lxc-start tries to change apparmor profile to unconfined
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
lxc (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Raring |
Fix Released
|
Medium
|
Unassigned |
Bug Description
=======
SRU information
1. Impact: failure to start unconfined containers.
2. Development fix: make sure that the buffer into which we read the current container is \0-terminated
3. Stable fix: same as development fix
4. Test case:
sudo lxc-create -t ubuntu -n x1
sudo sed -i '/lxc.aa_profile/d' /var/lib/
echo "lxc.aa_profile = unconfined" | sudo tee -a /var/lib/
sudo lxc-start -n x1
Unfortunately since the bug depends on a badly formed stack it can be hard to reproduce
5. Regression potential: there should be none, we are only setting the buffer to all zeros before we read into it.
=======
When starting a container that has 'lxc.aa_profile = unconfined' on its configuration file, lxc-start fails with
lxc-start: Read-only file system - failed to change apparmor profile to unconfined
This happens because the buffer used by lxc-start to read the process' apparmor profile from /proc/<
Ubuntu Release: Ubuntu 13.04
lxc package version: 0.9.0-0ubuntu3.4
Related branches
tags: | added: lxc |
Changed in lxc (Ubuntu): | |
importance: | Undecided → High |
Changed in lxc (Ubuntu Raring): | |
status: | New → Triaged |
importance: | Undecided → Medium |
description: | updated |
description: | updated |
tags: |
added: verification-done removed: verification-needed |
Status changed to 'Confirmed' because the bug affects multiple users.