[apparmor] [RFC PATCH 1/1] libapparmor: Create man page for aa_stack_profile()/aa_stack_onexec()

Jamie Strandboge jamie at canonical.com
Tue Jan 12 21:23:12 UTC 2016


On 01/11/2016 06:17 PM, Tyler Hicks wrote:
...

> Unlike
> +aa_change_profile(2), confined programs wanting to use aa_stack_profile() need
> +no special rules in their profile to stack a new profile since the operation
> +does not broaden the allowed permissions.
> +
Is this true? Won't the profile need write access to /proc/self/attr/current
and/or /proc/self/attr/exec like so:

  owner @{PROC}/@{pid}/attr/{current,exec} w,

Unfortunately, since we don't yet have kernel variables for @{pid}, this rule
(which is as strict as I can make it while still allowing the (presumed) access
for stacking) means I would be able to stack on other processes' confinement,
no? Or am I missing something behind the scenes where the kernel will have an
implied rule that you can always write to your own process' current and exec,
but no others?

...

> +Using aa_stack_profile() and related libapparmor functions are the only way to
> +ensure compatibility between among varying kernel versions. However, there may
> +be some situations where libapparmor is not available and directly interacting
> +with the AppArmor filesystem is required to stack a profile.

Typo: 'between among'

-- 
Jamie Strandboge                 http://www.ubuntu.com/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/apparmor/attachments/20160112/e8067dd3/attachment-0001.pgp>


More information about the AppArmor mailing list