podman: fails when underlying filesystem does not support security labels (EXT4_FS_SECURITY) #9687
Labels
kind/bug
Categorizes issue or PR as related to a bug.
locked - please file new issue/PR
Assist humans wanting to comment on an old issue or PR with locked comments.
/kind bug
Description
I am working with podman on OpenWrt, a light-weight distribution that aims to support network devices. The default OpenWrt kernel does not contain support for EXT4 security labels (EXT4_FS_SECURITY), and this seems to cause podman to fail under some circumstances. I am not sure if security labels are strictly required by podman, or if they merely increase the security surrounding containers (i.e., is it reasonable to run podman without security labels?).
Steps to reproduce the issue:
Install podman and sudo on OpenWrt.
Build a container image named "foo".
Run
sudo -u user sh
Run
podman run --userns=auto foo
Describe the results you received:
Without support for security labels, I get:
Describe the results you expected:
I think podman should be able to run without security labels. Obviously, it would not benefit from things like SELinux or capabilities if this were the case.
Additional information you deem important (e.g. issue happens only occasionally):
Output of
podman version
:Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide?
I visually inspected the source code in master.
Additional environment details (AWS, VirtualBox, physical, etc.):
vendor/github.com/containers/storage/drivers/chown_unix.go contains this:
and chown.go makes use of this with:
Would it be better to catch the idea that "security.capability" is unsupported and thus avoid the later Lsetxattr? The current approach is to error out if Lgetxattr failes.
The text was updated successfully, but these errors were encountered: