[Bug 144383] Re: apparmor-profiles: nscd profile spams my logs

2007-10-10 Thread jjohansen
Mathias is correct, the hint messages are only emitted when a profile is in learning mode. Setting the profile to enforce mode will stop the hint messages. -- apparmor-profiles: nscd profile spams my logs https://bugs.launchpad.net/bugs/144383 You received this bug notification because you are

[Bug 140626] Re: apparmor Segmentation fault

2007-09-18 Thread jjohansen
a dmesg dump would be good too. -- apparmor Segmentation fault https://bugs.launchpad.net/bugs/140626 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 138978] Re: new apparmor not masking directory permissions correctly

2007-09-12 Thread jjohansen
This is an intentional change and bug fix in the new AppArmor. The old AppArmor was always supposed to mediate write access to directories, but due to a bug in the code it would not under most circumstances. AppArmor does mask and implicitly allow directory traversal (unix dac x perm on

[Bug 139105] Re: Px and Ux do not work with globs

2007-09-12 Thread jjohansen
It sounds like there are two or more rules in the profile that overlap and have conflicting x mods. AppArmor requires that there is only a single x mode for any given match eg. /usr/lib/cups/filter/* Ux, /usr/lib/** ix, will conflict because the rule with ix overlaps the rule using Ux. The

[Bug 136637] Re: apparmor reinitializes caps late in boot

2007-09-12 Thread jjohansen
Kees is right, AppArmor composes capabilities, so as long as AppArmor is loaded capabilities are being enforced, whether or not applications are confined or unconfined. AppArmor's additional capability mediation that is specified in profiles is applied after standard capability mediation is

[Bug 131976] Re: fails to start: cannot apply additional memory protection after relocation

2007-09-10 Thread jjohansen
While I agree this is something needs to address with mount rules, I can't give an eta for when it will happen. In the mean time is it feasible to use variables so the prefixes can be all added in one place? -- fails to start: cannot apply additional memory protection after relocation

[Bug 131976] Re: fails to start: cannot apply additional memory protection after relocation

2007-09-01 Thread jjohansen
For both of these cases, if you look in /var/log/messages you can see that AppArmor is rejecting access to /rofs/lib/tls/i686/cmov/libc-2.6.1.so A simple fix is to update the profiles to use {/rofs,/cow,}/lib/tls/i686/cmov/*.so AppArmor can block access to stacked filesystem paths depending on

[Bug 117852] Re: Conflict in profiles in complain mode when upgrading apparmor-profiles

2007-05-30 Thread jjohansen
Updating profiles is a pain and known problem. The current plans for dealing with this are two fold. We have been working on a merge tool, which will allow two and three way profile merging. The tool will provide both automatic and manual merging of profiles. The other way of dealing with this

[Bug 116624] Re: Profiles not applied to running processes when AppArmor is started

2007-05-30 Thread jjohansen
With the current AppArmor code running the AppArmor init script right after mountall is the best solution. A feature on the AppArmor wish list is extremely early init. The current plans are to have apparmor initialize as early as possible, the security_initcall level instead of module_init level