[PATCH] devpts: Add ptmx_uid and ptmx_gid options
alexl at redhat.com
Tue Mar 8 09:16:31 UTC 2016
On mån, 2016-03-07 at 20:59 -0800, Andy Lutomirski wrote:
> On Thu, May 28, 2015 at 12:42 PM, Eric W. Biederman
> <ebiederm at xmission.com> wrote:
> > Andy Lutomirski <luto at amacapital.net> writes:
> Apparently alexl is encountering some annoyances related to the
> current workaround, and the workaround is certainly ugly.
It works, but it introduces an extra namespace that gets exposed to the
world, which is pretty ugly. For instance, entering the namespace
becomes hard. I can setns() into the intermediate user+mount namespace
without problems, but if i try to setns into the final user+mount ns
(it gets its own implicit mount ns) i get EPERM. I'm not sure exactly
> Your proposal seems like it could break some use cases involving
> fscaps on a mount or mount-like binary.
> What if we change it to use the owner of the userns that owns the
> current mount ns? For anything that doesn't explicitly use
> namespaces, this will be zero. For namespace users, it should do the
> right thing.
Any of these is fine with me. One nice thing would if i could somehow
detect whether this was supported or not so that i can fall back on the
Alexander Larsson Red Hat, Inc
alexl at redhat.com alexander.larsson at gmail.com
He's an all-American guitar-strumming househusband with no name. She's a
scantily clad impetuous former first lady who don't take no shit from
nobody. They fight crime!
More information about the Containers