Bump libcontainer to 5765dcd086eb0584c0e2eaff9a3ac97b467a98e6#16468
Bump libcontainer to 5765dcd086eb0584c0e2eaff9a3ac97b467a98e6#16468jessfraz merged 5 commits intomoby:masterfrom
Conversation
a674b5b to
7c0b8a9
Compare
|
This brings in the mount propagation changes into docker but we are having some issues when running containers with --read-only. I think it has something due to the changes, maybe something around the root not being PRIVATE anymore or something else with the mounts and propagation flags. Could u please take a look? |
|
@crosbymichael I looked briefly at my patch and can't think how it is leading to failure. Tomorrow I will spend more time on this. First I need to understand the test which is failing and that will give more clues. BTW, my patch does not change the propagation property of rootfs and it still continues to be PRIVATE. |
|
For me --read-only works with -ti option but not without it. "docker run --red-only fedora ls" is failing while "docker run -ti --read-only fedora ls" succeeds. I did strace on docker daemon and somebody is doing "fchown()" on a read only file system hence -EROFS is returned. 30347 fchown(0, 0, 0) = -1 EROFS (Read-only file system) I am not sure who is doing fchown() yet. |
|
@mrunalp Would you have any idea. |
|
Ok, setupUser() if failing in libcontainer (init_linux.go) |
|
Fchown is probably from the user ns related two patches. Sent from my iPhone
|
|
Following commit introduce Fchown() |
|
ok, thanks for taking a look at this. I was not sure about changing the propagation of the rootfs from PRIVATE to something else or not. |
|
@crosbymichael rootfs propagation mode change patches have not been merged yet. I am reworking those patches now. |
|
Ok, i figured out the issue, it's with michael|~ > docker run ubuntu ls -l /proc/1/fd/
total 0
lr-x------ 1 root root 64 Sep 22 17:41 0 -> /dev/null
l-wx------ 1 root root 64 Sep 22 17:41 1 -> pipe:[143849]
l-wx------ 1 root root 64 Sep 22 17:41 2 -> pipe:[143850]
lr-x------ 1 root root 64 Sep 22 17:41 3 -> /proc/1/fd
michael|~ > docker run -i ubuntu ls -l /proc/1/fd/
total 0
lr-x------ 1 root root 64 Sep 22 17:41 0 -> pipe:[142163]
l-wx------ 1 root root 64 Sep 22 17:41 1 -> pipe:[142167]
l-wx------ 1 root root 64 Sep 22 17:41 2 -> pipe:[142168]
lr-x------ 1 root root 64 Sep 22 17:41 3 -> /proc/1/fd |
|
Oh, so without "-i", stdin is pointing to /dev/null and we try to change ownership of /dev/null instead? And that will fail as / is read only. |
|
Naw, I just have to either ignore it if it's |
|
I assume if we are going to pick up the update to handle I think the combination of those (plus the ones included already in this PR) fix all known issues with user ns from a lower layer (libcontainer) perspective. |
|
@icecrime @estesp @tiborvass this one should be good to go execpt for waiting on the apparmor test fixes. I can rebase once @icecrime is done doing what he is doing. |
0346c54 to
861ed8f
Compare
|
Looks like switching to the vendored netlink library kills Windows daemon build. I assume putting a dummy .go file in |
|
@estesp i'm fixing that in runc now |
|
@estesp - No, it's not used on Windows (yet) |
861ed8f to
1acd3b2
Compare
Signed-off-by: Michael Crosby <[email protected]>
Signed-off-by: Michael Crosby <[email protected]>
Signed-off-by: Michael Crosby <[email protected]>
Signed-off-by: Michael Crosby <[email protected]>
Signed-off-by: Michael Crosby <[email protected]>
1acd3b2 to
7d8b5fc
Compare
|
LGTM |
1 similar comment
|
LGTM |
Bump libcontainer to 5765dcd086eb0584c0e2eaff9a3ac97b467a98e6
Fixes #6880
This bumps libcontainer to fix some STDIO permission issues and update docker with the latest changes to libcontainer and it's configuration.