Hi Pascal,
thanks for finding all the references - interesting read.

There is a long story short to this - the default apparmor profile tries
to allow you things that are safe and common. If you want to allow it
more, you'd have to extend the profile e.g. the abstraction in
/etc/apparmor.d/libvirt-qemu. What you add there is allowed to all
guests.

The base profile already has a /dev/shm rule, but it has no
subdir/subfiles and already has a comment to disable it if you like
security.

 45   # WARNING: this gives the guest direct access to host hardware and 
specific    
 46   # portions of shared memory. This is required for sound using ALSA with 
kvm,   
 47   # but may constitute a security risk. If your environment does not 
require     
 48   # the use of sound in your VMs, feel free to comment out or prepend 
'deny' to  
 49   # the rules for files in /dev.                                            
     
 50   /{dev,run}/shm r,                                                         
     
 51   /{dev,run}/shmpulse-shm* r,                                               
     
 52   /{dev,run}/shmpulse-shm* rwk,                                             
     
 55   # spice                                                                   
     
 56   owner /{dev,run}/shm/spice.* rw,                                          
     

Therefore adding further /dev/shm/** is unlikely as a default, but ok for 
people who set things up to use it.
Maybe in this particular case that addon should provide scripting or a hint at 
least to do that?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1786677

Title:
  [bionic] [libvirt-daemon-system] Missing AppArmor configuration
  file(s)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1786677/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to