4a7fc301 | 08-Oct-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: remove parent task info from audit logging
The reporting of the parent task info is a vestage from old versions of apparmor. The need for this information was removed by unique null- profi
apparmor: remove parent task info from audit logging
The reporting of the parent task info is a vestage from old versions of apparmor. The need for this information was removed by unique null- profiles before apparmor was upstreamed so remove this info from logging.
Signed-off-by: John Johansen <john.johansen@canonical.com>
show more ...
|
556d0be7 | 11-Jul-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: add an optional profile attachment string for profiles
Add the ability to take in and report a human readable profile attachment string for profiles so that attachment specifications can b
apparmor: add an optional profile attachment string for profiles
Add the ability to take in and report a human readable profile attachment string for profiles so that attachment specifications can be easily inspected.
Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Seth Arnold <seth.arnold@canonical.com>
show more ...
|
03816507 | 11-Jul-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: allow setting any profile into the unconfined state
Allow emulating the default profile behavior from boot, by allowing loading of a profile in the unconfined state into a new NS.
Signed-
apparmor: allow setting any profile into the unconfined state
Allow emulating the default profile behavior from boot, by allowing loading of a profile in the unconfined state into a new NS.
Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Seth Arnold <seth.arnold@canonical.com>
show more ...
|
742058b0 | 11-Jul-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: rework namespace free path
namespaces now completely use the unconfined profile to track the refcount and rcu freeing cycle. So rework the code to simplify (track everything through the pr
apparmor: rework namespace free path
namespaces now completely use the unconfined profile to track the refcount and rcu freeing cycle. So rework the code to simplify (track everything through the profile path right up to the end), and move the rcu_head from policy base to profile as the namespace no longer needs it.
Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Seth Arnold <seth.arnold@canonical.com>
show more ...
|
fa2ac468 | 11-Jul-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: update how unconfined is handled
ns->unconfined is being used read side without locking, nor rcu but is being updated when a namespace is removed. This works for the root ns which is never
apparmor: update how unconfined is handled
ns->unconfined is being used read side without locking, nor rcu but is being updated when a namespace is removed. This works for the root ns which is never removed but has a race window and can cause failures when children namespaces are removed.
Also ns and ns->unconfined have a circular refcounting dependency that is problematic and must be broken. Currently this is done incorrectly when the namespace is destroyed.
Fix this by forward referencing unconfined via the replacedby infrastructure instead of directly updating the ns->unconfined pointer.
Remove the circular refcount dependency by making the ns and its unconfined profile share the same refcount.
Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Seth Arnold <seth.arnold@canonical.com>
show more ...
|
77b071b3 | 11-Jul-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: change how profile replacement update is done
remove the use of replaced by chaining and move to profile invalidation and lookup to handle task replacement.
Replacement chaining can resul
apparmor: change how profile replacement update is done
remove the use of replaced by chaining and move to profile invalidation and lookup to handle task replacement.
Replacement chaining can result in large chains of profiles being pinned in memory when one profile in the chain is use. With implicit labeling this will be even more of a problem, so move to a direct lookup method.
Signed-off-by: John Johansen <john.johansen@canonical.com>
show more ...
|
a4987857 | 19-Feb-2013 |
John Johansen <john.johansen@canonical.com> |
apparmor: remove sid from profiles
The sid is not going to be a direct property of a profile anymore, instead it will be directly related to the label, and the profile will pickup a label back refer
apparmor: remove sid from profiles
The sid is not going to be a direct property of a profile anymore, instead it will be directly related to the label, and the profile will pickup a label back reference.
For null-profiles replace the use of sid with a per namespace unique id.
Signed-off-by: John Johansen <john.johansen@canonical.com> Acked-by: Kees Cook <kees@ubuntu.com>
show more ...
|