-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
latest podman injects nodev
for / by default, breaking e.g. mock
#1303
Comments
Can you add |
This is probably a result of our swap to systemd cgroup management in 0.8.2.1. Will need to look into why this is prohibiting this. |
While attempting to reproduce, I caused |
conmon coredump is just on one VM, so that's probably just my environment. Can repro locally on my laptop. |
It's not cgroupfs, it's not SELinux. Hm. |
Has to be the devices cgroup. We don't deliberately set anything related to said CGroup, though. |
The mystery deepens. To avoid mutating my desktop too much I've been doing some testing in a FAH28 VM, and
Now here's the thing...if I Other notable changes:
I just tried updating |
Ah hah 🔍.
|
Note the |
nodev
for / by default, breaking e.g. mock
...But why are we allowed to |
This looks like https://github.com/containers/storage/blob/956a1971694f18fd602b1203c0a2d192e2cc88a1/storage.conf#L35-L36 - added by @rhatdan a month ago. @cgwalters Can you change storage.conf to remove the @rhatdan Can we make this toggle-able per-container? |
I briefly tried to find out which git commit in podman started injecting However, now that I know the root cause, since today practically speaking recursive containers need --privileged, it's a simple matter of |
I think probably the storage conf shouldn't have default mount flags. Rather, podman could inject |
Also a side note, now that I understand the root cause, my failure to bisect it comes down to not noticing that |
Somehow only hit this now myself and took me some time to figure it out. I would definitely expect |
Slowly working my way back to this. We really need to be able to disable some options for containers/storage at container create time. I have been distracted by other tasks though. |
F29 podman ends up with nodev in the mount options for a --privileged container, which keeps mock from working properly. See containers/podman#1303
This should be fixed in latest podman. |
(In a quick test I failed to downgrade to https://koji.fedoraproject.org/koji/buildinfo?buildID=1133743 due to conmon, but trying the latest version in FAH28...)
The above works fine.
This specifically breaks running
mock
inside podman.The text was updated successfully, but these errors were encountered: