@jjohansen are the more restrictive file permissions intentional? I see
quite a few apparmorfs permissions changes between xenial and upstream:

-static struct aa_fs_entry aa_fs_entry_apparmor[] = {
-       AA_FS_FILE_FOPS(".access", 0666, &aa_fs_access),
-       AA_FS_FILE_FOPS(".stacked", 0666, &aa_fs_stacked),
-       AA_FS_FILE_FOPS(".ns_stacked", 0666, &aa_fs_ns_stacked),
-       AA_FS_FILE_FOPS(".ns_level", 0666, &aa_fs_ns_level),
-       AA_FS_FILE_FOPS(".ns_name", 0666, &aa_fs_ns_name),
-       AA_FS_FILE_FOPS("profiles", 0444, &aa_fs_profiles_fops),
-       AA_FS_DIR("features", aa_fs_entry_features),
+static struct aa_sfs_entry aa_sfs_entry_apparmor[] = {
+       AA_SFS_FILE_FOPS(".access", 0640, &aa_sfs_access),
+       AA_SFS_FILE_FOPS(".stacked", 0444, &seq_ns_stacked_fops),
+       AA_SFS_FILE_FOPS(".ns_stacked", 0444, &seq_ns_nsstacked_fops),
+       AA_SFS_FILE_FOPS(".ns_level", 0666, &seq_ns_level_fops),
+       AA_SFS_FILE_FOPS(".ns_name", 0640, &seq_ns_name_fops),
+       AA_SFS_FILE_FOPS("profiles", 0440, &aa_sfs_profiles_fops),
+       AA_SFS_DIR("features", aa_sfs_entry_features),
        { }
 };

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1713103

Title:
  snapd 2.27.3+17.10 ADT test failure with linux 4.13.0-6.7

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1713103/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to