Qt doesn't work in my ArchLinux docker
-
@mviereck I would report it as a bug and see what the Qt devs say about it.
-
I would report it as a bug and see what the Qt devs say about it.
Done, bug report is here: https://bugreports.qt.io/browse/QTBUG-70447
@all: Please click "Vote for this issue" to confirm the bug and to get attention from developers.
-
ok, it turns out to be an issue with
statx
syscall. It is already whitelisted in recent docker versions, but did not reach the distributions yet. It is fixed in docker-ce 18.06, but not in 18.03.This PR added statx to docker seccomp whitelist: https://github.com/moby/moby/pull/36417
Related SO thread: https://stackoverflow.com/questions/48995826/which-capabilities-are-needed-for-statx-to-stop-giving-epermPossible solutions for docker versions before 18.06:
- discouraged, degrades container isolation: add option
--security-opt seccomp=unconfined
- encouraged: download https://raw.githubusercontent.com/moby/moby/master/profiles/seccomp/default.json and run with
--security-opt seccomp=/path/to/downloaded-seccomp.json
- discouraged, degrades container isolation: add option
-
@mviereck I've been using Docker 18.06 (
docker --version: 18.06.1-ce, build e68fc7a
) all along and run, as described in my previous posts, into the same issues. Running docker with the provided seccomp file also results in the same error. Only--security-opt seccomp=unconfined
works for me at the moment. Have you had success using the seccomp file or updating to 18.06?BTW: Docker 18.06 is already available as a stable release for nearly 2 months (three weeks for the .1 version), but the official website (including the documentation) has not been updated yet to reflect that - perhaps because the release has only a 4-month support lifetime.
EDIT: Here's my minimal Dockerfile for reproducing the error. If successful, the docker logs show
QStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root'
, if it fails, the docker logs show the known errorThis application failed to start because no Qt platform plugin could be initialized.
-
Have you had success using the seccomp file or updating to 18.06?
@emberflare At first I succeeded with 18.03 and the downloaded seccomp profile file. Afterwards I made an upgrade to 18.06 and did not need the seccomp profile file anymore.
I gave an example calibre Dockerfile in the bugreport that I used for test runs. Can you check whether that one succeeds on your system?
Another possible check: run with
--cap-add=ALL
.Next check: Add to your seccomp profile whitelist syscalls not covered by
--cap-add=ALL
:"add_key","get_kernel_syms","keyctl","move_pages","nfsservctl","perf_event_open","personality","query_module","request_key","sysfs","_sysctl","uselib","userfaultfd","ustat",
Here's my minimal Dockerfile for reproducing the error.
It succeeds here with
Docker version 18.06.1-ce, build e68fc7a
and outputQStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root'
. -
@mviereck said in Qt doesn't work in my ArchLinux docker:
I gave an example calibre Dockerfile in the bugreport that I used for test runs. Can you check whether that one succeeds on your system?
Running that image fails for me with the usual error:
Could not find the Qt platform plugin "xcb" in ""
.Another possible check: run with
--cap-add=ALL
.This fails with my minimal Dockerfile, and with your calibre Dockerfile.
Next check: Add to your seccomp profile whitelist syscalls not covered by
--cap-add=ALL
:This fails with my minimal Dockerfile, and with your calibre Dockerfile.
Here's my minimal Dockerfile for reproducing the error.
It succeeds here with
Docker version 18.06.1-ce, build e68fc7a
and outputQStandardPaths: XDG_RUNTIME_DIR not set, defaulting to '/tmp/runtime-root'
.That is very strange. Perhaps my Docker installation is corrupted or my host is somehow incapable of applying seccomp configurations. In one of the PRs linked to this problem, somebody mentions a host dependency for seccomps, but it seems unlikely that they are missing on ubuntu 18.04.
I'll reinstall Docker and report back with the results.
EDIT: Same results with reinstalled docker. I'm looking into seccomp dependencies now.
-
@emberflare Maybe different kernel versions make a difference. Here:
$ uname -a Linux buster 4.17.0-3-amd64 #1 SMP Debian 4.17.17-1 (2018-08-18) x86_64 GNU/Linux
I'll reinstall Docker and report back with the results.
Make sure you don't have package
docker.io
installed. It interferes withdocker-ce
. Also there may be an old docker config file somewhere around that messes up your setup. Maybe purge-deinstalldocker-ce
, than installdocker.io
, purge it, too, than installdocker-ce
again. That hopefully removes all config files.somebody mentions a host dependency for seccomps
Afaik the kernel can be compiled to support seccomp or not. If it does not support it, there should be no restriction.
-
@emberflare Maybe different kernel versions make a difference. Here:
$ uname -a Linux buster 4.17.0-3-amd64 #1 SMP Debian 4.17.17-1 (2018-08-18) x86_64 GNU/Linux
My host is a Google Cloud instance, with a seemingly custom compiled kernel (
gcp
suffix):$ uname -a Linux gpu-instance-1 4.15.0-1018-gcp #19~16.04.2-Ubuntu SMP Mon Aug 20 13:39:28 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
Perhaps the problem lies in that kernel, but as you mentioned, it should either be compiled to support seccomp or not, and theoretically work in both cases. Could a kernel update help?
I'll reinstall Docker and report back with the results.
purge-deinstall
docker-ce
, than installdocker.io
, purge it, too, than installdocker-ce
againGood idea, I tried this, but still the same error.
-
I found an interesting documentation about seccomp and docker: https://github.com/docker/labs/tree/master/security/seccomp
It may be worth a try to check which syscalls your qt app is using and whether one is missing in the seccomp whitelist.
Installstrace
in image, run it interactive-it
with bash and try:strace -c -f -S name /opt/qt511/bin/qmlplugindump 2>&1 1>/dev/null | tail -n +3 | head -n -2 | awk '{print $(NF)}'
strace probably needs
--cap-add SYS_PTRACE
. If in doubt, try--cap-add=ALL
.This blog post may help, too: https://blog.jessfraz.com/post/how-to-use-new-docker-seccomp-profiles/
I did not check all that above yet, I will look closer at this later.
-
@mviereck Thanks for the command! The syscalls used by my application are the following:
access, arch_prctl, brk, close, connect, execve, fstat, futex, getcwd, getdents, geteuid, getpid, getrandom, getuid, lseek, lstat, mmap, mprotect, munmap, openat, prlimit64, read, readlink, rt_sigaction, rt_sigprocmask, set_robust_list, set_tid_address, socket, stat, statx, write
From what I can tell, all of these are allowed by the default seccomp profile of Docker 18.06, only the rule for
arch_prctl
is listed separately. I also verified that Docker has no problems accessing the seccomp file, which could've been a cause for my problem.Perhaps I should do a kernel update, as it currently is my last idea to fix this issue (without using
--security-opt seccomp=unconfined
).