[lxc-devel] seccomp, lxcfs and force-unmount
Wolfgang Bumiller
w.bumiller at proxmox.com
Mon Jul 27 08:24:02 UTC 2015
(I only recently subscribed to the list so forgive me if there's already
a thread I should be replying to instead of opening a new one.)
So I came across the force-unmount issue where `umount -f` on any of the
bind mounts can cause lxcfs on the host to terminate.
I find the seccomp solution to be rather crude as force-unmount might
have some legitimate usecases inside a container, and the seccomp way
cannot be limited to certain paths. And it's still problematic with 32
bit containers on 64 bit hosts, as mentioned in #571 due to
reject_force_umount being incorrectly resolved to systemcalls (and
getting equal -1 IDs from it).
I'd like to know why this is even necessary, as I don't see a reason to
care about IDs since as far as I can tell you _do_ need to add them to
both contexts. (Which is what I do in my pull request #600 - awaiting
review/comments).
Here's the idea/suggestion:
I'm wondering if it would instead make sense to spawn an lxcfs process
per container. If this is problematic due to lxcfs' design the only
other way I see to support force-unmount inside containers would be to
spawn a bindfs (fuse bind) per container between the container and
lxcfs, in which case the force-unmount would only terminate the bind,
rather than the lxcfs itself.
Either way I'd be willing to work on some patches if I know which
direction to go.
More information about the lxc-devel
mailing list