Thanks for the bug report. The problem is now understood. systemd is
calling lockf() on an anonymous socket file and the AppArmor profile
language does not support a way to grant file locking permissions on a
socket that does not have a path associated with it.

The AppArmor socket file rule type needs to gain a new permission for
file locking. This will require changes to the kernel and
apparmor_parser and, eventually, the AppArmor Python utilities.

** Changed in: apparmor (Ubuntu)
       Status: New => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1575779

Title:
  hostnamectl fails under lxd unpriv container

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1575779/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to