Control: Tag -1 upstream

The full context of this conversation is archived at 
https://bugs.debian.org/1100135

Sam Hartman <[email protected]> writes:

> package: apparmor
> version: 4.1.0~beta5-3
> severity: important
> x-debbugs-cc: [email protected], [email protected], 
> [email protected], 
> [email protected]
>
> Recently I started running into the following error shutting down
> containers with podman stop:
>
>       * rootless netns: kill network process: permission denied
>         This error is produced by
>         
> golang-github-containers-common/libnetwork/internal/rootlessnetns/netns_linux.go
>         in the cleanup function:
>               if err := n.cleanupRootlessNetns(); err != nil {
>               multiErr = multierror.Append(multiErr, wrapError("kill network 
> process", err))
>       }
>
> And that function effectively just finds and kills the pasta or
> slirp4netns process:
>       if err == nil {
>               // kill the slirp/pasta process so we do not leak it
>               err = unix.Kill(pid, unix.SIGTERM)
>               if err == unix.ESRCH {
>                       err = nil
>               }
>

Sam, I think your analyis makes sense. I see that you have now re-assigned this 
to
the golang-github-containers-common package, which does contain the code above.

May I ask you to file this bug at
https://github.com/containers/common/issues/new?template=BLANK_ISSUE and
tag me and dwalsh to it? I'd make sure that we make the right decision
here. As a heads-up, I've CC'ed Dan and Paul to this email.

Thanks!

-rt

Reply via email to