You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AppArmor 4.0 added new profiles for crun, runc, and podman which required extra AppArmor rules be created. This was originally reported in #1898 and fixed by @NeilW in #2004. This fix was sufficient for common tasks like shutting down containers, but commands like podman kill -s HUP container continue to fail with errors like:
ERRO[0000] unable to signal init: permission denied
Error: sending signal to container c4b8fdcd6af2f79cfb8fe64223c60f4282a36359add7844f181b45cac24dc46c: `/usr/bin/runc kill c4b8fdcd6af2f79cfb8fe64223c60f4282a36359add7844f181b45cac24dc46c 1` failed: exit status 1
Inspecting AppArmor logs we see DENIED messages like:
In the discussion for #2004 it seems like it was acknowledged that podman kill could send any signal; however, my read on that PR was that the rules were set to allow this to succeed. I'm filing this bug since experimentally this seems to not be the case.
Some other notes: I am using Ubuntu Noble's podman package (version 4.9.3+ds1-1ubuntu0.2). The prior issue was raised in https://bugs.launchpad.net/ubuntu/+source/libpod/+bug/2040483 and fixed upstream as part of the distro fixups to correct the original problem which is why I'm reporting the issue here first. Using kill(1) against the pid reported by podman inspect --format '{{ .State.Pid }}' container seems to work. And finally, we've got podman set up as the backend for docker compose using DOCKER_HOST set to the podman socket path. When we issue a docker compose down I also see kernel audit logs recording a DENIED signal=usr1 message (the rest of the message appears equivalent to the HUP message above). The docker compose down does eventually successfully stop and remove the container, but there may be other affected signals.
The text was updated successfully, but these errors were encountered:
AppArmor 4.0 added new profiles for crun, runc, and podman which required extra AppArmor rules be created. This was originally reported in #1898 and fixed by @NeilW in #2004. This fix was sufficient for common tasks like shutting down containers, but commands like
podman kill -s HUP container
continue to fail with errors like:Inspecting AppArmor logs we see DENIED messages like:
In the discussion for #2004 it seems like it was acknowledged that
podman kill
could send any signal; however, my read on that PR was that the rules were set to allow this to succeed. I'm filing this bug since experimentally this seems to not be the case.Some other notes: I am using Ubuntu Noble's podman package (version 4.9.3+ds1-1ubuntu0.2). The prior issue was raised in https://bugs.launchpad.net/ubuntu/+source/libpod/+bug/2040483 and fixed upstream as part of the distro fixups to correct the original problem which is why I'm reporting the issue here first. Using
kill(1)
against the pid reported bypodman inspect --format '{{ .State.Pid }}' container
seems to work. And finally, we've got podman set up as the backend fordocker compose
usingDOCKER_HOST
set to the podman socket path. When we issue adocker compose down
I also see kernel audit logs recording a DENIEDsignal=usr1
message (the rest of the message appears equivalent to the HUP message above). Thedocker compose down
does eventually successfully stop and remove the container, but there may be other affected signals.The text was updated successfully, but these errors were encountered: