Merge pull request #17736 from giuseppe/no-private-cgroupns-systemd

cgroupns: private cgroupns on cgroupv1 breaks --systemd
This commit is contained in:
OpenShift Merge Robot
2023-03-14 11:33:24 -04:00
committed by GitHub
3 changed files with 63 additions and 41 deletions

View File

@ -242,17 +242,17 @@ func (c *Container) setupSystemd(mounts []spec.Mount, g generate.Generator) erro
return err return err
} }
hasCgroupNs := false
for _, ns := range c.config.Spec.Linux.Namespaces {
if ns.Type == spec.CgroupNamespace {
hasCgroupNs = true
break
}
}
if unified { if unified {
g.RemoveMount("/sys/fs/cgroup") g.RemoveMount("/sys/fs/cgroup")
hasCgroupNs := false
for _, ns := range c.config.Spec.Linux.Namespaces {
if ns.Type == spec.CgroupNamespace {
hasCgroupNs = true
break
}
}
var systemdMnt spec.Mount var systemdMnt spec.Mount
if hasCgroupNs { if hasCgroupNs {
systemdMnt = spec.Mount{ systemdMnt = spec.Mount{
@ -271,40 +271,46 @@ func (c *Container) setupSystemd(mounts []spec.Mount, g generate.Generator) erro
} }
g.AddMount(systemdMnt) g.AddMount(systemdMnt)
} else { } else {
mountOptions := []string{"bind", "rprivate"} hasSystemdMount := MountExists(mounts, "/sys/fs/cgroup/systemd")
skipMount := false if hasCgroupNs && !hasSystemdMount {
return errors.New("cgroup namespace is not supported with cgroup v1 and systemd mode")
var statfs unix.Statfs_t
if err := unix.Statfs("/sys/fs/cgroup/systemd", &statfs); err != nil {
if errors.Is(err, os.ErrNotExist) {
// If the mount is missing on the host, we cannot bind mount it so
// just skip it.
skipMount = true
}
mountOptions = append(mountOptions, "nodev", "noexec", "nosuid")
} else {
if statfs.Flags&unix.MS_NODEV == unix.MS_NODEV {
mountOptions = append(mountOptions, "nodev")
}
if statfs.Flags&unix.MS_NOEXEC == unix.MS_NOEXEC {
mountOptions = append(mountOptions, "noexec")
}
if statfs.Flags&unix.MS_NOSUID == unix.MS_NOSUID {
mountOptions = append(mountOptions, "nosuid")
}
if statfs.Flags&unix.MS_RDONLY == unix.MS_RDONLY {
mountOptions = append(mountOptions, "ro")
}
} }
if !skipMount { mountOptions := []string{"bind", "rprivate"}
systemdMnt := spec.Mount{
Destination: "/sys/fs/cgroup/systemd", if !hasSystemdMount {
Type: "bind", skipMount := hasSystemdMount
Source: "/sys/fs/cgroup/systemd", var statfs unix.Statfs_t
Options: mountOptions, if err := unix.Statfs("/sys/fs/cgroup/systemd", &statfs); err != nil {
if errors.Is(err, os.ErrNotExist) {
// If the mount is missing on the host, we cannot bind mount it so
// just skip it.
skipMount = true
}
mountOptions = append(mountOptions, "nodev", "noexec", "nosuid")
} else {
if statfs.Flags&unix.MS_NODEV == unix.MS_NODEV {
mountOptions = append(mountOptions, "nodev")
}
if statfs.Flags&unix.MS_NOEXEC == unix.MS_NOEXEC {
mountOptions = append(mountOptions, "noexec")
}
if statfs.Flags&unix.MS_NOSUID == unix.MS_NOSUID {
mountOptions = append(mountOptions, "nosuid")
}
if statfs.Flags&unix.MS_RDONLY == unix.MS_RDONLY {
mountOptions = append(mountOptions, "ro")
}
}
if !skipMount {
systemdMnt := spec.Mount{
Destination: "/sys/fs/cgroup/systemd",
Type: "bind",
Source: "/sys/fs/cgroup/systemd",
Options: mountOptions,
}
g.AddMount(systemdMnt)
g.AddLinuxMaskedPaths("/sys/fs/cgroup/systemd/release_agent")
} }
g.AddMount(systemdMnt)
g.AddLinuxMaskedPaths("/sys/fs/cgroup/systemd/release_agent")
} }
} }
@ -446,7 +452,7 @@ func (c *Container) addNetworkNamespace(g *generate.Generator) error {
func (c *Container) addSystemdMounts(g *generate.Generator) error { func (c *Container) addSystemdMounts(g *generate.Generator) error {
if c.Systemd() { if c.Systemd() {
if err := c.setupSystemd(g.Mounts(), *g); err != nil { if err := c.setupSystemd(g.Mounts(), *g); err != nil {
return fmt.Errorf("adding systemd-specific mounts: %w", err) return err
} }
} }
return nil return nil

View File

@ -280,6 +280,13 @@ LISTEN_FDNAMES=listen_fdnames" | sort)
is "${container_uuid}" "${output:0:32}" "UUID should be first 32 chars of Container id" is "${container_uuid}" "${output:0:32}" "UUID should be first 32 chars of Container id"
} }
@test "podman --systemd fails on cgroup v1 with a private cgroupns" {
skip_if_cgroupsv2
run_podman 126 run --systemd=always --cgroupns=private $IMAGE true
assert "$output" =~ ".*cgroup namespace is not supported with cgroup v1 and systemd mode"
}
# https://github.com/containers/podman/issues/13153 # https://github.com/containers/podman/issues/13153
@test "podman rootless-netns slirp4netns process should be in different cgroup" { @test "podman rootless-netns slirp4netns process should be in different cgroup" {
is_rootless || skip "only meaningful for rootless" is_rootless || skip "only meaningful for rootless"

View File

@ -497,6 +497,15 @@ function skip_if_cgroupsv1() {
fi fi
} }
#######################
# skip_if_cgroupsv2 # ...with an optional message
#######################
function skip_if_cgroupsv2() {
if is_cgroupsv2; then
skip "${1:-test requires cgroupsv1}"
fi
}
###################### ######################
# skip_if_rootless_cgroupsv1 # ...with an optional message # skip_if_rootless_cgroupsv1 # ...with an optional message
###################### ######################