public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* user namespace and fully visible proc and sys mounts
@ 2016-03-06  8:28 Serge E. Hallyn
  2016-03-06 21:53 ` Eric W. Biederman
  0 siblings, 1 reply; 10+ messages in thread
From: Serge E. Hallyn @ 2016-03-06  8:28 UTC (permalink / raw)
  To: Eric W. Biederman, lkml, Seth Forshee, Stéphane Graber,
	serge, Andy Lutomirski

Hi,

So we've been over this many times...  but unfortunately there is more
breakage to report.  Regular privileged and unprivileged containers
work all right for us.  But running an unprivileged container inside a
privileged container is blocked.

When creating privileged containers, lxc by default does a few things:
it mounts some fuse.lxcfs files over procfiles include /proc/meminfo and
/proc/uptime.  It mounts proc rw but /proc/sysrq-trigger ro as well as
moves /proc/sys/net out of the way, bind-mounts /proc/sys readonly
(because this container is not in a user namespace) then moves
/proc/sys/net back.  Finally it mounts sys ro but bind-mounts
/sys/devices/virtual/net as writeable.

If any of these are left enabled, unprivileged containers can't be
started.  If all are disabled, then they can be.

Can we find a way to make these not block remounts in child user
namespaces?  A boot flag, a procfs and sysfs mount option, a sysctl?

-serge

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2016-03-08  4:15 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-03-06  8:28 user namespace and fully visible proc and sys mounts Serge E. Hallyn
2016-03-06 21:53 ` Eric W. Biederman
2016-03-06 23:38   ` Serge E. Hallyn
2016-03-07  2:24   ` Andy Lutomirski
2016-03-07  3:45     ` Serge E. Hallyn
2016-03-07  3:49       ` Andy Lutomirski
2016-03-07  5:03         ` Serge E. Hallyn
2016-03-08  0:07     ` Eric W. Biederman
2016-03-08  0:24       ` Andy Lutomirski
2016-03-08  4:05         ` Eric W. Biederman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox