roddhjav / apparmor.d

Full set of AppArmor profiles (~ 1500 profiles)
https://apparmor.pujol.io
GNU General Public License v2.0
426 stars 39 forks source link

aa-log reports from EndeavourOS (Arch, KDE) #308

Closed PhysicsIsAwesome closed 4 months ago

PhysicsIsAwesome commented 5 months ago

Hi Alex,

pls find attached aa-log reports from EndeavourOS:

Best regards PhysicsIsAwesome

apparmor="ALLOWED" operation="open" class="file" profile="dolphin" name="/dev/disk/by-label/"  comm="KIO::WorkerThre" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="file_inherit" class="net" profile="pacman"  comm="pacman" family="unix" sock_type="stream" protocol=0 requested_mask="receive"
apparmor="DENIED" operation="file_inherit" class="net" profile="hostname"  comm="hostname" family="unix" sock_type="stream" protocol=0 requested_mask="receive"
apparmor="DENIED" operation="file_inherit" class="net" profile="lscpu"  comm="lscpu" family="unix" sock_type="stream" protocol=0 requested_mask="receive"
apparmor="ALLOWED" operation="link" class="file" profile="dolphin" name="@{user_config_dirs}/session/dolphin_dolphin_dolphin.zJtbwy"  comm="dolphin" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_config_dirs}/session/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="dolphin" name="@{user_config_dirs}/kde.org/UserFeedback.org.kde.dolphin.conf.JcXWXs"  comm="dolphin" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_config_dirs}/kde.org/#@{int}" FSUID="admin" OUID="admin"
apparmor="DENIED" operation="open" class="file" profile="tailscaled" name="@{sys}/devices/virtual/dmi/id/sys_vendor"  comm="tailscaled" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="power-profiles-daemon" name="@{sys}/devices/pnp0/00:01/rtc/rtc0/alarmtimer.0.auto/uevent"  comm="power-profiles-" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="power-profiles-daemon" name="@{sys}/devices/platform/thinkpad_acpi/dytc_lapmode"  comm="power-profiles-" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="xorg" name="@{run}/udev/data/+sound:card0"  comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="xorg" name="@{run}/udev/data/+sound:card1"  comm="Xorg" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="xorg" name="/dev/input/mouse0"  comm="Xorg" requested_mask="wr" denied_mask="wr" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="xorg" name="/dev/input/mouse1"  comm="Xorg" requested_mask="wr" denied_mask="wr" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="xorg" name="/dev/input/mouse2"  comm="Xorg" requested_mask="wr" denied_mask="wr" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="xdg-desktop-portal" name="/var/lib/sddm/.config/user-dirs.dirs"  comm="xdg-desktop-por" requested_mask="r" denied_mask="r" fsuid=964 ouid=964 FSUID="sddm" OUID="sddm"
apparmor="DENIED" operation="open" class="file" profile="sddm-greeter" name="/usr/share/endeavouros/backgrounds/endeavouros-wallpaper.png"  comm="sddm-greeter-qt" requested_mask="r" denied_mask="r" fsuid=964 ouid=0 FSUID="sddm" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kwin_wayland" name="@{user_config_dirs}/khotkeysrc"  comm="kwin_wayland" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="@{user_config_dirs}/ksmserverrc"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="/etc/ssl/certs/"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kactivitymanagerd" name="@{user_config_dirs}/libreoffice/4/user/registrymodifications.xcu"  comm="kactivitymanage" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="@{user_config_dirs}/ksmserverrc"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="plasmashell" name="/usr/share/plasma5support/services/statusnotifieritem.operations"  comm="plasmashell" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="konsole" name="@{PROC}/@{pid}/stat"  comm="konsole" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="konsole" name="@{PROC}/@{pid}/cmdline"  comm="konsole" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kwin_wayland" name="@{user_cache_dirs}/ksvg-elements"  comm="kwin_wayland" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="DENIED" operation="mkdir" class="file" profile="brave" name="/etc/opt/"  comm="brave" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{PROC}/sys/kernel/core_pattern"  comm="brave" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{user_config_dirs}/kdedefaults/kcminputrc"  comm="brave" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{user_config_dirs}/kcminputrc"  comm="brave" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.f8Wph4"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="DENIED" operation="file_lock" class="file" profile="kscreenlocker_greet" name="@{user_cache_dirs}/kscreenlocker_greet/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="QSGRenderThread" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="DENIED" operation="open" class="file" profile="power-profiles-daemon" name="@{sys}/class/drm/"  comm="power-profiles-" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="/etc/pulse/client.conf"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="/dev/shm/"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="@{run}/user/@{uid}/pulse/"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="@{user_config_dirs}/pulse/cookie"  comm="threaded-ml" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_lock" class="file" profile="kde-powerdevil" name="@{user_config_dirs}/pulse/cookie"  comm="threaded-ml" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="@{user_cache_dirs}/@{multiarch}  comm="org_kde_powerde" requested_mask="wrc" denied_mask="wrc" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_lock" class="file" profile="kde-powerdevil" name="@{user_cache_dirs}/@{multiarch}  comm="org_kde_powerde" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="/usr/share/sounds/ocean/index.theme"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="/usr/share/sounds/freedesktop/index.theme"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="/usr/share/sounds/ocean/stereo/power-unplug.oga"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="@{sys}/devices/@{pci_bus}/0000:00:08.1/0000:07:00.4/usb3/3-2/removable"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="@{sys}/devices/@{pci_bus}/0000:00:08.1/0000:07:00.4/usb3/3-2/manufacturer"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="@{sys}/devices/@{pci_bus}/0000:00:08.1/0000:07:00.4/usb3/3-2/product"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{sys}/devices/platform/AMDI0010:00/i2c-0/i2c-GXTP5140:00/0018:27C6:01E0.0001/report_descriptor"  comm="ThreadPoolForeg" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="ptrace" class="ptrace" profile="plasmashell"  comm="plasmashell" requested_mask="read" denied_mask="read" peer="brave"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.m9exDi"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="startplasma" name="@{PROC}/sys/kernel/random/boot_id"  comm="startplasma-way" requested_mask="r" denied_mask="r" fsuid=1001 ouid=0 FSUID="user" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="startplasma" name="/etc/xdg/kde-mimeapps.list"  comm="startplasma-way" requested_mask="r" denied_mask="r" fsuid=1001 ouid=0 FSUID="user" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kwin_wayland" name="@{user_config_dirs}/khotkeysrc"  comm="kwin_wayland" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="kwin_wayland" name="@{user_config_dirs}/plasmarc"  comm="kwin_wayland" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="ksplashqml" name="@{user_config_dirs}/plasmarc"  comm="ksplashqml" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="@{user_config_dirs}/ksmserverrc"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="/etc/ssl/certs/"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1001 ouid=0 FSUID="user" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kactivitymanagerd" name="@{user_config_dirs}/libreoffice/4/user/registrymodifications.xcu"  comm="kactivitymanage" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="kde-powerdevil" name="@{user_config_dirs}/ksmserverrc"  comm="org_kde_powerde" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="plasmashell" name="@{user_cache_dirs}/plasma_engine_potd/simonstalenhag"  comm="QQuickPixmapRea" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="plasmashell" name="/usr/share/plasma5support/services/statusnotifieritem.operations"  comm="plasmashell" requested_mask="r" denied_mask="r" fsuid=1001 ouid=0 FSUID="user" OUID="root"
apparmor="ALLOWED" operation="ptrace" class="ptrace" profile="plasmashell"  comm="plasmashell" requested_mask="read" denied_mask="read" peer="unconfined"
apparmor="DENIED" operation="mkdir" class="file" profile="brave" name="/etc/opt/"  comm="brave" requested_mask="c" denied_mask="c" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{PROC}/sys/kernel/core_pattern"  comm="brave" requested_mask="r" denied_mask="r" fsuid=1001 ouid=0 FSUID="user" OUID="root"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{user_config_dirs}/kdedefaults/kcminputrc"  comm="brave" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="DENIED" operation="open" class="file" profile="brave" name="@{user_config_dirs}/kcminputrc"  comm="brave" requested_mask="r" denied_mask="r" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="open" class="file" profile="plasma_waitforname" name="/dev/tty"  comm="plasma_waitforn" requested_mask="r" denied_mask="r" fsuid=1001 ouid=0 FSUID="user" OUID="root"
apparmor="DENIED" operation="file_lock" class="file" profile="kscreenlocker_greet" name="@{user_cache_dirs}/kscreenlocker_greet/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="QSGRenderThread" requested_mask="k" denied_mask="k" fsuid=1001 ouid=1001 FSUID="user" OUID="user"
apparmor="ALLOWED" operation="signal" class="signal" profile="kwin_wayland"  comm="kwin_wayland" requested_mask="send" denied_mask="send" signal=term peer="kscreenlocker_greet"
apparmor="DENIED" operation="signal" class="signal" profile="sddm-greeter"  comm="sddm-helper" requested_mask="receive" denied_mask="receive" signal=term peer="sddm"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.nkgAFd"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.6VFjn5"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.WVlW6a"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.xN4wI4"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.gFIiRd"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.tIfTZH"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.OAQCwn"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.OOJbb7"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.27qSv3"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.7k35QC"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.ktPYLZ"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.k0LDEm"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.tQApB2"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.NwOwDq"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.PABGTi"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.kJG5tJ"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.b5kERZ"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="mknod" class="file" profile="kwin_wayland" name="@{user_cache_dirs}/kwin/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="kwin_wayland" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kwin_wayland" name="@{user_cache_dirs}/kwin/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="kwin_wayland" requested_mask="wrc" denied_mask="wrc" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_lock" class="file" profile="kwin_wayland" name="@{user_cache_dirs}/kwin/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="kwin_wayland" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="unlink" class="file" profile="kwin_wayland" name="@{user_cache_dirs}/kwin/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="kwin_wayland" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="dolphin" name="@{user_config_dirs}/kde.org/UserFeedback.org.kde.dolphin.conf.SyssRw"  comm="dolphin" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_config_dirs}/kde.org/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="dolphin" name="@{run}/udev/data/b259:*  comm="dolphin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dolphin" name="/etc/exports"  comm="dolphin" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="link" class="file" profile="dolphin" name="@{user_share_dirs}/recently-used.xbel.PcyEhk"  comm="dolphin" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_share_dirs}/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.dPVxeX"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.vOxxvA"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_receive" class="file" profile="kwin_wayland" name="/dev/shm/.org.chromium.Chromium.xtV8mS"  comm="kwin_wayland" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="plasmashell" name="@{user_share_dirs}/kate/sessions/"  comm="krunner_kateses" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/chipsec/docs/sphinx/_images/driver_dev_info.png"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/chipsec/docs/sphinx/_images/driver_files_info.png"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/cache/download/golang.org/x/exp/@v/v0.0.0-@{int}-814bf88cf225.info"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/errors/bad_release.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/errors/base_higher.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/errors/base_modpath_none.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/cache/download/github.com/arduino/go-paths-helper/@v/v1.12.0.info"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/errors/same_base_release.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/prerelease/prerelease_build_metadata.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/prerelease/prerelease_3.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/PATENTS"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/basic/v1_autobase_suggest.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/basic/v1_autobase_verify.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/basic/v1_v2_base_modpath_suggest.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/basic/v1_v2_base_modpath_verify.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/basic/v3_autobase_suggest.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/basic/v3_autobase_verify_first.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/prerelease/prerelease_beta2.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/prerelease/prerelease_2.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="baloorunner" name="@{HOME}/apparmor.d-git/src/pkg/mod/golang.org/x/exp@v0.0.0-@{int}-814bf88cf225/cmd/gorelease/testdata/cycle/cycle_suggest.test"  comm="baloorunner" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="systemsettings" name="@{user_config_dirs}/kinfocenterrc"  comm="kinfocenter" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_config_dirs}/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="mkdir" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/"  comm="kinfocenter" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="mknod" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.lock"  comm="kinfocenter" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.lock"  comm="kinfocenter" requested_mask="wrc" denied_mask="wrc" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_lock" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.lock"  comm="kinfocenter" requested_mask="wk" denied_mask="wk" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/#@{int}"  comm="kinfocenter" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc"  comm="kinfocenter" requested_mask="l" denied_mask="l" fsuid=1000 ouid=1000 target="@{user_share_dirs}/kinfocenter/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="chmod" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc"  comm="kinfocenter" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="unlink" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.lock"  comm="kinfocenter" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="file_lock" class="file" profile="systemsettings" name="@{user_cache_dirs}/kinfocenter/qtpipelinecache-x86_64-little_endian-lp64/qqpc_opengl.lck"  comm="kinfocenter" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc"  comm="kinfocenter" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="chmod" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/#@{int}"  comm="kinfocenter" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.ABBDHY"  comm="kinfocenter" requested_mask="l" denied_mask="l" fsuid=1000 ouid=1000 target="@{user_share_dirs}/kinfocenter/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="rename_src" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.ABBDHY"  comm="kinfocenter" requested_mask="wrd" denied_mask="wrd" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="rename_dest" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc"  comm="kinfocenter" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.hyQMZH"  comm="kinfocenter" requested_mask="l" denied_mask="l" fsuid=1000 ouid=1000 target="@{user_share_dirs}/kinfocenter/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="rename_src" class="file" profile="systemsettings" name="@{user_share_dirs}/kinfocenter/kinfocenterstaterc.hyQMZH"  comm="kinfocenter" requested_mask="wrd" denied_mask="wrd" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="dolphin" name="@{user_share_dirs}/recently-used.xbel.bnkWUP"  comm="dolphin" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_share_dirs}/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="link" class="file" profile="dolphin" name="@{user_share_dirs}/recently-used.xbel.QvApUa"  comm="dolphin" requested_mask="k" denied_mask="k" fsuid=1000 ouid=1000 target="@{user_share_dirs}/#@{int}" FSUID="admin" OUID="admin"
apparmor="ALLOWED" operation="open" class="file" profile="kioworker" name="/dev/disk/by-label/"  comm="kioworker" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="admin" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="kded" name="@{HOME}/Schreibtisch/"  comm="kded6" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="admin" OUID="admin"
roddhjav commented 5 months ago

Thanks for these logs. I will integrate them soon.

roddhjav commented 4 months ago

Closing. they have been integrated. Feel free to open again if you find some issue.

You may need to configure your personal dir as in: https://apparmor.pujol.io/configuration/#personal-directories