| 564ad051ce487e5f684feb4ace09545ef9e1b9d5 |
|
28-Jun-2016 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Refresh generated file
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> |
| 549a40b6128892112895299e445e0564c3faaea2 |
|
27-Jun-2016 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Update mount states handling
Properly list all of the states and the right apparmor stanza for them,
then comment them all as actually enabling this would currently let the
user bypass apparmor entirely.
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> |
| 7e4c9a30feb3905902a158cde099f4510a54d5ef |
|
27-Jun-2016 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: allow mount move
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> |
| 9a1d96120f578d35227895aff3852ef10a9e1b1d |
|
27-Jun-2016 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Allow bind-mounts and {r}shared/{r}private
Bind-mounts aren't harmful in containers, so long as they're not used to
bypass MAC policies.
This change allows bind-mounting of any path which isn't a dangerous
filesystem that's otherwise blocked by apparmor.
This also allows switching paths {r}shared or {r}private.
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> |
| b03f1f4ac3666abd032ddc617823213568ad577b |
|
11-May-2016 |
Stéphane Graber <stgraber@ubuntu.com> |
Also allow fstype=fuse for fuse filesystems
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> |
| 4845c17aff570c25e05c5347dfdcd577cb108d47 |
|
16-Mar-2016 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
Prevent access to pci devices
Prevent privileged containers from messing with the host's pci devices
directly. Refuse access under /proc/bus, and drop cap_sys_rawio. Some
containers may need to re-enable cap_sys_rawio (i.e. if they run an
X server).
It may be desirable to break some of this stuff into files which can be
separately included (or not included), but this patch isn't the right
place for that.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> |
| 537188a8eefd6df82995e71f453fce4d6622b110 |
|
08-Mar-2016 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
prevent containers from reading /sys/kernel/debug
Unprivileged containers cannot read it anyway, but also prevent root
owned containers from doing so. Sadly upstart's mountall won't run
if we try to prevent it from being mounted at all.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> |
| 056f8bba0d86ca2ba481a932f23faff9db2ef588 |
|
07-Mar-2016 |
Stéphane Graber <stgraber@ubuntu.com> |
Properly update the generated apparmor profiles
Some changes happened but the final profiles weren't generated...
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com> |
| 98b745498bf97637f68311f944903777f3ee1e67 |
|
05-Jan-2015 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Block access to /proc/kcore
Just like we block access to mem and kmem, there's no good reason for
the container to have access to kcore.
Reported-by: Marc Schaefer
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> |
| 807f4c9e1eaae674c76fd3a97d0b4a8810004177 |
|
29-Sep-2014 |
Jamie Strandboge <jamie@canonical.com> |
apparmor: restrict signal and ptrace for processes
Restrict signal and ptrace for processes running under the container
profile. Rules based on AppArmor base abstraction. Add unix rules for
processes running under the container profile.
Signed-off-by: Jamie Strandboge <jamie@canonical.com>
Acked-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> |
| f2f545857cd6b06689bb1220d66d3577f802dbbc |
|
30-Jun-2014 |
Jesse Tane <jesse.tane@gmail.com> |
Apparmor: allow hugetlbfs mounts everywhere
Signed-off-by: Jesse Tane <jesse.tane@gmail.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> |
| 773bd28258371ad0058ff946c5cf94419920ffdd |
|
29-Apr-2014 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
apparmor: allow writes to sem* and msg* sysctls
/proc/sys/kernel/sem* and /proc/sys/kernel/msg* are ipc sysctls
which are properly namespaced. Allow writes to them from
containers.
Reported-by: Dan Kegel <dank@kegel.com>
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> |
| 2a31251cc5f428f96ee3d322a78556310a681e14 |
|
04-Apr-2014 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Update profiles for current upstream parser
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> |
| 94a77f3fd8be2fb87f7d1465521fac3ec4b7e6b5 |
|
02-Apr-2014 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
apparmor: deny writes to most of /proc/sys (v2)
Allow writes to kernel.shm*, net.*, kernel/domainname and
kernel/hostname,
Also fix a bug in the lxc-generate-aa-rules.py script in a
path which wasn't being exercised before, which returned a
path element rather than its child.
Changelog (v2): remove trailing / from block path
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> |
| 198b363fff1de9afcee2f26b9aa847316f589afe |
|
01-Apr-2014 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
apparmor: auto-generate the blacklist rules
This uses the generate-apparmor-rules.py script I sent out some time
ago to auto-generate apparmor rules based on a higher level set of
block/allow rules.
Add apparmor policy testcase to make sure that some of the paths we
expect to be denied (and allowed) write access to are in fact in
effect in the final policy.
With this policy, libvirt in a container is able to start its
default network, which previously it could not.
v2: address feedback from stgraber
put lxc-generate-aa-rules.py into EXTRA_DIST
add lxc-test-apparmor, container-base and container-rules to .gitignore
take lxc-test-apparmor out of EXTRA_DIST
make lxc-generate-aa-rules.py pep8-compliant
don't automatically generate apparmor rules
This is only bc we can't be guaranteed that python3 will be
available.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> |
| c08a0b7c4e459f32a939391bc5c9667eb7c7ab5c |
|
03-Feb-2014 |
Serge Hallyn <serge.hallyn@ubuntu.com> |
cgmanager: container-base apparmor abstraction: allow mount move
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> |
| 8da250dad4b11c4983031742a83fb8f358044fe0 |
|
16-Jan-2014 |
Stéphane Graber <stgraber@ubuntu.com> |
apparmor: Add profiles
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Acked-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> |