** Description changed:

  [ Impact ]
  
  apparmor denies signals from runc, making stopping containers (a
  basic/core feature of most container runtimes) infeasible.
  
  [ Test Plan ]
  
  A basic case would include
- running a container and stopping it as described in the podman SRU testplan 
in LP: #2040483. For docker, an example would would be:
+ running a container and trying to stop it as described in the podman SRU 
testplan in LP: #2040483.
  
- $ docker stop $(docker run --rm -d nginx)
+ Here, let's use a container from docker hub which is known to run in the 
foreground and capture SIGINTs (CTRL + c) to terminate its process
+ docker.io/library/redis:alpine.
  
- In a fixed scenario, this should finish quickly with a success.
- In a broken one, this should fail and take longer to complete.
+ For docker, run
+ # docker run docker.io/library/redis:alpine
+ wait for the process to start in the foreground, you will see the following 
message:
  
- A thorough test would include installing and affected package, starting
- a container, upgrading the package, and only then trying to stop the
- container. If it behaves as an affected system would, this should be
- documented: users should know a refresh is needed.
+ 1:M 25 Oct 2024 00:54:48.415 * Ready to accept connections tcp
+ 
+ Then try to terminate the process by sending a single SIGINT by pressing 
CTRL+c.
+ You will verify that, in affected systems, the process will not be 
terminated. You will also see the following message in dmesg's output:
+ 
+ [Fri Oct 25 00:56:53 2024] audit: type=1400 audit(1729817813.238:144):
+ apparmor="DENIED" operation="signal" class="signal" profile="docker-
+ default" pid=1757 comm="runc" requested_mask="receive"
+ denied_mask="receive" signal=int peer="runc".
+ 
+ For containerd, run
+ # ctr images pull docker.io/library/redis:alpine
+ # ctr run --apparmor-default-profile="ctr-test" 
docker.io/library/redis:alpine redis
+ wait for the process to start in the foreground, you will see the following 
message:
+ 
+ 1:M 25 Oct 2024 00:54:48.415 * Ready to accept connections tcp
+ 
+ Then try to terminate the process by sending a single SIGINT by pressing 
CTRL+c.
+ You will verify that, in affected systems, the process will not be terminated.
+ Moreover, you should see the following error message on the screen:
+ 
+ ERRO[0091] forward signal interrupt  error="unknown error after kill:
+ runc did not terminate successfully: exit status 1: unable to signal
+ init: permission denied\n: unknown".
+ 
+ You will also see the following message in dmesg's output:
+ 
+ [  157.340083] audit: type=1400 audit(1729822489.388:130):
+ apparmor="DENIED" operation="signal" class="signal" profile="ctr-test"
+ pid=1245 comm="runc" requested_mask="receive" denied_mask="receive"
+ signal=int peer="runc"
+ 
+ Also note that the containerd API allows custom apparmor profile names.
+ Hence, a fix containing a name change to the apparmor profile (as the
+ one seen in the podman fix for this same issue) is not feasible.
+ 
+ In fixed systems (for both docker and containerd), the "ctrl+c" command
+ in the scenarios above will terminate the process and the error messages
+ described above will not be present. Note that after a package upgrade,
+ the system need to be restarted so the fixed apparmor profiles are
+ loaded.
  
  [ Where problems could occur ]
  
  The fixes here are bundled in new upstream releases as per the
  exceptions in place. There are risks of regression which should be dealt
  with in a case-by-case fashion.
  
  [ Other Info ]
  
  This is part of the regular container stack MREs as described in
  https://bugs.launchpad.net/ubuntu/+source/haproxy/+bug/2028418
  
  This is the docker/containerd counterpart of the fix released for podman
  in LP: #2040483

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065423

Title:
  Update AppArmor template to allow confined runc to kill containers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/containerd-app/+bug/2065423/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to