History log of /lxc/config/apparmor/abstractions/container-base
Revision Date Author Comments Expand
564ad051ce487e5f684feb4ace09545ef9e1b9d5 28-Jun-2016 Stéphane Graber <stgraber@ubuntu.com>

apparmor: Refresh generated file Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>

549a40b6128892112895299e445e0564c3faaea2 27-Jun-2016 Stéphane Graber <stgraber@ubuntu.com>

apparmor: Update mount states handling Properly list all of the states and the right apparmor stanza for them, then comment them all as actually enabling this would currently let the user bypass apparmor entirely. Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>

7e4c9a30feb3905902a158cde099f4510a54d5ef 27-Jun-2016 Stéphane Graber <stgraber@ubuntu.com>

apparmor: allow mount move Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>

9a1d96120f578d35227895aff3852ef10a9e1b1d 27-Jun-2016 Stéphane Graber <stgraber@ubuntu.com>

apparmor: Allow bind-mounts and {r}shared/{r}private Bind-mounts aren't harmful in containers, so long as they're not used to bypass MAC policies. This change allows bind-mounting of any path which isn't a dangerous filesystem that's otherwise blocked by apparmor. This also allows switching paths {r}shared or {r}private. Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>

b03f1f4ac3666abd032ddc617823213568ad577b 11-May-2016 Stéphane Graber <stgraber@ubuntu.com>

Also allow fstype=fuse for fuse filesystems Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>

4845c17aff570c25e05c5347dfdcd577cb108d47 16-Mar-2016 Serge Hallyn <serge.hallyn@ubuntu.com>

Prevent access to pci devices Prevent privileged containers from messing with the host's pci devices directly. Refuse access under /proc/bus, and drop cap_sys_rawio. Some containers may need to re-enable cap_sys_rawio (i.e. if they run an X server). It may be desirable to break some of this stuff into files which can be separately included (or not included), but this patch isn't the right place for that. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>

537188a8eefd6df82995e71f453fce4d6622b110 08-Mar-2016 Serge Hallyn <serge.hallyn@ubuntu.com>

prevent containers from reading /sys/kernel/debug Unprivileged containers cannot read it anyway, but also prevent root owned containers from doing so. Sadly upstart's mountall won't run if we try to prevent it from being mounted at all. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>

056f8bba0d86ca2ba481a932f23faff9db2ef588 07-Mar-2016 Stéphane Graber <stgraber@ubuntu.com>

Properly update the generated apparmor profiles Some changes happened but the final profiles weren't generated... Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>

98b745498bf97637f68311f944903777f3ee1e67 05-Jan-2015 Stéphane Graber <stgraber@ubuntu.com>

apparmor: Block access to /proc/kcore Just like we block access to mem and kmem, there's no good reason for the container to have access to kcore. Reported-by: Marc Schaefer Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>

807f4c9e1eaae674c76fd3a97d0b4a8810004177 29-Sep-2014 Jamie Strandboge <jamie@canonical.com>

apparmor: restrict signal and ptrace for processes Restrict signal and ptrace for processes running under the container profile. Rules based on AppArmor base abstraction. Add unix rules for processes running under the container profile. Signed-off-by: Jamie Strandboge <jamie@canonical.com> Acked-by: Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>

f2f545857cd6b06689bb1220d66d3577f802dbbc 30-Jun-2014 Jesse Tane <jesse.tane@gmail.com>

Apparmor: allow hugetlbfs mounts everywhere Signed-off-by: Jesse Tane <jesse.tane@gmail.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>

773bd28258371ad0058ff946c5cf94419920ffdd 29-Apr-2014 Serge Hallyn <serge.hallyn@ubuntu.com>

apparmor: allow writes to sem* and msg* sysctls /proc/sys/kernel/sem* and /proc/sys/kernel/msg* are ipc sysctls which are properly namespaced. Allow writes to them from containers. Reported-by: Dan Kegel <dank@kegel.com> Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>

2a31251cc5f428f96ee3d322a78556310a681e14 04-Apr-2014 Stéphane Graber <stgraber@ubuntu.com>

apparmor: Update profiles for current upstream parser Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>

94a77f3fd8be2fb87f7d1465521fac3ec4b7e6b5 02-Apr-2014 Serge Hallyn <serge.hallyn@ubuntu.com>

apparmor: deny writes to most of /proc/sys (v2) Allow writes to kernel.shm*, net.*, kernel/domainname and kernel/hostname, Also fix a bug in the lxc-generate-aa-rules.py script in a path which wasn't being exercised before, which returned a path element rather than its child. Changelog (v2): remove trailing / from block path Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>

198b363fff1de9afcee2f26b9aa847316f589afe 01-Apr-2014 Serge Hallyn <serge.hallyn@ubuntu.com>

apparmor: auto-generate the blacklist rules This uses the generate-apparmor-rules.py script I sent out some time ago to auto-generate apparmor rules based on a higher level set of block/allow rules. Add apparmor policy testcase to make sure that some of the paths we expect to be denied (and allowed) write access to are in fact in effect in the final policy. With this policy, libvirt in a container is able to start its default network, which previously it could not. v2: address feedback from stgraber put lxc-generate-aa-rules.py into EXTRA_DIST add lxc-test-apparmor, container-base and container-rules to .gitignore take lxc-test-apparmor out of EXTRA_DIST make lxc-generate-aa-rules.py pep8-compliant don't automatically generate apparmor rules This is only bc we can't be guaranteed that python3 will be available. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>

c08a0b7c4e459f32a939391bc5c9667eb7c7ab5c 03-Feb-2014 Serge Hallyn <serge.hallyn@ubuntu.com>

cgmanager: container-base apparmor abstraction: allow mount move Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>

8da250dad4b11c4983031742a83fb8f358044fe0 16-Jan-2014 Stéphane Graber <stgraber@ubuntu.com>

apparmor: Add profiles Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com>