/proc is not usually shared between the host and the container, but I
can see how that can happen if you run the mount with hidepid=2 on the
host.

When it comes to processes, aa-status works by going through /proc and reading 
attr/apparmor/current. So if you remount /proc with hidepid=2, then the 
processes are hidden.
https://docs.kernel.org/filesystems/proc.html#mount-options

The main issue is that the processes shouldn't be hidden from root, and
you are running aa-status with root. So I need to investigate a bit
further.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2006528

Title:
  LXD processes are not enforced in Ubuntu 20.04 HWE kernel

Status in apparmor package in Ubuntu:
  New

Bug description:
  In Ubuntu 20.04 server with HWE kernel (5.15.0-58-generic) and LXD
  5.0.2, container processes are not in enforced mode as identified by
  aa-status

  Below are the output of aa-status in this environment.
  https://pastebin.ubuntu.com/p/kT3bHSS6w7/


  The problem does not occur in Ubuntu 18.04
  (https://pastebin.ubuntu.com/p/j4WcqWZRjH/)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2006528/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to