-
Notifications
You must be signed in to change notification settings - Fork 322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permission denied due to SELinux on /sys/fs/cgroup/cpu/ #582
Comments
/cc @rhatdan |
/cc @giuseppe |
@giuseppe This looks like some files/directories are being created by podman/crun in /run or /tmp or /dev/shm and being mounted into the container. Is there some tool creating the /sys directory on a tmpfs? type=AVC msg=audit(1611853411.946:10554): avc: denied { read } for pid=2463591 comm="run-java.sh" name= The container_runtime_tmpfs_t is the label that podman or any container engine would create when writing to a tmpfs (tmpfs_t). |
can you please give more details on the components you've used? What is the version of crun you are using? I can reproduce the issue with crun 0.15, but it was fixed with #531 and crun 0.15.1 has the fix |
I can confirm the bug is reproducible on 0.15, with 0.17 it works all right. Thanks @giuseppe |
Containers are not able to access
/sys/fs/cgroup/cpu/cpu.cfs_quota_us
dues to SELinux.This was introduced in containers/podman#8949.
To reproduce try run
podman run -it --rm docker.io/library/alpine:latest cat /sys/fs/cgroup/cpu/cpu.cfs_quota_us
.You need to run cgroups v1 (not v2).
The text was updated successfully, but these errors were encountered: