-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
process_linux.go:252: getting pipe fds for pid 2130 caused "readlink /proc/2130/fd/0: permission denied" #1419
Comments
Yeah. This issue was fixed for rootless containers in #774 and IIRC @brauner (or someone on the Canonical containers team) was planning on expanding that patchset so it also works for unprivileged LXC containers. Not sure what the current status is. Maybe I should extend it myself by doing the whole |
Ah sorry I think they weren't aware of this part of another patch (I must've forgotten to split this properly): d2f4969#diff-e6cd3268ea1b2c0ee41532976972b36fR433. |
@cyphar Thanks, for your answer. I', will try to use this patch. About user_ns detection problem, as a temporary solution, But of course we need specific sysctl or /proc file for this, from kernel side. |
Yeah, I don't think we should implement it that way. The kernel provides (in recent kernels) |
@cyphar wow, cool, thanks. I'm will try this with your runc patch. |
Swith to custom docker-runc with fixed issue opencontainers/runc#1419
Folks, i'm was backported patches from @cyphar, all works fine patched docker-runc available at https://github.com/anevenchanniy/runc/tree/usern_ns patched docker-17.04 available at https://github.com/anevenchanniy/moby/tree/user_ns. |
@anevenchanniy In case you're interested, the patch for containerd to use |
I'll finish the docker integration tomorrow, there is a lot to do with imports, spec changes, and other deps that have changed over the past few months. |
Tested with latest docker, issue resolved. |
Unable to start docker container inside unprivilegied LXC container with error:
[root@klxc5 /]# docker run --rm -it registry.foo.bar/base/centos:7.3.1611 /bin/bash
docker: Error response from daemon: oci runtime error: container_linux.go:247: starting container process caused "process_linux.go:252: getting pipe fds for pid 2130 caused "readlink /proc/2130/fd/0: permission denied"".
LXC version: 2.0.7
OS: CentOs-7.3
LXC container config:
lxc.arch = x86_64
lxc.id_map = u 0 165536 65536
lxc.id_map = g 0 165536 65536
lxc.cgroup.devices.allow = a
lxc.cap.drop = mac_admin mac_override sys_time sys_module sys_rawio
lxc.aa_profile = unconfined
lxc.rootfs = /dev/vg00/klxc5.cloud.foo.bar
lxc.rootfs.backend = lvm
lxc.utsname = klxc5.cloud.foo.bar
lxc.network.type = veth
lxc.network.flags = up
lxc.network.link = k8sbr
lxc.network.ipv4 = x.x.x.x/21
lxc.network.ipv4.gateway = x.x.x.x
lxc.mount.auto = cgroup:rw proc:rw sys:rw
This behavior appears after the patch 50a19c6
The text was updated successfully, but these errors were encountered: