1. 04 Jan, 2018 1 commit
    • conf: write "deny" to /proc/[pid]/setgroups · a19b974f
      Christian Brauner authored
      When fully unprivileged users run a container that only maps their own {g,u}id
      and they do not have access to setuid new{g,u}idmap binaries we will write the
      idmapping directly. This however requires us to write "deny" to
      /proc/[pid]/setgroups otherwise any write to /proc/[pid]/gid_map will be
      denied.
      
      On a sidenote, this patch enables fully unprivileged containers. If you now set
      lxc.net.[i].type = empty no privilege whatsoever is required to run a container.
      
      Enhances #2033.
      Signed-off-by: 's avatarChristian Brauner <christian.brauner@ubuntu.com>
      Cc: Felix Abecassis <fabecassis@nvidia.com>
      Cc: Jonathan Calmels <jcalmels@nvidia.com>
      Signed-off-by: 's avatarChristian Brauner <christian.brauner@ubuntu.com>
  2. 03 Jan, 2018 1 commit
  3. 02 Jan, 2018 5 commits
  4. 30 Dec, 2017 6 commits
  5. 26 Dec, 2017 2 commits
  6. 22 Dec, 2017 6 commits
  7. 21 Dec, 2017 11 commits
  8. 20 Dec, 2017 5 commits
  9. 19 Dec, 2017 3 commits