We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aa-log
/dev/urandom
Log:
type=AVC msg=audit(1727368762.260:21147): apparmor="DENIED" operation="file_inherit" class="file" profile="briar-desktop" name="/dev/pts/0" pid=88450 comm="briar-desktop" requested_mask="wr" denied_mask="wr" fsuid=1001 ouid=1001�FSUID="user" OUID="user" type=AVC msg=audit(1727368762.267:21148): apparmor="DENIED" operation="open" class="file" profile="briar-desktop" name="/proc/88450/mountinfo" pid=88450 comm="java" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001�FSUID="user" OUID="user" type=AVC msg=audit(1727368762.267:21149): apparmor="DENIED" operation="mkdir" class="file" profile="briar-desktop" name="/tmp/hsperfdata_user/" pid=88450 comm="java" requested_mask="c" denied_mask="c" fsuid=1001 ouid=1001�FSUID="user" OUID="user" type=AVC msg=audit(1727368762.784:21150): apparmor="DENIED" operation="open" class="file" profile="briar-desktop" name="/dev/urandom" pid=88450 comm="java" requested_mask="wc" denied_mask="wc" fsuid=1001 ouid=0�FSUID="user" OUID="root" type=AVC msg=audit(1727368763.354:21151): apparmor="DENIED" operation="mkdir" class="file" profile="briar-desktop" name="/home/user/.skiko/51ffc79b686a0ae634dad1219048c160a5dd93b510dbe0d0f1e8b363423bd05a/" pid=88450 comm="AWT-EventQueue-" requested_mask="c" denied_mask="c" fsuid=1001 ouid=1001�FSUID="user" OUID="user" type=AVC msg=audit(1727368763.354:21152): apparmor="DENIED" operation="mkdir" class="file" profile="briar-desktop" name="/home/user/.skiko/51ffc79b686a0ae634dad1219048c160a5dd93b510dbe0d0f1e8b363423bd05a/" pid=88450 comm="AWT-EventQueue-" requested_mask="c" denied_mask="c" fsuid=1001 ouid=1001�FSUID="user" OUID="user"
aa-log -R prints:
aa-log -R
apparmor="DENIED" operation="file_inherit" class="file" profile="briar-desktop" name="/dev/pts/0" comm="briar-desktop" requested_mask="wr" denied_mask="wr" fsuid=1001 ouid=1001 FSUID="user" OUID="user" apparmor="DENIED" operation="open" class="file" profile="briar-desktop" name="/proc/88450/mountinfo" comm="java" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user" apparmor="DENIED" operation="mkdir" class="file" profile="briar-desktop" name="/tmp/hsperfdata_user/" comm="java" requested_mask="c" denied_mask="c" fsuid=1001 ouid=1001 FSUID="user" OUID="user" apparmor="DENIED" operation="mkdir" class="file" profile="briar-desktop" name="/home/user/.skiko/51ffc79b686a0ae634dad1219048c160a5dd93b510dbe0d0f1e8b363423bd05a/" comm="AWT-EventQueue-" requested_mask="c" denied_mask="c" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
The text was updated successfully, but these errors were encountered:
Hum, it is a feature because /dev/urandom r, is in the base abstraction. However, /dev/urandom rw, is not...
/dev/urandom r,
/dev/urandom rw,
Sorry, something went wrong.
Do you need to filter it? The base abstraction is included in every profile. Thus /dev/urandom r, shouldn't appear in the log.
Yes, it is needed when in complain mode apparmor transition to a temporary profile (foo//usr/bin/bash)
foo//usr/bin/bash
No branches or pull requests
Log:
aa-log -R
prints:The text was updated successfully, but these errors were encountered: