%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /snap/core/17212/usr/share/apparmor/easyprof/policygroups/ubuntu-core/16.04/
Upload File :
Create Path :
Current File : //snap/core/17212/usr/share/apparmor/easyprof/policygroups/ubuntu-core/16.04/mir-client

# Description: Can access the Mir display server as a client
# Usage: common

# TODO: is this needed by the client too? If it is, then we need to change the
# usage to 'reserved' until we have seccomp arg filtering implemented.
#capability chown,
#capability fowner,

# Socket to talk on
/run/mir_socket rw,

# FIXME: this is problematic with the current approach of forking and renaming
# the mir-template snap since the label will not match the server. This might
# be needed for the anonymous seqpacket socket? This needs to be refined.
unix (connect, send, receive) peer=(label="mir{,.*}_server-compositor_*"),

# For non-opengl apps
# https://www.kernel.org/doc/gorman/html/understand/understand015.html
/dev/shm/\#* rw,

# udev
deny /etc/udev/udev.conf r,
deny /run/udev/data/* r,

# FIXME: this is an information leak until AppArmor implements kernel variables
owner @{PROC}/@{pid}/cmdline r,

# FIXME: these should be part of (hw-)assign, not this policy group
# /dev/dri/card0 rw, # hardware acceleration
# /sys/devices/*/*/*/drm/card0/uevent r,

# FIXME: this is too lenient, please adjust for specific accesses
# /sys/devices/*/*/*/uevent r,

/usr/share/applications/ r,

# Library snaps will allow things like this, but this creates a tight coupling
# between mir and consumers of mir, so leave it out for now.
#@{INSTALL_DIR}/mir{,.*}/ r,
#@{INSTALL_DIR}/mir{,.*}/** r,
#@{INSTALL_DIR}/mir{,.*}/**/lib.so* mr,

Zerion Mini Shell 1.0