summaryrefslogtreecommitdiff
path: root/libpod/oci_conmon_linux.go
diff options
context:
space:
mode:
authorDaniel J Walsh <dwalsh@redhat.com>2021-11-22 14:34:05 -0500
committerDaniel J Walsh <dwalsh@redhat.com>2021-11-23 16:31:54 -0500
commitdf6aa673024c96fb41e0f8170b44b6e7b12aaddb (patch)
tree54fee8347cdfaf931c19ac05da4f3e8ea0da988e /libpod/oci_conmon_linux.go
parent1be4c36e7ecbe05333e13320ea1e194b0c41b539 (diff)
downloadpodman-df6aa673024c96fb41e0f8170b44b6e7b12aaddb.tar.gz
podman-df6aa673024c96fb41e0f8170b44b6e7b12aaddb.tar.bz2
podman-df6aa673024c96fb41e0f8170b44b6e7b12aaddb.zip
Unset SocketLabel after system finishes checkpointing
This should fix the SELinux issue we are seeing with talking to /run/systemd/private. Fixes: https://github.com/containers/podman/issues/12362 Also unset the XDG_RUNTIME_DIR if set, since we don't know when running as a service if this will cause issue.s Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'libpod/oci_conmon_linux.go')
-rw-r--r--libpod/oci_conmon_linux.go32
1 files changed, 26 insertions, 6 deletions
diff --git a/libpod/oci_conmon_linux.go b/libpod/oci_conmon_linux.go
index baf05189c..3aab6864a 100644
--- a/libpod/oci_conmon_linux.go
+++ b/libpod/oci_conmon_linux.go
@@ -777,9 +777,6 @@ func (r *ConmonOCIRuntime) AttachResize(ctr *Container, newSize define.TerminalS
// CheckpointContainer checkpoints the given container.
func (r *ConmonOCIRuntime) CheckpointContainer(ctr *Container, options ContainerCheckpointOptions) (int64, error) {
- if err := label.SetSocketLabel(ctr.ProcessLabel()); err != nil {
- return 0, err
- }
// imagePath is used by CRIU to store the actual checkpoint files
imagePath := ctr.CheckpointPath()
if options.PreCheckPoint {
@@ -823,14 +820,37 @@ func (r *ConmonOCIRuntime) CheckpointContainer(ctr *Container, options Container
if err != nil {
return 0, err
}
+ args = append(args, ctr.ID())
+ logrus.Debugf("the args to checkpoint: %s %s", r.path, strings.Join(args, " "))
+
+ oldRuntimeDir, oldRuntimeDirSet := os.LookupEnv("XDG_RUNTIME_DIR")
if err = os.Setenv("XDG_RUNTIME_DIR", runtimeDir); err != nil {
return 0, errors.Wrapf(err, "cannot set XDG_RUNTIME_DIR")
}
- args = append(args, ctr.ID())
- logrus.Debugf("the args to checkpoint: %s %s", r.path, strings.Join(args, " "))
+ runtime.LockOSThread()
+ if err := label.SetSocketLabel(ctr.ProcessLabel()); err != nil {
+ return 0, err
+ }
+ defer func() {
+ if oldRuntimeDirSet {
+ if err := os.Setenv("XDG_RUNTIME_DIR", oldRuntimeDir); err != nil {
+ logrus.Warnf("cannot resset XDG_RUNTIME_DIR: %v", err)
+ }
+ } else {
+ if err := os.Unsetenv("XDG_RUNTIME_DIR"); err != nil {
+ logrus.Warnf("cannot unset XDG_RUNTIME_DIR: %v", err)
+ }
+ }
+ }()
runtimeCheckpointStarted := time.Now()
err = utils.ExecCmdWithStdStreams(os.Stdin, os.Stdout, os.Stderr, nil, r.path, args...)
+ // Ignore error returned from SetSocketLabel("") call,
+ // can't recover.
+ if labelErr := label.SetSocketLabel(""); labelErr != nil {
+ logrus.Errorf("Unable to reset socket label: %q", labelErr)
+ }
+ runtime.UnlockOSThread()
runtimeCheckpointDuration := func() int64 {
if options.PrintStats {
@@ -1445,7 +1465,7 @@ func startCommandGivenSelinux(cmd *exec.Cmd, ctr *Container) error {
// Ignore error returned from SetProcessLabel("") call,
// can't recover.
if labelErr := label.SetProcessLabel(""); labelErr != nil {
- logrus.Errorf("Unable to set process label: %q", err)
+ logrus.Errorf("Unable to set process label: %q", labelErr)
}
runtime.UnlockOSThread()
return err