Some tests need to mount /proc (like pbuilder) or do bind mounts (like nested LXC), so we need to relax the restrictions. As lxd containers are unprivileged, the extra apparmor profile is merely a fallback security layer; users should not be able to do any harm to the host in an unpriv container.
Create profile without AppArmor: lxc profile create autopkgtest lxc profile show default | sed '/^name:/ s/default/autopkgtest/' | lxc profile edit autopkgtest lxc profile set autopkgtest raw.lxc lxc.aa_profile=unconfined Start containers with: lxc launch images:ubuntu/xenial/amd64 x1 --profile autopkgtest In that container bind mounts and mounting proc etc. works. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1519677 Title: add lxd backend To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/autopkgtest/+bug/1519677/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
