[apparmor] [PATCH 08/36] apparmor: provide the ability to boot with a default profile set on init

John Johansen john.johansen at canonical.com
Thu May 9 09:40:01 UTC 2013


On 05/08/2013 05:40 PM, Seth Arnold wrote:
> On Wed, May 01, 2013 at 02:30:53PM -0700, John Johansen wrote:
>> --- a/security/apparmor/Kconfig
>> +++ b/security/apparmor/Kconfig
>> @@ -29,3 +29,14 @@ config SECURITY_APPARMOR_BOOTPARAM_VALUE
>>  	  boot.
>>  
>>  	  If you are unsure how to answer this question, answer 1.
>> +
>> +config SECURITY_APPARMOR_UNCONFINED_INIT
>> +	bool "Set init to unconfined on boot"
>> +	depends on SECURITY_APPARMOR
>> +	default y
>> +	help
>> +	  This option determines policy behavior during early boot by
>> +	  placing the init process in the unconfined state, or the
>> +	  'default' profile.
>> +
>> +	  If you are unsure how to answer this question, answer Y.
> 
> I think this description needs some enhancement; I thought the boolean
> was the other way around until I thought I spotted a bug with a ! in
> the conditionals.
> 
> How about:
> 
>> +	  This option determines policy behavior during early boot by
>> +	  placing the init process in the unconfined state, or the
>> +	  'default' profile.
>> +
>> +       'Y' means init and its children are not confined, and never
>> +       can be confined; loaded policy will only apply to processes
>> +       started afterwards.
>> +
>> +       'N' means init and its children are confined in a profile
>> +       named 'default', which can be replaced later and thus
>> +       provide for confining even processes started early at boot,
>> +       though not confined during early boot. This can provide for
>> +       complete system confinement.
>> +
>> +	  If you are unsure how to answer this question, answer Y.
> 
> Thanks
> 
sure thats better





More information about the AppArmor mailing list