I run Cursor in Linux under a pretty relaxed Apparmor sandbox that stops processes from using SystemD and bypassing the sandbox. In the last cursor update, I now get this warning from D-Bus:
\[53194:0125/231050.359242:ERROR:dbus/object_proxy.cc:573\] Failed to call method: org.freedesktop.systemd1.Manager.StartTransientUnit: object_path= /org/freedesktop/systemd1: org.freedesktop.DBus.Error.AccessDenied: An AppArmor policy prevents this sender from sending this message to this recipient; type=“method_call”, sender=“:1.189” (uid=1000 pid=53194 comm=“cursor --no-sandbox” label=“cursor (enforce)”) interface=“org.freedesktop.systemd1.Manager” member=“StartTransientUnit” error name=“(unset)” requested_reply=“0” destination=“org.freedesktop.systemd1” (uid=1000 pid=3653 comm=“/usr/lib/systemd/systemd --user” label=“unconfined”)
with the body
(“app-org.chromium.Chromium-53194.scope”, “replace”, [(“PIDs”, <[uint32 53194]>)], @a(sa(sv)) )
Why does cursor need to start a system-d service?
thank you