Thanks for the bug report. The problem is now understood. systemd is
calling lockf() on an anonymous socket file and the AppArmor profile
language does not support a way to grant file locking permissions on a
socket that does not have a path associated with it.
The AppArmor socket file rule type needs to gain a new permission for
file locking. This will require changes to the kernel and
apparmor_parser and, eventually, the AppArmor Python utilities.
** Changed in: apparmor (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1575779
Title:
hostnamectl fails under lxd unpriv container
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1575779/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs