refactor AppArmor into LSM backend, add SELinux support
Currently, a maximum of one LSM within LXC will be initialized and
used. If in the future stacked LSMs become a reality, we can support it
without changing the configuration syntax and add support for more than
a single LSM at a time to the lsm code.
Generic LXC code should note that lsm_process_label_set() will take
effect "now" for AppArmor, and upon exec() for SELinux.
- fix Oracle template mounting of proc and sysfs, needed when using SELinux
Signed-off-by:
Dwight Engen <dwight.engen@oracle.com>
Acked-by:
Serge Hallyn <serge.hallyn@ubuntu.com>
Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com>
Showing
src/lxc/apparmor.h
deleted
100644 → 0
src/lxc/lsm/lsm.c
0 → 100644
src/lxc/lsm/lsm.h
0 → 100644
src/lxc/lsm/nop.c
0 → 100644
src/lxc/lsm/selinux.c
0 → 100644
Please
register
or
sign in
to comment