Hey Christian,

thanks for the profiles, I haven't had a chance to dig into them yet,
but after a quick first pass they look as expected.

so very interesting. First up apparmor has always done mediation post
symlink resolution, this is not new with stacking. What is new with
stacking is we are now loading policy within the container and applying
it. And it can and will expose several things done to setup the
container. Specifically you now have 2 profiles being enforced, the lxd
container profile (which was being enforced before), and now system
profiles from within the container, so in this case the libvirt profile.
The libvirt profile within the container should work the same as when
used on the host modulo any container setup that leaks through. This is
generally around mounts, and namespacing.

The bind mount done in bug 1507959, will manifest it self in different
ways than the symlink. Generally speaking bind mounts will act just like
a file at the location they are bound (name resolution follows them,
unlike symlink), but will require the mount rule to set them up.

With LXD doing a bind mount to /dev/ptmx its odd that you are seeing it
as a symlink. I am going to do some investigation, and see if I can't
replicate.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1684481

Title:
  KVM guest execution start apparmor blocks on /dev/ptmx now
  (regression?)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1684481/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to