9. However, these are not affecting the container in the same fashion. Snap finishes initializing, and cloud-init finishes
root@mantic-cust-vm:~# lxc shell m-c-c
root@m-c-c:~# snap changes
ID Status Spawn Ready Summary
1 Done yesterday at 21:03 UTC today at 12:30 UTC Initialize system state
2 Done today at 12:29 UTC today at 12:30 UTC Initialize device
Did the following:
1. launched a new VM from the custom build
lxc launch mantic-20231005 --vm --device root,size=20GiB mantic-cust-vm
2. pushed squashfs and lxc metadata from same custom build
lxc file push build.output/ livecd. ubuntu- cpc.squashfs mantic- cust-vm/ root/ server- cloudimg- amd64-lxd. tar.xz mantic- cust-vm/ root/
lxc file push vm/mantic-
3. initialized lxd
lxd init --auto
3. imported into lxc
lxc image import ./mantic- server- cloudimg- amd64-lxd. tar.xz ./livecd. ubuntu- cpc.squashfs --alias mantic-cust-con
4. launched the container
lxc launch mantic-cust-con m-c-c
5. observed the DENIED ptrace
Oct 06 12:27:01 mantic-cust-vm kernel: audit: type=1400 audit(169659522 1.386:113) : apparmor="DENIED" operation="ptrace" class="ptrace" profile= "lxd-m- c-c_</var/ snap/lxd/ common/ lxd>" pid=2420 comm="systemd" requested_ mask="read" denied_mask="read" peer="lxd- m-c-c_< /var/snap/ lxd/common/ lxd>//& unconfined"
6. deleted the container
lxc stop m-c-c
lxc delete m-c-c
6. disabled apparmor_ restrict_ unprivileged_ unconfined
sudo bash -c "echo 0 > /proc/sys/ kernel/ apparmor_ restrict_ unprivileged_ unconfined"
7. launched container
lxc launch mantic-cust-con m-c-c
8. see different apparmor denied messages:
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 audit(169659539 8.722:905) : apparmor="DENIED" operation="mount" class="mount" info="failed flags match" error=-13 profile= "lxd-m- c-c_</var/ snap/lxd/ common/ lxd>" name="/ run/systemd/ unit-root/ proc/" pid=4055 comm="(d-logind)" fstype="proc" srcname="proc" flags="rw, nosuid, nodev, noexec" 8.766:906) : apparmor="DENIED" operation="mount" class="mount" info="failed flags match" error=-13 profile= "lxd-m- c-c_</var/ snap/lxd/ common/ lxd>" name="/ run/systemd/ unit-root/ proc/" pid=4048 comm="(polkitd)" fstype="proc" srcname="proc" flags="rw, nosuid, nodev, noexec" 8.818:907) : apparmor="DENIED" operation="mount" class="mount" info="failed flags match" error=-13 profile= "lxd-m- c-c_</var/ snap/lxd/ common/ lxd>" name="/ run/systemd/ unit-root/ proc/" pid=4071 comm="(ostnamed)" fstype="proc" srcname="proc" flags="rw, nosuid, nodev, noexec" 8.874:908) : apparmor="STATUS" operation= "profile_ replace" info="same as current profile, skipping" label=" lxd-m-c- c_</var/ snap/lxd/ common/ lxd>//& :lxd-m- c-c_<var- snap-lxd- common- lxd>:unconfined " name="rsyslogd" pid=4062 comm="apparmor_ parser" 9.106:909) : apparmor="STATUS" operation= "profile_ replace" info="same as current profile, skipping" label=" lxd-m-c- c_</var/ snap/lxd/ common/ lxd>//& :lxd-m- c-c_<var- snap-lxd- common- lxd>:unconfined " name="/ usr/lib/ snapd/snap- confine" pid=4130 comm="apparmor_ parser" 9.106:910) : apparmor="STATUS" operation= "profile_ replace" info="same as current profile, skipping" label=" lxd-m-c- c_</var/ snap/lxd/ common/ lxd>//& :lxd-m- c-c_<var- snap-lxd- common- lxd>:unconfined " name="/ usr/lib/ snapd/snap- confine/ /mount- namespace- capture- helper" pid=4130 comm="apparmor_ parser" 9.482:911) : apparmor="DENIED" operation= "file_inherit" class="net" namespace= "root// lxd-m-c- c_<var- snap-lxd- common- lxd>" profile= "/usr/lib/ snapd/snap- confine" pid=4146 comm="snap-confine" family="netlink" sock_type="raw" protocol=15 requested_ mask="send receive" denied_mask="send receive" 9.498:912) : apparmor="DENIED" operation= "file_inherit" class="file" namespace= "root// lxd-m-c- c_<var- snap-lxd- common- lxd>" profile= "snap-update- ns.lxd" name="/ apparmor/ .null" pid=4157 comm="6" requested_mask="wr" denied_mask="wr" fsuid=1000000 ouid=0 9.558:913) : apparmor="DENIED" operation= "file_inherit" class="file" namespace= "root// lxd-m-c- c_<var- snap-lxd- common- lxd>" profile= "snap.lxd. hook.install" name="/ apparmor/ .null" pid=4146 comm="snap-exec" requested_mask="wr" denied_mask="wr" fsuid=1000000 ouid=0
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 audit(169659539
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 audit(169659539
9. However, these are not affecting the container in the same fashion. Snap finishes initializing, and cloud-init finishes
root@mantic- cust-vm: ~# lxc shell m-c-c
root@m-c-c:~# snap changes
ID Status Spawn Ready Summary
1 Done yesterday at 21:03 UTC today at 12:30 UTC Initialize system state
2 Done today at 12:29 UTC today at 12:30 UTC Initialize device
root@m-c-c:~# cloud-init status
status: done