ptp4l with the automotive profile [1] fails if the AppArmor rules are applied. This is because the automotive profile, and some other PTP profiles, use layer 2 networking.
``` = AppArmor = Time: 2025-04-23T08:2 Log: apparmor="DENIED" operation="capable" class="cap" profile="ptp4l" pid=766163 comm="ptp4l" capability=13 capname="net_raw" Capability: net_raw Suggestions: * adjust program to not require 'CAP_NET_RAW' (see 'man 7 capabilities') * add one of 'firewall-control, network-control, network-observe' to 'plugs' * do nothing if program otherwise works properly ``` [1] https://github.com/richardcochran/linuxptp/blob/a0154d343e7665c97652b9416e6b9576277c6231/configs/automotive- master.cfg#L20 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2083458 Title: Add AppArmor profiles for linuxptp services To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linuxptp/+bug/2083458/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs