ptp4l with the automotive profile [1] fails if the AppArmor rules are
applied. This is because the automotive profile, and some other PTP
profiles, use layer 2 networking.

```
= AppArmor =
Time: 2025-04-23T08:2
Log: apparmor="DENIED" operation="capable" class="cap" profile="ptp4l" 
pid=766163 comm="ptp4l" capability=13  capname="net_raw"
Capability: net_raw
Suggestions:
* adjust program to not require 'CAP_NET_RAW' (see 'man 7 capabilities')
* add one of 'firewall-control, network-control, network-observe' to 'plugs'
* do nothing if program otherwise works properly
```

[1]
https://github.com/richardcochran/linuxptp/blob/a0154d343e7665c97652b9416e6b9576277c6231/configs/automotive-
master.cfg#L20

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083458

Title:
  Add AppArmor profiles for linuxptp services

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linuxptp/+bug/2083458/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to