mirror of
https://github.com/token2/snapd.git
synced 2026-03-13 11:15:47 -07:00
I've noticed this denial in one of my test systems: kwi 19 10:54:52 ubuntu-2204-cryptfs kernel: audit: type=1400 audit(1713516892.723:323): apparmor="DENIED" operation="open" class="file" profile="snap-update-ns.chromium" name="/var/lib/snapd /" pid=8425 comm="5" requested_mask="r" denied_mask="r" fsuid=0 ouid=0 Given that snap-update-ns must access mount profiles and contains code to safely traverse a path without any symbolic links, I think the extra permissions is acceptable. I did not audit the code to pinpoint the exact cause. Signed-off-by: Zygmunt Krynicki <zygmunt.krynicki@canonical.com>