-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Processes are not visible to other containers in the pod #7886
Labels
In Progress
This issue is actively being worked by the assignee, please do not work on this at this time.
kind/bug
Categorizes issue or PR as related to a bug.
locked - please file new issue/PR
Assist humans wanting to comment on an old issue or PR with locked comments.
Comments
openshift-ci-robot
added
the
kind/bug
Categorizes issue or PR as related to a bug.
label
Oct 2, 2020
should containers in the same pod have the same selinux label? |
Maybe this was the case in previous versions of podman, because in a version of 1.8 i could see the pids of the other container |
Yes containers within the same pod are supposed to have the Same SELinux label. |
Ok this is a big bug.
|
|
rhatdan
added
the
In Progress
This issue is actively being worked by the assignee, please do not work on this at this time.
label
Oct 2, 2020
github-actions
bot
added
the
locked - please file new issue/PR
Assist humans wanting to comment on an old issue or PR with locked comments.
label
Sep 22, 2023
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
In Progress
This issue is actively being worked by the assignee, please do not work on this at this time.
kind/bug
Categorizes issue or PR as related to a bug.
locked - please file new issue/PR
Assist humans wanting to comment on an old issue or PR with locked comments.
Is this a BUG REPORT or FEATURE REQUEST? (leave only one on its own line)
/kind bug
Description
When i start multiple containers having the same pod with a shared pid namespace, the container can only see it's own pids.
The shared pid namespace works, because every container in the pod has a different pid number and not pid 1.
Also lsns shows that the pid namespace is shared between the containers.
After some debugging i found out that ps is blocked by selinux, because it can not access the pids from other containers in the proc filesystem.
Steps to reproduce the issue:
Describe the results you received:
A listing of /proc in the second container shows pid 1 and the pids of the first container.
Denied by selinux
Listing of lables
Here the selinux audit.log entries from the container host
When starting the containers with --security-opt label=disable i can see all pids of all containers in the pod.
Describe the results you expected:
The pids of every container in the same pod should be visible and i should the able to send a kill signal to process
in an other container sharing the same pod and pid namespace.
This is needed to reload haproxy from a sidecar container.
Additional information you deem important (e.g. issue happens only occasionally):
Output of
podman version
:Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):CentOS 8 with podman installed from kubic repo
Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide?
Yes
Additional environment details (AWS, VirtualBox, physical, etc.):
The text was updated successfully, but these errors were encountered: