[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4864d279-9a3f-eaf4-c297-ea34be604e41@metux.net>
Date: Wed, 14 Feb 2018 13:38:48 +0100
From: Enrico Weigelt <lkml@...ux.net>
To: Richard Weinberger <richard.weinberger@...il.com>
Cc: Aleksa Sarai <asarai@...e.de>,
Linux Containers <containers@...ts.linux-foundation.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: plan9 semantics on Linux - mount namespaces
On 14.02.2018 12:30, Richard Weinberger wrote:
> On Wed, Feb 14, 2018 at 12:27 PM, Enrico Weigelt <lkml@...ux.net> wrote:
>> On 14.02.2018 11:24, Aleksa Sarai wrote:
>>
>>> What distribution are you using and which release?
>>
>>
>> On a self-compiled system.
>>
>> Forgot to enable namespaces in the kernel. Now it seems to work
>> as root, but not as an unprivileged user:
>>
>>
>> daemon@...habox:~ unshare -r -U
>> unshare: can't open '/proc/self/setgroups': Permission denied
>> daemon@...habox:~ unshare -f -r -U
>> unshare: can't open '/proc/self/setgroups': Permission denied
>>
>
> Please read http://man7.org/linux/man-pages/man7/user_namespaces.7.html
> setgroups is a corner case and needs special care.
I'm still confused. Does the unshare program do something wrong here ?
Anyways, I doubt that user namespaces help solving my problem.
What I'd like to achieve is that processes can manipulate their private
namespace at will and mount other filesystems (primarily 9p and fuse).
For that, I need to get rid of setuid (and per-file caps) for these
private namespaces.
--mtx
--
Enrico Weigelt, metux IT consult
Free software and Linux embedded engineering
info@...ux.net -- +49-151-27565287
Powered by blists - more mailing lists