We start seeing the same behavior in the Anbox Cloud CI for a few days
now. What tests (via spread) primarily do:
1. ssh to an existing arm64 VM
2. Install a fresh LXD from latest/edge and configure it with the following
preseed (setting security.nesting to true or false doesn't make a difference):
```
config:
cluster.https_address: $addr:8443
core.https_address: $addr:8443
cluster:
enabled: false
server_name: lxd0
networks:
- name: lxdbr0
type: bridge
config:
ipv4.nat: true
ipv4.dhcp.expiry: infinite
ipv4.address: $LXD_SUBNET
ipv6.address: none
profiles:
- name: default
config:
security.nesting: true
devices:
root:
path: /
pool: default
type: disk
eth0:
type: nic
nictype: bridged
parent: lxdbr0
storage_pools:
- name: default
driver: zfs
config:
size: 20GB
```
3. Now juju starts to bootstrap a controller on top of LXD and then we deploy
our charms.
4. At some point the tests run the following:
11:08:00 ++++ timeout -s KILL 5m sudo -u root -H /snap/bin/juju ssh ams/0 -o
'ConnectionAttempts 30' -- /snap/bin/amc image add bionic:android10:arm64
/home/ubuntu/anbox-lxd-image.tar.xz
11:08:00 snap-confine has elevated permissions and is not confined but should
be. Refusing to continue to avoid permission escalation attacks
This seems to be consis11:08:00 ++++ timeout -s KILL 5m sudo -u root -H
/snap/bin/juju ssh ams/0 -o 'ConnectionAttempts 30' -- /snap/bin/amc image add
bionic:android10:arm64 /home/ubuntu/anbox-lxd-image.tar.xz
11:08:00 snap-confine has elevated permissions and is not confined but should
be. Refusing to continue to avoid permission escalation attacks
This doesn't always happen but I haven't yet checked if it's only
happening on one particular machine. The VMs are all running 20.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964636
Title:
Incorrect handling of apparmor `bpf` capability
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1964636/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs