20 ` [PATCH RFC 29/48] Audit: make audit_krule belongs to " Gao feng
2013-05-07 2:20 ` [PATCH RFC 30/48] Audit: reply audit filter list request to proper " Gao feng
2013-05-07 2:20 ` [PATCH RFC 32/48] Audit: pass proper user namespace to audit_filter_inode_name Gao feng
2013-05-07 2:20 ` [PATCH RFC 34/48] Log audit tree related message in proper user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 35/48] Audit: Log task related audit message to " Gao feng
2013-05-07 2:20 ` [PATCH RFC 36/48] Audit: Log watch " Gao feng
2013-05-07 2:20 ` [PATCH RFC 37/48] Audit: translate audit_log_start to audit_log_start_ns Gao feng
2013-05-07 2:21 ` [PATCH RFC 40/48] Audit: ima: " Gao feng
2013-05-08 16:55 ` Eric Paris [this message]
2013-05-09 1:13 ` [PATCH RFC 00/48] Add namespace support for audit Gao feng
2013-05-21 9:15 ` Gao feng
[not found] ` <519B3B4E.1070405-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-06-06 21:52 ` Serge Hallyn
2013-06-06 22:47 ` Serge Hallyn
2013-06-10 1:54 ` Gao feng
[not found] ` <51B531CC.2020604-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-06-10 21:24 ` Serge E. Hallyn
[not found] ` <20130610212437.GA11940-anj0Drq5vpzx6HRWoRZK3AC/G2K4zDHf@public.gmane.org>
2013-06-11 5:59 ` Gao feng
[not found] ` <51B6BCBE.7060608-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org>
2013-06-11 13:49 ` Eric Paris
2013-06-11 14:15 ` Serge E. Hallyn
2013-06-13 6:02 ` Gao feng
2013-05-07 2:20 ` [PATCH RFC 15/48] Audit: allow to send netlink message to auditd in uninit user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 27/48] Audit: make tree_list per " Gao feng
2013-05-07 2:20 ` [PATCH RFC 31/48] Audit: pass proper user namespace to audit_filter_syscall Gao feng
2013-05-07 2:20 ` [PATCH RFC 33/48] Audit: Log filter related audit message to proper user namespace Gao feng
2013-05-07 2:20 ` [PATCH RFC 38/48] Audit: tty: translate audit_log_start to audit_log_start_ns Gao feng
2013-05-07 2:21 ` [PATCH RFC 39/48] Audit: netlabel: " Gao feng
2013-05-07 2:21 ` [PATCH RFC 41/48] Audit: lsm: " Gao feng
2013-05-07 2:21 ` [PATCH RFC 42/48] Audit: selinux: " Gao feng
2013-05-07 2:21 ` [PATCH RFC 43/48] Audit: xfrm: " Gao feng
2013-05-07 2:21 ` [PATCH RFC 44/48] Audit: rename audit_log_start_ns to audit_log_start Gao feng
2013-05-07 2:21 ` [PATCH RFC 45/48] Audit: user audit_enabled_ns to replace audit_enabled Gao feng
2013-05-07 2:21 ` [PATCH RFC 46/48] Audit: rename audit_enabled_ns to audit_enabled Gao feng
2013-05-07 2:21 ` [PATCH RFC 47/48] Audit: make audit_log user namespace awared Gao feng
2013-05-07 2:21 ` [PATCH RFC 48/48] Audit: allow root user of un-init user namespace to set audit Gao feng
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1368032112.2139.0.camel@localhost \
--to=eparis-h+wxahxf7alqt0dzr+alfa@public.gmane.org \
--cc=containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
--cc=gaofeng-BthXqXjhjHXQFUHtdCDX3A@public.gmane.org \
--cc=linux-audit-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).