Processes are not visible to other containers in the pod #7886
Labels
In Progress
This issue is actively being worked by the assignee, please do not work on this at this time.
kind/bug
Categorizes issue or PR as related to a bug.
locked - please file new issue/PR
Assist humans wanting to comment on an old issue or PR with locked comments.
Is this a BUG REPORT or FEATURE REQUEST? (leave only one on its own line)
/kind bug
Description
When i start multiple containers having the same pod with a shared pid namespace, the container can only see it's own pids.
The shared pid namespace works, because every container in the pod has a different pid number and not pid 1.
Also lsns shows that the pid namespace is shared between the containers.
After some debugging i found out that ps is blocked by selinux, because it can not access the pids from other containers in the proc filesystem.
Steps to reproduce the issue:
Describe the results you received:
A listing of /proc in the second container shows pid 1 and the pids of the first container.
Denied by selinux
Listing of lables
Here the selinux audit.log entries from the container host
When starting the containers with --security-opt label=disable i can see all pids of all containers in the pod.
Describe the results you expected:
The pids of every container in the same pod should be visible and i should the able to send a kill signal to process
in an other container sharing the same pod and pid namespace.
This is needed to reload haproxy from a sidecar container.
Additional information you deem important (e.g. issue happens only occasionally):
Output of
podman version
:Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):CentOS 8 with podman installed from kubic repo
Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide?
Yes
Additional environment details (AWS, VirtualBox, physical, etc.):
The text was updated successfully, but these errors were encountered: