You can look at /proc/self/uid_map to see if uid 0 is mapped to a non-0
uid, which would mean that you're not getting real root.

Root in an unprivileged container does hold all the capabilities, but those are 
tied to the user namespace so they're only useful if the resource you're trying 
to access is namespaced too.
The audit log isn't yet namespaced (there's work to have it be) so even though 
root does have the CAP_AUDIT_READ capability against the container it doesn't 
have it against the whole kernel.

For now, I'd say just make the unit skip in containers in general. Until
audit is namespaced, there's very little reason for a container, even
privileged, to interact with it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1707901

Title:
  systemd-journald-audit.socket attempts to start in unpriviledged LXD
  container, but cannot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1707901/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to