> There's apparently some support for loading per-namespace Apparmor policies, > but that means that the process is no longer confined by the sVirt policy
Would it not be possible to make the namespace handling be able to tell if a namespaced policy tries to expand beyond the original (in this case, sVirt) policy then just silently deny that expansion (and report it in the host)?
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
Namespaced LSM's
Date: 2014-10-23 11:27 pm (UTC)> but that means that the process is no longer confined by the sVirt policy
Would it not be possible to make the namespace handling be able to tell if a namespaced policy tries to expand beyond the original (in this case, sVirt) policy then just silently deny that expansion (and report it in the host)?