[apparmor] [PATCH] apparmor: Add network debugging mode

John Johansen john.johansen at canonical.com
Fri Apr 6 22:03:43 UTC 2012


On 04/06/2012 02:30 PM, Jeff Mahoney wrote:
> Hi all -
> 
Hey Jeff

> Here's a patch to implement network rule debugging for apparmor_parser.
>
thanks,

> I have already integrated our AppArmor network extensions with 3.4-rc1
> and can post those if there is interest in including them upstream.
> We've been dragging around the network rule code for a while already.
> 
oh please do, there are network extension/improvement patches that are
a work in progress, if things work out we should have much better
networking support in the 3.0 release.

Out of curiosity what patches did you use for 3.4?  I have been meaning
to send you the revisions to the compatibility patches for 3.4.


> Please CC me on replies as I'm not on the list.
> 
> -Jeff
> 
> ---
> 
> While integrating 3.4-rc1, I ran into a problem where network rules
> weren't being processed. It ultimately boiled down to a kernel issue
> but I found it useful to see what the parser thought it was working
> with. Since the parser already has a debugging mode that will show things
> like capabilities, it was an obvious extension to add network rules.
> 
> Signed-off-by: Jeff Mahoney <jeffm at suse.com>

There are a couple of compile warnings that I will fix but other than that
it looks good to me

Acked-by: John Johansen <john.johansen at canonical.com>

> ---
>  parser/parser_misc.c |  104 ++++++++++++++++++++++++++++++++++++++++++++++++++-
>  1 file changed, 103 insertions(+), 1 deletion(-)
> 
> --- a/parser/parser_misc.c
> +++ b/parser/parser_misc.c
> @@ -178,7 +178,13 @@ struct network_tuple {
>  
>  /* used by af_name.h to auto generate table entries for "name", AF_NAME
>   * pair */
> -#define AA_GEN_NET_ENT(name, AF) {name, AF, "stream", SOCK_STREAM, "", 0xffffff}, {name, AF, "dgram", SOCK_DGRAM, "", 0xffffff}, {name, AF, "seqpacket", SOCK_SEQPACKET, "", 0xffffff}, {name, AF, "rdm", SOCK_RDM, "", 0xffffff}, {name, AF, "raw", SOCK_RAW, "", 0xffffff}, {name, AF, "packet", SOCK_PACKET, "", 0xffffff},
> +#define AA_GEN_NET_ENT(name, AF) \
> +	{name, AF, "stream",    SOCK_STREAM,    "", 0xffffff}, \
> +	{name, AF, "dgram",     SOCK_DGRAM,     "", 0xffffff}, \
> +	{name, AF, "seqpacket", SOCK_SEQPACKET, "", 0xffffff}, \
> +	{name, AF, "rdm",       SOCK_RDM,       "", 0xffffff}, \
> +	{name, AF, "raw",       SOCK_RAW,       "", 0xffffff}, \
> +	{name, AF, "packet",    SOCK_PACKET,    "", 0xffffff},
>  /*FIXME: missing {name, AF, "dccp", SOCK_DCCP, "", 0xfffffff}, */
>  
>  static struct network_tuple network_mappings[] = {
> @@ -908,6 +914,100 @@ void debug_capabilities(struct codomain
>  		__debug_capabilities(cod->set_caps, "Set Capabilities");
>  }
>  
> +const char *sock_types[] = {
> +	[0] = "none",
> +	[SOCK_STREAM] = "stream",
> +	[SOCK_DGRAM] = "dgram",
> +	[SOCK_RAW] = "raw",
> +	[SOCK_RDM] = "rdm",
> +	[SOCK_SEQPACKET] = "seqpacket",
> +	[SOCK_PACKET] = "packet",
> +	/*
> +	 * See comment above
> +	[SOCK_DCCP] = "dccp",
> +	*/
> +};
> +#define ALL_TYPES 0x43e
> +
> +#undef AA_GEN_NET_ENT
> +#define AA_GEN_NET_ENT(name, AF) [AF] = name,
> +
> +static const char *network_families[] = {
> +#include "af_names.h"
> +};
> +
> +void __debug_network(unsigned int *array, const char *name)
> +{
> +	int count = sizeof(sock_types)/sizeof(sock_types[0]);
> +	unsigned int mask = ~((1 << count) -1);
> +	unsigned int i, j;
> +	int none = 1;
> +	size_t af_max = get_af_max();
> +
> +	for (i = AF_UNSPEC; i < af_max; i++)
> +		if (array[i]) {
> +			none = 0;
> +			break;
> +		}
> +
> +	if (none)
> +		return;
> +
> +	printf("%s: ", name);
> +
> +	/* This can only be set by an unqualified network rule */
> +	if (array[AF_UNSPEC]) {
> +		printf("<all>\n");
> +		return;
> +	}
> +
> +	for (i = 0; i < af_max; i++) {
> +		if (array[i]) {
> +			const char *fam = network_families[i];
> +			int brackets = 0;
> +			if (fam)
> +				printf("%s ", fam);
> +			else
> +				printf("#%u ", i);
> +
> +			/* All types/protocols */
> +			if (array[i] == 0xffffffff || array[i] == ALL_TYPES)
> +				continue;
> +
> +			printf("{ ");
> +
> +			for (j = 0; j < count; j++) {
> +				const char *type;
> +				if (array[i] & (1 << j)) {
> +					type = sock_types[j];
> +					if (type)
> +						printf("%s ", type);
> +					else
> +						printf("#%u ", j);
> +				}
> +			}
> +			if (array[i] & mask)
> +				printf("#%x ", array[i] & mask);
> +
> +			printf("} ");
> +		}
> +	}
> +	printf("\n");
> +}
> +
> +void debug_network(struct codomain *cod)
> +{
> +	if (cod->network_allowed)
> +		__debug_network(cod->network_allowed, "Network");
> +	if (cod->audit_network)
> +		__debug_network(cod->audit_network, "Audit Net");
> +	if (cod->deny_network)
> +		__debug_network(cod->deny_network, "Deny Net");
> +	if (cod->quiet_network)
> +		__debug_network(cod->quiet_network, "Quiet Net");
> +
> +}
> +
>  void debug_cod_list(struct codomain *cod)
>  {
>  	if (cod->namespace)
> @@ -925,6 +1025,8 @@ void debug_cod_list(struct codomain *cod
>  	
>  	debug_capabilities(cod);
>  
> +	debug_network(cod);
> +
>  	if (cod->entries)
>  		debug_cod_entries(cod->entries);
>  




More information about the AppArmor mailing list