Re: [lxc-devel] [PATCH RFC] apparmor: improve behavior when kernel lacks mount restrictions

2014-09-19 Thread Serge Hallyn
Quoting Dwight Engen (dwight.en...@oracle.com): > On Sun, 14 Sep 2014 03:49:32 + > Serge Hallyn wrote: > > > (If we go this route we can also drop the whole lsm_label_get() > > method and the lsm_label field in the attach context info) > > > > Apparmor policies require mount restrictions to

Re: [lxc-devel] [PATCH RFC] apparmor: improve behavior when kernel lacks mount restrictions

2014-09-19 Thread Dwight Engen
On Sun, 14 Sep 2014 03:49:32 + Serge Hallyn wrote: > (If we go this route we can also drop the whole lsm_label_get() > method and the lsm_label field in the attach context info) > > Apparmor policies require mount restrictions to fullfill many of > their promises - for instance if proc can b

Re: [lxc-devel] [PATCH RFC] apparmor: improve behavior when kernel lacks mount restrictions

2014-09-19 Thread Serge Hallyn
Quoting Stéphane Graber (stgra...@ubuntu.com): > On Sun, Sep 14, 2014 at 03:49:32AM +, Serge Hallyn wrote: > > (If we go this route we can also drop the whole lsm_label_get() > > method and the lsm_label field in the attach context info) > > I'm not too familiar with the lsm code and I tend to

Re: [lxc-devel] [PATCH RFC] apparmor: improve behavior when kernel lacks mount restrictions

2014-09-19 Thread Stéphane Graber
On Sun, Sep 14, 2014 at 03:49:32AM +, Serge Hallyn wrote: > (If we go this route we can also drop the whole lsm_label_get() > method and the lsm_label field in the attach context info) I'm not too familiar with the lsm code and I tend to get lost in there, so just a few questions to confirm th

[lxc-devel] [PATCH RFC] apparmor: improve behavior when kernel lacks mount restrictions

2014-09-13 Thread Serge Hallyn
(If we go this route we can also drop the whole lsm_label_get() method and the lsm_label field in the attach context info) Apparmor policies require mount restrictions to fullfill many of their promises - for instance if proc can be mounted anywhere, then 'deny /proc/sysrq-trigger w' prevents only