[Devel] [PATCH RHEL7 COMMIT] ve/proc/ipc: allow mount proc and mqueue inside container
Konstantin Khorenko
khorenko at virtuozzo.com
Mon Jul 6 06:27:54 PDT 2015
The commit is pushed to "branch-rh7-3.10.0-123.1.2-ovz" and will appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-123.1.2.vz7.5.24
------>
commit e3d038561b5b594109630410803c3b537da5b4a7
Author: Pavel Tikhomirov <ptikhomirov at virtuozzo.com>
Date: Mon Jul 6 17:27:54 2015 +0400
ve/proc/ipc: allow mount proc and mqueue inside container
Patchset description:
capability fixes for docker
allow what docker wants, need it to run integration-cli tests
when we will prohibit CAP_SYS_ADMIN and CAP_NET_ADMIN in CT
* after switching to user namespaces we won't need those patches
which is planned in the scope of
https://jira.sw.ru/browse/PSBM-33304
to test without CAP_SYS_ADMIN and CAP_NET_ADMIN:
vzctl set 206 --capability net_admin:off \
--capability sys_admin:off --save
Pavel Tikhomirov (3):
vfs: allow mount/umount, pivot_root with CAP_VE_SYS_ADMIN
rtnl: allow move network devices into network namespace in CT
vfs: allow mount proc and mqueue inside container
################################################################
This patch description:
need this for docker, as it tries to mount proc and mqueue
and as we will not allow CAP_SYS_ADMIN in container.
* after switching to user namespaces we won't need this patch
https://jira.sw.ru/browse/PSBM-34523
Signed-off-by: Pavel Tikhomirov <ptikhomirov at virtuozzo.com>
It also allows to start container if CAP_SYS_ADMIN is unset with vzctl
else we get error:
vzctl set 206 --capability sys_admin:off --save
vzctl start 206
Starting Container ...
Unmount image: /vz/private/206/root.hdd
Unmounting file system at /vz/root/206
Unmounting device /dev/ploop28512
Container is unmounted
Mount image: /vz/private/206/root.hdd
Opening delta /vz/private/206/root.hdd/root.hds
Adding delta dev=/dev/ploop28512 img=/vz/private/206/root.hdd/root.hds (rw)
Mounting /dev/ploop28512p1 at /vz/root/206 fstype=ext4
data='balloon_ino=12,pfcache_csum,,'
Container is mounted
Os release: 3.10.0-123.1.2.vz7.5.23
Failed to mount /proc: Operation not permitted
Unmount image: /vz/private/206/root.hdd
Unmounting file system at /vz/root/206
Unmounting device /dev/ploop28512
Container is unmounted
Failed to start the Container
---
fs/proc/root.c | 3 ++-
ipc/mqueue.c | 3 ++-
2 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/fs/proc/root.c b/fs/proc/root.c
index 88be7c2..0b7dbdb 100644
--- a/fs/proc/root.c
+++ b/fs/proc/root.c
@@ -121,7 +121,8 @@ static struct dentry *proc_mount(struct file_system_type *fs_type,
options = data;
if (!current_user_ns()->may_mount_proc ||
- !ns_capable(ns->user_ns, CAP_SYS_ADMIN))
+ (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) &&
+ !ns_capable(ns->user_ns, CAP_VE_SYS_ADMIN)))
return ERR_PTR(-EPERM);
}
diff --git a/ipc/mqueue.c b/ipc/mqueue.c
index 657814c..c5f1d3e 100644
--- a/ipc/mqueue.c
+++ b/ipc/mqueue.c
@@ -335,7 +335,8 @@ static struct dentry *mqueue_mount(struct file_system_type *fs_type,
/* Don't allow mounting unless the caller has CAP_SYS_ADMIN
* over the ipc namespace.
*/
- if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN))
+ if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) &&
+ !ns_capable(ns->user_ns, CAP_VE_SYS_ADMIN))
return ERR_PTR(-EPERM);
data = ns;
More information about the Devel
mailing list