#include <abstractions/dbus-accessibility>
#include <abstractions/nameservice>
#include <abstractions/wutmp>
- /etc/compizconfig/config rw, # bug in compiz https://launchpad.net/bugs/697678
+
+ # bug in compiz https://launchpad.net/bugs/697678
+ /etc/compizconfig/config rw,
+ /etc/compizconfig/unity.ini rw,
/ r,
/bin/ rmix,
@{PROC}/asound/** rm,
@{PROC}/ati rm,
@{PROC}/ati/** rm,
+ @{PROC}/sys/vm/overcommit_memory r,
owner @{PROC}/** rm,
# needed for gnome-keyring-daemon
@{PROC}/*/status r,
# necessary for writing to sockets, etc.
/{,var/}run/** rmkix,
/{,var/}run/shm/** wl,
+ /{,var/}run/uuidd/request w,
# libpam-xdg-support/logind
owner /{,var/}run/user/*/** rw,
/opt/google/chrome-stable/google-chrome-stable Cx -> chromium,
/opt/google/chrome-beta/google-chrome-beta Cx -> chromium,
/opt/google/chrome-unstable/google-chrome-unstable Cx -> chromium,
+ /opt/google/chrome/google-chrome Cx -> chromium,
# Allow ptracing processes in the chromium child profile
ptrace peer=/usr/lib/lightdm/lightdm-guest-session//chromium,
@{PROC}/[0-9]*/ r, # sandbox wants these
@{PROC}/[0-9]*/fd/ r, # sandbox wants these
+ @{PROC}/[0-9]*/statm r, # sandbox wants these
@{PROC}/[0-9]*/task/[0-9]*/stat r, # sandbox wants these
/selinux/ r,
+++ /dev/null
-Author: Jamie Strandboge <jamie@canonical.com>
-Description: allow Google Chrome and add access to @{PROC}/[0-9]*/statm
-Bug-Ubuntu: https://launchpad.net/bugs/1361372
-
-Index: lightdm-1.11.9/data/apparmor/abstractions/lightdm_chromium-browser
-===================================================================
---- lightdm-1.11.9.orig/data/apparmor/abstractions/lightdm_chromium-browser
-+++ lightdm-1.11.9/data/apparmor/abstractions/lightdm_chromium-browser
-@@ -15,6 +15,7 @@
- /opt/google/chrome-stable/google-chrome-stable Cx -> chromium,
- /opt/google/chrome-beta/google-chrome-beta Cx -> chromium,
- /opt/google/chrome-unstable/google-chrome-unstable Cx -> chromium,
-+ /opt/google/chrome/google-chrome Cx -> chromium,
-
- # Allow ptracing processes in the chromium child profile
- ptrace peer=/usr/lib/lightdm/lightdm-guest-session//chromium,
-@@ -56,6 +57,7 @@
-
- @{PROC}/[0-9]*/ r, # sandbox wants these
- @{PROC}/[0-9]*/fd/ r, # sandbox wants these
-+ @{PROC}/[0-9]*/statm r, # sandbox wants these
- @{PROC}/[0-9]*/task/[0-9]*/stat r, # sandbox wants these
-
- /selinux/ r,
+++ /dev/null
-Author: Jamie Strandboge <jamie@canonical.com>
-Description: allow 'rw' on /etc/compizconfig/unity.ini (continue workaround for
- LP: 697678). Allow read of @{PROC}/sys/vm/overcommit_memory. Allow write to
- /run/uuidd/request.
-
-Index: lightdm-1.11.9/data/apparmor/abstractions/lightdm
-===================================================================
---- lightdm-1.11.9.orig/data/apparmor/abstractions/lightdm
-+++ lightdm-1.11.9/data/apparmor/abstractions/lightdm
-@@ -14,7 +14,10 @@
- #include <abstractions/dbus-accessibility>
- #include <abstractions/nameservice>
- #include <abstractions/wutmp>
-- /etc/compizconfig/config rw, # bug in compiz https://launchpad.net/bugs/697678
-+
-+ # bug in compiz https://launchpad.net/bugs/697678
-+ /etc/compizconfig/config rw,
-+ /etc/compizconfig/unity.ini rw,
-
- / r,
- /bin/ rmix,
-@@ -44,6 +47,7 @@
- @{PROC}/asound/** rm,
- @{PROC}/ati rm,
- @{PROC}/ati/** rm,
-+ @{PROC}/sys/vm/overcommit_memory r,
- owner @{PROC}/** rm,
- # needed for gnome-keyring-daemon
- @{PROC}/*/status r,
-@@ -68,6 +72,7 @@
- # necessary for writing to sockets, etc.
- /{,var/}run/** rmkix,
- /{,var/}run/shm/** wl,
-+ /{,var/}run/uuidd/request w,
- # libpam-xdg-support/logind
- owner /{,var/}run/user/*/** rw,
-
04_language_handling.patch
05_translate_debian_files.patch
06_apparmor-unix.patch
-07_apparmor-chrome.patch
-08_apparmor-updates.patch