Skip to content

Conversation

@robbmanes
Copy link

This is a backport of an upstream fix for:

opencontainers/selinux@fd7b61c

Currently if we have an error in the options, we will leak and allocated
SELinux label. This change will release on error.

Also return the mountlabel, even if the user specifies to disable SELinux separation. This keeps other containers from being able to look at this privileged
containers content, as well makeing sure all content has a label.

This should fix an issue we see where we leak labels in the docker daemon, causing over time large usage memory.

This is a backport of an upstream fix for:

opencontainers/selinux@fd7b61c

Currently if we have an error in the options, we will leak and allocated
SELinux label.  This change will release on error.

Also return the mountlabel, even if the user specifies to disable SELinux separation.  This keeps other containers from being able to look at this privileged
containers content, as well makeing sure all content has a label.
@rh-atomic-bot
Copy link

Can one of the admins verify this patch?
I understand the following commands:

  • bot, add author to whitelist
  • bot, test pull request
  • bot, test pull request once

@rhatdan
Copy link
Member

rhatdan commented Mar 2, 2020

LGTM

@rhatdan rhatdan merged commit 71de45f into projectatomic:docker-1.13.1-rhel Mar 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants