提交 a8704556 编写于 作者: S Simon Fels

Unload AppArmor profile for container management process

If we run the management process with the AppArmor profile loaded
from snap-confine various ashmem/binder operations are failing with
permission denied errors. To workaround this until this problem
is fixed we simply unload the AppArmor profile and continue to
execute completely without any profile loaded.
上级 b31d79ca
......@@ -29,4 +29,4 @@ chmod 666 /dev/ashmem
# this path.
mkdir -p $SNAP_COMMON/lxc
exec $SNAP/bin/anbox-wrapper.sh container-manager
exec $SNAP/usr/sbin/aa-exec -p unconfined -- $SNAP/bin/anbox-wrapper.sh container-manager
......@@ -36,6 +36,10 @@ parts:
- bin/anbox-bridge.sh
- bin/anbox-wrapper.sh
- bin/container-manager.sh
apparmor:
plugin: nil
stage-packages:
- apparmor
lxc:
source: git://github.com/morphis/lxc
source-branch: snappy-support
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册