Paul Gevers <elb...@debian.org> writes:

> On 27-01-2021 22:41, Valentin Vidic wrote:
>
>> On Wed, Jan 27, 2021 at 10:37:56PM +0100, Paul Gevers wrote:
>>
>>> debian@ci-worker-ppc64el-01:~$ sudo cat /etc/lxc/default.conf
>>> # MANAGED WITH CHEF; DON'T CHANGE BY HAND
>>> lxc.net.0.type = veth
>>> lxc.net.0.link = virbr0
>>> lxc.net.0.flags = up
>>> lxc.apparmor.profile = generated
>>> lxc.apparmor.allow_nesting = 1
>> 
>> I think this is only for new containers and for the existing ones these
>> options would be in /var/lib/lxc/<container>/config. Also apparmor
>> should log mount failures in kernel log or somewhere...
>
> We generate fresh containers on a daily basis.

Hi Paul,

These systemd messages are emitted during service setup, before the
service binary is even started, and are very much characteristic to the
Apparmor misconfiguration described in the LXC 3 NEWS file.  I can
readily reproduce them with another systemd-hardened package:

systemd[697]: coturn.service: Failed to set up mount namespacing: Permission 
denied
systemd[697]: coturn.service: Failed at step NAMESPACE spawning 
/usr/bin/turnserver: Permission denied

and such messages are neatly paired with these in the host syslog:

audit: type=1400 audit(1611830306.349:157): apparmor="DENIED" operation="mount" 
info="failed flags match" error=-13 profile="lxc-container-default-cgns" 
name="/" pid=27587 comm="(rnserver)" flags="rw, rslave"

Can you see such messages?  Are you sure that the failed runs had

lxc.apparmor.profile = generated
lxc.apparmor.allow_nesting = 1

in their LXC configuration?
-- 
Feri

Reply via email to