public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [AppArmor #5 0/13] AppArmor security module
@ 2010-07-15  0:43 John Johansen
  2010-07-15  0:43 ` [PATCH 01/13] AppArmor: misc. base functions and defines John Johansen
                   ` (13 more replies)
  0 siblings, 14 replies; 28+ messages in thread
From: John Johansen @ 2010-07-15  0:43 UTC (permalink / raw)
  To: linux-kernel; +Cc: linux-security-module

This is the fifth general posting of the newest version of the
AppArmor security module it has been rewritten to use the security_path
hooks instead of the previous vfs approach.  The current implementation
is aimed at being as semantically close to previous versions of AppArmor
as possible while using the existing LSM infrastructure.

Development is on going and
improvements to file, capability, network, resource usage and ipc mediation
are planned.

With this submission we believe AppArmor is ready for inclusion into
the kernel.

_Issues NOT specifically addressed_
* The d_namespace_path function still manually strips the " (deleted)"
  string that __d_path appends.  A fix to __d_path is being pursued
  independently of the AppArmor submission.

_Issues Addressed Since Last Time AppArmor was Posted_
* AppArmor auditing has been converted to use lsm_audit as suggested by
  Eric Paris in
  http://marc.info/?l=linux-security-module&m=125778105017307&w=2
* The user space interface CONFIG_APPARMOR_COMPAT_24 has not been removed,
  as the replacement interface isn't ready yet.  It will become a separate
  patch that distros can carry to provide backwards compatibility.
* AppArmor's old network mediation has been removed and moved into
  the compatibility patch.  The new network mediation routines will
  be submitted for review separate for the AppArmor base.
* all issues raised from last posting should be addressed.
* The code has seen more cleanup removing dead code. eg. // as null transition
* Several bug fixes have been applied

  A Detailed list of all changes and patches are available from the AppArmor
  git repository


The AppArmor project has recently transitioned away from Novell forge.
Code and Documentation can be found at the following locations
* Mailing List - apparmor@lists.ubuntu.com
* Documentation (wip) - http://apparmor.wiki.kernel.org/
* User space tools -  https://launchpad.net/apparmor
* Kernel module -
  git://git.kernel.org/pub/scm/linux/kernel/git/jj/apparmor-dev.git



^ permalink raw reply	[flat|nested] 28+ messages in thread
* [AppArmor #6 0/13] AppArmor security module
@ 2010-07-27  2:57 John Johansen
  2010-07-27  2:57 ` [PATCH 11/13] AppArmor: LSM interface, and security module initialization John Johansen
  0 siblings, 1 reply; 28+ messages in thread
From: John Johansen @ 2010-07-27  2:57 UTC (permalink / raw)
  To: linux-kernel; +Cc: linux-security-module

This is the sixth general posting of the newest version of the
AppArmor security module it has been rewritten to use the security_path
hooks instead of the previous vfs approach.  The current implementation
is aimed at being as semantically close to previous versions of AppArmor
as possible while using the existing LSM infrastructure.

Development is on going and
improvements to file, capability, network, resource usage and ipc mediation
are planned.

With this submission we believe AppArmor is ready for inclusion into
the kernel.

_Issues NOT specifically addressed_
* The d_namespace_path function still manually strips the " (deleted)"
  string that __d_path appends.  A fix to __d_path is being pursued
  independently of the AppArmor submission.

  http://lkml.org/lkml/2010/7/6/186

_Issues Addressed Since Last Time AppArmor was Posted_

All changes requested by feed back
* converted mediation of sysctls away from using security_sysctl to denty_open
* split aa_audit into profile dependent and profile independent parts, allowed
  * removal of profile conditional test from mode tests
* converted custom COMMON_AUDIT_DATA_INIT_NONE to COMMON_AUDIT_DATA_INIT
* removed dead NULL profile test in aa_may_ptrace
* updated __aa_transition_rlimits to require a profile
* General comment update, syncing comment headers to functions, updating
  TODO items, ..
* removed declarations of fns that no longer exist from includes
* remove explicit \0 from aa_dfa_null_transition
* add comment about change_hat_v tokenization
* add __init to aa_free_root_ns
* Move free inside of dfa test in dfa_free
* fix apparmor_setprocattr to allow PAGE_SIZE writes as long as they are
  \0 terminated
* replace , in aa_info_message with a ;
* rework aa_strneq as suggested by Tetsuo Handa
* remove unneeded incrementing of string pos at terminal character of permission
  string generation
* remove setting of hat info when hat not found in change_hat
* remove unused aa_fs_null and aa_fs_mnt
* cleanup simple write to buffer returns
* fix kvmalloc, vmalloc allocations to ensure that they are at least the size
  of work_struct
* remove extraneous !buffer tests when freeing memory in kvfree
* cleanup if condition in apparmor_capable
* Maks permitted caps returned by capget
* Fix missing call to cap_ptrace_traceme from apparmor_ptrace_traceme
* Remove unused mmap_min_addr bit
* Convert auditing to use namespace field instead of apparmors fully qualified
  domain names

Misc fixes and cleanups as result of above changes
* changed apparmor type reporting from audit= to apparmor= name pair so as
  not to have duplicate audit= name,value pair
* turn on apparmor audit type reporting by default
* converted change_profile onexec parameter of
* merged kvmalloc and dfa variation into a single lib kvmalloc routine
* fixed meta_read permission mapping bug
* removed redundant pid= in audit output
* removed unused delegate information removed from apparmor permission struct

  A Detailed list of all changes and patches are available from the AppArmor
  git repository, from commit a861e63c970d912a59c194be0fe09975c10b6a9a..


The AppArmor project has recently transitioned away from Novell forge.
Code and Documentation can be found at the following locations
* Mailing List - apparmor@lists.ubuntu.com
* Documentation (wip) - http://apparmor.wiki.kernel.org/
* User space tools -  https://launchpad.net/apparmor
* Kernel module -
  git://git.kernel.org/pub/scm/linux/kernel/git/jj/apparmor-dev.git



^ permalink raw reply	[flat|nested] 28+ messages in thread
* [AppArmor #7 0/13] AppArmor security module
@ 2010-07-29 21:47 John Johansen
  2010-07-29 21:48 ` [PATCH 11/13] AppArmor: LSM interface, and security module initialization John Johansen
  0 siblings, 1 reply; 28+ messages in thread
From: John Johansen @ 2010-07-29 21:47 UTC (permalink / raw)
  To: linux-kernel; +Cc: linux-security-module

This is the seveth general posting of the newest version of the
AppArmor security module it has been rewritten to use the security_path
hooks instead of the previous vfs approach.  The current implementation
is aimed at being as semantically close to previous versions of AppArmor
as possible while using the existing LSM infrastructure.

Development is on going and
improvements to file, capability, network, resource usage and ipc mediation
are planned.

With this submission we believe AppArmor is ready for inclusion into
the kernel.

_Issues NOT specifically addressed_
* The d_namespace_path function still manually strips the " (deleted)"
  string that __d_path appends.  A fix to __d_path is being pursued
  independently of the AppArmor submission.

  http://lkml.org/lkml/2010/7/6/186

_Issues Addressed Since Last Time AppArmor was Posted_

All changes requested by feed back
* Add comment for embedded \0 in fqnames and their validation
* Add comment for kvmalloc minimum size of work_struct when falling back
  to vmalloc
* Spell check of comments and general cleanup any need change found during
  the spell check.
* updated aa_info_message
* removed extraneous if (profile) checks
* removed unused AA_NEW_SID symbol
* added __init and __initdata to fns and variables where appropriate
* removed patch text not related to apparmor that was being added to
  Documentation/kernel-parameters.txt

Misc fixes and cleanups as result of above changes
* fixed missing include for vmalloc.h in lib.c that would cause build failure
  on some platforms
* Added simple Documentation/apparmor.txt

  A Detailed list of all changes and patches are available from the AppArmor
  git repository, from commit 5e43ceab0299aa8ee786e17048a31a865de3163f

The AppArmor project has recently transitioned away from Novell forge.
Code and Documentation can be found at the following locations
* Mailing List - apparmor@lists.ubuntu.com
* Documentation (wip) - http://apparmor.wiki.kernel.org/
* User space tools -  https://launchpad.net/apparmor
* Kernel module -
  git://git.kernel.org/pub/scm/linux/kernel/git/jj/apparmor-dev.git



^ permalink raw reply	[flat|nested] 28+ messages in thread

end of thread, other threads:[~2010-07-29 21:49 UTC | newest]

Thread overview: 28+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-07-15  0:43 [AppArmor #5 0/13] AppArmor security module John Johansen
2010-07-15  0:43 ` [PATCH 01/13] AppArmor: misc. base functions and defines John Johansen
2010-07-15  0:43 ` [PATCH 02/13] AppArmor: basic auditing infrastructure John Johansen
2010-07-15 15:18   ` Eric Paris
2010-07-15 16:36     ` John Johansen
2010-07-15 17:36       ` Eric Paris
2010-07-15 18:07         ` John Johansen
2010-07-15  0:43 ` [PATCH 03/13] AppArmor: contexts used in attaching policy to system objects John Johansen
2010-07-15  0:43 ` [PATCH 04/13] AppArmor: core policy routines John Johansen
2010-07-15 15:33   ` Eric Paris
2010-07-15 16:40     ` John Johansen
2010-07-15  0:43 ` [PATCH 05/13] AppArmor: dfa match engine John Johansen
2010-07-15  0:43 ` [PATCH 06/13] AppArmor: policy routines for loading and unpacking policy John Johansen
2010-07-15  0:43 ` [PATCH 07/13] AppArmor: userspace interfaces John Johansen
2010-07-15  0:43 ` [PATCH 08/13] AppArmor: file enforcement routines John Johansen
2010-07-15  0:43 ` [PATCH 09/13] AppArmor: mediation of non file objects John Johansen
2010-07-15  0:43 ` [PATCH 10/13] AppArmor: domain functions for domain transition John Johansen
2010-07-15  0:43 ` [PATCH 11/13] AppArmor: LSM interface, and security module initialization John Johansen
2010-07-15 17:27   ` Serge E. Hallyn
2010-07-15 18:04     ` John Johansen
2010-07-15  0:43 ` [PATCH 12/13] AppArmor: Enable configuring and building of the AppArmor security module John Johansen
2010-07-15  0:43 ` [PATCH 13/13] AppArmor: update Maintainer and Documentation/kernel-parameters.txt John Johansen
2010-07-15 13:06 ` [AppArmor #5 0/13] AppArmor security module Miklos Szeredi
2010-07-16  5:21   ` Tetsuo Handa
2010-07-16 16:37     ` John Johansen
2010-07-17  7:41       ` Tetsuo Handa
  -- strict thread matches above, loose matches on Subject: below --
2010-07-27  2:57 [AppArmor #6 " John Johansen
2010-07-27  2:57 ` [PATCH 11/13] AppArmor: LSM interface, and security module initialization John Johansen
2010-07-29 21:47 [AppArmor #7 0/13] AppArmor security module John Johansen
2010-07-29 21:48 ` [PATCH 11/13] AppArmor: LSM interface, and security module initialization John Johansen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox