No problem, it is the holiday season.

I get the following errors on 16.04:

[    0.511712] audit: initializing netlink subsys (disabled)
[    0.511802] audit: type=2000 audit(1483302109.500:1): initialized
[    7.355509] audit: type=1400 audit(1483302117.275:2): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lxc-container-default" 
pid=1248 comm="apparmor_parser"
[    7.355514] audit: type=1400 audit(1483302117.275:3): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lxc-container-default-cgns" 
pid=1248 comm="apparmor_parser"
[    7.355517] audit: type=1400 audit(1483302117.275:4): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="lxc-container-default-with-mounting" pid=1248 comm="apparmor_parser"
[    7.355519] audit: type=1400 audit(1483302117.275:5): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="lxc-container-default-with-nesting" pid=1248 comm="apparmor_parser"
[    7.356597] audit: type=1400 audit(1483302117.275:6): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="system_tor" pid=1250 
comm="apparmor_parser"
[    7.357507] audit: type=1400 audit(1483302117.279:7): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=1249 
comm="apparmor_parser"
[    7.357511] audit: type=1400 audit(1483302117.279:8): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=1249 
comm="apparmor_parser"
[    7.357514] audit: type=1400 audit(1483302117.279:9): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=1249 comm="apparmor_parser"
[    7.357517] audit: type=1400 audit(1483302117.279:10): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="/usr/lib/connman/scripts/dhclient-script" pid=1249 comm="apparmor_parser"
[    7.357701] audit: type=1400 audit(1483302117.279:11): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" 
pid=1254 comm="apparmor_parser"
[   13.742946] audit_printk_skb: 57 callbacks suppressed
[   13.742948] audit: type=1400 audit(1483302123.663:31): apparmor="DENIED" 
operation="unlink" profile="/usr/sbin/ntpd" 
name="/var/lib/openntpd/run/ntpd.sock" pid=2764 comm="ntpd" requested_mask="d" 
denied_mask="d" fsuid=0 ouid=0
[   14.590740] audit: type=1400 audit(1483302124.511:32): apparmor="DENIED" 
operation="unlink" profile="/usr/sbin/ntpd" 
name="/var/lib/openntpd/run/ntpd.sock" pid=2818 comm="ntpd" requested_mask="d" 
denied_mask="d" fsuid=0 ouid=0
[   17.359442] audit: type=1400 audit(1483302127.279:33): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lxd-mysql_</var/lib/lxd>" 
pid=3054 comm="apparmor_parser"
[   19.061796] audit: type=1400 audit(1483302128.983:34): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lxd-torelay_</var/lib/lxd>" 
pid=3535 comm="apparmor_parser"
[   20.960218] audit: type=1400 audit(1483302130.879:35): apparmor="DENIED" 
operation="unlink" profile="/usr/sbin/ntpd" 
name="/var/lib/openntpd/run/ntpd.sock" pid=3848 comm="ntpd" requested_mask="d" 
denied_mask="d" fsuid=0 ouid=0
[   21.072519] audit: type=1400 audit(1483302130.991:36): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="lxc-container-default" pid=3908 comm="apparmor_parser"
[   21.072525] audit: type=1400 audit(1483302130.991:37): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="lxc-container-default-cgns" pid=3908 comm="apparmor_parser"
[   21.072529] audit: type=1400 audit(1483302130.991:38): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="lxc-container-default-with-mounting" pid=3908 comm="apparmor_parser"
[   21.072533] audit: type=1400 audit(1483302130.991:39): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="lxc-container-default-with-nesting" pid=3908 comm="apparmor_parser"
[   21.073788] audit: type=1400 audit(1483302130.995:40): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="/usr/bin/lxc-start" pid=3910 comm="apparmor_parser"
[   21.075677] audit: type=1400 audit(1483302130.995:41): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="/usr/lib/lxd/lxd-bridge-proxy" pid=3911 comm="apparmor_parser"
[   21.076554] audit: type=1400 audit(1483302130.995:42): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="/sbin/dhclient" pid=3909 comm="apparmor_parser"
[   21.076559] audit: type=1400 audit(1483302130.995:43): apparmor="STATUS" 
operation="profile_load" 
label="lxd-mysql_</var/lib/lxd>//&:lxd-mysql_<var-lib-lxd>://unconfined" 
name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=3909 
comm="apparmor_parser"
[   24.173189] audit_printk_skb: 24 callbacks suppressed
[   24.173190] audit: type=1400 audit(1483302134.091:52): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="lxc-container-default" pid=4341 comm="apparmor_parser"
[   24.173196] audit: type=1400 audit(1483302134.091:53): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="lxc-container-default-cgns" pid=4341 comm="apparmor_parser"
[   24.173201] audit: type=1400 audit(1483302134.091:54): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="lxc-container-default-with-mounting" pid=4341 comm="apparmor_parser"
[   24.173205] audit: type=1400 audit(1483302134.091:55): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="lxc-container-default-with-nesting" pid=4341 comm="apparmor_parser"
[   24.175621] audit: type=1400 audit(1483302134.095:56): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="system_tor" pid=4343 comm="apparmor_parser"
[   24.177605] audit: type=1400 audit(1483302134.099:57): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="/sbin/dhclient" pid=4342 comm="apparmor_parser"
[   24.177611] audit: type=1400 audit(1483302134.099:58): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=4342 
comm="apparmor_parser"
[   24.177615] audit: type=1400 audit(1483302134.099:59): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=4342 comm="apparmor_parser"
[   24.177619] audit: type=1400 audit(1483302134.099:60): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="/usr/lib/connman/scripts/dhclient-script" pid=4342 comm="apparmor_parser"
[   24.177831] audit: type=1400 audit(1483302134.099:61): apparmor="STATUS" 
operation="profile_load" 
label="lxd-torelay_</var/lib/lxd>//&:lxd-torelay_<var-lib-lxd>://unconfined" 
name="/usr/bin/lxc-start" pid=4344 comm="apparmor_parser"
[   29.605458] audit_printk_skb: 63 callbacks suppressed
[   29.605459] audit: type=1400 audit(1483302139.527:83): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-webserver_<var-lib-lxd>" 
profile="/sbin/dhclient" name="/run/systemd/journal/stdout" pid=5233 
comm="dhclient" requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   29.605466] audit: type=1400 audit(1483302139.527:84): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-webserver_<var-lib-lxd>" 
profile="/sbin/dhclient" name="/run/systemd/journal/stdout" pid=5233 
comm="dhclient" requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   31.536211] audit: type=1400 audit(1483302141.455:85): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-mysql_<var-lib-lxd>" 
profile="/usr/sbin/mysqld" name="/run/systemd/journal/stdout" pid=5519 
comm="mysqld" requested_mask="wr" denied_mask="wr" fsuid=100113 ouid=100000
[   31.536218] audit: type=1400 audit(1483302141.455:86): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-mysql_<var-lib-lxd>" 
profile="/usr/sbin/mysqld" name="/run/systemd/journal/stdout" pid=5519 
comm="mysqld" requested_mask="wr" denied_mask="wr" fsuid=100113 ouid=100000
[   33.485885] audit: type=1400 audit(1483302143.407:87): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=5713 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   33.485894] audit: type=1400 audit(1483302143.407:88): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=5713 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   33.485908] audit: type=1400 audit(1483302143.407:89): apparmor="DENIED" 
operation="file_mmap" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/usr/bin/tor" pid=5713 comm="tor" requested_mask="m" 
denied_mask="m" fsuid=100000 ouid=100000
[   38.689862] audit: type=1400 audit(1483302148.611:90): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6026 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   38.689872] audit: type=1400 audit(1483302148.611:91): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6026 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   38.689888] audit: type=1400 audit(1483302148.611:92): apparmor="DENIED" 
operation="file_mmap" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/usr/bin/tor" pid=6026 comm="tor" requested_mask="m" 
denied_mask="m" fsuid=100000 ouid=100000
[   41.529888] audit: type=1400 audit(1483302151.451:93): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6474 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   41.529980] audit: type=1400 audit(1483302151.451:94): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6474 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   41.530038] audit: type=1400 audit(1483302151.451:95): apparmor="DENIED" 
operation="file_mmap" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/usr/bin/tor" pid=6474 comm="tor" requested_mask="m" 
denied_mask="m" fsuid=100000 ouid=100000
[   43.917886] audit: type=1400 audit(1483302153.839:96): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6607 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   43.917977] audit: type=1400 audit(1483302153.839:97): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6607 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   43.918025] audit: type=1400 audit(1483302153.839:98): apparmor="DENIED" 
operation="file_mmap" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/usr/bin/tor" pid=6607 comm="tor" requested_mask="m" 
denied_mask="m" fsuid=100000 ouid=100000
[   44.849815] audit: type=1400 audit(1483302154.771:99): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6639 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   44.849824] audit: type=1400 audit(1483302154.771:100): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6639 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   44.849839] audit: type=1400 audit(1483302154.771:101): apparmor="DENIED" 
operation="file_mmap" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/usr/bin/tor" pid=6639 comm="tor" requested_mask="m" 
denied_mask="m" fsuid=100000 ouid=100000
[   45.553854] audit: type=1400 audit(1483302155.475:102): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6650 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   45.553946] audit: type=1400 audit(1483302155.475:103): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6650 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000
[   45.553991] audit: type=1400 audit(1483302155.475:104): apparmor="DENIED" 
operation="file_mmap" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/usr/bin/tor" pid=6650 comm="tor" requested_mask="m" 
denied_mask="m" fsuid=100000 ouid=100000
[   46.317851] audit: type=1400 audit(1483302156.239:105): apparmor="DENIED" 
operation="file_inherit" namespace="root//lxd-torelay_<var-lib-lxd>" 
profile="system_tor" name="/run/systemd/journal/stdout" pid=6662 comm="tor" 
requested_mask="wr" denied_mask="wr" fsuid=100000 ouid=100000

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1648143

Title:
  tor in lxd: apparmor="DENIED" operation="change_onexec"
  namespace="root//CONTAINERNAME_<var-lib-lxd>" profile="unconfined"
  name="system_tor"

Status in apparmor package in Ubuntu:
  Confirmed
Status in tor package in Ubuntu:
  Confirmed

Bug description:
  Environment:
  ----------------

      Distribution: ubuntu
      Distribution version: 16.10
      lxc info:
      apiextensions:

      storage_zfs_remove_snapshots
      container_host_shutdown_timeout
      container_syscall_filtering
      auth_pki
      container_last_used_at
      etag
      patch
      usb_devices
      https_allowed_credentials
      image_compression_algorithm
      directory_manipulation
      container_cpu_time
      storage_zfs_use_refquota
      storage_lvm_mount_options
      network
      profile_usedby
      container_push
      apistatus: stable
      apiversion: "1.0"
      auth: trusted
      environment:
      addresses:
          163.172.48.149:8443
          172.20.10.1:8443
          172.20.11.1:8443
          172.20.12.1:8443
          172.20.22.1:8443
          172.20.21.1:8443
          10.8.0.1:8443
          architectures:
          x86_64
          i686
          certificate: |
          -----BEGIN CERTIFICATE-----
          -----END CERTIFICATE-----
          certificatefingerprint: 
3048baa9f20d316f60a6c602452b58409a6d9e2c3218897e8de7c7c72af0179b
          driver: lxc
          driverversion: 2.0.5
          kernel: Linux
          kernelarchitecture: x86_64
          kernelversion: 4.8.0-27-generic
          server: lxd
          serverpid: 32694
          serverversion: 2.4.1
          storage: btrfs
          storageversion: 4.7.3
          config:
          core.https_address: '[::]:8443'
          core.trust_password: true

  Container: ubuntu 16.10

  
  Issue description
  ------------------

  
  tor can't start in a non privileged container

  
  Logs from the container:
  -------------------------

  Dec 7 15:03:00 anonymous tor[302]: Configuration was valid
  Dec 7 15:03:00 anonymous systemd[303]: tor@default.service: Failed at step 
APPARMOR spawning /usr/bin/tor: No such file or directory
  Dec 7 15:03:00 anonymous systemd[1]: tor@default.service: Main process 
exited, code=exited, status=231/APPARMOR
  Dec 7 15:03:00 anonymous systemd[1]: Failed to start Anonymizing overlay 
network for TCP.
  Dec 7 15:03:00 anonymous systemd[1]: tor@default.service: Unit entered failed 
state.
  Dec 7 15:03:00 anonymous systemd[1]: tor@default.service: Failed with result 
'exit-code'.
  Dec 7 15:03:00 anonymous systemd[1]: tor@default.service: Service hold-off 
time over, scheduling restart.
  Dec 7 15:03:00 anonymous systemd[1]: Stopped Anonymizing overlay network for 
TCP.
  Dec 7 15:03:00 anonymous systemd[1]: tor@default.service: Failed to reset 
devices.list: Operation not permitted
  Dec 7 15:03:00 anonymous systemd[1]: Failed to set devices.allow on 
/system.slice/system-tor.slice/tor@default.service: Operation not permitted
  Dec 7 15:03:00 anonymous systemd[1]: message repeated 6 times: [ Failed to 
set devices.allow on /system.slice/system-tor.slice/tor@default.service: 
Operation not permitted]
  Dec 7 15:03:00 anonymous systemd[1]: Couldn't stat device 
/run/systemd/inaccessible/chr
  Dec 7 15:03:00 anonymous systemd[1]: Couldn't stat device 
/run/systemd/inaccessible/blk
  Dec 7 15:03:00 anonymous systemd[1]: Failed to set devices.allow on 
/system.slice/system-tor.slice/tor@default.service: Operation not permitted


  Logs from the host
  --------------------

  audit: type=1400 audit(1481119378.856:6950): apparmor="DENIED" 
operation="change_onexec" info="label not found" error=-2 
namespace="root//lxd-anonymous_" profile="unconfined" name="system_tor" 
  pid=12164 comm="(tor)"

  
  Steps to reproduce
  ---------------------

      install ubuntu container 16.10 on a ubuntu 16.10 host
      install tor in the container
      Launch tor

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1648143/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to