I saw the same with ntp on Xenial, but can also confirm that >=Zesty things seem to be fixed. Before I had: audit: type=1400 audit(1497945497.701:6958): apparmor="DENIED" operation="file_inherit" namespace="root//lxd-xenial-ntp_<var-lib-lxd>" profile="/usr/sbin/ntpd" name="/run/systemd/journal/stdout" pid=27776 comm="ntpd" requested_mask="wr" denied_mask="wr" fsuid=165536 ouid=165536
So it seems fixed, maybe an SRU needed of something in apparmor / abstractions? ** Changed in: apparmor (Ubuntu) Status: New => Confirmed ** Bug watch added: LXD bug tracker #3255 https://github.com/lxc/lxd/issues/3255 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor in Ubuntu. https://bugs.launchpad.net/bugs/1670408 Title: Missing apparmor rules cause tor to fail to start Status in apparmor package in Ubuntu: Confirmed Status in tor package in Ubuntu: Incomplete Bug description: Using tor 0.2.9.9-1ubuntu1 with Linux 4.10.0-9-generic on Zesty, tor fails to start after installing the tor package. "systemctl status tor@default" reports: Mar 06 16:04:00 zesty systemd[1]: tor@default.service: Main process exited, code=killed, status=11/SEGV Mar 06 16:04:00 zesty systemd[1]: Failed to start Anonymizing overlay network for TCP. Mar 06 16:04:00 zesty systemd[1]: tor@default.service: Unit entered failed state. Mar 06 16:04:00 zesty systemd[1]: tor@default.service: Failed with result 'signal'. There are two AppArmor denials in the kernel log: Mar 6 15:53:12 zesty-test kernel: [ 102.699647] audit: type=1400 audit(1488815592.268:35): apparmor="DENIED" operation="file_inherit" namespace="root//lxd-zesty_<var-lib-lxd>" profile="system_tor" name="/run/systemd/journal/stdout" pid=3520 comm="tor" requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000 Mar 6 15:53:12 zesty-test kernel: [ 102.702418] audit: type=1400 audit(1488815592.272:37): apparmor="DENIED" operation="file_mmap" namespace="root//lxd-zesty_<var-lib-lxd>" profile="system_tor" name="/usr/bin/tor" pid=3520 comm="tor" requested_mask="m" denied_mask="m" fsuid=100000 ouid=100000 Workaround: add the following two lines to /etc/apparmor.d/system_tor: /usr/bin/tor m, /run/systemd/journal/stdout rw, I couldn't remember how to that that profile reloaded, so I rebooted, and after the reboot tor does start up successfully. "systemctl tor@default" reports it as running. I haven't checked to see if only one or other rule is actually required. Importance -> High since this bug makes the package unusable in its default configuration on Zesty. Since the AppArmor profile comes from Debian's 0.2.9.9-1, this should probably be fixed in Debian. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1670408/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp