roddhjav / apparmor.d

Full set of AppArmor profiles (~ 1500 profiles)
https://apparmor.pujol.io
GNU General Public License v2.0
417 stars 39 forks source link

spam notification? #410

Closed littleblack111 closed 1 month ago

littleblack111 commented 1 month ago

just installed this via the AUR and got spamed notification cuz i enabled notification for aa... it give log for like everything and the log refresh everytime i open it. spammed

roddhjav commented 1 month ago

What distribution/Desktop environment do you use? Can you report the spammed logs here as described as: https://apparmor.pujol.io/report/

littleblack111 commented 1 month ago

i use bspwm with sddm as login manager.

it will keep spamming about everything and anything im doing. exp: when i just login, it will complain abt sddm. when i opened spotify, it will complain abt spotify stuff and sometimes freeze some apps(idk if its cuz of this), and browser etc... here is one i just captured:

apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/lib/gconv/gconv-modules"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/lib/gconv/gconv-modules"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/lib/gconv/gconv-modules.d/"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/lib/gconv/gconv-modules.d/"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/home/system/"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/home/"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/bin/bash"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/home/system/scripts/dunst-alert.sh"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/home/system/scripts/dunst-alert.sh"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/bin/pacat"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="exec" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/bin/pacat"  comm="bash" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" FSUID="system" OUID="root"
apparmor="ALLOWED" operation="file_mmap" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/bin/pacat"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/pulseaudio/libpulsecommon-17.0.so"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/pulseaudio/libpulsecommon-17.0.so"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="file_mmap" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/pulseaudio/libpulsecommon-17.0.so"  comm="paplay" requested_mask="rm" denied_mask="rm" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/gconv/gconv-modules"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/gconv/gconv-modules"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/gconv/gconv-modules.d/"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/gconv/gconv-modules.d/"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash//null-/usr/bin/pacat" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="paplay" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="exec" class="file" profile="dunst" name="/home/system/scripts/dunst-alert.sh"  comm="dunst" requested_mask="x" denied_mask="x" fsuid=1000 ouid=1000 target="dunst//null-/home/system/scripts/dunst-alert.sh" FSUID="system" OUID="system"
apparmor="ALLOWED" operation="file_mmap" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh" name="/usr/bin/env"  comm="dunst-alert.sh" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="exec" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh" name="/usr/bin/bash"  comm="dunst-alert.sh" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0 target="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" FSUID="system" OUID="root"
apparmor="ALLOWED" operation="file_mmap" class="file" profile="dunst//null-/home/system/scripts/dunst-alert.sh//null-/usr/bin/bash" name="/usr/bin/bash"  comm="bash" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="dunst" name="/home/system/dotfiles/dot-config/dunst/dunstrc"  comm="dunst" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="dunst" name="/run/user/1000/xauth_EgwwKY"  comm="dunst" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="xsel" name="/run/user/1000/xauth_EgwwKY"  comm="xsel" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/run/user/1000/xauth_EgwwKY"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="getattr" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/run/user/1000/xauth_EgwwKY"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/dev/nvidiactl"  comm="picom" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/proc/modules"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/proc/modules"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/proc/driver/nvidia/params"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/proc/driver/nvidia/params"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/dev/nvidia-modeset"  comm="picom" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="unlink" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/dev/char/195:254"  comm="picom" requested_mask="d" denied_mask="d" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/dev/nvidia-modeset"  comm="picom" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/dev/nvidia0"  comm="picom" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="wmctrl" name="/run/user/1000/xauth_EgwwKY"  comm="wmctrl" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/dotfiles/dot-oh-my-zsh/.git/HEAD"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/dotfiles/dot-oh-my-zsh/.git/config"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/dotfiles/dot-oh-my-zsh/.git/refs/heads/main"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="gpg" name="/etc/pacman.d/gnupg/gpg.conf"  comm="gpg" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="gpg" name="/etc/pacman.d/gnupg/pubring.gpg"  comm="gpg" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="gpg" name="/etc/pacman.d/gnupg/trustdb.gpg"  comm="gpg" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="sudo//null-/home/system/dotfiles/dot-config/bspwm/scripts/bspcomp//null-/usr/local/bin/picom" name="/dev/nvidiactl"  comm="CPMMListener" requested_mask="wr" denied_mask="wr" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="btrfs" name="/home/"  comm="btrfs" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="btop" name="/sys/devices/pci0000:00/0000:00:1d.0/0000:04:00.0/nvme/nvme0/"  comm="btop" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="capable" class="cap" info="optional: no audit" error=-1 profile="btop"  comm="btop" capability=34  capname="syslog"
apparmor="ALLOWED" operation="capable" class="cap" profile="btop"  comm="btop" capability=21  capname="sys_admin"
apparmor="ALLOWED" operation="open" class="file" profile="btop" name="/proc/driver/nvidia/capabilities/mig/config"  comm="btop" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="spotify" name="/home/system/dotfiles/dot-config/gtk-3.0/settings.ini"  comm="spotify" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="spotify" name="/home/system/dotfiles/dot-config/user-dirs.dirs"  comm="spotify" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="spotify" name="/home/system/.local/share/mime/mime.cache"  comm="Chrome_IOThread" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="spotify" name="/home/system/dotfiles/dot-config/fcitx/dbus/88c93dc0387649888d99ffb1ea95f213-0"  comm="spotify" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="spotify" name="/home/system/.local/share/mime/mime.cache"  comm="Core Thread" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="signal" class="signal" profile="sudo"  comm="sudo" requested_mask="send" denied_mask="send" signal=hup peer="btop"
apparmor="ALLOWED" operation="signal" class="signal" profile="sudo"  comm="sudo" requested_mask="send" denied_mask="send" signal=winch peer="btop"
apparmor="ALLOWED" operation="open" class="file" profile="dunstify" name="/proc/222960/cgroup"  comm="dunstify" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="dunstify" name="/proc/223078/cgroup"  comm="dunstify" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="exec" class="file" profile="run-parts" name="/etc/cron.hourly/snapper"  comm="run-parts" requested_mask="x" denied_mask="x" fsuid=0 ouid=0 target="run-parts//null-/etc/cron.hourly/snapper" FSUID="root" OUID="root"
apparmor="ALLOWED" operation="file_mmap" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/bin/bash"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/dev/tty"  comm="snapper" requested_mask="wr" denied_mask="wr" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/lib/gconv/gconv-modules"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/lib/gconv/gconv-modules"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/lib/gconv/gconv-modules.d/"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/lib/gconv/gconv-modules.d/"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/root/"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/cron.hourly/snapper"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/cron.hourly/snapper"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/conf.d/snapper"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/conf.d/snapper"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/snapper/configs/root"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/snapper/configs/root"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/bin/snapper"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="exec" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/usr/bin/snapper"  comm="snapper" requested_mask="x" denied_mask="x" fsuid=0 ouid=0 target="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" FSUID="root" OUID="root"
apparmor="ALLOWED" operation="file_mmap" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/bin/snapper"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/lib/gconv/gconv-modules"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/lib/gconv/gconv-modules"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/lib/gconv/gconv-modules.d/"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/lib/gconv/gconv-modules.d/"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper//null-/usr/bin/snapper" name="/usr/lib/gconv/gconv-modules.d/gconv-modules-extra.conf"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/snapper/configs/home"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="getattr" class="file" profile="run-parts//null-/etc/cron.hourly/snapper" name="/etc/snapper/configs/home"  comm="snapper" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 FSUID="root" OUID="root"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/HEAD"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/config"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/refs/heads/release-1.4/neovim-0.9"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/packed-refs"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/refs/"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/refs/heads/"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/refs/heads/release-1.4/"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/refs/tags/"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/refs/tags/1.4.0"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/objects/pack/"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/objects/pack/pack-e9b2559f3fbdc6e5ac761b3d2fdc20d78fbf90c9.idx"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/objects/pack/pack-e9b2559f3fbdc6e5ac761b3d2fdc20d78fbf90c9.pack"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/index"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=0 FSUID="system" OUID="root"
apparmor="ALLOWED" operation="mknod" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/index.lock"  comm="git" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/index.lock"  comm="git" requested_mask="wrc" denied_mask="wrc" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="unlink" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/index.lock"  comm="git" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/shallow"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
apparmor="ALLOWED" operation="open" class="file" profile="git" name="/home/system/.local/share/lunarvim/lvim/.git/info/exclude"  comm="git" requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000 FSUID="system" OUID="system"
roddhjav commented 1 month ago

I have fixed most of the issues. Howver, if they are more log than this, you still need to share them here (try with aa-log -s -R to collect everything since the boot time).

Some comments:

Finally, bspwm is not supported, so you may be on our own for some issues.

littleblack111 commented 1 month ago

im not very sure about what it ment by Then create a local addition file in it where you define your own personal directories.. where do i define that file? like /etc/apparmor.d/tunables/xdg-user-dirs.d/apparmor.d.d/local? or ~/local? or the aa config?

littleblack111 commented 1 month ago

i tried to do aa-log -s -R it didnt give me anything but exited without error?

littleblack111 commented 1 month ago

the logs exceeded github's comment limit so i put them in a file: https://fs.littleblack111.com/comment.txt

roddhjav commented 1 month ago

Yes, the file you need to create is /etc/apparmor.d/tunables/xdg-user-dirs.d/apparmor.d.d/local. Your link does not work. Please use a paste service: https://pastebin.com/

littleblack111 commented 1 month ago

yes i tried paste bin. it exceeded their size limit(i forgot how much)... pls lmk if the link work

roddhjav commented 1 month ago

Your link gives a 504 Gateway Time-out

roddhjav commented 1 month ago

Now, I was able to get your log. I have fixed the issues in scope.

However, most log are related to bspwm not beeing supporred (sddm//null-@{bin}/bspwm). I don't have the resources to support it. Therefore I can't help you here.

littleblack111 commented 1 month ago

it spammed stuff about grub, snapper and more

littleblack111 commented 1 month ago

Also wdym u don't have the resource? And on the link u provided. I don't see a display manager section for support?

littleblack111 commented 1 month ago

this might be a dumb question. but can i just exclude it? or at least suppress the notification for bspwm?

maybe is it gonna work if i add it to @{XDG_PROJECTS_DIR}(@{XDG_PROJECTS_DIR}+=sddm//null-@{bin}/bspwm or @{XDG_PROJECTS_DIR}+=sddm)?

roddhjav commented 1 month ago

Also wdym u don't have the resource? And on the link u provided. I don't see a display manager section for support?

I don't have time to support bspwm as a new DE.

but can i just exclude it? or at least suppress the notification for bspwm?

Yes, add:

@{bin}/bspwm rPUx,

To the new file: /etc/apparmor.d/local/sddm

However, you may have to do something similar to other profile later. You will have to check the logs to know this.

littleblack111 commented 1 month ago

alright. ty for the support!

littleblack111 commented 4 weeks ago

i have recived other logs, seem like regarding lvm, nvidia and xsel: log1.txt and when im doing upgrade. they give me stuff regarding lots of stuff. but mostly homebrew(which got spamed) so i lost prev ones log2.txt

i uploaded there agian cuz of github and pastebin limits

nobody43 commented 4 weeks ago

maybe is it gonna work if i add it to @{XDG_PROJECTS_DIR}(@{XDG_PROJECTS_DIR}+=sddm//null-@{bin}/bspwm or @{XDG_PROJECTS_DIR}+=sddm)?

No, that won't work. You options are: a) Confine bspwm and all related profiles:

  1. Write the profiles
  2. Add @{bin}/bspwm rPx, and owner @{HOME}/dotfiles/dot-config/bspwm/scripts/bspcomp rPx, to all related profiles
  3. Add their names to all peers (and labels), that calls bspwm, e.g.: peer="{_otherprofile_,bspwm}", label="{_otherprofile_,bspwm}"

b) Leave bspwm and all related profiles unconfined:

  1. Add @{bin}/bspwm rPUx, and owner @{HOME}/dotfiles/dot-config/bspwm/scripts/bspcomp rPUx, to all related profiles
  2. Add unconfined to all peers (and labels), that calls bspwm, e.g.: peer="{_otherprofile_,unconfined}", label="{_otherprofile_,unconfined}"

After either of these, post the log again - it's hard to read in it's current form.

littleblack111 commented 3 weeks ago

to which file? /etc/apparmor.d/local/sddm?

nobody43 commented 3 weeks ago

Yes, also local/sudo, judging by your log.