[lxc-users] bind-mounting kernel directories
    Chris Burroughs 
    chris.burroughs at gmail.com
       
    Mon Apr  6 20:17:27 UTC 2015
    
    
  
On 04/01/2015 12:54 PM, Michael H. Warfield wrote:
> Doing a read-only bind mount is marginal at best.  We've had issues with
> remounts in containers propagating out (that I think/hope are finally
> fixed) and some containers need mount privs in order to mount images or
> do nfs/afs/cifs mounts, so prohibiting the cap_sysadmin is not a viable
> option in general there.
With the centos default templates (ie with CAP_SYS_ADMIN) + privileged 
container the remount is allowed: mount -o remount,rw /dev/foo /lib/modules/
 From your 'think/hope' comment it sounded like you were expecting 
something besides CAP_SYS_ADMIN to be able to stop the remount, but I'm 
not sure what that mechanism would be.
    
    
More information about the lxc-users
mailing list