Bug 2034209
Summary: | Seccomp rules break F35 container DNS resolution | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Pavel Raiskup <praiskup> |
Component: | podman | Assignee: | Paul Holzinger <pholzing> |
Status: | CLOSED WONTFIX | QA Contact: | atomic-bugs <atomic-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.9 | CC: | bbaude, dwalsh, fweimer, gscrivan, jligon, jnovy, lsm5, mharri, mheon, ngompa13, pholzing, tsweeney, umohnani |
Target Milestone: | rc | Keywords: | Extras |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-02-26 17:51:10 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Pavel Raiskup
2021-12-20 12:05:55 UTC
This also affects Docker on RHEL 7 too. > What we do in Mock is just `podman start` and `podman exec`, without
> --privileged option as non-root user.
I checked once more, and we are running it as the root user (bad). Nevertheless,
I tested that both root/non-root scenario manually and it behaves the same.
Paul, can you take a look at this please? I think it also requires an update in libseccomp which is unlikely to happen in 7.9. We have a definitive fix for this issue in RHEL 8 but it touches few components and it won't be backported to RHEL 7. Could you just disable seccomp for F35 containers with `--security-opt seccomp=unconfined`? @praiskup please see https://bugzilla.redhat.com/show_bug.cgi?id=2034209#c7 I think we could turn off seccomp for all images, not only F35? https://github.com/rpm-software-management/mock/pulls better not disable seccomp by default, just do that on RHEL7 when using Fedora35+ images with an updated glibc. On RHEL 8 there is no need to disable seccomp because ENOSYS will be returned for syscalls unknown to the seccomp profile. There will be no back ported fixes for RHEL7. It no longer gets updated. Disable seccomp or update to RHEL 8 is the only option. |